Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method performed by an electronic appliance comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the electronic appliance to perform the method, the method comprising:
- receiving, by the electronic appliance, a first electronic object, the first electronic object specifying one or more permitted uses of a group of electronic content objects, the first electronic object further comprising one or more decryption keys for decrypting one or more content items contained in said group of electronic content objects;
receiving, by the electronic appliance, via separate delivery from the first electronic object, a first electronic content object, the first electronic content object being protected separately from the first electronic object and comprising an identifier and an encrypted first piece of electronic content, wherein the first electronic content object is a member of said group of electronic content objects; and
using tamper resistant software to govern use of the first piece of electronic content in accordance with the one or more permitted uses specified by the first electronic object, including using at least one of the one or more decryption keys to decrypt the first piece of electronic content.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
20 Claims
-
1. A method performed by an electronic appliance comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the electronic appliance to perform the method, the method comprising:
-
receiving, by the electronic appliance, a first electronic object, the first electronic object specifying one or more permitted uses of a group of electronic content objects, the first electronic object further comprising one or more decryption keys for decrypting one or more content items contained in said group of electronic content objects; receiving, by the electronic appliance, via separate delivery from the first electronic object, a first electronic content object, the first electronic content object being protected separately from the first electronic object and comprising an identifier and an encrypted first piece of electronic content, wherein the first electronic content object is a member of said group of electronic content objects; and using tamper resistant software to govern use of the first piece of electronic content in accordance with the one or more permitted uses specified by the first electronic object, including using at least one of the one or more decryption keys to decrypt the first piece of electronic content. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method performed by a first electronic appliance comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the first electronic appliance to perform the method, the method comprising:
-
sending, by the first electronic appliance, a first electronic object to a second electronic appliance, the first electronic object specifying one or more permitted uses of a group of electronic content objects, the first electronic object further comprising one or more decryption keys for decrypting one or more content items contained in said group of electronic content objects; sending, by the first electronic appliance, a first electronic content object to the second electronic appliance, the first electronic content object being protected separately from the first electronic object and comprising an identifier and an encrypted first piece of electronic content, wherein the first electronic content object is a member of said group of electronic content objects; wherein the first electronic object is sent to the second electronic appliance via separate delivery from the first electronic content object, and wherein the second electronic appliance comprises tamper-resistant software operable to govern use of the first piece of electronic content in accordance with the one or more permitted uses specified by the first electronic object. - View Dependent Claims (9)
-
-
10. A method of distributing rights-protected electronic content, the method performed by an electronic appliance comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the electronic appliance to perform the method, the method comprising:
-
distributing, by the electronic appliance, a first computer-readable object to a first computer system, the first computer-readable object comprising; a public header comprising information that, at least in part, identifies the computer-readable object, a private header comprising information for use in validating at least part of the computer-readable object, an encrypted piece of electronic content, and first cryptographic key information for use in decrypting the encrypted piece of electronic content; and distributing, by the electronic appliance, via separate delivery from the first computer-readable object, a second computer-readable object to the first computer system, the second computer-readable object being protected separately from the first computer-readable object and comprising; permission information specifying one or more permitted and/or prohibited uses of the electronic content; wherein the first computer system comprises tamper-resistant hardware and/or software capable of governing use of the piece of electronic content in accordance with the permission information, the tamper-resistant hardware and/or software being resistant to tampering by users of the first computer system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification