Creation of signatures for authenticating applications
First Claim
1. A computer implemented method for generating a document signature for a document, the method comprising:
- receiving, with one or more processors, a change by an application to the document;
determining, with the one or more processors, a rolling hash for the document by generating a first hash of a previous hash associated with a previous action performed on the document and a recent action associated with changing the document;
determining, with the one or more processors, a rolling hash offset for the document by generating a second hash for the recent action associated with changing the document and calculating a difference between the second hash and the previous hash associated with the previous action performed on the document;
determining, with the one or more processors, a globally unique identifier and a secret associated with the application that changed the document;
generating, with the one or more processors, a document signature by combining the rolling hash, the rolling hash offset, the globally unique identifier and the secret; and
storing the document signature, the globally unique identifier, the rolling hash and the rolling hash offset in data storage.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for authenticating applications. The system includes a plurality of portable electronic devices, at least one process organizer, at least one module developer, at least one task performer and a workflow server. The process organizer generates an application. The process organizer can request modules from module developers that are incorporated into the application. Alternatively, the process organizer makes an agreement with a task performer to perform tasks to complete the application. The application is transmitted to the workflow server, which includes an online marketplace for displaying and selling the applications. A user purchases the application through the store. A routing module generates a signature and compares the signature to application, module or document metadata and a secret to determine consistency of the data before the application, module or document is routed.
5 Citations
20 Claims
-
1. A computer implemented method for generating a document signature for a document, the method comprising:
-
receiving, with one or more processors, a change by an application to the document; determining, with the one or more processors, a rolling hash for the document by generating a first hash of a previous hash associated with a previous action performed on the document and a recent action associated with changing the document; determining, with the one or more processors, a rolling hash offset for the document by generating a second hash for the recent action associated with changing the document and calculating a difference between the second hash and the previous hash associated with the previous action performed on the document; determining, with the one or more processors, a globally unique identifier and a secret associated with the application that changed the document; generating, with the one or more processors, a document signature by combining the rolling hash, the rolling hash offset, the globally unique identifier and the secret; and storing the document signature, the globally unique identifier, the rolling hash and the rolling hash offset in data storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implemented system for generating a document signature for a document, the system comprising:
-
one or more processors; a memory storing instructions that when executed by the one or more processors, cause the one or more processors to perform the steps of determining, with the one or more processors, a rolling hash for the document by generating a first hash of a previous hash associated with a previous action performed on the document and a recent action associated with changing the document; determining, with the one or more processors, a rolling hash offset for the document by generating a second hash for the recent action associated with changing the document and calculating a difference between the second hash and the previous hash associated with the previous action performed on the document; determining, with the one or more processors, a globally unique identifier and a secret associated with the application that changed the document; generating, with the one or more processors, a document signature by combining the rolling hash, the rolling hash offset, the globally unique identifier and the secret; and storing the document signature, the globally unique identifier, the rolling hash and the rolling hash offset in data storage. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer readable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to perform steps comprising:
-
receiving from a user a change by an application to a document; determining a rolling hash for the document by generating a first hash of a previous hash associated with a previous action performed on the document and a recent action associated with changing the document; determining a rolling hash offset for the document by generating a second hash for the recent action associated with changing the document and calculating a difference between the second hash and the previous hash associated with the previous action performed on the document; determining a globally unique identifier and a secret associated with the application that changed the document; generating a document signature by combining the rolling hash, the rolling hash offset, the globally unique identifier and the secret; and storing the document signature, the globally unique identifier, the rolling hash and the rolling hash offset in data storage. - View Dependent Claims (18, 19, 20)
-
Specification