摘要:
A method of copying DVD information is disclosed. The method involves one or more DVD apparatuses, each of the DVD apparatuses including an arrangement for reading information from a DVD disk, at least one of said DVD apparatuses including an arrangement for storing information on a DVD disk. The method includes the steps of supplying a DVD disk, the DVD disk including a secure container comprising governed information and a first rule, the governed information being at least in part encrypted, and, under control of said first rule, copying at least a portion of the governed information onto a second DVD disk. The copying includes the steps of placing the copied information into a second secure container, associating a second rule with the second secure container, and storing the second secure container and the associated rule on the second DVD disk.
摘要:
A method of distributing electronic content is disclosed. The method comprises distributing a first electronic object to a user's computer system (600), the first electronic object being associated with an encrypted piece of electronic content, the first electronic object comprising first control information governing use of the piece of electronic content, the first control information specifying one or more permitted uses of the piece of electronic content, and separately distributing a second electronic object to the user's computer system, the second electronic object comprising second control information governing use of the piece of electronic content. The first and second control information are configured to be applied in combination by tamper resistant hardware and/or software (503) running on the user's computer system to securely govern use of the piece of electronic content. A corresponding method of receiving electronic content is also disclosed.
摘要:
A method of printing using a printer capable of executing commands or instructions is described in which the printer downloads a decryption program, receives an encrypted data stream to be printed, decrypts the encrypted data stream using the decryption program, and prints the decrypted data stream on a print medium.
摘要:
The present inventions provide an integrated, modular array of administrative and support services for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting financial management, rights management, certificate authority, rules clearing, usage clearing, secure directory services, and other transaction related capabilities functioning over a vast electronic network such as the Internet and/or over organisation internal Intranets. These administrative and support services can be adapted to the specific needs of electronic commerce value chains. Electronic commerce participants can use these administrative and support services to support their interests, and can shape and reuse these services in response to competitive business realities. A Distributed Commerce Utility having a secure, programmable, distributed architecture provides administrative and support services. The Distributed Commerce Utility makes optimally efficient use of commerce administration resources, and can scale in a practical fashion to accommodate the demands of electronic commerce growth. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many or all of its participants. Different support functions can be collected together in hierarchical and/or in networked relationships to suit various business models and/or other objectives. Modular support functions can be combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes. These Commerce Utility Systems can be distributed across a large number of electronic appliances with varying degrees of distribution.
摘要:
A descriptive data structure provides an abstract representation of a rights management data structure such as a secure container. The abstract representation may describe, for example, the layout of the rights management data structure. It can also provide metadata describing or defining other characteristics of rights management data structure use and/or processing. For example, the descriptive data structure can provide integrity constraints that provide a way to state rules about associated information. The abstract representation can be used to create rights management data structures that are interoperable and compatible with one another. This arrangement preserves flexibility and ease of use without compromising security.
摘要:
A method of and apparatus for assembling software elements to form a component assembly (690) are described. A record (808) containing information identifying the software elements (1000, 1100, 1200, 1202, 690) to be assembled to form the component assembly is accessed. At least some of the software elements (1000, 1100) identified by the record comprise executable program code and at least one of the software elements is a load module (1100) comprising executable program code and a header (804) having an execution space identifier identifying which of a number of different security levels is required of a component assembly execution space. The software elements identified by the record are assembled to form a component assembly (690) that may, in use, be loaded and executed when the level of security of the component assembly execution space matches the level of security identified by the execution space identifier.
摘要:
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, the utilizing the "electronic higher".
摘要:
A method of and apparatus for assembling software elements to form a component assembly (690) are described. A record (808) containing information identifying the software elements (1000, 1100, 1200, 1202, 690) to be assembled to form the component assembly is accessed. At least some of the software elements (1000, 1100) identified by the record comprise executable program code and at least one of the software elements is a load module (1100) comprising executable program code and a header (804) having an execution space identifier identifying which of a number of different security levels is required of a component assembly execution space. The software elements identified by the record are assembled to form a component assembly (690) that may, in use, be loaded and executed when the level of security of the component assembly execution space matches the level of security identified by the execution space identifier.
摘要:
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, the utilizing the "electronic higher".