Systems and methods for secure transaction management and electronic rights protection
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the “electronic highway.”
206 Citations
38 Claims
-
1-18. -18. (canceled)
-
19. A method performed by an electronic appliance, the electronic appliance comprising a clock, the method including:
-
contacting a trusted server;
obtaining a trusted time value from the trusted server;
determining whether a time value on the clock is within a predefined range of the trusted time value; and
at least temporarily disabling certain functionality if the time value on the clock is not within the predefined range of the trusted time value. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system including:
-
a central processing unit;
memory and a clock, the memory and the clock being associated with the central processing unit;
a communications port capable of transmitting communications between the central processing unit and a remote site; and
a protected processing environment, the protected processing environment being operable to;
control access to protected digital content in accordance with rules obtained from the remote site, obtain a trusted time value from a trusted server, determine whether a time value on the clock is within a predefined range of the trusted time value, and at least temporarily disable certain functionality if the time value on the clock is not within the predefined range of the trusted time value. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification