WO2000019296A1 - Method for the separate authentication of a template and user data - Google Patents
Method for the separate authentication of a template and user data Download PDFInfo
- Publication number
- WO2000019296A1 WO2000019296A1 PCT/CA1999/000891 CA9900891W WO0019296A1 WO 2000019296 A1 WO2000019296 A1 WO 2000019296A1 CA 9900891 W CA9900891 W CA 9900891W WO 0019296 A1 WO0019296 A1 WO 0019296A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dac
- template
- user data
- generating
- hereinafter referred
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
Definitions
- the present invention relates to the secure handling of data and more particularly concerns a method for separately authenticating a template and user data inserted in the template.
- U.S. patent no. 5, 1 95, 1 33 to Kapp et al. describes a system designed to generate a completed payment document, which can be signed by a customer, and then capture that customer's signature in digital form.
- the principal feature of this mechanism is that it seeks to ensure that a signature approving a particular document was, in fact, captured at the time of the completion of the transaction to which it relates and was not obtained on some other occasion and merely reproduced for the particular transaction in question.
- the Kapp et al. patent creates a digital record of the transaction and captures a digital representation of the signature at the time the transaction is completed. This system then uses this digital record to encrypt the digital representation of the signature.
- U.S. patent no. 5,689,567 is a system designed to verify the integrity or signer of electronic documents. This is accomplished by embedding and encrypting security information in the electronic document at a location selected by the signer. When the electronic document is subsequently displayed, the technology decrypts the security information and verifies the identity of the signer. In another mechanism, another method operates to authenticate and verify users on a network (U.S. patent no. 5,706,427). The possible applications of any of the aforementioned systems, albeit useful for certain purposes, are nonetheless limited as they do not allow for the creation, approval or authentication of template information distinct from the user data.
- the Remote Template Approval can serve as a vital tool facilitating electronic business processes.
- the RTA would enable those marketing these services to securely store and access user data separately from the templates, while individual template information could be generated, accessed or modified for each subsequent user or purchaser. This would represent an efficient way of gathering, storing and authenticating client and template information.
- it would offer an easy and secure medium through which users or consumers could submit information and purchase services on-line.
- the need to generate and store template information and user data as separate entities will become more pronounced as well. As this occurs, the need for the Remote Template Approval mechanism will expand with it.
- the present invention provides a system and method designed to facilitate remote template approval.
- This system will enable users to separate user data from template information and authenticate and verify each portion separately.
- users will be able to approve template information separately from the data added to the template.
- this invention will also enable users to securely recreate the complete document composed of both data and template and verify its authenticity.
- Such a process would represent a marked improvement over existing systems which enable users to add data to existing templates in such a fashion as to bind the data to the template in one document.
- the present invention allows the user to securely access the template and the data as distinct records, or to, optionally, access the complete document.
- the present invention provides a method for the separate authentication of a template and of user data inserted therein, comprising the steps of: a) providing the template, said template having a corresponding template ID and template Document Authentication Code, hereinafter referred to as
- DAC(t) linked thereto; b) inserting the user data in the template; c) extracting the user data from the template; d) generating a user data Document Authentication Code, hereinafter referred to as DAC(d), based on the user data; and e) storing the template ID, DAC(t), the user data and DAC(d) in an Approval Data Packet, hereinafter referred to as ADP.
- ADP Approval Data Packet
- DAC(t) a template ID and a corresponding template Document Authentication Code, hereinafter referred to as DAC(t), linked to the template
- DAC(t) entering the user data
- DAC(d) linking the user data to the fields of the template
- DAC(d) a user data Document Authentication Code
- ADP Approval Data Packet
- the present invention further provides a method for the separate authentication of a template and of user data inserted therein, comprising the steps of: a) providing the template, said template having a corresponding template ID and template Document Authentication Code, hereinafter referred to as DAC(t), linked thereto; b) inserting the user data in the template; c) generating a complete document Document Authentication Code, hereinafter referred to as DAC(c), based on the template with the user data therein; d) extracting the user data from the template; e) generating a user data Document Authentication Code, hereinafter referred to as DAC(d), based on the user data; and f) storing the template ID, DAC(t), the user data, DAC(c) and DAC(d) in an Approval Data Packet, hereinafter referred to as ADP.
- ADP Approval Data Packet
- DAC(nc) retrieves the template and DAC(c); i) inserting user data from previous users in the template; iii)generating for the template with the user data from previous users therein a new complete document Document Authentication Code, hereinafter referred to as DAC(nc); iv) comparing DAC(nc) with DAC(c), and proceeding only if DAC(nc) is equal to DAC(c); v) inserting data from the current user in the template; vi) generating a DAC(c), based on the template with the user data from the previous users and current user therein; vii) extracting the user data from the previous users and current user from the template; viii) generating a DAC(d), based on the user data extracted in step vii); and ix) storing the user data, DAC(c) and DAC(d) in ADP.
- the present invention can have numerous applications. For example, it could enable users to create and approve one document on one system (e-mail for example), with the target template indicated in the ADP, and send it to another system, which may be the same system or a completely different one. The message can then be entered into the actual template document with all the proper formatting and no need to convert the document.
- This invention would be useful for many industries that rely on templates as a means of collecting data. The same template could be generated for each new user and the data collected could be stored separately or could also be combined with the template to create a completed document. This method would allow users to re-generate the template for each subsequent user.
- FIG. 1 is a flow chart representing the main steps of a method for the separate authentication of a template and of user data inserted therein in accordance with a preferred embodiment of the present invention.
- FIG. 2 is a flow chart detailing step f of the method of FIG. 1 .
- FIG. 3 is a flow chart representing the main steps of a method for the separate authentication of a template and of user data inserted therein in accordance with an alternative embodiment of the invention.
- FIG. 4 is a flow chart representing the main steps of a method for the separate authentication of a template and of user data inserted therein in accordance with another embodiment of the invention.
- FIG. 5 is a flow chart detailing step g of the method of FIG. 4.
- FIG. 6 is a flow chart detailing another variant for step g of the method of FIG. 4.
- FIG . 7 is a flow chart representing the main steps of a method for the separate authentication of a template and of user data inserted therein in accordance with yet another embodiment of the invention. DESCRIPTION OF PREFERRED EMBODIMENTS OF THE INVENTION
- FIGs. 1 and 2 the steps of a method for the separate authentication of a template and user data inserted in the template are shown. This method allows the secure handling of the template and user data independently, without having to store the user data inside the template.
- the first step a) of the method of FIG. 1 consists of providing the template itself.
- a template ID, identifying the particular template chosen, and a template Document Authentication code, DAC(t), are both linked to the template.
- DAC(t) is a code characterizing precisely the template's content, and is preferably generated through a one-way hash function. If the template is not pre-existing, step a) may include the substep of generating the template, creating the template ID and DAC(t) and storing the last two in an appropriate location, which can for example be inside the template itself or in a linked storage system.
- the second step b) consists of inserting the user data in the template.
- user data is understood as encompassing any relevant information that may be entered in a template, including a user signature and the date of signing. The method may therefore be used in the context of the remote approval of a document.
- the template preferably has specific fields where the user data may be received.
- Step e) consists of storing the template ID, DAC(t), the user data and
- ADP Approval Data Packet
- the user data may alternatively be stored elsewhere and a link to its location may be provided in the ADP.
- step f) of reconstructing a complete document including both the template and the user data there is shown an optional step f) of reconstructing a complete document including both the template and the user data.
- the template ID and DAC(t) are first retrieved from the ADP, and the template corresponding to the template ID is accessed and opened.
- a new DAC (DAC(nt)) is generated on the opened template, and compared to DAC(t) . Corrective action is to be taken if they don't match. If they do match, the user data and DAC(d) are also retrieved.
- a DAC(nd) is generated on the user data and compared to DAC(d). If they also match, the user data may then be inserted in the template.
- the method described above may be performed without actually accessing the template.
- a template ID and the corresponding DAC(t) are selected, and the user data is entered, preferably in answer to prompts for particular information.
- the user data entered is then linked to corresponding fields in the template, so that a complete document including both the template and the user data may later be reconstructed.
- a step is added between steps b) and c) of FIG. 1 where a DAC(c) is generated based on the template with the user data therein, before the user data is extracted from the template.
- This DAC(c) is stored in the ADP with the other relevant information.
- additional substeps of generating a DAC(nc) on the complete document once the user data is inserted in the template and comparing this DAC(nc) with DAC(c) may be performed, as shown in FIG. 5.
- only the DACs of the complete documents may be compared, completely bypassing the verifications of the separate template and user data, as illustrated in FIG. 6.
- FIG. 7 there is shown another embodiment of the invention where multiple users insert user data sequentially in a single template.
- the method includes the steps of: a) authenticating a template and user data from a first user according to the method of FIG. 4. In this manner, an ADP is created containing the template ID, DAC(t), the user data, DAC(d) and DAC(c). b) for each subsequent user of the multiple users, the following substeps are performed: i) retrieving the template and DAC(c) from the ADP; ii) inserting user data from previous users in the template.
- the document thereby generated corresponds to the complete document of the previous iteration; iii)generating for the template with the user data from previous users therein a new complete document Document Authentication Code (DAC(nc)); iv) comparing DAC(nc) with DAC(c), and proceeding only if DAC(nc) is equal to DAC(c); v) inserting data from the current user in the template; vi) generating a DAC(c), based on the template with the user data from the previous users and current user therein; vii) extracting the user data from the previous users and current user from the template; viii) generating a DAC(d), based on the user data extracted in step vii); and ix) storing the user data, DAC(c) and DAC(d) in ADP.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Document Processing Apparatus (AREA)
- Computer And Data Communications (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU58446/99A AU5844699A (en) | 1998-09-25 | 1999-09-24 | Method for the separate authentication of a template and user data |
CA2345148A CA2345148C (en) | 1998-09-25 | 1999-09-24 | Method for the separate authentication of a template and user data |
EP99945805A EP1116084A1 (en) | 1998-09-25 | 1999-09-24 | Method for the separate authentication of a template and user data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002246006A CA2246006A1 (en) | 1998-09-25 | 1998-09-25 | Remote template approvals in a distributed network environment |
CA2,246,006 | 1998-09-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000019296A1 true WO2000019296A1 (en) | 2000-04-06 |
Family
ID=4162775
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CA1999/000891 WO2000019296A1 (en) | 1998-09-25 | 1999-09-24 | Method for the separate authentication of a template and user data |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1116084A1 (en) |
AU (1) | AU5844699A (en) |
CA (1) | CA2246006A1 (en) |
WO (1) | WO2000019296A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000062140A2 (en) * | 1999-04-12 | 2000-10-19 | Silanis Technology Inc. | Secure electronic document creation, approval and distribution method in an open and distributed network environment |
EP1336913A2 (en) * | 2002-02-18 | 2003-08-20 | Fujitsu Limited | Original creating apparatus and originality guaranteeing apparatus |
EP1498799A2 (en) * | 2003-07-15 | 2005-01-19 | Hitachi, Ltd. | Electronic document authenticity assurance method and electronic document disclosure system |
EP1669835A2 (en) * | 2004-11-29 | 2006-06-14 | Hitachi, Ltd. | Digital image data authenticity assuring method and digital image data disclosure system |
EP1670236A2 (en) * | 2004-12-07 | 2006-06-14 | Hitachi, Ltd. | Image data registration and verification methods and apparatus |
US7299408B1 (en) | 2002-04-01 | 2007-11-20 | Fannie Mae | Electronic document validation |
US8571973B1 (en) | 2002-12-09 | 2013-10-29 | Corelogic Solutions, Llc | Electronic closing |
US8688461B1 (en) | 2002-03-29 | 2014-04-01 | Fannie Mae | Electronic registry for authenticating transferable records |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0565314A2 (en) * | 1992-04-06 | 1993-10-13 | Addison M. Fischer | Method and apparatus for creating, supporting, and using travelling programs |
WO1998003927A2 (en) * | 1996-07-22 | 1998-01-29 | Cyva Research Corp | Personal information security and exchange tool |
-
1998
- 1998-09-25 CA CA002246006A patent/CA2246006A1/en not_active Abandoned
-
1999
- 1999-09-24 AU AU58446/99A patent/AU5844699A/en not_active Abandoned
- 1999-09-24 EP EP99945805A patent/EP1116084A1/en not_active Withdrawn
- 1999-09-24 WO PCT/CA1999/000891 patent/WO2000019296A1/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0565314A2 (en) * | 1992-04-06 | 1993-10-13 | Addison M. Fischer | Method and apparatus for creating, supporting, and using travelling programs |
WO1998003927A2 (en) * | 1996-07-22 | 1998-01-29 | Cyva Research Corp | Personal information security and exchange tool |
Non-Patent Citations (1)
Title |
---|
THE IMPACT OF TECHNOLOGY ON THE NOTARY PROCESS, 10 February 1998 (1998-02-10), XP002125327, Retrieved from the Internet <URL:law.uark.edu/~gahlers/notary.htm> [retrieved on 19991210] * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000062140A3 (en) * | 1999-04-12 | 2001-08-30 | Silanis Technology Inc | Secure electronic document creation, approval and distribution method in an open and distributed network environment |
WO2000062140A2 (en) * | 1999-04-12 | 2000-10-19 | Silanis Technology Inc. | Secure electronic document creation, approval and distribution method in an open and distributed network environment |
EP1336913A2 (en) * | 2002-02-18 | 2003-08-20 | Fujitsu Limited | Original creating apparatus and originality guaranteeing apparatus |
EP1336913A3 (en) * | 2002-02-18 | 2004-12-29 | Fujitsu Limited | Original creating apparatus and originality guaranteeing apparatus |
US8688461B1 (en) | 2002-03-29 | 2014-04-01 | Fannie Mae | Electronic registry for authenticating transferable records |
US7818657B1 (en) | 2002-04-01 | 2010-10-19 | Fannie Mae | Electronic document for mortgage transactions |
US8689094B1 (en) | 2002-04-01 | 2014-04-01 | Fannie Mae | Electronic document for mortgage transactions |
US8626647B1 (en) | 2002-04-01 | 2014-01-07 | Fannie Mae | Electronic mortgage document certification |
US8301553B1 (en) | 2002-04-01 | 2012-10-30 | Fannie Mae | Electronic mortgage document certification |
US7299408B1 (en) | 2002-04-01 | 2007-11-20 | Fannie Mae | Electronic document validation |
US8078512B1 (en) | 2002-04-01 | 2011-12-13 | Corelogic Real Estate Solutions, Llc | Document manifest and publication in association with dataset quality control |
US8571973B1 (en) | 2002-12-09 | 2013-10-29 | Corelogic Solutions, Llc | Electronic closing |
EP1498799A2 (en) * | 2003-07-15 | 2005-01-19 | Hitachi, Ltd. | Electronic document authenticity assurance method and electronic document disclosure system |
US7526645B2 (en) | 2003-07-15 | 2009-04-28 | Hitachi, Ltd. | Electronic document authenticity assurance method and electronic document disclosure system |
EP1498799A3 (en) * | 2003-07-15 | 2006-07-26 | Hitachi, Ltd. | Electronic document authenticity assurance method and electronic document disclosure system |
EP1669835A3 (en) * | 2004-11-29 | 2006-09-13 | Hitachi, Ltd. | Image data registration and verification methods and apparatus |
EP1669835A2 (en) * | 2004-11-29 | 2006-06-14 | Hitachi, Ltd. | Digital image data authenticity assuring method and digital image data disclosure system |
EP1670236A3 (en) * | 2004-12-07 | 2006-08-30 | Hitachi, Ltd. | Image data registration and verification methods and apparatus |
EP1670236A2 (en) * | 2004-12-07 | 2006-06-14 | Hitachi, Ltd. | Image data registration and verification methods and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CA2246006A1 (en) | 2000-03-25 |
EP1116084A1 (en) | 2001-07-18 |
AU5844699A (en) | 2000-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6931420B1 (en) | Method for the separate authentication of a template and user data | |
US6912660B1 (en) | Method for parallel approval of an electronic document | |
CA2393116C (en) | System and method for electronic storage and retrieval of authenticated original documents | |
US6609200B2 (en) | Method and system for processing electronic documents | |
US7162635B2 (en) | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents | |
CN113128950B (en) | Enterprise chain code service platform | |
CN116776318A (en) | Method and system for verifying ownership of digital assets using distributed hash tables and peer-to-peer distributed ledgers | |
EP3543891B1 (en) | A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof | |
JP2007515890A (en) | System and method for generating a digital certificate | |
CN108009445B (en) | Semi-centralized trusted data management system | |
CN110932859B (en) | User information processing method, apparatus, device and readable storage medium | |
WO2000019295A1 (en) | Method of creating authenticated verifiable reproductions of electronic documents | |
WO2023035477A1 (en) | Blockchain-based method for document validation | |
CA2345148C (en) | Method for the separate authentication of a template and user data | |
WO2011076809A2 (en) | Fully electronic notebook (eln) system and method | |
WO2000019296A1 (en) | Method for the separate authentication of a template and user data | |
CN110223075A (en) | Identity identifying method, device, computer equipment and storage medium | |
CN116777397A (en) | Electronic bill management method, device, terminal and storage medium based on block chain | |
WO2022237581A1 (en) | Blockchain application method and blockchain application terminal apparatus | |
US7818256B1 (en) | Digital receipt for electronic data and methods and systems for generating same | |
JP4663292B2 (en) | Electronic document storage management system, electronic document storage management method, and electronic document storage management program | |
JP2003006361A (en) | Electronic seal impression system and recording medium which records electronic seal impression program | |
CN113888131B (en) | Block chain-based man-hour information processing method, device, equipment and storage medium | |
Lone et al. | Forgery protection of academic certificates through integrity preservation at scale using ethereum smart contract | |
AU4060502A (en) | Method and system for processing electronic documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2345148 Country of ref document: CA Kind code of ref document: A Ref document number: 2345148 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999945805 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1999945805 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999945805 Country of ref document: EP |