Information capturing, indexing, and authentication system
First Claim
1. An information capturing and indexing system comprising:
- a database selection module that enables selection of a plurality of files for inclusion into at least one selectable database and that further enables individual selection of any of the plurality of files after they have been included into the at least one selectable database;
an authentication module operable to generate and insert authentication codes into each of the plurality of files, the authentication module being further operable to compare the authentication code in an individually selected one of the plurality of files with one or more attributes of the individually selected file to detect whether the individually selected file is compromised; and
an index module that enables generation of a searchable index of the plurality of files.
2 Assignments
0 Petitions
Accused Products
Abstract
An information capturing system and method is provided with a file authentication feature. The system generates and insert authentication codes into files selected for inclusion into a database. The system also compares the authentication code of a file selected from the database with one or more attributes about the selected file to detect whether the individually selected file was compromised. In one embodiment, the authentication code is derived from the content of the file itself. In another embodiment, the authentication code is derived from the date and time the system expects to save the file to the database. Yet another embodiment of the authentication code combines these two approaches.
-
Citations
19 Claims
-
1. An information capturing and indexing system comprising:
-
a database selection module that enables selection of a plurality of files for inclusion into at least one selectable database and that further enables individual selection of any of the plurality of files after they have been included into the at least one selectable database;
an authentication module operable to generate and insert authentication codes into each of the plurality of files, the authentication module being further operable to compare the authentication code in an individually selected one of the plurality of files with one or more attributes of the individually selected file to detect whether the individually selected file is compromised; and
an index module that enables generation of a searchable index of the plurality of files. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of capturing and indexing a digital file comprising a plurality of bits of information, the method comprising:
-
obtaining data about the digital file;
providing the data as an input to a cryptographic transformation function;
generating an authentication code comprising an output of the cryptographic transformation function;
inserting the authentication code into the file;
saving the file to a computer-readable medium; and
indexing the file. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method of authenticating a digital file stored on a computer-readable medium, wherein the digital file comprises a first set of bits and a second set of bits, wherein the second set of bits represents encrypted information about the digital file, the method comprising:
-
obtaining data about the digital file;
providing the data as an input to a cryptographic transformation function;
generating an authentication code comprising an output of the cryptographic transformation function;
comparing the authentication code with the encrypted information represented in the second set of bits;
authenticating the digital file if the authentication code matches the encrypted information represented by the second set of bits; and
generating a warning if the authentication code does not match the encrypted information represented by the second set of bits. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification