The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway."
대표청구항▼
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway." , wherein step (a) further includes the step of: a1) selecting one of a plurality of customer service stations. 7. The method of claim 1, wherein step (a) further includes the step of: a1) determining a type of browser on a requesting computer. 8. The method of claim 1, wherein step (a) further includes the step of: a1) determining an operating system on a requesting computer. 9. The method of claim 1, wherein step (c) further includes the step of: c1) converting the voice response to a format compatible with a browser of a requesting computer. 10. The method of claim 1, wherein step (c) further includes the step of: c1) converting the voice response into a GSM format. 11. The method of claim 1, wherein step (d) further includes the steps of: d1) presenting the text response to an operator; d2) editing the text response. 12. The method of claim 1, wherein step (b) further includes the step of: b1) forwarding the query to a cellular telephone. 13. The method of claim 1, wherein step (b) further includes the step of: b1) forwarding the query to a personal digital assistant. 14. A customer service center, comprising: a server connected to a computer network containing a speech recognition system; a preferred format identification system used to determine if an audio player is WAV compatible, capable of operating on the server, the preferred format identification system providing an audio response in a WAV format when the audio player is WAV compatible; an operator station capable of connecting to the server; a microphone connected to the operator station; and a codec connected to the microphone and the operator station. 15. The customer service center of claim 14, wherein the operator station provides a plurality of standard responses. 16. The customer service center of claim 14, further including: a database connected to the server contain a plurality of preprogrammed responses. 17. The customer service center of claim 14, wherein the plurality of preprogrammed responses includes a plurality of voiced responses and a plurality of text responses. 18. The customer service center of claim 14, wherein the operator station is a computer. 19. The customer service center of claim 14, wherein the operator station is a digital cellular telephone. 20. The customer service center of claim 14, wherein the operator station is a personal digital assistant. 21. The customer service center of claim 14, wherein the codec converts a voice input into a GSM format. 22. A method of operating a customer service center, comprising the steps of: a) receiving a query over a computer network; b) selecting either a voice response or a standard response; c) when the standard response is selected, selecting one of a plurality of preprogrammed responses, the one of the plurality of preprogrammed responses including a voiced reply and a text reply; d) transmitting the voiced reply and the text reply to a requesting computer over the computer network; and e) playing the voice based response at a user computer without requiring a software plug-in. 23. The method of claim 22, wherein step (a) further includes the step of: a1) determining if a requesting computer speakers are on. 24. The method of claim 22, wherein step (a) further includes the step of: a1) receiving an audio query from a user over the computer network. 25. The method of claim 22, further including the steps of: f) when the voice response is selected, voicing a voiced statement; g) converting the voiced statement into a text statement; h) transmitting the text statement to the requesting computer. 26. The method of claim 25, further including the steps of: i) determining if a speaker of a user computer are on; j) when the speaker is on, transmitting the voiced statement. 27. The method of claim 25, further including the step of: i) storing the voiced statement in a database. 28. The method of claim 25, fur
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (9)
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
White James E. (San Carlos CA) Helgeson Christopher S. (Mountain View CA) Steedman Douglas A. (Mountain View CA), System and method for distributed computation based upon the movement, execution, and interaction of processes in a netw.
White James E. ; Helgeson Christopher S. ; Steedman Douglas A., System and method for distributed computation based upon the movement, execution, and interaction of processes in a network.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogenous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive processor for performing an operation with simple and complex units each comprising configurably interconnected heterogeneous elements.
Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
Kittilingal, Sudeep; Mandayam, Jayanth; Keidar, Ron, Apparatus and method for hardware-based secure data processing using buffer memory address range rules.
Kottilingal, Sudeep Ravi; Mandayam, Jayanth; Keidar, Ron, Apparatus and method for hardware-based secure data processing using buffer memory address range rules.
Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having fixed, application specific computational elements.
Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having heterogeneous computational elements.
Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
Heidari, Ghobad; Chang, Kuor Hsin; Master, Paul L.; Hogenauer, Eugene B.; Scheuermann, Walter James, Communications module, device, and method for implementing a system acquisition function.
Enokida, Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
Enokida,Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
Shankar, Narendar M.; Paksoy, Erdal, Electronic devices, information products, processes of manufacture and apparatus for enabling code decryption in a secure mode using decryption wrappers and key programming applications, and other structures.
Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
Banaugh, Michelle; Fry, Peggy J.; Potter, David; Wood, George Luis, Method and apparatus for integrated payments processing and decisioning for internet transactions.
Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
Master,Paul L.; Hogenauer,Eugene; Wu,Bicheng William; Chuang,Dan MingLun; Freeman Benson,Bjorn, Method, system and program for developing and scheduling adaptive integrated circuity and corresponding control or configuration information.
Foster, Eric M.; Lotspiech, Jeffrey B.; Pestoni, Florian; Plouffe, Jr., Wilfred E.; Schaffa, Frank A., Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient.
Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
Malat,Scott; Dussel,David; Black,Cheryl; Priolo,James; Murphy,Sharon; Marfleet,Jackie; Ross,Douglas W.; Herzog,Susan, Methods and systems for managing call reports for the financial services industry.
Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Tinker, Jeffrey Lee; MacLean, Charles Duncan; Ali, Hamid Shaheed; Hiar, Edward Charles; Rutman, Michael; Morten, Glenn A., Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network.
Choi, In-sung, Printing device capable of authorizing printing limitedly according to user level, printing system using the same and printing method thereof.
Choi, In-sung, Printing device capable of authorizing printing limitedly according to user level, printing system using the same and printing method thereof.
Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Hunter, Jamie; McMichael, Lonnie Dean; LaSalle, Derek Norman; Jacomet, Pierre; Paley, Mark Eliot; Kurien, Thekkthalackal Varugis; Cross, David B., System and method for protected operating system boot using state validation.
Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent O.; Lee, Kuang-chih; Vu, Diem Thanh; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent; Lee, Kuang-Chih; Vu, Diem; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent; Lee, Kuang-chih; Vu, Diem; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Morten, Glenn A.; Hiar, Edward Charles; Jacobs, Andre; Veres, James E.; Zhuk, Oscar V.; Tinker, Jeffrey Lee, Tamper prevention and detection for video provided over a network to a client.
Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
Raju, Ramalinga Reddiar Shanmuga; Jayawanth, Tumkur Vajramsetty; Sabarish, Manavasi Santhanam, Unique versatile executor engine which can interpret and execute transaction structures and information views to build information systems.
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
※ AI-Helper는 부적절한 답변을 할 수 있습니다.