PROCEDURE FOR THE SAFE ANNOUNCEMENT DURING THE TRANSMISSION OF DATA OR FILES BETWEEN PARTICIPANTS

15-08-2003 дата публикации
Номер:
AT0000245876T
Автор: SCHMID KURT, SCHMID, KURT
Принадлежит:
Контакты:
Номер заявки: 64-55-9711
Дата заявки: 08-09-1997

[1]

METHOD FOR THE SECURE DISPLAY DURING TRANSMISSION OF DATA OR DATA FILES BETWBEH USERS BACKGROUHD OF THE INVENTION 1. Field of the Invention The invention relates to a method for the safe display during transfer of data or data files between participants, users, and/or subscribers. 2. Brief Description of the Background of thç Invention Including Prior Art Sensitive data, data sources, and data filas are present in the most varied fields of application in data processing. These application fields can include data and/or data sources fro» data bases, display information, online information, multi-media applications, online transactions and similar programs for the data processing in object code or source code or any other sensitive data. The invention described in detail in the following is not limited to any specific type of data or data file. It has been known for quite some time to encode data, or data sources or data files having a sensitive contenti It is assured with different known encoding methods, having differing quality levels, that unauthorized third parties cannot understand such data, data sources or data files! Additional different security requirements are imposed on the transmission daring the transmission of seneitive data or data files depending on the type of the sensitive data or data files. It can be important a) vt.hat the allocation by the electronic "signature" is conclusive between an object, i.e. data source or data file or data item, and a subject, i.e. person and/or computer; b) that it is assured that the sent data and/or data sources files are consistent with and match the data and/or data files which have been received as to its content up to the last bit, in other words unchanged, and/or c) that it is assured during the transmission of two data files, two data items, or one data file and one data item, which have in each case a defined relationship between each other, that this relationship remains present in its unchanged form also after the transmission. Such a connection would for example be an electronic signature to a data file of a data time. In this case it has to be assured during the transmission that the electronic signature is placed "under" those data and/or data files, which are to carry the electronic signature according to the opinion of the -signatory", i.e. that not totally different data and/or data files are provided with this electronic signature, and/or d) that the applied method for identifying sensitive data, data sources and/or files was not changed within the framework of the execution of the method, i.e. that the sender and the receiver operate with the identical method such that it is assured that sensitive data sources and data files are not changed by a change of the method in an undesired way and/or e) that it is assured that the data source or data file content, such as it is presented to the viewer on the screen, is identical in its contents to the actual data source or data file, i.e. that hidden data file contents or data, not ahown on the screen, as well as hidden connections to one or more other data sources or data files are missing such that the actual data source and or data file content, under consideration of all connections, is larger or different than that, which is presented to the viewer on the screen. The usual operating systems make available the size of a data file expressed in bytes as information relating to the size of the data file or of the data. Two identical data files or identical data therefore have to exhibit the same number of bytes. Vice versa, however, the same number of bytes does not necessarily mean an identity of two data sources, data files or of two data sets. For these reasons, methods have been developed in order to be able to determine with a high degree of probability the identity of data sources and of data files or of data based on quantitative criteria. The most widely used methods in this context are check sum procedures. The quality of such methods varies over a wide range. For example, methods are known, wherein only the blocks, occupied on the concrete data carrier for a concrete data source or data file, are counted and their sums are employed as a comparison number and reference value. This test procedure contains of course no indications relating to the contents of the data blocks, it is even ambiguous if each block has been conpletely defined, read, or recorded. Small deviations relative to the length of the data set or data file, as long as the total number of blocks is not changed by these deviations, are not recognized by such test procedures. Better check sum procedures are among others the cyclic redundancy check (CRC). - The probably most widely used such methods are the haeh functions. Cryptographic méthode can asauro with highest «ecurity the identity of data sources and of data by the generation of electronic seals in contrast to the mere error recognition in the check sum procedure. Electronic seals can be generated in the following way: 1. According to methods, such as for example the message authentication code (MAC), the electronic seals are directly generated or verified from data sets, data sources or data files by talcing into consideration a code key. 2. The electronic seal can be generated based on the mechanism of a hash code and an electronic signature as follows: a. Generation of a cryptographic check sunt from the respective data set, data sources and/or data files, for example through a hash function. Contents and not fixed blocks are tested with the hash functions. The freedom of collision is the most important requirement to a hash function. It is required in this context that it should not be possible after a malicious change of a data source or data file to obtain the sajne hash value as was present prior to the manipulation. Vice versa, no document can be generated to a predetermined hash value, which document would generate this hash value. b. Calculation of the electronic signature with the secret key of a generator and in connection with the data set, the data sources and/or the data files or their haeh code. "However, it is a disadvantage of this method, that it cannot be guaranteed that the thus electronically signed data sets, data sources and/or data files have not already been changed in any way. It is for example conceivable that a participant, a user, or a subscriber electronically signs data or data sources or data files without recognizing that these contain also additional undesired data, or that the participant, user, or subscriber signs, unbeknownst to the participant, user, or subscriber, only a part of the data set or data sources or data files. SUMMARY OF THE INVBHTION 1. Purpoaes of the Invenfrinp It is an object of the present invention to furnish a method, which assures that only uniquely identified or uniquely undisturbed data sets, data sources and/or data files are furnished with an electronic signature. These and other objects and advantages of the present invention will become evident from the description which follows. 2. Brief Description of the Invention The invention employé the following method steps. The data seta, data sources and/or data files are entered, captured, and recorded another time as a. graphical image. A defined transformation process generates a graphical image from the original form of the data set, data sources and/or data files in this process. If the original form of the data source or data file is for example a text data file, then the text data file ia recorded as ASCII- similar data and/or data files (plus any control characters) according to the syntax of the employed text processing program. The data file can then be displayed or printed in this output form, in connection with corresponding graphic drivers or printer drivers, on the screen and at the printer. The areas, not used for displaying or printing out on the screen or on a printout, are not furnished in the data files in question. In contrast, the original form of the data and/or data files is not seen as textual material but instead as an image in the preceding graphic image, which can be generated for example through a vector graphic procedure. Each - 8 individual point or dot of a character and each individual point or dot of a non-r«corded area is defined as a graphic element and captured in this way. Consequently, only those elements are entered and recorded which are visible on the screen, such that hidden elements such as control characters, macros and the like, as they occur for example in text data files, do not become part of the graphic data file. A data set or data file can be thereby changed such that the size of the data set or of the data file remains unchanged. Changes can thus not be determined based only on the size of the date or of the data file. However, such changea generate a different representation on the screen or on the printer. Thus, they are visible and generate thereby a different image. According to a further step, in each CM# ft unique value is determined and recorded, for example the corresponding hash value, both for the original form of the data and/or data files as well as for their graphic image through a check sum procedure, which can for example be a hash method. The respective hash values are referred to in the following as the first electronic seal (from the original form of the data and/or data files, and a second electronic seal (from the iœag* of the data and/or data files). According ta a third step, the original form of the data set and/or data files and their image, together with the two electronic seals, are transmitted to the receiver. It is apparent that also the original form of the data and/or data files or their image can be encoded for the transmission if this should be required. According to a further step, the receiver generates with the same transformation process also an image of the data file from the original form of the data and/or data file, transmitted to him and possibly decoded again. According to a further step, a third electronic seal is generated from this image of the data and/or data file according to the same method. If the image of the original form of the data and/or data files, generated by the receiver, is identical to the image of the original form of the data file, generated by the sender, then the electronic seals, generated by the receiver with the same transformation process, must also be identical to that seal, which was transmitted to the receiver together with the data file. A deviation of these two electronic seals means that the image, generated by the receiver according to the same transformation process, is not identical with that seal, which was generated by the emitter or sender. The consequence is that also the received original form of the data file has to be changed. This holds even where the clear data file size value and/or the image of the sent original form and/or of the received original form of the data file are identical. A complex transformation process can also comprise several parts. According to the present invention, individual seals can be generated for such parts and can be employed according to the present invention as are the previously described seals. In addition, seals can also be generated to suitable components of the system environment, for example relative to running processes. The more seals that are generated according to the present invention and are employed, the more secure is the procedure. The novel features which are considered as characteristic for the invention are set forth in the appended claims. The invention itself, however, both aa to its construction and its method of operation, together with additional objects and advantages thereof, will be best understood from the following description of specific embodiments when read in connection with the accompanying drawing. BRIEF DESCRIPTION OF THE DRAWING in the accompanying drawing, in which are shown several ot the various possible embodiments of the present invention: Fig. 1 is a view of a schematic diagram illustrating the method of the present invention. DESCRIPTION OF INVENTION AND PREFERRED EMBODIMENT The user has a first original form 01 of a data set or of a data file. For this purpose, the user generates a first electronic seal SI. The user generates a first graphic Image Al of th* first original for» Ul of the data in question or of the data file in question based on a first transformation process Tl. According to a further process step, a corresponding second electronic seal S2 is generated by the user from the first image Al, This second electronic seal S2 is connected to the first original form Ul in a suitable way, for example, it is attached by the user. The thus formed data packet is then transmitted to the desired receiver. The receiver can generate from the original form Ul', having been received at the receiver, again a second image Al' baaed on the same transformation process Tl'. In the following, the rscaiver generates anew a corresponding third seal S2' based on the eame process. If the original form Ul', received at the receiver, is identical to that of the firat original form Ul, which was sent out, then also the in each case generated seals SI and SI', or, respectively, S2 and S2' have to be identical. Each deviation would be a proof for a deviation between the first original form Ul, to be sent, and the received original form Ul'. In order to increase further the security of the method, a fourth seal S3 can be generated also by the transformation process Tl, and the fourth signal S3 can be transmitted together with the first original form Ul to the receiver. It is apparent that also the first original form Ul, the corresponding seals SI, S2, and/or S3 can be transmitted separately to the receiver according to the present invention. It will be understood that each of the elements described above, or two or more together, may also find a useful application in other methods for the secure transmission of data files differing from the types described above. - 13 While the invention ha» bean illustrated and described as embodied in the context of a method for the safe display during transfer of data or data files between users, it is not intended to be limited to the details shovn, since various modifications and structural changes may be made without departing in any way from the spirit of the preaent invention. Without further analysis, the foregoing will ao fully reveal the gxst of the present invention that othera can, by applying current knowledge, readily adapt it for various applications without omitting featured that, from the standpoint of prior art, fairly constitute essential characteristics of the generic or specific aspects of this invention. What is claimed as new and desired to be protected by Letters Patent is set forth in the appended claims. PROPERTY OR PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS 1. A method for the secure transmission of data or data files between participants, subscribersy and users, wherein a first graphic image (AX) of a first original form (Ul) ie generated from the first original form (Ul) of the data file or of tHe data by a first transformation process (Tl); wherein a second electronic seal (S2) is generated from the first graphic image (Al) in a second step; wherein the first original form (Ul) of the data file or of the data and the second electronic seal (SI) of the first graphic image (Ai) are transmitted to a receiver; wherein the receiver generates a second graphic image (Al') of the original form (Ul') received at the receiver with the same transformation process (Tl'); wherein the.receiver generates a fourth electronic seal (S2') from the second graphic image (Al'), generated by the receiver, based on the second transformation process (Tl'); and wherein the transmitted second is seal (S2) and the newly generated fourth electronic seal (S2') are compared relative to each other with respect to identity. 2. The method according to claim I, wherein a first electronic seal (51) is the generated from the first



[2]

The method involves forming a first graphical image (A1) of the first block (U1) of data by a first transformation process (T1). A second electronic seal (S2) is generated from the first image and transferred with the first image to a receiver. The receiver generates a second image (A1') of the first block using the same transformation process (T1') and generates a fourth electronic seal (S2') from the second graphical image, generated by itself using a second transformation process. The transmitted and newly generated second and fourth seals (S2,S2') are finally compared.



Process for authorizing data or data files designated for transmission by the sender as well as for identifying and verifying the integrity of the data and data files received by the recipient, characterized in that

an original form (U1) of a data file or data is displayed at the sender's end as a graphic illustration (A1) of the said original form (U1) by means of a transformation process;

a seal (S2) is generated from the graphic illustration (A1) by means of a given process;

the original form (U1) of the data or data files and the electronic seal (S2) is transmitted to the recipient;

then by the recipient;

the recipient - in a further stage - generates a second graphic illustration (A1') of the original form (U1') as received by the recipient, applying the same transformation process (T1');

a derived second electronic seal (S2') is generated from the second graphic illustration (A1') by means of the same process that has been applied by the sender;

the electronic seal (S2) of the second graphic illustration (A1') transmitted by the sender and the second derived electronic seal (S2') of the second graphic illustration (A1') of the data generated by the recipient are checked for identity.

Process according to Claim 1, characterized in that

an additional electronic seal (S1) is computed from the original form (U1) of the data file or data by means of a given process;

a derived electronic seal (S1') is generated from the original form (U1) of the data or data files by the recipient by means of the same process that has been applied by the sender;

the said derived seal (S1') is compared with the additional electronic seal (S1) that has been generated and transmitted by the sender from the original form (U1) of the data or data files.

Process according to Claim 1 or 2, characterized in that the original form (U1) of the data or data files exists in electronic form and the graphic illustration (A1) is transmitted and visibly displayed to the sender.

Process according to one of the claims 1 to 3, characterized in that the derived second illustration (A1') of the data or data files that have been generated by the recipient is visibly displayed to the recipient.