Storage and authentication of data transactions
First Claim
1. A computer-implemented method of authenticating data and providing a dated audit trail, said method comprising:
- (a) storing copies of a plurality of data items at a first location;
(b) generating a first data file at the end of a predetermined dated audit period, the first data file comprising a respective hash value of each said plurality of stored data items;
(c) generating a single hash value of said first data file, the single hash value corresponding to said predetermined dated audit period;
(d) transmitting said single hash value to a second location remote from said first location, via an information technology communications network;
(e) creating at said remote location a second data file for said predetermined dated audit period, said second data file comprising said single hash value and one or more additional data items relating to said single hash value;
(f) generating a hash value for said second data file, said hash value for said second data file corresponding to said predetermined dated audit period;
(g) publishing said hash value for said second data file in a dated journal of record published in numerous copies and held in separate public libraries, wherein the published hash value for said second data file corresponds to said predetermined dated audit period;
(h) at a date subsequent to the publishing of (g), generating a hash value for said second data file; and
(i) comparing the hash value for the second data file generated in (h) with the hash value for said second data file published in said dated journal, whereby if the hash value generated in step (h) is identical to the hash value published in said dated journal said second data file is authenticated.
3 Assignments
0 Petitions
Accused Products
Abstract
The various aspects of the present invention are based on four main principles: the provision, protection and validation of audit trails relating to data generated by and communicated between nodes of a network; authentication of communicating parties; enforcement of proof of receipt of data communications; and the detection of compromised user identifiers. The object of these principles being that, should a dispute arise over the substance of an authenticated e-mail or other data item, it would be possible to prove, with mathematical precision, the following features of the communication: the content of the message sent; the e-mail location to which the message was addressed; the fact that the message was despatched; the time and date of despatch; the fact that the message was received; the time and date it was received; and the fact that the content of the message had not been changed since it was sent. It is also intended to make it possible to prove the identity of the sender and the identity of the recipient.
-
Citations
6 Claims
-
1. A computer-implemented method of authenticating data and providing a dated audit trail, said method comprising:
- (a) storing copies of a plurality of data items at a first location;
(b) generating a first data file at the end of a predetermined dated audit period, the first data file comprising a respective hash value of each said plurality of stored data items;
(c) generating a single hash value of said first data file, the single hash value corresponding to said predetermined dated audit period;
(d) transmitting said single hash value to a second location remote from said first location, via an information technology communications network;
(e) creating at said remote location a second data file for said predetermined dated audit period, said second data file comprising said single hash value and one or more additional data items relating to said single hash value;
(f) generating a hash value for said second data file, said hash value for said second data file corresponding to said predetermined dated audit period;
(g) publishing said hash value for said second data file in a dated journal of record published in numerous copies and held in separate public libraries, wherein the published hash value for said second data file corresponds to said predetermined dated audit period;
(h) at a date subsequent to the publishing of (g), generating a hash value for said second data file; and
(i) comparing the hash value for the second data file generated in (h) with the hash value for said second data file published in said dated journal, whereby if the hash value generated in step (h) is identical to the hash value published in said dated journal said second data file is authenticated. - View Dependent Claims (2, 3, 4, 5, 6)
- (a) storing copies of a plurality of data items at a first location;
Specification