EP3803670A1 - Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publié - Google Patents
Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publiéInfo
- Publication number
- EP3803670A1 EP3803670A1 EP19730283.9A EP19730283A EP3803670A1 EP 3803670 A1 EP3803670 A1 EP 3803670A1 EP 19730283 A EP19730283 A EP 19730283A EP 3803670 A1 EP3803670 A1 EP 3803670A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- server
- digital content
- creator
- content
- software application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004422 calculation algorithm Methods 0.000 claims description 23
- 230000015654 memory Effects 0.000 claims description 19
- 238000012795 verification Methods 0.000 claims description 14
- 238000005516 engineering process Methods 0.000 claims description 9
- 238000004364 calculation method Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 19
- 238000000034 method Methods 0.000 description 10
- 230000008901 benefit Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 238000005065 mining Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 108091028043 Nucleic acid sequence Proteins 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Definitions
- a software application and a computer server for authenticating the identity of a digital content creator and the integrity of the published creator's content are provided.
- the present invention relates to the field of digital content management in a computer network, more generally to security measures for protecting information or exchanges of information on the computer network, for example by authenticating the integrity of the published digital contents. and / or by detecting falsifications made in the digital contents published on websites and / or any other method of digital or physical distribution.
- the present invention relates to a user software application interfacing with a computer server for recording digital content created by a creator and authenticating only the digital content published in a computer network by a third party user.
- the present invention also relates to a system for verifying and authenticating digital content published in a computer network conforming to the digital content initially created, in real time and secure, implementing the user software application using the computer server, to verify the authenticity of published digital content and / or to detect possible falsification of the digital content originally created and published by its creator on computer networks.
- a problem in the digital world concerns the reliability and veracity of information (or digital content or content or transaction) published on websites (or computer networks or online). Indeed, it is very easy to copy a given digital content (such as text, image, video, application, etc.), since it is only a succession of numbers (usually “zero” and of "one") which is duplicable to the identical and to infinity.
- a given digital content can also be easily modified, either to irreversibly damage the content by making the copy more difficult to repair, or to change the content itself to modify the original message or the author's idea ( or creator).
- These malicious acts are likely to easily infringe the copyrights of the person's original work or denigrate and damage the reputation or work of a person, an administration or a business.
- the method consists in producing a first hash value associated with a first information corresponding to the current file names or contents among the plurality of files, and then detecting the falsification by comparing the first hash value with a second hash value of a second piece of information corresponding to the file names or contents at the time of recording and saved in a magnetic disc player with an image marker.
- a report is provided to the administrator system and a modified message or image marker is displayed on the site to inform users of the tampering of the contents.
- this detection system does not reliably certify digital content with a single hashed to encrypt the content, or authenticate a file content creator.
- this system can not be adapted or set up to detect false contents in a distributed and decentralized system, such as for example from blockchain technology ("Blockchain” or “Ledger Distributed Technology”). ), or to trace the changes made to the contents.
- This system applies a modulo function on the cryptographic hash values and calculates the remaining sequences. Recurring zero remainder values define meta-block boundaries and meta-blocks of hash values aligned between the original video and the edited video. A hash hash is calculated on the meta-blocks to produce so-called self-aligned meta-hashes for the original video and the edited video. Self-aligned meta-hashes are comparable and can be matched to determine if the edited video is an excerpt from the original video. Finally, self-aligned meta-hashes are stored and validated on a blockchain network via smart contracts to provide enduring assurance that the data has not been tampered with, in addition to providing traceability and capabilities. transparent audit. However, this system is limited to the detection of edited audio and video format content.
- this system uses a public blockchain technology that allows anyone to access and modify digital content, without providing any guarantee as to the reliability of the modified content or its traceability.
- This system comprises: an accredited certificate authentication request server based on a blockchain which, in response to the request for authentication of a user terminal, transmits personal information, for issuing an accredited certificate ; an accredited certificate management server that makes a command to authenticate the user by determining, on the basis of the personal information for issuing an accredited certificate, the validity of an accredited certificate of the user by transmitting a public key for the trusted certificate of the user to the trusted certificate authentication request server.
- the system includes a hash processing command for the personal information of the certificate and to process as user identification information; and also a certificate management server hash string for information from Node certificate hash.
- this hash chain of the certificate management server issues an information forgery notification related to the public key certificate in a tamper verification request terminal consisting of a particular user.
- this system is used especially for public key certification in the context of "Bitcoin" type financial transactions.
- this system does not provide an authorized and validly registered identification of the user while ensuring the integrity of its digital content recorded by the user reliably.
- the system is comprised of an intelligent user device that allows the user to identify themselves before acquiring digital content to apply a hash function and a blockchain network to verify and authenticate the digital content.
- the user of the system makes a connection via a software application of his intelligent user device, he receives an approval of the logon and he then undertakes to acquire digital data from any source.
- the user then creates a hash file from the digital data and transmits the hash file to the system's blockchain network to receive a transaction confirmation and / or a system server identifier.
- this system uses the blockchain for "Bitcoin" type financial transactions, so this system simply allows a user to create a session to acquire digital content and then ensure authenticity content. Thus, this system does not allow an authorized and validly registered identification to be able to deposit certified digital content using the blockchain technology. User authentication to further ensure the integrity of the digital content is therefore unreliable.
- the present invention aims to overcome certain disadvantages of the prior art by proposing a new user software application to facilitate and ensure verification that a digital content published online is consistent with the digital content initially created by its creator, while securing and making reliable the recording of digital content by its creator, the authentication of the digital content creator and the integrity of the digital content published in the computer network.
- the present invention relates to a software application constituting at least one user application intended to be executed on at least one computer platform or a portable computing device for creating digital content and authenticating the digital content published in a computer network, the software application managing memories of which at least one memory of the computer hardware storing a unique pair of signature keys (CA) associated with each application loaded by a creator, this non-accessible key from the outside realizing a digital signature (S) of the content and the software application containing instructions that, when executed by a hardware processor, communicate with a distributed database server to enable the creation of the content and the determination of whether or not the creator exists on the server; the software application being characterized in that it is a succession of instruction sequences which, when it is executed on the computer platform or the computing device, makes it possible to perform at least one of the following functionalities:
- the digital content published by the server comprising in addition to the content the hash (HA) and the identifier (IDNP); verification of the authentication of the published digital content, in which the software application also comprises execution means configured to perform an authentication request, on the one hand, by generating a second hash value (H P ) published content and comparing the similarity between the first (HA) and the second (Hp) hash values, and secondly, by transmitting to the server a second message containing at least the second identical hash value (H P ). to the first (HA) hash, so that the server certifies the authentication of the published digital content.
- H P second hash value
- the software application comprises execution means configured to perform calculations, on the one hand, of the first hash value (HA) when the digital content has been created and finalized by the creator, and on the other hand, the signature (SA) from the signature key pair (CA) of the software application memory, which is specific to the digital content and related to the user's software application and / or of the creator.
- execution means configured to perform calculations, on the one hand, of the first hash value (HA) when the digital content has been created and finalized by the creator, and on the other hand, the signature (SA) from the signature key pair (CA) of the software application memory, which is specific to the digital content and related to the user's software application and / or of the creator.
- the application includes execution means configured to create if necessary a creator profile not yet registered, by displaying an application for defining and assigning several specific information related to the creator to record and authenticate the creator of the digital content on the server.
- the profile creation is carried out either by instructions contained in the user software application, or by instructions from the server, after a contact with the server by a new creator of content without profile saved on the server.
- the software application includes means for the creator to indicate the completion or incompletion of creating digital content and allowing temporary non-public backup.
- the software application includes execution means for combining several specific information related to the creator to authenticate the creator of the digital content.
- the software application comprises execution means making it possible to chronologically organize the digital contents during the creation of said contents.
- the identifier number generated by the server and received by the application of the user includes at least one information on the filing date and the creator.
- the specific information relating to the creator includes, depending on the degree of reliability sought, one or more confidential information such as name, address, work, leisure, photo ID, identity card or the fingerprint.
- the creation of a digital content is carried out by several creators, so as to obtain several signatures (SA) associated with each of said creators and a unique identifier number (IDNc) associated with the digital content created by said creators .
- SA signatures
- IDNc unique identifier number
- the pair of signing keys comprises a private key and a public key that are generated simultaneously during the creation of the user profile, and saved securely in the application's memories.
- the second message further comprises the published digital content and / or the ID number (IDNp).
- the server includes specific algorithms allowing: identifying the first message saved in the server from the identifier number (IDNp) associated with the second message transmitted by the user software application;
- HA hash values
- IDNA identifier numbers
- the present invention aims to overcome certain disadvantages of the prior art by proposing a new computer server to certify a digital content and its creator and verify the authenticity of the creator of digital content and integrity of digital content published in a computer network.
- the present invention relates to a computer server comprising a program which when executed by a computer system allows at least one of the following actions:
- IDC identifier
- the registration of the creator and / or the content is carried out by a network of blocks of blocks for storing in a memory of a distributed database of the blockchain network, at least a first message comprising digital content created and declared, associated with a first hash value (HA) and a first signature (SA), from a user software application of a computer platform or a computer device according to one of the features of the present invention, interfacing with the server; - the generation by the server of a specific identifier number (IDNc) sent to the creator, after verification by the server of the signature (SA) and the hash value (HA), and secondly, the setting publicly available digital content created and declared on the computer network, only for a creator stored and authenticated on the server in combination with the hash and the identifier number:
- IDNc specific identifier number
- the distributed database server includes an algorithm for generating a timestamp of digital content created and declared; the timestamp and the identification number (IDN) resulting from an encryption, by a server-specific encryption key (Ce), of the digital content transmitted by the software application, are stored in the database in a format of "log" file distributed and immutable in one of the immutable blocks of the block chain.
- IDN identification number
- Ce server-specific encryption key
- the server for each creator (a) registered, includes in its database a space specifically storing at least one hash key (Cha) and / or a signature key (Csa).
- the server includes algorithms for accessing the block (s) containing the digital content created and declared, the first hash value, the first signature and the number identifier, when a creator registers or identifies with the server by its specific identifier (IDC).
- IDRC specific identifier
- the server comprises specific algorithms and at least one decryption key (Cs) specific to the server for decrypting the second encrypted message and a second hash value (Hp) associated with the second message of the published digital content.
- Cs decryption key
- Hp hash value
- the server comprises specific algorithms allowing at least one of the following actions:
- the server comprises algorithms for identifying and authenticating each content creator by at least one of the hash keys, a signature key and / or an identifier number specific to each registered creator, starting from the identifier (IDC) specific to each creator and stored in the database of the server and / or from the ID number (IDNp) associated with the digital content published for all third-party users.
- IDC identifier
- IDNp ID number
- the technology of the blockchain network is of the "authorized”, “private” and publicly accessible type, on the one hand, to allow only the validly identified and authenticated creator to create and declare digital content, and on the other hand, allow any third-party user to verify the authenticity of the digital content It is another object of the present invention to provide an optimized and reliable system for verifying authenticity and integrity that digital content published in a computer network conforms to the digital content originally created by its creator.
- a system for verifying and authenticating digital content published in a computer network conforming to the digital content initially created comprising at least one computer platform or a computing device executing a user software application according to one of the particularities of the invention, communicating and using a computer server according to one of the features of the invention, to create digital content for a creator validly and previously authenticated and identified, and make it publicly available on the computer network and to authenticate each published digital content.
- FIGS. 1a and 1b show a system for verifying and authenticating a digital content published according to an embodiment, respectively, of a first part of the system in which a digital content is created and declared by an identified creator and publicly making said digital content, and a second part of the system in which the published content is authenticated by a third party user.
- FIGS. 2a and 2b schematically represent a system for verifying and authenticating digital content published according to another embodiment, respectively, of a first part of the system in which digital content is created and declared by an identified creator and the public provision of said digital content, and a second part of the system in which the published content is authenticate by a third-party user.
- FIGS. 1 and 2 of the present application concern mainly three groups of objects:
- a user software application (1 a, 1 b) enabling a user creator (a) to create digital content, so as to certify the origin and the originality of the digital content created;
- a computer server (2) capable of communicating with a software application (1a, 1b), for certifying digital content created by an authenticated creator and verifying the authenticity of this digital content published online;
- a system (10) using a user software application (1a, 1b) and a computer server (2) for verifying and authenticating that digital content published in a computer network conforms to the digital content initially created.
- the present invention relates to a software application (1a, 1b) constituting at least one user application intended to be executed on at least one computer platform or a portable computing device for creating digital content and authenticating the digital content published in a computer network.
- the software application is able to manage memories including at least one memory of the computer hardware (software application) memorizing a unique pair of signature keys (CA) associated with each application loaded by a creator, such as a "public" key Cpub and a "private” key Cpri and this "private” key is not accessible from the outside realizes a digital signature (S) of the content.
- the software application contains instructions that when executed by a hardware processor enable communication with a distributed database server to enable the creation of the content and the determination of existence or not (ie ie an absence or an anomaly of a user profile) of the creator on the server.
- the software application is a succession of instruction sequences which, when executed on the computer platform or the computer device, makes it possible to perform in addition at least one of the following functionalities:
- a first hash value (HA) from the created content (for example using a key, preferably a hash key), and a first signature (SA) that can be calculated on the digital content created and the hash generated, then;
- the declaration of the digital content by the application by transmitting to the server a first message containing the content, associated with the first hash value (HA) and a first signature (SA), and secondly, for setting public provision by the server only, on the computer network of the content of the registered and authenticated creator, after verification by the server of the signature (SA) and the hash value (HA), receipt by the application of the creator of a specific identifier number (IDNc) generated by the server (for example in the form of a QRC code which is two-dimensional barcode); - viewing by a third party user from the software application on its digital platform or digital device, the digital content published by the server comprising in addition to the digital content, a hash (Hp) and an identifier (IDNp); verification of the authentication of the published digital content, in which the software application also comprises execution means configured to perform an authentication request, on the one hand, by generating (or calculating) a second value of hashing (Hp) the published content and comparing the similarity between this second value (H
- the server performs a similarity comparison between the stored information of the first message (such as the first hash value HA and / or the IDNc identifier number) and the information from the second message (such as the second value of Hp hash and / or IDNp ID number and / or published digital content).
- the stored information of the first message such as the first hash value HA and / or the IDNc identifier number
- the information from the second message such as the second value of Hp hash and / or IDNp ID number and / or published digital content.
- the declaration of digital content created by a signature (SA) and associated with a (unique and authentic) user profile avoids the reappropriation of a profile / user account and make reliable all digital content created and published from this profile declared.
- SA signature
- the use of a digital signature also has the advantage of requiring a creator to be "serious" (ie to create and publish only digital content with authentic and reliable information / data), in order to that the reputation or notoriety of the creator (name and image associated with the content it will publish) is not hindered.
- the user's software application e.g., the creator or author
- the application makes it possible to sign said hash from a private key Cpri of a pair of signature keys (CA) to obtain a signature (SA) of the content created;
- the created and signed content is prepared by placing the said content in clear and the signature and / or the hash in any container to be sent to the server by a non-secure or secure channel.
- the signed content is published by the server to be received by an application of a computer platform or portable (or mobile) computer device of a third party user (or the creator user) to verify and validate the authenticity of the published content .
- the application includes algorithms allowing:
- the signature is decrypted by the application with the public key C pU b of the pair of signature keys,
- This embodiment describes (not only) an operation or a conventional method of signature by asymmetric encryption and a hash function.
- Other techniques known to those skilled in the art, can be implemented by the application of the present application to achieve a digital signature on a digital content.
- the final digital content i.e., digital content declared and ready to be published on the internet
- an immutable and secure environment for example, in a blockchain network or a secure server with a trusted third party that guarantees the immutability of the information.
- the server certifies the authentication of the published digital content by comparing the at least similarity between the hash values (HA; Hp) and / or the ID number (IDNp) of the published content and the number of the identifier (IDNc) of the created content. In some embodiments, the server may further compare the similarity between the created (original) content and the published content.
- the creation of a digital content is performed by several creators, so as to obtain several signatures (SA) associated with each of said creators and a unique identifier number (IDNc) associated with the digital content created by said creators.
- SA signatures
- IDNc unique identifier number
- authors can participate in the creation of a digital content for which a signature is associated with each of the authors and a single identifier (IDN) is generated by the server which will be specific to the digital content created.
- the software application comprises execution means configured to perform calculations, on the one hand, of the first hash value (HA) when the digital content has been created and finalized by the creator, and on the other hand, the signature (SA) from the signature key pair (CA) of the software application's memory, which is specific to the digital content and related to the software application of the user and / or creator. Hashing the created digital content ensures the integrity of that content. Thus, any modification (voluntary or involuntary) of the content occurring after performing a hash function, changes the hash value initially assigned by the function.
- a comparison of similarity between the hash value initially assigned to the content and the value of hash assigned after content modification can detect and verify any change in digital content and thus provides information on the integrity of digital content.
- the signature of the digital content created being specific to the software application of the user and / or the creator, makes it possible to authenticate the identity of a content creator.
- the private key Cpri and the public key Cpub of the signature key pair (CA) are obtained simultaneously by the user profile of the application, in order to create a unique and specific link between the user name profile and the digital content created. Said keys can be saved in a secure manner (in particular for the private key that is not accessible from the outside, while the public key is shared with the server) in the memories of the application.
- the user creator of the application also has the possibility to save the pair of signature keys since it is generated by the application of the creator (and therefore by the creator himself).
- the creator takes responsibility for the backup (and secrecy or non-disclosure) of the private key, while the public key is shared with the server.
- the backup of the signature key pair at the expense of the creator can be performed by the application or by other means of backup known to those skilled in the art.
- the software application includes execution means configured to create if necessary a creator profile not yet registered, by displaying an application for defining and assigning several specific information related to the creator to record and authenticate the creator of the digital content on the server.
- Creating an unregistered profile allows a new content creator to register as an authenticated creator so that it can create digital content whose integrity can be verified, including by the system of the present application.
- the creator registers and / or identifies himself through the application with an identifier (IDC) and a unique password and specific to the creator that can be stored in the server.
- IDCC identifier
- the application offers the creator to fill out several creator-specific information.
- the user software application includes execution means for combining a plurality of specific creator-related information to authenticate the creator of the digital content.
- the application may include tests to ensure that several specific information related to the creator have been defined and assigned in the profile of each creator, in order to validly identify each creator.
- the specific information related to the creator includes according to the degree of reliability referred one or more confidential information such as name, address, work, leisure, photo ID, identity card or the fingerprint.
- the creator during the creation of his profile fulfills several identification parameters through application identification request windows (or boxes) that can be checked and authenticated, for example by reading. and comparing information from the creator's identity card, fingerprint recognition, facial recognition, or any other means and / or data to authenticate the creator's identity (which may be pre-registered in the server).
- the software application includes execution means for chronologically organizing the digital contents during the creation of said contents.
- the server can take into account a notion of temporality associated with the digital content created (and / or the user profile) that can be saved in its information register (or database). This makes it possible to know, on the one hand, when a digital content has been created and published, and on the other hand, when said content could be modified to be able to check a write state with respect to a given moment (or a date and / or a time stamp).
- the identifier number (IDNp) generated by the server and received by the user's application includes at least one information on the filing date and the creator.
- the generated and published identifier number being unique, it can make it possible to identify information associated with it, such as the date of deposit / publication (for example in a format "hhmmJJMMAAAA” in which "hh” corresponds at one o'clock, “mm” corresponds to one minute, "DD” corresponds to the day, "MM” corresponds to the month and "AA” corresponds to the year) and / or the creator (for example in the format in a format " AUTORNAME “or” NOMAUTEUR "), so as to obtain, for example, an identification in a format” xyzxyzhhmmJJMMAAAAxyzAUTORNAMExyzxyz ".
- the profiling is performed either by instructions contained in the user software application, or by instructions from the server, after a prior contact with the server by a new content creator without profile saved on the server.
- the software application comprises means (for example through computer tests) enabling the creator to indicate the completion or incompleteness of the creation of the digital content. and allow a non-public temporary backup on the application's memories.
- the addition of test allows the application to check and to know if the creator user has finished creating or not the digital content, before certifying and publishing it online.
- the application can continue the execution of the other instruction sequences (including the calculation of the first hash value and the first signature of the content).
- the second message transmitted by the application to the server contains at least one second hash value (Hp) and / or the published digital content, and / or the identifier number (IDNp).
- the third-party user software application is configured to calculate (and / or extract) the second hash value (Hp) associated with the published content. Then, the third-party user software application is configured to transmit to the server the second message comprising at least the second hash value and / or the published content, and / or the identifier number (IDNp) for the server to check and certify the server. authenticity of digital content published online.
- the server includes specific algorithms allowing at least one of the following actions:
- the computer server (2) comprises an algorithm for saving at least one hash table grouping the deposited and sorted hashes in ascending order, as well as updating said table.
- This data structure called “hash table”
- This hash table can be used to compare and verify published digital content without its sources. For example, a digital content comprising a text of fifteen lines is published by "AUTORNAME", then its content is taken from a site that does not give the sources. In this case, the application can cut one of the fifteen lines, then another hash of each line, and ask the server to identify said hashes and check the published digital content, while ignoring the published ID number of that line. content.
- the user software application (1 a) provides at least one browser menu "creation and declaration of authentic content" (example, Figure 1a) allowing one or more creative users (a) to achieve least one of the following features:
- IDNc specific identifier number
- the user software application (1b) provides at least one browser menu "viewing and authentication of content" (example, Figure 2b) allowing one or more third-party users to achieve at least one of the following features:
- the computer platform is a website or a server.
- the portable or mobile computing device is one or more mobile phone, computer, touch pad, etc. and capable of holding or connectable to at least one camera, a playback device, an input device and / or a scanner.
- the portable computing device may have an internet connection and at least one internet browser.
- information exchanges e.g., digital content, instructions, notifications, updates, etc.
- information exchanges e.g., digital content, instructions, notifications, updates, etc.
- the server receives a message over an encrypted network, it includes additional decryption means for decrypting the encrypted message. While, when the server receives a message on a non-encrypted network, it is able to directly read the message to extract (without module or additional step).
- the present invention also relates to a computer server (2) comprising a computer program which, when executed by a computer system, allows at least one of the following actions to be performed: generate messages enabling a user to register (or "logger” or “user register” in English), to create digital content even if the user is not yet registered,
- the server also allows at least one of the following:
- a blockchain network (3) for storing in a memory of a distributed database of the blockchain network at least a first message comprising a digital content created and declared, associated with a first hash value (HA) and a first signature (SA), from a user software application (1 a, 1 b) of a computer platform or a device computer according to one of the features of the present invention, interfacing with the server;
- HA hash value
- SA first signature
- IDNc a specific identifier number sent to the creator, after verification by the server of the signature (SA) and the hash value (HA), and secondly, the setting publicly available digital content created and declared on the computer network, only for a creator stored and authenticated on the server in combination with the hash and the identifier number:
- the final digital content (i.e., digital content declared and ready to be published on the internet) is anchored in an immutable and secure environment.
- said content may to be deposited in a chain of blocks network.
- a network other than the blockchain network may be used, for example a secure server with a trusted third party that guarantees the immutability of the information.
- a block chain technology (or system or network or DLT or blockchain) is adapted to provide several advantages in terms of provenance, certification and traceability. .
- Blockchain (3) is not a typical source system, but rather a distributed type of database (or registry) whose information sent by users and internal links to the database are checked and aggregated at intervals of regular time in blocks and thus forming a chain.
- This blockchain (3) is capable of storing information securely through cryptographic evidence without the need for a central (trusted) instance.
- the blockchain (3) therefore stores the information in block form, which is concatenated into a string and stored in a distributed manner.
- Each block has a reference to the previous block, which allows to cross the entire chain from the last block. Since new blocks can be added at the same time, "ramifications" can appear, and generate several last blocks. Only one string can be valid to guarantee a single last block, and is determined by a consensus protocol.
- Each block includes several transactions, which are secured with asymmetric cryptography.
- Each new transaction can be validated by users or minors, which creates a chain of validated transactions.
- the owner of a current transaction digitally signs a hash value of the new transaction.
- the hash value uses the current transaction and the cryptographic key of the owner of the new transaction as input. It's important to note that the block chain (3) is devoid of state. The transactions stored in a block are the only existing state.
- transaction generally refers to all messages exchanged to ensure the consumption of a service.
- a transaction as for the databases, is either executed in full (successful consumption of the service, with all the related message exchanges), or in failure (no consumption of service).
- hash refers to the value returned by a hash function (or executable code).
- a hash function is any function that can be used to map data of arbitrary size to fixed size data. For example, as shown in the figures, "SHA-256" is a function among other functions that can produce a hash, but many algorithms can be used to produce a hash of starting digital data and / or digital content. .
- An ideal cryptographic hash function has the following four properties:
- Hash table An example of use is a data structure called "hash table", widely used in computer software to quickly search for data.
- Hash functions speed up the lookup in a table or database, for example by detecting duplicate records in a large file.
- They are also useful for cryptography.
- a cryptographic hash function makes it easy to verify that some input data is mapped to a given hash value, but if the input data is unknown, it is deliberately difficult to reconstruct (or otherwise) it by knowing the hash value stored. This is used to guarantee the integrity of the transmitted data.
- the creation of a block capable of storing transactions in the blockchain (3) may consist, for example (as in "Bitcoins"), of finding certain nonce values (random or pseudo-random number to be used a only once) so that the hash value for the transactions to be stored starts with a group of zeros.
- mining This is also referred to as "mining” (Bitcoin); the miner is rewarded with bitcoins for his computation efforts. A new block, if checked by other explorers, is then added to the block chain (3), which serves as storage confirmation for the associated transactions.
- the distributed database server (2) includes an algorithm for generating a timestamp (or "timestamp” in English), preferably without limitation of the "absolute" time or date of the creation of the content, digital content created and declared.
- timestamp or timestamp we define a chronological order of transactions and blocks between them.
- the timestamp and the identifier number (IDN), which can result from an encryption, by a server-specific encryption key (Ce), of the digital content transmitted by the software application, are stored in the database under a a distributed and immutable log file format in one of the immutable blocks of the blockchain.
- the server (2) comprises in its database a specifically storing space (for example, sus form table ) a hash key (Cha), a signature key (Csa) and / or an encryption key (Cca).
- the hash key makes it possible to decrypt the hash value associated with the published digital content
- the signature key makes it possible to calculate (and / or decrypt) the second signature value associated with the published content
- the encryption key enables to encrypt (or encrypt) the digital content created and declared (for example: by a timestamp and an ID number).
- the server may further comprise a decryption key, when the received messages are encrypted.
- the server includes algorithms for identifying and authenticating each content creator by at least one of the hash keys, a signature key, and / or an identifier number specific to each registered creator, from the identifier (IDC) specific to each creator and stored in the database of the server and / or from the ID number (IDNp) associated with the digital content published for all third-party users.
- the server is configured to access the memory space storing the first hash value, the first signature value and / or the ID number (IDNc) of the digital content created from the profile.
- user of each creator including the registration or authenticated identification of the creator by its specific identifier (IDC)
- ID number (IDNp) transmitted by the third party (which is extracted from the second message of the published content).
- the server includes algorithms for accessing the block (s) containing the created and declared digital content of the network of the blockchain, the first hash value (HA), the first signature (SA) and ID Number (IDN), when a creator registers or identifies with the server by its specific IDC.
- the server identifies and authenticates each creator by its specific identifier (IDC) (and its account opening password or creator profile), to allow transactions between the user software application of the creator and the server computer.
- IDC specific identifier
- This configuration makes it possible to control the certification of the identity of each creator of content and the origin of each digital content deposited on the server.
- the server accesses only the digital content of a creator identified and stored in the server.
- the server includes specific algorithms and at least one server specific decryption key (Cs) for decrypting the second encrypted message and the second hash value (Hs) associated with the published digital content.
- Cs server specific decryption key
- the server is configured to verify the authenticity and integrity of the published content from the hash values (HA ; Hs) and the ID number (IDNp).
- the server includes specific algorithms for:
- the server is configured to search in its database for the stored identifier number (IDNc) similar to and / or corresponding to the identifier number (IDNp) received by the second message (whether or not containing the IDNc ID number).
- IDNc the stored identifier number
- the server can identify the first hash value (HA) and the first signature (SA ) available in the server memories and associated with the ID number (IDNc) and thus the original digital content.
- the server After verification, the server notifies the third-party user application by two types of authentication notifications: either an approval that the published digital content complies with the digital content created and declared and therefore original, when the identifier numbers (INDc; IDNp ) and / or the hash values (HA ; HP) are similar to each other; a denial that the published digital content does not conform to the original digital content, when the identifier numbers (INDc; IDNp) and / or the hash values (HA ; Hs) are not similar to each other. (NK: I do not understand these two signatures ).
- the server-specific algorithms allow, on the one hand, to validate the integrity of the published digital content when the hash values (HA ; Hp) are similar, and on the other hand, to validate the authenticity of the creator of the published digital content when the signature values (HA ; HP) are similar.
- the verification of the authentication by comparison of the hash values (HA ; HP) and / or the identification numbers (INDc; IDNp) can be carried out in the form of testing by one or more server algorithms.
- the blockchain network technology is of the "authorized”, “private” and publicly accessible type to, on the one hand, only allow the validly identified and authenticated creator to create and declare digital content, and on the other hand, allow any third-party user to verify the authenticity of the digital content. This configuration protects the falsification of the created digital content and / or the identity of the content creator.
- the server may include a separate blockchain network, which authorizes and uses only by creator users to create their profile and digital contents, of a second blockchain network, which allows and is used by third-party users to check the published content online, but these two blockchain networks are interrelated.
- the validated repositories of digital content in blocks of the blockchain can be realized either by a distributed mining module to automate the validation of the recording of the source content by its creator in the chain. blocks of the platform, either by the content custodian itself. In the latter case, each custodian (or depository creator) is in charge of creating its own content and profile record and the block string verifies that the deposit format is correct, for example by assigning a new record identifier.
- the computer server (2) performs at least one of the following operations:
- the present application also relates to a system (10) for verifying and authenticating digital content published in a computer network conforming to the digital content initially created, the system comprising at least one computer platform or a computing device executing a user software application. according to one of the embodiments of the invention, communicating and using a computer server according to one of the embodiments of the invention, to create digital content for a validly authenticated and identified creator, and make it publicly available on the network computer and to authenticate each published digital content.
- the system (10) of the present invention has the advantage that only "authenticated and declared" creator users (or authors) can benefit from a guarantee of controlled origin proof of the digital content, and its integrity.
- This system also has the advantage of effectively managing in real time the "e-Reputation" (or online reputation of a person (individual) or entity (brand)) of each content creator, by providing secure and reliable authentication of the identity of each content creator and by preventing the system (or blockchain network) from being polluted by falsified and erroneous contents.
- modules may be implemented by electronic circuit, such as an integrated circuit for example or by other types of arrangement of components, such as for example semiconductors, logic gates, transistors or other discrete components.
- Such modules can also be implemented by one or more software application (s) or executable code portion (s) within at least one software environment, for execution by various types of software. processors and this, whatever the language used.
- An identified module may, for example, include one or more physical or logical blocks of machine instructions that may, for example, be organized into an object, process, or function.
- routines and instructions of an identified module do not need to be physically located together, but may include disparate instructions stored in different locations that, when functionally and logically joined together, form the module and perform the task. purpose indicated for the module.
- a module may be a simple executable code instruction, or a plurality of instructions, and may even be distributed among several different code segments or among different programs and stored in several memory blocks.
- operational data can be identified and illustrated in modules, and can be incorporated into any suitable form and organized into any suitable type of data structure. The operational data may be collected or may be spread over different locations including different finished storage devices, and may exist, at least partially, simply as electronic signals on a system or network.
- system means here any type of terminal or device arranged to perform the functions described with reference to the modules.
- the system comprises data processing means for performing these functions described and may therefore include specific circuits performing these functions or generally comprise computer resources for performing the instructions described above.
- a mode or an alternative embodiment means that a device, or a module, or a structure, or a particular feature described is included in at least one embodiment of the present invention and that the different examples do not necessarily relate to the same embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1854828A FR3082023B1 (fr) | 2018-06-04 | 2018-06-04 | Une application logicielle et un serveur informatique pour authentifier l’identite d’un createur de contenu numerique et l’integrite du contenu du createur publie |
PCT/EP2019/064352 WO2019233951A1 (fr) | 2018-06-04 | 2019-06-03 | Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publié |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3803670A1 true EP3803670A1 (fr) | 2021-04-14 |
Family
ID=65031230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19730283.9A Pending EP3803670A1 (fr) | 2018-06-04 | 2019-06-03 | Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publié |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3803670A1 (fr) |
FR (1) | FR3082023B1 (fr) |
WO (1) | WO2019233951A1 (fr) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11348099B2 (en) | 2018-07-01 | 2022-05-31 | Artema Labs, Inc. | Systems and methods for implementing blockchain-based content engagement platforms utilizing media wallets |
US11582044B2 (en) * | 2019-06-17 | 2023-02-14 | Mahboud Zabetian | Systems and methods to timestamp and authenticate digital documents using a secure ledger |
CN111625780B (zh) * | 2020-01-15 | 2023-04-18 | 支付宝(杭州)信息技术有限公司 | 一种基于区块链的音频作品授权方法、装置及设备 |
CN112347456B (zh) * | 2020-10-28 | 2023-09-01 | 达闼机器人股份有限公司 | 程序验证方法和装置、平台和用户终端及在线服务系统 |
CN112685795B (zh) * | 2020-12-31 | 2023-09-05 | 树根互联股份有限公司 | 数字存证创建方法、数字存证验证方法和数字存证系统 |
US11822701B2 (en) * | 2021-04-09 | 2023-11-21 | VIQ Solutions Inc. | Securing and managing offline digital evidence with a smart data lease system |
CN114338174B (zh) * | 2021-12-30 | 2023-06-23 | 李秦豫 | 一种网络传输方法 |
CN114866260B (zh) * | 2022-07-05 | 2022-10-28 | 杭州天谷信息科技有限公司 | 一种变色龙哈希分布式身份使用方法和系统 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5638446A (en) * | 1995-08-28 | 1997-06-10 | Bell Communications Research, Inc. | Method for the secure distribution of electronic files in a distributed environment |
JP2001282619A (ja) | 2000-03-30 | 2001-10-12 | Hitachi Ltd | コンテンツ改竄検知方法及びその実施装置並びにその処理プログラムを記録した記録媒体 |
US9553982B2 (en) * | 2013-07-06 | 2017-01-24 | Newvoicemedia, Ltd. | System and methods for tamper proof interaction recording and timestamping |
US20160283920A1 (en) | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
KR101723405B1 (ko) | 2016-07-04 | 2017-04-06 | 주식회사 코인플러그 | 블록체인을 기반으로 하는 공인인증서 인증시스템과 이를 이용한 블록체인을 기반으로 하는 공인인증서 인증방법 |
CN107077557B (zh) * | 2016-12-29 | 2020-07-31 | 深圳前海达闼云端智能科技有限公司 | 软件应用程序发布和验证的方法及装置 |
US9870508B1 (en) | 2017-06-01 | 2018-01-16 | Unveiled Labs, Inc. | Securely authenticating a recording file from initial collection through post-production and distribution |
-
2018
- 2018-06-04 FR FR1854828A patent/FR3082023B1/fr active Active
-
2019
- 2019-06-03 WO PCT/EP2019/064352 patent/WO2019233951A1/fr unknown
- 2019-06-03 EP EP19730283.9A patent/EP3803670A1/fr active Pending
Also Published As
Publication number | Publication date |
---|---|
FR3082023B1 (fr) | 2022-05-27 |
WO2019233951A1 (fr) | 2019-12-12 |
FR3082023A1 (fr) | 2019-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11799668B2 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
EP3803670A1 (fr) | Une application logicielle et un serveur informatique pour authentifier l'identité d'un créateur de contenu numérique et l'intégrité du contenu du créateur publié | |
EP3590223B1 (fr) | Procédé et dispositif pour mémoriser et partager des données intégrés | |
TWI714843B (zh) | 用於具有分散式共識之分散式系統中之契約資料之存取控制方法及其契約產生器及驗證伺服器 | |
JP6756817B2 (ja) | 非集中型のタイトル記録および認証のためのシステムならびに方法 | |
WO2018145127A1 (fr) | Procédés et systèmes de vérification d'une identification électronique avec stockage d'enregistrements de certification sur une chaîne latérale | |
JP2020511017A (ja) | ブロックチェーンベースのデジタル証明書を実装するためのシステム及び方法 | |
JP2020511018A (ja) | デジタル・マークを生成するためのシステム及び方法 | |
FR2930390A1 (fr) | Procede de diffusion securisee de donnees numeriques vers un tiers autorise. | |
EP3543891B1 (fr) | Procédé mis en oeuvre par ordinateur et système de suivi du cycle de vie de documents certifiés et ses programmes informatiques | |
CA2969495C (fr) | Procede mis en oeuvre dans un document d'identite et document d'identite associe | |
EP2619941A1 (fr) | Procede, serveur et systeme d'authentification d'une personne | |
FR2930391A1 (fr) | Terminal d'authentification d'un utilisateur. | |
CN113315745A (zh) | 一种数据处理方法、装置、设备及介质 | |
CN113421100A (zh) | 物品信息记录、流转、鉴别发起及服务方法、终端和系统 | |
FR2980011A1 (fr) | Procede de mise en oeuvre, a partir d'un terminal, de donnees cryptographiques d'un utilisateur stockee dans une base de donnees distante | |
EP2954449B1 (fr) | Authentification de signature manuscrite numérisée | |
WO2007085726A1 (fr) | Certification avec autorite de certification distribuee | |
FR3073111A1 (fr) | Procede et dispositif pour memoriser et partager des donnees integres | |
USRE49968E1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
US20240171393A1 (en) | Method to validate ownership and authentication of a digital asset | |
TW201342869A (zh) | 數位內容雲存儲與存證方法 | |
CH719096A1 (fr) | Système et procédé pour fournir un jeton non-fongible durablement authentifiable | |
FR2898423A1 (fr) | Procede securise de configuration d'un dispositif de generation de signature electronique. | |
WO2023083449A1 (fr) | Établissement de canaux de communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20201229 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20230406 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230527 |