최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0440141 (2006-05-23) |
등록번호 | US-8543842 (2013-09-24) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 15 인용 특허 : 522 |
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
1. A method comprising: creating an electronic document at a first user's electronic appliance;at the first user's electronic appliance, securely associating first rule-based control information with the electronic document, the control information indicating that the electronic document may be used
1. A method comprising: creating an electronic document at a first user's electronic appliance;at the first user's electronic appliance, securely associating first rule-based control information with the electronic document, the control information indicating that the electronic document may be used only by one or more designated users and only in one or more authorized ways, the control information being configured to be enforced by one or both of tamper-resistant software and hardware;distributing the electronic document and the first control information to a second user's electronic appliance, the second user's electronic appliance comprising one or both of tamper-resistant software or hardware configured to govern use of electronic documents in accordance with the first control information;determining that the second user is one of said one or more designated users;receiving a request at the first user's electronic appliance from the second user's electronic appliance, the request seeking a modification to the first control information, and providing second control information that alters the one or more authorized ways in which the electronic document may be used; andsending a modified set of control information based on the first and the second control information to the second user's electronic appliance in response to the request;wherein the second user's electronic appliance is configured to securely enable the second user to make at least one use of the electronic document in accordance with the modified set of control information. 2. The method of claim 1, in which the modified set of control information indicates that the electronic document may be used by a set of designated users that differs at least in part from the one or more designated users. 3. The method of claim 1, in which the one or more designated users comprise a group of users, and in which the first control information identifies the group of users. 4. The method of claim 1, in which the first control information includes a requirement that a return receipt be sent to the first user from a recipient of the electronic document, the method further comprising: receiving a return receipt from the second user's electronic appliance at the first user's electronic appliance in accordance with the first control information. 5. The method of claim 1, in which the first control information specifies one or more auditing requirements. 6. The method of claim 5, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication of how the electronic document has been used. 7. The method of claim 5, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication if the electronic document has been printed by the recipient. 8. The method of claim 5, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication if the electronic document has been viewed by the recipient. 9. The method of claim 5, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication if the electronic document has been edited by the recipient. 10. The method of claim 1, in which the first control information specifies that certain or all information in the electronic document may be extracted by an authorized recipient. 11. The method of claim 1, in which the first control information specifies that the electronic document may be redistributed by an authorized recipient. 12. The method of claim 1, in which the at least one use comprises viewing the electronic document. 13. The method of claim 1, in which the at least one use comprises printing, copying, extracting text from, or embedding text within the electronic document. 14. The method of claim 1, in which the first control information is configured to govern at least two of the following uses of the electronic document: viewing the electronic document, printing the electronic document, copying the electronic document, or modifying the electronic document. 15. A method performed at a first user's electronic appliance, the method comprising: creating an electronic document;associating rule-based first control information with the electronic document, the first control information indicating that the electronic document may be used only by one or more designated users and only in one or more authorized ways, the first control information being configured to be enforced by one or both of tamper-resistant software and hardware to govern use of the electronic document;determining that a second user is one of said one or more designated users;distributing the electronic document and the first control information to the second user's electronic appliance;receiving a request from the second user's electronic appliance, the request seeking a modification to the first control information and providing additional control information configured to authorize at least one additional use of the electronic document not authorized by the first control information; andsending a modified set of control information based on the first and the additional control information to the second user's electronic appliance in response to the request. 16. The method of claim 15, in which the first control information includes a requirement that a return receipt be sent to the first user from a recipient of the electronic document, the method further comprising: receiving a return receipt from the second user's electronic appliance in accordance with the first control information. 17. The method of claim 15, in which the first control information specifies one or more auditing requirements, the method further comprising: receiving auditing information generated at the second user's electronic appliance in compliance with the auditing requirements. 18. The method of claim 17, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication of how the electronic document has been used. 19. The method of claim 17, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication if the electronic document has been printed by the recipient. 20. The method of claim 17, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication if the electronic document has been viewed by the recipient. 21. The method of claim 17, in which the one or more auditing requirements include a requirement that a recipient of the electronic document send an indication if the electronic document has been edited by the recipient. 22. A method comprising: creating an electronic document at a first user's electronic appliance;at the first user's electronic appliance, securely associating rule-based first control information with the electronic document, the control information indicating that the electronic document may be used only in one or more authorized ways, the control information being configured to be enforced by one or both of tamper-resistant software and hardware;distributing the electronic document and the first control information to a second user's electronic appliance;receiving a request at the first user's electronic appliance from the second user's electronic appliance, the request seeking a modification to the first control information, and providing second control information that alters the one or more authorized ways in which the electronic document may be used; andsending a modified set of control information based on the first and the second control information in response to the request;wherein the second user's electronic appliance includes one or both of tamper-resistant software and hardware that is configured to securely enable the second user to make at least one use of the electronic document in accordance with the modified set of control information. 23. The method of claim 22, in which, the one or more authorized ways comprises at least two of the following: viewing the electronic document, printing the electronic document, copying the electronic document, or modifying the electronic document. 24. The method of claim 22, in which the first control information specifies that the electronic document may be redistributed by an authorized recipient.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.