Trusted Time Stamping Storage System
First Claim
1. A method for providing trusted time stamping in a data storage system, the method comprising:
- determining data being stored in the data storage system;
hashing the data to generate a hash value;
sending the hash value and a request for a time stamp to a time stamping authority;
receiving a time stamp token and a time stamping authority certificate from the time stamping authority, the time stamp token comprising a time stamp and the hash value;
storing the time stamp token and the time stamping authority certificate in the data storage system, the time stamp and hash value providing trusted time stamping for the determined data in data storage system; and
validating the time stamp token stored in the data storage system, including;
accessing the data stored in the data storage system,hashing the accessed data to generate a second hash value;
retrieving the hash value of the time stamp token;
comparing the second hash value to the hash value found in the time stamp token which is stored in the data storage system; and
validating the time stamp token based on the comparison.
0 Assignments
0 Petitions
Accused Products
Abstract
Data stored in a data storage system is hashed to generate a hash value. The hash value and a request for a time stamp are then sent to a time stamping authority. A time stamp token and/or a time stamp certificate is received from the time stamping authority. The time stamp token includes a time stamp and the hash value, and may be encrypted using a private key of the time stamping authority. The time stamp token and/or time stamp certificate is then stored with, for example, a reference to the data being stored in the data storage system. The time stamp token and/or time stamp certificate may then be used to validate the data being stored and the time stamp.
24 Citations
94 Claims
-
1. A method for providing trusted time stamping in a data storage system, the method comprising:
-
determining data being stored in the data storage system; hashing the data to generate a hash value; sending the hash value and a request for a time stamp to a time stamping authority; receiving a time stamp token and a time stamping authority certificate from the time stamping authority, the time stamp token comprising a time stamp and the hash value; storing the time stamp token and the time stamping authority certificate in the data storage system, the time stamp and hash value providing trusted time stamping for the determined data in data storage system; and validating the time stamp token stored in the data storage system, including; accessing the data stored in the data storage system, hashing the accessed data to generate a second hash value; retrieving the hash value of the time stamp token; comparing the second hash value to the hash value found in the time stamp token which is stored in the data storage system; and validating the time stamp token based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 14, 16, 17, 18, 19)
-
-
11. (canceled)
-
13. (canceled)
-
15. (canceled)
-
20. A storage system for providing trusted time stamping, the system comprising:
-
a storage device configured to store data; a data determiner configured to determine data in the storage device; a hasher configured to hash the determined data to generate a hash value; a time stamp requestor configured to send the hash value and a request for a time stamp to a time stamping authority; a receiver configured to receive a time stamp token and a time stamping authority certificate from the time stamping authority, the time stamp token comprising a time stamp and the hash value, wherein the storage device is configured to store the time stamp token, the time stamp token providing trusted time stamping for the determined data in the data storage system; and a validator configured to validate the time stamp token stored in the data storage system including; accessing the data stored in the data storage system, hashing the accessed data to generate a second hash value; retrieving the hash value of the time stamp token, comparing the second hash value to the hash value found in the time stamp token which is stored in the data storage system; and validating the time stamp token based on the comparison. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 31, 33, 34, 35, 36)
-
- 28. (canceled)
-
30. (canceled)
-
32. (canceled)
-
37. A method for validating a time stamp generated for data being stored in a data storage system, the method comprising:
-
receiving a request to validate a time stamp token received from a time stamping authority; accessing the time stamp token being stored in the data storage system; validating the time stamp token; determining a hash value associated with the time stamp token; accessing data being stored in the data storage system that was time stamped using the time stamp token; hashing the data to generate a second hash value; comparing the hash value included in the time stamp token with the second hash value; validating the data based on the comparison; and if the time stamp token and the data are validated, validating the time stamp. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. A method for providing trusted time stamping for commands for a data storage system, the method comprising:
-
determining a command executed in the data storage system; hashing information for the command to generate a hash value; sending the hash value and a request for a time stamp to a time stamping authority; receiving a time stamp token and a time stamping authority certificate from the time stamping authority, the time stamp token comprising a time stamp and the hash value; storing the time stamp token in the data storage system, the time stamp and hash value providing trusted time stamping mechanism for the command in the data storage system; and validating the time stamp token stored in the data storage system, including; accessing the information for the command; hashing the accessed information to generate a second hash value; retrieving the hash value of the time stamp token; comparing the second hash value to the hash value found in the time stamp token which is stored in the data storage system; and validating the time stamp token based on the comparison. - View Dependent Claims (51, 52, 53, 55, 57, 58, 59, 60, 61, 63, 64, 65, 66)
-
-
54. (canceled)
-
56. (canceled)
-
62. (canceled)
-
67. A storage system for providing trusted time stamping for commands being executed in the storage system, the system comprising:
-
a command determiner configured to determine a command being executed in the storage device; a hasher configured to hash information for the command to generate a hash value; a time stamp requester configured to send the hash value and a request for a time stamp to a time stamping authority; a receiver configured to receive a time stamp token and a time stamping authority certificate from the time stamping authority, the time stamp token comprising a time stamp and the hash value, wherein the storage device is configured to store the time stamp token, the time stamp token providing trusted time stamping for the command in the data storage system; and a validator configured to validate the time stamp token stored in the data storage system, including; accessing the information for the command; hashing the accessed information to generate a second hash value; retrieving the hash value of the time stamp token, comparing the second hash value to the hash value found in the time stamp token which is stored in the data storage system; and validating the time stamp token based on the comparison. - View Dependent Claims (68, 70, 72, 73, 74, 75, 76, 78, 79, 80, 81)
-
-
69. (canceled)
-
71. (canceled)
-
77. (canceled)
-
82. A method for validating a time stamp generated for a command being executed in a data storage system, the method comprising:
-
receiving a request to validate a time stamp token received from a time stamping authority; accessing the time stamp token being stored in the data storage system; validating the time stamp token; determining a hash value included with the time stamp token; accessing information for the command being stored in the data storage system that was time stamped using the time stamp token; hashing the information for the command to generate a second hash value; comparing the hash value included in the time stamp token with the second hash value; validating the information for the command based on the comparison; and if the time stamp token and the data are validated, validating the time stamp. - View Dependent Claims (83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94)
-
Specification