Movatterモバイル変換


[0]ホーム

URL:


US20150156188A1 - Methods and systems for providing secure transactions - Google Patents

Methods and systems for providing secure transactions
Download PDF

Info

Publication number
US20150156188A1
US20150156188A1US14/590,951US201514590951AUS2015156188A1US 20150156188 A1US20150156188 A1US 20150156188A1US 201514590951 AUS201514590951 AUS 201514590951AUS 2015156188 A1US2015156188 A1US 2015156188A1
Authority
US
United States
Prior art keywords
data storage
storage container
container
hash value
sdts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/590,951
Inventor
Gene Shih-Ching Wang
Sherman WANG
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BULLAPROOF Inc
Original Assignee
BULLAPROOF Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BULLAPROOF IncfiledCriticalBULLAPROOF Inc
Priority to US14/590,951priorityCriticalpatent/US20150156188A1/en
Assigned to BULLAPROOF, INC.reassignmentBULLAPROOF, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WANG, GENE SHIH-CHING, WANG, SHERMAN
Publication of US20150156188A1publicationCriticalpatent/US20150156188A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Methods and systems to provide secure electronic document transactions are described. In one embodiment, a processor creates a first data storage container capable of being nested as a component file of a second data storage container. In one embodiment, the first data storage container comprises: a unique first data storage container identifier; at least one unique component file identifier to identify at least one component file of the first data storage container, and the component file is an electronic document or another data storage container. In one embodiment, the first data storage container further comprises: at least one component file hash value for the at least one component file; a first attribute set; and a first data storage container hash value calculated based on features including the at least one unique component file identifier, the at least one component file hash value, and the first attribute set.

Description

Claims (29)

What is claimed is:
1. A data processing system comprising:
a memory to store instructions; and
a processor coupled to the memory, the processor configured to execute the instructions to:
create a first data storage container capable of being nested as a component file of a second data storage container, wherein the first data storage container comprises:
at least one component file hash value for at least one component file of the first data storage container, wherein a component file is an electronic document or another data storage container;
a first attribute set; and
a first data storage container hash value calculated based on features comprising the at least one component file hash value and the first attribute set.
2. The system ofclaim 1, wherein the features used to create the first data storage container hash value are unalterable.
3. The system ofclaim 1, wherein the first data storage container further comprises an editable notes section.
4. The system ofclaim 1, wherein the processor is further configured to execute instructions to perform one or more of:
recalculate the component file hash value of a component file and compare the result to a predetermined component file hash value stored in the first data storage container, wherein a hash value match constitutes verification of the integrity of said component file; and
recalculate the first data storage container hash value and compare the result to a predetermined first data storage container hash value that is stored in the first data storage container, wherein a hash value match constitutes verification of the integrity of the first data storage container.
5. The system ofclaim 1, wherein the processor is further configured to execute instructions to store, in a central storage, an authoritative copy of the first data storage container or an authoritative copy for each of its newly created or uploaded component files.
6. The system ofclaim 1, wherein the processor is further configured to execute instructions to allow a first user account to initiate one or more of:
store the first data storage container hash value or the at least one component file hash value;
access, using the first data storage container hash value, the first data storage container; and
access, using the at least one component file hash value, the component file.
7. The system ofclaim 6, wherein the first data storage container is created by the first user account, and wherein the first attribute set includes a first set of transfer instructions for the first data storage container identifying the first user account as a sender and a first group of one or more receiving user accounts.
8. The system ofclaim 7, wherein the processor is further configured to execute the transfer instructions by storing the first data storage container hash value at each of the first group's one or more receiving user accounts.
9. The system ofclaim 8, wherein, upon creating the first data storage container, the processor is further configured to execute instructions to:
send a transaction authorization request to the first user account, wherein the transaction authorization request include one or more elements of: account identifier of the first user account, account identifiers for each of the first group's one or more receiving user accounts, the hash values of one or more underlying files nested in the first data storage container to which the transaction authorization applies, date and time information of a running clock, transaction authorization reasons, warranties, transaction terms, or a requested electronic signature authorization type;
receive authorization from the first user account for the transaction authorization request;
add, upon receiving the authorization from the first user account, one or more elements of the transaction authorization request including finalized date and time information to the first attribute set;
calculate the first data storage container hash value;
send the first data storage container hash value to the first user account;
receive and authenticate an electronic signature from the first user account wherein the electronic signature is based at least in part on identifying information of the first user account and the first data storage container hash value; and
record a transaction event to a transaction authorization log, wherein the transaction event includes one or more of: the first data storage container hash value, the electronic signature, or one or more elements of the transaction authorization request including the finalized date and time information.
10. The system ofclaim 9, wherein the electronic signature type is one or more of a digital signature or salted password.
11. The system ofclaim 9, wherein the processor is further configured to execute instructions to:
send a transaction authorization request to each of the first group's one or more receiving user accounts upon transferring the first data storage container hash value to each of the first group's one or more receiving user accounts;
receive one of a plurality of data storage containers from each of the first group's one or more receiving user accounts as a result of the request for a transaction authorization;
verify that the first data storage container has been nested as a component file for each of the plurality of data storage containers;
verify that each of the plurality of data storage containers has a corresponding transaction authorization from the first group's one or more receiving user accounts;
create a third data storage container including the assignment, as component files, the plurality of data storage containers to the third data storage container.
12. The system ofclaim 8, wherein the processor is further configured to execute instructions to:
record, to the first attribute set, authorized ownership information specifying a second user account to own the first data storage container, wherein the second user account is one of the first group's one or more receiving user accounts; and
add a first entry to an ownership log specifying at least the first data storage container hash value and the authorized ownership information.
13. The system ofclaim 12, wherein the processor is further configured to execute instructions to transfer ownership of the first data storage container, the instructions to transfer ownership comprising instructions to:
obtain authorization from the owner of the first data storage container;
create the second data storage container including:
nesting the first data storage container as a component file of the second data storage container;
recording, to a second attribute set of the second data storage container, the new authorized ownership information identifying a third user account as the owner of the second data storage container; and
recording, to the second attribute set of the second data storage container, a second set of transfer instructions for the second data storage container identifying the second user account as a sender and a second group of one or more receiving user accounts, wherein the third user account is one of the second group's one or more receiving user accounts;
execute the second set of transfer instructions by storing the second data storage container hash value in each of the second group's one or more receiving user accounts;
create a second ownership log entry comprising at least the second data storage container hash value and the authorized ownership information; and
invalidate the first ownership log entry.
14. The system ofclaim 13, wherein the first attribute set contains a numerical value associated with the first data storage container, and wherein upon a change of ownership the numerical value is copied exactly or converted to a new numerical value in the second attribute set of the second data storage container.
15. The system ofclaim 1, wherein the first attribute set contains instructions for an electronic document editor to display a plurality of electronic documents as overlapping graphical layers on a canvas in a specified display order.
16. The system ofclaim 1, wherein the processor is further configured to execute an application, wherein the application is configured to interface with the first data storage container.
17. A computer-implemented method comprising:
creating a first data storage container capable of being nested as a component file of a second data storage container, wherein the first data storage container comprises:
at least one component file hash value for at least one component file of the first data storage container, wherein a component file is an electronic document or another data storage container;
a first attribute set; and
a first data storage container hash value calculated based on features comprising the at least one component file hash value and the first attribute set.
18. The method ofclaim 17, further comprising:
recalculating the component file hash value of a component file and comparing the result to a predetermined component file hash value stored in the first data storage container, wherein a hash value match constitutes verification of the integrity of said component file; and
recalculating the first data storage container hash value and comparing the result to a predetermined first data storage container hash value that is stored in the first data storage container, and wherein a hash value match constitutes verification of the integrity the first data storage container.
19. The method ofclaim 17, further comprising:
storing, in a central storage, an authoritative copy of the first data storage container or an authoritative copy for each of its newly created or uploaded component files.
20. The method ofclaim 17, wherein the first data storage container is created by a first user account, and wherein the first attribute set includes a first set of transfer instructions for the first data storage container identifying the first user account as a sender and a first group of one or more receiving user accounts.
21. The method ofclaim 20, further comprising:
storing the first data storage container hash value at each of the first group's one or more receiving user accounts.
22. The method ofclaim 21, wherein upon creating the first data storage container, further comprising:
sending a transaction authorization request to the first user account, wherein the transaction authorization request includes one or more features of: account identifier of the first user account, account identifiers for each of the first group's one or more receiving user accounts, the hash values of the one or more underlying files nested in the first data storage container to which the transaction authorization applies, date and time information of a running clock, transaction authorization reasons, warranties, transaction terms, or a requested electronic signature authorization type;
receiving authorization from the first user account for the transaction authorization request;
adding, upon receiving the authorization from the first user account, one or more features of the transaction authorization request including finalized date and time information to the first attribute set;
calculating the first data storage container hash value;
sending the first data storage container hash value to the first user account;
receiving and authenticating an electronic signature from the first user account wherein the electronic signature is based at least in part on identifying information of the first user account and the first data storage container hash value; and
recording a transaction event to a transaction authorization log, wherein the transaction event includes one or more of: the first data storage container hash value, the electronic signature, or one or more features of the transaction authorization request including the finalized date and time information.
23. The method ofclaim 22, wherein the electronic signature type is one or more of a digital signature or salted password.
24. The method ofclaim 22, further comprising:
sending a transaction authorization request to each of the first group's one or more receiving user accounts upon transferring the first data storage container hash value to each of the first group's one or more receiving user accounts;
receiving one of a plurality of data storage containers from each of the first group's receiving user accounts as a result of the request for a transaction authorization;
verifying that the first data storage container has been nested as a component file for each of the plurality of data storage containers;
verifying that each of the plurality of data storage containers has a corresponding transaction authorization from the first group's one or more receiving user accounts;
creating a third data storage container including the assignment, as component files, the plurality of data storage containers to the third data storage container.
25. The method ofclaim 21, further comprising:
recording, to the first attribute set, authorized ownership information specifying a second user account to own the first data storage container, wherein the second user account is one of the first group's one or more receiving user accounts; and
adding a first entry to an ownership log specifying at least the first data storage container hash value and the authorized ownership information.
26. The method ofclaim 25, further comprising:
obtaining authorization from the owner of the first data storage container;
creating the second data storage container including:
nesting the first data storage container as a component file of the second data storage container;
recording, to a second attribute set of the second data storage container, the new authorized ownership information identifying a third user account as the owner of the second data storage container; and
recording, to the second attribute set of the second data storage container, a second set of transfer instructions for the second data storage container identifying the second user account as a sender and a second group of one or more receiving user accounts, wherein the third user account is one of the second group's one or more receiving user accounts;
executing the second set of transfer instructions by storing the second data storage container hash value in each of the second group's one or more receiving user accounts;
creating a second ownership log entry comprising at least the second data storage container hash value and the authorized ownership information; and
invalidating the first ownership log entry.
27. The method ofclaim 26, wherein the first attribute set contains a numerical value associated with the first data storage container, and wherein upon a change of ownership the numerical value is copied exactly or converted to a new numerical value in the second attribute set of the second data storage container.
28. An apparatus comprising:
means for creating a first data storage container capable of being nested as a component file of a second data storage container, wherein the first data storage container comprises:
at least one component file hash value for at least one component file of the first data storage container, wherein a component file is an electronic document or another data storage container;
a first attribute set; and
a first data storage container hash value calculated based on features comprising the at least one component file hash value and the first attribute set;
means for nesting the first data storage container as a component file of the second data storage container;
means for verifying integrity of a component file of the first data storage container by recalculating the component file hash value and comparing the result to a predetermined component file hash value stored in the first data storage container, and wherein a hash value match constitutes verification of its integrity; and
means for verifying integrity of the first data storage container by recalculating the first data storage container hash value and comparing the result to a predetermined first data storage container hash value that is stored in the first data storage container, and wherein a hash value match constitutes verification of its integrity.
29. The apparatus ofclaim 28, further comprising:
means for allowing a first user account to initiate one or more of:
creating the first data storage container, and wherein the first attribute set includes a first set of transfer instructions for the first data storage container identifying the first user account as a sender and a first group of one or more receiving user accounts;
storing the first data storage container hash value or the at least one component file hash value;
accessing, using the first data storage container hash value, the first data storage container; and
accessing, using the at least one component file hash value, the component file.
US14/590,9512013-03-152015-01-06Methods and systems for providing secure transactionsAbandonedUS20150156188A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/590,951US20150156188A1 (en)2013-03-152015-01-06Methods and systems for providing secure transactions

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201361800776P2013-03-152013-03-15
US13/868,019US8959595B2 (en)2013-03-152013-04-22Methods and systems for providing secure transactions
US14/590,951US20150156188A1 (en)2013-03-152015-01-06Methods and systems for providing secure transactions

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/868,019ContinuationUS8959595B2 (en)2013-03-152013-04-22Methods and systems for providing secure transactions

Publications (1)

Publication NumberPublication Date
US20150156188A1true US20150156188A1 (en)2015-06-04

Family

ID=51534997

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/868,019Expired - Fee RelatedUS8959595B2 (en)2013-03-152013-04-22Methods and systems for providing secure transactions
US14/590,951AbandonedUS20150156188A1 (en)2013-03-152015-01-06Methods and systems for providing secure transactions

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/868,019Expired - Fee RelatedUS8959595B2 (en)2013-03-152013-04-22Methods and systems for providing secure transactions

Country Status (2)

CountryLink
US (2)US8959595B2 (en)
WO (1)WO2014150277A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170169125A1 (en)*2015-09-032017-06-15Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
USD875126S1 (en)2016-09-032020-02-11Synthro Inc.Display screen or portion thereof with animated graphical user interface
USD898067S1 (en)2016-09-032020-10-06Synthro Inc.Display screen or portion thereof with animated graphical user interface
USD916120S1 (en)2016-09-032021-04-13Synthro Inc.Display screen or portion thereof with graphical user interface
US20250139270A1 (en)*2023-10-272025-05-01Dell Products L.P.Integrity verification mechanism for protection against container migration attacks

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8335775B1 (en)*1999-08-052012-12-18Oracle International CorporationVersioning in internet file system
US10509773B2 (en)2004-06-102019-12-17Oracle International CorporationDBFS with flashback archive
US9015212B2 (en)*2012-10-162015-04-21Rackspace Us, Inc.System and method for exposing cloud stored data to a content delivery network
US10262151B2 (en)*2014-03-172019-04-16Citrix Systems, Inc.User-agnostic backend storage for cloud-based applications
US9912690B2 (en)*2014-04-082018-03-06Capital One Financial CorporationSystem and method for malware detection using hashing techniques
US10430619B2 (en)*2014-05-152019-10-01International Business Machines CorporationManagement of digital copies of registrations using mobile devices
US10091174B2 (en)*2014-09-292018-10-02Dropbox, Inc.Identifying related user accounts based on authentication data
US20160212142A1 (en)*2015-01-212016-07-21DocEx, Inc.Purpose-specific packages
US11354625B2 (en)2015-07-232022-06-07Adp, Inc.Employment verification system
US10447701B2 (en)*2016-03-182019-10-15Ricoh Company, Ltd.Authentication system, operating apparatus, and authentication method
US10872150B2 (en)2018-06-222020-12-22Red Hat, Inc.Managing virus scanning of container images
US11184423B2 (en)*2018-10-242021-11-23Microsoft Technology Licensing, LlcOffloading upload processing of a file in a distributed system using a key that includes a hash created using attribute(s) of a requestor and/or the file
US11165777B2 (en)2019-05-302021-11-02Bank Of America CorporationControlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11138328B2 (en)2019-05-302021-10-05Bank Of America CorporationControlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11153315B2 (en)*2019-05-302021-10-19Bank Of America CorporationControlling access to secure information resources using rotational datasets and dynamically configurable data containers
GB202009099D0 (en)2020-06-152020-07-29Dataswift LtdPersonal data management platform
US12026561B2 (en)2020-08-272024-07-02Cisco Technology, Inc.Dynamic authentication and authorization of a containerized process
US20220174067A1 (en)*2020-11-272022-06-02Covax Data, Inc.Securing data and tracking actions upon data
CN113051036B (en)*2021-03-312025-07-18京东方科技集团股份有限公司Application program licensing method, device, equipment and medium based on Docker container
US12284224B1 (en)*2023-10-032025-04-22strongDM, Inc.Virtualized permission and security enforcement
US12242599B1 (en)2024-09-272025-03-04strongDM, Inc.Fine-grained security policy enforcement for applications
US12348519B1 (en)2025-02-072025-07-01strongDM, Inc.Evaluating security policies in aggregate
US12432242B1 (en)2025-03-282025-09-30strongDM, Inc.Anomaly detection in managed networks

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060075245A1 (en)*2004-09-302006-04-06Meier Beat ULong-term authenticity proof of electronic documents
US20090006996A1 (en)*2006-08-072009-01-01Shoumen SahaUpdating Content Within A Container Document For User Groups
US20090089337A1 (en)*2007-10-012009-04-02Microsoft CorporationEfficient file hash identifier computation
US20100107101A1 (en)*2008-10-242010-04-29Microsoft CorporationIn-document floating object re-ordering
US20120198448A1 (en)*2010-07-022012-08-02International Business Machines CorporationStorage manager for virtual machines with virtual storage
US20120216246A1 (en)*2005-07-292012-08-23Bit 9, Inc.Parametric content control in a network security system
US20120331108A1 (en)*2011-06-222012-12-27Dropbox, Inc.File sharing via link generation

Family Cites Families (79)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7162635B2 (en)1995-01-172007-01-09Eoriginal, Inc.System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5615268A (en)1995-01-171997-03-25Document Authentication Systems, Inc.System and method for electronic transmission storage and retrieval of authenticated documents
CN101398871B (en)1995-02-132011-05-18英特特拉斯特技术公司Systems and methods for secure transaction management and electronic rights protection
US7143290B1 (en)1995-02-132006-11-28Intertrust Technologies CorporationTrusted and secure techniques, systems and methods for item delivery and execution
US5850442A (en)1996-03-261998-12-15Entegrity Solutions CorporationSecure world wide electronic commerce over an open network
US6023509A (en)1996-09-302000-02-08Intel CorporationDigital signature purpose encoding
US6192407B1 (en)1996-10-242001-02-20Tumbleweed Communications Corp.Private, trackable URLs for directed document delivery
US5920861A (en)1997-02-251999-07-06Intertrust Technologies Corp.Techniques for defining using and manipulating rights management data structures
US6119229A (en)1997-04-112000-09-12The Brodia GroupVirtual property system
US7047416B2 (en)1998-11-092006-05-16First Data CorporationAccount-based digital signature (ABDS) system
US6820202B1 (en)1998-11-092004-11-16First Data CorporationAccount authority digital signature (AADS) system
EP1159799B1 (en)1999-02-262006-07-26Bitwise Designs, Inc.Digital file management and imaging system and method including secure file marking
US6671805B1 (en)1999-06-172003-12-30Ilumin CorporationSystem and method for document-driven processing of digitally-signed electronic documents
CA2272723A1 (en)1999-05-252000-11-25Rdm CorporationDigital signature server
US6629150B1 (en)1999-06-182003-09-30Intel CorporationPlatform and method for creating and using a digital container
US6948069B1 (en)1999-07-022005-09-20Time Certain, LlcMethod and system for determining and maintaining trust in digital image files with certifiable time
US6895507B1 (en)1999-07-022005-05-17Time Certain, LlcMethod and system for determining and maintaining trust in digital data files with certifiable time
US6959382B1 (en)1999-08-162005-10-25Accela, Inc.Digital signature service
US6289460B1 (en)1999-09-132001-09-11Astus CorporationDocument management system
US6931420B1 (en)1999-09-242005-08-16Silanis Technology Inc.Method for the separate authentication of a template and user data
EP1219063B1 (en)1999-09-302013-12-11United States Postal ServiceSystems and methods for authenticating an electronic message
US7797543B1 (en)1999-09-302010-09-14United States Postal ServiceSystems and methods for authenticating an electronic message
US6868406B1 (en)1999-10-182005-03-15Stamps.ComAuditing method and system for an on-line value-bearing item printing system
US7664703B2 (en)1999-10-262010-02-16The Western Union CompanyValue transfer systems and methods
US6904524B1 (en)1999-12-212005-06-07American Management Systems, Inc.Method and apparatus for providing human readable signature with digital signature
US6802002B1 (en)2000-01-142004-10-05Hewlett-Packard Development Company, L.P.Method and apparatus for providing field confidentiality in digital certificates
US7191392B1 (en)2000-03-232007-03-13Virpack.ComSystem and method for the creation of virtual information packages
US7437310B1 (en)2000-03-272008-10-14International Business Machines CorporationThird party contract depository for E-commerce transactions
US7237114B1 (en)2000-04-262007-06-26Pronvest, Inc.Method and system for signing and authenticating electronic documents
US7069443B2 (en)2000-06-062006-06-27Ingeo Systems, Inc.Creating and verifying electronic documents
US20040073617A1 (en)2000-06-192004-04-15Milliken Walter ClarkHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US7606734B2 (en)2000-07-112009-10-20The Western Union CompanyWide area network person-to-person payment
US6978369B2 (en)2000-08-042005-12-20First Data CorporationPerson-centric account-based digital signature system
US7010691B2 (en)2000-08-042006-03-07First Data CorporationABDS system utilizing security information in authenticating entity access
CA2418050C (en)2000-08-042014-05-20First Data CorporationLinking public key of device to information during manufacture
AU2001288309A1 (en)2000-08-182002-03-04Distributed Trust Management Inc.Distributed information system and protocol for affixing electronic signatures and authenticating documents
JP2002091299A (en)2000-08-312002-03-27Internatl Business Mach Corp <Ibm>System and method for digital signature, mediation method and system for digital signature, information terminal, and recording medium
JP4552294B2 (en)2000-08-312010-09-29ソニー株式会社 Content distribution system, content distribution method, information processing apparatus, and program providing medium
US6944648B2 (en)2000-09-222005-09-13Docusign, Inc.System and method for managing transferable records
US20020053021A1 (en)2000-09-252002-05-02Rice Marion R.Internet-based secure document signing network
AU1578202A (en)2000-12-142002-06-24Silanis Technology IncWeb-based method and system for applying a legally enforceable signature on an electronic document
US6963974B1 (en)2000-12-282005-11-08Entrust LimitedMethod and apparatus for providing non-repudiation of transaction information that includes mark up language data
US20030014384A1 (en)2001-02-222003-01-16Alan EwaldDocument exchange system
US6944770B2 (en)2001-05-172005-09-13Intelli-Mark Technologies, Inc.Methods and systems for generating and validating value-bearing documents
US7146500B2 (en)2001-11-142006-12-05Compass Technology Management, Inc.System for obtaining signatures on a single authoritative copy of an electronic record
US7487535B1 (en)*2002-02-012009-02-03Novell, Inc.Authentication on demand in a distributed network environment
CA2849152C (en)2002-06-172015-08-25Robert Al-JaarSystem and method for creating, vaulting, transferring, and controlling transferable electronic records with unique ownership
US8307218B2 (en)2002-06-172012-11-06Silanis Technology Inc.System and method for creating, vaulting, transferring and controlling transferable electronic records with unique ownership
US20050044385A1 (en)2002-09-092005-02-24John HoldsworthSystems and methods for secure authentication of electronic transactions
US6990504B2 (en)2002-10-182006-01-24Tybera Development Group, Inc.Method and system for transmitting secured electronic documents
US7346551B2 (en)2002-12-232008-03-18Cybersource CorporationMethod and apparatus for custom strategy specification in a hosted electronic transaction service system
US7409559B2 (en)2002-12-232008-08-05United Services Automobile AssociationSystem and method of exchanging information via electronic mail
WO2004105311A1 (en)2003-05-152004-12-02Dean Joseph WhitmoreMethod and system for digitally signing electronic documents
US7426637B2 (en)*2003-05-212008-09-16Music Public Broadcasting, Inc.Method and system for controlled media sharing in a network
WO2005029292A1 (en)2003-09-242005-03-31Accenture Global Services GmbhServer-based digital signature
US7752269B2 (en)2004-01-192010-07-06Avaya Inc.Adhoc secure document exchange
US8713108B2 (en)2004-04-222014-04-29Aisin Aw Co., Ltd.Navigation system and navigation apparatus
US8229906B2 (en)2004-05-142012-07-24Sap AgMulti-level version format
US20050278552A1 (en)2004-06-142005-12-15Vincent DelisleSecure virtual account
US20060112271A1 (en)2004-11-222006-05-25Murata Kikai Kabushiki KaishaCipher mail server device
US7568104B2 (en)2005-01-192009-07-28International Business Machines CorporationMethod and apparatus for adding signature information to electronic documents
US7370050B2 (en)2005-02-282008-05-06Microsoft CorporationDiscoverability and enumeration mechanisms in a hierarchically secure storage system
US7711142B2 (en)2005-05-032010-05-04Teselle JohnMethod and system for composing a digital signature graphic appearance and specifying a document display location thereof
US20060291700A1 (en)2005-06-082006-12-28Ogram Mark EInternet signature verification system
US7861077B1 (en)2005-10-072010-12-28Multiple Shift Key, Inc.Secure authentication and transaction system and method
EP1943603A2 (en)2005-10-182008-07-16Intertrust Technologies CorporationMethods for digital rights management
US8176004B2 (en)2005-10-242012-05-08Capsilon CorporationSystems and methods for intelligent paperless document management
JP4839810B2 (en)2005-12-062011-12-21富士ゼロックス株式会社 Electronic document management system, program and method
US8151323B2 (en)*2006-04-122012-04-03Citrix Systems, Inc.Systems and methods for providing levels of access and action control via an SSL VPN appliance
JP2007304982A (en)2006-05-122007-11-22Canon Inc Electronic document management apparatus, electronic document management method, and computer program
JP2008146601A (en)2006-12-132008-06-26Canon Inc Information processing apparatus and information processing method
US7831497B2 (en)2007-03-012010-11-09Rafferty Asset Management, LlcBeta adjustment for leveraged index products
US20100217988A1 (en)2007-04-122010-08-26Avow Systems, Inc.Electronic document management and delivery
US8219974B2 (en)2007-12-072012-07-10Sap AgEnforcing legal holds of heterogeneous objects for litigation
US20100042846A1 (en)*2008-08-132010-02-18Trotter Douglas HTrusted card system using secure exchange
US20100191701A1 (en)2009-01-232010-07-29American International Group, Inc.System and method for managing a business process and business process content
US8976003B2 (en)2009-09-232015-03-10International Business Machines CorporationLarge-scale document authentication and identification system
US8244767B2 (en)2009-10-092012-08-14Stratify, Inc.Composite locality sensitive hash based processing of documents
CN102208047A (en)2010-03-302011-10-05鸿富锦精密工业(深圳)有限公司System and method for checking signoff information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060075245A1 (en)*2004-09-302006-04-06Meier Beat ULong-term authenticity proof of electronic documents
US20120216246A1 (en)*2005-07-292012-08-23Bit 9, Inc.Parametric content control in a network security system
US20090006996A1 (en)*2006-08-072009-01-01Shoumen SahaUpdating Content Within A Container Document For User Groups
US20090089337A1 (en)*2007-10-012009-04-02Microsoft CorporationEfficient file hash identifier computation
US20100107101A1 (en)*2008-10-242010-04-29Microsoft CorporationIn-document floating object re-ordering
US20120198448A1 (en)*2010-07-022012-08-02International Business Machines CorporationStorage manager for virtual machines with virtual storage
US20120331108A1 (en)*2011-06-222012-12-27Dropbox, Inc.File sharing via link generation

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170169125A1 (en)*2015-09-032017-06-15Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
US10410604B2 (en)2015-09-032019-09-10Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
US10522112B2 (en)*2015-09-032019-12-31Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
US11145275B2 (en)2015-09-032021-10-12Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
US11776506B2 (en)2015-09-032023-10-03Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
US12334038B2 (en)2015-09-032025-06-17Synthro Inc.Systems and techniques for aggregation, display, and sharing of data
USD875126S1 (en)2016-09-032020-02-11Synthro Inc.Display screen or portion thereof with animated graphical user interface
USD898067S1 (en)2016-09-032020-10-06Synthro Inc.Display screen or portion thereof with animated graphical user interface
USD916120S1 (en)2016-09-032021-04-13Synthro Inc.Display screen or portion thereof with graphical user interface
US20250139270A1 (en)*2023-10-272025-05-01Dell Products L.P.Integrity verification mechanism for protection against container migration attacks

Also Published As

Publication numberPublication date
US20140282900A1 (en)2014-09-18
WO2014150277A3 (en)2014-11-20
US8959595B2 (en)2015-02-17
WO2014150277A2 (en)2014-09-25

Similar Documents

PublicationPublication DateTitle
US8959595B2 (en)Methods and systems for providing secure transactions
US20240169457A1 (en)Systems and methods for executing and delivering electronic documents
US20170026180A1 (en)Method and database system for secure storage and communication of information
EP3627363A1 (en)Information processing system, devices and methods
US20090271321A1 (en)Method and system for verification of personal information
US10992683B2 (en)System and method for authenticating, storing, retrieving, and verifying documents
US20110270748A1 (en)Methods and apparatus for a financial document clearinghouse and secure delivery network
JPH10504150A (en) A method for securely using digital signatures in commercial cryptosystems
EP3794537B1 (en)Blockchain-based trustable guarantees
EP3794484B1 (en)Blockchain-based trustable guarantees
EP3841550B1 (en)Storage management based on message feedback
EP3844942B1 (en)Blockchain-based message services for time-sensitive events
US20250117848A1 (en)Integrated platform for digital asset registration, tracking and validation
US20240171414A1 (en)Blockchain-based electronic document vault
US20250167999A1 (en)Compliance Platform for use with Identity Data
US11916916B2 (en)System and method for authenticating, storing, retrieving, and verifying documents
InfrastructureINFORMATION SECURITY Advances and Remaining Challenges to Adoption of Public

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:BULLAPROOF, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, GENE SHIH-CHING;WANG, SHERMAN;REEL/FRAME:034657/0888

Effective date:20130420

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp