Systems and Methods for Roll-Up of Asset Digital Signatures
First Claim
1. A method for enabling a verifiable audit record relating to a plurality of information transactions in a computer network, the method comprising:
- (a) receiving, at a server during a time interval, a plurality of audit records, each audit record corresponding to a digital asset, identifying an action performed on the digital asset, and having an associated digital signature;
(b) creating, after receipt by the server of one of the plurality of audit of records, a hash value corresponding to a subset of the received audit records, the subset comprising at least two records and including the received audit record; and
(c) associating, by the server, the hash value with the subset of records.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing digital assets in a distributed computing environment are described. Meta-data for the digital assets is stored separately from the digital assets. Meta-data for some of the digital assets is copied and stored at a central location. Meta-data for the digital assets is generated by clients of the system. A method for enabling a verifiable audit record relating to a plurality of received audit records includes: receiving a plurality of audit records, each audit record corresponding to a digital asset, identifying an action performed on the digital asset, and having an associated digital signature; creating, after receipt of one of the plurality of audit of records, a hash value corresponding to a subset of the received audit records, the subset comprising at least two records and including the received audit record; and associating, by the server, the hash value with the subset of records.
-
Citations
30 Claims
-
1. A method for enabling a verifiable audit record relating to a plurality of information transactions in a computer network, the method comprising:
-
(a) receiving, at a server during a time interval, a plurality of audit records, each audit record corresponding to a digital asset, identifying an action performed on the digital asset, and having an associated digital signature;
(b) creating, after receipt by the server of one of the plurality of audit of records, a hash value corresponding to a subset of the received audit records, the subset comprising at least two records and including the received audit record; and
(c) associating, by the server, the hash value with the subset of records. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for enabling a verifiable audit record relating to a plurality of information transactions in a computer network, the system comprising:
a computer server comprising;
a transceiver which receives, during a time interval, a plurality of audit records, each audit record corresponding to a digital asset, identifying an action performed on the digital asset, and having an associated digital signature; and
a processor in communication with the transceiver which creates, after receipt by the server of one of the plurality of audit of records, a hash value corresponding to a subset of the received audit records, the subset comprising at least two records and including the received audit record; and
associates the hash value with the received record.- View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A computer readable medium having executable instructions thereon to create a verifiable audit record relating to a plurality of information transactions in a computer network, the computer readable medium comprising:
-
(a) instructions to receive, at a server during a time interval, a plurality of audit records, each audit record corresponding to a digital asset, identifying an action performed on the digital asset, and having an associated digital signature;
(b) instructions to create, after receipt by the server of one of the plurality of audit of records, a hash value corresponding to a subset of the received audit records, the subset comprising at least two records and including the received audit record; and
(c) instructions to associate, by the server, the hash value with the received record. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification