Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method performed by a user'"'"'s electronic appliance, the method comprising:
- receiving, by a processor included in the user'"'"'s electronic appliance, an electronic object, the electronic object including an encrypted piece of electronic content, the encrypted piece of electronic content including at least a first electronic fingerprint;
receiving, by the processor, separately from the electronic object and via separate delivery, separately protected control information specifying one or more permitted uses of the piece of electronic content; and
using, by the processor, at least in part, tamper-resistant hardware and/or software to decrypt the encrypted piece of electronic content and to enable the user to make at least one of the one or more permitted uses of the piece of electronic content, the at least one of the one or more permitted uses of the piece of electronic content including releasing the piece of electronic content in clear form with at least the first electronic fingerprint embedded therein.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
142 Claims
-
1. A method performed by a user'"'"'s electronic appliance, the method comprising:
-
receiving, by a processor included in the user'"'"'s electronic appliance, an electronic object, the electronic object including an encrypted piece of electronic content, the encrypted piece of electronic content including at least a first electronic fingerprint; receiving, by the processor, separately from the electronic object and via separate delivery, separately protected control information specifying one or more permitted uses of the piece of electronic content; and using, by the processor, at least in part, tamper-resistant hardware and/or software to decrypt the encrypted piece of electronic content and to enable the user to make at least one of the one or more permitted uses of the piece of electronic content, the at least one of the one or more permitted uses of the piece of electronic content including releasing the piece of electronic content in clear form with at least the first electronic fingerprint embedded therein. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method performed by a user'"'"'s electronic appliance, the method comprising:
-
receiving, by a processor included in the user'"'"'s electronic appliance, an encrypted piece of electronic content; receiving, by the processor, via separate delivery from the electronic content, separately protected control information specifying one or more permitted uses of the piece of electronic content; and using, by the processor, at least in part, tamper-resistant hardware and/or software to (i) decrypt the encrypted piece of electronic content, (ii) embed an electronic fingerprint into the piece of electronic content, and (iii) make at least one of the one or more permitted uses of the piece of electronic content. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method comprising:
-
inserting, by a processor included in a first electronic appliance, at least a first electronic fingerprint into a piece of electronic content; encrypting, by the processor, the piece of electronic content; packaging, by the processor, the piece of electronic content into an electronic object; associating, by the processor, separately protected control information with the electronic object, the control information specifying one or more permitted uses of the piece of electronic content; and distributing, by the processor, the electronic object to a user'"'"'s electronic appliance; distributing, by the processor, via separate delivery from the electronic object, the separately protected control information to the user'"'"'s electronic appliance, wherein the user'"'"'s electronic appliance comprises tamper-resistant hardware and/or software operable to apply the control information to govern use of the piece of electronic content. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method comprising:
-
receiving, by a processor associated with a first electronic appliance, a first request for a piece of electronic content from a first user, the piece of electronic content having control information associated therewith, the control information being separately protected and received by the processor via separate delivery from the electronic content and specifying one or more permitted uses of the piece of electronic content; inserting, by the processor, a first electronic fingerprint into a copy of the piece of electronic content to obtain a first fingerprinted piece of electronic content; encrypting, by the processor, the first fingerprinted piece of electronic content; distributing, by the processor, the encrypted first fingerprinted piece of electronic content to the first user; receiving, by the processor, a second request for the piece of electronic content from a second user; inserting, by the processor, a second electronic fingerprint into a copy of the piece of electronic content to obtain a second fingerprinted piece of electronic content; encrypting, by the processor, the second fingerprinted piece of electronic content; distributing, by the processor, the encrypted second fingerprinted piece of electronic content to the second user; wherein the first electronic fingerprint and the second electronic fingerprint are different, at least in part. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62)
-
-
63. A non-transitory computer-readable storage medium, the computer readable storage medium comprising computer code that, when executed by an electronic appliance comprising a protected processing environment, is operable to cause the electronic appliance to perform steps comprising:
decrypting an encrypted piece of electronic content in accordance with control information associated therewith, the control information being separately protected and received by the electronic appliance via separate delivery from the piece of electronic content and specifying one or more permitted uses of the piece of electronic content, and enabling a user to make at least one of the one or more permitted uses of the piece of electronic content, the at least one of the one or more permitted uses of the piece of electronic content including releasing the piece of electronic content in clear form with at least a first electronic fingerprint embedded therein. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
76. A non-transitory computer-readable storage medium, the computer readable storage medium comprising computer code that, when executed by an electronic appliance, is operable to cause the electronic appliance to perform steps comprising:
-
inserting at least a first electronic fingerprint into a piece of electronic content; encrypting the piece of electronic content; associating separately protected control information with the piece of electronic content, the control information specifying one or more permitted uses of the piece of electronic content; and distributing the piece of electronic content to a user'"'"'s electronic appliance; distributing the separately protected control information, via separate delivery from the piece of electronic content, to a user'"'"'s electronic appliance, wherein the user'"'"'s electronic appliance comprises tamper-resistant hardware and/or software operable to apply the control information to govern use of the piece of electronic content. - View Dependent Claims (77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91)
-
-
92. A non-transitory computer-readable storage medium, the computer readable storage medium comprising computer code that, when executed by an electronic appliance, is operable to cause the electronic appliance to perform steps comprising:
-
receiving a first request for a piece of electronic content from a first user, the piece of electronic content having control information associated therewith, the control information being separately protected, received by the electronic appliance via separate delivery from the piece of electronic content, and specifying one or more permitted uses of the piece of electronic content; inserting a first electronic fingerprint into a copy of the piece of electronic content to obtain a first fingerprinted piece of electronic content; encrypting the first fingerprinted piece of electronic content; distributing the encrypted first fingerprinted piece of electronic content to the first user; receiving a second request for the piece of electronic content from a second user; inserting a second electronic fingerprint into a copy of the piece of electronic content to obtain a second fingerprinted piece of electronic content; encrypting the second fingerprinted piece of electronic content; distributing the encrypted second fingerprinted piece of electronic content to the second user; and wherein the first electronic fingerprint and the second electronic fingerprint are different, at least in part. - View Dependent Claims (93, 94, 95, 96, 97, 98, 99)
-
-
100. An electronic appliance comprising:
-
means for receiving an electronic object, the electronic object including an encrypted piece of electronic content; means for receiving, via separate delivery from the electronic object, separately protected control information specifying one or more permitted uses of the piece of electronic content; and tamper-resistant hardware and/or software for decrypting the encrypted piece of electronic content and enabling a user to make at least one of the one or more permitted uses of the piece of electronic content, the at least one of the one or more permitted uses of the piece of electronic content including releasing the piece of electronic content in clear form with at least a first electronic fingerprint embedded therein. - View Dependent Claims (101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118)
-
-
119. A system comprising:
-
means for inserting at least a first electronic fingerprint into a piece of electronic content; means for encrypting the piece of electronic content; means for associating control information with the piece of electronic content, the control information specifying one or more permitted uses of the piece of electronic content; and means for separately protecting and distributing via separate delivery the piece of electronic content and the control information to a user'"'"'s electronic appliance, wherein the user'"'"'s electronic appliance comprises tamper-resistant hardware and/or software operable to apply the control information to govern use of the piece of electronic content. - View Dependent Claims (120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134)
-
-
135. A system comprising:
-
means for receiving a first request for a piece of electronic content from a first user, the piece of electronic content having control information associated therewith, the control information being separately protected and received by the system via separate delivery from the electronic content and specifying one or more permitted uses of the piece of electronic content; means for inserting a first electronic fingerprint into a copy of the piece of electronic content to obtain a first fingerprinted piece of electronic content; means for encrypting the first fingerprinted piece of electronic content; means for distributing the encrypted first fingerprinted piece of electronic content to the first user; means for receiving a second request for the piece of electronic content from a second user; means for inserting a second electronic fingerprint into a copy of the piece of electronic content to obtain a second fingerprinted piece of electronic content; means for encrypting the second fingerprinted piece of electronic content; means for distributing the encrypted second fingerprinted piece of electronic content to the second user; and wherein the first electronic fingerprint and the second electronic fingerprint are different, at least in part. - View Dependent Claims (136, 137, 138, 139, 140, 141, 142)
-
Specification