Securing digital content system and method
First Claim
1. A computer-implemented method for protecting electronic content, the method comprising the steps of:
- storing in a registration database an asymmetric decryption key that is associated with a digital electronic container;
receiving client device footprint data from a client device;
combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; and
sending the re-key value to the client device to re-key content data at the client device wherein a predetermined data block of the content data stores a symmetric decryption key and the predetermined data block and stored decryption key being previously encrypted using an asymmetric key technique, and wherein the digital container contains the content data arranged into data blocks including the predetermined data block, the digital electronic container being provided to the client device prior to the sending step.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user'"'"'s device may not open or permit access to the contents if the digital container is transferred to another user'"'"'s device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
138 Citations
16 Claims
-
1. A computer-implemented method for protecting electronic content, the method comprising the steps of:
-
storing in a registration database an asymmetric decryption key that is associated with a digital electronic container; receiving client device footprint data from a client device; combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; and sending the re-key value to the client device to re-key content data at the client device wherein a predetermined data block of the content data stores a symmetric decryption key and the predetermined data block and stored decryption key being previously encrypted using an asymmetric key technique, and wherein the digital container contains the content data arranged into data blocks including the predetermined data block, the digital electronic container being provided to the client device prior to the sending step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product comprising computer executable instructions embodied on a computer readable storage device that when read and executed by a computer processor executes the following steps:
-
storing in a registration database an asymmetric decryption key that is associated with a digital electronic container; receiving client device footprint data from a client device; combining the client device footprint data and the stored asymmetric decryption key to create a re-key value; and sending the re-key value to the client device to re-key content data at the client device wherein a predetermined data block of the content data stores a symmetric decryption key and the predetermined data block and stored decryption key being previously encrypted using an asymmetric key technique, and wherein the digital container contains the content data arranged into data blocks including the predetermined data block, the digital electronic container being provided to the client device prior to the sending step. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification