Time Stamp Patents (Class 713/178)
-
Patent number: 6931537Abstract: In a time stamping system formed by a client device and a server device, the client device includes a digest generation unit for generating a plurality of digests for a plurality of digital documents, a digest combining unit for combining the plurality of digests generated by the digest generation unit, a unified digest generation unit for generating a unified digest from the plurality of digests as combined by the digest combining unit, a transmission unit for transmitting a time stamping request containing the unified digest generated by the unified digest generation unit, to the server device, and a reception unit for receiving a time stamp token for the plurality of digital documents from the server device. The server device generates the time stamp token containing a time stamped digital document obtained by combining the unified digest and a time information acquired in response to the time stamping request, and a digital signature for the time stamped digital document.Type: GrantFiled: September 1, 2000Date of Patent: August 16, 2005Assignee: Nippon Telegraph & Telephone CorporationInventors: Akira Takura, Satoshi Ono
-
Patent number: 6915423Abstract: A method of providing a time stamping service for setting a client's system clock, wherein the client's system clock can be set to reliable standard time. Whether the client's system clock has been accurately set is one of the preconditions for the smooth provision of a public key infrastructure-based security service. A service provider providing the public key infrastructure-based security service safely receives reference time information from an objectively reliable third-party system, sets the client's system clock on the basis of the received reference time information and provides the security service on the basis of the set client's system clock. Therefore, the service provider can smoothly provide the security service while assuring the accuracy and reliability of the client's system clock. Further, the smooth provision of the security service can reduce the number of petitions from clients to the security service, thereby increasing the quality of the security service.Type: GrantFiled: January 30, 2001Date of Patent: July 5, 2005Assignee: Korea TelecomInventors: Young Sook Lim, Kyung Hee Kang, Seung Jae Lee
-
Patent number: 6912637Abstract: The present invention is related to a method and apparatus for managing memory in a network switch, wherein the memory includes the steps of providing a memory, wherein the memory includes a plurality of memory locations configured to store data therein and providing a memory address pool having a plurality of available memory addresses arranged therein, wherein each of the plurality of memory addresses corresponds to a specific memory location. The method further includes the steps of providing a memory address pointer, wherein the memory address pointer indicates a next available memory address in the memory address pool, and reading available memory addresses from the memory address pool using a last in first out operation. The method also includes writing released memory addresses into the memory address pool, adjusting a position of the memory address pointer upon a read or a write operation from the memory address pool.Type: GrantFiled: June 23, 2000Date of Patent: June 28, 2005Assignee: Broadcom CorporationInventor: Joseph Herbst
-
Patent number: 6910129Abstract: A method, an apparatus, and a computer program product for remote authentication are disclosed. The methods are based on exchanging of signals representing remote party's biometrics information (such as acoustic waveforms) and have application in secure telephony or video-conferencing communications over open networks. The apparatus includes a speech encoding/decoding module (632), a control module (636), an encryption/decryption module (640), a key generator (650), a Diffie Hellman key exchange system (660), a timer module (670) for measuring time between a challenged statement and a corresponding response statement, an input/output (I/O) module (680) for transmitting and receiving data via a communications channel 610.Type: GrantFiled: March 3, 2000Date of Patent: June 21, 2005Assignee: Kent Ridge Digital LabsInventors: Robert Huijie Deng, Feng Bao, Yongdong Wu
-
Patent number: 6898709Abstract: A personal computer (PC) system and methods for proving dates of digital data files, which are accessed, created, modified, received, or transmitted by the PC includes a trusted time source in a tamperproof environment, a first subsystem for saving the file at a moment in time, a second subsystem for retrieving from the trusted time source a date and a time corresponding to the moment in time, a third subsystem for appending the date and the time retrieved from the trusted time source to the saved file, a fourth subsystem for signing the saved file with the date and the time retrieved from the trusted time source appended thereto, a fifth subsystem means for hashing the signed file to produce a digest, a sixth subsystem for signing the digest with a key to produce a certificate, a seventh subsystem for appending the certificate to the saved file, and an eighth subsystem for saving the file with the certificate appended thereto.Type: GrantFiled: October 28, 1999Date of Patent: May 24, 2005Assignee: Time Certain LLCInventor: Steven W. Teppler
-
Patent number: 6895507Abstract: A system and methods for proving dates of digital data files, which are accessed, created, modified, received, or transmitted by a computer includes a trusted time source in a tamperproof environment, a first subsystem for saving the file at a moment in time, a second subsystem for retrieving from the trusted time source a date and a time corresponding to the moment in time, a third subsystem for appending the date and the time retrieved from the trusted time source to the saved file, a fourth subsystem for signing the saved file with the date and the time retrieved from the trusted time source appended thereto, a fifth subsystem for hashing the signed file to produce a digest, a sixth subsystem for signing the digest with a key to produce a certificate, a seventh subsystem for appending the certificate to the saved file, and an eighth subsystem for saving the file with the certificate appended thereto.Type: GrantFiled: July 3, 2000Date of Patent: May 17, 2005Assignee: Time Certain, LLCInventor: Steven W. Teppler
-
Patent number: 6886102Abstract: A system and method are disclosed for determining whether a sender seeking to send a message to a receiving computer system via a network is an authorized sender. A request to communicate is received from the sender. A number N1 is selected. A hash value for the number N1 is calculated. The hash value is sent to the sender.Type: GrantFiled: July 14, 2000Date of Patent: April 26, 2005Assignee: Symantec CorporationInventor: Michael P. Lyle
-
Patent number: 6874089Abstract: A system, method and computer program product for guaranteeing a data transaction over a network are disclosed. When a data transaction between at least a server and a client is detected on a network, data transmitted via the network between the server and client during the data transaction is captured. At least one identifier is associated with the captured data. A timestamp is also generated for the captured data. The timestamp includes information therein identifying at least a portion of the identifier(s). The captured data, the identifier(s) and the timestamp are stored in one or more data stores. The identifier(s) associated with the stored captured data is also mapped to an entry in an index to permit retrieval of the stored data from the data store via the index.Type: GrantFiled: August 9, 2002Date of Patent: March 29, 2005Assignee: Network Resonance, Inc.Inventors: Kevin Stewart Dick, Eric Kenneth Rescorla
-
Patent number: 6865678Abstract: A personal data/time notary device is embodied in a token device such as a “smart card”. The portable notary device includes an input/output (I/O) port, which is coupled to a single integrated circuit chip. The I/O port may be coupled to a conventional smart card reading device which in turn is coupled to a PC, lap-top computer or the like. A tamper resistant secret private key storage is embodied on the chip. The private key storage is coupled to the processor which, in turn, is coupled to a permanent memory that stores the program executed by the processor. At least one clock is embodied on the card. A second clock 14 and a random value generator 10 are also preferably coupled to the processor. The device combines digital time notarization into a digital signature operation to ensure that a time stamp is always automatically present. The user does not need to be involved in any additional decision making as to whether time stamping is necessary.Type: GrantFiled: May 8, 2002Date of Patent: March 8, 2005Inventor: Addison M. Fischer
-
Patent number: 6857071Abstract: An editing apparatus generates a capsular work in which usage conditions for each of plural usages and usage secret information, obtained by encrypting a decryption key encrypted work data with ticket keys which differ depending on usage from each other, are encapsulated together with the encrypted work data. A ticket server apparatus, which manages the usage conditions and the ticket keys, issues a ticket containing a ticket key in the case of allowing a user to practice the usage requested by the user. A distribution center apparatus, which manages the capsular work, distributes the capsular work in accordance with the user's request. An audiovisual apparatus acquires the capsular work from the distribution center apparatus and requests the ticket necessary to make use of the capsular work from the ticket server apparatus.Type: GrantFiled: July 29, 1999Date of Patent: February 15, 2005Assignee: NEC CorporationInventor: Masayuki Nakae
-
Publication number: 20040255120Abstract: The digital file management system and method of the present invention provides a processing service that may be located remotely on a computer network that receives digital files from users and performs file identification, authentication and verification, including time and digital signature. The system and method may include the remote processing and storage of file information such that the user does not need to maintain any application specific software at the user's local site. The system and method may record additional independent data with each stored file including: a “true date” gleaned from a secure clock which is not settable by the user (the Authentidate™); a number derived from a cyclic redundancy code (CRC) algorithm or checksum routine against the file; and a CRC or checksum derived from the “true date”, (the “date CRC”). This additional data may be recorded within each digital file after the file is acquired.Type: ApplicationFiled: May 24, 2004Publication date: December 16, 2004Applicant: AuthentiDate Holding Corp.Inventors: John T. Botti, Nicholas Themelis, Michael Wolf
-
Patent number: 6823456Abstract: A client/server networking topology comprising a trusted server agent (TSA) (e.g., software application) that runs either at a client node or at a node in close proximity to the client and provides various trusted services to the client on behalf of a trusted server. In instances where the node in which the TSA software runs (i.e., the client or a node in close proximity) may be untrusted, and/or unreliable, methods are provided for making the TSA software running on the untrusted and/or unreliable node provide trusted and reliable services. In one aspect of the invention, a method for providing trusted service in a client/server system comprises the steps of: providing at least one client; providing at least one trusted server (TS); providing at least one trusted server agent (TSA) which is executing on or near the at least one client; providing a trusted service by the at least one TSA to the at least one client on behalf of the at least one TS.Type: GrantFiled: August 25, 1999Date of Patent: November 23, 2004Assignee: International Business Machines CorporationInventors: Asit Dan, Arun K. Iyengar, Manoj Kumar
-
Patent number: 6816969Abstract: In a signature generating method where not necessarily all of a plurality of signature generating devices work together each time to generate signatures, the present invention seeks to correctly and securely reflect data relating to previous signatures. When generating signatures, the data used for the next signature is sent beforehand to the other signature generating devices. Also, when generating signatures, at least one of the devices is used consecutively, thus allowing history data to be shared during signature generation.Type: GrantFiled: February 28, 2001Date of Patent: November 9, 2004Assignee: Hitachi, Ltd.Inventors: Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Hisanori Mishima, Takeshi Matsuki, Kunihito Takeuchi, Mitsuru Iwamura, Tsutomu Matsumoto
-
Publication number: 20040221162Abstract: This invention relates to methods and systems to facilitate online electronic notary, signatures and time stamping services. A novel feature is enabling the creation of signed, time stamped or notarized documents having the appearance onscreen or in print of manually generated ones.Type: ApplicationFiled: February 3, 2004Publication date: November 4, 2004Applicant: Phill KongtcheuInventor: Phil Kongtcheu
-
Patent number: 6813358Abstract: A method and system are provided for timed-release cryptography. A sender encrypts data in a timed-release fashion such that a receiver based on information exchanged with a server decrypts the encrypted data at or after a release time without revealing to the server any information about the sender, the data, and the release time. In one embodiment, the sender encrypts a key and a release time based on a public key of the receiver and encrypts the data based on the encrypted key. The server determines a condition, which is a function of the encrypted key, the encrypted release time, and a current time. The server then sends the condition to the receiver using a conditional oblivious transfer method. If the current time as determined by the server is greater than or equal to the release time, the receiver determines the encrypted key based on the condition. The receiver then uses the encrypted key to decrypt the encrypted data.Type: GrantFiled: November 17, 1999Date of Patent: November 2, 2004Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramakris Rajagopalan
-
Publication number: 20040205347Abstract: Techniques that enable information recorded during a presentation to be accessed or retrieved using a handout printed for the presentation. A user can select one or more items, such as slides, printed on the handout and access portions of the recorded information when the user-selected items were presented or displayed. Different types of information may be accessed. Different actions may also be performed on the retrieved information.Type: ApplicationFiled: September 12, 2003Publication date: October 14, 2004Applicant: Ricoh Company, Ltd.Inventors: Berna Erol, Jamey Graham, Jonathan J. Hull, Dar-Shyang Lee
-
Patent number: 6804785Abstract: An exemplary embodiment of the invention relates to a computer-based method and system for identifying and resolving manufacturing conflicts across an extended enterprise via a network environment. The system includes a manufacturing enterprise system comprising a host system operating a web server, an applications server, and a database manager; a data storage device in communication with the host system, and at least one terminal for accessing the host system. The manufacturing enterprise system runs on a network that is coupled to the Internet and is accessible to a supplier enterprise system identified with proper permissions. The applications server executes a set of programs for managing the manufacturing enterprise system, including the problem reporting and resolution application of the present invention.Type: GrantFiled: December 20, 2000Date of Patent: October 12, 2004Assignee: International Business Machines CorporationInventors: Benjamin J. Steele, Cecil Charles Dishman, Robert M. Dunn, Kenneth A. Scea
-
Patent number: 6802005Abstract: A method and system for tracking the time spent by an employee at a job site. The employee is provided with an identification card which includes an encrypted representation of a biometric characteristic of the employee. When the employee arrives at, or leaves, the job site the biometric characteristic recorded on the identification card is compared to the characteristic as directly sensed from the employee and, if the comparison is successful, the approximate time as derived from a secure clock, is recorded.Type: GrantFiled: October 11, 1995Date of Patent: October 5, 2004Assignee: Pitney Bowes Inc.Inventor: William Berson
-
Patent number: 6798885Abstract: The present invention is apparatus and method for encoding, decoding, and encoding and decoding security information in a Musical Instrument Digital Interface (MIDI). In order to perform encoding, musical information and security information are received. The musical information is encoded to generate a plurality of MIDI events. The security information is encoded to generate a plurality of MIDI events of a selected standard type of MIDI event, the generated MIDI events being overrun events that have no effect on a musical output. The generated MIDI events are transmitted. In order to perform decoding, the transmitted MIDI events are received. The plurality of MIDI events encoding security information are detected among the received MIDI events and the plurality of MIDI events encoding security information are decoded to recover the security information.Type: GrantFiled: April 29, 1999Date of Patent: September 28, 2004Assignee: International Business Machines Corp.Inventor: Jerry Walter Malcolm
-
Patent number: 6796489Abstract: Systems and methods for processing or recording electronic documents that have embedded digital signatures. In an electronic document, signature blocks are used to embed the digital signatures. When an electronic document is received for recordation, the schema and profile of the document are checked. The electronic document or digital signatures are validated by reconstructing the document to a previous state such that the digital signature may be validated. The electronic document is processed and endorsed by inserting endorsement data. The electronic document is digitally signed by the recorder and a receipt is also digitally signed by the recorder. The electronic document is then imaged and indexed. The recorded electronic document and the receipt are returned to the sender using routing information that was included in the electronic document.Type: GrantFiled: June 6, 2001Date of Patent: September 28, 2004Assignee: Ingeo Systems, Inc.Inventors: Calvin N. Slater, Andy L. Rasmussen
-
Patent number: 6792536Abstract: A smart card system and methods for proving dates of digital data files includes a trusted time source, a first subsystem for saving the file at a moment in time, a second subsystem for retrieving from the trusted time source a date and a time corresponding to the moment in time, a third subsystem for appending the date and the time retrieved from the trusted time source to the saved file, a fourth subsystem for signing the saved file with the date and the time retrieved from the trusted time source appended thereto, a fifth subsystem for hashing the signed file to produce a digest, a sixth subsystem for signing the digest with a key to produce a certificate, a seventh subsystem for appending the certificate to the saved file, and an eighth subsystem for saving the file with the certificate appended thereto. All of the subsystems are preferably sealed together within a smart card.Type: GrantFiled: October 20, 1999Date of Patent: September 14, 2004Assignee: TimeCertain LLCInventor: Steven W. Teppler
-
Patent number: 6772331Abstract: A method and system for enabling wireless devices to be paired or permanently associated by a user or a network administrator. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and associate the devices with eachother. This is extremely useful for associating a wireless headset with a telephone or associating a wireless mouse with a computer.Type: GrantFiled: May 21, 1999Date of Patent: August 3, 2004Assignee: International Business Machines CorporationInventors: John Raithel Hind, Marcia Lambert Peters
-
Patent number: 6760764Abstract: A real time stamp distribution system for multi-element/multi-processor networks. A master network element derives a real time stamp (RTS) from a source and distributes the RTS to the remaining network elements. A combination of distribution methods are discussed including a dedicated hardware connection, hardware and software messaging and a method wherein a high precision stamp is derived from an oscillator located on each network element. In one embodiment the system has a drift adjustment feature to compensate for a system time stamp drift relative to the real time. Redundancy can be provided by employing multiple master timekeeper elements. The RTS in one application has three timing components; a high precision portion; an intermediate precision portion and a low precision portion. The intermediate portion can be implemented using shifter based counters such as a linear feedback shift register.Type: GrantFiled: August 9, 2000Date of Patent: July 6, 2004Assignee: Alcatel Canada Inc.Inventors: Steve G. Driediger, John S. Gryba, Charles H. Mitchell
-
Patent number: 6754823Abstract: A computer program product and method for installing downloaded software on a client system over a network is described. The product and method include generating an access key by receiving an installation key produced using a random number generated from a seed that is the value of a client system internal clock at the exact moment in time to the millisecond at which a software installation program was run on the client produce the access code by modulo combining the installation key and user name received by the client system.Type: GrantFiled: October 24, 2000Date of Patent: June 22, 2004Assignee: Kurzweil CyberArt TechnologiesInventors: Raymond C. Kurzweil, John A. Keklak, Jules A. Yasuna
-
Patent number: 6748533Abstract: A method, an apparatus and a computer program product are disclosed for protecting the legitimacy of an article (100), and in particular an electronic document, against forgery or fraud. Such articles include passports, credit cards, bank notes, lottery tickets, secure forms. The method includes the following steps: several watermarks (204, 224, 244) are generated independently (304, 306, 308) by different cryptographic watermarking mechanisms controlled utilising information permanently associated within the article or product (100); and each watermark is embedded in a linked cryptographic manner (160, 162, 164). Subsequently, the watermarks can be scanned and digitised (410). The authenticity of the article (100) can be determined by verifying the correctness of extracted watermarks and the encryption links (160, 162, 164) among them. Also disclosed is a method of embedding an invisible watermark (714) in an official seal (712) incorporated in an electronic article or document (700).Type: GrantFiled: December 2, 1999Date of Patent: June 8, 2004Assignee: Kent Ridge Digital LabsInventors: Jiankang Wu, Qibin Sun, Huijie Robert Deng
-
Patent number: 6742119Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt by combining the document and a digital time indication. The time stamp receipt is submitted to a time stamping agent having a trusted clock. The time stamping agent optionally validates the time stamp receipt and then computes the age of the time stamp receipt. If valid, the time stamping agent certifies the time stamp receipt by signing the time stamp receipt with a private signature key. The private signature key is selected from a group of signature keys by the time stamping agent based on the computed age of the time stamp receipt.Type: GrantFiled: December 10, 1999Date of Patent: May 25, 2004Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 6738913Abstract: A storage device is provided for gaining access to a storage medium and for reading data from or writing data to the storage medium. The storage medium has a plurality of access control areas for storing access control areas for storing access control information. The storage device also has an update process unit for performing a current update process and includes new access control information written in to a selected first access control area of the plurality access control areas. The first access control area differs from a second access control area of the plurality of the access control areas. In addition, the storage device also has an access control unit for controlling access to the storage medium depending on correspondence between entered access control information and the new access control information written in the access control area.Type: GrantFiled: August 10, 1999Date of Patent: May 18, 2004Assignee: Fujitsu LimitedInventor: Yoshiaki Uchida
-
Publication number: 20040093500Abstract: Encoder and decoder microchips suitable for use in remote control devices, are disclosed. The encoder microchip comprises means for performing an encoding function on an identification number embedded in the said microchip and a combination of a unit number and a stepping counter value, so as to generate a transmission value which is only decodable by a related decoding function having access to the same identification number. The decoder microchip comprises means for decoding the transmission value into a decoded unit number and a decoded counter value and means for comparing the decoded counter value with a decoder counter value range. The encoder and decoder microchips are provided with means for changing, e.g. in a preferred mode incrementing, the counter values by a number greater than one after a period of time, subsequent to the encoder microchip being activated or the decoder microchip receiving a transmission value.Type: ApplicationFiled: November 4, 2003Publication date: May 13, 2004Applicant: MICROCHIP TECHNOLOGY INCORPORATEDInventor: Frederick Bruwer
-
Patent number: 6735694Abstract: A method and system of certifying that a copy of a Web page was made at a particular time by a user of a Web client. A client piece preferably includes a one-way hashing function that, when applied to a Web page copy, generates a unique string. The string is concatenated with a URL for the Web page, a timestamp and other identifying information, to generate a signature. Using a public key cryptosystem, the signature is provided to a certification server. Upon receipt, the server first determines whether the signature represents the Web page copy. If so, a confirmation is sent to the client, and the signature is stored in a database. Preferably, the Web page copy itself is not stored in the database. Signatures from other Web page copies received during a given period (e.g., the same day) are then summed and the sum is published.Type: GrantFiled: November 21, 1997Date of Patent: May 11, 2004Assignee: International Business Machines CorporationInventors: Viktors Berstis, Maria Azua Himmel
-
Patent number: 6728880Abstract: Methods and apparatus, including computer program apparatus and a system, for providing a trusted time. A first local time from a computer is sent to a trusted server. Trusted time data protected by encryption or a digital signature is received from the trusted server. The invention stores the trusted time data on the computer and checks the validity of the trusted time data. The trusted time data is used on the computer to compute a trusted time corresponding to a local time.Type: GrantFiled: September 17, 1999Date of Patent: April 27, 2004Assignee: Adobe Systems IncorporatedInventor: Richard L. Sites
-
Patent number: 6728956Abstract: A data processor capable of preventing a system from starting up improperly due to incomplete program updating. The data processor receives, by way of an external interface, a program which is sent by communicating medium such as a broadcast wave or a telephone network from an external device and stores the received program into a memory B which is different from a memory A storing a program for the system when a version of the received program is newer than that of a program currently executed by the data processor, thereby starting up an MPU at the next time with the program stored in the memory B.Type: GrantFiled: August 24, 1999Date of Patent: April 27, 2004Assignee: Canon Kabushiki KaishaInventor: Kenichiro Ono
-
Publication number: 20040073789Abstract: A method for controlling access to a computer program, and to derivative works based upon the program, with a single software key the contents of which may be determined by multiple independent parties to development of the final work.Type: ApplicationFiled: October 15, 2002Publication date: April 15, 2004Inventor: John Stephenson Powers
-
Patent number: 6711680Abstract: A method and system for generating messages from which it can be verified that a variable does not exceed a predetermined limit. The message can be a postal indicium. A message originator, which can be a postage metering system, receives a message in the form R−k(T), where R is a trapdoor function, K is an integer equal to the limit, and T is a plain text, from a data processing center which maintains the inverse function R−1 in secrecy. The message originator computes Sm=Rm(R−k(T), where m is a current value of the variable, and incorporates Sm into the message. A verifier verifies that m<K by confirming that Rk−m(Sm)=T. The verifier cannot compute Rk−m(Sm) for m<K since it does not have R−1. For the same reason the originator cannot compute R−k′(T), k′>K, from R−k(T).Type: GrantFiled: December 9, 1999Date of Patent: March 23, 2004Assignee: Pitney Bowes Inc.Inventor: Robert A Cordery
-
Publication number: 20040049681Abstract: The invention relates in particular to a process for timestamping digital data comprising:Type: ApplicationFiled: June 27, 2003Publication date: March 11, 2004Inventors: Eric Diehl, Philippe Letellier
-
Patent number: 6697942Abstract: A data formatting method for embedding diverse data types in an electronic mail message includes the step of forming a network compliant electronic mail message header. Command blocks representing diverse data types are also generated. The command blocks representing the diverse data types are combined with a network compliant electronic mail message header into an electronic mail message. The electronic mail message is constructed to conform to network standards such that the command blocks representing the diverse data types are processed as textual information.Type: GrantFiled: October 1, 1999Date of Patent: February 24, 2004Assignee: Earthlink, Inc.Inventors: David L'Heureux, Craig Hackerd
-
Publication number: 20040034780Abstract: Systems and methods for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server (110), including receiving data from a data acquisition device (102), generating a MicroEPM data structure (106) comprising a time stamp, a digital signature, and the received data and transferring the MicroEPM data structure (106) to a regular EPM server (110).Type: ApplicationFiled: June 13, 2003Publication date: February 19, 2004Inventor: Charles R. Chamberlain
-
Publication number: 20040003255Abstract: A server includes a dedicated hardware card that is responsible for digesting an incoming email, appending a date and time to the digest to create a time stamp, and signing the result with a private digital signature. This provides a secure time stamp for an email that is resistant to falsification and tampering by the sender of an email, and which can be verified by a recipient of the email.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Applicant: Storage Technology CorporationInventors: Axelle Apvrille, Robert Klunker
-
Publication number: 20030233553Abstract: A computing device has a running real-time secure clock adjustable only according to trusted time as received from an external trusted time authority, a time offset within which is stored a time value adjustable by at least one of the user and the trusted time authority, and a time display for displaying a running real-time display time calculated as the trusted time from the secure clock plus the stored time value in the time offset. Reference thus may be made to the secure clock to evaluate a temporal requirement without concern that the user has adjusted the secure clock to subvert the temporal requirement. The computing device sends a request for secure time and the trusted time authority sends same. The computing device receives the secure time, sets the secure clock according to same, and sends confirmation to the trusted time authority that the secure time has been received.Type: ApplicationFiled: June 13, 2002Publication date: December 18, 2003Applicant: Microsoft CorporationInventors: M. Jay Parks, Jonas Fredrik Helin
-
Patent number: 6636968Abstract: The common encryption of content material is provided for decryption at a plurality of destination devices, each destination device having a unique private key of a public-private key pair. A multiple device key exchange is utilized to create a session key for encrypting the content material that is based on each of the public keys of the plurality of destination devices. The content material is encrypted using this session key. A partial key is also created for each of the intended destination devices that relies upon the private key of the destination device to form a decryption key that is suitable for decrypting the encrypted content material. The encrypted content material and the corresponding partial key are communicated to each destination device via potentially insecure means, including broadcast over a public network. Each destination device decrypts the encrypted content material using the decryption key that is formed from its private key and the received partial key.Type: GrantFiled: November 4, 1999Date of Patent: October 21, 2003Assignee: Koninklijke Philips Electronics N.V.Inventors: Martin Rosner, Michael A. Epstein, Michael S. Pasieka
-
Publication number: 20030163703Abstract: One embodiment of the present invention provides a system and method for preventing the unauthorized use of property. Briefly described, in architecture, one embodiment of the system comprises an image capture system configured to capture an image of an object and generate data corresponding to the captured image, an image key corresponding to the object, a processor configured to compare the image key with the data corresponding to the captured image, and further configured to enable use of the property only if the data corresponding to the captured image corresponds to the image key, and a security timer configured to time a period of time such that the processor compares the image key with the data corresponding to the captured image after the period of time has elapsed.Type: ApplicationFiled: February 28, 2002Publication date: August 28, 2003Inventors: Mark Nelson Robins, Heather Noel Bean
-
Publication number: 20030163704Abstract: A system, method and computer program product for guaranteeing a data transaction over a network are disclosed. When a data transaction between at least a server and a client is detected on a network, data transmitted via the network between the server and client during the data transaction is captured. At least one identifier is associated with the captured data. A timestamp is also generated for the captured data. The timestamp includes information therein identifying at least a portion of the identifier(s). The captured data, the identifier(s) and the timestamp are stored in one or more data stores. The identifier(s) associated with the stored captured data is also mapped to an entry in an index to permit retrieval of the stored data from the data store via the index.Type: ApplicationFiled: August 9, 2002Publication date: August 28, 2003Inventors: Kevin Stewart Dick, Eric Kenneth Rescorla
-
Publication number: 20030159048Abstract: Object: To provide a time stamping system for electronic documents making it possible to easily provide a time stamp certifying date and time of a document prepared with general purpose document preparation software and also to easily and accurately verify the time data and a program medium for the same.Type: ApplicationFiled: January 10, 2003Publication date: August 21, 2003Inventors: Tsutomu Matsumoto, Tadahiro Sato, Keisuke Ichikawa
-
Patent number: 6604197Abstract: In an electronic filing system over a computer network, a central server sets the requirements for making submissions. These requirements include a time limit after the expiry of which, submissions will no longer be accepted. A gateway server polls the central server for the submission requirements, and establishes a directory in its own file system to which all potential submitters have write access until expiry of the time limit. On completion of its submission, a submitter generates evidence of the complete submission. The evidence can be in the form of a digitally signed message digest. The submitter may encrypt the evidence using the gateway server's public encryption key and then forwards the evidence to the gateway server. If the evidence is filed before expiry of the time limit, the gateway server permits the evidence to be written to the directory established for the submission requirements.Type: GrantFiled: December 3, 1998Date of Patent: August 5, 2003Assignee: International Business Machines CorporationInventors: Terence Chun-Yat Lau, Lev Mirlas
-
Patent number: 6601172Abstract: In a computer network, documents are produced, the document is hashed to produce a fingerprint, and the fingerprint is encrypted to sign the document then the document signature is transmitted from the user system to a secure computer system. The secure computer system creates a time stamp including the document signature and a digital time. The secure system signs the time stamp to verify its origin. The time stamp and notary's signature are transmitted from the secure system to the user's system. The user has access to the notary's public key which is used for determining whether the time stamp is authentic. Then, if the document is revised, the revised document is hashed and the hash is combined with an indication that the revision is related to the original document. The indication could be a hash of the original document, the original document signature, the notary's time stamp for the original document, or the notary's signature for the original document.Type: GrantFiled: December 31, 1997Date of Patent: July 29, 2003Assignee: Philips Electronics North America Corp.Inventor: Michael Epstein
-
Publication number: 20030126447Abstract: A trusted high stability time source for use with a digital time stamping service and a trusted external time source includes a private time source, a published time source, at least one power supply, and control logic. The control logic is programmed to perform a time stamping operation and to perform a published time source update. In performing the published time source update, a reply received from the trusted external time source includes the published time update, and the published time is updated with the published time update if an update condition is satisfied. The update condition is based in part on a time difference between the private time and the published time update.Type: ApplicationFiled: December 27, 2001Publication date: July 3, 2003Inventors: Jacques Debiez, James P. Hughes
-
Publication number: 20030126446Abstract: A method and system for providing a secure time reference when storing data to a storage medium using write once read many (WORM) protection are provided. The method includes receiving a message, determining a message digest, appending a published time from a digital time stamping service to the message digest to create a timestamp, and digitally signing the timestamp with a private key of the digital time stamping service. The message, the timestamp, and the digital signature are stored to the medium using write once read many (WORM) protection.Type: ApplicationFiled: December 27, 2001Publication date: July 3, 2003Inventors: Jacques Debiez, James P. Hughes, Axelle Apvrille
-
Publication number: 20030120930Abstract: The present disclosure relates to a document notarization system and method. In one arrangement, the system and method pertain to accessing imaging data via a network, and electronically notarizing the imaging data. By way of example, notarization can comprise modifying an original document by adding a stamp and/or a digital signature or generating a separate (or appended) notarization certificate. The present disclosure further relates to a network-based notarization service stored on computer-readable media. In one arrangement, the notarization service comprises logic configured to access a document stored in a personal imaging repository, and logic configured to electronically notarize the document.Type: ApplicationFiled: December 21, 2001Publication date: June 26, 2003Inventors: Shell S. Simpson, Ward S. Foster
-
Publication number: 20030120939Abstract: A method, computer program product, and data processing system for generating and validating an upgradeable digital timestamp of a document is disclosed. The digital timestamp includes a hash value, a current time, and a digital signature. Over time, as computer and cryptanalytic technology progresses, upgrade timestamps are applied to the document that take advantage of more advanced, more difficult to break hash functions or digital signature schemes. These upgrade timestamps are applied preventatively at a point in time just prior to the timestamp's being able to be compromised.Type: ApplicationFiled: December 26, 2001Publication date: June 26, 2003Applicant: Storage Technology CorporationInventors: James P. Hughes, Axelle Apvrille
-
Patent number: 6584565Abstract: The time over which a digital signature can be verified is extended well beyond the expiration of any or all of the certificates upon which that signature depends. A “save state” approach is disclosed, in which an archive facility is used to store public key infrastructure (PKI) state, e.g. cryptographic information, such as certificates and certificate revocation lists (CRLs), in addition to non-cryptographic information, such as trust policy statements or the document itself. This information comprises all that is necessary to re-create the signature verification process at a later time. When a user wants to reverify the signature on a document, possibly years later, a long term signature verification (LTSV) server re-creates the precise state of the PKI at the time the document was originally submitted. The LTSV server restores the state, and the signature verification process executes the exact process it performed (or would have performed) years earlier.Type: GrantFiled: July 15, 1997Date of Patent: June 24, 2003Assignee: Hewlett-Packard Development Company, L.P.Inventor: Steven Zamek
-
Publication number: 20030115469Abstract: A log of access to protected content is kept that has forced periodic updates, even if no access has occurred. Systems and methods make it difficult to determine when the access log will be modified next. A server securely sends a variable time period (VTP) and a time duration to the next connection (TDNC) to a client. These two values determine how often the client must update the access log and how long the client must wait before establishing communication with the server. Thus, the server is able to detect and deter rollback attacks.Type: ApplicationFiled: December 14, 2001Publication date: June 19, 2003Applicant: Intel CorporationInventors: Keith L. Shippy, Richard P. Mangold