TRUSTWORTHY TIMESTAMPS AND CERTIFIABLE CLOCKS USING LOGS LINKED BY CRYPTOGRAPHIC HASHES
First Claim
Patent Images
1. A method comprising:
- maintaining a first, chained-hash log;
associating a first clock with the chained-hash log; and
entangling the first log with a second log by adding a time-stamped synchronization entry to the chained-hash log, the synchronization entry having a second time indication associated with the second log and a hash of one or more entries in the first log.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for creating and/or using trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes. In one embodiment, the method comprises maintaining a first, chained-hash log; associating a first clock with the chained-hash log, and entangling the first log; with a second by adding a time-stamped synchronization entry to the chained-hash log, where the synchronization entry has a second time indication associated with the second log and a hash of one or more entries in the first log.
-
Citations
26 Claims
-
1. A method comprising:
-
maintaining a first, chained-hash log; associating a first clock with the chained-hash log; and entangling the first log with a second log by adding a time-stamped synchronization entry to the chained-hash log, the synchronization entry having a second time indication associated with the second log and a hash of one or more entries in the first log. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method comprising
synchronizing a first hash-chained log with a second hash-chained log by adding a time-stamped log entry into the first log containing a first time indication of a clock associated with the second log; - and
producing one or more document timestamps traceable to a trusted source using the first and second logs cross-connected through synchronization entries added as part of a synchronization process. - View Dependent Claims (20, 21)
- and
-
22. A method comprising:
-
exchanging log information to synchronize a pair of hash-chained logs that each have clocks; and placing a bound on accuracy of a clock associated with one log in the pair of logs based on an assessment of accuracy of a clock associated with the other log in the pair of logs.
-
-
23. A method comprising:
-
updating a clock used for time-stamping entries in a hash-chained log; and correcting one or more log entries of a log based on the updated clock. - View Dependent Claims (24, 25, 26)
-
Specification