Method for certifying the authenticity of digital objects by...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S156000, C713S175000, C713S176000

Reexamination Certificate

active

06622247

ABSTRACT:

FIELD OF THE INVENTION
This invention relates generally to global information systems, and more particularly to certifying the authenticity and correctness of digital objects used in global information systems.
BACKGROUND OF THE INVENTION
Global information systems, such as the Internet, have greatly reduced the cost of producing and distributing digital information and services, i.e., content. For the purpose of storing, accessing, processing, and distributing, the content can be packaged as digital objects. The content of digital objects can be text, audio, video, images, software programs, digital scrip, and so forth. Supporting digital objects in global information systems may require additional infrastructure services such as repository management, data processing, and communication networks.
Conceptually, a digital object includes two main components, data and metadata. The data includes the content, and the metadata describes the content. Typically, the metadata contain a persistent unique identifier of the object. In addition, the metadata can also include access, ownership, and licensing information pertaining to the underlying content.
In order to interact with a digital object, the object must be processed. For example, if the object includes as content a video, the processing simply renders the video. Other types of processing can include transforming, distributing, replicating, compressing, repackaging, caching, communicating, aggregating, encrypting, brokering, billing, maintaining, and the like. Therefore, in some cases, it makes sense to include the processes, e.g., software programs, with the digital object.
It is desired to provide a method that can certify the authenticity and correctness of digital objects before they are used.
SUMMARY OF THE INVENTION
A computerized method is provided for certifying a digital object. The digital object is uniquely identified with an fingerprint identification. The identification is registered with a certification authority using a first public/private key exchange to receive a certificate of the digital object.
The digital object supplier identity is established though a certification authority. This can then be used to provide assurance of the authenticity of a digital object. The digital object is tested to receive a compliance label using a second public/private key exchange of the third party testing authority. The digital object is then distributed along with the certificate, and the label using a third public/private key exchange to consumers. Encoding/encryption methods are used to provide, for trusted information exchange in all of the above operations.
The consumer can then confirm the authenticity and correctness of the digital object. Based on this verification, suitability for consumption can be determined. After the digital object has been distributed, it is also possible to re-affirm the certification. Furthermore, third parties to the consumer, e.g., suppliers, certification authorities, testing authorities, and regulatory authorities, can revoke the certification.


REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 5079707 (1992-01-01), Bird et al.
patent: 5136647 (1992-08-01), Haber et al.
patent: 2002/0112034 (2002-08-01), Feik
Kruckeberg, Certification of Software, Automatisierungstechnishe-Praxis vol 31, 9 pp. 439-444 1989.*
Newton, H. Newton's Telecomm Dictionary. 8thEdition. Flatiron Publishing. 1994. p. 553.*
Schneier, B. Handbook of Applied Cryptography. Second Edition. John Wiley and Sons. 1996. (CIP 1995). pp. 1, 2, 37-39, and 185-187.*
Willett, S. “Novell focuses on third-party products, improves testing process.” Computer Reseller News. Jan. 2, 1995. Issue 611. p. 47.*
Anonymous Author. “FUD Finally Fades Into Oblivion.” Data Communications. Dec. 1993. vol. 22, Iss. 18. p. 138. Abstract.*
Anonymous Author. “Printers Postscript Clones Face Compatibility Test Suites.” InfoWorld. Oct. 10, 1988. vol. 10, Iss. 41. p. 31. Abstract.*
Anthony, Charles. “Testing Goes Automatic.” Quality. Jan. 1986. vol. 25, Iss. 1. p. 54. Abstract.*
Witt, Clyde. “Emphasizing transport in transport packaging.” Material Handling and Engineering. Jan. 1995. vol. 50, Iss. 1. p. 22.*
Lampson et al.; Authentication in Distributed Systems; Theory and Practice; Proceedings of the Thirteenth ACM Symposium on Operating Systems Principles; pp. 1-47; 1992.
Brownstein, Executive Director; Managing Access to Digital Information: An Approach Based on Digital Objects and Stated Operations; Cross-Industry Woriing Team Corporation for National Research Initiatives; pp. 1-27; 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for certifying the authenticity of digital objects by... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for certifying the authenticity of digital objects by..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for certifying the authenticity of digital objects by... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3088723

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.