Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach a
Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.
대표청구항▼
1. A method for managing the use of protected electronic content by a rights management application executing on a computing device, the method comprising: receiving, from a first application executing on the computing device, by a second application executing on the computing device, a request to u
1. A method for managing the use of protected electronic content by a rights management application executing on a computing device, the method comprising: receiving, from a first application executing on the computing device, by a second application executing on the computing device, a request to use the protected electronic content and a first credential associated with the first application;receiving, from the second application executing on the computing device by the rights management application, the request to use the protected content and a second credential associated with the second application;validating, by the rights management application, the second credential;sending, by the rights management application based on validating the second credential, the protected electronic content to the second application;validating, by the second application, the first credential; andsending, by the second application based on validating the first credential, the protected electronic content to the first application for use in accordance with the request. 2. The method of claim 1, wherein the first credential comprises a credential issued by a credentialing authority based on the credentialing authority validating that the first application meets a predefined level of security. 3. The method of claim 1, wherein the second credential comprises a credential issued by a credentialing authority based on the credentialing authority validating that the second application meets a predefined level of security. 4. The method of claim 1, wherein the request to use the protected electronic content comprises a request to render the protected electronic content. 5. The method of claim 1, wherein the request to use the protected electronic content comprises a request to receive a copy of the protected electronic content. 6. The method of claim 1, wherein the protected electronic content comprises electronic content stored in a protected storage managed by the rights management application. 7. The method of claim 1, wherein the protected electronic content comprises electronic content stored in unprotected storage encrypted with a protected key. 8. The method of claim 1, wherein the protected electronic content is associated with at least one control governing use of the protected electronic content. 9. The method of claim 8, wherein the at least one control requires possession of the first credential prior to allowing use of the protected electronic content. 10. The method of claim 9, wherein the at least one control is securely associated with the protected electronic content. 11. A non-transitory computer-readable storage medium storing instructions that, when executing by a processor of a computing system, are configured to cause the processor to: receive, from a first application executing on the computing system by a second application executing on the computing system, a request to use a piece of electronic content managed by a rights management application executing on the computing system and first credential associated with the first application;receive, from the second application executing on the computing device by the rights management application, the request to use the protected content and a second credential associated with the second application;validate, by the rights management application, the second credential;send, by the rights management application based on validating the second credential, the protected electronic content to the second application;validate, by the second application, the first credential; andsend, by the second application based on validating the first credential, the protected electronic content to the first application for use in accordance with the request. 12. The non-transitory computer-readable storage medium of claim 11, wherein the first credential comprises a credential issued by a credentialing authority based on the credentialing authority validating that the first application meets a predefined level of security. 13. The non-transitory computer-readable storage medium of claim 11, wherein the second credential comprises a credential issued by a credentialing authority based on the credentialing authority validating that the second application meets a predefined level of security. 14. The non-transitory computer-readable storage medium of claim 11, wherein the request to use the protected electronic content comprises a request to render the protected electronic content. 15. The non-transitory computer-readable storage medium of claim 11, wherein the request to use the protected electronic content comprises a request to receive a copy of the protected electronic content. 16. The non-transitory computer-readable storage medium of claim 11, wherein the protected electronic content comprises electronic content stored in a protected storage managed by the rights management application. 17. The non-transitory computer-readable storage medium of claim 11, wherein the protected electronic content comprises electronic content stored in unprotected storage encrypted with a protected key. 18. The non-transitory computer-readable storage medium of claim 11, wherein the protected electronic content is associated with at least one control governing use of the protected electronic content. 19. The non-transitory computer-readable storage medium of claim 18, wherein the at least one control requires possession of the first credential prior to allowing use of the protected electronic content. 20. The non-transitory computer-readable storage medium of claim 19, wherein the at least one control is securely associated with the protected electronic content.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (51)
Puri Sunil ; Elder James W. ; Hunter William Clifford, Automatic file format converter.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Katzer, Robin D.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted access to third party applications systems and methods.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.