Copy protection of data
First Claim
Patent Images
1. A method of downloading encrypted data from a server to a client, said method including:
- registering the client with the server by;
determining a machine identifier of the client by analysing its hardware and/or its software configuration,transmitting the machine identifier to the server,embedding the transmitted machine identifier with a cryptographic key in an applet, andtransmitting the applet to the client, subsequently identifying the client to the server by;
at the client, again determining the machine identifier for the clientat the client, comparing the again determined machine identifier for the client with the machine identifier embedded in said applet, andsignaling to the server on the basis of the outcome of the comparison; and
thendownloading data encrypted by means of the cryptographic key to the identified client, anddecrypting the downloaded data at the client using the cryptographic key from the applet.
3 Assignments
0 Petitions
Accused Products
Abstract
A copyright protection scheme downloads data from a server, typically over the World Wide Web to a client for presentation to a user. The downloaded data is cryptographically protected, by encryption and hashing. When displayed by the client, storing and copying functions are selectively disabled in respect of the data, in order to prevent unauthorized copying.
-
Citations
3 Claims
-
1. A method of downloading encrypted data from a server to a client, said method including:
-
registering the client with the server by; determining a machine identifier of the client by analysing its hardware and/or its software configuration, transmitting the machine identifier to the server, embedding the transmitted machine identifier with a cryptographic key in an applet, and transmitting the applet to the client, subsequently identifying the client to the server by; at the client, again determining the machine identifier for the client at the client, comparing the again determined machine identifier for the client with the machine identifier embedded in said applet, and signaling to the server on the basis of the outcome of the comparison; and
thendownloading data encrypted by means of the cryptographic key to the identified client, and decrypting the downloaded data at the client using the cryptographic key from the applet. - View Dependent Claims (2, 3)
-
Specification