Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A secure component-based operating process including:
- (a) retrieving at least one component;
(b) retrieving a record that specifies a component assembly;
(c) checking said component and/or said record for validity;
(d) using said component to form said component assembly in accordance with said record; and
(e) performing a process based at least in part on said component assembly.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
15 Claims
-
1. A secure component-based operating process including:
-
(a) retrieving at least one component; (b) retrieving a record that specifies a component assembly; (c) checking said component and/or said record for validity; (d) using said component to form said component assembly in accordance with said record; and (e) performing a process based at least in part on said component assembly. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A secure component operating system process including:
-
receiving a component; receiving directions specifying use of said component to form a component assembly; authenticating said received component and/or said directions; forming, using said component, said component assembly based at least in part on said received directions; and using said component assembly to perform at least one operation.
-
-
14. A method comprising performing the following steps within a secure operating system environment:
-
providing code; providing directions specifying assembly of said code into an executable program; checking said received code and/or said assembly directors for validity; and in response to occurrence of an event, assembling said code in accordance with said received assembly directions to form an assembly for execution.
-
-
15-90. -90. (canceled)
Specification