Trusted and Secure Techniques for Item Delivery and Execution
First Claim
1. A method for securely sending an item represented in digital form, the method comprising the steps of:
- authenticating a sending person'"'"'s identity, the sending person desiring to send the item to an intended recipient;
securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; and
sending the secure digital object and the one or more controls to the intended recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
64 Citations
105 Claims
-
1. A method for securely sending an item represented in digital form, the method comprising the steps of:
-
authenticating a sending person'"'"'s identity, the sending person desiring to send the item to an intended recipient; securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; and sending the secure digital object and the one or more controls to the intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A computer-readable medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
-
authenticating a sending person'"'"'s identity, the sending person desiring to send an item represented in digital form to an intended recipient; securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; and sending the secure digital object and the one or more controls to the intended recipient. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A trusted computer system for securely sending an item represented in digital form, the system comprising:
-
means for authenticating a sending person'"'"'s identity, the sending person desiring to send the item to an intended recipient; means for securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; and means for sending the secure digital object and the one or more controls to the intended recipient. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method for securely receiving an item represented in digital form from a sender, the method comprising the steps of:
-
receiving a secure digital object containing the item; receiving one or more controls governing interactions with the secure digital object, wherein the one or more controls are received independently from the secure digital object; and allowing access to the item by a receiving person according to the one or more controls. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78)
-
-
79. A computer-readable medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
-
receiving a secure digital object containing a digital representation of an item; receiving one or more controls governing interactions with the secure digital object, wherein the one or more controls are received independently from the secure digital object; and allowing access to the item by a receiving person according to the one or more controls. - View Dependent Claims (80, 81, 82, 83, 84, 85, 86)
-
-
87. A system for securely receiving an item represented in digital form from a sender, the system comprising:
-
means for receiving a secure digital object containing the item; means for receiving one or more controls governing interactions with the secure digital object, wherein the one or more controls are received independently from the secure digital object; and means for allowing access to the item by a receiving person according to the one or more controls. - View Dependent Claims (88, 89, 90, 91, 92, 93, 94, 95, 96)
-
-
97. A method for securely redistributing, from a sender to an intended recipient, an item represented in digital form, the method comprising the steps of:
-
receiving a secure digital object containing the item; receiving one or more controls governing interaction with the secure digital object, wherein the one or more controls are received independently from the secure digital object; and redistributing the secure digital object to the intended recipient according to the one or more controls. - View Dependent Claims (98, 99, 100, 101, 102, 103, 104, 105)
-
Specification