Trusted and Secure Techniques for Item Delivery and Execution
First Claim
1. A method of securely delivering an item from a first electronic appliance, the first electronic appliance comprising a protected processing environment, the protected processing environment at least in part protecting information contained in the protected processing environment from tampering by a user of the first electronic appliance, the method comprising:
- authenticating an identity of a user of the first electronic appliance;
authenticating an intended recipient of the item;
associating one or more electronic controls with the item; and
packaging the item and the one or more electronic controls into one or more secure electronic containers.
0 Assignments
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
63 Citations
22 Claims
-
1. A method of securely delivering an item from a first electronic appliance, the first electronic appliance comprising a protected processing environment, the protected processing environment at least in part protecting information contained in the protected processing environment from tampering by a user of the first electronic appliance, the method comprising:
-
authenticating an identity of a user of the first electronic appliance;
authenticating an intended recipient of the item;
associating one or more electronic controls with the item; and
packaging the item and the one or more electronic controls into one or more secure electronic containers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising the steps of:
-
receiving a secure electronic container;
opening the secure electronic container;
authenticating one or both of the secure electronic container and contents of the secure electronic container, wherein the contents include a received item;
automatically accessing one or more controls associated with the secure electronic container, the controls having been received independently of the secure electronic container; and
performing processing on the received item in accordance with the one or more controls. - View Dependent Claims (16, 17)
-
-
18. A method comprising the steps of:
-
receiving a notification that a secure electronic container has arrived;
authenticating the secure electronic container;
opening the secure electronic container;
authenticating contents of the secure electronic container;
accessing at least one processing control, the processing control specifying, at least in part, one or more processing operations that must be performed on the secure electronic container and/or the contents of the secure electronic container;
performing the one or more processing operations;
notifying at least one remote entity upon completion of the one or more operations. - View Dependent Claims (19, 20, 21, 22)
-
Specification