Method and apparatus for verifying secure document timestamping
First Claim
Patent Images
1. A method comprising:
- receiving a timestamp from a caller via a telephone connection;
receiving a device identifier from the caller, in which the device identifier identifies a device;
determining a cryptographic key based on the device identifier;
determining a representation of a time based on the timestamp and the cryptographic key;
providing the representation of the time to the caller;
determining an account; and
charging a fee to the account.
3 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of the invention, a method is provided for receiving a timestamp from a caller via a telephone connection; receiving a device identifier from the caller, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining an indication of a time based on the timestamp and the cryptographic key; providing the indication of the time to the caller; determining an account; and charging a fee to the account.
-
Citations
33 Claims
-
1. A method comprising:
-
receiving a timestamp from a caller via a telephone connection;
receiving a device identifier from the caller, in which the device identifier identifies a device;
determining a cryptographic key based on the device identifier;
determining a representation of a time based on the timestamp and the cryptographic key;
providing the representation of the time to the caller;
determining an account; and
charging a fee to the account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
receiving a sequence of DTMF signals from a caller via a telephone connection;
determining a timestamp based on the DTMF signals;
receiving a device identifier from the caller, in which the device identifier identifies a device;
determining a cryptographic key based on the device identifier;
determining a representation of a time based on the timestamp and the cryptographic key;
providing the representation of the time to the caller;
determining an account; and
charging a fee to the account.
-
-
24. A method comprising:
-
receiving a timestamp from a timestamp recipient via an Internet connection;
receiving a device identifier via the Internet connection, in which the device identifier identifies a device;
determining a cryptographic key based on the device identifier;
determining a representation of a time based on the timestamp and the cryptographic key;
providing the representation of the time to the timestamp recipient via the Internet connection;
determining an account; and
charging a fee to the account.
-
-
25. A method, comprising:
-
generating, by a cryptoprocessor, a timestamping request for a series of timestamps;
generating, by the cryptoprocessor, the series of timestamps according to a schedule stored in a memory;
transmitting the series of timestamps to a recipient; and
charging a fee. - View Dependent Claims (26, 27, 28)
-
-
29. A computer readable medium storing instructions configured to direct a processor to:
-
internally generate a timestamping request for a series of timestamps;
generate the series of timestamps according to a stored schedule;
transmit the series of timestamps to a recipient; and
charge a fee. - View Dependent Claims (30, 31, 32)
-
-
33. An apparatus, comprising:
-
a cryptoprocessor configured to internally generate a timestamping request for a series of timestamps;
a memory in communication with the cryptoprocessor and storing a program for directing the cryptoprocessor to generate the series of timestamps according to a stored schedule, and to determine a fee; and
an output device, controlled by the cryptoprocessor, for transmitting the series of timestamps to a recipient, and for outputting a charge for the fee.
-
Specification