摘要 |
A method of protecting a digital object ( 111 ) against unauthorized tampering, comprising computing a digital signature over the contents of the digital object ( 111 ), creating a summary of the computed digital signature, and embedding the summary in the digital object ( 111 ). The authenticity of the thusly protected digital object ( 111 ) can be verified by extracting the embedded summary from the digital object ( 111 ), computing a digital signature over the contents of the digital object ( 111 ), creating a summary of the computed digital signature, and matching the extracted summary and the created summary, whereby the digital object ( 111 ) is verified as authentic if the matching is successful. Also devices and computer programs for implementing the protecting and verification methods. |