Securing digital content system and method
DC CAFCFirst Claim
1. A method of securely delivering data, comprising the steps of:
- creating a container having electronic content and a container identifier;
encrypting at least one data block of the electronic content using a symmetric encryption technique and encrypting a header associated with a first data block of the electronic content using an asymmetric encryption technique, the header including a symmetric decryption key; and
re-keying the header using data associated with a user or a user'"'"'s device to lock at least a portion of the electronic content to the user or the user'"'"'s device,wherein the locked at least a portion of the electronic content can only be decrypted and accessed by the user or on the user'"'"'s device when the user or user'"'"'s device has been authenticated against at least the container identifier.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user'"'"'s device may not open or permit access to the contents if the digital container is transferred to another user'"'"'s device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
-
Citations
14 Claims
-
1. A method of securely delivering data, comprising the steps of:
-
creating a container having electronic content and a container identifier; encrypting at least one data block of the electronic content using a symmetric encryption technique and encrypting a header associated with a first data block of the electronic content using an asymmetric encryption technique, the header including a symmetric decryption key; and re-keying the header using data associated with a user or a user'"'"'s device to lock at least a portion of the electronic content to the user or the user'"'"'s device, wherein the locked at least a portion of the electronic content can only be decrypted and accessed by the user or on the user'"'"'s device when the user or user'"'"'s device has been authenticated against at least the container identifier. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising a computer storage medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
create a container having electronic content and a container identifier; determine at least one data block for partitioning the electronic content; encrypt the at least one data block of the electronic content using a symmetric encryption technique and to encrypt a header associated with a first data block of the electronic content using an asymmetric encryption technique, the header including a symmetric decryption key; re-key the header using data associated with a user or a user'"'"'s device to lock at least a portion of the electronic content to the user or the user'"'"'s device, wherein the locked at least a portion of the electronic content can only be decrypted and accessed by the user or on the user'"'"'s device when the user or user'"'"'s device has been authenticated against at least the container identifier; and decrypt the locked portion of the electronic content when the user or user'"'"'s device has been authenticated.
-
-
8. A computer-implemented method of securely delivering data, comprising the steps of:
-
creating a container having electronic content and a container identifier; encrypting at least one data block of the electronic content using a symmetric encryption technique and encrypting a header associated with a first data block of the electronic content using an asymmetric encryption technique, the header including a symmetric decryption key; and re-keying the header using at least a portion of the container identifier and data associated with a user or a user'"'"'s device to lock at least a portion of the electronic content to the user or the user'"'"'s device, wherein the locked at least a portion of the electronic content can only be decrypted and accessed by the user or on the user'"'"'s device when the user or user'"'"'s device has been authenticated against at least the container identifier, and wherein the step for re-keying creates a unique value for the header for every different container delivered to the user'"'"'s device. - View Dependent Claims (9)
-
-
10. A computer-based method for accessing content, the method comprising the steps of:
-
transmitting an electronic container having at least one file of electronic content and a container identifier, wherein at least one data block of the electronic content is encrypted using a symmetric encryption technique and a header associated with a first data block of the electronic content is encrypted using an asymmetric encryption technique, the header including a symmetric decryption key; and transmitting a permission token based on an attempt to access the electronic content to grant access to the electronic content, wherein at least the symmetric decryption key is re-encrypted for each occurrence of transmitting the permission. - View Dependent Claims (11, 12, 13, 14)
-
Specification