Systems, methods and devices for trusted transactions
First Claim
20. A method for conducting a trusted transaction between two of a plurality of parties who have reached an agreement to transact, comprising:
- establishing a secure transmission channel between the two parties;
approving an identity of at least one of the two parties;
determining an amount of value-added information to be exchanged between the parties, the value-added information comprising a plurality of value-adding components;
verifying the agreement to transact; and
transmitting the value-added information.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc. An important contributor to trust for such aspects of the transaction is disclosed to be the use of highly-secure steganographic computer processing means for data identification, authentication, and transmission, such that confidence in the transaction components is enhanced. By providing an integrated multivalent system for enhancing trust across a variety of categories (for a variety of transaction species, including those in which the need for trust is greater on the part of one party than of another, as well as those in which both require substantial trust enhancement), the invention reduces barriers to forming and optimizing transactional relationships.
322 Citations
186 Claims
-
20. A method for conducting a trusted transaction between two of a plurality of parties who have reached an agreement to transact, comprising:
-
establishing a secure transmission channel between the two parties;
approving an identity of at least one of the two parties;
determining an amount of value-added information to be exchanged between the parties, the value-added information comprising a plurality of value-adding components;
verifying the agreement to transact; and
transmitting the value-added information. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method for conducting at least one trusted transaction between at least two parties, comprising:
-
authenticating the at least two parties;
agreeing to a security of a transmission channel;
exchanging secondary value-added information;
determining at least one term for a primary value-added information exchange; and
facilitating payment for the transaction based on the terms. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A method for conducting a trusted transaction between at least two parties, comprising:
-
establishing a steganographic cipher;
exchanging secondary value-added information between the parties;
agreeing to at least one term for the exchange of primary value-added information; and
facilitating payment for the transaction. - View Dependent Claims (55, 56, 57, 58, 59)
-
-
60. A method for conducting a trusted transaction between at least two parties, comprising:
-
identifying at least one of a unique identification for each of the at least two parties, a unique identification of the transaction, a unique identification of value-added information to be transacted, and a unique identification of a value-adding component;
applying a steganographic cipher; and
verifying an agreement to transact between the parties. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67)
-
-
68. A method for bi-directionally exchanging value-added information between at least two parties, comprising:
-
associating a plurality of unique identifiers with the value-added information, the value-added information including at least one of a digital watermark, a file header, a file attachment, and a file wrapper;
associating each of the at least two parties with unique identifiers, the unique identifiers including at least one of a digital watermark, a file header, a file attachment, and a file wrapper; and
exchanging value-added information between the at least two parties. - View Dependent Claims (69, 70, 71, 72, 73, 74, 75, 76, 77)
-
-
78. A method for exchanging value-added information between at least two parties, comprising:
-
providing a data transmission means;
verifying the parties to the transaction;
negotiating at least one term selected from the group consisting of a price, a service, a selection, and combinations thereof; and
binding the at least one term to the information using at least one of a digital watermark, a file header, metadata, and a file wrapper;
wherein the at least one bound transaction term comprises value-added information. - View Dependent Claims (79, 80)
-
-
81. A method for trusted transactions, comprising the steps of:
-
receiving data to be processed;
determining a structure of the data;
determining if the data is authentic; and
determining an associated usage of the data based on the data structure and the authenticity of the data. - View Dependent Claims (82, 83, 84, 85, 86)
-
-
87. A method for secure transaction, comprising:
-
receiving a request to process a transaction;
uniquely identifying a source of the request;
uniquely identifying at least one term of the request; and
storing identification information for transaction negotiation. - View Dependent Claims (88, 89, 90, 91, 92, 93)
-
-
94. A method for the facilitation of the exchange of information data between at least a first party and a second party, comprising:
-
receiving a rule governing information data from a first party;
receiving a request for the information data from a second party;
matching the rule with the request; and
uniquely identifying the information data and the first and second parties;
wherein the information data is selected from the group consisting of unstructured data and structured data. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108)
-
-
100-1. The method of claim 94, wherein the exchange is substantially noncontiguous.
-
110. A method for rights management, comprising:
-
receiving information;
determining whether the information is structured information or unstructured information;
identifying the information with a steganographic cipher;
authenticating the information with at least one of a digital signature and digital watermark check; and
associating the identification and authentication results with at least one of a predetermined record, a predetermined rule, and a predetermined function. - View Dependent Claims (111, 112)
-
-
113. A method for rights management, comprising:
-
exchanging information between at least two parties;
verifying the information, the verification performed by at least one of the parties; and
activating at least one of a predetermined act and a rule based on the result of the verification of information. - View Dependent Claims (114, 115, 116, 117, 118, 119)
-
-
120. A method for risk management, comprising:
-
receiving information;
determining whether the information is structured or unstructured;
identifying information with a predetermined ciphered key;
authenticating information with at least one of a digital signature, a digital watermark check, and a predetermined ciphered key;
associating identification and authentication results with a predetermined rule; and
limiting access based on a predetermined exposure of a decision maker.
-
-
121. A method for securely exchanging information data between at least two parties, comprising:
-
creating a private key;
deriving a corresponding public key corresponding to the information data sought and at least one of (a) verifiable data associated with different versions of the information data, (b) verifiable data associated with a transmitting device, and (c) verifiable data associated with an identity of the party seeking the information data;
establishing a set of one time signatures relating to the information data;
establishing a hierarchy of access to the set of one time signatures;
creating a public key signature that is verifiable with the public key, including the hierarchy of access to the set of one time signatures;
providing the information to a certification authority for verification; and
verifying the one time signature and the hierarchy of access to enable transfer of predetermined data.
-
-
122. A method for authenticating an exchange of a plurality of sets of information data between at least two parties, comprising:
-
creating a plurality of hierarchical classes based on a perceptual quality of the information data;
assigning each set of information data to a corresponding hierarchical class;
defining access to each hierarchical classes and to each set of information data based on at least one recognizable feature of the information data to be exchanged;
predetermining access to the sets of information data by perceptually-based quality determinations;
establishing at least one connection between the exchanging parties;
perceptually recognizing at least one of the sets of information data dependent on user provided value-added information data; and
enabling a trusted transaction based on verification, and associated access, governing at least one of a set of information data sets. - View Dependent Claims (123, 124, 125)
-
-
126. A method for authenticating the exchange of perceptual information data between at least two parties over a networked system, comprising:
-
creating a plurality of hierarchical classes based on a perceptual quality of the information data;
assigning each set of information data to a corresponding hierarchical class;
defining access to each hierarchical classes and to each set of information data based on at least one recognizable feature of the information data to be exchanged;
perceptually recognizing at least one of the sets of information data dependent on user provided value-added information data;
enabling a trusted transaction of the information data based on verification of means of payment, and associated access, governing at least one copy of the information data sought;
associating the transaction event with the information data prior to transmission of the information data; and
transmitting and confirming delivery of the information data - View Dependent Claims (127, 128, 129, 130, 131, 132)
-
-
133. A device for conducting a trusted transaction between at least two parties who have agreed to transact, comprising:
-
means for uniquely identifying unique identification information selected from the group consisting of a unique identification of one of the parties, a unique identification of the transaction, a unique identification of value-added information to be transacted, and a unique identification of a value-adding component;
a steganographic cipher; and
means for verifying an agreement to transact between the parties. - View Dependent Claims (134, 135, 136, 137, 138)
-
-
139. A device for conducting a trusted transaction between at least two parties who have agreed to transact, comprising:
-
means for uniquely identifying unique identification information selected from the group consisting of a unique identification of one of the parties, a unique identification of the transaction, a unique identification of value-added information to be transacted, and a unique identification of a value-adding component; and
means for enabling a subsequent mutually agreed to at least one term. - View Dependent Claims (140)
-
-
141. A device for conducting trusted transactions between at least two parties, comprising:
-
a steganographic cipher;
a controller for receiving input data or outputting output data; and
at least one input/output connection, wherein the device has a unique identification code. - View Dependent Claims (142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159)
-
-
160. A trusted transaction device for transmitting authentic value-added information data between at least two parties, comprising:
-
a display;
a unique identifier;
means for ciphering information input and output;
means for interacting with other similarly functional devices; and
means for storing or retrieving value-added information and a value-adding component. - View Dependent Claims (161, 162, 163, 164, 165, 166, 167, 168, 169)
-
-
170. A device for securely exchanging information data, comprising:
-
means for creating a private key by the party seeking predetermined data;
means for deriving a corresponding public key based on the predetermined data and at least one of verifiable data associated with different versions of the information, verifiable data associated with a transmitting device, and verifiable data associated with the identity of the party seeking information;
means for creating a set of one-time signatures relating to the predetermined data;
means for validating a predetermined hierarchy of access of the set of one-time signatures;
means for creating a public key signature, verifiable with the public key, including the access hierarchy of one time signatures;
means for securely transacting predetermined data by providing information relating to a proposed transaction; and
means for verifying the one time signature and the hierarchy of access to enable transfer of predetermined data. - View Dependent Claims (171, 172)
-
-
173. A system for the secure exchange of predetermined, verifiable information data between at least two parties, comprising:
-
at least one condition for the use of the information;
means for differentiating between predetermined information and other seemingly identical information based on an authentication protocol;
means for associating authenticity of verifiable information data with at least one condition for use;
a storage unit for storing the predetermined, verifiable information; and
means for communicating with the predetermined, verifiable information storage. - View Dependent Claims (174, 175, 176)
-
-
177. A system for the exchange of information, comprising:
-
at least one sender;
at least a receiver;
a verifiable message; and
a verification of the message by at least one of the senders and the receivers;
wherein a verification of the message enables a decision over receiving additional related information.
-
-
178. A system for computer based decision protocol comprising:
-
a means for identifying between structured and unstructured information;
a means for authenticating structured information; and
a means for enabling a decision rule based on the identity and authenticity of the information. - View Dependent Claims (179)
-
-
180. A system for computer-based decision protocol, comprising:
-
means for identifying between structured and unstructured information;
means for identifying structured information; and
means for enabling a predetermined decision rule based on the identity of the information. - View Dependent Claims (181, 182, 183, 184, 185, 186)
-
Specification