Method and system for securely timestamping digital data
First Claim
1. A method for securing timestamping of digital data comprising the steps of:
- providing a secure encryption key; and
, providing a processor for performing security functions with the secure encryption key, the processor operable in a first mode wherein the secure encryption key is used for encryption operations and for test operations and in a second mode in which the secure encryption key is only used for timestamping operations, wherein once the processor performs a function with the secure encryption key in the second mode, it is precluded from performing further functions in the first mode with the same secure encryption key.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system for securely timestamping digital data is disclosed. A secure encryption key is provided within a timestamping module. The timestamping module comprises a processor for performing security functions with the secure encryption key. The processor is operable in a first mode wherein the secure encryption key is used for encryption operations and for test operations and in a second mode in which the secure encryption key is only used for timestamping operations. Once the processor performs a function with the secure encryption key in the second mode it is precluded from performing further functions in the first mode with the secure encryption key. After the processor has been placed in the second mode of operation a unique code for being embedded within timestamped digital data is generated. Data indicative of a real time a request for a timestamping operation has been received is then provided to the processor from a real time clock. Based on the data indicative of a real time a timestamp is generated using the secure encryption key. The timestamp is embedded within the digital data and the unique code is inserted within the digital data. The digital data with the inserted data therein are then encoded to form timestamped digital data. Upon receipt of the securely timestamped digital data the unique code is retrieved from the securely timestamped digital data in order to verify the authenticity of the time data.
-
Citations
24 Claims
-
1. A method for securing timestamping of digital data comprising the steps of:
- providing a secure encryption key; and
,providing a processor for performing security functions with the secure encryption key, the processor operable in a first mode wherein the secure encryption key is used for encryption operations and for test operations and in a second mode in which the secure encryption key is only used for timestamping operations, wherein once the processor performs a function with the secure encryption key in the second mode, it is precluded from performing further functions in the first mode with the same secure encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
- providing a secure encryption key; and
-
11. A method for securely timestamping digital data comprising the steps of:
- providing a secure encryption key;
providing a processor for performing security functions with the secure encryption key, the processor operable in a first mode wherein the secure encryption key is used for encryption operations and for test operations and in a second mode in which the secure encryption key is only used for timestamping operations, wherein once the processor performs a function with the secure encryption key in the second mode, it is precluded from performing further functions in the first mode with the secure encryption key;
when the processor is in the first mode of operation, receiving a first request to perform a timestamping operation on first digital data and then placing the processor in the second mode of operation; and
,providing a unique code for being embedded within timestamped digital data, the unique code being indeterminable before receipt of the first request. - View Dependent Claims (12, 13, 14)
- providing a secure encryption key;
-
15. A method for securely timestamping digital data comprising the steps of:
-
providing a secure encryption key;
providing a processor for performing security functions with the secure encryption key, the processor operable in a first mode wherein the secure encryption key is used for encryption operations and for test operations and in a second mode in which the secure encryption key is only used for timestamping operations, wherein once the processor performs a function with the secure encryption key in the second mode, it is precluded from performing further functions with the secure encryption key in the first mode;
placing the processor in the second mode of operation; and
,providing a unique code for being embedded within timestamped digital data, the unique code being indeterminable before the processor is placed in the second mode of operation. - View Dependent Claims (16, 17, 18)
-
-
19. A method for securely timestamping digital data comprising the steps of:
-
receiving securely timestamped digital data, wherein the securely timestamped digital data have a unique code embedded therein, and wherein the unique code has been generated by a processor after the processor has been placed in a mode of operation in which a secure encryption key is only used for timestamping operations;
decrypting the timestamp using a key corresponding to the secure encryption key for providing time data in dependence thereupon;
retrieving the unique code from the securely timestamped digital data; and
,comparing the unique code with reference data in order to produce a comparison result, and if the comparison result is indicative of a match indicating authenticity of the time data.
-
-
20. A secure system for securely timestamping digital data comprising:
at least a first port for receiving the digital data and for providing timestamped digital data; and
a processor for;
performing security functions with the secure encryption key, the processor operable in a first mode wherein a secure encryption key is used for encryption operations and for test operations and in a second mode in which the secure encryption key is only used for timestamping operations, wherein once the processor performs a function with the secure encryption key in the second mode, it is precluded from performing further functions with the secure encryption key in the first mode. - View Dependent Claims (21, 22, 23, 24)
Specification