Method and system for encoding signatures to authenticate files
First Claim
1. A computer file containing digital data wherein authentication information is encoded in the filename of said computer file at a predetermined position or using delimiters.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and system for verifying the authenticity and integrity of files transmitted through a computer network. Authentication information is encoded in the filename of the file. In a preferred embodiment, authentication information is provided by computing a hash value of the file, computing a digital signature of the hash value using a private key, and encoding the digital signature in the filename of the file at a predetermined position or using delimiters, to create a signed filename. Upon reception of a file, the encoded digital signature is extracted from the signed filename. Then, the encoded hash value of the file is recovered using a public key and extracted digital signature, and compared with the hash value computed on the file. If the decoded and computed hash values are identical, the received file is processed as authentic.
58 Citations
13 Claims
-
1. A computer file containing digital data wherein authentication information is encoded in the filename of said computer file at a predetermined position or using delimiters.
-
2. A method for encoding authentication information in the filename of a computer file containing digital data, said method comprising the steps of:
-
computing a digital signature of the computer file using a private key of a sender; and
,encoding said computed digital signature in a filename of said computer file at a predetermined position or using delimiters. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for authenticating a computer file having a filename comprising authentication information, said method comprising the steps of:
-
extracting said authentication information from the filename of the computer file at a predetermined position or using delimiters;
recovering an encoded hash value of the computer file by using a public key of a sender of the computer file and the extracted authentication information;
computing a hash value of said computer file using a hash function used by the sender to generate the encoded authentication information;
comparing the encoded and the computed hash values; and
,if the encoded and the computed hash values are identical, processing the computer file, else, if the encoded and the computed hash values are different, rejecting the computer file. - View Dependent Claims (11, 12, 13)
-
Specification