System and method for authenticating data transmissions from a digital scanner
First Claim
1. A method for authenticating data transmission between a network-connected digital scanner and a terminal, the method comprising:
- scanning a document at a digital scanner;
signing the scanned document with a private key of a first asymmetric key-pair to create a first signature;
transmitting the scanned document and first signature to a first network-connected terminal; and
, at the first terminal, using a public key of the first key-pair to authenticate the transmitted document.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for authenticating data transmission between a network-connected digital scanner and a terminal. The method comprises: scanning a document at a digital scanner; signing the scanned document with a private key of a first asymmetric key-pair to create a first signature; transmitting the scanned document and first signature to a network-connected terminal; and, at the terminal, using a public key of the first key-pair to authenticate the transmitted document.
Typically, signing the scanned document with a private key of a first asymmetric key-pair to create a first signature includes: creating a one-way hash function of the scanned document; and, encrypting the one-way hash function with the private key. Then, using a public key of the first key-pair to authenticate the transmitted scanned document includes: creating a one-way hash function of the transmitted document; decrypting the transmitted first signature with the public key; and, comparing the one-way hash function of the transmitted document to the decrypted signature. Some aspects of the method include the further steps of: at the digital scanner, establishing a user identity test, for example a PIN number, associated with the terminal; and submitting proof of user identity when a document is to be transmitted. Then, the scanned document and signature are transmitted in response to passing the user identity test, for example inputting the PIN number.
32 Citations
25 Claims
-
1. A method for authenticating data transmission between a network-connected digital scanner and a terminal, the method comprising:
-
scanning a document at a digital scanner;
signing the scanned document with a private key of a first asymmetric key-pair to create a first signature;
transmitting the scanned document and first signature to a first network-connected terminal; and
,at the first terminal, using a public key of the first key-pair to authenticate the transmitted document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating data transmission, the system comprising:
-
a digital scanner having a repository for a private key of a first asymmetric key-pair and an interface for receiving documents, the digital scanner scanning a submitted document, signing the scanned document with the private key to create a first signature, and transmitting the scanned document and first signature at an output; and
,a first terminal having a repository for a public key of the first key-pair and an input to accept the transmitted document and the transmitted first signature from the digital scanner, the first terminal using the public key to authenticate the transmitted document. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification