Securing digital content system and method
First Claim
1. A computer-implemented method for protecting electronic content, the method comprising the steps of:
- sending a digital electronic container having a container identification to a client device, the digital electronic container containing content data arranged into data blocks encrypted using a symmetric keying technique, a predetermined data block storing a symmetric decryption key, and the predetermined data block and stored symmetric decryption key being encrypted using an asymmetric key technique;
storing an asymmetric decryption key associated with the digital electronic container in a registration database;
receiving client device footprint data from the client device;
combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; and
sending the re-key value to the client device to re-key the predetermined data block at the client device thereby locking the content data to the client device.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user'"'"'s device may not open or permit access to the contents if the digital container is transferred to another user'"'"'s device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
138 Citations
18 Claims
-
1. A computer-implemented method for protecting electronic content, the method comprising the steps of:
-
sending a digital electronic container having a container identification to a client device, the digital electronic container containing content data arranged into data blocks encrypted using a symmetric keying technique, a predetermined data block storing a symmetric decryption key, and the predetermined data block and stored symmetric decryption key being encrypted using an asymmetric key technique; storing an asymmetric decryption key associated with the digital electronic container in a registration database; receiving client device footprint data from the client device; combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; and sending the re-key value to the client device to re-key the predetermined data block at the client device thereby locking the content data to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising computer executable instructions embodied on a computer readable storage device that when read and executed by a computer processor executes the following steps:
-
sending a digital electronic container having a container identification to a client device, the digital electronic container containing content data arranged into data blocks encrypted using a symmetric keying technique, a predetermined data block storing a symmetric decryption key, and the predetermined data block being encrypted using an asymmetric key technique; storing an asymmetric decryption key associated with the digital electronic container in a registration database; receiving client device footprint data from the client device; combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; and sending the re-key value to the client device to re-key the predetermined data block at the client device thereby locking the content data to the client device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification