최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0403536 (2006-04-12) |
등록번호 | US-8533851 (2013-09-10) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 21 인용 특허 : 522 |
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the “electronic highway.”
1. An electronic appliance comprising: a central processing unit;a secure processing unit; anda computer readable medium storing: protected electronic materials comprising protected digital content and an embedded signature; andcomputer readable instructions that, when executed by the secure process
1. An electronic appliance comprising: a central processing unit;a secure processing unit; anda computer readable medium storing: protected electronic materials comprising protected digital content and an embedded signature; andcomputer readable instructions that, when executed by the secure processing unit, are operable to: validate the embedded signature against a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, the information being hidden by being placed in a secret location, wherein validating the embedded signature comprises matching the embedded signature with the current signature, and wherein the secret location comprises one of: disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; anddeny use of the protected digital content when the embedded signature fails to validate against the current signature of the electronic appliance, wherein the computer readable instructions comprise a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance. 2. The electronic appliance of claim 1, in which the protected electronic materials further comprise software. 3. The electronic appliance of claim 1, in which the protected electronic materials further comprise rights management software for applying electronic permission information to govern use of the protected digital content. 4. The electronic appliance of claim 3, in which the current signature is derived, at least in part, from one or more of: firmware, a hash of ROM BIOS, a hash of a disk defect map, a network adapter address of the electronic appliance, information stored in non-volatile memory of the electronic appliance, and information stored in a root directory of a disk drive of the electronic appliance. 5. The electronic appliance of claim 1, further comprising firmware, and in which the current signature is derived, at least in part, from the firmware. 6. The electronic appliance of claim 1, further comprising a Read-Only Memory Basic Input/Output System (ROM BIOS), and in which the current signature is derived, at least in part, from the ROM BIOS. 7. The electronic appliance of claim 1, further comprising firmware, and in which the current signature is derived, at least in part, from a hash of the firmware. 8. The electronic appliance of claim 1, in which the current signature is derived, at least in part, from a hash of a disk defect map. 9. The electronic appliance of claim 1, in which the current signature is derived, at least in part, from a network adapter address of the electronic appliance. 10. The electronic appliance of claim 1, in which the current signature is derived, at least in part, from information stored in memory of the electronic appliance. 11. The electronic appliance of claim 1, in which the current signature is derived, at least in part, from information stored in a root directory of a disk drive of the electronic appliance. 12. The electronic appliance of claim 1, in which the protected electronic materials are encrypted, at least in part. 13. The electronic appliance of claim 1, in which the secure processing unit comprises a tamper-resistant housing, internal memory, and a processor. 14. A method performed by an electronic appliance comprising a central processing unit and a secure processing unit, the method comprising: transferring program control, by the central processing unit, to the secure processing unit;executing, by the secure processing unit, instructions from a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance;retrieving, by the secure processing unit, an embedded electronic appliance signature from a protected electronic item, wherein the signature is retrieved from one of: disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system;comparing, by the secure processing unit, the embedded electronic appliance signature with a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance; anddenying, by the secure processing unit, use of protected digital content included in the protected electronic item upon determining that the embedded electronic appliance signature does not match the current signature. 15. The method of claim 14, in which the protected electronic item further comprises a piece of software. 16. The method of claim 14, in which the protected electronic item further comprises rights management software for applying electronic permission information to govern use of the protected digital content. 17. The method of claim 16, in which the current signature is derived, at least in part, from one or more of: firmware, a hash of ROM BIOS, a hash of a disk defect map, a network adapter address of the electronic appliance, information stored in non-volatile memory of the electronic appliance, and information stored in a root directory of a disk drive of the electronic appliance. 18. The method of claim 14, in which the current signature is derived, at least in part, from firmware of the electronic appliance. 19. The method of claim 14, in which the current signature is derived, at least in part, from a hash of ROM BIOS of the electronic appliance. 20. The method of claim 14, in which the current signature is derived, at least in part, from a hash of an electronic appliance disk defect map. 21. The method of claim 14, in which the current signature is derived, at least in part, from a network adapter address of the electronic appliance. 22. The method of claim 14, in which the current signature is derived, at least in part, from information stored in memory of the electronic appliance. 23. The method of claim 14, in which the current signature is derived, at least in part, from information stored in a root directory of a disk drive of the electronic appliance. 24. The method of claim 14, in which the protected electronic item is encrypted, at least in part. 25. An electronic appliance comprising: a central processing unit;a secure processing unit comprising: a tamper-resistant housing;internal memory; anda processor;a computer readable medium storing: protected electronic materials;protected digital content;a previously determined signature; andcomputer readable instructions that, when executed by the secure processing unit, are operable to: validate the previously determined signature against a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, the information being hidden by being placed in a secret location, wherein validating the previously determined signature against the current signature comprises matching the previously determined signature with the current signature, and wherein the secret location comprises one of: disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; anddeny use of the protected digital content when the previously determined signature fails to validate against the current signature of the electronic appliance, wherein the computer readable instructions comprise a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance. 26. The electronic appliance of claim 25, further comprising firmware, and in which the current signature is derived, at least in part, from the firmware. 27. The electronic appliance of claim 25, further comprising ROM BIOS, and in which the current signature is derived, at least in part, from the ROM BIOS. 28. The electronic appliance of claim 25, in which the current signature is derived, at least in part, from a network adapter address of the electronic appliance. 29. The electronic appliance of claim 25, in which the current signature is derived, at least in part, from one or more of: a hash of firmware, a hash of ROM BIOS, a hash of a disk defect map, a network adapter address of the electronic appliance, information stored in memory of the electronic appliance, and information stored in a root directory of a disk drive of the electronic appliance. 30. A method performed by an electronic appliance comprising a central processing unit and a secure processing unit, the method comprising: transferring program control, by the central processing unit, to the secure processing unit;executing, by the secure processing unit, instructions from a plurality of instruction blocks whose execution flow is customized to a layout order of the instruction blocks particular to the electronic appliance;retrieving, by the secure processing unit, a previously determined electronic appliance signature associated with a protected electronic item;comparing, by the secure processing unit, the previously determined electronic appliance signature with a current signature of the electronic appliance, the current signature being derived at least in part from information unique to the electronic appliance, wherein the information is stored in one of: disk storage marked as damaged, disk storage that is otherwise reserved as an alternate for sectors marked as damaged, or unused storage in a file maintained by an operating system; anddenying, by the secure processing unit, use of protected digital content included in the protected electronic item upon determining that the previously determined signature does not match the current signature. 31. The method of claim 30, in which the protected electronic item further comprises rights management software for applying electronic permission information to govern use of the protected digital content. 32. The method of claim 31, in which the current signature is derived, at least in part, from firmware of the electronic appliance. 33. The method of claim 31, in which the current signature is derived, at least in part, from a network adapter address of the electronic appliance. 34. The method of claim 30, in which the current signature is derived, at least in part, from one or more of: firmware, a hash of ROM BIOS, a hash of a disk defect map, a network adapter address of the electronic appliance, information stored in non-volatile memory of the electronic appliance, and information stored in a root directory of a disk drive of the electronic appliance.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.