Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method performed by an electronic appliance, the method comprising:
- receiving an electronic content object;
receiving electronic control information configured for use in governing access to or other use of the electronic content object, the electronic control information comprising a first key associated with a first auditor and a second key associated with a second auditor, the electronic control information requiring audit information to be collected regarding at least one use of the electronic content object;
making the at least one use of the electronic content object in accordance with the control information;
collecting audit information regarding the at least one use of the electronic content object;
encrypting at least a first portion of the audit information using the first key; and
encrypting at least a second portion of the audit information using the second key;
wherein the electronic appliance comprises tamper-resistant hardware and/or software for governing use of the electronic content object in accordance with control information, the tamper-resistant hardware and/or software being resistant to tampering by users of the electronic appliance.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
120 Citations
5 Claims
-
1. A method performed by an electronic appliance, the method comprising:
-
receiving an electronic content object; receiving electronic control information configured for use in governing access to or other use of the electronic content object, the electronic control information comprising a first key associated with a first auditor and a second key associated with a second auditor, the electronic control information requiring audit information to be collected regarding at least one use of the electronic content object; making the at least one use of the electronic content object in accordance with the control information; collecting audit information regarding the at least one use of the electronic content object; encrypting at least a first portion of the audit information using the first key; and encrypting at least a second portion of the audit information using the second key; wherein the electronic appliance comprises tamper-resistant hardware and/or software for governing use of the electronic content object in accordance with control information, the tamper-resistant hardware and/or software being resistant to tampering by users of the electronic appliance. - View Dependent Claims (2, 3, 4, 5)
-
Specification