최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0157061 (2002-05-30) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 73 인용 특허 : 329 |
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway."
We claim: 1. A method by which two entities, a first entity seeking rights to information and a second entity owning rights to the information, electronically bargain toward an agreement concerning the information, the method comprising: generating a first control set representing initial terms off
We claim: 1. A method by which two entities, a first entity seeking rights to information and a second entity owning rights to the information, electronically bargain toward an agreement concerning the information, the method comprising: generating a first control set representing initial terms offered by the first entity in exchange for obtaining rights to the information, the first control set specifying, at least in part, desired privacy requirements; generating a second control set representing initial terms that the second entity is willing to accept in exchange for granting rights to the information, wherein the second entity rejects at least one of the initial terms of the first control set and proposes at least one alternative term to the first entity; generating a third control set of agreed upon terms; and granting rights to the information to the first entity in accordance with the terms of the third control set. 2. The method of claim 1, wherein the first entity is part of one organization and the second entity is part of an unrelated organization. 3. The method of claim 1, further comprising: digitally signing the first control set with a digital signature of the first entity. 4. The method of claim 3, wherein the digital signature includes a time stamp indicating at least a time of offer. 5. The method of claim 1, further comprising: digitally signing the second control set with a digital signature of the second entity. 6. The method of claim 5, wherein the digital signature includes a time stamp indicating at least a time of counteroffer. 7. The method of claim 1, further comprising: digitally signing the third control set. 8. The method of claim 7, wherein the digital signature on the third control set includes a time stamp indicating at least a time of generation of the third control set. 9. The method of claim 1, wherein the information is selected from the group consisting of: software, one or more electronic documents, digitally encoded audio content, and digitally encoded video content. 10. A method for securely performing an electronic transaction involving the transfer of rights to information, the method comprising: accessing a first control set that a first party desires to govern the transaction, the first control set including at least a first term relating to the scope of rights sought by the first party and a second term relating to the withholding of private information of the first party; accessing a second control set that a second party desires to govern the transaction, the second control set including at least a first term relating to the scone of rights the second party is willing to give and a second term relating to the collection of private information of the first party; comparing one or more terms of the first control set with one or more terms of the second control set as part of a bargaining process through which terms and conditions acceptable to each party are identified wherein, during the bargaining process, the second party proposes one or more alternative terms under which the second party would charge an additional amount for the information in exchange for collecting a lesser amount of private information from the first party; and creating a third control set that is acceptable to each party, the third control set including at least a first term relating to the scone of rights granted to the first party and a second term relating to the collection of private information of the first party, the third control set being operable to govern at least one aspect of the first party's access to, or use of, the information. 11. The method of claim 10, wherein the first control set is created at a first electronic appliance associated with the first party, and the second control set is created at a second electronic appliance associated with the second party. 12. The method of claim 10, wherein the first party and the second party are part of the same organization. 13. A method for electronically controlling use of a first entity's personal information, the method comprising: (a) receiving a first set of one or more electronic terms, said first set of terms indicating one or more acceptable uses of one or more pieces of the first entity's personal information; (b) receiving a second set of one or more electronic terms, said second set of terms indicating one or more desired uses of one or more pieces of the first entity's personal information; (c) comparing, at least in part, the first set of terms with the second set of terms; and (d) electronically authorizing at least one of said desired uses of one or more pieces of the first entity's personal information, the authorized use corresponding to one or more of said acceptable uses. 14. A method as in claim 13, wherein at least one of said acceptable uses comprises electronically collecting a predefined piece of the first entity's personal information. 15. A method as in claim 14, wherein the predefined piece of the first entity's personal information comprises information regarding the first entity's access to, or use of a piece of electronic content. 16. A method as in claim 13, wherein steps (a) through (d) are performed within a tamper-resistant environment at a site associated with the first entity. 17. A method as in claim 13, wherein steps (a) through (d) are performed by a process at a site associated with a second entity, and wherein step (b) comprises receiving the second set of terms from a memory unit at the second entity's site. 18. A method as in claim 13, wherein steps (a) through (d) are performed at a site associated with a trusted third party, and wherein step (a) comprises securely receiving the first set of terms from a remote site associated with the first entity, and step (b) comprises securely receiving the second set of terms from a remote site associated with a second entity. 19. A method as in claim 13, further comprising: (c)(1) generating an electronic control set, the electronic control set being operable to facilitate enforcement of at least one term contained in both the first set of terms and the second set of terms, the electronic control set governing, at least in part, the performance of said authorizing step. 20. A method as in claim 19, further comprising: (c)(2) recording the electronic control set in a substantially non-repudiatable form. 21. A method as in claim 20, wherein recording the electronic control set in a substantially non-repudiatable form comprises digitally signing the electronic control set with at least one digital signature. 22. A method as in claim 21, wherein said at least one digital signature comprises a digital signature of the first entity. 23. A method as in claim 13, wherein steps (a) through (d) are performed in the order recited. 24. A computer program package for electronically negotiating terms of an electronic agreement between a first entity controlling information and a second entity seeking access to the information, the computer program package providing instructions which, if executed by a computer system, cause the system to perform operations comprising: (a) receiving a first set of one or more electronic terms, said first set of terms indicating one or more acceptable uses of one or more pieces of the first entity's personal information; (b) receiving a second set of one or more electronic terms, said second set of terms indicating one or more desired uses of one or more pieces of the first entity's personal information; (c) comparing, at least in part, the first set of terms with the second set of terms; and (d) electronically authorizing at least one of said desired uses of one or more pieces of the first entity's personal information, the authorized use corresponding to one or more of said acceptable uses. 25. The computer program package of claim 24, wherein at least one of said acceptable uses comprises electronically collecting a predefined piece of the first entity's personal information. 26. The computer program package of claim 25, wherein the predefined piece of the first entity's personal information comprises information regarding the first entity's access to, or use of, a piece of electronic content. 27. The computer program package of claim 24, wherein steps (a) through (d) are performed within a tamper-resistant environment at a site associated with the first entity. 28. The computer program package of claim 24, wherein steps (a) through (d) are performed by a process at a site associated with a second entity, and wherein step (b) comprises receiving the second set of terms from a memory unit at the second entity's site. 29. The computer program package of claim 24, wherein steps (a) through (d) are performed at a site associated with a trusted third party, and wherein step (a) comprises securely receiving the first set of terms from a remote site associated with the first entity, and step (b) comprises securely receiving the second set of terms from a remote site associated with a second entity. 30. The computer program package of claim 24, further comprising: (c)(1) generating an electronic control set, the electronic control set being operable to facilitate enforcement of at least one term contained in both the first set of terms and the second set of terms, the electronic control set governing, at least in part, the performance of said authorizing step. 31. The computer program package of claim 30, further comprising: (c)(2) recording the electronic control set in a substantially non-repudiatable form. 32. The computer program package of claim 31, wherein recording the electronic control set in a substantially non-repudiatable form comprises digitally signing the electronic control set with at least one digital signature. 33. The computer program package of claim 32, wherein said at least one digital signature comprises a digital signature of the first entity. 34. The computer program package of claim 24, wherein steps (a) through (d) are performed in the order recited. 35. A computer program package for electronically negotiating terms of an electronic agreement between a first entity controlling information and a second entity seeking access to the information, the computer program package providing instructions which, if executed by a computer system, cause the system to perform operations comprising: generating a first control set representing initial terms offered by the first entity in exchange for obtaining rights to the information, the first control set specifying, at least in part, desired privacy requirements; generating a second control set representing initial terms that the second entity is willing to accept in exchange for granting rights to the information; wherein the second entity rejects at least one of the initial terms of the first control set and proposes at least one alternative term to the first entity; generating a third control set of agreed upon terms; and granting rights to the information to the first entity in accordance with the terms of the third control set. 36. The computer program package of claim 35, wherein the first entity is part of one organization and the second entity is part of an unrelated organization. 37. The computer program package of claim 35, further comprising: digitally signing the first control set with a digital signature of the first entity. 38. The computer program package of claim 37, wherein the digital signature includes a time stamp indicating at least a time of offer. 39. The computer program package of claim 35, further comprising: digitally signing the second control set with a digital signature of the second entity. 40. The computer program package claim 39, wherein the digital signature includes a time stamp indicating at least a time of counteroffer. 41. The computer program package of claim 35, further comprising: digitally signing the third control set. 42. The computer program package of claim 41, wherein the digital signature on the third control set includes a time stamp indicating at least a time of generation of the third control set. 43. The computer program package of claim 35, wherein the information is selected from the group consisting of: software, one or more electronic documents, digitally encoded audio content, and digitally encoded video content.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.