System and method for electronic certification and authentication of data
First Claim
1. A method for authenticating data, the method comprising:
- receiving data individually encrypted in a first encryption layer by each of a plurality of users each user using a different user-specific private key, the data comprising a hash code for each user, each hash code generated based on at least the same document;
encrypting the received individually encrypted data together in a second encryption layer to create multi-layered encrypted data wherein the second encryption layer is encrypted using an organization-specific private key uniquely assigned to an organization; and
transferring the multi-layered encrypted data to a device that has an organization-specific public key for decrypting the second encryption layer and public keys that only decrypt data encrypted by private keys assigned to a plurality of pre-designated authorizers to determine if the users are the pre-designated authorizers.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating data. Data may be received that is individually encrypted in a first encryption layer by each of a plurality of users using user-specific private keys. The received data may be encrypted together in a second encryption layer to create multi-layered encrypted data. The multi-layered encrypted data may be transferred to a beneficiary device to determine if the encrypted data is authentic. At the beneficiary device, the second encryption layer may be decrypted to expose the first encryption layer. Then, the first encryption layer may be decrypted using public keys that only decrypt data encrypted by private keys assigned to a plurality of authorizers pre-designated to authenticate the data. If the first encryption layer is properly decrypted using the authorizers'"'"' decryption keys, it may be determined that the users are the pre-designated authorizers.
113 Citations
20 Claims
-
1. A method for authenticating data, the method comprising:
-
receiving data individually encrypted in a first encryption layer by each of a plurality of users each user using a different user-specific private key, the data comprising a hash code for each user, each hash code generated based on at least the same document; encrypting the received individually encrypted data together in a second encryption layer to create multi-layered encrypted data wherein the second encryption layer is encrypted using an organization-specific private key uniquely assigned to an organization; and transferring the multi-layered encrypted data to a device that has an organization-specific public key for decrypting the second encryption layer and public keys that only decrypt data encrypted by private keys assigned to a plurality of pre-designated authorizers to determine if the users are the pre-designated authorizers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 18)
-
-
9. A method for authenticating original data, the method comprising:
-
receiving multi-layered encrypted data comprising a hash code for each of a plurality of users, each hash code generated based on at least the same document, wherein a first encryption layer is individually encrypted by a plurality of users each using a different user-specific private key, which is in turn combined and encrypted in a second encryption layer using an organization-specific private key uniquely assigned to an organization; decrypting the second encryption layer to expose the first encryption layer using an organization-specific public key corresponding to the organization-specific private key; attempting to decrypt the first encryption layer using public keys that only decrypt data encrypted by private keys assigned to a plurality of authorizers pre-designated to authenticate the data; and determining that the users are the pre-designated authorizers only if the first encryption layer is properly decrypted using the authorizers'"'"' decryption keys. - View Dependent Claims (10, 11, 12, 19)
-
-
13. A system for authenticating data, the system comprising:
-
a memory to store multi-layered encrypted data comprising a hash code for each of a plurality of users, each hash code generated based on at least the same document, wherein a first encryption layer is individually encrypted by a plurality of users each using a different user-specific private key, which in turn is combined and encrypted in an encryption layer using an organization-specific private key uniquely assigned to an organization; and a processor to transfer the multi-layered encrypted data to a beneficiary device, wherein the beneficiary device is adapted to; decrypt the second encryption layer to expose the first encryption layer using an organization-specific public key corresponding to the organization-specific private key, attempt to decrypt the first encryption layer using public keys that only decrypt data encrypted by private keys assigned to a plurality of authorizers pre-designated to authenticate the data, and determine that the users are the pre-designated authorizers only if the first encryption layer is properly decrypted using the authorizers'"'"' decryption keys. - View Dependent Claims (14, 15, 16, 17, 20)
-
Specification