Systems and methods for secure transaction management and electronic rights protection
First Claim
1. A method including:
- creating a first secure container including a first governed item and having associated a first control;
creating a second secure container including a second governed item and having associated a second control;
transferring the first secure container from a first location to a second location;
transferring the second secure container from a third location to the second location;
at the second location, obtaining access to at least a portion of the first governed item, the access being governed at least in part by the first control;
at the second location, obtaining access to at least a portion of the second governed item, the access being governed at least in part by the second control;
at the second location, creating a third secure container including at least a portion of the first governed item and at least a portion of the second governed item and having associated at least one control, the creation being governed at least in part by the first control and the second control.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway”.
1075 Citations
2 Claims
-
1. A method including:
-
creating a first secure container including a first governed item and having associated a first control;
creating a second secure container including a second governed item and having associated a second control;
transferring the first secure container from a first location to a second location;
transferring the second secure container from a third location to the second location;
at the second location, obtaining access to at least a portion of the first governed item, the access being governed at least in part by the first control;
at the second location, obtaining access to at least a portion of the second governed item, the access being governed at least in part by the second control;
at the second location, creating a third secure container including at least a portion of the first governed item and at least a portion of the second governed item and having associated at least one control, the creation being governed at least in part by the first control and the second control. - View Dependent Claims (2)
transmitting the third secure container to a location remote from the second location, the transmission being governed at least in part by the first control or the second control.
-
Specification