Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method for performing the following steps within a virtual distribution environment located at a first site, the first site being associated with a content distributor, the virtual distribution environment comprising one or more electronic appliances and a first secure container, the first secure container having associated a first control set and containing a second secure container having associated a second control set, the second secure container containing first protected information, the method comprising:
- at the first site, using a control from the second control set to govern an aspect of use of the first protected information while the first protected information is contained within the second secure container;
a user of content directly or indirectly initiating communication with the first site, including transmitting a third secure container to the first site, the third secure container having associated a third control set;
creating a fourth secure container having associated a fourth control set for governing an aspect of use of protected information contained within the fourth secure container;
copying or removing a first portion of the first protected information from the second secure container;
incorporating the first portion in the fourth secure container;
storing identification information at least in part identifying the first portion, the storing being governed at least in part by a control from the first control set;
transmitting the identification information to a second site, the transmission being governed at least in part by a control from the first control set; and
copying or transferring the fourth secure container from the first site to a third site located remotely from the first site, the third site being associated with the user.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
1061 Citations
8 Claims
-
1. A method for performing the following steps within a virtual distribution environment located at a first site, the first site being associated with a content distributor, the virtual distribution environment comprising one or more electronic appliances and a first secure container, the first secure container having associated a first control set and containing a second secure container having associated a second control set, the second secure container containing first protected information, the method comprising:
-
at the first site, using a control from the second control set to govern an aspect of use of the first protected information while the first protected information is contained within the second secure container;
a user of content directly or indirectly initiating communication with the first site, including transmitting a third secure container to the first site, the third secure container having associated a third control set;
creating a fourth secure container having associated a fourth control set for governing an aspect of use of protected information contained within the fourth secure container;
copying or removing a first portion of the first protected information from the second secure container;
incorporating the first portion in the fourth secure container;
storing identification information at least in part identifying the first portion, the storing being governed at least in part by a control from the first control set;
transmitting the identification information to a second site, the transmission being governed at least in part by a control from the first control set; and
copying or transferring the fourth secure container from the first site to a third site located remotely from the first site, the third site being associated with the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification