Trusted and secure techniques, systems and methods for item delivery and execution
0 Assignments
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
-
Citations
42 Claims
-
1-7. -7. (canceled)
-
16. A system including:
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, said second rule at least in part governing the ability of a user of said first apparatus to transmit said audio file to a second apparatus;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses. - View Dependent Claims (17, 18, 19)
-
20. A system including:
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule;
a first secure container containing a file, the file including one or more of audio data, video data image data, or text date, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and
audit information;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses. - View Dependent Claims (21, 23, 24, 25, 28)
-
22. (canceled)
-
26. A system including:
a first apparatus including user controls, a communications part, a processor, a memory containing a first rule; and
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file, said first secure container having been received from a second apparatus and said second rule having been received from a third apparatus different from said second apparatus;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses.
-
27. (canceled)
-
29. (canceled)
-
30. A system including:
a first apparatus including user controls, a communications port, a processor, a memory containing, a first rule; and
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file;
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
user authentication hardware and/or software a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses. - View Dependent Claims (31, 32, 33)
-
34. A system including:
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule;
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and
a digital certificate;
one ore both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses or for both transmission of secure container to other apparatuses and the receipt of secure containers from other apparatuses. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 35, 36, 37, 38, 39, 40, 41)
-
42-510. -510. (canceled)
Specification