TRUSTED AND SECURE TECHNIQUES FOR ITEM DELIVERY AND EXECUTION
First Claim
1. A method for securely managing a document represented in digital form, the method comprising the steps of:
- obtaining a first secure container containing a digital representation of the document;
receiving one or more controls governing interactions with the first secure container, wherein the one or more controls are received separately from the first secure container; and
redistributing the first secure container to an intended recipient according to the one or more controls.
2 Assignments
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
-
Citations
33 Claims
-
1. A method for securely managing a document represented in digital form, the method comprising the steps of:
-
obtaining a first secure container containing a digital representation of the document;
receiving one or more controls governing interactions with the first secure container, wherein the one or more controls are received separately from the first secure container; and
redistributing the first secure container to an intended recipient according to the one or more controls. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
-
obtaining a secure container containing a digital representation of a document;
receiving one or more controls governing interactions with the secure container, wherein the one or more controls are received separately from the secure container; and
redistributing the secure container to an intended recipient according to the one or more controls. - View Dependent Claims (13, 14)
-
-
15. A system comprising:
-
means for obtaining a first secure container containing a digital representation of a document;
means for receiving one or more controls governing interactions with the first secure container, wherein the one or more controls are received separately from the first secure container; and
means for redistributing the first secure container to an intended recipient according to the one or more controls. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for securely managing electronic documents, the method comprising:
-
creating an electronic document;
packaging the electronic document in a secure electronic container;
associating one or more controls with the secure electronic container, the one or more controls specifying one or more permitted uses of the electronic document, the controls being configured to be used by tamper-resistant hardware and/or software to govern access to or other use of the electronic document; and
sending the secure electronic container to a trusted go-between. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification