Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method for performing a commercial process including the following steps:
- at a processing arrangement located at a first site, receiving a first communication including a first programming module and first authentication information, the first communication being directly or indirectly received from a second site located remotely from the first site;
at the processing arrangement, using the first authentication information to at least in part authenticate the first programming module;
at the processing arrangement, receiving a second communication including a second programming module and second authentication information, the second communication being directly or indirectly received from a third site located remotely from the first site and from the second site;
at the processing arrangement, using the second authentication information to at least in part authenticate the second programming module; and
at the processing arrangement, executing programming from the first programming module and programming from the second programming module, the execution contributing to the performance of a commercial process, the commercial process including the following steps;
(1) using a governed item; and
(2) storing audit-related information relating to the governed item use.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
33 Claims
-
1. A method for performing a commercial process including the following steps:
-
at a processing arrangement located at a first site, receiving a first communication including a first programming module and first authentication information, the first communication being directly or indirectly received from a second site located remotely from the first site;
at the processing arrangement, using the first authentication information to at least in part authenticate the first programming module;
at the processing arrangement, receiving a second communication including a second programming module and second authentication information, the second communication being directly or indirectly received from a third site located remotely from the first site and from the second site;
at the processing arrangement, using the second authentication information to at least in part authenticate the second programming module; and
at the processing arrangement, executing programming from the first programming module and programming from the second programming module, the execution contributing to the performance of a commercial process, the commercial process including the following steps;
(1) using a governed item; and
(2) storing audit-related information relating to the governed item use. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification