Systems and methods for secure transaction management and electronic rights protection
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
149 Citations
194 Claims
-
1-166. -166. (canceled)
-
167. A method by which two entities, a first entity seeking rights to information and a second entity owning rights to the information, electronically bargain toward an agreement concerning the information, the method comprising:
-
generating a first control set representing initial terms offered by the first entity in exchange for obtaining rights to the information;
generating a second control set representing initial terms that the second entity is willing to accept in exchange for granting -rights to the information, wherein the second entity rejects at least one of the initial terms of the first control set and proposes at least one alternative term to the first entity;
generating a third control set of agreed upon terms; and
granting rights to the information to the first entity in accordance with the terms of the third control set. - View Dependent Claims (168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180)
-
-
181. A method for securely performing an electronic transaction involving the transfer of rights to information, the method comprising:
-
accessing a first control set that a first party desires to govern the transaction, the first control set including at least a first term relating to the scope of rights sought by the first party;
accessing a second control set that a second party desires to govern the transaction, the second control set including at least a first term relating to the scope of rights the second party is willing to give;
comparing one or more terms of the first control set with one or more terms of the second control set as part of a bargaining process through which terms and conditions acceptable to each party are identified;
wherein, during the bargaining process, the first party or the second party proposes one or more alternative terms; and
creating a third control set that is acceptable to each party, the third control set including at least one of the one or more alternative terms, the third control set being operable to govern at least one aspect of the first party'"'"'s access to, or other use of, the information;
- View Dependent Claims (182, 183, 184, 185, 186, 187, 188, 189, 190)
-
-
191. A computer-readable medium containing executable program instructions, the executable program instructions being operable, when executed by a computer system, to cause the computer system to perform operations comprising:
-
generating a first control set representing initial terms offered by a first entity to a second entity in exchange for obtaining rights to information under control of the second entity;
obtaining a second control set from the second entity, the second control set reflecting the second entity'"'"'s rejection of at least one of the initial terms of the first control set and proposing at least one alternative term;
generating a third control set of agreed upon terms, the third control set including said at least one alternative term;
sending the third control set to the second entity;
obtaining the information from the second entity;
and accessing the information in accordance with the third control set. - View Dependent Claims (192, 193, 194)
-
Specification