scispace - formally typeset
Search or ask a question
Patent

Database usage metering and protection system and method

08 Oct 1987-
TL;DR: In this article, a "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program resident in the hardware device.
Abstract: A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which .disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user's site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.
Citations
More filters
Patent
30 Sep 2010
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Abstract: PROBLEM TO BE SOLVED: To solve the problem, wherein it is impossible for an electronic content information provider to provide commercially secure and effective method, for a configurable general-purpose electronic commercial transaction/distribution control system. SOLUTION: In this system, having at least one protected processing environment for safely controlling at least one portion of decoding of digital information, a secure content distribution method comprises a process for encapsulating digital information in one or more digital containers; a process for encrypting at least a portion of digital information; a process for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container; a process for delivering one or more digital containers to a digital information user; and a process for using a protected processing environment, for safely controlling at least a portion of the decoding of the digital information. COPYRIGHT: (C)2006,JPO&NCIPI

7,643 citations

Patent
11 Sep 1998
TL;DR: In this paper, a method and system for placing an order to purchase an item via the Internet is described, where an order is placed by a purchaser at a client system and received by a server system.
Abstract: A method and system for placing an order to purchase an item via the Internet. The order is placed by a purchaser at a client system and received by a server system. The server system receives purchaser information including identification of the purchaser, payment information, and shipment information from the client system. The server system then assigns a client identifier to the client system and associates the assigned client identifier with the received purchaser information. The server system sends to the client system the assigned client identifier and an HTML document identifying the item and including an order button. The client system receives and stores the assigned client identifier and receives and displays the HTML document. In response to the selection of the order button, the client system sends to the server system a request to purchase the identified item. The server system receives the request and combines the purchaser information associated with the client identifier of the client system to generate an order to purchase the item in accordance with the billing and shipment information whereby the purchaser effects the ordering of the product by selection of the order button.

1,828 citations

Patent
24 Oct 1995
TL;DR: In this article, a network-based sales system includes at least one buyer computer for operation by a user desiring to buy a product, a merchant computer, and a payment computer.
Abstract: A network-based sales system includes at least one buyer computer for operation by a user desiring to buy a product, at least one merchant computer, and at least one payment computer. The buyer computer, the merchant computer, and the payment computer are interconnected by a computer network. The buyer computer is programmed to receive a user request for purchasing a product, and to cause a payment message to be sent to the payment computer that comprises a product identifier identifying the product. The payment computer is programmed to receive the payment message, to cause an access message to be created that comprises the product identifier and an access message authenticator based on a cryptographic key, and to cause the access message to be sent to the merchant computer. The merchant computer is programmed to receive the access message, to verify the access message authenticator to ensure that the access message authenticator was created using the cryptographic key, and to cause the product to be sent to the user desiring to buy the product.

1,697 citations

Patent
18 Oct 1996
TL;DR: In this article, the authors propose a method of browsing the World Wide Web of the Internet using a client machine supporting a graphical user interface and an Internet browser, which locally stores, retrieves and outputs information objects to reduce the waiting time normally associated with the download of hypertext documents having high resolution graphics.
Abstract: A method of browsing the World Wide Web of the Internet using a client machine supporting a graphical user interface and an Internet browser. The method locally stores, retrieves and outputs information objects to reduce the waiting time normally associated with the download of hypertext documents having high resolution graphics. In one embodiment, the method begins as a web page is being displayed on the graphical user interface (70), the web page having a link to a hypertext document preferably located at a remote server. In response to the user clicking on the link, the link is activated by the browser (74) to request downloading the hypertext document from the remote server to the graphical user interface of the client (76). While the client waits for a reply and/or as the hypertext document is being downloaded, the browser displays a previously-cached information object (82).

1,615 citations

Patent
20 Mar 1998
TL;DR: In this paper, a method for monitoring client interaction with a resource downloaded from a server (10) in a computer network includes the steps of using a client (12) to specify an address of a resource located on a first server, downloading a file corresponding to the resource from the first server in response to specification of the address, using the client to specify a first executable program located on another server, the address of the first executable programs being embedded in the file downloaded from the second server, and a software timer for monitoring the amount of time the client(12) spends interacting with
Abstract: A method for monitoring client (12) interaction with a resource downloaded from a server (10) in a computer network includes the steps of using a client (12) to specify an address of a resource located on a first server (10), downloading a file corresponding to the resource from the first server (10) in response to specification of the address, using the client (12) to specify an address of a first executable program located on a second server (10), the address of the first executable program being embedded in the file downloaded from the first server (10), the first executable program including a software timer for monitoring the amount of time the client (12) spends interacting with and displaying the file downloaded from the first server (10), downloading the first executable program from the second server to run on the client (12) so as to determine the amount of time the client (12) interacts with the file downloaded from the first server (10). A server (10) for use in analysis and automatically serving out files assembled according to user interests and preferences.

1,516 citations

References
More filters
Patent
11 Jul 1983
TL;DR: In this paper, the authors propose a software authorization system where a software can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit.
Abstract: Software (programs, videogames, music, movies, etc.) can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit. Authorizations may be sent via telephone line, mail, or whatever form of communication is most suited to the application. Authorizations cannot be reused, for example by recording the telephone authorization signal and replaying it to the base unit. Similarly, authorizations can be made base unit specific, so that an authorization for one base unit cannot be transferred to another base unit. This invention also solves the "software piracy problem" and allows telephone sales of software as additional benefits.

615 citations

Journal ArticleDOI
01 Mar 1979
TL;DR: The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks.
Abstract: This paper presents a tutorial introduction to contemporary cryptography. The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks. The paper concludes with a guide to the cryptographic literature.

574 citations

Patent
24 Feb 1969
TL;DR: In this paper, the authors present an apparatus and method of automatically, anonymously and equitably buying and selling fungible properties between subscribers, which enables institutional investors to communicate anonymously with each other for the purpose of arranging block trades of listed and over-the-counter securities.
Abstract: This disclosure is directed to an apparatus and method of automatically, anonymously and equitably buying and selling fungible properties between subscribers. The specific embodiment described in the disclosure relates to the buying and selling of securities wherein a communication system pursuant to this invention is described which permits institutional investors to communicate anonymously with each other for the purpose of arranging block trades of listed and over-the-counter securities. Said system comprises a centralized data storage unit, a digital computer, a plurality of subscriber terminals and a plurality of communication links established therebetween. The method of the system comprises the steps of (1) booking unfilled buy offers including associated price and quantity parameters on a buy offer list in a priority sequence according to a first predetermined program, (2) booking unfilled sell offers including associated price and quantity parameters on a sell offer list in a priority sequence according to a second predetermined program, (3) comparing in said priority sequence, the price and quantity parameters of each incoming offer with the corresponding parameters of each offer on the complementary one of said lists, (4) transacting said received offer with the higher priority offers on said complementary list if said incoming offer can be matched against one or more offers on the complementary offer list, and (5) placing the untransacted portion of said received offer on the corresponding one of said lists in a priority sequence according to the corresponding one of said predetermined programs if said incoming offer cannot be completely matched against offers on complementary offer list.

566 citations

Patent
09 Jul 1985
TL;DR: In this article, the authors propose a system for reproducing information in material objects at a point of sale location, where the information to be reproduced is provided at the point-of-sale location from a location remote with respect to the point of sales location.
Abstract: not available for EP0195098Abstract of corresponding document: US4528643The present invention contemplates a system for reproducing information in material objects at a point of sale location wherein the information to be reproduced is provided at the point of sale location from a location remote with respect to the point of sale location, an owner authorization code is provided to the point of sale location in reponse to receiving a request code from the point of sale location requesting to reproducing predetermined information in a material object, and the predetermined information is reproduced in a material object at the point of sale location in response to receiving the owner authorization code.

560 citations

Patent
04 Jun 1979
TL;DR: In this paper, a microprocessor for executing computer programs which are stored in cipher to prevent software piracy is proposed, which can process valuable proprietary programs and data files which are distributed in cipher on videodiscs, semiconductor memory, or other media without risk of software piracy.
Abstract: A microprocessor for executing computer programs which are stored in cipher to prevent software piracy. Such a crypto-microprocessor deciphers the enciphered program piecemeal as it executes it, so that a large enciphered program can be securely executed without disclosing the deciphered program or associated data to persons who have access to the wiring of the computer in which the crypto-microprocessor is a component. Such a device may process valuable proprietary programs and data files which are distributed in cipher on videodiscs, semiconductor memory, or other media without risk of software piracy. Various methods of encryption may be used including methods which result in the cipher of a byte being a complicated function of the byte's address in memory. Each crypto-microprocessor chip may use a unique cipher key or tables for deciphering the program, so that a program that can be executed in one chip cannot be run in any other microprocessor.

463 citations