Remote access authorization of local content
First Claim
1. A method of controlling access by a user to encrypted content on content media at the user, comprising instantiating at the user a current instance of an executable program stored on the content media, the executable program generating a configuration identifier that is unique to the current instance of the executable program;
- creating, using the configuration identifier, a virtual directory structure for content on the content media, the content having a location within the directory structure that depends upon the configuration identifier and which has a corresponding path;
communicating with a remote server for access authorization by said user;
providing to the user information on selectable content and the corresponding path of such content; and
providing to the user from said remote server a decryption key for decrypting selected content.
1 Assignment
0 Petitions
Accused Products
Abstract
Network users are authorized individual access during a log-on session to encrypted content on content media at the user without the necessity of individualizing the content media for the particular user. The content may comprise multimedia data. The content media, which may be mass produced and distributed, includes a computer program which generates a unique configuration identifier upon instantiation of the program to begin a user access session. The program creates a virtual directory structure for the content that is uniquely determined for that session by the configuration identifier. The configuration identifier is uploaded to a remote server which uses the configuration identifier with other information identifying the content media and the user authorize user access. The remote server creates and downloads to a browser of the user an encrypted message containing URLs for accessing the content in the virtual directory structure and containing transformations of a decryption algorithm and decryption keys for the encrypted content. Encrypted multimedia content selected by the user is stored in a temporary file, decrypted in a moving time window, and rendered After rendering, the decrypted portion of the temporary file is scrambled to preclude further access.
-
Citations
45 Claims
-
1. A method of controlling access by a user to encrypted content on content media at the user, comprising instantiating at the user a current instance of an executable program stored on the content media, the executable program generating a configuration identifier that is unique to the current instance of the executable program;
- creating, using the configuration identifier, a virtual directory structure for content on the content media, the content having a location within the directory structure that depends upon the configuration identifier and which has a corresponding path;
communicating with a remote server for access authorization by said user;
providing to the user information on selectable content and the corresponding path of such content; and
providing to the user from said remote server a decryption key for decrypting selected content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
- creating, using the configuration identifier, a virtual directory structure for content on the content media, the content having a location within the directory structure that depends upon the configuration identifier and which has a corresponding path;
-
16. A method of controlling access by a user to encrypted content on content media at the user, comprising storing on the content media encrypted content files, each file having an associated key;
- providing on the content media an executable program, the executable program comprising a first portion operating as a server, a second portion generating a unique identifier for each instantiation of the program, a third portion creating for each instance of the executable program a virtual directory structure for the content files on the content media, the content files in the directory structure having locations in said directory structure determined by the unique identifier and said locations having corresponding paths, and a fourth portion for decryption;
authorizing by a remote server user access to the encrypted content; and
communicating to the executable program after said authorizing an associated key for decrypting an encrypted content file selected by the user. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
- providing on the content media an executable program, the executable program comprising a first portion operating as a server, a second portion generating a unique identifier for each instantiation of the program, a third portion creating for each instance of the executable program a virtual directory structure for the content files on the content media, the content files in the directory structure having locations in said directory structure determined by the unique identifier and said locations having corresponding paths, and a fourth portion for decryption;
-
33. A method of controlling access by a user to encrypted content on content media at the user, comprising instantiating at the user a current instance of an executable program stored on the content media;
- generating with the executable program upon instantiation a configuration identifier that is unique to the current instance of the executable program;
communicating with a remote server for access authorization by said user, comprising providing said configuration identifier to the remote server;
providing to the user information on selectable content; and
providing to the user from said remote server in a message encrypted using said configuration identifier a decryption code and a decryption key for decrypting selected content. - View Dependent Claims (34, 35)
- generating with the executable program upon instantiation a configuration identifier that is unique to the current instance of the executable program;
-
36. A method of controlling access by a user to encrypted content on content media at the user, comprising instantiating at the user a current instance of an executable program stored on the content media;
- communicating with a remote server for access authorization by said user;
providing to the user information on selectable content; and
providing to the user from said remote server a first transformation of a decryption code and a second transformation of a decryption key for decrypting selected content, said first and second transformations being unique to the current instance.
- communicating with a remote server for access authorization by said user;
-
37. Content media for controlled access to encrypted content by a user, comprising a repository on the content media storing encrypted content files;
- an executable program on the content media executable by a computer of the user, said executable program comprising a local server for communicating with a browser of the user;
a configuration identifier generator operable upon instantiation of the program to generate a unique configuration identifier corresponding to a current instance of the executable program;
first program code for creating upon said instantiation of the executable program a virtual directory structure for the encrypted content files stored in said repository, the content files having locations within said directory structure during said current instance determined by the configuration identifier, and said locations having corresponding encrypted paths; and
second program code for receiving from said browser keys for decrypting an encrypted content file selected by the user for access and the corresponding encrypted path. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45)
- an executable program on the content media executable by a computer of the user, said executable program comprising a local server for communicating with a browser of the user;
Specification