scispace - formally typeset
Patent

Systems and Methods for Secure Transaction Management and Electronic Rights Protection

Reads0
Chats0
TLDR
In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Abstract
PROBLEM TO BE SOLVED: To solve the problem, wherein it is impossible for an electronic content information provider to provide commercially secure and effective method, for a configurable general-purpose electronic commercial transaction/distribution control system. SOLUTION: In this system, having at least one protected processing environment for safely controlling at least one portion of decoding of digital information, a secure content distribution method comprises a process for encapsulating digital information in one or more digital containers; a process for encrypting at least a portion of digital information; a process for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container; a process for delivering one or more digital containers to a digital information user; and a process for using a protected processing environment, for safely controlling at least a portion of the decoding of the digital information. COPYRIGHT: (C)2006,JPO&NCIPI

read more

Citations
More filters
Patent

Technology sharing during demand and supply planning in a network-based supply chain environment

TL;DR: In this article, a system, method, and article of manufacture are provided for technology sharing during demand and supply planning in a network-based supply chain environment, and steps included are providing locator and mapping capabilities utilizing the network.
Patent

Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information

TL;DR: In this article, a matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting process, non-limiting examples of which include software objects.
Patent

Method and apparatus for serving files to browsing clients

TL;DR: In this paper, requests from browsing clients are identified which contain information relating to the data itself and the display format for the data, and the data is read and processed so as to combine a representation of the viewable data with executable instructions.
Patent

Data security system and method for separation of user communities

TL;DR: In this paper, a distributed storage system and a compiler is used to reconstruct plaintext based on security clearance for the community of the inquiring party. But full or partial plaintext reconstruction is permitted only in the presence of assigned security clearance.
Patent

System and method for managing copyrighted electronic media

TL;DR: In this article, the authors present a system for the management of copyright-preserving electronic media in a secure electronic format and registered on associated registration server, which serves to provide on-line licensing and copyright management for that media.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Recommender systems

TL;DR: This special section includes descriptions of five recommender systems, which provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients, and which combine evaluations with content analysis.
Book

An Introduction to Database Systems

C. J. Date
TL;DR: Readers of this book will gain a strong working knowledge of the overall structure, concepts, and objectives of database systems and will become familiar with the theoretical principles underlying the construction of such systems.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.