摘要:
A method, system, and device for verifying authorized issuance of a statement or expression, including determining if a statement or expression is associated with a statement of trusted issuance; determining if the statement of trusted issuance applies; determining if issuance of the statement of trusted issuance is authorized; and verifying that the issuance of the statement or expression was authorized, if the statement of trusted issuance applies, and the issuance of the statement of trusted issuance is authorized.
摘要:
A method, system and computer program product for transferring a digital work, including receiving by a first device a first digital work including digital content which is associated with usage rights and transfer permission information; sending to a server a request to transfer the digital content to a second device, the request indicating an identification of the second device; receiving from the server permission to transfer the digital content, the permission being generated based on the identification indicated by the request and the permission indicating new usage rights associated with the digital content; and transferring the digital content associated with the new usage rights to the second device.
摘要:
An enforceable property right and a system for controlling the manner of use of an item in accordance with usage rights. The enforceable property right includes an item ticket having a security mechanism incorporated therein and specifying an item for which the item ticket can be redeemed and a license associated with the item ticket. The license includes usage rights specifying a manner of use for redeeming the item ticket and a mechanism for unlocking said security mechanism.
摘要:
A method, system, and device for verifying authorized issuance of a statement or expression, including determining if a statement or expression is associated with a statement of trusted issuance; determining if the statement of trusted issuance applies; determining if issuance of the statement of trusted issuance is authorized; and verifying that the issuance of the statement or expression was authorized, if the statement of trusted issuance applies, and the issuance of the statement of trusted issuance is authorized.
摘要:
A method, system, and device for verifying authorized issuance of a statement or expression, including determining if a statement or expression is associated with a statement of trusted issuance; determining if the statement of trusted issuance applies; determining if issuance of the statement of trusted issuance is authorized; and verifying that the issuance of the statement or expression was authorized, if the statement of trusted issuance applies, and the issuance of the statement of trusted issuance is authorized.
摘要:
A method, system, and computer program product for controlling consumption of a distributed network service in accordance with rights expression information associated with the distributed network service and specifying a manner of use of the distributed network service, including interpreting the rights expression information associated with the distributed network service, the rights expression information indicating a manner of use of the distributed network service; and controlling consumption of the distributed network service based on the rights expression information.
摘要:
A trust policy is constructed based upon a social relationship between real-world entities. The trust policy may determined based upon a social network and social network maps. The social network map provides a framework to determine social distances. The trust policy provides quick and secure access to desired or trusted nodes while providing security from entities outside the trusted sphere of nodes. The trust policy determined by the social distance may be used for various types of applications including filtering unwanted e-mail, providing secure access to resources, and accessing protected services. File sharing, referral querying, advertisement targeting, announcement targeting, access control, and various applications may be limited using the constructed trust policy.