최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0895845 (2004-07-22) |
등록번호 | US-7415617 (2008-08-19) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 111 인용 특허 : 471 |
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities functioning over electronic
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities functioning over electronic network-s, and can also be adapted to the specific needs of electronic commerce value chains. In one embodiment, a Distributed Commerce Utility having a secure, programmable, distributed architecture provides administrative and support services. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many of its participants. Different support functions can be collected together in hierarchical and/or networked relationships to suit various business models or other objectives. Modular support functions can combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes.
What is claimed is: 1. A method of creating a first digital certificate for governing access to or other use of electronic data, the method comprising: providing information certifying a fact, digital file, or process; providing issuer identification information including information relating to th
What is claimed is: 1. A method of creating a first digital certificate for governing access to or other use of electronic data, the method comprising: providing information certifying a fact, digital file, or process; providing issuer identification information including information relating to the identity of an issuer of the first digital certificate; providing liability protection information including information relating to the amount of liability the issuer is willing to accept in the event that the information certifying a fact, digital file, or process is inaccurate; and storing the certifying information, the issuer identification information, and the liability protection information in the first digital certificate; issuing payment information generated at least partially based on the amount of liability the issuer is willing to accept in the event that the information certifying a fact, digital file, or process is inaccurate. 2. The method in claim 1, further including: providing authentication information encrypted with a private key and storing the private key in the first digital certificate. 3. The method in claim 2, further including: providing location information relating to a location from which the public key of the issuer may be obtained and storing the location information in the first digital certificate. 4. The method as in claim 1, further including: providing information relating to an expiration date for the first digital certificate and storing the information in the first digital certificate. 5. The method as in claim 1, further including: providing information at least in part identifying a second digital certificate which certifies information upon which the first digital certificate is based at least in part and storing the information in the first digital certificate. 6. A digital certifying authority including the following: means for the creation of digital certificates, including: means for signing the digital certificates; a secure communications facility; means for evaluating digital certificates received from third parties through the secure communications facility, including means for checking the validity and authenticity of the digital certificates and means for reporting results; the means for evaluating digital certificates being capable of operating at least in part under the control of rules received in a secure container, the secure container being received through the secure communications facility; an encryption/decryption processor; a billing system, including means for billing third parties for the creation of and evaluation of digital certificates; a key generator; an electronic archive storing keys and digital certificates; and a query mechanism designed to retrieve keys and digital certificates from the electronic archive. 7. The digital certifying authority as in claim 6, further including a usage clearinghouse designed to at least part clear electronic transactions. 8. The digital certifying authority as in claim 6, in which the electronic archive further stores a list of revoked digital certificates. 9. The digital certifying authority as in claim 6, in which the electronic archive further stores information relating to the amount of liability at least one certificate issuer is willing to accept in the event a digital certificate is determined to be false or to contain erroneous information. 10. The digital certifying authority as in claim 6, further including means for issuing multiple digital certificates for the same individual or entity, the multiple digital certificates each including a common identifier. 11. A method for governing access to or other use of electronic data, the method comprising: generating a first virtual entity certificate having an identifier related to a first virtual entity, and a digital signature of a first member of the first virtual entity; embedding the first virtual entity certificate into a secure container having a first associated rule set at least in part governing use of the first virtual entity certificate, the first associated rule set including a rule governing the circumstances under which the first member may perform an action on behalf of the first virtual entity; the first member extracting the first virtual entity certificate from the secure container, the extraction being governed at least in part by the first associated rule set; and the first member performing an action on behalf of the first virtual entity, the action being governed at least in part by the first associated rule set, the first member's authority to perform the action being certified by the first virtual entity certificate. 12. The method as in claim 11, further including: generating a second virtual entity certificate including an identifier related to a first virtual entity, and a digital signature of a second member of the first virtual entity; and embedding the second virtual entity certificate into the secure container, the secure container having a second associated rule set at least in part governing use of the second virtual entity certificate, the second associated rule set including a rule governing the circumstances under which the second member may perform an action on behalf of the first virtual entity. 13. The method as in claim 11, in which: the first member's action includes generating or altering a digital certificate, the generation or alteration being accomplished by the first member as a representative of the virtual entity. 14. The method as in claim 12, in which: the step of embedding the first virtual entity certificate into the secure container occurs in a protected processing environment located in a computer associated with the first member. 15. The method as in claim 14, in which: the step of embedding the second virtual entity certificate into the secure container occurs in a protected processing environment located in a computer associated with the second member, and the secure container, or a copy of the secure container, is then directly or indirectly transmitted to the protected processing environment associated with the first member.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.