×

Trusted and secure techniques, systems and methods for item delivery and execution

DC
  • US 7,281,133 B2
  • Filed: 04/07/2005
  • Issued: 10/09/2007
  • Est. Priority Date: 02/13/1995
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system including:

  • a first apparatus includinguser controls,a communications port,a processor,a memory containinga first rule;

    a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and

    one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;

    a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and

    one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses;

    a second apparatus, said second apparatus includinguser controls,a communications port,a processor,a memory containing a third rule,one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith;

    a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said second apparatus, said protected processing environment including one or both of hardware or software used for applying said third rule and one or more rules associated with secure containers in combination to at least in part govern at least one aspect of access to or use of said governed item; and

    one or both of hardware or software used for transmission of secure containers to other apparatuses, or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×