Technique for digitally notarizing a collection of data streams
First Claim
1. A computer program product for digitally notarizing a collection comprising a plurality of data streams, the computer program product embodied on one or more computer-usable media and comprising:
- computer-readable program code configured to compute a hash value over each of the plurality of data streams, wherein each data stream is created by a different application processing component;
computer-readable program code configured to combine each hash value for each of the plurality of data streams with a unique identifier of the application processing component which created the data stream for which the hash value was computed, thereby creating a combination data block;
computer-readable program code configured to hash the combination data block;
computer-readable program code configured to digitally sign the hashed combination data block with a private cryptographic key, wherein the private cryptographic key and a public cryptographic key which is cryptographically associated therewith represent a digital notary; and
computer-readable program code configured to provide the digitally signed hashed combination data block, along with the combination data block, as the digital notarization for the collection plurality of data streams, wherein the digital notarization cryptographically seals contents of the collection of data streams.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, computer program product, and method of doing business by digitally notarizing a collection of data streams, thereby improving security of the contents of the data streams. Preferably, public key cryptography is used, wherein the collection of data streams is digitally signed (i.e. notarized) using a private cryptographic key of a digital notary, such that an associated public cryptographic key can be used to verify the authenticity and integrity of the collection of data streams. One or more components which are involved in creating the data streams are preferably authenticated, and a unique identifier of each such component is included within cryptographically-protected information that is provided for the digital notarization. The authenticated identities of the components can therefore be determined from the digital notarization.
-
Citations
38 Claims
-
1. A computer program product for digitally notarizing a collection comprising a plurality of data streams, the computer program product embodied on one or more computer-usable media and comprising:
-
computer-readable program code configured to compute a hash value over each of the plurality of data streams, wherein each data stream is created by a different application processing component; computer-readable program code configured to combine each hash value for each of the plurality of data streams with a unique identifier of the application processing component which created the data stream for which the hash value was computed, thereby creating a combination data block; computer-readable program code configured to hash the combination data block; computer-readable program code configured to digitally sign the hashed combination data block with a private cryptographic key, wherein the private cryptographic key and a public cryptographic key which is cryptographically associated therewith represent a digital notary; and computer-readable program code configured to provide the digitally signed hashed combination data block, along with the combination data block, as the digital notarization for the collection plurality of data streams, wherein the digital notarization cryptographically seals contents of the collection of data streams. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for digitally notarizing a collection comprising a plurality of data streams, comprising:
-
means for computing a hash value over each of the plurality of data streams, wherein each data stream is created by a different application processing component; means for combining each hash value for each of the plurality of data streams with a unique identifier of the application processing component which created the data stream for which the hash value was computed, thereby creating a combination data block; means for hashing the combination data block; means for digitally signing the hashed combination data block with a private cryptographic key, wherein the private cryptographic key and a public cryptographic key which is cryptographically associated therewith represent a digital notary; and means for providing the digitally signed hashed combination data block, along with the combination data block, as the digital notarization for the collection of data streams, wherein the digital notarization cryptographically seals contents of the collection of data streams. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of digitally notarizing a collection comprising a plurality of data streams, comprising:
-
computing a hash value over each of the plurality of data streams, wherein each data stream is created by a different application processing component; combining each hash value for each of the plurality of data streams with a unique identifier of the application processing component which created the data stream for which the hash value was computed, thereby creating a combination data block; hashing the combination data block; digitally signing the hashed combination data block with a private cryptographic key, wherein the private cryptographic key and a public cryptographic key which is cryptographically associated therewith represent a digital notary; and providing the digitally signed hashed combination data block, along with the combination data block, as the digital notarization for the collection of data streams, wherein the digital notarization cryptographically seals contents of the collection of data streams. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A digitally notarized collection of data streams, comprising:
-
a plurality of data streams in the collection, wherein each data stream is created by a different application processing component; and a digital notarization of the collection, created by; computing a hash value over each of the plurality of data streams; combining each hash value for each of the plurality of data streams with a unique identifier of the application processing component which created the data stream for which the hash value was computed, thereby creating a combination data block; hashing the combination data block; digitally signing the hashed combination data block with a private cryptographic key, wherein the private cryptographic key and a public cryptographic key which is cryptographically associated therewith represent a digital notary; and providing the digitally signed hashed combination data block, along with the combination data block, as the digital notarization for the collection of data streams, wherein the digital notarization cryptographically seals contents of the collection of data streams.
-
-
38. A method of doing business using digitally notarized data streams, comprising:
-
digitally notarizing a collection comprising a plurality of data streams, further comprising; computing a hash value over each of the plurality of data streams, wherein each data stream is created by a different application processing component; combining each hash value for each of the plurality of data streams with a unique identifier of the application processing component which created the data stream for which the hash value was computed, thereby creating a combination data block; hashing the combination data block; digitally signing the hashed combination data block with a private cryptographic key, wherein the private cryptographic key and a public cryptographic key which is cryptographically associated therewith represent a digital notary; and providing the digitally signed hashed combination data block, along with the combination data block, as the digital notarization for the collection of data streams; and verifying authenticity of the digitally notarized collection of data streams, by a receiver of the digital notarization, further comprising; using the public cryptographic key of the digital notary to decrypt the digitally signed hashed combination data block, yielding a new version of the hashed combination data block and a new version of the combination data block; computing a new hash over the new version of the combination data block; and determining whether the new hash is identical to the new version of the hashed combination data block, and if so, concluding that the data streams in the collection have not been altered.
-
Specification