Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2007-10-23
2007-10-23
Revak, Christopher (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C726S002000
Reexamination Certificate
active
10659111
ABSTRACT:
Method and system for verifying the authenticity and integrity of files transmitted through a computer network. Authentication information is encoded in the filename of the file. In a preferred embodiment, authentication information is provided by computing a hash value of the file, computing a digital signature of the hash value using a private key, and encoding the digital signature in the filename of the file at a predetermined position or using delimiters, to create a signed filename. Upon reception of a file, the encoded digital signature is extracted from the signed filename. Then, the encoded hash value of the file is recovered using a public key and extracted digital signature, and compared with the hash value computed on the file. If the decoded and computed hash values are identical, the received file is processed as authentic.
REFERENCES:
patent: 5958051 (1999-09-01), Renaud et al.
patent: 5978791 (1999-11-01), Farber et al.
patent: 6367012 (2002-04-01), Atkinson et al.
patent: 6393468 (2002-05-01), McGee
patent: 2002/0174341 (2002-11-01), Logue et al.
UIUC DLI Testbed Processing Customization; http://dli.grainger.uiuc.edu/papers/coletext.htm; 8 pages, Mar. 12, 1996.
Can I support long file names on my Mac?; http://www.zdnet.co.uk/help/tips/story/0,2802,e7107647,00.html; 2 pages, Dec. 21, 2000.
Secure Hash Standard; http://www.itl.nist.gov/flpspubs/flp180-1.htm; 18 pages, Apr. 17, 1995.
Bender, et al.; Techniques for data hiding; IBM Systems Journal, vol. 35, Nos. 3&4; 1996; pp. 313-336, 1996.
Schneier, Bruce; Applied Cryptography, Second Edition, Protocols, Algorithms, and Source Code in C; 15 pages, 1996.
Besrour Saoussen
International Business Machines - Corporation
Irvin David R.
Revak Christopher
Schmeiser Olsen & Watts
LandOfFree
Method and system for encoding signatures to authenticate files does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for encoding signatures to authenticate files, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for encoding signatures to authenticate files will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3826062