Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A system comprising:
- an electronic appliance, the electronic appliance comprising a first protected processing environment, the first protected processing environment being operable to encrypt content data for transmission to a second protected processing environment associated with a peripheral device and to decrypt content data received from the second protected processing environment; and
a peripheral device, the peripheral device comprising a second protected processing environment, the peripheral device being communicatively coupled to the electronic appliance, the second protected processing environment being operable to encrypt content data for transmission to the first protected processing environment and to decrypt content data received from the first protected processing environment, the second protected processing environment comprising memory comprising instructions that, when executed by the peripheral device, are operable to read control information received by the peripheral device supplied from different parties along different paths than content data received from the first protected processing environment, the control information specifying one or more permitted uses of the content data received from the first protected processing environment, and to enable the content data received from the first protected processing environment to be used only in accordance with the one or more permitted uses specified by the control information.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
110 Citations
6 Claims
-
1. A system comprising:
-
an electronic appliance, the electronic appliance comprising a first protected processing environment, the first protected processing environment being operable to encrypt content data for transmission to a second protected processing environment associated with a peripheral device and to decrypt content data received from the second protected processing environment; and a peripheral device, the peripheral device comprising a second protected processing environment, the peripheral device being communicatively coupled to the electronic appliance, the second protected processing environment being operable to encrypt content data for transmission to the first protected processing environment and to decrypt content data received from the first protected processing environment, the second protected processing environment comprising memory comprising instructions that, when executed by the peripheral device, are operable to read control information received by the peripheral device supplied from different parties along different paths than content data received from the first protected processing environment, the control information specifying one or more permitted uses of the content data received from the first protected processing environment, and to enable the content data received from the first protected processing environment to be used only in accordance with the one or more permitted uses specified by the control information. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification