Method of authenticating a plurality of files linked to a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S180000, C380S028000

Reexamination Certificate

active

07117367

ABSTRACT:
A method of authenticating a text document with links to a plurality of files by modifying at least a selected attribute of invisible characters on a plurality of inter-word intervals of the text document, this method comprising the steps of computing (step10) a one-way hash function of each file in order to obtain a hash value composed of a subset of hash digits for each one, encoding (step16) each subset of a plurality of subsets of space characters in the document by replacing in each subset of space characters, the value of the selected attribute for each space character by a corresponding encoded hash digit of each subset of hash digits corresponding to each file, computing (step18) the electronic signature of the encoded text document by using a public-key algorithm composed of a subset of signature digits, and encoding (step20) another subset of space characters in the encoded document by replacing the value of the selected attribute for each space character by a corresponding encoded signature digit.

REFERENCES:
patent: 5499294 (1996-03-01), Friedman
patent: 5629770 (1997-05-01), Brassil et al.
patent: 5915024 (1999-06-01), Kitaori et al.
patent: 5958051 (1999-09-01), Renaud et al.
patent: 6772342 (2004-08-01), Hawthorne
patent: 2002/0013794 (2002-01-01), Carro et al.
patent: WO 97/14087 (1997-04-01), None
patent: WO 00/77677 (2000-06-01), None
Bender et al. “Techniques for Data Hiding,”IBM Systems Journal,vol. 35, Nos. 3-4, 1996 pp. 313-335, No publication month & date. Accepted for publication on Feb. 29, 1996.
Brassil et al “Electronic Marking and Identification Techniques to Discourage Document Copying,”IEEE Journal on Selected Areas in Communications,vol. 13, No. 8, October 1995, pp. 1495-1503.
Dittman et al., “H2O4M—Watermarking for Media: Classification, Quality Evaluation, Design Improvements,”Proceedings of the 2000 ACM Workshops on Multimedia.pp. 107-110, Nov. 2000.
Kohl et al. “Security for the Digital Library-Protecting Documents Rather than Channels,”Database and Expert Systems Applications.Aug. 26-28, 1998, pp. 316-321.
Krawczyk et al. “HMAC: Keyed-Hashing for Message Authentication,” Feb. 1997, pp. 1-11.
Lacy et al. “Music on the Internet and the Intellectual Property Protection Program,”ISIE '97,Jul. 7, 1997.
“Secure Hash Standard,” Federal Information Processing Standards Publication 180-1. Apr. 17, 1995, pp. 1-18.
Su et al. “Digital Watermarking of Text, Image, and Video Documents,”Computers and Graphics, Pergamon Press, Ltd.vol. 22, No. 6, Dec. 1998.
International Search Report dated Jun. 25, 2003 for corresponding PCT application No. PCT/EP02/06928.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of authenticating a plurality of files linked to a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of authenticating a plurality of files linked to a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of authenticating a plurality of files linked to a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3622373

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.