Claims
- 1. A method comprising
authenticating one or more portions of a digital object using verification information contained in a unique persistent identifier for the object as a whole,
- 2. The method of claim 1 in which the verification information is over the portion or portions of the digital object not including the object's identifier.
- 3. A medium bearing a unique persistent identifier associated with a digital object, the identifier including information derived from the digital object and sufficient to enable a machine to verify that the digital object with which the identifier is associated is unchanged from what it was at an earlier point in time.
- 4. The method of claim 1 in which one or more portions of the digital object comprise a separate digital object having an associated unique persistent identifier, the unique persistent identifier including verification information.
- 5. A method comprising
forming a digital object including a determinable portion or portions containing a hash of another digital object, the hash being cryptographically generated, and including in the identifier of the object as a whole, verification information for portions of the digital object including the determinable portion or portions containing the hash.
- 6. The method of claim 5 in which the hash includes a digital signature.
- 7. The method of claim 5 in which the digital object comprises other digital objects each with an identifier and verification information.
- 8. The methods of claims 1 or 5 also including identifying fraud or data corruption using data derived from the previously existing digital object.
- 9. The method of claims 1 or 5 also including withholding the previously existing digital objects from public dissemination.
- 10. The method of claim 5 in which a holder of the digital object cannot access the portions of the incorporated digital objects including their identifiers to verify the content of each of the digital objects included in the whole.
- 11. The method of claim 5 in which the digital object comprises identifiers of one or more of the identifiable digital objects.
- 12. A method comprising
determining an identity of a computational facility in which a digital object is stored and from which it can be accessed using an identifier of the digital object and a network-based identifier resolution system, the identifier including information from which the digital object can be verified.
- 13. The method of claim 1, 5, or 12 comprising using a cryptographically controlled identifier resolution mechanism to confirm an owner of a digital object based on the identifier of the digital object.
- 14. A method comprising
transferring a digital object from one party to another by conveying an authorization string and a unique identifier of the digital object, the digital object being remotely accessed for purposes of verification, the authorization string being used to invoke change of control in a resolution system based on the identifier, the control being changed without an issuer of the digital object being required to be involved in the change.
- 15. The method of claim 14 in which the digital object comprises an original and also including tracking the transfer of the digital object from place to place over time.
- 16. The method of claim 14 in which the digital object comprises an original, the method also including transferring duplicates of the original.
- 17. The method of claim 14 in which the change of control includes transferring the digital object from the one party to the other.
- 18. The method of claim 14 in which an instance of a digital object, on being initially created, can be tracked throughout the system
- 19. A method comprising
publishing by an authorized party of an algorithm for use in verifying the authenticity of digital objects.
- 20. A method comprising
based on current identifiers of digital objects, using a resolution mechanism to contact computational facilities containing the digital objects, producing and sending replacement digital objects to these facilities, inserting revised information about the identity of new computational facilities and new identifiers for the replacement digital objects in the resolution system, and rendering prior information about computational facilities and public keys invalid by revoking access to the resolution system with respect to the old identifiers by the current owners.
- 21. A method comprising
forming a data body, forming information based on the data body from which the authenticity of the data body may be verified, forming a digital object including the data body, forming an identifier of the digital object, the identifier including the verification information, and transferring the digital object to a computational facility.
- 22. A method comprising
comparing a digital object with a pre-existing digital object from which it was derived, and determining an existence of fraud based on the results of the comparison.
- 23. The method of claim 22 in which the existence of fraud in a digital object is determined by comparing the digital object from which it was derived with an ancestor digital object from which it was derived.
- 24. A method comprising
publishing by a party that originates a digital object of a fingerprinting algorithm for use in verifying the authenticity of at least a portion of the digital object.
Parent Case Info
[0001] This application is entitled to and claims the benefit of the priority of the filing date of provisional U.S. patent application serial No. 60/369,591, filed Apr. 2, 2002, which is incorporated in its entirety by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60369591 |
Apr 2002 |
US |