Securing digital content system and method
First Claim
1. A computer-implemented method for protecting electronic content, the method comprising the steps of:
- storing an asymmetric decryption key that is associated with a digital electronic container;
receiving client device footprint data from a client device;
creating a re-key value using both the client device footprint data and the stored asymmetric decryption key; and
providing the re-key value to the client device for re-keying content data provided by the electronic digital container at the client device wherein a predetermined data block of the content data stores a symmetric decryption key, the predetermined data block and stored decryption key being previously encrypted using an asymmetric key technique, and wherein the content data is arranged into data blocks including the predetermined data block.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user'"'"'s device may not open or permit access to the contents if the digital container is transferred to another user'"'"'s device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.
-
Citations
16 Claims
-
1. A computer-implemented method for protecting electronic content, the method comprising the steps of:
-
storing an asymmetric decryption key that is associated with a digital electronic container; receiving client device footprint data from a client device; creating a re-key value using both the client device footprint data and the stored asymmetric decryption key; and providing the re-key value to the client device for re-keying content data provided by the electronic digital container at the client device wherein a predetermined data block of the content data stores a symmetric decryption key, the predetermined data block and stored decryption key being previously encrypted using an asymmetric key technique, and wherein the content data is arranged into data blocks including the predetermined data block. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product comprising computer executable instructions embodied on a non-transitory computer readable storage medium that when read and executed by a computer processor executes the following steps:
-
storing an asymmetric decryption key that is associated with a digital electronic container; receiving client device footprint data from a client device; creating a re-key value using both the client device footprint data and the stored asymmetric decryption key; and providing the re-key value to the client device for re-keying content data provided by the digital electronic container to the client device wherein a predetermined data block of the content data stores a symmetric decryption key, the predetermined data block and stored decryption key being previously encrypted using an asymmetric key technique, and wherein the content data is arranged into data blocks including the predetermined data block. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification