WO2002049269A1 - Electronic postmarking without directly utilizing an electronic postmark server - Google Patents

Electronic postmarking without directly utilizing an electronic postmark server Download PDF

Info

Publication number
WO2002049269A1
WO2002049269A1 PCT/US2001/047720 US0147720W WO0249269A1 WO 2002049269 A1 WO2002049269 A1 WO 2002049269A1 US 0147720 W US0147720 W US 0147720W WO 0249269 A1 WO0249269 A1 WO 0249269A1
Authority
WO
WIPO (PCT)
Prior art keywords
time
data
microepm
hash value
date stamp
Prior art date
Application number
PCT/US2001/047720
Other languages
French (fr)
Inventor
Charles R. Chamberlain
Original Assignee
United States Postal Service
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by United States Postal Service filed Critical United States Postal Service
Priority to US10/450,469 priority Critical patent/US7266696B2/en
Priority to AU2002235181A priority patent/AU2002235181A1/en
Priority to PCT/US2002/011380 priority patent/WO2002084945A1/en
Publication of WO2002049269A1 publication Critical patent/WO2002049269A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Definitions

  • the present invention relates to the field of generating electronic postmarks, and more specifically relates to the field of electronically postmarking data without directly utilizing a regular electronic postmark server.
  • An electronic postmark, or EPM provides content and temporal integrity and identification authenticity for data, which is transferred over a network.
  • the process of generating an EPM utilizing a regular EPM server is described in "Systems and Methods for Authenticating an Electronic Message," U.S. Serial No. 09/675,677 filed on September 29, 2000, which is expressly incorporated herein by reference.
  • the MicroEPM is a system and method for performing electronic postmarking of data without directly utilizing a regular electronic postmark (EPM) server.
  • the MicroEPM permits the generation of an electronic postmark off-line, which allows mobile devices or devices, which do not have a network, interface, to create EPMs for internally generated data.
  • the invention also permits devices, which are connected to a network to generate EPMs without having to interface with an EPM server. This capability could be useful when the processing overhead of communication with an EPM server is too great, or if the EPM server is unavailable due to network problems or server downtime.
  • systems and methods for performing electronic postmarking of data include receiving data from a data acquisition device; generating a MicroEPM data structure comprising a time stamp, a digital signature, and the received data; and transferring the MicroEPM data structure to a regular EPM server.
  • EPM electronic postmark
  • Figure 1 depicts a top level block diagram showing the operation of a system consistent with the invention
  • FIG. 2A depicts one embodiment consistent with the invention where the MicroEPM device is a separate, stand-alone unit;
  • FIG. 2B depicts an embodiment consistent with the invention where the MicroEPM device is physically incorporated into the data acquisition/generation device;
  • FIG. 3 shows a detailed block diagram of one embodiment consistent with the invention
  • Figure 4 provides an explanation of the trusted time boundaries
  • FIG. 5 depicts a flowchart showing the steps performed by MicroEPM device to generate a MicroEPM data structure. DESCRIPTION OF THE EMBODIMENTS
  • FIG. 1 shows a top-level block diagram of a system 100 consistent with the invention.
  • a sender 102 generates or captures digital data, such as an electronic mail message, using a data acquisition or generation device, such as a personal computer.
  • the data is received by a MicroEPM device 104, which generates a MicroEPM data structure using the received data, and stores the MicroEPM data structure in internal memory.
  • the MicroEPM data structure comprises a time and date stamp, a hash value of the received data, and a digital signature, and is described below in greater detail.
  • One or more MicroEPM data structures may be generated and stored on MicroEPM device 104, this number being limited by the amount of internal storage available.
  • MicroEPM device 104 may download the MicroEPM data structures, as a batch 106, via a network 108 to a regular EPM server 110. This downloading process allows the MicroEPM data structures to be processed and logged by EPM server 110.
  • EPM server 110 Upon receiving the batch of MicroEPM data structures, EPM server 110 will generate a batch EPM data structure corresponding MicroEPM data structure batch 106. Batch EPM data structure 106 may therefore correspond to a single MicroEPM data structure, or to a plurality of MicroEPM data structures.
  • EPM server 110 may then return the batch EPM data structure back to the sender 102 over a network 112, or optionally it may forward the batch EPM data structure to a receiver 116 via a network 114, who is the intended recipient of the data generated by sender 102.
  • FIG. 2A shows a MicroEPM device 104 as a separate, standalone unit.
  • a user 202 operates a data acquisition/generation device 204 to generate data for electronic postmarking.
  • Data acquisition/generation device 204 can be any kind of device, which stores information in a digital format. For example, it could be a digital camera, a digital video recorder, a personal digital assistant, a laptop computer, or any other type of electronic device, which generates or acquires digital data.
  • Data acquisition/generation device 204 supplies digital data to an external MicroEPM device 104 through an electronic interface 206.
  • Interface 206 could be, for example, a network such as TCP/IP, Local Area Network, or wireless network.
  • the interface could also be a standard serial or parallel interface such as an RS-232, Universal Serial Bus (USB), IEEE- 1394 (Firewire), or any other electronic interface known to those skilled in the art.
  • standard interface 206 allows MicroEPM device 104 to interface with a variety of different devices 204.
  • acquired digital data (not shown) is sent from data acquisition/generation device 204 over electronic interface 206 to external MicroEPM device 104.
  • MicroEPM device 104 generates a MicroEPM data structure for the acquired digital data and stores the MicroEPM data structure locally. This process can be repeated for each data acquisition session, thereby storing a plurality of MicroEPM data structures in MicroEPM device 104.
  • user 202 can download the MicroEPM data structures (either individually or in a batch) over network 108 to regular EPM server 110.
  • EPM server 110 would then generate a single EPM data structure for the batch of MicroEPM data structure and send this to an electronic address (not shown).
  • FIG. 2B shows a system including a MicroEPM device 104 " physically incorporated into a data acquisition/generation device 204 ⁇
  • data acquisition/generation device 204 " can be any kind of digital device which stores digital data. This digital data may be buffered in data acquisition/generation device 204 ⁇ and transferred to MicroEPM device 104 ' at the command of user 202. Alternatively, the digital data may be automatically transferred to internal MicroEPM device 104 " upon its generation. In this embodiment, MicroEPM device 104 " must be small enough to fit into portable data generation/acquisition device 204 " , and may therefore be implemented on one or more integrated circuits.
  • Data acquisition/generation device 204 " may connect to network 108 whereby the processed MicroEPM data structures may be submitted to regular EPM sever 110 for the generation of a batch EPM of the MicroEPM data structures.
  • FIG. 3 shows a detailed block diagram of MicroEPM device 104.
  • Digital data 301 arrives through an interface 302 from data acquisition/generation device 204(not shown) using a standard protocol.
  • a key interface 304 accepts a private key 303 from an official source, such as the United States Postal Service (USPS), or any other trusted entity which generates private keys (as described more fully in the aforementioned U.S. Postal Application No. 675,677/09) for the generation of MicroEPM data structures.
  • USPS United States Postal Service
  • a time signal providing time data is required to generate a MicroEPM data structure.
  • the time data may be generated from external time signals 305 derived from a reference broadcast source or may be generated internally using an internal clock circuit 306.
  • External time signals 305 may be received in the form of broadcast signals from a Global Positioning Satellite (GPS) system through a micro GPS receiver 308.
  • GPS Global Positioning Satellite
  • Another source of broadcast time signals is National Institute of Standards Technology radio station WWV.
  • Such broadcast sources supply highly accurate time signals that are a widely accepted reference, and therefore are considered a "trusted" time source.
  • a source is trusted if it is both known to be accurate, and it is secure from tampering.
  • external time signals may also be fed directly into the MicroEPM device using an external interface (not shown).
  • EPM server 110 may be the trusted time source.
  • Internal time data may be generated using timing circuits, such as quartz-oscillator/integrated circuit combinations that are used in wristwatches and are well known in the art.
  • the user may have control over this time data, such as the ability to manually set start and stop times. Because this data is under the control of a user, it is not secure from tampering. Therefore, such time data would not be considered "trusted.”
  • internal time data could be a "quasi-trusted" time source that is set once and then runs without stopping.
  • a quasi-trusted time source provides greater security of the time source and accuracy than a non- trusted source, but not the security and accuracy of the trusted time source.
  • Time data which is not from a trusted source, requires additional time data, such as, for example, external trusted time signal 305, provided from a trusted source in order to generate time stamps for the MicroEPM.
  • additional time data need not provide precise time data, but may provide a range of times providing trusted time "boundaries" for the internally generated time data.
  • the time boundaries may come from official EPM server 110. Details regarding time boundaries are set forth below.
  • a postmark generation unit 310 uses the time data, acquired digital data 301 from device 204, and acquired private key 303, a postmark generation unit 310 creates a MicroEPM data structure.
  • Postmark generation unit 310 could be a software module running on a general-purpose microprocessor, or a dedicated integrated circuit, such as an ASIC (Application Specific Integrated Circuit).
  • the MicroEPM data structure is subsequently stored in a postmark storage unit 312.
  • Postmark storage unit 312 typically comprises physical memory such as solid state RAM, or it could be a mass storage device such as a hard drive.
  • a plurality of MicroEPM data structures may be stored in postmark storage unit 312 as a single batch. At the user's command, the batch may be downloaded to EPM server 110 through secure a EPM interface 314.
  • FIG. 4 provides an explanation of the trusted time boundaries mentioned above. If the internal time data MicroEPM device 104 uses for postmarking does not come from a trusted time source, another time source must be used to be able to provide some level of temporal authenticity. Time stamps generated by EPM server 110 could be used to provide trusted time boundaries, which "anchor" the MicroEPM data structure's time stamps.
  • EPM server 110 or MicroEPM device 104 may wish to provide a single trusted time boundary. For example, some applications may only require authentication that digital data 301 was sent prior to a time certain. For such an application, a stop time reference received from a trusted time source, such as external time signals 305, can be added as a trusted time/ date stamp. Therefore, all digital data acquired before the trusted stop time reference is known to have been acquired before the stop time reference.
  • the trusted stop time reference may be received by EPM server 110 or from any other trusted source.
  • MicroEPM device 104 which does not use a trusted time source / date stamp, will include a trusted start time reference.
  • MicroEPM device 104 may have interfaced with a trusted time source at some point before digital data 301 was acquired. From the trusted time source , MicroEPM will receive a trusted time/date stamp that may be stored in memory.
  • MicroEPM device 104 may include this reference in a MicroEPM data structure as a trusted start time reference. In addition, it may also include a time/ date stamp from a source other than a trusted source.
  • MicroEPM device 104 may also provide both a start time reference 402 and stop time reference 404.
  • Start reference time 402 is encapsulated into each MicroEPM data structure. As such, it must be downloaded from EPM server 110 and stored locally on MicroEPM device 104. This downloading of start reference 402 may be done automatically after a batch of MicroEPM data structures are transferred to EPM server 110, or it may be done manually at the command of user 202. Therefore, the MicroEPM data structure may contain two separate pieces of time information: 1 ) a time stamp 408 which is generated by the internal clock, and 2) start-time reference 402 which bounds the initial time for each MicroEPM and may have been generated by EPM server 110. Stop time reference 404 is generated once EPM server 110 electronically postmarks the batch of MicroEPM data structures. All of the time stamps for the MicroEPM data structures 403, for a given batch, fall between start reference 402 and stop reference 404.
  • FIG. 5 shows the stages, which MicroEPM device 104 executes when generating a MicroEPM data structure.
  • a trusted time stamp may be acquired, stage 502, to serve as start reference time 402 for the batch of MicroEPM data structures 403.
  • Start time reference 402 may be received from EPM server 110.
  • Start reference time 402 is stored in memory on MicroEPM device 104.
  • another trusted time data source may be used if desired, stage 504.
  • the MicroEPM does not have a trusted time source, and must ensure that a digital message was acquired after a time certain, MicroEPM device 104 will acquire a trusted start time reference 402 at either stage 502 or stage 504.
  • MicroEPM device 104 includes a trusted time source, such as external signals 305, it may still acquire a trusted start time reference.
  • User 202 then acquires data, stage 506, which is passed to the MicroEPM device, stage 508.
  • the data is hashed, stage 510, typically using a one-way hash function. Any known or later developed hash function may be used. In one embodiment, a hash function, which produces a 64-bit key, is used. Therefore, the digital data is "frozen” (i.e. the integrity of the data may be checked at any time).
  • the hash is then time/date stamped, stage 512, using data generated by the internal time source. Alternatively, if the internal source is not a trusted source, EPM server start time reference 402, acquired prior to data acquisition, is also appended.
  • the MicroEPM device 104 produces a MicroEPM data structure.
  • the hash value, internal time stamp, and start time reference (if acquired) are digitally signed using private key 303.
  • the digital signature and hash value comprise the MicroEPM data structure, which is placed in batch storage, stage 514.
  • hash value, internal time stamp, start time reference (if acquired) as well as the digital data may be digitally signed.
  • a MicroEPM data structure may be comprised of the hash value, the digital signature and a copy of the digital data.
  • the process may loop back 516, to process additional MicroEPM data structures. After all the MicroEPM data structures are batched in memory, the batch may be optionally be hashed, stage 518, for additional security.
  • the MicroEPM data structures are then sent to regular EPM server 110 over network 108 in order to generate a "standard" EPM data structure for the batch, such as by appending a new trusted time/ date stamp to the batch of MicroEPM data structures and hashing the new time date stamp, and the batch of MicroEPM data structures, stage 520.
  • User 202 may then acquire, stage 522, the current EPM time/date stamp from server 110 and store it as the new start reference.

Abstract

Systems and methods for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server (110), including receiving data from a data acquisition device (102), generating a MicroEPM data structure (106) comprising a time stamp, a digital signature, and the received data and transferring the MicroEPM data structure (106) to a regular EPM server (110).

Description

ELECTRONIC POSTMARKING WITHOUT DIRECTLY UTILIZING AN ELECTRONIC POSTMARK SERVER
DESCRIPTION
Field of the Invention
[001] The present invention relates to the field of generating electronic postmarks, and more specifically relates to the field of electronically postmarking data without directly utilizing a regular electronic postmark server.
Cross Reference to Related Applications
[002] This application claims the benefit of provisional application "System and Method for Performing Electronic Postmarking without Directly utilizing an Electronic Postmark Server," filed December 15, 2000 and assigned Serial No. 60/255,432.
[003] Application Serial No. 60/255,432 is expressly incorporated herein by reference.
Background
[004] An electronic postmark, or EPM, provides content and temporal integrity and identification authenticity for data, which is transferred over a network. The process of generating an EPM utilizing a regular EPM server is described in "Systems and Methods for Authenticating an Electronic Message," U.S. Serial No. 09/675,677 filed on September 29, 2000, which is expressly incorporated herein by reference. [005] The MicroEPM is a system and method for performing electronic postmarking of data without directly utilizing a regular electronic postmark (EPM) server. The MicroEPM permits the generation of an electronic postmark off-line, which allows mobile devices or devices, which do not have a network, interface, to create EPMs for internally generated data. Furthermore, the invention also permits devices, which are connected to a network to generate EPMs without having to interface with an EPM server. This capability could be useful when the processing overhead of communication with an EPM server is too great, or if the EPM server is unavailable due to network problems or server downtime.
SUMMARY
[006] In accordance with the invention, systems and methods for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server, include receiving data from a data acquisition device; generating a MicroEPM data structure comprising a time stamp, a digital signature, and the received data; and transferring the MicroEPM data structure to a regular EPM server.
[007] Additional objects and advantages will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice. The objects and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. [008] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
[009] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate several embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
[010] Figure 1 depicts a top level block diagram showing the operation of a system consistent with the invention;
[011] Figure 2A depicts one embodiment consistent with the invention where the MicroEPM device is a separate, stand-alone unit;
[012] Figure 2B depicts an embodiment consistent with the invention where the MicroEPM device is physically incorporated into the data acquisition/generation device;
[013] Figure 3 shows a detailed block diagram of one embodiment consistent with the invention;
[014] Figure 4 provides an explanation of the trusted time boundaries; and
[015] Figure 5 depicts a flowchart showing the steps performed by MicroEPM device to generate a MicroEPM data structure. DESCRIPTION OF THE EMBODIMENTS
[016] Reference will now be made in detail to the exemplary embodiments illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
[017] Figure 1 shows a top-level block diagram of a system 100 consistent with the invention. A sender 102 generates or captures digital data, such as an electronic mail message, using a data acquisition or generation device, such as a personal computer. The data is received by a MicroEPM device 104, which generates a MicroEPM data structure using the received data, and stores the MicroEPM data structure in internal memory. The MicroEPM data structure comprises a time and date stamp, a hash value of the received data, and a digital signature, and is described below in greater detail. One or more MicroEPM data structures may be generated and stored on MicroEPM device 104, this number being limited by the amount of internal storage available. Once a set, or batch, of MicroEPM data structures (consisting of one or more Micro EPM data structures) are accumulated on MicroEPM device 104 over some period of time, MicroEPM device 104 may download the MicroEPM data structures, as a batch 106, via a network 108 to a regular EPM server 110. This downloading process allows the MicroEPM data structures to be processed and logged by EPM server 110. Upon receiving the batch of MicroEPM data structures, EPM server 110 will generate a batch EPM data structure corresponding MicroEPM data structure batch 106. Batch EPM data structure 106 may therefore correspond to a single MicroEPM data structure, or to a plurality of MicroEPM data structures. EPM server 110 may then return the batch EPM data structure back to the sender 102 over a network 112, or optionally it may forward the batch EPM data structure to a receiver 116 via a network 114, who is the intended recipient of the data generated by sender 102.
[018] Figure 2A shows a MicroEPM device 104 as a separate, standalone unit. A user 202 operates a data acquisition/generation device 204 to generate data for electronic postmarking. Data acquisition/generation device 204 can be any kind of device, which stores information in a digital format. For example, it could be a digital camera, a digital video recorder, a personal digital assistant, a laptop computer, or any other type of electronic device, which generates or acquires digital data. Data acquisition/generation device 204 supplies digital data to an external MicroEPM device 104 through an electronic interface 206. Interface 206 could be, for example, a network such as TCP/IP, Local Area Network, or wireless network. The interface could also be a standard serial or parallel interface such as an RS-232, Universal Serial Bus (USB), IEEE- 1394 (Firewire), or any other electronic interface known to those skilled in the art. The use of standard interface 206 allows MicroEPM device 104 to interface with a variety of different devices 204.
[019] At the user's command, acquired digital data (not shown) is sent from data acquisition/generation device 204 over electronic interface 206 to external MicroEPM device 104. MicroEPM device 104 generates a MicroEPM data structure for the acquired digital data and stores the MicroEPM data structure locally. This process can be repeated for each data acquisition session, thereby storing a plurality of MicroEPM data structures in MicroEPM device 104. Afterwards, user 202 can download the MicroEPM data structures (either individually or in a batch) over network 108 to regular EPM server 110. EPM server 110 would then generate a single EPM data structure for the batch of MicroEPM data structure and send this to an electronic address (not shown).
[020] Figure 2B shows a system including a MicroEPM device 104" physically incorporated into a data acquisition/generation device 204\ As above, data acquisition/generation device 204" can be any kind of digital device which stores digital data. This digital data may be buffered in data acquisition/generation device 204\ and transferred to MicroEPM device 104' at the command of user 202. Alternatively, the digital data may be automatically transferred to internal MicroEPM device 104" upon its generation. In this embodiment, MicroEPM device 104" must be small enough to fit into portable data generation/acquisition device 204", and may therefore be implemented on one or more integrated circuits. Data acquisition/generation device 204" may connect to network 108 whereby the processed MicroEPM data structures may be submitted to regular EPM sever 110 for the generation of a batch EPM of the MicroEPM data structures.
[021] Figure 3 shows a detailed block diagram of MicroEPM device 104. Digital data 301 arrives through an interface 302 from data acquisition/generation device 204(not shown) using a standard protocol. A key interface 304 accepts a private key 303 from an official source, such as the United States Postal Service (USPS), or any other trusted entity which generates private keys (as described more fully in the aforementioned U.S. Postal Application No. 675,677/09) for the generation of MicroEPM data structures.
[022] A time signal providing time data is required to generate a MicroEPM data structure. The time data may be generated from external time signals 305 derived from a reference broadcast source or may be generated internally using an internal clock circuit 306. External time signals 305 may be received in the form of broadcast signals from a Global Positioning Satellite (GPS) system through a micro GPS receiver 308. Another source of broadcast time signals is National Institute of Standards Technology radio station WWV. Such broadcast sources supply highly accurate time signals that are a widely accepted reference, and therefore are considered a "trusted" time source. A source is trusted if it is both known to be accurate, and it is secure from tampering. Optionally, external time signals may also be fed directly into the MicroEPM device using an external interface (not shown). In addition, EPM server 110 may be the trusted time source.
[023] Internal time data may be generated using timing circuits, such as quartz-oscillator/integrated circuit combinations that are used in wristwatches and are well known in the art. The user may have control over this time data, such as the ability to manually set start and stop times. Because this data is under the control of a user, it is not secure from tampering. Therefore, such time data would not be considered "trusted."
[024] Alternatively, internal time data could be a "quasi-trusted" time source that is set once and then runs without stopping. A quasi-trusted time source provides greater security of the time source and accuracy than a non- trusted source, but not the security and accuracy of the trusted time source.
[025] Time data, which is not from a trusted source, requires additional time data, such as, for example, external trusted time signal 305, provided from a trusted source in order to generate time stamps for the MicroEPM. This additional data need not provide precise time data, but may provide a range of times providing trusted time "boundaries" for the internally generated time data. The time boundaries may come from official EPM server 110. Details regarding time boundaries are set forth below.
[026] Further referring to Figure 3, using the time data, acquired digital data 301 from device 204, and acquired private key 303, a postmark generation unit 310 creates a MicroEPM data structure. Postmark generation unit 310 could be a software module running on a general-purpose microprocessor, or a dedicated integrated circuit, such as an ASIC (Application Specific Integrated Circuit). Afterwards, the MicroEPM data structure is subsequently stored in a postmark storage unit 312. Postmark storage unit 312 typically comprises physical memory such as solid state RAM, or it could be a mass storage device such as a hard drive. A plurality of MicroEPM data structures may be stored in postmark storage unit 312 as a single batch. At the user's command, the batch may be downloaded to EPM server 110 through secure a EPM interface 314.
[027] Figure 4 provides an explanation of the trusted time boundaries mentioned above. If the internal time data MicroEPM device 104 uses for postmarking does not come from a trusted time source, another time source must be used to be able to provide some level of temporal authenticity. Time stamps generated by EPM server 110 could be used to provide trusted time boundaries, which "anchor" the MicroEPM data structure's time stamps.
[028] In one embodiment, EPM server 110 or MicroEPM device 104 may wish to provide a single trusted time boundary. For example, some applications may only require authentication that digital data 301 was sent prior to a time certain. For such an application, a stop time reference received from a trusted time source, such as external time signals 305, can be added as a trusted time/ date stamp. Therefore, all digital data acquired before the trusted stop time reference is known to have been acquired before the stop time reference. The trusted stop time reference may be received by EPM server 110 or from any other trusted source.
[029] In addition, for other applications, it may be necessary to know only that digital data 301 was acquired by MicroEPM device 104 after a time certain. In one embodiment, MicroEPM device 104, which does not use a trusted time source / date stamp, will include a trusted start time reference. For example, MicroEPM device 104 may have interfaced with a trusted time source at some point before digital data 301 was acquired. From the trusted time source , MicroEPM will receive a trusted time/date stamp that may be stored in memory. MicroEPM device 104 may include this reference in a MicroEPM data structure as a trusted start time reference. In addition, it may also include a time/ date stamp from a source other than a trusted source. [030] MicroEPM device 104 may also provide both a start time reference 402 and stop time reference 404. Start reference time 402 is encapsulated into each MicroEPM data structure. As such, it must be downloaded from EPM server 110 and stored locally on MicroEPM device 104. This downloading of start reference 402 may be done automatically after a batch of MicroEPM data structures are transferred to EPM server 110, or it may be done manually at the command of user 202. Therefore, the MicroEPM data structure may contain two separate pieces of time information: 1 ) a time stamp 408 which is generated by the internal clock, and 2) start-time reference 402 which bounds the initial time for each MicroEPM and may have been generated by EPM server 110. Stop time reference 404 is generated once EPM server 110 electronically postmarks the batch of MicroEPM data structures. All of the time stamps for the MicroEPM data structures 403, for a given batch, fall between start reference 402 and stop reference 404.
[031] Figure 5 shows the stages, which MicroEPM device 104 executes when generating a MicroEPM data structure. Initially, a trusted time stamp may be acquired, stage 502, to serve as start reference time 402 for the batch of MicroEPM data structures 403. Start time reference 402 may be received from EPM server 110. Start reference time 402 is stored in memory on MicroEPM device 104. Optionally, another trusted time data source may be used if desired, stage 504. In one embodiment, if the MicroEPM does not have a trusted time source, and must ensure that a digital message was acquired after a time certain, MicroEPM device 104 will acquire a trusted start time reference 402 at either stage 502 or stage 504. However, if MicroEPM device 104 includes a trusted time source, such as external signals 305, it may still acquire a trusted start time reference.
[032] User 202 then acquires data, stage 506, which is passed to the MicroEPM device, stage 508. The data is hashed, stage 510, typically using a one-way hash function. Any known or later developed hash function may be used. In one embodiment, a hash function, which produces a 64-bit key, is used. Therefore, the digital data is "frozen" (i.e. the integrity of the data may be checked at any time). The hash is then time/date stamped, stage 512, using data generated by the internal time source. Alternatively, if the internal source is not a trusted source, EPM server start time reference 402, acquired prior to data acquisition, is also appended.
[033] At stage 514, the MicroEPM device 104 produces a MicroEPM data structure. In one embodiment, the hash value, internal time stamp, and start time reference (if acquired) are digitally signed using private key 303. In one embodiment, the digital signature and hash value comprise the MicroEPM data structure, which is placed in batch storage, stage 514. In another embodiment, hash value, internal time stamp, start time reference (if acquired) as well as the digital data may be digitally signed. In such a case, a MicroEPM data structure may be comprised of the hash value, the digital signature and a copy of the digital data.
[034] The process may loop back 516, to process additional MicroEPM data structures. After all the MicroEPM data structures are batched in memory, the batch may be optionally be hashed, stage 518, for additional security. The MicroEPM data structures are then sent to regular EPM server 110 over network 108 in order to generate a "standard" EPM data structure for the batch, such as by appending a new trusted time/ date stamp to the batch of MicroEPM data structures and hashing the new time date stamp, and the batch of MicroEPM data structures, stage 520. User 202 may then acquire, stage 522, the current EPM time/date stamp from server 110 and store it as the new start reference.
[035] Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

Claims

WHAT IS CLAIMED IS:
1. A method for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server, the method comprising: receiving data from a data acquisition device; generating a MicroEPM data structure comprising a hash value of the received data and a digital signature; and transferring the MicroEPM data structure to a regular EPM server.
2. The method of claim 1 , further including: generating a time/date stamp from a time source; and hashing the time/date stamp and the received data to produce a hash value.
3. The method of claim 2, wherein the time source is not a trusted source, and further including: acquiring a trusted start time reference; and wherein hashing includes hashing the trusted start time reference, the time/date stamp, and the digital data to produce a hash value.
4. The method of claim 3, wherein acquiring a trusted start time reference further includes: receiving an external time signal from a broadcast source.
5. The method of claim 4, wherein the broadcast source is a GPS system and wherein acquiring a trusted start time reference further includes: receiving an external time signal from the GPS system
6. The method of claim 2, further including: digitally signing the hash value, and the time/date stamp to produce a digital signature.
7. The method of claim 6 wherein digitally signing further includes: digitally signing the hash value, the time/date stamp and the digital data.
8. The method of claim 1 , further including: generating a time/ date stamp from a time source; and digitally signing the hash value and the time/date stamp to produce a digital signature.
9. The method of claim 8, further wherein digitally signing further includes digitally signing the hash value, the time/date stamp and the digital data to produce a digital signature.
10. The method of claim 8, wherein the time source is not a trusted time source and wherein the method further includes: acquiring a trusted start time reference; and digitally signing the signing the hash value, the trusted start time reference, and the time/date stamp to produce a digital signature.
11. The method of claim 10, wherein the digitally signing further
includes: digitally signing the signing the hash value, the trusted start time reference, the time/date stamp, and the digital data to produce a digital signature.
12. The method of claim 1 , wherein generating further includes: generating a MicroEPM data structure comprising a hash value, a digital signature, and the received digital data.
13. The method of claim 1 , further including: storing the generated MicroEPM data structure in a batch of generated MicroEPM data structures; and wherein the step of transferring includes transferring the batch of stored MicroEPM data structures.
14. The method of claim 13, further including: acquiring a new trusted start reference.
15. The method of claim 1 , further including: processing, by the regular EPM server, the transferred MicroEPM data structures.
16. The method of claim 15, wherein processing includes: generating an EPM data structure corresponding to the transferred
MicroEPM data structure.
17. The method of claim 15, wherein processing includes: generating a trusted time/date stamp; hashing the time/date stamp and the batch of MicroEPM data structures to produce a second hash value; and generating an EPM data structure comprising the second hash value.
18. The method of claim 17, wherein generating further includes generating an EPM data structure comprising the second hash value and the batch of MicroEPM data structures.
19. A method for performing electronic postmarking of data, without directly utilizing a regular EPM server, comprising: receiving data from a data acquisition device; generating a time/date stamp; hashing the data and the time/ date stamp to produce a hash value; digitally signing the hash value and the time/date stamp; generating a MicroEPM data structure comprising the hash value and the digital signature; storing the MicroEPM data structure in a batch; and sending a batch of stored MicroEPM data structures to a regular EPM server.
20. An apparatus for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server, comprising: means for receiving data from a data acquisition device; means for generating a MicroEPM data structure comprising a hash value and a digital signature; and an interface for transferring the MicroEPM data structure to a regular EPM server.
21. The apparatus of claim 20, further including: means for acquiring a time/date stamp; and means for hashing the time/date stamp and the received data to produce a hash value.
22. The apparatus of claim 21 , wherein the time/date stamp is not from a trusted source, and wherein the apparatus further includes: means for acquiring a trusted start time reference; and means for hashing the trusted start time reference, the time/date stamp and the digital data to produce a hash value.
23. The apparatus of claim 22, further including: an interface for receiving an external time signal from a broadcast source.
24. The apparatus of claim 23, wherein the broadcast source is a GPS system and wherein the apparatus further includes: a GPS signal receiver.
25. The apparatus of claim 21 , further including: means for digitally signing the hash value and the time date stamp to produce a digital signature.
26. The apparatus of claim 25 further including: means for digitally signing the hash value, the time/date stamp, and the digital data.
27. The apparatus of claim 20, further including: means for acquiring a time/ date stamp; and means for digitally signing the hash value and the time date stamp to produce a digital signature.
28. The apparatus of claim 27, further including: means for digitally signing the hash value, the time date stamp, and the digital data to produce a digital signature.
29. The apparatus of claim 27, wherein the time/ date stamp is not from a trusted source and wherein the apparatus further includes: an interface for acquiring a trusted start time reference; and means for digitally signing the signing the hash value, the trusted start time reference, and the time/date stamp to produce a digital signature.
30. The apparatus of claim 29, further including: means for digitally signing the signing the hash value, the trusted start time reference, the time/date stamp, and the digital data to produce a digital signature.
31. The apparatus of claim 20, further including: means for generating a MicroEPM data structure comprising a hash value, a digital signature, and the received digital data.
32. The apparatus of claim 20, further including: a memory for storing the generated MicroEPM data structure in a batch of generated MicroEPM data structures; and an interface for transferring the batch of stored MicroEPM data structures.
33. The apparatus of claim 32, further including: means acquiring a new trusted start reference.
34. The apparatus of claim 20, further including: means for processing, by the regular EPM server, the transferred MicroEPM data structures.
35. The apparatus of claim 34, further including: means for generating an EPM data structure corresponding to the transferred MicroEPM data structure.
36. The apparatus of claim 34, further including: means for generating a trusted time/date stamp; means for hashing the time/date stamp and the batch of MicroEPM data structures; to produce a second hash value; and means for generating an EPM data structure comprising the second hash value.
37. The apparatus of claim 36, further including; means for generating an EPM data structure comprising the second hash value and the batch of MicroEPM data structures.
38. The apparatus of claim 20, the means for receiving data further comprises an internal data acquisition device.
39. The apparatus of claim 20, wherein the means for receiving data further comprises an interface for receiving data from an external data acquisition/generation device.
PCT/US2001/047720 2000-12-15 2001-12-17 Electronic postmarking without directly utilizing an electronic postmark server WO2002049269A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US10/450,469 US7266696B2 (en) 2000-12-15 2001-12-17 Electronic postmarking without directly utilizing an electronic postmark server
AU2002235181A AU2002235181A1 (en) 2000-12-15 2001-12-17 Electronic postmarking without directly utilizing an electronic postmark server
PCT/US2002/011380 WO2002084945A1 (en) 2001-04-12 2002-04-12 Systems and methods for electronic postmarking of data including location data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US25543200P 2000-12-15 2000-12-15
US60/255,432 2000-12-15

Publications (1)

Publication Number Publication Date
WO2002049269A1 true WO2002049269A1 (en) 2002-06-20

Family

ID=22968300

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/047720 WO2002049269A1 (en) 2000-12-15 2001-12-17 Electronic postmarking without directly utilizing an electronic postmark server

Country Status (3)

Country Link
US (1) US7266696B2 (en)
AU (1) AU2002235181A1 (en)
WO (1) WO2002049269A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040039912A1 (en) * 1999-02-26 2004-02-26 Bitwise Designs, Inc. To Authentidate Holding Corp. Computer networked system and method of digital file management and authentication
EP1159799B1 (en) * 1999-02-26 2006-07-26 Bitwise Designs, Inc. Digital file management and imaging system and method including secure file marking
WO2003021476A1 (en) * 2001-08-31 2003-03-13 Trac Medical Solutions, Inc. System for interactive processing of form documents
US8108322B2 (en) 2002-07-29 2012-01-31 United States Postal Services PC postage™ service indicia design for shipping label
DE10311634A1 (en) * 2003-03-14 2004-09-30 Authentidate International Ag Electronic transmission of documents
US8374930B2 (en) * 2009-02-02 2013-02-12 Trustifi Corporation Certified email system and method
US8341023B2 (en) * 2009-06-17 2012-12-25 Trustifi Corporation Certified email system and method
WO2016149047A1 (en) * 2015-03-13 2016-09-22 United States Postal Service Methods and systems for data authentication services
US11132685B1 (en) 2020-04-15 2021-09-28 Capital One Services, Llc Systems and methods for automated identity verification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5923763A (en) * 1996-03-21 1999-07-13 Walker Asset Management Limited Partnership Method and apparatus for secure document timestamping
US6119228A (en) * 1997-08-22 2000-09-12 Compaq Computer Corporation Method for securely communicating remote control commands in a computer network
WO2001003363A1 (en) * 1999-07-02 2001-01-11 Time Certain, Llc System and methods for proving dates in digital data files
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents

Family Cites Families (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4675841A (en) 1974-12-23 1987-06-23 Pitney Bowes Inc. Micro computerized electronic postage meter system
US3978457A (en) 1974-12-23 1976-08-31 Pitney-Bowes, Inc. Microcomputerized electronic postage meter system
US4097923A (en) 1975-04-16 1978-06-27 Pitney-Bowes, Inc. Remote postage meter charging system using an advanced microcomputerized postage meter
US4271481A (en) 1976-06-10 1981-06-02 Pitney Bowes Inc. Micro computerized electronic postage meter system
US4093999A (en) 1976-12-01 1978-06-06 Vickers Limited Electronic franking machines
US4376299A (en) 1980-07-14 1983-03-08 Pitney Bowes, Inc. Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals
US4660221A (en) 1983-07-18 1987-04-21 Pitney Bowes Inc. System for printing encrypted messages with bar-code representation
US4641346A (en) 1983-07-21 1987-02-03 Pitney Bowes Inc. System for the printing and reading of encrypted messages
US4641347A (en) 1983-07-18 1987-02-03 Pitney Bowes Inc. System for printing encrypted messages with a character generator and bar-code representation
US4637051A (en) 1983-07-18 1987-01-13 Pitney Bowes Inc. System having a character generator for printing encrypted messages
US4775246A (en) 1985-04-17 1988-10-04 Pitney Bowes Inc. System for detecting unaccounted for printing in a value printing system
US4743747A (en) 1985-08-06 1988-05-10 Pitney Bowes Inc. Postage and mailing information applying system
US4831555A (en) 1985-08-06 1989-05-16 Pitney Bowes Inc. Unsecured postage applying system
US4725718A (en) 1985-08-06 1988-02-16 Pitney Bowes Inc. Postage and mailing information applying system
US4757537A (en) 1985-04-17 1988-07-12 Pitney Bowes Inc. System for detecting unaccounted for printing in a value printing system
US4835713A (en) 1985-08-06 1989-05-30 Pitney Bowes Inc. Postage meter with coded graphic information in the indicia
US4812965A (en) 1985-08-06 1989-03-14 Pitney Bowes Inc. Remote postage meter insepction system
US4907161A (en) 1985-12-26 1990-03-06 Pitney Bowes Inc. Batch mailing system
US4999481A (en) 1985-12-26 1991-03-12 Pitney Bowes Inc. Method and apparatus for sequentially numbering mail pieces
US4837701A (en) 1985-12-26 1989-06-06 Pitney Bowes Inc. Mail processing system with multiple work stations
US4853864A (en) 1985-12-26 1989-08-01 Pitney Bowes Inc. Mailing systems having postal funds management
US4760534A (en) 1985-12-26 1988-07-26 Pitney Bowes Inc. Mailing system with postage value transfer and accounting capability
US4853865A (en) 1985-12-26 1989-08-01 Pitney Bowes Inc. Mailing system with postage value printing capability
US4812992A (en) 1986-04-10 1989-03-14 Pitney Bowes Inc. Postage meter communication system
US4811234A (en) 1986-04-10 1989-03-07 Pitney Bowes Inc. Postage meter recharging system
US4864506A (en) 1986-04-10 1989-09-05 Pitney Bowes Inc. Postage meter recharging system
US5375172A (en) 1986-07-07 1994-12-20 Chrosny; Wojciech M. Postage payment system employing encryption techniques and accounting for postage payment at a time subsequent to the printing of postage
US4809185A (en) 1986-09-02 1989-02-28 Pitney Bowes Inc. Secure metering device storage vault for a value printing system
ATE160039T1 (en) 1986-09-02 1997-11-15 Pitney Bowes Inc AUTOMATED TRANSACTION SYSTEM USING INSERTABLE CARDS FOR REMOTE LOADING FEES OR UTILITY DATA
US4858138A (en) 1986-09-02 1989-08-15 Pitney Bowes, Inc. Secure vault having electronic indicia for a value printing system
US5200903A (en) 1987-07-09 1993-04-06 Alcatel Business Systems Ltd. Franking machine
US4873645A (en) 1987-12-18 1989-10-10 Pitney Bowes, Inc. Secure postage dispensing system
CA1301335C (en) 1988-02-08 1992-05-19 Robert K.T. Chen Postage meter value card system
GB8804689D0 (en) 1988-02-29 1988-03-30 Alcatel Business Systems Franking system
US5258906A (en) 1988-07-13 1993-11-02 Vital Heart Systems, Inc. System for remotely authorizing operation of a device and for automatically generating an invoice based on device usage
US4949381A (en) 1988-09-19 1990-08-14 Pitney Bowes Inc. Electronic indicia in bit-mapped form
US5019991A (en) 1988-12-16 1991-05-28 Pitney Bowes Inc. Certified weigher-short paid mail
US5189700A (en) 1989-07-05 1993-02-23 Blandford Robert R Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents
GB2233937B (en) 1989-07-13 1993-10-06 Pitney Bowes Plc A machine incorporating an accounts verification system
US5337361C1 (en) 1990-01-05 2001-05-15 Symbol Technologies Inc Record with encoded data
DE4003006A1 (en) 1990-01-30 1991-08-01 Francotyp Postalia Gmbh METHOD FOR IDENTIFYING MACHINE AND VALUE STAMPING MACHINES
US5022080A (en) 1990-04-16 1991-06-04 Durst Robert T Electronic notary
DE4018166C2 (en) 1990-06-01 1994-12-01 Francotyp Postalia Gmbh Franking module
US5869819A (en) 1994-08-17 1999-02-09 Metrologic Instuments Inc. Internet-based system and method for tracking objects bearing URL-encoded bar code symbols
US6076733A (en) 1993-11-24 2000-06-20 Metrologic Instruments, Inc. Web-based system and method for enabling a viewer to access and display HTML-encoded documents located on the world wide web (WWW) by reading URL-encoded bar code symbols printed on a web-based information resource guide
US5224046A (en) 1990-09-13 1993-06-29 Pitney Bowes Inc. System for recharging a plurality of postage meters
US5202914A (en) 1990-09-13 1993-04-13 Pitney Bowes Inc. System for resetting a postage meter
US5293319A (en) 1990-12-24 1994-03-08 Pitney Bowes Inc. Postage meter system
US5319562A (en) 1991-08-22 1994-06-07 Whitehouse Harry T System and method for purchase and application of postage using personal computer
US5280531A (en) 1991-10-28 1994-01-18 Pitney Bowes Inc. Apparatus for the analysis of postage meter usage
US5309363A (en) 1992-03-05 1994-05-03 Frank M. Graves Remotely rechargeable postage meter
US5308932A (en) 1992-09-25 1994-05-03 Pitney Bowes Inc. Mail processing system for verifying postage amount
US5490217A (en) 1993-03-05 1996-02-06 Metanetics Corporation Automatic document handling system
JP3394795B2 (en) 1993-07-16 2003-04-07 株式会社東芝 Object processing apparatus and object processing method
US5390251A (en) 1993-10-08 1995-02-14 Pitney Bowes Inc. Mail processing system including data center verification for mailpieces
US5457642A (en) 1993-10-08 1995-10-10 Pitney Bowes Inc. Mail processing system including required data center verification
US5422954A (en) 1993-11-04 1995-06-06 Pitney Bowes Inc. Apparatus and method of producing a self printed inspection label
US6233568B1 (en) 1994-01-03 2001-05-15 E-Stamp Corporation System and method for automatically providing shipping/transportation fees
US5606507A (en) 1994-01-03 1997-02-25 E-Stamp Corporation System and method for storing, retrieving and automatically printing postage on mail
GB9401789D0 (en) 1994-01-31 1994-03-23 Neopost Ltd Franking machine
GB9401757D0 (en) 1994-01-31 1994-03-23 Neopost Ltd Franking machine
JP3231545B2 (en) 1994-06-28 2001-11-26 富士通株式会社 Optical frequency stabilizer
US5586036A (en) 1994-07-05 1996-12-17 Pitney Bowes Inc. Postage payment system with security for sensitive mailer data and enhanced carrier data functionality
US5612889A (en) 1994-10-04 1997-03-18 Pitney Bowes Inc. Mail processing system with unique mailpiece authorization assigned in advance of mailpieces entering carrier service mail processing stream
US5535279A (en) 1994-12-15 1996-07-09 Pitney Bowes Inc. Postage accounting system including means for transmitting a bit-mapped image of variable information for driving an external printer
US5583779A (en) 1994-12-22 1996-12-10 Pitney Bowes Inc. Method for preventing monitoring of data remotely sent from a metering accounting vault to digital printer
US5717596A (en) 1995-02-15 1998-02-10 Pitney Bowes Inc. Method and system for franking, accounting, and billing of mail services
GB9505433D0 (en) 1995-03-17 1995-05-03 Neopost Ltd Postage meter system and verification of postage charges
US6308991B1 (en) 1995-10-16 2001-10-30 Oberthur Gaming Technologies, Inc. Printed document including bar code authentication system
US6285990B1 (en) 1995-12-19 2001-09-04 Pitney Bowes Inc. Method for reissuing digital tokens in an open metering system
GB9601946D0 (en) 1996-01-31 1996-04-03 Neopost Ltd Postage metering system
US6321992B1 (en) 1997-03-19 2001-11-27 Metrologic Instruments, Inc. Internet-based system and method for tracking objects bearing URL-encoded bar code symbols
US5978781A (en) 1997-05-08 1999-11-02 Pitney Bowes Inc. Digital printing, metering, and recording of other post services on the face of a mail piece
US6311892B1 (en) 1997-08-12 2001-11-06 Bell & Howell Postal Systems, Inc. Automatic system for verifying articles containing indicia thereon
US6006211A (en) 1997-09-05 1999-12-21 Pitney Bowes Inc. Metering incoming deliverable mail to identify delivery delays
US6032138A (en) 1997-09-05 2000-02-29 Pitney Bowes Inc. Metering incoming deliverable mail
US6064995A (en) 1997-09-05 2000-05-16 Pitney Bowes Inc. Metering incoming mail to detect fraudulent indicia
US6125357A (en) 1997-10-03 2000-09-26 Pitney Bowes Inc. Digital postal indicia employing machine and human verification
US6064993A (en) 1997-12-18 2000-05-16 Pitney Bowes Inc. Closed system virtual postage meter
US6112193A (en) 1998-05-22 2000-08-29 Pitney Bowes Inc. Reading encrypted data on a mail piece to cancel the mail piece
US6408286B1 (en) 1998-12-30 2002-06-18 Pitney Bowes Inc. Postage printing system having a digital coupon distribution system
US6549892B1 (en) 1999-05-21 2003-04-15 Pitney Bowes Inc. System for delivering mail
US7299210B2 (en) 2000-02-16 2007-11-20 Stamps.Com On-line value-bearing indicium printing using DSA
US20020019938A1 (en) 2000-08-04 2002-02-14 Aarons Michael Thomas Method and apparatus for secure identification for networked environments
EP1325447A4 (en) 2000-09-07 2006-02-08 Us Postal Service Methods for automated access to shipping services
US20030225711A1 (en) 2002-02-20 2003-12-04 Martin Paping Method and apparatus for postal user identification and billing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010002485A1 (en) * 1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5923763A (en) * 1996-03-21 1999-07-13 Walker Asset Management Limited Partnership Method and apparatus for secure document timestamping
US6119228A (en) * 1997-08-22 2000-09-12 Compaq Computer Corporation Method for securely communicating remote control commands in a computer network
WO2001003363A1 (en) * 1999-07-02 2001-01-11 Time Certain, Llc System and methods for proving dates in digital data files

Also Published As

Publication number Publication date
US20040034780A1 (en) 2004-02-19
US7266696B2 (en) 2007-09-04
AU2002235181A1 (en) 2002-06-24

Similar Documents

Publication Publication Date Title
US8417958B2 (en) Systems and methods for electronic postmarking of data including location data
US8189048B2 (en) Vehicle speed monitoring system
US8095797B2 (en) Systems and methods for authenticating an electronic message
KR100448960B1 (en) Time stamp producing system
US7890765B2 (en) Generating and verifying trusted digital time stamp
US9667444B2 (en) Data transmission and reception system with accurate time information
US7266696B2 (en) Electronic postmarking without directly utilizing an electronic postmark server
US20130117572A1 (en) Portable electronic device, system and method for authenticating a document associated with a geographical location
JP2007060668A (en) Authenticating data units of mobile communications device
WO2008063850A2 (en) System and methods for digital file management and authentication
GB2462163A (en) Digital Camera with automatic image and metadata encryption.
EP1391697B1 (en) Measurement authentication
CN113239341B (en) Identity authentication method, equipment and system independent of user real characteristic information
JP4125975B2 (en) Time stamp system and program thereof
JP3963315B2 (en) Time authentication method, time authentication request program, and time authentication request device
JP6870462B2 (en) Verification system, verification device, information generator, program
EP1520439B1 (en) Method in a mobile telecommunication network for obtaining location and time information about users
US7949878B2 (en) Telecommunication-assisted time stamp
EP1122928A3 (en) A system and method for authentication of electronic messages sent to a network server
WO2002084945A1 (en) Systems and methods for electronic postmarking of data including location data
JP2004126967A (en) Time stamp device and its program medium
JP2002185449A (en) Time seal issuing apparatus
JP2003242061A (en) Delivery processing system, delivery processing device and terminal device
CN116915408A (en) Module, method and system for generating data blocks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 10450469

Country of ref document: US

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP