Document transmission techniques IV
First Claim
1. A method of determining the authenticity of a digital document sent by an unknown sender, the method comprising:
- receiving a digital document, an encrypted digest of the document created by the sender using a hash algorithm, the digest being encrypted using a first token of the sender;
obtaining a second token relating to the first token;
decoding the encrypted digest using the second token;
using a hash algorithm to create a digest of the document; and
comparing the decrypted received digest with the newly created digest to determine the authenticity of the sender and the document.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of determining the authenticity of a digital document sent by an unknown sender. The method comprises receiving a digital document and an encrypted digest of the document created by the sender using a hash algorithm. The digest is encrypted using a first token, such as a private key, of the sender. The method also comprises obtaining a second token, such as a public key, relating to the first token, decoding the encrypted digest using the second token, using a hash algorithm to create a digest of the document; and comparing the decrypted received digest with the newly created digest to determine the authenticity of the sender and the document. The receiving step may comprise receiving a digital certificate of the sender within which the second token is contained as part of the sender'"'"'s digital certificate. Also the validity of the sender'"'"'s certificate can be checked on-line.
-
Citations
19 Claims
-
1. A method of determining the authenticity of a digital document sent by an unknown sender, the method comprising:
-
receiving a digital document, an encrypted digest of the document created by the sender using a hash algorithm, the digest being encrypted using a first token of the sender;
obtaining a second token relating to the first token;
decoding the encrypted digest using the second token;
using a hash algorithm to create a digest of the document; and
comparing the decrypted received digest with the newly created digest to determine the authenticity of the sender and the document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of sending a digital document to a recipient together with data enabling the document and the sender to be authenticated, the method comprising:
-
creating a digest of the document using a hash algorithm;
encrypting the digest using a first token of the sender;
obtaining a second token relating to the first token of the sender, which can be used to decrypt the encrypted digest;
sending the encrypted digest, the digital document and the second token to the recipient. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A device for determining the authenticity of a digital document sent by an unknown sender, the device comprising:
-
a communications module arranged to receive the document, an encrypted digest of the document created by the sender using a hash algorithm, the digest being encrypted using a first token of the sender, and a second token relating to the first token; and
a controller arranged to decode the encrypted digest using the second token;
creating a digest of the document using a hash algorithm; and
comparing the decrypted received digest with the newly created digest to determine the authenticity of the sender and the document.
-
-
19. A device for sending a digital document to a recipient together with data enabling the document and the sender to be authenticated, the device comprising:
-
a controller arranged to create a digest of the document using a hash algorithm and to encrypt the digest using a first token of the sender; and
a communications module arranged to obtain a second token related to the first token of the sender, which can be used to decrypt the encrypted digest and to send the encrypted digest, the digital document and the second token to the recipient.
-
Specification