System and method of authentication of digital information

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S179000, C713S157000

Reexamination Certificate

active

06260145

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to an authentication system and method which, when electronic transactions are conducted between organizations, verifies that a document has been transferred through an authorized creator and approvers and appends the representative' s digital signature to the document that has been circulated via the correct route.
2. Description of the Related Art
In recent years, companies have been confronted by a problem of illegal transactions by their employees. The recent illegal transactions show a tendency for a sharp increase in the sum of money involved and to become longer in term. The prevention of illegal transactions is one of the important problems which confronts companies. With the recent spread of the Internet, there is a trend toward conducting electronic transactions between companies. In such electronic transactions, the prevention of illegal transactions is necessary.
With the electronic transactions, the development of authentication technologies utilizing recent cryptographic techniques enables electronic authentication of individuals on a computer network. For example, for a user A to send a document to a user B, the user A appends his or her digital signature to that document. The user B who receives the document can then confirm that the received document was one created by the user A by verifying the digital signature of the user A.
However, the network-based electronic transactions have the following problems.
By utilizing an authentication technology for intra-company documents, persons in charge of handling a document, such as a creator and an approver of that document, can be identified. The authentication technology is merely adapted to identify each individual. That is, although the person who created the document can be identified, it is impossible to determine whether that person really has authority to create the document. Likewise, although the person who approved the document can be identified, it is impossible to determine whether that person is really authorized to approve the document.
With documents that are communicated within a company, mere identification of persons who handled a document is not sufficient; it is important whether or not the persons who handled the document are authorized to handle it.
In electronic transactions between companies, assume that a company A sends a document to a company B. Then, the company A will append the representative's digital signature to that document in order to indicate that it was definitely created by the company A. The company B can verify the digital signature appended to the received document to confirm that the document was definitely created by the company A.
If the company A gives means of appending the representative's digital signature to a person in charge of creating or inspecting documents, there will arise the possibility that this person may append the representative's digital signature even to documents which are not related to his or her duties, to thereby perform illegal transactions. In order to conduct secure electronic transactions between companies, therefore, it is required for a document-sending company to install such a system as allows the representative's digital signature to be attached to a document immediately prior to transmission of it.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide an authentication system and method which systematically verifies that a person who handles a document has authority to handle it, and automatically appends the representative's digital signature to the verified document to thereby prevent illegal transactions.
The authentication system of the present invention comprises an authentication apparatus and terminal units of respective persons in charge, which are all configured for a communications network.
In a first aspect of the present invention, the authentication apparatus is equipped with a confidential information storage unit and a verification unit. The confidential information storage unit stores confidential information corresponding to digital information to be circulated, and the verification unit verifies on the basis of the confidential information and information appended to the digital information that the digital information has been circulated correctly, or via the correct route.
As the confidential information, for example, use is made of the result of the application of each of the functions that have been allocated to the persons in charge who handle the digital information to the verification data, in the sequence in which the information is to be circulated through the persons in charge.
The digital information is transmitted outside of the company with the representative's digital signature appended only when a match occurs between the confidential information and information appended to the digital information. In this manner, illegal transactions by employees are prevented.
In a second aspect of the present invention, each terminal unit is equipped with a communications unit and a conversion unit. The communications unit receives the digital information to be circulated and sends it to the next terminal unit. At this point, the conversion unit converts the information appended to the digital information in accordance with an algorithm allocated to the corresponding person in charge. For example, the above-described allocated function may be used as the algorithm.
In a third aspect of the present invention, the authentication apparatus is equipped with a communications unit and a verification unit in order to circulate information relating to intercompany transactions through one or more persons in charge within a company. The communications unit receives digital information that have been circulated through the persons in charge and the verification unit verifies that the digital information has been circulated correctly on the basis of information appended to the digital information.


REFERENCES:
patent: 4219151 (1980-08-01), Haruki
patent: 4450535 (1984-05-01), Pommery et al.
patent: 4679236 (1987-07-01), Davies
patent: 5276737 (1994-01-01), Micali
patent: 5390247 (1995-02-01), Fischer
patent: 5455865 (1995-10-01), Perlman
patent: 5465299 (1995-11-01), Matsumoto et al.
patent: 5606609 (1997-02-01), Houser et al.
patent: 5608721 (1997-03-01), Natarajan et al.
patent: 5610982 (1997-03-01), Micali
patent: 5638447 (1997-06-01), Micali
patent: 5748960 (1998-05-01), Fischer
patent: 5754659 (1998-05-01), Sprunk et al.
patent: 5787172 (1998-07-01), Arnold
patent: 5825880 (1998-10-01), Sudia et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method of authentication of digital information does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method of authentication of digital information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method of authentication of digital information will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2477655

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.