Method and system for securing local database file of local content stored on end-user system
First Claim
1. A method for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the method comprising the steps of:
- decrypting at least a section of a file with a first decrypting key, wherein the first decrypting key is formed as a combination of a base key, a time-stamp, and an update number so as to uniquely correspond to both a given time and a given update in the section of the file;
determining if there are any updates in the section of the file to any data items that form a library index of storage locations to electronic digital content and if there are updates then performing the steps of;
decrypting, with the first decrypting key, a reference table containing one or more location indicators for storing the data items in a data table;
getting an offset to an update reference table;
decrypting the update reference table containing one or more location indicators for updates to the data items with the first decrypting key;
populating the data table with the data items at locations specified by the location indicators in the reference table; and
populating the data table with the updates to the data items at locations specified in the update reference table with the updates to the data items.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for forming a data table in memory on an end user system. The data table forming a library index of storage locations to electronic digital content in memory. The method consists of retrieving an encrypted file from storage. The file has a beginning, an end and a trailer section located just prior to the end. The file is read from the end a predetermined distance to verify if an identifier is present. Reading and decrypting the trailer section from the file read. Determining if there are any updates in the trailer section. In the case there are no updates in the trailer section then decrypting the reference table containing one or more data table location indicators for data items with the first decrypting key. Next, decrypting one or data items with the first decrypting key. Populating the data table with data items at locations specified in the reference table.
138 Citations
13 Claims
-
1. A method for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the method comprising the steps of:
-
decrypting at least a section of a file with a first decrypting key, wherein the first decrypting key is formed as a combination of a base key, a time-stamp, and an update number so as to uniquely correspond to both a given time and a given update in the section of the file; determining if there are any updates in the section of the file to any data items that form a library index of storage locations to electronic digital content and if there are updates then performing the steps of; decrypting, with the first decrypting key, a reference table containing one or more location indicators for storing the data items in a data table; getting an offset to an update reference table; decrypting the update reference table containing one or more location indicators for updates to the data items with the first decrypting key; populating the data table with the data items at locations specified by the location indicators in the reference table; and populating the data table with the updates to the data items at locations specified in the update reference table with the updates to the data items. - View Dependent Claims (2, 3, 9, 10)
-
-
4. A computer readable medium containing programming instruction for forming a data table stored in memory, the data table forming a library index of storage locations to electronic digital content, the programming instructions comprising:
-
decrypting at least a section of a file with a first decrypting key, wherein the first decrypting key is formed as a combination of a base key, a time-stamp, and an update number so as to uniquely correspond to both a given time and a given update in the section of the file; determining if there are any updates in the section of the file to any data items that form a library index of storage locations to electronic digital content and if there are updates then performing the steps of; decrypting, with the first decrypting key, a reference table containing one or more location indicators for storing the data items in a data table; getting an offset to an update reference table; decrypting the update reference table containing one or more location indicators for updates to the data items with the first decrypting key; populating the data table with the data items at locations specified by the location indicators in the reference table; and populating the data table with the updates to the data items at locations specified in the update reference table with the updates to the data items. - View Dependent Claims (5, 6, 11)
-
-
7. An end user information processing system comprising:
-
a data table stored in memory, the data table forming a library index of storage locations to electronic digital content; a first decrypting key for decrypting at least a section of a file, wherein the first decrypting key is formed as a combination of a base key, a time-stamp, and an update number so as to uniquely correspond to both a given time and a given update in the section of the file; means for determining if there are any updates in the section of the file to one or more data items that form the library index of storage locations to electronic digital content and if there are updates then decrypting, with the first decrypting key, a reference table containing one or more location indicators for storing the data items in a data table; getting an offset to an update reference table; decrypting the update reference table containing one or more location indicators for updates to the data items with the first decrypting key; populating the data table with the data items at locations specified by the location indicators in the reference table; and populating the data table with the updates to the data items at locations specified in the update reference table with the updates to the data items. - View Dependent Claims (8, 12, 13)
-
Specification