System for generating a security document
First Claim
Patent Images
1. A system for generating a security document, comprising:
- a plurality of computing nodes forming a computing cluster, each computing node comprising one or more hardware processors, each computing node having a node identifier for uniquely identifying the node within the cluster, each node being capable of running multiple concurrent processes, each process being executed by at least one of the one or more hardware processors, and each process having a process identifier for uniquely identifying the process within the node,at least some of the processes on at least some of the nodes being adapted to perform the steps of;
a. collecting information for inclusion in the document, the information including at least a subject identifier for uniquely identifying a subject of the document;
b. generating a first random value and a second random value;
c. concatenating the subject identifier and the second random value;
d. applying a cryptographic hash function to the concatenation of the subject identifier and the second random value, resulting in a message digest value;
e. truncating the message digest value;
f. generating a document identifier, by at least one of the one or more hardware processors, comprising a concatenation of the node identifier, a first delimiter, the process identifier, the first random value, a second delimiter, and the truncated message digest valueg. generating the security document by formatting the information into a human-readable document in the form of a digital file, and applying the document identifier visibly to the document; and
h. storing the document and the document identifier in a database, the document being retrievable from the database by means of the document identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for generating a security document includes a plurality of computing nodes forming a computing cluster, each computing node having a node identifier for uniquely identifying the node within the cluster, each node being capable of running multiple concurrent processes, and each process having a process identifier for uniquely identifying the process within the node,
- at least some of the processes on at least some of the nodes being adapted to perform the steps of:
- a. collecting information for inclusion in the document, the information including at least a subject identifier for uniquely identifying a subject of the document;
- b. generating a first random value and a second random value;
- c. concatenating the subject identifier and the second random value;
- d. applying a cryptographic hash function to the concatenation of the subject identifier and the second random value, resulting in a message digest value;
- e. truncating the message digest value;
- f. generating a document identifier comprising a concatenation of the node identifier, a first delimiter, the process identifier, the first delimiter, the first random value, a second delimiter, and the truncated message digest value;
- g. generating the security document, and applying the document identifier visibly to the document; and
- h. storing the document and the document identifier in a database, the document being retrievable from the database by means of the document identifier.
- at least some of the processes on at least some of the nodes being adapted to perform the steps of:
-
Citations
11 Claims
-
1. A system for generating a security document, comprising:
-
a plurality of computing nodes forming a computing cluster, each computing node comprising one or more hardware processors, each computing node having a node identifier for uniquely identifying the node within the cluster, each node being capable of running multiple concurrent processes, each process being executed by at least one of the one or more hardware processors, and each process having a process identifier for uniquely identifying the process within the node, at least some of the processes on at least some of the nodes being adapted to perform the steps of; a. collecting information for inclusion in the document, the information including at least a subject identifier for uniquely identifying a subject of the document; b. generating a first random value and a second random value; c. concatenating the subject identifier and the second random value; d. applying a cryptographic hash function to the concatenation of the subject identifier and the second random value, resulting in a message digest value; e. truncating the message digest value; f. generating a document identifier, by at least one of the one or more hardware processors, comprising a concatenation of the node identifier, a first delimiter, the process identifier, the first random value, a second delimiter, and the truncated message digest value g. generating the security document by formatting the information into a human-readable document in the form of a digital file, and applying the document identifier visibly to the document; and h. storing the document and the document identifier in a database, the document being retrievable from the database by means of the document identifier. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10, 11)
-
-
7. A method of generating a security document on a computing process, the process running on a computing node comprising one or more hardware processors, the computing node forming part of a computing cluster, each computing cluster including multiple computing nodes and each node having a node identifier for uniquely identifying the node within the cluster, each node being capable of running multiple concurrent processes, each process being executed by least one of the one or more hardware processors and each process having a process identifier for uniquely identifying the process within the node, and the method comprising:
-
a. collecting information for inclusion in the document, the information including at least a subject identifier for uniquely identifying a subject of the document; b. generating a first random value and a second random value; c. concatenating the subject identifier and the second random value; d. applying a cryptographic hash function to the concatenation of the subject identifier and the second random value;
resulting in a message digest value;e. truncating the message digest value; f. generating a document identifier, by at least one of the one or more hardware processors, comprising a concatenation of the node identifier, a first delimiter, the process identifier, the first random value, a second delimiter, and the truncated message digest value; g. generating the security document by formatting the information into a human-readable document in the form of a digital file, and applying the document identifier visibly to the document; and h. storing the document and the document identifier in a database, the document being retrievable from the database by means of the document identifier.
-
Specification