Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method comprising:
- sending, via an electronic network, a request for a piece of electronic content to a remote site;
receiving, via the electronic network, first information regarding a first location at which a first portion of the piece of electronic content is located and second information regarding a second location at which a second portion of the piece of electronic content is located;
obtaining, via the electronic network, the first portion from the first location in a first secure electronic container;
obtaining the second portion from the second location in a second secure electronic container; and
using the piece of electronic content in accordance with control information associated therewith.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
16 Claims
-
1. A method comprising:
-
sending, via an electronic network, a request for a piece of electronic content to a remote site; receiving, via the electronic network, first information regarding a first location at which a first portion of the piece of electronic content is located and second information regarding a second location at which a second portion of the piece of electronic content is located; obtaining, via the electronic network, the first portion from the first location in a first secure electronic container; obtaining the second portion from the second location in a second secure electronic container; and using the piece of electronic content in accordance with control information associated therewith. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method performed by an electronic appliance, the method comprising:
-
receiving a secure electronic container comprising one or more content objects; separately receiving first electronic control information configured for use in governing access to or other use of the one or more content objects, the first electronic control information comprising second control information specified by a first entity, and third control information specified by a second entity; and using tamper-resistant hardware and/or software to make use of at least one of the one or more content objects in accordance with the first electronic control information wherein the tamper-resistant hardware and/or software is resistant to tampering by a user of the electronic appliance. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method performed by a first electronic appliance, the method comprising:
-
receiving first electronic control information configured for use in governing access to or other use of an electronic content object; determining that the first electronic control information permits modifications to the first electronic control information to be made; modifying the first electronic control information to yield second electronic control information; and sending the second electronic control information to a second electronic appliance, the second electronic appliance comprising tamper-resistant hardware and/or software for enabling use of the electronic content object in accordance with electronic control information, the tamper-resistant hardware and/or software being resistant to tampering by users of the second electronic appliance. - View Dependent Claims (12, 13, 14, 15)
-
-
16-25. -25. (canceled)
Specification