Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method for auditing access to, or other use of, a digital object at a first computer system, the method comprising:
- obtaining a request to access or otherwise use the digital object;
granting the request to access or otherwise use the digital object in accordance with one or more rules associated with the digital object;
storing audit information relating to the access or other use of the digital object; and
determining that at least a predefined amount of audit information has been stored, and sending at least part of the stored audit information to another computer system remote from the first computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
33 Claims
-
1. A method for auditing access to, or other use of, a digital object at a first computer system, the method comprising:
-
obtaining a request to access or otherwise use the digital object; granting the request to access or otherwise use the digital object in accordance with one or more rules associated with the digital object; storing audit information relating to the access or other use of the digital object; and determining that at least a predefined amount of audit information has been stored, and sending at least part of the stored audit information to another computer system remote from the first computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer program product embodied on a computer readable medium, the computer program product including instructions that, when executed by a computer system, are operable to cause the computer system to perform actions comprising:
-
obtaining a request to access or otherwise use a digital object; granting the request to access or otherwise use the digital object in accordance with one or more rules associated with the digital object; storing audit information relating to the access or other use of the digital object; and determining that at least a predefined amount of audit information has been stored, and sending at least part of the stored audit information to a remote computer system. - View Dependent Claims (30, 31, 32, 33)
-
Specification