Storage and Authentication of Data Transactions
First Claim
Patent Images
1. A computer implemented method of transmitting data between a first user and a second user via an information technology communications network, comprising the steps of:
- generating a first hash value for a selected one of the data items;
digitally signing and encrypting said first hash value with a secret identifier associated with the first user;
transmitting to a second user said encrypted first hash value;
receiving and storing said transmitted encrypted first hash value for audit purposes and generating a second hash value for said received encrypted first hash value;
encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user; and
returning the encrypted second hash value to the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
Data is transmitted between a first user and a second user via an information technology communications network, in a method comprising the steps of:
- generating a first hash value for a selected one of the data items;
- digitally signing and encrypting the first hash value with a secret identifier associated with the first user;
- transmitting to a second user the encrypted first hash value;
- receiving and storing the transmitted encrypted first hash value for audit purposes and generating a second hash value for the received encrypted first hash value;
- encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user; and
- returning the encrypted second hash value to the first user.
11 Citations
15 Claims
-
1. A computer implemented method of transmitting data between a first user and a second user via an information technology communications network, comprising the steps of:
-
generating a first hash value for a selected one of the data items; digitally signing and encrypting said first hash value with a secret identifier associated with the first user; transmitting to a second user said encrypted first hash value; receiving and storing said transmitted encrypted first hash value for audit purposes and generating a second hash value for said received encrypted first hash value; encrypting the second hash value with a private identifier associated with a second user and a public identifier associated with the first user; and returning the encrypted second hash value to the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
- 9. Apparatus for storage of data, comprising a computer memory for storing copies of a plurality of data items, a computer output for generating at the end of a predetermined period of time, a data file comprising hash values of each data item created and/or stored during that time, a computer hash value generator for generating a single hash value of said data file, and a transmitter for transmitting said single hash value to a remote location for storage and/or publication thereof, or of data representative thereof.
-
12. A method of storing and authenticating data, comprising the steps of storing copies of a plurality of data items,
generating at the end of a predetermined period of time, a data file comprising hash values of each data item created and/or signed during that time, generating a single hash value of said data file, and transmitting said single hash value to a remote location for storage and/or publication thereof (or of data representative thereof).
-
13. Apparatus for transmitting data between first and second end users via an information technology communications network,
said first end user comprising means for encrypting a data item using a first identifier and transmitting said encrypted data item to said second end user module, said second end user comprising means for receiving said encrypted data item and transmitting an acknowledgement signal to said first end user, said first end user further comprising means for encrypting said first identifier using a second identifier and transmitting said encrypted first identifier to said second end user in response to receipt of said acknowledgement signal, said second end user further comprising means for requesting and receiving said second identifier in response to receipt of said encrypted first identifier, and means for decrypting said first identifier using said second identifier and for decrypting said data item using said first identifier.
-
14. Apparatus for verifying by a second end user the authenticity of use of an identifier by a first end user, the apparatus comprising means for identifying the communication of a data item encrypted using or otherwise including an identifier unique to said first end user from said first end user to said second end user across an information technology communications network, means for accessing, in response to such identification, storage means containing information relating to one or more valid recent events or transactions relating to said identifier which have occurred across said information technology communications network, means for obtaining confirmation from said first end user that at least one of said recent events or transactions is valid, and means for preventing further use of said identifier in the event that such confirmation is not received.
-
15. A computer implemented method for verifying by a second end user the authenticity of use of an identifier by a first end user, the method comprising the steps of
identifying the communication of a data item encrypted using or otherwise including an identifier unique to said first end user from said first end user to said second end user across an information technology communications network, accessing, in response to such identification, storage means containing information relating to one or more valid recent events or transactions relating to said identifier which have occurred across said information technology communications network, obtaining confirmation from said first end user that at least one of said recent events or transactions is valid, preventing further use of said identifier in the event that such confirmation is not received.
Specification