Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method performed by a first electronic appliance by which two entities, a first entity seeking rights to information and a second entity owning rights to the information, electronically bargain toward an agreement concerning the information, the first electronic appliance comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the electronic appliance to perform the method, the method comprising:
- evaluating a first control set representing initial terms offered by the first entity in exchange for obtaining rights to the information;
evaluating a second control set representing initial terms that the second entity is willing to accept in exchange for granting rights to the information, wherein the second control set is generated based on the second entity rejecting at least one of the initial terms of the first control set and proposing at least one alternative term to the first entity;
generating a third control set of agreed upon terms; and
sending, to a second electronic appliance associated with the first entity, an electronic indication granting rights to the information to the first entity in accordance with the terms of the third control set.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
584 Citations
14 Claims
-
1. A method performed by a first electronic appliance by which two entities, a first entity seeking rights to information and a second entity owning rights to the information, electronically bargain toward an agreement concerning the information, the first electronic appliance comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the electronic appliance to perform the method, the method comprising:
-
evaluating a first control set representing initial terms offered by the first entity in exchange for obtaining rights to the information; evaluating a second control set representing initial terms that the second entity is willing to accept in exchange for granting rights to the information, wherein the second control set is generated based on the second entity rejecting at least one of the initial terms of the first control set and proposing at least one alternative term to the first entity; generating a third control set of agreed upon terms; and sending, to a second electronic appliance associated with the first entity, an electronic indication granting rights to the information to the first entity in accordance with the terms of the third control set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification