Logging system and method based on one-way hash function
First Claim
1. A logging system based on a one-way hash function, comprising:
- a user system, for recording a log file, initializing a message authentication code (MAC) key and an image code, adding a logging unit in the log file according to an event verification request, using the one-way hash function to generate a check value and generating an event verification response according to the check value and an image code sequence;
a verifier, for transmitting the event verification request to the user system and after receiving the event verification response, using the one-way hash function to check the correctness of the received image code sequence from the user system; and
a trusted third party, for receiving the initialized MAC key from the user system, receiving the check value and the image code sequence from the verifier, calculating a latest MAC key according to the initialized MAC key and the image code sequence, using the one-way hash function to check the correctness of the check value and the image code sequence and returning a log of a verification succeeded message to the user system if the image code sequence obtained by the hash calculation equals to the check value;
wherein the trusted third party is controlled by a first company, the verifier is controlled by a second company, the first company is different from the second company, and datum transmitted among the verifier, the user system and the trusted third party are unencrypted.
1 Assignment
0 Petitions
Accused Products
Abstract
A logging system and method based on a one-way hash function are described. The system includes a user system, a trusted third party, and a verifier. The method includes the following steps. The user system records a log file and initializes a message authentication code key and an image code. When the verifier requests the user system for a logging unit corresponding to an operation history, the user system uses a one-way hash function to calculate a check value and returns the check value and an image code sequence. The verifier then verifies the integrity of the check value and the image code sequence through the trusted third party. The trusted third party checks if the image code sequence obtained by the hash calculation equals to the check value through the one-way hash function, so as to verify that the log file of the user system has not been modified.
6 Citations
17 Claims
-
1. A logging system based on a one-way hash function, comprising:
-
a user system, for recording a log file, initializing a message authentication code (MAC) key and an image code, adding a logging unit in the log file according to an event verification request, using the one-way hash function to generate a check value and generating an event verification response according to the check value and an image code sequence; a verifier, for transmitting the event verification request to the user system and after receiving the event verification response, using the one-way hash function to check the correctness of the received image code sequence from the user system; and a trusted third party, for receiving the initialized MAC key from the user system, receiving the check value and the image code sequence from the verifier, calculating a latest MAC key according to the initialized MAC key and the image code sequence, using the one-way hash function to check the correctness of the check value and the image code sequence and returning a log of a verification succeeded message to the user system if the image code sequence obtained by the hash calculation equals to the check value; wherein the trusted third party is controlled by a first company, the verifier is controlled by a second company, the first company is different from the second company, and datum transmitted among the verifier, the user system and the trusted third party are unencrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A logging method based on a one-way hash function, for recording and verifying an operation log of a user system, comprising:
-
initializing a message authentication code (MAC) key and an image code in the user system recording a log file; transmitting the initialized MAC key from the user system to a trusted third party; adding a logging unit according to an operation history and updating the logging unit into the log file when the user system receives an event verification request from a verifier; using a one-way hash function to calculate so as to generate a check value and an image code sequence serving as an event verification response according to the event verification request; transmitting the check value and the image code sequence from the user system to the verifier; using the one-way hash function to check a correctness of the image code sequence corresponding to the event verification request after the verifier receives the check value and the image code sequence; transmitting the received check value and the checked image code sequence from the verifier to the trusted third party; and using the one-way hash function to check the correctness of the check value and the image code sequence after the trusted third party receives the check value and the image code sequence and returning a log of a verification succeeded message to the user system if the image code sequence obtained by the hash calculation equals to the check value; wherein the trusted third party is controlled by a first company, the verifier is controlled by a second company, the first company is different from the second company, and datum transmitted among the verifier, the user system and the trusted third party are unencrypted. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification