Telecommunication-assisted time stamp
First Claim
1. A method for providing a time stamp by means of a tamper-proof time signal (5, 10) via a telecommunications network (2), wherein a network user (1a, 1b, . . . , 1e) requests an, in particular, officially recognized time signal (5, 10) from an, in particular, certified central system (3);
- said time signal being encrypted by the central system (3) with at least one key, transmitted to the network user (1a, 1b, . . . , 1e) via the telecommunications network (2) after encryption, and decrypted by this network user with the same key or keys.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method and system for providing a time stamp by means of a manipulation-proof time signal (5, 10) via a telecommunication network (2), wherein a network subscriber (1a, 1b, . . . , 1e) requests an especially officially recognized time signal (5,10) from an especially certified central system (3). Said signal is encrypted by the central system (3) using at least one key, is transmitted to the network subscribers (1a, 1b, . . . , 1e) via the telecommunication network (2) after encryption and is decrypted by the subscribers using the same key(s). The invention also relates to a method for transmitting data with a manipulation-proof time stamp.
12 Citations
10 Claims
-
1. A method for providing a time stamp by means of a tamper-proof time signal (5, 10) via a telecommunications network (2), wherein a network user (1a, 1b, . . . , 1e) requests an, in particular, officially recognized time signal (5, 10) from an, in particular, certified central system (3);
- said time signal being encrypted by the central system (3) with at least one key, transmitted to the network user (1a, 1b, . . . , 1e) via the telecommunications network (2) after encryption, and decrypted by this network user with the same key or keys.
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A system for generating a tamper-proof time stamp in network-based communication systems, wherein the system includes a central system (3) and one each clock system (4a, 4b, . . . , 4e, 6a, 6b, . . . , 6e) on the side of a network user (1a, 1b, . . . , 1e) and on the side of the central system (3);
- the clock systems (4a-6a, 4b-6b, . . . , 4e-6e) being assigned to each other and to the network user (1a, 1b, . . . , 1e) and operating synchronously to generate a key which changes, in particular, at intervals of time, and with which an, in particular, officially recognized time signal (5, 10) can be encrypted in the central system (3) and decrypted by the network user (1a, 1b, . . . , 1e) after it is sent to this network user.
- View Dependent Claims (10)
Specification