Patent number 8782431 is assigned to Mach 1
The following quote was obtained by the news editors from the background information supplied by the inventors: "Extensible Markup Language 'XML' is a flexible way to generate common, easily-exchanged information formats and share both the format and the data on the World Wide Web, internal networks, and elsewhere. XML is similar to hypertext markup language (HTML). Both XML and HTML include markup tags to describe a file or page's contents. HTML describes the content in terms of how the content is displayed while XML structures, stores, and transports information. Thus, an XML file can be processed purely as data by a program. Alternately, the XML file can be displayed or stored.
"While HTML uses predefined tags, XML permits a developer of an XML document or fragment to define tags. Almost any data item can be identified using a XML tag. The standard method to allow an XML document to be created, accessed, or modified is with a document object model (DOM). A standardized specification has been developed that defines the interfaces for the different objects comprising the DOM, but does not provide any specifics for how a DOM should be implemented. Therefore, a programming language that utilizes a DOM compliant with the standard will produce an instance of that DOM that is language-neutral and platform-independent, regardless of how the underlying language implements the model.
"Therefore, there is a need for a security process and system capable of discreetly marking files, marking files with authenticity data, efficiently searching for instances of the marked files internally and externally, and determining file alterations/modifications/actions."
In addition to the background information obtained for this patent, VerticalNews journalists also obtained the inventors' summary information for this patent: "The present invention is directed to a steganographic digital data security process and system for authenticating files composed of markup language. The digital data security process includes accessing a markup language document object model that includes markup language format schema related to a particular digital file desired to be utilized by the present invention. Authenticity data is generated in the form of a cryptographic token with an identity marker. The digital file is reviewed to determine the markup language tag arrangement of which the digital file is constituted. The cryptographic token is placed within at least one of the markup language tags in a manner that prevents the cryptographic token from being recognized as markup language instructions according to the document object model. The resulting marked digital file carries within its markup language tags authenticity data relating to such information as is desired by a user to be associated with the digital file.
"The marked digital file, because the interior authenticity data that identifies it is inert within the markup language tag(s), behaves exactly as an unaltered digital file. The marked digital file may undergo all of the processes of a similar digital file. The marked digital file will carry within its contents the identity marker and encrypted authenticity data; thus, a user may scour a suspect digital file or suspect set of digital files to find the marked digital file, which may be located or identified on the basis of the identity marker. When the identity marker is located within the marked digital file it may be culled from a larger file set for further review. A user may scour digital files and digital file sets in multiple fashions, transmission scouring, dynamic external scouring, dynamic internal scouring, or manual scouring. Upon identifying a file as pertaining to a desired source, a user may provide a key that decrypts the marked file to expose in plain text the authenticity data within the cryptographic identity token.
"The digital data security system includes the markup language document object model, a cryptographic token generator, a markup language mapping function, a cryptographic token embedding function, a scouring agent, a persistent data storage facility, and a data retriever. The markup language document object model includes a listing of schema corresponding to one or more file formats. The cryptographic token generator is supplied with authenticity data including identity attribution elements to produce a cryptographic token with an identity marker that points to the containing encrypted authenticity data. The markup language mapping function reviews a digital file to determine the markup language tag arrangement of the file. The cryptographic token embedding function positions the cryptographic token inertly within a markup language tag that corresponds to sets of text, corresponding to grammatical or other stylistic text arrangements, and is purposefully imitative of markup language recognized as functional by the document object model corresponding to the digital file. The resulting output is a marked digital file.
"The marked digital file of the present invention includes at least one cryptographic token of the present invention embedded inertly within the markup language of the contents of a digital file. The marked digital file may be created by the process of the present invention directly or indirectly. The system and process of the present invention are means of directly creating a marked digital file. A marked digital file may be indirectly created when a user copies a textual portion of a marked digital file. As a copier of the marked digital file may not copy a rendered subcomponent of the marked digital file without also copying the markup language related to the copied portion, a new document derived from the marked digital file also includes the authenticity data of the original marked digital file. The present invention permits tracking of a document derived from marked digital files as well marked digital files.
"The system and process further include scouring markup language tags within a file for an identity marker; scouring a database of multiple external files composed of extensible markup language for an identity marker; scouring a transmission of multiple files composed of extensible markup language for an identity marker; and scouring a database of multiple internal files composed of extensible markup language for internal files lacking an identity marker. The present invention further includes a file created according to the process and subprocesses herein or utilized by the system and components thereof. Instructions may be provided to systems and software manipulating an editable document with a cryptographic token with particular authenticity data.
"These aspects of the invention are not meant to be exclusive. Furthermore, some features may apply to certain versions of the invention, but not others. Other features, aspects, and advantages of the present invention will be readily apparent to those of ordinary skill in the art when read in conjunction with the following description, and accompanying drawings."
URL and more information on this patent, see:
Keywords for this news article include: Information Technology, Information and Cryptography, Information and Data Security, Mach 1 Development, Mach 1
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- Study: Recessions Can Postpone Motherhood Forever
- Tim Cook Has Proved That Apple is His Baby
- Hispanic Entrepreneurs Short-changed in Texas
- China Approves iPhone 6 After Security Assurances
- Meet the YouTube Tech Review Sensation
- U.S. Home Prices Rose at Slowest Pace in 20 Months
- Who Is Daniel Ivascyn?
- Netflix Eyes Hollywood With Feature Film
- Hispanics Carry Big Clout: Census
- Washington's 'The Equalizer' Debuts With $35 Million