CN1716149A - Method for releasing using data from user station point to external station point - Google Patents

Method for releasing using data from user station point to external station point Download PDF

Info

Publication number
CN1716149A
CN1716149A CNA2005100790241A CN200510079024A CN1716149A CN 1716149 A CN1716149 A CN 1716149A CN A2005100790241 A CNA2005100790241 A CN A2005100790241A CN 200510079024 A CN200510079024 A CN 200510079024A CN 1716149 A CN1716149 A CN 1716149A
Authority
CN
China
Prior art keywords
service
consumer
government utility
payment
commercial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2005100790241A
Other languages
Chinese (zh)
Other versions
CN100339784C (en
Inventor
V·H·希尔
D·M·范韦
R·韦伯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intertrust Technologies Corp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intertrust Technologies Corp filed Critical Intertrust Technologies Corp
Publication of CN1716149A publication Critical patent/CN1716149A/en
Application granted granted Critical
Publication of CN100339784C publication Critical patent/CN100339784C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The method of issuing use data from the user's site to outer site includes the following steps: using digital information in the user's site; creating data relative to the said use; correlating the first control command with the said data; sending the data and the first control command to the first outer site; executing the first operation based on the requirement of the first control command with the data in the first outer site; transmitting the data including the first control command from the first outer site to the second outer site under the authorization of the first control command; and executing the second operation based one the requirement of the first control command with the data in the second site. In this way, the first control command may be correlated with the data in the first outer site and the second outer site and controlled with the said data.

Description

A kind of method of using data from the user's websites to exterior websites issue
The application be that September 4, application number in 1996 are 96180487.4 (world) applying date, denomination of invention divides an application for the application for a patent for invention of " trusted infrastructure that is used for secure e-business, electronic transaction, business processing control and robotization, Distributed Calculation and managing entitlement ".
Invention field
The present invention relates generally to modern computing and networks efficiency are brought into ideally the management and the support of electronic transaction, and further relate to a kind of security architecture that can carry out distributed credible management to ecommerce, especially a kind of method of using data from the user's websites to exterior websites issue.
These inventions relate more specifically to " distributed commercial government utility "-management and support ecommerce and the basis of other electronic transaction and pass based environment.
More particularly, these inventions relate generally to:
● ecommerce and the effective management and the support of communicating by letter;
● be used for electronic rights management and support service method and technology;
● be used for distributed management and support the technology and the device of service, these management and support service as secure electronic transaction management, electronic processing control and robotization and in electric network and/or virtual distributional environment or the removing function of across a network and/or virtual distributional environment; With and/or
● removing, control, robotization and other are managerial, framework and tenability, and the operation of make efficient in human digitization community, safety jointly, collecting commercial participant on a 50-50 basis becomes can and support this operation.
Background technology
The society of highly effective must have the resident who makes them can control essence that they participate in business and result's ability.Each community all needs these basic services, facilities and equipment:
● mail is transmitted in the post office,
● school provides education for children,
● highway division makes that the road is clear and keep good road conditions,
● fire department is responsible for fire extinguishing,
● Utilities Electric Co. provides electric power for family,
● telephone operator links together people and far and near electronic equipment and directory services is provided when you do not know correct number,
● bank guarantees the safety of wealth,
● CATV (cable television) and broadcasting station provide news and entertainment to family,
● discarded object is collected by environmental health department, and
● social service support is at the social policy of the population below the poverty line.
These and other important " backstage " management and support service that a foundation stone or basis are provided, make the facility of the modern life known to us and necessity become may and effective, and commercial runner is rotated reposefully.
Suppose that you want to buy bread at the bakery of this locality.It is busy that the baker need not do the institute relevant with making bread, because he can rely on support and management service that community provides.For example:
● the baker does not need to plant or pulverize the flour that cereal is produced toast bread.On the contrary, he can buy flour there from the supplier with the truck supply of material.
● same, the baker needn't plant or produce oil plant makes baking oven keep heat; Can provide with pipeline or canned form by the people of special production and supply oil plant.
● you can believe the cleanliness of local bakery greatly, because it has showed an examination notice, prove that it has obtained the inspection of local healthy department.
For guaranteeing that people can be compensated because of their effort, support and management service are also extremely important.For example:
● you and baker can believe safely that government safeguards that you take out the currency that is used to pay bread from wallet or wallet.
● if you use paying by check, and banking system will be deducted from your bank account with the money of check equivalent all through the night and pay bakery with money.
● if you are different banks with the bakery use, your check can be handled by a kind of " clearing house " system of robotization, and this system makes different banks can exchange check and handle the account transfer and return the check of leaving from account short of money between bank of account-efficiently.
● if bakery receives the Credit Card Payments mode, can improve the dirigibility of the modes of payments that adopts in exchange bakery product process, and increases client's facility and purchasing power.
On yardstick and scope, these are supported and management service all provides huge economy-make our economy more efficient.For example, these important supports and management service the baker can be concentrated on energy how to do preferably-make and baking bread.In its large-scale commercial baking box, make many bread by bakery and experienced baker, with in each family, toast separately bread respectively with oneself baking box, perhaps also toast bread and extract the oil plant and the exchange of bartering of toast bread institute palpus with the grower of cereal, for example compare with chicken exchange bread, more effective.As a result, you and bakery just can be finished purchase-transaction with credit card because you and bakery believe that all this payment system goes on well, and believe can as non-cash transaction efficiently, easily basis efficient " automatically " move.
Service need be managed and support to electronic communities
Formed a global electronic communities now.In CYBERSPACE, the participant of electronic communities need mould, control and carry out automatically their trading ability.They are badly in need of reliably, safety, support trusty and management service.
Increasing world commerce is undertaken by the electronics mode.Electric network huge, that connected the millions of computing machines in the whole world of Internet--become just day by day approach of business transaction.Having benefited from wieldy interface to a great extent (allows consumer's " click " project to begin to buy as those, finish a simple form then, credit card information is provided), Internet becomes the consumer just rapidly to commercial and commercial focus to business procurement.It is also just becoming various electronic assets and the sale of service and important " channel " of issue that comprises information, software, recreation and amusement.
Meanwhile, major company's use special use and public data network and their supplier and consumers get in touch.The driving that significantly and unfeelingly descended by calculated performance and network capabilities cost, the importance of ecommerce will be along with more and more computerize and increasing of the world.This brand-new electronic communities-it has ecommerce widely-just and brings huge, brand-new demand for e-management, support and " bank clearing " service.
This electronic communities is badly in need of a basis, to support commercial and the electronic transaction individual and contacts relation.On any important yardstick, ecommerce all need the third party support with one of the management service supplier reliably, efficiently, extendible, safe network and mechanism so that facilitate for the pith of process of exchange.For example:
● for the people of electronic communities contributed value requires seamless, mechanism efficiently, they can be compensated from they pay.
● to electronic communities vending articles or service providers need reliably, electronic fare payment system efficiently, be participant's service of themselves and other value chain.
● the buyer in the electronic market, though usually can not be careful the movable details behind of payment transaction, requirement and payments mechanism and monetary liabilities fulfillment have wieldy, Efficient and Flexible interface.
● at all electronics " content " (for example, represent the analog or digital information of literal, figure, film, animation, image, video, digitizing linear movement image, sound and recording, still image, computed in software machine program, data) in, for many kinds of Electronic Control processes, right holder needs safety, the mechanism of interoperability flexibly and widely, the business prototype that is used to manage their right and manages them comprises the payment and relevant use information of collecting their content of various uses when needed.
● even all each side all need a framework support service that also can keep reliable, trusted and safety when the business transaction phenomenal growth.
Therefore, a successful electronic transaction management and an important foundation stone of commercial affairs, be a whole set of management and support the exploitation and the operation of service, support these targets and be beneficial to generally be applicable to ecommerce more various, flexible, can expand and the appearance of business model efficiently.
People's such as Ginter No.08/388,107 U.S. Patent application have described a kind of comprehensive solution.
The above-mentioned U.S. Patent application No.08/388 that quotes, 107 (people such as Ginter) patent specification has been described relevant technologies, and that this technology provides is safe to developing, the ecommerce on the distributed basis of business and the useful uniqueness of managing entitlement and powerful ability.This application No.08/388,107 were abandoned afterwards, and the granted patent of its continuation application number is US Patent No.5,982,891.This technology can be when supporting existing business model and convention, makes many new, important commercial patterns and usage of trade become possibility in this part of ecommerce participant.
People's such as Ginter instructions has been described comprehensive overall system and many participatory approaches, technology, structure and schemes, make at Internet (Intranet) go up, inside, living room and the work-at-home of big little company indoor safe, distributed electronic business and managing entitlement become possibility efficiently.These technology, system and scheme are given ecommerce and electronic rights management, have brought unprecedented security, reliability, efficient and dirigibility.
People's such as Ginter patent specification is also described " information government utility "-support and managerial service, the network of facilities and equipment, for the wheel of ecommerce provides lubricant, supports the electronic transaction in this brand-new electronic communities.For example, people such as Ginter describe in detail widely and to support and the supplier of management service, are used for safe " virtual distributional environment " interface and provide support.These are supported and the management service supplier comprises:
● the deal maker
● operational analysis person
● accept the reporter
● create the reporter
● system administration manager
● License Proxy
● certification authority
● content and message library
● financial settlement institute
● consumer/author's login system
● template base
● the control structure storehouse
● payment system
● EFT (Electronic Funds Transfer), credit card, written accounting system, and
● receipt, reply, transaction and analysis review system.
Summary of the invention
The present invention is based upon on the basis of the solution of describing in the Ginter patent specification and is expanded
The present invention is based upon on the basis of the key concept of describing in people's such as Ginter the patent specification, simultaneously these inventions are expanded, with further raise the efficiency, dirigibility and ability.They provide the distributed electronic management and have supported the overlapping of service (" distributed business government utility ").In their preferred embodiment, they can utilize the advantage of other ability of describing in people's patent specifications such as " virtual distributional environment " and Ginter, and they are positioned at the top of these abilities and are expanded.
The present invention provides a series of integrated, modular management and services for the management of ecommerce and electronic rights and transaction.These management and support service, be engaged in Financial Management, managing entitlement, authorization identifying, rule clearing, use clearing, security catalog service and other and the relevant ability of concluding the business for what on huge electric network such as Internet and/or in-house Intranet even electrical equipment network at home, carry out, safe basis is provided.
These management and support service can adapt to the specific (special) requirements of ecommerce value chain.The participant of ecommerce can use these management and support service, keeps their interests, and can and reuse these services according to emulative commercial reality adjustment.
The invention provides " distributed electronic business government utility " system, management is provided and supports service with safety, programmable distributed frame.This distributed electronic business government utility can be optimized effectively and utilizes the commercial management resource, and can expand according to actual conditions, to satisfy the requirement that ecommerce is grown up.
This distributed electronic business government utility can comprise some commercial government utilities system.These commercial government utility systems provide one can be whole electronic communities and/or they are many and/or all participants utilize and reusable framework support net.
Can different support functions be concentrated in together by hierarchy and/or networking relation, to adapt to various business models and/or other target.Can the modularization support function be combined with the form of different arrays, for different design implementations and purpose form different commercial government utility system.These commercial government utility systems can be distributed in a large amount of electrical equipment by various distributed degrees.
Comprehensively " distributed commercial government utility " system provided by the present invention comprises:
● make actual effectively ecommerce and managing entitlement become possibility.
● the service of managing safely and supporting electronic reciprocal effect and result is provided.
● for the human electronic transaction and the mutual relationship of ecommerce and other form provides framework.
● optimize and utilize modern Distributed Calculation and networks efficiency.
● automatic electronic and distributed treatment are provided.
● the ecommerce and the communication construction of support moduleization, able to programme, distributed and computation optimization.
● various comprehensive functions are provided, can integrate the service of supporting to carry out various management and support effect.
● from automatic electronic and distributed treatment, obtain interests to greatest extent, thereby on total system or network, realize the optimal allocation and the utilization of resource.
● efficient, flexibly, cost is effective, configurable, can reuse, can adjust and versatility.
● can reflect user's commerce and demands of individuals economically.
● distribution process-make business model flexible expansion as requested best, satisfy user's demand.
● a large amount of movable and service of overall treatment effectively.
● can mould and operate according to each business model and be distributed and mixture centralized processing.
● the comprehensive of local, centralized and networked ability is provided, can be moulded uniquely or refigure, to meet the situation of continuous variation.
● support the resource of general purpose, and can reuse many different business models; Framework can be for having the different value chain recyclings of different demands.
● can support any amount of commerce and communication pattern.
● utilize local, centralized resource to satisfy the demand of each value chain efficiently with networking.
● the shared of public resource disperseed cost and improved efficient to greatest extent.
● support mixed, distributed, reciprocity and centralized networked capabilities.
● can be in local, long-range and/or Centralized Operation.
● can synchronous, asynchronous running or support two kinds of operating modes.
● adapt to the constraint of fast-changing commercial circles opportunity, relation and " Cyberspace " easily, neatly.
Generally speaking, distributed commercial government utility system provides comprehensive, integrated management and has supported service for the electronic reciprocal of secure e-business and other form.
Distributed commercial government utility provided by the invention system comprises following advantage and feature:
● distributed commercial government utility support able to programme, distributed, computation optimization commercial affairs and telecommunication management.It provides the various management of a series of execution uniquely and the service of task-provide is provided realizes that the necessary management of maximum benefit covers best resource utilizes widely from automatic electronic, distributed treatment and system (as network).
● distributed commercial government utility especially is suitably for Internet, the Intranet of mechanism and the similar environment that relate to distributed digital information creating person, user and service system the fundamentals of management is provided.
● distributed commercial government utility framework is for ecommerce and the management of communicating by letter and support that service provides efficiently, cost effectively, flexibly, constructable, can reuse and general basis.Provide the basis of the human electronic transaction of these abilities most important for setting up the optimized electronic relation schema of supporting commercial and individual.
● distributed commercial government utility framework provides an ecommerce to support the basis of service with communicating by letter, and can mould and operate as distributed and mixture centralized processing at any specific pattern.
● the pattern that distributed commercial government utility is supported can be by shaping and shaping again, with the continuous best of breed that reflects the distributed commercial Administration of Public Affairs ability of local, centralized and networking.
● the Promethean e-management ability of distributed commercial government utility support networked capabilities that mix, distributed, reciprocity and centralized.The combination of these abilities running in any this locality, long-range and central asynchronous and/or synchronous networking are made up respectively, any be certain purpose in given, these networking combinations together comprise commercial that can realize, most economical and can promote-just commercial institute expects-pattern most.
● the framework of distributed commercial government utility is from general.It can support any amount of commercial affairs and communication pattern, and these patterns share that (as recycling) is rational, local, centralized and resource networking.As a result, distributed commercial government utility makes practical effective ecommerce and managing entitlement pattern become possibility, can be by the public maintenance cost that is used to amortize resource of identical or overlapping resources bank.
● the business model of one or more distributed commercial government utilities can be shared some or all resource of one or more other patterns.One or more patterns also can be changed the mixing and the attribute of their distributed management operations, with adapt to Cyberspace-a vertiginous commercial circles opportunity, relation and restriction-requirement.
● distributed commercial government utility is handled by allowing to convert traditional business processing to ecommerce, thereby supports traditional business processing.Distributed commercial government utility has further strengthened these processing by adopting distributed treatment that efficient, commercial practicable electronic business mode may be necessary, " clearing house " management relevant with right, safety Design, OO design, managerial intelligent agent, negotiation and electronics decision-making technic and/or automatic electronic control technology.
● the running of these distributed commercial government utilities (financial payment, use audit etc.) can be carried out in participant's consumer electronics safety and carry out in the space, as carrying out in people such as Ginter disclosed " shielded processing environment ".
● the array of the commercial government utility system node that the running of distributed clearing house can be by " virtual networking and/or graduation " carries out, and these addresses adopt (as equity) general, interoperable virtual distributional environments as the basis.
● for given application or pattern, can authorize change, so that different management and/or support functions to be provided to distributed commercial government utility array of services.
● any or all of effect that distributed commercial government utility is supported, all can be undertaken by identical mechanism, forum or other organization or other electronic communities participant such as personal user's website and/or utilize.
● one or more parts of distributed commercial government utility can be made up of distributed shielded processing environment, carry out the effect that one or more have graduation and/or peer-to-peer.
● a plurality of processing environments of distributed commercial government utility protection that are subjected to can be carried out the complete task of service, basic ingredient and/or clearing house.
● in a preferred embodiment; can be distributed as the quantity of the shielded processing environment of VDE participant to the contributive distributed shielded processing environment of the effect of distributed commercial government utility, and/or can have specific classification, networking and/or centralized management and support relation at the shielded processing environment of this participant.
● in certain pattern, a certain or multiple distributed commercial government utility effect can be distributed fully, some other or a plurality of effects can be more and/or in the complete set (as social estate system), and other effect can be the distributed segment set Chinese style of part.
● this basic equity control that distributed commercial government utility provided, making can the distributed effect of combination in any, and collective provides important, practicable, extendible and/or essential commercial management, security and robotization service.
● can in programmable distributed and centralized mixed-arrangement, adopt the combination of characteristic, layout and/or the ability of distributed commercial government utility; and has a shielded processing environment the final user; and/or " centre " basic shielded processing environment (this locality, zone, specific grade etc.), and/or the various characteristics, layout and the ability that operate in the shielded processing environment of centralized service.
● for Internet and other electronic environment that support has distributed information founder, user and ISP, distributed commercial government utility is particularly useful.By helping people that their activity is transferred in the CYBERSPACE, it has played the part of the key player of essence in the mankind's activity with these non-electronizations forwards the transition process of Internet, Intranet and other electronic reciprocal network to.These network users need the basis of distributed commercial government utility and support service, with commerce and the demands of individuals that realize them economically.If want to support best the ability of electronic business mode, so that the free burial ground for the destitute meets the demands and desirable a large amount of activities of overall treatment and service effectively intentionally, the distributed processing basis of this safety is essential so.
● this distributed commercial government utility technology provided by the invention, for ecommerce, managing entitlement and Distributed Calculation and process control provide support a whole set of safety, distributed and management service.
● the support service of distributed commercial government utility comprise high safety, complicated technology and/or contract service, can by the participant of ecommerce and value chain with seamless, convenient and quite transparent way call, the user is a complicacy that can't see bottom operation.
● distributed commercial government utility can be guaranteed suitable high level physics, computing machine, network, processing and based on the security and the robotization of policy, provide simultaneously enhancing, efficiently, reliable, wieldy, function easily, and this support in an orderly manner, effectively exactly the electronic communities demand essential (or highly hope).
● in its preferred embodiment, distributed commercial government utility is supported in the establishment of the competitive business model that operates in " opening " the digital market based on VDE.
● distributed commercial government utility can be to their facilitating property of value chain participant and operational paradigm.For example, they can provide a cover complete, integrated, important " clearing " function, these functions are programmable, and can by one seamless, " distributed " interface (as a distributed application program) revise, to support a plurality of participant commercial relations best.Just as desired, clearing and/or support function and/or subfunction can be utilized separately and/or separately, so that be commercial affairs, secret, efficient or other destination service.
● distributed commercial government utility can make supplier, wholesale dealer, dealer, reseller, consumer and other value chain participant be easy to just can connect, call and use the service of distributed commercial government utility.Continue (Hookup) can be simple and easy, seamless and comprehensive (hookup can provide complementary widely service).
● by providing or supporting the user's indicia patterns that is used to the service of settling accounts that participative management mechanism provides, distributed commercial government utility just can further strengthen convenience and efficient, but what utilize is to share framework and processing.
● by supporting electronization ground, seamlessly adopt " virtual " pattern of a plurality of participant special services and ability, distributed commercial government utility can realize important efficient from the scale of participative management mechanism and speciality.
● distributed commercial government utility can obtain expediently such as the benefit on service or the product consumer, here the service of indication or product from call that various supports services " tissue " obtain-each is served all and can be configured to (total tissue is visible concerning the participant of value chain, and the complicacy of bottom is that (maybe may be) be sightless substantially or fully) by the constituent element ISP's of more professional service and/or participation distributed group.
● in their preferred embodiment, distributed commercial government utility service and ability can adopt and any one or a plurality of virtual distributed environment capacity described with people such as Ginter combine with reasonable manner, comprising:
A. the VDE chain of handling and controlling,
B. safe and reliable inter-node communication and interoperability,
C. An Quan database,
D. authorize,
E. password,
F. fingerprint,
G. other VDE safety technique,
H. right operating system,
I. object designs and safety container technique,
J. container control structure,
K. right and procedure control language,
L. electronics is consulted,
M. An Quan hardware and
N. intelligent agent (smart object) technology (for example, as the intelligent agent of supporting process control, a plurality of participant and/or other managerial agent capability that the distributed node management is integrated).
Commercial affairs government utility system may be distributed and hybrid-type
Support that distributed commercial government utility provided and management service function, can be in every way comprehensive and/or be distributed in electronic communities, system or the network.The virtual distributional environment based on shielded processing environment that preferred embodiment has adopted people such as Ginter to describe is so that this comprehensive and distribution.Because all this processing environments that protected by virtual distributional environment all are believable at least to a certain extent, each shielded processing environment can both be as the part of clearing house or clearing house.The business model that meets VDE commercial affairs node users interests and wish can be supported distributed commercial government utility service; these service quilts by all means; be pushed to adopt as the protected processing environment of other VDE, safety communication technology and other VDE ability (as described in other place, the VDE ability can be directly and the present invention integrated) final user's electrical equipment in.These electrical equipment can form the combination of the shielded processing environment of virtual clearing jointly with the value chain node of the formula that more focuses mostly on.Finally, Cyberspace is full of big, " virtual " computing machine with part, wherein to the visit of resource based on " accessibility " and right.
Distributed commercial government utility is modularization, able to programme and unitized environment, and it can support these virtual machines.Distributed commercial government utility is the framework basis of a kind of uniqueness, design ecommerce value chain pattern and virtual machine.The programmability of specific implementation means can be different reality of identical and/or similar service support (logic and/or physics) and/or distribution in various degree, for example:
● centralized commercial government utility system and service can be used for providing from the position of concentrating effectively the certain support service function or the combination of function.
● other commercial government utility system can provide with partially or completely distributed mode.
● some are supported and managerial service function can be distributed in and/or cross over existing or new communication construction or other electric network is supported constituent element.
● other supports service can utilize peer-to-peer communications and mutual, and the safety on any or all user's electrical equipment is carried out running in the space (in shielded processing environment), is used to provide the safety net of supporting service organization.
● other supports service can operate in network support framework and user's electrical equipment.
These distributed support services can replenish the support service facility of concentrating more (and/or elimination is to needs of the latter).Can provide various combination identical and/or different, non-service distributed and that distribute by different way, in order to support different activities.In addition, the servicing property of an assemble mode can be different and different because of what realize with distribution.If necessary, the realization of these different modes can be shared identical commercial government utility system and service, with and/or any concrete distributed commercial Administration of Public Affairs and/or support function and/or their any combination.
In addition, a concrete commercial government utility system can be utilized (as business model or relation) by different value chains in a different manner with service architecture.For example, certain value chain can select to make the function of this support service more concentrated from efficient, security, control or other reason, and other value chain then may be selected that distribute more and/or different distributed modes.
For example, as long as method of payment and right owner and/or other value chain participant agree, any one of distributed commercial government utility security architecture or a plurality of support service can be to the arbitrary collection or the combinations of final user and/or value chain electrical equipment, distribute and/or appoint their part or all of function and mandate.Distribute and appoint these services and function to have various advantages, as creating interim, special secure e-business net flexibly effectively, wherein, arbitrary, the some or whole electrical equipment in set or the combination can be at least participate in as part (if not the complete) counterpart of other electrical equipment in the same commerce Net tissue.
The invention provides following and distribution management and support the non exhaustive tabulation of the bells and whistles that service is relevant:
● any mixing of any management and/or support function can be integrated with mixing of any other management and/or support function.
● in an integrated design, the arbitrary collection of commercial government utility systemic-function or subclass can combine with any other mixing of commercial government utility systemic-function.These mixing can distribute with any desirable degree, and distribution and other any one or a plurality of part of any one or a plurality of parts compared in this mixing, and are the amount doesn't matter.This just allows value chain to adopt best and/or practicable design.The right clearing, financial settlement, use accumulation, operation report and/or other clearing that comprise in being distributed in of any degree and/or any mixing of other distributed commercial government utility function can be provided.These distributed commercial government utility functions and/or management and/or support service can and/or support service to combine with other any desired distributed commercial government utility function and/or management.
● any one or a plurality of management and/or support that service and/or function can both be as commercial government utility System Operations, and support the network of commercial government utility system node, each node is supported the part of the management service activity of these commercial government utilities at least.Service and/or interoperability safely with it be authorized and/or be provided in each commercial government utility system can both to other commercial government utility system and/or node approval.
● each commercial government utility system (or combination of commercial government utility system) all can participate in " the virtual clearing house " that be made up of a plurality of commercial government utility system.In preferred embodiments, when foundation VDE rule and control, these " virtual clearing houses " can be in the mode of these rules and control defined, with other the commercial government utility system and/or other the virtual clearing house interoperability that participate in consolidated network.Obtain mandate in these " virtual clearing houses " can be from electronic-controlled installation built-in safe handling Quality Initiative, and can participate in handling robotization from the ecommerce that this processing controls chain and other VDE ability obtain.
This with distribute any support service function and of interdepartmental system of any desired degree or network in the ability of when expectation correct subsequently (adjustment), huge function, dirigibility is provided and improved efficient.For example, the distribution aspect of serving such as supports such as settlement function will help avoid " bottleneck ", if promptly it does not have enough abilities to deal with the processing load, will create centralized settlement facility.Utilize the distributed treatment ability of many value chain participants' equipment, also in improvement effect and system response time, lower running expense, higher fault-tolerance, use the multifunctionality in realizing and from the present invention each value chain participant's the demand and the adaptability of requirement obtained aspects such as more value chain attractive force usually, have huge benefit.
Some examples of management that distributed commercial government utility provides and/or support service
Distributed commercial government utility can be organized into some different, special and/or general " commercial government utility system ".Commercial affairs government utility system can be centralized, distributed or the segment set Chinese style that partly distributes, so that the actual needed management of Business Management Layer, safety and other service to be provided.Some commercial government utility systems comprise some known management service functions, as financial settlement and the way of realization of certification authority's distributed commercial affairs government utility.Other commercial government utility system relates at the new services of known service activity and new combination and design.Commercial affairs government utility system supports any example of the distributed commercial government utility of concrete electronic business mode, and commercial government utility system itself can be made of the constituent element of commercial government utility system.Commercial affairs government utility system can comprise following any or all ability and the distribution design of combination in any form, for example:
● financial settlement institute,
● use the clearing house,
● right and permission clearing house,
● certification authority,
● the security catalog service,
● secure transaction management mechanism,
● be close to the combination of the multi-usage of the combination in any of the system capability of listing, general and/or commercial government utility system above comprising, and
● other commercial government utility system.
The facility of these commercial government utility systems and the wide range of applicability.For example, they can provide management support for the following arbitrary or all items of listing:
● believable electron event management,
● networking, robotization, distributed, safe processing management and control,
● virtual distributional environment processing chain and control, and
● stride and comprise " connection ", virtual junctions or the electric network of the network that periodically connects and/or the managing entitlement in this network and use (as incident) management (fulfil as audit, control, right etc.).
Commercial affairs government utility system can supervise the electronic processing chain with following relevant electron event result, as:
● e-advertising,
● market and operational analysis,
● electronic money,
● financial transaction is settled accounts and is communicated by letter,
● production and other distributed treatment control model,
● financial settlement
● the payment of, processing controls (incident) content-based to small part and/or managing entitlement is fulfiled or the regulation (comprising service fee, product expense or other any expense and/or charge) of other remuneration becomes possibility,
● carry out audit, keep accounts, pay (or regulation of other remuneration) and/or other clearing activity of fulfiling,
● compile, accumulate, use and/or provide and one or more safety containers and/or content and/or the relevant information of processing (incident), comprise content and/or other any content of safety container,
● according to using audit, user situation and/or the market study relevant that information is provided with one or more safety containers and/or content and/or processing (incident),
● adopt the information of obtaining situation of content being revealed from the user (comprising advertisement) and/or the utilization of the handling (incident),
● for object registered and/or that registering provide the object enrolled for service with and/or right, permission, price and/or Else Rule and control information;
● with the rule and control use and/or for the rule and control needed digital certificate information, as the attribute of identity verification, grade membership and/or other mode classification (the classification checking of for example automatically handling), as relevant with right based on management compass of competency (paying taxes), employ and/or other comprises the fulfiling of financial transaction of the grade right (as the club membership of buying of discount buyer) of acquisition;
● the third party is filed and/or checking is used for carrying out safety backup and can not refuses to pay transaction and/or Transaction Information,
● the mixing array able to programme of commercial government utility system handles control and automation services is provided; wherein different commercial government utility system supports the requirement of different value chains and/or business model; and this commercial government utility system also supports distributed; extendible; efficient networking and/or hierarchical relationship is fixing and/or virtual clearing house's pattern; these patterns have adopted secure communication in the shielded processing environment in distributed clearing house of commercial government utility system; in order to transmit rule and control and the derivation relevant with the clearing house; sum up and/or detailed Transaction Information
● EDI, electronic trade pattern and distributed calculating arrange that wherein the participant needs believable basis, makes distributed management, robotization and the control efficiently of transaction value chain become possibility, and
● other support and/or support service and/or function.
Description of drawings
The following detailed description about currently preferred embodiment of study can be understood these and other characteristic provided by the invention and advantage better more up hill and dale in conjunction with the drawings, and these figure are:
Fig. 1 shows a distributed commercial government utility example of supporting consumer's exemplary electrical equipment;
Figure 1A shows the shielded processing environment (" PPE ") in the consumer electronic appliance;
Figure 1B shows that distributed commercial government utility can comprise many exemplary commercial government utilities system;
How Fig. 2 A-2E shows could distribution management and support the example of service function;
Fig. 3 A-3C shows exemplary distributed commercial government utility system;
Fig. 4 shows the example networks of commercial government utility system;
Fig. 4 A shows a unlimited network of consumer electronic appliance and commercial government utility system;
Fig. 5 show the right owner how could and a plurality of commercial government utility system that links of electronics " information highway " between select;
Fig. 6 shows the example that different commercial government utility system is worked together;
How Fig. 7 could arrive the intrasystem example of commercial government utility with a plurality of management and the comprehensive integration of support service function if showing;
Fig. 7 A shows an example networks of the commercial government utility system of combination function;
Fig. 8 A-8B shows the hierarchical structure of exemplary commercial government utility system;
Fig. 9 shows an illustrative layers aggregated(particle) structure of multi-functional commercial government utility system;
Figure 10 shows an exemplary financial settlement institute;
Figure 11 shows an exemplary use clearing house;
Figure 12 shows an exemplary right and permission clearing house;
Figure 13 shows an exemplary certification authority;
Figure 14 shows an exemplary security catalog service;
Figure 15 shows an exemplary transaction office;
Figure 16 A-16F illustrates the present invention commercial affairs government utility system can support other commercial government utility system;
Figure 17 A shows the framework of an exemplary commercial government utility system to 17D-3;
Figure 17 E-1 shows the exemplary interactive mode of commercial government utility system to 17E-4;
Figure 17 F shows management and supports an exemplary arrangement of the distribution part of service running;
Figure 18 show an exemplary financial settlement commercial government utility system;
Figure 19 show an exemplary financial settlement layout;
Figure 20 shows an exemplary financial settlement and handles;
Figure 20 A-20F shows another example of financial settlement activity and processing;
Figure 21 shows the decomposition example of the value chain (payment) of a simplification;
Figure 22 shows an example how realizing the decomposition of Figure 21 in financial settlement institute environment;
Figure 22 A shows and realize the exemplary arrangement that payment is decomposed in the shielded processing environment of user;
Figure 23 shows the example that a complicated more value chain (payment) is decomposed;
Figure 24 shows an example how realizing decomposition in financial settlement institute environment;
Figure 25 shows the example that a value chain is decomposed, and this example also describes the compensation to distributed commercial government utility in detail.
Figure 26 shows the exemplary value chain (payment) of decomposing at any amount of payee;
Figure 27 shows another example that decomposes and redistribute by value chain that financial settlement realizes (payment);
Figure 28 shows exemplary super distribution payment that utilizes financial settlement that financial settlement carries out and the scheme of redistributing;
Figure 29 shows a value chain (payment) exemplary, that carry out in the shielded processing environment of consumer or other place and gathers;
Figure 30 shows value chain exemplary, that stride multinomial transaction (payment) merger;
Figure 31 shows value chain (payment) merger exemplary, that stride multinomial transaction and a plurality of consumers;
Figure 32 shows a framework that the exemplary commercial government utility system of payment merger is provided;
Figure 33 shows the commercial government utility system of an exemplary use clearing house;
Figure 34 shows the framework of an exemplary use clearing house;
Figure 35 shows an exemplary use settlement process;
Figure 36 shows another exemplary use settlement process of utilizing a plurality of uses clearing house;
Figure 37 show utilize to use and financial settlement an exemplary use settlement process;
Figure 38 shows the media layout process of an exemplary use clearing house;
Figure 39 shows an exemplary use settlement process of using the open discount offered of information according to the different brackets consumer;
Figure 40 shows an exemplary right and permission clearing house commercial affairs government utility system;
Figure 41 shows the framework of an exemplary right and permission clearing house;
Figure 42 shows an exemplary right and permission settlement process;
Figure 42 A shows the renewal registration process of an exemplary control collection;
Figure 43 shows another exemplary right and permission settlement process;
Figure 44 A-44E shows the example of another right and permission clearing;
Figure 45 A and 45B show exemplary right template;
Figure 45 C shows exemplary, corresponding with an exemplary right template control collection;
Figure 46 shows another exemplary right and permission settlement process;
Figure 47 shows an exemplary certifying authority commercial affairs government utility system;
Figure 48 shows the framework of an exemplary certifying authority;
Figure 49 shows an exemplary authentication processing;
Figure 50 shows an exemplary distributed authentication and handles;
Figure 50 A shows a control collection exemplary, adjust performance and/or other result when having digital certificate;
Figure 51 A-51D shows the data structure of exemplary digital certificate;
Figure 51 E shows exemplary, as to be used for generating according to other a digital certificate and trust data storehouse digital certificate technology;
Figure 51 F-51H shows an exemplary technology that is used for the regulation pseudo-entity;
Figure 52 shows an exemplary security catalog and serves commercial government utility system;
Figure 53 shows an exemplary security catalog service structure;
Figure 54 shows an exemplary security catalog service processing;
Figure 55 shows an exemplary mechanism of exchange commercial affairs government utility system;
Figure 56 shows an exemplary mechanism of exchange framework;
Figure 57 shows an exemplary mechanism of exchange and handles;
Figure 58 A shows the example how mechanism of exchange creates the control superset;
Figure 58 B shows the performed example steps of mechanism of exchange;
Figure 58 C and 58D show the commercial government utility system of an exemplary safety verification point;
Figure 59 and 60 shows the example how distributed commercial government utility could support different electronic value chains;
The example that Figure 61 shows a buying, speciallys permit and/or lease;
Figure 62 shows the example of a buying in kind and payment;
Figure 63 shows the example of consumer safety ground payment services;
Figure 64 shows the exemplary value chain of buying in kind and decomposes;
Figure 65 shows an example of cooperating between the in-house and outside commercial government utility system;
Figure 66 shows between the mechanism and the example of an inner example transaction mechanism;
Figure 67 shows the example of an international trade.
Embodiment
Distributed commercial government utility
Fig. 1 shows the consumer electronics 100 that is electrically connected with distributed commercial government utility 75.In this example, electric network 150 links together electrical equipment 100 and distributed commercial government utility 75.The comings and goings that carries out in the distributed commercial government utility 75 support consumer electronics 100.
Distributed commercial government utility 75 is ecommerce and the basis of communicating by letter and management being provided and having supported service.This basis is efficient, cost is effective, flexible, configurable, can reuse, able to programme and can be general.Its support individual and commercial all various electronic relationship of using, mutual with communicate by letter.
Distributed commercial government utility can be supported any electrical equipment
Electrical equipment 100 can be the electronics or the electrical equipment of any kind of, as computing machine, entertainment systems, televisor or video machines-only mentioned the here title of several examples.In concrete example shown in Figure 1, consumer electronics 100 is a family expenses colour television set 102, a video recorder 104 and a set-top box 106.Electrical equipment 100 can be controlled by hand-held remote controller 108.Set-top box 106 can be by cable TV network 114 from television broadcast device 110 and/or satellite 112 received television programs.Video recorder 104 can be play the various program material of tape, CD or other medium, and can have the ability of the program material that record receives by set-top box 106.
Electrical equipment 100 can have " shielded processing environment "
Electrical equipment 100 is preferably the sort of safe electrical appliance shown in Fig. 7 and Fig. 8 in people's such as Ginter the patent specification.It is preferably the ingredient of " the virtual distributional environment " described in people's such as Ginter the patent specification.Figure 1A shows, and televisor 102, set-top box 106, medium broadcast/and record machine 104 and telepilot 108 all can have " shielded processing environment " (" PPE ") 154.Distributed commercial government utility 75 is can be with the processing carried out in arbitrary environment in these shielded processing environments 154 mutual and provide support.
Shielded processing environment 154 can be based on one or more computer chips, " secure processing units " based on hardware and/or software shown in Figure 9 as people's such as Ginter patent specification.Shielded processing environment 154 provides high safety believable environment, wherein, can not have to carry out electronic processing and transaction reliably under significant damage or other the compromise situation.People's such as Ginter patent disclosure book has been described technology, the system and method for the shielded processing environment 154 of design, structure and maintenance, makes right owner and other value chain participant (comprising consumer 95) can trust its security and integrality.In preferred embodiments, this trust is between distributed commercial government utility 75 and the electrical equipment 100 being important alternately.
Distributed commercial government utility can be made up of many " commercial government utility system "
Figure 1B shows that distributed commercial government utility 75 can be made up of many commercial government utilities system 90.There is different kinds in commercial affairs government utility system, as:
financial settlement institute 200;
use clearing house 300;
● right and permission clearing house 400;
certification authority 500;
security catalog service 600;
● mechanism of exchange 700;
VDE manager 800; And
● the commercial government utility system 90 of other kind.
Function or running that commercial affairs government utility system 90 can support and manage in the protected processing environment 154.As:
electrical equipment 100 shielded processing environments 154 can provide the electronic payment mechanism 118 of robotization, and bank or other wealth account that this mechanism is consumed the consumer according to program count the debit.Distributed commercial government utility 75 can comprise the special-purpose commercial government utility 90a of system of a kind of being called " financial settlement institute " 200; it supports the financial sector of shielded processing environment 154 runnings-guarantee that right owner and other people obtain the remuneration of right quantity, and guarantees that consumer 95 exceeds paying.
● the broadcaster of TV programme 102a may need the shielded processing environment 154 of electrical equipment 100, so that utilize electronics to use metering mechanism, the video frequency program that metering consumer 95 watches how many video frequency programs and them to watch.Distributed commercial government utility 75 can comprise one and be called the special-purpose commercial government utility 90b of system of " use clearing house " 300, and it receives the use information that the use meters 116 in the shielded processing environment 154 are measured, and is analyzed and provide report.
● the right owner of video frequency program 102a can stake out a claim that shielded processing environment 154 provides a kind of copy protection mechanism 120, stops replicating video program 102a safely.Distributed commercial government utility 75 can comprise one and be called the special-purpose commercial government utility 90c of system of " right and permission clearing house " 400; it provides necessary permission to shielded processing environment 154; make consumer 95 (for example can watch specific program; pay by the number of times of watching), and forbid copy protection mechanism 120 for reinforcement and provide assistance.
● the right owner of video frequency program 102a can also require electrical equipment 100 shielded processing environments 154 before consumer 95 can watch video frequency program 102a, " digital certificate " 122 of information such as processing and identification consumer's identity, age.Distributed commercial government utility 75 can comprise a special-purpose commercial government utility 90d of system that is called " certification authority " 500, it to shielded processing environment 154 create and the permission that provides " digital certificate " 504-that the consumer can be effectively provided with the right owner mutual.
The commercial government utility of shown in Figure 1B other system 90 comprises:
● " a security catalog service " 600, it can assist shielded processing environment 154 to communicate by network 150 and other computing machine and electrical equipment;
● " mechanism of exchange " 700, it can be used for processing controls and robotization, as examining and monitor the sophisticated electronic transaction that relates to shielded processing environment 154 safely; And
● " manager " 800 of virtual distributional environment (" VDE "), in preferred embodiments, it can make the steadily operation safely of shielded processing environment 154.
Also can adopt unshowned other commercial government utility system 90 manages and/or supports to add among Figure 1B function and running.Each commercial government utility system 90 can work together, shares whole work, so that support consumer 95 efficiently, effectively.
Commercial affairs government utility system can be distributed
Fig. 2 A-2E shows the distributed commercial government utility 75 that how to distribute.Some management of commercial affairs government utility system 90 and support function can be in consumer's electrical equipment 100-or even carry out on a large amount of different electrical equipment of together cooperating in the mode of " dispersion ".
As mentioned above, electrical equipment 100 provides a shielded processing environment 154 respectively, and this environment can be resisted infringement and the place of a safety is provided, and wherein can carry out management and support running.This makes the electrical equipment 100 in the consumer family can be implemented as other party, the running of being trusted as participant of right owner, ecommerce etc.In view of believable, the shielded characteristic of protected processing environment 154, part, the expansion of commercial government utility system 90 even can be present in all in each or arbitrary shielded processing environment 154 and the relevant electrical equipment in the total system.
Fig. 2 A-2E has represented an exemplary commercial government utility system 90, as the repertoire of the use clearing house 300 of four jigsaw puzzles.Fig. 2 A-2E shows, the function of these commercial government utility systems can be with different degree distribution.For example:
● Fig. 2 A shows an example, and all functions of wherein commercial government utility system 90 all are to carry out in the hub facility of a safety.
● Fig. 2 B shows an example, and most of function of wherein commercial government utility system 90 is to carry out in the hub facility of a safety, is to carry out in the shielded processing environment 154 of consumer electronics 100 but some functions are arranged.
● Fig. 2 C shows an example, and some functions of wherein commercial government utility system 90 are to carry out in the hub facility of a safety, but most of function is to carry out in the shielded processing environment 154 of consumer electronics 100.
● Fig. 2 D shows an example; some functions of wherein commercial government utility system 90 are to carry out in the hub facility of a safety; some function is to carry out in the shielded processing environment 154A of first consumer electronics 100A, and also having some functions is to carry out in the shielded processing environment 154B of second consumer electronics 100B.
● Fig. 2 E shows an example, and the function neither one of wherein commercial government utility system 90 is to carry out in the hub facility of a safety; Some function is to carry out in the shielded processing environment 154 (1) of first consumer electronics 100 (1); some function is to carry out in the shielded processing environment 154 (2) of second consumer electronics 100 (2); some function is to carry out in the shielded processing environment 154 (3) of second consumer electronics 100 (3), and also having some functions is to carry out in the shielded processing environment 154 (N) of N consumer electronics 100 (N).
On the other hand or in addition, some functions of commercial government utility system 90 can be distributed in the network 150-for example, be used for apparatus for transmitting data between electrical equipment 100.
A plurality of management and support function distribute
How Fig. 3 A shows and a plurality of functions or the subfunction of commercial government utility system 90 could be distributed in the same shielded processing environment 154.For example:
● operate on the function 200a of financial settlement institute among the shielded processing environment 154a of consumer electronic appliance 100A; can provide certain financial settlement as audit, the centralized financial settlement that can replace and/or provide support institute 200 some performed financial settlement are operated.
● operate on the function 300a of use clearing house among the shielded processing environment 154a of consumer electronic appliance 100A; can carry out certain use information settlement operations; as comprehensive or analyze collected use information, to replenish, to replace or to add by using the performed use settlement operations in clearing house 300.
● the shielded processing environment 154a of electrical equipment 100A can locate in the consumer address; carry out certain right and permission settlement operations 400a, certain operation 500a of certification authority and certain security catalog service support operation 600a, serve 600 performed operations to replenish, to add or to replace by right and permission clearing house 400, certification authority 500 and security catalog.
Fig. 3 B shows, another exemplary consumer appliances 100 (2) ..., 100N (being personal computer 124 in this example) can carry out the various combination (for example part or all of function of mechanism of exchange 700 execution) of local support or management function.For example:
● the processing in the shielded processing environment 154 (1) can be dependent on the right of the 300A of use clearing house, the distributed segment set Chinese style of part of the 200A of financial settlement institute, the distributed segment set Chinese style of part of the distributed segment set Chinese style of part and the permission 400A of clearing house, the 500A of certification authority of the distributed segment set Chinese style of part, centralized security catalog service 600A and centralized mechanism of exchange 700A.
● the processing in the shielded processing environment 154 (2) can be dependent on the right of the 300B of use clearing house, the distributed segment set Chinese style of part of the centralized 200B of financial settlement institute, the distributed segment set Chinese style of part and the permission 400B of clearing house, the centralized 500B of certification authority, centralized security catalog service 600B and the mechanism of exchange 700B of the distributed segment set Chinese style of part.
● the processing in the shielded processing environment 154 (N) can be dependent on the security catalog service 600N of the distributed segment set Chinese style of the 500N of certification authority, part of the right of the 300N of use clearing house, the distributed segment set Chinese style of part of the 200N of financial settlement institute, the distributed segment set Chinese style of part of the distributed segment set Chinese style of part and the permission 400N of clearing house, the distributed segment set Chinese style of part and the mechanism of exchange 700N of the distributed segment set Chinese style of part.
Further promote distributed clearing and serve this notion, the distributed commercial government utility 75-that might fully distribute mainly or is fully depended on running and activity that management in the shielded safe handling environment 154 of consumer electronics 100 and support are served as Fig. 3 C as shown in.Like this, user's oneself electrical equipment 100 just can-settle accounts and authentication, security catalog service and mechanism of exchange each or the repertoire in serving with distributed mode-executions finance, use, right and permission.This " this locality " and/or parallel and/or distributed processing settlement of transactions can more effectively satisfy individual consumer's demand.For example, this is the method that a kind of consumer of permission provides control, protects some private datas of coming out from themselves electrical equipment, still provides them needed concise message to the right owner simultaneously.
Distributed layout shown in Fig. 2 A-2E and the 3A-3C is not to be mutually exclusive method with centralized commercial government utility system 90 is provided.On the contrary, provide the mixed-arrangement may be more favourable, some of them management and service function is (as the function of keeping secret that gathers, uses data of a small amount of payment and issuing of voucher, issue voucher as father for their child) be extensively to distribute, other management and support that service function (as maintenance of the large database of issuing, support the security catalog service of important numbers voucher or the like) is then more concentrated.Any concrete management and the distributed degrees of support service, clearing house or function can depend on various very important topics, comprise requirement, business model and the other factors of efficient, confidence level, extensibility, resource.In addition, the degree of distribution relates to multilevel hierarchy, and this hierarchy is based on by the subclass that is the concrete business model decision of concrete commercial subpattern thereafter, perhaps geography and/or management organization and/or area.
Because given electrical equipment 100 can participate in multiple activity, its different activity might depend on the various combination of distributed and centralized commercial government utility system 90.For example; for certain activity; shielded processing environment 154 can depend on centralized financial settlement institute 200; to another activity; it may depend on the financial settlement institute 200 of the distributed segment set Chinese style of part; and, may depend on complete distributed financial settlement institute 200 again to another activity.Different activities or business model can adopt distribution in various degree.
Commercial affairs government utility system net
Fig. 4 shows that commercial government utility system 75 can comprise " net " of huge distributed, part is a distributed and/or centralized commercial government utility system 90.Network 150 can be used to this net and the various electrical equipment 100 of commercial government utility system 90 are linked, and electrical equipment 100 can be shared distributed commercial government utility 75 fully.For example, electric network 150 can be received:
● set-top box 106 and/or media player 104,
personal computer 124,
● computer graphical workstation1 26,
● multimedia, video game system 128, perhaps
● the electrical equipment 100 of other any kind of for example comprises equipment, main frame and/or the microcomputer etc. of production control equipment, household electrical appliance, process controller, electric network and/or other communication construction.
In this example, same distributed commercial government utility 75 can support many different consumers, author, publisher, supplier, dealer and other people various activity-distributed commercial government utility 75 can support the different electronic behaviors that quantity is huge.Fig. 4 also shows; by disclosed the sort of safety (as confidentiality, reliability and integrality) purpose electronics " container " 152 that is used for of people such as exchange Ginter; commercial affairs government utility system 90 can communicate with electrical equipment 100 (also can each other), and container 152 is by utilizing safety rule and the control handled in shielded processing environment to manage.
In fact commercial affairs government utility system net can be unlimited
Fig. 4 A shows, commercial government utility system net can be very huge or even unlimited.In fact, network 150 can be a seamless net, and it extends to all over the world, utilizes the commercial government utility system 90 of any amount to connect thousands of electrical equipment.
The net of commercial affairs government utility system 90 can provide and very complicated interconnected of various electrical equipment, and what these electrical equipment were carried out is various electric function and transaction.As mentioned above, arbitrary electrical equipment 100 all may communicate with arbitrary commercial government utility system 90 or other any electrical equipment.This makes can be the most effective, give different electronic transactions with different commercial government utility system assignment the most neatly.For example:
● the close commercial government utility system in geographic position can be used for reducing obtaining back and forth the required time of data as far as possible.
● in some cases, far away commercial government utility system can be used for handling effectively some special transaction better.
● government regulation also can be specified at least in part and be selected certain commercial government utility system but not other system.(for example, if the financial settlement that japanese consumers attempts using being positioned at Cayman island institute 200, she just may run into jural problem-or the resident of a New Jersey may be by the financial settlement of legal requiremnt operation report New Jersey consumption tax institute 200).
● each side releases commercial government utility system different, that vie each other probably, and these different systems will be full of the net that comprises distributed commercial government utility 75.For the recycling of efficient and ecommerce resource, the interoperability between these systems and/or their node is extremely important.
Right owner and supplier can select between commercial government utility system
Fig. 5 shows how the right owner could elect between different commercial government utility service systems 90.In this example, the 300a of clearing house is used in Bob running first, and the 300b of clearing house is used in Alice running second, and Helen operates the 3rd and uses the 300c of clearing house.These different uses clearing the ISP can vie each other on quality and/or price, perhaps, they can be complementary (for example, they are respectively having speciality aspect the different transaction).
Because electric network 150 can be linked to electrical equipment 100 in the many different commercial government utilities system 90, the right owner of the digital properties that the consumer is using can have many different commercial government utilities system selective.That content provider and right owner can authorize is specific (or in groups), and commercial government utility system 90 handles the different aspect of transaction.For example:
● computer software publisher can stipulate that personal computer 124 sends metrical information 116a to the 300c of the use clearing house of Helen, with the use of other performed activity of supervisory computer software or personal computer.
● the right owner of video frequency program 102 can specify set-top box 106 to send the metrical information 116 of relevant video to the use clearing house of Alice.
● the content of multimedia supplier can specify the 300a of use clearing house that utilizes Bob to handle the use data 116c that is done generation by multi-media player 128.
Under some situation, specific consumer 95 also can be in the specific clearing house that specifies them to like in advance or is worked during other commercial government utility system 90.Fig. 5 shows supplier (and/or consumer's) selection, guides the measurement service flow into selected use clearing house 300 (described here and described Electronic Control of people such as Ginter will be preferably the how mechanism of guide service flow of working control) by one " police ".
Content provider or right owner can allow consumer 95 from one group of commercial affairs government utility system 90 (and/or supplier of commercial government utility system 90), select to want the content provider and/or the right owner that transact business.For example:
● the commercial government utility system 90 that specific indivedual or kind can be authorized in the television operations chamber, handles the transaction relevant with TV programme, and/or appointment do not want by they handle its transaction concrete individually or the commercial government utility system 90 of kind.
● concrete commercial government utility system 90 can be indivedual (or some kind) suppliers and/or consumer 95 and sets up and require or standard.
● the participant of value chain can participate in the commercial relations of legal agreements and/or different commercial government utility system 90.
Commercial affairs government utility system can work together
Fig. 6 shows, different commercial government utility system 90 can work together, to support different runnings.In this example:
● use the 300a of clearing house, right and the permission 400a of clearing house, 500a of certification authority and the 200a of financial settlement institute (left side of figure), can be used for supporting the concrete running of set-top box 106 and televisor 102.
● the identical 200a of financial settlement institute, the different 300b of use clearing house, the different 500b of certification authority and different right and the permission 400b of clearing house (top of figure) can be used for supporting some services on the personal computer 124.
● the different 200c of financial settlement institute, the 500c of certification authority, the use 300c of clearing house and identical right and the permission 400b of clearing house (right side of figure) can be used for supporting the electronic behavior of multimedia system 128.
● the various combination of commercial government utility system (in this example, using clearing house 300, the 200d of financial settlement institute, right and the permission 400c of clearing house and the 500a-of the certification authority bottom along figure) can be used for supporting audio system 130.
This example shows, various commercial government utility system 90 work that combines, and the various combination of commercial government utility system can be used to support different electronic transactions.
For efficient or convenient for the purpose of can and support service colligate in general commercial government utility system with management
Fig. 7 shows, for obtaining maximum convenience, efficient or other reason, the management of different special-purpose commercial government utility system 90 and support service function or subfunction to integrate forms more general or multiduty commercial government utility system 90.For example:
● Bob can operate an integrated or comprehensive commercial government utility 90a of system, and this system provides the function of the 200a of financial settlement institute, the function of the 500a of certification authority and the function of using the 300a of clearing house.
● Anne can operate an integrated or comprehensive commercial government utility 90b of system, and this system provides function, right and the function 400b of permission clearing house and the function 700b of mechanism of exchange of the 200b of financial settlement institute.
● Helen can operate an integrated or comprehensive commercial government utility 90c of system, and this system provides the function 400c and the function 500c of certification authority of right and permission clearing house.
● Roger can move an integrated or comprehensive commercial government utility 90d of system, and this system provides security catalog service 600d, uses service 300d, 200d that financial settlement is served of clearing house and right and permitted the 400d of clearing house.
The consumer of controlling electric device 100 can visit these different commercial government utility systems 90 or its combination any one or all.For example, set-top box 106 can obtain right, permission and authentication from the commercial government utility 90c of system of Helen, but also can utilize financial settlement and the operational analysis of the commercial government utility 90a of system of Bob.
Commercial affairs government utility system 90 can provide any combination of Operations Management and support function or subfunction, to carry out the needed running of certain business model, provides the highest efficient and/or convenience.For example, the commercial government utility system 90 (2) of Anne can only provide a special subclass of financial settlement institute function.
Fig. 7 A shows how a commercial government utility service system 90 just can provide widely, another example of different management and support function combination or part combination.In Fig. 7 A, each management and support service function all with different types of simple building blocks (child ' s play block) representative (synoptic diagram):
financial settlement 200 usefulness squares represent,
use settlement function 300 usefulness semicircle pieces to represent,
● right and permission settlement function 400 usefulness rectangular blocks represent,
● the function 500 usefulness corner blocks of certification authority represent,
● security catalog service function 600 usefulness tunnel pieces represent,
● the function 700 usefulness right cylinders of mechanism of exchange are represented.
Consumer and consumer electronics 100 are represented with rectangular column on end among the figure.Electric network 150 usefulness roads represent, it links each commercial government utility system each other, and link with consumer's electrical equipment 100.Electronic data container 152 can transmit along " information highway " between this electric network or the different electronic equipment 150.
Fig. 7 A only shows the many management that may use and supports the part of Services Combination.For example:
● on the upper left side, the commercial government utility 90A of system provides some financial settlement function 200a, at least some rights and permission settlement function function 400a and at least some authentication function 500a at least.The complete like this ecommerce government utility 90A of system can be used to represent the right owner to be engaged in commercial management and authorize business, and handles payment problem according to these rights.
● the right side that is close to facility 90A is the commercial government utility 90D of system, and it comprises financial settlement service 200d and mechanism of exchange service 700a.In audit and/or comprehensively complicated, that multistep the is rapid transaction of management, when the each side that also guarantees simultaneously to conclude the business obtained due remuneration, it seemed particularly useful.
● below in figure, the commercial government utility 90B of system comprises financial settlement function 200f and uses settlement function 300c.Use the relevant payment of transaction and other financial detailed account with electronics and use when providing audit and report to serve according to electronics handling, the commercial government utility 90B of system seems particularly useful.
● the middle bottom of figure shows the commercial government utility 90C of system, and it combines authentication service mechanism 500 with using clearing service organization 300.When issuing the use that digital certificate writes down these vouchers then (for example, being assessment risk, potential debt, insurance premium etc.), it seems particularly useful.
Various examples shown in Fig. 7 A are the purposes for demonstration.Depend on business goal, convenience and other factors, other combination is possible or very possible.
The hierarchical organization of commercial affairs government utility system
Fig. 8 A shows that commercial government utility system 90 or function can hierarchical arrangement.For example, total finance (or other) clearing house 200 (N) can monitor and/or to remaining countless finance (or other) branchs clearing house 200 (1), 200 (2) ... bear the overall responsibility times.In this example of Fig. 8 A, consumer appliances 100 can be mutual with clearing house 200 (1), and the latter can be then mutual, like that with clearing house 200 (2).Management and support service this " hierarchy " can be considered on some mode with major company or army in command chaining similar-have the training of some clearing houses and/or appoint ability, control and/or supervise other clearing house.
Fig. 8 B shows management and supports another example of the hierarchy of service.In this example, some centralized lump sums and/or other commercial government utility system 90 their some or all responsibilities are entrusted to other commercial government utility system 90.In illustrated this concrete example, mechanisms such as company, non-profit organization can have the commercial government utility system 156 of oneself.The ecommerce of some or other activity (as show business) can have oneself directly under the commercial government utility of specialty system 158.Some geography, area or administration tissue (as all buy the individual of certain commodity in the state of Wisconsin) can have the professional commercial government utility system 160 of own zonal/administration property.Conversely, the commercial government utility system 156,158 and 160 that rank is lower in the hierarchy can further entrust to specific consumer, mechanism or other entity with the authority of office or responsibility.
In an example arrangement, the commercial government utility system 90 of the on commission authority of office can carry out nearly all actual support performance, but can notify more arch commercial affairs government utility system 90 by report or other means.In another one is arranged, in any case arch commercial affairs government utility system 90 is all irrelevant with the daily routines of vicarial commercial government utility system.In another example arrangement, a few thing is done by more special commercial government utility system, and the work of remainder is then done by more arch commercial affairs government utility system.In concrete scheme, work and specifically being divided in of the authority of office depend on some factor to a great extent, as the utilizability of efficient, confidence level, resource, managed type of transaction and other various factors.Can partly entrust the clearing authority of office (gather as entrust using, but do not entrust finance or managing entitlement responsibility), and can consistent with peer processes (as when keeping some centralized critical function, some function being placed in consumer's the electrical equipment).
Multi-functional commercial government utility system can classification or tissue on a 50-50 basis
Fig. 9 shows different, a complicated more commercial government utility system environments, comprises the command chain unit of a classification and the unit of a high degree of cooperation on horizontal direction between the different multi-functional commercial government utility system 90.In this example, the responsibility that five different brackets are arranged, the commercial government utility of the master of the first order (arch) system 90 (1) (for example, financial settlement 200) have maximum authority of office, ability, power, control, scope and/or the responsibility of the commercial government utility of other of 2,3,4,5 grades system reduce successively.Fig. 9 also shows, can have different functions, scope of offical duty and/or area with the different commercial government utility system of one-level.For example:
● commercial government utility system 90 (2) (1) can be " category-A " commercial government utility system,
● commercial government utility system 90 (2) (2) can be " category-B " commercial government utility system,
● commercial government utility system 90 (2) (3) can be " C class " commercial government utility system.
On next stage, commercial affairs government utility system can be category-A commercial affairs government utility systems (as 90 (3) (1) and 90 (3) (2)), can be category-B commercial affairs government utility systems (as 90 (3) (4)), can be C class commercial affairs government utility systems (90 (3) (5) and 90 (3) (6)), also can be mixed type-can be as commercial government utility system 90 (3) (3) the commercial government utility system with category-A and category-B function.
Fig. 9 also shows, other clearing house on 4,5 grades can be divided into all kinds and branch type.For example, financial settlement in 200 the environment, category-A is responsible for consumer's credit, category-B is responsible for eCheck, C class and then is responsible for commercial credit.Other division can be the clearing of Visa (category-A), MasterCard (category-B) and American Express (C class) card.The clearing house of A/B class will be responsible for the clearing trust so, can handle consumer's the credit and the clearing of eCheck.The branch type I of category-B can be responsible for the business electronic check.The branch type I of C class is responsible for the commercial letter of credit transaction, divides type-iii then to be responsible for credit bill (credit draft).The ultimate principle of susceptible condition can be based on the border (as France, Germany, New York and Alabama) of administration, and/or the arrangement (non-performing loan risk, the trust etc. of responsibilities such as buyer, large-scale transaction on a small scale) of agreement.The equity scale has reflected the needs of coordinating total transaction (as between small-scale buyer's clearing house and large-scale trader's clearing house).
Right and permission clearing house 400 can break the restriction of type of content (as film; Science, technology and medicine; Software).Subtype A can comprise film, antique and the artistic film that the first run is shown; Subtype B can handle magazine and textbook; The C class can be responsible for recreation, office and education content.Peer-to-peer communications between the clearing house may relate to the permission (permission can be stored in the clearing house as multimedia presentation, this clearing house utilizes the reserve passage to be linked to other clearing house, to guarantee the up-to-date permission that distributes) of multimedia presentation.
Some exemplary commercial government utility systems
As mentioned above, commercial government utility system 90 is universalizations and programmable-therefore can provide the different supports and the mixing of management function, to satisfy the requirement of given transaction.Therefore, the actual many or most of commercial government utility system 90 that realizes can provide the difference support and the management function of certain limit, and this makes and is difficult to the commercial government utility system for specific " kind " with the mutual comparison-of-pair sorting of realization means.
However, concerning pattern, transaction and application widely, some Utopian special commercial government utility system 90 is particularly useful.It to some characteristics of the commercial government utility system of describing dissimilar these " purely " the helpful and actual realization means that facilitate for this reason-admit can mix the function of some idealized patterns or the subclass of function.It below is the brief introduction of some characteristics these " purely ", Utopian commercial government utility system.
Financial settlement institute 200
Figure 10 at length shows an exemplary financial settlement institute 200.Financial settlement institute 200 handles payment, to guarantee that being worth the supplier can obtain just compensation.In carrying out the process of this task, financial settlement institute 200 can be safely coordinated with other commercial government utility system 90.
In this example, financial settlement institute 200 can pass through electric network 150, utilizes in people's such as Ginter the patent specification in conjunction with Fig. 5 A and the described the sort of electronics container 152 of 5B, in the mode of safety, communicates by letter with the shielded processing environment 154 of electrical equipment.Financial settlement 200 can be from these safe containers 152 shielded processing environments 154 receive payment informations 202, and mutual electronically with each banking industry, credit card or other mechanism, to guarantee to have carried out rational payment.
For example, financial settlement 200 can be mutual with consumer's the 206a of bank, supplier's 206b of bank and consumer's the 206c of credit card company.For example, financial settlement 200 can be with the fund of consumer's the 206a of bank and the 206b of bank that loan fund puts the right owner under, with the payment consumption person see a film, the expense of TV programme or other content.In addition or on the other hand, financial settlement 200 can be mutual with consumer's the 206c of credit card company, with the request letter of reference with, obtain credit mandate, payment etc.
Financial settlement institute 200 can for example provide payment statement 204-to consumer 95, sends form by the electrical equipment in safe electronic container 152b 100, to keep the confidentiality of report messages.In this example, consumer 95 can utilize them to check form 204 by electrical equipment 100 shielded processing environments 154, and they can be printed or preserve, so that reservation record.
In an example, the payments mechanism that shielded processing environment 154 is provided can provide the stored value card of electronic money, so that use when payment electronic service or content.This stored value card can be deposited the currency of digital form.Consumer 95 can be with the digital cash flower in that they be wanted on anything.When the stored value card sky time, consumer 95 just can by authorize financial settlement the consumer account's allotted fund from their 206a of bank enrich wallet.Financial settlement 200 payments that can handle electronic money, when consumerization light behind the last money of depositing, just arrange automatically to enrich again stored value card (for example based on consumer mandate in advance), and to provide them to the consumer are detailed report and the forms 204 that how to spend electronic money.
Use clearing house 300
Figure 11 shows an exemplary use clearing house 300.In this example, use clearing house 300 to receive use information from using meter 116, analyze use information and provide report according to the analysis of being carried out.When realizing these tasks, use clearing house 300 can be safely to coordinate with other commercial government utility system 90.
For example, use clearing house 300 can send the detailed report 304a of all films, TV programme and other content that users are watched last month to consumer 95.Communication between shielded processing environment 154 and the use clearing house 300 can be the form of safety container 152.As described in people's such as Ginter patent specification, use the meter 116 can be according to many different factors metering operating positions, and can be from very in detail to cutting off fully.If the consumer wishes that they just can check detailed operation report 304a on their televisor 102.
Using clearing house 300 to meet to other clearing house's report protects the consumer of consumer's privacy to view and admire custom.Can also in safety container 152, transmit these reports.For example, use clearing house 300 to provide final report 304b to advertiser 306, this report does not expose consumer's identity, but provides relevant consumer to view and admire the valuable information of custom to the advertiser.On the other hand, if the consumer agrees that use clearing house 300 just can provide the more detailed report that discloses consumer's identity to advertiser 306 or other specific people.Consumer 95 can receive awards again back, for example discount, cash, free movie or other compensation.
Use the producer or the director of the video frequency program that clearing house 300 can also watch to right owner 308-such as consumer 95, issue report 304c.These reports make the right owner that whom be examined and have watched their program and other creation.This guarantee payment or send them to the consumer may be very useful aspect may interested other similar program.
Use clearing house 300 also to send report 304d, so that automatically investigate the welcome degree of program to viewership research firm 310.Use clearing house 300 also can send report, use for science, market or other research to other market research agency 312.
Right and permission clearing house 400
Figure 12 shows an exemplary right and permission clearing house 400.Right and permission clearing house 400 store and the distribution electronics permitted for 404 (representing with stop-light) in these figure.Permission 404 approvals also keep permission, and it has also stipulated the result.Right and permission clearing house 400 can together cooperate with other commercial government utility system 90, to finish its task.
In this example, right and permission clearing house 400 can take on centralized " knowledge base " or the right clearing house relevant with digital content.For example, broadcasting station, author and other content originator and right owner can use the form of electronics " control collection ", to right and the 400 registration permissions of permission clearing house.These permissions can stipulate that the consumer can maybe can not use digital properties, when can use permission, and can stipulate to use the result of permission.Permission (control collection) can correspondingly be paid from the shielded processing environment 154 of electrical equipment by right and permission clearing house 400, responds to asking 402.
For example, suppose that consumer 95 wants to watch a concert or fight sheet on televisor 102.They can operate their telepilot 108, the right that certain program is watched in the request acquisition.Shielded processing environment 154 can be got in touch with right and permission clearing house 400 by network 150 automatically, sends electronic request 402.Right and permission clearing house 400 can see whether it authority 404b of (and being authorized to provide) necessity has been provided from right owner 400 theres of program in the storehouse or knowledge base of oneself " searching ".Then, it just can issue shielded processing environment 154 with the permission 188 of request.
For example, permission 188 can allow the consumer only to read through concert or fight sheet, and forbids duplicating with copy protection mechanism 120.Permission 188 also can (perhaps in addition) the regulation price (for example, from consumer's stored value card, deducting 5.95 dollars) of watching program.Electrical equipment 100 can whether they be ready that paying 5.95 dollars sees this program to consumer's 95 inquiries.If answer is "Yes" (for example, with telepilot 108 indication), electrical equipment 100 can be automatically counts also " release " program of debit with consumer's stored value card, and like this, the consumer just can watch program.
Right and the permission clearing house 400 can in safety container 152b, transfer the permission 188, container 152b also can comprise by the permission controlled information-or permit 188 can the different moment via with program or the different path of other content, arrival electrical equipment 100.For example, can on network 150, send permission, and the program relevant with it can arrive from satellite 112 or via other path, as wired TV network 114 (referring to Fig. 1).
Right and permission clearing house 400 can also issue report 406 to right owner or other people, indicate approval or have refused which permission.For example, the author of book or video frequency program can be consistent with individual's hobby of consumer, can know the extracts that has how many people to ask to issue his or her works exactly.The report of using clearing house 300 to be provided can be provided in this class report.
Certification authority 500
Figure 13 shows an exemplary certification authority 500.Certification authority 500 issues digital authenticating 504, for the management of electronic rights provides environment.Certification authority 500 can cooperate with other commercial government utility system 90, finishes its task.
Certification authority 500 issues the digital authenticating 504 of the specific fact of identification.Digital certificate 122 resembles driving license or high school diploma in some aspects because they each the proof of certain fact all is provided.For example, we can show driving license and have reached ballot, buy alcoholic beverage or watched age of " R " G-film G so that show us.This same driving license has shown a fact, and promptly we have the name of oneself and live in certain address, and has certain knowledge (the motor vehicles method in state) and skill (driving the ability of motor vehicles).Digital certificate 504 is similar to this aspect of driving license, promptly confirms licencee's identity and relevant facts, and only digital certificate is to make of numerical information rather than card.
In this example, certification authority 500 can receive consumer's request and relevant evidence 502, and can issue the correlated digital voucher 504 that confirms the specific fact.Certification authority 500 also can receive evidence and voucher from other people such as official mission 506, professional institution 508 and university 510 theres, can also receive the definition of voucher.Give one example, certification authority 500 can obtain birth certificate or other identity information from official mission 506 theres.According to this identity information, certification authority 500 just can prepare and issue digital certificate 504, shows individual's identity and the age.Certification authority 500 also can issue digital certificate 504 according to the various evidences and the input that obtain from each one there, shows working condition, occupation, residence state or other various classification and rank.
Certification authority 500 can discern tissue and machine and even people.For example, certification authority 500 can issue a voucher, show that Stanford University is the institution of higher learning that a suffered people praises highly, or ACME carrier is the such fact of a company in good standing and the transport of dangerous goods that goes through.Certification authority 500 is all right, for example, issues voucher 504 to computing machine, shows that computing machine has other security of certain level or is authorized to represent certain individual or entity's processing messages.
Certification authority 500 can communicate with shielded processing environment 154 and other each side by exchange electronics container 152.The digital certificate 504 that the protected processing environment 154 of electrical equipment 100 can use certification authority 500 to issue is so that those permissions 188 that management and utilization such as right and permission clearing house 400 are issued.For example, set-top box 106 can prevent automatically that any consumer below 17 years old from watching the program material of some kind, or to student's discount offered of watching education material-everything all is to be foundation with the voucher 504 that certification authority 500 is issued.
The security catalog service
Figure 14 shows an example of security catalog service 600.The effect of security catalog service 600 is similar to computerized phone or name service catalogue.Consumer 95 can send a request 602, points out their needed information.Security catalog service 600 can " be searched " this information and be provided answer 604 to consumer 95.Security catalog service 600 can together be cooperated with other commercial government utility system 90, to carry out its task.
For example, suppose that consumer 95 thinks that the electricity consumption submode orders pizza from Joe ' s Pizza shop.The type of their pizza of wanting of decision (for example with sausage and onion big cheese pizza).Yet they also do not know the electronic address (this address resembles a telephone number) in Joe ' s Pizza shop.Consumer 95 can utilize the information that telepilot 108 input wants to search about them (" Joe ' s Pizza, Lakeville, Connecticut).Shielded processing environment 154 can generate the request 602 that comprises this identifying information, and this request is sent to security catalog service 600.It can send this request in safety container 152a.
After security catalog service 600 request of receiving 602, it just can accessing database, finds information requested.Security catalog service 600 may directly obtain the electronic address of Joe from Joe or it in the past.Security catalog service 600 can send back to electrical equipment 100 with this information requested in response 604.Response 604 also can be in safety container 152b.Consumer 95 can utilize this information electricity consumption submode that their order was issued in several seconds in Joe ' s Pizza shop-after the consumer places an order, and this order just may be displayed on ordering on the terminal of Joe ' s Pizza shop.After a few minutes, Joe just can send to the pizza (with car rather than with the mode of electronics, because out and out pizza is more satisfactory more than the electronics pizza) of very warm cheese, sausage and onion to consumer 95.
Anyone gets in touch anyone that security catalog service 600 can help to link with network 150 and other.Give one example, security catalog service 600 can tell to use clearing house 300 how to find financial settlement institute 200 on network 150.Any electrical equipment 100 that links with network 150 can both be served 600 by security catalog and be got in touch with other any electrical equipment.
As mentioned above, sending to the request 602 of security catalog service 600 and response 604 that it is beamed back can be encapsulated in people's such as Ginter the described the sort of safety container 152 of patent specification.Container 152 safe in utilization helps to prevent that the earwig from eavesdropping the exchange between consumer 95 and the security catalog service 600.So just protected consumer's privacy.If someone eavesdrops consumer 95 pizza order; they can pay no attention to; but they may more be concerned about the such fact of protection, and promptly their mode of just using electronics and some other people (people of secret and trusting relationship being arranged as doctor, bank, lawyer or other and they) communicate.Safety container 152 also help to guarantee message that across a network 150 transmits be real, without change.Electronics container 152 makes Joe ' s Pizza shop be sure of that the pizza order of just having received comes from consumer 95 (rather than other people) really, and order is without change, and the consumer can believe relatively that then nobody can send out the pizza order of a vacation for the Joe pizzeria with his name.In this embodiment preferred,, adopt safety container 152 and shielded processing environment 154 can also guarantee that consumer 95 can not admit afterwards if consumer 95 has ordered pizza from Joe ' s Pizza shop really.
Mechanism of exchange 700
Figure 15 shows an exemplary mechanism of exchange 700.In this example, mechanism of exchange 700 provides process control and robotization.It helps to guarantee process and concludes the business and can finish smoothly.Mechanism of exchange 700 can together be cooperated with other commercial government utility system 90, to finish its task.
In more detail, in this example, mechanism of exchange 700 monitors the situation of electronic transactions and/or processing, is maintained into simultaneously what to have taken place so far and also needed to take place a little and so on safe and reliable records for finishing whole transaction and/or processing.If necessary, mechanism of exchange 700 can also come a more positive effect by as generating the request that specific activities takes place.Under some situation, mechanism of exchange 700 can be complex transaction or handle in unique participant, it " understands thoroughly " institute that handles in steps.Mechanism of exchange 700 also can utilize the electronics mode to stipulate whole processing according to the Electronic Control that each participant provided in the process control.
Figure 15 shows what use is made of mechanism of exchange 700 and makes the example that consumer 95 can order goods (as sweater).In the home shopping example of whole concrete electronization (only be used for the example purpose, but be not limited in this), consumer 95 can use a teleswitch and 108 select concrete retailer, want the style and the color of the sweater ordered with certain price.In this home shopping example, the shielded processing environment 154 of electrical equipment 100 can generate electronic order 702, and this order is sent to the order of electronics " mail-order " company and collects department 704.Can in safety container 152, send order 702.
In this example, mechanism of exchange 700 can be assisted the coordination business activity of electronics mail-order firm and confirmed to have finished accurately and timely and paid the required institute of sweater in steps.For example:
● after receiving electronic order 702, order is collected department 704 can give 700 electronic notifications 706 of mechanism of exchange.Mechanism of exchange 700 stored electrons notify 706 also may send out " requirement " 708.
● before placing an order, mechanism of exchange 700 may have been issued and require 708, makes order collect department 704 and knows how this did when order was come in.
● according to " requirement " 708, order is collected department 704 can be to the electronics of 712 orders 710 of production division and/or written (or other) version.
● mechanism of exchange 700 can be sent out a production requirement 714 to production division, produces sweater with the hobby according to the consumer.
● mechanism of exchange 700 also can require 716 to 718 supplies of material of supplier.For example, mechanism of exchange 700 can require supplier's 718 supply goods and materials, as thread ball 711, makes production division 712 have the necessary starting material of the sweater of production.
● when supplier 718 provided materials needed, it just can give notice 720, notice mechanism of exchange 700.
● after the sweater that is over was made by production division 712, it just notified 722 to 700 one of mechanism of exchange, prompting mechanism of exchange 700.
● mechanism of exchange 700 can notify 722 according to what production division 712 sent, notifies 726 to 724 one of delivery department, for example, requires delivery department to fetch the sweater of completion there from production division, and sweater is delivered in consumer's hand.
● mechanism of exchange 700 can with other commercial government utility system 90, as 200 cooperations of financial settlement institute, to arrange payment problem.
Certainly, this example only is used for the purpose of example.Mechanism of exchange 700 can be used for all various processing and robotizations, as the negotiation of the processing of electronic order between commercial undertaking inside or the commercial undertaking and sale, electronic data interchange (EDI), electronic contract and/or fulfil, between the payment of electronic document, company and the safe electronic of in-company transaction, business processing integrated-only listed several in many useful applications here.
VDE management service 800
In this preferred embodiment; VDE manager 800 (referring to the relevant discussion in Fig. 1 of this instructions and people's such as Figure 1A and Ginter the instructions) can provide various electronics to safeguard and other function so that network 150, electrical equipment 100 shielded processing environments 154 and distributed commercial government utility 75 safety, steadily, running efficiently.For example, VDE manager 800 can be managed the electronic security(ELSEC) secret key of whole network 150, and can pass through electrical equipment 100, each commercial government utility system 90 and other electrical equipment, and the service relevant with the maintenance of secure data is provided.As describing in detail in people's such as Ginter the patent specification; other critical function that VDE manager 800 is taken on comprises installation and disposes shielded processing environment 154, and assists shielded processing environment to safeguard the permission and/or the use data of storage safely.VDE manager 800 can together be cooperated with other commercial government utility system 90.
Commercial affairs government utility system 90 can support mutually
Except supporting consumer 95, commercial government utility system 90 can also support other commercial government utility system.Figure 16 A-16F has done demonstration to this.For example:
financial settlement 200 help to guarantee that other commercial government utility system 90 obtains remuneration (referring to Figure 16 A) for paying of they;
● use clearing house 300 (referring to Figure 16 B) how to use to other commercial government utility system 90 announcement supports that they provided.For example, use clearing house 300 can tell that certification authority 500 is (this potential debt or assistance detection of false voucher that certification authority is understood its guarantee at any time is very useful) of how to use its voucher.
● Figure 16 C shows, right and permission clearing house 400 can support other commercial government utility system 90, as financial settlement institute 200, use clearing house 300, other right and permission clearing house 400 ', certification authority 500, security catalog to serve 600 and mechanism of exchange 700.
certification authority 500 can issue digital certificate 504, confirm other commercial government utility system 90 of running-support of other one or more commercial government utility systems 90 (referring to Figure 16 D), as financial settlement institute 200, use clearing house 300, right and permission clearing house 400, other certification authority 500 ', security catalog service 600 and mechanism of exchange 700.
● Figure 16 E shows that security catalog service 600 can support other commercial government utility system 90, as financial settlement institute 200, use clearing house 300, right and permission clearing house 400, certification authority 500, other security catalog service 600 ' and mechanism of exchange 700.
● Figure 17 F shows that mechanism of exchange 700 can support other commercial government utility system 90, as financial settlement institute 200, use clearing house 300, right and permission clearing house 400, certification authority 500, security catalog service 600 and other mechanism of exchange 700 '.
“A?piece?of?the?tick”
Commercial government utility described herein system 90 provides valuable, important service and function.The fortune author of these services can and should obtain compensation from the service that they provided.Commercial government utility system of financial settlement institute 200 can guarantee that they and other support service providers obtain this compensation, and make troubles can not for other electronic communities and value chain participant.
Assist or compensatory value chain participant process in, commercial government utility system 90 can (according to the agreement arrangement of having ratified already) extract its that part or number percent, so that compensate the clearing service that it provides.Can support service according to payment (i.e. " the small amount payment ") compensation that belongs to each electronic transaction (" a piece of thetick ") on a small quantity.The supplier can partly or entirely hand to these expenses their value chain participants separately in every way.
The value chain participant that can call several different brackets compensates commercial government utility system 90, and these participants comprise:
● information consumer (for example, comprising the people who utilizes the movable information " consumption " that produces of ecommerce, electronic transaction management and managing entitlement);
● the right owner of content and other electronics supplier;
● the participant of safety, distributed electronic business transaction the most widely;
● in addition, each support the ISP may also must support mutually in every way-therefore may need to compensate one another.For example:
● commercial government utility system 90 can be used as the consumer's of another commercial government utility system 90 intermediary;
● commercial government utility system 90 may be required to support the running of another commercial government utility system 90; And/or
● commercial government utility system 90 may must work together, to support public transaction.
Different commercial government utility system 90 can set up public expense cooperatively, distributes between them then.In the another one scheme, each commercial government utility system 90 can charge from the service of oneself separately.Between the different commercial government utility system 90, can there be competition-compete now supplier and consumer's business as credit card company according to the quality of service and price.
The framework of exemplary distributed commercial government utility system
Describe and in Figure 10-12, illustrated one " right operating system " at the 180th page of people's such as Ginter patent specification and later part, this system provide one small-sized, safety, by event driven, separate, based on service, towards multiprocessing operating system environment " assembly ", distributed, this environment is integrated has VDE security control information, assembly and the agreement of legacy operating system notion.The framework of the preferred exemplary commercial government utility system 90 that is provided according to these inventions is based upon on the basis of the right operating system that people such as Ginter describes and is expanded.
For example, the framework of preferred exemplary commercial government utility system 90 provides the set of service function, right operating system can be used as should to be used for operation.These service functions have defined various useful, any and/or all commercial government utility systems 90 may need the task of carrying out.These service functions are that can distribute, extendible and can reuse.They can be comprehensively for various combinations with divide business model-to provide any specific commercial government utility of realization system 90 desired general function make up-for example is provided.
Figure 17 A shows the general frame of an exemplary commercial government utility system 90, and Figure 17 B shows an example of the application architecture of commercial government utility system, and Figure 17 C then shows the detail of service function.
At first with reference to Figure 17 B, in this example, the application software framework of commercial government utility system 90 comprises commercial government utility system description device 90A.Commercial affairs government utility system description device 90A comprises the information about commercial government utility system 90, and this system can be used for discerning this system and ability thereof, and describes, gathers any amount of service function 90B (1), 90B (2) ... and/or interface is provided.Commercial affairs government utility system description device 90A and service function 90B can, for example, use object-oriented programming, and will be in fact how implement and/or the activity abstract of the commercial government utility system 90 that realizes being asked realizes, assist to guarantee that this describer and service function are modularization and can reuse with object-oriented programming.
Commercial affairs government utility system description device 90A (1) also can be responsible for the activity of coordination service function 90B.In this example, describer 90A is used for request and other system activity are directed to suitable service function 90B, so that may be present in difference between the service function 90B by being in harmonious proportion interface, data type etc., and aid in processing stream directed total between the various service function 90B, need to guarantee the movable coordinated of more than one services.The tabulation of the non exhaustive property of the example of these service functions 90B comprises as follows:
● audit,
● maintenance record,
● supervision and handling,
● monitored state,
● finish and handle definition,
● processing controls,
● the interface of clearance service,
● funds transfer,
● currency exchange,
● tax and application,
● the distribution of account creation and identifier,
● payment gathers,
● the decomposition of payment,
● the pre-authorization of budget,
● condition notification,
● confirm,
● do not finish the record of incident,
● the generation of requirement,
● the generation of report,
● the consequence of incident,
● the account regulates,
● authentication,
● the establishment of electronic money,
● the management of event database
● routing database,
● generate request,
● duplicate,
● propagate,
● use the management of database,
● the establishment of bill and processing,
● market survey,
● consult,
● the management of control collection database,
● the generation of control collection,
● the processing controls logic,
● the generation of flow of event,
● route,
● filing,
● the management of right and permission database,
● the management of template database,
● the processing of business management language,
● the processing of managing entitlement language,
● the management of advertising database,
● other generation of level automatically,
● other distribution of level automatically,
● notarization,
● the seal maker,
● Digital Time-stamp,
● fingerprint/watermark,
● bid and counter-offer,
● the object registration
● the distribution of object identifier,
● copyright registration,
● the registration of control collection,
● the template registration,
● the establishment of voucher,
● remove single maintenance,
● the management of orientor database,
● the processing of data base querying and response,
● other service function.
Figure 17 C illustrates in greater detail service function 90B.In this example, service function 90B is by the service application component 90D (1) of service function describer 90C and any amount, 90D (2) ... form.Service function describer 90C plays a part to be similar to commercial government utility system description device 90A, and only it is used for service function 90B and service application component 90D.Service function describer 90C and service application component 90D also can utilize object-oriented programming, and will in fact how implement and/or realize that the activity abstract of the requested service function 90B of institute realizes, guarantee that with OO technical assistance this describer and service application component are modularization and can reuse.In this example, service application component 90D realizes most abilities of service function 90B by carrying out step or the subfunction of service function 90B.
Figure 17 A shows total framework of an exemplary commercial government utility system 90.Total framework shown in this example is an object-oriented systems, and wherein total commercial government utility system 90 is single object, and it is made up of the service function 90B object that can reuse.These service functions 90B is made up of service application component (object) 90D that can reuse liking.As described below such, arbitrary or all objects can utilize commercial government utility to support the service that the 90-4 of service layer is provided.Shown in the commercial government utility system architecture 90 of preferred facility scheme be based upon on the right operating system 90-1 that describes in detail in people's such as Ginter the patent specification (for example, referring to people such as Ginter Figure 12).One group of service function 90B comprises " application " that right operating system 90-1 is performed.The quantity of service function 90B is arbitrarily.
Commercial government utility system 90 frameworks of the Object-Oriented Design shown in Figure 17 A have several desirable characteristics.For example, commercial government utility system 90 can easily add, removes and/or change service function 90B, to change, to expand and/or strengthen its ability.Similarly, this framework allows to add, remove and/or change the assembly 90D that service is used, so that make service function have similar dirigibility.In addition, OO design significantly improved service function and/or the service application component in the commercial government utility of difference system 90 or different service function 90B (shown in Figure 17 A) in the recycling simplification and efficient.
Application layer if desired, can be supported by the 90-4 of support service layer of commercial government utility by service function layer 90-2 and service application component layer 90-3 (comprising assembly 90DA).The 90-4 of support service layer of commercial affairs government utility can improve the efficient of a large amount of transaction.The support of these commercial government utilities is served 90-4 and can be comprised, as:
● dialogue management,
● fault-tolerant
● memory management,
● balancing the load,
● the bridge joint of database, and
● the support service of other commercial government utility.
In this example, service function 90B is based on assembly, and utilized and can reuse and based on the service application component 90D of assembly.Service application component 90D carries out step or the subfunction of service function 90B usually.Each service application component 90D can have one or two part:
Assembly 90-B a, it needn't be carried out in shielded processing environment 154; And
Security component 90-B b, must in shielded processing environment 154, carry out.
In this exemplary framework, at assembly 90D aWith assembly 90D bBetween can have corresponding relation.For example, has an assembly 90D at least aCan with at least one 90D bCorresponding.At assembly 90D aWith assembly 90D b(as among Figure 17 with shown in the public geometric configuration) between man-to-man correspondence can be arranged.In this preferred embodiment, the isolation on this function make can must and/or in case of necessity, mutual between the safe handling of running and the service application component 90D in PPE 154.Utilize this framework, can be more prone to, more effectively create the service function that needing simultaneously to realize application layer and safe handling ability.For example, in this preferred embodiment, management and/or support function on some performances that commercial government utility system 90 provides, the utilization that can relate to the application layer data library facility and obtain the information of shielded processing environment (" PPE ") 154 protections.An instantiation like this can be financial settlement 200 user's payment record.If financial settlement 200 fortune author be chosen in the historical information of preserving payment in the application layer data storehouse; but need be subjected to the information of PPE 154 protections; so that accurately determine consumer account's As-Is, realize serving application component 90D with single object A, can obviously simplify the task (as prolonging the decision of additional facility) of utilizing information among the given service function 90B, assembly 90D AMake in the application layer data storehouse information be subjected to PPE 154 protection and by service application component 90D BThe information of handling is consistent.In addition, this exemplary service application component can reuse in other service function 90B.
In another example, service application component 90D ACan mainly serve as corresponding PPE154 object 90D BThe Applied layer interface object.For example, if notarization service function 90B requires the Applied Digital signature, serve application component 90D so AAn interface can mainly be provided, and this interface is from the service application component 90D of correspondence BReceive and send messages assembly 90D BCarry out nearly all real work of creating and implementing digital signature.In addition, application layer services assembly 90D AAbnormality processing, protocol conversion or other function can be provided in addition, be used for assisting more easily or coming integration capability in the mode different with the mode that is initially service function 90B design.
Figure 17 D-1 shows exemplary corresponding relation between the exemplary commercial government utility system 90 of service function 90B and useful, general type.Exemplary service function 90B (" audit ", " record is safeguarded " ...) expression in the horizontal direction.These exemplary services functions 90B to the example types of commercial government utility system 90 (" financial settlement institute ", " use clearing house " ...) realization useful, these examples vertically write in the square frame of that delegation above the chart.The chart of Figure 17 D-1 not row complete-may also have the useful commercial government utility system of other type, also may also have other service function 90B.Really, the framework of commercial government utility system 90 guarantees that its type and service function 90B can both be expanded when business model or other factors change.
In nearly all implementation, although some are commercial to require and pattern may excite the combination of critical services function and the use of set, the framework of commercial government utility system 90 be in essence flexibly-make the implementer can freely mix and make up various function according to their needs.For example, it is useful providing and play the part of the commercial government utility system 90 of " financial settlement 200 " role-provide payment processes, communication, data base administration and other related service.The framework of commercial affairs government utility system can provide also universalization and have more versatility more of such " financial settlement institute "-in essence.For example, concrete commercial government utility system 90 implementations of " financial settlement institute " can also combine " non-finance " service function with financial service function.Concrete function or the function collection realized in any given implementation of commercial affairs government utility system 90 depend on implementer's independent requirement-for example by business model or function decision.
For example, Figure 17 D-2 shows, the repertoire of " financial settlement institute " 200 this exemplary commercial government utility system can be set up from exemplary service function 90B.In this example, the service function 90B that surrounds with black line just is included among the commercial government utility system description device 90a shown in Figure 17 B.Figure 17 D-3 shows this exemplary commercial government utility system of the use clearing house that is based upon on the different subclass of service function 90B that black line surrounds (shown in Figure 17 D-1) 300.Comparison diagram 17D-2 and Figure 17 D-3, as can be seen, some service function 90B (as " audit ", " condition notification ", " event data library management " etc.) can and use in the settlement operations in finance and reuse.The union of the service function 90B that black line surrounds among the service function 90B that comprehensively can use black line encirclement among Figure 17 D-2 of finance and use clearing house commercial affairs government utility system 90 and Figure 17 D-3.Provide simply and call more or less and/or different service function 90B, just can provide more or less and/or different functions to concrete commercial government utility system 90.
The distribution of commercial affairs government utility system 90
In preferred embodiments, above-mentioned Secure Application assembly 90-3 can comprise or comprise Figure 41 A-41D and reciprocal control structure shown in 48 and relevant rule and method in people's such as Ginter the patent specification.These reciprocal control structures can be used for the interconnected similar and different control collection that operates on identical or different commercial government utility system 90 or other the electrical equipment 100.Therefore, there are one or more reciprocal relations in the commercial government utility system 90 that each operator may be related with other operator-be some effects in the various operations.
Figure 17 E-1 shows the example of distinct interaction pattern to 17E-4, and commercial government utility system 90 can utilize these interactive modes, with ongoing part based on the transaction of these reciprocal control structures or handle mutual:
● Figure 17 E-1 shows an incident intermediary pattern; the event notice 748 that wherein commercial government utility system 90 is received from secure entity (as first shielded processing environment); generate an incident 758, incident 758 cause another (and/or same) secure entity (as second and/or first shielded processing environment) activity.
● Figure 17 E-2 shows a different commercial government utility system interaction pattern, wherein first secure entity provides event notice 748 to commercial government utility system 90 and other secure entity, carry out certain step, but second entity is carried out before next step handles in reality, be by the time receives from commercial government utility system 90 and just proceeds after authorizing.
● Figure 17 E-3 shows a notification mode, wherein from the security audit purpose, commercial affairs government utility system mostly 90 is as a passive onlooker, receive event notice 748, remove and leave no choice but solve abnormal problem (as makeing mistakes), otherwise can directly not carry out alternately with ongoing processing or transaction.
● the licensing mode before Figure 17 E-4 shows, wherein commercial government utility system 90 is received after the event notice 748 of certain secure entity, must this event notice 748 be passed to next secure entity with before carrying out next step of entire process or transaction at entity, notify 748 ' to one of this entity issued.
Figure 17 E-1 is not whole to the various interactive modes of the commercial government utility system 90 shown in Figure 17 E-4, neither repel mutually-any given transaction or handle can be according to business model or other requirement, comprise these patterns various combination partly or entirely.As mentioned above, the present invention provides technology-for example, comprise that the electrical equipment to individual consumer 95 provides for the running of distribute concrete service function 90-2 or service application component 90-3 in system 50 or network.Figure 17 F shows an example of control collection 188, and this control collection can be used for controlling " this locality " part that shielded processing environment (as consumer's electrical equipment) is at a distance carried out settlement operations.This control collection 188 can be paid to electrical equipment, other commercial government utility system 90 or other certain electrical equipment of consumer the ingredient of communication construction (as be under the jurisdiction of) by commercial affairs government utility system 90.For example; commercial affairs government utility system 90 can be its partial balance authority of office (for example; realize with one or more service function 90-2; each function all comprises one or more service application component 90-3); entrust to a process control, this process control can be carried out in the shielded processing environment 154 of consumer electronics.
Figure 17 F example is exactly method 850 (as metering, record keeping or budget), and its AUDIT incident 852 (1) is handled by checking method 854.For example, exemplary metering method 850 has:
● USE incident 852 (2) (as " click " metering),
● INITIALIZE incident 852 (1) (as preparing metering) for using,
● RESET incident 852 (3) (as after makeing mistakes, meter being returned to known kilter),
● AUDIT incident 852 (4) (as collecting the record that generates in the USE incident and the copy of current UDE value, and arranging payment) to the auditor,
● READ USE RECORD incident 852 (5) copy of the service recorder of being asked (as return),
● READ UDE incident 852 (6) (as return current UDE copy),
● READ MDE incident 852 (7) (as return the MDE that is asked copy), and
● various other incidents.
In this example, AUDIT incident 852 (4) can be connected to checking method 854.In this example, in order to visit this data, commercial affairs government utility system 90 may need to obtain the permission of access tag and/or suitable substance P ERC control collection form, and the semantic knowledge of the record format write of the USE incident 852 (2) of metering method 850, PERC control collection has defined the more detailed usage license.Semantic knowledge can be from outer (the out of band) agreement (as standard) of section, or the MDE (or relevant MDE part) that describes the metering method 850 of service recorder form by visit obtains.
The incident of checking method 854 comprises USE incident 856 (2), and this incident is carried out the desired function of incident of call method-in the case, collects the copy of service recorder and current MDE and they are sent out.In this example, suppose to also have an INITIALIZE incident 856 (1) in this method.When being called, INITIALIZE incident 856 (1) will be sent to, and its relevant loading module is understood the semanteme of service recorder with the READ MDE incident 852 (7) of callback metering method 850.Then, call USE incident 856 (2), the loading module 852 (2) relevant with this incident of processing will call the suitable incident (call READ USE RECORD incident as repeating, call READ UDE once) of metering method 850.At this moment, except that the encapsulation and transmission of management object, the desired purpose of call method reaches.
Be the settlement function that realizes distributing more, USE incident 856 (2) is done more the processing possibly.For example, in the process of the USE record that reads meter, checking method 854 can realize analytic function (as the object that uses is classified, put up with information that the clearing chain reports be reduced to visited this simple counting of all kinds of content how many times).Uninterested content type record then is abandoned.Detailed minute book also can be abandoned after analyzing.In another example, UDE value (as having write down the how many times click) and the user record quantity that retrieves can be contrasted, if both are inconsistent, just can report on the spot or take measures (as banning use of given supplier's object before further mutual).In another example, record can remove user's identity information, to ensure privacy.In another example, can handle and analyze some service recorder (abandoning then) on the spot, other details then are saved, and are provided with aftertreatment.
In case carried out distributed settlement function, information just can be encapsulated in one or more management objects, so that upload to concentrated place along the clearing chain.This may relate to the supplier directly reports, and/or to other settlement function report.After receiving, handle, send or be subjected to the part people to acknowledge receipt of really, can discharge (utilize the metering method deletion, sum up or submit to) with the record that checking method 854 will be handled.
Adopt in the example of the metering method 850 shown in Figure 17 F at another, AUDIT incident 854 can be carried out by metering method 850 " inside ".In this example, user record and UDE will be bundled in one or more management objects, utilize the loading module 853 relevant with the AUDIT incident 854 (4) of metering method 850 to send the auditor to.Yet they can not send out these objects yet, but handle on the spot.For this reason, ROS (referring to Figure 12 and Figure 13 of people such as Ginter) auditor's that adopt, that be used for seeking appointment name service record is redirected back local PPE 154.In PPE 154, can create the processing that (based on method and/or the loading module of representing them to be paid) controlled by commercial government utility system 90, carry out above-mentioned local settlement function, what only adopt is the content of management object, rather than calls the incident of metering method.Because this running is to carry out on the content of management object and they, more as if the function of carrying out in the settlement facility a long way off, can in the electrical equipment of the electrical equipment of local consumer and networking, carry out but handle.
Distribute in this way and support the additional capabilities that service provides centralized architecture not have or do not possess.For example, the copy of right and the permission clearing house former permission of asking of a playscript with stage directions ground server record request and buffer memory mechanism in can associated agency.A kind of like this local right and permission clearing house can reduce the traffic of network, and the local knowledge base (as the scene permission of computer software) that facilitates at the permission of concrete mechanism.Right owner, right and License Proxy mechanism or other right distribute and organize, and can authorize local right and permit server according to requesting for permission permission.
The another one example, many safe, supermatic management and support that service can be all and/or partly be distributed in the electrical equipment that at least irregularly connects-no matter this electrical equipment is computing machine, set-top box, PDA(Personal Digital Assistant), digital telephone, intelligentized Digital Television, or other any digital appliances.These electrical equipment can utilize shielded processing environment to guarantee to support that the execution of serving is safe and reliable, can not distorted and disturb (as people's such as Ginter patent specification is described).
In another example, a possible VDE distribution of content scheme relates to the user of the content provider who carries out initial encapsulation effect, the distribution person who carries out distributed function, record service recorder and the clearing house that handles use and Financial Information.This and centralized tupe form contrast, and wherein all these functions all are by the side execution of concentrating.
Also has an example, by LAN/WAN environment and " gateway " machine in the external world and " trunk " server of commercialization that connects company in electrical equipment, Local Area Network server and/or the company of striding the personal user, the function of distribution clearing house, raising that can implementation efficiency.
Also have an example, the computing machine that core credential management mechanism can authorized company is ratified some digital certificate.For example, company can be the member of certain trade organization.The certification authority of trade organization can give this company a digital certificate, shows this fact, and the certification authority that entrusts the computing machine of the said firm oneself to issue voucher, and each employee who shows the said firm is this fact of a member of this trade organization.Similarly, father and mother can be authorized to issue the digital certificate of representing they offspring.
How above-mentioned technology can stride a plurality of commercial government utility system distributed commercial government utility that distributes by adopting the framework of commercial government utility system 90, having illustrated.In addition, the service function 90-2 that one or more commercial government utility system 90 is provided can resolve into whole or even the section processes step of carrying out in other selected any system (comprising end users' system) of the participant of or the commercial government utility of part system 90 or given scheme whole at other (as service application component 90-2).
The type of exemplary commercial government utility system
Financial settlement institute 200
Figure 18 show financial settlement an example of commercial government utility system 200." financial settlement institute " support electronic transaction robotization, finance is fulfiled efficiently.For example, financial settlement 200 can collect and pay relevant information and details, and arrange account transfer and other compensation effectively, and receive remuneration with the supplier who guarantees to be worth, comprise the part payment that is directed to suitable value chain participant is resolved in payment automatically, selectively.Financial settlement institute 200 can also offer a loan to the shielded processing environment of participant (as the final user), budget constraints; and/or electronic money; wherein; for the safety and the local performance of operating, financial settlement may be its certain operations be distributed to these shielded processing environments and have suffered.Below exactly can be by the exemplary financial settlement support function of utilizing the present invention to provide:
● with safety, efficient, in time and accurate way financial transaction is settled accounts.
● to be subjected to being worth supplier and user/consumer confidence and easily payments mechanism safe financial settlement is provided.
● (for example guarantee to right owner and other value chain participant, from being created to distribution, selling and provide to electronic communities to some part of the process control of paying the supplier of value) payment, do not require that they bear a large amount of financial works of coming into contacts with the consumer who extensively distributes and/or various usually complicated financial service standard and agreement of management.
● allow the consumer of content to use various payment media, by the expense of public, believable payment interface information products and relevant service.
● allow each side in the transaction to confirm that the exchange of appointment takes place according to both sides' wish, and prevent that the either party from denying transaction.
● buy or coordinate during operation report the account (as from account's transfer fund of value chain participant to one or more suppliers' account).
● support frequent penny ante clearing activity.
● provide the financial settlement service to all value chain participants (as buyer, publisher and the dealer of various digital contents, and the user of the buyer of physical goods, publisher and dealer and other service).
● with distributed ecommerce territory and existing electronics, written and/or other payment and/or clearing service interface, include, but are not limited to the clearing house, digital cash of access, debit card system of bank, smart card system, electronic data interchange, robotization etc.
● by one or more banks and/or other tissue, clearing and coordination are come into force, and/or directly with may carry out the entity interface that clearing are served legally.
● by one or more banks and/or other tissue, give digital processing and/or founder, information distribution and/or the reviser of numerical information and/or the user account of consumer and/or other fund, loan and debt, create and distribution distinguishing mark, numeral, title or other unique identifier.
● container safe in utilization in any step, part or the process control that provide safe financial settlement to serve.
● be controlled to the secure financial settlement process of the rule-based and control of small part, these rules and control have promoted the distribution of the processing carried out in each shielded processing environment of system of distributed financial settlement institute (shielded processing environment, Web server, centralized settlement facility as the user).
● handle of the conversion of a kind of currency efficiently and safely to another kind of currency.
● according to comprise that service fee, product expense and/or other are content-based to small part, any expense of the use of processing controls and/or managing entitlement or other remuneration of charge, fulfil payment.
● support, processing controls content-based and/or other to use the nominal fee of transaction and being extensive use of of small amount payment to small part, wherein this support can comprise distributed, the safe accumulation and/or the processing of penny ante activity, and periodically by clearing house's network delivery information relevant, for further handling and/or accumulation with this activity.
● when reducing transactional overhead as much as possible, measure and manage the small amount payment activity efficiently.
● reduce the stand-by period of handling the small amount payment transaction as much as possible.
● gather or " binding " and the local transaction that is worth shop or other payment media (method).
● adopt value chain rule and control and processing and Quality Initiative, so that the decomposition of managing payment efficiently (cutting apart), comprise according to control use and/or other and permitting (as before starting concrete method of payment, requirement according to rule and control, the scatter pay amount of money between value chain each side, thereby the result of control payment safely) identical or different Electronic Control collection will payment distributes or is transferred to different value chain suppliers.
● by,, reduce the quantity that (as minimizing as far as possible) supports the electronic information that given electronic transaction collection is required as the accumulation of distributed transaction processing and/or transaction.
● be supported in value chain participant place and accumulate a plurality of payments or small amount payment (bundle or combine) on the spot.
● allow being worth supplier (as the participant of value chain) provides service or commodity (in kind and/or electronics) before, to check other value chain participant's paying ability effectively selling on credit.
● allow to be worth the supplier on the payment media of value chain participant preference, fund for the purchase level mandate appropriate level estimated, for example, comprise and allow to offer a loan and/or monetary budget, this budget can spend in all and/or the transaction of limited kinds on (as content and/or processing controls class), for example, comprise that payment obviously specified the budget of spending type, as only being used for G and PG film.
● potential value chain participant's identification is provided, and the payment media that this identity and value chain participant select is bound together.
● periodically provide the report of transaction, so that the clearing house is coordinated and record.Carry out and examine, keep accounts, fulfil payment and/or other remuneration and/or other clearing activity.
● according to the loss of time, place, local fund, with and/or kind such as the identity of purpose (commercialization, amusement, travelling, family expense), kinsfolk or other individual or entity, interior perhaps other commodity that obtained and/or the classification of service and/or the payment classification of activities of any kind of payment activity, event driven report is provided.
● concentrate embedded safe handling chain and control to obtain the authorization from Electronic Control.
● ratify to authorize and/or provide service and/or cooperation together to one or more distributed financial settlement, these financial settlement are certain combinations of the affiliated institutions of one or more this clearing houses, and/or be peer-to-peer with them.
● across a network or other system, according to the described rule of people's such as Ginter patent specification, control and other VDE technology, distribution financial settlement function (for example, each consumer or other value chain participant's node can both be carried out distributed financial settlement service, and participant's node can directly transmit financial settlement information to other one or more participants).
● service and/or cooperation are together authorized and/or provided in the clearing house to one or more finance branches, these minutes, the clearing house can operate in logic and/or physically anywhere, the inside of company and/or government organs for example, and/or one or more local and/or senior financial settlement the auxiliary service in total service set district in.
● interdepartmental system or network distribute and/or authorize the financial settlement function, for example, each consumer and/or some other or all value chain participant's node all may be supported distributed use clearing service, this clearing service has started the financial settlement transaction and the function of own safety in the environment of whole clearing house network, comprise the interoperability of the activity of all employing VDE technology of other place in clearing house and other one or more participants' the node of interoperable and the tabulation.
● calculate efficiently, summary and scattered distribution volume and " value added tax " imposed by at least one area under one's jurisdiction.
● support financial settlement institute network; there is relation interoperable, equity wherein a kind of (group) or multiple (group) clearing house; and that do not had on the same group and right other group membership's interoperability can be different; for example, in the shielded processing environment of final user financial settlement may only have limited right with " master " financial settlement institute interoperability.
● support the network of the shielded processing environment in clearing house; wherein this shielded processing environment comprises careful thorough " bank " or the shielded processing environment of banking industry; here this shielded processing environment can utilize the VDE ability to supervise safely; carry out bank function; safety margin (local and/or ground, distant place) as national currency; " lend " right of reserve currency to the shielded processing environment of final user and/or other clearing house; the right of starting electronic money object; fulfil the right of payment with local or distant place currency reserves; receive the ability of the communication (as electronic bill) of representing the debt of dealing with; fulfil the ability of this class payment; and as the bank " branch offices " of one or more virtual banks (or bank network), wherein these virtual banks are carrying out many now by the performed effect of traditional bank.
● support the ability of electronic money that financial settlement is created, this electronic money is anonymous conditionally, this currency can be used for fulfiling the payment debt, and this currency is taken as real currency and treats, and does not need the debit to get in touch the true and false of identifying currency with at a distance banking institution after receiving or has licensed.
● support the ability of the shielded processing environment in distributed clearing house and above-mentioned one or more function Collaboration in portable set such as smart card (as stored value card etc.); wherein honeycomb or land communicator (or other transmission mechanism) support with current or multinomial transaction as the relevant information of keeping accounts; or relate to other msu message of the commercial activity that comprises buyer, dealer and/or publisher's identification, and with the online or asynchronous communication of these movable relevant information such as authorization message, budget information, loan supply, money supply and/or payment.
● support to the value chain participant,, exchange the use data of using data or arrangement more meticulously (for example, improve in some environment privacy concern) with this for example to consumer's discount offered, subsidy and/or reward voucher.
● can organize by classification, equity or mixed mode, here, can be at different business models and/or activity and/or value chain, the responsibility of the financial settlement that distributes in a different manner, and under a certain or several situations, a certain side or a few side can be higher than other side on rank, and under other a certain or several situations, then be that same level or rank are lower.
● the relation between the participant is programmable, and (and adjusting afterwards) can be set, so that embody the financial settlement arrangement at one or more expectations of given commercial activity, value chain or pattern.
● to a plurality of participants distribution payments, for example, comprise the tax revenue of paying to one or more government departments (as municipal government, state government and federal government).
Figure 18 show an exemplary financial settlement towards function 200 chart.In this example, financial settlement institute 200 is supermatic, and it operates in believable, a safe territory, in order to a shielded processing environment to be provided.It provides the financial settlement service for all various e-commerce chains effectively.It is also playing the part of virtual distributional environment (VDE) territory of high safety and the role of the gateway between other territory-provide the agreement support for existing framework.It is inflexible, centralized that gateway function can make the shielded processing environment of VDE high flexible, distributed be utilized, however ubiquitous, believable existing financial infrastructure services.
Financial settlement 200 Core Feature relate to that payment processes 208, payment gather 212, payment decompose 214 and small amount payment management 216-because these functions collect money there from consumer and other value chain participant, and pay wealth to the supplier such as the dealer of value chain service or product.
More particularly, in this example, financial settlement institute 200 can carry out following function:
● payment processes 208,
● credit checks 210,
● payment gathers 212,
● payment decomposes 214,
● small amount payment handles 216,
● event driven report 218,
● coordinate 220,
● the maintained/managed 222 of database,
● duplicate 224, and
● propagate 226.
Financial settlement 200 payment information 202, consumer information 230, supplier's information 232, summary report and the bills 234 that can receive from the external world.It can generate buy order 236, credit order 238, form 204 on credit and report 240, release signal 242 and credit inquiry and mandate 244.
Data base administration 222 and event-driven report 218 can be used for providing accurate finance report safely to the value chain participant.Coordination function 220-and report and Financial Management be all relevant-and make financial settlement institute 200 that Financial Management more reliably can be provided.Copy function 224 and communication function 226 by financial settlement 200 be used for promoting with other financial settlement 200 and/or distributed treatment of other safety or unsafe shielded processing environment, allow financial settlement institute to share situation and lastest imformation with other commercial government utility system or other participant safely.
Shown in example in, payment information 202 (can arrive in one or more safety containers 152) is the main input information of payment processes piece 208.If desired, payment information 202 also can comprise some or all the use information of using clearing house 300 of sending to-or comprise with finance audit and transaction tracking and get in touch closer dissimilar use information.This payment information 202 can be in real time or time-delay arrive (as periodically or by other event-driven).
Financial settlement 200 funds transfers that utilize supplier's information 232 and consumer information 230 to realize between consumers and the supplier.Financial settlement 200 utilize summary report and bill 234 instruct total payment processes 208 and payment gather 212 and payment decompose 214.For example, financial settlement institute 200 can be to third-party financial group, as issues such as bank, the credit card company order 236,238 of buying on credit and provide a loan, also correspondingly supplier's account is counted the credit side so that consumer's account is counted the debit.Financial settlement institute 200 can issue form 204 and report 240, is used for security audit and/or the purpose of information is provided.Financial settlement institute 200 can issue credit mandate 244 after carrying out credit inquiry 210, thus loan is expanded to suitable value chain participant.This mandate 244 can comprise the I/O function, unless they carry out (be that authorization requests is come in, clearing house 200 is sources of loan and/or loan restricted information) fully in this locality.
Financial settlement institute 200 can suitably issue release signal 242 under the situation, makes electrical equipment 100 after financial settlement institute 200 transmits, analyzes and/or handles Financial Information, ends to safeguard and/or reservation " pending " information.In an example, consumer electronics 100 can store Financial Information in the limit of business model, even this information is " released ", this information is reduced to general introduction.Certainly, it perhaps with the copy of data finished this work (as, if allowed in the past visit it).For example, suppose that the local replica of financial use information contains the business model information of secret.Check once and may will spend 1 dollar, may be given a plurality of participants again for this 1 dollar.Usually, total the bottom line that the user only knows, although but do not understand the details of distribution-may exist each participant's of current transaction record in this locality.
Figure 19 show financial settlement an exemplary Organization Chart of 200.In this example, financial settlement institute 200 comprises secure communications processor 246, transaction processor 248, database manager 250, switch 252 and other one or more interface block 244.Financial settlement this exemplary architecture can be based on the operating system framework (in that example, general external service manager 172 can be supported the interface 254 of the service of settling accounts) shown in Figure 12,13 of people's such as Ginter patent specification.Secure communications processor 246 make financial settlement institute 200 can with other electrical equipment 100 (1) ... 100 (N) communicate by letter safely.This communication can be undertaken by the digital container 152 of safety.Most of commercial government utility system 90 wishes that all (comprising financial settlement institute 200) support in real time and receiving vessel 152 asynchronously.In addition, financial settlement 200 also can support the agreement that connects in real time, in simple transaction, as do not decompose require use Credit Card Payments the time, this agreement does not need container 152.Use the advantage that connects in real time to be that the result is real-time.This needs the situation of more money or loan favourable to the user because used up money (be not report simply or periodically replenish the budget of not using up), stakes out a claim when allowing transaction that any activity started to close transaction before proceeding also favourable supplier (as the supplier of interior perhaps budget).
The connection that is used for real-time deal does not always need safety container 152, even but but use yet its advantage of container 152 in this case.For example, container 152 allows rule and control are added in the content, the user can be specified how to use content.In addition, the use of container 152 has promoted the existing force of protected processing environment.The such technology transferring case 152 of utilization such as Email is (as the annex as the SMTP email message, or the annex of the e-mail agreement of other any supporting attachment) making can the asynchronous process content, thus make commercial government utility system 90 can be mild their highest point reason load.The operating cost of commercial affairs clearing house is exactly the depreciation cost of equipment.The quantity of equipment is mainly required to determine by maximum load.Can imagine that load has significant difference (during for example, with Friday night 8 and the load in 3 o'clock mornings of Tu. compare).Mild function can be saved equipment and relevant cost (electricity charge, manpower, maintenance etc.) in large quantities.
But the information that transaction processor 248 Treatment Analysis are received, database manager 250 can be with the information storage received in databases, are provided with post analysis and/or for historical analysis (with the limit that improves loan, the process of analyzing payment etc.).In addition, database manager 250 also can store the information relevant with the existing loan limit, mailing address (physics and/or electronics) and other account information.For example, people's such as Ginter patent specification has been discussed budget encumbrance (encumbrance).Database manager 250 can be used for storing information such as being used for following the tracks of encumbrance.The security information group can also be arranged, be used for shielded processing environment and/or adopt the telex network of these shielded processing environments, and the clearing service can be arranged.Also can be stored in the there with the record relevant with the clearing communication for service.Database 250 also can be equipped with the report facility relevant with its content.
Transaction processor 248 and database manager are opened 250 and are together carried out most of functions shown in Figure 180.Switch 252 is used between interface block 244 routing iinformation back and forth.Interface block 244 is used for and third-party clearing service, as communications such as the automatic clearing house (ACH) of credit card company, bank settlement, debit card accounts.Perhaps, the cross charging service that Federal Reserve Bank 256 is provided can be used to replace or replenish shown in the third party settle accounts service, with according to current bank's agreement and legal requiremnt, provide account's clearing service.According to feasible Finance and Banking system, financial settlement 200 payments mechanisms that adopted can be symmetrical (as telling the account charge of VISA) to the account of the toll account of consumer A and loan supplier Y, also can be asymmetric (as telling VISA that the toll account of consumer A is counted the debit) to paying the bill the financial settlement that the account of the supplier Y that uses other certain payments mechanism counts the credit side.
Exemplary financial settlement is handled
Figure 20 show an exemplary financial settlement process control.In this example, supplier 164 is to consumer's 95 supplied goods, service or content.For example, supplier 164 can provide one or more digital properties 1029 and the relevant controlling in electronic security(ELSEC) container 152 404.Shielded safe handling environment 154 record payment, use and the out of Memory at consumer 95 places, and the index 228 of checking account that indicates this information can be provided.The index 228 of checking account can be sent to the financial settlement institute 200 in one or more safety container 152b from consumer 95 places.The index 228 of checking account may comprise, as the identification of the electrical equipment 100 reported; Payment; Supplier's identification; The desirable modes of payments of consumer; Electrical equipment user's name or the checking of other body; And the type of transaction that relates to.The time and/or the frequency of report can be according to many different incidents, as year, moon, week, day or interval At All Other Times; Some generations (ratify in advance to buy as requiring, the purchase of some takes place, and the money in the local Electronic Wallet is used up, and must report or the like for other certain reason) relevant or extraneous events; Or above-mentioned these combination.
Financial settlement institute 200 analyzes the index 228 of checking account, and generates one or more final reports 240.Financial settlement institute 200 can transmit final report 240 by utilize electronically in safety container 152c, provides this final report to supplier 164.Financial settlement institute 200 can also cooperate with financial intermediary 258 and one or more finance processor 260, realization counts the debit with bank or other account that consumer 95 is had, and the bank or other account that correspondingly supplier 164 are had count the credit side.
For example, financial settlement institute 200 can receive msu message, decomposes transaction (being decomposed into the value chain number of founder, distribution person and other people and revenue department and other government entity), calculates the deserved number from each transaction beneficiary then.Then, if wish or be necessary (because scale, the expense of every transaction or the consideration on other efficient and/or the cost of transaction), each side's transaction can be accumulated as total value, submit to financial intermediary 258 (with suitable account information), be responsible for the execution of credit card trade by intermediary.Then, financial intermediary 258 (may collect the charges or extract certain number percent) just may make transaction take place in finance processor 260, makes each beneficiary can both obtain rational number.Perhaps, directly submit the necessary ability of credit card trade and the authority of office to if financial settlement institute 200 has to credit card company, it just can make transaction directly take place in finance processor 260 (as VISA).
Finance processor 260 can describe the finance debt-credit and the payment that had taken place already in detail to supplier 164 (and/or consumer 95) form 204.If desired, it can provide form 204 in safety container (not shown) inside.Financial settlement 200 can obtain counting debit's the part or the fund of certain percentage, provided the financial settlement service to compensate it.
Figure 20 A-20F shows an exemplary financial settlement activity, and this activity has utilized the local electronic money wallet 262 in the electrical equipment 100 that is maintained in the consumer.In this example, financial settlement institute 200 can provide the electronic money of electronic cash form by transmit electronic cash in one or more safety containers 152 at first to consumer 95.Financial settlement 200 can be automatically consumer's the 206a of bank or other account be counted the debit, obtaining these funds, and can do (referring to Figure 20 A) like this according to consumer's request.
Just can there be them in consumer's electrical equipment 100 in the electronic cash wallet 262 that electrical equipment 100 safeguards (" MDE " that describe as people such as Ginter) (referring to Figure 20 B) in its shielded processing environment 154 after receiving electronic funds.Consumer's electrical equipment 100 can use this to be stored in commodity and service that local electronic money payment consumer is consumed.For example, publisher 68 can be by at one or more safety container 152b transmission works 166, provide works 166 to consumer's electrical equipment, as books, film, TV programme etc.The consumer can operate his or her electrical equipment 100 and open this container and visit works 166, makes the consumer use these works (referring to Figure 20 C) in the specified mode of its relevant Electronic Control.
Suppose that the right owner requires the use payment for works 166, consumer's electrical equipment 100 can count the amount paid that needs in the stored value card 262 debit (this situation is 5 dollars) (referring to Figure 20 C) automatically.In addition, electrical equipment 100 can automatically generate the service recorder 264 of this use incident of record.Generation according to time and/or other incident; consumer's electrical equipment 100 can be automatically with the form of one or more electronics container 152c; to financial settlement 200 send check account index 264-it may be included in a collection of audit logging that audit time sends or be stored in relative recording collection in the safety database-(or its general introduction, with protection consumer's privacy) (referring to Figure 20 D).
Financial settlement 200 receive service recorder 262 and successfully it be stored in oneself the database 250 after, just can in electronics container 152d, send a release signal 242 (referring to Figure 20 D).This release signal 242 makes consumer's electrical equipment 100 can delete the service recorder of being safeguarded before it 264 (referring to Figure 20 D).
The consumer can reuse identical or different works 166, pointing out the generation of another service recorder 264 ', and utilizes another to use charge to cut down stored value card 262 (being exactly the content of using up wallet in the case) (referring to Figure 20 E).The stored value card 262 of using up can point out consumer's electrical equipment 100 to get in touch with financial settlement institute 200 once more, with the fund that requires to obtain to append (referring to request 228 ') and service recorder 264 ' (in this example, two block messages all transmit in identical electronic container 152e) (referring to Figure 20 F) is provided.
Financial settlement 200 can respond (after consumer's bank or other account are counted the debit) by the electronic funds that transmission is appended, and can provide other release signal (referring to Figure 20 F) of the electrical equipment 100 deletion service recorders 264 ' that allow the consumer.Money recieved can be paid the right owner (deducting any rational number) with after compensating commercial government utility system 90.
Payment is decomposed
Figure 21 shows an exemplary financial settlement activity that relates to value chain " decomposition ".In this example, financial settlement 200 support the payment in the value chain to decompose efficiently, reliably, safely.Figure 21 shows a creator of content of paying works 166 to publisher 168, as the author.Publisher is to consumer 95 distribution (for example, at e-book 166, in) and pay works.In this example, consumer 95 has paid 20 dollars for the copy of his this part works 166 '.Consumer's payment between author 164 and publisher 168 according to as contract agreement quilt " decomposition " or carve up.In this example, publisher obtains 4 dollars in 20 dollars of consumer, and remaining returns the author.
Decompose make financial settlement 200 payments that can automatically between any amount of value chain participant, carve up the consumer.This to guarantee all concerning product or serve contributive each side can be reliably, efficiently from their contributions separately, obtain the compensation exceedingly useful.
Figure 22 shown financial settlement 200 how could to support value chain shown in Figure 21 to decompose.In the electronics example of Figure 22, consumer 95 can pay financial settlement institute 200 with his payment by the electricity consumption submode.This payment can be the form that is encapsulated in the electronic money among the safe electronic container 152a, perhaps other certain form (as the use information of being reported that combines with existing mandate, so as financial settlement 200 bank accounts with consumer 95 count the debit).
Financial settlement 200 can the appropriate portion of consumer institute defrayment be distributed to author 164 and publisher 168 according to the agreement between author and the publisher.Be what tell financial settlement 200 whose decomposition part that should obtain to pay? in this example of Figure 22, works 166 can the form with electronics pass to publisher 168 from author 164 in one or more safe electronic containers 152, pass to the consumer from publisher 168 again.One or more Electronic Control collection 188 can be contained in the identical or different container, and these control collection are relevant with works 166 or other property.The number that control collection 188 can specify consumer 95 to pay in other item is so that can use works 166.
The payment of how to decompose the consumer between other value chain participant also can be specified and control to control 188.For example, author 164 can be in the control 188b that she provides, and specifies every part of copy of the works 166 that she will buy from ultimate consumer 95 and obtains 16 dollars.Because safe handling chain and control (referring to people's such as Ginter patent specification) that with good grounds virtual distributional environment provides, author 164 just can be sure of the domination of the potential user of (its degree depends on that author's commercial priority requires and the strength of total system is permitted) publisher 168, consumer 95 and other any consumer or property 166 with controlled 188b.Publisher 168 can add its control in the control of author's 164 appointments to, and the control 188c (for example) of publisher provides 4 dollars of prices markup, is used for brand, distribution and marketing service.
Figure 22 A shows the control collection of describing in the patent specification that how to utilize people such as Ginter in consumer's shielded processing environment 154 188 and carries out the payment decomposition.People such as Ginter have illustrated how the control collection is realized and controlled whole meterings, record keeping and budget and handle in user's shielded processing environment 154 in Figure 48 and relevant text.Figure 22 A shows the decomposition payment according to one or more control collection 188 of the shielded processing environment 154 that offers the consumer.Each processing block shown in Figure 22 can respond the user and open request (incident) with accessed content.
In this concrete example, metering method 275 is designed for when the consumer uses the content of specific fragment for the first time, send an incident (if desired for accounting method 277, metering incident 275 can also or alternatively transmit this incident when the consumer uses this content at every turn, so that " paying by watching number of times " function to be provided).
In this example, accounting method 277 comprises two kinds of different accounting method 277a and 277b.Method 277a, 277 can independently pay-and for example, author 164 can pay the submethod 227a of record keeping, and the submethod 277b of record keeping can pay in publisher 168.Accounting method 277a writes regulation with information should be in the record keeping index data structure of author's 164 pairs how much (being 16 dollars in this example).Accounting method 277b writes regulation with information should be in the identical or different record keeping index data structure of publisher's 168 pairs how much (being 4 dollars in this example).Accounting method 277a, 277b can receive the open incident that metering method 275 is transmitted respectively, and billing record can be write the record keeping index data structure of identical (or different).
In this example, budget method 279 can independent payment outside accounting method 277a and 277b.Budget method 279 can write record the budget index data structure 281 that agreement (promptly carving up 16/4 dollar between author and publisher) is decomposed in regulation (in other item) payment, and accounting method 277a, 277b have made regulation to this agreement.Budget index data structure 281 (with the data structure separated maintenance that accounting method 277a, 277b safeguard, therefore can not be revealed by author 164 and/or publisher 168) can be delivered to financial settlement institute 200.Financial settlement 200 will carry out payment and above-mentioned financial settlement counted the debit, count the debit with 20 dollars among the consumer account, with 16 dollars of accounts that login the author, 4 dollars of accounts's (thereby between author 164 and publisher 168, decomposing 20 dollars that the user pays) that login publisher.Meanwhile, the record keeping index data structure can be sent to the use clearing house 300 of author 164 and/or publisher's 168 appointments.Use clearing house 300 can analyze this record keeping index data structure and allow author 164 and/or publisher 168 know how much they will obtain from financial settlement institute 200.
Like this, in this example, Electronic Control collection 188 can specify or stipulate therein: (i) available right in the concrete digital object, the spending of (ii) exercising this right, and the payment of (iii) how to divide (decomposition) exercise the right between the right owner.The efficient of height is provided the ability that this (before the person's of expanding consumption method of payment and arrangement) in advance regulation payment is decomposed and dirigibility-because it can use consumer's method of payment, the partial payment with the consumer automatically is directed to the relevant personnel that need be compensated.Because being used for the identical electrical equipment 100 of exercise the right also can be used for assisting payment is directed to each different value chain participant, whole financial settlement a part spread over effectively in a large amount of parallel computation resources.For example, because people's such as Ginter the disclosed system of patent specification can provide the confidence level of height, so the right owner can enough appropriation give commercial affairs stream with this control collection 188 promulgations, implements their arrangement of payment.Financial settlement 200 can assist to guarantee that this decomposition payment can effectively, promptly arrive the destination that they should arrive.
The shielded processing environment 154 at consumer 95 places has been strengthened control 188 safely, and before allowing consumer's 95 visit works 166, this control need be from consumer 95 full-payout and/or payment authorization.Control 188c also can specify which financial settlement institute 200 of use to be engaged in payment processes, and when selecting the method for payment aspect to provide dirigibility for consumer 95, it is feasible specifying which method of payment.Then; consumer's shielded processing environment 154c just can send to financial settlement institute 200 with suitable payment or payment authorization 190a automatically; so that 188a decomposes according to control, control 188a can be identical with the control (subclass of perhaps decomposing those relevant controls with payment) of author and/or publisher's appointment.
Because consumer's shielded processing environment 154c generates the control 188a (referring to Figure 22) at control 188c, the 188b of publisher and author's appointment; thereby can entrust these payment control 188a to carry out the willingness to pay of author and publisher, agreement is divided in reflection payment between the two.Consumer's shielded processing environment 154c can be in one or more safe electronic container 152a, and consumer's payment or payment authorization 152a and these payment control 188a are sent to financial settlement institute 200.
Financial settlement institute 200 handles payment or payment authorization 152a according to control 188a, divides agreement according to the payment of reaching between author and the publisher, will pay 152b and distribute to publisher, will pay 152c and distribute to the author.Like this, for example, financial settlement 200 just 4 dollars electronic money can be sent to publisher, and 16 dollars electronic money is sent to the author; Perhaps the money of these numbers is logined bank or other account of author and publisher.Because entire process takes place in a safety, believable virtual distributional environment, each participant of value chain can both believe that they obtain their desired payment with reality, processing can be by very effective method automatically, electronicly carry out, and this method can adapt to various business model and special relation neatly.
Figure 23 shows other, a complicated more to a certain extent payment and decomposes example, and this example has added distribution of content person or tabulator 170 in value chain.In this example, 20 dollars of consumer 95 are divided into three parts rather than two parts now possibly, and author 164 still obtains 16 dollars, and publisher has to 3 dollars, and distribution of content person/tabulator 170 then obtains 1 dollar because of his or her effort.Figure 24 shows that identical basic scheme shown in Figure 22 still can be used for satisfying this new value chain participant's payment or other interests.
Figure 25 shows another payment and decomposes example.How Figure 25 shows with decomposing commercial government utility system 90 role in maintenance and management value chain process is compensated.As mentioned above, distributed commercial government utility 75 provides very important service, as financial settlement, use audit, permission, identification or the like.This class management and support service that whole commerce or industry can depend on efficiently, provide reliably.Commercial affairs government utility system obtains compensation should and making great efforts from they self investment.A kind ofly making the method that they are compensated, is to obtain a small amount of share-" a piece of the tick " from each transaction.Above-mentioned identical payment is decomposed mechanism and also be can be used for supporting to give commercial government utility system 90 that this small amount payment is provided.
Figure 23 shows an example, wherein commercial government utility system 90 obtain each trading value 3% (shown in example in be 0.6 dollar).Because above-mentioned Electronic Control collection 188 can be used for realizing this small amount payment ability, can adapt to any desired commercial arrangement or purpose flexibly effectively.
Figure 26 shows, payment is decomposed and be can be used for the payment of unique user decomposed or carve up to become arbitrarily a different number (even to write down number with dissimilar currency, be used for the international trade purpose), these different amount of money are located at each different destination, and have adopted various payments mechanism (as credit card, bank account, electronic money etc.).
Figure 27 and 28 shows other example that payment is decomposed, and can how to handle these and other arrangement neatly further to show distributed commercial government utility 75.The payment that the example of Figure 27 is presented at author 164, publisher 168, tabulator 170, carves up the consumer between packing person 174 and two other author 164, the 164b again, the extra works that author 164a, 164b provide are incorporated in the electronics property right that offers the consumer.The example of Figure 27 is specially adapted to that packing person 174 extracts content from a plurality of source book that relate to relevant issues and with their comprehensive source book products that becomes to mix again, as multimedia combination, " current awareness " intersection or be sold to the publication of the bulletin class of interested each side.
For example, packing person 174 can publish a bulletin about politics in the present age again, and it has selected one piece of article of author 164, with other two pieces of works that it is write with author 164a, 164b, is publishing in the first phase bulletin down.Author 164,164a, 164b can authorize packing person 174 layout and reissue works again again.Packing person can utilize this right of layout again again, makes up-to-date first phase bulletin, and it is distributed in the safe electronics container for consumer's 95 readings.In this example, safe electronic container 152a can comprise commercial-three works of four kinds of independences " payment " set that require at least and use one (by everyone appointment among author 164, author 164a, the author 164b) respectively, and one is used for whole bulletin (being specified by packing person 174 again).Perhaps, can in safety container 152 independently, send and pay each works and/or the control that is applicable to them, and/or some works or oeuvre with and/or control also can be positioned at a distance.
Read this part bulletin, consumer 95 must open electronics container 152a.The price (by the price of packing person again) of supposing each phase bulletin is 10 dollars.10 dollars of consumer payments or payment authorization just are sent to financial settlement institute 200, financial settlement institute 200 comes these 10 dollars of decomposition, compensated for each participant of value chain, for example, author 164 can obtain 1 dollar, and publisher 168 can obtain 1 dollar, and tabulator 170 can obtain 0.5 dollar, two other author 164a, 164b obtain 1 dollar respectively, again packing person can to obtain all the other fund-all these be by the Electronic Control commander's who is suitable for.Like this, packing person just can be compensated again, so that select suitable feature article and their are comprehensively become one piece of publication of reading easily, packing person can also use the sign of the identification brand of oneself as oeverall quality again, and can add the content of oneself creating.
Figure 28 shows " super distribution " example.Right owner worries from the infringement of copyright of " pass-along "-in other words very much, bootlegging and issue again.The pass-along problem is comparatively serious in digital environment such as Internet.Disclosed management and service arrangement in disclosed virtual distributional environment and this instructions in people's such as Ginter the patent specification fundamentally make pass-along change a kind of important chance into from tangible threat.In preferred embodiments, because virtual distributional environment provides e-management uniqueness, automatic, safe to the value chain right, the consumer can be taken as the believable member of value chain and treat.This makes super distribution pattern become possibility, and wherein all consumers become potential distribution person.Because the income of super distribution has only been brought minimum right owner's cost, the super right owner who is distributed as successfully works provides the possibility of huge income.
Referring to Figure 28, suppose that consumer 95 obtains works from tabulator 170 there, she enjoys a lot, and just wants these works are passed to her several friends and colleague.Suppose that tabulator 170 has ratified the right that consumer 95 has the redistribution works, the consumer is easy to just the copy of these works to be issued the potential consumer of other any amount 95 (1) so ..., 95 (N).Other these people know consumer 95, believe she can to they not send out may not have the interest and thing of low quality.In addition, the consumer in downstream need not pay the bill the extracts that just can read the outline of works or see it (as see a film trailer, read chapter 1 of a novel or the like).
After freely running through outline or finishing watching preceding 5 minutes of film, suppose to have 6 consumer downstream 95 (3)-95 (8) to agree that each people does not have dollar for this content payment 3.25.Financial settlement 200 can guarantee that author 164, publisher 168 and tabulator 170 can obtain the income of appropriate portion (give the author as 7 dollars, give publisher for 7 dollars, give the tabulator for 8.75 dollars) respectively.
Super distribution makes arbitrarily, and the redistribution of a grade becomes possibility.For example, suppose in these 6 consumer downstream 95 (3)-95 (8) have three people decision that these works are passed to other 6 potential consumers-so respectively and receive copy with regard to 18 other people are arranged.Because the works of redistribution have the control structure of the identical arrangement of payment of corresponding order, thus author 164, publisher 168 and tabulator 170 everyone can both obtain extra payment there from each new consumer.The snowball effect of redistribution can continue considerable time in such a way in the consumer of any amount, and can increase considerably value chain member's income with minimum extra cost.
Payment gathers or binds
Nominal fee and small amount payment can become the important foundation that content is used transaction.For example, the consumer can be by particular work that she watched, use one section computer software or the number of times of one section music hearing is paid.The different modes of payments can be provided neatly, and the initial cost that makes the consumer can select to pay the plurality volume obtains unlimited use, or is the less small amount payment of unit payment amount with each the use.In addition, concerning commercial government utility system 90, small amount payment is to be used for the easiest burden of the service that bucking-out system provided and most realistic method.Therefore, aspect supporting and implementing the small amount charge, this ability of handling small amount payment effectively is very important.
Traditional financial payment mechanism as credit card, check etc., is not suitable for managing small amount payment.These systems have the classification transactional overhead usually, and this is a white elephant for the business model based on many purchases below 5 dollars.For example, to spend 0.5 dollar if handle certain payment transaction, concerning processing is lower than the payment of certain number (might be 2 dollars), just seem uneconomical so, accounted for a big chunk of turnover because handle the spending of payment, even surpassed transaction itself.Therefore, traditional financial payment mechanism is more suitable for wholesale and buys, and is not suitable for small amount and buys.
Figure 29 shows that what use is made of payment gathers or bind, by reducing the quantity of the indivedual financial transactions that need clearing, and/or by reduce these exchanges of clearing need the quantity of information receiving and transmitting, eliminate this worry.Exemplary payment shown in Figure 29 gathers and can carry out at the electrical equipment 100 of the shielded processing environment 154 of being arranged in of consumer oneself; Perhaps in centralized financial settlement institute 200, carry out; Or partly in electrical equipment, carry out, part is carried out in centralized clearing house.This payment aggregation process can gather many small amount payments or combine, and forms bigger payment-or form a collection of small amount payment that can single treatment.This bigger payment and/or small amount payment in batches can periodically be reported with other transaction data, if desired, are just coordinated and record by commercial government utility 75.This ability that gathers small amount payment all has important advantageous effect at the quantity of the individual transaction of raising the efficiency, reduce the needs clearing and the aspects such as information receiving and transmitting amount on the reduction electric network 150.Certainly, payment gathers (for example needn't be fit to each transaction, some big, crucial or risky transaction may need real-time clearing), but can be used for the transaction of wide variety of conventional, to reduce burden to commercial government utility system 90 and total system 50.
One in this conception of species becomes in the example, payment gathers the number that can keep each individual transaction, to obtain the full and accurate property of height, when report (as having received the X dollar but can be used for triggering, or taken place Y time the transaction), so just can many individual transaction tie together the transmission and/or the processing.This gather the quantity and the frequency that reduce the individual message of on electric network 150, propagating all useful.In this case, the electrical equipment 100 of report can be reported: the total value after (i) individual transaction gathers, perhaps (ii) each individual transaction, perhaps (iii) both, perhaps (iv) both combinations.
Figure 29 shows that the consumer can use his or her electrical equipment 100 to be engaged in many different activities, for example reads novel, watches video frequency program, obtains and check result of study, enjoys the balance of multimedia presentation and family finance such as check book alternately.Each small amount payment that uses can be relevant with in these activities each.For example, the each visit of consumer just to 1 dollar of the A of publisher payment, is paid 1.5 dollars to author A by author's writing and by the electronic edition of the works of publisher's distribution.The works of supposing author A are very welcome, adapted into film.The consumer can watch the wherein film-A5 of payment publisher dollar as the basis by the number of times that uses, 3 dollars of authors, and 750.5 dollars of distributed commercial government utilities.
Payment tabulator 266 is (if wish; can in the shielded processing environment 154 that the consumer place is provided by consumer electronic appliance 100, operate) payment can be gathered to public entities, preserve and return the amount of the A of publisher, the flowing water total value of returning the amount of author A and returning the amount of distributed commercial government utility 75.When the consumer triggered other payment events at every turn, this flowing water total value just increased.Can be periodically or otherwise will gather at a certain time interval after amount paid report to the commercial government utility of financial settlement institute 200 or other system 90 (for example weekly, every month once or once a day), the appearance of certain incident (for example, the consumer has surmounted her loan mandate and new mandate of needs, certain Electronic Control expires etc.), and/or arbitrary or whole mixing of these technology.
Figure 30 shows the payment of striding some consumer transactions and gathers.In this example, pay same value chain participant and adopt the payment of same method of payment to be summarised in together as total value.This payment gathers-quantity of total financial transaction that needs settle accounts can take place-reduce in consumer place and/or financial settlement institute.This has improved efficient and handling capacity, has reduced the cost of handling each indivedual consumer transaction.
Figure 31 shows the example that another one payment gathers, and wherein gathers to be many different consumers' transaction is carried out.For example, financial settlement 200 can gather the All Activity that adopts the particular payment method belong to specific supplier.Notice that the payment shown in Figure 29-31 gathers the details that technology not necessarily can cause losing individual transaction.In other words, consumer's electrical equipment 100 still can write down and report the details of each transaction, although financial settlement 200 and/or use clearing house 300 still can once conclude the business once the payment of the use information-individual transaction of transaction ground report information is combined so that more effectively handle and operate payment.This ability of operating and handle more detailed, more full and accurate use information when gathering payment separately can provide senior audit responsibility under the prerequisite that does not excessively increase payment processes mechanism burden.In some cases, lose detailed record and can obtain deposit here in the clearing house.They can be abandoned, but be retained in the knowledge base of user's system and/or commercial government utility system 90 them also beneficial.For example, if the record keeping dispute, in fact what just can take place-never they sent to the clearing house even prove as useful evidence in the local replica of detail record.
Figure 32 shows how to transform an exemplary financial settlement institute 200, makes it comprise payment tabulator assembly 268.Payment tabulator 268 can be used for gathering from the many different consumer electronic appliances 100 or the payment income in other source, and these are gathered the back payment offers switch 200, so that handle with third-party clearing service.Payment tabulator 268 can optionally only gather some payment, and switch 200 is then directly delivered in other payment meanwhile, does not directly handle so that just do not do to gather.Gathering of payment can be according to many different factors.For example, can gather payment according to consumer, supplier, method of payment, combination any or whole factors.This function that gathers can completely or partially be carried out in consumer 95 electrical equipment, is perhaps concentrated by centralized clearing house 200 and carries out.
Use clearing house 300
Figure 33 shows this commercial government utility system 300 of exemplary use clearing house.Use the service of clearing house can collect usually, analyze relevant digital properties and/or the use of digital processing and/or the use information of execution detailed, that sum up with " directed again " and/or that derive with function.This information can comprise the information of any description electronic transaction activity.Below using the clearing house and/or supporting that service can provide and/or promote:
● independent audit and report (can be independent of the financial settlement service provides);
● general market survey;
● to negotiation, enforcement being provided, determining and privacy of communicating by letter and security classification with using information-related consumer and value chain participant;
● the marketing of formulating according to colony and unified catalogue sales, lease or issue permission.
More particularly, use clearing service according to the present invention can provide the combination in any of for example following detailed characteristics and/or function:
● sum up, gather, utilize, derive and/or provide a description and/or relate to the information of the use of the content of safety container, safety container and/or other any content and/or any digital control processing, wherein this information description and/or relate to one or more users of (a) content and/or processing, (b) use of one or more contents, control and treatment, content and/or user, and/or one or more recipients of this use information.
● make that the use and/or the process information of tracking and report content and/or processing controls becomes possibility on the level of highly full and accurate (as in detail).
● can collect, gather, analyze, sum up, take passages, report, distribute, lease, permit and/or sell use information.
● utilize the information that exposures such as content such as advertisement, information material, amusement, material for training, business efficiency software application is drawn from the user, by utilizing the VDE mechanism in the preferred embodiment, gather and/or analyze the clearing house to use information safely a part of information and/or relevant with it information that draws like this is provided at least, here, this clearing house provides above-mentioned use information or at least a portion of the information that draws from this information in addition at least one clearing house and/or value chain right owner safely; Wherein, described clearing house can provide resulting different use information to other the different each side with clearing house or other right owner effect safely.
● utilize the shielded processing environment of user metering is created and/or drawn according to various technology " consumption of information " the index disclosed technology of people such as (for example, adopt) Ginter of checking account.
● Collection and analysis uses information in detail, as open, extract, the number of times of embedding or combine digital property or its any part; Perhaps the value chain participant uses property, as the module of interactive entertainment or multimedia presentation, computer software or these products or the time span of accessory constituent.
● for the use information from consumer or other shielded safe handling environment provides various capacity of orientation again.
● provide be beneficial to file and approval independently, third party's auditing capabilities.
● in a preferred embodiment according to using audit, user situation and/or the market study relevant that information is provided with the use of the processing controls of one or more safety containers and/or content and/or VDE management.
● be right owner, consumer and/or other value chain participant and/or interested each side such as government department, provide neutral, believable third party to examine to use and gather and report service (tax, law enforcement, business survey and statistics etc.).
● right and permission clearing together with rule and control (for example provide the audit chance, a report is provided, pointed out to use the permission and the right of which rule and control, for example what does, does, when done-actual user's activity and specific permission and right and/or rule are closely connected with control template are in the same place thus) by whom.
● in this preferred embodiment, to each and/or one or more groups creator of content, distribution of content person, industry analyst, Finance House Association and other any speculator and value chain participant and/or other any interested each side such as government statistics personnel, regulating and controlling mechanism and/or tax administration office arbitrarily, provide report and analysis according to VDE rule and control and the standardized and customization of in the VDE container, producing and paying.
● provide original, that refined, that summed up, that derive and the report of the trust data that gathers, so that support in any value chain and/or stride and/or the multiple business model of a plurality of value chains.
● will use information to separate with the financial settlement service or distribute and give the inner or outside value chain participant of electronic communities and other each side.
● support privacy and the control of maintaining secrecy, fully conservation value chain participant all with the right of using information-related interests, for example, comprise the inherent right of handling and controlling the VDE chain of managed business model.
● can satisfy the requirement of privacy aspect, (exceed the distribution person, tabulator of consumer or value chain content, the information beyond other user of directed person or electronic equipment again as non-disclosure, in this facility scheme, this equipment has adopted VDE for safety, managed interior perhaps other processing controls, mandate, so which type of information the user of notified on authorization is collecting and/or settling accounts).
● can by trust be used for to small part with rule be controlled to be foundation; further handle secret or private use information or sending this information to other side or a plurality of participant (comprising other any use clearing house) before; automatically hidden (as encrypt), remove and/or change one or more parts of this information; thereby protect privacy and secret effectively, comprise the confidential information of protecting commerce and trade.
● the business model information that protection is crucial prevents that interested other each side from spying, and/or prevent to disclose unintentionally other each side and/or the public to stake, thereby establishes solid foundation for real believable commercial network.
● allow to comprise publisher and distribution person, and/or the supply of consumer and service and/or the product value chain participant in being organized in, negotiation is about to convey to the value chain right owner's of any appointment the detailed levels of use information, wherein, detailed levels can be who and the particular type that uses information and/or subtype and different according to concrete take over party, here, the some different detailed levels of the different piece of this use information can be provided to the use information receiver of appointment, or as the referable detailed levels of appointment, the details of Que Dinging to small part is to be determined by the right of specifying a side like this, and this side of appointment is to be described by VDE rule and control information in the preferred embodiment to small part.
● allow consumer and tissue negotiation to send the detailed levels of value chain right owner's information to.
● allow consumer or other value chain participant-founder, publisher, distribution person, more directed person-appointments and/or consult detailed levels, they are expectation with the classification of content any given segment of using, content, concrete processing, handle classification and/or payment (for example requires gathering of relevant use information and/or anonymity, anonymous and/or use the maintenance of the relevant privacy of particulars may require the payment price markup with some or all, with the loss of the value that remedies this information).
● allow information consumer and/or other value chain participant to customize their " consumption of information ", and set up rule and control, how regulation gather their use information according to wish or be used-and according to the right owner's of the information that receives of having the right competition requirement, and/or reception information that user and right owner both sides are agreed with electronic method offers the right owner.User and/or one or more right owner can have the right to specify the limit to one or more right owners, and/or describe the concrete use information can maybe must pass to one or more right owners.
● which class of supporting real value chain participant's control to gather the value chain participant is used information, who can visit any information and how just can use these information, how to collect and handle these information, and the degree of contact of service recorder and characteristic value chain participant or tissue.
● in any step, part and/or the process control that provide safe use clearing to serve, use container (using the VDE safety container) safely as shielded processing environment of VDE and the secure communication ability described in conjunction with people such as Ginter.
● be supported in exchange and use in the process of the use data of data or arrangement more meticulously (for example, improving in some environment concern), to the value chain participant, as to consumer, distribution person, discount offered, subsidy and/or reward voucher such as directed person again privacy.
● generate and provide sales research and report and comprehensive the sales catalogue sale targetedly of other form (post targetedly, sell directly to households and) to interested each side.These data are similar to the audience fating report and/or the commercial sales list targetedly of the audit of independent magazine and issue of a newspaper amount, TV usually, but they are at one efficiently, generate in the distributed and safe electronic environment.When needing, according to recipient's request, payment, right and/or with a part or a side of the sharp owner's interests of a plurality of part right of possession or the conflict of interest of a plurality of participants at bottom-up information, these data can have particulars important, new model (as watch, print, extract, recycling, electronics savings, redistribution etc.), more full and accurate information, and customization, report data optionally.
● utilize detailed use information, automatically generate hierarchy, scheme, group and/or grade, and the one or more grades that automatically in the use data of creating, collect, transmitting together with at least one safety container and/or VDE in the preferred embodiment, draw, assign individual, individual group, mechanism, mechanism's group, numeral and/or analog content or numeral in groups and/or analog content.
● support advertisement and marketing, comprise and support value chain robotization efficiently, with automatic delivery service, as automatic searching target, or to the consumer who stipulates, the professional person, advertisement and/or other sales data are delivered in the set of employee and company (as one or more grades), wherein set can be selected by the oneself, use data, use data conditions, or other method is determined, wherein these set can be by arbitrary or a plurality of value chain participant (as the founder, the consumer, distribution person, the service provider, website, distributed clearing house) forms, described one or more participant can receive different, the data of customization, if the participant of the data of reception has obtained the mandate of rule and control, just can redistribute these data, these participants can obtain loan from this redistribution, reward voucher, pay in cash, and/or the remuneration of other form, this redistribution can be taked to select according to the oneself to small part, use data, use data conditions or other method, the some or all of this data that receives is directed to other a certain side or a plurality of participant, and all these processing all can be managed (as supporting) safely by internodal processing controls VDE chain in the preferred embodiment.
● according to the exposure of value chain user to advertisement, determine payment and/or other remuneration that the right owner should obtain from the advertiser there, and at least in part have with as the content of the foundation of determining remuneration and/or handle among some sides of relevant right owner's interests, part these remunerations safely automatically distribute.
● according to directly, concrete more in detail use data and and/or the consumer that automatically draw and the preference of value chain hint, clear and definite from use information, user situation, Classification and Identification information etc., support senior, the market segmentation and the more suitably design of information products and business model targetedly.
● make " special-purpose " use clearing house (the use clearing house of certain organizational controls and/or running) can obtain some detailed use information; here; these use the clearing house can carry out other processing of operational analysis and/or these information; and from these part or all of use information; to clearing house and/or other value chain participant that concentrate more and/or its side; the use information that optionally restriction is provided is (as adopting the summary of higher level; summary information; the use of restriction use information and/or use-pattern-check; print; preserve; redistribution etc.); these are used the difference restriction of information; applicable to from different types of content; handle; the user; and/or the use information that draws in the use of user's group; this limitation capability is by the details of hidden some internal activity; for the confidential information of the clandestine trade of company or other tissue provides extra important protection; and; other of value chain side or a plurality of participant can require to obtain payment and/or other remuneration, as to preserving the repayment of these detailed use information.
● make tissue can adopt special-purpose use data clearing house on the Intranet of company, the document workflow of these clearing houses and tissue and/or data warehouse integrate here.
● by special-purpose using-system (as company; government bodies; the affiliate; or other any organized operation entity) clearing house; from the electrical equipment of organization internal, accept use information; and record gathered be the detailed report that uses for inner; and/or report is for the inner original detailed data of using; but only will use data to gather report as summing-up; distribute for outside; for example; distribute and give the right owner; and/or other value chain participant; and/or one or more gyp clearing houses; in preferred embodiments; be protected for the inner detailed data of using; to the electronic identity of small part basis by each side's security maintenance of appointment; with and other uses of access or these contents is limited to the each side of appointment and/or in the mode of appointment; these electronic identities comprise that any interested party's classification identifying information is (as the member of certain research organization; senior officer administration person), this information has the privilege of using relevant customizing messages.
● by the use clearing house of special use, discern and provide and use relevant information, these information provide the use data of important value, are used to distribute resource, direction research and other important commercial purpose of organization internal.
● distribute and use clearing (as for efficient and/or other reason).
● in preferred embodiments, according to the described rule of people's such as Ginter patent specification, control and other VDE technology, across a network or other system's distribution settlement function.(for example, each consumer and/or other value chain participant's node all may be a distributed use clearing service, it is settled accounts to the safe handling that small part starts oneself, and here, participant's this node can directly send use information to other side or a plurality of participant)
● hierarchically organized use clearing house, maintain secrecy in each layer of hierarchy at least in part.
● service is authorized and/or is provided in approval to one or more distributed use branches clearing houses (or with these clearing houses), these clearing houses logically and/or physically can operate in other place, as the inside of company or government organs, and/or in the service subclass in total service set zone of one or more area under one's jurisdictions and/or senior use clearing house.
● interdepartmental system or network distribute and/or license settlement function; here; each consumer and/or some other or all shielded processing environments of value chain participant (node); all might in the environment of total distributed commercial government utility, support distributed use clearing service and function.
● start it, directly conclude the business with the use of other one or more participants' safety.
● use any or all activity of adopting virtual distributional environment technology, the running of interoperable is offered the node of one or more interoperables of other participant.
● utilize the clearing house generate to use used information, this information is used in the design of being used information descriptions by these and/or the sales process at product and/or the service relevant with product and/or its and is obtained utilizing to small part.
● can be by classification, equity, or integrated mode is organized, here, can be at different business models and/or activity and/or value chain, distribute in a different manner and use the responsibility of clearing, and, under one or more situations, a certain side or a few can be on grade, to be higher than other each side, and under other one or more situations, then be same level or lower rank, in other words, the relation between the participant is programmable, and (revising later on) can be set, to represent certain commercial activity, the use clearing of one or more hope of value chain or pattern are arranged.
Figure 33 shows an exemplary use clearing house 300 from the viewpoint of handling.In this example, use clearing house 300 to collect, analyze and report the use of numerical information, include, but are not limited to the use of digital content.In this example, use clearing house 300 to carry out following function:
data aggregation 314,
● data base administration 316,
privacy control 318,
security audit 320,
safety message 322,
● data gather 324,
● advertisement and marketing 326,
operational analysis 328,
● duplicate 330, and
● propagate 332.
If necessary, use the communication between clearing house 300 and other electrical equipment 100 to be undertaken by safe electronic container 152.As above in conjunction with financial clearing house 200 being explained the mode receiving vessel that use clearing house 300 can be real-time and/or asynchronous.In using clearing house 300, real-time demand may relate to advertisement or viewership information, these information can lose its part or all of value as the function of time (as, if do not submit certain viewership information before the specific time, it just may be again has nothing to do with the market analysis of appointment; Perhaps, if even the advertiser does not receive use information with having, they just possibly can't cater to consumer's taste effectively).Another situation may relate to the use information of must submitting (as the user who the spends a holiday back of returning finds that their needed audit data and grace of payment have all expired, unless and examine, otherwise they just can't use these properties).In some cases, for the reason identical with the financial clearing house of top combination 200, the asynchronous situation of submitting will be preferable.
Data collection function 314 is used to collect the information of service recorder 302 and other type, as rule and control 188 (for example, can provide about price and permission information), financial form 240a, detailed finance report 240b, use information and/or analysis request 336.Data collection function 314 can be mutual nearly with database management function 316-be stored and be maintained in use or other database in various information.Duplicate with communication function 330,332 and (for example can be used for the content of database 316 and other database synchronization; and/or stride the shielded processing environment of many secure networks or electrical equipment provides distributed data base the database that other uses clearing house 300 to safeguard).
Data gather 324 and analyze 328 and can be used for analyzing data collection function 314 contents collected and/or that be stored in the data in the database 316, use clearing house 300 can carry out audit 320 and/or report 322.Privacy control 318 can be used for only disclosing some information to the third party with function of reporting 322, thereby and non-disclosure out of Memory-protection consumer to privacy and secret care, use information to collect as the consumer.This uncertain control 316 can be explained with the rule relevant with the container of information arrival.
Function of reporting 322 can generate various use audit reports 304.In addition, use clearing house 300 to can be used for providing advertisement and/or marketing to support 326 (as assisting to make advertisement, and/or provide market and advertising research) specially at the consumer of suitable population.Like this, in an example, use clearing house 300 self can generate and/or releasing advertisements 340, watch for certain consumer targetedly, perhaps use the clearing house to pay this advertisement for other.Use clearing house 300 also can be according to information request 336, generate the response 342 of customization, and, in case being transferred to, relevant audit logging use clearing house 300 and this transmission to be confirmed, can also generate release signal 344, authorize electrical equipment 100 from local data base, to delete and/or make the use information of " no longer waiting for ".After this use information was " released ", consumer 95 had the interest reservation rather than deletes this information (as for the curiosity that monitors other people (employee, children etc.) behavior).
Use clearing house 300 can delete its control 188b, so that how for example manage use information, market analysis information or out of Memory is that all the other each side are used.For example, use clearing house 300 can prepare a property right report or analysis, this part report is offered the third party, and therefrom obtain compensation.Use clearing house 300 can stake out a claim that they provide the personnel of report must not anyone this part report that distributes again to other for it.Use clearing house 300 to implement this requirement with electronically by in one or more safety containers 152, transmitting this report and Electronic Control 188b being reported therewith related.These Electronic Control 188b can together, implement this ban that " must not distribute again " with other allowance condition and/or restriction (as must not revise this report, can print and check this report, can take passages this report etc.).
As mentioned above, use clearing house 300 also can receive financial form 240a and/or detailed financial records 240b or other Financial Information-and can generate oneself financial form 240c and/or detailed financial records 240d.For example, use clearing house 300 to provide service to the content provider, wherein use clearing house 300 to obtain to control 188a there from the content provider, this control is similar to the control that consigns to consumer 95.On the basis of these data relatively, use clearing house 300 to estimate and to estimate from the amounts of financial settlement institute 200 acquisitions to the content provider.Use clearing house 300 that audit function-rechecking financial settlement institute 200 independently can be provided like this and fraud detection function (using clearing house 300 to find out to have submitted to relevant the payment or the people of the incorrect service recorder of amount paid as utilizing) is provided.In addition, but control 188 represent content suppliers are considering the confidential mode implemented, then, use clearing house 300 just can provide a kind of service, the use data of collecting with reality compare, so that set up a pattern, its financial result has truly set up this pattern of proposing as the content provider.
Figure 34 shows an exemplary architecture using clearing house 300.In this example, use clearing house 300 to comprise that secure communication enforcement 346, database and transaction processor 348, verifier 350, authorization check person 354 and data gather 354.Use the framework of clearing house 300 can be based on the right operating system framework shown in Figure 12,13 of people's such as Ginter patent description.
In this example, secure communication 346 provides on electric network 150 communicating by letter by safety container 152 and various electrical equipment 100.In this example, database and transaction processor 348 are carried out most of functions of Figure 33.Verifier 350 can be used for verifying consumer and/or data, and authorization check person 352 can be used for check and authorizes, and 354 of data tabulators can be used for carrying out data and gather function 324.Verifier 350 and authorization check person 352 be with safe electrical appliance and shielded processing environment, carries out the authentication function described in people's such as Ginter the instructions.
Figure 35 shows an exemplary total use settlement process.In this example, supplier 164 is to consumer 95 (1), 95 (2), and 95 (3) provide digital properties.For example, supplier 164 can everyone provides a novel or other works in consumer 95 in electronics container 152.One or more control collection 188 and works 166 related (can pay at the identical electronic container 152 that is used for paying works 166 in an example) can be arranged.Control 188 can be specified the use information that must collect some type with the form of the index of checking account, and must be according to regular hour and/or this index of checking account of other event report.
Because container 152 can only be opened in shielded safe handling environment 154; shielded processing environment 154 is ingredients of the virtual distributional environment described in people's such as above-cited Ginter the patent specification; supplier 164 just can believe that the index of checking account of requirement will generate or report according to his or her indication.When consumer 95 used property 166, the use information of index 302 forms of checking account is collected, stored to their electrical equipment 100 automatically.Then, take place allocate event (as every month once, once in a week, after using certain number of times etc.) afterwards, consumer's electrical equipment 100 just in digital container to using clearing house's 300 transmissions index information 302 of checking account.
Use clearing house 300 to collect the index information 302 of checking account, this information can be existed in its database 316, analyze the index information of checking account to generate report 304, this report can send to supplier 164 in another electronics container 152.
Supplier 164 is by using clearing house 300, obtains number of times that the his or her works of audit are used and security information how to use these works automatically, thus with this supplier from collection or analyze the burden of these detailed use information and free.In addition, by only disclosing briefing through consumer's 95 permissions (for example, have how many people to use works 166, but their name of non-disclosure or address), use clearing house 300 can protect their privacy.If supplier 164 oneself attempts analyzing detailed service recorder, this function of keeping secret is with difficulty or problem are more more.
Figure 36 shows a more detailed exemplary use settlement process, and this processing relates to two different use clearing houses 300 (1) and 300 (2).In this example, supplier 164 directly consigns to consumer 95 with works 166 and these works can be distributed once more to consumer's distribution person 168.The control 188 relevant with distributed content 166 can be specified the relevant information of use of using the contents 166 that clearing house's 300 (1) Collection and analysis and founder 164 directly distribute, and another use clearing house 300 (2) is the relevant information of use of the works 166 that distributed of Collection and analysis and distribution person 168 more then.Perhaps, use clearing house 300 (1), 300 (2) (for example can collect the dissimilar use information relevant with same electronics property 166, can collect and " paying by watching number of times " relevant information a use clearing house, another uses the clearing house to collect the information of all disposable purchases).Use clearing house 300 (1), 300 (2) can be respectively to founder 164 and/or distribution person 168 and/or consumer's 95 issue reports 304.
Figure 37 shows and uses clearing house 300 is how with 200 uses of financial settlement institute.In this example, consumer's electrical equipment 100 can:
● send the check account index information 302 relevant to use clearing house 300 with the use of digital content, and
● to financial settlement 200 send relevant with the financial settlement activity use and the payment index information 228 of checking account.
If desired, use clearing house 300 and the financial settlement institute 200 can be by identical commercial operation (in the case, can in identical electronics container 152, send use and finance check account index information).Use clearing house's 300 performed use settlement function to operate, to support detailed operation report and financial settlement efficiently with the financial settlement function parallelizations that financial settlement institute 200 carries out.
Figure 38 shows the use settlement operations of another exemplary location according to media and/or ad content.Consumer 95 (1), 95 (2), 95 (N) can subscribe to various information distribution service 170A, 170B ....Program material and advertisement (commercial content) that information distribution service 170 can distribute and be made by content provider 164.The content that consumer 95 consumption distributes, their electrical equipment 100 are collected and to using clearing house 300 (1), 300 (2) ... report relevant use data.
Use the clearing house to carry out the demographic analysis,, the particular advertisement location of other commercial content 164 is served 170 as customizing messages according to this demographic analysis to the use data that receive.For example, information service 170A can be to long-distance running fan and other healthy fan distribute program material and commercial content 164.Use clearing house 300 (1) that the consumer 95 use information that provides of subscribing to and watching this category information can be provided.Like this, use clearing house 300 (1) just to be in the position of a uniqueness, advertisement is placed in interested other commerciality of colony's possibility and non-commercial content of same interest.Similarly, information service 170B can broadcast automobile fan information of interest specially.Use clearing house 300 (2) can collect use data about the use of this category information-so just be in a unique and beneficial position, organize consumer's distribution and releasing advertisements, commerciality and non-commercial content to this.
Figure 39 shows another can be by the exemplary use settlement operations of using clearing house 300 to carry out.In this example, right owner 164 can license clearing house 300, is ready that according to consumer 95 disclosed use quantity of information comes discount offered.This can utilize property control 188, by selecting and/or add electronics to consult to realize (referring to people's such as Ginter Figure 76 A and 76B) from controlling to concentrate.Right owner can be considered as it the universal rule of their property-or can authorize certain right and permission clearing house 400 to pay these control collection (as using the gatherer's of information special status as particular category according to them) in advance.
An example is arranged, and consumer's electrical equipment can be a personal computer, and the right owner 164 of distributed computer software may wonder also which software program consumer 95 is using except knowing themselves software that is distributing.On the other hand, consumer 95 may not want to disclose the details of all software programs on the his or her personal computer.
The another one example, digital broadcasting right owner 164 may wonder each broadcast program that consumer 95 watches, the consumer does not want then to allow that anyone know his or she programs of interest type other.
Use clearing house 300 to provide economically award, encourage more fully openly, but also give selection of consumer, thereby reconcile the interests of these opposition effectively to consumer 95.
In this example, right owner 164 is to consumer's 95 distribution digital contents and relevant control.These controls can be specified the selection that discloses use information.The consumer can select:
● full-payout and reservation all use information except that guaranteeing the necessary information of this payment strictly private;
● allow limited use advertisement, exchange small discount on the price for this;
● utilize heavy discount, as allowing full disclosure to use the repayment of information.
Some secret consumer may think to allow as much as possible the external world know their use habit less, and is ready that full-payout is to protect their privacy.Other consumer then may pay no attention to the external world and know their use habit, and is ready according to more fully openly obtaining big discount.This selection grade of any amount can be provided, make the consumer can, for example, accurately select to disclose the information of what type, which should be kept secret.Because use information is to collect in as the shielded safe handling environment 154 of consumer's electrical equipment 100 ingredients, the consumer can believe that use information can be handled safely, and without his or her agreement, can not take place unwarranted open.
For example; the one or more control collection 188 that provide according to protected processing environment 154 to the consumer; and/or becoming possible consumer's selection by these controls, consumer's protected processing environment 154 can be to using clearing house 300 to disclose (or disclosing minimum) use information.Then, use clearing house 300 just can freely analyze its collected limited use information or complete use information, to right owner 164 and other third party, as market researcher, middle man, advertiser, auditor, scientist and other personnel, provide report analysis.
Right and permission clearing house 400
Figure 40 shows an example of right and this commercial government utility system 400 of permission clearing house.The service of right and permission clearing house can be carried out the combination in any of following all functions:
● the running of registrating number object word and relevant permission, price and/or other permission and/or requirement, support to carry out and/or fail to carry out the causal execution of these runnings;
● according to situation and/or other requirement of appointment,, provide the permission of approval in advance on request as permission requestor's classification, the situation of fulfiling the payment requirement or ability to perform etc.;
● support safely and efficiently to one or more countries and/the suitable mechanism registration electronic copyright in other area under one's jurisdiction;
● function of reporting.
More particularly, support service to comprise according to the right and the permission of these inventions, for example, following some or all function and characteristic:
● along the identification of digitized electronic value chain, distribute and confirm specific property right and/or other business rules and control.
● for the object of registration provides object enrolled for service and right, price and/or other control information.
● according to its numbering and/or nomenclature scheme, and/or, distribute at least one discriminating digit and/or title to each digital object according to one or more numberings and/or nomenclature scheme that other one or more tissues, association's (as standardisation bodies), company and/or mechanism (as governability office) stipulate.
● concentrate built-in safe handling chain and control to obtain the authorization from Electronic Control.
● provide permission (as the description of the running of permitting and relevant result such as price being done according to rule and control) for the digital properties of having registered safely, and the property of supporting these registrations automatically related (template of presetting according to the classification of property as update rule and control, employing etc.) with rule and control collection, these permissions can long-rangely at least in part provide and in enrollment process or as the result of this registration, download to the registration place safely.
● allow the right owner of digital content to determine and neatly regulation and safely to one or more rights and permission clearing house provide them to think how to use and the intellecture property of not using them (for example; the shielded digital properties of VDE) method, and any result who uses and/or misapply.
● along a special electronic value chain, provide VDE to support, with distribution and management right and business rules (comprise approval in advance with other permission), here, these rights and business rules are constantly supported.
● provide the digital object permission to personnel on request through licensing digital object.
● can according to the different permissions of the user of one or more combination sorts (as age groups, area under one's jurisdiction, commercial age, consumer, founder, supplier, affiliate, government, nonprofit organization, education tissue, organizational member etc.) security association, different clauses is provided.
● the owner tenders guarantee to right, and promptly their clause set up is obtaining observing of potential different and distributed value chain participant basis.
● control can be provided, these controls do not comprise all possible permission, and/or according to requestor's right (category and/or by individual), special and/or preplan on the good basis, required and/or desirable permission as requested further distributes, as allow the right owner to select only to distribute a most frequently used permission relevant, and, allow the suitable new permission of each side's acquisition according to right owner's pattern with specific digital properties.
● by the database mechanisms of clearing house and providing and/or information receiving and transmitting of robotization are provided, according to asking and/or discern automatically expiring of these rights, thereby upgrade overdue permission, these permissions are provided, and/or in preferred embodiments, notice VDE value chain participant should obtain these permissions (initiatively attempt using for information about and/or before Electronic Control handles, notify this user, thereby avoid the user to suffer setbacks and inefficiency the user).
● in the arbitrary step, the part that provide safe right clearing to serve or in handling, those safety containers that people such as use Ginter describe.
● right and permission " template " that establishment, storage, distribution and reception allow the right owner to specify right, condition and result fully, (as compensation), these templates are relevant with the running of the use (and/or electron event of VDE processing controls) that relates to their digital properties.
● template is response and property, content user, class of subscriber and/or other numerical information and/or physics or virtual address and/or be used for incident and the relevant digital control collection of processing controls of event result monitoring directly.
● template can the oneself be carried out.
● template is applicable to a plurality of object/situations.
● template can independently be paid by any digital object relevant with it with them.
● can expansion templates to expect new running and scheme, include, but are not limited to new method of payment, pricing model and price rank and new permission.
● template can be discerned neatly and comprise all various digital rights that distribute and send and/or send right.
● template can be discerned the right of individual status and classification status neatly.
● different templates is applicable to the property type of different contents and/or processing controls arrangement.
● a plurality of templates are applicable to identical property and/or processing controls arrangement.
● right and permission clearing house can safeguard the superset template, allow the sub-clearing house in value chain participant and/or the hierarchy to revise one or more such superset templates, adopt the subclass of described one or more superset templates and/or the template of superset with establishment.
● can utilize graphic user interface and/or managing entitlement language, finish template with many diverse ways.
● can be by using topological diagram, synoptic diagram, the figured value chain rule that can directly edit and controlling and create and/or revise template " application ", these rules and control and value chain relation are by showing that mixing icon, positional information, process flow diagram and Word message shows, wherein rule and control realize by using the right management language, and, for example, the senior form of expression of the key element of rights language or these key elements can be directly corresponding to the assembly with graphical representation.
● a plurality of value chain participants can participate in and/or revise template, and/or participate in and/or revise the different templates that is applicable to identical numerical information.
● users can elect between the different templates that is applicable to same numbers information, and these information comprise, for example, describe and/or control the numerical information of passing through as the control procedure of safe VDE processing chain and control and management (as incident management information).
● across a network or other system's distribution right settlement function are (for example, each consumer and/or other value chain participant's node all may be distributed right clearing service, this serves the right clearing that start its safety to small part, wherein said participant's node can directly send right information to the clearing node of other one or more participants, interoperable, in preferred embodiments, the sort of VDE technology of describing in people's such as Ginter the patent specification has all been adopted in all activities).
● service is authorized and/or is provided in approval to one or more distributed right branches clearing houses (or with these clearing houses), can be positioned at other place on the operational logic of these clearing houses and/or physically, inside as company or government organs, and/or one or more area under one's jurisdictions, and/or in the service subclass in total service set zone of the senior right clearing house of interdepartmental system or network distribution and/or mandate right settlement function, for example, each consumer and/or other some or all value chain participant's node all might be supported distributed use clearing service, in the environment of lump sum institute network, start its, the right settlement bargain and the function of safety comprise the node of clearing house and other one or more participants' interoperable, and the interoperability of the activity of other local all employing VDE technology in the tabulation.
● can be at least in part according to some aspect of the use of content and/or processing controls, automatically provide one or more rights to the participant, the award composition that provides reward voucher to compensate these uses (as buying) situation is provided the one or more rights that provide like this, this situation can directly be learnt from use information, also can derive from the weighting formula that relates to a plurality of variablees.
● can organize by classification, equity or mixed mode, here, can be at different business models and/or activity and/or value chain, the responsibility of the right that distributes in a different manner clearing, and under a certain or several situations, a certain side or a few side can be higher than other side on rank, and under other a certain or several situations, then be lower than other side.In other words, the relation between the participant is programmable, and (and adjusting afterwards) can be set, so that embody the right clearing arrangement at one or more hope of given commercial activity, value chain or pattern.
Figure 40 shows an exemplary right and permission clearing house 400 from view of function.In this example, right and permission clearing house 400 can carry out the part or all of function of following four kinds of major functions:
● the object registration.Right and permission clearing house 400 registration digital properties and permission and the price relevant with them.
● permission as required.Right and the 400 response inquiries of permission clearing house together provide permission 188 and relevant price in safe electronic container 152.Permission control 188 can independently provide beyond content.
● consult permission.Right and 400 response inquiry and the requests of permission clearing house, the right owner that right and permission clearing house have been entrusted to this responsibility in representative consults permission and/or price.Right and permission clearing house 400 also can be the intermediaries that consults between right owner and the right user.Can consult between right owner and the right user and report the result of these negotiations to right and permission clearing house.
● report.Right and permission clearing house 400 can provide report, with accumulation financial settlement institute 200 and/or use the report of clearing house's 300 execution.
In this example, right and permission clearing house 400 can provide following part or all of function:
● the establishment of permission, renewal or change 408,
● the distribution 410 of permission,
data base administration 412,
● the definition of template and/or manage 414,
● consult permission 416,
● report 417,
● duplicate 418,
registration 419, and
● propagate 420.
The main task of the object registration of right and permission clearing house 400 is finished by data base administration 412.Fasten in this pass, right and permission clearing house 400 can be in identical or different electronics containers 152, receive control collection 188 and corresponding object identity identification 422, then with this information " registration " in database 412, reference after being provided with.Right and permission clearing house 400 can assist the right owner to define control collection 188 by template function 414 is provided, and this control collection has been stipulated right and the permission relevant with right owner's electronics property.Except that object or property 166, registration process 419 and database 412 also can be registered control collection 188.
The database function 412 and the distributed function 410 of right and permission clearing house 400 can be used for response request 412, the permission that distributes on request, all these tasks of the permission relevant with particular estate (utilizing distributed function 410) of also can being responsible for distributing.Because permission and/or price may expire or change, right and permission clearing house 400 also can be responsible for the more new regulation permission of issue in the past and/or the control collection 188 of price, and those control collection that upgraded that distribute.
Right and permission clearing house 400 also can provide function of reporting 417, and for example, issue has been issued about it or the permission that distributes and/or the report 406 of price.In this example, the running of right and permission clearing house 400 provides the chance of audit, and promptly a channel adds use information by it.This audit running (for example, can combine with the function of using clearing house 300 by the function with right and permission clearing house 400 provide) can be used for creating about the consolidated return which provides permit, used which permission-to market survey and commercial results and to provide extra responsibility to the right owner be of great value information.
The audit function of this right and permission clearing house 400 may be highly beneficial concerning keeping secret.For example, the right of special use and permission clearing house 400 can be expanded, provide payment to gather, so as to hide from financial settlement the information of individual transaction grade of 200 secret.In the another one example, right and permission clearing house 400 can issue report 426, for example point out the number of the number of the object of being registered in the initial time database 412 during the reporting period, new registering object and about planting some statistical summaries of kind number of the average or permission that middle price is relevant of class object with these objects and/or some.
Right and permission clearing house 400 also available response 428 respond inquiry 402.For example, request may constitute by license request-can ratify this request automatically; Perhaps may need right and permission clearing house 400 to grant, to determine whether these permissions of qualified acquisition of requestor.Can set up qualification by showing one or more effective vouchers, can check simply or these vouchers are stored in the database 412, send the supplier to other information about the permission of clearing house's approval.In this preferred embodiment, other qualification can be according to requestor's PPE54 and the secret of sharing known to right and the permission clearing house 400 (collecting one or more labels of 188 from control as what the requestor held).This secret of sharing can be used with voucher, perhaps, requires lower or has set up under the situation of (as having obtained first local shared secret) in qualification, and the secret of sharing just is enough to separately secure permission, and replaces or upgrades overdue permission.
Right and permission clearing house 400 also comprise permission protocol mechanism 416, can be used for consulting not obtain in advance the permission 188 of right owner approval.For example, suppose that consumer 95 wants to use the not a certain right in database 412.Consumer 95 can ask to obtain this right.Correspondingly, right and permission clearing house 400 can confirm this right whether the right owner has invested it and represent right owner negotiation.If right owner does not provide this right, do not give the right that right and permission clearing house 400 consult yet, this clearing house just can get in touch with the right owner so, and request is obtained the authorization and/or is permitted.If right owner agrees the negotiation power to right and permission clearing house 400, this clearing house just can enter the electronics negotiation (referring to Figure 75 A-76B of people such as Ginter) between consumer's control collection and right owner's the control collection.The control collection of finally consulting can be sent to the consumer, make the consumer can use aforesaid right.
Figure 41 shows an exemplary framework of right and permission clearing house 400.In this example, right and permission clearing house 400 comprise secure communication facility 430, database and transaction processor 432, verifier 434, authorization check person 436 and registration process device 438.As mentioned above, the framework of right and permission clearing house 400 can be based on the right operating system framework of describing with related text shown in Figure 12 and 13 of people's patent specifications such as Ginter.
Database and transaction processor 432 are carried out most of functions shown in Figure 40.Registration process device 438 can be carried out registration function 419.On electric network 150, secure communication facility 430 is by safety container 152, safely with consumer 95, author 164, publisher 168, tabulator 170, packing person 174 and other value chain participant communicate again.Verifier 434 and authorization check person 436 be with safe electrical appliance and shielded processing environment, carries out people's such as Ginter the described authentication function of patent specification.
Figure 42 shows an exemplary right and permission settlement process.In this example, author's 164 usefulness comprise that the control collection 188A that controls A sends works 166 to publisher 168.The 168-of publisher forms new control collection 188AB according to the processing chain of safety and control-add control B to control to concentrate.Publisher 168 utilizes control collection 188AB to consumer's 95 distribution works 166.Publisher 168 can also more fully control among the collection 188ABC at one, and appointment is seldom used, but requisite again sometimes additional permission collection C (for example, control C can allow the journalist according to certain purpose, the part chapters and sections of extracts works 166).
Publisher 168 can be to right and the 400 registration control collection 188ABC of permission clearing house (if desired, also can register control collection 188AB and control collection 188A).Publisher 168 can also comprise additional " control of control " or " permission of permission " " D " (as the control of distribution in conjunction with Figure 79-85 description of people's such as Ginter patent disclosure book) with control 168ABC.These additional " D " controls can be specified the condition (frequency of given user's standing, issue again, the number of control etc.) of approval right A, B and/or C.
Consumer 95 (or other any supplier is as tabulator, packing person, author or other publisher again) can ask to obtain the copy in any of right and permission clearing house 400 registered these various control collection.For example, if consumer 95 is journalists, she uses works 166 according to control collection 188AB, for certain purpose, she wants to take passages this works, and she just can ask publisher 168 in the past at right and the permission 400 registered control superset 188ABC of clearing house.Another example, what receive the consumer 95 of Germany may be the control collection 188 that distributes in the U.S., may need to ask to obtain to meet the law in Europe and the different controls of currency environment collect.In addition, right owner may be in some day afterwards, and by the right and the permission clearing house 400 of the control collection being responsible for or distributing new on request, the control that distributes before revising is so that increase new right, " sale " is provided, cancels right etc.
Figure 42 A shows another example, and wherein consumer 95 can be to one of right and the registration of permission clearing house 400 and certain object, the file or the relevant control collection 188X of software program that have received as consumer 95.As long as the control of registering for the object of right and permission clearing house 400 is modified, new control collection 188X is with regard to request right and permission clearing house 400, for the object of naming sends a new control collection 188Y to consumer 95.Right and permission clearing house 400 can automatically send the control collection 188Y of renewal to all registered users of optional network specific digit property.
In different examples, publisher 168 may use very limited control collection 188X distribution works 166, control collection 188X only allows consumer 95 to watch summary, and specifies right and permission clearing house 400 to watch or use the communication center of the permission of whole contents as acquisition.Then, consumer 95 can get in touch with right and permission clearing house 400, and a control widely that obtains to allow other grade to use collects 188Y.Because it requires consumer 95 and right and permission clearing house 400 to get in touch, so that use the property that distributed in the past practically, this just provides the calculability of height and the auditing capabilities of constantly expanding.Similarly, right and permission clearing house 400 can replace the control collection that expires by the control collection 188Y that upgrades.This mechanism can be used for, for example by the time to particular items provide various discounts (after for example allow that the movie distributor starts day at film 6 months, the film that the first run is shown gives a discount, need not film start in decision this how many discounts are provided).
Figure 43 shows performed another exemplary right and the permission settlement operations of right and permission clearing house 400.In Figure 43 example, among author 164, publisher 168, tabulator 170 or other the other value chain participant each all may also be registered other control to right and themselves control collection of permission clearing house 400 registration 188A, 188B, 188C-respectively, controls the distribution of their supplier's control.Then, right and permission clearing house 400 just distribute one be not the burden of control collection of they special care to free each value chain participant from formulating with each control collection 188A, 188B, consistent, the new combination control of 188C collection 188ABC-.In this example, right and permission clearing house 400 and other tissue (as with government organs 440, as Copyright Bureau-or and the tissue such as the professional association of other type) between interface can be arranged.The works of registration in right and permission clearing house 400 and the copyright in other object-the reduce or eliminate burden of these work of right owner do-it-yourself can automatically be registered by right and permission clearing house 400.Copyright registration between right and permission clearing house 400 and the government organs 440 alternately can, for example, utilize VDE and safety container 152.
Figure 44 A-44E shows another one can be by right and the permission settlement process of using right and permission clearing house 400 to finish.In this example, publisher 168 can provide property 166 and relevant control collection 188a (referring to Figure 44 A) to consumer 95.The electrical equipment 100 that the consumer can use her is attempted the property 166 that control collection 188a are used in visit with relevant shielded processing environment 154, but may determine that she needs another one control collection 188b, so that the mode of wishing by her is visited this property.Consumer's electrical equipment 100 can generate the request 402 to right and permission clearing house 400, (referring to Figure 44 B).In response, the control 188b of right and the request of can distributing of permission clearing house 400, this control has comprised permission and pricing information (referring to Figure 44 C) that consumer 95 is asked.Then, the consumer just can use property 166 according to control collection 188, and uses/check account index information 302 (referring to Figure 44 D) according to consumer's use generation.Consumer's electrical equipment 100 can be to using clearing house's 300 these use information of report, and can be when release signal is received by suitable clearing house, just deletion and/or internal reservoir use information is released to " pending " (referring to Figure 44 E).
The right template
Figure 45 A and 45B show exemplary right template 450, and Figure 45 C shows exemplary, corresponding control collection 188.Right template 450 is similar to " filling in blank space " form in some aspects.Right owner can use right template 450 to define the right relevant with specific digital properties expeditiously, effectively.It is very big that template 450 is influenced by concrete content industry, supplier, content type etc., and template 450 can be used for constructing the general ability of people's such as Ginter the described virtual distributional environment technology of patent disclosure book.This makes the user resemble supplier to occur with the concentrated menu of resource, and the resource here is applicable to specific purpose or useful to this purpose.
For example, template 450 can be internally perhaps other controlled information do some conjectures, it be how to divide or tissue, and/or what character these solid tissues all have.Template 450 has been simplified the process of definition permission, has reduced or eliminated the required professional knowledge of the bottom ability of utilizing virtual distributional environment and a large amount of time to drop into.In this example, the user can avoid always being to use template 450, on the contrary, they can (for example define permission 188 with the managing entitlement language, nature or the computer based language)-but the user of a large amount of number percents will like, and the wieldy graphical interfaces that template 450 provided-when such professional of the permission of second after second being engaged in a large amount of different contents of regulation, they can not mind the dirigibility and relevant complicacy of abandoning other.
Exemplary right template 450 shown in Figure 45 A (for example, may be fit to literal and/or figure supplier) defined the many different types of use/action relevant with concrete digital properties, for example, " watch title ", " watching summary ", " modification title ", " again distribute ", " backup ", " view content " and " print What ".Right template 450 can further provide one " menu " or corresponding to the option list of every kind of use.These different options make the right owner can define the right that other people can use this property.For example, can comprise following right:
● unconditional permission,
● with the payment is the permission of condition,
● according to the permission of content,
● unconditional forbidding, and
● forbidding and/or permit according to other factors.
Right owner can " fill in " or select between variety of option, and definition is corresponding to " the right configuration file " of their particular estate.In this example, right template 450 can be deepened pattern and/or the grade by the right of payment terms running.Such pricing model and grade can define various dissimilar commerce price neatly, for example, disposable charge, pay, reduce cost by the number of times of watching etc.Referring to Figure 45 B, be how to use patterned interface to specify an example of pricing model and grade among the figure.
In this example, right template 450 can the oneself be carried out and/or by " translation " automatically or be compiled into one or more control collection 188, is provided realization right owner's the necessary control of selection.For example, Figure 45 B has one " watching title " control 188a, allow to resemble Figure 45 A right template 450 regulations unconditionally watch title.Similarly, the exemplary control 188b of Figure 45 B comprises other control collection unit 188 (2) ... 188 (N), and these unit are corresponding to other right and the permission 188 of right owner according to right template 450 definition of Figure 45 A.
In this example, right template 450 is extendible.For example, may and/or produce new running when new technology becomes new running, right template 450 just can be expanded, to adapt to new running, meanwhile, " upward-compatible " former right template still.Different right templates 450 can be used for dissimilar properties, different value chain participants, or the like-meanwhile, certain right template may be applicable to a plurality of objects or property, a plurality of value chain participant, or the like.Some right template 450 may be the superset of other right template.For example, total right permission template 450 can define all possible right that is applicable to specific property or particular type property, and subtemplate then can further define and the consumer of different consumers, different stratum or the different relevant rights of right owner.Like this, for example, the author just can use a different subtemplate of subtemplate that uses with distribution person.Template also can be a recurrence, and promptly they can be used for quoting other template (similarly, the control collection of their definition also can be quoted other control collection).
Right and permission clearing house 400 can fill in the part of right template 450-or, can use a kind of automatic processing (for example, the instruction of presetting according to the right owner) to finish and/or duplicate the right template.Right owner can use graphic user interface to finish right template 450 (as the tabulation of Show Options on the user's computer screen, click with mouse pointing equipment, fill the option of wishing).In the another one example, right owner can define his or she parameter when right template 450 and/or structure relevant controlling collection 188 filled in the managing entitlement language that can compile automatically or handle of using a computer and select.
Figure 46 shows an exemplary right utilizing right template 450 and permits settlement process control.In this example, right and permission clearing house 400 and/or each right owner define right template 450 (referring to Figure 46, square 452 (1)).Then these rights are inserted right template 450, definition approval with right that keeps and relevant pricing model and grade.(square 452 (2)).Right owner is with the permission and the object association (as by creating one or more control collection 188 of quoting and/or being applicable to controlled property) (square 452 (3)) of right template definition.Then, the right owner just can be with permission (control collection 188) with object (square 452 (4)) or separately transmission.Right owner can directly send to consumer 95 (square 452 (5)) with these control collection 188, and/or they can be sent to right and permission clearing house 400, so that in database (square 452 (6)) registration with store.Right and permission clearing house 400 can provide this permission through authorizing in advance to consumer's (square 452 (7)) as requested after receiving consumer's request (452 (8)).
As mentioned above, the supplier can utilize the mechanism of additional providing " control distributes " by right and permission clearing house 400, promptly instructs and/or control distribution process, controls the distribution of this permission of authorizing in advance.
Certification authority
Figure 47 shows an exemplary commercial affairs government utility system of certification authority 500.Usually, authentication service mechanism can create " confirmation ", guarantee and/or prove the digital document that some is true.The so-called fact comprises, for example, and identification and/or membership qualification in particular groups such as certain tissue; Age group, the standing that has; Be subordinate to some or a plurality of area under one's jurisdictions; And/or have one or more rights through confirming, used content and/or processing before section or specific time at a fixed time.
More particularly, can provide the combination in any of following advantageous feature and function according to the certification authority of these inventions, for example with the form of voucher:
● digital certificate information, for rule and/or control required or they use together, as the rule and the controls such as other attribute of proof, identity, membership qualification and/or identity and/or environment, and comprise that source (as supplier's identity of one or more authentications) and/or classification according to these information automatically authenticate this information.
● provide believable checking, i.e. her that people of calling oneself really of consumer or other value chain participant and/or say it oneself is that people of one or more specific group, classification and/or organizational members.
● believable checking is provided, i.e. their those people of calling oneself really of one group of value chain participant, wherein a large amount of vouchers from different aspect are gathered check, will use content and/or carry out under the situation of one or more control procedures control at some, and it is necessary that these vouchers are gathered.
● generate voucher automatically, represent the proof of a value chain or part value chain, with this summary as a plurality of such vouchers.
● by service regeulations and control, prediction is from a plurality of participants of the voucher of the particular groups that can form in fact representative and authenticated, by rights collect voucher, occurring under the situation of some voucher, identification is expected and/or meet certain standard-as enough transaction income more than two, enough prestige etc.-each side, new voucher will generate and play a part compound voucher automatically, confirm the collective and the collaborative existence of a plurality of participants, wherein said voucher can be related with some rule and control, these rules and control allow some electronic behavior, as use content and/or control procedure control, at a plurality of participant EDI, distribution of content, carry out in trade system and/or the financial transaction system.
● generate one or more vouchers, with this result who as rule and control voucher creation is managed to small part, wherein, one or more vouchers of Sheng Chenging are to satisfy some required standards like this, as some the specific activity of each side in a plurality of participants-as one or more vouchers and/or mandate and/or use activity and/or loan and/or payment activity are provided and/or report is movable and/or VDE supports electronic protocol activity (for example, comprise electronics negotiation activity)-afterwards, as based on the result of one or more instructions of safety rule and control and produce.
● authenticate other and support service (as financial settlement institute, use clearing house, right and permission clearing house, transaction approval and other certification authority etc.).
● authenticate according to searching automatically of other voucher (as identity) and safety database, search automatically can local, stride distributed database layout or long-range carrying out.
● provide non-automatic and carry out the service of (promptly some part is provided by the people or assists at least), promptly, issue more basic voucher (as I.D.) according to the actual evidence beyond the automation services of issuing the subordinate voucher.
● can use public keys encryption technology, private secret key, with and/or the VDE virtual network of safety, support (as creating) digital certificate.
● can issue voucher, support the environment that right is used in automatic, believable, distributed, the reciprocity safe electronic environment, this environment is supported processing chain and control.
● with other distributed commercial government utility service, utilize general, reusable, programmable, distributed, modular framework, support unlimited various different business models and scheme.
● can issue the voucher of supporting the control collection, the control collection has its use and depends on existence and/or lack specific and/or particular category and/or unspecific one or more unit that shows the digital certificate of certain fact, and, issue relevant voucher about existing or lacking, may have different requirements jointly with different.
● can issue one or more vouchers, these vouchers are cooperated with Electronic Control collection with good conditionsi, only to some consumer and/or comprise that other value chain participant of consumer ratifies some right.
● upgrade overdue voucher, support complicated time and/or use and/or other event driven voucher to expire (comprising termination)-for example, overdue criterion can change according to the classification of specific voucher, voucher, user specific and/or particular category, user node etc.
● safeguard and distribution, comprise, optionally distribute and cancel directory information to distributed node according to situation about distributing on the node and/or rule and control.
● on distributed government utility node interoperable, the equity networking, cancel directory information according to time, other event distribution, wherein, according to the agreed information requirements of cancelling, with Information Selection be distributed to certain or certain several nodes, and/or will cancel information distribution to each or certain several nodes indiscriminately.
● obtain the authorization from the processing controls theft-resistant link chain that the Electronic Control collection is embedded.
● (for example, for the voucher of some kind, each consumer's node all may be a voucher mechanism for across a network or other system's distribution voucher body function; Father can have the right to issue voucher to their child).
● hierarchically organized voucher mechanism, comprise rely on that other voucher mechanism issues the voucher of this purpose is arranged to small part, allow automatically to verify some voucher mechanisms (voucher that they issued with about confidence level, resonable degree etc. relevant definite) in other words.
● authorize and/or provide service and/or cooperation together to one or more distributed voucher mechanism branch clearing house, these minutes, the clearing house can operate in logic and/or physically anywhere, the inside of company and/or government organs for example, and/or one or more local and/or interdepartmental systems or network distribute and/or authorize in the auxiliary service in total service set district of senior voucher mechanism clearing house of right settlement function.
● each consumer and/or some other or all value chain participant's node all may be supported the clearing service of distributed voucher mechanism, this clearing service has started own security credence and function in the environment of whole clearing house network, comprise the interoperability of the activity of all employing VDE technology of other place in clearing house and other one or more participants' the node of interoperable and the tabulation.
● provide responsibility to honour control (promptly the responsibility number of promising to undertake according to the publisher is guaranteed digital certificate); can comprise that maintenance is honoured relevant information with this responsibility safely; and provide the prompting of the responsibility protection of bearing about these vouchers to the receiptor of voucher; and may further include by the clear and definite electronics of VDE management and honour or honour, the receiptor of the voucher of accepting insurance that any responsibility of accepting insurance more than the number is honoured by continuous hint.
● can be by classification, equity, or integrated mode is organized, here, can be at different business models and/or activity and/or value chain, the responsibility of voucher mechanism activity in a different manner distributes, and, under one or more situations, a certain side or a few can be on grade, to be higher than other each side, and under other one or more situations, then be same level or lower rank, in other words, the relation between the participant is programmable, and (revising later on) can be set, to represent certain commercial activity, the specific credential institutional arrangement of one or more hope of value chain or pattern.
Figure 47 shows an exemplary certification authority 500 from the angle of handling.In this example, the digital document that is called voucher 504 has been created by certification authority 500, and some fact of voucher 504 " confirmation " is as identity or classification membership qualification.For example, a believable third party certification authority 500 can provide safe digital certificate, and promptly the consumer's claims that people that she just is really or have some feature, attribute, classification membership qualification etc.For example, some attribute can be illustrated in the membership qualification in the particular category (as the employee of certain company), and certain date is the people of birth in the past, and health has the people of certain deformity, the personnel of the teaching and administrative staff of school, management or student mechanism or the retiree of army.
In this example, the digital certificate 504 issued of certification authority 500 is taken as that right is used and the conveyer of Trading Authorization environment.As people's such as Ginter patent specification was described, voucher 504 ability in virtual distributional environment was big especially, provided environment because they use for right.For example, based on the voucher use of classification and automatic, the distributed management of commercial rights, can fundamentally improve the efficient of trustable network.For example, suppose that content publisher wants all are not charged by commercial price the subscriber of the academic journal of institution of high learning, then give 20% discount the student and the professor of university.The digital certificate 504 that authentic authentication mechanism 500 issues can be used for automatically witnessing-in the environment of distributed electronic network-and promptly have only the people of those certain qualified enjoyment discounts could use its (in this example, having only those verified people that belong to certain higher educational institution could use it).
In the example of Figure 47, certification authority 500 can carry out following all functions:
● true collection and check 522,
● the generation 524 of voucher,
● cancel the maintenance 526 of catalogue,
● voucher and the distribution 528 of cancelling catalogue,
● checking 530,
● the renewal 532 of voucher,
● authorize 534,
● duplicate 536,
● propagate 538, and
● filing 554.
Certification authority 500 can collect evidence 502, as the foundation whom issues digital certificate 504 to.In this example, evidence 502 can comprise other digital certificate 504 ' (so that can set up another voucher on the basis of a voucher).True collection and checking function 522 can be admitted evidence 502 and other confidence level data 540 (as the information about voucher agreement or that misapplied in the past).Voucher systematic function 524 can handle 522 according to the collection and the check of the fact, generates new digital certificate 504.Then, the distributed function 528 new digital certificate 504 that just can distribute, and issue bill 542 are compensated the certification authority that bears work relevant with issuing voucher and responsibility.
Certification authority 500 can also safeguard according to confidence level data 540 and cancel catalogue 542, point out that the fact those agreements or that confirmed in the past is no longer true (for example, Mr.'s Smith past attempts is the professor of Stanford university, but leaves office from this university now) voucher.In a single day that cancels catalogue safeguards why extremely important this function 526 is, is that it provides a kind of mechanism, find that promptly some voucher is that " bad " just guarantees that they can not continue to use.The voucher 504 that certification authority 500 issues may be expired, and certification authority can (for example, charge) by carrying out voucher update functions 532, upgrade the voucher of issuing in the past.Certification authority 500 can safeguard the record or the database of the voucher that it is issued, this database can be distributed-have benefited from copy function 536 and communication function 538, accurately, efficiently extend across some different place distributed data bases.
Figure 48 shows an exemplary framework of certification authority 500.In this example, certification authority 500 can comprise secure communication facility 544, encryption/decryption process device 546, accounting system 548, secret key maker 550, inquiry mechanism 552 and electronic filing 554.In this example, secure communication facility 544 is used for communicating by letter with the commercial government utility of other electrical equipment 100 and/or other system 90.Electronic filing 554 stores secret keys, voucher 504 and other safeguards the needed information of running of certification authority 500.Encryption/decryption process device 546 is used for creating digital certificate 504 by using firm cryptographic technique.Accounting system 548 issue bills 542.Inquiry mechanism 552 is used to inquire about electronic filing 554.Secret key maker 550 is used to generate the required secret key of certification authority's 500 self running.
Figure 49 shows an exemplary certification authority and handles.In this example, publisher can send an electronic security(ELSEC) container 152 to consumer 95.Want some the permission 188a in the container 152 safe in utilization, the consumer may need to obtain a voucher from certification authority 500, confirm relevant consumer's the specific fact (be the citizen of the U.S. as the consumer, the consumer is the retiree of army, and the consumer is over 18 years old etc.).The consumer can generate a request 502 of giving certification authority 500, requires to issue a suitable confirmation.The evidence 502 that certification authority can check consumer 95 or certain third party to provide as long as certification authority 500 pleases oneself, is just issued required digital certificate 504 to this consumer.Digital certificate 504 not only can use together with the control collection 188a of publisher, and can confirm the same fact with needs and agree to entrust certification authority 500 to use together as other right owner of the issuer of voucher.
Certification authority 500 can utilize safety container 152 and consumer 95 to communicate.It can generate and provide voucher 504 to control collection 188b.Some aspect (as cannot distribute again and/or revise) that control collection 188b may command voucher 504 uses and/or the processing chain and the control of issuing (authorizing offspring to issue voucher) of definition subordinate voucher for them as father and mother.
Certification authority 500 can " be entrusted " to represent another certification authority to issue voucher-as in by 188 definition process chains of one or more Electronic Control collection and control.Stride some different electrical equipment distribution certification authorities 500 and have the advantage of efficient aspect.Figure 50 shows the useful examples that distributed voucher is issued scheme.
Figure 50 shows, right owner 164 (and/or right and permission clearing house 400) can ask (as by the control of distributing electronic in safety container 152a 188a) certification authority 500, issues digital certificate 504 (1) to higher educational institution such as the institute 1060 approved.Control collection 188a can set up necessary strategy and the program of finding out that in fact whether certain specific institute formally gets the nod.According to the evidence 502 of control collection 188a and institute's 1060 submissions, certification authority 500 just can issue a digital certificate 504A, shows to obtain the such fact of approval.
In order to utilize voucher 504A, the student of institute 1060, teacher and/or worker need provide another voucher, show that he or she belongs to institute's 1060 these facts.By each institute 1060 that holds voucher 504A is issued subordinate voucher 504 (2) to its teacher, worker and student, rather than allow certification authority 500 issue a voucher 504 again for each student, teacher and the worker of institute 1060, seem more effective and/or feasible.For example, institute 1060 can safeguard all students, teacher and worker's current directory.Do not need request authentication mechanism 500 to issue voucher 504 (1) separately for each student, teacher and the worker of institute 1060, institute oneself just can bear this responsibility.
For example, the 500A of distributed authentication mechanism of oneself can select to move in institute 1060.In an example, certification authority 500 (for example can issue control collection 188b, be subordinated to the control 188a of right owner 164 issues), this control collection entrusts in certain limit (as showing limited various fact, as " this people be employed be engaged in go up relevant with institute 1060 ") to issue the power and the responsibility of subordinate voucher 504 (2) to the 500A of certification authority of institute.These subordinate vouchers 504 (2) can be the copies of voucher 504 (1), and append the relevant and concrete expiry date (as current term end) of statement unique individual and institute 1060.Then, the 500A of certification authority of institute just can each teacher, student and worker on current register issue such subordinate voucher 504 (2).
The receiptor of voucher 504 (2) also needs another one voucher 504 (1) to show their identity.This be because the voucher 504 (2) issued of the 500A of certification authority show be the Genus Homo that is this name in institute's 1060 these facts-rather than the specific receiptor of this voucher be exactly this fact of that people.The receiptor must be from government, obtains another " identity " voucher 504 (1) as certification authority 500 theres of state government or federal government's running.
Right owner 164 (and/or right and permission clearing house 400, not shown) can be digital properties 166 issue control collection 188c, can provide the combination of effective digital certificate 504 to those, the people who shows their membership qualification in " colleges and universities of approval " this classification agrees discount granted or other benefit is provided.Each student, teacher and the worker that obtain voucher 504 (2) in the institute 1060 can enjoy these discounts or other benefit.Figure 50 A shown these different digital certificates be how to be used to support with the voucher be condition control 188-in other words, its unit depends on the control collection that exists or lack the voucher 504 that shows certain fact.
In this example of Figure 50 A, one or more control collection 188c comprise the discrete control 188 (1) that is applicable to same digital properties 166 or same group of property ... 188 (N).Control 188 (3) can provide additional and/or different rights to all students, teacher and the worker of Stanford university.In this example of Figure 50 A, can use a plurality of vouchers that the proof of being asked is provided simultaneously.For example, can use voucher 504 (1), 540 (2), the 504A shown in Figure 50 example simultaneously, make the discount that concrete individual can enjoy to be provided to the student, teacher and the worker that approve colleges and universities.For example:
● voucher 504 (1) can show this fact of that people of calling oneself really of John Alexander this person.
● another voucher 504A shows that Stanford university is this fact of colleges and universities of a resultant approval.
● another voucher 504 (2) shows that John this term of Alexander is a student of Stanford university.
In these different vouchers 504 each all can be issued by different certification authority 500.For example, a certification authority 500 (as government organs' running) can issue the voucher 504 (1) of proof consumer identity, and another certification authority can issue the voucher 504 (2) that shows student's situation, the 3rd certification authority can issue voucher, shows that Stanford is this fact of (referring to Figure 50) university of approving.
The another one example, the control collection 188 (1) shown in Figure 50 A can provide certain benefit to the resident of California.Confirm its residential identity digital certificate 504 (3) of (as with " identity " card 504 (1)) as long as the consumer shows one, just can satisfy its condition.By showing the voucher 504 (5) that shows the United States citizen identity, just can satisfy other another permission 180 (N) shown in Figure 50 A.Voucher 504 (3), 504 (5) proves that the individual of appointment (for example belongs to certain or certain several area under one's jurisdictions really, the resident of town, state, country or other administrative units or do business-therefore there, pay sale, income or other tax revenues of this unit, or pay certain overhead cost), this is between the state and/or extremely important the transnational commerce and trade.For example, certification authority 500 can issue voucher 504 to the financial settlement institute 200 of Britain.This voucher 504 can be used in combination with control collection 188, and control collection 188 is to have only the financial settlement institute 200 of Britain just to have the right to receive the right of sterling payment and permit clearing house's 400 distributions by right owner and/or regulation.Want that the consumer that pays in sterling only when employed financial settlement has suitable Britain voucher, just may finish payment transaction.Then, this Britain clearing house hands over the certain tax-supplier is freed from understanding fully that his or her which transaction should be handed over Britain's tax, which need not be handed over the such burden of Britain's tax possibly.
Figure 50 A also shows another voucher 504 (4), confirms that someone and other someone have married.Use voucher 504 (4), also must show first voucher 504 (1) that confirms identity.Allow the kinsfolk use aspect other members' of family the voucher (as a people can be according to his or her spouse or father and mother's attested voucher income), these show between the individual or the individual very useful with the voucher of relation between organizing.
Figure 51-51D shows the exemplary long form of various digital certificates 504.His that people of calling oneself really of digital certificate 504 (1) the susceptible of proof someones of Figure 51 A.This voucher can comprise, for example;
● state the field 560 (1) of individual name,
● point out the field 560 (2) of individual's date of birth,
● point out the expires field 560 (3) when digital certificate expires,
● corresponding to the public secret key field 560 (4) of the public secret key of individual, ID code 560 (5) (in this example, can be the hash of public secret key field 560 (3)), and
● the checksum field 560 (6) of error-checking function is provided.
In this example, digital certificate 504 (1) certified mechanisms 500 utilize this certification authority public secret key-private secret key cryptographic system the private secret key, encrypt as RSA or EI Gamal.The corresponding public secret key of certification authority 500 can disclose (as it is distributed on some disclosed WWW websites or environment that other extensively distributes in), perhaps treat it in strict confidence, do not disclose to the outside of shielded processing environment 154.Under any one situation, digital certificate 504 (1) is successfully deciphered therein, disclosed its original cleartext information, this provides the guarantee of height, i.e. the certification authority really 500 of this digital certificate (the private secret key of supposing certification authority is not divulged a secret as yet) of issuing.
Why useful expires field 560 (3) is, is because ignoring the people who cancels directory verfification has at least any to believe, if promptly voucher must be updated periodically, it is good so.Expires field 560 (3) provides other one deck to protect-make certification authority 500 can use integrality and the confidence level of different secret keys to authentication processing is provided by guaranteeing not continuous and effective forever of voucher.The secret key of changing identification mechanism 500 has reduced the adversary and has decoded the motivation of certain secret key, is limited because be subjected to the quantity of information of secret key protection, and rogue ground uses the secret key of divulging a secret will have only limited effective time.And still unforeseen progress may make some cryptographic algorithm lack scope for their abilities on (at present) mathematics, because their dependences is that (at present) can reluctantly calculate in theory.Again issue voucher if enable new algorithm, the mechanism of so built-in changing identification mechanism 500 secret keys, it is interior (perhaps this influence that cracks secret key will to be limited in a period of time, can use a plurality of asymmetric secret key that generates according to algorithms of different right, mark and make it to secret key and come into force, thereby eliminate this risk, its cost is the extra encryption time).
The another one that shows Figure 51 B, 51C and 51D contains variety classes information (as be professional voucher field 560 (7) under voucher 504 (5) situations, under voucher 504 (3) situations, be address field information 560 (8), and under student's identity card 504 (2) situations, be student's credential information 504 (9)) the example of digital certificate.These vouchers 504 (2), 504 (3), 504 (5) combine by common ID field 560 (5) and I.D. 504 (1), and I.D. and voucher are independently shown in requirement simultaneously usually.
Figure 51 E show exemplary digital certificate that certification authority issues how can-with believable database-the become foundation that other certification authority ratifies other voucher.The 500A of certification authority can, for example, user identity come into force and create the I.D. 504 (1) shown in Figure 51 A.The user can submit this I.D. 504 (1) to the 500B of other certification authority, and the 500B of certification authority has one to have the personnel of particular community and/or the database 554a of tissue.For example, the 500B of certification authority can be operated by the professional institution of maintain internal database 554a.The 500B of certification authority trusts the content of internal database 554a, because the 500B of certification authority safeguards it and make it accurate.
By the content of identity information in the comparison diagram 51A voucher and trust data storehouse 554a, the 500B of certification authority need not obtain any actual evidence from the owner of Figure 51 A voucher there, just can issue the voucher of Figure 51 B.This has solved the user oneself all must " appearance " such major issue when needing a highly believable voucher at every turn-and also make the generation of second voucher to carry out automatically.
Figure 51 E also shows, the voucher 504 (2) that the 500B of certification authority issues can (with I.D. 504 (1)) be issued the sufficient authority of another voucher 504 (3) according to its Query Result in the 554b of trust data storehouse as the 500c of another certification authority.
Another example will be a company, and the said firm has shown its identity to the secretary of state in its area under one's jurisdiction, place.If the said firm has met the requirement of disposing hazardous material, the I.D. 504 (1) that it just can submit to the secretary of state to issue to appropriate authority (which company at present of be responsible for safeguarding qualified and be authorized to dispose the 500B of certification authority of the database 554a of hazardous material).Then, the 500B of certification authority just can issue and show this true voucher 504 (2), and if desired, everything can all automatically carry out.
Be inserted in before 219 pages the title of security catalog service (shown in Figure 52).
Allow the participant to take on the agency's of certain entity proof
Sometimes, the characteristic value chain or with other participant one or more participants of particular kind of relationship are arranged, need be authorized to represent group participation person to act.For example, a plurality of participants may wish according to the mandate of joint venture that belongs to a member wherein from them or joint venture act-or the characteristic value chain in all participants all may need to represent whole value chain to act.Each participant who receives this mandate from this entity may need the mandate of this entity to act.
The invention provides a kind of mechanism, wherein digital certificate 504 can be used for creating " pseudo-entity ", and this pseudo-entity can be specified the combination in any of the identical or different ability of power to combination in any approval utilization under controlled service condition of participant.More particularly, digital certificate is authorized power that on behalf of this entity, each participant in the pseudo-entity act-be subjected to the constraint of service condition and any cause-effect relationship that defines in the service condition of having utilized the control collection relevant with container to stipulate.
Figure 51 F shows an exemplary electronics container 152, this container encloses following information:
The value 564 of sign " pseudo-entity ",
Each member of signature 566 (1)-566 (N)-entities respectively has one,
The out of Memory 568 relevant with entity,
Each member of digital certificate 504 (1)-504 (N)-entities respectively has one,
Regulation power (as power perhaps can) and the control information 188 of " service condition ".
Value 564 provides the identifier of identified entities uniquely." out of Memory " field 568 can provide the further information about entity (as the entity title, each participant's name and address, the expiry date that the entity termination exists, and out of Memory).Signature 566 (1)-566 (N) will enclose his or her signature as each member of the signature-pseudo-entity on the cooperation agreement, show a member of agreeing to become entity, and agree the condition of authorizing each participant.
In this example, container 152 comprises that further description can use the Electronic Control collection 188 of the condition of this power.Control 188 has defined the power of authorizing each participant-comprise that (in this example) uses the conditioned disjunction restriction of these power.Control 188 can be each participant provides identical power and/or service condition, and perhaps they can provide different power and/or service conditions to each participant.
For example, control 188 can authorize each participant in the pseudo-entity to represent entity to take on the role of certification authority 500.In this concrete example, control 188 can allow each side of pseudo-entity represent pseudo-entity to make voucher-be subjected to the constraint of service condition, and controls the cause-effect relationship that defines in the service condition of stipulating by having utilized.As mentioned above, the power of authorizing voucher is that an example-according to the electronics service condition of any kind, the electronics power that can authorize any kind perhaps can.
Figure 51 G shows an exemplary process of the container 152 of creating Figure 51 F.In this example, the each side of pseudo-entity can consult the control information (Figure 51 G, square 570) according to the management of the electronics Negotiation Technology shown in Figure 75 A-76B of people's patent specifications such as Ginter collective activity." service condition " stipulated in resulting control information 188, the power that can use as each participant in the entity, and to the restriction of these power (can a participant ground of participant separate provision).
Start the participant of the issue of digital container 152 (being actually participant's shielded processing environment 154), can select the value 564 (Figure 51 G, square 572) of a random number as entity identifier.Next, participant's PPE 154 can be by the value 564 and out of Memory 568 (Figure 51 G, square 574) association with entity identifier, for pseudo-entity is created credential information.Then, participant's PPE 154 just can give the credential information signature of pseudo-entity, shows that the participant agrees to become a member of pseudo-entity, and agrees to use the condition (Figure 51 G, square 576) of control information 188.
Next, participant's PPE 154 just can make electronics container 152, with it place control information 188, pseudo-entity credential information 564,566,568 and participant oneself, specify this participant to utilize so that the voucher 504 of the secret key that uses one's power (Figure 51 G, square 578).Then, the participant just can determine whether more participant is added to (Figure 51 G, square 580) in the entity voucher.If just container 152 can be transmitted other participation member that (Figure 51 G, square 582) gives pseudo-entity, and can be visited and verify (Figure 51 G, square 586) by next participant.Ensuing this participant is the signature 566 (2) by adding oneself similarly, and she also agrees to control 188 and adhere to this pseudo-entity (Figure 51 G, square 588) to sign-show for the pseudo-entity credential information.This new information is added in this entity credential information 564,566,568 and/or replaces this information (Figure 51 G, square 590).Ensuing this participant also is added to (Figure 51 G, square 592) in the container 152 with themselves voucher 504 (2).
Repeating step 580-592 constantly, each participant in pseudo-entity have been made mark (the "No" outlet of decision block 580) to container 152.Then, the container of finishing 152 can be transmitted individual all participants (Figure 51 G, square 594) of giving.
The participant that Figure 51 H shows pseudo-entity may utilize so that an exemplary process representing pseudo-entity to use one's power according to the control 188 shown in Figure 51 F.The example procedure of Figure 51 H is to be carried out according to request by participant's shielded processing environment 154.Participant's shielded processing environment 154 record audit loggings (Figure 51 H, square 594a) utilize the service condition assessment request (Figure 51 H, square 594b) of controlling 188 defineds then.If this ask by control 188 permission (the decision block 594c of Figure 51 H "Yes" outlet); participant's shielded processing environment 154 is just from value 564 (Figure 51 H of container 152 accesses virtual entities; square 594d); and the control information 188 that utilization is relevant with service condition; realize this request and finish suitable result (Figure 51 H, square 594e).In an example; participant's shielded processing environment 154 can be by issuing digital certificate 504 according to service condition; represent pseudo-entity to play certification authority 500-by using the secret key decryption entity identifier value 564 corresponding with participant's oneself voucher 504 in the container 152; do figure notation to digital certificate, and make this digital certificate become the part of the voucher of newly issuing.Then, this example just can write down additional msu message 594H, reports its activity.
If the permission of the activity of being asked not controlled 188 (Figure 51 H, the "No" outlet of decision block 594c), whether seriously the example procedure of Figure 51 H just determines mistake (decision block 594f).Wrong if serious (the "Yes" outlet of decision block 594f), this process can be forbidden further use information (square 594g) in container 152, and the msu message (square 594h) that record is additional stops (Figure 51 H, square 594i) then.Wrong not serious if (the "No" outlet of decision block 594f), shielded processing environment 154 is the additional msu message (square 594h) of record just, just can finish this task (Figure 51 H, square 594i) then.
Process shown in Figure 51 F-51H and technology have various use.An example arranged, suppose that first publisher has published and distributed the deduction works of the content that a content that comprises him and second publisher provide.These two publishers just can constitute a pseudo-entity, allow first this entity activity of publisher's representative-but can only carry out according to the service condition that both sides consult to agree.For example, second publisher may be willing to allow first publisher publish and distribute the content of second publisher again, and allow consumer 95 to take passages and a collection of selected materials content-but only shown the consumer that shows suitable, that issue by this pseudo-entity the consumer and be allowed to use this true voucher 504 of aforesaid right.For example, the special subscriber who only has certain feature just has the right to obtain voucher 504.Above technology first publisher can be represented comprise the pseudo-entity of forming by first and second publishers, issue voucher 504 to the subscriber.Second publisher can believe that first publisher will only issue voucher according to the service condition of these two publishers' negotiation agreements.
Another example is the manufacture process that comprises a plurality of participants.Control 188 service conditions that provide make the value chain participant in the manufacture process value chain can represent whole value chain to carry out certain activity.For example, a material maker, a finished product supplier and between them a carrier of transporting material can form a pseudo-entity.Then, this pseudo-entity just can be submitted the control collection to the mechanism of exchange of describing certain processing, and all three participants of common action have been described in this processing.For example, according to the control collection that the service condition of the pseudo-entity that is applicable to them is created, can allow the requirement of associating showing material, final outward appearance and delivery time table, as a simple example.
In the another one example, a tame semiconductor company, an integrator of tame system, the different software vendor of three families can form a pseudo-entity, support chip design, emulation and the design test application program of semiconductor company.In this example, can issue voucher to every company that forms this exemplary physical and the concrete personnel in every company.Rule of consulting between the company and control can stipulate that who can access software applications and which part of Relational database, and who can revise software and/or data.Utilize this method, semiconductor company just can authorize the outside contractor and/or the specific people of supplier and these external companies of representative to visit the said firm.Can be only to these people authorize enough solution typical problems and executive system maintenance task right to access.And, can in the limited time, authorize the right (mandate) that they add, so that solve specific problem, address these problems some executable file and/or the data that need to visit in those acquiescences that are not included in them permissions.
The characteristic part of pseudo-entity of the present invention has been represented the expansion on disclosed processing chain of people such as being based upon Ginter and the control technology.For example, the voucher that generates according to this aspect of the invention can utilize the ability of VDE processing chain and control to manage the voucher chain.
The security catalog service
Figure 52 shows the example that security catalog is served commercial government utility system 600.That the security catalog service can provide electronics safely and/or other directory information is as name, address, public secret key, voucher etc.Transmit such information (as in preferred embodiments, by using virtual distributional environment) safely and help to prevent eavesdropping, help keeping secret, and, provide important framework support by making important participant mutual effectively.
More particularly, the security catalog service that provides according to these aspects can provide following exemplary advantageous feature and function:
● according to various parameter, provide the directory information that comprises various classified informations safely and reliably.
● can be according to name, function, physical location and/or other attribute, the consumer, the content provider, the clearing house and/or other side's electronic address and/or other communication path is provided safely.
● can basis, for example name, function, physical location and/or other attribute provide the consumer, the content provider, the clearing house and/or other side's public secret key and/or voucher.
● protect (suitably hiding) information relevant with identity, the while manages effectively and/or the confidential corespondence of asking in the safety container and responding is automatically carried out.
● utilize safety container and rule and control to guarantee the integrality and the non-standard (nonreputability) of content.
● from concentrating built-in safe handling chain and control, Electronic Control obtains the authorization.
● across a network or other system's distribution security catalog service function are (for example, each consumer and/or other value chain participant's node all may be distributed security catalog service, this service is as described in people's patent specifications such as Ginter, utilizes VDE to start security catalog service transacting with other one or more participants.)
● authorize and/or provide service and/or cooperation together to one or more distributed security catalog service branches clearing house, these minutes, the clearing house can operate in logic and/or physically anywhere, the inside of company and/or government organs for example, and/or one or more local and/or interdepartmental systems or network distributes and/or the auxiliary service in total service set district of the advanced security directory service mechanism of authorizing secure directory services functionality in.
● each consumer and/or some other or all value chain participant's node all may be supported security catalog service organization, this mechanism provides name and relevant service function in the environment of total name service network, comprise with the node of other one or more participants' interoperable and tabulation in other local all adopt the interoperability of the activity of VDE technology.
● can be hierarchically organized, with according to name, function, physical location and/or other attribute, entrust the responsibility of subclass of composite catalog and the running of security catalog service.
● for example, can be hierarchically organized so that the catalogue of catalogue to be provided.
● can be by classification, equity, or integrated mode is organized, here, can be at different business models and/or activity and/or value chain, the responsibility of distributed-directory service in a different manner, and, under one or more situations, a certain side or a few can be on grade, to be higher than other each side, and under other one or more situations, then be same level or lower rank, in other words, the relation between the participant is programmable, and (revise later on) can be set at certain commercial activity, the concrete directory service arrangement of one or more hope of value chain and/or pattern.
Figure 52 shows relevant exemplary security catalog service 600 from process angle.In this example, security catalog service 600 is to preserve about the directory information of consumer, value chain participant and/or electrical equipment safely and the archives of this information are provided according to qualified requirement.In this example, security catalog service 600 can provide following function:
data base administration 606,
● database search/retrieval 608,
database replication 610,
● database propagates 612,
● checking 614, and
● authorize 616.
Can be by search and search engine 608 accessing databases 606, the input information that the consumer is provided is as source and the record that utilizes its retrieval to be correlated with.For example, security catalog service 600 can obtain the identity 618 of individual, tissue, service and/or equipment; Electronic address 620; Voucher 622; And/or secret key 624.This information can be stored in the database 606.
In response to request 602, security catalog service search and search engine 608 accessible database 606, retrieve all the other information (for example, the e-mail address of someone or tissue, someone public secret key, the identity that has the individual of certain e-mail address, individual's the identity that has certain public secret key and address etc.).
In addition, but security catalog service 600 backward references control, audit require etc.For example, certain user may be required to show perfect instrument (as voucher 504), so that the email address, inside of visited company.Some field of the information that database 606 is known can not know for all visitors (as office or specific employee, their master catalogue on corporate server etc.; The people who perhaps shows voucher 504 can know that consumer's actual address, this voucher are that consumer by the certification authority 500 that takes on him issues, and other people's is all not all right).These controls can be specified in the safety container that transmits information to security catalog service 600.
When the requestor provides information, they may be required and can only use this information in the mode of authorizing.For example, they may be allowed to use this information to draft email message, rather than take passages the physical address of mailing list.These restrictions can be implemented by control 188b, and security catalog service 600 is related with this control collection by the information that it provides.
Shown in Figure 53, security catalog service 600 can also provide database 606 and search and search engine 608 except that secure communication facility 626 is provided.The framework of security catalog service 600 can be based on Figure 12 and Figure 13 of people's such as Ginter patent specification.
Figure 54 shows security catalog and serves 600 performed security catalog service processing.In this example, originator 95 (1) wants to send out a message to addressee 95 (2).Originator and addressee can be the electrical equipment 100 that consumer, clearing house etc. are had.Originator 95 (1) can send an Address requests to the security catalog service 600 that some information and request out of Memory are provided.Security catalog service 600 these requests of response provide information requested for originator 95 (1), and the originator can utilize this information to send message for addressee 95 (2).In this example, Address requests 602 and response message 604 are included in the safe electronic container 152, so that safeguard the confidentiality and integrity that keeps request and response.For example, utilize this mode, outside listener-in just can't know whose communication originator 95 (1) wants with, he or she need which type of information communicate-directory response can " not be deceived " and the message of asking is directed to other place.In addition, as mentioned above, directory service 600 may comprise controls 188 together with its response, and/or asks or require to control 188 parts that become it to import.
Mechanism of exchange 700
Figure 55 shows an exemplary mechanism of exchange commercial affairs government utility system 700.These inventions also make safety " mechanism of exchange " have to provide the ability of following all function:
● in a total eventful transaction or processing chain and control procedure, ratify safely, confirm and/or auditing events (purpose that for example, comprises checking and approval);
● for eventful transaction or processing chain with control procedure stores safely, ratifies, confirms and/or the control collection that distributes (purpose that for example, comprises checking and approval);
● issue the requirement of arbitrary or All Activity and/or treatment step; And
● if desired, participate in business on one's own initiative or handle (as by management, orientation, intermediary, arbitration, startup etc., be included as distributed calculating, process management, EDI, with reference to currency etc., participate in adopting the method and the pattern distributed, automatic incident of reciprocity control).
● can confirmation step and/or path, comprise the electronic information correct route that turns out to be through the communication switchboard of mechanism of exchange, this switch is fit to confirm certain information, wherein, what the voucher confirmation was followed is the path of requirement, and/or according to the rules rule and control sends this electronic information, for example obtain certain archive information and/or keep within the budget and/or other restriction and/or constraint, for example: the quantity of the information container of " shipping " at the appointed time, in the current container and/or within a certain period of time container comprises the number of the electronic money of (representative), the amount of money of appropriating when order goods buying, the proper mechanism etc. that orders.
Mechanism of exchange can only be the onlooker and the certifier safety, vigilant of electronic transaction and/or transaction step (all order of transaction step), it can be the service provider of a safety of a plurality of participant secure electronic transactions, and/or can participate in electronic transaction energetically directly.
More particularly, the mechanism of exchange according to these inventions can provide following advantageous feature and/or function:
● safeguard safely and approval and multistage transaction and/or the processing chain event notice information relevant with control procedure.
● can be by requiring its proof or checking, composition according to the business processing key element is represented, force and carry out a series of required transaction and/or processing chain and control procedure, for example, here one or more mechanism of exchange confirm and/or verify one or more specific incidents respectively in one or more steps " position " of trading order.
● can concentrate from the some discrete son control that some different participants provided, form total transaction control collection.
● utilize reciprocal method to coordinate required transaction event, for example, comprise the order of the incident between the value chain participant.
● from concentrating built-in safe handling chain and control, Electronic Control obtains the authorization.
● can intervene managing transaction and/or processing chain and control procedure on one's own initiative.
● can co-ordination stream and/or processing chain and control procedure and/or other business process.
● can be based on believable, safe distributed electronic business environment, provide robotization, efficiently the management, comprise confirmation and/or verification step in the activity of distributed entitlement information, EDI, financial transaction and/or trade system value chain, improve the security of distributed managing entitlement very significantly, wherein, this security may meet or exceed the security that centralized online business model can provide.
● can management value chain participant (tissue, individual consumer, virtual community etc.) inner and/or between conclude the business to small part.
● can to small part by service regeulations and control, regulation and/or monitor condition and/or the result satisfy basic transaction.
● can be according to the analysis (as by using derivation engine and/or expert system) of the situation of mistake and/or transaction situation, order this generations a bit what.
● can coordinate security, route, priority ranking and negotiations process in confidence, utilize secret, believable interface, make different, the common efficient running of distributed each side.
● for security document and/or processing controls provide suitable notarization, approval, confirmation and/or transmit.
● can confirmation step and/or path, comprise the electronic information correct route that turns out to be through the communication switchboard of mechanism of exchange, this switch is fit to confirm certain information, wherein, what the voucher confirmation was followed is the path of requirement, and/or according to the rules rule and control sends this electronic information, for example keep within the budget and/or other restriction: the quantity of the information container of " shipping " at the appointed time, the current container and/or the number of the electronic money of container representative within a certain period of time, the amount of money of ordering goods and appropriating when buying, the proper mechanism etc. that orders, why issuing these rules and control, is in order to satisfy about obtaining the proper proof or the requirement of checking at the node place that obtains this routing iinformation.
● across a network or other system, according to the described rule of people's such as Ginter patent specification and control and other VDE technology, the function of distribution mechanism of exchange (for example, each consumer and/or other value chain participant's node all may be distributed use clearing service, this is served to its mechanism of exchange function of small part startup, and wherein participant's node can directly transmit use information to other one or more participants).
● arbitration, conciliation and the negotiate service of electronic type or other form can be provided.
Figure 55 shows a concrete example of mechanism of exchange 700 from the angle of general function.Mechanism of exchange 700 provides safe audit facility, so that the event notice of receiving from the participant of this transaction according to it is safeguarded total transaction or the present situation of handling there.
In this concrete example, mechanism of exchange 700 is carried out following function:
● the collection 730 of event notice,
● the management 732 of validity event database,
● the generation 734 of requirement,
● the security audit of verifying 736,
● report 738,
● notify 740,
● duplicate 742, and
● propagate 744.
In this example, mechanism of exchange 700 is received the notice of event notice 748 forms, and the incident of informing takes place, and event notice can be contained in one or more safe electronic containers 152.The collection process 730 of event notice is collected these event notices 748, and they can be stored in the validity event database 732.Mechanism of exchange 700 can be according to its validity event database 732, generates other to notify 748 ', and can response request 752 and/or according to other requirement, and issue shows transaction or the answer 750 of the present situation of handling.In addition, the content of the validity event database 732 that mechanism of exchange 700 can be analyzed according to audit function 736 generates and output shows transaction or the progress of handling and the audit logging 754 of situation.Mechanism of exchange 700 can also be according to its function of reporting 738, issue report 736.Validity event database 732 can be a distributed event notification data storehouse, and in the case, reproduction process 742 and communication process 744 are used to safeguard and upgrade this database in distributed mode.
In this example, the another one major function of mechanism of exchange 700 is that issue incident new or that revised requires 758, and this requirement can be used for control or influence is always handled or transaction.Mechanism of exchange 700 can obtain control collection 188, price and permission 188 ', flow of event require 760, with and/or handle route request 762.Flow of event require 760 and handle route request 762 and can both concentrate regulation in one or more controls, the content of mechanism of exchange 700 these information of response and validity event database 732 can use its requirement to generate processing 734 establishments incident requirement 758 new or that revised.Mechanism of exchange 700 can also be created control collection 188 new or that revised " and price new or that revised and/or permit 188 .Mechanism of exchange 700 can be with the input of financial form 764 as its security audit function 736.
Figure 56 shows an exemplary framework of mechanism of exchange 700.In this example, mechanism of exchange 700 (can based on people's such as Ginter Figure 12 and VDE right operating system (ROS) shown in Figure 13) comprises secure communication facility 770, database and transaction processor 772, processing controls logic 774, routing table 776 and adaptive control collection database 778 (these functions can in all sorts of ways in one or more controls place and realize).In addition, mechanism of exchange 700 also can comprise a document notary public 780, in a seal maker 782, a Digital Time-stamp maker 784 and one fingerprint/watermark maker 786 are arranged.
Secure communication facility 770 can communicate mechanism of exchange 700 in the mode (for example, by safe electronic container 152) of safety on electric network 150.Database and transaction processor 772 are carried out the great majority shown in Figure 55 and are handled.Adaptive control collection database 778 can be carried out the validity event database function.Routing table 776 can be used as the ingredient of requirement systematic function 734, gives suitable entity with suitable message route.
Processing controls logic 774 can comprise derivation engine or expert system, is used for processing events stream to require 760 and/or handle those error situations that route request 762 does not fully expect that or stipulates.Processing controls logic 774 can operate according to rule-based principle, fuzzy logic, neural network or above these part or all of combination-or other any processing controls logical method.Processing controls logic 774 is determined to be about in total transaction or in handling next incident to take place.
Document notary public 780 can be used for generating the document of verifying, so that in that digital sealing and/or shorthand information are added to record and/or the digital document.
Figure 57 shows an exemplary mechanism of exchange and handles.In the example of this simplification, mechanism of exchange 700 can be the entity that intra-company is used for examining safely and instructing whole commodity delivery process.In this example, consumer 95 sends a order form 788.Order is collected department 704 and is received order 788, just to order incident 710 of mechanism of exchange 700 issues.Mechanism of exchange 700 response order incidents 710, the rule and/or the requirement of issuing one or more Electronic Control collection 188 forms, the regulation order is collected department 704 and how to be handled this part order.These rules 188 can the predetermined processing chain order, and guide the activity of the 709A of executive arm, warehouse 709B, carrier 726 and the payment collection 709C of department.Rule 188-can be in safe electronic container 152 be delivered to another department-so just the stipulated requirement of imminent transaction and total processing from a department and flows.Then, each department just can pass to next department with the route of security control 188 with rule and/or mechanism of exchange 700 appointments.Each department can also issue event notice 748, and warning mechanism of exchange 700 is careful the present situation of entire process.Mechanism of exchange 700 can be stored in this status information in its safe validity event database 732, instructs next step processing for audit and/or permission mechanism of exchange 700.
Mechanism of exchange 700 can, for example, use Figure 17 E-1, with ongoing transaction or handle mutual to the interactive mode shown in the 17E-4.A useful especially sight of mechanism of exchange 700 is management by the processing of a plurality of participants as carrying out in coordinated enterprise or for the company of other common purpose work.In this class business scenarios, many companies may just work towards common general objective, but they also may also have oneself in set the goal, for example, protect the confidential information of their clandestine dealing.Mechanism of exchange 700 can be used as an independently third party intervener/arbitrator, to coordinate the activity between a plurality of companies, need not detailed process information be disclosed arbitrary company to other any mechanism of exchange 700.
For example, mechanism of exchange 700 can generate regulation flow of event and/or processing route request 758 the control collection and/or in varying environment, mean the control collection 188 of different things.An example is arranged, and a control collection of mechanism of exchange 700 issue may make certain company carry out a step, and another company carries out the concrete steps that another one step-each company do not know all that always other company is performed or the order of step.Therefore, mechanism of exchange 700 just can be developed control collection 188, can be used for only partly open between the different activity persons of individual or company.
Figure 58 A and 58B show the illustrative steps and the process of performed being used for of mechanism of exchange " basic transaction ".In this example, mechanism of exchange 700 is being played the part of the role who is similar to the coach of football team to a certain extent.By receiving skill collection and each individual's " player " requirement, and they are combined into total " a recreation plan ", mechanism of exchange 700 just can relate to the value chain participant of any amount in total " basic transaction " process.
In this example, each value chain participant 164 (1) in a processing of mechanism of exchange 700 management, ... 164 (N), can contribute control collection 188 (1), ... 188 (N), these control collection regulations or management participant oneself are to commerce requirement, restriction and the process (Figure 58 A and 58B, square 750) of transaction.These other control collection 188 (1), 188 (N) has stipulated how each individual participant takes on the role of oneself.Each participant 164 (1), ... 164 (N) know its effect in total transaction, but may not know other participant's role, perhaps not clear " team "-therefore that how to go to form other participant, these other control collects 188 (1), common descriptor transaction of 188 (N) may do not taken into account always concluding the business.
Mechanism of exchange 700 also receives another control collection 188X, and this control collects control collection that how to have stipulated each participant with requiring and limiting, and is combined in (Figure 58 A and 58B, square 752) in total process of exchange.This total transaction control collection 188Y has stipulated how to solve the son transaction control collection 188 (1) that individual participant provides, conflict between 188 (N) (for example, this may relate to the electronics negotiations process 798 shown in Figure 75 A-76A of patent specification of people such as Ginter).Mechanism of exchange 700 bonds them together indivedual control collection of participant other logic that combines-utilize, to create a total transaction control superset 188Y (Figure 58 A and 58B, square 752).The control superset 188Y that mechanism of exchange will finally obtain is stored in (Figure 58 B, square 754) in the local storage.This overhead control superset control mechanism of exchange 700 is processing events how, to carry out the transaction of " small ".
Mechanism of exchange 700 just can start total transaction control superset 188Y (Figure 58 B, square 758) after the incident that the requirement of receiving is into handled (Figure 58 B, square 756).Then, mechanism of exchange 700 just can be paid corresponding reciprocity control collection to each participant in the transaction, thereby this control collection collects each participant of the part of superset 188Y-make can both communicate by letter with superset (Figure 58 B, square 760) corresponding to total transaction control.Perhaps, in this example, each participant can-it when mechanism of exchange 700 provides its control collection 188 (1), 188 (N)-reciprocity of maintenance control collection, this control collects and can communicate with the control collection that this participant gives mechanism of exchange 700.
Then, mechanism of exchange 700 just can begin to monitor the incident (Figure 58 B, square 762) of utilizing the control superset that starts to be received.If the incident of coming in is not error situation (Figure 58 B, the outlet of the "No" of decision block 764), mechanism of exchange 700 will understand whether this incident shows that basic transaction finishes (Figure 58 B, square 765) so.If basic transaction is not finished (Figure 58 B, the "No" outlet of decision block 765) as yet, square 762 is just returned in control, continues monitoring events.If basic transaction is finished (the "Yes" outlet of decision block 765), mechanism of exchange 700 just assert that transaction finishes (Figure 58 B, square 774).
If the incident of coming in is error situation (Figure 58 B, " Y " outlet of decision block 764), mechanism of exchange 700 is just handled this error event (Figure 58 B, square 766) in control superset 188Y.If mistake not too serious (Figure 58 B, the "No" outlet of decision block 767), square 762 is just returned in control so, waits for the arrival of next event notice.
If mistake relatively more serious (Figure 58 B, the "Yes" outlet of decision block 767), mechanism of exchange 700 just may call a gross error and handle routine (Figure 58 B, square 768).Gross error is handled routine 768 according to the rule among the control superset 188Y and/or according to inference engine 774 or other processing controls logic, attempts to eliminate this mistake.Such inference engine or other processing controls logic 774 can be programmed by the business model of total transaction, and it just has enough information according to error situation like this, select adequate measures.
Process shown in Figure 58 B can nestedly be carried out.For example, the son transaction of certain " participant " definition self may be exactly that a basic transaction based on many participants' contribution-all these is to be managed by same or different mechanism of exchange 700.
Safety verification is put commercial government utility system
Commercial government utility system 90 can comprise to be made its service function that can play " safety verification dot system 6000 " (referring to Figure 58 C) effect, this safety verification dot system that security, filing are provided and can confirm and/or the licensed service of the checking communication information with some method.Safety verification dot system 6000 can:
● for ecommerce provides distributed alternately, examined efficiently, automatically and has filed layer, and
● strengthen the safety depth of distributed security environment such as VDE and distributed commercial government utility layer.
Like this, safety verification dot system 6000 can be carried out safety and/or management function.This ability of commercial affairs government utility system has been utilized the advantage (as allowing the central authority ability of control and treatment node practically) of centralized safe mode, and these abilities are deployed in distributed " user's space " pattern, this pattern can reach maximum efficient and dirigibility, support safety with manageable retractility (main weakness of integrated system), and provide the safety advantages of the enhancing of a plurality of independently security context layers.The ability in back extremely needing to be particularly suitable for the extremely sensitive communication of safety guarantee.Need the participation and the safe handling of the processing environment of one or more independently safety verification point protections, these safe floors just can work, and basic distributed security environment has been consolidated in this safe handling.
Can confirm and/or verify information through one or more safety verification dot systems 6000, so that allow the receiptor (as side who receives the information in the container) of information believe that before receiving information some communication function and/or security step (process) have taken place.This confirmation and/or checking can comprise, for example, handle by required and/or that authorize, shielded safety verification dot system 6000, confirm or verify correct communication route.Check point can be distributed in the whole communication network, perhaps at physics and/or logic place " this locality " (referring to Figure 58 C) of final user's VDE node.
Safety verification dot system 6000 can adopt the communication switchboard that is fit to confirm and/or verify certain information and process.For example, what the voucher that safety verification dot system 6000 is issued can confirm to follow is required path, and required check point was checked the safe electronic container that links to each other, and/or according to some predetermined rule and control, had finished the transmission of this container or other electronic information.For example, this service can assist to guarantee and/or confirm and/checking surpasses certain budget, other restriction and/or constraint, and/or satisfied some other requirement.
For example, safety verification dot system 6000 can assist to ensure following requirement (comprise and do not exceed restriction or other constraint): the quantity of the information container of " shipping " in preset time; Current container and/or within a certain period of time container comprise the number (extremely important concerning reducing irrational electronic money activity) of the electronic money of (or representative); The amount of money of appropriating when order goods buying comprises that the correct mechanism that orders is on the scene; Like that.For example, when the VDE safety container through the one or more communication switchboard that being fit to, this requirement assessment can be carried out according to container (or other numerical information communication) activity that sends from certain logic and/or physical region, node, groups of nodes, user or user group and/or other user community, and foundation wherein is that the identifying information in security node and/or personal user and/or tissue and/or zone is by reference determined." communication check point " ability of these commercial government utility systems can be by the safety " check point " that provides one or more " independence " to distribute along communication path, provide the security feature of usefulness, communication path require to exist by this check point to be provided and related with this container safely and/or insert the correct voucher and/or the checking of this container by the process that this check point (or one group of check point) is managed safely, thereby has significantly improved safe reliability.Can be by collecting this existence of node detection-for example, according to rule and control, can collect before node is about to handle the partial content at least of one or more containers of collecting at this, requirement must exist correct voucher or checking.These kinds of container can comprise, for example, and from the specific individual and/or the container of tissue, and/or have the container and/or a container contents of certain or certain several particular community.
From the angle of security, safety verification dot system 6000 can " be independent of " final user's virtual distributional environment node.For example; angle from security; these nodes can be independently; because they are for the management of check point; used secret key to manage to safeguard a plurality of safe execution section in their shielded processing environments; make the security breach at final user's node place can directly not jeopardize the security of check point running, and help to guarantee to relate to not other section of entail dangers to of destruction that safety carries out section.
Safety verification dot system 6000 also can be collected msu message, for example, comprise the container receiptor's that retrieval is predetermined identity information, information of container classification, be used for for the verification that confirms (approval) in the future with and/or out of Memory, and/or file described container part or all of content.Can encrypt some such information to small parts, like this, if neither one or a plurality of container sender, predetermined and/or actual container receiptor and/or have the right to visit the cooperation of the government organs of these information, one or more parts of these information just can not be decrypted.
Figure 58 C and 58D show an example of the arrangement of " check point security " commercial government utility system 6000, this example provides the security of communication check point, approval and filing service in the environment of the communication network that connects user 95 (1), 95 (2), 95 (3).In this example, safety verification dot system 6000 can be the ingredient of communication construction.For example, safety verification dot system 6000 can be that one or more communication switchboards or other are designed for the ingredient that the heading message that comprises according to them detects the device of safe electronic container 152.
In this example, safety verification dot system 6000 has security capabilities, control whether allow via communication construction transmission safety container 152 by-and through the result of this container of communication construction route.In an example; the control that together operates with user's 95 (1) shielded processing environments can require the container 152 container of electronic money (as carry) of some kind to comprise control 404, and control 404 requires their routes through safety verification dot system 6000 (or certain safety verification dot systems).Such control 404 can prevent to use container 152 and content thereof (currency that comprises as it), unless it is through suitable safety verification dot system 6000 routes.
For example, suppose that user 95 (1) wants to send a safety container 152 to user 95 (2).In this example, user 95 (1) transmits container 152 by communication construction to user 95 (2).It is a container that this communication construction can detect the information that is sending, and can this container of route, so that allow the safety verification dot system intercept and capture (as system 6000 (5)).
After intercepting and capturing container 152, safety verification dot system 6000 (5) can be checked the control information in the container, judges whether to have satisfied the requirement that container is further sent to user 95 (2).Only meet after these requirements, safety verification dot system 6000 (5) just container can be transmitted to user 95 (2)-or, it can revise container, allows user 95 (2) to open and use container according to the control 404 (for example, may limit use) of container.Can authorizing secure check point system 6000 revise the part of container control 404-for example, increase the restriction of further using at least.
The example of Figure 58 C shows two " nets " of safety verification dot system 6000.In this example, these two nets have been represented the set of safety verification dot system 6000, and each safety verification dot system 6000 all is proved (for example, certified mechanism 500 confirms) and is:
A safety verification dot system, and
Other member of a specific order.
Therefore, in this example, safety verification dot system 6000 (1)-6000 (5), 6000 (7) these ranks that " net 1 " representative confirmed; " net 2 " represents safety verification dot system 6000 (4)-6000 (6) these ranks.As an example, " net 1 " safety verification dot system 6000 is proved to be can handle the container that comprises electronic money 6004.
One of requirement of stipulating in the control information relevant with container 152 is that it must make some security audit function through the safety verification dot system (as system 6000 (5))-for example of " net 2 ", and following the tracks of as believable electronic money becomes possibility.A safety verification dot system (as 6000 (3)) of " net 1 " can refuse according to these control 404 with container 152 give user 95 (2)-or it can refuse to revise container 152 it can be used by user 95 (2).
As another example, suppose that user 95 (2) wants to send out container 152 to another user 95 (3).In this concrete example, the control 404 relevant with container 152 may require next step communication of container 152 must be by the safety verification dot system 6000 (7) of " net 1 ".In the control 404 that user 95 (1) provides such route request may be arranged, perhaps may add by safety verification dot system 6000 (5) or user's 95 (2) shielded processing environment.
Shown in instantiation in, control 404 can make the safety verification dot system 6000 (7) of " net 1 " container 152 be sent to user 95 (3) by another route (as by another kind of commercial government utility system and/or non-safe communication switch) that does not comprise safety verification dot system 6000.
Figure 58 D shows a performed example procedure of exemplary safety verification dot system.In this exemplary process, safety verification dot system 6000 is received container 152 (Figure 58 D, square 6002), has judged whether to satisfy the requirement (Figure 58 D, decision block 6004) of its relevant controlling 404 defineds.If require to satisfy, safety verification dot system 6000 just can be carried out the result of " requiring satisfied ", as revising control 404, to satisfy above-mentioned route request (Figure 58 D, square 6006).If require not satisfy (Figure 58 D, the "No" outlet of decision block 6004), the safety verification dot system just can be carried out " requiring not satisfy " result's (Figure 58 D, square 6008).
Each group result may relate to the security audit of some types.If safety verification point 6000 has passed through to comprise the container 152 of electronic money, safety verification point 6000 just can write down following one or more msu message:
● sender's identity,
● the identity of sender's node,
● receiptor's identity,
● the identity of receiptor's node,
● currency based on voucher,
● other safety verification point 6000 of currency process,
● former currency processor's identity,
● the date of transmission, when and where,
● the date of reception, when and where,
● how long currency has transported, and
● other security audit information.
If safety verification dot system 6000 refusals pass through and/or revise container 152, it just might generate an audit report that comprises available trace information, for example:
● sender's name,
● the essence of deficiency,
● predetermined receiptor, and
● other trace information.
It can also notify sender, predetermined receiptor, government bodies or other mechanism.It also can collect " communication failure " expense to the sender.
Then, safety verification dot system 6000 need just can judge whether other communication (Figure 58 D, decision block 6010).If no, process just may finish.Other if desired communication (the "Yes" outlet of decision block 6010), safety verification dot system 6000 just can send container 152 to next system (Figure 58 D, square 6012).Next system can be the safety verification dot system 6000 (Figure 58 D, square 6016,6004,6006,6008) that another one is carried out other processing.
Example
Example-digital content distribution value chain
Figure 59 shows exemplary distributed commercial government utility 75 and how to be used to support an exemplary digital content distribution value chain 162.In the example of Figure 59, author 164 can create valuable works, as novel, TV programme, musical works etc.The author provides these works 166 form of electronic digit (for example, with) to publisher 168.
Publisher can utilize his brand, and title identification and marketing effort are to consumer's 95 these works of distribution.Publisher 168 can also to content " tabulator " 170-to the consumer provide widely, from the people of a plurality of participant contents-provide works 166.For example, tabulator's example comprises traditional online information database service and deposits WWW website from the content of many participation aspects.Usually, the consumer uses tabulator's service by the search information relevant with consumer-defined one or more themes.Tabulator 170 can provide research tool to consumer 95, is selected by consumer oneself.
Tabulator 170 can directly distribute to consumer 95 and comprise the works 172 of part or all of original artwork 166.Tabulator 170 can also distribute works 172 and give " packing person again " 174.Packing person 174 can extract content and they are comprehensively become blended product from the relevant several works of content again, as multimedia combination, journalism thing, " current awareness " intersection.In these services, packing person 174 is selected content according to the interest of audience's performance and is organized again.Consumer 95 can subscribe to the electronic edition newsletter about certain specific title, perhaps gives 174 1 brief catalogues of packing person again, lists their topics of interest above.Packing person 174 will screen relevant information and send information to consumer again.Here, packing person is screening for the consumer again.
For example, packing person 174 can be the publisher of newsletter again, and can in newsletter 176, reprint the author works 166 partly or entirely.Packing person 174 can directly distribute newsletter 176 and give the consumer again, and perhaps newsletter may be passed through other passage.Packing person 174 can use the search engine searching consumer 95 interested articles that tabulator 170 provides again, and these articles are comprehensively become the electronic edition newsletter, have tabulator 170 brand and packing person 174 ' brand more above, then newsletter is issued consumer 95.
Distributed commercial government utility 75 can be supported the value chain of Figure 59 with many participation methods.For example:
1, certification authority 500 can issue voucher, and to make each value chain participant can both discern them are whom and show that they are members of one or more particular category.For example, author 164 and/or publisher 168 can stipulate, as long as the suitable amount of money of payment, any attested tabulator or again packing person all have the right to take passages or a collection of selected materials works 166.Certification authority 500 can issue digital certificate 504, supports the commercial object of this new hope, tabulator that reputation is rather good really of voucher proof tabulator 170, and packing person 174 packing person again that reputation is pretty good really also again.As long as author 164 and/or publisher 168 trusts the security of the voucher 504 that total systems 50 and certification authority 500 issue, they just can not worry that works 166 can be by other anyone extracts or a collection of selected materials beyond the personnel of the suitable type of their appointment.
In another example, certification authority 500 can issue voucher 504 to tabulator 170 or other user.Certification authority 500 can issue this voucher 504 under the guidance of author 164 or publisher 168.Voucher 504 can show such fact, and promptly tabulator 170 or some permission 404 of other user's modification are agreed to authorize by author 164 or publisher 168.Author 164 or publisher 168 can have specific permission 404, only make just to allow these permissions of modification under the situation that has " tabulator of mandate " voucher.
In another example, certification authority 500 can issue voucher to one or more other users of level, make them can utilize the specific part and/or the modification permission of content and/or content, by adopting author or some VDE rule that publisher or certification authority provided and control (for suitable rule is allowed with controlling), this permission can be limited to specific utilization and/or modification.
2, in this example, right and permission clearing house 400 can be used for registering works 166 and mandate and the consistent suitable permission 404 of instruction that is provided with each value chain participant are provided.For example, author 164 can be to right and permission clearing house 400 registration works 166, the control collection 404 of other each value chain participant's of stipulative definition right.
For example:
● an example is arranged, and control collection 404 can stipulate, as long as publisher is each part copy of distributing dollar to the certain number of author's 164 payments, and just can the distribute copy of works 166 of unlimited amount of publisher 168.
control collection 404 can allow publisher 168 to add his control, and it is unlimited to make consumer 95 can read works 166, but forbids that the consumer duplicates or redistribute these works.
● although the Electronic Control collection can be propagated in electronics container 152 with works 166, and it can also provide separately.For example, right and permission clearing house 400 can be according to requests, and anyone who obtains the control collection to request provides the control collection relevant with works 166.
Right and permission clearing house 400 can safeguard the control collection 404 of different editions for different user classs, for example, consumer 95 can receive control collection 404a, and tabulator 170 can receive another control collection 404b, and packing person 174 then can receive the control collection 404c that another are different again.These controls concentrate each all can be provided in advance by author 164 or other right owner 168, " Pi Zhun permission in advance " system is provided, this system makes being extensive use of extremely effectively and high safety of works 166, in addition, these control energy collectings are enough in seamless mode, can be distributed to receiptor's (perhaps can be utilized) of control collection by the distribution person of these control collection with the control collection with the distributed template applications program interaction of VDE-one or more template applications programs.In concrete " super distribution " business model, allow to distribute as far as possible widely works 166, the work that right and permission clearing house are 400 is for providing present control collection 404, and this control collection authorizes specific value chain participant to use works under given conditions in a particular manner.
3, in this concrete example, use clearing house 300 to support value chain by collecting from each value chain participant's use information.Like this, use clearing house 300 just can provide safe audit function, generate the report that record works 166 have been used how many times and how have been used.
An example is arranged, use clearing house 300 can analyze use information, define how many consumers 95 and read this works.For example, use clearing house 300 to report the consumption information of different the level of details and/or the information of particular types to each value chain participant according to each side to the requirement of privacy and generally acknowledged commercial rights.An example is arranged, use clearing house 300 to provide a report to consumer 95 about his or she own use works 166 situations, meanwhile, provide final report information to author 164 or 168 of publishers, this information may not comprise consumer's name, address or other direct identifying information.
Another one example, report also can be directly flow to tabulator 170, publisher 168 and author 164 from packing person 174 again.Can be along any logic route, directly or by the directed report of any order through each side, this report is included as any mixing of each side's information that value chain admits, and can be implemented by VDE rule and control at least in part.
4, in this example, financial settlement 200 can provide the safety of the financial details of transaction to settle accounts-guarantee that suitable value chain participant compensates other suitable value chain participant.An example is arranged, financial settlement 200 can a robotization of being managed by VDE rule and control to small part, in the process control efficiently, use the situation of works 166 according to consumer 95, obtain payment from consumer 95 theres, and the various piece of payment is reasonably distributed to author 164, publisher 168 and other suitable value chain participant.For example, financial settlement institute 200 can be mutual with other bank or financial institution, realizes the robotization of payment account transfer, and/or assist management shown in the total value chain in the electronic money safeguarded.Financial settlement 200 can also assist to guarantee it self management of providing for them with other commercial government utility system 90 and support that service is reasonably compensated, in other words, for example, the safe VDE that carries out in the commercial government utility system 90 handles and can automatically guarantee to these management and support ISP's payment.
5, in this example, security catalog service 600 is supported the value chain that this is exemplary by for the electronic communication between value chain participant and/or the commercial government utility system 90 facilitates.For example, security catalog service 600 can provide electronic address and/or routing iinformation according to request, and a value chain participant can be got in touch with electronics mode and another participant.An example is arranged, suppose that consumer 95 seeks out the latest edition of works 166, but find that the address of publisher 168 has changed.Consumer 95 can get in touch with electronics mode and security catalog service 600, and the latter can provide present address information.Certainly, in the business transaction system applies, the each side that the security catalog service provides more meticulous service to wish with identification is as the multi-dimensional search of catalogue resource, so that according to categorical attribute identification each side.Security catalog service 600 can also provide the service (price, the operation parameter of permission is as the right of redistribution etc.) of discerning content according to the type of content and/or associated rule and control.
6, in this example, mechanism of exchange 700 can be used for assisting again packing person's 174 exploitation newsletters 176.For example, mechanism of exchange 700 can assist the many different works that many different authors are created are all gathered and extracts is published in this process automation in the newsletter.Mechanism of exchange 700 can be safeguarded the present situation of total process that multistep is rapid safely, points out to have finished which step, and which step is not also carried out.Mechanism of exchange 700 can also aid in the rapid process of this multistep, arbitration and conciliation between different participants, in some cases, can initiatively influence or control this process (for example, by issuing new instruction or requirement) according to wrong or other condition.
Example-manufacturing chain
Figure 60 shows the exemplary manufacturing value chain that distributed commercial government utility 75 is supported.In this concrete example, consumer 95 places an order and receives the confirmation of order to manufacturer 180.Manufacturer may order parts and necessity from many different suppliers 182 (1)-182 (N) there.Supplier 182 (1)-182 (N) then again may be from other supplier 182 (a1) ... other parts or subassembly are ordered in the there.Bank 184 provides with funds to supplier 182 according to ordering the assurance that proof and manufacturer will repay payment in advance.Transportation/warehouse ﹠ transport corporation 186 is responsible for transportation and stores necessity and/or finished product.
In this value chain, certification authority 500 and mechanism of exchange 700 help the safe transfer of electronic order, letter of confirmation, terms and conditions and contract, assist also to guarantee that each value chain participant when exchanging necessary information with other value chain participant, keeps the confidentiality to a certain degree of wishing.Use clearing house 300 can assist to examine safely total process control, reality between the tracking value chain participant and electronics parcel, and the out of Memory relevant with use.Financial settlement 200 finance arrangements between can salvage value chain participant, for example, help the electric network world 150 and paper spare or other bank world 184 between coordinate.Right and permission clearing house 400 can provide safe filing to the Electronic Control 404 of definitional part or all transaction.Mechanism of exchange 700 can monitor the overall process in the intercurrent transaction of value chain participant safely, and provides suitable cycle status report to each value chain participant.In addition, mechanism of exchange 700 can assist to guide or the total transaction of arbitration, to guarantee to realize that institute in steps and requirement.Security catalog service 600 can aid between the different value chain participants routing iinformation electronically.Certainly, noted earlier as the present invention, and be applicable to that whole instructions is such, VDE processing chain and control and other ability comprise rule and control and safety technique, will be preferably as the basis of above-mentioned activity.
The example how commercial affairs government utility system supports mutually
Above-mentioned Figure 16 A-16E shows different commercial government utility system 90 is how to support mutually.More particularly, Figure 16 A shows, financial settlement institute 200 can provide service to other one or more commercial government utility system 90, for example, comprise use clearing house 300, right and permission clearing house 400, certification authority 500, security catalog service 600, mechanism of exchange 700 and other financial settlement institute 200 '.In these cases, a plurality of commercial government utility system has constituted virtual clearing house and high level commercial government utility system.
Under each situation, financial settlement 200 funds of collecting because of supporting that service is deserved, and these funds are existed among at least one supplier's the account, this account adopts a kind of modes of payments at least.Financial settlement institute 200 can also provide the VDE audit logging, proves the source and the number of fund, and financial settlement 200 accounts that deposit the supplier of fund in.Financial settlement 200 can help other one or more support service organizations to set up supplier's account, and send account's number and/or number sets and suitable terms and conditions to this one or more support service organization.Issue financial settlement 200 support services request and the response that returns to the support service of asking; can in the VDE safety container, transmit (as previously mentioned); utilizing their firm securities, confidentiality, control architecture and confidence level flexibly, and can handle by the shielded processing environment of one or more VDE in each place.Can by financial settlement 200 and/or other one or more support service organization provide finance and account information (and/or include VDE control in collect) with forms of VDE control collection.Financial settlement institute 200 can also provide service mutually, further promotes function and management efficient.For example, financial settlement 200 can provide service to other country or the colleague of other geographic area.In another example, financial settlement 200 can allow another financial settlement 200 use not direct one or more methods of payment of support of these second financial settlement institute 200.
Figure 16 B shows and uses clearing house 300 to provide service to other commercial government utility system 90.In an example, use clearing house 300 to support service organization to other ecommerce, use clearing house 300 ' as financial settlement institute 200, right and permission clearing house 400, certification authority 500, security catalog service 600, mechanism of exchange 700 and other, the data and/or the report that raw data, combined data are provided, derive to small part.The service organization of these other frameworks can be with this information as the proof to transaction and details thereof of third party independently, represent their service organization to do market survey, and/or this information (probably with their use information) is resell to its people.In an example, right and permission clearing house 400 can sell report to publisher, the information that report has comprised them with serve 600 and the combination of the information of certification authority 500 from financial settlement institute 200 and use clearing house 300 and security catalog.More particularly, report can comprise the tabulation of specific publisher at the object of right and the registration of permission 400 places, clearing house, number of times to right and the request renewal of permission clearing house or interpolation right and permission, financial settlement 200 income numbers of summing up for each digital properties, certification authority 500 represents that publisher issues indicates the user through confirming and have the voucher number of effective subscription of the copyright of publisher, and number of times from the online Web server site information of publishers to security catalog service 600 requests that seek.Under each situation, support service all to provide information, so that it is incorporated in the report to publisher to right and permission clearing house.
Example-distributed commercial government utility 75 can be supported purchase, granting permission and/or the lease transaction of digital properties
In the situation that the consumer pays the bill for numerical information, distributed commercial government utility 75 provides important confidence level, security, convenience and efficient.And, the founder of information and distribution person can be according to various methods and in different market in a different manner, the digital properties-price of any digital format of giving that this information-yes.
Figure 61 shows the example of information delivery service device 1000, and wherein informant 168 provides digital content, for buying, lease and/or provide permission.In this example, information service company 168 releases news 166 to several markets, the whole world (comprising the individual).Their market scope comprises professional person, home office customer and minimized office market and big-and-middle-sized company and family consumer.For example, supplier 168 can be to the content 166 of family consumer 95 (1), professional person such as lawyer 95 (2) and company or other tissue 95 (3) payment electronic forms.In an example:
● individual consumer 95 (1) has bought 3 pieces of articles 166 (1) from online encyclopedia there with subscription price;
● lawyer 95 (2) has bought three chapter contents 166 (2) of Patent Law feature article;
● two Product Line Managers of major company 95 (3) have received property market research report 166 (3).
Before information was paid transaction, consumer 95 (1), professional person 95 (2) and company 95 (3) can utilize security catalog service 600, search informant 168 website, and they think the content of usefulness to assist identification.Subsequently, each side 95 can be to 168 of suppliers electronic information first, and request obtains the customizing messages that they are wanted.Supplier 168 can delivery information 166 and control price and relevant rule of permitting and control 188 in the lump in VDE safe electronic container 152.Each side 95 has an electrical equipment 100, and electrical equipment 100 includes the shielded processing environment 154 of carrying out control 188.
Supplier 168 decides different prices at different market to information.For example:
● professional person 95 (2) and SOHO (small office/family office) payment transaction expense;
● major company's 95 (3) payments are subscribed to and tranaction costs sum (whenever print from a large-scale report or take passages one page and need pay 10 dollars as company 85 (3), may also will pay subscription charge);
● personal user 95 (1) pays by average subscription charge.
In each case, this locality, state and/or the federal consumption tax are included in the middle of the retail price.In the Electronic Control collection 188 that can in electronics container 152, pay, provide method of payment, also can provide method of payment separately with related content 166 (providing) as people such as Ginter.
Financial settlement 200 guarantee that the method for payment of supplier 168 by any mandate obtains payment.Method of payment is widely accepted in information delivery service 168.In some market, the payment of some form is than more popular in other market.For example:
● in professional person, SOHO and consumer market, credit card (MasterCard and Visa) and sell on credit (American Express) popular.
● consumer 95 (1) also likes credit card, and the use of bank's debit card is also in continuous increase.
● large-scale company 95 (3) also uses credit card and charge card, and clearing house (ACHs) payment by robotization is by based on X.12 the tradition and VDE safe electronic exchanges data (EDI) transaction of agreement are kept accounts and payment.
Financial settlement institute 200 makes payment more efficient in many ways.For example, financial settlement 200 that facilitate for several methods of payment of supplier, the interface of " station purchase ", and record at least one account number relevant with given supplier.
In this concrete example, digital certificate can be paid to each consumer 95 by certification authority 500, indicates one or more classifications of consumer.For example, certification authority 500 can pay:
● one or more vouchers 504 (1), show that consumer 95 (1) is this fact of individual consumer subscriber of information service 1000, and show that further the consumer is registered school student and is this fact of resident's (being used to relate to the tax revenue of transaction) of markon's welfare Asia
● voucher 504 (2), show professional person 95 (2) be one by this fact of the lawyer of the legal recognition of California, and
● one or more vouchers 504 (3) show that company 95 (3) is a corporate entity and has this fact of certain credit grade.
Control collection 188 can start different methods of payment according to existing suitable digital certificate 504.For example, the control collection 188 (1) that consigns to consumer electronic appliance 100 (1) authorizes consumers 95 (1) to use each one in these three pieces of articles 166 (1).Control collection 188 (1) can, for example, comprise a requirement, be consumer 95 (1) must have one by independent certification authority 500 (information distribution person or authorize a more senior certification authority under take on other side of certification authority's effect) voucher 504 (1) issued, show that consumer 95 (1) has subscribed to online encyclopedia and still not out of date this fact of this subscription.Voucher 504 (1) can, for example, with certification authority 500 (as can be by the management of U.S. government or other government organs or authorize) other voucher of issuing uses, be United States citizen, live in the U.S. and be this fact of legal resident in the inferior state of markon's welfare to show consumer 95 (1).
The individual consumer
Consumer 95 (1) by issue in the VDE electronics container 152 financial settlement 200 transaction, use to informant's 168 payment subscription charges.Payment transaction may relate to, for example, to financial settlement 200 electrical equipment 100 that send the electronics container 152 include rule and control 188 (4) and audit logging 302 (1).Audit logging 302 (1) can point out, for example:
● should pay to whom,
● turnover,
● concrete method of payment (as the Visa card),
● subscriber's Visa card number sign indicating number and date of expiry,
● the identifier of information subscribing,
● receive the supplier's of payment account number.
Safety container 152 (7) also may comprise the rule that indicates the sales tax that also should impose municipal government, markon's welfare Asia and Federal Government and control 188 (4).Financial settlement 200 impose suitable sales tax and deposit this part fund in suitable account, for example, these funds should be deposited in the relevant account who belongs to the California tax authority 1002.
In the process of exchange payment, the consumer 95 (1) of subscription can receive a voucher 504 (1) from certification authority 500, shows that she in fact has been the date of expiry of subscriber and current subscription.
The professional person
In this example, lawyer 95 (2) may stay in Britain.He has bought three chapter contents 166 (2) about the feature article of patent with MasterCard, but he is with sterling rather than dollar payment.Finish this purchase-transaction, lawyer 95 (2) at first will be in advance from financial settlement 200 mandates that obtain buying at the most in every month 500 dollars (or the sterling numbers that are equal to).Can from financial settlement 200 forms with the budget control the safety container 152 (8) 188 (5), will be in advance authorize the electrical equipment 100 (2) that sends to the lawyer.Shielded processing environment 154 (2) can be opened container 152 (8) in lawyer's the electrical equipment 100 (3), checking budget record 188 (5), and this control is stored in the associated safety database of PPE 154 (2) maintenances.
In learning this three chapter 166 (1) each chapter all opened after, lawyer's shielded processing environment 154 (2) just can be created a relevant audit logging, and from budget record in the existing deposit deduction buy the amount of money.After one month, perhaps after this deposit of 500 dollars of authorizing is in advance used up, lawyer's PPE 154 (2) can send safety container 152 (9) to financial settlement institute 200, its subsidiary audit logging 302 (2) has indicated all purchases, their amount of money, and supplier's account maybe should count credit side's account, helps the high-efficient automatic of computing like this.Financial settlement institute 200 can open safety container 152 (9), lawyer's credit card account is counted the debit, and pay their deserved funds to suitable supplier.
Company
Before content business, the inner 200A of clearing house of distributed corporate finance of company 95 (3) according to financial settlement in 200 the authorization operation, send out a safety container 152 to each manager 95 (3) A, 95 (3) B, every month the information and the market survey budget of present approval pointed out in budget record 188 wherein.The 500A of distributed authentication mechanism of company (in this example, having adopted the hierarchy identical with certification authority 500) can also issue digital certificate 504 (not shown) to the employee of company.
In this example, each product manager 95 (3) A, 95 (3) B are the relative section of printed report and budget optionally on the electrical equipment 100 of his or she this locality, and every printing one page just deducts 10 dollars.Shielded processing environment 154 (3) is carried out this process safely in the local electrical equipment 100 (3); utilize control 188 (3) to regulate, control 188 (3) digital certificates 504 (3) that may need certification authority 500 and/or the 500A of certification authority of distributed company to issue.
According to the control 188 (3) that the informant provided, the end of month in every month, when perhaps the budget of this moon is used up, the electrical equipment 100 (3) of company just sends the audit logging (not shown) to the in-company financial settlement 200A of institute, points out the account number the supplier who reports arbitrary purchase events, the amount of money and these purchases that interim takes place.The local 200A of clearing house of distributed corporate finance gathers the total value in the audit logging, and in safety container 152 (12), at least one audit logging 302 (3) is sent to outside financial settlement institute 200, authorize and pay deserved fund to the supplier of market intelligence by automatic clearing house (ACH).In addition, the account number of the company 95 (3) that fund should be counted the debit and the account number of the market research agency that issue is reported are arranged in the safety container 152 (11) (as the ingredient of audit logging 302 (3)), fund should be dialled in this account number.Financial settlement 200 finish payment process and beam back VDE safety container (at least one audit logging is provided) as confirming to the 200A of clearing house of corporate finance of inside by ACH.The distributed 200A of clearing house utilizes the safety container (not shown) to send at least one affirmation audit logging to each product manager 95 (3) A, 95 (3) B again.
Example: distributed commercial government utility 75 can be supported the transaction that the consumer buys tangible goods and pays
The pith of ecommerce must be accompanied by sale, purchase, distribution management and/or the payment of all kinds of intangible goods.The commercial affairs of tangible goods have the requirement of many identical safety, confidence level and efficient as the commercial affairs of intangible goods (as digital information).Make computing machine become real commercial instrument, distributed, safe, believable right/incident management software layer (as right operating system or middleware software), the standard of the virtual distributional environment of describing as people such as Ginter just becomes the task of top priority.Therefore, even when tangible rather than digital properties are the object of secure e-business, distributed commercial government utility 75 also can be played an important role.
Figure 62 shows exemplary tangible goods and buys and payment system 1010.In the example of Figure 62, the supplier of famous clothes of imagination and household objects, for example, L.L.Bean or Lands End sell their kinds of goods by digital network such as Internet/WWW network sale.In this example, company has been created:
● Web LIST SERVER 1012, be used for providing the inventory of clothes to consumer 95,
● Web fulfillment service device 1014, as the interface of fulfiling function, and
● the 3rd Web server 1016, take on the interface of secure financial clearing house 200 and multiple method of payment (as MasterCard (" MC "), VISA, and American Express (" AMEX ")).
In this example, company also:
● serve 600 enrolled for service to security catalog,
● by financial settlement institute 200, foundation has the supplier account of a kind of method of payment (as credit card, loan credit card and/or bank) at least,
● to mechanism of exchange 700 several transaction of registration.
In this example, the basic transaction that comprises an Electronic Control collection is at least registered to mechanism of exchange 700 (can be the distributed mechanism of exchange of sales company inside) by company, and this control collection has been described, for example:
● to one or more processing mechanism such as storehouse 1018 and logistics units 1020 (may be also may not be same company) of fulfiling,
● receive the in stock affirmation of goods of expectation,
● receive the Confirmation of Orders book,
● the mandate in advance that obtains paying from the method for payment of the particular consumer that places an order,
● the delivery indication,
● confirm that goods sends, and
● finish the control of payment transaction.
In this example, company also obtains at least one digital certificate 504 from certification authority 500, show at least with next true, as:
● company is the corporation de jure that (Delaware) registers in the Delaware State;
● company does not have bankruptcy and/or has certain standing;
● company has been assigned with a specific federal taxation identification number, and
● company has the state tax receipts identification number in each state in several states, specific state and their corresponding identification numbers.
Consumer 95 utilizes his or her electrical equipment 100 with web browsing ability, visits LIST SERVER 1012 on the net at the WWW of Internet.LIST SERVER 1012 sends the Web page 1022 to consumer 95, and one page electronic directory is provided.Can in one or more safe electronic containers 152 (1), send the Web page 1022.Consumer 95 utilizes his or her electrical equipment 100 display page 1022A, clicks to show man's choli Oxford button part on the page, orders the shirt of 15.95 dollars of prices.The current Web page is substituted by the Web page 1022B from fulfillment service device 1014.This second Web page 1022B can send in safety container 152 (2).
Consumer's electrical equipment 100 has a shielded processing environment 154.PPE 154 opens safety container 152, display page 1022B on screen.Page displayed 1022B is a form, and form divides several columns, comprises the description of Directory Number and shirt and retail price.Consumer 95 in column, insert color, neckline size, normal height or tall person personage, normal or make to measure, quantity.Consumer 95 also will point out the place of delivery of shirt, the grade of delivery service and consumer's address.
After consumer 95 finished required information, electrical equipment 100 was put into safety container 152 (3) with the information in the form hurdle 1024, and container is beamed back fulfillment service device 1014.The fulfillment service device is opened container 152 (3) and is read column information 1024.Fulfillment service device 1014 is created the VDE audit logging, shows the information received 1024, and fulfillment service device 1014 can also be created control collection 188 and/or start the event notice of purchase-transaction.
Fulfillment service device 1014 can directly or by mechanism of exchange 700 be communicated by letter with storehouse 1018.Then, fulfillment service device 1014 will be understood that the commodity that need are whether in stockit is available and can deliver.If fulfillment service device 1014 knows that required commodity are in stockit is available and can deliver, and the information 1024 that consumer 95 provides is enough to proceed transaction, and the fulfillment service device is just beamed back another one Web page 1022C to the consumer, shows:
● purchase can realize,
● various sales taxes and freight charges,
● the address that provides and the grade of selected delivery service,
● be used to fill in and the new column of paying relevant information, and
● whether the inquiry consumer wants to proceed.
Fulfillment service device 1014 also sends PPE 154 from audit logging 302 (1) to consumer and mechanism of exchange 700, points out that the bigger basic transaction of which part finishes.
Checked fulfil details after, if consumer 95 decision he or she do not think continuous business, his or her electrical equipment 100 just can send safe VDE container 152 (5) to fulfillment service device 1014 and mechanism of exchange 700, points out to conclude the business and cancels.If consumer 95 answer is asked continuous business for being, the consumer is prompted to select a kind of method of payment from the method for payment tabulation that provides.In this example, this tabulation corresponding to commodity provider and financial settlement the method for payment all supported of 200 both sides.Consumer 95 inserts the number of credit card or charge card, date of expiry and the address of sending bill.
After having finished required information, consumer's electrical equipment 100 just can utilize his or her safe PPE, in safety VDE container 152 (5), send these information to financial settlement institute 200, and will with one of audit logging independently VDE container (not shown) issue mechanism of exchange 700.
Financial settlement institute 200 obtains to authorize in advance from the credit card company that handles there, and for example, the approval in-formation 1026 of utilizing safe VDE container 152 (6) to authorize in advance returns to fulfillment service device 1014.Financial settlement 200 can send another VDE container 152 (7) to mechanism of exchange 700 with audit logging 302 (2), show that authorisation step finishes in advance.
Fulfillment service device 1014 can send another with the new Web page 1022D and the VDE safety container 152 (8) of audit logging information 302 (3) to consumer 95, shows:
● the process of ordering is finished,
● sell the support that has obtained method of payment,
● when delivery, consumer's credit card will be paid full payment,
● the trade confirmation number is provided with the back reference, so that can be to fulfillment service device 1014 and/or mechanism of exchange 700 inquiries.
Fulfillment service device 1014 (as with storehouse 1018) Bale Cargo, they are consigned to express company 1020, and, for example, send safety container 152 (9), 152 (10), show that to financial settlement institute 200 and mechanism of exchange 700 goods sends respectively with audit logging 302 (4), 302 (5).In this example, express company 1010 (" logistics department ") also sends VDE safety container 152 (11) to mechanism of exchange 700 and fulfillment service device (if desired, also can to consumer 95), shows that this express company 1020 has taken package.
In this example, after having paid package, express company 1020 just sends the VDE safety container 152 (12) that comprises the audit logging 302 (7) that the delivery that shows package finished to mechanism of exchange 700, then, the latter just stamps the mark of finishing to transaction, to financial settlement institute 200, express company 1020, fulfillment service device 1014 and send another VDE safety containers 200 to consumer 95 in some cases, show that transaction finishes then.
Example: distributed commercial government utility 75 can support that wherein the consumer is the transaction of services pay
In the end of this century, a powerful and influential mark of flourishing west economy, especially America's economy is exactly from a large amount of manufacturings, " chimney " economic transformation to " information economy " and " service economy ".Distributed commercial government utility 75 can be supported the transaction of consumer for consuming or using service to pay.
Figure 63 shows an exemplary online service system 1030.In an example, online service 1032 obtains to show the digital certificate 504 (1) of this online service identity to security catalog service 600 registrations from certification authority 500 theres.The voucher that each side issued 504 that certification authority 500 and certification authority 500 are authorized is also agreed in online service, for the concrete fact is issued voucher.
For example, online service 1032 is agreed to accept the voucher 504 (3) that the 500A of distributed authentication mechanism issues there from (by voucher 504 (2)) father and mother that confirm through certification authority 500, to issue voucher, show that they have child and these children still is small children at present.Online service 1032 does not allow the children of confirmation like this to visit the material of some problem of subject of online service distribution again, do not allow to use digital signature to be engaged in purchase-transaction based on these vouchers yet, unless the custody of child people has issued another voucher, show that they are ready to bear financial responsibility (as unrestricted condition, or the total value of the purchase of each transaction or (in an example, this time is one month) cost in preset time has a numerical ceiling).Can these vouchers 504 (2), 504 (3) be issued father and mother and/or at least one children VDE safety container 152 from certification authority 500.
Now, suppose that children 95 (2) have subscribed to a game on line that is called " chat ".Online service 1032 has a Web interface of designing for the school-ager specially.1032 each season of the subscription that provides of service all must upgrade.Utilize electrical equipment 100 as personal computer or have bi-directional communication function and the televisor of shielded processing environment 154 and set-top box, online service 1032 is found in children's 95 (2) directory services 600 safe in utilization, and sends a message that pulls subscription.In response, online service 1032 issue in VDE safety container 152 (4) that father and mother 95 (1) or payment of guardian require 1034, membership qualification and information about firms.The individual 95 (1) of father and mother or guardian and/or other paying provides credit card number, the date of expiry of he or she (or they) and sends the address information 1036 of bill to online service 1032 in one or more other safety containers 152 (5).
In this example, online service 1032 utilizes VDE safety container 152 (6), consumer's services accounts, credit card and/or other payment information 1036 are sent to financial settlement institute (at this example becomes in the example, and father and mother 95 (1) may directly provide finance and relevant information to financial settlement institute 200 in VDE safety container 152 (5)).Online service supplier 1032 also to financial settlement 200 provide the website of clearing house and supplier's account number.In shielded processing environment (for example; may comprise and be locked in the safe room or a general calculation machine of other place of safety); financial settlement institute 200 opens safety container 152 (6), takes out payment information 1036, and finishes the payment transaction with credit card company.
Concerning this example, financial settlement institute 200 is then again at least one safe VDE container 152 (7), (this tabulation only is used for illustrative purposes with following message 1038, do not impair general situation, promptly wherein any available information all may be transmitted) send to online service 1032:
● the VDE audit logging of transaction,
● the authorization number of transaction,
● supplier's account number,
● obtain the consumer's of service account number, and
● the number of payment.
Online service 1032 sends safety container 152 (8) to consumer 95 (1) again then, shows that payment has obtained acceptance.In an example, online service 1032 can instruct certification authority 500 to issue voucher 504, shows that at the date of maturity subscription before is all effective.Online service 1032 also provide from financial settlement the audit logging 302 (1) that draws 200 information that provide 1038.
Children 95 (2) sign in in the online information service 1032 at every turn, and children's PPE 154 just check determines whether to exist or know voucher 504, if, whether:
● these digital certificates show that current subscription online service is still not yet due, and
● any small children is documentary and all effectively (for example, because children are less than 18 years old, so still not yet due) all.
Online service is by these vouchers 504, be sure of that children 95 (2) are authorized to use online service 1032 and some " adult " content of disable access after, just ratify the part of optionally access authorization.
The characteristic of online service comprises distributed many people interactive game.In this example, children 95 (2) with in addition at least one through the children that authorize and confirm play games-in this concrete example, the adult is forbidden playing these recreation by the VDE of bottom rule and control.Can utilize at least one VDE safety container 152 (9), will realize that from online service 1032 at least a portion (as executable code and/or explanatory code such as Java) of software of at least a portion 1040 of at least one recreation downloads in the middle of children's the information appliance 100 (2).
Utilize people's such as Ginter the described method of instructions, determine these programs and/or program segment 1040 genuine and believable and unmodified.Be used for calculating the one-way hash function secret key of (generation is used for the digital signature of the integrality of definite at least one program 1040 or program at least a portion), the approval 504 that has at least a certified mechanism 500 to issue is tied in the identity of online service 1032.
In this example, when children 95 (2) played games, his or her activity had at least a part to be measured according to disclosed method in the people's such as Ginter that wait for ratification jointly the application, creates the audit logging 302 (2) that shows this children's operating position.In certain, send these audit loggings 302 (2) to online service 1032, in this example, online service 1032 may comprise uses clearing house 300.Use clearing house 300 to analyze these service recorders 302 (2), and utilize them to determine to receive how many expenses to children 95 (2).
Example: distributed commercial government utility 75 can be used for for buying and/or using tangible goods to provide value chain to decompose
Distributed commercial government utility 75 can be used for facilitating for the purchase that relates to tangible goods or the transaction of other type.Figure 64 shows an exemplary tangible goods delivery system 1040.For example, company 1042 utilizes the electrical equipment 100 that comprises PPE 154 to place an order and orders office appliance.The commodity of ordering have the copy paper of 8.5 * 11 inches of box folders, stapler, staple, one case and the yellow notebook of a dozen legal sizes.These commodity are made by manufacturer 1050, are sold by dealer 1048, and sell the said firm by retailer 1046.
In this example, financial settlement institute 200 receives payment 1052 and will pay decomposition from company 1042, payment is divided into decomposes payment 1052A, 1052B, 1052C, consigns to retailer 1046, dealer 1048 and manufacturer 1050 respectively.
For example, company 1042 sends to retailer 1046 with order 1044 in VDE safety container 152 (1).In this example, retailer 1046 provides fulfillment service, promptly collect order 1044, and control collection 188 correspondingly is provided, this control collection has indicated dealer 1048 and/or the account number of manufacturer 1050 and the number percent that each side will collect of every kind of commodity from retail price.If desired, retailer 1046 can provide a kind of different control collection 188 (no matter how much quantity is)-one one ground of permission to carry out different payments and decompose for every kind of commodity ordering.Retailer 1046 can provide this control collection 188a to company 1042.
Can when the one or more digital certificate 504 that has that certification authority 500 issues, regulate control collection 188a.For example, the digital certificate 504 (1) that 188a can require company 1042 to provide certification authority 500 to issue is provided in control.Voucher 504 (1) shows the identity of the company 1042 of order.Company 1042 can provide another voucher 504 (2) in the credible hierarchical chain identical with certification authority 500, prove singlely down to be authorized to place an order, and each order has the highest spending limit of appointment.Company 1042 can provide identical or different voucher 504 (2), and this voucher shows that also the procurement staff of company has been authorized to use the charge card of company.
In this example, the charge card of 1042 usefulness companies of company payment.Before retailer's 1046 deliveries, financial settlement institute 200 at first obtains payment authorization from credit card company.After receiving the notice of authorizing in advance, retailer 1046 just can be to company's 1042 deliveries 1047.After the delivery, retailer 1046 just creates at least one VDE audit and/or billing record 1052 at least one VDE safety container 152 (2), and sends this container to financial settlement 200 (can also or alternatively msu message being sent to retailer 1046).
Then, financial settlement 200 just total payment is distributed to each value chain participant that (for example, may directly receive from retailer 1046 and/or by company 1042) control collection 188a represents, thereby finish the transaction of charge card.By this method, their payment just when retailer 1046 receives its payment, is received by dealer 1048 and/or manufacturer 1050.Control collection information 188a also can show how to distribute total payment and supplier's account number, so that pay this locality, state and federal tax revenue (if words of payment of duty), and defrayment, as paying to express company.
This example of Figure 64 shows that the decomposition of value chain is applicable to tangible goods and intangible goods.If desired, can also use similar techniques, further fall back on the supply chain supplier of the metal of folder (as be provided for making) of manufacturer 1050.
Example: distributed commercial government utility 75 can be assisted the distributed digital loop property by providing object registration and other to serve
Distributed commercial government utility 75 can be assisted electronic communities distribute effectively electronics or digital properties or content.For example, utilize the electrical equipment 100 that is equipped with shielded processing unit 154, founder or other right owner 164 just can send the digital object that will register to right and permission clearing house 400 in safety container.
Right and permission clearing house 400 utilize its shielded processing unit of VDE to open container; distribute a unified object identifier, show the type (software, video, sound, literal, multimedia etc.) of founder's identity, registering object and the digital signature of object.Unified object identifier can be that the whole world is unique, is unique in the name space territory of founder or other entity (as online service, digital library or specific area under one's jurisdiction, as designated country) just perhaps.
In this example; right and permission clearing house 400 utilize its shielded processing environment; private secret key with this right and permission clearing house is done to go up figure notation to this unified object identifier, and in the VDE safety container object and identifier is returned to its individual or entity of registration.Right and permission clearing house 400 can object of reservation copy, the perhaps unified object identifier of an object of reservation, object and unify the signature of object identifier.In another example, right and permission clearing house 400 make figure notation for a new object of being made up of primary object and its unified file identifier, and this new object and/or its signature are kept in the archives of right and permission clearing house 400.
The founder may also send permission and price template 450 (referring to Figure 45 A-45C) in the VDE safety container, point out to ratify which permission, used the paying price of these permissions, if feasible, also point out individual, classification and/or area under one's jurisdiction that these prices and permission are suitable for.In a VDE safety container 152, can send more than one permission and price template 450, perhaps, can be each permission and VDE safety container 152 of the independent use of price template.
In this example, utilize VDE safety container 152, object just is sent to publisher 168 theres (referring to Figure 16) from the founder.Utilize voucher 504, publisher 168 just can prove that publisher has been authorized to optionally change the permission and the price of object really to the VDE example (PPE 154) of the control collection of explaining the founder, and creates new permission and price template.Then, publisher 168 just sends the VDE safety container to right and permission clearing house 400, has comprised the unified object identifier that is accompanied by new control in the container.In this preferred embodiment, if object remains unchanged, it is constant that publisher 168 just can select to allow this unify object identifier; Yet, if publisher has changed this object, it might be added the brand of oneself, so just must change unified object identifier, with the situation of reflection publisher.Utilize the private secret key of publisher to recomputate digital signature.As the front, registering object can select a store digital signature or signature to add practical object.
Example: distributed commercial government utility 75 can be used for facilitating for copyright registration
As value-added service, right and permission clearing house 400 can provide copyright registration service (referring to Figure 43).Right and permission clearing house 400 can send to the copy of object suitable government department 440, for example the suitable online copyright registration service organization of U.S. Copyright Bureau.If registration or processing will be charged, can and unify object identifier with object with the control that indicates payment mode, in the VDE safety container, send.
In this example, copyright registration service organization can send at least one VDE safety container to financial settlement institute 200, the subsidiary at least audit logging of safety container, the account of government department who shows account, the collection of funds of the amount of money, method of payment and the enroller dealt with, back, copyright registration service organization receives in the VDE safety container again and shows that transaction has obtained the audit logging of approval (perhaps owing to which kind of reason, the transaction of suggestion is not granted) in advance.
If financial settlement institute 200 has ratified this transaction in advance, in this example, the computing machine that has the VDE ability in the U.S. Copyright Bureau is opened this safety container, this is unified object identifier and object adds in the registered database.Under the trust chain that certification authority 500 sends-in this example, this mechanism can by or represent U.S. government's Operations Management-copyright registration service organization to issue at least one digital certificate 504, show these facts, promptly in fact the object of the digital signature of unified object identifier with appointment and appointment had been stepped in registration unit and had been remembered, and in fact to have a people at least when this object of registration be the owner of this copyright.Voucher 504 is sent to that people (and/or specifying notification received that people) and the right and the permission clearing house 400 of registering object in the VDE safety container, the latter can provide copyright registration information according to request again in safety VDE container.
Copyright registration service organization sends at least one VDE safety container to financial settlement institute 200, this container has an audit record at least, instruct clearing house 200 to continue to fulfil in advance the transaction (if all essential information all are the ingredients of the processing ratified in advance) of approval and/or provide for information about to clearing house 200, as the amount of money of dealing with, the account of method of payment and enroller, the account of the department of U.S. government of collection of funds, and should finish this payment transaction, back, copyright registration service organization again in the VDE safety container from audit logging that financial settlement is received, show that transaction has been finished and fund has deposited certain suitable account or a plurality of account in, perhaps show payment transaction failure and the reason that can't finish transaction.
Example: distributed commercial government utility 75 can be supported to permit and the renewal or the adjustment of price
Distributed commercial government utility 75 can provide a kind of mechanism, is used for upgrading overdue right and permission, thereby further facilitates for the distribution of electronics and digital properties.Referring to Figure 42 A.
In an example, suppose that a employee that a family enters the company of happy 1000 ranks has the control collection of an expired digital properties (may be one section software or Java small routine).The shielded processing environment of VDE on this employee's computing machine can send a VDE safety container to right and permission clearing house 400.
Distributed commercial government utility 75 can also provide a kind of mechanism, distributes to be distributed the altered right of one or more participants, permission and price in the chain, thereby facilitates for the distribution of electronics and digital properties.In an example, suppose the consumer on her hard disk, have a numeral to and the VDE control collection that has publisher to distribute.Permission and price are indicated as the pattern of paying by access times at first, and wherein the each operand of user will be paid 10 cents as printing or checking.
Determine now whether can utilize new permission and price, the shielded processing environment among the consumer PC can utilize from the website of control collection acquisition and the Email of MIME compatibility, sends a VDE safety container to right and permission clearing house 400.The consumer has sent an inquiry and received answer in the VDE safety container to security catalog service 600 in the VDE safety container, has obtained the website of right and permission clearing house 400 thus.
The VDE safety container of issuing right and permission clearing house 400 comprises object identifier and requires acquisition to comprise the request of the current control of price.The shielded processing environment of right and permission 400 server places, clearing house is opened the VDE safety container, the nearest control collection of retrieval from control database, and by reply email, another VDE safety container that has required control is sent out.Consumer's shielded processing environment is opened this container, and replaces and/or expand expired control with new control.Now, the consumer just can be according to just receive and concentrate the rule of defined and control to use content by the control that the VDE in local computer or other electrical equipment handles accessory rights and permission clearing house.In this example, these new rules and control will use the price of being paid to reduce to 5 cents from 10 cents of each operations at every turn.
Example: distributed commercial government utility 75 can support the to distribute pattern of new right
Distributed commercial government utility 75 can also be supported some transaction, and wherein some or all right is not that form with content distributes to the ultimate consumer at first, but these rights that must request distribute.In an example, suppose that lawyer's decision combines his article there with other material that obtains from legal information distribution person, enter publication.Legal information distribution person has selected a right and permission clearing house 400, as the distribution person of the control collection information of their many properties.They whenever at right and object of permission clearing house 400 registrations, will collect with two controls of the registration of the form described in people's such as Ginter the instructions:
● a control collects the acquiescence control of stipulating to comprise to the price of retail consumers, and
● second control collection transmits the right and the price of retail consumers little interest, for example a collection of selected materials power.
The publisher of lawyer's communication has chosen a chapter from the Patent Law disquisition, and wants to comprise in communication outside other article the extracts of one 1000 word.This communication publisher has obtained monographic this chapter and retail control collection thereof, it utilizes the Email of Internet MIME compatibility, send an inquiry to right and permission clearing house 400 in the VDE safety container, requirement obtains by the extracts power of that chapter of appended unified object identifier sign and a collection of selected materials power.This lawyer just finds right and permission clearing house 400 (website that perhaps, can comprise right and permission clearing house 400 in the initial retail version that the lawyer receives) in directory service 600 safe in utilization.
Right and permission clearing house 400 checked object databases find the control collection information of unifying the object of object identifier name with this, and determine to utilize with price separately and take passages and a collection of selected materials power.The power of extracts is not transmitted and is revised the right of taking passages part.A collection of selected materials power with will the price is fixed at give a discount 30% control of retail price transmit, if the whole chapter of a collection of selected materials not just calculates price in proportion according to the length of extracts.
The composing application program of utilizing VDE to know, this communication publisher combines several works, comprise extracts with 1000 words as new works, and the object that this is new is with its control collection, to right and the registration of permission clearing house.This communication publisher as United States Patent (USP) and Copyright Bureau, registers this new object also to copyright registration functional department.This communication publisher is distributed in new works in the VDE safety container, and this container also comprises in independent a collection of selected materials works and all complete communication control collection of each.The shielded processing environment basis of local VDE in the consumer electronics is applicable to the control of this composite object and the controlling recording operating position of each part of independent rule is arranged.Sometimes, VDE is to using clearing house 300 and financial settlement institute 200 to send audit logging.
Example: distributed commercial government utility 75 can support electronic rights to consult
Distributed commercial government utility 75 can support electronic rights to consult.In an example, suppose that a distinguished professor creates " course bag ": in this example, the compilation of the many different works that use for the student of a certain course of sacrificial vessel body, this course has only a term.In this example, this professor sends a VDE safety container that has inquiry to suitable right and permission clearing house 400, and regains the control collection of the listed digital properties of inquiry.After having checked permission and price, this professor notices the selling at exorbitant prices that a chapter is arranged in the book, makes the total price of course bag be higher than the highest price that s/he is wished.
This professor uses the disclosed negotiation mechanisms of people (as referring to Figure 75 A-76B) such as Ginter, consults with right and permission clearing house 400.Right and permission clearing house 400 find automatically that again it lacks the power of this negotiation itself, so just negotiation is redirected to publisher.
By witnessing; show in " higher education " this classification and have membership qualification; and after certification authority 500 obtained suitable voucher 504, the shielded processing environment of publisher's Web server just provided a control collection new, that revised for the property towards this professor.These control discount offered valencys require to have printed copy on the printer VDE ability, that authorized, and this printer will write down the umber of printed copy, and these controls also use the VDE technology to report to transaction each side.This professor is still dissatisfied to price, consults to counter-offer so just sent out a VDE to publisher in safety container.Counter-offer control collection of the VDE of publisher and this professor's negotiation is consulted and is reached an agreement, and the new control collection of the new price, time limit and the condition that have by mutual consent is provided to this professor, and then, this professor continues to make course bag.The price why right and permission clearing house 400 have been ready to ratify to reduce, in part because in this example, this professor can provide digital certificate, show she in China fir pearl not exactly round in shape branch school, Lip river, University of California for full-time and have the student of certain minimum quantity will utilize this fact of these materials.This checking meets the requirement of publisher to right and 400 explanations of permission clearing house.
Example: the authentication of executable module
On behalf of government, a valuable use of certification authority 500 issue digital certificate exactly.Except the voucher of issuing indicate identification, law situation etc., governmental certification mechanism 500 can issue the voucher that confirms executable module such as loading module.For example, certification authority of governments at all levels 500 can authenticate the set of the executable module of the law of representing their administrative region and trade usage.For example, Saudi Arabia may require, and all electrical equipment under its management control all will have loading module, and these modules have only been issued the authentication of the government department of appropriate content with assurance by the attribute of checking container.The installed module that may the authentication calculations state tax receive in the inferior state of markon's welfare.
Example: the distribution of amusement
Distributed commercial government utility 75 can be used for the pattern that film is supported to issue to the consumption market in high efficient and flexible ground.For example, suppose that film and entertainment company such as Di Sini want to provide electron distributions formula commercial affairs government utility 75, to support 95 its films of distribution to the consumer.Di Sini can oneself open commercial government utility system 90, and perhaps the third party with neutrality gets in touch, and represents it that commercial government utility system 90 is provided oneself.In this example, the purpose of commercial government utility system 90, be support to the consumer provide safe by watch number of times pay/pays, lease, lease and other film distributor is concluded the business by access times.
Film itself can be with digitized linear forms distribution-for example, the media of DVD (DVD) or other high power capacity.Except film itself, these media also store one or more safety containers of the control collection that comprises the use of controlling these films.Consumer 95 can utilize has that network 150 connects or the media player 104 (referring to Fig. 1) of other " passage behind " (as ability of read-write smart card etc.) is play these films.
Media player 104 has a shielded processing environment 154, as is used for the secure processing device of management right and handling safety container.Can also play storage medium with the personal computer that is equipped with shielded processing environment and net connection.
Set-top box 104 can be by being distributed in the Electronic Control on the media and/or controlling by the behind passage.These controls require the consumer of each property that set-top box 104 record consumers decision watches to use and payment information.For example consumer 95 can put into media player 104 with media such as DVD CD, clicks " playing (play) " button.Next consumer's media player 104 can show (as on televisor 102) message first, tells the consumer to watch this film will spend how much (as 2.95 dollar), and the inquiry consumer she whether want to continue.If the consumer answers "Yes", media player 104 just plays on consumer's televisor 102 that this film-record uses and payment information simultaneously, reports to commercial government utility system 90.Under the control of the one or more associated electrical control collection that consign to it, shielded processing environment 154 can monitor and collect and can finally be used to guarantee the information of consumer for watching the film paying and providing safe use to examine in the media player 104.For example, the use audit of safety can be used for allowing the performer of Di Sini, film and director and other to participate in other people of this film making, examine how many people safely and watched this film (and the demographic information might be provided, so that the location of advertisement etc.).For example, media player 104 shielded processing environments can be collected check account following information in the index of record metering, record keeping and/or the budget relevant with specific control safely:
● the title of film,
● the numeric identifier of film,
● play the time and date of property,
● play the number of times of property,
● whom the people who plays property is.
In an example, consumer 95 must have the digital certificate of being issued by suitable certification authority that shows certain fact 122.Such digital certificate 122 can be used for providing environment for the Electronic Control collection that consigns to media player 104.Before the control of using comes into force, such voucher is arranged possibly when allowing consumer's movie and/or forbidding movie under certain condition and/or make in movie.
For example, father and mother can obtain digital certificate 122, and showing has children in the family.This digital certificate that " children is arranged " 122 can be used for preventing media player 104 broadcast " G " levels, " GP " level other any film in addition.If necessary, these vouchers 122 can be by other management being provided with the present invention and supporting the same tissue of service to issue.
The Electronic Control that certain movie in media such as CD provides can be stipulated also that specific value chain is decomposed and implement with arrangement of payment.For example, media player 104 is understood from the electronics rule that consigns to it and is controlled the concrete number percent that " knowing " movie distributor, operating room and distributed commercial government utility 75 will obtain 2.95 dollars of usage charges, and department of state government must obtain certain tax revenue of sales tax or VAT form.Because this information safeguards in the shielded processing environment 154 that in media player 104 consumer 95 knows plan and/or its details that payment is decomposed never.(consumer and be indifferent to the ratio of publisher's " share " and the income of operating room usually.Shielded processing environment can provide this payment to decompose in this locality or as mentioned above by distributed or centralized financial settlement function 200 in the media player 104).
Media player 104 in real time (online) and/or on the basis that recurrent event drives its collected use scale information of report.In an example, media player can be reported its information of this month collection in front the end of month in every month.It can report the payment information of collecting (comprising the decomposition data that the control collection provides) to the financial settlement institute 200 (perhaps, can directly directly report this information to clearing house 200) of Di Sini operation.Financial settlement 200 guarantee consumer's account is suitably counted the debit, and each payee (as other each side in Di Sini, movie distributor and the value chain) obtains suitable " share " in the consumer payment.Financial settlement 200 credit inquiry and the mandates that the consumer also can be provided, assist to guarantee that the consumer can not be accumulated to the big bill that she can't pay.
Media player 104 can be to use clearing house 300 its collected use information of report by independent auditor (film maker and performer can adhere to this function by third party auditor independently-rather than Di Sini-carry out) running; perhaps; for example; if to Di Sini and/or clearing house's 200 these information-rules of report and control requirement; can hide some information to Di Sini; to guarantee the right of value chain others; and; because as the protection mechanism of VDE, Di Sini can't discern, changes and/or remove these information.Use clearing house 300 to analyze to use data and issue to show the report of spectators' sum, the market share etc.Use clearing house 300 can also further analyze this information, so that demographic and/or other market survey information to be provided.This category information is very useful concerning advertiser and sales force.
Di Sini can also run right and permission clearing house 400.In this example, even permission is distributed in the optical medium, right and permission clearing house also can provide additional control collection for various reasons.For example, the control collection that is distributed in the media can expire in some day.Right and permission clearing house 400 can issue new control and collect to substitute expired control collection.Right and permission clearing house 400 also can issue permission, " sale " to be provided and/or to change price (as reducing the price of old film).Right and permission clearing house 400 can also issue special permission (as taking passages or a collection of selected materials right, promptly multimedia developer or advertiser can ask to obtain right and/or redistribute right so that print to some picture as the Micky Mouse pattern that gets the Green Light).Di Sini can " ratify " some so special permissions in advance, makes right and permission clearing house that they can be provided automatically as requested.Thereby the user that digital certificate 122 can be used for and permit mutual-assurance to obtain the control collection has the right to use it.
Example: distributed commercial government utility 75 can support to use collection, the analysis and directed again of information
Before people's such as Ginter instructions invention disclosed, electronic communities lack can be in local computer or shielded processing environment high-level efficiency, effectual general, the technology that can reuse, distributed, reciprocity that monitors and weigh operating position.Collect, analyze and report and use data, significant values is provided as other participant of right owner and distribution chain, distributed commercial government utility 75, consumer and other interested each side of architecture.Know that what has taken place usually may have decisive role or contribution to may what taking place maybe.In addition, can directed again use information, to support other wide range of commercial activity, comprise advertisement and selling mode.
Supposing that one or more consumers of each family have information appliance 100 in several companies, is personal computer in this example, and this electrical equipment has the shielded processing environments of the described VDE of people (PPE) 154 such as Ginter.Further hypothesis is in the middle of a period of time, perhaps be one month in this example, VDE is writing down detailed use information always and with in the encrypting database of these information storage in each hard disk of every computing machine, computing machine is the logical extension of consumer PPE and controlled by it.These consumers everyone from common different source, bought different information and amusement combination.Each example of VDE is all used information according to the controlling recording relevant with content of buying or using and/or service.
Every month and/or other requirement are (perhaps, if support, allow) report at interval first day or first day shortly past, each example of VDE sends to use clearing house 300 all according to the relevant control of using in the month before with them of each digital properties with service recorder.Use clearing house 300 to provide about last month or other any report report of use property in (every day, weekly, each season, every year etc.) at interval to each right owner again.
In an example, these reports contain identification individual consumer and the information of employing their company.In another example, report contains detailed use information, removes but individual consumer's identity is used clearing house 300.Perhaps, the identity of individual consumer and company all can be removed.Can as industry, geographic position and/or country and/or other any useful classification, gather use information by any one or a plurality of certain classification.
In another useful examples, company that certain is specific or individual consumer may not allow VDE (certain, as to be subjected to by on-the-spot rule and the administration of controlling the right that obtains) to transmit identity informations at the information appliance of primary importance to use clearing house 300 from them.The user may set up VDE control, forbids disclosing these identity identification informations.In another example, the user may use disclosed negotiation mechanism in people such as the Ginter application, negotiation and each consumer purchase or the information-related concentrated requirement of each control privacies other at different levels and the secret of using in addition, the electronics negotiations process generates through that revise or new rule and control collection in other words, and reflection is privacy or confidentiality at different levels in addition.In another example, right owner, right and permission clearing house 400 or use clearing house 300 or other side can use identical negotiation mechanism by utilizing the privacies at different levels and the secret of VDE rule and control collection.
Shown in Figure 11 and Figure 33-39, use the function of clearing house, promptly can remove identifying information, combined data, analysis data, generate report and/or send these reports, may reside in one or more logical OR physical locations to right owner and other interested each side.For example, these be can carry out in the distributed use clearing house 300 that local computer (or out of Memory electrical equipment) go up to be carried out and each or all in clearing house's functions used.One or more uses clearing house may reside in company's set of the company of an appointment or appointment, and these companies comprise production-supply-marketing industry, health care, trade organization, corporate family (" keiretsu ").Similarly, these use the function of clearing house to be finished by each country or other use clearing house local or other any classification and/or geographical variable regulation.
Use clearing house 300 also can provide the report of raw data, combined data and/or customization to right owner, distribution chain participant and/or other interested each side.These each side comprise: for example, creator of content, publisher, again packing person, more directed person, advertisement agency mechanism and their client, Finance House Association, market survey and consulting firm, circulation audit and audience research mechanism, to the company and the government organs of the interesting sale in one or more markets, the marketing, advertising function.
In another example, use clearing house 300 also can sell information to the advertiser, the advertisement that shows particular advertisement and/or type is analyzed the exposure rate of combination and classification company to the client in individual, company and/or the one group of company, market and/or other.
Example: security catalog service protection secret and privacy
Individual and secret of the trade and privacy usually are the modern life and important aspects.The individual does not want to allow other people know whose contacts they are following.Aspect many participations in commerce, enterprise does not wish to disclose them to getting in touch, contact with other each side or making business interested.On the Internet of today, for example, the people of some visit Internet can determine the given individual and the situation of the inquiry between the directory service.This information can provide the important clue of relevant still undocumented existing or unsettled commercial arrangement, merging or purchasing and merging etc.
The VDE safety container provides a basis for security catalog service 600, and secret and privacy just is kept at wherein.In an example, the Corporation Counsel of company of the row of tame rank happiness 100 families is seeking out email address in this enterprise of family that the investment banker handling purchasing and merging in the proposal-but her idea is not revealed to other anyone.The procurator sends one to security catalog service 600 and wants the individual that contacts with and the inquiry of Business Name with her in the VDE safety container.Then, the security catalog service just returns to the procurator with answer in another VDE safety container.The voucher that inquiry and answer can utilize certification authority 500 to issue confirms procurator and security catalog service 600.The payment of inquiry can be handled by financial settlement institute 200, deposits payment the account of supplier in security catalog service 600 in, will employ the account of this procuratorial company to count the debit simultaneously.
Because these transaction utilize VDE and VDE safety container to carry out, the people of monitoring communication is except knowing that each side is communicating by letter, and other is known nothing.Safety analysis man has developed the technology of " traffic analysis ", wherein monitors the communication frequency between both sides or a plurality of participant, and the variation of communication frequency is related with out of Memory, thereby forms the content of relevant these communications and/or the reference of purpose.
Use VDE and VDE safety container, might defeat traffic analysis, rise but cost is a cost.In this example, company can serve 600 to security catalog and send a VDE container with empty inquiry, and this was inquired about in the average elapsed time, in the VDE container with empty response, generated return messages.VDE example in procurator's computing machine with generation be sent to financial settlement payment transaction, but can be with these payment record with other gather so that eliminate association between inquiry and the payment mode.Although this is inadequate from commercial standpoint, this use VDE and VDE safety container are defeated the method that traffic analysis is attacked, can in disclosed safe, credible, the effective distributed trading capacity of application form of utilizing people such as Ginter, among a plurality of participants of hiding the communication pattern between them, use in principle.
Example: the cooperation between the clearing house of organization internal and outside
Each commercial government utility system 90 can be by distributing shown in (as Fig. 2 A-2E and Fig. 3 A-3C) with various combination in various degree.In an example shown in Figure 65, the company 1070 of the row of the U.S. happy 100 major companies of one tame rank commences business in a plurality of countries (as the U.S., Japan and Europe), and in these countries, the said firm all commences business in a plurality of places respectively in many countries, and the said firm finds to be necessary the distributed commercial government utility 75 of transnational distribution VDE.In order to improve the efficient of buying external information and the effect that makes full use of the informant, company 1070 selects to discuss agreement with a plurality of suppliers, this agreement just as if the domestic manufacturing of the U.S. with handle all purchases so that the dollar payment is the same.In this example, company 1070 is safeguarding its global Intranet1072.Intranet 1072 is with the electrical equipment 1074US (1) of the 1074HQ of corporate HQ (be shown and be positioned at the U.S.) with company U.S. employee herein, ..., 1074US (N), company Japan employee's electrical equipment 1074JP (1), ..., 1074 (N) and the Europe employee's of company electrical equipment 1074EU (1), ..., 1074EU (N) is linked together.Intranet 1072 also allows each employee 1074 to intercom mutually.Can also be routed to Internet at certain or other gateway of the U.S. by company based on the transaction of VDE between company 1070 and the informant thereof.
Manage and support service efficiently for providing, company 1070 has all disposed at least one distributed financial settlement institute 200 and at least one distributed use clearing house 300 in each country.For example, company 1070 can operate the 200A of financial settlement institute and use the 300A of clearing house in the U.S., operates the financial settlement 200B of institute and uses the 300B of clearing house in Japan, at West Europe running financial settlement 200C of institute and the use 300C of clearing house.Domestic in the country that a plurality of addresses are arranged and the U.S., can there be several so distributed clearing houses.Except discussing agreement with the informant, company 1070 can also discuss agreements with the use clearing house 300 of large scale business and main financial settlement institute 200.These centralized clearing houses can be positioned at Anywhere, and can communicate by letter with company by the Intranet 1072 of Internet and company.These clearing houses 200,300 are not the cum rights of company 1070, only utilize this business arrangement.Each distributed clearing house in the company 1070 all simultaneously company and company have with it business arrangement external settlement management under operate.
In this example, the production marketing manager 1074JP (1) that company 1070 employs in Japan obtains a market intelligence 166 from the distribution person 1076 of the U.S..This report is sent to employee 1074JP (1) with relevant being controlled among the VDE safety container 152a by the distribution person of the U.S. 1076.VDE has write down operating position and the deserved payment of informant in the electrical equipment of this manager 1074JP (1).These audit loggings 302 (1), 302 (2) are periodically sent to company's private network (or Intranet) 1072 that (the special-purpose clearing house that uses) 300B of distributed use clearing house and the 200B-both of inner financial settlement institute are arranged in Japanese firm inside in VDE safety container 1052b, 1052c.In this example; according to the VDE control relevant with buying content; the special-purpose 300B of clearing house of the use regular and control according to the VDE of the processing of managing shielded processing environment often; remove individual's identifying information, and in the VDE safety container, audit logging 302 (3) sent to outside gyp use clearing house 300.All distributed use 300A of clearing house of intra-company, 300B, 300C send periodic communication information to gyp use clearing house 300 in VDE safety container 152.The instigator creates again back, sells, permits with clearing house 300 and/or reports to right owner and other each side (as to obtaining these information the third party of commercial interest being arranged) issue, wherein Ge Ren identity is removed, and under many circumstances, according to VDE rule and control, the title of company also is removed.
Control 188a according to the VDE relevant with the content bought 166; complete service recorder (identity identification information that has the employee) copy also is sent to the instigator of company often with the 300HQ of clearing house (can be positioned at the corporate HQ), as the audit logging from all distributed use 300A of clearing house of company, 300B, 300C.Then these records are gathered merging, for further analysis, the report and the audit.
The inner distributed financial settlement 200A of institute, 200B, 200C also according to the VDE control collection of purchasing information, in VDE safety container 152, collect audit logging 302 from the shielded processing environment of reporting to their 1074 of each VDE.Each inner financial settlement 200A of institute, 200B, 200C gather payment, and send the VDE safety container 152 have audit logging 302 often, and audit logging shows and is about to transfer to the informant, as the total charge of transaction results.Company can also provide about the Company Account that is about to allotted fund and/or collect the supplier account's of these funds lastest imformation.Back, outside main financial settlement institute 200 finishes after these payment transactions, beams back the audit logging of confirming payment transaction for again company 1070 and informant.In preferred embodiments, the generation of these activities safety under the control of distributed VDE node, and, make activity partial automation at least by using the processing chain and the control of VDE container and management multinode, a plurality of participant, sequential processes.An alternative example is arranged, the finishing of transaction of calculating and paying of payment is that externally main financial settlement institute 200 carries out, and draws from the use information of using clearing house 300 from receiving.(certainly, be same side if use clearing house 300 and financial settlement institute 200, this information has just been received by financial settlement institute).In this example, next outside and inner financial settlement can compare payment information.
This example does not depend on management and supports service with which type of degree distribution.In a relevant example, use and financial settlement function may be distributed to the shielded processing environment 1074 of each VDE, shown in Fig. 2 A-2E and Fig. 3 A-3C.In this example; each shielded processing environment 1074 can both be to main clearing house 200 and 300, distributed external settlement institute and/or by being different from aforesaid way; as by continent tissue (North America, Central and South America, Australia, Europe etc.), rather than directly report by the cross charging of the position tissue of country and company 1070.
In another example, the 1074HQ of corporate HQ and be that the relevant 200HQ of clearing house, the 300HQ in base provides centralized settlement system with general headquarters, all uses and Financial Information this system that all must flow through.In this example concrete, that concentrate more, all consumer electronics 1074 all pass through Intranet, in safety container 152, to the 200HQ of clearing house, the 300HQ report their use and the financial transaction that with general headquarters are the base.The 200HQ of financial settlement institute of corporate HQ can directly get involved the universal payment system of VDE compatibility, this system directly supports the use of VDE processing chain and control, to guarantee according to the management variable relevant with payment, as the rule and the control of payment, each side, place, timing and/or other condition, fulfil financial transaction automatically, safely.These are that the 200HQ of clearing house, the 300HQ (can be used as single, integrated commercial government utility system work) in base can transmit suitable gathering and/or other check account index and/or payment information to the 200A of each clearing house, 200B, 200C, 300A, 300B, the 300C in each country again with general headquarters.Although the efficient than the example of above-mentioned less classification is low, this arrangement is still attractive for major company, these companies wish offering a loan to distributed inner financial settlement and/or playing the part of central administrator's role during electronic money, and the managing internal information relevant of collecting effectively, thereby use information and Financial Information are carried out centralized control with transaction.
Example: mechanism of exchange can be used between organization internal and the tissue
Figure 66 shows and exemplarily uses mechanism of exchange 700 to stride tissue and communicate by letter in tissue.Figure 66 show one have " Intranet " (particular organization in private data network) 5100 (A) organize A (left side of figure).Intranet 5100 (A) can be LAN (Local Area Network) and/or wide area network.Consumer electronics 100 (A) (1) ..., 100 (A) (N) (for example, organize the employee of A) and can intercom mutually by Intranet 5100 (A).
Figure 66 also shows another and organizes B, and this tissue also can have Intranet5100 (B), the consumer electronics 100 (B) (1) of oneself ..., 100 (B) are (N) and special-purpose mechanism of exchange 700 (B).In addition, Figure 66 shows a public data network 5104 (as Internet) and a public mechanism of exchange 700 (C).Figure 66 shows, in this example, organizes A and B and the external world to communicate by believable mechanism of exchange 700 (A), 700 (B) (if necessary, can comprise " gateway ", the secure communication assembly that " fire wall " is relevant with other).In another example, credible mechanism of exchange 700 (A), 700 (B) do not need actual " gateway ", " fire wall " to pass in and out Internet5104, but can organize A, B inner working fully respectively, may generate electronics container 302 simultaneously, so that on Internet5104, transmit.
In this example, organize the shielded processing environment 100 of user (A) (1) of A ..., (N) each all has the shielded processing environment of a virtual distributional environment to 100 (A), and can pass through safe electronic container 302, intercommunication mutually on Intranet 5100 (A).Similarly, organize the shielded processing environment 100 of user (B) (1) of B ..., (N) each all has the shielded processing environment of a virtual distributional environment to 100 (B), and can pass through safe electronic container 302, intercommunication mutually on Intranet 5100 (B).In addition, organize A and organize B can pass through safe electronic container 302, intercommunication mutually on Internet 5104.
Organize the credible mechanism of exchange 700 (A) of A special use to can be used for facilitating for intercommunication and the processing of organizing A.For example, Zhuan Yong credible mechanism of exchange 700 (A) can be used for detail record and organizes that a user issues another user's message in the A.Meanwhile, public mechanism of exchange 700 (C) is used in to be organized A and organizes between the B and coordinate, and the confidential information of certain tissue wherein can not revealed to another tissue.Be how advantageously to utilize the device of Figure 66 to arrange the more detailed example of being engaged in business transaction below.
Suppose to be distributed to each user 100 (A) (2) at p.m.entry with secret, 100 (A) (7)-100 (A) (10) and 100 (A) (12) (everyone can not revise p.m.entry in the middle of them) before, at first must obtain the approval of user 100 (A) (1), 100 (A) (3) and 100 (A) (5) (everyone can revise p.m.entry), except user 100 (A) (1), 100 (A) (3) and 100 (A) (5) (three people all in the above after the signature, they can not revise p.m.entry again) obtain outside the copy of p.m.entry, other people can not get.Special-purpose mechanism of exchange 700 (A) can these requirements of maintenance definition rule set.Mechanism of exchange 700 (A) can:
● the mode with " circulation (round robin) " sends the p.m.entry (in safety container) that waits for ratification to each user 100 (A), 100 (A) (3) and 100 (A) (5).
● if having a people to revise p.m.entry among these users, mechanism of exchange 700 (A) will pass round to two other user the p.m.entry of revising, and allows them remake comment and modification.
● in case p.m.entry has all been ratified in three users 100 (A) (1), 100 (A) (3) and 100 (A) (5), mechanism of exchange 700 (A) just has the right their everyone numeral and/or handwritten signature or the abbreviation of signing are added in the p.m.entry, it is placed one or more safety containers that have the control collection, the control collection shows that it is read-only, have only user 100 (A) (2), 100 (A) (7)-100 (A) (10) and 100 (A) (12) could read it.
● next, mechanism of exchange 700 (A) just can be in container sends among these users everyone with a copy of p.m.entry, perhaps requires same container is passed round another person from a people.
● mechanism of exchange 700 may need Electronic Control to come the index of checking account of maintenance safe, and this index shows where container has been, who opened it, who has visited the p.m.entry that it protects and when visit.Like this, mechanism of exchange 700 (A) just can by prove specific someone whether visited specific document, when visit and how long visited, but improve individual statistical.
Organize the Intranet 5104 of A also to can be used for exchanging and/or the design instruction of distribution height secret.For example, mechanism of exchange 700 (A) can be safeguarded the detail record of whose digital form of having signed of expression-like this on design instruction, but guarantees individual's statistical and improve the efficient of height.
As mentioned above, special-purpose mechanism of exchange 700 (A), 700 (B) can also provide " fire wall " function, prevent that confidential information is leaked to the outside of organizing A, B.For example, supposing to organize A is a tame integrated circuit (IC) design chamber, and organizing B is a tame integrated circuit manufacturing plant.Organize the wiring pattern of A design and regulation chip circuit, make " tape output " and send to and organize B.Organize B to make integrated circuit according to " tape output ", and to organizing A to pay chip.
Mechanism of exchange 700 can be used for protecting each to organize the secret of A and B simultaneously for top business transaction facilitates.For example:
● the whole design of organizing the special-purpose mechanism of exchange 700 (A) of A to supervise to organize A and the effect of standard exploitation.For maintaining secrecy, all communications all are the Intranet 5100 (A) by organizing A, take place in safety container 302.Mechanism of exchange 700 (A) can be safeguarded design documentation in the past, ongoing work and as the archives of the specification version of design process progress.
● organize the special-purpose mechanism of exchange 700 (A) of A can manage the exploitation of final design specification-guarantee to finish the required all conditions of design specification all to be observed.
● in case design specification is finally finished, and mechanism of exchange 700 (A) just can be in safety container 152 be passed round it those people that need in the above " signature " among the A to organizing.Each electrical equipment 100 (AA) (1) ..., 100 (A) (K) can add and/or embed above-mentioned digital signature, and handwritten signature, seal and/or fingerprint show specific approval.
● organize the special-purpose mechanism of exchange 700 (B) of B automatically a copy of design specification to be issued the suitable user 100 (B) (1) who organizes in the B by the Intranet 5100 (B) that organizes B, 100 (B) are (N).Anyone that organize B outside knows the copy of the specification who has received.On the other hand, if necessary, organize the mechanism of exchange 700 (A) of A can comprise the Electronic Control collection of limiting access, being only limited to visit organizes some slip-stick artist-these security controls in the B will be with electrical equipment 100 (B) (1), ..., 100 (B) (N) bring into together and organize B and have these security appliance ground to carry out.
Organize the manufacture process that the mechanism of exchange 700 (B) of B can managing chip, guarantee that making the desired institute of chip according to the design specification of organizing A has all obtained observing with condition in steps.
Example: mechanism of exchange can promote international trade
Figure 67 shows the example that what use is made of mechanism of exchange 700 is engaged in international trade.In this concrete example, mechanism of exchange 700 coordinates to be positioned at their multinational transaction of complexity between the 1106A of company, the 1106B of country (as the U.S., Australia and Europe) and the 1106C separately.The 1106A of company has 1108A of bank and the lawyer 1110A of oneself.Similarly, the 1106B of company has 1108B of bank and the lawyer 1110B of oneself, and the 1106C of company has 1108C of bank and the lawyer 1110C of oneself.
Mechanism of exchange 700 is by transmitting bid back and forth and counter-offer in safety container, and uses above-mentioned contract formation technology to formulate part or all of clause and non-repudiation is provided, and aids between the transnational each side and reaches an agreement.In case formation contract, but the mechanism of exchange 700 main collection of maintenance regulation and control just, regulation are finished the full terms that exchange must satisfy-thus, be necessary for different incidents conclusion is provided.Perhaps, contract is Once you begin carried out, and mechanism of exchange has not just played practical function, in simple model, that is to say that particularly the VDE container can carry value chain rule and control, the process and the condition that must satisfy have been stipulated in these rules and control on the whole, comprise their sequence of operation.The rule that mechanism of exchange 700 provides can take international law into account with control-and different application of rules is in different countries.These rules can require various import and export and restriction, interstate International Tax Agreement is taken into account, comprise route relevant and filing requirement with prepayment and/or ongoing tariff, the moneytary operations mechanism of identification standard, assist relevant country and international body with contract or the filing of some contractual terms and conditions, manage any delivery or other movement requirement, the contractual terms and conditions translation service (particularly standard terminology and condition) of standard is set up in assistance, manage the requirement of international certification authority and the difference of form, apply the social regulation that suitable management group requires, and collect suitable management group tax revenue, as tax revenue of countries and regions government entity etc.Mechanism of exchange 700 can utilize the safe electronic container to communicate by letter between international each side, and variety of event notice that international each side provides is come into force and is verified.
Example: distributed mechanism of exchange
The business transaction of mechanism of exchange 700 control complexity down also can be distributed between tissue and/or area under one's jurisdiction inside or they.The international real estate transaction of supposing a complexity requires dealing company, several financial institutions, insurance company, law office, perhaps also has the participation of several functional departments in the middle of them of authority of several countries.Further each Fang Douyou of organizations and individuals of hypothesis transaction possesses the computing machine of VDE function, and has a distributed mechanism of exchange in each tissue or the mechanism at least, and this mechanism of exchange is this real estate transaction service in the power by main mechanism of exchange 700 approvals.
In this example, each side of real estate transaction is with the form of VDE rule and control, proposed to represent the business rules and the parameter of their commercial relations, and each side role in whole transaction has been stipulated in these rules and control.For example, insurance company must think that can accept and obtain value and expense that the mortgage loan people agrees gives property insurance with the buyer.In addition, suppose to utilize people's such as Ginter the described negotiation mechanism of application form to approve the VDE rule and the control of these transaction mutually, and rule of consulting and control with the history of consulting these rules and control, are stored in the main mechanism of exchange of this real estate transaction.Five-star mechanism of exchange can be the distributed mechanism of exchange of main mechanism of exchange 700 or any mutual approval.In this example, our hypothesis is for the former.In brief, the rule and the control of managing transaction is all agreed by all each side.Because mechanism of exchange 700 may be the international real estate sale distributed template applications program that distributed, therefore negotiations process may be simplified, this template is based on mechanism of exchange 700 experience in the past, or mechanism of exchange 700 creates for this transaction is special, with this as the value-added service that provides to its Very Important Person.
The VDE of this basic transaction rule and control according to the rules, each side of transaction finishes certain section transaction before having a responsibility for being careful and must and finishing whole transaction in termination.In some cases, be responsible for finishing the part of total transaction jointly by a plurality of participants.For example, the buyer and the seller must reach an agreement on purchasing price.In this example, they have proposed the commercial requirement of oneself, for example, comprise their price and other change, they and utilize the VDE negotiation mechanism, reach the relatively agreement of balance of interests.The merit if electronics is failed to consultations, each can directly consult, and perhaps will have the VDE safety container that shows the audit logging of consulting failure and send to mechanism of exchange, is participated in each side in other each side of whole transaction by its notified on authorization.
In this example; if the buyer and the seller really are in agreement; finish negotiation (or by using the VDE technology; collect the negotiation of both sides' digital signature and finish instruction) the shielded processing environment of VDE notice is sent to distributed mechanism of exchange; reinform other side of the mechanism of exchange that comprises other participation by mechanism of exchange, on price, be in agreement.According to the VDE control of son transaction, VDE can security notice one side or a plurality of participant, and some other transaction has been finished now.In this example, title search company now just can carry out their task; Insurance company can utilize the VDE negotiation mechanism now, consults insurance coverage with the buyer.The lawyer of buyer Office of the Legal Counsel can with the negotiation of going together of seller company; In the process of the various documents of formulating and consult to finish part or whole transaction, the lawyer of two companies can use the legal adviser of VDE and VDE safety container and outside to come into contacts with.
In this example, one or more digital certificates that each side has certification authority 500 to issue are used for verifying each side who participates in this transaction and son transaction thereof.Financial settlement institute 200 is for each value-added service provides means of payment, and in an example, these services are provided by mechanism of exchange 700.The audit logging that the shielded processing environment of VDE that uses clearing house 300 to collect each participation sends in the VDE safety container frequently, and provide independently third party's audit for these transaction.Security catalog service 600 helps the participant to seek other each participant's electronic address when keeping secret and privacy.
After each son transaction was finished, the in-house distributed mechanism of exchange that the son transaction is just finished therein notified main mechanism of exchange 700 subtasks of this transaction to finish.According to the VDE rule and the control of reaching in the past; the individual of some or all these transaction of participation can obtain audit logging and/or the message sending and verify from the protected processing environment of at least one participant's VDE; for example, the PPE at individual node place, distributed commercial government utility system, distributed mechanism of exchange and/or should transaction main mechanism of exchange.
After all component units of total transaction are all finished, a mechanism of exchange is exactly the main mechanism of exchange of real estate sale in this example, can notify the distributed mechanism of exchange of each participant and each participation, precondition all satisfies, and clears whole transaction.Perhaps, mechanism of exchange can give the seller and buyer's one last chance, allows their decisions continue to finish or shelve transaction.This example shows, comprises the commercial government utility system 90 of mechanism of exchange 700, can be distributed in the shielded processing environment of middle VDE of supporting one or more commercial government utility system 90.
Example: digital broadcast networks
Allow many users amortize framework and other resource, than the rival set up critical batch quickly, support specialized adapting to and to pay the most attractive products ﹠ services, give full play to and buy the lever of consulting and render a service and set up the most comprehensive framework to the consumer, as certain business activity the best " station " resource-these all are the core concepts of setting up successful modern commerce.VDE and distributed commercial government utility have been established foundation stone for creating extremely competitive and successful Cyberspace commerce, and these commerce have embodied these attributes.Many characteristics that reflected Internet and WWW net in these commerce.As VDE and distributed commercial government utility, they also comprise distributed community, and this community gives full play to advantage by the cooperative relationship of supporting ecommerce.They will provide the service of different levels and the product and the service of complementarity, and the activity of coordinating them make both sides be benefited aspect very advantageous.
Digital broadcast networks (" DBN ") the Promethean commercial enterprise that comes to this.The participant of DBN is made up of many different websites and service based on WWW net (" Web "); they by the maximum purchasing power of shared resource, experience, generate marketing and consumer's information and support will many frequent complementations the rational management covering that bundles of activity, obtain better balance and operational paradigm.With compatible regular closely similar (these rules and control make the basis that may and become them that is designed to of WWW net and VDE and distributed commercial government utility), and be positioned at the ability upper strata of these two frameworks, digital broadcast networks adopts their invention to support efficient, increasingly automated and distributed community, gives full play to business efficiency.Other example comprises the combination of other entity in a similar fashion, realizes the function of virtual enterprise (as company or other tissue) jointly.The essence of the distributivity of VDE and commercial government utility system, concerning for these modern times, potentiality business activity large-scale, Cyberspace provides extremely important the effective framework.
Digital broadcast networks can be used as the comprehensive of Web website and ISP, have central authorities, perhaps be zonal logic (as with market be according to) colony of general headquarters, perhaps, can be used as the company of a profitability share-holding system, its business model makes the people associate Television Broadcasting Limited (as NBC), perhaps can be used as company joint venture or virtual, the said firm has certain mixing of above-mentioned attribute or mixes the comprehensive of attribute, and adopts the commercial relations and the activity of distributed, reciprocity, classification and centralized management.In an example, some companies can gang provide the advantage of scale and cooperation, and each participant provides professional speciality to a certain degree, and solid tissue is then coordinated with certain form in the joint venture of " more senior " or company together.
In an example, digital broadcast networks can be the company that there are many joint operation units that secure permission in a family.Licensed-in joint operation unit can comprise the WEB website, specially be geographical and/or market area service in logic, and/or be that other Web website is served in the environment of the classification of described distributed commercial government utility service and/or equity.The said firm can represent its own and joint operation unit:
● consult to play the most rational charge of period with the advertisement agency of advertiser and they,
● obtain the content that the third party provides with minimum cost,
● the information of resell market analysis and customer group situation,
● with its joint operation unit's revenue sharing, its joint operation unit shares in the revenue with DBN and/or other joint operation unit again,
● according to joint operation unit and/or the joint operation user's of unit basic condition, unit provides advertisement to joint operation,
● guarantee to have a considerable amount of people to watch (exposure and/or other mutual) advertiser's material,
● the secured virtual network that adopts VDE and distributed commercial government utility ability is provided, comprises and use public user's application tool, interface and bookkeeping, whole tissue can be operated safely and efficiently.
● for network provides the favourable advertisement of network and joint operation unit,
● according to the request of joint operation unit and/or the needs that operating position shows, unit buys and/or provides content to joint operation,
● according to its agreement with the joint operation unit, the operating position of collection analysis content, the purchase of Cyberspace and other data,
● allow the joint operation unit to carry out many network functions-in other words, obtain and utilize the geographical content (and/or interested especially other content of its customer group) that goes up and/or be positioned at this locality (with congruence there) in logic in this locality,
● consult the agreement about show and colour, these materials have commercial value to the target of joint operation unit physics and/or logical market,
● according to agreement, with remaining control control at least its part Web " broadcasting " space-in other words at least to partial content controlled-and under the several participants' of DBN and/or other certain or certain control, by rule and control execution,
● representative and/or carry out other management, support and/or service function for network.
For example, DBN can utilize many safety and managerial ability and the service function provided by the present invention of VDE, manages and make distributed relation and activity robotization as DBN business model core.For example:
● mechanism of exchange 700 can provide whole management environment for the management of Web Community.For example, mechanism of exchange 700 can be managed the route that (by using VDE rule and the control in the preferred embodiment) issues the content of suitable joint operation unit.It can also manage and report processing chain and the control that use is information-related.Mechanism of exchange 700 can and/or obtain its Electronic Control collection from the protocol related acquisition between DBN and its joint operation unit.Can use electronics to consult to create that these are protocol related.Mechanism of exchange 700 can also receive bilateral or other control of networking and concerning in the middle of direct reflection joint operation unit and other participant.
● right and permission clearing house 400 can expand to the commercial rights relevant with content network joint operation unit.The relevant right storage vault of the content that provides to the consumer with network entity-comprise the content rights that network entity self is held is provided for it, and makes it to be utilized by other network entity.Such content rights can comprise, for example, shows, sells, distributes, directed and advertise again.It can be according to request and/or to use the situation information as the automatic formation of foundation that other right (as right or the special directed again right of distributing again) is provided.
● use clearing house 300 can collect use information, with support the market analysis, user situation and advertisement.It can also analytical information and draws report.It can give suitable DBN with these inner distributions, and according to the outside Sales Reports of commercial opportunity and/or other information based on use.
financial settlement institute 200 can guarantee to fulfil rational compensation in whole network.It can collect the joint operation unit owes DBN because of content payment.It can distribute to the joint operation unit, and they are advertised and the deserved payment of sale use information.It can collect payment from the joint operation unit, to support services such as the DBN framework and the web advertisement.It is associated on the framework of GE Capital clearing house, so that the transmitting-receiving information relevant with payment.
security catalog service 600 can be safeguarded the directory service based on unique identity and/or category attribute.May have the huge joint operation unit of quantity in the whole world.Directory service 600 can also be safeguarded consumer's directory information, comprises unique identifier and situation information.The catalogue framework of the content that security catalog service 600 can maintaining network has, manages and/or utilize.
certification authority 500 can prove the effect of all participants in the network.For example, it will issue a voucher to each unit of joint operation.It can also issue the voucher of the commercial relations that confirm the packet network entity, so that facilitate for coming into contacts with the third party safely, efficiently.It can also issue certificate to the consumer, and representative is about certain special consumer rights of business activity between consumer and the extraneous each side (for example, discount or become a member of bigger " DBN " community).
Partly or entirely service function (for example recited above) can be a height profile, and can mainly, basically even fully only move on the Web server of unit and service network of pooling.
Although in conjunction with thinking that at present most realistic, the most preferred embodiment describes the present invention, should understand, the present invention is not limited to disclosed embodiment, on the contrary, should expand to thought and interior included various modifications of scope and corresponding arrangement of containing claims.

Claims (18)

1. one kind provides the method to the visit of online service, and this method may further comprise the steps:
Receive first digital certificate from a user, described first digital certificate is used to prove at least one attribute of described user;
Determine according to described first digital certificate whether described user is authorized to visit this online service at least in part;
Receive the request of a described online service of visit from described user; With
If the user is authorized to visit described online service, then send one second certificate of authority to the user, described second certificate of authority proves that this user is licensed for access to described online service;
Check that described second digital certificate determines whether that this user is licensed for access to described online service;
If this user is licensed for access to described online service, then allow the described online service of user capture.
2. according to the method for claim 1; the step that it is characterized in that described second digital certificate of described inspection is performed in the shielded processing environment of a local computer system, and described user promptly is the request of sending described visit online service from described local computer system.
3. according to the method for claim 1, be characterised in that further comprising the steps of:
Send the software that uses described online service to the user;
Send the integrality that a digital signature is determined described software to the user.
4. according to the method for claim 3, be characterised in that described digital signature is bound (bound) at least in part on the sign of described online service.
5. according to the method for claim 1, it is characterized in that also comprising:
Provide the 3rd digital certificate to the user, described the 3rd digital certificate is used to prove the sign of described online service, and described the 3rd digital certificate is sent by a certification authority agent.
6. according to the method for claim 5, it is characterized in that described first digital certificate is also sent by described certification authority agent.
7. according to the method for claim 1, it is characterized in that described first digital certificate comprises an expression at described user's age.
8. according to the method for claim 1, it is characterized in that described first digital certificate is used to discern the responsible side that the described online service of described user capture is paid.
9. method according to Claim 8 is characterized in that also comprising:
Send the request of a payment to a described side who is responsible for that the described online service of described user capture is paid; With
Receive the indication that described payment has been received.
10. according to the method for claim 9, it is characterized in that before the step that sends described second digital certificate to the user is performed, carry out a payment of described transmission request step (a) and receive the step (b) of the paid-in indication of described payment.
11., it is characterized in that described second digital certificate is used to prove that described user had been licensed for access to described online service before a specific date according to the method for claim 1.
12., it is characterized in that described at least one attribute comprises the indication that described user is allowed the quantity of purchase in a given time according to the method for claim 1.
13., it is characterized in that described online service comprises an interactively game on line according to the method for claim 1.
14., it is characterized in that also comprising according to the method for claim 13:
In the container of a safety, send the software that is used to play described game on line to described user.
15., it is characterized in that described online service comprises order (subscription) according to the method for claim 1.
16., it is characterized in that described second digital certificate comprises the expiration date of described order according to the method for claim 15.
17., it is characterized in that also comprising according to the method for claim 1:
Collect payment information from described user.
18., it is characterized in that also comprising according to the method for claim 17:
Send described payment information to a financial settlement institute.
CNB2005100790241A 1996-09-04 1996-09-04 Method for releasing using data from user station point to external station point Expired - Lifetime CN100339784C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB961804874A CN1214352C (en) 1996-09-04 1996-09-04 Trusted infrastructure support system, method and techniques for secure electronic commerce, electronic transactions, commerce process control and automation distributted computing and rights manageme

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CNB961804874A Division CN1214352C (en) 1996-09-04 1996-09-04 Trusted infrastructure support system, method and techniques for secure electronic commerce, electronic transactions, commerce process control and automation distributted computing and rights manageme

Publications (2)

Publication Number Publication Date
CN1716149A true CN1716149A (en) 2006-01-04
CN100339784C CN100339784C (en) 2007-09-26

Family

ID=5127923

Family Applications (3)

Application Number Title Priority Date Filing Date
CNB961804874A Expired - Lifetime CN1214352C (en) 1996-09-04 1996-09-04 Trusted infrastructure support system, method and techniques for secure electronic commerce, electronic transactions, commerce process control and automation distributted computing and rights manageme
CNB2005100790241A Expired - Lifetime CN100339784C (en) 1996-09-04 1996-09-04 Method for releasing using data from user station point to external station point
CNB2005100764923A Expired - Lifetime CN100399227C (en) 1996-09-04 1996-09-04 Method for releasing using data from user's websites to exterior websites

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CNB961804874A Expired - Lifetime CN1214352C (en) 1996-09-04 1996-09-04 Trusted infrastructure support system, method and techniques for secure electronic commerce, electronic transactions, commerce process control and automation distributted computing and rights manageme

Family Applications After (1)

Application Number Title Priority Date Filing Date
CNB2005100764923A Expired - Lifetime CN100399227C (en) 1996-09-04 1996-09-04 Method for releasing using data from user's websites to exterior websites

Country Status (1)

Country Link
CN (3) CN1214352C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI480711B (en) * 2011-08-08 2015-04-11
CN105637523A (en) * 2013-10-16 2016-06-01 思杰系统有限公司 Secure client drive mapping and file storage system for mobile device management type security
CN112036906A (en) * 2020-07-31 2020-12-04 苏宁金融科技(南京)有限公司 Data processing method, device and equipment

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1324420C (en) * 2001-03-01 2007-07-04 费舍-柔斯芒特系统股份有限公司 Data sharing in process plant
CN1304986C (en) * 2001-06-07 2007-03-14 康坦夹德控股股份有限公司 Method and system for subscription digital rights management
US20040201682A1 (en) * 2001-08-22 2004-10-14 Lou Chauvin System, method and software product for allowing a consumer to order image products over a communication network from a plurality of different providers
KR20100039450A (en) * 2002-09-16 2010-04-15 야후! 인크. On-line software rental
US9715581B1 (en) 2011-11-04 2017-07-25 Christopher Estes Digital media reproduction and licensing
US20130254896A1 (en) * 2012-03-23 2013-09-26 Infineon Technologies Austria Ag Method to Detect Tampering of Data
CN105809590A (en) * 2016-03-15 2016-07-27 刘家旺 Creditor's right mediation and collection and notarization execution verification method and platform
WO2019227208A1 (en) * 2018-05-28 2019-12-05 Royal Bank Of Canada System and method for secure electronic transaction platform
CN109246088A (en) * 2018-08-20 2019-01-18 田金荣 A kind of big data security system based on financial service management
CN110264171B (en) * 2019-06-06 2023-04-18 深圳前海微众银行股份有限公司 Distributed bill processing method, device, equipment and computer readable storage medium
CN110400213A (en) * 2019-07-26 2019-11-01 中国工商银行股份有限公司 Data processing method and device and electronic equipment and readable medium
CN110443250B (en) * 2019-07-31 2022-06-10 天津车之家数据信息技术有限公司 Method and device for identifying category of contract seal and computing equipment
CN112541147A (en) * 2019-09-23 2021-03-23 北京轻享科技有限公司 Content publishing management method and system
CN111368521B (en) * 2020-02-29 2023-04-07 重庆百事得大牛机器人有限公司 Management method for legal advisor service

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2643525A1 (en) * 1989-02-23 1990-08-24 Js Telecommunications METHOD AND DEVICE FOR ACCESSING AN EXTENDED COMMUNICATION NETWORK
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5463565A (en) * 1993-10-29 1995-10-31 Time Warner Entertainment Co., L.P. Data block format for software carrier and player therefor
US5416842A (en) * 1994-06-10 1995-05-16 Sun Microsystems, Inc. Method and apparatus for key-management scheme for use with internet protocols at site firewalls
EP0690399A3 (en) * 1994-06-30 1997-05-02 Tandem Computers Inc Remote financial transaction system
ATE305682T1 (en) * 1994-07-19 2005-10-15 Certco Llc METHOD FOR SECURELY USING DIGITAL SIGNATURES IN A COMMERCIAL ENCRYPTION SYSTEM
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI480711B (en) * 2011-08-08 2015-04-11
CN105637523A (en) * 2013-10-16 2016-06-01 思杰系统有限公司 Secure client drive mapping and file storage system for mobile device management type security
CN105637523B (en) * 2013-10-16 2019-01-08 思杰系统有限公司 Security client driving mapping and document storage system
CN112036906A (en) * 2020-07-31 2020-12-04 苏宁金融科技(南京)有限公司 Data processing method, device and equipment
CN112036906B (en) * 2020-07-31 2022-08-19 苏宁金融科技(南京)有限公司 Data processing method, device and equipment

Also Published As

Publication number Publication date
CN1234892A (en) 1999-11-10
CN100399227C (en) 2008-07-02
CN1700138A (en) 2005-11-23
CN1214352C (en) 2005-08-10
CN100339784C (en) 2007-09-26

Similar Documents

Publication Publication Date Title
CN1953417B (en) A method to distribute use data from user site to external site
CN100339784C (en) Method for releasing using data from user station point to external station point
US8185473B2 (en) Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US8751793B2 (en) Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
CN100345157C (en) Method and apparatus for only identifying purchase of customer in electronic vending system
US7415617B2 (en) Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US20080120240A1 (en) Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
CN1231039A (en) Personal information security and exchange tool
CN1285067A (en) Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
CN1716150A (en) Method for releasing using data from user station point to external station point
CN1716303A (en) Method for releasing using data from user station point to external station point
CN1700137A (en) Method for releasing using data from user's websites to exterior websites
CN1790406A (en) Method for distributing use data from user site to external site
JP2011060296A (en) Method for managing use of electronic content
JP4537470B2 (en) Credit infrastructure support systems, secure electronic trading, electronic commerce, trading process control and automation methods and techniques, distributed computing and rights management
JP2004086915A (en) Credit infrastructure support system, method and technique for controlling/automating safe electronic trade, electronic commerce and trace process, distributed computation and right management
JP2008226246A (en) Credit infrastructure support system, safe electronic trade, electronic commercial transaction, method and technique for trade process control and automation, distributed computation, and right management
JP2004133914A (en) Credit infrastructure support system, safe electronic trading, electronic commerce, method and technique for controlling and automating trading process, distributed computation and right management
JP2012150847A (en) Credit infrastructure support system, secure electronic trade, e-commerce, method and technology for trade process control and automation, distributed computation, and right management
JP2009295194A (en) Credit infrastructure support system, safe electronic commerce, electronic commercial transaction, method and technology for controlling and automating commerce process, distribution computation, and right management
JP2012164355A (en) Credit infrastructure support system, safety electronic trade, electronic commercial transaction, method and technology for trade process control and automation, distributed computation and right management
JP2008217802A (en) Credit infrastructure support system, secure electronic trade, electronic commerce, method and technique for controlling and automatizing trade process, distributed computation, and right management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20070926

EXPY Termination of patent right or utility model