최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0328668 (1999-06-09) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 203 인용 특허 : 411 |
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway".
We claim: 1. A method for processing based on independent deliverables comprising: delivering a first piece of executable code representing a first part of a commercial process, said commercial process involving a governed item, said first piece of executable code being separate from said governed
We claim: 1. A method for processing based on independent deliverables comprising: delivering a first piece of executable code representing a first part of a commercial process, said commercial process involving a governed item, said first piece of executable code being separate from said governed item; separately delivering a second piece of executable code representing a second part of said commercial process, said second piece of executable code being separate from said governed item; ensuring the integrity of said first and second delivered pieces of executable code, by generating a first hash of at least a portion of said first piece of executable code and comparing said first hash with a first expected value, and by generating a second hash of at least a portion of said second piece of executable code and comparing said second hash with a second expected value; ensuring that a calling process has authorization to call said first and second delivered pieces of executable code by verifying the calling process's knowledge of a value of a first tag associated with said first piece of executable code and a value of a second tag associated with said second piece of executable code; and performing said process involving said governed item based at least in part on said first and second delivered executable code pieces, wherein said process includes recording information regarding at least one performance of at least a portion of said process. 2. The method of claim 1 wherein said first piece of code at least in part controls decrypting content. 3. The method of claim 1 further including securely and persistently associating at least one of said first and second executable code pieces with said process. 4. The method of claim 1 wherein at least said performing step is performed at an end user electronic appliance. 5. The method of claim 1 wherein the step of delivering said first piece of executable code comprises securely delivering said first piece of code from at least one remote location over a telecommunications link, and the step of delivering a second piece of executable code comprises securely delivering said second piece of code from the same or different remote location over the same or different telecommunications link. 6. The method of claim 1 wherein the performing step comprises executing said first and second delivered code pieces within the same secure processing environment. 7. The method of claim 1 further including combining said first and second code pieces to provide a combined executable. 8. The method of claim 1 wherein said performing step includes the step of putting said first and second executable code pieces together to at least in part define said process. 9. The method of claim 1 wherein said step of delivering said second piece of executable code is performed at a different time than said step of delivering said first piece of executable code. 10. The method of claim 1 wherein: said step of delivering a first piece of executable code comprises delivering said first piece of executable code to an arrangement at a user site comprising an input/output bus connecting a first electronic appliance with at least a second electronic appliance, said first electronic appliance including a first electrical connector connected to said input/output bus, said second electronic appliance including a second electrical connector connected to said input/output bus; said step of delivering a second piece of executable code comprises delivering said second piece of executable code to said arrangement at said user site; and said method further comprises establishing a secure transmission channel on said input/output bus, and transferring at least a portion of a data item over said secure transmission channel from said first electronic appliance to said second electronic appliance through said first and second connectors and said input/output bus. 11. The method of claim 1, in which the first tag and the second tag are at least in part encrypted. 12. The method of claim 1, in which the first tag is included in a header associated with said first piece of executable code, and in which the second tag is included in a header associated with said second piece of executable code. 13. The method of claim 11, in which the first tag is included in a header associated with said first piece of executable code, and in which the second tag is included in a header associated with said second piece of executable code. 14. The method of claim 12, in which verifying the calling process's knowledge of a value of the first tag and a value of the second tag comprises: decrypting the first tag to obtain the value of the first tag; comparing the value of the first tag with a first value provided by the calling process; decrypting the second tag to obtain the value of the second tag; and comparing the value of the second tag with a second value provided by the calling process. 15. The method of claim 14, in which the value of the first tag comprises a first random number having a predefined length, and in which the value of the second tag comprises a second random number having a predefined length.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.