System and method for digital content management and controlling copyright protection
First Claim
1. A digital content management system, comprising:
- a storage unit for storing personal secure information and an electronic file, wherein the electronic file comprises an encrypted digital content and an encrypted symmetric key; and
an information management unit for decrypting the encrypted symmetric key by using the personal secure information so as to generate a symmetric key, and decrypting the encrypted digital content by using the symmetric key for generating a digital content.
1 Assignment
0 Petitions
Accused Products
Abstract
A digital content application system comprises a first user means, a second user means and a digital content application platform. The first user means comprises a storage unit and an information management unit. The storage unit stores personal secure information and an electronic file. The electronic file comprises an encrypted digital content and an encrypted symmetric key. The information management unit decrypts the encrypted symmetric key by using the personal secure information so as to generate a symmetric key, and decrypts the encrypted digital content by using the symmetric key for generating a digital content. In conjunction with the decryption of the digital content, the information management unit determines the integrity of the digital content based on two hash values. The digital content application platform receives the digital content from the second user means and transmitting the electronic file to the first user means.
15 Citations
48 Claims
-
1. A digital content management system, comprising:
-
a storage unit for storing personal secure information and an electronic file, wherein the electronic file comprises an encrypted digital content and an encrypted symmetric key; and
an information management unit for decrypting the encrypted symmetric key by using the personal secure information so as to generate a symmetric key, and decrypting the encrypted digital content by using the symmetric key for generating a digital content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A digital content application system, comprising:
-
a first user means associated with a first user, comprising;
a storage unit for storing personal secure information and an electronic file, wherein the electronic file comprises an encrypted digital content and an encrypted symmetric key; and
an information management unit for decrypting the encrypted symmetric key by using the personal secure information so as to generate a symmetric key, and decrypting the encrypted digital content by using the symmetric key for generating a digital content;
a second user means associated with a second user for providing the digital content,; and
a digital content application platform used for receiving the digital content from the second user means and transmitting the electronic file to the first user means . - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A digital content management method, comprising steps of:
-
providing an electronic file comprising an encrypted digital content and an encrypted symmetric key;
decrypting the encrypted symmetric key by using personal secure information so as to generate a symmetric key; and
decrypting the encrypted digital content by using the symmetric key so as to generate a digital content. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method to identify integrity of a digital content, comprising steps of:
-
generating a first hash value based on a digital content;
creating a digital signature based on a secret key corresponding to a user of the digital content and the first hash value;
generating a publicized key corresponding to the secret key;
decrypting the digital signature by using the publicized key so as to generate a second hash value; and
determining whether the digital content is modified based on the first and the second hash values. - View Dependent Claims (42, 43)
-
-
44. A method of controlling copyright of a digital content, comprising steps of:
-
generating a symmetric key;
encrypting a digital content by using the symmetric key;
generating a publicized key corresponding to a user of the digital content;
encrypting the symmetric key by using the publicized key corresponding to the user; and
combining the encrypted digital content and the encrypted symmetric key as an electronic file by using the encrypted symmetric key. - View Dependent Claims (45, 46, 47, 48)
-
Specification