Securing digital content system and method

ABSTRACT

A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authentication/authorization server. This system provides a high level of encryption security equivalent to that provided by public key/asymmetric cryptography without the complexity and expense of the associated PKI infrastructure. The system enjoys the simplicity and ease of use of single key/symmetric cryptography without the risk inherent in passing unsecured hidden keys. The secured digital container when locked to a user or user&#39;s device may not open or permit access to the contents if the digital container is transferred to another user&#39;s device. The digital container provides a secure technique of distributing electronic content such as videos, text, data, photos, financial data, sales solicitations, or the like.

CROSS-REFERENCE TO RELATED APPLICATIONS

ThisThe present application is a reissue application of U.S. Pat. No.9,191,376 issued Nov. 17, 2015 from application Ser. No. 14/553,209,filed Nov. 25, 2014. Application Ser. No. 14/553,209 is a continuationapplication of co-pending U.S. non-provisional application Ser. No.13/762,113 filed Feb. 7, 2013 now U.S. Pat. No. 8,930,697 which is acontinuation of U.S. non-provisional application Ser. No. 13/157,993filed Jun. 10, 2011 now U.S. Pat. No. 8,402,558 which is a continuationof U.S. non-provisional application Ser. No. 12/181,442 now U.S. Pat.No. 7,979,697 which is a continuation of prior U.S. non-provisionalapplication Ser. No. 10/576,303, filed Apr. 19, 2006 now U.S. Pat. No.7,421,741, which is the National Stage Application of InternationalPatent Application PCT/US2004/034494 filed Oct. 20, 2004, and claimspriority to and the benefit of U.S. Provisional Application 60/512,091filed on Oct. 20, 2003, the disclosures of which are all herebyincorporated by reference in their entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention generally relates to encrypting digital content, and morespecifically, to securely locking encrypted digital media to aparticular user, computer or other computing device.

2. Background Description

Any owner or distributor of secure or copyrighted digital content, i.e.,electronic data in any form, may face several problems concerning theencryption of the data and the method of access that is provided to anend user. The owner or distributor typically is compelled to provide arobust method of encryption while remaining within a system that isrelatively easy and simple for users to operate. In order to berelatively effective and/or easy to use, the system provided by ownersor distributors must typically allow users to repeatedly access thematerial while requiring that they undergo an authentication, approvalor payment process under a set of rules determined by the content owner.For example, the user may access the content an unlimited number oftimes after approval, or the user may have to regain approval after acertain number of accesses and/or after a certain amount of time haspassed. Normally, content owners require substantial confidence andassurance that once approved for access by a particular user on aparticular device the content cannot be freely accessed by another userespecially if the content is transmitted to another machine or device.

Currently, most content originators and distributors utilize a PublicKey Infrastructure, or PKI system, to accomplish these functions. ThePKI system utilizes public key or asymmetric cryptography in which apublic key and a private key are produced at the time that the contentfile is encrypted. This PKI system typically has the followingproperties or requires the use of:

-   -   (i) A certificate authority that issues and verifies a digital        certificate. A digital certificate includes the public key,        information about the public key or other licensing information.    -   (ii) A registration authority that acts as the verifier for the        certificate authority before a digital certificate is issued to        a requestor.    -   (iii) One or more directories where the certificates (with their        public keys) are held.    -   (iv) A certificate management system.        This PKI system is quite complex and very often is an        operational and financial burden for content originators,        distributors and users.

An alternative encryption system is symmetric cryptography. A symmetricsystem utilizes a secret or hidden key that is shared by both the senderand recipient of the encrypted data. While much simpler to use andsubstantially less costly to implement, a common drawback may be that ifthe secret key is discovered or intercepted, the encrypted data caneasily be decrypted and stolen. However, if a method and system forprotecting the secret key, itself, can be provided so that the secretkey is not exposed to discovery or interception, including an end user,then a very reliable and effective procedure and system for securelydelivering electronic content is possible while avoiding the significantburdens of a PKI infrastructure.

SUMMARY OF THE INVENTION

An aspect of the invention provides a method for creating a digitalcontainer and encrypting the contents of the digital container with asymmetric encryption technique. The method also provides for protectingthe symmetric decryption keys by inserting the symmetric decryption keysinto header associated with a data block in the digital container andencrypting the header using an asymmetric encryption algorithm. Upon anattempted access of the container by a user, the header is re-encryptedusing data from the user's device and/or the user so that the contentsof the digital container are now locked to the user's device or to theuser. Transaction data such as credit card information or accountinformation may also be obtained from the user, perhaps for paying forthe contents of the container or other service, which may be verifiedand used to gain access to the contents. Once the container has beenlocked to the user's device or user, the container may only be openedand accessed on that device or by that user. If the digital containerwere to be transmitted to another device, the digital containerrecognizes that the footprint of the device has changed or the user isdifferent and may not open until a re-authorization has been performedwhich may involve a financial transaction.

A further aspect of the invention includes a system for creating adigital container and encrypting the contents of the digital containerwith a symmetric encryption technique. The system also provides forprotecting the summetric decryption keys by inserting the symmetricdecryption keys into header associated with a data block in the digitalcontainer and encrypting the header using an asymmetric encryptionalgorithm. Upon an attempted access of the container by a user, thesystem re-encrypts the header using data from the user's device such asa machine footprint and/or the user such as a client fingerprint so thatthe contents of the digital container are now locked to the user'sdevice or to the user. The system may also acquire transaction data suchas credit card information or account information from the user, perhapsfor paying for the contents of the container or other service, which maybe verified and used to gain access to the contents. Once the containerhas been locked to the user's device or user, the system provides thatthe container may only be opened and accessed on that device or by thatuser. If the digital container were to be transmitted to another device,the system recognizes that the footprint of the device has changed orthe user is different and may not open until a re-authorization has beenperformed which may involve a financial transaction.

In another aspect of the invention, a computer program productcomprising a computer usable medium having readable program codeembodied in the medium is provided. The computer program productincludes at least one component to create a digital container and toencrypt the contents of the digital container with a symmetricencryption technique. The at least one component also protects thesymmetric decryption keys by inserting the symmetric decryption keysinto header associated with a data block in the digital container andencrypting the header using an asymmetric encryption algorithm. Upon anattempted access of the container by a user, the at least one componentre-encrypts the header using data from the user's device and/or the userso that the contents of the digital container are now locked to theuser's device or to the user. The at least one component may also obtaintransaction data such as credit card information or account informationfrom the user, perhaps for paying for the contents of the container orother service, which may be verified and used to gain access to thecontents. Once the container has been locked to the user's device oruser, the container may only be opened and accessed on that device or bythat user.

In another aspect, a method of securely delivering data is provided. Themethod includes creating a container having electronic content and acontainer identifier, encrypting at least one data block of theelectronic content using a symmetric encryption technique and encryptinga header associated with a first data block of the electronic contentusing an asymmetric encryption technique, the header including asymmetric decryption key, and re-keying the header using data associatedwith a user or a user's device to lock at least a portion of theelectronic content to the user or the user's device, wherein the lockedat least a portion of the electronic content can only be decrypted andaccessed by the user or on the user's device when the user or user'sdevice has been authenticated against at least the container identifier.

In another aspect, a computer program product comprising a computerusable medium having readable program code embodied in the medium isprovided. The computer program product includes at least one componentto create a container having electronic content and a containeridentifier, determine at least one data block for partitioning theelectronic content, encrypt the at least one data block of theelectronic content using a symmetric encryption technique and to encrypta header associated with a first data block of the electronic contentusing an asymmetric encryption technique, the header including asymmetric decryption key, re-key the header using data associated with auser or a user's device to lock at least a portion of the electroniccontent to the user or the user's device, wherein the locked at least aportion of the electronic content can only be decrypted and accessed bythe user or on the user's device when the user or user's device has beenauthenticated against at least the container identifier, and decrypt thelocked portion of the electronic content when the user or user's devicehas been authenticated.

In another aspect, a computer-implemented method of securely deliveringdata is provided. The computer-implemented method includes creating acontainer having electronic content and a container identifier,encrypting at least one data block of the electronic content using asymmetric encryption technique and encrypting a header associated with afirst data block of the electronic content using an asymmetricencryption technique, the header including a symmetric decryption key,and re-keying the header using at least a portion of the containeridentifier and data associated with a user or a user's device to lock atleast a portion of the electronic content to the user or the user'sdevice, wherein the locked at least a portion of the electronic contentcan only be decrypted and accessed by the user or on the user's devicewhen the user or user's device has been authenticated against at leastthe container identifier, and wherein the step for re-keying creates aunique value for the header for every different container delivered tothe user's device.

In another aspect, a computer-based method for accessing content isprovided. The method includes transmitting an electronic containerhaving files of electronic content and a container identifier, whereinat least one data block of the electronic content is encrypted using asymmetric encryption technique and a header associated with a first datablock of the electronic content is encrypted using an asymmetricencryption technique, the header including a symmetric decryption key,and transmitting a permission token based on an attempt to access theelectronic content to grant access to the electronic content, wherein atleast the symmetric decryption key is re-encrypted for each occurrenceof transmitting the permission.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram of an embodiment of the system ofthe invention;

FIG. 2 is a functional block of an embodiment showing registration andencryption of a secure digital container (SDC), according to theinvention;

FIG. 3 is a functional block diagram of a user's device, according tothe invention;

FIG. 4 is an illustrative embodiment of a Graphical User Interface(GUI), according to the invention;

FIG. 5 is a functional block diagram of an embodiment of a containerauthentication and permission token generation process, according to theinvention;

FIG. 6 is an illustration of an embodiment of a permission token,according to the invention;

FIG. 7 is a functional block diagram of an embodiment of a decryptionprocess, according to the invention;

FIGS. 8A and 8B are flow diagrams of an embodiment showing steps ofusing the invention; and

FIG. 9 is a flow diagram of an embodiment showing steps of using theinvention.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

The invention provides a system and method of encrypting electroniccontent using symmetric encryption without exposing the decryption keyto discovery or interception. In embodiments, delivery of the electroniccontent from a creator to an end user may be accomplished by digitalcontainers that employ protected key symmetric encryption. The inventioncombines the robustness equivalent to PKI encryption but with thesimplicity and cost effectiveness of symmetric/secret key cryptography.U.S. Provisional Application Ser. No. 0/512,091, filed Oct. 20, 2003 isincorporated by reference herein in its entirety.

An aspect of the invention involves a unique process that is used to“re-key” the “hidden” keys sent with the electronic content, often indigital containers, with a value that contains data specific to the userand/or the user's device. This “re-keying” (i.e., re-encrypting) istypically performed on the user's device without ever exposing thecontent in an unencrypted form, thus the keys themselves are maintainedsecurely and eliminates the potential for compromising the electronicdata and/or the keys. During “re-keying”, the “re-keyed” keys may alsobe associated with the original user's device in such a way as toeffectively inhibit any unauthorized access to the electronic content.This is especially useful, if and when, the electronic content might befurther propagated to other user's devices, such as by email, copieddisks, or peer-to-peer communications, for example. These other usersare effectively denied access to the electronic content since theelectronic content has been re-keyed and associated with the originaluser and/or original user's device. After the “re-keying” processexecutes, the content inside the container is “locked” to a particulardevice and/or a particular user.

FIG. 1 is a functional block diagram of an embodiment of the system ofthe invention, generally denoted by reference numeral 100. FIG. 1 alsoillustrates several steps associated with processes of the invention.The system 100 includes a content originator device 105 which includes acontainer creation application 110 (which may alternatively execute on aserver or separate container creation computer) and content file orfiles 115 such as video, text, streaming media, audio, animation, music,financial transaction data, or any other type of data for inclusion inthe production of a secure digital container (SDC) 120. The containercreation application 110 also provides for encrypting electronic contentsuch as the content files 115.

Further included in the system 100 is a user's device 125 (e.g., acomputer controlled device such as a personal computer, a cable receiverbox, compact disk (CD) player, television, digital video disk (DVD)player, satellite receiver, personal digital assistant (PDA), or thelike) that may receive the electronic content 115, typically via a SDC120. In embodiments, the SDC 120 may be delivered to a user's computervia a CD or DVD. The user's device 125 may be interconnected via anetwork 150, such as the Internet, for transmission of the SDC 120 tothe user's device 125. The network may be any type of network such aswired, wireless, phone system, or the like. The SDC 120 may be deliveredvia any number of various known techniques including website download,peer-to-peer download, email, instant messaging (IM), file transferprotocols, or the like. (For clarity, once the SDC 120 has beentransmitted or is otherwise present on the user's device, the SDC on theuser's device is denoted by reference numeral 120′)

The user's device 125 also includes memory 130 for storing various dataitems such as digital rights management (DRM) data and a ClientFingerprint Mode Flag (CFMF), also described in more detail below. Theuser's device 125 may also include a hard drive, compact disk (CD)drives or a digital video disk (DVD) drive, generally denoted byreference numeral 135. The user's device 125 may also include anexternal hardware identification device 140 for providing input forauthenticating a user such as a biometric authentication device or cardreader, for example.

The system 100 may also include a container authentication server 160(also referred to as a container verification server), which inembodiments, may oversee operations of a container registration database165. In embodiments, database 165 may be distributed. The containerauthentication server also manages attempts to open the container by auser and coordinates permissions, authentications and portions of there-keying sequences of a digital container using the container ID andcontainer registration database 165. This may also include managingfinancial transactions associated with the container assess. Alsoincluded in the system 100 may be a transaction server 180 (e.g., anIPayment, Inc. Gateway server) for receiving financial transactionrequests such as credit card or debit transactions when a user choosesto purchase a service or item controlled by the SDC 120′, and forproviding a response to the request which validates a purchase, asdescribed more fully below.

In one application, the container creation application 110 encrypts theone or more content files 115 (or any subset of the content files) andincorporates the one or more content files 115 into the secure digitalcontainer 120. Once the SDC 120 has been constructed, usage rightsparameters as selected by the content originator, along with other SDCregistration data, may be stored in the container registration database165, as denoted by reference numeral 170. The usage rights may include,but not limited to, limiting accesses to the content files to a certainnumber of occurrences, limiting access to a period of time, limitingcopying of the content files (or portions thereof), limiting the copyingto a secondary device, limiting the burning of the content file tostorage media such as CD or DVD or controlling printing, to name a few.

Once the SDC 120 is transmitted or released to a user (or users), orperhaps to an Internet site to be discovered and downloaded by users orpotential customers of the electronic content, a user may attempt toopen the SDC 120′ on their device 125 (or attempts to open portions ofthe SDC 120′). When the attempt to access or open the SDC 120′ occurs,executable code either in the SDC 120′ or already on the user's deviceopens a secure link to the container verification server 160 and sendsan authorization request message 190. This authorization request message190 includes data specific to the user or the user's device.

This authorization request message 190 may also include financialtransaction information, such as credit/debit card data or useridentification data (e.g., account numbers, social security numbers,telephone numbers, alias names, or the like) perhaps for Internetpayment services such as online payment services provided by PayPal™,Inc, or the like. If a financial transaction is involved, then this datamay be sent to the transaction server 180 (e.g., an iPayment, Inc.Gateway server, or the like) in a financial transaction request message192. Once this request is processed, transaction approval or denial datamay be returned to the container authentication server 160 in afinancial transaction response message 194.

After receiving the financial transaction response message 194, thecontainer authentication server 160 may create an authentication requestresponse called a permission token message, as denoted by referencenumeral 196. This permission token message contains a permission tokenthat is typically a relatively small bit string that includes thefinancial transaction approval or denial data, the contents usage rightsdata, permission flags and re-encryption data that is now unique to boththe SDC 120′ and the user and/or the user's device, as explained morefully below.

When the permission token 196 is returned to the SDC 120′ on the user'sdevice 125, the container executable code may read the token bit stringand may write the usage rights data and a permission flag called aclient fingerprint mode flag (CFMF) to a confidential (e.g., unpublishedor hidden) location such as memory 130 on the user's device 125.Alternatively, this confidential location may be a storage device suchas a disk, DVD, or external storage device.

Once this CFMF and usage rights data have been stored, any future orsubsequent attempt to re-open the container causes the containerexecutable code to detect the stored CFMF resulting in the SDC 120′opening, potentially limited by the usage rights data, without having torepeat the authentication process. The function of the CFMF and theusage rights data will be discussed in greater detail below.

Also, when the container executable code receives the re-encryptiondata, the container executable code uses the re-encryption data (i.e.,returned with the permission token) to re-encrypt a core or selectedpart of the encrypted content file(s). This re-encryption process(described more fully below) provides unique aspects to controlling andshielding the electronic content and encryption/decryption process whenthe selected segment of the content file(s) is re-encrypted with a valuethat contains data specific to the SDC 120′ and the user and/or theuser's device 125. This re-encryption process is performed on the user'sdevice without ever exposing the contents in an unencrypted form andshields the contents and the encryption keys from piracy, unauthorizedaccess, theft or intrusion with a high degree of confidence. Since alluser devices are considered to be insecure environments, it may be saidthat this process re-encrypts the data in a secure way in an insecureenvironment. After this process is executed, the content inside the SDC120′ is “locked” to a particular device (e.g., device 125) and/or aparticular user. Thereafter, the SDC 120′ can never be sent (perhaps byemail, physical delivery, or other electronic delivery) to a differentuser and/or another user device and opened successfully withoutundergoing a new authentication process.

FIG. 2 is a functional block diagram of an embodiment showingregistration and encryption of a SDC, according to the invention,generally denoted by reference numeral 200. FIG. 2 also illustratescertain steps of the registration and encryption process, according tothe invention. The container creation application 110 evaluates thecontent file(s) 115 as selected or composed by a container creator anddetermines an appropriate number of data blocks for partitioning thecontent files and to be used to encrypt these files. The number of datablocks to be encrypted may be related to the type of device beingtargeted (e.g., a cable box, personal computer, or other type ofdevice), number of files being encrypted, or overall amount of databeing encrypted, or as requested by a container creator, for example.The data block concept typically increases speed and efficiency of thedecryption process. Also, the data block concept provides an ability toencrypt only parts of the electronic content instead of the entirety andalso permits portions of the content to be optionally accessed by a userprior to any decryption. For example, if a large media file, such as afeature length motion picture is being decrypted, the user may be ableto use a media player to jump to any point in the film and begin to viewit without waiting for the entire file to be decrypted. Another examplemay be when advertisement segments, such as previews, are presented to auser prior to decryption. It should be clear by these examples thatessentially any portion of the electronic material may be selected bythe container creator and marked as “unencrypted,” as appropriate.

Once the content file or files 115 are divided into data blocks, asymmetric encryption algorithm 112 may be used to encrypt eachindividual data block resulting in one or more encrypted data blocks1-N, 230a-230c. The encryption process and insertion into the SDC 120for each encrypted data block 230a-230c is represented by referencenumerals 245a-245c, respectively. Commercially available symmetricencryption algorithms such as, for example, Blowfish™, Twofish™,Rijndael™, Serpent™ or Triple DES™ may be used. The container creationapplication 110 may be designed in a modular fashion, so that theencryption algorithm modules can be upgraded as new encryptiontechnology becomes available.

As part of the symmetric encryption process, the symmetric key used toencrypt the data blocks 230a-230c, and which subsequently is to be usedto decrypt these data blocks, is then inserted or “hidden” in the headerof the first data block 230a, as denoted by reference numeral 240. Inembodiments, this convention might include using another data blockother than the first data block. After the data block(s) encryption iscompleted, an asymmetric encryption algorithm 205 is used to encrypt theheader 231 of the first data block and render the hidden symmetric keyinaccessible and secure during transmission, delivery or use. Thisprocess is denoted by reference numeral 235. Any secure asymmetricencryption algorithm, such as ElGamal, may be used for this function.

The asymmetric encryption algorithm 205 generates two decryption keys,called the primary and secondary keys 250 and 252, respectively, and arestored in a record 225 in the container registration database 165 on thecontainer verification server 160. The primary 250 and secondary key 252are associated with the corresponding unique SDC 120 via digitalcontainer ID 210 (also referred to as unique container ID) (e.g.,12345). Reference numeral 220 denotes the logical association of thedigital container ID 210, the primary key 250 and the secondary key 252for each unique record in the container registration database 165.

There may be a plurality of entries in the container registrationdatabase for many different digital containers and associated keys, asone of ordinary skill in the art would recognize. This illustrationshows but one example. These keys may be produced based on data, inwhole or in part, from the particular container ID 210. In this way,these decryption keys are made unique to that particular container. Thedigital container ID may be of various lengths such as, for example,32-64 bytes, but any appropriate length may be used depending onanticipated total numbers of digital containers that may be createdoverall. The digital container ID may also be organized by series suchthat different producers of digital containers may acquire or purchaseunique series (or a range) of digital container IDs, thus avoidingpotential conflicts in digital container IDs.

In embodiments, the data block concept might be modified to insertdifferent symmetric keys into the encrypted headers of multiple datablocks. For example, the data blocks may be divided into uniquelyencrypted sets. Each set would be encrypted with a symmetric key uniqueto that set. A number of data blocks equal to the number of uniquelyencrypted data block sets may then be used to store these uniquesymmetric keys in their header. These headers may, in turn, be encryptedwith a similar number of asymmetric encryption keys sets. These keyssets may all be stored in the container registration database record forthe container in question. As a result, a similar number of fingerprintkeys may be created for the token assembly and eventual decryptionprocess. Hence, this technique may be used to effectively eliminatereverse engineering and/or “hacking.” This technique may also be used toallow various content files to be decrypted independently of the othercontent files in the container such that this scheme may be used tolimit access to various independent content files within a containeraccording to date, sequence, user or any combination of these factors.

FIG. 3 is a functional block diagram of a user's device, according tothe invention, generally denoted by reference numeral 125. FIG. 3 isalso discussed in relation to FIGS. 1 and 2. The user's device 125 mayinclude a SDC 120′ (which may have been received via a transmission, forexample) having a digital container ID 210 and may also include acontainer code module 302 (i.e., executable code). The user device 125also includes appropriate system hardware 310 such as a centralprocessing unit (CPU), network interface, power, etc. for generaloperations.

Also included in the user's device 125 may be an operating system (OS)315 suitable for the type of user device, a special security chipset 320for securely storing keys, a smart card 305 and smart card reader 306for alternatively providing user identification data, a memory 130 forstorage of encrypted usage rules 325 and the CFMF 330. The memory 130may be logically segregated or unique to the user device 125 and may ormay not be under control of the OS 315, depending on the device type andOS type.

When the digital container 120′ is received at a user's computer ordevice 125 and the user attempts to access the protected content of theSDC 120′, executable instructions 302 resident in the SDC (or perhapsalready present on the user's device) searches for the CFMF 330. TheCFMF 330 may already be present if the container had been previouslyapproved to be opened on the device 125. If the SDC 120′ has not beenapproved previously, the CFMF 330 is not found and the container codemodule 302 begins an approval process. In embodiments, the user mightalso be prompted to input various biometric measurement parameters suchas fingerprints and/or retina scans in place of or in addition to themanual data input via a biometric measurement device 140. In thisfashion, a variety of multi-factor authentication modes is possible forincreasing the security of the authentication process

The executable instructions of the container code module 302 may alsoread data from the user's device 125 to create a machine footprint 335.The machine footprint 335 is derived from sources on the user's computeror device such as, but not limited to, the following:

Bios version

OS version

Network Interface Card (NIC) ID

System Name

System Manufacturer

System Model

Processor Name or ID number

User Name

Physical memory identification data

Disk drive model name or ID

Display name

In embodiments, unique user identification data may also be read from an“smart” card 305 that is inserted into the user's CD-ROM drive or otherexternal memory reading device 306. This card 305 has a read/writememory capacity and may be used to store user identification data andsecure financial transaction data. The container code module 302 may beprogrammed to read data from this card 305 and include this informationin the machine footprint 335, if the card 305 is available. Data fromthis card 305 may be used to lock the contents of the SDC 120′ to aparticular user instead of a particular device. In this manner the usermay securely pay for and access protected contents on any machine suchas a device made available for multiple users or public use.

In another version of the invention, the container code module 302 maybe programmed to read unique identification data from specializedsecurity chipset 320 on the user's device 125. This uniqueidentification data may be written to a protected area of the chipset320 which cannot be accessed or altered by the user. This kind ofprotected identification data may be included in the machine footprint335 and may be used to maximize security. An example of this type ofapplication may be the secure distribution of data to a predeterminedset of recipients. Each of these recipients might be furnished with adevice that utilizes a specialized chipset 320 containing protectedidentification data so that when the machine footprint 335, computedduring an authenticating phase, does not reflect the specialidentification data read from these protected chips, access to thecontents is denied or restricted. User data may also be used to captureuser data via a data input screen (e.g., GUI) 400 to create secure userinput data 345. An example of GUI 400 is described below in reference toFIG. 4.

Once the appropriate machine footprint data has been selected and read,the executable instructions of the container code module 302 creates the“client fingerprint” 340. The client fingerprint 340 includes themachine footprint data 335 and the unique container ID 210.

FIG. 4 is an illustrative embodiment of a Graphical User Interface(GUI), according to the invention, generally denoted by referencenumeral 400. The approval process may include displaying the datainput/e-commerce GUI 400 to the user. This GUI 400 may be tailoredaccording to particular targeted users or applications and may includeprompts for user input data 405 such as credit/debit card numbers,expiration dates, name, address, email address or other identifyinginformation, as appropriate. The user may also be prompted to enterdemographic data or financial transaction data, such as account numbers,that may be used to purchase the contents of the container and/orproducts/services represented by the contents of the SDC 120′.

When the user has completed entering the form data 405 in the datainput/e-commerce screen (e.g., GUI 400) and presses the “Send” button410 on the GUI 400, the SDC 120′ opens up a secure SSL link 350 to thecontainer authentication server 160 and transmits the client fingerprint340 and the secure user input data 345 (i.e., from user input data 405)as part of the authorization request 190. In embodiments, the user inputdata 405 is never stored on the user's device and is therefore securelyprotected throughout processing. In other SDC embodiments, user datainput is not required and the process is initiated when the user attemptto open the container, bypassing prompting for user input. In this case,no user input data is sent to the container authentication server 160with the client fingerprint 340.

FIG. 5 is a functional block diagram of an embodiment of a containerauthentication and permission token generation process, according to theinvention, generally denoted by reference numeral 500. FIG. 5 also showscertain steps of the process, which may be considered in view of FIGS.1-4. When the container verification server receives the authorizationrequest, any secure user input data 345 (e.g., financial transactiondata) that may be included is sent to a transaction processing module555. This transaction processing module 555 assembles a financialtransaction request, if appropriate, and securely transmits it to thetransaction server for transaction processing, as represented byreference numeral 192.

The container authentication server also reads the client fingerprintdata 340 as received from the SDC executable code and sends it to a CFMFalgorithm module 550. This CFMF algorithm module randomly selects aportion of the machine footprint data creating a machine footprintsubset 335′, and separately creates a CFMF 330. The CFMF 330 value maybe made unique by using the container ID read from the clientfingerprint 340 via a randomizing function.

The CFMF 330 is then processed by a fingerprint key algorithm module560. This module 560 first concatenates the CFMF 330 value, the machinefootprint subset 335′ data and the container ID 210 into a single value.This value may be processed by a cryptographic one-way hashing functionto create a fingerprint key 565. Examples of suitable hashing functionsinclude Secure Hash Algorithm (SHA-1) and Message-Digest algorithm(MD5), as generally known by a skilled artisan.

The primary and secondary decryption keys, respectively, for theencrypted first data block 230a of the SDC 120 are then retrieved fromthe container registration database that were previously stored duringthe container registration process. An atomic proxy encryption algorithm570, a generally known technique, combines these keys (e.g., 250, 252)with the fingerprint key 565 to produce an atomic proxy re-key value580. An atomic proxy algorithm is typically an encryption function thatcan re-encrypt data on any insecure machine in a secure manner. Thus,the encrypted data (e.g., data blocks 230a-230c) may be re-encryptedwhile data remains secure at all times. The data is never leftunprotected or exposed.

Further, the usage rights parameters for the container may be read fromthe container registration database 165. These parameters describe usagerules such as the number of times the user may access the contents, aperiod of time in which the user may access the contents, as applied toportions or the entire contents. The usage parameters may also includeany subscription data that might allow the user to access othercontainers involved in a subscription grouping. This may be accomplishedby grouping ranges of containers in to a series.

These usage rights parameters may be encrypted by a symmetric encryptionalgorithm 575. The previously created fingerprint key 565 may be used asthe encryption key for this process. The resulting encrypted usage rules585 data may then be provided to the token assembler 590. The previouslycreated atomic proxy re-key value 580 may also be sent to the tokenassembler 590 along with a permission flag data string 594 (also knownas an installation flag) and any encrypted financial transactionresponse 194 data 596, previously created by the transaction server 180.

The permission flag data string 594 determines whether the containercode module (i.e., executable code) grants or denies access to theprotected container (e.g., SDC 120′) contents. Other functions mightinclude determining what approval, denial or error message may bepresented to the user. The financial transaction response data providesdata that might be displayed in transaction approval or denial messagewhen presented to the user. This financial transaction response data mayinclude credit/debit card acceptance or rejection codes as well aspurchase confirmation data.

The token assembler 590 also constructs a permission token 600. Thepermission token is typically a string of bytes that may include, but isnot limited to:

-   -   i) header bytes that identify the start of the permission token        data string and perform a handshake function.    -   ii) the installation permission flag.    -   iii) the atomic proxy re-key value.    -   iv) the Client Fingerprint Mode Flag.    -   v) the encrypted usage rights data.    -   vi) the encrypted financial transaction response data.    -   vii) trailer bytes that identify the end of the permission token        data string.

FIG. 6 is an illustration of an embodiment of a permission token,according to the invention, generally denoted by reference numeral 600.The exemplary permission token 600 includes fields for a header 605 toindicate the beginning of the token, an installation permission flag610, an atomic proxy re-key value 615, a client fingerprint mode flag620, digital rights management usage rules data 625, a financialtransaction response data 630, and a trailer 635 to indicate the end ofthe token. These fields of the permission token 600 are built by thetoken assembler 590, previously described, for transmission in a messageto the SDC on the user's device. The use of these fields at the user'sdevice is described in relation to FIG. 7.

FIG. 7 is a functional block diagram of an embodiment of a decryptionprocess, according to the invention. FIG. 7 also shows certain steps ofthe decryption process. The permission token 600 is returned to theuser's device via a permission token message (e.g., message 196 ofFIG. 1) and read by the container executable instructions. The encryptedusage rules data 625 and the CFMF 620 are then stored in a confidentialor “hidden” location 130 located on or associated with the user's device125 as encrypted usage rules data 585 and CFMF 330, respectively.

The executable instructions of the container code module may read theatomic proxy re-key value 615 from the token 600. An atomic proxyalgorithm 705 uses this re-key value 615, along with the uniquecontainer ID 210 read from the container, to securely re-encrypt theencrypted header of data block 1, as denoted by reference numeral 715.This one-time operation locks the encrypted content data to the userand/or the user's device 125 and takes place without ever exposing thecontent data in unencrypted form.

The executable instructions employ a machine footprint module 720 thatuses the CFMF 330 value to determine what subset 722 of the originalmachine footprint sources 725 is used to create the machine footprintsubset 720 that matches the similar subset created on the containerauthentication server 160 during the token assembly process. Once themachine footprint subset 722 is determined, it is used by the machinefootprint module 720 to create the fingerprint key 730.

The fingerprint key 730 is used by an asymmetric decryption algorithm735 to decrypt the re-encrypted header of the first content data block231. Once the header decryption process is completed, the fingerprintkey 730 may be discarded and therefore no decryption key is stored onthe user's machine and available for hacking or reverse engineering.Throughout this process, the container and its content(s) are securelylocked to the user's machine 125. Since the fingerprint key 730 is notstored on the user's device 125, it is re-created every time the userattempts to open the container.

When the header 231 is decrypted, the symmetric key hidden in the headeris extracted as denoted by reference numeral 740 and used by a symmetricdecryption algorithm 750 to decrypt the encrypted content data blocks230a-230c. Once these data blocks are decrypted, the user may access,view, or otherwise use the content based on usage rights. The symmetricdecryption algorithm 750 may be resident with the executable instructionset (i.e., container code module 302) that resides in the SDC 120′ ormay already be present on the user's device. This algorithm may beupgraded as new technology becomes available.

Moreover, when the user attempts to access the encrypted data in the SDC120′ at a later time, the executable instructions of the container codemodule 302 can locate the CFMF that was written to a hidden orconfidential location during the first decryption effort. If this flagis found, the process used to create the fingerprint key 730 is repeatedand this key is used to decrypt the usage rules data 130 to determine ifthe usage rules allow further access to the protected contents.

In this way, the user may access the content without having to repeatthe over container authorization process. If the CFMF 330 is not foundor if the usage rules contained in the usage rights data 130 prohibitaccess to the protected contents, then the executable instructions willprompt the user to repeat the authorization procedure.

Depending on what elements of the user's device or user input that wereused to create the original machine footprint 335, the user may beprompted to recreate certain conditions that were in effect when theoriginal machine foot print was created. For example, the user may beprompted to re-enter certain security codes or biometric measurements.If the Smart Card scenario was being used, the user may be prompted tore-insert this card in order to successfully reopen the container.

The machine footprint module 720 that re-creates the machine footprintsubset 722 may be programmed with a variable tolerance which permitssome degree of flexibility if changes in the machine footprint of theuser's device occur. For example, if the machine footprint subset wascreated by reading eight pieces of data from the user's device, themachine footprint module 720 may be programmed to ignore changes inthree of the pieces of data and still recreate the fingerprint key 730used to decrypt the container contents.

As a result of the re-encryption technique, if the digital container isever transmitted to a different computer or device, the executableinstructions will fail to locate the CFMF when the new user attempts toaccess the content. If this condition is detected, the authorizationprocess re-initiates so that the container might be associated withanother user.

FIGS. 8A and 8B are flow diagrams of an embodiment showing steps ofusing the invention, starting at step 800. FIGS. 8A, 8B and 9 mayequally represent a high-level block diagram of components of theinvention implementing the steps thereof. The steps of FIGS. 8A, 8B and9 (and other block diagrams) may be implemented on computer program codein combination with the appropriate hardware. This computer program codemay be stored on storage media such as a diskette, hard disk, CD-ROM,DVD-ROM or tape, as well as a memory storage device or collection ofmemory storage devices such as read-only memory (ROM) or random accessmemory (RAM). Additionally, the computer program code can be transferredto a workstation over the Internet or some other type of network. Thesteps of the flow diagrams may be implemented on the system of FIG. 1.

Continuing with FIGS. 8A and 8B, at step 805 a digital container creatoror originator selects one or more files to be placed in a digitalcontainer and chooses which files are to be encrypted. At step 810,content data is analyzed for data block sizing and those chosen filesare encrypted by corresponding data blocks. At step 815, symmetricencryption algorithm encrypts data blocks. The symmetric decryption keymay be stored or “hidden” in the header of the first data block(alternatively, in embodiments other blocks may be used).

At step 820, an asymmetric encryption algorithm may be used to encryptthe header of the first data block. At step 825, the primary andsecondary asymmetric keys for the first data block may be stored in acontainer verification server. At step 830, the newly constructeddigital container is transmitted or otherwise made available to a user'sdevice. At step 835, a user attempts to open the container and/or accessthe encrypted files. At step 840, the container attempts to locate andread a CFMF on the user's device. At step 845, a check is made if theCFMF has been located. If so, then processing continues at step 872.Otherwise, if not, then at step 850, a machine footprint may be createdby reading data from various sources associated with the user and/or theuser's device.

At step 852, the machine footprint data is combined (e.g., by hashing)with the digital container ID to form a client footprint. At step 854, acheck is made whether user input is required as determined by thedigital container executable instructions. If not, then processingcontinues at step 856. However, if yes, then at step 855, the user maybe prompted for financial transaction data, a password, an accountnumber, or other unique access permission information. At step 856, theclient footprint and user input data, if any, may be securelytransmitted to a container verification server.

At step 858, the container verification server reads the clientfootprint and creates an atomic proxy re-key value, encrypted usagerights data, permission flag and CFMF. At step 860, a check is madewhether a financial transaction is involved with container access. Ifnot, processing continues at step 864. If yes, then at step 862, thecontainer verification server transmits financial data to a transactionserver for authenticating or processing financial data and a transactionresponse is generated by the transaction server to the containerverification server. At step 864, a permission token may be assembledwith the permission flag, atomic proxy re-key value, CFMF, encryptedusage rule (or rights) data and any available transaction response data.At step 866, the container verification server securely returns thepermission token to the digital container on the user's device.

At step 868, the digital container reads the permission token and storesencrypted usage rule (i.e., rights) data and CFMF in a confidentiallocation on the user's device or associated storage. At step 870, anatomic proxy algorithm uses the atomic proxy re-key value to securelyre-encrypt the first data block header which locks the digital contentto the user or user's device. At step 872, the digital containerexecutable instructions uses the CFMF to read appropriate machinefootprint data and construct a fingerprint key. At step 874, thesymmetric decryption algorithm uses the fingerprint key to decrypt usagerules data.

At step 876, a check is made whether the usage rules allow access to thedigital contents or portions of the digital content. If access is notpermitted, processing continues at step 850, where it may be assumedthat the digital container is now present on another or different devicefrom the original device from which the client footprint was initiallycreated and for which a re-keying (i.e., re-encrypting) under propervalidations and approval (perhaps including a financial transaction) mayoccur for establishing the new device or user. Alternatively, processingmay also terminate.

However, if access is permitted at step 876, then at step 878, anasymmetric decryption algorithm uses the fingerprint key to decrypt thefirst data block header and extract the “hidden” symmetric key. At step880, a symmetric decryption algorithm uses the symmetric key to decryptall the encrypted data blocks. At step 882, the contents of thecontainer may be accessed by a user according to usage rules such asone-time access, execute only, print prohibited, copy prohibited, printprohibited, time-limited access, access count, or the like. At step 884,the user may close the container to end the session and all decryptedcontents are deleted by the container executable instructions. Theprocess may resume at step 835, if the user attempts to access or openthe digital container.

FIG. 9 is a flow diagram of an embodiment showing steps of using theinvention, starting at step 900. At step 905, a new container may becreated and the contents (e.g., files) partitioned (e.g., organized intodata blocks). Each data block (or each data block of a subset of thetotal number of data blocks) may be encrypted using a symmetricencryption algorithm. At step 910, a content decryption key may behidden in the header of the first data block.

At step 915, an asymmetric encryption algorithm may be used to encryptthe first data block header. The asymmetric keys (e.g., primary andsecondary keys) may be stored in a container registration database forlater recall. Typically the database would be an independentlymaintained facility and securely protected. At step 920, the digitalcontainer is sent, delivered, or otherwise made available to a user'sdevice such as a phone, personal digital assistant (PDA), PC, cable box,or other computer controller device. At step 925, a user may attempt toopen and/or access the digital container and its contents.

At step 930, machine footprint data and, optionally, user input data(such as, for example, financial data, account data, credit data, asocial security number, or other identifying data) may be sent to acontainer authentication server along with the digital container ID,typically accomplished using a secure network connection. At step 935,the container authentication server combines data from the user, user'sdevice and digital container ID, as available, to produce a fingerprintkey.

At step 940, the container authentication server uses an atomic proxyalgorithm to combine the fingerprint key with the encryption keyspreviously stored in the container registration database for the digitalcontainer ID to create an atomic proxy re-key value. At step 945, thefingerprint key and atomic proxy re-key value may be inserted into apermission token and sent as a message to the digital container. At step950, the atomic proxy algorithm uses the re-key value from the toke tore-encrypt the first data block header. The content of the container isnow locked to the user's device and/or user.

At step 955, executable instructions associated with the digitalcontainer combines the data from the original machine footprint sourcesand data from the permission token to re-create the fingerprint key. Atstep 960, an asymmetric decryption function uses the fingerprint key todecrypt the first data block header of the digital container. Once thisoccurs, the fingerprint key is discarded or purged to preventunauthorized acquisition of the fingerprint key.

At step 965, the symmetric decryption function may use the key retrievedfrom the decrypted header to decrypt any encrypted content data blocks.The digital container may also include non-encrypted data blocks asconstructed originally by the container creator which would, of course,not required any decryption when accessed by a user. At step 970, theuser may access the contents of the container as regulated by the usagerules. The user may also be prevented from accessing certain or allparts of the content based on the usage rules, or if the fingerprints donot support decryption on the user's device. At step 980, the processends.

Environments and Examples of Using the Invention

This product brings unique capabilities to a number of digital goodsdistribution, e-commerce and rights management markets. These marketsinclude, but are not limited to:

-   -   i) The secure distribution of digital entertainment goods to the        general consumer market. Since the digital container and the        related encryption function described by this invention are        designed to operate in a variety of device and operating system        environments, the product is well suited to this market. The        container may be used distribute and sell such products as        movies and videos, games, software, books (including audio        books) periodical or the like. These items may be securely        distributed to cable television set-top boxes, personal        computers, tablet computers, handheld computing devices and        mobile phones, just to name a few.    -   ii) The legal distribution of digital goods in a Peer-To-Peer        (P2P) environment. The on-board e-commerce and access tracking        features of the product make it especially useful in the P2P        marketplace.    -   iii) The self publishing marketplace. The digital container        product allows users to create and e-commerce-enable their own        publishing and media distribution objects. Authors can publish        and sell their own books, stories and articles at a fraction of        the price of current publishing requirements. Musicians can        create multimedia containers which promote and sell their music        without having to deal with any expensive record labels.    -   iv) The personal records privacy and regulations compliance        marketplace. Hospitals, private doctors and law firms can        containerize and store the private records of patients and        clients. These records may be retrieved and securely transmitted        to authorized recipients such as government agencies or        insurance firms as needed.    -   v) The secure distribution of documents and files for        corporations and government agencies. The pre-registration of        distribution lists on the Container Authentication Server        combined with the multi-factor authentication features of this        invention provide for an extremely effective method of secure        document distribution. The containerization concept allows this        secure distribution to take place outside of corporate LANs and        across multiple devices and operating systems.    -   vi) Secure financial transactions using the Smart Card concept.        The Smart Card is an intelligent card that may be inserted into        a non-specialized reader device such as a CD-ROM drive. The card        is designed to hold secure personal identification data along        with financial account data. Customers may use ATMs to deposit        money onto the card and it can be used to purchase items in        brick and mortar establishments like any bank debit card. But it        could also be inserted into a computing device to execute secure        purchases of containerized digital goods. Identification data        from the card may be used in the authentication process        described by the invention to lock digital goods to a user and        not just to a device. In this way, a customer may access secure        containerized files on any device, such as work computers setup        for multiple users or public use devices such as computers at        public libraries. In this manner a Personal Media Virtual        Library concept can be created. The Smart Card can be used to        purchase containerized digital goods which are then stored in an        individualized “virtual library.” This library would consist of        storage space purchased from an internet vendor. The Smart Card        would contain the secure URL of this individualized library        which would allow the user to access previously purchased        containers from any device in any location.

While the invention has been described in terms of embodiments, thoseskilled in the art will recognize that the invention can be practicedwith modifications and in the spirit and scope of the appended claims.

We claim:
 1. A computer-implemented method for protecting electroniccontent, the method comprising the steps of: storing an asymmetricdecryption key that is associated with a digital electronic container;receiving client device footprint data from a client device; creating are-key value using both the client device footprint data and the storedan asymmetric decryption key that is associated with a digitalelectronic container; and providing the re-key value to the clientdevice for re-keying content data provided by of the electronic digitalcontainer at the client device wherein a predetermined data block of thecontent data stores contains a symmetric decryption key, thepredetermined data block and stored the symmetric decryption key beingpreviously encrypted using an asymmetric key technique, and wherein thecontent data is arranged into data blocks including the predetermineddata block.
 2. The computer-implemented method of claim 1, wherein allof the data blocks are encrypted using a systematic symmetric keytechnique.
 3. The computer-implemented method of claim 1, wherein thedigital electronic container is configured with executable instructionsthat are configured to execute at the client device to combine theclient device footprint data and the re-key value to create afingerprint key, the fingerprint key for decrypting the predetermineddata block thereby providing access to the symmetric decryption key. 4.The computer-implemented method of claim 1, wherein the step ofproviding the re-key value to the client device includes sending there-key value as part of a permission token.
 5. The computer-implementedmethod of claim 4, wherein the permission token includes a fingerprintkey.
 6. The computer-implemented method of claim 1, wherein the step ofreceiving receives user input data and the step of creating produces afingerprint key.
 7. The computer-implemented method of claim 6, whereinthe user input data includes any one or more of: financial transactiondata, expiration data, an email address, demographic data, financialdata, account data, credit data, a social security number andidentifying data.
 8. The computer-implemented method of claim 1, whereinthe step of creating uses a container identifier associated with thedigital electronic container to produce a fingerprint key.
 9. Thecomputer-implemented method of claim 8, wherein the providing step sendsthe re-key value and the fingerprint key as part of a permission token.10. A computer program product comprising computer executableinstructions embodied on a non-transitory computer readable storagemedium that when read and executed by a computer processor executes thefollowing steps: storing an asymmetric decryption key that is associatedwith a digital electronic container; receiving client device footprintdata from a client device; creating a re-key value using both the clientdevice footprint data and the stored an asymmetric decryption key thatis associated with a digital electronic container; and providing there-key value to the client device for re-keying content data provided bythe digital electronic container to the client device wherein apredetermined data block of the content data stores contains a symmetricdecryption key, the predetermined data block and stored the symmetricdecryption key being previously encrypted using an asymmetric keytechnique, and wherein the content data is arranged into data blocksincluding the predetermined data block.
 11. The computer program productclaim 10, wherein all of the data blocks are encrypted using asystematic symmetric key technique.
 12. The computer program product ofclaim 10, wherein the digital electronic container is configured withexecutable instructions that are configured to execute at the clientdevice to combine the client device footprint data and the re-key valueto create a fingerprint key, the fingerprint key for decrypting thepredetermined data block thereby accessing the symmetric decryption key.13. The computer program product of claim 10, wherein the step ofproviding the re-key value to the client device includes providing there-key value as part of a permission token.
 14. The computer programproduct of claim 13, wherein the permission token includes a fingerprintkey.
 15. The computer program product of claim 10, wherein the step ofreceiving receives user input data and the step of combining produces afingerprint key.
 16. The computer program product of claim 15, whereinthe user input data includes any one or more of: financial data, accountdata, credit data, a social security number and identifying data.