Digital signing method
First Claim
Patent Images
1. A digital signing method, comprising:
- providing a log list comprising previously generated digital signatures;
computing a computed hash value of inputted data including a message to be signed or a hash value thereof, the inputted data further including only a most recently generated digital signature obtained from the log list or a hash value thereof;
encoding the computed hash value of the inputted data to produce encoded data of a predetermined format that is suitable for encryption processing for generating a digital signature;
applying a secret key to the encoded data to generate a digital signature;
distributing a signature-attached message including the generated digital signature, the message to be signed, and the most recently generated digital signature obtained from the log list or the hash value thereof; and
registering the generated digital signature as log data with the log list.
0 Assignments
0 Petitions
Accused Products
Abstract
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
12 Citations
9 Claims
-
1. A digital signing method, comprising:
-
providing a log list comprising previously generated digital signatures; computing a computed hash value of inputted data including a message to be signed or a hash value thereof, the inputted data further including only a most recently generated digital signature obtained from the log list or a hash value thereof; encoding the computed hash value of the inputted data to produce encoded data of a predetermined format that is suitable for encryption processing for generating a digital signature; applying a secret key to the encoded data to generate a digital signature; distributing a signature-attached message including the generated digital signature, the message to be signed, and the most recently generated digital signature obtained from the log list or the hash value thereof; and registering the generated digital signature as log data with the log list. - View Dependent Claims (2, 3)
-
-
4. A computer-readable storage medium having stored thereon computer-executable program to conduct digital signing using a computer, said computer-executable program causing said computer to:
-
provide a log list comprising previously generated digital signatures; compute a computed hash value of inputted data including a message to be signed or a hash value thereof, the inputted data further including only a most recently generated digital signature obtained from the log list or a hash value thereof; encode the computed hash value of the inputted data to produce encoded data of a predetermined format that is suitable for encryption processing for generating a digital signature; apply a secret key to the encoded data to produce a generated digital signature; register as log data the generated digital signature in the log list; and distribute a signature-attached data including the generated digital signature, the message to be signed, and the most recently generated digital signature obtained from the log list or the hash value thereof. - View Dependent Claims (5, 6)
-
-
7. A computer-executable program that executes a digital signing method using a computer, said digital signing method comprising:
-
providing a log list comprising previously generated digital signatures; computing a computed hash value of inputted data including a message to be signed or a hash value thereof, the inputted data further including only a most recently generated digital signature obtained from the log list or a hash value thereof; encoding the computed hash value of the inputted data to produce encoded data of a predetermined format that is suitable for encryption processing for generating a digital signature; applying a secret key to the encoded data to produce a generated digital signature; registering as log data the generated digital signature in the log list; and distributing a signature-attached data including the generated digital signature, the message to be signed, and the most recently generated digital signature obtained from the log list or the hash value thereof. - View Dependent Claims (8, 9)
-
Specification