Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method performed by an electronic appliance, the electronic appliance comprising a protected processing environment and rights management programming stored on a computer readable medium, the rights management programming being operable, when executed by the electronic appliance, to govern use of electronic content by a user of the electronic appliance, the method comprising:
- enabling a user of the electronic appliance to use a piece of electronic content, the piece of electronic content having control information securely associated therewith, the control information specifying one or more consequences of use of the piece of electronic content and being received by the electronic appliance separately from the piece of electronic content;
monitoring usage of the piece of electronic content for occurrence of one or more predefined events; and
taking one or more actions upon detection of the one or more predefined events;
wherein the one or more predefined events and the one or more actions are specified, at least in part, in the control information, and wherein the rights management programming is operable, when executed by the electronic appliance, to cause the electronic appliance to perform said monitoring and taking steps, using, at least in part, the protected processing environment.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
28 Claims
-
1. A method performed by an electronic appliance, the electronic appliance comprising a protected processing environment and rights management programming stored on a computer readable medium, the rights management programming being operable, when executed by the electronic appliance, to govern use of electronic content by a user of the electronic appliance, the method comprising:
-
enabling a user of the electronic appliance to use a piece of electronic content, the piece of electronic content having control information securely associated therewith, the control information specifying one or more consequences of use of the piece of electronic content and being received by the electronic appliance separately from the piece of electronic content; monitoring usage of the piece of electronic content for occurrence of one or more predefined events; and taking one or more actions upon detection of the one or more predefined events; wherein the one or more predefined events and the one or more actions are specified, at least in part, in the control information, and wherein the rights management programming is operable, when executed by the electronic appliance, to cause the electronic appliance to perform said monitoring and taking steps, using, at least in part, the protected processing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification