Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A load module embodied on a computer-readable medium, the load module comprising:
- a load module header including a public portion and a private portion;
said public portion including identification information and information describing at least one aspect of a hardware or software platform on which said load module is designed to execute;
said private portion including at least one correlation tag including information used to determine whether a method has authorization to call or load the load module; and
a load module body, including;
executable programming specifying that information relating to a use of the load module be communicated to a remote site; and
a reference to data, at least some of said data being associated with or used by said executable programming.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
38 Claims
-
1. A load module embodied on a computer-readable medium, the load module comprising:
-
a load module header including a public portion and a private portion; said public portion including identification information and information describing at least one aspect of a hardware or software platform on which said load module is designed to execute; said private portion including at least one correlation tag including information used to determine whether a method has authorization to call or load the load module; and a load module body, including; executable programming specifying that information relating to a use of the load module be communicated to a remote site; and a reference to data, at least some of said data being associated with or used by said executable programming. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An operating system embodied on a computer-readable medium, comprising:
-
component assembling programming which assembles a plurality of elements into a component, said component assembling programming including; (a) validation programming used to validate said elements, said validation programming including; (1) tag checking programming used to check the identity, validity or integrity of elements by comparing tags incorporated in said elements to expected values; and (2) element identification and referencing programming; and (b) communications programming used to communicate at least one result of said tag comparison to a remote site; and an object switch which controls and communicates objects, said object switch including; one or more stream interfaces; and a container manager used to manage secure containers. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A component assembly embodied on a computer readable medium, comprising:
-
a first load module and a second load module, each load module comprising; a load module header, made up of a public portion and a private portion; said public portion including identification information and information describing at least one aspect of a hardware or software platform on which said load module is designed to execute; said private portion including at least one correlation tag including information used to determine whether a method has authorization to call or load the load module; and a load module body, including; executable programming; and a reference to data, at least some of said data being associated with or used by said executable programming, said first load module executable programming including programming requiring the storage of audit information relating to use of the component assembly. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A component assembly embodied on a computer readable medium, comprising:
-
a first load module and a second load module, each load module comprising; a load module header, made up of a public portion and a private portion; said public portion including identification information; said private portion including at least one correlation tag and information on the stack size used by or required by said load module, said correlation tag including information used to determine whether a method has authorization to call or load the load module; and a load module body, including; executable programming; and a reference to data, at least some of said data being associated with or used by said executable programming, said first load module executable programming including programming requiring the storage of information uniquely identifying a device at which said component assembly is stored.
-
-
37. A component assembly embodied on a computer readable medium, comprising:
-
a first load module and a second load module, each load module comprising; a load module header, made up of a public portion and a private portion; said public portion including identification information; said private portion including at least one correlation tag, and an access tag, said access tag being made up of at least two fields, each of which can be accessed and used separately and said correlation tag including information used to determine whether a method has authorization to call or load the load module; and a load module body, including; executable programming; and a reference to data, at least some of said data being associated with or used by said executable programming, said first load module executable programming including programming requiring communicating a unique identification for a device at which said component assembly is stored to a remote location.
-
-
38. A computer processing system comprising:
-
a processing unit operable to execute computer programming, wherein the computer programming comprises; a component assembler which assembles a plurality of elements into a component assembly, said plurality of elements each including at least one tag, said component assembler including a validator that validates each of said plurality of elements, said validator including a tag checker that checks at least one of;
(a) the identity, (b) the validity or (c) the integrity, of said plurality of elements by comparing said tags incorporated in said plurality of elements to expected values; andan object switch coupled to said component assembler, said object switch including; (a) a stream router that communicates component assemblies; (b) one or more stream interfaces coupled to said stream router; (c) a container manager that, in use, manages said component assemblies; and (d) an object switch interface that interfaces said object switch with said component assembler; and a communications module which communicates a unique identifier of the computer processing system or a user of the computer processing system to a remote location.
-
Specification