최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0102216 (2005-04-07) |
등록번호 | US-7392395 (2008-06-24) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 26 인용 특허 : 454 |
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively parti
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, "trusted" virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).
What is claimed is: 1. A system for governing access to or other use of electronic data, the system comprising: a first apparatus including: user controls, a communications port, a processor, and a memory containing: a first rule, a first secure container containing a file, the file including at le
What is claimed is: 1. A system for governing access to or other use of electronic data, the system comprising: a first apparatus including: user controls, a communications port, a processor, and a memory containing: a first rule, a first secure container containing a file, the file including at least one of audio data, video data, image data, or text data, the first secure container having an associated second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and at least one digital signature, the digital signature including data for use in validating the file; at least one of hardware or software capable of receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment containing information, the protected processing environment at least in part protecting at least some of the contained information from tampering by a user of said first apparatus, said protected processing environment including at least one of hardware or software capable of applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and at least one of hardware and software capable of at least one of: transmission of secure containers to other apparatuses, or the receipt of secure containers from other apparatuses. 2. A system as in claim 1, said first apparatus including at least one of signature affixation hardware and signature affixation software. 3. A system as in claim 1, said digital signature being stored in a secure container. 4. A system as in claim 3, said secure container including at least one cryptographic key. 5. A system as in claim 4, said secure container in which said digital signature is stored being a second secure container, different from said first secure container. 6. A system as in claim 5, wherein said memory further contains a third rule, the third rule at least in part governing at least one aspect of access to or use of said digital signature. 7. A system as in claim 3, said memory storing at least one rule at least in part governing at least one aspect of access to or use of said digital signature. 8. A system for governing access to or other use of electronic data, the system comprising: a first apparatus including: user controls, a communications port, a processor, and a memory containing: a first rule, a first secure container containing a file, the file including at least one of audio data, video data, image data, or text data, the first secure container having an associated second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and at least one first electronic seal; at least one of hardware or software capable of receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment containing information, the protected processing environment at least in part protecting at least some of the contained information from tampering by a user of said first apparatus, said protected processing environment including at least one of hardware or software capable of applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and at least one of hardware or software capable of at least one of: transmission of secure containers to other apparatuses, or the receipt of secure containers from other apparatuses. 9. A system as in claim 8, said electronic seal including a digital representation of a handwritten signature. 10. A system as in claim 8, said electronic seal including receipt information. 11. A system as in claim 8, said electronic seal including usage information. 12. A system as in claim 8, said electronic seal including at least one image designed to allow for visual recognition of said seal. 13. A system as in claim 8, said seal including encoded information. 14. A system as in claim 13, said encoded information being stenographically encoded in said seal. 15. A system as in claim 8, said electronic seal including a digital signature. 16. A system as in claim 8, said electronic seal including validation information. 17. A system as in claim 8, said electronic seal including information regarding at least one transmission of said first secure container. 18. A system as in claim 17, said transmission information including information regarding the transmitter of said first secure container. 19. A system as in claim 8, said electronic seal including at least one electronic seal rule. 20. A system as in claim 19, said at least one electronic seal rule governing, at least in part, at least one aspect of access to or use of said first secure container contents. 21. A system as in claim 8, said electronic seal including a representation of at least one aspect of said first secure container contents. 22. A system as in claim 21, said representation including a hash of at least a portion of said first secure container contents. 23. A system as in claim 22, said hash comprising a hash of at least a portion of said file after normalization of said portion. 24. A system as in claim 22, said electronic seal further including a time value. 25. A system as in claim 22, said electronic seal further including a certificate value obtained from a digital certificate. 26. A system as in claim 8, said electronic seal including encrypted information. 27. A system as in claim 26, said encrypted information being encrypted, at least in part, using a key from a public/private key pair. 28. A system as in claim 27, said encryption key belonging to at least one individual or entity responsible at least in part for at least one transmission of said file. 29. A system as in claim 8, said electronic seal further including at least one error correction code. 30. A system as in claim 29, said error correction code being derived from at least a portion of said first secure container contents. 31. A system as in claim 8, said electronic seal being stored in a secure container. 32. A system as in claim 31, said secure container in which said electronic seal is stored being a second secure container, different from said first secure container. 33. A system as in claim 32, said memory storing at least one rule at least in part governing at least one aspect of access to or use of said electronic seal. 34. A system as in claim 8, said file including at least one second electronic seal. 35. A system as in claim 34, said at least one second electronic seal being stored in said first secure container. 36. A system for governing access to or other use of electronic data, the system comprising: a first apparatus including: user controls, a communications port, a processor, and a memory containing: a first rule, a first secure container containing a file, the file including at least one of audio data, video data, image data, or text data, the first secure container having associated a second rule, the second rule governing, at least in part, access to or other use of at least a portion of the file; and at least one electronic fingerprint; at least one of hardware or software capable of receiving and opening secure containers, at least some of said secure containers including the capacity to contain at least one governed item, and having at least one rule associated therewith; a protected processing environment containing information, the protected processing environment at least in part protecting at least some of the contained information from tampering by a user of said first apparatus, said protected processing environment including at least one of hardware or software capable of applying said first rule and said second rule in combination to at least in part govern at least one aspect of access to or use of said file; and at least one of hardware or software capable of at least one of: transmission of secure containers to other apparatuses, or the receipt of secure containers from other apparatuses. 37. A system as in claim 36, the at least one electronic fingerprint being stored in a secure container. 38. A system as in claim 37, said secure container in which said electronic fingerprint is stored being a second secure container, different from said first secure container.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.