Not Applicable
Not Applicable
Not Applicable
The present invention relates to computer electronic documents comprised of multiple sections, in particular the characteristics of section inclusion and “inclusion order” and the authentication of these characteristics in an incremental nature.
U.S. Pat. No. 5,754,659 defines a method which produces a separate hash key for each information group without introducing information from the previous information group into the information group. Then a combined hash key is produced of the information group hash keys. A digital signature is computed from the combined hash key allowing means of authentication of the set of hash keys. There is no means defined of incorporating hash key information into the next information group then computing a hash key of the information group and previous hash key.
U.S. Pat. No. 6,327,656 put forth methods which are to be used by a server dependent on the type of certification request received from a client. The process and methods described in U.S. Pat. No. 6,327,656 do not provide any mechanism to inherently support authentication of section inclusion and inclusion order. U.S. Pat. No. 6,327,656 provide methods for independent third part authentication of document with a digital signature, a unique serial number, and time and date information. These methods allow other third parties to have the server third party verify and certify a document as being original.
U.S. Pat. No. 7,100,045 puts forth a method in which date information and a digital signature supplied by a third party produced from the first party document to create a third party digital signature to use as a certification and authentication of the first party document. This method does not use a watermark method which provides authentication of section inclusion and inclusion order.
U.S. Pat. No. 7,191,156 puts forth a method using a client/server architecture in which the signing of data uses steganographic to encode digital signature information from a message sent to a remote computer which is used to authenticate the transmitted document. There is no provision in this method to authenticate document inclusion and inclusion order of separate documents in a sequence of documents.
U.S. Pat. No. 7,162,635 define methods for a system which provides verifiable chain of evidence and security for the retrieval of documents and other information objects. These methods do not use a watermark which authenticates section inclusion and inclusion order.
U.S. Pat. No. 7,194,636 defines a method which provides the use of digital signature to authenticate that data content or document and the digital signature of the storage device used to store said document and then being able to authenticate that said document is on the approved storage device. There is no provision for authentication of document section inclusion or inclusion order utilizing a watermark.
U.S. Pat. No. 6,021,491 defines a method to prove document file inclusion by generating digital signatures for each file of a file set placing these digital signatures into a signature file. The signature file then has a digital signature generated for it to verify its authenticity. File inclusion is validated by the mere fact that its digital signature is placed in the signature file. There is no mechanism defined for which to authenticate file inclusion order in this method. There is no provision for authentication of document section inclusion or inclusion order utilizing a watermark.
U.S. Pat. No. 6,796,489 describe a method for reconstruction of a previous state of a document and then using a digital signature to verify that the reconstruction was correct. This method also provides a method to record an electronic document with a recording third party using digital signatures. There is no provision for authentication of document section inclusion or inclusion order utilizing a watermark.
U.S. Pat. No. 6,311,271 describe a method in which a stream of digital data is divided into original blocks and ancillary information is added to each of the blocks. A signature of not all combined but one or more of the combined blocks is computed and divided into parts to be embedded as part of the ancillary information in each of the blocks transmitted. There is no digital signature of each individual original block including a watermark from the previous block. The method of determining section inclusion and inclusion order is different than the method of the current invention because it does not include a watermark in each block. It also does not compute a digital signature of each block.
U.S. Pat. No. 5,958,051 define methods which utilizes a separate signature file including digital signatures from separate files to be authenticated. All files are treated as independent documents and are not considered as part of a single document chain even though they maybe. Each file has a separate digital signature which is not dependent on the results of the signature of the previous file included in the signature file. The mechanism for determining file inclusion and inclusion order would be simply the order in the signature file and is not dependent on information from a watermark of the previous file in the signature file.
U.S. Pat. No. 7,065,650 defines methods verifying the integrity of a collection of digital objects by computing a hash value for each object then placing these hash values of each object into a hash file and computing a digital signature of the hash file. Digital object inclusion and inclusion order are determined by the order of hashes placed in the hash file. There is no watermark used from the previous digital object in the computation of the current digital object.
U.S. Pat. No. 6,418,457 defines an application to create a system of digitally signed documents including a document creator, an inventor's digital signature with a time stamp, and a witness's digital signature with time stamp of the inventor's document. This system does not use a watermark from the previous document in the computation of the current document's digital signature. This method does not provide a mechanism to authenticate document inclusion of in a particular inventor's notebook except perhaps by using a title of the document or a notebook title embedded in the document. This method also defines a set of user groups for administration, inventor, and witness roles. There is no watermark used to authenticate document inclusion and inclusion order in this method.
U.S. Pat. Nos. 6,085,322 and 5,872,848 defines a method for an originating party and a verifying party to digitally sign a single document in such a way that the authenticity of the document can be verified. Since this is a method for signing single documents it does not include a watermark from previous documents and has no provision for authenticating document inclusion or inclusion order in a document authentication chain.
U.S. Pat. No. 7,069,443 define a method to apply multiple digital signatures to a single electronic document and then also computing a digital signature of the signatures. This method is described to be used on a single electronic document and therefore does not use a watermark from a previous document in the digital signature computations of the current document. There is also no provision from authenticating document inclusion or inclusion order.
The concept of a “document” used here relates to what is commonly known as a computer electronic document which is contained in one or more computer files. Document used here also represents any computer file(s) containing digital information which is binary information.
For some legal and operational scenarios it is important to be able to validate 1) the order in which a document has been created or modified, 2) what was previously part of the document has not been changed, 3) the set of sections or files making up the document are in fact part of the document, and 4) it may also be important to determine the original document author. This set of characteristics of a document is the document characteristics and the validation of these characteristics shall be the document authentication for the purposes of this invention. The author characteristic is an optional document characteristic and not necessary to authenticate characteristics 1, 2, and 3 above.
It is important that document authentication be capable of being carried out by a third party such that the third party can determine the validity of the document characteristics. Asymmetric key digital signature is used to provide the third party authentication capability. Secret key digital signature would be just as effective for authentication.
“Section(s)” of a document for the purpose of this invention shall refer to either a separate file or an appended record to the end of a file. A document could therefore be comprised of a single file or multiple files. Often electronic documents are created in multiple parts as a result of separate editing sessions. For a single file the results of an editing session can be appended too the end of the file without modifying the previous data of the document. The appended record then represents an added section to the document. Documents in which each creation/editing session results in data representing a section may also be keep in a separate file. This separate file storage format results in multiple files making up the document. This invention provides a method to irrefutably authenticate the document characteristics of document creation scenarios using either of these storage formats. The process of adding a section to a document is referred to as section commitment. A document comprising multiple committed sections is referred to as the “document authentication chain” or “authentication chain”.
A section would be first created in some form of a word and/or graphic processing application resulting in a file containing binary information. Once a document section is complete it then is committed to the document authentication chain. Authentication chain commitment requires, in this order, the inclusion of a watermark from the previous section into the pre-committed section, the computation of a message digest (MD) of the section and watermark, and then the digital signing of section/watermark MD by a third party.
Proof of section inclusion or modification of a document is particularly important. It is also important to authenticate section inclusion before a document is complete. The document inclusion characteristic supported by the authentication chain is an incremental characteristic of the document being built. So all sections currently making up the document must be authentication capable at anytime. When a new section is added it must then be committed to the authentication chain becoming irrefutably part of the document and the commitment does not disturb the authentication chain prior to the new section. This invention is a method by which sections can be shown to be incrementally part of a particular document using a watermark from the previous section. A third party is then able to prove that sections of a document are in fact part of that target document providing authentication for scenarios that require this type of evidence.
Document section inclusion order represents the order of creation and modification of the document. This invention provides a method for third party authentication of the sequence of section inclusion using Digital Signature methods. With our invention it is possible to authenticate the order that sections have been added without using a date and time. However, most legal and operational scenarios for other reasons are best supported when a date and time have been affixed to each section.
Validation that prior sections have not changed once a new section has been added is accomplished by the watermark that is carried forward from the prior section to the new section. If any prior section is changed then that section and the subsequent sections will not authenticate using the third party signature.
Authorship can be included by placing the author's signature of the MD of the first document section, the header, as a data member of the first section. The author's signature is only required to be part of the header. The author's signature is also not required to authenticate section inclusion, section inclusion order, and section modification detection. By not requiring the author to apply a digital signature to each section, the document authentication chain application must provide adequate author authentication capability. If there is no author authentication then the author must apply a digital signature to each section of the document.
Document authentication chains do not require support directly from either word processing or graphic processing applications. The creation of document authentication chains can be supported by a stand alone application which would take data files from any application and then add them to a document authentication chain. The inventors have built a document authentication chain demonstration application utilizing the computing and software development resources of the University of Advancing Technology. This demonstration application successfully creates the described authentication chain capable of including documents or files from any other application. Examples of three applications which would utilize this invention include an electronic engineering notebook, medical records, and legal records.
Referring to
Referring to
Referring to
Carrying the Document Signature 4