System and Method for Controlling Actions Taken on Voting Devices
First Claim
1. A computer-implemented method for controlling actions taken on voting devices, comprising:
- receiving a first hash code associated with a request to perform an action on a voting device located at a polling location, wherein the first hash code is generated by a hashing algorithm at a central election office;
entering the first hash code into the voting device, wherein the voting device verifies the validity of the first hash code by executing the hashing algorithm to generate a second hash code and then comparing the second hash code to the first hash code, and wherein the voting device permits the action if the validity of the first hash code is verified; and
performing the action on the voting device.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a system and method that allows a central election office to maintain control over actions taken on voting devices located at various polling locations. In an exemplary embodiment, a poll worker or other user contacts the central election office with a request to perform an action on a voting device. An election management system located at the central election office executes a hashing algorithm to generate a first hash code associated with the action. The central election office communicates the first hash code to the polling location, and the poll worker or other user inputs the first hash code into the voting device. The voting device executes the same hashing algorithm to generate a second hash code associated with the action, and compares the second hash code to the first hash code to verify the validity of the first hash code. If the validity of the first hash code is verified, the voting device permits the poll worker or other user to perform the action on the voting device.
-
Citations
66 Claims
-
1. A computer-implemented method for controlling actions taken on voting devices, comprising:
-
receiving a first hash code associated with a request to perform an action on a voting device located at a polling location, wherein the first hash code is generated by a hashing algorithm at a central election office; entering the first hash code into the voting device, wherein the voting device verifies the validity of the first hash code by executing the hashing algorithm to generate a second hash code and then comparing the second hash code to the first hash code, and wherein the voting device permits the action if the validity of the first hash code is verified; and performing the action on the voting device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system for controlling actions taken on voting devices, comprising:
-
an election management system comprising a processor programmed to execute a hashing algorithm to generate a first hash code associated with a request to perform an action; and a voting device comprising an input device that provides for manual entry of the first hash code, the voting device further comprising a processor programmed to (i) execute the hashing algorithm to generate a second hash code, (ii) compare the second hash code to the first hash code to verify the validity of the first hash code, and (iii) permit the action if the validity of the first hash code is verified. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 65, 66)
-
-
50. A voting device, comprising:
-
an input device that provides for manual entry of a first hash code, wherein the first hash code is generated by a hashing algorithm in connection with a request to perform an action; and a processor in communication with the input device to receive the first hash code, wherein the processor is programmed to (i) execute the hashing algorithm to generate a second hash code, (ii) compare the second hash code to the first hash code to verify the validity of the first hash code, and (iii) permit the action if the validity of the first hash code is verified. - View Dependent Claims (51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
Specification