System and methods for secure transaction management and electronics rights protection
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
176 Claims
-
1-90. -90. (canceled)
-
91. A method comprising:
-
creating an electronic document at a first user'"'"'s electronic appliance;
at the first user'"'"'s electronic appliance, securely associating control information with the electronic document, the control information indicating that the electronic document may be used only by one or more designated users and only in one or more authorized ways, the control information being configured to be enforced by tamper-resistant software and/or hardware to govern use of the electronic document;
distributing the electronic document and the control information to a second user'"'"'s electronic appliance;
determining that the second user is one of said one or more designated users; and
at the second user'"'"'s electronic appliance, securely enabling the second user to make at least one use of the electronic document in accordance with the control information, in which software and/or hardware at the second user'"'"'s electronic appliance is operable to perform, at least in part, said securely enabling step, said software and/or hardware at the second user'"'"'s electronic appliance being resistant to tampering by the second user with the performance of said securely enabling step. - View Dependent Claims (92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107)
-
-
108. A method comprising:
-
receiving an electronic document at a first user'"'"'s electronic appliance, the electronic document having been sent from a second user'"'"'s electronic appliance;
receiving, at the first user'"'"'s electronic appliance, control information associated with the electronic document, the control information indicating that the electronic document may be used only in one or more authorized ways; and
using a software application running on the first user'"'"'s electronic appliance to enable the first user to make at least one use of the electronic document in accordance with the control information, wherein the software application is configured to be resistant to attempts by users of the first electronic appliance to use the electronic document in unauthorized ways. - View Dependent Claims (109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135)
-
-
136. A method performed at a first user'"'"'s electronic appliance, the method comprising:
-
creating an electronic document;
associating first control information with the electronic document, the first control information indicating that the electronic document may be used only in one or more authorized ways, the first control information being configured to be enforced by tamper-resistant software and/or hardware to govern use of the electronic document, and the electronic document being configured to be resistant to attempts to access or otherwise use its contents unless permitted by said tamper-resistant software and/or hardware; and
distributing the electronic document and the first control information to a second user'"'"'s electronic appliance. - View Dependent Claims (137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152)
-
-
153. A computer-readable medium containing a software application comprising executable program instructions, the executable program instructions including instructions for:
-
receiving an electronic document and first control information associated with the electronic document, the first control information indicating that the electronic document may be used only in one or more authorized ways;
separately receiving second control information associated with the electronic document; and
applying the first control information and the second control information to enable at least one use of the electronic document in accordance with the first control information and the second control information;
wherein the software application is configured to be resistant to attempts to use the electronic document in unauthorized ways. - View Dependent Claims (154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172)
-
-
173. A method comprising:
-
creating an electronic document at a first user'"'"'s electronic appliance;
at the first user'"'"'s electronic appliance, securely associating control information with the electronic document, the control information indicating that the electronic document may be used only in one or more authorized ways, the control information being configured to be enforced by tamper-resistant software and/or hardware to govern use of the electronic document;
distributing the electronic document and the control information to a second user'"'"'s electronic appliance; and
at the second user'"'"'s electronic appliance, securely enabling the second user to make at least one use of the electronic document in accordance with the control information, in which software and/or hardware at the second user'"'"'s electronic appliance is operable to perform, at least in part, said securely enabling step, said software and/or hardware at the second user'"'"'s electronic appliance being resistant to tampering by the second user with the performance of said securely enabling step. - View Dependent Claims (174, 175, 176)
-
Specification