Trusted and secure techniques, systems and methods for item delivery and execution

a technology of trusted courier and item delivery, applied in the field of secure and trusted delivery of digital information, can solve the problems of unable to provide the degree of interactivity between the sender and the recipient in a world, the trusted courier technique does not provide a reliable means of later, and the problem of deficient in important ways, so as to achieve a high degree of trust, confidence and security, and high cost-effective

Inactive Publication Date: 2005-08-18
INTERTRUST TECH CORP
View PDF99 Cites 84 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The invention provides a way for people to have their communication treated like they were being sent through a trusted friend or courier. It offers fast and affordable ways to ensure privacy and safety when sending sensitive data over the internet or within companies' own networks. The invention uses advanced technologies such as encryption and blockchain to manage and protect these transactions. Overall, this innovation helps create more reliable and safe channels for conducting business online.

Problems solved by technology

The technical problem addressed in this patent text needs to be identified by a senior R&D personnel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted and secure techniques, systems and methods for item delivery and execution
  • Trusted and secure techniques, systems and methods for item delivery and execution
  • Trusted and secure techniques, systems and methods for item delivery and execution

Examples

Experimental program
Comparison scheme
Effect test

example electronic

Delivery and Return Receipt

[0287]FIG. 92 illustrates one example delivery of item 4054 to recipient 4056. In this example, the virtual electronic delivery person 4060 demands to see a certificate or token 4064 proving that recipient 4056 is the same person sender 4052 designated to receive item 4054 (FIG. 91B, block 4092B). Recipient 4056 could provide this certificate 4064 by, for example, supplying a “smart” electronic card containing the certificate in digital form. Alternatively or in addition; if sender 4052 so required, electronic delivery person 4060 might require stronger forms of personal authentication such as, for example, a voice print, fingerprint or handprint test, identification based on other physical (biometric) characteristics such as face profile, retinal or iris patterns of the eye, or the like.

[0288] There are advantages to using multiple authentication techniques in combination. For example, a well made certificate is essentially unforgeable (which is to say, ...

example receive process

[0539]FIGS. 114A and 114B show an example process 4600 for receiving an item. In this example, electronic appliance 600 that has received an electronic object 300 may first generate a notification to PPE 650 that the container has arrived (FIG. 114A, block 4602). PPE 650 may, in response, use the dynamic user interaction techniques discussed above to interact with and authenticate the recipient in accordance with the electronic controls 4078 within the received object 300 (FIG. 114A block 4603; authentication routine shown in FIG. 111).

[0540] Intended recipient 4056 may be given an option of accepting or declining delivery of the object (FIG. 114A, block 4604). If intended recipient 4056 accepts the item, appliance may store the container 302 locally (FIG. 114A, block 4606) and then generate a “register object” event for processing by PPE 650.

[0541]FIG. 115 shows example steps that PPE 650 may perform in response to a “register object” event. In this particular example, PPE 650 ma...

example trusted

Electronic Go-Between Detailed Architecture and Operation

[0552] In addition to the secure archive, witnessing and transaction management functions discussed above, trusted electronic go-between 4700 may perform additional services, such as, for example: [0553] notary services; [0554] provide an electronic trading environment allowing multiple parties to electronically auction goods or services; [0555]“clearing” transaction details, such as, payments, audit information and the like; [0556] acting as a “certifying authority” (see Shear et al. patent disclosure) by issuing digital certificates 4064; [0557] provide any or all of the various support and administrative services described in the Shear et al. patent disclosure; [0558] act as a trusted registry for electronic control sets; [0559] provide electronic or human arbitration, mediation or negotiation services to facilitate formation of agreements or electronic contracts; [0560] provide legal, accounting, architectural, design or o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner INTERTRUST TECH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products