Trusted and secure techniques, systems and methods for item delivery and execution
DCFirst Claim
1. A system including:
- a first apparatus includinguser controls,a communications port,a processor,a memory containinga first rule;
a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and
one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and
one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses;
a second apparatus, said second apparatus includinguser controls,a communications port,a processor,a memory containing a third rule,one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said second apparatus, said protected processing environment including one or both of hardware or software used for applying said third rule and one or more rules associated with secure containers in combination to at least in part govern at least one aspect of access to or use of said governed item; and
one or both of hardware or software used for transmission of secure containers to other apparatuses, or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
-
Citations
40 Claims
-
1. A system including:
-
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule; a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses; a second apparatus, said second apparatus including user controls, a communications port, a processor, a memory containing a third rule, one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said second apparatus, said protected processing environment including one or both of hardware or software used for applying said third rule and one or more rules associated with secure containers in combination to at least in part govern at least one aspect of access to or use of said governed item; and one or both of hardware or software used for transmission of secure containers to other apparatuses, or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification