Systems and methods for secure transaction management and electronic rights protection
First Claim
1. An electronic appliance comprising:
- a central processing unit;
a secure processing unit; and
a computer readable medium storing;
protected electronic materials comprising protected digital content and an embedded signature; and
computer readable instructions that, when executed by the secure processing unit, are operable to;
validate the embedded signature against a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, the information being hidden by being placed in a secret location, wherein validating the embedded signature comprises matching the embedded signature with the current signature, and wherein the secret location comprises one of;
disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; and
deny use of the protected digital content when the embedded signature fails to validate against the current signature of the electronic appliance, wherein the computer readable instructions comprise a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the “electronic highway.”
-
Citations
34 Claims
-
1. An electronic appliance comprising:
-
a central processing unit; a secure processing unit; and a computer readable medium storing; protected electronic materials comprising protected digital content and an embedded signature; and computer readable instructions that, when executed by the secure processing unit, are operable to; validate the embedded signature against a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, the information being hidden by being placed in a secret location, wherein validating the embedded signature comprises matching the embedded signature with the current signature, and wherein the secret location comprises one of;
disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; anddeny use of the protected digital content when the embedded signature fails to validate against the current signature of the electronic appliance, wherein the computer readable instructions comprise a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method performed by an electronic appliance comprising a central processing unit and a secure processing unit, the method comprising:
-
transferring program control, by the central processing unit, to the secure processing unit; executing, by the secure processing unit, instructions from a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance; retrieving, by the secure processing unit, an embedded electronic appliance signature from a protected electronic item, wherein the signature is retrieved from one of;
disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system;comparing, by the secure processing unit, the embedded electronic appliance signature with a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance; and denying, by the secure processing unit, use of protected digital content included in the protected electronic item upon determining that the embedded electronic appliance signature does not match the current signature. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An electronic appliance comprising:
-
a central processing unit; a secure processing unit comprising; a tamper-resistant housing; internal memory; and a processor; a computer readable medium storing; protected electronic materials; protected digital content; a previously determined signature; and computer readable instructions that, when executed by the secure processing unit, are operable to; validate the previously determined signature against a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, the information being hidden by being placed in a secret location, wherein validating the previously determined signature against the current signature comprises matching the previously determined signature with the current signature, and wherein the secret location comprises one of;
disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; anddeny use of the protected digital content when the previously determined signature fails to validate against the current signature of the electronic appliance, wherein the computer readable instructions comprise a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance. - View Dependent Claims (26, 27, 28, 29)
-
-
30. A method performed by an electronic appliance comprising a central processing unit and a secure processing unit, the method comprising:
-
transferring program control, by the central processing unit, to the secure processing unit; executing, by the secure processing unit, instructions from a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance; retrieving, by the secure processing unit, a previously determined electronic appliance signature associated with a protected electronic item; comparing, by the secure processing unit, the previously determined electronic appliance signature with a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, wherein the information is stored in one of;
disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; anddenying, by the secure processing unit, use of protected digital content included in the protected electronic item upon determining that the previously determined signature does not match the current signature. - View Dependent Claims (31, 32, 33, 34)
-
Specification