Trusted and secure techniques for item delivery and execution
First Claim
1. A method for securely sending an item represented in digital form, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising the steps of:
- authenticating a sending person'"'"'s identity, the sending person desiring to send the item to an intended recipient;
securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item;
securely associating routing information with the secure digital object, wherein the routing information includes identity information relating to one or more previous recipients of the item, and wherein application of at least one of the one or more controls to govern a use of the item is based at least in part on the routing information; and
sending the secure digital object, the routing information, and the one or more controls to the intended recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
49 Citations
103 Claims
-
1. A method for securely sending an item represented in digital form, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising the steps of:
-
authenticating a sending person'"'"'s identity, the sending person desiring to send the item to an intended recipient; securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; securely associating routing information with the secure digital object, wherein the routing information includes identity information relating to one or more previous recipients of the item, and wherein application of at least one of the one or more controls to govern a use of the item is based at least in part on the routing information; and sending the secure digital object, the routing information, and the one or more controls to the intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A non-transient computer-readable storage medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
-
authenticating a sending person'"'"'s identity, the sending person desiring to send an item represented in digital form to an intended recipient; securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; securely associating routing information with the digital object, wherein the routing information includes identity information relating to one or more previous recipients of the item, and wherein application of at least one of the one or more controls to govern a use of the item is based at least in part on the routing information; and sending the secure digital object, the routing information, and the one or more controls to the intended recipient. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A trusted computer system for securely sending an item represented in digital form, the system comprising:
-
a processor; and a memory storing computer instructions that, when executed by the processor, cause the system to perform a method, the method comprising; authenticating a sending person'"'"'s identity, the sending person desiring to send the item to an intended recipient; securely associating one or more controls with a secure digital object containing the item, the one or more controls specifying one or more permissions and/or restrictions relating to use of the item; securely associating routing information with the digital object, wherein the routing information includes identity information relating to one or more previous recipients of the item, and wherein application of at least one of the one or more controls to govern a use of the item is based at least in part on the routing information; and sending the secure digital object, the routing information, and the one or more controls to the intended recipient. - View Dependent Claims (47, 48, 49, 50, 51, 52)
-
-
53. A method for securely receiving an item represented in digital form from a sender, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising the steps of:
-
receiving a secure digital object containing the item; receiving one or more controls governing interactions with the secure digital object; receiving routing information securely associated with the item, wherein the routing information includes identity information relating to one or more previous recipients of the item; and allowing access to the item by a receiving person according to the one or more controls, wherein application of at least one of the one or more controls is based, at least in part, on the routing information. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76)
-
-
77. A non-transient computer-readable storage medium comprising program code, the program code being operable, when executed by an electronic appliance, to cause the electronic appliance to perform steps comprising:
-
receiving a secure digital object containing a digital representation of an item; receiving one or more controls governing interactions with the secure digital object; receiving routing information securely associated with the item, wherein the routing information includes identity information relating to one or more previous recipients of the item; and allowing access to the item by a receiving person according to the one or more controls, wherein application of at least one of the one or more controls is based, at least in part, on the routing information. - View Dependent Claims (78, 79, 80, 81, 82, 83, 84)
-
-
85. A system for securely receiving an item represented in digital form from a sender, the system comprising:
-
a processor; and a memory storing computer instructions that, when executed by the processor, cause the system to perform a method, the method comprising; receiving a secure digital object containing the item, receiving one or more controls governing interactions with the secure digital object, receiving routing information securely associated with the item, wherein the routing information includes identity information relating to one or more previous recipients of the item; and allowing access to the item by a receiving person according to the one or more controls, wherein application of at least one of the one or more controls is based, at least in part, on the routing information. - View Dependent Claims (86, 87, 88, 89, 90, 91, 92, 93, 94)
-
-
95. A method for securely redistributing, from a sender to an intended recipient, an item represented in digital form, the method performed by a computer system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the system to perform the method, the method comprising the steps of:
-
receiving a secure digital object containing the item; receiving one or more controls governing interaction with the secure digital object; receiving routing information securely associated with the item, wherein the routing information includes identity information relating to one or more previous recipients of the item, and wherein application of at least one of the one or more controls to govern a use of the item is based at least in part on the routing information; and redistributing, by the processor, the secure digital object to the intended recipient according to the one or more controls. - View Dependent Claims (96, 97, 98, 99, 100, 101, 102, 103)
-
Specification