Method and system for multimedia access control enablement
First Claim
1. A method for securely distributing a plurality of software files from a software distribution processor to a user processor, and selectively enabling the user processor to use a subset of a lesser plurality of said plurality of software files, comprising the steps of:
- storing in said software distribution processor a plurality of software files including an ith software file;
storing in said software distribution processor a plurality of file encryption keys including an ith file encryption key;
encrypting in said software distribution processor said plurality of said software files, using corresponding ones of said plurality of file encryption keys, including encrypting said ith file using said ith file encryption key, producing a plurality of encrypted files which includes an ith encrypted file which is said ith file encrypted under said ith file encryption key;
transmitting from said software distribution processor to a user processor at least a portion of said plurality of encrypted files;
storing in said software distribution processor, a first customer key which includes a clear customer number and a second portion;
transforming in said software distribution center, said first customer key with a transformation function producing a second customer key;
encrypting said ith file encryption key with said second customer key, producing an encrypted ith file encryption key;
transmitting from said software distribution processor to a user processor, said first customer key;
transmitting from said software distribution processor to said user processor, said encrypted ith file encryption key;
transforming at said user processor said first customer key using said transformed function, producing said second customer key;
decrypting said ith file encryption key received at said user processor using said second customer key, recovering said ith file encryption key;
decrypting said ith encrypted file received at said user processor, using said recovered ith file encryption key, producing said ith software file;
whereby the user processor is enabled to use said ith software file.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a customer key which includes a clear customer number and a derived portion derived from the customer number. The customer key is transformed into a second customer key which serves as a key expression for encrypting a file encryption key specifically intended for a respective one of the plurality of files. A plurality of software files can be stored together, for example on a CD-ROM, with each file encrypted under a corresponding file encryption key. The CD-ROM can be distributed to many user processors. When a specific user processor needs to run one of the software files, a request will be transmitted from the user processor to the software distribution processor. In response to that request, an encrypted file encryption key specific for the requested file, will be transmitted to the user processor. This will enable the user processor to decrypt only the requested file from the CD-ROM. All other files on the CD-ROM remain in their encrypted form and cannot be decrypted and used by the file encryption key received from the software distribution processor.
1086 Citations
21 Claims
-
1. A method for securely distributing a plurality of software files from a software distribution processor to a user processor, and selectively enabling the user processor to use a subset of a lesser plurality of said plurality of software files, comprising the steps of:
-
storing in said software distribution processor a plurality of software files including an ith software file; storing in said software distribution processor a plurality of file encryption keys including an ith file encryption key; encrypting in said software distribution processor said plurality of said software files, using corresponding ones of said plurality of file encryption keys, including encrypting said ith file using said ith file encryption key, producing a plurality of encrypted files which includes an ith encrypted file which is said ith file encrypted under said ith file encryption key; transmitting from said software distribution processor to a user processor at least a portion of said plurality of encrypted files; storing in said software distribution processor, a first customer key which includes a clear customer number and a second portion; transforming in said software distribution center, said first customer key with a transformation function producing a second customer key; encrypting said ith file encryption key with said second customer key, producing an encrypted ith file encryption key; transmitting from said software distribution processor to a user processor, said first customer key; transmitting from said software distribution processor to said user processor, said encrypted ith file encryption key; transforming at said user processor said first customer key using said transformed function, producing said second customer key; decrypting said ith file encryption key received at said user processor using said second customer key, recovering said ith file encryption key; decrypting said ith encrypted file received at said user processor, using said recovered ith file encryption key, producing said ith software file; whereby the user processor is enabled to use said ith software file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securely distributing a plurality of software files from a software distribution processor to a user processor, and selectively enabling the user processor to use a subset of a lesser plurality of said plurality of software files, comprising:
-
means for storing in said software distribution processor a plurality of software files including an ith software file; means for storing in said software distribution processor a plurality of file encryption keys including an ith file encryption key; means for encrypting in said software distribution processor said plurality of said software files, using corresponding ones of said plurality of file encryption keys, including encrypting said ith file using said ith file encryption key, producing a plurality of encrypted files which includes an ith encrypted file which is said ith file encrypted under said ith file encryption key; means for transmitting from said software distribution processor to a user processor at least a portion of said plurality of encrypted files; means for storing in said software distribution processor, a first customer key which includes a clear customer number and a second portion; means for transforming in said software distribution center, said first customer key with a transformation function producing a second customer key; means for encrypting said ith file encryption key with said second customer key, producing an encrypted ith file encryption key; means for transmitting from said software distribution processor to a user processor, said first customer key; means for transmitting from said software distribution processor to said user processor, said encrypted ith file encryption key; means for transforming at said user processor said first customer key using said transformed function, producing said second customer key; means for decrypting said ith file encryption key received at said user processor using said second customer key, recovering said ith file encryption key; means for decrypting said ith encrypted file received at said user processor, using said recovered ith file encryption key, producing said ith software file; whereby the user processor is enabled to use said ith software file. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for securely distributing a plurality of multimedia files from a multimedia distribution processor to a user processor, and selectively enabling the user processor to use a subset of a lesser plurality of said plurality of multimedia files, comprising the steps of:
-
storing in said multimedia distribution processor a plurality of multimedia files including an ith multimedia file; storing in said multimedia distribution processor a plurality of file encryption keys including an ith file encryption key; encrypting in said multimedia distribution processor said plurality of said multimedia files, using corresponding ones of said plurality of file encryption keys, including encrypting said ith file using said ith file encryption key, producing a plurality of encrypted files which includes an ith encrypted file which is said ith file encrypted under said ith file encryption key; transmitting from said multimedia distribution processor to a user processor at least a portion of said plurality of encrypted files; storing in said multimedia distribution processor, a first customer key which includes a clear customer number and a second portion; transforming in said multimedia distribution center, said first customer key with a transformation function producing a second customer key; encrypting said ith file encryption key with said second customer key, producing an encrypted ith file encryption key; transmitting from said multimedia distribution processor to a user processor, said first customer key; transmitting from said multimedia distribution processor to said user processor, said encrypted ith file encryption key; transforming at said user processor said first customer key using said transformed function, producing said second customer key; decrypting said ith file encryption key received at said user processor using said second customer key, recovering said ith file encryption key; decrypting said ith encrypted file received at said user processor, using said recovered ith file encryption key, producing said ith multimedia file; whereby the user processor is enabled to use said ith multimedia file.
-
Specification