Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method for automated negotiation, including the following steps:
- creating a first rule set at a first site, the first rule set designed to participate in an automatic negotiation with a second rule set;
transmitting the first rule set from the first site to a second site, at the second site, performing an automated negotiating process including;
comparing information present in or specified by the first rule set to a first requirement specified by a second rule set present at the second site;
if the comparison results in a first outcome, carrying out a first action, the first action including;
creating a secure container consisting of protected content and having an associated third rule set, the third rule set being created as a result of an interaction between the first rule set and the second rule set;
transmitting the secure container from the second site to the first site; and
using a rule from the third rule set to govern an aspect of access to or use of the protected content; and
if the comparison results in a second outcome, carrying a second action, which is different in at least one respect from the first action.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
30 Claims
-
1. A method for automated negotiation, including the following steps:
- creating a first rule set at a first site, the first rule set designed to participate in an automatic negotiation with a second rule set;
transmitting the first rule set from the first site to a second site, at the second site, performing an automated negotiating process including;
comparing information present in or specified by the first rule set to a first requirement specified by a second rule set present at the second site;
if the comparison results in a first outcome, carrying out a first action, the first action including;
creating a secure container consisting of protected content and having an associated third rule set, the third rule set being created as a result of an interaction between the first rule set and the second rule set;
transmitting the secure container from the second site to the first site; and
using a rule from the third rule set to govern an aspect of access to or use of the protected content; and
if the comparison results in a second outcome, carrying a second action, which is different in at least one respect from the first action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
comparing first information present in or specified by the first rule set to the first requirement;
determining that the first information does not match the first requirement;
comparing second information present in or specified by the first rule set to a second requirement specified by the second rule set; and
determining that the second information matches the second requirement.
- creating a first rule set at a first site, the first rule set designed to participate in an automatic negotiation with a second rule set;
-
5. The method of claim 4, in which:
-
the first requirement includes a requirement that a first payment method be used;
the second requirement includes a requirement that a second payment method be used;
the first information identifies a payment method other than the first payment method; and
the second information identifies the second payment method.
-
-
6. The method of claim 4, in which:
-
the first requirement includes a requirement that first specified identification information be provided, and further specifies a first price; and
the second requirement specifies a second price which is higher than the first price, but requires provision of less identification information than the first specified identification information.
-
-
7. The method of claim 4, in which the first action includes associating a digital signature with the contents of the secure container.
-
8. The method of claim 1, in which the step of creating a first rule set is performed at least in part in a secure environment present at the first site.
-
9. The method of claim 8, in which the automated negotiating step is performed at least in part in a secure environment present at the second site.
-
10. A method for automated negotiation, including the following steps:
-
creating a first rule set at a first site;
creating a second rule set at a second site;
transmitting the first rule set from the first site to a third site;
transmitting the second rule set to the third site;
at the third site, performing the following steps;
comparing a requirement specified by the first rule set to a requirement specified by the second rule set and determining that the requirements are consistent;
based at least in part on the results of the comparison, creating a third rule set, the third rule set including at least one rule specified at least in part by the first rule set and the second rule set;
associating the third rule set with a secure container;
encapsulating protected content into the secure container; and
transmitting the secure container to the first site. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
prior to the steps of transmitting the first rule set and the second rule set to the third site, a communication between the first party and the second party, the communication resulting in agreement to use the neutral negotiator for the negotiation.
-
-
13. The method of claim 12, in which the first rule set includes a request to gain access to content owned or controlled by the second party.
-
14. The method of claim 13, in which the first rule set includes a specification of a first price the first party is willing to or desires to pay for the content access.
-
15. The method of claim 14, in which the second rule set includes a specification of a second price the second party requires or desires in order to grant access to the content.
-
16. The method of claim 15, in which the comparing step includes comparing the first price to the second price and determining whether the first price is equal to or exceeds the second price.
-
17. The method of claim 16, in which the first rule set includes a specification of a first payment method the first party is willing to use to pay for the content access.
-
18. The method of claim 17, in which the second rule set includes a specification of a second payment method the second party is willing to accept for payment for the content access.
-
19. The method of claim 18, in which the comparing step includes comparing the first payment method to the second payment method to determine whether they are consistent.
-
20. The method of claim 19, in which the first rule set includes a specification of first information the first party is willing to or desires to disclose in return for gaining access to the content.
-
21. The method of claim 20, in which the second rule set includes a specification of second information the second party desires or requires in return for providing access to the content.
-
22. The method of claim 21, in which the comparing step includes comparing the first information specification to the second information specification to determine whether they are consistent.
-
23. The method of claim 22, in which the second rule set also specifies a third price, which is lower than the second price, and further specifies that the third price may be used if the first party agrees to provide the second information, but that the second price must be used if the first party refuses to provide the second information, and
the comparing step includes determining whether the first party is willing to provide the second information and, if the first party is willing to provide the second information, using the third price instead of the second price in the step of comparing price information.
-
24. A method for automated negotiation including the following steps:
-
generating a first rule set including a first rule from a first party which owns or at least in part controls governed content and a second rule from a second party which constitutes or includes a clearinghouse;
incorporating the governed content into a secure container;
storing the first rule set at a first site;
transmitting a second rule set from a second site to the first site, the second rule set including a third rule from a third party;
comparing at least a portion of the first rule set to at least a portion of the second rule set; and
based on the results of the comparison, providing access to the secure container to the third party. - View Dependent Claims (25, 26, 27, 28)
as a result of the comparison step, transmitting the secure container containing the governed content to the second site.
-
-
27. The method of claim 26, further including:
as a result of the comparison step, generating digital information specifying at least some of the terms agreed to in the negotiation.
-
28. The method of claim 27, further including:
associating a digital signature with the digital information.
-
29. A method of automated negotiation including:
-
creating a first rule set representing a negotiating position of a first party;
incorporating the first rule set into a first secure container;
creating a second rule set representing a negotiating position of a second party;
incorporating the second rule set into a second secure container;
selecting a negotiation site associated with a third party;
transmitting the first and the second secure containers to the negotiation site;
at the negotiation site, comparing an attribute of the first rule set to an attribute of the second rule set to determine whether the attributes are compatible and, depending on the results of the comparison, determining that the negotiation has succeeded, determining that the negotiation has failed, or determining that an additional comparison is required;
if the negotiation has succeeded, transmitting a third secure container to the first party, the third secure container containing governed content;
if the negotiation has failed, informing both parties of the failure, and not transmitting the third secure container to the first party; and
if an additional comparison is required, performing that comparison, and repeating until the negotiation either succeeds or fails. - View Dependent Claims (30)
-
Specification