Apparatus and method for authenticating the dispatch and contents of documents
DC CAFCFirst Claim
1. A method of authenticating a dispatch and contents of the dispatch transmitted from a sender to a recipient, comprising the steps of:
- sending content data representative of the contents of the dispatch, and, a destination of the dispatch associated with said recipient, to an authenticator functioning as a non-interested third party with respect to the sender and the recipient, to be forwarded to said destination;
receiving a representation of authentication data that has been generated by said authenticator, said authentication data comprising a representation of the following set A of information elements;
a1—
comprising said content data, and dispatch record data elements a2, . . . , an which includes at least an indicia a2 relating to a time of the dispatch which is provided in a manner resistant to or indicative of tampering by either of the sender and the recipient, and an indicia a3 relating to said destination of the dispatch, wherein at least part of said authentication data is secured against tampering of the sender and the recipient, and wherein said authentication data includes a set B comprising one or more information elements b1, . . . ,bm generated by respectively applying functions F1, . . . ,Fm to subsets S1, . . . ,Sm comprising selected portions of said set A, where said functions F1, . . . ,Fm can be different from one another and said subsets S1, . . . ,Sm can be different from one another, and wherein said authentication data does not comprise an encrypted representation of said content data and said dispatch record data which is encrypted with a secret key, either symmetric or asymmetric, associated with said recipient.
2 Assignments
Litigations
0 Petitions
Reexaminations
Accused Products
Abstract
Apparatus and method for authenticating that a sender has sent certain information via a dispatcher to a recipient is disclosed. The method includes the steps of: (a) providing a set A comprising a plurality of information elements a1, . . . , an, said information element a1 comprising the contents of said dispatched information, and said one or more information elements a2, . . . , an comprising dispatch-related information and comprise at least the following elements: a2—a time indication associated with said dispatch; and a3—information describing the destination of said dispatch, and wherein at least one of said information elements is provided in a manner that is resistant or indicative of tamper attempts by said sender; (b) associating said dispatch-related information with said element a1 by generating authentication-information, in particular comprising a representation of at least said elements a1, a2 and a3, said representation comprising a set of one or more elements, each comprising a representation of one or more elements of said set A; (c) securing at least part of said authentication-information against undetected tamper attempts of at least said sender. The dispatch relates either to transmission or to manual delivery. The apparatus implements the operations of the method.
87 Citations
51 Claims
-
1. A method of authenticating a dispatch and contents of the dispatch transmitted from a sender to a recipient, comprising the steps of:
-
sending content data representative of the contents of the dispatch, and, a destination of the dispatch associated with said recipient, to an authenticator functioning as a non-interested third party with respect to the sender and the recipient, to be forwarded to said destination;
receiving a representation of authentication data that has been generated by said authenticator, said authentication data comprising a representation of the following set A of information elements;
a1—
comprising said content data, and dispatch record data elements a2, . . . , an which includes at least an indicia a2 relating to a time of the dispatch which is provided in a manner resistant to or indicative of tampering by either of the sender and the recipient, and an indicia a3 relating to said destination of the dispatch,wherein at least part of said authentication data is secured against tampering of the sender and the recipient, and wherein said authentication data includes a set B comprising one or more information elements b1, . . . ,bm generated by respectively applying functions F1, . . . ,Fm to subsets S1, . . . ,Sm comprising selected portions of said set A, where said functions F1, . . . ,Fm can be different from one another and said subsets S1, . . . ,Sm can be different from one another, and wherein said authentication data does not comprise an encrypted representation of said content data and said dispatch record data which is encrypted with a secret key, either symmetric or asymmetric, associated with said recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. Authentication data for authenticating a dispatch and contents of the dispatch electronically transmitted from or for a sender to a recipient, comprising a representation of the following set A of information elements:
-
content data a1 representative of the contents of a dispatch; and
dispatch record data elements a2, . . . ,an which include at least an indicia a2 relating to a time of the dispatch and an indicia a3 relating to the destination of the dispatch, wherein said time related indicia a2 being provided in a manner resistant to or indicative of tampering by either of the sender and the recipient, and wherein at least part of said authentication data is secured against tampering of the sender and the recipient, and wherein said authentication data are generated and secured by an authenticator functioning as a non-interested third party with respect to the sender and the recipient, and wherein said authentication data includes a set B comprising one or more information elements b1, . . . ,bm generated by respectively applying functions F1, . . . ,Fm to subsets S1, . . . ,Sm comprising selected portions of said set A, where said functions F1, . . . ,Fm can be different from one another and said subsets S1, . . . ,Sm can be different from one another, and wherein said authentication data does not comprise an encrypted representation of said content data and said dispatch record data which is encrypted with a secret key, either symmetric or asymmetric, associated with said recipient. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method for verifying the authenticity of a dispatch sent from a sender to a recipient, comprising the steps of:
-
providing a representation of a selected portion of a group A′
of data elements purported authentic, said elements including a content data, and dispatch record data comprising at least a time and destination relating to the dispatch;
comparing said representation for match with a representation of at least part of authentication data, that has been generated by an authenticator functioning as a non-interested third party with respect to the sender and the recipient, said authentication data comprising a representation of the following set A of information elements;
a1—
comprising a content data, and dispatch record data elements a2, . . . ,an which includes at least an indicia a2 relating to a time of the dispatch which is provided in a manner resistant to or indicative of tampering by either of the sender and the recipient, and an indicia a3 relating to said destination of the dispatch,wherein at least part of said authentication data is secured against tampering of the sender and the recipient, and wherein said authentication data includes a set B comprising one or more information elements b1, . . . ,bm generated by respectively applying functions F1, . . . ,Fm to subsets S1, . . . ,Sm comprising selected portions of said set A, where said functions F1, . . . ,Fm can be different from one another and said subsets S1, . . . ,Sm can be different from one another, and wherein said authentication data does not comprise an encrypted representation of said content data a1 and said dispatch record data elements a2, . . . ,an which is encrypted with a secret key, either symmetric or asymmetric, associated with said recipient. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
Specification