System and method for securely hyperlinking graphic objects
First Claim
1. A method for creating an authenticated hyperlink to access a file by means of a hyperlink address and to authenticate said hyperlink address and said file when said authenticated hyperlink is activated, said method comprising the steps of:
- providing a digital image;
encoding the address of a file in a first portion of said digital image, said address of the file being a Uniform Resource Locator (URL) that includes a network address of the file;
computing a message authentication code based on the address of the file and the file;
encoding the computed message authentication code in a second portion of said digital image, wherein the message authentication code is computed using a hash function having as inputs the address of the file, the file, and a secret key K, andafter said encoding the address of a file in the first portion of said digital image and after said encoding the computed message authentication code in the second portion of said digital image, a computer workstation storing the digital image in a storage device comprised by the computer workstation.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods and computer programs for verifying the authenticity and integrity of hyperlink addresses and files that are accessible by means of these hyperlink addresses. A system and a method are disclosed for authenticating a file such as an HTML document hyperlinked to a graphic object such as a digital image or to a graphic icon. The hyperlink network address (e.g., the URL of the hyperlink on the Internet) is encoded on a first portion of the graphic object. Checking information such as a MAC digital signature and the hyperlinked file are encoded into a second portion of the same graphic object. In accordance with another aspect of the invention, a system and a method are disclosed for verifying the authenticity and integrity of a hyperlink and a file when this hyperlink is activated.
-
Citations
14 Claims
-
1. A method for creating an authenticated hyperlink to access a file by means of a hyperlink address and to authenticate said hyperlink address and said file when said authenticated hyperlink is activated, said method comprising the steps of:
-
providing a digital image; encoding the address of a file in a first portion of said digital image, said address of the file being a Uniform Resource Locator (URL) that includes a network address of the file; computing a message authentication code based on the address of the file and the file; encoding the computed message authentication code in a second portion of said digital image, wherein the message authentication code is computed using a hash function having as inputs the address of the file, the file, and a secret key K, and after said encoding the address of a file in the first portion of said digital image and after said encoding the computed message authentication code in the second portion of said digital image, a computer workstation storing the digital image in a storage device comprised by the computer workstation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising a computer readable storage medium in a computer workstation, said storage medium having a computer program stored therein, said computer program configured to be executed by a computer to perform a method for creating an authenticated hyperlink to access a file by means of a hyperlink address and to authenticate said hyperlink address and said file when said authenticated hyperlink is activated, said method comprising the steps of:
-
providing a digital image; encoding the address of a file in a first portion of said digital image, said address of the file being a Uniform Resource Locator (URL) that includes a network address of the file; computing a message authentication code based on the address of the file and the file; encoding the computed message authentication code in a second portion of said digital image, wherein the message authentication code is computed using a hash function having as inputs the address of the file, the file, and a secret key K, and after said encoding the address of a file in the first portion of said digital image and after said encoding the computed message authentication code in the second portion of said digital image, storing the digital image in a storage device comprised by the computer workstation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification