×

System and method for manipulating a computer file and/or program

  • US 6,615,349 B1
  • Filed: 02/23/1999
  • Issued: 09/02/2003
  • Est. Priority Date: 02/23/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. A system for manipulating a computer file and/or program comprising:

  • a serving device having access to a computer file and/or program which is unencrypted and which can encrypt the unencrypted computer file and/or program to become an encrypted computer file and/or program and transfer it;

    a connector connected to the serving device on which the encrypted computer file and/or program travels and to which the serving device transfers the encrypted computer file and/or program;

    a client device which receives the encrypted computer file and/or program and decrypts the encrypted computer file and/or program back to the unencrypted computer file and/or program, said client device not allowing intervention to the encrypted computer file and/or program during a time when the encrypted computer and/or file program is received, said serving device separate, apart and distinct from the client device, the serving device assigns permissions and/or rights to the unencrypted computer file and/or program which identifies what the client device can do with the unencrypted or encrypted computer file and/or program after the client device has received the encrypted computer file and/or program or after the client device has decrypted the encrypted computer file and/or program back to the unencrypted computer file and/or program, the serving device encrypts the permissions and/or rights and transfers them to the client device through the connector, said client device decrypts the unencrypted permissions and/or rights, the serving device includes controlling server software and/or firmware which causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights and instructs the client device to temporarily suspend user intervention when the client device receives the encrypted computer file and/or program and the encrypted permissions and/or rights, the client device includes controlling client software and/or firmware which causes the decryption of the encrypted computer file and/or program, the client device has a mechanism for requesting the unencrypted computer file and/or program from the serving device, the controlling client software and/or firmware causes the encryption of the unencrypted computer file and/or program and the permissions and/or rights for storage, the client device has an operating system and the controller client software and/or firmware instructs the operating system to reestablish user intervention at a desired time, the serving device has a server public key infrastructure which encrypts using encrypted communication protocols the permissions and/or rights and the unencrypted computer file and/or program, the client device has a client public key infrastructure which decrypts from transmission the permissions and/or rights and encrypted computer file and/or program using encrypted communication protocols, the client device includes an encrypting file system which encrypts the unencrypted computer file and/or program and the permissions and/or rights and allows for the manual selection of the unencrypted computer file and/or program for encryption or decryption, the client public key infrastructure has an encryption and/or decryption key and the encrypting file system uses the encryption and/or decryption key utilized by the client public key infrastructure, the controlling client software and/or firmware moves or copies the encrypted computer file and/or program to the next client device through the second connector, said client device having a controlling next client software and/or firmware which decrypts the received encrypted computer file and/or program and the encrypted permissions and/or rights and temporarily suspends user intervention of the next client device while the encrypted computer file and/or program is received by the next client device; and

    a next client device connected to the client device through the connector.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×