최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0632944 (2000-08-04) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 63 인용 특허 : 413 |
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively parti
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, "trusted" virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
What is claimed is: 1. A system including: a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing an audio file, said audio file including steganographically encoded information, the first secure conta
What is claimed is: 1. A system including: a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing an audio file, said audio file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the audio file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said audio file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. 2. A system as in claim 1, said steganographically encoded information including at least one electronic fingerprint. 3. A system as in claim 1, said steganographically encoded information including a first portion encoded using a first steganographic encoding technique and a second portion encoded using a second steganographic encoding technique. 4. A system as in claim 3, in which said first steganographic encoding technique provides a higher degree of security than said second steganographic encoding technique. 5. A system as in claim 4, in which at least a portion of said steganographically encoded information is encrypted. 6. A system as in claim 3, in which said first portion is encrypted using a first technique which differs in at least one respect from a second encryption technique used for encryption of said second portion. 7. A system as in claim 6, in which said encryption techniques differ in at least the key used for each technique. 8. A system as in claim 6, in which said encryption techniques differ in the strength of encryption used. 9. A system as in claim 1, in which said steganographic encoding includes at least the creation of slight variances in spacings between words or characters, said slight variances encoding at least a portion of said steganographically encoded information. 10. A system as in claim 1, in which said steganographic encoding includes at least the creation of slight variances in spacings between lines of text, said slight variances encoding at least a portion of said steganographically encoded information. 11. A system as in claim 1, in which said steganographic encoding includes at least the creation of slight variances in the gray scale used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 12. A system as in claim 1, in which said steganographic encoding includes at least the creation of slight variances in the color frequencies used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 13. A system including: a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing a video file, said video file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the video file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said video file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. 14. A system as in claim 13, said steganographically encoded information including at least one electronic fingerprint. 15. A system as in claim 13, said steganographically encoded information including a first portion encoded using a first steganographic encoding technique and a second portion encoded using a second steganographic encoding technique. 16. A system as in claim 15, in which said first steganographic encoding technique provides a higher degree of security than said second steganographic encoding technique. 17. A system as in claim 16, in which at least a portion of said steganographically encoded information is encrypted. 18. A system as in claim 15, in which said first portion is encrypted using a first technique which differs in at least one respect from a second encryption technique used for encryption of said second portion. 19. A system as in claim 18, in which said encryption techniques differ in at least the key used for each technique. 20. A system as in claim 18, in which said encryption techniques differ in the strength of encryption used. 21. A system as in claim 13, in which said steganographic encoding includes at least the creation of slight variances in spacings between words or characters, said slight variances encoding at least a portion of said steganographically encoded information. 22. A system as in claim 13, in which said steganographic encoding includes at least the creation of slight variances in spacings between lines of text, said slight variances encoding at least a portion of said steganographically encoded information. 23. A system as in claim 13, in which said steganographic encoding includes at least the creation of slight variances in the gray scale used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 24. A system as in claim 13, in which said steganographic encoding includes at least the creation of slight variances in the color frequencies used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 25. A system including: a first apparatus including user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing an image file, said image file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the image file: hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers: a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said image file: and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. 26. A system as in claim 25, said steganographically encoded information including at least one electronic fingerprint. 27. A system as in claim 25, said steganographically encoded information including a first portion encoded using a first steganographic encoding technique and a second portion encoded using a second steganographic encoding technique. 28. A system as in claim 27, in which said first steganographic encoding technique provides a higher degree of security than said second steganographic encoding technique. 29. A system as in claim 28, in which at least a portion of said steganographically encoded information is encrypted. 30. A system as in claim 27, in which said first portion is encrypted using a first technique which differs in at least one respect from a second encryption technique used for encryption of said second portion. 31. A system as in claim 30, in which said encryption techniques differ in at least the key used for each technique. 32. A system as in claim 30, in which said encryption techniques differ in the strength of encryption used. 33. A system as in claim 25, in which said steganographic encoding includes at least the creation of slight variances in spacings between words or characters, said slight variances encoding at least a portion of said steganographically encoded information. 34. A system as in claim 25, in which said steganographic encoding includes at least the creation of slight variances in spacings between lines of text, said slight variances encoding at least a portion of said steganographically encoded information. 35. A system as in claim 25, in which said steganographic encoding includes at least the creation of slight variances in the gray scale used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 36. A system as in claim 25, in which said steganographic encoding includes at least the creation of slight variances in the color frequencies used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 37. A system including: a first apparatus including, user controls, a communications port, a processor, a memory containing a first rule, and a first secure container containing a text file, said text file including steganographically encoded information, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the text file; hardware and/or software used for receiving and opening secure containers, said secure containers each including the capacity to contain at least one governed item, at least one rule being associated with each of said secure containers: a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said Protected processing environment including hardware and/or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said text file; and hardware and/or software used for transmission of secure containers to other apparatuses and/or for the receipt of secure containers from other apparatuses. 38. A system as in claim 37, said steganographically encoded information including at least one electronic fingerprint. 39. A system as in claim 37, said steganographically encoded information including a first portion encoded using a first steganographic encoding technique and a second portion encoded using a second steganographic encoding technique. 40. A system as in claim 39, in which said first steganographic encoding technique provides a higher degree of security than said second steganographic encoding technique. 41. A system as in claim 40, in which at least a portion of said steganographically encoded information is encrypted. 42. A system as in claim 39, in which said first portion is encrypted using a first technique which differs in at least one respect from a second encryption technique used for encryption of said second portion. 43. A system as in claim 42, in which said encryption techniques differ in at least the key used for each technique. 44. A system as in claim 42, in which said encryption techniques differ in the strength of encryption used. 45. A system as in claim 37, in which said steganographic encoding includes at least the creation of slight variances in spacings between words or characters, said slight variances encoding at least a portion of said steganographically encoded information. 46. A system as in claim 37, in which said steganographic encoding includes at least the creation of slight variances in spacings between lines of text, said slight variances encoding at least a portion of said steganographically encoded information. 47. A system as in claim 37, in which said steganographic encoding includes at least the creation of slight variances in the gray scale used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information. 48. A system as in claim 37, in which said steganographic encoding includes at least the creation of slight variances in the color frequencies used in at least a portion of the contents of said first secure container, said slight variances encoding at least a portion of said steganographically encoded information.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.