Content deleted Content added
Dmichaels999 (talk | contribs) No edit summary |
Dmichaels999 (talk | contribs) |
||
Line 30:
During an interval, the transient private key is used to sign data concatenated with trusted timestamps and authenticity certificates. To [[File verification|verify]] the data at a later time, a receiver accesses the [[Persistence (computer science)|persistent]] public key for the appropriate time interval. The public key applied to the digital signature can be passed through published cryptographic routines to unpack the [[Cryptographic hash function|hash]] of the original data, which is then compared against a fresh hash of the stored data to verify data integrity. If the signature successfully decrypts using a particular interval's published public key, the receiver can be assured that the signature originated during that time period. If the decrypted and fresh hashes match, the receiver can be assured that the data has not been tampered with since the transient private key created the timestamp and signed the data.
Transient-key cryptography was invented in 1997 by Dr. Michael D. Doyle of [http://www.eolas.com Eolas Technologies Inc.], while working on the [[Visible Embryo Project]] <ref>{{cite patent |country=US |number=6381696 |title=Method and system for transient key digital time stamps |gdate=2002-04-30 |inventor=MD Doyle}}</ref> <ref>{{cite patent |country=US |number=7047415 |title=System and method for widely witnessed proof of time |gdate=2006-05-16 |invent1=MD Doyle |invent2=PF Doyle |invent3=GW Bernsohn |invent4=JD Roberts }}</ref> <ref>{{cite patent |country=US |number= 7210035 |title=System and method for graphical indicia for the certification of records |gdate=2007-04-24 |invent1=MD Doyle |invent2=RG Hamilton |invent3=MC Perrone |invent4=PF Doyle }}</ref> and later acquired by and productized by [http://www.proofspace.com ProofSpace, Inc]. It has been
*[http://www.proofspace.com ProofSpace, Inc] has published a more detailed [http://fios.com/proofmarksystemtech.pdf technical overview document] of transient key cryptography.
|