×

Method and system for digital information protection

  • US 5,701,343 A
  • Filed: 11/29/1995
  • Issued: 12/23/1997
  • Est. Priority Date: 12/01/1994
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for digital information protection in a system in which a user makes an access to a digital information provided by an information center, by connecting a computer card owned by the user to an information terminal device connected with the information center, the method comprising the steps of:

  • (a) carrying out a mutual authentication between the computer card and the information terminal device;

    (b) carrying out a user authentication by the computer card through the information terminal device;

    (c) sending an information request specifying the desired digital information of the user from the information terminal device to the information center by signing and encrypting an information identifier for identifying the desired digital information;

    (d) sending the work key for encrypting the desired digital information from the information center to the computer card by a cipher communication using a public key cryptosystem;

    (e) obtaining and registering the work key sent from the information center at the computer card, and sending a work key receipt signature from the computer card to the information center;

    (f) receiving a work key request message containing a random number from the information terminal device at the computer card, encrypting the work key according to the random number, and sending an encrypted work key from the computer card to the information terminal device;

    (g) encrypting the desired digital information specified by the information request by using the work key at the information center, and sending the encrypted digital information from the information center to the information terminal device;

    (h) receiving and decrypting the encrypted work key sent from the computer card so as to obtain the work key at the information terminal device, receiving and decrypting the encrypted digital information sent from the information center by using the work key, and providing the decrypted digital information to the user at the information terminal device; and

    (i) sending an encrypted information receipt signature from the information terminal device to the information center, and recording the information request, the work key receipt signature, and the encrypted information receipt signature as a ground for charging at the information center.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×