Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A computer-readable medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
- using a first electronic budget to govern a first type of use of a piece of electronic content; and
using a second electronic budget to govern a second type of use of the piece of electronic content;
wherein the program code is resistant to tampering by a user of the electronic appliance.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
20 Claims
-
1. A computer-readable medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
-
using a first electronic budget to govern a first type of use of a piece of electronic content; and using a second electronic budget to govern a second type of use of the piece of electronic content; wherein the program code is resistant to tampering by a user of the electronic appliance. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
accessing a first record containing information directly or indirectly identifying components of a first component assembly, at least one of the components comprising a first load module including programming; checking a digital signature of the first record; securely assembling the components of the first component assembly to form at least a portion of the first component assembly; and executing at least some of the programming. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving a first electronic container, the first electronic container comprising an encrypted first content object, the first electronic container further comprising first control information specifying one or more permissions relating to access to or other use of the first content object, the first control information further comprising an encrypted first key for use in decrypting the first content object; using tamper-resistant software to decrypt the first key, use the first key to decrypt the first content object, and govern access to or other use of the first content object in accordance with the one or more permissions specified by the first control information; receiving a second electronic container, the second electronic container comprising an encrypted second content object or a reference thereto; receiving, separately from the second electronic container, second control information specifying one or more permissions relating to access to or other use of the second content object, the second control information further comprising an encrypted second key for use in decrypting the second content object; and using the tamper-resistant software to decrypt the second key, use the second key to decrypt the second content object, and govern access to or other use of the second content object in accordance with the one or more permissions specified by the second control information. - View Dependent Claims (14)
-
-
15. A method comprising:
-
receiving a request for usage information at a first electronic appliance, the first electronic appliance comprising a protected processing environment for governing access to or other use of electronic content; validating that the request is from a trusted source; retrieving usage information related to access to or other use of one or more pieces of electronic content by the electronic appliance; and sending the usage information to a second electronic appliance, the second electronic appliance being located remotely from the first electronic appliance. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification