Systems and Methods for Secure Transaction Management and Electronic Rights Protection
First Claim
1. A system comprising:
- an electronic appliance, the electronic appliance comprising a first protected processing environment, the first protected processing environment being operable to encrypt data for transmission to a second protected processing environment associated with a peripheral device and to decrypt data received from the second protected processing environment; and
a peripheral device, the peripheral device comprising a second protected processing environment, the peripheral device being communicatively coupled to the electronic appliance, the second protected processing environment being operable to encrypt data for transmission to the first protected processing environment and to decrypt data received from the first protected processing environment, the second protected processing environment comprising memory comprising instructions that, when executed by the peripheral device, are operable to read control information specifying one or more permitted uses of data received from the first protected processing environment, and to enable the data received from the first protected processing environment to be used only in the manner specified by the control information.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
9 Claims
-
1. A system comprising:
-
an electronic appliance, the electronic appliance comprising a first protected processing environment, the first protected processing environment being operable to encrypt data for transmission to a second protected processing environment associated with a peripheral device and to decrypt data received from the second protected processing environment; and a peripheral device, the peripheral device comprising a second protected processing environment, the peripheral device being communicatively coupled to the electronic appliance, the second protected processing environment being operable to encrypt data for transmission to the first protected processing environment and to decrypt data received from the first protected processing environment, the second protected processing environment comprising memory comprising instructions that, when executed by the peripheral device, are operable to read control information specifying one or more permitted uses of data received from the first protected processing environment, and to enable the data received from the first protected processing environment to be used only in the manner specified by the control information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An electronic appliance comprising:
-
a first protected processing environment, the first protected processing environment including; a first processor and a first memory unit, the first memory unit including instructions that, when executed by the first processor, are operable to cause the first processor to; encrypt data for transmission to a second protected processing environment associated with a peripheral device, the peripheral device being communicatively coupled with the electronic appliance; decrypt data received from the second protected processing environment; and enforce control information specifying one or more permitted uses of data.
-
-
9. A virtual distribution environment (VDE) comprising:
-
a VDE-capable server, the VDE-capable server containing a protected processing environment configured to process VDE-protected content in response to requests from non-VDE-capable electronic appliances, the VDE-capable server being further configured to release VDE-protected content in unprotected form to said non-VDE-capable electronic appliances; and a plurality of non-VDE-capable electronic appliances communicatively connected to the VDE-capable server to form a network, the non-VDE-capable electronic appliances being capable of requesting VDE-protected content from the VDE-capable server and receiving the VDE protected content in unprotected form from the VDE-capable server.
-
Specification