Digital signatures for data streams and data archives
First Claim
1. A method for creating a secure data file suitable for transferring over a computer network, the method comprising:
- providing at least one data file having an identifier using a computer system; and
creating a signature file having the identifier for the at least one data file and a digital signature using the computer system, the signature file being separate from the at least one data file, wherein the signature file is arranged to substantially vouch for the authenticity of the at least one data file.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatuses and products are provided for verifying the authenticity of data within one or more data files. Each data file is provided with an identifier, such as a one-way hash function or cyclic redundancy checksum. A signature file, that includes the identifiers for one or more data files, is provided with a digital signature created with a signature algorithm. The data file(s) and signature file are then transferred, or otherwise provided to a user. The user verifies the digital signature in the signature file using a signature verifying algorithm. Once verified as being authentic, the signature file can be used to verify each of the data files. Verification of the data files can be accomplished by comparing the identifier for each data file with the corresponding identifier in the signature file. If the identifiers in the data and signature files match, then the data file can be marked as authentic. If the identifiers do not match then the data file can be rejected or otherwise dealt with accordingly.
-
Citations
13 Claims
-
1. A method for creating a secure data file suitable for transferring over a computer network, the method comprising:
-
providing at least one data file having an identifier using a computer system; and creating a signature file having the identifier for the at least one data file and a digital signature using the computer system, the signature file being separate from the at least one data file, wherein the signature file is arranged to substantially vouch for the authenticity of the at least one data file. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for verifying the authenticity of a first digital data file and a digital signature file, the digital signature file being separate from the first digital data file, the first digital data file including an identifier, the digital signature file including the identifier for the first data file and a digital signature, the method including:
-
verifying the digital signature using a computer system to determine the authenticity of the digital signature file; determining when the digital signature is verified; and comparing the identifier in the first digital data file with the identifier for the first digital data file in the digital signature file using the computer system to identify the first digital data file as authentic when it is determined that the digital signature is verified. - View Dependent Claims (8, 9)
-
-
10. A method for verifying the authenticity of a plurality of data files suitable for transfer over a networked computing system, each of the plurality of data files including a data file identifier, the method comprising:
-
creating a single signature file, the signature file including a digital signature, the signature file further including a version of the data file identifier for each of the plurality of data files, the single signature file being separate from each of the plurality of data files; and verifying the authenticity of the digital signature included in the signature file, wherein when the digital signature included in the signature file is verified as being authentic, each of the plurality of data files is considered to be authentic. - View Dependent Claims (11, 12, 13)
-
Specification