Unique digital signature
First Claim
Patent Images
1. A method for generating a unique digital signature comprising:
- receiving a request for said unique digital signature;
incrementing an index number corresponding to a system key;
executing a one-way hash function, using said index number and said system key as inputs, said one-way hash function producing a hash value in a first digital format;
transforming said hash value in said first digital format into a second digital format, and using said transformed hash value in said second digital format as an adapted digital signature;
concatenating said adapted digital signature and said service id to form said unique digital signature; and
returning said unique digital signature.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for a unique digital signature is provided. According to one aspect of the invention, a unique digital signature comprises an adapted digital signature and a service id. The adapted digital signature provides temporary or restricted privileges for a particular electronic service. In one embodiment, the electronic service is electronic message forwarding. In another embodiment, the electronic service is electronic media delivery. An authentication log file is maintained for recording status information concerning unique digital signatures.
-
Citations
26 Claims
-
1. A method for generating a unique digital signature comprising:
-
receiving a request for said unique digital signature; incrementing an index number corresponding to a system key; executing a one-way hash function, using said index number and said system key as inputs, said one-way hash function producing a hash value in a first digital format; transforming said hash value in said first digital format into a second digital format, and using said transformed hash value in said second digital format as an adapted digital signature; concatenating said adapted digital signature and said service id to form said unique digital signature; and returning said unique digital signature. - View Dependent Claims (2, 3, 4)
-
-
5. A method for authenticating a unique digital signature comprising:
-
extracting an adapted digital signature and a service id from said unique digital signature; testing said service id to ensure said service id is valid; verifying said adapted digital signature is valid by; retrieving a system key from a plurality of system keys; hashing said system key with an index number to form a hash value; converting said hash value from a binary format into a second digital format; comparing said hash value in said second digital format with said adapted digital signature; incrementing said index number; and repeating said act of hashing if said hash value in said second digital format and said adapted digital signature do not match; and in response to said act of verifying; setting an indicator in an authentication log file, said indicator designating said index number and said system key combination as used; and granting access to an electronic service corresponding to said service id. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer readable medium having stored therein one or more sequences of instructions for generating a unique digital signature, said one or more sequences of instructions causing one or more processors to perform a plurality of acts, said acts comprising:
-
receiving a request for a unique digital signature; incrementing an index number corresponding to a system key; executing a one-way hash function, using said index number and said system key as inputs, said one-way hash function producing a hash value in a first digital format; transforming said hash value in said first digital format into a second digital format, and using said transformed hash value in said second digital format as an adapted digital signature; concatenating said adapted digital signature and said service id to form said unique digital signature; and returning said unique digital signature. - View Dependent Claims (15, 16, 17)
-
-
18. A computer readable medium having stored therein one or more sequences of instructions for authenticating a unique digital signature, said one or more sequences of instructions causing one or more processors to perform a plurality of acts, said acts comprising:
-
extracting an adapted digital signature and a service id from said unique digital signature; testing said service id to ensure said service id is valid; verifying said adapted digital signature is valid by; retrieving a system key from a plurality of system keys; hashing said system key with an index number to form a hash value; converting said hash value from a binary format into a second digital format; comparing said hash value in said second digital format with said adapted digital signature; incrementing said index number; and repeating said act of hashing if said hash value in said second digital format and said adapted digital signature do not match; and in response to said act of verifying; setting an indicator in an authentication log file, said indicator designating said index number and said system key combination as used; and granting access to an electronic service corresponding to said service id. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
Specification