Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each chec
Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain. The hierarchy culminates with a signed hash that can be used to verify the integrity of other hash values in the hierarchy, and these other hash values can, in turn, be used to efficiently verify the authenticity of arbitrary portions of the content file.
대표청구항▼
1. A computer-implemented method for authenticating a streamed transmission of a digital file, the method being performed by a system comprising a processor and a non-transitory computer-readable storage medium storing instructions that when executed by the processor, cause the system to perform the
1. A computer-implemented method for authenticating a streamed transmission of a digital file, the method being performed by a system comprising a processor and a non-transitory computer-readable storage medium storing instructions that when executed by the processor, cause the system to perform the method, the method comprising; receiving a streamed transmission of a digital the and a progression of check values, each check value in the progression of check values being derived from at least one other check value in the progression and from a portion of the digital file, the progression of check values comprising an encrypted final check value corresponding to a beginning portion of the digital file and being included in proximity to a beginning of the streamed transmission;decrypting the encrypted final check value;determining the integrity of one or more portions of the digital file based, at least in part, on the decrypted final check value; anddetermining if the streamed transmission is authentic based on the determined integrity of the one or more portions of the digital file before the entire digital file is received. 2. The computer-implemented method of claim 1, wherein the streamed transmission further comprises error-check values, each error-check value being inserted in proximity to a part of the digital file to which said error-check value corresponds, each error-check value being configured to facilitate authentication of a part of the digital file and a check value in the progression of check values. 3. The computer-implemented method of claim 2, wherein each error-check value comprises a hash of the part of the digital file to which the error-check value corresponds. 4. The computer-implemented method of claim 2, wherein at least one error check value comprises a hash of a combination of the hash part of the digital file to which the error-check value corresponds and at least one other error-check value. 5. The computer-implemented method of claim 1, wherein determining the integrity of the one or more portions of the digital file comprises determining that the one or more portions of the digital file are authentic and the method further comprises authenticating the streamed transmission. 6. The computer-implemented method of claim 1, wherein determining the integrity of the one or more portions of the digital file comprises determining that the one or more portions of the digital file are not authentic and the method further comprises implementing at least one defensive action. 7. The computer-implemented method of claim 6, wherein the at least one defensive action comprises terminating a connection with a source of the streamed transmission. 8. The computer-implemented method of claim 6, wherein the at least one defensive action comprises preventing a user of the system from using the digital file. 9. The computer-implemented method of claim 6, wherein the at least one defensive action comprises terminating an application executing on the system receiving the streamed transmission. 10. The computer-implemented method of claim 6, wherein the at least one defensive action comprises recording the determination that the one or more portions of the digital file are not authentic. 11. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor, are configured to cause the processor to perform a method for authenticating of a streamed transmission, the method comprising: receiving a streamed transmission of a digital file and a progression of check values, each check value in the progression being derived from at least one other check value in the progression and from a portion of the digital file, the progression of check values comprising an encrypted final check value corresponding to a beginning portion of the digital file and being included in proximity to a beginning of the streamed transmission;decrypting the encrypted final check value;determining the integrity of one or more portions of the digital file based, at least in part, on the decrypted final check value; anddetermining if the streamed transmission is authentic based on the determined integrity of the one or more portions of the digital file before the entire digital file is received. 12. The non-transitory computer-readable storage medium of claim 11, wherein the streamed transmission further comprises error-check values, each error-check value being inserted in proximity to a part of the digital file to which said error-check value corresponds, each error-check value being configured to facilitate authentication of a part of the digital file and a check value in the progression of check values. 13. The non-transitory computer-readable storage medium of claim 12, wherein each error-check value comprises a hash of the part of the digital file to which the error-check value corresponds. 14. The non-transitory computer-readable storage medium of claim 12, wherein at least one error check value comprises a hash of a combination of the hash part of the digital file to which the error-check value corresponds and at least one other error-check value. 15. The non-transitory computer-readable storage medium of claim 11, wherein determining the integrity of the one or more portions of the digital file comprises determining that the one or more portions of the digital file are authentic and the method further comprises authenticating the streamed transmission. 16. The non-transitory computer-readable storage medium of claim 11, wherein determining the integrity of the one or more portions of the digital file comprises determining that the one or more portions of the digital file are not authentic and the method further comprises implementing at least one defensive action. 17. The non-transitory computer-readable storage medium of claim 16, wherein the at least one defensive action comprises terminating a connection with a source of the streamed transmission. 18. The non-transitory computer-readable storage medium of claim 16, wherein the at least one defensive action comprises preventing a user from using the digital file. 19. The non-transitory computer-readable storage medium of claim 16, wherein the at least one defensive action comprises terminating an application executing on the system receiving the streamed transmission. 20. The non-transitory computer-readable storage medium of claim 16, wherein the at least one defensive action comprises recording the determination that the one or more portions of the digital file are not authentic.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (51)
Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Warminster GB2) Proudler Graeme J. (Stoke Gifford GB2), Data authentication and protection system.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.