Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method for auditing the use of at least one resource with a secure operating environment, said method comprising:
- securely receiving a first control from a first entity external to said operating environment;
securely receiving a second control from a second entity external to said operating environment, said second entity being different from said first entity;
using at least one resource;
securely sending to said first entity in accordance with said first control, first audit information concerning use of said resource; and
securely sending to said second entity in accordance with said second control, second audit information concerning use of said resource, said second audit information being at least in part different from said first audit information.
4 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway."
1923 Citations
2 Claims
-
1. A method for auditing the use of at least one resource with a secure operating environment, said method comprising:
-
securely receiving a first control from a first entity external to said operating environment; securely receiving a second control from a second entity external to said operating environment, said second entity being different from said first entity; using at least one resource; securely sending to said first entity in accordance with said first control, first audit information concerning use of said resource; and securely sending to said second entity in accordance with said second control, second audit information concerning use of said resource, said second audit information being at least in part different from said first audit information.
-
-
2. A method for auditing the use of at least one resource with a secure operating environment, said method comprising:
-
securely receiving first and second control alternatives from an entity external to said operating environment; selecting one of said first and second control alternatives; using at least one resource; if said first control alternative is selected by said selecting step, securely sending to said entity in accordance with said first control alternative, first audit information concerning use of said resource; and if said second control alternative is selected by said selecting step, securely sending to said second entity in accordance with said second control alternative, second audit information concerning use of said resource, said second audit information being at least in part different from said first audit information.
-
Specification