Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method of controlling access to, or other use of, electronic content, the method comprising:
- associating first control information with electronic content; and
transferring the first control information to a first electronic appliance, wherein the first control information is configured to enable the first electronic appliance to transmit second control information to at least a second electronic appliance, the second control information configured to enable the second electronic appliance to access or otherwise use the electronic content but not to enable the second electronic appliance to transmit control information to enable another electronic appliance to access or otherwise use the electronic content.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
25 Claims
-
1. A method of controlling access to, or other use of, electronic content, the method comprising:
-
associating first control information with electronic content; and transferring the first control information to a first electronic appliance, wherein the first control information is configured to enable the first electronic appliance to transmit second control information to at least a second electronic appliance, the second control information configured to enable the second electronic appliance to access or otherwise use the electronic content but not to enable the second electronic appliance to transmit control information to enable another electronic appliance to access or otherwise use the electronic content. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of controlling access to, or other use, of electronic content, the method comprising:
-
receiving a piece of electronic content at a first electronic appliance; receiving, separately from the piece of electronic content, first control information at the first electronic appliance, the first control information permitting creation of second control information for transmission to a second electronic appliance; transmitting the second control information to the second electronic appliance, the second control information enabling the piece of electronic content to be accessed or otherwise used on the second electronic appliance, the second control information not enabling control information to be sent from the second electronic appliance to a third electronic appliance to enable the piece of electronic content to be accessed or otherwise used on the third electronic appliance; wherein the first electronic appliance comprises hardware and/or software for resisting attempts by users of the first electronic appliance to tamper with the creation of the second control information. - View Dependent Claims (7, 8, 9)
-
-
10. A method of securely packaging electronic content using a secure application program running on an electronic appliance, the secure application program being resistant to tampering by users of the electronic appliance, the method comprising:
-
enabling a user to select a first piece of electronic content; and transferring the first piece of electronic content into a secure electronic container, the secure electronic container comprising control information for governing contents of the secure electronic container, wherein the control information comprises one or more permissions specifying one or more permitted and/or prohibited uses of contents of the secure electronic container, and wherein subsequent use of the first piece of electronic content is governed by said one or more permissions. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method comprising:
-
distributing a first electronic budget to a user, the first electronic budget being configured for use in governing usage of one or more electronic objects of a first type, the first electronic budget specifying a time-based limitation on usage of electronic objects of the first type; and distributing a second electronic budget to the user, the second electronic budget being configured for use in governing access to or other usage of one or more electronic objects of a second type. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An integrated circuit comprising:
-
a microprocessor; a clock; a random number generator; an encryption/decryption engine; non-volatile memory, the non-volatile memory comprising; one or more load modules; an operating system comprising a memory management unit and a virtual memory manager; one or more cryptographic keys; volatile memory; and a tamper-resistant barrier enclosing the foregoing. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification