×

Computationally efficient method for trusted and dynamic digital objects dissemination

  • US 6,058,383 A
  • Filed: 02/14/1998
  • Issued: 05/02/2000
  • Est. Priority Date: 06/27/1996
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a system for dissemination of digital objects over a transmission channel, said system including at least one information provider, end user, and trusted third party, a method for providing trusted and dynamic dissemination of digital objects comprising the steps of:

  • a) registering the information provider with said trusted third party prior to distribution of any digital objects;

    b) grouping digital objects into distribution packages by the information provider;

    c) providing a certificate request by the information provider to the trusted third party, said certificate request including a certificate request body and a field for verifying integrity of contents of said body, said body including information provider identification fields for providing information to uniquely identify the information provider, package identifying field for uniquely identifying a distribution package, object information fields for uniquely identifying each of a plurality of digital objects in the distribution package, said information fields including a digest of each of said digital objects, said digest being computed as an output of a predetermined secure one-way hash function with said object as its input;

    d) verifying said certificate request by the trusted third party using predetermined criteria;

    e) providing a certificate to the information provider by the trusted third party if the predetermined criteria in step d) are met, said certificate including a certificate body and a field for verifying integrity of contents of said body, said body including a trusted third party'"'"'s identification field for uniquely identifying the trusted third party, a time stamp indicating issue date, and said certificate request body;

    f) rejecting the certificate request if the predetermined criteria of step d) are not met;

    g) verifying said certificate from step e) by the information provider using predetermined criteria;

    h) storing said certificate if said predetermined criteria in step g) are met;

    i) rejecting said certificate if said predetermined criteria in step g) are not met;

    j) accessing said certificate from step h) by an end user before accessing any of said digital objects;

    k) verifying said certificate by the end user using predetermined criteria;

    l) rejecting said certificate if said predetermined criteria in step k) are not met;

    m) accessing a digital object from the distribution package if the predetermined criteria in step k) are met;

    n) computing a digest as an output of said predetermined secure one-way hash function with said accessed digital object from step m) as input;

    o) comparing said digest from step n) with the digest of the digital object from the object information fields in the certificate;

    p) rejecting said digital object if the compared digests in step o) are not identical; and

    q) accepting said digital object if the compared digests in step o) are identical;

    whereby said trusted third party can authenticate all digital objects in the distribution package and issue a single certificate certifying all of said digital objects, and said end user can verify trustworthiness of each of said digital objects in the single certificate and access any of the digital objects in the distribution package at user'"'"'s discretion.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×