System and method for manipulating a computer file and/or program
First Claim
1. A system for manipulating a computer file and/or program comprising:
- a serving device having access to a computer file and/or program which is unencrypted and which can encrypt the unencrypted computer file and/or program to become an encrypted computer file and/or program and transfer it;
a connector connected to the serving device on which the encrypted computer file and/or program travels and to which the serving device transfers the encrypted computer file and/or program;
a client device which receives the encrypted computer file and/or program and decrypts the encrypted computer file and/or program back to the unencrypted computer file and/or program, said client device not allowing intervention to the encrypted computer file and/or program during a time when the encrypted computer and/or file program is received, said serving device separate, apart and distinct from the client device, the serving device assigns permissions and/or rights to the unencrypted computer file and/or program which identifies what the client device can do with the unencrypted or encrypted computer file and/or program after the client device has received the encrypted computer file and/or program or after the client device has decrypted the encrypted computer file and/or program back to the unencrypted computer file and/or program, the serving device encrypts the permissions and/or rights and transfers them to the client device through the connector, said client device decrypts the unencrypted permissions and/or rights, the serving device includes controlling server software and/or firmware which causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights and instructs the client device to temporarily suspend user intervention when the client device receives the encrypted computer file and/or program and the encrypted permissions and/or rights, the client device includes controlling client software and/or firmware which causes the decryption of the encrypted computer file and/or program, the client device has a mechanism for requesting the unencrypted computer file and/or program from the serving device, the controlling client software and/or firmware causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights for storage, the client device has an operating system and the controller client software and/or firmware instructs the operating system to reestablish user intervention at a desired time, the serving device has a server public key infrastructure which encrypts using encrypted communication protocols the permissions and/or rights and the unencrypted computer file and/or program, the client device has a client public key infrastructure which decrypts from transmission the permissions and/or rights and encrypted computer file and/or program using encrypted communication protocols, the client device includes an encrypting file system which encrypts the unencrypted computer file and/or program and the permissions and/or rights and allows for the manual selection of the unencrypted computer file and/or program for encryption or decryption, the client public key infrastructure has an encryption and/or decryption key and the encrypting file system uses the encryption and/or decryption key utilized by the client public key infrastructure, the controlling client software and/or firmware moves or copies the encrypted computer file and/or program to the next client device through the second connector, said client device having a controlling next client software and/or firmware which decrypts the received encrypted computer file and/or program and the encrypted permissions and/or rights and temporarily suspends user intervention of the next client device while the encrypted computer file and/or program is received by the next client device; and
a next client device connected to the client device through the connector.
6 Assignments
0 Petitions
Accused Products
Abstract
A system for manipulating a computer file and/or program. The system includes a serving device having access to a computer file and/or program which is unencrypted and which can encrypt the unencrypted computer file and/or program to become an encrypted computer file and/or program and transfer it. The system includes a connector connected to the serving device on which the encrypted computer file and/or program travels and to which the serving device transfers the encrypted computer file and/or program. The system includes a client device which receives the encrypted computer file and/or program and decrypts the encrypted computer file and/or program back to the unencrypted computer file and/or program.
247 Citations
10 Claims
-
1. A system for manipulating a computer file and/or program comprising:
-
a serving device having access to a computer file and/or program which is unencrypted and which can encrypt the unencrypted computer file and/or program to become an encrypted computer file and/or program and transfer it;
a connector connected to the serving device on which the encrypted computer file and/or program travels and to which the serving device transfers the encrypted computer file and/or program;
a client device which receives the encrypted computer file and/or program and decrypts the encrypted computer file and/or program back to the unencrypted computer file and/or program, said client device not allowing intervention to the encrypted computer file and/or program during a time when the encrypted computer and/or file program is received, said serving device separate, apart and distinct from the client device, the serving device assigns permissions and/or rights to the unencrypted computer file and/or program which identifies what the client device can do with the unencrypted or encrypted computer file and/or program after the client device has received the encrypted computer file and/or program or after the client device has decrypted the encrypted computer file and/or program back to the unencrypted computer file and/or program, the serving device encrypts the permissions and/or rights and transfers them to the client device through the connector, said client device decrypts the unencrypted permissions and/or rights, the serving device includes controlling server software and/or firmware which causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights and instructs the client device to temporarily suspend user intervention when the client device receives the encrypted computer file and/or program and the encrypted permissions and/or rights, the client device includes controlling client software and/or firmware which causes the decryption of the encrypted computer file and/or program, the client device has a mechanism for requesting the unencrypted computer file and/or program from the serving device, the controlling client software and/or firmware causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights for storage, the client device has an operating system and the controller client software and/or firmware instructs the operating system to reestablish user intervention at a desired time, the serving device has a server public key infrastructure which encrypts using encrypted communication protocols the permissions and/or rights and the unencrypted computer file and/or program, the client device has a client public key infrastructure which decrypts from transmission the permissions and/or rights and encrypted computer file and/or program using encrypted communication protocols, the client device includes an encrypting file system which encrypts the unencrypted computer file and/or program and the permissions and/or rights and allows for the manual selection of the unencrypted computer file and/or program for encryption or decryption, the client public key infrastructure has an encryption and/or decryption key and the encrypting file system uses the encryption and/or decryption key utilized by the client public key infrastructure, the controlling client software and/or firmware moves or copies the encrypted computer file and/or program to the next client device through the second connector, said client device having a controlling next client software and/or firmware which decrypts the received encrypted computer file and/or program and the encrypted permissions and/or rights and temporarily suspends user intervention of the next client device while the encrypted computer file and/or program is received by the next client device; and
a next client device connected to the client device through the connector. - View Dependent Claims (2, 3)
-
-
4. A method for manipulating a computer file and/or program comprising the steps of:
-
suspending intervention by a user at a client device of the client device;
encrypting an unencrypted computer file and/or program at the server device to form an encrypted computer file and/or program;
transferring the encrypted computer file and/or program to the client device along a connector connected to the client device and the server device; and
reestablishing the intervention of the client device by the user. - View Dependent Claims (5, 6, 7, 8, 9, 10)
-
Specification