The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 30, 2022

Filed:

Jan. 08, 2020
Applicant:

Nytell Software Llc, Wilmington, DE (US);

Inventors:

David J. Marples, Mansfield, GB;

John R. Wullert, II, Martinsville, NJ (US);

Assignee:

Nytell Software LLC, Wilmington, DE (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06F 21/10 (2013.01); G06F 21/12 (2013.01); G06Q 20/12 (2012.01); G06Q 10/10 (2012.01); G06Q 30/04 (2012.01); G06Q 30/06 (2012.01); H04L 9/14 (2006.01);
U.S. Cl.
CPC ...
H04L 63/0428 (2013.01); G06F 21/10 (2013.01); G06F 21/12 (2013.01); G06Q 10/10 (2013.01); G06Q 30/04 (2013.01); G06Q 30/06 (2013.01); H04L 9/14 (2013.01); H04L 63/061 (2013.01); G06F 2221/2115 (2013.01); G06Q 20/1235 (2013.01); G06Q 2220/10 (2013.01); G06Q 2220/12 (2013.01); H04L 2209/24 (2013.01); H04L 2463/101 (2013.01);
Abstract

A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.


Find Patent Forward Citations

Loading…