Join
today

Boliven PRO is more than just patent search

  • Build and save lists using the powerful Lists feature
  • Analyze and download your search results
  • Share patent search results with your clients

Patents »

US7463738: Method for providing multimedia files and terminal therefor

Share

Filing Information

Inventor(s) Naoaki Nii ·
Assignee(s) Nokia Corporation ·
Attorney/Agent(s) Banner & Witcoff, Ltd. ·
Primary Examiner Nasser Moazzami ·
Assistant Examiner Brandon S Hoffman ·
Application Number US9739797
Filing date 12/20/2000
Issue date 12/09/2008
Prior Publication Data
Predicted expiration date 03/11/2023
Patent term adjustment 811
U.S. Classifications 380/232  · 705/65  ·
International Classifications H04L900  · H04N7167  ·
Kind CodeB2
35 Claims, 21 Drawings


Abstract

A method of and a system for securely distributing data files to a user. A first key is encrypted using a second key. The encrypted first key is stored on an integrated circuit card that is associated with the user. The integrated circuit card is provided to the user. Data files are encrypted using the first key to get an encrypted data file at a first party. The encryption parameters are exchanged between the first party and integrated circuit card.

Independent Claims | See all claims (35)

  1. 1. A method comprising: encrypting a first encryption key using a second encryption key, to provide an encrypted first encryption key; storing the encrypted first encryption key on a first integrated circuit card at a first computer; encrypting a data file using the first encryption key, to result in an encrypted data file; distributing the encrypted data file to a distribution terminal; placing the first integrated circuit card into communication with a first mobile terminal; downloading the encrypted data file from the distribution terminal to the first mobile terminal and storing the encrypted data file on the first mobile terminal; directly transferring the encrypted first encryption key from the first integrated circuit card to the first mobile terminal, wherein the encrypted first encryption key and the encrypted data file are transmitted over separate communication channels; decrypting the encrypted first encryption key in the first mobile terminal using an encryption key corresponding to the second encryption key; and decrypting the encrypted data file in the first mobile terminal using the first encryption key.
  2. 11. A system comprising: a first integrated circuit card; a first computer configured to store an encrypted first encryption key on the first integrated circuit card, the encrypted first encryption key including a first encryption key encrypted using a second encryption key; a distribution terminal configured to receive an encrypted data file, wherein the encrypted data file is data file encrypted using the first encryption key; and a first mobile terminal configured to communicate with the first integrated circuit card, download the encrypted data file from the distribution terminal, store the encrypted data file, directly receive the encrypted first encryption key from the first integrated circuit card, wherein the encrypted first encryption key and the encrypted data file are transmitted over separate communication channels, decrypt the encrypted first encryption key using an encryption key corresponding to the second encryption key, and decrypt the encrypted data file using the first encryption key.
  3. 17. A method comprising: establishing communication between an encryption source and a first mobile terminal; downloading an encrypted data file from a distribution source to the first mobile terminal and storing the encrypted data file on the first mobile terminal; directly receiving an encrypted first encryption key from the encryption source at the first mobile terminal, wherein the encrypted first encryption key and the encrypted data file are received into the first mobile terminal via separate communication channels; decrypting the encrypted first encryption key to obtain a first encryption key in the first mobile terminal using a second encryption key; and decrypting the encrypted data file to obtain a data file in the first mobile terminal using the first encryption key.
  4. 28. Apparatus comprising: a memory; and a processor configured to perform a method comprising: establishing communication between an encryption source and the apparatus; downloading an encrypted data file from a distribution source to the apparatus and storing the encrypted data file on the apparatus; directly receiving an encrypted first encryption key from the encryption source at the apparatus, wherein the encrypted first encryption key and the encrypted data file are received into the apparatus via separate communication channels; decrypting the encrypted first encryption key to obtain a first encryption key in the apparatus using a second encryption key; and decrypting the encrypted data file to obtain a data file in the apparatus using the first encryption key.

References Cited

U.S. Patent Documents

Document NumberAssigneesInventorsIssue/Pub Date
US4528643 FPDC, Inc. Freeny, Jr. Jul 1985
US5629980* Xerox Corporation Stefik et al. May 1997
US5721778* Sony Corporation Kubota et al. Feb 1998
US5734719 International Business Systems, Incorporated Tsevdos et al. Mar 1998
US5758257 Herz et al. May 1998
US5857175 Micro Enhancement International Day et al. Jan 1999
US5910987* InterTrust Technologies Corp. Ginter et al. Jun 1999
US5963916 Intouch Group, Inc. Kaplan Oct 1999
US6032130 Video Road Digital Inc. Alloul et al. Feb 2000
US6055314* Microsoft Corporation Spies et al. Apr 2000
US6189099* Durango Corporation Rallis et al. Feb 2001
US6449651* Toshiba America Information Systems, Inc. Dorfman et al. Sep 2002
US6560581* Visa International Service Association Fox et al. May 2003
US6895393* Hitachi, Ltd. Numata et al. May 2005

Foreign Patent Documents

Document NumberAssigneesInventorsIssue/Pub Date
CA2319773LEE CHIUN QIANGJan 1999
FR2774187BOXMARTJul 1999
WO200020950GLASSBROOK, INC.Apr 2000
WO200020950*GLASSBROOK, INC.Apr 2000
WO200030117SONY ELECTRONICS INC.May 2000
* cited by examiner

Referenced By

Document NumberAssigneeInventorsIssue/Pub Date
US8001474 Embarq Holdings Company, LLC Rich Hake et al. Aug 2011
US8191159 Micron Technology, Inc Doug L. Rollins May 2012

Patent Family

The current document is not in a family.

Claims 

  1. 1. A method comprising: encrypting a first encryption key using a second encryption key, to provide an encrypted first encryption key; storing the encrypted first encryption key on a first integrated circuit card at a first computer; encrypting a data file using the first encryption key, to result in an encrypted data file; distributing the encrypted data file to a distribution terminal; placing the first integrated circuit card into communication with a first mobile terminal; downloading the encrypted data file from the distribution terminal to the first mobile terminal and storing the encrypted data file on the first mobile terminal; directly transferring the encrypted first encryption key from the first integrated circuit card to the first mobile terminal, wherein the encrypted first encryption key and the encrypted data file are transmitted over separate communication channels; decrypting the encrypted first encryption key in the first mobile terminal using an encryption key corresponding to the second encryption key; and decrypting the encrypted data file in the first mobile terminal using the first encryption key.
  2. 2. The method of claim 1, further comprising wirelessly transferring the encrypted data file to the first mobile terminal.
  3. 3. The method of claim 1, wherein the first integrated circuit card includes a publisher identity stored thereon, and wherein downloading the encrypted data file includes: sending the publisher identity to the distribution terminal, and verifying the sent publisher identity as an authorized identity.
  4. 4. The method of claim 1, further comprising: transferring the data file from the first mobile terminal to a second mobile terminal.
  5. 5. The method of claim 1, further comprising: establishing a communication link between the first mobile terminal and a second mobile terminal; accessing, by the first mobile terminal, a second integrated circuit card in communication with the second mobile terminal; determining that the first and second integrated circuit cards each have a common publisher identity stored thereon; and forwarding, based on the determination of common publisher identity stored on the first and second integrated circuit cards, the data file from the first mobile terminal to the second mobile terminal.
  6. 6. The method of claim 1, wherein the first integrated circuit card includes consumption metering data stored thereon, and further comprising: updating the consumption metering data based on download of the data file to the first mobile terminal; updating the consumption metering data based on download of additional data files to the first mobile terminal; and upon the consumption metering data reaching a predetermined value, allowing no further data file downloads based on the consumption metering data reaching the predetermined value.
  7. 7. The method of claim 6, further comprising: updating the consumption metering data upon transfer of the data file or one of the additional data files to a second mobile terminal.
  8. 8. The method of claim 7, wherein the updating process permits downloading of further data files by the first mobile terminal from the distribution terminal.
  9. 9. The method of claim 1, wherein the second encryption key is one of the encryption keys of a public/private encryption key pair, and wherein the key corresponding to the second encryption key is the other of the encryption keys of the public/private encryption key pair.
  10. 10. The method of claim 9, wherein: the other of the encryption keys of the public/private encryption key pair is stored in a secure module in the first mobile terminal.
  11. 11. A system comprising: a first integrated circuit card; a first computer configured to store an encrypted first encryption key on the first integrated circuit card, the encrypted first encryption key including a first encryption key encrypted using a second encryption key; a distribution terminal configured to receive an encrypted data file, wherein the encrypted data file is data file encrypted using the first encryption key; and a first mobile terminal configured to communicate with the first integrated circuit card, download the encrypted data file from the distribution terminal, store the encrypted data file, directly receive the encrypted first encryption key from the first integrated circuit card, wherein the encrypted first encryption key and the encrypted data file are transmitted over separate communication channels, decrypt the encrypted first encryption key using an encryption key corresponding to the second encryption key, and decrypt the encrypted data file using the first encryption key.
  12. 12. The system of claim 11, wherein the first integrated circuit card includes a publisher identity stored thereon, and wherein the first mobile terminal is configured to send the publisher identity to the distribution terminal, and the distribution terminal is configured to verify the sent publisher identity as an authorized identity.
  13. 13. The system of claim 11, further comprising a second mobile terminal, and wherein the first mobile terminal is configured to transfer the data file to the second mobile terminal.
  14. 14. The system of claim 11, further comprising a second mobile terminal, and wherein the first mobile terminal is configured to: establish a communication link with the second mobile terminal, access a second integrated circuit card in communication with the second mobile terminal, determine that the first and second integrated circuit cards each store a common publisher identity, and forward, based on the determination that the first and second integrated circuit cards each store a common publisher identity, the data file to the second mobile terminal.
  15. 15. The system of claim 11, wherein the second encryption key is one of the encryption keys of a public/private encryption key pair, and wherein the key corresponding to the second encryption key is the other of the encryption keys of the public/private encryption key pair.
  16. 16. The system of claim 15, wherein: the other of the encryption keys of the public/private encryption key pair is stored in a secure module in the first mobile terminal.
  17. 17. A method comprising: establishing communication between an encryption source and a first mobile terminal; downloading an encrypted data file from a distribution source to the first mobile terminal and storing the encrypted data file on the first mobile terminal; directly receiving an encrypted first encryption key from the encryption source at the first mobile terminal, wherein the encrypted first encryption key and the encrypted data file are received into the first mobile terminal via separate communication channels; decrypting the encrypted first encryption key to obtain a first encryption key in the first mobile terminal using a second encryption key; and decrypting the encrypted data file to obtain a data file in the first mobile terminal using the first encryption key.
  18. 18. The method of claim 17, wherein downloading the encrypted data file comprises wirelessly receiving the encrypted data file.
  19. 19. The method of claim 17, wherein the encryption source includes a publisher identity stored thereon, and wherein downloading the encrypted data file includes: sending the publisher identity to the distribution source; and verifying the sent publisher identity as an authorized identity.
  20. 20. The method of claim 17, further comprising: transferring the data file from the first mobile terminal to a second mobile terminal.
  21. 21. The method of claim 17, further comprising: establishing a communication link between the first mobile terminal and a second mobile terminal; accessing, by the first mobile terminal, a second encryption source in communication with the second mobile terminal; determining that the first and second encryption sources each have a common publisher identity stored thereon; and forwarding, based on the determination of common publisher identity stored on the first and second encryption sources, the data file from the first mobile terminal to the second mobile terminal.
  22. 22. The method of claim 17, wherein the first encryption source includes consumption metering data stored thereon, and further comprising: updating the consumption metering data based on download of the data file to the first mobile terminal; updating the consumption metering data based on download of additional data files to the first mobile terminal; and upon the consumption metering data reaching a predetermined value, allowing no further data file downloads based on the consumption metering data reaching the predetermined value.
  23. 23. The method of claim 22, further comprising: updating the consumption metering data upon transfer of the data file or one of the additional data files to a second mobile terminal.
  24. 24. The method of claim 23, wherein the updating the consumption metering data upon transfer of the data file or one of the additional data files to the second mobile terminal permits downloading of further data files by the first mobile terminal from the distribution source.
  25. 25. The method of claim 17, wherein the second encryption key is one of the encryption keys of a public/private encryption key pair, and wherein the key corresponding to the second encryption key is the other of the encryption keys of the public/private encryption key pair.
  26. 26. The method of claim 17, further comprising: storing the encrypted first encryption key on a first integrated circuit card at a first computer.
  27. 27. The method of claim 17, further comprising: distributing the encrypted data file to a distribution terminal.
  28. 28. Apparatus comprising: a memory; and a processor configured to perform a method comprising: establishing communication between an encryption source and the apparatus; downloading an encrypted data file from a distribution source to the apparatus and storing the encrypted data file on the apparatus; directly receiving an encrypted first encryption key from the encryption source at the apparatus, wherein the encrypted first encryption key and the encrypted data file are received into the apparatus via separate communication channels; decrypting the encrypted first encryption key to obtain a first encryption key in the apparatus using a second encryption key; and decrypting the encrypted data file to obtain a data file in the apparatus using the first encryption key.
  29. 29. The apparatus of claim 28, wherein the data file comprises a multimedia file.
  30. 30. The apparatus of claim 28 wherein the apparatus comprises a wireless terminal for multimedia data.
  31. 31. The apparatus of claim 28, wherein the distribution source comprises a wireless kiosk.
  32. 32. The apparatus of claim 28, wherein said downloading to the apparatus the encrypted data file from the distribution source comprises wirelessly receiving the encrypted data file at the apparatus.
  33. 33. The apparatus of claim 28, wherein the encryption source includes a publisher identity stored thereon, and wherein the downloading an encrypted data file from the distribution source further includes: sending the publisher identity to the distribution source, to verify the sent publisher identity as an authorized identity.
  34. 34. The apparatus of claim 28, wherein the processor is further configured to perform: transferring the data file from the apparatus to a second apparatus.
  35. 35. The apparatus of claim 28, wherein the processor is further configured to perform: establishing a communication link between the apparatus and a second apparatus; accessing a second encryption source in communication with the second apparatus; determining that the first and second encryption sources each have a common publisher identity stored thereon; and based on the determination, forwarding the data file to the second apparatus.

Full Specification