Claims
- 1. A method for distributing information to a consumer through an electronic communications medium, the method comprising:
receiving a request for information-provision from the consumer; generating a user identifier to identify the consumer; transmitting the user identifier to the consumer's computer; downloading client-side software onto the consumer's computer; and upon receiving a subsequent request for information from the consumer, authenticating the user;
transmitting an encrypted description of the requested information to the consumer; and receiving requests from the client-side software running on the consumer's computer for one or more encrypted and compressed information objects described in the encrypted description; and securely transmitting the one or more encrypted and compressed information objects to the consumer's computer for secure writing to a physical, removeable information-storage medium.
- 2. The method of claim 1 wherein transmitting the user identifier to the consumer's computer further includes storing the user identifier in a cookie on the consumer's computer.
- 3. The method of claim 1 further including, following downloading client-side software onto the consumer's computer:
invoking an initialization routine by the user to initialize the client-side software; collecting, by the initialization routine, unique values stored within components of the consumer's computer, and cryptographically hashing those values to produce a machine identifier; and transmitting the machine identifier and the user identifier from the consumer's computer to the server.
- 4. The method of claim 3 further including:
receiving by the server the machine identifier and the user identifier; computing a verification value from the machine identifier and user identifier; and returning the verification value to the consumer's computer.
- 5. The method of claim 4 further including:
computing, by the initialization routine, a local verification value; comparing the local verification value, by the initialization routine, to the verification value returned to the initialization routine by the server; and detecting that an error condition has arisen if the local verification value is not equal to the verification value returned to the initialization routine by the server.
- 6. The method of claim 4 wherein authenticating the user upon receiving a subsequent request for information from the consumer further includes comparing a verification value and user idea transmitted to the server by client-side software running on the consumer's computer to a user identifier and verification value stored locally by the server.
- 7. The method of claim 1 wherein the encrypted description of the requested information transmitted to the consumer includes:
descriptions of the locations of encrypted and compressed information objects; and layout information that maps placement of information objects onto the physical, removable information-storage medium.
- 8. The method of claim 1 wherein securely transmitting the one or more encrypted and compressed information objects to the consumer's computer for secure writing to a physical, removable information-storage medium further includes:
receiving the one or more encrypted and compressed information objects by the client-side software running on the consumer's computer; generating, by the client-side software running on the consumer's computer, a local encryption key; for each received encrypted and compressed information object,
decompressing and decrypting the encrypted and compressed information object using a cryptographic key associated with the information object in the encrypted description of the requested information, re-encrypting the decompressed and decrypted information object and moving the re-encrypted information object into a memory-resident image; and piecewise decrypting information objects within the memory-resident image and storing the decrypted information objects onto the physical, removable information-storage medium.
- 9. The method of claim 1 wherein the physical, removable information-storage medium is one of:
a CD-R; a CD-RW; a writeable DVD; and a flash-memory within a secure electronic device.
- 10. The method of claim 1 wherein distributing information includes:
audio files; video files; computer software; text-based literature; multi-media files; and images.
- 11. A physical, removable information-storage medium containing information distributed by the method of claim 1.
- 12. Computer instructions encoded in a computer-readable medium for the client-side software of claim 1.
- 13. Computer instructions encoded in a computer-readable medium that carry out the method of claim 1.
- 14. An encrypted description of the requested information of claim 1 stored in a computer readable memory.
- 15. A consumer computer containing a client-side software program that:
requests compressed and encrypted information objects from a server; securely assembles compressed and encrypted information objects from the server into an encrypted memory-resident image; and piecewise decrypts and writes the information objects to a physical, removable information-storage medium.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims the benefit of Provisional Patent Application No. 60/352,475, filed Jan. 23, 2002, incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60352475 |
Jan 2002 |
US |