The present invention provides systems and methods for transfering electronic information from one location to another such that only one original work exists at a given time. The methods and systems of the present invention allow distribution of originals without requiring a registration authority
The present invention provides systems and methods for transfering electronic information from one location to another such that only one original work exists at a given time. The methods and systems of the present invention allow distribution of originals without requiring a registration authority or other entity to vouch for what constitutes an "original" piece of information, thus reducing (or eliminating entirely) the need to centrally record changes in ownership each time originals change hands.
대표청구항▼
The invention claimed is: 1. A method of distributing from a sender's site to a receiver's site a first original electronic work, the first original electronic work having a securely and persistently associated first electronic attribute indicating that it is an original, the method comprising the
The invention claimed is: 1. A method of distributing from a sender's site to a receiver's site a first original electronic work, the first original electronic work having a securely and persistently associated first electronic attribute indicating that it is an original, the method comprising the steps of: (a) establishing communication between the sender's site and the receiver's site; (b) exchanging authentication information between the sender's site and the receiver's site; (c) creating, at the sender's site, a first copy of the first original electronic work and securely and persistently associating with the first copy a second electronic attribute indicating that it is a copy; (d) transmitting the first copy from the sender's site to the receiver's site; (e) sending a first acknowledgement from the receiver's site to the sender's site, the first acknowledgement indicating the receipt of the first copy by the receiver's site; (f) receiving, at the sender's site, the first acknowledgement, and, responsive thereto, changing the first electronic attribute to indicate that it is a copy, thereby creating a second copy of the first original electronic work; (g) sending an authorization from the sender's site to the receiver's site authorizing the receiver's site to change the second electronic attribute to indicate that it is an original; and (h) receiving the authorization at the receiver's site, and, responsive thereto, securely changing the second electronic attribute to indicate that it is an original, thereby creating a second original electronic work, wherein the first and second copies are prevented from being successfully passed off as original electronic works and the second electronic attribute associated with the first copy of the electronic work is configured to be authenticated independently by the receiver's site after receipt of the first copy by the receiver's site. 2. A method as in claim 1, further comprising: (i) sending a second acknowledgement from the receiver's site to the sender's site, the second acknowledgement indicating that the receiver successfully changed the second electronic attribute associated with the first copy to indicate that it is an original; and (j) receiving the second acknowledgement at the sender's site. 3. The method of claim 1, wherein the sender's site and the receiver's site each have protected computing environments, the protected computing environments being operable to substantially impede users of the sender's site or the receiver's site from successfully tampering with the first and second electronic attributes. 4. The method of claim 3, wherein the step of exchanging authentication information between the receiver's site and the sender's site includes exchanging information between the receiver's site and the sender's site regarding the presence or nature of the protected computing environments at the receiver's site and the sender's site. 5. The method of claim 1, further comprising: sending a second acknowledgement from the receiver's site to the sender's site, the second acknowledgement indicating that the receiver's site successfully changed the second electronic attribute associated with the first copy to indicate that it is an original; failing to receive the second acknowledgement at the senders site within a predetermined period of time following the sending of the authorization; and notifying a system administrator of said failure to receive the second acknowledgement. 6. The method of claim 1, wherein the receiver's site is operable to notify a system administrator if the receivers site fails to receive the authorization within a predetermined period of time following the sending of the first acknowledgement. 7. The method of claim 1, wherein the original electronic work is selected from the group consisting of:ebooks, music, documents, bearer bonds, currency, movies, and software. 8. The method of claim 1, wherein at most one electronic work with an electronic attribute indicating that it is an original exists at the sender's site and the receiver's site during the performance of steps (a) through (h). 9. A method of receiving a first copy of a first original electronic work at a receiver's site from a sender's site, the first copy having a first electronic attribute securely and persistently associated with it indicating, it is an copy, the first original electronic work being located at the sender's site, the method comprising the steps of: (a) establishing communication, by the receiver's site, with a sender's site; (b) exchanging authentication information, by the receiver's site, with the sender's site; (c) receiving, at the receiver's site, the first copy from the sender's site; (d) sending, by the receiver's site, a first acknowledgement to the sender's site, the first acknowledgement indicating the receipt of the first copy and directing the sender's site to change a second electronic attribute securely and persistently associated with the first original electronic work to indicate that is a copy, thereby creating a second copy of the first original electronic work; (e) receiving, at the receiver's site, authorization from the sender's site authorizing that the first electronic attribute associated with the first copy be changed to indicate that it is an original; and (f) securely changing, by the receiver's site, the first electronic attribute associated with the first copy to indicate that it is an original, thereby creating a second original electronic work, wherein the first and second copies are prevented from being successfully passed off as original electronic works and the first electronic attribute associated with the first copy is configured to be authenticated independently by the receiver's site after receipt of the first copy by the receiver's site. 10. A method as in claim 9, further comprising: (g) sending, by the receiver's site, a second acknowledgement to the receiver's site, the second acknowledgement indicating that the first electronic attribute associated with the first copy was changed to indicate that it is an original. 11. The method of claim 9, wherein the receiver's site has a protected computing environment, the protected computing environment being operable to substantially impede users of the receiver's site from successfully tampering with the first electronic attribute associated with the first copy. 12. The method of claim 11, wherein the step of exchanging authentication information includes exchanging information regarding the presence or nature of a protected computing environment at the sender's site and the protected computing environment at the receiver's site. 13. The method of claim 9, further comprising: sending, by the receiver's site, a second acknowledgement to the sender's site, the second acknowledgement indicating that the first electronic attribute associated with the first copy was changed to indicate that it is an original. 14. The method of claim 9, wherein the receiver's site is operable to notify a system administrator if the receiver's site fails to receive the authorization within a predetermined period of time following the sending of the first acknowledgement. 15. The method of claim 9, wherein the original electronic work is selected from the group consisting of:ebooks, music, documents, bearer bonds, currency, movies, and software. 16. The method of claim 9, wherein at most one electronic work with an electronic attribute indicating that it is an original exists at the sender's site and the receiver's site during the performance of steps (a) through (f). 17. A method of sending an original electronic work from a sender's site to a receiver's site, the method comprising the steps of: (a) establishing communication, by a sender's site, with a receiver's site; (b) exchanging authentication information, by the sender's site, with the receiver's site; (c) creating, at the sender's site, a first copy of a first original electronic work, and securely and persistently associating a first electronic attribute with the first copy indicating that it is a copy; (d) sending the first copy, by the sender's site, to the receiver's site; (e) receiving, at the sender's site, a first acknowledgement from the receiver's site, the first acknowledgement indicating the receipt of the first copy by the receiver's site, and, responsive thereto, changing a second electronic attribute associated with the first original electronic work to indicate that it is a copy, thereby creating a second copy of the first original electronic work; (f) sending, by the sender's site, an authorization to the receiver's site authorizing and directing the receiver's site to securely change the first electronic attribute associated with the first copy to indicate that it is an original, thereby creating a second original electronic work, wherein the first and second copies are prevented from being successfully passed off as original electronic works and the first electronic attribute associated with the first copy is configured to be authenticated independently by the receiver's site after receipt of the first copy by the receiver's site. 18. A method as in claim 17, further comprising: (g) receiving a second acknowledgement, at the sender's site, from the receiver's site, the second acknowledgement indicating that the receiver's site successfully changed the first electronic attribute associated with the first copy to indicate that it is an original. 19. The method of claim 17, wherein the sender's site has a protected computing environment, the protected computing environment being operable to substantially impede users of the sender's site from successfully tampering with the first and second electronic attributes. 20. The method of claim 19, wherein the step of exchanging authentication information includes exchanging information regarding the presence or nature of the protected computing environment at the sender's site and a protected computing environment at the receiver's site. 21. The method of claim 17, further comprising: receiving, at the sender's site, a second acknowledgement from the receiver's site, the second acknowledgement indicating that the receiver's site successfully changed the first electronic attribute associated with the first copy to indicate that it is an original; and notifying a system administrator if the second acknowledgement is not received from the receiver's site within a predetermined period of time. 22. The method of claim 17, wherein the original electronic work is selected from the group consisting of:ebooks, music, documents, bearer bonds, currency, movies, and software. 23. The method of claim 17, wherein at most one electronic work with an electronic attribute indicating that it is an original exists at the sender's site and the receiver's site during the performance of steps (a) through (f).
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Wulforst Howard E. (P.O. Box 60160 Reno NV 89506), Method and apparatus for transmitting verified copy of a document over distances and to substitute for original document.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Bisbee Stephen F. (Gibson Island MD) Trotter Douglas H. (Baltimore MD), System and method for electronic transmission storage and retrieval of authenticated documents.
Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Porzio, Matthew A.; Fieweger, James Andrew, Computerized method and system for managing a community facility in a networked secure collaborative exchange environment.
Porzio, Matthew A.; Fieweger, James Andrew, Computerized method and system for managing a community facility in a networked secure collaborative exchange environment.
Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
Ford, Christopher; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment.
Ford, Christopher Todd; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys.
Ford, Christopher Todd; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys.
Meyer, Jerry Lee; Durairaj, Sudhakar; Hakhinian, Mushegh, Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment.
Rebaud, Sylvain P.; Nagar, Niranjan; Bratton, Timothy R.; Ryan, Sean, Media service delivery system providing conditional access to media content from various client devices.
Rebaud, Sylvain P.; Nagar, Niranjan; Bratton, Timothy R.; Ryan, Sean, Media service delivery system providing conditional access to media content from various client devices.
Rebaud, Sylvain P.; Nagar, Niranjan; Bratton, Timothy R.; Ryan, Sean, Media service delivery system providing conditional access to media content from various client devices.
Hudson, Peter Michael Bruce; Muja, Marius Constantin, Methods and systems for verifying ownership of a physical work or facilitating access to an electronic resource associated with a physical work.
Fieweger, Andrew; Wadley, Matthew; Azzolino, Angela; Sassin, Michael, System and method for information delivery based on at least one self-declared user attribute.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.