×

Method and system for multimedia access control enablement

  • US 5,319,705 A
  • Filed: 10/21/1992
  • Issued: 06/07/1994
  • Est. Priority Date: 10/21/1992
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for securely distributing a plurality of software files from a software distribution processor to a user processor, and selectively enabling the user processor to use a subset of a lesser plurality of said plurality of software files, comprising the steps of:

  • storing in said software distribution processor a plurality of software files including an ith software file;

    storing in said software distribution processor a plurality of file encryption keys including an ith file encryption key;

    encrypting in said software distribution processor said plurality of said software files, using corresponding ones of said plurality of file encryption keys, including encrypting said ith file using said ith file encryption key, producing a plurality of encrypted files which includes an ith encrypted file which is said ith file encrypted under said ith file encryption key;

    transmitting from said software distribution processor to a user processor at least a portion of said plurality of encrypted files;

    storing in said software distribution processor, a first customer key which includes a clear customer number and a second portion;

    transforming in said software distribution center, said first customer key with a transformation function producing a second customer key;

    encrypting said ith file encryption key with said second customer key, producing an encrypted ith file encryption key;

    transmitting from said software distribution processor to a user processor, said first customer key;

    transmitting from said software distribution processor to said user processor, said encrypted ith file encryption key;

    transforming at said user processor said first customer key using said transformed function, producing said second customer key;

    decrypting said ith file encryption key received at said user processor using said second customer key, recovering said ith file encryption key;

    decrypting said ith encrypted file received at said user processor, using said recovered ith file encryption key, producing said ith software file;

    whereby the user processor is enabled to use said ith software file.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×