×

Document Verification With Distributed Calendar Infrastructure

  • US 20140282863A1
  • Filed: 04/30/2014
  • Published: 09/18/2014
  • Est. Priority Date: 12/22/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for enabling authentication of digital records, comprising:

  • receiving, at a core system on a core processing level, from each of at least one highest non-core processing system at a respective highest non-core processing level, a current highest-level combined output value that is formed as digital combinations of successively lower-level combined output values computed in lower non-core processing levels as node values of a tree data structure having lowest level inputs formed as digital transformations, computed in user-level systems, of digital input records;

    computing, for a current calendar period, a current calendar value as a digital combination of the current highest-level combined output values;

    returning to at least the highest non-core processing level from the core system the current calendar value, whereupon recomputation parameters are distributed downward to the user-level systems for association with respective ones of the digital input records such that an arbitrary subsequent test digital record is considered authenticated relative to the corresponding digital input record if, applying the corresponding digital transformation to the test digital record and, using the recomputation parameters to recomputed the node values upward through the tree data structure and core, the same current calendar value is attained as when it was originally computed with the corresponding digital input record forming the lowest level input; and

    compiling and maintaining a calendar, said calendar comprising a set of the current calendar value and of previous calendar values computed in previous calendar periods from the beginning of an initial calendar time, such that there is a correspondence between calendar values in the calendar and physical time;

    in which;

    the recomputation parameters are keyless and therefore independent of any trust authority parameters such as cryptographic keys.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×