Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method comprising:
- creating first control information, the first control information being configured for use by a protected processing environment to govern access to or other use of an electronic content object at a first electronic appliance, the first control information including a requirement that information relating to access to or other use of the electronic content object be recorded;
sending the first control information to a first electronic appliance;
determining whether usage information relating to access to or other use of the electronic content object has been recorded; and
conditionally sending, based at least in part on results of the determining step and the first control information, second control information to the first electronic appliance, the second control information including a time-based constraint.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
138 Citations
20 Claims
-
1. A method comprising:
-
creating first control information, the first control information being configured for use by a protected processing environment to govern access to or other use of an electronic content object at a first electronic appliance, the first control information including a requirement that information relating to access to or other use of the electronic content object be recorded; sending the first control information to a first electronic appliance; determining whether usage information relating to access to or other use of the electronic content object has been recorded; and conditionally sending, based at least in part on results of the determining step and the first control information, second control information to the first electronic appliance, the second control information including a time-based constraint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving first control information at a first electronic appliance, the first electronic appliance including a protected processing environment; using the first control information to obtain access to or make other use of an electronic content object at the first electronic appliance, the access to or use of the electronic content object being governed by the protected processing environment in accordance with the first control information; determining that at least a portion of the first control information has expired or has been consumed; sending usage information to a second electronic appliance after obscuring one or more details of usage not permitted to be disseminated, the one or more details being identified based on control information associated with the electronic content object; sending a request for second control information; and receiving second control information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification