摘要:
A method of creating a first secure container is disclosed, the method including the following steps: accessing a descriptive data structure, said descriptive data structure including or addressing organisation information at least in part describing a required or desired organisation of a content section of said first secure container, and metadata information at least in part specifying at least one step required or desired in creation of said first secure container; using said descriptive data structure to organise said first secure container contents; using said metadata information to at least in part determine specific information required to be included in said first secure container contents; and generating or identifying at least one rule designed to control at least one aspect of access to or use of at least a portion of said first secure container contents.
摘要:
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, the utilizing the "electronic higher".
摘要:
The present inventions provide an integrated modular array of administrative and support services for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting financial management, rights management, certificate authority, rules clearing, usage clearing, secure directory services, and other transaction related capabilities functioning over a vast electronic network such as the Internet and/or over organization internal Intranets. These administrative and support services can be adapted to the specific needs of electronic commerce value chains. Electronic commerce participants can use these administrative and support services to support their interests, and can shape and reuse these services in response to competitive business realities. A Distributed Commerce Utility having a secure, programmable, distributed architecture provides administrative and support services. The Distributed Commerce Utility makes optimally efficient use of commerce administration resources, and can scale in a practical fashion to accommodate the demands of electronic commerce growth. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many or all of its participants. Different support functions can be collected together in hierarchical and/or in networked relationships to suit various business models and/or other objective. Modular support functions can be combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes. These Commerce Utility systems can be distributed across a large number of electronic appliances with varying degrees of distribution.
摘要:
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, the utilizing the "electronic higher".
摘要:
A method for operating a subject switching system is disclosed. The method comprises:
(a) at the subject switch, receiving rights management information associated with digital information, the rights management information identifying a class hierarchy made up of one or more digital information classes,
(i) the class hierarchy having been defined at least in part using rights management information associated with digital information, (ii) the class hierarchy having been used to classify the digital information, classification based at least in part on the rights management information;
(b) the subject switch publishing the class hierarchy to a user located remotely from the subject switch, the user having a user appliance containing a secure node; (c) the user subscribing to one of the digital information classes; (d) the user appliance monitoring received messages for digital information in the subscribed digital information class; (e) the user appliance identifying one such received message; (f) receiving at the user appliance rights management information associated with the identified digital information; and (g) using at the user appliance the identified digital information in accordance with the received rights management information, the use governed by the user appliance secure node.