×

Method and system for controlling unauthorized access to information distributed to users

  • US 5,586,186 A
  • Filed: 07/15/1994
  • Issued: 12/17/1996
  • Est. Priority Date: 07/15/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for controlling unauthorized access to information distributed to users, the method comprising the steps of:

  • choosing an encryption parameter and generating from it an encryption key using a public key algorithm;

    generating a decryption key using the public key algorithm;

    encrypting the information using the encryption parameter and the encryption key;

    distributing identical copies of the encrypted form of the information to users;

    receiving identifying information from a user;

    generating a numeric representation of the identifying information;

    generating a unique user key using the numeric representation of the identifying information and decryption key information;

    providing the user with the unique user key; and

    decrypting the encrypted form of the information using the numeric representation of the identifying information, the unique user key, and the encryption parameter.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×