Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach a
Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.
대표청구항▼
1. A method for managing the use of protected electronic content by a rights management application executing on a computing device, the method comprising: receiving, by the rights management application from a rendering application, a request to use the protected electronic content;identifying one
1. A method for managing the use of protected electronic content by a rights management application executing on a computing device, the method comprising: receiving, by the rights management application from a rendering application, a request to use the protected electronic content;identifying one or more first rules securely associated with the protected electronic content specifying at least one first condition for use of the protected electronic content, the one or more first rules being specified by a first entity, the at least one first condition comprising a condition that the rendering application be configured to verify that the protected electronic content has been approved by a third-party entity prior to rendering the protected electronic content;determining that the at least one first condition has been satisfied;identifying one or more second rules associated with the rendering application specifying at least one second condition for use of the protected electronic content by the rendering application, the one or more second rules being specified by a second entity and being received by the rights management application separate from the one or more first rules, the at least one second condition comprising a condition that the rendering application possess a first credential issued by a first credentialing authority;determining that the at least one second condition has been satisfied;sending, by the rights management application to the rendering application, the protected electronic content; andrendering the protected electronic content by the rendering application. 2. The method of claim 1, wherein the one or more first rules are securely packaged with the protected electronic content. 3. The method of claim 1, wherein the at least one first condition further comprises a condition that a user of the rendering application has purchased the rights to use the protected electronic content. 4. The method of claim 1, wherein the at least one first condition and the at least one second condition are, at least in part, different. 5. The method of claim 1, wherein the at least one second condition comprises a condition that the protected electronic content be approved by the third-party entity. 6. The method of claim 1, wherein the protected electronic content comprises electronic content stored in protected storage managed by the digital rights management application. 7. The method of claim 1, wherein the protected electronic content comprises electronic content stored in unprotected storage encrypted with a protected key. 8. The method of claim 1, wherein sending the protected electronic content comprises: decrypting the protected electronic content; andsending the decrypted protected electronic content to the rendering application. 9. The method of claim 1, wherein determining that the at least one first condition has been satisfied comprises determining that the rendering application possesses a second credential issued by a second credentialing authority. 10. The method of claim 9, wherein the second credential issued by the second credentialing authority is issued based on the second credentialing authority validating that the rendering application meets a predefined level of security. 11. The method of claim 9, wherein the second credential comprises a second digital certificate issued by the second credentialing authority. 12. A non-transitory computer-readable storage medium storing instructions that, when executing by a processor of a computing system, are configured to cause the processor to: receive, by a rights management application from a rendering application, a request to use the protected electronic content;identify one or more first rules securely associated with the protected electronic content specifying at least one first condition for use of the protected electronic content, the one or more first rules being specified by a first entity, the at least one first condition comprising a condition that the rendering application be configured to verify that the protected electronic content has been approved by a third-party entity prior to rendering the protected electronic content;determine that the at least one first condition has been satisfied;identify one or more second rules associated with the rendering application specifying at least one second condition for use of the protected electronic content by the rendering application, the one or more second rules being specified by a second entity and being received by the rights management application separate from the one or more first rules, the at least one second condition comprising a condition that the rendering application possesses a first credential issued by a first credentialing authority;determine that the at least one second condition has been satisfied;send, by the rights management application to the rendering application, the protected electronic content; andrender the protected electronic content by the rendering application. 13. The non-transitory computer-readable storage medium of claim 12, wherein the one or more first rules are securely packaged with the protected electronic content. 14. The non-transitory computer-readable storage medium of claim 12, wherein determining that the at least one first condition has been satisfied comprises determining that the rendering application possesses a second credential issued by a second credentialing authority. 15. The non-transitory computer-readable storage medium of claim 14, wherein the second credential comprises a second digital certificate issued by the second credentialing authority. 16. The non-transitory computer-readable storage medium of claim 12, wherein the at least one first condition and the at least one second condition are, at least in part, different. 17. The non-transitory computer-readable storage medium of claim 12, wherein the at least one second condition comprises a condition that the protected electronic content be approved by third third-party entity. 18. The non-transitory computer-readable storage medium of claim 14, wherein the second credential issued by the second credentialing authority is issued based on the second credentialing authority validating that the rendering application meets a predefined level of security.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (52)
Puri Sunil ; Elder James W. ; Hunter William Clifford, Automatic file format converter.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Katzer, Robin D.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted access to third party applications systems and methods.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.