Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Z-ARCHIVE-Cryptocurrency

Search All Applications in Z-ARCHIVE-Cryptocurrency


Patent US10805084


Issued 2020-10-13

Decentralized System For Secure Access Of Digital Content

Disclosed are examples of decentralized systems and related apparatus, devices, computer program products, and methods for secure access of digital content. In some implementations, a first request from a client to access encrypted digital content includes a call on a digital contract. The call passes an ephemeral key set encrypted with a public key of a consumer. A transaction identifying the first request in association with the encrypted ephemeral key set is recorded in the digital contract. The transaction is identified by a transaction identifier (ID), which is sent to the client. A second request from the client includes: an authorization token including the transaction ID, and a signature of the consumer. Authorization of the consumer is verified based on the authorization token. A transaction identifying one or more keys is recorded in the digital contract. The digital content can be re-encrypted and sent to the client.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A decentralized system for secure access of digital content in an overlay network, the system comprising: a memory device; and one or more processors in communication with the memory device, the one or more processors configured to: obtain, from a client, a first request to access encrypted digital content, the first request comprising a call on a digital contract, the call passing an ephemeral key set encrypted with a public key of a consumer associated with the client, record, in the digital contract, a transaction identifying the first request in association with the encrypted ephemeral key set, the transaction being identified by a transaction identifier (ID), send, to the client, the transaction ID, obtain, from the client, a second request comprising: an authorization token comprising the transaction ID and a signature of the consumer, verify, based on the authorization token, authorization of the consumer, record, in the digital contract, a transaction identifying one or more key management service (KMS) keys, the one or more KMS keys comprising: a proxy re-encryption key generated using a public/private key pair, and an encrypted version of a content key of the ephemeral key set, the encrypted version of the content key encrypted with a public key of the consumer, re-encrypt, using the proxy re-encryption key, the digital content from a first key space to a second key space, the first key space being an original key space, and the second key space being an ephemeral key space, and send, to the client, the re-encrypted digital content.

  • 6. A non-transitory computer-readable medium storing program code to be executed by one or more processors, the program code comprising instructions configured to cause: obtaining, from a client, a first request to access encrypted digital content, the first request comprising a call on a digital contract, the call passing an ephemeral key set encrypted with a public key of a consumer associated with the client; recording, in the digital contract, a transaction identifying the first request in association with the encrypted ephemeral key set, the transaction being identified by a transaction identifier (ID); sending, to the client, the transaction ID; obtaining, from the client, a second request comprising: an authorization token comprising the transaction ID and a signature of the consumer; verifying, based on the authorization token, authorization of the consumer; recording, in the digital contract, a transaction identifying one or more KMS keys, the one or more KMS keys comprising: a proxy re-encryption key generated using a public/private key pair, and an encrypted version of a content key of the ephemeral key set, the encrypted version of the content key encrypted with a public key of the consumer; re-encrypting, using the proxy re-encryption key, the digital content from a first key space to a second key space, the first key space being an original key space, and the second key space being an ephemeral key space; and sending, to the client, the re-encrypted digital content.

  • 11. A method comprising: obtaining, from a client, a first request to access encrypted digital content, the first request comprising a call on a digital contract, the call passing an ephemeral key set encrypted with a public key of a consumer associated with the client; recording, in the digital contract, a transaction identifying the first request in association with the encrypted ephemeral key set, the transaction being identified by a transaction identifier (ID); sending, to the client, the transaction ID; obtaining, from the client, a second request comprising: an authorization token comprising the transaction ID and a signature of the consumer; verifying, based on the authorization token, authorization of the consumer; recording, in the digital contract, a transaction identifying one or more KMS keys, the one or more KMS keys comprising: a proxy re-encryption key generated using a public/private key pair, and an encrypted version of a content key of the ephemeral key set, the encrypted version of the content key encrypted with a public key of the consumer; re-encrypting, using the proxy re-encryption key, the digital content from a first key space to a second key space, the first key space being an original key space, and the second key space being an ephemeral key space; and sending, to the client, the re-encrypted digital content.