Microprocessor for executing enciphered programs
Message signal scrambling apparatus
Digital computer having code conversion apparatus for an encrypted program
Crypto microprocessor using block cipher
File access security method and means
Method and apparatus for marking the information content of an information carrying signal
Software distribution system
Computer security device
High security pay television system
Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media
ApplicationNo. 06/918109 filed on 10/14/1985
US Classes:705/53, Including third party for collecting or distributing payment (e.g., clearinghouse)707/9, Privileged access713/193By stored data protection
ExaminersPrimary: Buczinski, Stephen C.
Assistant: Wallace, Linda J.
Attorney, Agent or Firm
International ClassesG06F 1/00 (20060101)
G06F 21/00 (20060101)
G06Q 30/00 (20060101)
G06F 17/30 (20060101)
AbstractA "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databases are encrypted and stored on a non-volatile mass storage device (e.g., an optical disk). A tamper-proof decrypting device and associated controller decrypts selected portions of the stored database and measures the quantity of information which is decrypted. This measured quantity information is communicated to a remote centralized billing facility and used to charge the user a fee based on database usage. A system may include a "self-destruct" feature which disables system operation upon occurrence of a predetermined event unless the user implements an "antidote"--instructions for implementing the antidote being given to him by the database owner only if the user pays his bill. Absolute database security and billing based on database usage are thus provided in a system environment wherein all database access tasks are performed at the user's site. Moreover, a free market competitive environment is supported because literary property royalties can be calculated based on actual data use.