최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0696659 (2003-10-28) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 105 인용 특허 : 442 |
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway."
We claim: 1. A method for auditing access to, or other use of, a digital object at a first computer system, the method comprising: obtaining a request to access or otherwise use the digital object; granting the request to access or otherwise use the digital object in accordance with one or more rul
We claim: 1. A method for auditing access to, or other use of, a digital object at a first computer system, the method comprising: obtaining a request to access or otherwise use the digital object; granting the request to access or otherwise use the digital object in accordance with one or more rules associated with the digital object; storing audit information relating to the access or other use of the digital object; and determining that at least a predefined amount of audit information has been stored, and sending at least part of the stored audit information to another computer system remote from the first computer system. 2. The method of claim 1, in which at least one of the one or more rules includes an indication of a number of times that the digital object is allowed to be accessed or otherwise used. 3. The method of claim 2, further comprising: in response to obtaining the request to access or otherwise use the digital object, determining whether the request could be granted without exceeding the number of times that the digital object is allowed to be accessed or otherwise used. 4. The method of claim 3, in which determining whether the request could be granted without exceeding the number of times that the digital object is allowed to be accessed or otherwise used includes: accessing previously stored audit information, the previously stored audit information containing an indication of a number of times the digital object has been accessed or otherwise used. 5. The method of claim 1, in which storing audit information relating to the access or other use of the digital object comprises creating an audit record containing information relating to the access or other use of the digital object, and storing the audit record in a database containing one or more other audit records, the one or more other audit records containing information relating to one or more other accesses or other uses of the digital object. 6. The method of claim 5, in which determining that at least a predefined amount of audit information has been stored comprises determining that the database contains at least a predefined number of audit records. 7. The method of claim 1, in which storing audit information relating to the access or other use of the digital object comprises creating an audit record containing information relating to the access or other use of the digital object, and storing the audit record in a database containing one or more other audit records, the one or more other audit records containing information relating to one or more other accesses or other uses of the digital object or one or more other digital objects. 8. The method of claim 7, in which determining that at least a predefined amount of audit information has been stored comprises determining that the database contains at least a predefined number of audit records. 9. The method of claim 1, in which storing audit information relating to the access or other use of the digital object comprises creating an audit record containing information relating to the access or other use of the digital object, and storing the audit record. 10. The method of claim 9, in which determining that at least a predefined amount of audit information has been stored comprises determining that at least a predefined number of audit records have been stored. 11. The method of claim 1, in which storing audit information relating to the access or other use of the digital object comprises updating previously stored audit information. 12. The method of claim 11, in which determining that at least a predefined amount of audit information has been stored comprises determining that the previously stored audit information has been updated at least a predefined number of times. 13. The method of claim 11, in which determining that at least a predefined amount of audit information has been stored comprises determining that the stored audit information exceeds a predefined size. 14. The method of claim 1, in which the remote computer system comprises a clearinghouse. 15. The method of claim 1, in which the remote computer system comprises a computer system associated with a creator of the digital object. 16. The method of claim 1, in which the remote computer system Comprises a computer system associated with a distributor of the digital object. 17. The method of claim 1, in which the digital object is encrypted, and in which granting the request to access or otherwise use the digital object comprises decrypting the digital object. 18. The method of claim 1, in which the request to access or otherwise use the digital object comprises a request to open the digital object. 19. The method of claim 1, in which the digital object comprises digitally recorded music, and in which the request to access or otherwise use the digital object comprises a request to play the music through one or more speakers. 20. The method of claim 1, in which the digital object comprises digitally recorded video content, and in which the request to access or otherwise use the digital object comprises a request to play the video content. 21. The method of claim 1, in which the digital object comprises textual content, and in which the request to access or otherwise use the digital object comprises a request to display at least part of the textual content on a computer screen. 22. The method of claim 21, in which the audit information relating to the access or other use of the digital object comprises an indication of a quantity of textual content that was displayed. 23. The method of claim 21, in which the audit information relating to the access or other use of the digital object comprises an indication of a length of time the textual content was displayed. 24. The method of claim 1, in which the digital object comprises textual content, and in which the request to access or otherwise use the digital object comprises a request to print at least part of the textual content. 25. The method of claim 1, further comprising: deleting the stored audit information from the first computer system. 26. The method of claim 1, further comprising: receiving a communication from the remote computer system, the communication being operable to cause at least some functionality at the first computer system to be disabled. 27. The method of claim 26, in which the communication from the remote computer system is sent in response to said remote computer system receiving said at least part of the stored audit information. 28. The method of claim 1, further comprising: receiving a communication from the remote computer system, the communication being operable to disable further use of the digital object at the first computer system. 29. A computer program product embodied on a computer readable medium, the computer program product including instructions that, when executed by a computer system, are operable to cause the computer system to perform actions comprising: obtaining a request to access or otherwise use a digital object; granting the request to access or otherwise use the digital object in accordance with one or more rules associated with the digital object; storing audit information relating to the access or other use of the digital object; and determining that at least a predefined amount of audit information has been stored, and sending at least part of the stored audit information to a remote computer system. 30. The computer program product of claim 29, in which at least one of the one or more rules includes an indication of a number of times that the digital object is allowed to be accessed or otherwise used. 31. The computer program product of claim 30, further including instructions operable to cause the computer system to perform actions comprising: in response to obtaining the request to access or otherwise use the digital object, determining whether the request could be granted without exceeding the number of times that the digital object is allowed to be accessed or otherwise used. 32. The computer program product of claim 31, in which determining whether the request could be granted without exceeding the number of times that the digital object is allowed to be accessed or otherwise used includes: accessing previously stored audit information, the previously stored audit information containing an indication of a number of times the digital object has been accessed or otherwise used. 33. The computer program product of claim 29, further including instructions operable to cause the computer system to perform actions comprising: deleting the stored audit information.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.