Trusted and secure techniques, systems and methods for item delivery and execution
First Claim
1. A system including:
- a first apparatus includinguser controls,a communications port,a processor,a memory containinga first rule, anda first secure container containing an audio file, said audio file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the audio file;
hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers;
a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said audio file; and
hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses.
2 Assignments
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
586 Citations
48 Claims
-
1. A system including:
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing an audio file, said audio file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the audio file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said audio file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
13. A system including:
-
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing a video file, said video file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the video file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said video file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system including:
a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing an image file, said image file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the image file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said image file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
37. A system including:
-
a first apparatus including, user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing a text file, said text file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the text file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said Protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said text file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification