최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0102514 (2005-04-07) |
등록번호 | US-7281133 (2007-10-09) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 36 인용 특허 : 470 |
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively parti
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, "trusted" virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
What is claimed is: 1. A system including: a first apparatus including user controls, a communications port, a processor, a memory containing a first rule; a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secur
What is claimed is: 1. A system including: a first apparatus including user controls, a communications port, a processor, a memory containing a first rule; a first secure container containing a file, the file including one or more of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said first apparatus, said protected processing environment including one or both of hardware or software used for applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and one or both of hardware or software used for transmission of secure containers to other apparatuses or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses; a second apparatus, said second apparatus including user controls, a communications port, a processor, a memory containing a third rule, one or both of hardware or software used for receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment at least in part protecting at least some information contained in said protected processing environment from tampering by a user of said second apparatus, said protected processing environment including one or both of hardware or software used for applying said third rule and one or more rules associated with secure containers in combination to at least in part govern at least one aspect of access to or use of said governed item; and one or both of hardware or software used for transmission of secure containers to other apparatuses, or for the receipt of secure containers from other apparatuses, or for both transmission of secure containers to other apparatuses and the receipt of secure containers from other apparatuses. 2. A system as in claim 1, said system further including at least one electronic intermediary. 3. A system as in claim 2, said intermediary residing at said first apparatus. 4. A system as in claim 2, said intermediary being distributed between at least two locations, said two locations comprising said first apparatus and said second apparatus. 5. A system as in claim 3, said first apparatus including a communications server at least in part facilitating communications between an internal network and a public network. 6. A system as in claim 5, wherein said public network constitutes the internet. 7. A system as in claim 2, said intermediary constituting at least a portion of an apparatus operated by a communications service provider. 8. A system as in claim 2, said intermediary including one or both of digital signature hardware or digital signature software operatively connected to allow application of a digital signature to an item. 9. A system as in claim 2, said intermediary including one or both of hash hardware or hash software operatively connected to allow calculation of a hash value based on an item. 10. A system as in claim 2, said intermediary including one or both of electronic seal hardware or electronic seal software operatively connected to allow application of a electronic seal to an item. 11. A system as in claim 2, said intermediary including one or both of audit trail hardware or audit trail software operatively connected to record and store audit information relating to an item. 12. A system as in claim 11, in which said intermediary audit information includes information regarding at least one transmission of said item. 13. A system as in claim 11, in which said intermediary audit information includes information regarding at least one access to said item. 14. A system as in claim 2, said intermediary including one or both of time stamp hardware or time stamp software operatively connected to provide time information. 15. A system as in claim 14, said intermediary including one or both of time certification hardware or time certification software operatively connected to said one or both of time stamp hardware or time stamp software, said time certification including one or more of certification of time of transmission, receipt or use of an item. 16. A system as in claim 2, said intermediary including one or both of auditing hardware or auditing software operatively connected to provide auditing services. 17. A system as in claim 2, said intermediary including one or both of authentication hardware or authentication software. 18. A system as in claim 17, in which said one or both of authentication hardware or authentication software is operatively connected to at least in part authenticate governed items. 19. A system as in claim 17, in which said one or both of authentication hardware or authentication software is operatively connected to at least in part authenticate one or both of a sender of a governed item or a site responsible for sending a governed item. 20. A system as in claim 17, in which said one or both of authentication hardware or authentication software is operatively connected to at least in part authenticate one or both of a recipient of a governed item or a site at which a governed item is received. 21. A system as in claim 2, said intermediary including one or both of auction hardware or auction software operatively connected to provide electronic auction services. 22. A system as in claim 2, said intermediary including one or both of transaction clearing hardware or transaction clearing software operatively connected to provide services relating to clearing transactions. 23. A system as in claim 22, said transaction clearing services including payment-related services. 24. A system as in claim 23, said transaction clearing services including audit-related services. 25. A system as in claim 2, said intermediary including one or both of certification hardware or certification software operatively connected to provide certification services. 26. A system as in claim 25, said certification services including the creation of digital certificates. 27. A system as in claim 2, said intermediary including one or both of currency hardware or currency software operatively connected to provide currency-related services. 28. A system as in claim 27, said currency-related services including currency conversion. 29. A system as in claim 2, said intermediary including a secure archive. 30. A system as in claim 29, said secure archive including receipt-related information. 31. A system as in claim 29, said secure archive including information about transmissions of one or more items. 32. A system as in claim 29, said secure archive including identification information relating to one or more items. 33. A system as in claim 29, said secure archive including authentication information relating to one or more items. 34. A system as in claim 29, said secure archive authentication information including at least one hash value of at least a portion of an item. 35. A system as in claim 29, said secure archive including information relating to one or more controls. 36. A system as in claim 2, said intermediary including one or both of transmission hardware or transmission software operatively connected to receive items from other apparatuses and to transmit items to other apparatuses. 37. A system as in claim 36, said one or both of transmission hardware or transmission software operatively connected to provide store and forward services. 38. A system as in claim 2, said intermediary including one or both of cryptographic key repository hardware or cryptographic key repository software operatively connected to maintain a repository of cryptographic keys. 39. A system as in claim 2, said intermediary including a user rights authority clearinghouse. 40. A system as in claim 39, said user rights authority clearinghouse operatively connected to make rights available to users.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.