System and method for electronic transmission storage and retrieval of authenticated documents
First Claim
1. A method of executing a transaction by transferring authenticated information objects having respective verifiable evidence trails, comprising the steps of:
- retrieving, by a first party from a trusted repository, an authenticated information object, wherein the authenticated information object includes a first digital signature of the first party, a first certificate relating at least an identity and a cryptographic key to the first party, date and time stamps and a second certificate applied by the trusted repository, and a digital signature of the trusted repository;
the first digital signature and first certificate have been validated by the trusted repository;
the second certificate relates at least an identity and a cryptographic key to the trusted repository; and
the authenticated information object has been stored under the control of the trusted repository;
attaching instructions to a retrieved authenticated object;
transmitting the retrieved authenticated object and the attached instructions to a second party;
receiving, by the second party, a transmitted retrieved authenticated object and attached instructions;
presenting, by the second party to the trusted repository, a received transmitted retrieved authenticated object and attached instructions; and
executing the transaction according to the instructions presented to the trusted repository.
11 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus are provided that implement digital signing and/or encryption for the electronic transmission, storage, and retrieval of authenticated documents and that enable the establishment of the identity of the originator of an electronic document and of the integrity of the information contained in such a document. Together these provide irrevocable proof of authenticity of the document. The methods and apparatus make it possible to provide “paper-less” commercial transactions, such as real-estate transactions and the financial transactions secured by real estate. A Certification Authority provides tools for initializing and managing the cryptographic material required to sign and seal electronic documents. An Authentication Center provides “third party” verification that a document is executed and transmitted by the document'"'"'s originator. The methods and apparatus eliminate the need for “hard copies” of original documents as well as hard-copy storage. Retrieval of an authenticated document from the Authentication Center may be done by any number of authorized parties at any time by on-line capability.
350 Citations
46 Claims
-
1. A method of executing a transaction by transferring authenticated information objects having respective verifiable evidence trails, comprising the steps of:
-
retrieving, by a first party from a trusted repository, an authenticated information object, wherein the authenticated information object includes a first digital signature of the first party, a first certificate relating at least an identity and a cryptographic key to the first party, date and time stamps and a second certificate applied by the trusted repository, and a digital signature of the trusted repository;
the first digital signature and first certificate have been validated by the trusted repository;
the second certificate relates at least an identity and a cryptographic key to the trusted repository; and
the authenticated information object has been stored under the control of the trusted repository;
attaching instructions to a retrieved authenticated object;
transmitting the retrieved authenticated object and the attached instructions to a second party;
receiving, by the second party, a transmitted retrieved authenticated object and attached instructions;
presenting, by the second party to the trusted repository, a received transmitted retrieved authenticated object and attached instructions; and
executing the transaction according to the instructions presented to the trusted repository. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
extracting instructions presented to the trusted repository from the received transmitted retrieved authenticated object and attached instructions;
interpreting extracted instructions to determine at least one term of the transaction; and
enforcing the at least one term in executing the transaction.
-
-
12. The method of claim 11, wherein the instruction conveys a term-of-use of the retrieved authenticated information object.
-
13. The method of claim 11, wherein the instruction authorizes the trusted repository to transfer a restricted right of ownership in the retrieved authenticated information object.
-
14. The method of claim 13, wherein the retrieved authenticated information object is at least one of a limited edition of information objects and has respective identification information.
-
15. The method of claim 14, wherein the instruction includes a term that conveys a purpose for creating a limited edition and a term that includes a restriction enforced when the object is accessed.
-
16. The method of claim 11, wherein the instruction causes to be performed an action of displaying an authenticated name conveyed in a certificate with an authenticated information object.
-
17. The method of claim 16, where the authenticated information object includes at least one digital signature.
-
18. The method of claim 1, wherein the instructions cause the trusted repository to transfer control of the authenticated information object from the trusted repository to a second trusted repository.
-
19. The method of claim 1, wherein the instructions cause the trusted repository to transfer possession of the authenticated information object to a second trusted repository.
-
20. The method of claim 1, wherein the trusted repository implements a subscriber-based membership system governing the granting of access authorization to an authenticated information object based on established assurance levels in identifying certificate holders and in business rule enforcement.
-
21. The method of claim 1, wherein the first party applies a digital signature to the retrieved authenticated object and the instructions before the second party presents the object and instructions to the trusted repository, thereby terminating further execution of the transaction.
-
22. The method of claim 1, wherein the second party presents further instructions to the trusted repository, and the second party digitally signs and applies a third certificate to the presented object and instructions.
-
23. The method of claim 22, further comprising the step of communicating, from the first party to the second party after the trusted repository receives the presented object and instructions, a response that includes the first digital signature and the first certificate.
-
24. The method of claim 23, wherein the first party and second party each communicate a plurality of responses before the transaction is executed.
-
25. A method of executing a transaction by transferring authenticated information objects having respective verifiable evidence trails, comprising the steps of:
-
retrieving, by a first party from a trusted repository, an authenticated information object, wherein the authenticated information object includes a first digital signature of the first party, a first certificate relating at least an identity and a cryptographic key to the first party, date and time stamps and a second certificate applied by the trusted repository, and a digital signature of the trusted repository;
the first digital signature and first certificate have been validated by the trusted repository;
the second certificate relates at least an identity and a cryptographic key to the trusted repository; and
the authenticated information object has been stored under the control of the trusted repository;
attaching first instructions to a retrieved authenticated object;
transmitting the retrieved authenticated object and the first instructions to a second party;
receiving, by the second party, a transmitted retrieved authenticated object and first instructions;
communicating, by the second party to the first party, a response to a received transmitted retrieved authenticated object and first instructions;
sending second instructions from the first party to the trusted repository; and
executing the transaction according to the second instructions. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
extracting instructions from presented received transmitted retrieved authenticated object and attached instructions;
interpreting extracted instructions to determine at least one term of the transaction; and
enforcing the at least one term in executing the transaction.
-
-
40. The method of claim 39, wherein the instructions authorize the trusted repository to transfer a restricted right of ownership in the retrieved authenticated information object.
-
41. The method of claim 40, wherein the retrieved authenticated information object is at least one of a limited edition of information objects and has respective identification information.
-
42. The method of claim 41, wherein the instructions include a term that conveys a purpose for creating a limited edition and a term that includes a restriction enforced when the object is accessed.
-
43. The method of claim 39, wherein the instructions convey a term-of-use of the retrieved authenticated information object.
-
44. The method of claim 39, wherein the instructions cause to be performed an action of displaying an authenticated name conveyed in a certificate with an authenticated information object.
-
45. The method of claim 44, where the authenticated information object includes at least one digital signature.
-
46. A method of off-line executing a transaction by transferring at least one authenticated information object, instruction, and connection information for a verifiable evidence trail, comprising the steps of:
-
establishing a secure communication session between a second party and a trusted custodial utility (TCU);
retrieving, by the second party from the TCU, an authenticated information object and at least one instruction, wherein the authenticated information object and instruction include a first digital signature of a first party, a first certificate relating at least an identity and a cryptographic key to the first party, date and time stamps and a second certificate applied by the TCU, and a digital signature of the TCU;
the first digital signature and first certificate have been validated by the TCU;
the second certificate relates at least an identity and a cryptographic key to the TCU; and
the authenticated information object has been stored under the control of the TCU;
displaying a retrieved authenticated information object;
using at least one retrieved instruction to control actions that the second party can perform on the retrieved authenticated information object;
adding, by the second party to the retrieved authenticated information object, an information object and a third digital signature of the second party and a third certificate relating at least an identity and a cryptographic key to the second party;
transmitting to the TCU at least the retrieved information object, added information object, third digital signature, and third certificate in accordance with the retrieved instructions.
-
Specification