Self-authenticating negotiable documents
First Claim
1. A method of providing a self-authenticating negotiable document, the method comprising the steps of:
- a) receiving, by a single entity, data to be included on the negotiable document;
b) signing, by the single entity, the negotiable document with a digital signature key;
c) providing, by the single entity, an authenticating data value by computing a one-way hash value from the data and the digital signature; and
d) outputting, by the single entity, a data packet that includes the authenticating data value, wherein the data packet is used to provide data for creating a self-authentication symbol for the negotiable document.
6 Assignments
0 Petitions
Accused Products
Abstract
A self-authenticating document is created by providing a one-way hash value in a symbol creation process, and then using a public key to decrypt data of the self-authenticating document. Raw data to be provided with the self-authenticating document is received, and an account digital signature key is retrieved and used to sign the raw data. A non-repudiation hash value from a previously-created self-authenticating document is utilized, and the raw data and the digital signature key is combined with the hash value to create a new hash value for the self-authenticating document. The hashed data is then encrypted, and any non-encrypted fields are merged in to create a full data packet. The full data packet is used to provide a self-authenticating symbol, such as a bar code label, on the self-authenticating document. The self-authenticating code is used during a document verification step to ensure that the document is genuine. The non-encrypted data within the self-authenticating code contains flags indicating which public key should be used to decrypt the encrypted data within the self-authenticating code. After decryption, a checksum is performed and compared against a checksum value stored in the decrypted portion of the self-authenticating code. If they match, and if a digital signature within the self-authenticating code is verified using an appropriate public key, the document is determined to be authentic.
-
Citations
14 Claims
-
1. A method of providing a self-authenticating negotiable document, the method comprising the steps of:
-
a) receiving, by a single entity, data to be included on the negotiable document;
b) signing, by the single entity, the negotiable document with a digital signature key;
c) providing, by the single entity, an authenticating data value by computing a one-way hash value from the data and the digital signature; and
d) outputting, by the single entity, a data packet that includes the authenticating data value, wherein the data packet is used to provide data for creating a self-authentication symbol for the negotiable document. - View Dependent Claims (2, 3, 4)
e) between the steps a) and b), checking the data to determine if digitized signatures are to be printed on the negotiable document, and if so;
f) retrieving digital identification codes from a data base, the digital identification codes being used in the step b) in the signing of the negotiable document.
-
-
3. The method according to claim 1, wherein a most-recently-used hash value from a previously-created negotiable document is used in computing an updated hash value for the step c).
-
4. The method according to claim 1, wherein the self-authentication symbols are utilized by a processor to validate at least one of a creator of the negotiable document, printed contents of the negotiable document, and the self-authentication symbol itself.
-
5. A method of digitally signing data using a public key and private key methodology, the method comprising the steps of:
-
a) receiving, by a single entity, data to be sent in a secured form;
b) providing, by the single entity, a digital signature to be sent with the data, the digital signature being encoded with a private key;
c) obtaining, by the single entity, a self-authenticating data value for the data by computing a one-way hash value; and
d) outputting, by the single entity, the self-authenticating data value, the data and the digital signature as a full data packet. - View Dependent Claims (6)
-
-
7. A method for authenticating and validating contents of a data symbol, comprising the steps of:
-
a) determining if the data symbol has been encrypted, and if so, decrypting the data symbol using a public key;
b) computing a check sum on the decrypted data symbol;
c) comparing the computed check sum with a self-authenticating data value included in the data symbol and retrieved from the data symbol through the decrypting of the data symbol to determine if the decrypted data symbol is error free; and
d) verifying a digital signature provided with the data symbol using a public digital signature key, wherein, if the comparison in step c) and the verification in step d) are successful, the data symbol is authenticated and validated. - View Dependent Claims (8)
wherein a particular public key is used to decrypt the data symbol based on the value of the flag.
-
-
9. A system for creating a self-authenticating check, comprising:
-
a database containing data to be used in creating the self-authenticating check;
a validation unit communicatively coupled to the database and configured to receive the data and to validate if the data is useable in creating the self-authenticating check;
a merge image and signature unit communicatively coupled to the validation unit and configured to merge an account digital signature key with the data received from the validation unit;
an encryption unit communicatively coupled to the merge image and signature unit and configured to encrypt the data with the account digital signature key;
a symbol creation unit communicatively coupled to the encryption unit and configured to further encrypt the data using a public key and private key-based encryption algorithm, wherein the merge image and signature unit merges the encrypted data output from the symbol creation unit with non-encrypted data to be used for decryption; and
a printing unit communicatively coupled to the merge image and signature unit and configured to print a self-authenticating symbol onto the self-authenticating check, the self-authenticating symbol being based on the encrypted data output by the merge image and signature unit. - View Dependent Claims (10, 11, 12)
-
-
13. A method of providing a self-authenticating negotiable document, the method comprising the steps of:
-
a) receiving, by a single entity, a private key that is to be used to self-authenticate a negotiable document, the private key being received prior to creation of the negotiable document;
b) receiving, by the single entity, data to be included on the negotiable document;
c) signing, by the single entity, the negotiable document with a digital signature key;
d) providing, by the single entity, an authenticating data value by computing a one-way hash value from the data and the digital signature; and
e) outputting, by the single entity, a data packet that includes the authenticating data value, wherein the data packet is used to provide data for creating a self-authentication symbol that is placed on the negotiable document. - View Dependent Claims (14)
-
Specification