Method and apparatus for authenticating information
First Claim
1. An automatically-authenticating information object embodied in a computer-readable storage medium accessible from a first computer, said automatically-authenticating information object comprising:
- an information segment to be authenticated;
an authenticator address corresponding to a predetermined authenticator resident on a second computer, the predetermined authenticator comprising an application configured to perform authentication of the information segment; and
a set of instructions for automatically authenticating the information segment when an attempt is made to access said information segment, said set of instructions including instructions for establishing a communications link between said automatically-authenticating information object on said first computer and said predetermined authenticator on said second computer using said authenticator address, transmitting an authentication request from the automatically-authenticating information object to said predetermined authenticator, receiving a responsive communication from said predetermined authenticator, and permitting the information segment to be accessed if the responsive communication indicates that the information segment is authentic.
1 Assignment
0 Petitions
Accused Products
Abstract
An information object configured for automatic authentication of information contained therein includes an information segment to be authenticated, an authenticator address corresponding to a predetermined authenticator, and a set of instructions for establishing a communications link between the information object and the predetermined authenticator using the authenticator address, transmitting an authentication request to the predetermined authenticator, and receiving a responsive communication from the predetermined authenticator for authenticating the information segment.
27 Citations
12 Claims
-
1. An automatically-authenticating information object embodied in a computer-readable storage medium accessible from a first computer, said automatically-authenticating information object comprising:
-
an information segment to be authenticated;
an authenticator address corresponding to a predetermined authenticator resident on a second computer, the predetermined authenticator comprising an application configured to perform authentication of the information segment; and
a set of instructions for automatically authenticating the information segment when an attempt is made to access said information segment, said set of instructions including instructions for establishing a communications link between said automatically-authenticating information object on said first computer and said predetermined authenticator on said second computer using said authenticator address, transmitting an authentication request from the automatically-authenticating information object to said predetermined authenticator, receiving a responsive communication from said predetermined authenticator, and permitting the information segment to be accessed if the responsive communication indicates that the information segment is authentic. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for automatically authenticating electronically-represented information, said method comprising the steps of:
-
including an information segment to be authenticated in an automatically-authenticating information object embodied in a computer-readable storage medium;
embedding said automatically-authenticating information object in a data file;
loading the data file on a first computer;
automatically activating said automatically-authenticating information object when said data file is opened, wherein said automatically-authenticating information object establishes a communications link to a predetermined authenticator of said information segment resident on a second computer, transmits an authentication request to said predetermined authenticator, receives a responsive communication from said predetermined authenticator, and controlling access to said information segment based upon said responsive communication, said predetermined authenticator comprising an application installed on the second computer. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification