최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0405130 (2006-04-13) |
등록번호 | US-8185473 (2012-05-22) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 27 인용 특허 : 511 |
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities functioning over electronic
An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities functioning over electronic networks can also be adapted to the specific needs of electronic commerce value chains. In one embodiment, a Distributed Commerce Utility having a secure, programmable, distributed architecture provides administrative and support services. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many of its participants. Different support functions can be collected together in hierarchical and/or networked relationships to suit various business models or other objectives. Modular support functions can be combined in different arrays to form different Commerce Utility Systems for different design implementations and purposes.
1. A system comprising: a telecommunications switch comprising a processor, a memory, and a security checkpoint system, the security checkpoint system verifying that information received at the telecommunications switch in a secure electronic container was routed through one or more required or auth
1. A system comprising: a telecommunications switch comprising a processor, a memory, and a security checkpoint system, the security checkpoint system verifying that information received at the telecommunications switch in a secure electronic container was routed through one or more required or authorized security checkpoint systems prior to receipt, and that the secure electronic container was sent in accordance with controls restricting the transmission of the information in the secure electronic container; anda secure end user node, the end user node being located at a site on a telecommunications network that is remote from the telecommunications switch, the end user node being configured to receive the secure electronic container from the security checkpoint system over the telecommunications network, and to securely enable an end user to use the information in the secure electronic container in accordance with controls included in the secure electronic container;wherein the security checkpoint system and the end user node are independent from a security perspective, such that a breach of security related to the end user node will not compromise the security of the security checkpoint system. 2. The system of claim 1, in which the security checkpoint system gathers audit information related to at least one of: (i) an intended recipient of the secure electronic container, (ii) a class of information included in the secure electronic container, a (iii) checksum or other information for use in validating information included in the secure electronic container, or (iv) a sender of the secure electronic container. 3. The system of claim 2, in which at least some of the audit information is encrypted such that it may not be decrypted without the cooperation of a sender of the secure electronic container or an intended or actual recipient of the secure electronic container having authority to access such information. 4. The system of claim 1, in which the security checkpoint system prevents the information included in the secure electronic container from being used upon determining that the secure electronic container was not routed through one or more required or authorized security checkpoint systems prior to receipt at the security checkpoint system. 5. The system of claim 1, in which the security checkpoint system refuses to modify the secure electronic container to make it usable by a user, upon determining that the secure electronic container was not routed through one or more required or authorized security checkpoint systems prior to receipt at the security checkpoint system. 6. The system of claim 1, in which the security checkpoint system modifies the secure electronic container to make it usable by a user, upon determining that the secure electronic container was routed through one or more required or authorized security checkpoint systems prior to receipt at the security checkpoint system. 7. The system of claim 1, in which the security checkpoint system detects secure electronic containers based on secure container header information. 8. The system of claim 1, in which the security checkpoint system modifies at least a portion of the controls included in the secure electronic container to add further limitations on use of the information in the secure electronic container. 9. The system of claim 1, in which the information in the secure electronic container comprises electronic currency. 10. A method performed by a security checkpoint system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving, over a telecommunications network, a secure electronic container at the security checkpoint system;verifying that the secure electronic container was routed through one or more required or authorized security checkpoint systems prior to receipt at the security checkpoint system, and that the secure electronic container was sent in accordance with one or more controls associated with the secure electronic container and restricting the transmission of information in the secure electronic container; andsending the secure electronic container over the telecommunications network to a secure end user node located remotely from the security checkpoint system configured to access the information in the security electronic container in accordance with the one or more controls ,wherein the sending is performed in accordance with the one or more controls. 11. The method of claim 10, wherein the security checkpoint system and the end user node are independent from a security perspective, such that a breach of security related to the end user node will not compromise the security of the security checkpoint system. 12. The method of claim 10, further comprising: gathering, at the security checkpoint system, audit information related to at least one of: (i) an intended recipient of the secure electronic container, (ii) a class of information included in the secure electronic container, (iii) checksum or other information for use in validating information included in the secure electronic container, or (iv) a sender of the secure electronic container. 13. The method of claim 12, further comprising: encrypting at least some of the audit information such that it may not be decrypted without cooperation of a sender of the secure electronic container or an intended or actual recipient of the secure electronic container having authority to access such information. 14. The method of claim 10, further comprising: upon completion of the verifying step, modifying the secure electronic container to make it usable by a user. 15. The method of claim 10, further comprising: detecting secure electronic containers at the security checkpoint system based on secure container header information. 16. The method of claim 10, further comprising: modifying at least a portion of the one or more controls to add further limitations on use of information in the secure electronic container. 17. The method of claim 10, in which the information in the secure electronic container comprises electronic currency. 18. The method of claim 10, in which the one or more controls comprise one or more budgets, limits, or other restrictions related to use of information in the secure electronic container. 19. The method of claim 10, in which the one or more controls comprise a limit on the number of secure electronic containers that can be sent from a given entity in a given amount of time. 20. A telecommunications switch, the telecommunications switch comprising: a processor;a memory; anda security checkpoint system protected processing environment, the security checkpoint system protected processing environment being configured to:verify that a piece of electronic information received at the security checkpoint system protected processing environment was routed through a telecommunications network in accordance with controls associated with the piece of electronic information; andassociate a digital certificate with the piece of electronic information upon determining that the piece of electronic information was routed through the telecommunications network in accordance with the controls. 21. The telecommunications switch of claim 20, in which the security checkpoint system protected processing environment is further operable to modify the controls before transmitting the piece of electronic information to an end user. 22. The telecommunications switch of claim 20, in which the security checkpoint system protected processing environment is further configured to record audit information related to the piece of electronic information. 23. The telecommunications switch of claim 22, in which the audit information relates to at least one of: (i) an intended recipient of the piece of electronic information, (ii) a class of information to which the piece of electronic information belongs, (iii) a checksum or other data for use in validating the piece of electronic information, or (iv) a sender of the piece of electronic information. 24. A method performed by a telecommunications switch comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving, over a telecommunications network, an electronic container at the telecommunications switch, an electronic container including protected information and having associated control information for governing the protected information, the control information including one or more requirements regarding how the electronic container may be routed;determining if the electronic container was routed in accordance with the control information; andupon determining that the electronic container was routed in accordance with the control information, forwarding the electronic container to an end user node over the telecommunications network. 25. The method of claim 24, in which the control information includes a requirement that the electronic container have an associated certificate issued by a security checkpoint system, the method further comprising: determining if the electronic container has the associated certificate. 26. The method of claim 24, further comprising: recording auditing information relating to the protected information. 27. The method of claim 24, further comprising: inserting a certificate into the electronic container. 28. The method of claim 27, further comprising: recording auditing information relating to the protected information;wherein the inserting step is performed in response to successful completion of the recording step. 29. The method of claim 24, further comprising: enforcing a predefined limit on a quantity of secure electronic containers permitted to be transmitted through the telecommunications switch in a predefined time period. 30. A method performed by a telecommunications switch comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving, over a telecommunications network, an electronic container at the telecommunications switch, the electronic container including protected information and control information for governing the protected information, the control information including one or more auditing requirements;recording auditing information at the telecommunications switch in accordance with the control information; andforwarding the electronic container from the telecommunications switch to an end user node over the telecommunications network. 31. The method of claim 30, in which the control information includes a requirement that the electronic container be routed in predefined manner, the method further comprising: determining if the electronic container has been routed in the predefined manner. 32. The method of claim 30, in which the auditing information relates to at least one of: (i) an intended recipient of the protected information, (ii) checksum or other information for use in validating the protected information, or (iii) a sender of the protected information. 33. The method of claim 30, in which the auditing requirements include a requirement that information identifying one or more of the following be recorded: (i) one or more telecommunications switches through which the electronic container was routed, or (ii) a time of receipt of the electronic container at the telecommunications switch. 34. The method of claim 30, further comprising: encrypting at least some of the auditing information such that it may not be decrypted without cooperation of a sender of the electronic container or an intended or actual recipient of the electronic container having authority to access such auditing information. 35. A method performed by a telecommunications switch comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving, over a telecommunications network, an electronic container at the telecommunications switch, the electronic container including protected information and control information for governing the protected information, the control information including one or more security-related requirements;determining, at the telecommunications switch, that the one or more security-related requirements have been satisfied; andupon determining that the one or more security-related requirements have been satisfied, forwarding the electronic container from the telecommunications switch to an end user node over the telecommunications network. 36. The method of claim 35, in which the control information includes one or more requirements regarding how the electronic container may be routed, the method further comprising: determining if the electronic container was routed in accordance with the requirements included in the control information. 37. The method of claim 35, further comprising: associating a certificate with the electronic container following completion of the determining step, the certificate attesting to the one or more security-related requirements having been satisfied. 38. The method of claim 35, further comprising: at the end user node, governing access to the protected information in accordance with the control information, the governing including verifying the association of the certificate with the electronic container. 39. The method of claim 35, further comprising: recording auditing information at the telecommunications switch. 40. The method of claim 39, in which the auditing information relates to at least one of: (i) an intended recipient of the protected information, (ii) checksum or other information for use in validating the protected information, or (iii) a sender of the protected information. 41. The method of claim 39, in which the auditing information relates to at least one of: (i) one or more telecommunications switches through which the electronic container was routed, or (ii) a time of receipt of the electronic container at the telecommunications switch. 42. A method performed by an end user site comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving, over a telecommunications network, an electronic container at the end user site, the electronic container including protected information and having associated one or more controls for governing the protected information;determining if the electronic container has an associated certificate, the certificate having been issued by a telecommunications switch on the telecommunications network prior to receipt of the electronic container at the end user site; andproviding an end user with access to the protected information in accordance with the one or more controls;wherein the end user site includes software and/or hardware for impeding tampering by the end user with performance of at least said step of providing access to the protected information in accordance with the one or more controls. 43. The method of claim 42, in which the one or more controls include one or more requirements regarding how the electronic container may be routed, the method further comprising: determining if the electronic container was routed in accordance with the one or more requirements included in the one or more controls. 44. The method of claim 42, in which the certificate attests to the performance of an auditing step by the telecommunications switch. 45. A method performed by a telecommunications switch comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving a data item at the telecommunications switch, the telecommunications switch being located on a telecommunications network, the data item having control information associated therewith, the control information specifying routing requirements for the data item;determining if the data item has been routed in accordance with the control information;sending the data item to a remote site on the telecommunications network upon determining that the data item has been routed in accordance with the control information; andrecording information related to the data item. 46. The method of claim 45, in which the recorded information relates to at least one of: (i) an intended recipient of the data item, (ii) checksum or other information for use in validating the data item, or (iii) a sender of the data item. 47. The method of claim 45, in which the recorded information relates to one or more telecommunications switches through which the data item was routed. 48. The method of claim 45, in which the recorded information relates to a time of receipt of the data item at the telecommunications switch. 49. A method performed by a security checkpoint system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving an electronic purchase order at the security checkpoint system, the security checkpoint system being located on a telecommunications network, the electronic purchase order having been sent by a first site on the telecommunications network to a remote site;determining if the electronic purchase order complies with requirements relating to the financial amount committed;determining if the electronic purchase order includes an indication of proper ordering authority; andsending the electronic purchase order over the telecommunications network to the remote site upon determining that the electronic purchase order complies with the requirements relating to financial amount committed and includes a valid indication of proper ordering authority. 50. The method of claim 49, in which the security checkpoint system comprises a telecommunications switch. 51. A method performed by a security checkpoint system comprising a processor and a memory encoded with program instructions that, when executed by the processor, cause the processor to perform the method, the method comprising: receiving an electronic container at the security checkpoint system, the security checkpoint system being located on a telecommunications network, the electronic container including protected information and having been sent from a first user site;at the security checkpoint system, determining if transmission of the electronic container complies with one or more limits relating to the transmission of electronic containers from the user site; andsending the electronic container to a second user site upon determining that transmission of the electronic container to the second user site complies with the one or more limits. 52. The method of claim 51, in which the one or more limits include a limit on the number of electronic containers that can be sent from the first user site, or an organization including the first user site, in a predefined period of time. 53. The method of claim 51, in which the one or more limits include a limit on the financial amount represented by the protected information in the electronic container. 54. The method of claim 51, further comprising: associating a certificate with the electronic container upon determining that transmission of the electronic container to the second user site complies with the one or more limits. 55. The method of claim 54, in which the first user site belongs to a first organization and the second user site belongs to a second organization, and in which the one or more limits include a limit on the amount of protected information sent from the first organization to the second organization in a predefined period of time.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.