Storage and authentication of data transactions
3 Assignments
0 Petitions
Accused Products
Abstract
The various aspects of the present invention are based on four main principles: the provision, protection and validation of audit trails relating to data generated by and communicated between nodes of a network; authentication of communicating parties; enforcement of proof of receipt of data communications; and the detection of compromised user identifiers. The object of these principles being that, should a dispute arise over the substance of an authenticated e-mail or other data item, it would be possible to prove, with mathematical precision, the following features of the communication: the content of the message sent; the e-mail location to which the message was addressed; the fact that the message was despatched; the time and date of despatch; the fact that the message was received; the time and date it was received; and the fact that the content of the message had not been changed since it was sent. It is also intended to make it possible to prove the identity of the sender and the identity of the recipient.
-
Citations
42 Claims
-
1-23. -23. (canceled)
-
24. An apparatus for storage of data comprising:
-
means for storing copies of a plurality of data items, means for generating at the end of a predetermined period of time, a data file comprising hash values of each data item created and/or stored during that time, means for generating a single hash value of said data file, and means for transmitting said single hash value to a remote location for storage or publication of the single hash value or publication of data representative thereof. - View Dependent Claims (25, 26)
-
-
27. A method of storing and authenticating data, comprising the steps of:
-
storing copies of a plurality of data items, generating at the end of a predetermined period of time, a data file comprising hash values of each data item created and/or signed during that time, generating a single hash value of said data file, and transmitting said single hash value to a remote location for storage of the single hash value or publication of the single hash value or publication thereof (or data representative thereof. - View Dependent Claims (28, 29, 30)
-
-
31. An apparatus for transmitting data between first and second end users via an information technology communications network,
said first end user comprising means for encrypting a data item using a first identifier and transmitting said encrypted data item to said second end user, said second end user comprising means for receiving said encrypted data item and transmitting an acknowledgement signal to said first end user, said first end user further comprising means for encrypting said first identifier using a second identifier and transmitting said encrypted first identifier to said second end user in response to receipt of said acknowledgement signal, said second end user further comprising means for requesting and receiving said second identifier in response to receipt of said encrypted first identifier, and means for decrypting said first identifier using said second identifier and for decrypting said data item using said first identifier.
-
40. A method for transmitting data between first and second end users via an information technology communications network, comprising the steps of:
-
encrypting by the first end user a data item using a first identifier and transmitting said encrypted data item to said second end user, receiving by said second end user said encrypted data item and transmitting an acknowledgement signal to said first end user, said first end user encrypting said first identifier using a second identifier and transmitting said encrypted first identifier to said second end user in response to receipt of said acknowledgement signal, said second end user requesting and receiving said second identifier in response to receipt of said encrypted first identifier, decrypting said first identifier using said second identifier and decrypting said data item using said first identifier.
-
-
41. An apparatus for verifying by a second end user the authenticity of use of an identifier by a first end user, the apparatus comprising:
-
means for identifying the communication of a data item encrypted using or otherwise including an identifier unique to said first end user from said first end user to said second end user across an information technology communications network, means for accessing, in response to such identification, storage means containing information relating to one or more valid recent events or transactions relating to said identifier which have occurred across said information technology communications network, means for obtaining confirmation from said first end user that at least one of said recent events or transactions is valid, and means for preventing further use of said identifier in the event that such confirmation is not received.
-
-
42. A method for verifying by a second end user the authenticity of use of an identifier by a first end user, the method comprising the steps of:
-
identifying the communication of a data item encrypted using or otherwise including an identifier unique to said first end user from said first end user to said second end user across an information technology communications network, accessing, in response to such identification, storage means containing information relating to one or more valid recent events or transactions relating to said identifier which have occurred across said information technology communications network, obtaining confirmation from said first end user that at least one of said recent events or transactions is valid, and preventing further use of said identifier in the event that such confirmation is not received.
-
Specification