SYSTEM AND METHOD TO VALIDATE AND AUTHENTICATE DIGITAL DATA
First Claim
1. A method for generating an authentication record for digital content and authenticating digital content, the method comprising:
- a user selecting a digital content item;
creating a seal record associated with the digital content item;
providing a first hash value for the digital content item;
incorporating the first hash value into the seal record;
acquiring secondary information related to at least one of the digital content item and the user; and
importing secondary information into the seal record.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method combining registration with a trusted third party, certificate generation, hashing, encryption, customizable file identification fields, and time-stamping technology with recognized “best practice” procedures to achieve the legal admissibility and evidential weight of any form of digital file or collection of digital files. Generally, the originator of the file (the first party) and the originator'"'"'s employing organization are registered with a Trusted Third Party. The originator reduces the file, by means of a hashing algorithm, to a fixed bit length binary pattern. This provides a unique digital fingerprint of the file. The resultant hash value, the originator'"'"'s identity details, the employing organization details associated and securely linked to the digital certificate, the title of the file, customizable file identification fields, and other relevant data are forwarded to a Trusted Third Party where the date and time from a known and trusted time source are added. The customizable file identification fields can provide the originator with a mechanism for configuring the seal to incorporate as much additional information as deemed necessary to prove the authenticity of the digital content and/or provide data for the purposes of adding value in functions such as source identification, sorting, analysis, investigation, and compliance. Such information could include, but would not be limited to, location/GPS coordinates, machine id, biometric information, smart-card data, reason for sealing. The original file does not leave the control of the originating party. When combined, the forwarded details and date and time create a Seal Record. The Seal Record is encrypted and hashed. The Seal Record along with all other relevant information are retained on a central secure server. The recipient of the file (the second party) can confirm the file has been received in an unaltered state with integrity retained and it is the authentic version by validating the file.
-
Citations
22 Claims
-
1. A method for generating an authentication record for digital content and authenticating digital content, the method comprising:
-
a user selecting a digital content item; creating a seal record associated with the digital content item; providing a first hash value for the digital content item; incorporating the first hash value into the seal record; acquiring secondary information related to at least one of the digital content item and the user; and importing secondary information into the seal record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 22)
-
-
16. A system for generating an authentication record for digital content and authenticating digital content, the system comprising:
-
a user interface; and a sealing module, further comprising; a seal record generator for creating a seal record associated with a digital content item selected by a user; a data collection module for acquiring secondary information related to at least one of the digital content item and the user; a hash engine for providing a first hash value for a digital content item. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification