Patent
Database usage metering and protection system and method
Reads0
Chats0
TLDR
In this article, a "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program resident in the hardware device.Abstract:
A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which .disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user's site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.read more
Citations
More filters
Patent
Method and apparatus for assigning consequential rights to documents and documents having such rights
Xin Wang,Eddie J. Chen,Thomas Demartini,Charles P. Gilliam,Guillermo Lao,Aram Nahidipour,Michael Raley,Thanh Ta,Bijan Tadayon +8 more
TL;DR: In this paper, a right management system including one or more consequential rights associated with digital content, and specifying a manner of use of the digital content is defined, where the right management module enforces the rights permitting use of digital content in accordance with the rights upon occurrence of a consequential event.
Patent
System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers
TL;DR: In this paper, a data encryption/decryption system is provided which encrypts a critical file to a software program using an embedded executable, which prompts a user to purchase a license key to decrypt the file in order to run the software program.
Patent
Systems and methods for integrity certification and verification of content consumption environments
TL;DR: In this article, the authors propose an approach to verify the authenticity of protected content in a trusted environment by providing integrity certification and verification services, which can be used to authenticate the content.
Patent
Secure video card in computing device having digital rights management (DRM) system
TL;DR: In this paper, the authors describe a digital rights management (DRM) system thereon for rendering of protected digital content on the computing device, which includes a video section for receiving the content and for producing a video signal to be sent to the monitor.
Patent
An interactive System for remotely and uniquely creating, editing and administrating an online communication System for a plurality of online service providers
TL;DR: In this article, the authors present an on-line communications service that allows a plurality of service providers to provide services to respective groups of subscribers, with the on-online service from each provider being independent of the online service from other providers, and subscribers' access to features is maintained through service maps which are customized by the service provider interactively with the host computer.
References
More filters
Patent
Software distribution system
TL;DR: In this paper, the authors propose a software authorization system where a software can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit.
Journal ArticleDOI
Privacy and authentication: An introduction to cryptography
TL;DR: The basic information theoretic and computational properties of classical and modern cryptographic systems are presented, followed by cryptanalytic examination of several important systems and an examination of the application of cryptography to the security of timesharing systems and computer networks.
Patent
Instinet communication system for effectuating the sale or exchange of fungible properties between subscribers
TL;DR: In this paper, the authors present an apparatus and method of automatically, anonymously and equitably buying and selling fungible properties between subscribers, which enables institutional investors to communicate anonymously with each other for the purpose of arranging block trades of listed and over-the-counter securities.
Patent
System for reproducing information in material objects at a point of sale location
TL;DR: In this article, the authors propose a system for reproducing information in material objects at a point of sale location, where the information to be reproduced is provided at the point-of-sale location from a location remote with respect to the point of sales location.
Patent
Crypto microprocessor for executing enciphered programs
TL;DR: In this paper, a microprocessor for executing computer programs which are stored in cipher to prevent software piracy is proposed, which can process valuable proprietary programs and data files which are distributed in cipher on videodiscs, semiconductor memory, or other media without risk of software piracy.