DATE-PROVABLE REGISTRATION SYSTEM FOR PUBLISHED DOCUMENTS
First Claim
1. A computer-implemented document integrity verification method comprising:
- receiving a digital document in a word processing format into a non-transitory computer readable medium;
generating a first baseline data sequence from the digital document;
generating a first modified baseline data sequence from the first baseline data sequence in accordance with a set of modification rules, wherein at least one element of the first baseline data sequence, between the first and final elements of the first baseline data sequence, is modified in the first modified baseline data sequence, and wherein an integrity verification code (IVC) generated for the first modified baseline data sequence will differ from an IVC generated for the first baseline data sequence;
generating a first original IVC, wherein generating a first original IVC comprises performing a one-way operation on the first modified baseline data sequence, and wherein the modification rules render tampering undetectable for the at least one modified element within the first baseline data sequence; and
transmitting the first original IVC across a public computer network to a remote database node.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
23 Citations
20 Claims
-
1. A computer-implemented document integrity verification method comprising:
-
receiving a digital document in a word processing format into a non-transitory computer readable medium; generating a first baseline data sequence from the digital document; generating a first modified baseline data sequence from the first baseline data sequence in accordance with a set of modification rules, wherein at least one element of the first baseline data sequence, between the first and final elements of the first baseline data sequence, is modified in the first modified baseline data sequence, and wherein an integrity verification code (IVC) generated for the first modified baseline data sequence will differ from an IVC generated for the first baseline data sequence; generating a first original IVC, wherein generating a first original IVC comprises performing a one-way operation on the first modified baseline data sequence, and wherein the modification rules render tampering undetectable for the at least one modified element within the first baseline data sequence; and transmitting the first original IVC across a public computer network to a remote database node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program embodied on a computer executable medium and configured to be executed by a processor, the program comprising:
-
code for receiving a digital document in a word processing format into a non-transitory computer readable medium; code for generating a first baseline data sequence from the digital document; code for generating a first modified baseline data sequence from the first baseline data sequence in accordance with a set of modification rules, wherein at least one element of the first baseline data sequence, between the first and final elements of the first baseline data sequence, is modified in the first modified baseline data sequence, and wherein an integrity verification code (IVC) generated for the first modified baseline data sequence will differ from an IVC generated for the first baseline data sequence; code for generating a first original IVC, wherein generating a first original IVC comprises performing a one-way operation on the first modified baseline data sequence, and wherein the modification rules render tampering undetectable for the at least one modified element within the first baseline data sequence; code for transmitting the first original IVC across a public computer network to a remote database node. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A document integrity verification apparatus comprising:
-
processor; a memory comprising a non-transitory computer readable medium; and a modified IVC generator configured to; receive a digital document in a word processing format into the medium; generate a first baseline data sequence from the digital document; generate a first modified baseline data sequence from the first baseline data sequence in accordance with a set of modification rules, wherein at least one element of the first baseline data sequence, between the first and final elements of the first baseline data sequence, is modified in the first modified baseline data sequence, and wherein an integrity verification code (IVC) generated for the first modified baseline data sequence will differ from an IVC generated for the first baseline data sequence; and generate a first original IVC, wherein generating a first original IVC comprises performing a one-way operation on the first modified baseline data sequence, and wherein the modification rules render tampering undetectable for the at least one modified element within the first baseline data sequence.
-
Specification