Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method of using a resource including the following steps:
- receivinag the resource at a first computing environment;
receiving a first control or control set at the first secure computing enviroment;
receiving a second control or control set at the first secure computing enbvironment;
evaluating an auditing-related aspect of the first control or control set and the second control or control set, including evaluating a privacy-related aspect of the first control or control set and the second control or control set;
choosing between the first control or control set and the second control or control set, the choice being based at least in part on the evaluation;
resource; and
reporting auditing-related information relating to the access to or use of the resource to a second computing environment.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
1530 Citations
6 Claims
-
1. A method of using a resource including the following steps:
-
receivinag the resource at a first computing environment;
receiving a first control or control set at the first secure computing enviroment;
receiving a second control or control set at the first secure computing enbvironment;
evaluating an auditing-related aspect of the first control or control set and the second control or control set, including evaluating a privacy-related aspect of the first control or control set and the second control or control set;
choosing between the first control or control set and the second control or control set, the choice being based at least in part on the evaluation;
resource; and
reporting auditing-related information relating to the access to or use of the resource to asecond computing environment. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification