Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method comprising:
- executing end user content processing application software in one or more virtual machine environments that are executed by a host operating system of a computer system;
executing rights management software by the host operating system of the computer system, wherein the rights management software executes outside the one or more virtual machine environments in which the end user content processing application software is executing;
processing a protected piece of digital content using the end user content processing application software; and
using the rights management software to make a determination as to whether to allow the protected piece of digital content to be transmitted between the one or more virtual machine environments and a resource external to the one or more virtual machine environments, wherein the determination is based at least in part on one or more controls associated with the protected piece of digital content that define usage conditions for the protected piece of digital content.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
-
Citations
13 Claims
-
1. A method comprising:
-
executing end user content processing application software in one or more virtual machine environments that are executed by a host operating system of a computer system; executing rights management software by the host operating system of the computer system, wherein the rights management software executes outside the one or more virtual machine environments in which the end user content processing application software is executing; processing a protected piece of digital content using the end user content processing application software; and using the rights management software to make a determination as to whether to allow the protected piece of digital content to be transmitted between the one or more virtual machine environments and a resource external to the one or more virtual machine environments, wherein the determination is based at least in part on one or more controls associated with the protected piece of digital content that define usage conditions for the protected piece of digital content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification