Selective sending of portions of electronic content

    公开(公告)号:US08352552B2

    公开(公告)日:2013-01-08

    申请号:US11778824

    申请日:2007-07-17

    申请人: Leila Kaghazian

    发明人: Leila Kaghazian

    IPC分类号: G06F15/16

    CPC分类号: G06F3/01 G06Q10/107

    摘要: A user of a handheld communication device selects in a foreground process portions of an electronic document. In a background process a new document is prepared that comprises the selected portions. The user selects the address for forwarding the new document, and the new document gets sent in a background process.

    Systems and methods for conducting transactions and communications using a trusted third party
    4.
    发明授权
    Systems and methods for conducting transactions and communications using a trusted third party 有权
    使用受信任的第三方进行交易和通信的系统和方法

    公开(公告)号:US08185478B2

    公开(公告)日:2012-05-22

    申请号:US12895510

    申请日:2010-09-30

    IPC分类号: G06Q40/00

    摘要: Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party. In other embodiments, the sender encrypts this hash using a key associated with the third party and sends the encrypted hash to the receiver, who then forwards it to the third party.

    摘要翻译: 提供系统和方法来管理电子文件的传输。 在一个实施例中,发送者将文件的加密版本(诸如数字编码的音轨,电影,文档等)传送给希望接收它的人。 接收器计算加密文件的散列,并将其发送到可信任的第三方。 受信任的第三方将由接收器计算的哈希与由发送者计算的另一个哈希进行比较。 如果两个哈希匹配,则第三方将文件解密密钥发送给接收者。 在一些实施例中,接收机还可以发送第三方支付信息,使得发送者,内容所有者和/或第三方可以在交易中为其角色支付。 在优选实施例中,一旦第三方已经确认接收者所承担的加密文件将正确解密,则第三方仅向第三方发送和/或使用支付信息。 在一些实施例中,发送者计算文件的加密版本的散列,并将其直接发送到第三方。 在其他实施例中,发送者使用与第三方相关联的密钥来加密该散列,并将加密的散列发送到接收者,接收者随后将其转发给第三方。

    Systems and Methods for Secure Transaction Management and Electronic Rights Protection
    5.
    发明申请
    Systems and Methods for Secure Transaction Management and Electronic Rights Protection 失效
    安全交易管理和电子版权保护的系统和方法

    公开(公告)号:US20110197285A1

    公开(公告)日:2011-08-11

    申请号:US13023415

    申请日:2011-02-08

    IPC分类号: G06F21/00

    摘要: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”

    摘要翻译: 本发明提供了用于安全交易管理和电子权利保护的系统和方法。 根据本发明装备的电子设备如电脑有助于确保仅以授权的方式访问和使用信息,并保持信息的完整性,可用性和/或机密性。 这种电子设备提供分布式虚拟分配环境(VDE),其可以执行安全的处理和控制链,例如控制和/或计量或以其他方式监视电子存储或传播信息的使用。 这样的虚拟分发环境可以用于保护电子商务和其他电子或电子促进交易中的各种参与者的权利。 分布式和其他操作系统,环境和架构,例如使用防篡改的基于硬件的处理器的那些,可以在每个节点建立安全性。 这些技术可以用于支持全电子信息分发,例如利用“电子公路”。

    Systems and methods for pricing and selling digital goods
    6.
    发明授权
    Systems and methods for pricing and selling digital goods 有权
    数字商品定价和销售的系统和方法

    公开(公告)号:US07933829B2

    公开(公告)日:2011-04-26

    申请号:US11262209

    申请日:2005-10-28

    IPC分类号: G06Q40/00

    CPC分类号: G06Q30/06 G06Q30/08 G06Q40/04

    摘要: Some of the embodiments provided herein disclose receiving a plurality of bids, each bid being submitted by a bidder, and each bid having a bid value; assigning a weighting factor to each bid, the weighting factor being based, at least in part, on the bid value; selecting a first bid from the plurality of bids, the first bid having been submitted by a first bidder; selecting a second bid from the plurality of bids, the second bid being selected in a manner that is dependent, at least in part, on the weighting factor assigned to the second bid; performing a comparison of the value of the first bid with the value of the second bid; using the results of the comparison to determine whether to vend a copy of the digital file to the first bidder; and sending a copy of the digital file to the first bidder.

    摘要翻译: 本文提供的一些实施例公开接收多个投标,每个出价由投标人提交,并且每个投标具有投标价值; 为每个投标分配加权因子,加权因子至少部分地基于投标价值; 从所述多个投标中选择第一投标,所述第一投标由第一投标人提交; 从所述多个投标中选择第二投标,所述第二投标以至少部分依赖于分配给所述第二投标的加权因子的方式进行选择; 执行第一出价的价值与第二投标价值的比较; 使用比较的结果来确定是否将数字文件的副本提交给第一投标人; 并将数字文件的副本发送给第一个投标人。

    Software Self-Defense Systems and Methods
    9.
    发明申请
    Software Self-Defense Systems and Methods 有权
    软件自卫系统与方法

    公开(公告)号:US20110035733A1

    公开(公告)日:2011-02-10

    申请号:US12854685

    申请日:2010-08-11

    IPC分类号: G06F9/45 G06F12/14

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。

    Methods and Systems for Encoding and Protecting Data Using Digital Signature and Watermarking Techniques
    10.
    发明申请
    Methods and Systems for Encoding and Protecting Data Using Digital Signature and Watermarking Techniques 有权
    使用数字签名和水印技术对数据进行编码和保护的方法和系统

    公开(公告)号:US20100235650A1

    公开(公告)日:2010-09-16

    申请号:US12788118

    申请日:2010-05-26

    IPC分类号: G06F12/14

    摘要: Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark. If the strong watermark is found, further use of the signal is inhibited, as the presence of the strong watermark, in combination with the absence or corruption of the signature-containing watermark, provides evidence that the signal has been improperly modified. If, on the other hand, the strong mark is not found, further use of the data signal can be allowed, as the absence of the strong mark indicates that the data signal was never registered with the signature-containing watermark.

    摘要翻译: 提供了系统和方法,用于保护和管理根据预定编码方案注册的电子数据信号,同时允许访问未注册的数据信号。 在一个实施例中,相对难以移除的易于检测的强水印被插入到数据信号中。 数据信号被分成块序列,每个块的数字签名通过水印被嵌入在信号中。 然后将数据信号存储并分布在例如光盘,DVD等上。 当用户尝试访问或使用数据信号的一部分时,检查信号是否存在包含用于信号的期望部分的数字签名的水印。 如果发现水印,则提取数字签名并用于验证信号所需部分的真实性。 如果没有找到包含签名的水印,则检查该信号是否存在强水印。 如果发现强水印,则抑制了信号的进一步使用,因为强水印的存在与含签名的水印的不存在或破坏相结合,提供了信号被不正确地修改的证据。 另一方面,如果没有发现强标记,则可以允许进一步使用数据信号,因为没有强标记表示数据信号从未向含有签名的水印注册。