Method of and apparatus for investigating transactions in a data processing environment
First Claim
Patent Images
1. A method of investigating transactions in a data processing environment comprising a trusted computing environment, the method comprising the steps of:
- i. selecting a user within the trusted computing environment;
ii. creating an investigation identity which is owned by the user;
iii. using the investigation identity to take part in transactions; and
iv. creating a record of those transactions.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of investigating misdemeanour within a data processing system is provided. An investigator is given an anonymous authenticated identity on a trusted computing device such that a trustworthy record of transactions can be created. The investigator can participate in the transaction.
-
Citations
10 Claims
-
1. A method of investigating transactions in a data processing environment comprising a trusted computing environment, the method comprising the steps of:
-
i. selecting a user within the trusted computing environment;
ii. creating an investigation identity which is owned by the user;
iii. using the investigation identity to take part in transactions; and
iv. creating a record of those transactions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for investigating transactions, said apparatus including a trusted computing device arranged such that an investigation identity is owned by a user, and a record of transactions made by the investigation identity is stored in an authenticated record by the trusted computing device.
-
10. A computer program product for causing a trusted computing device having a trusted computing environment to perform the following steps:
-
i. select a user within the trusted computing environment;
ii. create an investigation identity which is owned by the user;
iii. use the investigation identity to take part in transactions; and
iv. create a record of those transactions.
-
Specification