Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
Reads0
Chats0
TLDR
In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.Abstract:
PROBLEM TO BE SOLVED: To solve the problem, wherein it is impossible for an electronic content information provider to provide commercially secure and effective method, for a configurable general-purpose electronic commercial transaction/distribution control system. SOLUTION: In this system, having at least one protected processing environment for safely controlling at least one portion of decoding of digital information, a secure content distribution method comprises a process for encapsulating digital information in one or more digital containers; a process for encrypting at least a portion of digital information; a process for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container; a process for delivering one or more digital containers to a digital information user; and a process for using a protected processing environment, for safely controlling at least a portion of the decoding of the digital information. COPYRIGHT: (C)2006,JPO&NCIPIread more
Citations
More filters
Patent
Technology sharing during demand and supply planning in a network-based supply chain environment
TL;DR: In this article, a system, method, and article of manufacture are provided for technology sharing during demand and supply planning in a network-based supply chain environment, and steps included are providing locator and mapping capabilities utilizing the network.
Patent
Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
TL;DR: In this article, a matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting process, non-limiting examples of which include software objects.
Patent
Method and apparatus for serving files to browsing clients
TL;DR: In this paper, requests from browsing clients are identified which contain information relating to the data itself and the display format for the data, and the data is read and processed so as to combine a representation of the viewable data with executable instructions.
Patent
Data security system and method for separation of user communities
Ron M. Redlich,Martin A. Nemzow +1 more
TL;DR: In this paper, a distributed storage system and a compiler is used to reconstruct plaintext based on security clearance for the community of the inquiring party. But full or partial plaintext reconstruction is permitted only in the presence of assigned security clearance.
Patent
System and method for managing copyrighted electronic media
TL;DR: In this article, the authors present a system for the management of copyright-preserving electronic media in a secure electronic format and registered on associated registration server, which serves to provide on-line licensing and copyright management for that media.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI
Recommender systems
Paul Resnick,Hal R. Varian +1 more
TL;DR: This special section includes descriptions of five recommender systems, which provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients, and which combine evaluations with content analysis.
Book
An Introduction to Database Systems
TL;DR: Readers of this book will gain a strong working knowledge of the overall structure, concepts, and objectives of database systems and will become familiar with the theoretical principles underlying the construction of such systems.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.