Method and apparatus for verifying secure document timestamping
First Claim
Patent Images
1. A method comprising:
- receiving a timestamp from a caller via a telephone connection;
receiving a device identifier from the caller, in which the device identifier identifies a device;
determining a cryptographic key based on the device identifier;
determining a representation of a time based on the timestamp and the cryptographic key;
providing the representation of the time to the caller;
determining an account; and
charging a fee to the account.
3 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of the invention, a method is provided for receiving a timestamp from a caller via a telephone connection; receiving a device identifier from the caller, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining an indication of a time based on the timestamp and the cryptographic key; providing the indication of the time to the caller; determining an account; and charging a fee to the account.
-
Citations
49 Claims
-
1. A method comprising:
-
receiving a timestamp from a caller via a telephone connection; receiving a device identifier from the caller, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining a representation of a time based on the timestamp and the cryptographic key; providing the representation of the time to the caller; determining an account; and charging a fee to the account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
receiving a sequence of DTMF signals from a caller via a telephone connection; determining a timestamp based on the DTMF signals; receiving a device identifier from the caller, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining a representation of a time based on the timestamp and the cryptographic key; providing the representation of the time to the caller; determining an account; and charging a fee to the account.
-
-
24. A method comprising:
-
receiving a timestamp from a timestamp recipient via an Internet connection; receiving a device identifier via the Internet connection, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining a representation of a time based on the timestamp and the cryptographic key; providing the representation of the time to the timestamp recipient via the Internet connection; determining an account; and charging a fee to the account.
-
-
25. A method, comprising:
-
receiving, by a central controller, a timestamp from a timestamp recipient; receiving, by the central controller, a device identifier that identifies a timestamp device; utilizing, by the central controller, the device identifier to determine a cryptographic operation used to generate the timestamp; attempting, by the central controller, to verify the timestamp by using the cryptographic operation on at least a portion of the timestamp; communicating, by the central controller, the results of the attempt to verify to the timestamp recipient; and charging a fee. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A computer readable memory storing instructions configured to direct a processor to:
-
receive a timestamp from a timestamp recipient; receive a device identifier that identifies a timestamp device; utilize the device identifier to determine a cryptographic operation used to generate the timestamp; attempt to verify the timestamp by using the cryptographic operation on at least a portion of the timestamp; communicate the results of the attempt to verify to the timestamp recipient; and charge a fee. - View Dependent Claims (36, 37)
-
-
38. An apparatus, comprising:
-
a computer processor configured to receive a timestamp from a timestamp recipient and to receive a device identifier that identifies a timestamp device; a memory in communication with the computer processor and storing a program for directing the computer processor to utilize the device identifier to determine a cryptographic operation used to generate the timestamp, and to attempt to verify the timestamp by using the cryptographic operation on at least a portion of the timestamp; and an output device, controlled by the computer processor, for communicating the results of the attempt to verify to the timestamp recipient, and for outputting a charge for a fee.
-
-
39. A method, comprising:
-
receiving, by a central controller, a timestamp from a timestamp recipient that includes a cleartext portion and a ciphertext portion; receiving, by the central controller, a device identifier that identifies a timestamp device; utilizing, by the central controller, the device identifier to determine a cryptographic key; attempting, by the central controller, to verify the timestamp by using a cryptographic operation on the timestamp, wherein the cryptographic operation is associated with the cryptographic key; communicating, by the central controller, the results of the attempt to verify to the timestamp recipient; and charging a fee. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
-
46. A computer readable memory storing instructions configured to direct a processor to:
-
receive a timestamp from a timestamp recipient that includes a cleartext portion and a ciphertext portion; receive a device identifier that identifies a timestamp device; utilize the device identifier to determine a cryptographic key; attempt to verify the timestamp by using a cryptographic operation on the timestamp, wherein the cryptographic operation is associated with the cryptographic key; communicate the results of the attempt to verify to the timestamp recipient; and charge a fee. - View Dependent Claims (47, 48)
-
-
49. An apparatus, comprising:
-
a computer processor configured to receive a timestamp from a timestamp recipient that includes a cleartext portion and a ciphertext portion and to receive a device identifier that identifies a timestamp device; a memory in communication with the computer processor and storing a program for directing the computer processor to utilize the device identifier to determine a cryptographic key, and to attempt to verify the timestamp by using a cryptographic operation on the timestamp, wherein the cryptographic operation is associated with the cryptographic key; and an output device, controlled by the computer processor, for communicating the results of the attempt to verify to the timestamp recipient, and for outputting a charge for a fee.
-
Specification