The invention relates generally to electronic document publishing and in particular to a system and method of trusted publishing.
A content publisher may be any entity that produces content of any sort, including document files, images, songs, movies, sounds, or other media files, streaming content, applications, services, plug-ins or any other type of data or program that can be presented to and used by the consumer in any fashion. In this specification, the terms “content” and “product” are used to refer to any of these types of content.
Spam and viruses spread at an alarming rate, and there is no technical mechanism to guarantee that legitimate business can communicate with willing customers while still protecting users from the glut of spam Consumers have no guaranteed means by which to ensure that any arbitrary content they view comes from a trusted source, nor to limit or control content viewed on their system based on the publisher. Nor can consumers strictly control the type of content that can be opened on their computer. Further, consumers have and no way of dealing with publishers who spam or send offensive content.
Governments and institutions have no means by which to track and therefore enforce laws or restrictions on content publishers.
Content publishers have no guaranteed means to prevent illicit companies from spoofing their branding in arbitrary document or media types. Further, content publishers have no way to protect their arbitrary content after it has been released, with no mechanism to prevent viral spreading of that content, and no way to benefit from that content once it has reached the public domain.
Also, content publishers have no way to control or limit consumer usage of their content, especially where it concerns content that is passive—with no inherent executing code to implement copy protection mechanisms. Moreover, disparate purchasing mechanisms limit the ability of content publishers to charge for their content, and make it difficult for users to purchase goods from various sources.
The cost of implementing purchasing infrastructures often prevents content publishers from adopting purchasing technologies. Further, content publishers have no convenient means of communicating with consumers of their content, and therefore no mechanism to provide offers for new content or upgrades of existing content.
In accordance with an embodiment of the present invention, there is provided a trusted publishing system for publishing trusted content. The system comprises a publisher trust envelope module for converting content into a trusted document, and a consumer trust envelope module for validating the trusted document.
In accordance with another embodiment of the present invention, there is provided a method of publishing trusted content. The method comprises the steps of generating a trust envelope for content, placing an encrypted hash of the content in the trust envelope, placing the content in the trust envelope, and placing a publisher identifier in the trust envelope.
In accordance with another embodiment of the present invention, there is provided a method of viewing trusted content. The method comprises the steps of receiving a trust envelope, determining a publisher decryption key to decrypt the encrypted hash of the content into a decrypted hash, performing a local hash of the content and comparing the local hash with the decrypted hash, and allowing a viewer to view the content if the local hash and the decrypted hash match The trust envelope includes content, an encrypted hash of the content, and a publisher identifier.
A system and method of the present patent disclosure will now be described with reference to various examples of how the embodiments can best be made and used. For convenience, like reference numerals are used throughout the description and several views of the drawings to indicate like or corresponding parts, wherein the various elements are not necessarily drawn to scale.
Trusted Publishing
A publisher is any entity that produces content using any means. A consumer is any entity that uses this content in any way. They may or may not be the same entity.
The trusted publisher module includes content 20 such as a document, a publisher encryption key 18, and the publisher trust envelope module 12. The consumer module 24 may view the document or content 20, and includes a publisher decryption key 28 (preferably, the consumer module 24 will have a list of publisher decryption keys, each tagged using the publisher identifier) and the consumer trust envelope module 14. The trust authority module 26 includes a publisher database 16 which holds data representing encryption and decryption keys, identifiers, relationship data, etc.
Publishing Trusted Content
When publishing content, i.e., an application or any other form of content, the publisher may create content of any sort, using any tool applicable to generate that content. This includes such content as: document files (*.doc, *.xls, *.pdf, etc); xml files; media files such as movies (*.mpg, *.wmv, *.qt, etc), songs (*.mp3, etc), images (*.jpg, *.png, *.gif, etc), sounds (*.wav, etc) and other media types; streaming content; web sites; applications (*.exe, *.scr, etc); services; email message (MIME, HTML, Rich Text, Plain Text, or any other email format); or any other type of content that can be manipulated in any fashion on a computer. Content also includes any compound formats—which can include one or more instances of one or more of the content types described above. The publisher also uses the publisher trust envelope module 12 to generate a trust envelope around the content. Among other things, this trust envelope comprises a hash of the content and a publisher identifier (see the Trust Envelope section below). The hash is encrypted using a publisher encryption key—a private encryption key unique to that publisher, and industry standard encryption technology. A Trusted Publisher may apply for more than one Publisher Encryption Key, and each would have its own unique identifier. Other parts of the trust envelope and/or content may also be encrypted. Once the trust envelope is generated around the content, the content is considered to be trusted content.
Consuming Trusted Content
Preferably, if the hashes do not match (i.e., the signature is invalid (46)), the consumer trust envelope module 12 refuses to open the content (49), thus protecting the consumer and publisher from illicit content. Alternatively, the consumer trust envelope module 12 may perform other applicable tasks such as invalidating the document.
Publisher Trust Envelope Module 12
The publisher trust envelope module 12:
The consumer trust envelope module 14:
The trust envelope comprises the following:
A trusted publisher module 22 may be implemented as application on a publisher's server that generates trusted content using the systems described herein.
Trust Authority Module 26
Preferably, the trusted publishing system 10 includes a trust authority module 26, which is an entity that used supporting systems to provide:
Preferably, the relationship between the consumer and the publisher is managed by a trust authority entity and supported by modules 26 used by the consumer and publisher. The trust authority module 26 may provide any of the process functions described below. A trust authority entity may or may not also be a consumer and/or publisher of trusted content. Preferably, the trust authority functionality is implemented in the trust authority module 26. Such functionality can include any of the following processes, which may also impact Trusted Publisher 22 and Consumer 24 modules and processes.
Content Claims, Screening, and Content Violation Reporting
Preferably, the trust envelope has tags that indicate the type of information presented in the content. The following process illustrates an example of a Trusted Publisher's Content claim, which is the publisher's assertion that the content fits one of the categories provided.
The following process in an example of an indication of how the end user can use the content claim and the publisher identifier to implement filtering of any type of content protected by the Trusted Publishing system.
Content claim violations occur when a Trusted Publisher fails to accurately specify the type of content found within the trusted content. Exact rules describing the meaning of each type of content can be made available by the trust authority (entity or module 26) so consumers can determine if the content indeed breaks the trusted content rules. Preferably, these rules are not static, and are made freely and conveniently available by the trust authority to both consumers and trusted publishers.
Preferably, the Consumer Trust Envelope Module 12 includes a mechanism by which the consumer can report a potential content claim violation, and track that violation afterwards. The Trust Authority can then investigate the claim, and deal with the Trusted Publisher, or the authorities, as appropriate, as per the severity of the claim The Trust Authority might also revoke the publishing rights for that Trusted Publisher, at it's sole discretion
Preferably, the Trust Authority would be responsible for distributing Publisher Decryption Key revocation notifications to the Trusted Publisher and all Consumers. Preferably, this is handled automatically by the Trust Authority module 26 and the Consumer Trust Envelope Module 12.
Purchasing Extensions
Preferably, the Consumer Trust Envelope Module 12 provides a single purchasing mechanism for the consumer for all types of content that can be protected by the trust envelope.
Preferably, the purchase is managed by the Trust Authority and order fulfillment is negotiated with the Trusted Publishers systems or by systems provided by the Trust Authority as applicable, in an automated fashion in the trust authority module 26.
Preferably, the consumer would only have to enter their purchasing credentials once to the Trust Authority module 26, and could make all future purchases through the Trusted Publishing system 10 without re-entering their purchasing details.
Usage Rights Management
Preferably, mechanism would be made available in the Trusted Publisher system 10 which would allow Trusted Publishers to define usage rights for any content 20 they publish
Usage rights may include (among other concepts): time-limited use (for instance, one month trials, etc); use-count limitations (for instance, ten uses of the content, etc.); subscription restrictions (similar to time or use-count rights, but connected to the Purchasing Extensions for subscription renewals and other options, etc.); and may or may not be specifically limited to a single user or single group of users; etc.
Preferably, the Publisher Trust Envelope Module 12 allows the Trust Publisher to encrypt the usage rights into the trust envelope, and the Consumer Trust Envelope Module 12 implements all required features to restrict usage according to those rules. The Consumer Trust Envelope Module 12 may also communicate with the Trust Authority when managing the rights management, for instance, for upgrading or renewing subscriptions. Preferably, the Trust Authority would negotiate such transactions with the Trusted Publisher in an automated fashion, similar to the mechanisms defined in the Purchasing Extensions section.
Consumer Identity
Preferably, the Consumer Trust Envelope Module 12 uniquely identifies each consumer, based on a user-ID and password system, or some other trusted secure mechanism
With this system 10, all user-specific information (such as preferences, subscriptions, purchasing information, etc), may be stored and managed by the Trust Authority, and may also potentially be stored in a secure local cache on the consumer's machine.
Preferably, The Trust Authority or Consumer Trust Envelope (through it's secured local cache) could then manage and verify all subscription, usage restrictions, purchasing extensions (for instance, credit card information and mailing address), and any other related Trust Relationship features or any other user-related features.
Content Updates
Preferably, the Trusted Publisher system 10 provides mechanisms for the Trusted Publishers to automatically, or through subscription system (see Purchasing Extensions and Usage Rights Management), or through manual interaction, cause updates of the content to be delivered to the consumer. This could include such things as: application or driver updates; documentation updates; news updates; media updates; or updates of any other type of content as defined above.
The consumer would have complete control over the acceptance and application of updates, and could screen them using the techniques described in the Content claims, Screening, and Content Violation section.
Communications
Preferably, the Trusted Publisher system 10 provides mechanisms for the Trusted Publishers to communicated directly or indirectly with their Consumers, while allowing the Consumers to have strict control over the timeliness and screening of such communications using the system described in the Content claims, Screening and Content Violation section above.
This mechanism could allow the Trusted Publisher to send arbitrary, trusted content to any of their consumers using the Publisher Trust Envelope and the Consumer Trust Envelope. This provides a direct communication channel between the Consumer and the Trusted Publisher for such things as: technical support; new content offers; content upgrade offers; marketing or related materials; news; forum materials; etc. The consumer has strict control over the content that could be delivered via this mechanism, and could completely disable this communication system altogether, or only for specific Trusted Publishers.
Trusted Publishing Example: Email
The following example illustrates the trusted publishing (30) and view of trusted content (40) workflows described above, using email as the communication medium. This is an example of trusted publishing, and is not meant as the sole representation of the technology, nor as a suggestion of any limitations for implementation.
The trusted publishing system and methods according to the present invention may be implemented by any hardware, software or a combination of hardware and software having the above described functions. The software code, either in its entirety or a part thereof, may be stored in a computer readable memory. Further, a computer data signal representing the software code which may be embedded in a carrier wave may be transmitted via a communication network. Such a computer readable memory and a computer data signal are also within the scope of the present invention, as well as the hardware, software and the combination thereof.
While particular embodiments of the present invention have been shown and described, changes and modifications may be made to such embodiments without departing from the true scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
2460467 | Mar 2004 | CA | national |