Generating printable certificates to verify log authenticity
First Claim
1. A computer-implemented method comprising:
- receiving, with one or more processors, an image;
generating, with the one or more processors, a compound document of the image, the compound document including a document log and a page log;
capturing, with the one or more processors, a change made to the image, the change comprising an annotation of the image;
logging, with the one or more processors, the change made to the image;
generating, with the one or more processors, a hash for the change made to the image, the hash including a previous hash of a previous transaction performed on the image and a unique identifier for a device that generated the hash for the change made to the image;
updating, with the one or more processors, the document log and the page log of the compound document with the hash for the change made to the image;
receiving, with the one or more processors, a request for a certificate, the certificate including the hash for the change made to the image;
extracting, with the one or more processors, the hash for the change made to the image from the compound document; and
generating, with the one or more processors, the certificate from the hash for the change made to the image.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for generating printable certificates to verify log authenticity. A logging module generates a compound document that includes metadata for changes made to pages in a document. Each time a change is made to the document, such as adding stroke data, the logging module updates the compound document with the changes. The online marketplace module displays an option for purchasing a printable certificate. In response to a request for a certificate, the logging module generates a printable certificate that includes a set number of hashes for previous transactions. The verification module can recreate a transaction and generate a hash that is compared to the certificate to verify that no tampering has occurred with the document.
-
Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving, with one or more processors, an image; generating, with the one or more processors, a compound document of the image, the compound document including a document log and a page log; capturing, with the one or more processors, a change made to the image, the change comprising an annotation of the image; logging, with the one or more processors, the change made to the image; generating, with the one or more processors, a hash for the change made to the image, the hash including a previous hash of a previous transaction performed on the image and a unique identifier for a device that generated the hash for the change made to the image; updating, with the one or more processors, the document log and the page log of the compound document with the hash for the change made to the image; receiving, with the one or more processors, a request for a certificate, the certificate including the hash for the change made to the image; extracting, with the one or more processors, the hash for the change made to the image from the compound document; and generating, with the one or more processors, the certificate from the hash for the change made to the image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
one or more processors; and a memory, the memory storing instructions, which when executed by the one or more processors, cause the one or more processors to perform the operations of; receiving an image; capturing a change made to the image, the change comprising an annotation of the image; generating a compound document of the image, the compound document including a document log and a page log; logging the change made to the image; generating a hash for the change made to the image, the hash including a previous hash of a previous transaction performed on the image and a unique identifier for a device that generated the hash for the change made to the image; updating the document log and the page log of the compound document with the hash for the change made to the image; receiving a request for a certificate, the certificate including the hash for the change made to the image; extracting the hash for the change made to the image from the compound document; and generating the certificate from the hash for the change made to the image. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising a computer readable non-transitory storage medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
receive an image; generate a compound document of the image, the compound document including a document log and a page log; capture a change made to the image, the change comprising an annotation of the image; log the change made to the image; generate a hash for the change made to the image, the hash including a previous hash of a previous transaction performed on the image and a unique identifier for a device that generated the hash for the change made to the image; update the document log and the page log of the compound document with the hash for the change made to the image; receive a request for a certificate, the certificate including the hash for the change made to the image; extract the hash for the change made to the image from the compound document; and generate the certificate from the hash for the change made to the image.
-
Specification