System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
First Claim
1. A computer implemented method of handling stored authoritative copy objects that have been created by signing information objects by respective transfer agents, submitting signed information objects to a trusted third-party repository of information objects, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying a wrapper to each validated information object including a current date-time stamp and a digital signature and authentication certificate of the trusted third-party repository of information objects, which handles at least one authoritative copy object based on rules established by an owner of the at least one authoritative copy object, comprising the steps of:
- establishing at least one type of information object as an authoritative copy object that is not to be released by a trusted third-party repository of information objects;
enabling at least one selected user to access at least one selected type of authoritative copy object;
identifying at least one type of authoritative copy object required to conclude a deal; and
identifying and controlling at least one selected authoritative copy object as a transferable record.
9 Assignments
0 Petitions
Accused Products
Abstract
Exemplary embodiments include methods of handling stored electronic original objects that have been created by signing information objects by respective transfer agents, submitting signed information objects to a trusted custodial utility, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying to each validated information object a date-time stamp and a digital signature and authentication certificate of the trusted custodial utility. One method includes re-validating an electronic original object by verifying the digital signature of the trusted custodial utility applied to the object and applying to the re-validated object a current date-time stamp and a digital signature and current authentication certificate of the trusted custodial utility. Other methods include handling information objects that are transferable records according to specified business rules.
-
Citations
36 Claims
-
1. A computer implemented method of handling stored authoritative copy objects that have been created by signing information objects by respective transfer agents, submitting signed information objects to a trusted third-party repository of information objects, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying a wrapper to each validated information object including a current date-time stamp and a digital signature and authentication certificate of the trusted third-party repository of information objects, which handles at least one authoritative copy object based on rules established by an owner of the at least one authoritative copy object, comprising the steps of:
-
establishing at least one type of information object as an authoritative copy object that is not to be released by a trusted third-party repository of information objects; enabling at least one selected user to access at least one selected type of authoritative copy object; identifying at least one type of authoritative copy object required to conclude a deal; and identifying and controlling at least one selected authoritative copy object as a transferable record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A computer implemented method of handling stored authoritative copy objects that have been created by signing information objects by respective transfer agents, submitting signed information objects to a trusted third-party repository of information objects, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying a wrapper to each validated information object including a current date-time stamp and a digital signature and authentication certificate of the trusted third-party repository of information objects, comprising the following steps by the trusted third-party repository of information objects:
-
receiving a request submitted by a user for retrieval of an authoritative copy object identified in the request; determining whether the user has authority to submit the request; and if the user is determined to have authority, carrying out the steps of; retrieving the authoritative copy object identified in the request; extracting from the retrieved authoritative copy object content information and at least one signature block; extracting from the signature block signer information; extracting at least one of a current date-time of a digitized signature included in the signer information and a current date-time of the trusted third-party repository of information objects'"'"' receipt of the signature block; extracting from the signature block certificate information that includes signer identifying information; forming a data structure from the extracted information such that upon rendering the content the information is properly placed with respect to the content and includes at least one forgery-resistant indicium that clearly identifies the rendered information as a copy; and communicating the data structure to the user, the data structure communicated to the user representing an impaired version distinct from the unique authoritative storage copy that is not to be released by the trusted third-party repository of information objects. - View Dependent Claims (32, 33, 34)
-
-
35. A computer implemented method of handling stored authoritative copy objects that have been created by signing information objects by respective transfer agents, submitting signed information objects to a trusted third-party repository of information objects, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying a wrapper to each validated information object including a current date-time stamp and a digital signature and authentication certificate of the trusted third-party repository of information objects, which handles at least one authoritative copy object based on rules established by an owner of the at least one authoritative copy object, comprising the steps of:
-
authenticating an identity of the owner; establishing at least one type of information object as an authoritative copy object that is not to be released by a trusted third-party repository of information objects; enabling at least one selected user to access at least one selected type of authoritative copy object; identifying at least one type of authoritative copy object required to conclude a deal; identifying and controlling at least one selected authoritative copy object as a transferable record; identifying at least one user able to authorize transfer of an interest in a transferable record; and validating the owner'"'"'s right to act with respect to the deal. - View Dependent Claims (36)
-
Specification