WO2000039659A1 - Transmitting reviews with digital signatures - Google Patents

Transmitting reviews with digital signatures Download PDF

Info

Publication number
WO2000039659A1
WO2000039659A1 PCT/EP1999/010212 EP9910212W WO0039659A1 WO 2000039659 A1 WO2000039659 A1 WO 2000039659A1 EP 9910212 W EP9910212 W EP 9910212W WO 0039659 A1 WO0039659 A1 WO 0039659A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
time stamp
review
signature
fingeφrint
Prior art date
Application number
PCT/EP1999/010212
Other languages
French (fr)
Inventor
Michael S. Pasieka
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Priority to KR1020007009533A priority Critical patent/KR20010041400A/en
Priority to DE69917434T priority patent/DE69917434T2/en
Priority to EP99964634A priority patent/EP1057095B1/en
Priority to BR9908289-6A priority patent/BR9908289A/en
Priority to JP2000591491A priority patent/JP2002533824A/en
Publication of WO2000039659A1 publication Critical patent/WO2000039659A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H15/00ICT specially adapted for medical reports, e.g. generation or transmission thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H30/00ICT specially adapted for the handling or processing of medical images
    • G16H30/20ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/88Medical equipments

Definitions

  • the invention is related to the field of cryptography and more specifically to cryptographically timestamping documents to prove their existence at a certain time.
  • a digital document i.e. a document such as a contract or receipt that is digitally stored in a computer system
  • a certain date such as the alleged creation date or distribution date of the document.
  • a one-way hash of the document is produced, and the hash is encrypted using a private key of the owner of the document in order to form a so called digital signature.
  • the document signature is sent to a digital notary or time stamper who combines the digital signature with a digital stamping time (digital representation of the time and date) to form a time stamp, and the notary hashes the time stamp and encrypts the time stamp hash using the digital notary's private key to form another digital signature called the time stamp signature. Then the notary sends a record including the time stamp and the time stamp signature to the author.
  • Notarizing digital documents is disclosed in U.S. patent 5,136,646. Notarizing by secure hardware in a system is disclosed in U.S. patent 5,001,752.
  • Public key cryptography is disclosed in "New Directions in Cryptography” by Diffie and Hellman in IEEE Transactions On Information Theory, Vol IT-22, November 1976, pp 644-654 and in U.S. patents 4,405,829 to Rivest and 4,868,877.
  • One-way hashing is disclosed in "Collision-Free Hash Functions and Public Key Signature Schemes", Advances in Cryptology - Eurocrypt '87, SpringerNerlag, LNCS, 1988, vol. 304, pp. 203-217.
  • a first document is reviewed and a digital log (review document) of review activities during a review of the first document and then the review document is digitally signed and the signature is notarized in such a way, that the relationship between the first document and the review document can be proved as well as the origination and integrity of the review document and the time of the review document's notarization.
  • a digital activity log of a critical procedure is produced and the activity log is digitally signed and notarized, so that, the integrity and origination of the activity log can be proved.
  • an image is created and sent to a secure server.
  • the server signs the image (hashes the image and encrypts the hash) and sends the server's image signature to an electronic notary which notarizes the image signature.
  • the notary returns a time stamp and time stamp signature for the image signature (image time stamp and notary's image signature) to the server.
  • the server sends the image and server's image signature to a reviewer who uses the signature to verify the origin and integrity of the image.
  • the reviewer may also receive the image time stamp and notary's image signature and verify the time of notarization of the image.
  • the reviewer human reviews the image and the reviewer's workstation automatically creates a review activity log (review) which is returned to the server.
  • the server combines the review with information indicating that the review is related to the image.
  • the identifying information may be, for example, the image hash, image signature, image time stamp or notary's image signature.
  • the server signs the combination and sends the server's review signature to the notary which notarizes the server's review signature.
  • the notary returns a review time stamp and notary's review signature to the server.
  • the server sends the image, image signature, review, and review signature to an auditor who can verify the origin and integrity of the review, that the review was based on the image, and the origin and integrity of the image.
  • the server may also send the image time stamp, notary's image signature, review time stamp, and notary's review signature to the auditor who can verify the time of notarization for the image and review. Then the auditor can review the quality of the image and the quality of the review.
  • a report is signed by the author before the report is sent to the server. Then the report and author's signature are sent to a server which sends the author's signature to the notary which notarizes the author's signature. Preferably, the notary returns a time stamp and time stamp signature for the report to the server. Then, later upon request, the server sends the report and report signature to the reviewer who can use the report signature to verify the origin and integrity of the report. The server may also send the report time stamp and notary's signature to the reviewer who can verify the time at which the report was notarized.
  • the human reviewer reviews the report and the reviewer's workstation automatically creates a review (log of activities and conclusions of the review process).
  • a multimedia presentation is produced in order to document the activities performed during a critical procedure, so that, the correctness of the procedure can be demonstrated.
  • the author signs the presentation and sends the presentation signature to an electronic notary who notarizes the signature.
  • the electronic notary creates a time stamp for the presentation, signs the time stamp, and returns the presentation time stamp and notary's presentation signature to the author.
  • the author sends the presentation, the presentation time stamp, and the notary's presentation signature to the reviewer.
  • the reviewer verifies the origin and integrity of the presentation and verifies the time of notarization in the presentation time stamp.
  • the reviewer's workstation automatically creates a review (review activities log).
  • the notary creates a time stamp, signs the time stamp, and returns the time stamp and notary's signature for the review to the reviewer.
  • the reviewer sends the review and review signature as well as the time stamp and notary's signature for the review to an auditor.
  • the auditor verifies the origin and integrity of the review and verifies the time of notarization.
  • the notary requests the presentation and presentation signature from the author as well as the time stamp and notary's signature for the presentation.
  • the auditor verifies the origin and integrity of the presentation and verifies the time of the notarization. Then the auditor reviews the quality of the presentation and/or the quality of the review.
  • Time stamps can be authenticated by having the notary resign the time stamp and return the signature and then checking whether the old and new signatures match.
  • Another method of authenticating time stamps is to provide information from the time stamp or the notary's signature to the notary and requesting that the notary use the information to find the notary's record of the time stamp and signature, and return information regarding success or failure or return the time stamp and signature, from the notary's records.
  • Another method of authenticating time stamps is for the notary to always return one or more previous and subsequent time stamps to the customer, and then the customer can contact other customers identified in the subsequent time stamps and request those customers to verify the time for the time stamp.
  • Figures 1 a- 1 h shows a flow chart of a first specific embodiment of the invention for authenticating image reviews.
  • Figures 2a-2i shows another flow chart for a second specific embodiment of the invention for authenticating report reviews.
  • Figures 3a-3i illustrate another flow chart for a third specific embodiment of the invention for authenticating presentations of critical procedures and reviews of such procedures.
  • Figure 4 shows a sample embodiment of the network system of the invention.
  • Figure 5 provides additional details of the authoring workstations of figure 4.
  • Figure 6 provides additional details of the reviewing workstations of figure 4.
  • Figure 7 illustrates additional details of the auditing workstations of figure 4.
  • Figure 8 illustrates additional details of the notary's host of figure 4.
  • Figure 9 shows additional details of the secure server of figure 4.
  • Figure 10 shows a specific embodiment of apparatus to program the systems of figures 6-9.
  • a reviewer workstation comprising means (550) for receiving a first document produced by an author; means (551) for automatically creating a review document while a human reviewer reviews the first document, including a log of the activities of the reviewer during the review.
  • the reviewer workstation further comprises means for verifying the origin and integrity of the first document, including: means (550) for providing: a record for the first document, the record including the first document; and an electronic signature for the first document, the signature being produced using a private key (784) of the first document for encrypting a fingerprint of the first document, the fingerprint being produced by hashing the record of the first document, the hashing being performed using a one-way hashing method; a public key (551) of the first document; means (553) for decrypting the first document signature using the public key (551) of the first document; means (554) for reproducing the fingerprint of the first document using the one-way hashing method; and means (555) for comparing the first document fingerprint with the decryption of the first document signature and verifying the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison.
  • means (550) for providing: a record for the first document, the record including the first document; and an electronic signature for the
  • the network further comprises means for verifying that the first document signature existed at some particular previous time, including: means (550) for receiving a time stamp and time stamp signature for the first document, the first document time stamp containing the stamping time at which the time stamp was produced and the first document signature, the first document time stamp signature being produced by encoding a fingerprint of the first document time stamp using a private key (704) of an electronic notary, the fingerprint being produced by hashing the time stamp using a one-way hashing method; and means for verifying the time stamp including: a public key (705) of the notary; means (556) for producing the fingerprint for the first document time stamp by hashing the time stamp using the one-way hashing method; means (557) for decrypting the first document time stamp signature using the public key (705) of the notary; and means (560) for comparing the first document time stamp finge ⁇ rint with the decryption of the first document time stamp signature and verifying the origin of the first document time stamp and that the first document time stamp
  • the reviewer workstation further comprises means for allowing the origin and integrity of the review document to be verified by others, including: means (571) for producing a review document record including the review document; means (572) for producing a digital finge ⁇ rint for the review document by hashing the review document record using a one-way hashing method; a private key (573) of the review document, securely held to prevent access by others; and a public key (574) of the review document, made available to others; means (575) for producing a digital signature for the review document by encrypting the review finge ⁇ rint using the review document private key (573); and means (580) for distributing the review document record, the review document signature, and the review document public key (574) whereby others can decrypt the review document signature using the review public key (574), produce the review document finge ⁇ rint by hashing the review document record, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the review document.
  • the digital signature of the review document includes identifying information that can be used to identify the first document as the document on which the review document is based.
  • the identifying information depends on information contained in the first document record.
  • the identifying information depends on a private key used for signing the first document.
  • the workstation further comprises means for receiving a time stamp of the first document, the time stamp including a digital stamping time; and the identifying information depends on information included in the time stamp.
  • the workstation further comprises means for allowing verification of the existence of the review document signature at the time of the review, including: means (577) for providing the review document signature to an electronic notary; means (577) for receiving a time stamp and time stamp signature for the review document from the electronic notary, the review document time stamp including the stamping time and the review document signature, the review document time stamp signature being produced from a finge ⁇ rint of the review document time stamp using a private key of the notary, the finge ⁇ rint of the review document time stamp being produced by hashing the time stamp using a one-way hashing method; and means (580) for distributing the time stamp and time stamp signature whereby others can decrypt the time stamp signature using the public key (552) of the notary, produce the time stamp finge ⁇ rint by hashing the time stamp, and compare the decryption with the finge ⁇ rint so as to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
  • means (577) for providing the review document signature to
  • the log of activities includes information indicating the time for which the first document was displayed.
  • the log of activities includes information indicating the times for which portions of the first document were displayed and the order in which the portions were displayed.
  • the reviewer uses multiple displays or multiple windows on one display and the log of activities includes information indicating the times for which portions of the first document were displayed at each respective display or window.
  • the log of activities includes information indicating the times when the reviewer was looking at the display.
  • the reviewer uses multiple displays or multiple windows on one display and the log of activities includes information indicating the times during which the reviewer looked at each respective display or window.
  • the log of activities includes information entered by the reviewer during the review.
  • the log of activities includes information indicating the configuration of software used during the review.
  • the log of activities includes information indicating the configuration of hardware used during the review.
  • the log of activities includes information indicating image manipulations used during the review, the image manipulations being selected from the group including: zooming into portions of images of the first document; slow motion of a video portion of the first document; contrast adjustment of images or video; changes in color in images or video; or other digital image enhancements.
  • An authoring workstation comprising: means (483) for recording a presentation document including a log of activities of a critical procedure; means for allowing the origin and integrity of the presentation document to be verified, including: means (484) for producing a presentation document record including the presentation document; means (485) for producing a digital finge ⁇ rint for the presentation document by hashing the presentation document record using a one-way hashing method; a private key (486) of the presentation securely held from others; and a public key (487) made available to others; means (441) for producing a digital signature for the presentation document by encrypting the presentation finge ⁇ rint using the private key (486) of the presentation; means (496) for distributing the presentation document record, the presentation document signature, and the public key (487) of the presentation whereby others can decrypt the presentation document signature, produce the presentation document finge ⁇ rint by hashing the presentation document record, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the presentation document; means (49
  • the critical procedure is a medical operation and the workstation includes a multitude of cameras (458) for recording the operation from different perspectives and one or more microphones (459) for recording the audio information during the operation.
  • the critical procedure is an inspection of a building construction to determine compliance with specifications; the workstation includes a portable camera (458) and microphone (459) for recording what an inspector sees in the building.
  • An auditor workstation comprising: means (630) for obtaining a first document record including a first document, a public key (631 ) of the first document, a first document time stamp, a first document time stamp signature, a public key (632) of the review, a review document record including a review document, a review document time stamp, a review document time stamp signature, and a public key (633) of the notary; means (634) for decrypting the first document signature using the public key (631) of the first document; means (635) for reproducing the finge ⁇ rint of the first document using the one-way hashing method; means (636) for comparing the first document finge ⁇ rint with the decryption of the first document signature and verifying the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison; means (637) for producing the finge ⁇ rint for the first document time stamp by hashing the time stamp using the one-way hashing method; means (640) for decrypting
  • a secure server comprising: means (780) for receiving through a secure channel, a first document from an author; means (781) for producing a first document record including the first document; means (782) for storing the first document record; means (811, 812) for providing a digital signature for the first document, the signature being formed by encrypting the first document finge ⁇ rint using a first document private key (784); a first document public key (785) for others to use for decrypting the signature of the first document for reproducing the first document finge ⁇ rint; means (787) for distributing the first document record, the first document signature, and the first document public key (785) whereby others can decrypt the first document signature using the public key, produce the first document finge ⁇ rint by hashing the time stamp, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the first document; means (815, 816 and 817) for providing a time stamp and time stamp signature of a notary for the first document; means (79
  • the server further comprises: means for producing a digital finge ⁇ rint for the first document by hashing the first document record using a one-way hashing method; and means for producing a digital finge ⁇ rint for the review document by hashing the review document record using the one-way hashing method.
  • the means for providing a first document signature includes one or more of: means for encrypting the first document finge ⁇ rint using a private key of the first document, and means for receiving a first document signature from the author.
  • the means for providing a review document signature includes one or more of: means for encrypting the review document finge ⁇ rint using a private key of the review document; and means for receiving a first document signature from the reviewer.
  • the means for providing a time stamp and time stamp signature of a notary for the first document includes one or more of: means for receiving the time stamp and time stamp signature for the first document from the author; and the combination of: means for providing the first document signature to an electronic notary; and means for receiving a first document time stamp and first document time stamp signature from the electronic notary, the first document time stamp including the stamping time at which the time stamp was produced and the first document signature, the first document time stamp signature being produced from a finge ⁇ rint of the first document time stamp using a private key of the notary;
  • the means for providing a time stamp and time stamp signature of a notary for the review document includes one or more of: means for receiving the time stamp and time stamp signature for the first document from the reviewer; and the combination of: means for providing the review document signature to an electronic notary; and means for receiving a time stamp and time stamp signature for the review document from the electronic notary, the review document time stamp including the stamping time at which the time stamp was produced and the review document signature, the review document time stamp signature being produced from a finge ⁇ rint of the review document time stamp using a private key of the notary, the finge ⁇ rint of the review document time stamp being produced by hashing the time stamp using a one-way hashing method.
  • Figures la-lh show a first specific embodiment of the invention for authenticating reviews.
  • an author uses an imager to create an image and the image is automatically sent to a server which signs and stores the image.
  • the author operates an imager to create an image and initiates submitting the image to a secure server.
  • the imager may include any equipment that produces an image such as a text page scanner, digital still camera, fax machine, medical scanner (electrocardiogram / angiogram, ultrasound imager, computerized axial tomograph, magnetic resonance imager, X-ray machine) or any other method of making images.
  • the images may be video images and/or audio images such as a cardiac sound recording or a medical record dictation.
  • the imager transmits the image to a secure server over a secure channel.
  • the secure channel may be an encrypted message over a public network or an non- encrypted message over a private (secure) network with sufficient security precautions, depending on the nature of the information.
  • the transmission will identify the author and the imager device.
  • the server may return an image sequence number for the imager to facilitate later access to the image.
  • the server combines the imager ID (or author ID) and image sequence number with the image to produce an image record and stores the image record.
  • the items of information in the image record are stored relationally so they can easily be retrieved based on, for example, a keyword search.
  • relationally just means that, the fact that some information item is related to another information item and vice versa is also stored in the workstation.
  • the items of the image record are stored relationally with each other.
  • the server hashes the image record using a one-way hash to produce an image finge ⁇ rint.
  • the advantage of a one-way hash is that it can not be reversed to decrypt the report, so that, even if the report were confidential or private the finge ⁇ rint would not have to be kept confidential.
  • a hash of a digital document is commonly referred to as a digital finge ⁇ rint.
  • the server encrypts the image finge ⁇ rint using the server's private key (or author's or imager's private keys stored in the server) to form an image signature.
  • the pinpose of the encryption is to provide proof that the author is the originator of the image, and that the image has not been altered by others since it was signed.
  • the encryption of the hash has nothing to do with keeping the data or the hash secret but only to prove integrity and origin of the image.
  • the server has a private key that can be used to encrypt digital information and which is kept confidential from other parties.
  • the other parties have a related public key that can be used to decrypt information that was encrypted using the private key. That is, the server has made the public key publicly available, for example, by posting the public key on another non-secure server or by publishing the key.
  • Others who whish to verify the origin of the image e.g. that the imager connected to the server produced the image
  • integrity of the image i.e. that the image has not been changed or replaced with another image since it was signed by the server
  • the author ID (or scanner ID) and image sequence number are included in the image record to provide evidence of the origin of the image.
  • the server obtains a time stamp and a time stamp signature from an electronic notary for the server's image signature.
  • the server establishes a connection with the notary's host network, and the server sends the server's image signature to the host.
  • the channel does not need to be secure since the image signature is not confidential.
  • the host creates an image time stamp containing the server's image signature and the digital time of the time stamping (e.g. receipt time or stamping time).
  • the notary ID, the sequence number of the time stamp (this is different than the sequence number of the image), and the server ID are also included in the time stamp.
  • step 115 the host hashes the image time stamp, to produce a time stamp finge ⁇ rint, and in step 116, the host signs the time stamp hash (finge ⁇ rint) using the notary's private key to produce a time stamp signature for the image.
  • step 117 the host produces a time stamp record for the image containing the image time stamp and the notary's image signature and stores the information items of the record relationally in the notary's protected storage.
  • step 118 the host transmits the image time stamp record back to the server.
  • the server verifies and stores the time stamp record.
  • the server hashes the image time stamp and decrypts the notary's image signature using the notary's public key in order to verify the integrity and origin of the image time stamp and the notary's image signature. If they match, the server knows that the signature and time stamp are from the notary (or at least someone with access to the notary's private key) because it was the notary's public key that decrypted the signature, and the server also knows that the signature and time stamp have not been altered since the notary signed the time stamp.
  • the server stores the information items of the notary's image time stamp record with relation to the information items in the image record and the server's image signature.
  • a reviewer (human user) requests the image for reviewing the image using a displayer and the stored image record is provided by the server along with and the image time stamp record, and the displayer verifies the origin, integrity, and time of notarization of the image.
  • the reviewer requests the image using the displayer, for example, by specifying an imager ID and image sequence number.
  • the displayer may be any equipment that allows the image to be played to the user.
  • the displayer is not restricted to visual display and may be, for example, a loud speaker playing an audio image.
  • the server sends the image record and the time stamp record for the image to the displayer over a secure channel (if the image is confidential).
  • step 134 the displayer hashes the image time stamp and decrypts the notary's image signature using the notary's public key in order to verify the digital time of notarization and other information in the image time stamp.
  • step 135 the displayer produces the image finge ⁇ rint and decrypts the servers's image signature (from the image time stamp) using the server's public key and compares the decryption with the finge ⁇ rint to verify the origin and integrity of the image. If they match, the reviewer knows that the signature and report are from the server (or at least someone with access to the server's private key) because it was the server's public key that decrypted the signature, and the reviewer also knows that the signature and report have not been altered since the author signed the report.
  • the reviewer reviews the image as the displayer automatically generates a log of the review activities (review), the reviewer enters his conclusions and submits the review, and then the displayer sends the review back to the server.
  • the reviewer initiates recording of a review activities log (review) for the image by, for example, entering a command into a user interface of the displayer to display the image.
  • the displayer may record the begin time and end time during which the reviewer displays the image. Alternately, the review may contain the total time during which the image was displayed.
  • the review may also include any keystrokes or audio dictation the reviewer enters to record comments or conclusions about the image.
  • the workstation documents the configuration of the workstation including the revision level of all the software on the workstation and the hardware connected to the workstation. If portions of the image are subject to manipulations, such as zooming, changing contrast, changing color assignments, and various digital image enhancements, they are logged in the review.
  • the reviewer may be able to look at multiple windows on a display or on multiple displays, for example, to compare two images or the same image with different image enhancements.
  • the review may contain a log indicating which windows or displays the reviewer looks at in what order and for how long.
  • the activities log would include a video showing what the reviewer is examining.
  • the log could be played to show the views that the reviewer looked at in the same order for the same time.
  • the image is a product of a compressed transmission (e.g. MPEG II)
  • MPEG II a compressed transmission
  • Such a system would especially be useful for critical activities such as medical image reviews.
  • other known methods could be used to determine what monitors the reviewer is studying during the review.
  • the reviewer enters conclusions and submits the review activities log.
  • the reviewer may press a button on the displayer indicating that there is nothing interesting on the image and the image would be replaced by the next image, and the review log would contain the amount of time that image was viewed and the fact that the results were negative.
  • the review log may include a video of the reviewer's activities during the review with extensive audio comments about whatever is shown on the image.
  • conclusions may be entered through every part of a more extensive review, but typically comments will be entered at least at the end of the review.
  • the displayer sends the review and review record's ID to the server over a secure channel and server returns a sequence number for the review.
  • the displayer forms a review record that includes the review and preferably, other information, such as, the reviewer's ID, a review title, and the displayer ID, and sends it to the server over a secure channel.
  • the server returns a receipt and may return a sequence number or other ID, so that, the reviewer can be easily accessed.
  • the server stores the review record, verifies the review record, and obtains a time stamp record for the review.
  • the server produces a review record containing the information received from the displayer possibly along with other information such as a receipt time, displayer ID, and review sequence number.
  • the items of information in the review record are stored relationally with the items of information in the image record and image time stamp record.
  • the server produces a finge ⁇ rint of the review record by combining the imager ID and image sequence number with the review record and hashing the combination. Combining the imager ID and image sequence number with the review record provides evidence that the review is based on the image.
  • step 156 the server produces a review signature by encrypting the review finge ⁇ rint using the server's private key.
  • step 158 the server obtains a time stamp record for the review. This step inco ⁇ orates all of steps 112-124 shown in figures lb and lc, except in this case, those steps are performed for the review rather than for the image. The description of those steps above is sufficient for those skilled in the art to understand step 158.
  • an auditor human user
  • the auditor requests the review record and review time stamp from the server using an auditing workstation by, for example, specifying the displayer ID and review sequence number.
  • the auditor's workstation may be any equipment that allows the review to be played based on the image, so that, the auditor can determine the quality of the image and the quality of the review.
  • the server sends the review record and the review time stamp record to the auditor's workstation.
  • the workstation hashes the review time stamp and decrypts the notary's review signature using the notary's public key, and compares the decryption to the hash in order to verify the digital time of notarization and other information in the image time stamp.
  • step 168 the workstation verifies the review by producing the review finge ⁇ rint and decrypting the server's review signature (from the review time stamp) and compares the decryption with the finge ⁇ rint in order to verify the origin and integrity of the review.
  • the auditor requests the image record and image time stamp record and verifies the image and image time stamp and then audits the image and review for quality.
  • the auditor requests the image from the server by specifying, for example, the imager ID and image sequence number, and in step 174, the server sends the image record and the time stamp record to the workstation.
  • step 176 the workstation verifies the image time stamp by hashing the image time stamp and decrypting the notary's image signature using the notary's public key, and comparing the hash to the decryption.
  • step 177 the workstation produces the image finge ⁇ rint and decrypts the servers's image signature (from the image time stamp) and compares the decryption with the finge ⁇ rint to verify the origin and integrity of the image.
  • step 178 the auditor plays the review based on the image, so that, the auditor can determine the quality of the image and the quality of the review of the image.
  • Figures 2a-2i show a second specific embodiment of the invention for authenticating reviews.
  • Figure 2a illustrates a first group of steps 200 of the method of the invention, in which software loaded in the author's workstation is used for creating and signing a digital document, so that, others can authenticate the origin and integrity of the document and for storing the document and signature.
  • an author creates a report (digital document) using software loaded onto the workstation which is connected to a server in a network, and the author inputs a command to submit the report to the server.
  • the report may include any digital information such as written text, filled out forms, scanned images, and sound recordings.
  • the report contains the type of information that someone may desire to prove originated from the author and has not been altered.
  • the report may be a medical report, a contract or other legal papers, a safety or specification compliance report of a building under construction, or any other collection of information that needs to be protected from unauthorized alteration or replacement.
  • the author's workstation produces and stores a report record containing the report.
  • the report record also contains the author's ID and the report title. Other information may also be included in the report record such as the editing history for creating the report, the creation time of the report, the workstation ID.
  • the items of information in the report record are stored relationally so they can easily be retrieved based on, for example, a keyword search. In this case, relationally just means that, the fact that the report is related to the hash and signature and vice versa is also stored in the workstation.
  • the author's workstation preferably hashes the report record using a specified oneway hashing method to form a report finge ⁇ rint.
  • the workstation encrypts the report finge ⁇ rint using the author's private key (or private key of the workstation) to form the author's signature for the report.
  • the author has a private key that can be used to encrypt digital information and other parties have a public key that can be used to decrypt the information.
  • the workstation stores the author's signature in the storage of the workstation relationally with the items of information in the report record.
  • the workstation may delete those items, or archive them onto removable media or otherwise remove the information from the random access storage of the workstation.
  • the workstation sends (transmits) the report record and the author's signature for the report to a customer's server. If the contents of the report are confidential or private then a secure channel is established between the workstation and the server before the transmission and the server is a secure server.
  • a secure channel may be a transmission of encrypted data through a public network or of non-encrypted data through a private (secure) network with reasonable security precautions taken depending on the confidentiality of the information.
  • the server verifies and stores the report.
  • the server hashes the report record to produce the same report fmge ⁇ rint as described above in step 204. Also, the server decrypts the author's signature using the author's public key. Then in step 215, the server compares the report finge ⁇ rint to the decrypted signature to verify that they match.
  • the server knows that the signature and report are from the author (or at least someone with access to the author's private key) because it was the author's public key that decrypted the signature, and the server also knows that the signature and report have not been altered since the author signed the report.
  • the server stores the report record.
  • the items of the report record and the author's signature are stored relationally in the server's secure storage, so that, they can be easily accessed.
  • the secure server may send a receipt to the workstation, so that, the workstation removes at least the report from active storage.
  • the server obtains a time stamp and time stamp signature for the author's report signature, from an electronic notary.
  • the server sends the author's report signature to a notary's host system over the network. Since the signature is not confidential, high security is not required for signature transmission, so that, a secure channel is not required. Alternately, the notary could be a secure part of the hardware of the server, for example, a device with a private key that the owner of the server would not know or be able to discover without destroying the device.
  • the host creates a time stamp containing the author's signature and the receipt time (or time of creating the time stamp).
  • the notary ID, time stamp sequence number, and customer ID are also included in the time stamp.
  • the customer ID may be associated with the server or with some or all of the servers of a customer.
  • the notary hashes the time stamp and in step 226, the notary signs the time stamp hash by encrypting the time stamp using the notary's private key.
  • the notary publicly provides a public key which can be used to decrypt the notary's signature.
  • anyone with access to the time stamp and notary's signature can hash the time stamp and decrypt the notary's signature using the public key and compare the hash to the decrypted signature and determine if they match.
  • time stamp includes a stamping time and the author's report signature it proves that the signature existed at the time of stamping and that the report existed at some time before the stamping.
  • the electronic notary stores the time stamp and the notary's signature for the report relationally, for example, on a secure disk drive system of the notary.
  • the notary transmits to the server, a time stamp record for the report, including the report time stamp and the notary's report signature for the time stamp.
  • one or more previous and subsequent time stamp records may be sent in a package to the customer's server, so that, by contacting the customers identified in the subsequent time stamp records, the authenticity of the time stamp can be verified independently from the notary.
  • the server authenticates and stores the time stamp record.
  • step 232 in order to authenticate the report time stamp, the server hashes the time stamp and decrypts the notary's report signature using the notary's public key.
  • step 235 the server compares the time stamp hash with the decrypted time stamp signature, and if there is a match, then the time stamp is authenticated. That is, the server knows that the time stamp and notary's signature are from the notary and have not been altered since the time stamp was signed.
  • step 238 the server stores the information items from the time stamp record (and any previous and subsequent time stamp records) with relation to the information items in the report record.
  • a reviewer human user obtains a copy of the report (first document) and verifies its origin and integrity.
  • the reviewer uses a review workstation (displayer) to request the report from the server by specifying, for example, the author's ID and report title. The reviewer could be using the same workstation as was used by the author or a different workstation.
  • the server sends the report record and report time stamp record to the reviewer's workstation through a secure channel.
  • the reviewer's workstation hashes the time stamp and decrypts the notary's signature using the notary's public key to verify the time stamp.
  • the workstation knows that the notary's signature was produced from the time stamp by someone with access to the notary's private key and thus, that the information in the time stamp existed when the signature was produced. Since the time stamp contains the author's signature for the report and the time (including date) at which the notary's signature was produced, it proves that the author's signature existed at that time and the report existed at some previous time.
  • the workstation hashes the report and decrypts the author's signature (contained in the time stamp) using the author's public key, and compares the results to verify the author's signature.
  • the reviewer reviews the report as a log is produced to document the review activity and the resulting review activity log (review) is digitally signed.
  • the reviewer initiates the review of the report by, for example, specifying the author ID and report title and the workstation automatically records the review activities in the log.
  • the workstation documents the configuration of the workstation including the revision level of all the software on the workstation and the hardware connected to the workstation.
  • the workstation documents every step of the review including which parts of the report are examined, and how long and in what order they are examined. If portions of the report are subjected to manipulations such as zooming, slow motion, contrast adjustment, changes in color, or other digital image enhancements, then those manipulations are recorded in the log.
  • the reviewer may dictate or otherwise enter review information and conclusions into the review (log) during the review.
  • the workstation includes one or more video cameras and microphones and a video and audio record of the reviewer's activities are made to document the actual extent of the review, that is, what the reviewer was looking at, his expression, his comments during the review.
  • the recording of the log is performed in the background, so that, it does not interfere with the review process, but the reviewer is expected to enter comments about the report during the review and preferably conclusions at the end of the review.
  • step 253 the reviewer enters conclusions of the review of the report into the review activity log (review) and inputs a command to submit the review to the server.
  • the workstation combines the review log and the report time stamp to form a review record. Other information may also be included in the review record, such as, the reviewer's ID, the workstation ID, the review title, a review sequence number for the workstation.
  • the workstation hashes the review record to produce a review finge ⁇ rint. The pu ⁇ ose for combining the time stamp with the review log before signing is to document that the review is a review of the report.
  • step 256 the workstation encrypts the review finge ⁇ rint using the reviewer's (or workstation's) private key to form the reviewer's signature.
  • the workstation may store the review, and the reviewer's signature, if desired.
  • step 258 the workstation sends the review record, and reviewer's signature to the server.
  • the server authenticates the review record an stores the review record and reviewer's signature. The server can then return a receipt to the review workstation, so that, the review can be deleted to same storage space on the review work station.
  • the server hashes the review record to form a review finge ⁇ rint, and decrypts the reviewer's signature using the reviewer's public key.
  • the server compares the decrypted signature with the finge ⁇ rint to verify the origin and integrity of the review.
  • the server knows that the review is from the reviewer, the review is based on the report, and the review and signature have not been changed since the reviewer signed the review.
  • the secure server stores the review record and the reviewer's signature with relation to the information related to the report.
  • the server sends the reviewer's signature to an electronic notary which produces a time stamp, signs the time stamp, stores the time stamp and its signature, and returns the time stamp and signature to the server.
  • steps are similar to the steps 220, in figure 2c, which should be referred to, and only the differences will be discussed below.
  • the server sends the reviewer's signature to the electronic notary.
  • the notary's host creates a time stamp that contains the reviewer's signature and the receipt time.
  • the notary's ID, a time stamp sequence number, and the customer ID for the server are also included in the time stamp.
  • step 274 the host hashes the time stamp, and in step 276, the host encrypts the time stamp hash to sign the time stamp using the notary's private key.
  • step 277 the host stores the time stamp and notary's signature, and in step 278, the notary's host returns a review time stamp record including the review time stamp and the notary's review signature to the server.
  • step 280 in figure 2i, for this embodiment, the server verifies the notary's time stamp and time stamp signature for the review, and stores the review time stamp record.
  • step 285 the server hashes the review time stamp and decrypts the notary's review signature.
  • the server stores the review time stamp and notary's review signature with relation to the information items in the report record, report time stamp record, and review record.
  • Figures 3a-3i illustrate a third specific embodiment of the invention for authenticating reviews.
  • Figure 3a shows a first group of steps 300, of the method of the invention in which an author creates a digital presentation that documents the procedure used in a critical process. Then the author uses software loaded in the author's workstation for signing, storing, and having the presentation notarized, so that, others can authenticate the origin and integrity of the presentation and the time of notarizing the presentation.
  • the presentation may be a multimedia documentary including video, audio, text, images and any other type of digital information about a critical procedure.
  • the presentation may be an audio video record of an inspection of a building under construction to document compliance with specifications and building codes.
  • the presentation may document the design or construction or testing of a product such as an ai ⁇ lane or a facility such as a nuclear power plant.
  • the presentation may be a record of a procedure such as, a multimedia documentary of a medical procedure such as a medical operation on a patient.
  • the presentation may be created as legal evidence such as a video version of a last will and testament or a video deposition of a witness for a legal proceeding.
  • an author creates the presentation.
  • the presentation may be created using remote mobile equipment (e.g. a cam corder) and then loaded into the author's workstation or it may be produced at the workstation using connected recording equipment and software loaded onto the author's workstation.
  • the author inputs a command to sign the presentation.
  • the author's workstation produces a presentation record containing the presentation and stores the record.
  • the presentation record also contains the author's ID and the presentation title.
  • Other information may also be included in the presentation record such as the revision and editing history for creating the presentation, the creation time of the presentation, the workstation ID.
  • the items of information in the presentation record are stored relationally so they can easily be retrieved.
  • step 304 the author's workstation hashes the presentation record using a specified one-way hashing method to form a presentation finge ⁇ rint.
  • step 306 the workstation encrypts the presentation finge ⁇ rint using the author's private key (or private key of the workstation) to form the author's signature for the presentation.
  • step 308 the workstation stores the author's signature in the storage of the workstation relationally with the items of information in the presentation record.
  • the author's workstation obtains a time stamp and time stamp signature for the author's presentation signature, from an electronic notary.
  • the author's workstation sends the author's presentation signature to an electronic notary's host system.
  • the host creates a time stamp containing the author's signature and the receipt time.
  • the notary ID, time stamp sequence number, and author ID are also included in the time stamp.
  • the notary hashes the time stamp, and in step 316, the notary signs the time stamp hash using the notary's private key.
  • the electronic notary stores the time stamp and the notary's signature for the presentation relationally.
  • the notary transmits, to the author, a time stamp record for the presentation, including the presentation time stamp and the notary's presentation signature for the time stamp.
  • the author authenticates and stores the time stamp record.
  • the workstation in order to authenticate the time stamp, the workstation hashes the time stamp and decrypts the notary's signature using the notary's public key.
  • the authoring workstation compares the time stamp hash with the decrypted time stamp signature, and if there is a match, then the time stamp is authenticated.
  • the workstation stores the information items of the time stamp record and any previous and subsequent time stamp records with relation to the information items in the presentation record.
  • a reviewer human user obtains a copy of the presentation from the author and verifies its origin and integrity.
  • the reviewer uses a review workstation (displayer) to request the presentation from the author by specifying the author's ID and presentation title.
  • the authoring station sends the presentation record and presentation time stamp record to the displayer.
  • the displayer hashes the time stamp and decrypts the notary's signature using the notary's public key to verify the time stamp.
  • step 338 the workstation reproduces the presentation finge ⁇ rint and decrypts the author's signature (contained in the time stamp) using the author's public key and compares the decrypted signature to the finge ⁇ rint to verify the presentation.
  • the reviewer reviews the presentation as a review activity log (review) is automatically produced by the reviewer's workstation in order to document the review process, and the review is digitally signed and stored.
  • the reviewer initiates the review of the presentation and the reviewer's workstation (displayer) automatically begins recording the review activities in a log.
  • step 343 the reviewer enters conclusions of the review of the presentation into the review log and inputs a command to sign the review.
  • the displayer creates a review record including the review and preferably the reviewer's ID. The record may also contain the review title, the displayer ID, the author's ID and/or the presentation title.
  • the displayer combines the review record and the author's signature and hashes the combination to form a review finge ⁇ rint.
  • step 347 the reviewer's workstation produces the reviewer's signature by encrypting the review fmge ⁇ rint using the reviewer's private key.
  • the displayer stores the reviewer's signature relationally with the information items in the review record, the presentation record, and the presentation time stamp record.
  • the displayer sends the reviewer's signature to an electronic notary which produces a time stamp, signs the time stamp, stores the time stamp and its signature and returns the time stamp and signature to the reviewer.
  • steps are similar to the group 310 of steps in figure 3b, for providing the author's signature, which should be referred to and only the differences will be discussed below in detail.
  • the displayer sends the reviewer's signature to the host of an electronic notary.
  • the host creates a time stamp that contains the reviewer's signature and the receipt time.
  • step 354 the host hashes the time stamp, and in step 356 the host signs the time stamp by encrypting the hash using the notary's private key.
  • step 357 the host stores the time stamp and notary's signature, and in step 358, the notary returns a time stamp record including the review time stamp and the notary's review signature to the reviewer's workstation.
  • step 362 the displayer hashes the review time stamp and decrypts the notary's review signature.
  • step 363 the displayer compares the hash and decryption to verify the review time stamp and notary's review signature.
  • step 364 the displayer stores the review time stamp and notary's review signature with relation to the information items in the presentation record, presentation time stamp record, and review record.
  • an auditor (human user) requests the review record and review time stamp record and verifies the review and review time stamp.
  • the auditor requests the review and review time stamp from the reviewer using an auditing workstation.
  • the reviewer sends the review record and the review time stamp record to the auditor's workstation.
  • the workstation hashes the review time stamp and decrypts the notary's review signature using the notary's public key, and compares the hash and decrypted signature in order to verify the digital time of notarization and other information in the presentation time stamp.
  • step 378 the workstation verifies the review by producing the review finge ⁇ rint and decrypting the reviewer's review signature (from the review time stamp) and comparing the decryption with the finge ⁇ rint to verify the origin and integrity of the review.
  • the auditor requests the presentation record and presentation time stamp record, verifies the presentation and presentation time stamp, and then audits the presentation and the review for quality.
  • the auditor requests the presentation, and in step 384, the author sends the presentation record and the time stamp record for the presentation to the auditor's workstation.
  • the auditor's workstation verifies the presentation time stamp by hashing the presentation time stamp and decrypting the notary's presentation signature using the notary's public key, and comparing the hash to the decryption.
  • step 387 the workstation produces the presentation finge ⁇ rint and decrypts the authors's presentation signature (from the presentation time stamp) and compares the decryption with the finge ⁇ rint to verify the origin and integrity of the presentation.
  • step 388 the auditor plays the review log based on the presentation in order to determine the quality of the presentation and the review of the presentation.
  • Figure 4 illustrates network 400 of the invention, in which a multitude of computer nodes are connected together by a communications network 401 of cables and communications equipment.
  • the network nodes include one or more authoring stations 402 for creating digital documents, secure server 403 for storing the documents and providing them to the other nodes, host 404 of an electronic notary for time stamping the documents, one or more reviewing station 405 for reviewing the digital documents and automatically creating a review log of the review activities.
  • the network includes one or more auditing stations 406 for auditing the quality of the documents and for auditing the quality of the reviews of the documents.
  • All the nodes may be provided by programming general pu ⁇ ose computer workstations and providing equipment required for specific functions, for example, if an authoring station is intended for producing x-ray images then an x-ray imager will have to be provided and connected to the workstation for use in such authoring.
  • the authoring stations include equipment and other apparatus (e.g. programmed memory) for creating documents and may also include apparatus for signing the documents and/or for obtaining time stamps for the documents from the notary's host.
  • the documents may be audio or video images such as pictures, medical scans, text images, and dictations.
  • the documents may include revisions of previous document.
  • the documents may be reports including multiple text pages, images, and/or audio records in combination.
  • the authoring stations may include apparatus for creating multimedia presentations, for example, of critical process.
  • An authoring station may include audio and video equipment for producing such multimedia presentations or merely means for downloading information produced by mobile equipment such as video camcorders.
  • the authoring stations also include apparatus for transmitting the documents to the server or to the reviewing station and auditing station, and may include apparatus for receiving documents to include in the digital documents or for revising such documents.
  • the authoring station includes processor 452 such as a central processing unit (CPU) or an embedded controller, communicating with electronic memory 453.
  • the memory includes program modules which control the operation of the processor and buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 454 between the buffers and authoring station peripherals and through IOC 455 between the buffers other nodes of the network.
  • the peripherals may include input apparatus, for example, keyboard 456, mouse 457 (or other pointer), video camera 458, microphone 459, and scanner 460, and output equipment such as display 461 and printer 462.
  • the peripherals may also include storage equipment such as disk storage 463 and archival storage 463 (such as a tape drive or RW- ROM).
  • the memory includes program module 470 for operating IOC 454 for moving information from buffer 471 to the peripherals and storing information received from the peripherals into buffer 471.
  • the memory also includes program module 472 for operating IOC 455 for moving information from buffer 471 to other nodes of the network and for storing information received from the other nodes into buffer 471.
  • the authoring workstation includes authoring apparatus 480 for use by an author to produce a first document.
  • the authoring apparatus may include apparatus 481 for producing an image, apparatus 482 for producing a report, and/or apparatus 483 for producing a multimedia production for documenting the steps preformed during a critical procedure.
  • Apparatus 484 is provided for producing a first document record containing the first document.
  • the document record may also contain information identifying the author, the authoring workstation, the time of the authoring, the time of signing, the identification of other documents on which the first document depends, a sequence number of the document, and a title of the document.
  • the authoring station also includes apparatus 492 for storing the first document record, at least until a receipt is received from a server, and apparatus 496 for distributing to others, the first document record.
  • this embodiment of the authoring station includes apparatus 485 for producing a finge ⁇ rint of the first document record using a one-way hashing method.
  • Private key 486 is used for encrypting the finge ⁇ rint of the first document to produce a first document signature and the first document private key is kept confidential and can not be accessed by others.
  • Apparatus 491 produces a first document signature by encrypting the first document finge ⁇ rint using first document private key 486, and public key 487 is used for decrypting the first document signature.
  • the public key is distributed to others by the author workstation, server 403, or otherwise. Also, apparatus 492 is adapted for storing the first document signature relationally with the information items of the first document record, and apparatus 496 is adapted for distributing to others, the first document signature and public key 487 which may be used for decrypting the first document signature.
  • the authoring station obtains a time stamp and time stamp signature for the first document and distributes these along with the first document and the first document signature.
  • Apparatus 493 provides the first document signature to an electronic notary.
  • the notary may be a portion of the authoring workstation 499 which is secure from the author, and preferably secure from the owner of the workstation.
  • the notary may be a remote host connected, for example, by a telephone system and modem to the authoring workstation or server.
  • Apparatus 494 obtains a time stamp and a time stamp signature from the electronic notary for the first document.
  • the time stamp contains the first document signature and a digital time when the time stamp was produced.
  • the first document time stamp signature is produced by encrypting a finge ⁇ rint of the first document time stamp using private key 498 of the notary.
  • the finge ⁇ rint of the review document time stamp is produced by hashing the first document time stamp using a one-way hashing method.
  • Apparatus 495 stores the first document time stamp and the first document time stamp signature of the notary.
  • Apparatus 496 distributes to others, the first document time stamp and the first document time stamp signature.
  • the notary also provides public key 498 to others, for decrypting the first document time stamp signature.
  • the reviewing stations are used to request digital documents, to review the documents while automatically producing a log of review activities (i.e.
  • the documents to be reviewed may be obtained from the server or from the author's workstation, and the resulting reviews may be transmitted to the server or to the auditor's workstation.
  • the review station may include apparatus for signing reviews and/or for obtaining time stamps for the reviews from the notary's host.
  • the reviewing station includes processor 522 communicating with electronic memory 523.
  • the memory includes programs (programmed memory) which control the operation of the processor and which contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 524 between the buffers and reviewing station peripherals and through IOC 525 between the buffers and other nodes of the network.
  • the peripherals may include input apparatus, such as, keyboard 526, mouse 527 (or other pointer), video camera 528, microphone 529, and may include output equipment, such as, display 531 and printer 532.
  • the peripherals may also include storage equipment such as disk storage 533 and archival storage 534 (such as a tape drive or RW-ROM).
  • Memory 523 includes program module 540 for operating IOC 524 for moving information between buffer 541 and the peripherals for input, output, and storage.
  • the memory also includes program module 542 for operating IOC 545 for moving information between buffer 541 and other nodes of communications network 400.
  • the memory includes apparatus 550 for obtaining the first document record, the first document time stamp, the first document time stamp signature, first document public key 551 for decrypting first document signatures, and notary's public key 552 for decrypting time stamp signatures.
  • the review station verifies the first document and first document signature.
  • Apparatus 553 decrypts the first document signature using first document public key 551 , and apparatus 554 reproduces the finge ⁇ rint of the first document using the one-way hashing method.
  • Apparatus 555 compares the first document finge ⁇ rint with the decryption of the first document signature and verifies the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison.
  • the review station verifies the time stamp and time stamp signature that was received.
  • Apparatus 556 reproduces the finge ⁇ rint of the first document time stamp by hashing the time stamp using the one-way hashing method, and apparatus 557 decrypts the first document time stamp signature using public key 552 of the notary.
  • Apparatus 560 compares the first document time stamp finge ⁇ rint with the decryption of the first document time stamp signature and verifies the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison.
  • Apparatus 561 automatically creates a review document while a human reviewer reviews the first document.
  • the review document includes a record log of the activities of the reviewer during the review and may include other information relevant to the review.
  • Apparatus for creating the review document may include one or more of: apparatus 562 for recording information indicating the periods of time for which a portion of the first document was displayed, apparatus 563 for recording information indicating the order in which multiple portions of the first document were displayed, apparatus 564 for recording information indicating the periods of time when the reviewer was looking at each of multiple respective windows or displays, apparatus 565 for recording information indicating the order in which the reviewer looked at respective windows or displays, apparatus 566 for recording information entered by the reviewer, apparatus 567 for recording the configuration of the software of a review workstation, apparatus 568 for recording configuration of the hardware of the review workstation, and apparatus 569 for recording information indicating image manipulations performed during the review.
  • Apparatus 571 produces a review document record containing the review document and information for identifying the first document on which the review is based.
  • the identifying information may be information in the first document record, information in the first document time stamp, and/or information in both.
  • the review document record may also contain one or more of: the identity of the reviewer, the identity of the reviewer workstation, the time of the review, a sequence number for the review, and a title for the review.
  • Apparatus 576 stores the review document record and apparatus 580 distributes the review document record to others. In the first and second embodiments of the method of the invention, described above the review station distributes the review document only to the server, but in the third embodiment the reviewer station distributes the review document directly to an auditor.
  • the reviewer's workstation signs the review and distributes the review signature and a public key for decrypting the review signature.
  • apparatus 572 produces a finge ⁇ rint of the review document record using a one-way hashing method.
  • Review private key 574 is used for encrypting the finge ⁇ rints of review documents to produce review signatures and can not be accessed by others, and apparatus 575 produces a review document signature by encrypting the review document finge ⁇ rint using the review private key.
  • Apparatus 576 stores the review document signature.
  • Review public key 573 is used for decrypting review signatures.
  • Apparatus 580 distributes, to others, public key 573 and the review document signatures.
  • the reviewer's station obtains a time stamp for the review from a notary.
  • the notary may be portion 581 of the workstation or a separate node of the network as shown in figures 4 and 8.
  • Apparatus 577 provides the review signature to an electronic notary.
  • apparatus 578 obtains a time stamp and a time stamp signature from the electronic notary for the review document.
  • the time stamp contains the review signature and a digital time when the time stamp was produced.
  • the review time stamp signature is produced by encrypting a finge ⁇ rint of the review time stamp using private key 704 (in figure 8) of the notary.
  • the finge ⁇ rint of the review time stamp is produced by hashing the review time stamp using a one-way hashing method.
  • Apparatus 579 stores the review time stamp and the review time stamp signature of the notary, and apparatus 580 distributes, to others, the review time stamp and the review time stamp signature.
  • the auditing stations are used for requesting the digital documents and respective reviews of the documents and auditing the quality of the documents and the quality of the reviews.
  • the same workstations may be used for authoring, reviewing, and auditing if all the required hardware and other apparatus is provided on the workstation.
  • the auditing station includes processor 602 communicating with electronic memory 603.
  • the memory includes program modules (programmed memory) which control the operation of the processor and contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 604 between the buffers and auditing station peripherals and through IOC 605 between the buffers and other nodes of the network.
  • the peripherals may include input apparatus, such as, keyboard 606, mouse 607 (or other pointer), and may include output equipment, such as, display 611 and printer 612.
  • the peripherals may also include storage equipment such as disk storage 613 and archival storage 614.
  • Memory 603 includes program module 620 for operating IOC 604 for moving information between buffer 621 and the peripherals for input, output and storage.
  • the memory also includes program module 622 for operating IOC 605 for moving information between buffer 621 and other nodes of communications network 400.
  • apparatus 630 obtains the first document record, the first document signature, the first document public key 631 (for decrypting the first document signature), the first document time stamp, the first document time stamp signature, the notary's public key 633 (for decrypting the time stamp signature), the review record, the review document signature, the reviewer's public key 632 (for decrypting the review signature), the review document time stamp, and the review time stamp signature.
  • the auditing workstation verifies the first document and first document signature.
  • Apparatus 634 decrypts the first document signature using the author's public key 631, and apparatus 635 reproduces the finge ⁇ rint of the first document using the one-way hashing method.
  • Apparatus 636 compares the first document finge ⁇ rint with the decryption of the first document signature and verifies the origin of the first document, based on the comparison.
  • verification means proving that the first document was produced by the author and has not been altered since it was signed.
  • the auditing workstation then verifies the first document time stamp.
  • Apparatus 637 produces the finge ⁇ rint for the first document time stamp by hashing the time stamp using the one-way hashing method, and apparatus 640 decrypts the first document time stamp signature using the notary's public key 633. Also, apparatus 641 compares the finge ⁇ rint with the decryption of the signature and verifies the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison.
  • Apparatus 642 decrypts the review document signature using the reviewer's public key 632, and apparatus 643 reproduces the finge ⁇ rint of the review document using the one-way hashing method.
  • Apparatus 644 compares the review document finge ⁇ rint with the decryption of the review document signature and verifies the origin of the review document and that the review document has not been altered since it was signed, depending on the comparison.
  • the auditing workstation verifies the review time stamp.
  • Apparatus 645 produces the finge ⁇ rint for the review time stamp by hashing the time stamp using the oneway hashing method.
  • Apparatus 646 decrypts the review time stamp signature using public key 633 of the notary.
  • Apparatus 647 compares the review time stamp finge ⁇ rint with the decryption of the review time stamp signature and verifies the origin of the review time stamp and that the review time stamp has not been altered since it was signed, depending on the comparison.
  • apparatus 648 is used by the auditor for determining the quality of the first document and the quality of the review of the first document.
  • the notary's host receives signatures for documents and creates a time stamp including the document signature and a notarizing time.
  • the host may receive the requests for time stamps only from the secure server or may receive them from the reviewing station and auditing station.
  • the electronic notary provides the time stamps, so that, others can verify that a document signature existed at the time of notarization, and therefore, that the document existed before that time.
  • the host may simply store the time stamp, but preferably, also returns the time stamp to the requesting party.
  • a notary's signature for the time stamp may also be provided.
  • the notary may also be involved in authenticating the time stamps as described below.
  • the notarizing station includes processor 672 communicating with electronic memory 673.
  • the memory includes programs (programmed memory) which control the operation of the processor and contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 674 between the buffers and notarizing station peripherals and between the buffers and other nodes of the network.
  • the peripherals may include input apparatus, such as, keyboard 676, mouse 677 (or other pointer), and may include output equipment, such as, display 681 and printer 682.
  • the peripherals may also include storage equipment such as disk storage 684 and archival storage 683.
  • Clock 678 provides stamping times for the time stamps provided by the notary.
  • Memory 673 includes program module 690 for operating IOC 674 for moving information between buffer 691 and the peripherals for input, output and storage.
  • the memory also includes program module 692 to operate IOC 675 for moving information between buffer 691 and other nodes of communications network 400.
  • First the notary's host uses apparatus 700 to receive a document signature from a customer such as a server, author or reviewer.
  • Apparatus 701 determines a stamping time based on clock 678.
  • Apparatus 702 produces a time stamp containing the document signature and the stamping time.
  • the time stamp preferably, also contains one or more of: the identity of the customer, a sequence number of the time stamp, and the identity of the notary.
  • Apparatus 703 produces a finge ⁇ rint of the time stamp by hashing the time stamp using a one-way hashing method.
  • Private key 704 of the notary is used for encrypting the time stamp finge ⁇ rint and the private key is protected, to prevent access by others.
  • Apparatus 706 produces a time stamp signature by encrypting the time stamp finge ⁇ rint using private key 704 of the notary.
  • Public key 705 of the notary is used by others for decrypting the time stamp signature that was encrypted using the private key.
  • the host stores the time stamp and returns it to the customer.
  • Apparatus 707 stores the time stamp and the time stamp signature relationally in a disk storage system of the notary.
  • Apparatus 710 returns the time stamp and time stamp signature to the customer.
  • apparatus 711 distributes the notary's public key 705 to others whereby others may verify that the time stamp is from the notary and has not been altered since it was signed, and thus the information in the time stamp is accurate at least according to the notary.
  • the secure server includes apparatus for storing and retrieving documents and may include apparatus for signing documents and for obtaining time stamps for documents from the notary's host.
  • the server station includes processor 752 communicating with electronic memory 753.
  • the memory includes programs (programmed memory) which control the operation of the processor and contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 754 between the buffers and server peripherals and through IOC 755 between the buffers and other nodes of the network.
  • the peripherals may include input apparatus, such as, keyboard 756, mouse 757 (or other pointer), and may include output equipment, such as, display 761 and printer 762.
  • the peripherals may also include storage equipment such as disk storage 763 and archival storage 763.
  • Memory 753 includes program module 770 for operating IOC 754 for moving information between buffer 771 and the peripherals for input, output and storing information.
  • the memory also includes program module 772 for operating IOC 755 for moving information between buffer 771 and other nodes of communications network 401.
  • a server is not described, however, a server could be used in that embodiment, if convenient, to receive and store information and then provide the information to others.
  • the server may provide information related to the first document and/or information related to the review of the first document.
  • the server includes apparatus 780 for receiving through a secure channel, a first document from the author.
  • Apparatus 780 may receive a first document record from an author or apparatus 781 may be provided for producing a first document record.
  • the first document record includes the first document and may also include other information such as the author ID, author's workstation, document title, creation date, sequence number of the first document.
  • Apparatus 782 stores the first document record.
  • Apparatus 811 may be provided for producing a digital signature for the first document.
  • the signature is formed by encrypting the first document finge ⁇ rint using a first document private key 784.
  • the digital signature for the first document may be provided by receiving the signature from the author or by forming and encrypting a digital finge ⁇ rint using a first document private key 784 of the server, author, or author's workstation.
  • a first document public key 785 is used by others for decrypting the signature of the first document for reproducing the first document finge ⁇ rint.
  • Apparatus 787 distributes the first document record, the first document signature, and the first document public key 785 whereby others can decrypt the first document signature using the public key, produce the first document finge ⁇ rint by hashing the time stamp, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the first document.
  • the server may also provide to others, a time stamp and time stamp signature for the first document.
  • Apparatus 815, 816, 817 provides a time stamp and time stamp signature of a notary for the first document.
  • the time stamp and time stamp signature for the first document may be furnished by the author, or the server may obtain the time stamp and time stamp signature for the first document by sending the first document signature to an electronic notary and receiving the time stamp and time stamp signature back from the notary.
  • Apparatus 791 distributes the time stamp and the time stamp signature for the first document, whereby others can decrypt the time stamp signature using public key 792 of the notary, produce the time stamp finge ⁇ rint by hashing the time stamp, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
  • Apparatus 795 receives through a secure channel, a review document.
  • Apparatus 795 may receive a review document record or apparatus 796 may be provided to produce a review document record, containing the review document.
  • Apparatus 813, 814 provides a digital signature for the review document.
  • the signature is formed by encrypting the review document finge ⁇ rint using a review document private key 800.
  • the signature includes identifying information for determining whether the review document is based on the first digital document. The identifying information may be based on information in the review document record or in the review time stamp.
  • the digital signature for the review document may be provided by receiving the signature from the reviewer or by encrypting the digital finge ⁇ rint using a review private key 800 of the server, reviewer or reviewer's workstation.
  • Review public key 801 is used by others for decrypting the signature of the review document to reproduce the review document finge ⁇ rint.
  • Apparatus 802 distributes the review document record, the review signature, and the review public key 801, whereby others can decrypt the review signature using the review public key, produce the review finge ⁇ rint by hashing the review record, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the review document and that the review document is based on the first document.
  • the server may also provide, to others, a time stamp and time stamp signature for the review document.
  • the time stamp and time stamp signature for the review document may be furnished by the reviewer, or the server may obtain the time stamp and time stamp signature for the review document by providing the review document signature to an electronic notary and obtaining the time stamp and time stamp signature from the notary.
  • Apparatus 821, 822 may obtain a time stamp and time stamp signature of a notary for the review document.
  • the notary may be a part of the server or may be a separate node of network 400, as shown in figures 4 and 8.
  • Apparatus 804 distributes the time stamp and time stamp signature whereby others can decrypt the time stamp signature using public key 792 of the notary, produce the time stamp finge ⁇ rint by hashing the time stamp, and compare the decryption with the finge ⁇ rint to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
  • the apparatus for providing a first document signature includes one or more of: apparatus 811 for forming first document signatures, and apparatus 812 for receiving a first document signature from the author.
  • the apparatus for forming the first document signature include apparatus 783 for producing a digital finge ⁇ rint for the first document by hashing the first document record using a one-way hashing method, and a private key 784 kept confidential in the server for signing the first document by encrypting the finge ⁇ rint for the first document.
  • the apparatus for providing a review document signature may include: apparatus 813 for forming a review document signature or apparatus 814 for receiving a first document signature from the reviewer.
  • the apparatus for forming the review document signature may include apparatus 797 for producing a digital finge ⁇ rint for the review document by hashing the review document record using a one-way hashing method, and private key 800 is kept confidential in the server, for signing the review document by encrypting the finge ⁇ rint for the review document.
  • the apparatus for providing a time stamp and time stamp signature of a notary for the first document includes one or more of: apparatus 815 for receiving the time stamp and time stamp signature for the first document from the author; and the combination of: apparatus 816 for providing the first document signature to an electronic notary; and apparatus 817 for receiving a first document time stamp and first document time stamp signature from the electronic notary.
  • the first document time stamp includes the stamping time at which the time stamp was produced and also includes the first document signature.
  • the first document time stamp signature is produced from a finge ⁇ rint of the first document time stamp using private key 704 of the notary.
  • the apparatus for providing a time stamp and time stamp signature of a notary for the review document includes one or more of: apparatus 820 for receiving the time stamp and time stamp signature for the first document from the author; and the combination of: apparatus 821 for providing the review document signature to an electronic notary; and apparatus 822 for receiving a time stamp and time stamp signature for the review document from the electronic notary.
  • the review document time stamp includes the stamping time at which the time stamp was produced and the review document signature.
  • the review document time stamp signature is produced from a finge ⁇ rint of the review document time stamp using private key 704 of the notary.
  • the finge ⁇ rint of the review document time stamp is produced by hashing the time stamp using a one-way hashing method.
  • Figure 10 illustrates programmable computer system 850 and various example apparatus for programming such programmable computer which are all well known in the art.
  • the computer system may be programed either by connecting non-volatile memory (e.g. ROM, PROM, EEPROM, flash memory, battery backed SRAM) containing programmed structures, to the programmable computer or by providing signals to the programmable computer which may be applied to memory 857 of the programmable computer in order to provide programmed structures.
  • Another computer system 851 such as an Internet server may be connected through communication apparatus 852 to system 850, so as to provide signals that are used for programming system 850.
  • Apparatus 852 may include a copper or optic cable, radio, infrared, or network such as Ethernet, ARCnet, Token ring, or a modem and telephone system.
  • Storage drive 853 may have integral media 854 and be removably attached to system 850 or drive 853 may be integral with system 850 and receive signals from removable computer media 854.
  • System 850 may include user interface 855 and program input module 856, and written materials may be provided for manually programming the computer.
  • a user may input the signals using apparatus (not shown) of the user interface such as a keyboard, text scanner, microphone, digital camera or bar code reader.
  • the signals provided to system 850 may be copied to storage drive 853 for later recall into volatile memory 857 or stored in non-volatile memory 858 to provide programmed apparatus in memory.
  • System 850 may be programmed by providing programmed non-volatile memory.
  • System 850 may include slot 859 to which cartridge 860 containing non-volatile memory such as a PC flash memory card, may be connected to provide programmed apparatus.
  • System 850 may include socket 861 into which non- volatile memory package 862 may be inserted to provide programmed apparatus.
  • System 850 may be fabricated with nonvolatile integral memory 858 to provide programmed apparatus.
  • the programmed structures include programs and other data in memory which control micro-processor 863 and I/O processors (e.g. 864) of the programmable computer to implement computer processes.
  • the computer system may be a workstation, modem, PC card, printer, or other software ungradable component. Other well known methods of programming a computer system may also be used.

Abstract

A medical documentary of a critical procedure, is created, digitally signed by the author, and preferably electronically notarized. A reviewer requests the first document and receives the documentary along with the signatures. The reviewer verifies the information. As the reviewer examines the documentary, a log (review) is automatically created. The review is digitally signed and preferably notarized.

Description

Transmitting reviews with digital signatures.
FIELD OF THE INVENTION
The invention is related to the field of cryptography and more specifically to cryptographically timestamping documents to prove their existence at a certain time.
BACKGROUND OF THE INVENTION
In many common situations, people need to verify that a digital document (i.e. a document such as a contract or receipt that is digitally stored in a computer system) existed on a certain date. That is, we may need to prove that no one has altered or revised the digital document since a certain date such as the alleged creation date or distribution date of the document.
One method of providing such proof is known as electronic notarizing or timestamping. A one-way hash of the document is produced, and the hash is encrypted using a private key of the owner of the document in order to form a so called digital signature. The document signature is sent to a digital notary or time stamper who combines the digital signature with a digital stamping time (digital representation of the time and date) to form a time stamp, and the notary hashes the time stamp and encrypts the time stamp hash using the digital notary's private key to form another digital signature called the time stamp signature. Then the notary sends a record including the time stamp and the time stamp signature to the author. Anyone with access to the time stamp and notary's signature can then hash the time stamp and use the notary's public key to decrypt the notary's signature and compare the hash to the decryption to prove that the author's signature, and thus the document, existed when the time stamp was created, and that, the author's signature and the stamping time were originally encrypted together by someone who had access to the notary's private key.
Notarizing digital documents is disclosed in U.S. patent 5,136,646. Notarizing by secure hardware in a system is disclosed in U.S. patent 5,001,752. Public key cryptography is disclosed in "New Directions in Cryptography" by Diffie and Hellman in IEEE Transactions On Information Theory, Vol IT-22, November 1976, pp 644-654 and in U.S. patents 4,405,829 to Rivest and 4,868,877. One-way hashing is disclosed in "Collision-Free Hash Functions and Public Key Signature Schemes", Advances in Cryptology - Eurocrypt '87, SpringerNerlag, LNCS, 1988, vol. 304, pp. 203-217.
The above citations are hereby incorporated in whole by reference.
SUMMARY OF THE INVENTION
It is an object of the invention to provide methods and apparatus for the authentication of review activity logs of digital documents.
In the inventions disclosed herein, a first document is reviewed and a digital log (review document) of review activities during a review of the first document and then the review document is digitally signed and the signature is notarized in such a way, that the relationship between the first document and the review document can be proved as well as the origination and integrity of the review document and the time of the review document's notarization.
It is another object of the invention to provide methods and apparatus for authenticating presentations that document critical procedures.
In the invention a digital activity log of a critical procedure is produced and the activity log is digitally signed and notarized, so that, the integrity and origination of the activity log can be proved.
In one embodiment of the invention, an image is created and sent to a secure server. The server signs the image (hashes the image and encrypts the hash) and sends the server's image signature to an electronic notary which notarizes the image signature. Preferably, the notary returns a time stamp and time stamp signature for the image signature (image time stamp and notary's image signature) to the server. Then upon request, the server sends the image and server's image signature to a reviewer who uses the signature to verify the origin and integrity of the image. The reviewer may also receive the image time stamp and notary's image signature and verify the time of notarization of the image. Then the reviewer (human) reviews the image and the reviewer's workstation automatically creates a review activity log (review) which is returned to the server. The server combines the review with information indicating that the review is related to the image. The identifying information may be, for example, the image hash, image signature, image time stamp or notary's image signature. Then, the server signs the combination and sends the server's review signature to the notary which notarizes the server's review signature.
Preferably, the notary returns a review time stamp and notary's review signature to the server. Then upon request, the server sends the image, image signature, review, and review signature to an auditor who can verify the origin and integrity of the review, that the review was based on the image, and the origin and integrity of the image. The server may also send the image time stamp, notary's image signature, review time stamp, and notary's review signature to the auditor who can verify the time of notarization for the image and review. Then the auditor can review the quality of the image and the quality of the review.
In another embodiment of the invention, a report is signed by the author before the report is sent to the server. Then the report and author's signature are sent to a server which sends the author's signature to the notary which notarizes the author's signature. Preferably, the notary returns a time stamp and time stamp signature for the report to the server. Then, later upon request, the server sends the report and report signature to the reviewer who can use the report signature to verify the origin and integrity of the report. The server may also send the report time stamp and notary's signature to the reviewer who can verify the time at which the report was notarized. The human reviewer reviews the report and the reviewer's workstation automatically creates a review (log of activities and conclusions of the review process). Then, information indicating the relationship between the review and the original document is combined with the review and the combination is signed by the reviewer. The review and reviewer's signature are sent to the server which sends the reviewer's signature to the notary which notarizes the reviewer's signature. Preferably, the notary returns a review time stamp and a notary's review signature to the server. In a third embodiment of the invention, a multimedia presentation is produced in order to document the activities performed during a critical procedure, so that, the correctness of the procedure can be demonstrated. The author signs the presentation and sends the presentation signature to an electronic notary who notarizes the signature. Preferably, the electronic notary creates a time stamp for the presentation, signs the time stamp, and returns the presentation time stamp and notary's presentation signature to the author. Then upon request, the author sends the presentation, the presentation time stamp, and the notary's presentation signature to the reviewer. The reviewer verifies the origin and integrity of the presentation and verifies the time of notarization in the presentation time stamp. As the human reviewer reviews the presentation, the reviewer's workstation automatically creates a review (review activities log). When the review is complete the reviewer signs the review and sends the reviewer's signature to an electronic notary. The notary creates a time stamp, signs the time stamp, and returns the time stamp and notary's signature for the review to the reviewer. Then upon request, the reviewer sends the review and review signature as well as the time stamp and notary's signature for the review to an auditor. The auditor verifies the origin and integrity of the review and verifies the time of notarization. Also, the notary requests the presentation and presentation signature from the author as well as the time stamp and notary's signature for the presentation. The auditor verifies the origin and integrity of the presentation and verifies the time of the notarization. Then the auditor reviews the quality of the presentation and/or the quality of the review.
As described above, in embodiments where the notary returns a time stamp and time stamp signature, they can be distributed to allow others to verify the time of notarizing of the digital documents. Alternatively, or in addition, other methods of verifying the time of notarization can be provided. Time stamps can be authenticated by having the notary resign the time stamp and return the signature and then checking whether the old and new signatures match. Another method of authenticating time stamps, is to provide information from the time stamp or the notary's signature to the notary and requesting that the notary use the information to find the notary's record of the time stamp and signature, and return information regarding success or failure or return the time stamp and signature, from the notary's records. Another method of authenticating time stamps, is for the notary to always return one or more previous and subsequent time stamps to the customer, and then the customer can contact other customers identified in the subsequent time stamps and request those customers to verify the time for the time stamp.
Other alternatives and advantages of applicant's inventions will be disclosed or become obvious to those skilled in the art by studying the detailed description below with reference to the following drawings which illustrate the elements of the appended claims of the inventions.
BRIEF DESCRIPTION OF THE DRAWINGS Figures 1 a- 1 h shows a flow chart of a first specific embodiment of the invention for authenticating image reviews.
Figures 2a-2i shows another flow chart for a second specific embodiment of the invention for authenticating report reviews.
Figures 3a-3i illustrate another flow chart for a third specific embodiment of the invention for authenticating presentations of critical procedures and reviews of such procedures.
Figure 4 shows a sample embodiment of the network system of the invention.
Figure 5 provides additional details of the authoring workstations of figure 4.
Figure 6 provides additional details of the reviewing workstations of figure 4. Figure 7 illustrates additional details of the auditing workstations of figure 4. Figure 8 illustrates additional details of the notary's host of figure 4. Figure 9 shows additional details of the secure server of figure 4. Figure 10 shows a specific embodiment of apparatus to program the systems of figures 6-9.
Overview of the embodiments
A reviewer workstation, comprising means (550) for receiving a first document produced by an author; means (551) for automatically creating a review document while a human reviewer reviews the first document, including a log of the activities of the reviewer during the review.
Preferably, the reviewer workstation further comprises means for verifying the origin and integrity of the first document, including: means (550) for providing: a record for the first document, the record including the first document; and an electronic signature for the first document, the signature being produced using a private key (784) of the first document for encrypting a fingerprint of the first document, the fingerprint being produced by hashing the record of the first document, the hashing being performed using a one-way hashing method; a public key (551) of the first document; means (553) for decrypting the first document signature using the public key (551) of the first document; means (554) for reproducing the fingerprint of the first document using the one-way hashing method; and means (555) for comparing the first document fingerprint with the decryption of the first document signature and verifying the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison. Preferably, the network further comprises means for verifying that the first document signature existed at some particular previous time, including: means (550) for receiving a time stamp and time stamp signature for the first document, the first document time stamp containing the stamping time at which the time stamp was produced and the first document signature, the first document time stamp signature being produced by encoding a fingerprint of the first document time stamp using a private key (704) of an electronic notary, the fingerprint being produced by hashing the time stamp using a one-way hashing method; and means for verifying the time stamp including: a public key (705) of the notary; means (556) for producing the fingerprint for the first document time stamp by hashing the time stamp using the one-way hashing method; means (557) for decrypting the first document time stamp signature using the public key (705) of the notary; and means (560) for comparing the first document time stamp fingeφrint with the decryption of the first document time stamp signature and verifying the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison. Preferably, the reviewer workstation further comprises means for allowing the origin and integrity of the review document to be verified by others, including: means (571) for producing a review document record including the review document; means (572) for producing a digital fingeφrint for the review document by hashing the review document record using a one-way hashing method; a private key (573) of the review document, securely held to prevent access by others; and a public key (574) of the review document, made available to others; means (575) for producing a digital signature for the review document by encrypting the review fingeφrint using the review document private key (573); and means (580) for distributing the review document record, the review document signature, and the review document public key (574) whereby others can decrypt the review document signature using the review public key (574), produce the review document fingeφrint by hashing the review document record, and compare the decryption with the fingeφrint to verify the origin and integrity of the review document.
Preferably ,the digital signature of the review document includes identifying information that can be used to identify the first document as the document on which the review document is based.
Preferably, the identifying information depends on information contained in the first document record.
Preferably, the identifying information depends on a private key used for signing the first document. Preferably, the workstation further comprises means for receiving a time stamp of the first document, the time stamp including a digital stamping time; and the identifying information depends on information included in the time stamp.
Preferably, the workstation further comprises means for allowing verification of the existence of the review document signature at the time of the review, including: means (577) for providing the review document signature to an electronic notary; means (577) for receiving a time stamp and time stamp signature for the review document from the electronic notary, the review document time stamp including the stamping time and the review document signature, the review document time stamp signature being produced from a fingeφrint of the review document time stamp using a private key of the notary, the fingeφrint of the review document time stamp being produced by hashing the time stamp using a one-way hashing method; and means (580) for distributing the time stamp and time stamp signature whereby others can decrypt the time stamp signature using the public key (552) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint so as to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
Preferably, the log of activities includes information indicating the time for which the first document was displayed.
Preferably, the log of activities includes information indicating the times for which portions of the first document were displayed and the order in which the portions were displayed.
Preferably, the reviewer uses multiple displays or multiple windows on one display and the log of activities includes information indicating the times for which portions of the first document were displayed at each respective display or window. Preferably, the log of activities includes information indicating the times when the reviewer was looking at the display.
Preferably, the reviewer uses multiple displays or multiple windows on one display and the log of activities includes information indicating the times during which the reviewer looked at each respective display or window. Preferably, the log of activities includes information entered by the reviewer during the review.
Preferably, the log of activities includes information indicating the configuration of software used during the review.
Preferably, the log of activities includes information indicating the configuration of hardware used during the review.
Preferably, the log of activities includes information indicating image manipulations used during the review, the image manipulations being selected from the group including: zooming into portions of images of the first document; slow motion of a video portion of the first document; contrast adjustment of images or video; changes in color in images or video; or other digital image enhancements.
An authoring workstation, comprising: means (483) for recording a presentation document including a log of activities of a critical procedure; means for allowing the origin and integrity of the presentation document to be verified, including: means (484) for producing a presentation document record including the presentation document; means (485) for producing a digital fingeφrint for the presentation document by hashing the presentation document record using a one-way hashing method; a private key (486) of the presentation securely held from others; and a public key (487) made available to others; means (441) for producing a digital signature for the presentation document by encrypting the presentation fingeφrint using the private key (486) of the presentation; means (496) for distributing the presentation document record, the presentation document signature, and the public key (487) of the presentation whereby others can decrypt the presentation document signature, produce the presentation document fingeφrint by hashing the presentation document record, and compare the decryption with the fingeφrint to verify the origin and integrity of the presentation document; means (493) for providing the presentation document signature to an electronic notary; means (494) for receiving a time stamp and time stamp signature for the presentation document from the electronic notary, the presentation document time stamp including the stamping time at which the time stamp was produced and the presentation document signature, the presentation document time stamp signature being produced from a fingeφrint of the presentation document time stamp using a private key (486) of the notary; and means (496) for distributing the time stamp whereby others can decrypt the time stamp signature using a public key (498) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp. Preferably, the critical procedure is a review of medical images; and the workstation includes means (497 and 498) for recording information indicating the time for which the images are displayed.
Preferably, the critical procedure is a medical operation and the workstation includes a multitude of cameras (458) for recording the operation from different perspectives and one or more microphones (459) for recording the audio information during the operation. Preferably, the critical procedure is an inspection of a building construction to determine compliance with specifications; the workstation includes a portable camera (458) and microphone (459) for recording what an inspector sees in the building.
An auditor workstation, comprising: means (630) for obtaining a first document record including a first document, a public key (631 ) of the first document, a first document time stamp, a first document time stamp signature, a public key (632) of the review, a review document record including a review document, a review document time stamp, a review document time stamp signature, and a public key (633) of the notary; means (634) for decrypting the first document signature using the public key (631) of the first document; means (635) for reproducing the fingeφrint of the first document using the one-way hashing method; means (636) for comparing the first document fingeφrint with the decryption of the first document signature and verifying the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison; means (637) for producing the fingeφrint for the first document time stamp by hashing the time stamp using the one-way hashing method; means (640) for decrypting the first document time stamp signature using the public key (633) of the notary; means (641) for comparing the first document time stamp fingeφrint with the decryption of the first document time stamp signature and verifying the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison; means (642) for decrypting the review document signature using the public key of the review document; means (643) for reproducing the fingeφrint of the review document using the oneway hashing method; means (644) for comparing the review document fingeφrint with the decryption of the review document signature and verifying the origin of the review document and that the review document has not been altered since it was signed, depending on the comparison; means (645) for producing the fingeφrint for the review document time stamp by hashing the time stamp using the one-way hashing method; means (646) for decrypting the review document time stamp signature using the public key (633) of the notary; means (647) for comparing the review document time stamp fingeφrint with the decryption of the review document time stamp signature and verifying the origin of the review document time stamp and that the review document time stamp has not been altered since it was signed, depending on the comparison; and means (648) for auditing the review document.
A secure server, comprising: means (780) for receiving through a secure channel, a first document from an author; means (781) for producing a first document record including the first document; means (782) for storing the first document record; means (811, 812) for providing a digital signature for the first document, the signature being formed by encrypting the first document fingeφrint using a first document private key (784); a first document public key (785) for others to use for decrypting the signature of the first document for reproducing the first document fingeφrint; means (787) for distributing the first document record, the first document signature, and the first document public key (785) whereby others can decrypt the first document signature using the public key, produce the first document fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the first document; means (815, 816 and 817) for providing a time stamp and time stamp signature of a notary for the first document; means (791) for distributing the time stamp and the time stamp signature for the first document, whereby others can decrypt the time stamp signature using a public key (792) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp for the first document; means (795) for receiving through a secure channel, a review document; means (796) for producing a review document record including the review document; means (813 and 814) for providing a digital signature for the review document, the signature being formed by encrypting the review document fingeφrint using a review document private key (800), the signature including information for determining whether the review document is based on the first digital document; a review document public key (801) for others to use for decrypting the signature of the review document for reproducing the review document fingeφrint; means (802) for distributing the review document record, the review document signature, and the review document public key (801) whereby others can decrypt the review document signature using the review document public key, produce the review document fingeφrint by hashing the review document record, and compare the decryption with the fingeφrint to verify the origin and integrity of the review document and that the review document is based on the first document; means (820, 821 and 822) for providing a time stamp and time stamp signature of a notary for the review document; means (804) for distributing the time stamp and time stamp signature of the review document, whereby others can decrypt the time stamp signature using the public key (792) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp of the review document.
Preferably, the server further comprises: means for producing a digital fingeφrint for the first document by hashing the first document record using a one-way hashing method; and means for producing a digital fingeφrint for the review document by hashing the review document record using the one-way hashing method.
Preferably, the means for providing a first document signature includes one or more of: means for encrypting the first document fingeφrint using a private key of the first document, and means for receiving a first document signature from the author.
Preferably, the means for providing a review document signature includes one or more of: means for encrypting the review document fingeφrint using a private key of the review document; and means for receiving a first document signature from the reviewer. Preferably, the means for providing a time stamp and time stamp signature of a notary for the first document, includes one or more of: means for receiving the time stamp and time stamp signature for the first document from the author; and the combination of: means for providing the first document signature to an electronic notary; and means for receiving a first document time stamp and first document time stamp signature from the electronic notary, the first document time stamp including the stamping time at which the time stamp was produced and the first document signature, the first document time stamp signature being produced from a fingeφrint of the first document time stamp using a private key of the notary;
Preferably, the means for providing a time stamp and time stamp signature of a notary for the review document, includes one or more of: means for receiving the time stamp and time stamp signature for the first document from the reviewer; and the combination of: means for providing the review document signature to an electronic notary; and means for receiving a time stamp and time stamp signature for the review document from the electronic notary, the review document time stamp including the stamping time at which the time stamp was produced and the review document signature, the review document time stamp signature being produced from a fingeφrint of the review document time stamp using a private key of the notary, the fingeφrint of the review document time stamp being produced by hashing the time stamp using a one-way hashing method.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Figures la-lh show a first specific embodiment of the invention for authenticating reviews. In a first group of steps 100 in figure la, an author uses an imager to create an image and the image is automatically sent to a server which signs and stores the image. In step 102, the author operates an imager to create an image and initiates submitting the image to a secure server. The imager may include any equipment that produces an image such as a text page scanner, digital still camera, fax machine, medical scanner (electrocardiogram / angiogram, ultrasound imager, computerized axial tomograph, magnetic resonance imager, X-ray machine) or any other method of making images. Also, the images may be video images and/or audio images such as a cardiac sound recording or a medical record dictation. In step 103, the imager transmits the image to a secure server over a secure channel. The secure channel may be an encrypted message over a public network or an non- encrypted message over a private (secure) network with sufficient security precautions, depending on the nature of the information. Preferably, the transmission will identify the author and the imager device. The server may return an image sequence number for the imager to facilitate later access to the image. In step 104, the server combines the imager ID (or author ID) and image sequence number with the image to produce an image record and stores the image record. Preferably, the items of information in the image record are stored relationally so they can easily be retrieved based on, for example, a keyword search. Herein, relationally just means that, the fact that some information item is related to another information item and vice versa is also stored in the workstation. In this case the items of the image record are stored relationally with each other. In step 105, the server hashes the image record using a one-way hash to produce an image fingeφrint. The advantage of a one-way hash is that it can not be reversed to decrypt the report, so that, even if the report were confidential or private the fingeφrint would not have to be kept confidential. A hash of a digital document is commonly referred to as a digital fingeφrint. In step 107, the server encrypts the image fingeφrint using the server's private key (or author's or imager's private keys stored in the server) to form an image signature. The pinpose of the encryption is to provide proof that the author is the originator of the image, and that the image has not been altered by others since it was signed. The encryption of the hash has nothing to do with keeping the data or the hash secret but only to prove integrity and origin of the image.
The server has a private key that can be used to encrypt digital information and which is kept confidential from other parties. The other parties have a related public key that can be used to decrypt information that was encrypted using the private key. That is, the server has made the public key publicly available, for example, by posting the public key on another non-secure server or by publishing the key. Others who whish to verify the origin of the image (e.g. that the imager connected to the server produced the image) or integrity of the image (i.e. that the image has not been changed or replaced with another image since it was signed by the server), can use the image record, image signature and the public key for such verification. The author ID (or scanner ID) and image sequence number are included in the image record to provide evidence of the origin of the image. Where such evidence is not required they may be omitted. Other information such as the digital image creation time (date and time) can be included. It is possible to only hash together selected parts of the image record to produce the image fingeφrint, if desired. Alternately, the imager or author could have different unique private/public password (key) pairs assigned to them that could be used to prove the origination of the image so the imager ID or author ID would not have to be combined with the image before hashing. The server would have access to the private keys for signing the images and provide others with the public keys. In the next group of steps 110, in figure lb, the server obtains a time stamp and a time stamp signature from an electronic notary for the server's image signature. In step 112, the server establishes a connection with the notary's host network, and the server sends the server's image signature to the host. The channel does not need to be secure since the image signature is not confidential. In step 114, the host creates an image time stamp containing the server's image signature and the digital time of the time stamping (e.g. receipt time or stamping time). Preferably the notary ID, the sequence number of the time stamp (this is different than the sequence number of the image), and the server ID are also included in the time stamp. In step 115, the host hashes the image time stamp, to produce a time stamp fingeφrint, and in step 116, the host signs the time stamp hash (fingeφrint) using the notary's private key to produce a time stamp signature for the image. In step 117, the host produces a time stamp record for the image containing the image time stamp and the notary's image signature and stores the information items of the record relationally in the notary's protected storage. In step 118, the host transmits the image time stamp record back to the server. In the next group of steps 120, in figure 1 c, the server verifies and stores the time stamp record. In step 122, the server hashes the image time stamp and decrypts the notary's image signature using the notary's public key in order to verify the integrity and origin of the image time stamp and the notary's image signature. If they match, the server knows that the signature and time stamp are from the notary (or at least someone with access to the notary's private key) because it was the notary's public key that decrypted the signature, and the server also knows that the signature and time stamp have not been altered since the notary signed the time stamp. In step 124, the server stores the information items of the notary's image time stamp record with relation to the information items in the image record and the server's image signature. In the next set of steps 130, in figure 1 d, a reviewer (human user) requests the image for reviewing the image using a displayer and the stored image record is provided by the server along with and the image time stamp record, and the displayer verifies the origin, integrity, and time of notarization of the image. In step 132, the reviewer requests the image using the displayer, for example, by specifying an imager ID and image sequence number. The displayer may be any equipment that allows the image to be played to the user. The displayer is not restricted to visual display and may be, for example, a loud speaker playing an audio image. In step 133, the server sends the image record and the time stamp record for the image to the displayer over a secure channel (if the image is confidential). In step 134, the displayer hashes the image time stamp and decrypts the notary's image signature using the notary's public key in order to verify the digital time of notarization and other information in the image time stamp. In step 135, the displayer produces the image fingeφrint and decrypts the servers's image signature (from the image time stamp) using the server's public key and compares the decryption with the fingeφrint to verify the origin and integrity of the image. If they match, the reviewer knows that the signature and report are from the server (or at least someone with access to the server's private key) because it was the server's public key that decrypted the signature, and the reviewer also knows that the signature and report have not been altered since the author signed the report.
In the next few steps 140, in figure le, of this embodiment of the invention, the reviewer reviews the image as the displayer automatically generates a log of the review activities (review), the reviewer enters his conclusions and submits the review, and then the displayer sends the review back to the server. In step 142, the reviewer initiates recording of a review activities log (review) for the image by, for example, entering a command into a user interface of the displayer to display the image. In the review the displayer may record the begin time and end time during which the reviewer displays the image. Alternately, the review may contain the total time during which the image was displayed. The review may also include any keystrokes or audio dictation the reviewer enters to record comments or conclusions about the image. The workstation documents the configuration of the workstation including the revision level of all the software on the workstation and the hardware connected to the workstation. If portions of the image are subject to manipulations, such as zooming, changing contrast, changing color assignments, and various digital image enhancements, they are logged in the review. The reviewer may be able to look at multiple windows on a display or on multiple displays, for example, to compare two images or the same image with different image enhancements. In this case, the review may contain a log indicating which windows or displays the reviewer looks at in what order and for how long. Preferably, the activities log would include a video showing what the reviewer is examining. Preferably, enough information would be gathered, so that, the log could be played to show the views that the reviewer looked at in the same order for the same time. If the image is a product of a compressed transmission (e.g. MPEG II), it may be possible to request at least portions of the raw uncompressed image for improving enhancements of interesting portions of the image, and such access would be included in the log. Such a system would especially be useful for critical activities such as medical image reviews. Alternately, other known methods could be used to determine what monitors the reviewer is studying during the review. In step 144, the reviewer enters conclusions and submits the review activities log. For example, in a simple system, the reviewer may press a button on the displayer indicating that there is nothing interesting on the image and the image would be replaced by the next image, and the review log would contain the amount of time that image was viewed and the fact that the results were negative. On the other hand, in a more elaborate system, the review log may include a video of the reviewer's activities during the review with extensive audio comments about whatever is shown on the image. Of course conclusions may be entered through every part of a more extensive review, but typically comments will be entered at least at the end of the review. In step 146, the displayer sends the review and review record's ID to the server over a secure channel and server returns a sequence number for the review. The displayer forms a review record that includes the review and preferably, other information, such as, the reviewer's ID, a review title, and the displayer ID, and sends it to the server over a secure channel. The server returns a receipt and may return a sequence number or other ID, so that, the reviewer can be easily accessed.
In the group of steps 150, in figure If, for this embodiment of the invention, the server stores the review record, verifies the review record, and obtains a time stamp record for the review. In step 152, the server produces a review record containing the information received from the displayer possibly along with other information such as a receipt time, displayer ID, and review sequence number. In step 153, the items of information in the review record are stored relationally with the items of information in the image record and image time stamp record. In step 154, the server produces a fingeφrint of the review record by combining the imager ID and image sequence number with the review record and hashing the combination. Combining the imager ID and image sequence number with the review record provides evidence that the review is based on the image. Alternately, other items that can be used to uniquely identify the image, could be combined with the review such as an image hash, the server's image signature, the image time stamp, the combination of the notary's ID and time stamp sequence number, or the notary's image signature.
In step 156, the server produces a review signature by encrypting the review fingeφrint using the server's private key. Finally, in step 158, the server obtains a time stamp record for the review. This step incoφorates all of steps 112-124 shown in figures lb and lc, except in this case, those steps are performed for the review rather than for the image. The description of those steps above is sufficient for those skilled in the art to understand step 158. In the next set of steps 160, in figure lg, an auditor (human user) requests the review record and review time stamp record and verifies the review time stamp and review. In step 162, the auditor requests the review record and review time stamp from the server using an auditing workstation by, for example, specifying the displayer ID and review sequence number. The auditor's workstation may be any equipment that allows the review to be played based on the image, so that, the auditor can determine the quality of the image and the quality of the review. In step 164, the server sends the review record and the review time stamp record to the auditor's workstation. In step 166, the workstation hashes the review time stamp and decrypts the notary's review signature using the notary's public key, and compares the decryption to the hash in order to verify the digital time of notarization and other information in the image time stamp. In step 168, the workstation verifies the review by producing the review fingeφrint and decrypting the server's review signature (from the review time stamp) and compares the decryption with the fingeφrint in order to verify the origin and integrity of the review. In the final group of steps 170, in figure lh, the auditor requests the image record and image time stamp record and verifies the image and image time stamp and then audits the image and review for quality. In step 172, the auditor requests the image from the server by specifying, for example, the imager ID and image sequence number, and in step 174, the server sends the image record and the time stamp record to the workstation. In step 176, the workstation verifies the image time stamp by hashing the image time stamp and decrypting the notary's image signature using the notary's public key, and comparing the hash to the decryption. In step 177, the workstation produces the image fingeφrint and decrypts the servers's image signature (from the image time stamp) and compares the decryption with the fingeφrint to verify the origin and integrity of the image. Finally, in step 178, the auditor plays the review based on the image, so that, the auditor can determine the quality of the image and the quality of the review of the image.
Figures 2a-2i show a second specific embodiment of the invention for authenticating reviews. Figure 2a illustrates a first group of steps 200 of the method of the invention, in which software loaded in the author's workstation is used for creating and signing a digital document, so that, others can authenticate the origin and integrity of the document and for storing the document and signature.
In step 202, an author creates a report (digital document) using software loaded onto the workstation which is connected to a server in a network, and the author inputs a command to submit the report to the server. The report may include any digital information such as written text, filled out forms, scanned images, and sound recordings.
The report contains the type of information that someone may desire to prove originated from the author and has not been altered. For example, the report may be a medical report, a contract or other legal papers, a safety or specification compliance report of a building under construction, or any other collection of information that needs to be protected from unauthorized alteration or replacement.
In step 203, the author's workstation produces and stores a report record containing the report. Preferably, the report record also contains the author's ID and the report title. Other information may also be included in the report record such as the editing history for creating the report, the creation time of the report, the workstation ID. Preferably, the items of information in the report record are stored relationally so they can easily be retrieved based on, for example, a keyword search. In this case, relationally just means that, the fact that the report is related to the hash and signature and vice versa is also stored in the workstation. In step 204, the author's workstation preferably hashes the report record using a specified oneway hashing method to form a report fingeφrint. In step 206, the workstation encrypts the report fingeφrint using the author's private key (or private key of the workstation) to form the author's signature for the report. The author has a private key that can be used to encrypt digital information and other parties have a public key that can be used to decrypt the information.
Preferably, the workstation stores the author's signature in the storage of the workstation relationally with the items of information in the report record. In order to save space, after the workstation receives a receipt from the server indicating that the report record and author's signature are safely stored, then the workstation may delete those items, or archive them onto removable media or otherwise remove the information from the random access storage of the workstation. In step 208, the workstation sends (transmits) the report record and the author's signature for the report to a customer's server. If the contents of the report are confidential or private then a secure channel is established between the workstation and the server before the transmission and the server is a secure server. A secure channel may be a transmission of encrypted data through a public network or of non-encrypted data through a private (secure) network with reasonable security precautions taken depending on the confidentiality of the information.
In the second group of steps 210, of the second embodiment of the invention, in figure 2b, the server verifies and stores the report. In step 212, in order to authenticate the report, the server hashes the report record to produce the same report fmgeφrint as described above in step 204. Also, the server decrypts the author's signature using the author's public key. Then in step 215, the server compares the report fingeφrint to the decrypted signature to verify that they match. If they match, the server knows that the signature and report are from the author (or at least someone with access to the author's private key) because it was the author's public key that decrypted the signature, and the server also knows that the signature and report have not been altered since the author signed the report. In step 218, the server stores the report record. Preferably, the items of the report record and the author's signature are stored relationally in the server's secure storage, so that, they can be easily accessed. When the report record and author's signature are safely stored then the secure server may send a receipt to the workstation, so that, the workstation removes at least the report from active storage.
In a next group of steps 220, in figure 2c, the server obtains a time stamp and time stamp signature for the author's report signature, from an electronic notary. In step 222, the server sends the author's report signature to a notary's host system over the network. Since the signature is not confidential, high security is not required for signature transmission, so that, a secure channel is not required. Alternately, the notary could be a secure part of the hardware of the server, for example, a device with a private key that the owner of the server would not know or be able to discover without destroying the device. In step 223, the host creates a time stamp containing the author's signature and the receipt time (or time of creating the time stamp). Preferably, the notary ID, time stamp sequence number, and customer ID are also included in the time stamp. The customer ID may be associated with the server or with some or all of the servers of a customer. In step 224, the notary hashes the time stamp and in step 226, the notary signs the time stamp hash by encrypting the time stamp using the notary's private key. The notary publicly provides a public key which can be used to decrypt the notary's signature. Anyone with access to the time stamp and notary's signature, can hash the time stamp and decrypt the notary's signature using the public key and compare the hash to the decrypted signature and determine if they match. If they match it proves that the signature was produced by the notary and that the information in the time stamp has not been changed since it was signed by the notary. Since the time stamp includes a stamping time and the author's report signature it proves that the signature existed at the time of stamping and that the report existed at some time before the stamping.
In step 227, the electronic notary stores the time stamp and the notary's signature for the report relationally, for example, on a secure disk drive system of the notary. In step 228, the notary transmits to the server, a time stamp record for the report, including the report time stamp and the notary's report signature for the time stamp. Also, one or more previous and subsequent time stamp records may be sent in a package to the customer's server, so that, by contacting the customers identified in the subsequent time stamp records, the authenticity of the time stamp can be verified independently from the notary.
In the next group of steps 230, in figure 2d, the server authenticates and stores the time stamp record. In step 232, in order to authenticate the report time stamp, the server hashes the time stamp and decrypts the notary's report signature using the notary's public key. In step 235, the server compares the time stamp hash with the decrypted time stamp signature, and if there is a match, then the time stamp is authenticated. That is, the server knows that the time stamp and notary's signature are from the notary and have not been altered since the time stamp was signed. In step 238, the server stores the information items from the time stamp record (and any previous and subsequent time stamp records) with relation to the information items in the report record. In the next group of steps 240, in figure 2e, a reviewer (human user) obtains a copy of the report (first document) and verifies its origin and integrity. In step 242, the reviewer uses a review workstation (displayer) to request the report from the server by specifying, for example, the author's ID and report title. The reviewer could be using the same workstation as was used by the author or a different workstation. In step 244, the server sends the report record and report time stamp record to the reviewer's workstation through a secure channel. In step 246, the reviewer's workstation hashes the time stamp and decrypts the notary's signature using the notary's public key to verify the time stamp. That is, if the hash and the decryption of the signature match then the workstation knows that the notary's signature was produced from the time stamp by someone with access to the notary's private key and thus, that the information in the time stamp existed when the signature was produced. Since the time stamp contains the author's signature for the report and the time (including date) at which the notary's signature was produced, it proves that the author's signature existed at that time and the report existed at some previous time. In step 248, the workstation hashes the report and decrypts the author's signature (contained in the time stamp) using the author's public key, and compares the results to verify the author's signature. That is, if the hash and the decryption of the author's signature match then the report was signed by someone with access to the author's private key and the report has not been changed since it was signed. In the next group of steps 250, in figure 2f, of this second embodiment, the reviewer reviews the report as a log is produced to document the review activity and the resulting review activity log (review) is digitally signed. In step 252, the reviewer initiates the review of the report by, for example, specifying the author ID and report title and the workstation automatically records the review activities in the log. In the log, the workstation documents the configuration of the workstation including the revision level of all the software on the workstation and the hardware connected to the workstation. Then, as the reviewer reviews the report, the workstation documents every step of the review including which parts of the report are examined, and how long and in what order they are examined. If portions of the report are subjected to manipulations such as zooming, slow motion, contrast adjustment, changes in color, or other digital image enhancements, then those manipulations are recorded in the log. The reviewer may dictate or otherwise enter review information and conclusions into the review (log) during the review. Preferably, the workstation includes one or more video cameras and microphones and a video and audio record of the reviewer's activities are made to document the actual extent of the review, that is, what the reviewer was looking at, his expression, his comments during the review. Preferably, the recording of the log is performed in the background, so that, it does not interfere with the review process, but the reviewer is expected to enter comments about the report during the review and preferably conclusions at the end of the review.
In step 253, the reviewer enters conclusions of the review of the report into the review activity log (review) and inputs a command to submit the review to the server. In step 254, the workstation combines the review log and the report time stamp to form a review record. Other information may also be included in the review record, such as, the reviewer's ID, the workstation ID, the review title, a review sequence number for the workstation. In step 256, the workstation hashes the review record to produce a review fingeφrint. The puφose for combining the time stamp with the review log before signing is to document that the review is a review of the report.
Alternatively, or in addition to the time stamp, other information proving that the review is for the report could be combined with the review log before hashing, such as, the author's report signature, the report fingeφrint, the combination of the author's ID and the report title, or the time stamp signature for the report. In step 256, the workstation encrypts the review fingeφrint using the reviewer's (or workstation's) private key to form the reviewer's signature. The workstation may store the review, and the reviewer's signature, if desired. In step 258, the workstation sends the review record, and reviewer's signature to the server. In order to save space the review can be deleted or achieved from the reviewer's workstation as soon as the server returns a receipt for the review. In another group of steps 260, in figure 2g, of this first specific embodiment, the server authenticates the review record an stores the review record and reviewer's signature. The server can then return a receipt to the review workstation, so that, the review can be deleted to same storage space on the review work station. In step 262, the server hashes the review record to form a review fingeφrint, and decrypts the reviewer's signature using the reviewer's public key. In step 265, the server compares the decrypted signature with the fingeφrint to verify the origin and integrity of the review. If the results match then the server knows that the review is from the reviewer, the review is based on the report, and the review and signature have not been changed since the reviewer signed the review. In step 268, the secure server stores the review record and the reviewer's signature with relation to the information related to the report.
In the next group of steps 270, in figure 2h, of the second specific embodiment of the invention, the server sends the reviewer's signature to an electronic notary which produces a time stamp, signs the time stamp, stores the time stamp and its signature, and returns the time stamp and signature to the server. These steps are similar to the steps 220, in figure 2c, which should be referred to, and only the differences will be discussed below. In step 272, the server sends the reviewer's signature to the electronic notary. In step 273, the notary's host creates a time stamp that contains the reviewer's signature and the receipt time. Preferably, the notary's ID, a time stamp sequence number, and the customer ID for the server are also included in the time stamp. In step 274, the host hashes the time stamp, and in step 276, the host encrypts the time stamp hash to sign the time stamp using the notary's private key. In step 277, the host stores the time stamp and notary's signature, and in step 278, the notary's host returns a review time stamp record including the review time stamp and the notary's review signature to the server. In the final group of steps 280, in figure 2i, for this embodiment, the server verifies the notary's time stamp and time stamp signature for the review, and stores the review time stamp record. These steps are similar to steps 230 in figure 2d, discussed above, which should be refeπed to for details, so only the differences will be discussed below. In step 285, the server hashes the review time stamp and decrypts the notary's review signature. In step 288, the server compares the hash and decryption to verify the review time stamp and notary's review signature. In step 284, the server stores the review time stamp and notary's review signature with relation to the information items in the report record, report time stamp record, and review record. Figures 3a-3i illustrate a third specific embodiment of the invention for authenticating reviews. Figure 3a shows a first group of steps 300, of the method of the invention in which an author creates a digital presentation that documents the procedure used in a critical process. Then the author uses software loaded in the author's workstation for signing, storing, and having the presentation notarized, so that, others can authenticate the origin and integrity of the presentation and the time of notarizing the presentation.
The presentation may be a multimedia documentary including video, audio, text, images and any other type of digital information about a critical procedure. As an example, the presentation may be an audio video record of an inspection of a building under construction to document compliance with specifications and building codes. The presentation may document the design or construction or testing of a product such as an aiφlane or a facility such as a nuclear power plant. The presentation may be a record of a procedure such as, a multimedia documentary of a medical procedure such as a medical operation on a patient. The presentation may be created as legal evidence such as a video version of a last will and testament or a video deposition of a witness for a legal proceeding.
In step 302, an author creates the presentation. The presentation may be created using remote mobile equipment (e.g. a cam corder) and then loaded into the author's workstation or it may be produced at the workstation using connected recording equipment and software loaded onto the author's workstation. When the presentation is ready, the author inputs a command to sign the presentation. In step 303, the author's workstation produces a presentation record containing the presentation and stores the record. Preferably, the presentation record also contains the author's ID and the presentation title. Other information may also be included in the presentation record such as the revision and editing history for creating the presentation, the creation time of the presentation, the workstation ID. Preferably, the items of information in the presentation record are stored relationally so they can easily be retrieved. In step 304, the author's workstation hashes the presentation record using a specified one-way hashing method to form a presentation fingeφrint. In step 306, the workstation encrypts the presentation fingeφrint using the author's private key (or private key of the workstation) to form the author's signature for the presentation. Finally, in step 308, the workstation stores the author's signature in the storage of the workstation relationally with the items of information in the presentation record.
In the second group of steps 310, of the third embodiment the invention in figure 3b, the author's workstation obtains a time stamp and time stamp signature for the author's presentation signature, from an electronic notary. In step 312, the author's workstation sends the author's presentation signature to an electronic notary's host system. In step 313, the host creates a time stamp containing the author's signature and the receipt time. Preferably, the notary ID, time stamp sequence number, and author ID are also included in the time stamp. In step 314, the notary hashes the time stamp, and in step 316, the notary signs the time stamp hash using the notary's private key. In step 317, the electronic notary stores the time stamp and the notary's signature for the presentation relationally. In step 318, the notary transmits, to the author, a time stamp record for the presentation, including the presentation time stamp and the notary's presentation signature for the time stamp.
In the next group of steps 320 in figure 3 c, the author authenticates and stores the time stamp record. In step 322, in order to authenticate the time stamp, the workstation hashes the time stamp and decrypts the notary's signature using the notary's public key. In step 325, the authoring workstation compares the time stamp hash with the decrypted time stamp signature, and if there is a match, then the time stamp is authenticated. In step 328, the workstation stores the information items of the time stamp record and any previous and subsequent time stamp records with relation to the information items in the presentation record.
In the next group of steps 330, in figure 3e, a reviewer (human user) obtains a copy of the presentation from the author and verifies its origin and integrity. In step 332, the reviewer uses a review workstation (displayer) to request the presentation from the author by specifying the author's ID and presentation title. In step 334, the authoring station sends the presentation record and presentation time stamp record to the displayer. In step 336, the displayer hashes the time stamp and decrypts the notary's signature using the notary's public key to verify the time stamp. In step 338, the workstation reproduces the presentation fingeφrint and decrypts the author's signature (contained in the time stamp) using the author's public key and compares the decrypted signature to the fingeφrint to verify the presentation. In the next group of steps 340, in figure 3e, of this third embodiment, the reviewer reviews the presentation as a review activity log (review) is automatically produced by the reviewer's workstation in order to document the review process, and the review is digitally signed and stored. In step 342, the reviewer initiates the review of the presentation and the reviewer's workstation (displayer) automatically begins recording the review activities in a log. In step 343, the reviewer enters conclusions of the review of the presentation into the review log and inputs a command to sign the review. In step 344, the displayer creates a review record including the review and preferably the reviewer's ID. The record may also contain the review title, the displayer ID, the author's ID and/or the presentation title. In step 346, the displayer combines the review record and the author's signature and hashes the combination to form a review fingeφrint. In step 347, the reviewer's workstation produces the reviewer's signature by encrypting the review fmgeφrint using the reviewer's private key. In step 348, the displayer stores the reviewer's signature relationally with the information items in the review record, the presentation record, and the presentation time stamp record.
In another group of steps 350, in figure 3f, of this third specific embodiment, the displayer sends the reviewer's signature to an electronic notary which produces a time stamp, signs the time stamp, stores the time stamp and its signature and returns the time stamp and signature to the reviewer. These steps are similar to the group 310 of steps in figure 3b, for providing the author's signature, which should be referred to and only the differences will be discussed below in detail. In step 352, the displayer sends the reviewer's signature to the host of an electronic notary. In step 353, the host creates a time stamp that contains the reviewer's signature and the receipt time. In step 354, the host hashes the time stamp, and in step 356 the host signs the time stamp by encrypting the hash using the notary's private key. In step 357, the host stores the time stamp and notary's signature, and in step 358, the notary returns a time stamp record including the review time stamp and the notary's review signature to the reviewer's workstation.
In the next group of steps 360, in figure 3g, for this embodiment, the displayer verifies the notary's time stamp and signature for the review, and stores the time stamp record. These steps are similar to steps 320 in figure 3c, discussed above, which should be referred to for details, so only the differences will be discussed in detail below. In step 362, the displayer hashes the review time stamp and decrypts the notary's review signature. In step 363, the displayer compares the hash and decryption to verify the review time stamp and notary's review signature. In step 364, the displayer stores the review time stamp and notary's review signature with relation to the information items in the presentation record, presentation time stamp record, and review record.
In the next set of steps 370 in figure 3h, an auditor (human user) requests the review record and review time stamp record and verifies the review and review time stamp. In step 372, the auditor requests the review and review time stamp from the reviewer using an auditing workstation. In step 374, the reviewer sends the review record and the review time stamp record to the auditor's workstation. In step 376, the workstation hashes the review time stamp and decrypts the notary's review signature using the notary's public key, and compares the hash and decrypted signature in order to verify the digital time of notarization and other information in the presentation time stamp. In step 378, the workstation verifies the review by producing the review fingeφrint and decrypting the reviewer's review signature (from the review time stamp) and comparing the decryption with the fingeφrint to verify the origin and integrity of the review.
In the final group of steps 380, in figure 3i, of this third embodiment, the auditor requests the presentation record and presentation time stamp record, verifies the presentation and presentation time stamp, and then audits the presentation and the review for quality. In step 382, the auditor requests the presentation, and in step 384, the author sends the presentation record and the time stamp record for the presentation to the auditor's workstation. In step 386, the auditor's workstation verifies the presentation time stamp by hashing the presentation time stamp and decrypting the notary's presentation signature using the notary's public key, and comparing the hash to the decryption. In step 387, the workstation produces the presentation fingeφrint and decrypts the authors's presentation signature (from the presentation time stamp) and compares the decryption with the fingeφrint to verify the origin and integrity of the presentation. Finally in step 388, the auditor plays the review log based on the presentation in order to determine the quality of the presentation and the review of the presentation.
Figure 4 illustrates network 400 of the invention, in which a multitude of computer nodes are connected together by a communications network 401 of cables and communications equipment. The network nodes include one or more authoring stations 402 for creating digital documents, secure server 403 for storing the documents and providing them to the other nodes, host 404 of an electronic notary for time stamping the documents, one or more reviewing station 405 for reviewing the digital documents and automatically creating a review log of the review activities. Also, the network includes one or more auditing stations 406 for auditing the quality of the documents and for auditing the quality of the reviews of the documents. All the nodes may be provided by programming general puφose computer workstations and providing equipment required for specific functions, for example, if an authoring station is intended for producing x-ray images then an x-ray imager will have to be provided and connected to the workstation for use in such authoring.
The authoring stations include equipment and other apparatus (e.g. programmed memory) for creating documents and may also include apparatus for signing the documents and/or for obtaining time stamps for the documents from the notary's host. The documents may be audio or video images such as pictures, medical scans, text images, and dictations. The documents may include revisions of previous document. The documents may be reports including multiple text pages, images, and/or audio records in combination. The authoring stations may include apparatus for creating multimedia presentations, for example, of critical process. An authoring station may include audio and video equipment for producing such multimedia presentations or merely means for downloading information produced by mobile equipment such as video camcorders. The authoring stations also include apparatus for transmitting the documents to the server or to the reviewing station and auditing station, and may include apparatus for receiving documents to include in the digital documents or for revising such documents.
In figure 5, additional details of authoring station 450 are shown. The authoring station includes processor 452 such as a central processing unit (CPU) or an embedded controller, communicating with electronic memory 453. The memory includes program modules which control the operation of the processor and buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 454 between the buffers and authoring station peripherals and through IOC 455 between the buffers other nodes of the network. The peripherals may include input apparatus, for example, keyboard 456, mouse 457 (or other pointer), video camera 458, microphone 459, and scanner 460, and output equipment such as display 461 and printer 462. The peripherals may also include storage equipment such as disk storage 463 and archival storage 463 (such as a tape drive or RW- ROM).
The memory includes program module 470 for operating IOC 454 for moving information from buffer 471 to the peripherals and storing information received from the peripherals into buffer 471. The memory also includes program module 472 for operating IOC 455 for moving information from buffer 471 to other nodes of the network and for storing information received from the other nodes into buffer 471.
In the specific embodiment shown in figure 5, the authoring workstation includes authoring apparatus 480 for use by an author to produce a first document. The authoring apparatus may include apparatus 481 for producing an image, apparatus 482 for producing a report, and/or apparatus 483 for producing a multimedia production for documenting the steps preformed during a critical procedure. Apparatus 484 is provided for producing a first document record containing the first document. The document record may also contain information identifying the author, the authoring workstation, the time of the authoring, the time of signing, the identification of other documents on which the first document depends, a sequence number of the document, and a title of the document. The authoring station also includes apparatus 492 for storing the first document record, at least until a receipt is received from a server, and apparatus 496 for distributing to others, the first document record.
In the second and third embodiments of the methods of the invention above, the author's workstation signs the document before distributing the document, and then distributes the document signature along with the document. For that reason, this embodiment of the authoring station includes apparatus 485 for producing a fingeφrint of the first document record using a one-way hashing method. Private key 486 is used for encrypting the fingeφrint of the first document to produce a first document signature and the first document private key is kept confidential and can not be accessed by others. Apparatus 491 produces a first document signature by encrypting the first document fingeφrint using first document private key 486, and public key 487 is used for decrypting the first document signature. The public key is distributed to others by the author workstation, server 403, or otherwise. Also, apparatus 492 is adapted for storing the first document signature relationally with the information items of the first document record, and apparatus 496 is adapted for distributing to others, the first document signature and public key 487 which may be used for decrypting the first document signature.
In the third embodiment of the method of the invention described above, the authoring station obtains a time stamp and time stamp signature for the first document and distributes these along with the first document and the first document signature. Apparatus 493 provides the first document signature to an electronic notary. The notary may be a portion of the authoring workstation 499 which is secure from the author, and preferably secure from the owner of the workstation. On the other hand, the notary may be a remote host connected, for example, by a telephone system and modem to the authoring workstation or server. Apparatus 494 obtains a time stamp and a time stamp signature from the electronic notary for the first document. The time stamp contains the first document signature and a digital time when the time stamp was produced. The first document time stamp signature is produced by encrypting a fingeφrint of the first document time stamp using private key 498 of the notary. The fingeφrint of the review document time stamp is produced by hashing the first document time stamp using a one-way hashing method. Apparatus 495 stores the first document time stamp and the first document time stamp signature of the notary. Apparatus 496 distributes to others, the first document time stamp and the first document time stamp signature. The notary also provides public key 498 to others, for decrypting the first document time stamp signature. The reviewing stations are used to request digital documents, to review the documents while automatically producing a log of review activities (i.e. a review), and to transmit the reviews, for example, to a server for storage or to an auditing station as described below. The documents to be reviewed (first documents) may be obtained from the server or from the author's workstation, and the resulting reviews may be transmitted to the server or to the auditor's workstation. The review station may include apparatus for signing reviews and/or for obtaining time stamps for the reviews from the notary's host.
In figure 6, additional details of reviewing station 520 are shown. The reviewing station includes processor 522 communicating with electronic memory 523. The memory includes programs (programmed memory) which control the operation of the processor and which contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 524 between the buffers and reviewing station peripherals and through IOC 525 between the buffers and other nodes of the network. The peripherals may include input apparatus, such as, keyboard 526, mouse 527 (or other pointer), video camera 528, microphone 529, and may include output equipment, such as, display 531 and printer 532. The peripherals may also include storage equipment such as disk storage 533 and archival storage 534 (such as a tape drive or RW-ROM).
Memory 523 includes program module 540 for operating IOC 524 for moving information between buffer 541 and the peripherals for input, output, and storage. The memory also includes program module 542 for operating IOC 545 for moving information between buffer 541 and other nodes of communications network 400. The memory includes apparatus 550 for obtaining the first document record, the first document time stamp, the first document time stamp signature, first document public key 551 for decrypting first document signatures, and notary's public key 552 for decrypting time stamp signatures.
The review station verifies the first document and first document signature. Apparatus 553 decrypts the first document signature using first document public key 551 , and apparatus 554 reproduces the fingeφrint of the first document using the one-way hashing method. Apparatus 555 compares the first document fingeφrint with the decryption of the first document signature and verifies the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison. Similarly, the review station verifies the time stamp and time stamp signature that was received. Apparatus 556 reproduces the fingeφrint of the first document time stamp by hashing the time stamp using the one-way hashing method, and apparatus 557 decrypts the first document time stamp signature using public key 552 of the notary. Apparatus 560 compares the first document time stamp fingeφrint with the decryption of the first document time stamp signature and verifies the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison.
Apparatus 561 automatically creates a review document while a human reviewer reviews the first document. The review document includes a record log of the activities of the reviewer during the review and may include other information relevant to the review. Apparatus for creating the review document may include one or more of: apparatus 562 for recording information indicating the periods of time for which a portion of the first document was displayed, apparatus 563 for recording information indicating the order in which multiple portions of the first document were displayed, apparatus 564 for recording information indicating the periods of time when the reviewer was looking at each of multiple respective windows or displays, apparatus 565 for recording information indicating the order in which the reviewer looked at respective windows or displays, apparatus 566 for recording information entered by the reviewer, apparatus 567 for recording the configuration of the software of a review workstation, apparatus 568 for recording configuration of the hardware of the review workstation, and apparatus 569 for recording information indicating image manipulations performed during the review.
Apparatus 571 produces a review document record containing the review document and information for identifying the first document on which the review is based. The identifying information may be information in the first document record, information in the first document time stamp, and/or information in both. The review document record may also contain one or more of: the identity of the reviewer, the identity of the reviewer workstation, the time of the review, a sequence number for the review, and a title for the review. Apparatus 576 stores the review document record and apparatus 580 distributes the review document record to others. In the first and second embodiments of the method of the invention, described above the review station distributes the review document only to the server, but in the third embodiment the reviewer station distributes the review document directly to an auditor.
In the second and third embodiments of the method of the invention above, the reviewer's workstation signs the review and distributes the review signature and a public key for decrypting the review signature. In this case, apparatus 572 produces a fingeφrint of the review document record using a one-way hashing method. Review private key 574 is used for encrypting the fingeφrints of review documents to produce review signatures and can not be accessed by others, and apparatus 575 produces a review document signature by encrypting the review document fingeφrint using the review private key. Apparatus 576 stores the review document signature. Review public key 573 is used for decrypting review signatures. Apparatus 580 distributes, to others, public key 573 and the review document signatures.
In the third embodiment of the method of the invention described above, the reviewer's station obtains a time stamp for the review from a notary. The notary may be portion 581 of the workstation or a separate node of the network as shown in figures 4 and 8. Apparatus 577 provides the review signature to an electronic notary. Then apparatus 578 obtains a time stamp and a time stamp signature from the electronic notary for the review document. The time stamp contains the review signature and a digital time when the time stamp was produced. The review time stamp signature is produced by encrypting a fingeφrint of the review time stamp using private key 704 (in figure 8) of the notary. The fingeφrint of the review time stamp is produced by hashing the review time stamp using a one-way hashing method. Apparatus 579 stores the review time stamp and the review time stamp signature of the notary, and apparatus 580 distributes, to others, the review time stamp and the review time stamp signature. The auditing stations are used for requesting the digital documents and respective reviews of the documents and auditing the quality of the documents and the quality of the reviews. The same workstations may be used for authoring, reviewing, and auditing if all the required hardware and other apparatus is provided on the workstation.
In figure 7, additional details of a auditor's workstation 600 are shown. The auditing station includes processor 602 communicating with electronic memory 603. The memory includes program modules (programmed memory) which control the operation of the processor and contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 604 between the buffers and auditing station peripherals and through IOC 605 between the buffers and other nodes of the network. The peripherals may include input apparatus, such as, keyboard 606, mouse 607 (or other pointer), and may include output equipment, such as, display 611 and printer 612. The peripherals may also include storage equipment such as disk storage 613 and archival storage 614.
Memory 603 includes program module 620 for operating IOC 604 for moving information between buffer 621 and the peripherals for input, output and storage. The memory also includes program module 622 for operating IOC 605 for moving information between buffer 621 and other nodes of communications network 400.
In the memory, apparatus 630 obtains the first document record, the first document signature, the first document public key 631 (for decrypting the first document signature), the first document time stamp, the first document time stamp signature, the notary's public key 633 (for decrypting the time stamp signature), the review record, the review document signature, the reviewer's public key 632 (for decrypting the review signature), the review document time stamp, and the review time stamp signature.
The auditing workstation verifies the first document and first document signature. Apparatus 634 decrypts the first document signature using the author's public key 631, and apparatus 635 reproduces the fingeφrint of the first document using the one-way hashing method. Apparatus 636 compares the first document fingeφrint with the decryption of the first document signature and verifies the origin of the first document, based on the comparison. Herein, verification means proving that the first document was produced by the author and has not been altered since it was signed.
The auditing workstation then verifies the first document time stamp. Apparatus 637 produces the fingeφrint for the first document time stamp by hashing the time stamp using the one-way hashing method, and apparatus 640 decrypts the first document time stamp signature using the notary's public key 633. Also, apparatus 641 compares the fingeφrint with the decryption of the signature and verifies the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison.
Then the auditing workstation verifies the review document and review document signature. Apparatus 642 decrypts the review document signature using the reviewer's public key 632, and apparatus 643 reproduces the fingeφrint of the review document using the one-way hashing method. Apparatus 644 compares the review document fingeφrint with the decryption of the review document signature and verifies the origin of the review document and that the review document has not been altered since it was signed, depending on the comparison. Then the auditing workstation verifies the review time stamp. Apparatus 645 produces the fingeφrint for the review time stamp by hashing the time stamp using the oneway hashing method. Apparatus 646 decrypts the review time stamp signature using public key 633 of the notary. Apparatus 647 compares the review time stamp fingeφrint with the decryption of the review time stamp signature and verifies the origin of the review time stamp and that the review time stamp has not been altered since it was signed, depending on the comparison.
Finally, apparatus 648 is used by the auditor for determining the quality of the first document and the quality of the review of the first document. The notary's host receives signatures for documents and creates a time stamp including the document signature and a notarizing time. The host may receive the requests for time stamps only from the secure server or may receive them from the reviewing station and auditing station. The electronic notary provides the time stamps, so that, others can verify that a document signature existed at the time of notarization, and therefore, that the document existed before that time. The host may simply store the time stamp, but preferably, also returns the time stamp to the requesting party. A notary's signature for the time stamp may also be provided. The notary may also be involved in authenticating the time stamps as described below. In figure 8, additional details of a notary's workstation 670 are shown. The notarizing station includes processor 672 communicating with electronic memory 673. The memory includes programs (programmed memory) which control the operation of the processor and contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 674 between the buffers and notarizing station peripherals and between the buffers and other nodes of the network. The peripherals may include input apparatus, such as, keyboard 676, mouse 677 (or other pointer), and may include output equipment, such as, display 681 and printer 682. The peripherals may also include storage equipment such as disk storage 684 and archival storage 683. Clock 678 provides stamping times for the time stamps provided by the notary. Memory 673 includes program module 690 for operating IOC 674 for moving information between buffer 691 and the peripherals for input, output and storage. The memory also includes program module 692 to operate IOC 675 for moving information between buffer 691 and other nodes of communications network 400.
First the notary's host uses apparatus 700 to receive a document signature from a customer such as a server, author or reviewer.
Then the host creates a time stamp and signs the time stamp. Apparatus 701 determines a stamping time based on clock 678. Apparatus 702 produces a time stamp containing the document signature and the stamping time. The time stamp preferably, also contains one or more of: the identity of the customer, a sequence number of the time stamp, and the identity of the notary. Apparatus 703 produces a fingeφrint of the time stamp by hashing the time stamp using a one-way hashing method.
Private key 704 of the notary is used for encrypting the time stamp fingeφrint and the private key is protected, to prevent access by others. Apparatus 706 produces a time stamp signature by encrypting the time stamp fingeφrint using private key 704 of the notary. Public key 705 of the notary is used by others for decrypting the time stamp signature that was encrypted using the private key.
The host stores the time stamp and returns it to the customer. Apparatus 707 stores the time stamp and the time stamp signature relationally in a disk storage system of the notary. Apparatus 710 returns the time stamp and time stamp signature to the customer. Also, apparatus 711 distributes the notary's public key 705 to others whereby others may verify that the time stamp is from the notary and has not been altered since it was signed, and thus the information in the time stamp is accurate at least according to the notary.
The secure server includes apparatus for storing and retrieving documents and may include apparatus for signing documents and for obtaining time stamps for documents from the notary's host.
In figure 9, additional details of a customer's server 750 are shown. The server station includes processor 752 communicating with electronic memory 753. The memory includes programs (programmed memory) which control the operation of the processor and contains buffers for storing information received or to be transmitted through input and/or output circuit (IOC) 754 between the buffers and server peripherals and through IOC 755 between the buffers and other nodes of the network. The peripherals may include input apparatus, such as, keyboard 756, mouse 757 (or other pointer), and may include output equipment, such as, display 761 and printer 762. The peripherals may also include storage equipment such as disk storage 763 and archival storage 763.
Memory 753 includes program module 770 for operating IOC 754 for moving information between buffer 771 and the peripherals for input, output and storing information. The memory also includes program module 772 for operating IOC 755 for moving information between buffer 771 and other nodes of communications network 401. In the third embodiment of the method of the invention above, a server is not described, however, a server could be used in that embodiment, if convenient, to receive and store information and then provide the information to others. The server may provide information related to the first document and/or information related to the review of the first document. In order to provide information related to the first document, the server includes apparatus 780 for receiving through a secure channel, a first document from the author. Apparatus 780 may receive a first document record from an author or apparatus 781 may be provided for producing a first document record. The first document record includes the first document and may also include other information such as the author ID, author's workstation, document title, creation date, sequence number of the first document. Apparatus 782 stores the first document record. Apparatus 811 may be provided for producing a digital signature for the first document. The signature is formed by encrypting the first document fingeφrint using a first document private key 784. The digital signature for the first document may be provided by receiving the signature from the author or by forming and encrypting a digital fingeφrint using a first document private key 784 of the server, author, or author's workstation. A first document public key 785 is used by others for decrypting the signature of the first document for reproducing the first document fingeφrint. Apparatus 787 distributes the first document record, the first document signature, and the first document public key 785 whereby others can decrypt the first document signature using the public key, produce the first document fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the first document.
The server may also provide to others, a time stamp and time stamp signature for the first document. Apparatus 815, 816, 817 provides a time stamp and time stamp signature of a notary for the first document. The time stamp and time stamp signature for the first document may be furnished by the author, or the server may obtain the time stamp and time stamp signature for the first document by sending the first document signature to an electronic notary and receiving the time stamp and time stamp signature back from the notary. Apparatus 791 distributes the time stamp and the time stamp signature for the first document, whereby others can decrypt the time stamp signature using public key 792 of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
Similarly, the server may provide information related to the review document. Apparatus 795 receives through a secure channel, a review document. Apparatus 795 may receive a review document record or apparatus 796 may be provided to produce a review document record, containing the review document. Apparatus 813, 814 provides a digital signature for the review document. The signature is formed by encrypting the review document fingeφrint using a review document private key 800. The signature includes identifying information for determining whether the review document is based on the first digital document. The identifying information may be based on information in the review document record or in the review time stamp. The digital signature for the review document may be provided by receiving the signature from the reviewer or by encrypting the digital fingeφrint using a review private key 800 of the server, reviewer or reviewer's workstation. Review public key 801 is used by others for decrypting the signature of the review document to reproduce the review document fingeφrint. Apparatus 802 distributes the review document record, the review signature, and the review public key 801, whereby others can decrypt the review signature using the review public key, produce the review fingeφrint by hashing the review record, and compare the decryption with the fingeφrint to verify the origin and integrity of the review document and that the review document is based on the first document. The server may also provide, to others, a time stamp and time stamp signature for the review document. The time stamp and time stamp signature for the review document may be furnished by the reviewer, or the server may obtain the time stamp and time stamp signature for the review document by providing the review document signature to an electronic notary and obtaining the time stamp and time stamp signature from the notary. Apparatus 821, 822 may obtain a time stamp and time stamp signature of a notary for the review document. The notary may be a part of the server or may be a separate node of network 400, as shown in figures 4 and 8. Apparatus 804 distributes the time stamp and time stamp signature whereby others can decrypt the time stamp signature using public key 792 of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
The apparatus for providing a first document signature includes one or more of: apparatus 811 for forming first document signatures, and apparatus 812 for receiving a first document signature from the author. The apparatus for forming the first document signature include apparatus 783 for producing a digital fingeφrint for the first document by hashing the first document record using a one-way hashing method, and a private key 784 kept confidential in the server for signing the first document by encrypting the fingeφrint for the first document.
Similarly, the apparatus for providing a review document signature may include: apparatus 813 for forming a review document signature or apparatus 814 for receiving a first document signature from the reviewer. The apparatus for forming the review document signature may include apparatus 797 for producing a digital fingeφrint for the review document by hashing the review document record using a one-way hashing method, and private key 800 is kept confidential in the server, for signing the review document by encrypting the fingeφrint for the review document.
The apparatus for providing a time stamp and time stamp signature of a notary for the first document, includes one or more of: apparatus 815 for receiving the time stamp and time stamp signature for the first document from the author; and the combination of: apparatus 816 for providing the first document signature to an electronic notary; and apparatus 817 for receiving a first document time stamp and first document time stamp signature from the electronic notary. The first document time stamp includes the stamping time at which the time stamp was produced and also includes the first document signature. The first document time stamp signature is produced from a fingeφrint of the first document time stamp using private key 704 of the notary.
Similarly, the apparatus for providing a time stamp and time stamp signature of a notary for the review document, includes one or more of: apparatus 820 for receiving the time stamp and time stamp signature for the first document from the author; and the combination of: apparatus 821 for providing the review document signature to an electronic notary; and apparatus 822 for receiving a time stamp and time stamp signature for the review document from the electronic notary. The review document time stamp includes the stamping time at which the time stamp was produced and the review document signature. The review document time stamp signature is produced from a fingeφrint of the review document time stamp using private key 704 of the notary. The fingeφrint of the review document time stamp is produced by hashing the time stamp using a one-way hashing method.
Figure 10 illustrates programmable computer system 850 and various example apparatus for programming such programmable computer which are all well known in the art. The computer system may be programed either by connecting non-volatile memory (e.g. ROM, PROM, EEPROM, flash memory, battery backed SRAM) containing programmed structures, to the programmable computer or by providing signals to the programmable computer which may be applied to memory 857 of the programmable computer in order to provide programmed structures. Another computer system 851 such as an Internet server may be connected through communication apparatus 852 to system 850, so as to provide signals that are used for programming system 850. Apparatus 852 may include a copper or optic cable, radio, infrared, or network such as Ethernet, ARCnet, Token ring, or a modem and telephone system. Storage drive 853 may have integral media 854 and be removably attached to system 850 or drive 853 may be integral with system 850 and receive signals from removable computer media 854. System 850 may include user interface 855 and program input module 856, and written materials may be provided for manually programming the computer. A user may input the signals using apparatus (not shown) of the user interface such as a keyboard, text scanner, microphone, digital camera or bar code reader. The signals provided to system 850 may be copied to storage drive 853 for later recall into volatile memory 857 or stored in non-volatile memory 858 to provide programmed apparatus in memory. Alternately, the system may be programmed by providing programmed non-volatile memory. System 850 may include slot 859 to which cartridge 860 containing non-volatile memory such as a PC flash memory card, may be connected to provide programmed apparatus. System 850 may include socket 861 into which non- volatile memory package 862 may be inserted to provide programmed apparatus. System 850 may be fabricated with nonvolatile integral memory 858 to provide programmed apparatus. The programmed structures include programs and other data in memory which control micro-processor 863 and I/O processors (e.g. 864) of the programmable computer to implement computer processes. The computer system may be a workstation, modem, PC card, printer, or other software ungradable component. Other well known methods of programming a computer system may also be used.
The invention has been described with reference to specific embodiments including the best mode for carrying out the invention, and with sufficient detail that anyone skilled in the art can make and use the invention. Those skilled in the art may modify these embodiments or provide other embodiments within the spirit of the invention, and thus, the description does not limit the present invention to the disclosed embodiments.

Claims

CLAIMS:
1. A reviewer workstation, comprising: means (550) for receiving a first document produced by an author; means (551) for automatically creating a review document while a human reviewer reviews the first document, including a log of the activities of the reviewer during the review.
2. The reviewer workstation of claim 1 in which: the workstation further comprises means for verifying the origin and integrity of the first document, including: means (550) for providing: a record for the first document, the record including the first document; and an electronic signature for the first document, the signature being produced using a private key (784) of the first document for encrypting a fingeφrint of the first document, the fingeφrint being produced by hashing the record of the first document, the hashing being performed using a one-way hashing method; a public key (551) of the first document; means (553) for decrypting the first document signature using the public key
(551) of the first document; means (554) for reproducing the fingeφrint of the first document using the oneway hashing method; and means (555) for comparing the first document fingeφrint with the decryption of the first document signature and verifying the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison.
3. The reviewer workstation of claim 1 , in which the log of activities includes information indicating the time for which the first document was displayed.
4. The reviewer workstation of claim 3, in which the log of activities includes information indicating the times for which portions of the first document were displayed and the order in which the portions were displayed.
5. The reviewer workstation of claim 3, in which the reviewer uses multiple displays or multiple windows on one display and the log of activities includes information indicating the times for which portions of the first document were displayed at each respective display or window.
6. The reviewer workstation of claim 1 , in which the log of activities includes information indicating the times when the reviewer was looking at the display.
7. The reviewer workstation of claim 6, in which the reviewer uses multiple displays or multiple windows on one display and the log of activities includes information indicating the times during which the reviewer looked at each respective display or window.
8. The reviewer workstation of claim 1 , in which the log of activities includes information entered by the reviewer during the review.
9. The reviewer workstation of claim 1 , in which the log of activities includes information indicating the configuration of software used during the review.
10. The reviewer workstation of claim 1 , in which the log of activities includes information indicating the configuration of hardware used during the review.
11. The reviewer workstation of claim 1 , in which the log of activities includes information indicating image manipulations used during the review, the image manipulations being selected from the group including: zooming into portions of images of the first document; slow motion of a video portion of the first document; contrast adjustment of images or video; changes in color in images or video; or other digital image enhancements.
12. An authoring workstation, comprising: means (483) for recording a presentation document including a log of activities of a critical procedure; means for allowing the origin and integrity of the presentation document to be verified, including: means (484) for producing a presentation document record including the presentation document; means (485) for producing a digital fingeφrint for the presentation document by hashing the presentation document record using a one-way hashing method; a private key (486) of the presentation securely held from others; and a public key (487) made available to others; means (441 ) for producing a digital signature for the presentation document by encrypting the presentation fingeφrint using the private key (486) of the presentation; means (496) for distributing the presentation document record, the presentation document signature, and the public key (487) of the presentation whereby others can decrypt the presentation document signature, produce the presentation document fingeφrint by hashing the presentation document record, and compare the decryption with the fingeφrint to verify the origin and integrity of the presentation document; means (493) for providing the presentation document signature to an electronic notary; means (494) for receiving a time stamp and time stamp signature for the presentation document from the electronic notary, the presentation document time stamp including the stamping time at which the time stamp was produced and the presentation document signature, the presentation document time stamp signature being produced from a fingeφrint of the presentation document time stamp using a private key (486) of the notary; and means (496) for distributing the time stamp whereby others can decrypt the time stamp signature using a public key (498) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp.
13. An auditor workstation, comprising: means (630) for obtaining a first document record including a first document, a public key (631) of the first document, a first document time stamp, a first document time stamp signature, a public key (632) of the review, a review document record including a review document, a review document time stamp, a review document time stamp signature, and a public key (633) of the notary; means (634) for decrypting the first document signature using the public key (631) of the first document; means (635) for reproducing the fingeφrint of the first document using the oneway hashing method; means (636) for comparing the first document fingeφrint with the decryption of the first document signature and verifying the origin of the first document and that the first document has not been altered since it was signed, depending on the comparison; means (637) for producing the fingeφrint for the first document time stamp by hashing the time stamp using the one-way hashing method; means (640) for decrypting the first document time stamp signature using the public key (633) of the notary; means (641) for comparing the first document time stamp fingeφrint with the decryption of the first document time stamp signature and verifying the origin of the first document time stamp and that the first document time stamp has not been altered since it was signed, depending on the comparison; means (642) for decrypting the review document signature using the public key of the review document; means (643) for reproducing the fmgeφrint of the review document using the one-way hashing method; means (644) for comparing the review document fingeφrint with the decryption of the review document signature and verifying the origin of the review document and that the review document has not been altered since it was signed, depending on the comparison; means (645) for producing the fmgeφrint for the review document time stamp by hashing the time stamp using the one-way hashing method; means (646) for decrypting the review document time stamp signature using the public key (633) of the notary; means (647) for comparing the review document time stamp fingeφrint with the decryption of the review document time stamp signature and verifying the origin of the review document time stamp and that the review document time stamp has not been altered since it was signed, depending on the comparison; and means (648) for auditing the review document.
14. A secure server, comprising: means (780) for receiving through a secure channel, a first document from an author; means (781) for producing a first document record including the first document; means (782) for storing the first document record; means (811, 812) for providing a digital signature for the first document, the signature being formed by encrypting the first document fingeφrint using a first document private key (784); a first document public key (785) for others to use for decrypting the signature of the first document for reproducing the first document fingeφrint; means (787) for distributing the first document record, the first document signature, and the first document public key (785) whereby others can decrypt the first document signature using the public key, produce the first document fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the first document; means (815, 816 and 817) for providing a time stamp and time stamp signature of a notary for the first document; means (791) for distributing the time stamp and the time stamp signature for the first document, whereby others can decrypt the time stamp signature using a public key (792) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp for the first document; means (795) for receiving through a secure channel, a review document; means (796) for producing a review document record including the review document; means (813 and 814) for providing a digital signature for the review document, the signature being formed by encrypting the review document fingeφrint using a review document private key (800), the signature including information for determining whether the review document is based on the first digital document; a review document public key (801) for others to use for decrypting the signature of the review document for reproducing the review document fingeφrint; means (802) for distributing the review document record, the review document signature, and the review document public key (801) whereby others can decrypt the review document signature using the review document public key, produce the review document fingeφrint by hashing the review document record, and compare the decryption with the fmgeφrint to verify the origin and integrity of the review document and that the review document is based on the first document; means (820, 821 and 822) for providing a time stamp and time stamp signature of a notary for the review document; means (804) for distributing the time stamp and time stamp signature of the review document, whereby others can decrypt the time stamp signature using the public key (792) of the notary, produce the time stamp fingeφrint by hashing the time stamp, and compare the decryption with the fingeφrint to verify the origin and integrity of the time stamp and the stamping time in the time stamp of the review document.
PCT/EP1999/010212 1998-12-28 1999-12-17 Transmitting reviews with digital signatures WO2000039659A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
KR1020007009533A KR20010041400A (en) 1998-12-28 1999-12-17 Transmitting reviews with digital signatures
DE69917434T DE69917434T2 (en) 1998-12-28 1999-12-17 Device for checking documents with historical storage of the activities of the examiner
EP99964634A EP1057095B1 (en) 1998-12-28 1999-12-17 System for reviewing a document having a log of the reviewer activities
BR9908289-6A BR9908289A (en) 1998-12-28 1999-12-17 Reviewer, authoring, and auditor workstations, and security server
JP2000591491A JP2002533824A (en) 1998-12-28 1999-12-17 Transmission of examination certificate with digital signature

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/221,955 US6587945B1 (en) 1998-12-28 1998-12-28 Transmitting reviews with digital signatures
US09/221,955 1998-12-28

Publications (1)

Publication Number Publication Date
WO2000039659A1 true WO2000039659A1 (en) 2000-07-06

Family

ID=22830141

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP1999/010212 WO2000039659A1 (en) 1998-12-28 1999-12-17 Transmitting reviews with digital signatures

Country Status (7)

Country Link
US (1) US6587945B1 (en)
EP (1) EP1057095B1 (en)
JP (1) JP2002533824A (en)
KR (1) KR20010041400A (en)
BR (1) BR9908289A (en)
DE (1) DE69917434T2 (en)
WO (1) WO2000039659A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002019075A2 (en) * 2000-08-30 2002-03-07 Spectros Corporation System and method for client document certification and validation by remote host
DE10106083A1 (en) * 2001-02-08 2002-08-29 Jan Wendenburg Procedure for assigning digital time stamps
ES2178937A1 (en) * 2000-10-31 2003-01-01 Serra Luis Ignacio Cortes Method of interconnecting sites for the exchange of data
EP1183582B1 (en) * 1999-04-23 2004-11-17 Intel Corporation Cryptographic device and method for assuring integrity of trusted agent communications
WO2007039453A1 (en) * 2005-10-05 2007-04-12 International Business Machines Corporation System and method for performing a trust-preserving migration of data objects from a source to a target

Families Citing this family (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE334526T1 (en) * 1999-02-26 2006-08-15 Bitwise Designs Inc DIGITAL DATA MANAGEMENT AND IMAGING SYSTEM AND METHOD WITH SECURE DATA MARKING
US7206820B1 (en) * 2000-03-18 2007-04-17 Digimarc Corporation System for linking from object to remote resource
US7797543B1 (en) * 1999-09-30 2010-09-14 United States Postal Service Systems and methods for authenticating an electronic message
WO2001024437A2 (en) 1999-09-30 2001-04-05 United States Postal Service Systems and methods for authenticating an electronic message
US7315948B1 (en) * 1999-12-10 2008-01-01 International Business Machines Corporation Time stamping method employing a separate ticket and stub
AU2001249230A1 (en) 2000-03-17 2001-10-03 United States Postal Service Methods and systems for establishing an electronic account for a customer
US20020026584A1 (en) * 2000-06-05 2002-02-28 Janez Skubic Method for signing documents using a PC and a personal terminal device
JP2002092186A (en) * 2000-09-18 2002-03-29 Nidek Co Ltd Method and system of sharing medical information
JP3755394B2 (en) * 2000-09-29 2006-03-15 日本電気株式会社 Electronic commerce audit system, electronic commerce audit method, and recording medium recording electronic commerce audit program
US7197513B2 (en) 2000-12-08 2007-03-27 Aol Llc Distributed image storage architecture
US7779117B2 (en) * 2002-05-31 2010-08-17 Aol Inc. Monitoring digital images
US20020128844A1 (en) * 2001-01-24 2002-09-12 Wilson Raymond E. Telephonic certification of electronic death registration
US7188246B2 (en) * 2001-03-20 2007-03-06 Koninklijke Philips Electronics N.V. System for adding electronic signature to a report associated with an image file
US6904416B2 (en) * 2001-03-27 2005-06-07 Nicholas N. Nassiri Signature verification using a third party authenticator via a paperless electronic document platform
US7779481B2 (en) * 2001-04-12 2010-08-17 United States Postal Service Systems and methods for electronic postmarking of data including location data
JP2004527962A (en) * 2001-04-23 2004-09-09 インターナショナル・ビジネス・マシーンズ・コーポレーション Non-transferable anonymous electronic receipt
US7260820B1 (en) * 2001-04-26 2007-08-21 Vm Ware, Inc. Undefeatable transformation for virtual machine I/O operations
US7657747B2 (en) * 2001-06-15 2010-02-02 Link Us All, Llc System and method for specifying security, privacy, and access control to information used by others
US8255235B2 (en) 2001-09-07 2012-08-28 United States Postal Service Item tracking and anticipated delivery confirmation system method
US7200747B2 (en) * 2001-10-31 2007-04-03 Hewlett-Packard Development Company, L.P. System for ensuring data privacy and user differentiation in a distributed file system
US20030120930A1 (en) * 2001-12-21 2003-06-26 Simpson Shell S. Document notarization system and method
US7395436B1 (en) * 2002-01-31 2008-07-01 Kerry Nemovicher Methods, software programs, and systems for electronic information security
US7134020B2 (en) * 2002-01-31 2006-11-07 Peraogulne Corp. System and method for securely duplicating digital documents
JP2003244139A (en) * 2002-02-20 2003-08-29 Amano Corp Time stamp imprinting system to electronic document, and program medium thereof
US7660988B2 (en) * 2002-03-18 2010-02-09 Cognomina, Inc. Electronic notary
US7774855B2 (en) * 2002-05-07 2010-08-10 Savvis Communications Corporation Integrity monitoring system and data visualization tool for viewing data generated thereby
EP3547599A1 (en) * 2002-08-06 2019-10-02 Apple Inc. Methods for secure enrollment and backup of personal identity credentials into electronic devices
US20040186357A1 (en) * 2002-08-20 2004-09-23 Welch Allyn, Inc. Diagnostic instrument workstation
US20050288571A1 (en) * 2002-08-20 2005-12-29 Welch Allyn, Inc. Mobile medical workstation
US20040221162A1 (en) * 2003-02-03 2004-11-04 Phill Kongtcheu Method and systems to facilitate online electronic notary, signatures and time stamping
US7219236B2 (en) * 2003-02-26 2007-05-15 Electronic Data Systems Corporation Administering a security system
US8326653B2 (en) * 2003-03-04 2012-12-04 Nuance Communications, Inc. Method and apparatus for analyzing patient medical records
US7353397B1 (en) 2003-04-30 2008-04-01 Adobe Systems Incorporated Repurposing digitally signed information
US20040243536A1 (en) * 2003-05-28 2004-12-02 Integrated Data Control, Inc. Information capturing, indexing, and authentication system
US7289632B2 (en) 2003-06-03 2007-10-30 Broadcom Corporation System and method for distributed security
US7110919B2 (en) * 2003-06-19 2006-09-19 Siemens Building Technologies, Inc. Field panel trending on event in a building control system
DE10340064A1 (en) * 2003-08-28 2005-04-07 Francotyp-Postalia Ag & Co. Kg Arrangement for detecting biometric data, especially medical data, of individual stores identification associated with individual in memory; processing unit performs manipulation-proof combination of biometric data with identification
DE10343369A1 (en) * 2003-09-17 2005-05-04 Francotyp Postalia Ag Method for assigning identifications to information
US20080028220A1 (en) * 2003-12-14 2008-01-31 The Thayn Firm, Limited Liability Company, A Limited Liability Company Method and System for Verifying Documents
CN1642077B (en) * 2004-01-13 2011-07-06 国际商业机器公司 Credible digital time stamp generating and verifying method and system
US20050177396A1 (en) * 2004-01-14 2005-08-11 Meir Gottlieb Method and apparatus for performing concurrent patient coding for hospitals
EP1577730A1 (en) * 2004-03-17 2005-09-21 Sap Ag Method, system and software application for verifying certain requirements on electronic documents
WO2005111926A1 (en) 2004-05-18 2005-11-24 Silverbrook Research Pty Ltd Method and apparatus for security document tracking
WO2006010826A1 (en) * 2004-06-28 2006-02-02 France Telecom Method and a system for securing a fax transmission through a communications network
US20060212148A1 (en) * 2005-03-18 2006-09-21 Critech Enterprises Inc. Systems and methods for the evaluation of artistic performances
US20060224895A1 (en) * 2005-03-31 2006-10-05 Xerox Corporation System and methods for electronically notarizing scanned documents
US7783072B2 (en) * 2005-04-27 2010-08-24 Therapeias Health Management, Llc Methods and systems for clinical trial data management
US20070061164A1 (en) * 2005-09-15 2007-03-15 James Broselow Healthcare information storage system
JP4150037B2 (en) * 2005-09-30 2008-09-17 株式会社東芝 Time stamp acquisition system, time stamp acquisition device, time stamp acquisition program, and time stamp acquisition method
JP2007174335A (en) * 2005-12-22 2007-07-05 Fuji Xerox Co Ltd Image reading apparatus, electronic document creation method in image reading apparatus, and electronic document creation program
US7996439B2 (en) * 2006-01-18 2011-08-09 Echosign, Inc. Automatic document exchange and execution management
US7996367B2 (en) 2006-01-18 2011-08-09 Echosign, Inc. Automatic document exchange with document searching capability
US7895166B2 (en) * 2006-01-18 2011-02-22 Echosign, Inc. Automatic document exchange with archiving capability
US20070226507A1 (en) * 2006-03-22 2007-09-27 Holzwurm Gmbh Method and System for Depositing Digital Works, A Corresponding Computer Program, and a Corresponding Computer-Readable Storage Medium
US7934160B2 (en) * 2006-07-31 2011-04-26 Litrell Bros. Limited Liability Company Slide kit creation and collaboration system with multimedia interface
US20080045236A1 (en) * 2006-08-18 2008-02-21 Georges Nahon Methods and apparatus for gathering and delivering contextual messages in a mobile communication system
US20080100874A1 (en) * 2006-10-25 2008-05-01 Darcy Mayer Notary document processing and storage system and methods
US20080104408A1 (en) * 2006-10-25 2008-05-01 Darcy Mayer Notary document processing and storage system and methods
US20080147559A1 (en) * 2006-11-30 2008-06-19 Cohen Alexander J Data services outsourcing verification
FR2912578B1 (en) * 2007-02-13 2009-05-22 Airbus France Sas METHOD OF AUTHENTICATING AN ELECTRONIC DOCUMENT AND METHOD OF VERIFYING A DOCUMENT THUS AUTHENTICATED.
US20080288291A1 (en) * 2007-05-16 2008-11-20 Silver Springs - Martin Luther School Digital Signature, Electronic Record Software and Method
US8165304B2 (en) * 2008-02-18 2012-04-24 Sungkyunkwan University Foundation For Corporate Collaboration Domain digital rights management system, license sharing method for domain digital rights management system, and license server
US20100010320A1 (en) * 2008-07-07 2010-01-14 Perkins David G Mobile medical workstation and a temporarily associating mobile computing device
US8589372B2 (en) 2008-12-16 2013-11-19 Clinton A. Krislov Method and system for automated document registration with cloud computing
US8341141B2 (en) * 2008-12-16 2012-12-25 Krislov Clinton A Method and system for automated document registration
US8914351B2 (en) 2008-12-16 2014-12-16 Clinton A. Krislov Method and system for secure automated document registration from social media networks
US20110172498A1 (en) * 2009-09-14 2011-07-14 Olsen Gregory A Spot check monitor credit system
US9621584B1 (en) 2009-09-30 2017-04-11 Amazon Technologies, Inc. Standards compliance for computing data
US8312284B1 (en) * 2009-11-06 2012-11-13 Google Inc. Verifiable timestamping of data objects, and applications thereof
ES2377787B1 (en) * 2010-07-20 2013-02-13 Telefónica, S.A. METHOD AND SYSTEM OF ELECTRONIC SIGNATURE GUARANTEED.
US9367833B2 (en) 2011-07-14 2016-06-14 Invention Science Fund I, Llc Data services outsourcing verification
US8989376B2 (en) * 2012-03-29 2015-03-24 Alcatel Lucent Method and apparatus for authenticating video content
US9787568B2 (en) 2012-11-05 2017-10-10 Cercacor Laboratories, Inc. Physiological test credit method
US9779483B2 (en) * 2012-12-26 2017-10-03 Volcano Corporation Measurement and enhancement in a multi-modality medical imaging system
US9471119B2 (en) * 2014-05-13 2016-10-18 International Business Machines Corporation Detection of deleted records in a secure record management environment
KR101611241B1 (en) * 2014-08-11 2016-04-26 주식회사 케이티 Message authentication method, system, server and computer-readable medium
US20160119147A1 (en) * 2014-10-24 2016-04-28 Mohammed Mustafa Saidalavi Method and System of Online Content Review, Authentication, and Certification
US11140171B1 (en) 2015-06-05 2021-10-05 Apple Inc. Establishing and verifying identity using action sequences while protecting user privacy
US10868672B1 (en) 2015-06-05 2020-12-15 Apple Inc. Establishing and verifying identity using biometrics while protecting user privacy
US9935945B2 (en) * 2015-11-05 2018-04-03 Quanta Computer Inc. Trusted management controller firmware
US10468129B2 (en) * 2016-09-16 2019-11-05 David Lyle Schneider Biometric medical antifraud and consent system
US10856750B2 (en) 2017-04-28 2020-12-08 Masimo Corporation Spot check measurement system
WO2019228559A2 (en) * 2019-09-02 2019-12-05 Alibaba Group Holding Limited Managing blockchain-based centralized ledger systems
WO2020143856A2 (en) 2020-04-22 2020-07-16 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
EP3837657B1 (en) 2020-04-22 2022-12-07 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
WO2020143855A2 (en) 2020-04-22 2020-07-16 Alipay (Hangzhou) Information Technology Co., Ltd. Managing transaction requests in ledger systems
CN116720774B (en) * 2023-06-06 2024-02-13 陕西华春网络科技股份有限公司 Time verification-based bidding method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5136646A (en) * 1991-03-08 1992-08-04 Bell Communications Research, Inc. Digital document time-stamping with catenate certificate
WO1996013921A1 (en) * 1994-10-28 1996-05-09 Surety Technologies, Inc. Digital document authentication system for providing a certificate which authenticates and uniquely identifies a document
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
EP0822551A2 (en) * 1996-07-31 1998-02-04 International Business Machines Corporation Recording apparatus with system for authentification of the recorded material
US5751809A (en) * 1995-09-29 1998-05-12 Intel Corporation Apparatus and method for securing captured data transmitted between two sources
WO1999035785A2 (en) * 1997-12-31 1999-07-15 Koninklijke Philips Electronics N.V. Transmitting revisions with digital signatures

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06259305A (en) * 1993-03-09 1994-09-16 Hitachi Ltd Method for granting secrecy protection label
RU2144269C1 (en) * 1994-07-19 2000-01-10 Сертко, Ллс Method of secret use of digital signatures in commercial cryptographic system
JPH08287147A (en) * 1995-04-11 1996-11-01 Hitachi Ltd Paperless official document management system
JPH1097582A (en) * 1996-06-06 1998-04-14 Toshiba Corp Medical information system
JP3688822B2 (en) * 1996-09-03 2005-08-31 株式会社東芝 Electronic medical record system
JP3831990B2 (en) * 1996-10-04 2006-10-11 株式会社日立製作所 Communication data audit method and apparatus
US6188766B1 (en) * 1997-03-05 2001-02-13 Cryptography Research, Inc. Apparatus and method for confirming, timestamping, and archiving printer and telecopier transmissions

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5136646A (en) * 1991-03-08 1992-08-04 Bell Communications Research, Inc. Digital document time-stamping with catenate certificate
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
WO1996013921A1 (en) * 1994-10-28 1996-05-09 Surety Technologies, Inc. Digital document authentication system for providing a certificate which authenticates and uniquely identifies a document
US5751809A (en) * 1995-09-29 1998-05-12 Intel Corporation Apparatus and method for securing captured data transmitted between two sources
EP0822551A2 (en) * 1996-07-31 1998-02-04 International Business Machines Corporation Recording apparatus with system for authentification of the recorded material
WO1999035785A2 (en) * 1997-12-31 1999-07-15 Koninklijke Philips Electronics N.V. Transmitting revisions with digital signatures

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DIFFIE W ET AL: "NEW DIRECTIONS IN CRYPTOGRAPHY", IEEE TRANSACTIONS ON INFORMATION THEORY,US,IEEE INC. NEW YORK, vol. 22, no. 6, 1 November 1976 (1976-11-01), pages 644 - 654, XP000565260, ISSN: 0018-9448 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1183582B1 (en) * 1999-04-23 2004-11-17 Intel Corporation Cryptographic device and method for assuring integrity of trusted agent communications
WO2002019075A2 (en) * 2000-08-30 2002-03-07 Spectros Corporation System and method for client document certification and validation by remote host
WO2002019075A3 (en) * 2000-08-30 2003-04-17 Spectros Corp System and method for client document certification and validation by remote host
ES2178937A1 (en) * 2000-10-31 2003-01-01 Serra Luis Ignacio Cortes Method of interconnecting sites for the exchange of data
WO2003043297A2 (en) * 2000-10-31 2003-05-22 Luis Ignacio Cortes Serra Method of interconnecting sites for the exchange of data
WO2003043297A3 (en) * 2000-10-31 2003-08-28 Serra Luis Ignacio Cortes Method of interconnecting sites for the exchange of data
DE10106083A1 (en) * 2001-02-08 2002-08-29 Jan Wendenburg Procedure for assigning digital time stamps
WO2007039453A1 (en) * 2005-10-05 2007-04-12 International Business Machines Corporation System and method for performing a trust-preserving migration of data objects from a source to a target
US7996679B2 (en) 2005-10-05 2011-08-09 International Business Machines Corporation System and method for performing a trust-preserving migration of data objects from a source to a target

Also Published As

Publication number Publication date
US6587945B1 (en) 2003-07-01
EP1057095A1 (en) 2000-12-06
BR9908289A (en) 2000-10-31
EP1057095B1 (en) 2004-05-19
JP2002533824A (en) 2002-10-08
DE69917434D1 (en) 2004-06-24
KR20010041400A (en) 2001-05-15
DE69917434T2 (en) 2005-06-02

Similar Documents

Publication Publication Date Title
EP1057095B1 (en) System for reviewing a document having a log of the reviewer activities
EP0963637B1 (en) Transmitting revisions with digital signatures
US6948069B1 (en) Method and system for determining and maintaining trust in digital image files with certifiable time
EP3710974B1 (en) Method and arrangement for detecting digital content tampering
US8924302B2 (en) System and method for electronic transmission, storage, retrieval and remote signing of authenticated electronic original documents
JP4169797B2 (en) Digital authentication center for medical image authentication
CN101118586B (en) Information processing apparatus, data processing apparatus, and methods thereof
US7552335B2 (en) Information processing apparatus, method therefor, computer program, and computer-readable storage medium
JP4788212B2 (en) Digital signature program and digital signature system
CN102077213B (en) Techniques for ensuring authentication and integrity of communications
US20070022293A1 (en) Information processing apparatus and method
JP2000056681A (en) Digital data recorder with security information
US20100014668A1 (en) Image data verification program recorded on a recording medium, image data verification method, and image data verification system
JPH11338780A (en) Method and device for acknowledging and safely storing electronic document
JP4614377B2 (en) ENCRYPTED DATA MANAGEMENT SYSTEM AND METHOD, STORAGE MEDIUM
CN100574359C (en) Information processing method and equipment
JP2007028015A (en) Program, system and method for time stamp verification, and time stamp generation request method
CN111405223A (en) Video processing method, device and equipment
KR20020067663A (en) Data distribution system
JP4861704B2 (en) Electronic evidence data disclosure method and system
JPH09311854A (en) Signatured document communication device
JP2004139170A (en) E-mail system
CN112769953A (en) Judicial case data diversified preservation method and system based on cloud storage
CN115834035A (en) Multimedia data storage method, computer equipment and storage device
JP2006243892A (en) Data input/verification system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): BR ID IN JP KR SG

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

WWE Wipo information: entry into national phase

Ref document number: 1999964634

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: IN/PCT/2000/320/CHE

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 1020007009533

Country of ref document: KR

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWP Wipo information: published in national office

Ref document number: 1999964634

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1020007009533

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1020007009533

Country of ref document: KR

WWG Wipo information: grant in national office

Ref document number: 1999964634

Country of ref document: EP