METHOD AND SYSTEM FOR MONITORING A SECURE DOCUMENT
First Claim
1. A method for enabling access to a secure document by a document service, the method comprising:
- receiving from a document owner the document and an ordered sequence of signature verification keys that are to be selected in an orderly manner;
enabling access to the document via an allocated access address;
enabling uploading of an uploaded document and verifying a signature associated with the uploaded document using a currently selected signature verification key from the ordered sequence such that;
if verification fails, rejecting the uploaded document; and
if verification succeeds, replacing the document accessible via the allocated access address with the uploaded document and selecting a next signature verification key of the ordered sequence to be the currently selected signature verification key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for enabling access to a secure document by a document service includes receiving the document, and an ordered sequence of signature verification keys that are to be selected in an orderly manner, from a document owner. Access is enabled to the document via an allocated access address. Uploading an uploaded document is enabled. A signature associated with the uploaded document is verified using a currently selected signature verification key from the ordered sequence. If verification fails, the uploaded document is rejected. If verification succeeds, the document accessible via the allocated access address is replaced with the uploaded document and a next signature verification key of the ordered sequence is selected to be the currently selected signature verification key.
-
Citations
19 Claims
-
1. A method for enabling access to a secure document by a document service, the method comprising:
-
receiving from a document owner the document and an ordered sequence of signature verification keys that are to be selected in an orderly manner; enabling access to the document via an allocated access address; enabling uploading of an uploaded document and verifying a signature associated with the uploaded document using a currently selected signature verification key from the ordered sequence such that; if verification fails, rejecting the uploaded document; and if verification succeeds, replacing the document accessible via the allocated access address with the uploaded document and selecting a next signature verification key of the ordered sequence to be the currently selected signature verification key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable medium containing instructions that when executed cause a processor to execute the steps of:
-
receiving from a document owner the document and an ordered sequence of signature verification keys that are to be selected in an orderly manner; enabling access to the document via an allocated access address; enabling uploading of an uploaded document and verifying a signature associated with the uploaded document using a currently selected signature verification key from the ordered sequence such that; if verification fails, rejecting the uploaded document; and if verification succeeds, replacing the document accessible via the allocated access address with the uploaded document and selecting a next signature verification key of the ordered sequence to be the currently selected signature verification key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A document service data processing system comprising:
-
a processing unit in communication with a computer readable medium, wherein the computer readable medium contains a set of instructions wherein the processing unit is designed to carry out the set of instructions to; receive from a document owner the document and an ordered sequence of signature verification keys that are to be selected in an orderly manner; enable access to the document via an allocated access address; enable uploading of an uploaded document; verify a signature associated with the uploaded document using a currently selected signature verification key from the ordered sequence such that; if verification fails, reject the uploaded document; if verification succeeds, replace the document accessible via the allocated access address with the uploaded document and select a next signature verification key of the ordered sequence to be the currently selected signature verification key. - View Dependent Claims (16, 17, 18, 19)
-
Specification