Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method performed by an electronic appliance, the electronic comprising a protected processing environment and rights management programming stored on a computer readable medium, the rights management programming being operable, when executed by the electronic appliance, to govern use of electronic content by a user of the electronic appliance, the method comprising:
- enabling a user of the electronic appliance to use a piece of electronic content, the piece of electronic content having control information securely associated therewith, the control information specifying one or more consequences of use of the piece of electronic content;
monitoring usage of the piece of electronic content for occurrence of one or more predefined events; and
taking one or more actions upon detection of the one or more predefined events;
wherein the one or more predefined events and the one or more actions are specified, at least in part, in the control information, and wherein the rights management programming is operable, when executed by the electronic appliance, to cause the electronic appliance to perform said monitoring and taking steps, using, at least in part, the protected processing environment.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
99 Citations
67 Claims
-
1. A method performed by an electronic appliance, the electronic comprising a protected processing environment and rights management programming stored on a computer readable medium, the rights management programming being operable, when executed by the electronic appliance, to govern use of electronic content by a user of the electronic appliance, the method comprising:
-
enabling a user of the electronic appliance to use a piece of electronic content, the piece of electronic content having control information securely associated therewith, the control information specifying one or more consequences of use of the piece of electronic content;
monitoring usage of the piece of electronic content for occurrence of one or more predefined events; and
taking one or more actions upon detection of the one or more predefined events;
wherein the one or more predefined events and the one or more actions are specified, at least in part, in the control information, and wherein the rights management programming is operable, when executed by the electronic appliance, to cause the electronic appliance to perform said monitoring and taking steps, using, at least in part, the protected processing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for reporting information regarding usage of electronic content, the method comprising:
-
receiving a piece of electronic content at an electronic appliance, the piece of electronic content having control information associated therewith, the control information including one or more requirements for reporting usage information;
using tamper-resistant hardware and/or software running on the electronic appliance to securely enable a user of the electronic appliance to use the piece of electronic content in accordance with the control information;
securely storing usage information related to the use of the piece of electronic content in memory of the electronic appliance; and
sending the usage information to a remote site. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A method performed by an electronic appliance, the method comprising:
-
enabling a user of the electronic appliance to use an electronic object;
metering usage of the electronic object in terms of one or more atomic elements; and
securely storing, in memory of the electronic appliance, usage information derived from the metering step. - View Dependent Claims (55, 56, 57, 58)
-
-
59. A method comprising:
-
determining whether one or more events associated with a user'"'"'s use of electronic content at a first device meets a predefined condition, wherein the predefined condition is based at least in part on a unit of usage of the electronic content that has been defined to be significant by a creator and/or other provider of the electronic content;
performing additional processing if a determination is made that the one or more events meet the predefined condition, the additional processing relating to at least one of;
auditing, reporting, billing, end user usage analysis, and/or fraud detection. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67)
-
Specification