scispace - formally typeset
Patent

Database usage metering and protection system and method

Reads0
Chats0
TLDR
In this article, a "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program resident in the hardware device.
Abstract:Ā 
A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which .disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user's site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.

read more

Citations
More filters
Patent

Method and system for managing, accessing and paying for the use of copyrighted electronic media

TL;DR: In this article, a method for identifying copyrighted content on a network to help ensure legal uses of the copyrighted content is presented, which includes searching a network for steganographically embedded content based on predetermined information, comparing data extracted from located content to the predetermined information; and verifying with a database whether the located content has been licensed for online uses.
Patent

System and method for protection of digital works

TL;DR: An additive encryption scheme is a particular type of encryption scheme which preserves formatting of a digital work as mentioned in this paper, which enables the rendering or replay application to process the encrypted document into encrypted presentation data without decrypting it first.
Patent

Secure authentication systems and methods

TL;DR: In this article, the authors provided a method for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT) and granting access to the user if a valid response to the first RTT is received and the username/ password pair is valid.
Patent

Method of encrypting information for remote access while maintaining access control

TL;DR: In this paper, the authors proposed a method for encrypting electronic information such as a document so that only users with permission may access the document in decrypted form, where the process of encrypting the information includes selecting a set of policies as to who may access information and under what conditions.
Patent

Postage payment system with security for sensitive mailer data and enhanced carrier data functionality

TL;DR: In this paper, a method and system for processing mail including imprinting on a mailpiece mailer identification information is presented, where data is encrypted relative to the mailpiece with a private key associated with the mailer identity information.
References
More filters
Patent

Software distribution system

TL;DR: In this paper, the authors propose a software authorization system where a software can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit.
Journal ArticleDOI

Privacy and authentication: An introduction to cryptography

TL;DR: The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks.
Patent

Instinet communication system for effectuating the sale or exchange of fungible properties between subscribers

TL;DR: In this paper, the authors present an apparatus and method of automatically, anonymously and equitably buying and selling fungible properties between subscribers, which enables institutional investors to communicate anonymously with each other for the purpose of arranging block trades of listed and over-the-counter securities.
Patent

System for reproducing information in material objects at a point of sale location

Freeny, +1 more
TL;DR: In this article, the authors propose a system for reproducing information in material objects at a point of sale location, where the information to be reproduced is provided at the point-of-sale location from a location remote with respect to the point of sales location.
Patent

Crypto microprocessor for executing enciphered programs

TL;DR: In this paper, a microprocessor for executing computer programs which are stored in cipher to prevent software piracy is proposed, which can process valuable proprietary programs and data files which are distributed in cipher on videodiscs, semiconductor memory, or other media without risk of software piracy.