Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A computer readable medium storing a computer program package, the computer program package including instructions that, when executed by a computer system'"'"'s processor, are operable to cause the computer system to take actions including:
- retrieve at least a first executable component, a second executable component and at least one record that specifies a component assembly;
determine whether said first executable component, second executable component and/or record is valid;
form said component assembly in accordance with said record, wherein said component assembly is a computer program comprising said first executable component and said second executable component;
retrieve a rule at least in part governing a process, the rule requiring that information relating to the process be stored; and
perform the process, including executing said component assembly, and communicating information relating to the performance of the process to a remote site, said communication occurring at least in part under control of said rule.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
645 Citations
9 Claims
-
1. A computer readable medium storing a computer program package, the computer program package including instructions that, when executed by a computer system'"'"'s processor, are operable to cause the computer system to take actions including:
-
retrieve at least a first executable component, a second executable component and at least one record that specifies a component assembly;
determine whether said first executable component, second executable component and/or record is valid;
form said component assembly in accordance with said record, wherein said component assembly is a computer program comprising said first executable component and said second executable component;
retrieve a rule at least in part governing a process, the rule requiring that information relating to the process be stored; and
perform the process, including executing said component assembly, and communicating information relating to the performance of the process to a remote site, said communication occurring at least in part under control of said rule. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A process comprising:
-
accessing a record containing information directly or indirectly identifying (1) two or more executable elements of a component assembly, said two or more executable elements including at least some executable programming, and (2) a rule at least in part governing use of said executable programming;
using said information to identify and locate said two or more executable elements and said rule;
accessing said located two or more elements and said rule;
securely assembling said two or more executable elements to form at least a portion of said component assembly, wherein said component assembly comprises a computer program; and
executing said component assembly in accordance with said rule. - View Dependent Claims (7, 8, 9)
-
Specification