US20160196297A1 - Method and system for time-stamping a document the state of which changes over time - Google Patents

Method and system for time-stamping a document the state of which changes over time Download PDF

Info

Publication number
US20160196297A1
US20160196297A1 US14/909,925 US201414909925A US2016196297A1 US 20160196297 A1 US20160196297 A1 US 20160196297A1 US 201414909925 A US201414909925 A US 201414909925A US 2016196297 A1 US2016196297 A1 US 2016196297A1
Authority
US
United States
Prior art keywords
time
document
signature
value
stamping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/909,925
Inventor
Hans ALMGREN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ENIGIO TIME AB
Original Assignee
ENIGIO TIME AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ENIGIO TIME AB filed Critical ENIGIO TIME AB
Assigned to ENIGIO TIME AB reassignment ENIGIO TIME AB ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALMGREN, Hans
Publication of US20160196297A1 publication Critical patent/US20160196297A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • G06F17/30371
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • G06F17/30011
    • G06F17/30377
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/84Using snapshots, i.e. a logical point-in-time copy of the data

Definitions

  • time-stamping and protecting the integrity of documents such as letters
  • Such methods comprise, for instance, signatures, seals, public notarization arrangements and so on.
  • the verification of such time stamps and integrity-protecting arrangements often depends on the continuous, traceable and non-reversible nature of physical domain matter.
  • Some cryptographic methods use one-way functions, such as certain hash functions, in order to create such cryptographic keys.
  • One advantage of one-way functions of sufficient quality is that it is practically impossible to calculate the data input to the one-way function given an output value of the one-way function, why the existence of a certain cryptographic key can be used as proof of the pre-calculation existence of the said input data.
  • a Merkle tree is a tree structure in which the label of each node is a one-way function output value of a concatenation of each of the node's children nodes' labels. This provides a fast way to verify the integrity of large sets of data if the root node label is received from a trusted source. See, for instance, U.S. Pat. No. 4,309,569 and EP 0932109 A2.
  • U.S. Pat. Nos. 5,136,646 and 5,136,647 both disclose ways to time-stamp documents, in which a providing party uses a one-way function to create a verifiable code comprising a current time-stamp. The methods are recursive and uses previously time-stamped documents.
  • U.S. Pat. No. 6,381,696 B1 discloses a method for authentication documents, wherein transient cryptographic keys are used, which keys are only valid during a certain respective time interval and are then destroyed.
  • U.S. Pat. No. 6,742,119 B1 and U.S. Pat. No. 7,490,241 B1 both disclose methods for time-stamping a document, whereby a central party having a trusted clock validates a time-stamp made by a document creating party.
  • U.S. Pat. No. 8,312,284 discloses a method for time-stamping a document, such as a digital photograph, wherein the document is enveloped by an earlier and a later time-stamp.
  • US 2007/0179748 A1 discloses a measurement means with built-in capabilities to time-stamp measurement values continuously using a private key.
  • US 2009/0067667 A1 discloses a method for protecting the integrity of image metadata by incorporating a coded version of such metadata in a watermark in the image.
  • WO1999/035785 A1 discloses various ways of protecting the integrity of and time-stamping documents across multiple revisions and using one-way hash functions.
  • WO2006/075566 A1 discloses methods for guaranteeing the authenticity of images documenting for instance insured property, including digital processing and specifically-adapted recording equipment.
  • JP 2008/216342 A discloses a method for verifying the authenticity of a forensic analysis of a computer HDD, whereby the analysis is captured on film. Chained hash functions are used to guarantee synchronization.
  • JP 2001022848 discloses a digital notarization method for proving authenticity and time for electronic documents.
  • CA 2317139 discloses a method for time-stamping an electronic document, wherein a combined digest is calculated for a plurality of documents.
  • One problem with the prior art is to afterwards be able to determine, in a trustworthy way, that a document was indeed time-stamped after a certain historic point in time. For such determination, it is in some cases not sufficient that a trustworthy third party simply states that this was the case.
  • a particular problem is to provide a way to, at a later point in time, prove the authenticity of a document which has an inherent time dimension, in other words that the state of the document changes over time.
  • Examples of such documents comprise samplings or descriptions of real-world sequences of events or processes, where a sequence of samplings or descriptions provides information regarding the development of the state of such a document over time.
  • Concrete examples comprise video footage of sporting events, user interactions and conferences; surveillance cameras; audio material such as telephone conversations; screen captures of a non-static web page the contents of which change as a result of user interactions or as a result of other factors; and the development of predetermined stock quotes over time.
  • the present invention solves the above described problems.
  • the present invention relates to a method for time-stamping a document the state of which changes over time, characterised in that the method comprises the following steps: a) performing a digital description or sampling of a state of the document at a certain point in time; b) creating a digital signature of the said state, where the signature is created so that it is constituted by, comprises or is calculated based upon an output value of a signature one-way function, where an input value to the signature one-way function is at least a part of the said description or at least a part of the result of the said sampling; c) embedding or incorporating the said signature, or a value calculated based upon the signature, into the document, at a point in time which is later than the certain point in time, in such a way so that it is possible to read the embedded or incorporated value from or based upon a state of the document at the said later point in time; and d) repeating from a) at the said later point in time; and in that, for at least one of the method comprises
  • the invention also relates to a system.
  • FIG. 1 is an overview of a system for carrying out a method according to the present invention
  • FIG. 2 is an overview of a method for creating a signal for time-stamping of documents according to a preferred embodiment of the present invention
  • FIG. 3 shows method steps of a method according to a preferred embodiment of the present invention to produce a time-stamping signal
  • FIGS. 4 a -4 c are respective schematic representations of different ways of time-stamping a document
  • FIGS. 5 a -5 d are respective schematic representations of different ways of automatically incorporating a current value of a time-stamp into a document;
  • FIG. 6 is a schematic representation of a dynamically updated web page according to a preferred embodiment of the present invention.
  • FIGS. 7 a and 7 b schematically illustrate a method of providing a way to verify the integrity of a document according to a preferred embodiment of the invention
  • FIGS. 8 a and 8 b schematically illustrate a method of providing a way to verify the integrity of a document according to a preferred embodiment of the invention, which document is published on the Internet;
  • FIG. 8 c schematically illustrates a webpage filtering method according to a preferred embodiment of the present invention
  • FIGS. 9 a and 9 b illustrate respective method steps for verifying the integrity of a document and associated data, respectively;
  • FIG. 10 schematically illustrates a method according to a preferred embodiment of the present invention for proving that an information stream is provided in realtime
  • FIG. 11 schematically illustrates a method for verifying the integrity of data in a database
  • FIGS. 12 a -12 c schematically illustrate a respective setup for performing a respective first, second and third method according to the invention for time-stamping a document the state of which changes over time.
  • a “document” means a piece of information, such as a text, an image, a piece of audio, a moving image such as a film or the like, or a combination of several such pieces of information, which is either digitally stored or capable of being sampled and then stored in digital form.
  • sample a document means converting a document from analogue form to digital form.
  • a real-world phenomenon means converting analogue information gathered in relation to said phenomenon and converting such gathered information into digital form.
  • sample may mean receiving or fetching digital information representing or constituting a document which has already been converted into digital form or which exists in the digital domain.
  • Time-stamping a document means introducing or creating a piece of information, which piece of information is stored in association with the document as a part of the document or in a way that can be securely re-associated with the document, and that provides a way to, at a later point in time, determine a time at which the time-stamping occurred.
  • One example of such time-stamping is to create a signature (see definition below) of the document and to store the signature and associate it with the document in question.
  • a “reference source” is a certain well-defined source of information which can be sampled, described or used as-is in order to produce a reference document describing a current state of the reference source.
  • Examples of reference sources include the current quotes for certain predefined exchange-traded stock; the current standing in a sports game; the currently viewed image frame in a publically broadcast live television program or a currently broadcast audio signal in such program or a publically broadcast live radio program; and the current front page of a newspaper published on the Internet.
  • a “reference document” is a digital sample, description or snapshot of the current state, at a certain point in time, of a certain reference source with which the reference document is associated.
  • a reference document is “externally provided” in the sense that the reference source is a source which is external to the system 100 .
  • a “one-way function” is a function the input value of which is, in practice, impossible to determine based only upon the corresponding function output value, and which is substantially one-to-one in the sense that in the practical applications described herein, two different input values will in practice always result in two different output values.
  • Examples include many hash functions which are conventional as such, such as SHA hash functions, such as SHA-1, SHA-2 and SHA-3, as well as MD5.
  • a “publically published” piece of information or document is published in such a way so that it is readily available to a wide enough audience, and with sufficient persistence over time, so that a third party is likely to be able to verify the time of publication and the contents of the piece of information or document exactly as they were at the date and time of publication, even if some time, such as several years, has passed after the publication.
  • a “signature” of a document is a value created so that it is constituted by, comprises or is calculated based upon the output value of a certain signature one-way function, to which at least a part of the document is one of one or several input values, in such a way so that the signature is substantially impossible to calculate without having access to relevant information about the document.
  • a “proof signature” is a signature calculated for a document in order to, at a later point in time, be able to prove access to relevant information about the document at the time of the creation of the proof signature.
  • a “verification signature” is a signature created in relation to a certain document for comparison with a proof signature which has been calculated earlier.
  • a “digitally coded watermark” is a piece of information which is encoded into a digitally stored document in such a way so that it is only visible or noticeable when observing the document under certain predetermined conditions, such as when subjecting the document to certain algorithms, and which otherwise only has a negligible or unnoticeable effect on the document.
  • FIG. 1 shows a system 100 according to the present invention, comprising a central control device 101 and the following digital interfaces:
  • the interface 102 is arranged to carry out such sampling for one or several reference sources, hence creating reference documents D 1 , D 2 , D 3 , and/or to simply receive such reference documents D 1 , D 2 , D 3 .
  • interface 103 may be arranged to simply send documents P 1 , P 2 , P 3 to one or several publishers, and/or to order the publishing using one or several self-service publishing services.
  • Each publication P 1 -P 3 should be publically published on at least one channel which is controlled by a third party different from the operator of system 100 , preferably on several parallel channels, where each such channel should provide substantially permanent persistence in the sense that documents P 1 -P 3 and their time and date of publication should be publically accessible even after the lapse of several years after publication; be easily accessible by a large number of third parties; be easily referred to; and preferably be immutable to the party ordering the publishing.
  • Examples include various Internet publication channels, such as popular blog platforms, Twitter (registered trademark), video publishing sites such as YouTube (registered trademark), news sites, e-mails to predetermined recipients; paper publications such as newspapers and bulletins; broadcast media such as radio, TV, Text TV, etc.; and telecom platforms such as SMS (Short Message Service) to predetermined recipients.
  • Internet publication channels such as popular blog platforms, Twitter (registered trademark), video publishing sites such as YouTube (registered trademark), news sites, e-mails to predetermined recipients; paper publications such as newspapers and bulletins; broadcast media such as radio, TV, Text TV, etc.; and telecom platforms such as SMS (Short Message Service) to predetermined recipients.
  • Each such channel should provide the possibility for a broad spectrum of third parties to, at a later point in time, preferably at least several years after the publication time, verify the publication time of the published information.
  • At least ten different platforms should be used in parallel, preferably at least ten platforms which are independent from each other in terms of common ownership and control, preferably also under different legislative rule.
  • the system 100 furthermore comprises a database 106 and a clock 107 , both of which, together with interfaces 102 , 103 , 104 , 105 , are in communication with the central control device 101 .
  • the clock 107 may be internal to the system 100 , and in that case periodically synchronized with an external, trusted clock, but preferably the clock 107 is in the form of a clock signal received from a trusted external party.
  • the system 100 is implemented as a computerized device, which may as such comprise one or several interconnected computers, and the functionality of which is implemented as suitable hardware and/or software logic.
  • Computer devices 130 , 140 in FIG. 1 are merely illustrative, and may be one or many computers, mobile telephones, computer networks or any other type of device capable of automated communication across digital interfaces 104 , 105 .
  • FIG. 2 is a simplified illustration of a method according to a preferred embodiment of the present invention.
  • the arrow T represents time, and the various events illustrated in FIG. 2 are ordered in the way shown, apart from the one-way function tree shown to the bottom right, within a broken lines box.
  • the latter one-way function tree rather represents an instantaneous state of a certain one-way function structure at the time just before the publishing of P 6 .
  • An example of such a one-way function tree is a conventional hash tree.
  • A, B and D 1 -D 9 represent different digitally stored reference documents; D 1 #-D 9 # represent respective output values of a certain one-way function the respective input value of which is the respective reference document D 1 -D 9 ; T# 1 -T# 8 represent respective values of a signal according to a preferred embodiment of the present invention for time-stamping of documents, or intermediate values for calculating such signal values; and P 1 -P 8 represent published respective values for such a signal for time-stamping of documents.
  • T# 1 -T# 8 or P 1 -P 8 can be used as the time-stamping signal (described below).
  • T# 1 -T# 8 are used as the time-stamping signal, they are preferably published in a way corresponding to the one described herein in relation to P 1 -P 8 . Irrespective of which stream of values are used as the time-stamping signal, this signal should be frequently updated, well-defined and stored in database 106 , so that it is possible to later verify the historic values of the time-stamping signal.
  • a and B are digitally stored documents, such as texts, word-processing documents, images, video films and so on, provided by the user 131 to the system 100 ; and D 1 -D 9 are documents automatically selected by the system 100 based upon predetermined associations between the system 100 and the corresponding reference sources.
  • # 1 , # 2 and # 3 represent respective one-way functions.
  • the one-way function # 1 used for producing D 1 #-D 9 # is not necessarily the same as the one-way function # 2 used to produce T# 1 -T# 8 or # 3 to produce P 1 -P 8 . Even if it is preferred that the same one-way function is for instance used to produce all output values D 1 #-D 9 #, it would be possible to change the one-way function used if information regarding what one-way function was used for what operation and when was stored in database 106 for later reference.
  • Each one-way function may be a single function or an aggregate of functions, also accepting other input than the inputs shown in FIG. 2 , as long as such an aggregate in itself constitutes a one-way function with an output value which may be deterministically recalculated at a later point in time, given all the used input values.
  • FIG. 3 illustrates the method steps of a method for creating a signal for time-stamping of documents according to a preferred embodiment of the present invention.
  • a signal may, for instance, be in the form of an alphanumerical value or a graphical code, such as a QR- or bar code, representing such a value, or have any other type of information format, and is published, transmitted, publishable or transmittable.
  • a digitally stored reference document A, B, D 1 , D 2 , D 3 , D 4 , D 5 , D 6 , D 7 , D 8 or D 9 is selected.
  • the reference document is a digital description or sample of the current state at a certain first point in time of a certain reference source.
  • the truthfulness of each reference document can be retrospectively verified by consulting one or several publically available information sources concerning the historic state of said reference source.
  • the current state of one and the same reference source can be sampled at several consecutive points in time, to thus create several different reference documents. That the reference document is “selected” means that a reference source is selected and that the digitally stored reference document is obtained, such as by directly sampling the state of the reference source, by reading the current state of the reference source or by receiving a digital representation of the current state of the reference source.
  • a one-way function such as an aggregate of several one-way functions, is employed and an output value of the one-way function is calculated for certain input data.
  • the selected reference document is used as one of at least one input values to the one-way function.
  • the one-way function is # 2
  • the corresponding output value T# 1 is calculated using D and D 123 #, which latter in itself is the output value of a previously used one-way function # 1 and depending upon documents D 1 -D 3 .
  • a and D 123 # can, for instance, be concatenated before being used as one single input value into # 2 , or # 2 can be designed to accept at least two input parameters.
  • the one-way function is constituted by the respective one-way functions # 1 and # 2 , which are used in series.
  • # 1 , # 1 and # 2 are used in series, with intermediate input of other input parameters D 1 #, D 2 # and D 3 #, respectively.
  • the one-way function may be a single one-way function or an aggregate of several one-way functions, and the same one-way function or aggregate of one-way functions may or may not be used for all reference documents A, B, D 1 -D 9 .
  • the reference document in question is an input parameter to the one-way function in the sense that it is practically impossible to calculate the output value without knowing the value of the corresponding reference document in question.
  • other information such as other one-way function output values, may also be used as input parameters into the one-way function when calculating the corresponding output value.
  • all input values, and their use are stored, preferably in database 106 , for easy re-calculation of the output value at a later point in time.
  • the time-stamping signal is updated based upon the said calculated output value, so that the said output value is constituted by or can be determined based upon the value of the signal.
  • the signal value is published as documents P 1 -P 8 , after additional calculations based upon values T# 1 -T# 8 as described below.
  • the values T# 1 -T# 8 can constitute the signal value themselves. The important thing is that it at a later point in time is possible to derive each corresponding published signal value T# 1 -T# 8 or P 1 -P 8 based upon sufficient knowledge about the reference documents A, B, D 1 -D 9 and any other information used when calculating the sequence of time-stamping signal values, and how these calculations were made.
  • FIG. 2 illustrates, in the broken line box, the specific calculation of P 6 .
  • a corresponding calculation is made, at each respective point in time, for each published signal value P 1 -P 8 .
  • a tree structure such as a conventional hash tree, is grown step by step as new one-way function output values T# 1 -T# 8 are calculated.
  • Said values T# 1 -T# 8 are logically stored as leaves in the tree structure. Then, a certain tree one-way function # 3 is used to digest the leaf values T# 1 -T# 8 layer by layer in the tree until a tree root is reached, which tree root depends, via the tree one-way function # 3 , on each leaf which is an ancestor to the said tree root. More specifically, for each parent node a respective output value of the tree one-way function # 3 is calculated, where the respective one-way function # 2 output signal value and/or calculated tree one-way function # 3 output value of each respective child node for the parent node in question are used as input values for the tree one-way function # 3 for that parent node.
  • T# 1 and T# 2 are used as input values to the tree one-way function # 3 , producing output value I# 12 .
  • I# 12 is used, together in turn with output value I# 34 , calculated with T# 1 and T# 2 as input values, to, again via one-way function # 3 , calculate output value I# 1234 .
  • I# 1234 is used, together with I# 56 , to, via one-way function # 3 , calculate I# 123456 which constitutes the tree root output value.
  • each parent node is a one-way function digest of its children.
  • the tree is grown by adding more children and then recalculating the corresponding part of the tree, ending up with a new root node.
  • all, or at least most, calculated time-stamping signal values since the start of the method are stored in the tree, and that each tree root which is publically published depends upon all previously calculated signal values.
  • At least 8 child nodes are associated with each parent node before the parent node is considered full.
  • the previous root node becomes a child node in the new, grown tree, and a new root node is introduced.
  • the reference sources used can be of different types.
  • at least one reference source is a set of specified publically published intangible information, the state of which is not known beforehand.
  • Examples of such reference sources include a set of stock exchange quotes from one or several officially recognized stock exchanges; a set of winning lottery numbers from major lotteries; or randomly selected data published by third parties on a widely used publically accessible publishing platform such as YouTube (registered trademark) or Twitter (registered trademark).
  • At least one reference source is, in a corresponding way, a publically published, tangible physical event, the state of which is not known beforehand.
  • Examples comprise a predetermined specific sports event, where a corresponding reference document is captured imagery or audio from the sports event, for instance from a predetermined broadcaster, or results data; specified news coverage, where the reference document is imagery or audio from a predetermined covering news broadcast, text material from a predetermined publisher covering the news event, or statistical data related to the news event; meteorological data; data from publically published scientific progress data from a specified field, such as space exploration; and so on.
  • each reference source and the method of selecting the corresponding reference document are sufficiently well-defined so that it is possible to determine the actual and specific historic value of the reference document at a later point in time, such as more than one, or preferably several, year after the time of selecting the reference document in question.
  • a method according to the present invention will still be able to perform trustworthy verification of document time-stamps and the related verification tasks as described herein due to the redundancy provided by using sufficiently many disparate reference sources.
  • At least one, preferably all, of the reference documents A, B, D 1 -D 9 are associated with the respective calculated one-way function output value D 1 #-D 9 #, D 123 #, D 56 #, D 78 #, T# 1 -T# 8 and/or the updated and published signal value P 1 -P 8 , and the reference document, possibly along with the additional information, is preferably also stored in database 106 for future reference. Also, it is preferred that the time of creation and/or selection of each reference document D 1 -D 9 is stored in database 106 , and associated with the respective reference document.
  • a time-stamping signal is achieved which can be used for time-stamping, so that time-stamps retroactively can be proven not to have existed before a certain point in time. Namely, there is no practical way to foresee the exact composition of a certain reference document, such as D 7 , before the sampling of the corresponding reference source and thereby the creation of D 7 . Since the publication P 6 depends on D 7 in a one-way type of relationship, P 6 could not practically have been calculated before D 7 was known. Hence, the time-stamping signal value P 6 is guaranteed not to have existed before the time of creation of D 7 . By verifying that D 7 is actually a correct representation of the state of the corresponding reference source at the alleged time of creation or selection of D 7 , it can be verified that P 5 did not exist before this time.
  • the provider of the time-stamping signal only has to provide the third party with the values D 8 #, T# 5 , I# 1234 , as well as what one-way function or functions # 1 , # 2 , # 3 used. Then, the third party can carry out the calculations and hence verify that, to satisfactory statistical certainty, no other reference document than D 7 could have produced the published value P 6 . It is noted that the third party does not have to be provided with the actual values of any other documents, such as A or D 1 -D 6 or D 8 . It is sufficient to provide corresponding one-way function outputs. This is advantageous, since some reference document information may be classified or sensitive.
  • a method according to a preferred embodiment of the present invention for verifying that a time-stamping signal value, calculated in accordance with the above described preferred embodiment of the present invention comprises providing to a requesting party information regarding a publically published digitally stored reference document of the above described type, which could not have been produced before a certain point in time, as well as a specification of any one-way function or functions used to calculate the time-stamping signal value and any input variables used for such calculations apart from the said reference document.
  • a time-stamping signal according to the said preferred embodiment of the present invention can, for instance, be used to guarantee the freshness of a document which is time-stamped using the signal. This and other applications are described in greater detail below.
  • At least one, preferably several, of the reference sources are of types the respective state of which typically changes very frequently, preferably several times every second.
  • the reference source is predetermined and unambiguously defined video footage, such as video footage from a predetermined video camera; broadcast by a predetermined broadcasting station; or the like.
  • the video footage is publically available, for instance over a broadcasting network or via the Internet.
  • the individual frames of the video stream, or clusters of such frames, and/or an associated audio stream are used as reference documents.
  • Using such often-updated and often-sampled reference source makes it possible to provide a time-stamping signal which is updated often, and which hence provides fine timeline granularity.
  • the current value of the signal is continuously or periodically published, as shown in FIGS. 1 and 2 , in form of documents P 1 -P 8 .
  • the signal may also continuously or periodically be sent to a predetermined receiver. “Continuously” is here to be interpreted so that the signal is published or sent as soon as the signal value changes, and/or at a certain minimum periodicity.
  • the signal value is changed, and the updated signal is published or sent, at least once every minute, more preferably at least once every ten seconds, most preferably at least once every second.
  • the adding of a new tree leaf T# 1 -T# 6 does not always automatically lead to the publishing of a new corresponding document P 1 -P 6 .
  • New documents may instead be published periodically, irrespective of new additions of leafs, and/or upon the request for a new time-stamping signal value internally from the system 100 , for instance with the purpose of time-stamping an incoming document, or from any third party.
  • At least some, preferably most, more preferably at least 90%, of the used reference documents, which are per se publically published, are regularly used without the origin of the reference document data being published to third parties, but only disclosed in connection to a verification request from a third party. This adds additional security to the use of the time-stamping signal.
  • time-stamping signal values there is a feedback relationship between consecutive time-stamping signal values, in the form of a dependence of later time-stamping signal values on previous time-stamping signal values for at least one, preferably most, most preferably substantially all, time-stamping signal values.
  • such a dependent time-stamping signal value T# 1 -T# 8 or P 1 -P 8 comprises a previous time-stamping signal value T# 1 -T# 7 or P 1 -P 7 , in the sense that a previous or current value of the time-stamping signal, a value upon which a previous or current value of the signal is based, or a value calculated based upon such previous or current signal value, is used as an input value to the one-way function or one-way function aggregate which is used to calculate the value of the time-stamping signal value in question.
  • Such feedback adds redundancy to the time-stamping signal, since some loss of information can be tolerated while still being able to retroactively calculate most time-stamping signal values.
  • Different types of such feedback is exemplified in FIG. 2 in the following ways:
  • time-stamping signal values T# 1 -T# 3 , T# 6 -T# 8 depend upon at least one externally provided reference document A, B, D 1 -D 9 and are calculated as a direct consequence of the selection of a new corresponding reference document.
  • Some signal values T# 4 -T# 5 are not created as the direct consequence of the selection of a new corresponding reference document, but of the selection of some internally generated piece of information. In this case, such information may as such be dependent upon externally provided reference documents and preferably comprises at least one previously calculated signal value. The latter type of signal values is preferably used in order to increase the updating frequency of the time-stamping signal.
  • the number of signal values based upon selection of a new respective externally provided reference document are in minority, preferably there are over time at least 10, preferably 100, signal values based upon an internally generated piece of information for each signal value which is based upon an externally provided reference document.
  • One way to achieve such time-stamping signal values which do not depend upon any externally provided reference document is to re-iterate tree nodes, such as the current tree root, in the tree structure shown in FIG. 2 , back to leaf level, by making the re-iterated tree node an additional leaf node. This may be done at any interval, and may be used to increase the publication rate of documents P 1 -P 6 above the rate of actual additions of new reference documents.
  • the publication of new time-stamping signals P 1 -P 6 can be made independent upon the addition of reference documents.
  • time-stamping signal which is updated at regular intervals, even very frequently, can be achieved with high reliability and security. It is preferred that the system 100 internal data used to calculate such time-stamping signal values have not been specified to third parties beforehand, since this could make it possible to foresee the future values of the time-stamping signal.
  • a certain reference document B is time-stamped using the current respective value P 6 of the time-stamping signal, and at least a part of a digitally stored version of the certain time-stamped document B, or the output value of a one-way function an input value of which is the certain document B, is used as an input value for the calculation of a subsequent time-stamping signal value T# 8 .
  • time-stamping of a document B is described in closer detail below, but can for instance include the incorporation of the time-stamping signal value P 6 into the document B in the form of an image or a piece of text.
  • Such incorporation of the current value of the time-stamping signal into a reference document which is used to produce the signal will affect the value of the subsequent time-stamping signal T# 8 or P 8 .
  • the then current time-stamping signal value may be read, and at the same time the existence of reference document B is a necessary requirement for the existence of T# 8 .
  • iteration of the time-stamping signal production process involving a reference document B adds an additional layer of security to the method.
  • each published time-stamping signal value P 1 -P 8 comprises a one-way function output value according to the above, such as a hash value, of at least 256 bits. Furthermore, it is preferred that it comprises a date and time information specifying a time after which the signal value in question was publically known and/or a date and time information specifying a time before which the signal value in question was not publically known. The latter may for instance be the time of creation of a corresponding reference document. For such timing activities, the clock 107 is used for reference.
  • FIG. 2 also illustrates another aspect of the present invention, namely to use the repeatedly or continuously updated time-stamping signal to create a time-constrained digital signature of a document A, B, D 1 -D 9 .
  • this document is provided by the user 131 and not automatically selected by the system 100 , for creation of a digital signature of the document B.
  • what is said herein in relation to creating a signature of document B is also applicable to document A and to reference documents D 1 -D 9 .
  • the said signature is created so that it is constituted by, comprises or is calculated based upon the output value of a certain signature one-way function, which in FIG. 2 is exemplified by one-way function # 2 but which may be any one-way function as defined herein.
  • An input value to the signature one-way function is at least a part of a digitally stored version of the document B.
  • the input value is document B in its entirety, even if any well-defined, predetermined part may be used as long as it is practically impossible to calculate the corresponding one-way function output value without knowledge of the contents of document B.
  • the output value is T# 8 .
  • the downstream value P 8 may also be selected constitute a signature of document B.
  • each signature created by or received by the system 100 for a document is stored in database 106 and associated with the document in question, for future use for instance as a proof signature.
  • a time-stamping signal value is created according to the above described, the current value of which signal, or a value which has been calculated based upon the current value of which signal, is also used, together with document B, as an input value to said signature one-way function.
  • the time-stamping signal value is T# 7 .
  • the input value is the whole or a part of document A in combination with D 123 #, which in this case constitutes the time-stamping signal value, and the output value may be T# 1 or P 1 .
  • the created signature or a value which has been calculated based upon the signature, is then publically published, as P 8 in the exemplifying case of document B, over at least one, preferably several parallel, publication channel(s) as described above, making it possible to third parties to later verify the publication time of the signature.
  • This provides a way to be able to prove that document B in its form when selected by system 100 did exist at least at the publication time of P 6 , and that the signature was not created before the time of selection of documents D 7 or D 8 by the system 100 .
  • respective signatures are calculated for a plurality of documents A, B, D 1 -D 9 at different points in time, and logically stored in a tree structure as described above, wherein a distinct tree one-way function # 3 output value of the tree root, or a distinct value which has been calculated based upon this output value, is publically published for each document in said plurality of documents.
  • the tree one-way function # 3 output value of the tree root is publically published also without being the consequence of a signature having been created for a document, and that such publication is preceded by the addition to the tree structure of a value which is not the freshly calculated signature of a document.
  • An example of such value is an internally generated piece of information as described above.
  • such an internally generated piece of information is one of the previously calculated output values of the tree one-way function # 3 .
  • the digital version of the document A, B used for the calculation of the said signature one-way function output value is associated with the created and/or published signature and stored, preferably in the database 106 , for future reference and use when a third party requires a verification of the created signature.
  • Some digitally stored documents may comprise too little information for providing sufficient security for the present purposes, since a brute force attack may be successful in guessing the contents of such a document and that way calculate the corresponding one-way function output value.
  • Examples include documents containing 10 bytes or less of significant information. Therefore, and in particular for such small documents, it is preferred that a random number is also used as an input value to the signature one-way function, in addition to the document itself. In this case, it is also preferred that the said random number is associated with the small document and/or the signature one-way function output value and stored in the database 106 for future reference when re-calculating the output value of the one-way function in question.
  • such a random number is a random alphanumerical string containing at least 16, preferably at least 256, random bytes.
  • the system 100 is arranged to continuously produce the above described time-stamping signal, and to provide it to third parties in substantially real-time via the described publications of the signal value via interface 103 . It is also preferred that the system 100 , via interface 104 , accepts digitally stored documents from third parties, such as user 131 , for which documents a signature is created and published as described above. It is also preferred that any document which is accepted for signature creation is also used as an input into at least one one-way function the output value of which is used to calculate the said time-stamping signal value.
  • any document provided by a third party automatically becomes part of the time-stamping signal process, so that the document and evolvement of the time-stamping signal over time engage in a mutually dependent manner, making it substantially impossible for third parties to fake signatures produced according to embodiments of the present invention since this would require the whole historic time-stamping signal process to be reconstructed or faked.
  • a time-stamping signal according to embodiments of the present invention is embedded or incorporated into a document, such as document B in FIG. 2 , which has previously been provided to the system 100 by a third party or which after embedding or incorporating is provided to the system 100 , such as user 131 .
  • the embedding or incorporation is done in such a way so that it is possible to read the value of the embedded or incorporated time-stamping signal from or based upon the document.
  • time-stamping signal is in fact embedded or incorporated into the document in immediate connection to the creation or updating of the document in question. It is especially preferred that such incorporation takes place using a piece of standalone technical document-creating equipment which is arranged to read a time-stamping signal from the system 100 directly via interface 103 or via publications P 1 -P 8 , to embed or incorporate the time-stamping signal value as an integrated part of the document-creating process, and to substantially immediately provide the created document to the system 100 , via interface 104 , for creation of a signature and publishing of the corresponding time-stamping signal. Examples of such methods are given in the following.
  • the said current value may be associated and stored together with the document on a central server, such as in the database 106 , for future reference.
  • the document may be available from an external source, in which case only a one-way function output value from a one-way function to which the document is input value may be stored in database 106 .
  • FIGS. 4 a , 4 b and 4 c show three different ways of embedding the time-stamping signal 402 into a digitally stored document 400 , where the embedded time-stamping signal is in the form of a piece of information from which the value of the signal can be deduced.
  • the three examples are all applied to a document 400 comprising image data 401 , but it is realized that the corresponding time-stamping techniques can be applied to other types of documents, such as documents comprising video footage, plain text, audio, a web page and so on, or combinations thereof.
  • the time-stamping signal 402 is introduced in the form of a graphical element, such as a string of alphanumeric characters, a QR code or a barcode, into a visual representation of the document, which graphical element carries said piece of information.
  • a graphical element such as a string of alphanumeric characters, a QR code or a barcode
  • the document 400 comprises, apart from the image data 401 , also conceptually illustrated metadata information 403 , 404 . Then, said piece of information 402 is added to a digitally stored version of the document as a metadata field.
  • metadata field is of course only visible when read by a metadata reading algorithm, which may be conventional as such.
  • said piece of information 402 is in the form of a digitally coded watermark 402 which is incorporated into a digitally stored version of the document 400 .
  • the image data 401 and the time-stamping signal value 402 are merged using a per se conventional digital watermarking algorithm, so that the resulting document 400 comprises an image which is substantially unaffected when viewed in the normal way, but which reveals the encoded time-stamping signal value 402 when subjected to a predetermined, per se conventional watermark decoding algorithm.
  • a current value of a time-stamping signal for instance a time-stamping signal such as the one described above, automatically upon production of a document.
  • this takes place at the same instance as, or in immediate connection to, the production of the document.
  • a document which is only available in a digital form once produced such as a digitally stored image obtained by sampling light inciding towards a digital image sensor
  • the said incorporation takes place as a part of the sampling process, or at least as an integrated step of the image production process before a final digitally stored image is obtained and can be used.
  • FIGS. 5 a , 5 b and 5 c illustrate the use of a piece of document producing hardware sampling equipment 500 , arranged to sample a real world physical phenomenon, such as taking a digital photography, and to produce a digitally stored sampled document 501 reflecting a corresponding state of the real world.
  • the equipment 500 is specifically adapted to perform a time-stamping method according to the above described.
  • the document 501 produced is exemplified by an image
  • the piece of equipment 500 is an optical camera. It is, however, realized that other types of documents can also be contemplated in corresponding ways, as elaborated on above in connection to FIGS. 4 a -4 c .
  • the camera 500 may instead be for example a digital audio recorder or a digital video camera.
  • a real-world item 510 is depicted by the camera 500 in the form of the digitally stored, conceptually illustrated document 501 , and it is preferred that the document 501 is substantially immediately transferred, by the camera 500 , to a system 100 according to the present invention, via interface 104 to which the camera 500 is connected via a communication channel to which the camera 500 has been provided access, for instance via wired or wireless Internet.
  • the system 100 preferably uses the document 501 as input variable into a one-way function so that later produced time-stamping signal values depend upon the existence of the document 501 .
  • a digital signature of the time-stamped document 501 is created according to the above described, and that the produced signature is associated with the document 501 and stored in the database 106 .
  • the equipment 500 is caused to calculate a one-way function output value of the document 501 , in connection to performing the sampling, which sampled physical phenomenon constitutes the document 501 , and said output value is then communicated from the equipment 500 to the central system 100 over said communication channel.
  • the equipment 500 may calculate the signature of the document 501 itself.
  • the equipment 500 first receives the current value of the time-stamping signal from interface 103 , via a communication channel provided between the system 100 and the equipment 500 , such as a communication channel via wired or wireless Internet.
  • the current signal value at the time of sampling the document 501 is embedded 502 into the image or frame by positioning a graphics-presenting device 520 , arranged to show a graphical element carrying said piece of information such as an alphanumerical code, a barcode or a QR code, in the image or frame as viewed by camera 500 , so that the graphical element is captured as a part of the sampled document.
  • a graphics-presenting device 520 has been provided access to said communications channel to interface 103 of system 100 , over which the current time-stamping signal value is communicated to the device 520 for display.
  • the device 520 may, for instance, be in the form of a small screen.
  • FIGS. 5 b and 5 c both illustrate situations in which the camera 500 itself is provided access to a communication channel over which the current value of the time-stamping signal is communicated to the camera 500 from interface 103 , and wherein the camera 500 itself embeds the current signal value into the document 501 in connection to performing the sampling.
  • FIG. 5 b there is a graphics-presenting device 530 which is an integrated part of the same general device as the image-capturing device 500 .
  • the device 530 may be in the form of a small screen located on the front side of the camera 500 , such as the screen on a so-called smartphone the front camera of which is used to capture the document 501 image.
  • the graphics-presenting device 530 is arranged to present said graphical element at the same time as the camera 500 captures the document 501 image.
  • a mirror 531 is used, so that the device 530 is visible in the view of the captured document 501 image.
  • the document 501 depicts, via mirror 531 , an image covering the device 530 .
  • Both the method illustrated in FIGS. 5 b and 5 c are particularly suitable when the document 501 comprises at least one still image, or one frame in a moving image. In the latter case, it is preferred that the subsequent frames in the moving image are treated as described herein for one frame, iteratively.
  • the current signal value at the time of capturing the image or frame is embedded into the document 501 image by feeding the signal to the camera 500 , from interface 103 , and causing the camera 500 to embed the said piece of information digitally into the document 501 image.
  • a digital image-manipulation means 540 which may be software-implemented but for security reasons preferably is in the form of a dedicated piece of hardware equipment which is integrated into the camera 500 and arranged to receive and automatically embed the piece of information into the document 501 upon sampling.
  • FIGS. 4 a -4 c can be used together with embedding techniques illustrated in FIGS. 5 a -5 c in any combination, both for image documents and any other type of applicable document.
  • the document By incorporating the current value of the time-stamping signal into the document 501 , the document can be securely time-stamped in a way which can be verified by third parties in retrospect. If the document 501 is also substantially immediately fed to the system 100 so that it is used for the calculation of future time-stamping signal values, the captured document 501 can be securely time-stamped within a very short time interval within which the document must have been produced.
  • FIG. 5 d illustrates schematically a timeline T and associated events between a real-world event involving a ball 600 bouncing on the ground 601 , which is depicted using camera or video camera 500 which is in turn connected to a system 100 according to the present invention.
  • the camera 500 is arranged to sample 610 the light incident from the scene with the ball 600 towards the camera 500 , and to produce 611 a series of digitally stored images 501 , each depicting the bouncing ball 600 at different points in time.
  • This series of images 501 may preferably be in the form of a video footage, such that each image 501 constitutes a respective frame in a video film of the bouncing ball 600 .
  • the current respective value of the time-stamping signal is received 613 from the system 100 , via interface 103 and is embedded 502 , as described above, into the sequence of images 501 by individual images being caused to contain the respective current value of the signal at the time of capturing the image in question, or at least the last known updated such value at the time of capturing the image 501 .
  • all images 501 need not have an embedded signal value 502 .
  • at least one frame every second of a captured video stream includes such a value 502 , and preferably at least 10% of the individual images 501 in a sequence of images captured by the camera 500 in accordance with what is described herein.
  • At least one image 501 preferably at least one image every second of a captured video stream, and preferably at least 10% of the individual images 501 in a sequence of images captured by the camera 500 in accordance with what is described herein, is or are communicated to the system 100 , via interface 104 , so that the image can be used as a reference document for producing the time-stamping signal as described above.
  • the updated time-stamping signal embedded in at least one later captured image will contain an embedded time-stamping signal which is dependent upon a previously captured image in the same series of images or the same video stream.
  • At least one such previously captured image had the then current value of the time-stamping signal embedded in such a way so that it affects the value of the time-stamping signal calculated based upon that image.
  • a signature, or a value which has been calculated based upon a signature, of one sampling is first published. Then, the published value is used as an input value to the signature one-way function used to create a signature for a later sampling in a subsequent iteration.
  • a video sequence or stream used in this way is a document with an inherent time aspect, the state of which changes over time.
  • the video sequence or stream constitutes a reference source, the current state of which is sampled and used as a basis for the calculation of the time-stamping signal, which in turn is embedded into the video sequence or stream hence affecting both future states of the video itself and future values of the time-stamping signal.
  • the corresponding is true regarding other types of documents with inherent time dimensions, apart from video footage.
  • different versions of a version-handled document constitute different such states, in case each version has a defined time at which the version existed.
  • such version-handled document versions are not covered by the present invention. In the latter case, only documents that directly reflect the development of a particular changing real-life, physical phenomenon are covered by the invention.
  • the document the state of which changes over time is a sequence of samplings of an interactive session between a first party and a second party.
  • Such an interactive session can be considered to be a reference source as defined herein, the state of which changes over time.
  • Examples of such sessions comprise a remote dialog, over the Internet and via a desktop computer of a user, between the user in question and a helpdesk; a chat conversation between two parties; a video chat between two parties; or the like.
  • the session is between two parties, each using an electronic device such as a server, computer or mobile phone to communicate with the other party.
  • both parties are human, but in some embodiments one or both of the parties are automated. More than two parties may also join in the session.
  • the “state” of the session may, for instance, be screen contents of one or both of the electronic devices; captured audio from the session; a text message sent from one party and shown to the other party; or the like.
  • the interactive session more precisely the current state of the interactive session, is sampled repeatedly during the duration of the session, and the sampled document states are provided to and saved in a central server, such as the system 100 , together with the created signature values.
  • both the signature and the current value of the time-stamping signal are used as input values to a one-way function producing the value to be incorporated, so that the incorporated value depends both on a previous value of the time-stamping signal and a previously sampled state of the same interactive session.
  • the signature, or a value calculated based upon the signature, such as a later calculated time-stamping value which is dependent upon the signature value is publically published.
  • the said incorporation of said value preferably is in the form of an embedded item which is embedded so that it is graphically visible on at least one of the displays of the electronic devices used by the parties as a part of the interactive session.
  • the incorporation is preferably made so that the value can be directly or indirectly deduced from a sampling of the state of the interactive session performed at a point in time at which the value in question was incorporated.
  • the interactive session will constitute an integrated part of the process of creating and publishing the time-stamping signal, and a third party gaining access to the performed samplings can verify, at a later point in time and using publically available data, both the time and the contents of the interactive session.
  • FIG. 12 a illustrates a first preferred variant of such a method, in which the interactive session is a remote session conducted over the Internet between a first party 1221 using an electronic device 1220 in the form of a computer and a second party 1230 .
  • a current state of the session is illustrated by the contents 1201 of a web browser 1202 displayed on the screen 1222 of the electronic device 1220 .
  • the state 1201 comprises an incorporated item 1205 which is or is based upon a calculated signature of a previously captured state of the interactive session.
  • the series of samplings of the session comprise screen dumps, such as a copy of the contents 1201 , and/or audio capture, of the session as seen from at least one of the two parties 1221 , 1230 .
  • the samplings are performed using a software application executed on or from at least one of the electronic devices 1220 , 1230 , using which a party participates in the interactive session.
  • the software is executed on or from the computer 1220 .
  • the software application is arranged to sense state changes concerning the interactive session, in terms of screen updates and/or audio events, and to trigger samplings as a reaction to such state changes.
  • Such sensing and triggering can take place in ways that are completely conventional as such, for instance by installing the software as a plugin to the web browser 1202 .
  • the computer is arranged to communicate with the interface 104 of the system 100 for providing sampled states for time-stamping and also for receiving updated time-stamping signal values.
  • FIG. 12 b illustrates a similar setup as in FIG. 12 a , but wherein the sampling does not take place using a software application of the electronic device 1220 itself, but rather using a camera 1223 , which is preferably a video camera, for capturing image material such as video material. Then, the said samplings comprise said image material, captured by the camera 1223 so that the screen 1222 of the electronic device 1220 using which one of said parties 1221 participates in the interactive session is visible for the camera's 1223 view. Furthermore, the camera 1223 is in communication with a central server, such as the system 100 via interface 104 , for delivering the captured document states to the system 100 . The capturing may but need not be synchronized with events of the interactive session.
  • a central server such as the system 100 via interface 104
  • the captured image material comprises audio, and also that the image material covers a view in which an input means of the electronic device 1220 , such as a keyboard 1224 or a mouse, is visible, so that it is possible to, at a later point in time, follow physical interactions by the user 1221 with the device 1220 , using such input means, by viewing the sequence of samplings of the document state, such as viewing a video film captured by the video camera 1223 .
  • an input means of the electronic device 1220 such as a keyboard 1224 or a mouse
  • FIG. 12 c illustrates another preferred way of implementing a method for time-stamping an interactive session.
  • the said central server such as the system 100 , or a separately arranged central server 1210 which in turn is in communication with the system 100 via interface 104 , is arranged to initiate the said samplings, and the corresponding creation of signatures for each such sampling, upon a request from at least one of the parties 1221 , 1230 .
  • the interactive session is a web session conducted using interconnected devices 1220 , 1230 , and the communication between the parties is routed via the server 1210 .
  • the user 1221 may request the server 1210 to act as an intermediary for a web session with the other party 1230 in connection to setting up the interactive web session.
  • the server 1210 then enters as an intermediary in said session, forwarding all web traffic from the device 1220 to the device 1230 and vice versa, and at the same time performing continuous, periodical or intermittent sampling of the current state of the session and also incorporating the said value into the state in a way making it visible to at least user 1221 via device 1220 during the duration of the interactive session.
  • This may take place in a way which is otherwise transparent to the parties 1221 , 1230 , in particular to the device 1230 , apart from the fact that the IP address of the server 1210 is used instead of that of the opposite party for the session.
  • an intermediary server 1210 can be used in combination with a piece of software on the computer 1220 arranged to incorporate a current time-sampling signal value in the current state of the session as viewed by the user 1221 .
  • the sampled information can be digital information which is simply intercepted from the interactive session, such as a screen dump or a piece of text; analog information which is digitally sampled, such as a digital photograph of the screen 1222 or a digitally stored audio uptake from the room in which the device 1220 is arranged; or any combination of the two.
  • any metadata available to the central server 1210 may be recorded from the interactive session.
  • a piece of software as described in connection to FIG. 12 a may also be arranged to provide a user-activatable means, for instance as a control in the web browser 1202 , for activating the recording by system 1210 of activities in the web browser 1202 .
  • reference document instead of using for instance a single frame of a video footage, it is preferred to as reference document use a long enough section of a stream, such as a video and/or audio stream, in order for a human taking part of the said section at a later point to obtain a good understanding of the contents of the stream at that point.
  • the selected section should be at least 10 seconds, preferably at least 1 minute, preferably at least 2 minutes long.
  • the time stamp associated with the reference document would in this case be the actual end time of the section, and this time information should be associated with the reference document and stored in database 106 . It is preferred that data from substantially the whole time frame of the selected section is used as input value to the corresponding one-way function.
  • reference documents from the same stream reference source will in this case preferably be produced at more frequent intervals than the length of each section.
  • the stream itself that is the reference source data or a converted or sampled form of the same, is stored in its entirety in database 106 , together with information regarding how to extract which reference documents from the stored stream. This way, there is no obligation to store each selected section for each reference document also in cases where such sections overlap.
  • a number of consecutive images 501 comprise footage of a natural phenomenon the development of which is foreseeable by a viewer. This is illustrated in FIG. 5 d in the form of the bouncing ball 600 , and makes it more difficult to fake the series of images by for instance image manipulation.
  • Such a deterministic phenomenon is useful, but it is even more preferred to, instead of the bouncing ball 600 described herein, use in the corresponding manner a phenomenon the general development of which is foreseeable and clearly time-directed, but the details of which comprise chaotic elements. Examples include a fire developing and a road with traffic passing by.
  • Such a method is particularly suitable for use in a video conference system or a video surveillance system which is arranged to capture video footage in accordance to what has been described in connection to FIG. 5 d , possibly in combination with what has been described in connection to FIGS. 5 a - 5 c.
  • a video conference or surveillance system may comprise an image-displaying device 520 , positioned in the view of a video camera and arranged to display a current and preferably continuously updated value of the time-stamping signal to be captured as a part of the captured video footage, while the video footage data is continuously fed to the system 100 , creating a feedback loop in turn making it easy to later verify the time of recording of the video stream.
  • a natural phenomenon such as a moving pendulum, is arranged in the view of the video camera.
  • the sampling equipment 500 is caused to sample 611 the physical phenomenon repeatedly over some period of time T so that several reference documents 501 are produced, at least one such document is time-stamped as described above, at least a part of a digitally stored version of the said time-stamped document is used, by the system 100 , as an input value for calculating the time-stamping signal as described above, and the time-stamping signal value after being updated using the said time-stamped reference document is embedded into a later produced reference document as captured by the equipment 500 .
  • FIG. 6 illustrates a web server 600 arranged to provide a web page 601 to a requesting computer device 610 , upon the command of a user 611 .
  • the web page 601 is merely schematically illustrated in FIG. 6 , for reasons of clarity.
  • the web page 601 comprises an embedded time-stamping signal value 602 , which can be embedded in any of the ways described above in connection to FIGS. 4 a -4 c , but is preferably a component on the web page 601 which is visible to the user 611 viewing the web page on the screen of the computer device 610 .
  • the web page 601 constitutes the digitally stored document referred to above.
  • the web page 601 further comprises programming code 603 , schematically illustrated in FIG. 6 , which code 603 is arranged to initiate a time-stamping of the document, i.e. the web page 601 , according to what has been described above.
  • the programming code 603 is arranged to receive from the server 100 , via a communication channel such as the Internet and via interface 103 , an updated time-stamping signal value from the server 100 , and to update the embedded value 602 in accordance with this updated signal received from the server 100 .
  • this reception of the updated time-stamping signal value is preceded by the programming code 603 communicating a current state, such as the current visual look, of the web page 601 to the server 100 , via a corresponding communication channel and via interface 104 , so that the updated signal value is based upon said communicated state.
  • a current state such as the current visual look
  • Such an update procedure of the embedded code 602 is initiated by the programming code 603 as a consequence of the web page 601 being requested by computer device 610 , and hence being viewed. This way, it is guaranteed that the user always sees an embedded code 602 which was the most recent one available at the time of the requesting of the web page 601 . Also, it can later be proven how often and when a web page has been requested, by consulting system 100 via interface 105 .
  • the programming code may be of a conventional type, such as Javascript (registered trademark).
  • a non-static web page may be viewed as a document with an inherent time dimension according to the discussion above in connection to FIGS. 12 a -12 c , and in particular the state of which document changes over time. As a result, the viewing of such a web page can be interpreted of such a state change.
  • FIG. 7 a illustrates the setup, and FIG. 7 b the method steps, of a method according to a preferred embodiment of the present invention of providing a way to verify the integrity of a document 701 , which document may but need not be digitally stored, and may for instance be a document which is printed in a magazine or an outdoor commercial spot, or displayed on an electronic display. It is preferred that the document 701 is printed in a permanent way, integrated within the document.
  • the document is firstly time-stamped according to what has been described above, in the sense that the system 100 calculates an updated time-stamping signal value and associates a digitally stored version of the document 701 , such as a digital sampling of the document or an original, digitally stored master copy of the document 701 , in the database 106 with the said updated signal value.
  • a digitally stored version of the document 701 such as a digital sampling of the document or an original, digitally stored master copy of the document 701 , in the database 106 with the said updated signal value.
  • the document is published with a visibly embedded piece of information 702 , such as described above in connection to FIG. 4 a .
  • This publishing is done by a publishing device 700 , which may for instance be a print shop or -office, arranged to receive the above said updated time-stamping signal and to embed it into the image 701 as information 702 .
  • the information 702 is published as an integrated and inseparable part of the document 701 .
  • the information 702 is embedded in the form of a QR code or barcode, since such are easily recognized by image interpretation software in the system 100 .
  • a communication channel is provided, over which a third party user 710 can send, via interface 105 to the system 100 , a depiction of the published document 701 .
  • the user 710 can typically use his normal Internet-connected camera 711 or smartphone to take a picture of the image 701 , including the information 702 , and send the digitally stored picture, via interface 105 , to the system 100 for analysis.
  • the system 100 accepts the depiction of the published document, and deduces the value of the time-stamping signal from the piece of information 702 visible in the depiction. This is made in a way which is convention as such, and may comprise image interpretation logic, and specifically interpreting a QR code as an alphanumerical code which is or is associated with the signal value in question.
  • the system 100 finds said digitally stored version, if there is such a digitally stored version associated with the said time-stamping signal value in the database 106 .
  • Pertinent information may, for instance be predetermined additional information, such as metadata, which has been associated with the document in the database 106 beforehand.
  • such metadata is a piece of information using which the user 710 can identify the image, and that way verify the authenticity of the image 701 .
  • the document itself may be sent, in which case it is easy for the user 710 to verify the image by simply comparing the image 701 to the document received to the computer equipment 712 .
  • Such a method provides a way for the user 710 to, using only standard equipment such as a normal smartphone, quickly and reliably verify the authenticity of an image irrespective of where or in what format it is presented.
  • the image-capturing equipment 711 continuously analyzes imagery captured by equipment 711 and monitors for visual pieces of information 702 in the view of equipment 711 . As soon as such information 702 has been detected by the equipment 711 , the information is sent to system 100 for verification, as described above, and if the time-stamping signal value represented by the detected information 702 is found to correspond to a document previously time-stamped by the system 100 , information relating to the time-stamped document is received by the equipment 711 from system 100 , whereupon the equipment 711 displays an image with graphical overlay in connection to the detected information 702 , giving information to the user 710 that the detected information 702 is associated with a time-stamped document. For instance, a smaller version of the image itself can be displayed on top of, or in connection to, the information 702 when visible in the view of the equipment 711 .
  • the document 701 is a frame in a video footage
  • the piece of information 702 is embedded into the video footage by individual frames of the video being caused to contain a respective piece of information 702 .
  • the video footage may be as described above in connection to FIGS. 4 a -5 d
  • respective information 702 may be inserted into each frame or only a subset of the frames, such as at least one frame for each second of video material.
  • the inserted information may represent a signature which is updated using continuously updated time-stampings signal values or only intermittently updated time-stamping signal values.
  • the signature represented by the piece of information 702 is calculated based upon either the currently viewed frame 701 ; a predetermined subpart of video material; or the video material as a whole.
  • FIG. 8 a illustrates the setup, and FIG. 8 b the method steps, of a method according to a preferred embodiment of the present invention of providing a way to verify the integrity of a digitally stored document 801 which is published on the Internet and viewed using a web browser 802 , for instance as a part of a web page 803 .
  • Such a method comprises the step of, firstly, time-stamping the document 801 according to what has been described above and in analogy with the initial time-stamping of document 801 as described above in connection to FIG. 7 a .
  • the document 801 may be, for instance, an image, a video sequence, or other types of graphical material the authenticity of which may be desired to verify by a third party 810 user viewing the web page 803 .
  • the document 801 is published on the Internet, with associated programming code arranged to react upon some kind of activation by the user 810 .
  • the programming code is preferably a part of the web page 802 , and may be integrated into the document 801 itself.
  • Such activation may, for example, be in the form of activation of an activation means, such as a selection of or clicking on the document 810 in the web browser 803 , or the activation of a user control 804 such as a graphically represented clickable field, for instance in the same web page 802 as the document 801 .
  • the document 801 is sent to the system 100 , via interface 105 .
  • the system 100 Upon receipt of the document 801 in the system 100 , the system 100 is caused to lookup, in the database 106 , if the document 100 has been time-stamped by calculating the corresponding digital signature and checking if a document with the same digital signature has previously been time-stamped. This check is preferably based upon previously calculated hash values rather than upon the previously stored underlying documents themselves. Alternatively, a one-way function output value is calculated, with the document 801 as an input value, and the said output value is communicated to the system 100 , via interface 105 . Then, the system 100 checks if a document with the same signature as the provided value has been time-stamped. In this latter case, the system 100 may not need to store the document 801 itself, but only the digitally stored signature of the document 801 .
  • the system 100 is arranged to communicate, to the third party user 810 , some kind of information 805 pertinent to the document 801 and which allows the user 810 to verify that the document 801 is authentic in the meaning that it is verifiable that the document 801 has previously been time-stamped by system 100 .
  • the said pertinent information is presented in the web browser 803 , possibly in the same web page 802 , in that case preferably as an embedded part of the document 801 .
  • the pertinent information 805 is a symbol, such as a check-mark or such, simply signaling that a match was found in the database 106 .
  • the pertinent information 805 is in the form of a graphical element similar to the element 402 as described above in connection to FIG. 4 a , allowing the user to identify, directly or indirectly, a time-stamping signal value associated with the document 801 , which then can be used to directly verify the time-stamping authenticity of the document 801 via interface 105 .
  • the pertinent information comprises a time and date of the time-stamping of the document 801 by the system 100 .
  • the interface 103 is arranged to provide the said pertinent information in the form of the document 801 itself, with the said pertinent information visually embedded in the document 801 , and that the web browser 803 is arranged to replace the document 801 with the one provided via interface 103 upon said user 810 activation and database 106 lookup.
  • the document 801 is a still or moving image
  • the said pertinent information is published in connection to the image, such as communicating an updated document 801 with embedded pertinent information 805 as described above, but without the web browser 803 leaving the currently viewed web page 802 .
  • the web browser 803 is redirected, preferably on the initiative of said programming code in the web page 802 , to another page, where the document 801 together with pertinent information 805 is presented to the user 810 in the web browser 803 .
  • the web page redirected to is a trusted web page hosted by the operator of the system 100 , where more detailed information about the document 801 and its time-stamping can be presented to the user 810 .
  • the said pertinent information 805 comprises the time of the document 801 time-stamp as stored in the database 106 .
  • a document which has not yet been time-stamped by system 100 is provided with a piece of programming code providing an activation means allowing a viewing user to activate a function which results in the sending of the document in question, via interface 104 , to the system 100 for time-stamping.
  • an activation means allowing a viewing user to activate a function which results in the sending of the document in question, via interface 104 , to the system 100 for time-stamping.
  • metadata specific to the web page in which the document in question is shown preferably also along with metadata specific to the activating user, is also sent to the system 100 for time-stamping in association with the document.
  • the programming code thereafter changes the activation means to the type discussed above, allowing a user viewing the webpage to verify the time-stamping of the document.
  • a webpage is provided in which all documents contained in the webpage and that have already been time-stamped are provided with respective activation means allowing the user to verify a previously made time-stamp, while the remaining documents contained in the webpage that can be time-stamped by the system 100 are provided with respective activation means allowing the user to perform a time-stamping of the document in question.
  • FIG. 8 c illustrates an embodiment of the present invention, in which the user 810 uses a computer device 811 to view a certain webpage provided by a server 820 .
  • 821 is a simplified illustration of how the webpage looks when viewed in a browser on the computer 811 as directly communicated from server 820 to computer 811 , for instance via the Internet.
  • the user 810 can choose to view the webpage provided by server 820 through a filtering server 830 , in which case the viewed webpage looks like the simplified illustration 831 .
  • the webpage is shown in a way corresponding to the way in 821 , but with added or modified content.
  • this content is exemplified by check-marks on documents that have been confirmed to have been time-stamped previously by system 100 .
  • the filtering server 830 fetches, upon the request of the user 810 , the webpage in question from server 820 , and investigates its contents.
  • both the webpage as a whole and its various constituent parts are examined individually, and each are sent to the system 100 for verification of any time-stamps made for the respective sent items. The procedure for performing such verification has been explained above.
  • each positive verification is stored by server 830 , which then adds elements to or modifies documents verified to have been previously time-stamped by system 100 and sends the modified webpage to the user's 810 computer 811 for viewing as 831 .
  • FIG. 8 c all three documents contained in the webpage, as well as the webpage itself, were verified to have been time-stamped.
  • the said added or modified content constitute respective activation means as described above, by the activating of which the user 810 may verify that the time-stamp is indeed authentic as described above.
  • the filtering server 830 is arranged to read webpage data from web server 820 , to investigate if the received webpage data contains any documents of a type that may be time-stamped by system 100 , to send a query to the system 100 requesting verification, for each one of the found documents, if any, of whether the respective documents have been previously time-stamped by the system 100 , and then to produce updated webpage data with incorporated verification signaling elements for documents that have been verified to have been time-stamped, to the computer 811 operated by user 810 .
  • the signaling means are in the form of visual elements shown in connection to each verified document in the modified webpage.
  • the filtering server 830 is arranged to, as a consequence of the user 810 requesting the webpage data via filtering server 830 , send to the system 100 , via interface 104 , each document contained in the webpage, and preferably also the webpage itself if applicable, that can be time-stamped by the system 100 and which has not yet been time-stamped by the system 100 , for time-stamping such as been described above.
  • one-way function output values of such documents may be sent to the system 100 , using a predetermined one-way function which is known by the system 100 .
  • a digital proof signature is first created of the digitally stored original document, the integrity of a digital copy of which is later to be challenged.
  • the creation of the digital signature is performed as described above, and the signature is associated with the document and stored in database 106 .
  • the integrity of a digitally stored document alleged to be an identical, untampered version of the same document as the one for which the proof signature was calculated, is challenged.
  • the system 100 receives, by a challenging third party person or system and via interface 105 , a digitally stored copy of the challenged document, for which a corresponding digital verification signature is created of the received document.
  • This verification signature is calculated in the same way as the proof signature, and using the same historic value of the time-stamping signal which was used for the creation of the digital proof signature. Hence, stored historic data regarding the time-stamping signal are sought out in the database 106 and used in the creation of the verification signature. Finally, the integrity of the received document is positively verified only in case the digital proof signature is equal to the digital verification signature. If such verification is possible, it will also be possible to, in a provable manner as described above, specify a point in time at which the original document existed in the same form as the challenged document.
  • an image of the scene of an accident to be used for insurance purposes may comprise metadata regarding photo time and date; geographic position; a text description; information about parties involved in the accident; and reference numbers of related insurance policies.
  • Each of these pieces of metadata may be challenged at a later point in time, and need to be verified.
  • a method according to a preferred embodiment of the present invention for verifying the integrity of a certain metadata information pertinent to a digitally stored document is similar to the method described above in connection to FIG. 9 a , and involves the steps of, at a first point in time, creating a digital proof signature of the document as described above in relation to FIG. 9 a , but wherein the signature one-way function is calculated based upon both at least a part of a digitally stored version of the document itself as well as upon said metadata information.
  • the created digital proof signature is stored in database 106 .
  • the integrity of the metadata in question is verified by receiving the metadata information from a challenging user person or system, creating a corresponding digital verification signature of the document as described above in connection to FIG. 9 a and using the same value of the signal used for the creation of the digital proof signature. Lastly, the integrity of the metadata information is verified only in case the digital proof signature is equal to the digital verification signature pertinent to the document.
  • FIG. 9 b illustrates a special case of this general method for verifying the integrity of a piece of metadata, which offers the added advantage that the integrity of one or several pieces of metadata information can be verified without any need to provide information from or to a challenging party or to third parties about other metadata, that may be sensitive. For instance, in the insurance example above the photo time may have to be verified without having to exchange information regarding the geographic position about the accident.
  • the digitally stored proof signature is created for the original document so that the used signature one-way function is calculated based upon also each digital metadata signature.
  • the respective metadata signatures and the proof signature are arranged in the form of a tree structure, such as a hash tree similar to the one described above in relation to FIG. 2 , in which the proof signature is located in the tree root and such that each leaf constitutes a respective metadata signature.
  • the proof signature for the original document is stored in database 106 .
  • challenging third party user or system provides a subset of the several pieces of metadata, such as metadata # 1 and # 2 but not # 3 , which is received by system 100 via interface 105 .
  • the challenger may also provide a digitally stored copy of the original document, in case the document itself is also to be challenged.
  • corresponding digital verification signatures are created first of the received pieces of metadata and then of the original document, or the provided digital copy, in the same way as the proof signature for the original document was created and using the same value of the signal used for the creation of the digital metadata signatures and the digital proof signature.
  • the stored digital metadata signatures are used only for pieces of metadata not received at the second point in time. Provided pieces of metadata replace corresponding stored metadata information.
  • FIG. 10 illustrates a method of providing a way to verify that a certain document 1001 is remotely published in realtime or near realtime for a user 1010 to view.
  • the document 1001 is published as a part of a web page 1002 in a web browser 1003 , but it is realized that the document 1001 may be published in other ways, such as on a TV screen or the like.
  • Such a document 1001 comprises information the nature of which is updated to reflect the development of a real course of events which is sampled and continuously published in form of the document 1001 .
  • the document 1001 is continuously time-stamped as described above, by being sent to the system 100 , via interface 104 , and by the system 100 continuously creating and publishing, via interface 103 , an updated signature for the currently received document 1001 .
  • the signature is used as an input variable to a one-way function used for calculating an updated value of the time-stamping signal according to the above described.
  • a new signature is calculated either periodically using a short period such as at least once every minute or at least once every ten seconds and/or as soon as the contents of the document 1001 changes and/or as soon as the time-stamping signal is updated by the system 100 .
  • the third party user 1010 is provided access to a means for comparing a continuously updated piece of information 1005 which is embedded into the document 1001 with a corresponding current time-stamping signal value stored in the central server 100 .
  • Such comparison can be performed directly or indirectly.
  • a currently updated time-stamping signal calculated based upon at least the updated signature of the document 1001 , or the signature itself, can be embedded as a graphical item 1005 into the document 1001 itself, as described above in connection to FIG. 4 a , and a corresponding value can be sent, via an independent communication channel, to the same or a different screen which can be viewed by the user, so that the two items can be compared directly and visually by the user 1010 .
  • the web page 1002 can incorporate a piece of programming code which is associated with the document and arranged to receive both the said signals and to automatically perform a comparison between them and signal the outcome of the comparison to the user 1010 .
  • the programming code can be arranged to publish a marker, such as a check mark 1006 , for visual verification by the user 1010 .
  • the said programming code can be arranged to extract the value of the item 1005 and to request, via interface 105 , the system to verify that the extracted value is indeed a correct and recently updated value, and in case the reply via interface 105 from the system 100 is affirmative, to display the check mark 1006 .
  • “recently updated” means that the system 100 can guarantee a time discrepancy of at the most 10 seconds.
  • the programming code can be arranged to, upon a first activation of a control 1004 or a clicking on the document 1001 , perform a verification as described above, and to display a visual result signal 1006 , and, upon a second such activation or clicking, redirect the web browser 1003 to another web page, preferably hosted by the operator of the system 100 and preferably presenting more detailed information to the user 1010 regarding, for instance, the current state of the document 1001 and/or a proof regarding the time of time-stamping of a recent state of the document 1001 .
  • FIG. 11 shows a system configured for carrying out a method for verifying the integrity of data in a database 1100 .
  • the database 1100 can be any type of database comprising any type of digitally stored data, comprising a continuously updated datastream or the like.
  • at least one digital proof signature is created of all or a subset of said data, in a way similar to the ones described above, by communicating the said data to the system 100 , via interface 104 , and by the system 100 upon reception of such data calculating a signature based upon an updated time-stamping signal value, and preferably allowing the created signature to be input data into a one-way function the result of which is or is used to calculate a later time-stamping signal value.
  • the created signature is stored in database 106 .
  • the integrity of the said data in the database 1100 is repeatedly, such as periodically, every day or more frequently, or as soon as the data in the database 1100 is accessed, checked by comparing the said stored digital proof signature with a corresponding but later created digital verification signature which is based upon the current value of the data to be verified and the same time-stamping signal value used for creation of the digital proof signature. In case any discrepancy between the digital verification signature and the digital proof signature is found, a report is sent.
  • a standalone module 1110 such as a software product run on the same computer as the database 1100 or another computer, is put into communication with the database 1100 and the system 100 , via interfaces 104 and 105 . Then, the module 1110 reads the data from the database 1100 , sends the data to be signed to interface 104 , and requests a verification of the previously created signature via interface 105 . All these steps are described in closer detail above. Moreover, the module sends the report to a computer 1120 which is operated by user 1121 in case a discrepancy is found, indicating that data has been altered.
  • the value of the stored digital proof signature is updated repeatedly, by creating a new digital proof signature according above.
  • the updating of the value of the stored digital proof signature is triggered by access events to the database 1100 , such that a new digital signature is created as a consequence of each database modification, such as insertions, updates or deletions, by any party.
  • This can be implemented in practice using so called SQL (Structured Query Language) query triggers or the like.
  • SQL Structured Query Language
  • a new comparison is made before each updating of the signal.
  • Such a method achieves a fast, low-profile method of continuously monitoring a database and alerting if some data, such as data which is supposed to be immutable, is altered by way of accident or abuse, and where the existence and timing of such modifications can be proven and tracked exactly and with high reliability and trustworthiness.
  • the time-stamping signal can be used in other applications, such as simply being published in a continuously updated manner on a web page for general reference purposes.
  • time-stamping mentioned herein primarily relate to the creation time of documents, in contrast to their date of destruction.
  • the time-stamping signal according to the invention forms the basis for convenient, precise and large-scale digital negative time-stamping of documents, in which documents are time-stamped with time-stamping signal values as inputs.
  • time-stamping process plays a part in the actual creation of the document. If the document is created in such a way so that the future value of the time-stamping signal will depend upon the process of creating the document, secure time-stamping verification will be possible despite the inherent characteristics of the digital domain, such as absolute stability and wide-ranging reversibility.
  • One particular class of documents that may be time-stamped using the present invention comprises digital images, in particular digital photographs. They have some significant properties, according to the following. Encoding and compression makes it non-trivial to change individual bits or add information without compromising the document's validity. Visual analysis will reveal non-realistic image manipulations. The higher the image resolution, the harder it gets to manipulate the document in a trustworthy manner. Visual elements in the photo that carry information can be accompanied with digitally stored meta information in the same document, or associated with the document in some sort of digital envelope. Verification of the correspondence of such metadata adds to the credibility of the time-stamping.
  • Image sequences such as video, adds the additional possibility of using integrated time-stamps.
  • time-stampling signal and/or calculated signatures as described above may preferably be published, continuously, periodically or intermittently, in a dedicated electronic publishing space, such as a particular web address on the Internet, such as www.timebeat.com.
  • a dedicated electronic publishing space such as a particular web address on the Internet, such as www.timebeat.com.
  • publishing takes place in a read-only manner on a web address the sole or main contents of which, when read by a third party web reader or the like, is a recently updated value for the above described time-stamping signal and/or signature value. This provides a simple way for third parties to incorporate these values into their own applications for secure time-stamping or the like.

Abstract

Method for time-stamping a document the state of which changes over time, comprising the following steps: e) performing a digital sampling of a state of the document at a certain point in time; f) creating a digital signature of the said state, constituted by, comprising or being calculated based upon an output value of a signature one-way function, an input value to which is the sampling; g) embedding the signature into the document, at a point in time which is later than the certain point in time, so that it is possible to read the embedded value from a state of the document at the said later point in time; and h) repeating from a) at the said later point in time; and in that the signature is publically published over at least one publication channel. The invention also relates to a system.

Description

  • For applications in the physical domain, there are many known methods for time-stamping and protecting the integrity of documents, such as letters. Such methods comprise, for instance, signatures, seals, public notarization arrangements and so on. The verification of such time stamps and integrity-protecting arrangements often depends on the continuous, traceable and non-reversible nature of physical domain matter.
  • In the digital domain, where matter is of discreet, not always traceable and often reversible nature, there are other types of problems that need to be dealt with in order to be able to time-stamp and protect the integrity of information.
  • Various types of cryptographic methods, in which only persons controlling certain cryptographic keys have access to certain information, have been developed during the recent decades for use in the computerized digital domain.
  • Some cryptographic methods use one-way functions, such as certain hash functions, in order to create such cryptographic keys. One advantage of one-way functions of sufficient quality is that it is practically impossible to calculate the data input to the one-way function given an output value of the one-way function, why the existence of a certain cryptographic key can be used as proof of the pre-calculation existence of the said input data.
  • One known technology is linked time-stamping, in which several digitally stored documents are hashed at consecutive points in time, and wherein each hash includes the hash of a previous document by concatenation. Periodically, such hashes are published in widely available publications such as newspapers. Since the existence of each linked hash implies the previous existence of the information upon which the hash is based, such a method makes it practically impossible to back-date a certain document, within the limits of publication frequency. Also, the order of document creation can be protected. See for instance WO 2007/072468 A1.
  • Furthermore, it is known to use so-called Merkle trees in this type of applications. A Merkle tree is a tree structure in which the label of each node is a one-way function output value of a concatenation of each of the node's children nodes' labels. This provides a fast way to verify the integrity of large sets of data if the root node label is received from a trusted source. See, for instance, U.S. Pat. No. 4,309,569 and EP 0932109 A2.
  • Other prior art related to the present invention includes the following:
  • U.S. Pat. Nos. 5,136,646 and 5,136,647 both disclose ways to time-stamp documents, in which a providing party uses a one-way function to create a verifiable code comprising a current time-stamp. The methods are recursive and uses previously time-stamped documents.
  • U.S. Pat. No. 6,381,696 B1 discloses a method for authentication documents, wherein transient cryptographic keys are used, which keys are only valid during a certain respective time interval and are then destroyed.
  • U.S. Pat. No. 6,742,119 B1 and U.S. Pat. No. 7,490,241 B1 both disclose methods for time-stamping a document, whereby a central party having a trusted clock validates a time-stamp made by a document creating party.
  • U.S. Pat. No. 8,312,284 discloses a method for time-stamping a document, such as a digital photograph, wherein the document is enveloped by an earlier and a later time-stamp.
  • US 2007/0179748 A1 discloses a measurement means with built-in capabilities to time-stamp measurement values continuously using a private key.
  • US 2009/0067667 A1 discloses a method for protecting the integrity of image metadata by incorporating a coded version of such metadata in a watermark in the image.
  • WO1999/035785 A1 discloses various ways of protecting the integrity of and time-stamping documents across multiple revisions and using one-way hash functions.
  • WO2006/075566 A1 discloses methods for guaranteeing the authenticity of images documenting for instance insured property, including digital processing and specifically-adapted recording equipment.
  • JP 2008/216342 A discloses a method for verifying the authenticity of a forensic analysis of a computer HDD, whereby the analysis is captured on film. Chained hash functions are used to guarantee synchronization.
  • JP 2001022848 discloses a digital notarization method for proving authenticity and time for electronic documents.
  • CA 2317139 discloses a method for time-stamping an electronic document, wherein a combined digest is calculated for a plurality of documents.
  • One problem with the prior art is to afterwards be able to determine, in a trustworthy way, that a document was indeed time-stamped after a certain historic point in time. For such determination, it is in some cases not sufficient that a trustworthy third party simply states that this was the case.
  • A particular problem is to provide a way to, at a later point in time, prove the authenticity of a document which has an inherent time dimension, in other words that the state of the document changes over time. Examples of such documents comprise samplings or descriptions of real-world sequences of events or processes, where a sequence of samplings or descriptions provides information regarding the development of the state of such a document over time. Concrete examples comprise video footage of sporting events, user interactions and conferences; surveillance cameras; audio material such as telephone conversations; screen captures of a non-static web page the contents of which change as a result of user interactions or as a result of other factors; and the development of predetermined stock quotes over time.
  • The present invention solves the above described problems.
  • Hence, the present invention relates to a method for time-stamping a document the state of which changes over time, characterised in that the method comprises the following steps: a) performing a digital description or sampling of a state of the document at a certain point in time; b) creating a digital signature of the said state, where the signature is created so that it is constituted by, comprises or is calculated based upon an output value of a signature one-way function, where an input value to the signature one-way function is at least a part of the said description or at least a part of the result of the said sampling; c) embedding or incorporating the said signature, or a value calculated based upon the signature, into the document, at a point in time which is later than the certain point in time, in such a way so that it is possible to read the embedded or incorporated value from or based upon a state of the document at the said later point in time; and d) repeating from a) at the said later point in time; and in that, for at least one of the created signatures, the signature in question, or a value which has been calculated based upon the signature in question, is publically published over at least one publication channel, which channel provides the possibility for third parties to, at a later point in time, verify the publication time in question.
  • The invention also relates to a system.
  • In the following, the present invention will be described in detail, with reference to the following drawings:
  • FIG. 1 is an overview of a system for carrying out a method according to the present invention;
  • FIG. 2 is an overview of a method for creating a signal for time-stamping of documents according to a preferred embodiment of the present invention;
  • FIG. 3 shows method steps of a method according to a preferred embodiment of the present invention to produce a time-stamping signal;
  • FIGS. 4a-4c are respective schematic representations of different ways of time-stamping a document;
  • FIGS. 5a-5d are respective schematic representations of different ways of automatically incorporating a current value of a time-stamp into a document;
  • FIG. 6 is a schematic representation of a dynamically updated web page according to a preferred embodiment of the present invention;
  • FIGS. 7a and 7b schematically illustrate a method of providing a way to verify the integrity of a document according to a preferred embodiment of the invention;
  • FIGS. 8a and 8b schematically illustrate a method of providing a way to verify the integrity of a document according to a preferred embodiment of the invention, which document is published on the Internet;
  • FIG. 8c schematically illustrates a webpage filtering method according to a preferred embodiment of the present invention;
  • FIGS. 9a and 9b illustrate respective method steps for verifying the integrity of a document and associated data, respectively;
  • FIG. 10 schematically illustrates a method according to a preferred embodiment of the present invention for proving that an information stream is provided in realtime;
  • FIG. 11 schematically illustrates a method for verifying the integrity of data in a database; and
  • FIGS. 12a-12c schematically illustrate a respective setup for performing a respective first, second and third method according to the invention for time-stamping a document the state of which changes over time.
  • All figures share the same reference numerals and denotations for similar or like components.
  • Herein, the following terms are used with the following respective meanings:
  • A “document” means a piece of information, such as a text, an image, a piece of audio, a moving image such as a film or the like, or a combination of several such pieces of information, which is either digitally stored or capable of being sampled and then stored in digital form.
  • To “sample” a document means converting a document from analogue form to digital form. To “sample” a real-world phenomenon means converting analogue information gathered in relation to said phenomenon and converting such gathered information into digital form. Alternatively, to “sample” may mean receiving or fetching digital information representing or constituting a document which has already been converted into digital form or which exists in the digital domain.
  • “Time-stamping” a document means introducing or creating a piece of information, which piece of information is stored in association with the document as a part of the document or in a way that can be securely re-associated with the document, and that provides a way to, at a later point in time, determine a time at which the time-stamping occurred. One example of such time-stamping is to create a signature (see definition below) of the document and to store the signature and associate it with the document in question.
  • A “reference source” is a certain well-defined source of information which can be sampled, described or used as-is in order to produce a reference document describing a current state of the reference source. Examples of reference sources include the current quotes for certain predefined exchange-traded stock; the current standing in a sports game; the currently viewed image frame in a publically broadcast live television program or a currently broadcast audio signal in such program or a publically broadcast live radio program; and the current front page of a newspaper published on the Internet.
  • A “reference document” is a digital sample, description or snapshot of the current state, at a certain point in time, of a certain reference source with which the reference document is associated. A reference document is “externally provided” in the sense that the reference source is a source which is external to the system 100.
  • A “one-way function” is a function the input value of which is, in practice, impossible to determine based only upon the corresponding function output value, and which is substantially one-to-one in the sense that in the practical applications described herein, two different input values will in practice always result in two different output values. Examples include many hash functions which are conventional as such, such as SHA hash functions, such as SHA-1, SHA-2 and SHA-3, as well as MD5.
  • A “publically published” piece of information or document is published in such a way so that it is readily available to a wide enough audience, and with sufficient persistence over time, so that a third party is likely to be able to verify the time of publication and the contents of the piece of information or document exactly as they were at the date and time of publication, even if some time, such as several years, has passed after the publication.
  • A “signature” of a document is a value created so that it is constituted by, comprises or is calculated based upon the output value of a certain signature one-way function, to which at least a part of the document is one of one or several input values, in such a way so that the signature is substantially impossible to calculate without having access to relevant information about the document.
  • A “proof signature” is a signature calculated for a document in order to, at a later point in time, be able to prove access to relevant information about the document at the time of the creation of the proof signature.
  • A “verification signature” is a signature created in relation to a certain document for comparison with a proof signature which has been calculated earlier.
  • A “digitally coded watermark” is a piece of information which is encoded into a digitally stored document in such a way so that it is only visible or noticeable when observing the document under certain predetermined conditions, such as when subjecting the document to certain algorithms, and which otherwise only has a negligible or unnoticeable effect on the document.
  • FIG. 1 shows a system 100 according to the present invention, comprising a central control device 101 and the following digital interfaces:
      • a document reading interface 102, arranged to read different reference documents D1, D2, D3, preferably reference documents of several different types and associated with different reference sources;
      • a time-stamping signal publishing interface 103, arranged to publish a time-stamping signal value in the form of a time sequence of values as embodied in different documents P1, P2, P3, preferably documents of several different types, published at consecutive points in time, which interface 103 may also be capable of communicating a time-stamping signal value (see below) to third party systems upon request;
      • a document reception and time-stamp delivery interface 104, arranged to allow a user 131 to, via a computer device 130, deliver a document A to the system 100 for time-stamping, and to deliver a corresponding time-stamp or a time-stamped document to the computer device 130; and
      • a document verification interface 105, arranged to receive verification requests from a computer device 140 and to deliver verification status reports to the computer device 140.
  • As each document D1, D2, D3 constitutes a respective sampled state of a respective reference source, the interface 102 is arranged to carry out such sampling for one or several reference sources, hence creating reference documents D1, D2, D3, and/or to simply receive such reference documents D1, D2, D3. Similarly, interface 103 may be arranged to simply send documents P1, P2, P3 to one or several publishers, and/or to order the publishing using one or several self-service publishing services.
  • Each publication P1-P3 should be publically published on at least one channel which is controlled by a third party different from the operator of system 100, preferably on several parallel channels, where each such channel should provide substantially permanent persistence in the sense that documents P1-P3 and their time and date of publication should be publically accessible even after the lapse of several years after publication; be easily accessible by a large number of third parties; be easily referred to; and preferably be immutable to the party ordering the publishing. Examples include various Internet publication channels, such as popular blog platforms, Twitter (registered trademark), video publishing sites such as YouTube (registered trademark), news sites, e-mails to predetermined recipients; paper publications such as newspapers and bulletins; broadcast media such as radio, TV, Text TV, etc.; and telecom platforms such as SMS (Short Message Service) to predetermined recipients.
  • Each such channel should provide the possibility for a broad spectrum of third parties to, at a later point in time, preferably at least several years after the publication time, verify the publication time of the published information.
  • Preferably, at least ten different platforms should be used in parallel, preferably at least ten platforms which are independent from each other in terms of common ownership and control, preferably also under different legislative rule.
  • The system 100 furthermore comprises a database 106 and a clock 107, both of which, together with interfaces 102, 103, 104, 105, are in communication with the central control device 101. The clock 107 may be internal to the system 100, and in that case periodically synchronized with an external, trusted clock, but preferably the clock 107 is in the form of a clock signal received from a trusted external party.
  • The system 100 is implemented as a computerized device, which may as such comprise one or several interconnected computers, and the functionality of which is implemented as suitable hardware and/or software logic. Computer devices 130, 140 in FIG. 1, as well as other computer devices depicted in other figures herein, are merely illustrative, and may be one or many computers, mobile telephones, computer networks or any other type of device capable of automated communication across digital interfaces 104, 105.
  • FIG. 2 is a simplified illustration of a method according to a preferred embodiment of the present invention. The arrow T represents time, and the various events illustrated in FIG. 2 are ordered in the way shown, apart from the one-way function tree shown to the bottom right, within a broken lines box. The latter one-way function tree rather represents an instantaneous state of a certain one-way function structure at the time just before the publishing of P6. An example of such a one-way function tree is a conventional hash tree.
  • In FIG. 2, A, B and D1-D9 represent different digitally stored reference documents; D1#-D9# represent respective output values of a certain one-way function the respective input value of which is the respective reference document D1-D9; T#1-T# 8 represent respective values of a signal according to a preferred embodiment of the present invention for time-stamping of documents, or intermediate values for calculating such signal values; and P1-P8 represent published respective values for such a signal for time-stamping of documents. Hence, either T#1-T# 8 or P1-P8 can be used as the time-stamping signal (described below). If T#1-T# 8 are used as the time-stamping signal, they are preferably published in a way corresponding to the one described herein in relation to P1-P8. Irrespective of which stream of values are used as the time-stamping signal, this signal should be frequently updated, well-defined and stored in database 106, so that it is possible to later verify the historic values of the time-stamping signal.
  • A and B are digitally stored documents, such as texts, word-processing documents, images, video films and so on, provided by the user 131 to the system 100; and D1-D9 are documents automatically selected by the system 100 based upon predetermined associations between the system 100 and the corresponding reference sources.
  • #1, #2 and #3 represent respective one-way functions. The one-way function #1 used for producing D1#-D9# is not necessarily the same as the one-way function #2 used to produce T#1-T# 8 or #3 to produce P1-P8. Even if it is preferred that the same one-way function is for instance used to produce all output values D1#-D9#, it would be possible to change the one-way function used if information regarding what one-way function was used for what operation and when was stored in database 106 for later reference. Each one-way function may be a single function or an aggregate of functions, also accepting other input than the inputs shown in FIG. 2, as long as such an aggregate in itself constitutes a one-way function with an output value which may be deterministically recalculated at a later point in time, given all the used input values.
  • FIG. 3 illustrates the method steps of a method for creating a signal for time-stamping of documents according to a preferred embodiment of the present invention. Such a signal may, for instance, be in the form of an alphanumerical value or a graphical code, such as a QR- or bar code, representing such a value, or have any other type of information format, and is published, transmitted, publishable or transmittable.
  • In a first step, a digitally stored reference document A, B, D1, D2, D3, D4, D5, D6, D7, D8 or D9 is selected. The reference document is a digital description or sample of the current state at a certain first point in time of a certain reference source. The truthfulness of each reference document can be retrospectively verified by consulting one or several publically available information sources concerning the historic state of said reference source.
  • The current state of one and the same reference source can be sampled at several consecutive points in time, to thus create several different reference documents. That the reference document is “selected” means that a reference source is selected and that the digitally stored reference document is obtained, such as by directly sampling the state of the reference source, by reading the current state of the reference source or by receiving a digital representation of the current state of the reference source.
  • In a next step, as illustrated in FIGS. 2 and 3, a one-way function, such as an aggregate of several one-way functions, is employed and an output value of the one-way function is calculated for certain input data. According to a preferred embodiment of the invention, the selected reference document is used as one of at least one input values to the one-way function.
  • In FIG. 2, several different possible alternatives for the one-way function are illustrated. For instance, for document A, the one-way function is #2, and the corresponding output value T# 1 is calculated using D and D123#, which latter in itself is the output value of a previously used one-way function #1 and depending upon documents D1-D3. A and D123# can, for instance, be concatenated before being used as one single input value into #2, or #2 can be designed to accept at least two input parameters. For document D4, the one-way function is constituted by the respective one-way functions #1 and #2, which are used in series. For documents D1, D2 and D3, #1, #1 and #2 are used in series, with intermediate input of other input parameters D1#, D2# and D3#, respectively.
  • Hence, the one-way function may be a single one-way function or an aggregate of several one-way functions, and the same one-way function or aggregate of one-way functions may or may not be used for all reference documents A, B, D1-D9. The important thing is that the reference document in question is an input parameter to the one-way function in the sense that it is practically impossible to calculate the output value without knowing the value of the corresponding reference document in question. Hence, other information, such as other one-way function output values, may also be used as input parameters into the one-way function when calculating the corresponding output value. Preferably, all input values, and their use, are stored, preferably in database 106, for easy re-calculation of the output value at a later point in time.
  • In a next step, the time-stamping signal is updated based upon the said calculated output value, so that the said output value is constituted by or can be determined based upon the value of the signal.
  • In the exemplifying embodiment illustrated in FIG. 2, the signal value is published as documents P1-P8, after additional calculations based upon values T#1-T# 8 as described below. However, in alternative embodiments, the values T#1-T# 8 can constitute the signal value themselves. The important thing is that it at a later point in time is possible to derive each corresponding published signal value T#1-T# 8 or P1-P8 based upon sufficient knowledge about the reference documents A, B, D1-D9 and any other information used when calculating the sequence of time-stamping signal values, and how these calculations were made.
  • FIG. 2 illustrates, in the broken line box, the specific calculation of P6. In the exemplifying embodiment illustrated in FIG. 2, a corresponding calculation is made, at each respective point in time, for each published signal value P1-P8. A tree structure, such as a conventional hash tree, is grown step by step as new one-way function output values T#1-T# 8 are calculated.
  • Said values T#1-T# 8 are logically stored as leaves in the tree structure. Then, a certain tree one-way function #3 is used to digest the leaf values T#1-T# 8 layer by layer in the tree until a tree root is reached, which tree root depends, via the tree one-way function #3, on each leaf which is an ancestor to the said tree root. More specifically, for each parent node a respective output value of the tree one-way function #3 is calculated, where the respective one-way function #2 output signal value and/or calculated tree one-way function #3 output value of each respective child node for the parent node in question are used as input values for the tree one-way function #3 for that parent node. Hence, T# 1 and T# 2 are used as input values to the tree one-way function #3, producing output value I#12. I#12 is used, together in turn with output value I#34, calculated with T# 1 and T# 2 as input values, to, again via one-way function #3, calculate output value I#1234. Finally, I#1234 is used, together with I#56, to, via one-way function #3, calculate I#123456 which constitutes the tree root output value.
  • It is then this root value I#123456, at the point after adding T# 6 and recalculating the tree, which is published as P6. The corresponding may be true regarding values T#1-T# 5, T#7-T# 8 and published documents P1-P5, P7-P8, respectively.
  • In other words, it is the tree one-way function output value of the tree root, or a value which has been calculated based upon this output value, which is publically published as P6.
  • Hence, only the leaf nodes contain one-way function output values that are input to the tree, and each parent node is a one-way function digest of its children. The tree is grown by adding more children and then recalculating the corresponding part of the tree, ending up with a new root node.
  • Then, in a next step the procedure is repeated, and another digitally stored reference document is selected, which reference document is a digital description or sample of the current physical and/or information state of the same or another reference source at a subsequent point in time. Hence, after processing for instance reference document D4, resulting in the calculation of T# 4 and the publication of P4, reference document D5 is processed, resulting in the calculation of T# 5 and the publication of P5. As a result, the tree grows by one additional leaf node, namely T# 5. This way, the tree may eventually grow very large, potentially comprising all previous T# values since the start of the method. Still, it is computationally cheap to process the tree, since only a limited subset of the tree needs to be modified in order to for instance add a node, and a verification only involves the respective tree branch.
  • As the tree grows, more leaf nodes are added, and as a consequence the number of parent node layers will grow. However, since the capacity of the tree grows exponentially with the number of layers, only a limited number of layers will be needed even for very large numbers of stored leafs, such as several billions of leafs or even substantially more.
  • It is preferred that all, or at least most, calculated time-stamping signal values since the start of the method are stored in the tree, and that each tree root which is publically published depends upon all previously calculated signal values.
  • It is furthermore preferred that at least 8 child nodes are associated with each parent node before the parent node is considered full.
  • As the tree grows so that a new layer is created, the previous root node becomes a child node in the new, grown tree, and a new root node is introduced.
  • The reference sources used can be of different types. According to one preferred embodiment, at least one reference source is a set of specified publically published intangible information, the state of which is not known beforehand. Examples of such reference sources include a set of stock exchange quotes from one or several officially recognized stock exchanges; a set of winning lottery numbers from major lotteries; or randomly selected data published by third parties on a widely used publically accessible publishing platform such as YouTube (registered trademark) or Twitter (registered trademark). That the state of the reference source “is not known beforehand” is to be interpreted so that it would have been substantially impossible to foresee the state before the actual point of sampling or selection of the reference document, in the sense that the output value of a one-way function accepting the selected reference document as input value would have been practically impossible to predict before the time of selecting the reference document.
  • According to one preferred embodiment, at least one reference source is, in a corresponding way, a publically published, tangible physical event, the state of which is not known beforehand. Examples comprise a predetermined specific sports event, where a corresponding reference document is captured imagery or audio from the sports event, for instance from a predetermined broadcaster, or results data; specified news coverage, where the reference document is imagery or audio from a predetermined covering news broadcast, text material from a predetermined publisher covering the news event, or statistical data related to the news event; meteorological data; data from publically published scientific progress data from a specified field, such as space exploration; and so on.
  • Combinations of such sources may also of course be used in parallel. The important thing is that each reference source and the method of selecting the corresponding reference document are sufficiently well-defined so that it is possible to determine the actual and specific historic value of the reference document at a later point in time, such as more than one, or preferably several, year after the time of selecting the reference document in question. However, it is realized that even if some, or even most, of the reference sources become unavailable for retroactive inspection after some time, a method according to the present invention will still be able to perform trustworthy verification of document time-stamps and the related verification tasks as described herein due to the redundancy provided by using sufficiently many disparate reference sources.
  • In order to aid in such later re-constructing of the reference document, at least one, preferably all, of the reference documents A, B, D1-D9, preferably together with any other data used as input values to the one or several used respective one-way function(s), are associated with the respective calculated one-way function output value D1#-D9#, D123#, D56#, D78#, T#1-T# 8 and/or the updated and published signal value P1-P8, and the reference document, possibly along with the additional information, is preferably also stored in database 106 for future reference. Also, it is preferred that the time of creation and/or selection of each reference document D1-D9 is stored in database 106, and associated with the respective reference document.
  • Using a method according to the present embodiment, a time-stamping signal is achieved which can be used for time-stamping, so that time-stamps retroactively can be proven not to have existed before a certain point in time. Namely, there is no practical way to foresee the exact composition of a certain reference document, such as D7, before the sampling of the corresponding reference source and thereby the creation of D7. Since the publication P6 depends on D7 in a one-way type of relationship, P6 could not practically have been calculated before D7 was known. Hence, the time-stamping signal value P6 is guaranteed not to have existed before the time of creation of D7. By verifying that D7 is actually a correct representation of the state of the corresponding reference source at the alleged time of creation or selection of D7, it can be verified that P5 did not exist before this time.
  • For instance, if a third party requests proof that P6 did not exist before an alleged creation time of D7, the provider of the time-stamping signal only has to provide the third party with the values D8#, T# 5, I#1234, as well as what one-way function or functions #1, #2, #3 used. Then, the third party can carry out the calculations and hence verify that, to satisfactory statistical certainty, no other reference document than D7 could have produced the published value P6. It is noted that the third party does not have to be provided with the actual values of any other documents, such as A or D1-D6 or D8. It is sufficient to provide corresponding one-way function outputs. This is advantageous, since some reference document information may be classified or sensitive.
  • Hence, a method according to a preferred embodiment of the present invention for verifying that a time-stamping signal value, calculated in accordance with the above described preferred embodiment of the present invention, comprises providing to a requesting party information regarding a publically published digitally stored reference document of the above described type, which could not have been produced before a certain point in time, as well as a specification of any one-way function or functions used to calculate the time-stamping signal value and any input variables used for such calculations apart from the said reference document.
  • A time-stamping signal according to the said preferred embodiment of the present invention can, for instance, be used to guarantee the freshness of a document which is time-stamped using the signal. This and other applications are described in greater detail below.
  • According to one particularly preferred embodiment, at least one, preferably several, of the reference sources are of types the respective state of which typically changes very frequently, preferably several times every second. An example of this is that the reference source is predetermined and unambiguously defined video footage, such as video footage from a predetermined video camera; broadcast by a predetermined broadcasting station; or the like. Preferably, the video footage is publically available, for instance over a broadcasting network or via the Internet. In this case, the individual frames of the video stream, or clusters of such frames, and/or an associated audio stream, are used as reference documents. Using such often-updated and often-sampled reference source makes it possible to provide a time-stamping signal which is updated often, and which hence provides fine timeline granularity.
  • Moreover, it is preferred that the current value of the signal is continuously or periodically published, as shown in FIGS. 1 and 2, in form of documents P1-P8. The signal may also continuously or periodically be sent to a predetermined receiver. “Continuously” is here to be interpreted so that the signal is published or sent as soon as the signal value changes, and/or at a certain minimum periodicity.
  • Preferably, the signal value is changed, and the updated signal is published or sent, at least once every minute, more preferably at least once every ten seconds, most preferably at least once every second.
  • According to one preferred embodiment, the adding of a new tree leaf T#1-T# 6 does not always automatically lead to the publishing of a new corresponding document P1-P6. New documents may instead be published periodically, irrespective of new additions of leafs, and/or upon the request for a new time-stamping signal value internally from the system 100, for instance with the purpose of time-stamping an incoming document, or from any third party.
  • In order to obtain better timeline granularity, better robustness, better resilience to organized attacks by third parties or reference source controllers, and higher trustworthiness, it is furthermore preferred that a collection of several different reference sources are used in parallel, and that reference documents representing different reference sources are used as the respective input value to the one-way function #1 in different respective iterations of the method.
  • It is also preferred that at least some, preferably most, more preferably at least 90%, of the used reference documents, which are per se publically published, are regularly used without the origin of the reference document data being published to third parties, but only disclosed in connection to a verification request from a third party. This adds additional security to the use of the time-stamping signal.
  • As shown in FIG. 2, there is a feedback relationship between consecutive time-stamping signal values, in the form of a dependence of later time-stamping signal values on previous time-stamping signal values for at least one, preferably most, most preferably substantially all, time-stamping signal values. Hence, such a dependent time-stamping signal value T#1-T# 8 or P1-P8 comprises a previous time-stamping signal value T#1-T# 7 or P1-P7, in the sense that a previous or current value of the time-stamping signal, a value upon which a previous or current value of the signal is based, or a value calculated based upon such previous or current signal value, is used as an input value to the one-way function or one-way function aggregate which is used to calculate the value of the time-stamping signal value in question.
  • Such feedback adds redundancy to the time-stamping signal, since some loss of information can be tolerated while still being able to retroactively calculate most time-stamping signal values. Different types of such feedback is exemplified in FIG. 2 in the following ways:
      • One-way function #2 output value T# 1, which in itself may constitute the value of the time-stamping signal at the time or is merely used to calculate the time-stamping signal value P1, is used as input value into one-way function #2 in order to produce output value T# 4, which as such may constitute the value of the time-stamping signal at that, later, time, or which is merely used to calculate the value of the time-stamping signal P4.
      • In a similar manner, D56#, which is the output value of one-way function #1, is used as input value to one-way function #2 both for the calculation of T# 3 and, at a later point in time, T# 5. This way, both T# 3, P3, T# 5 and P5 will depend upon D56#.
      • Each time-stamping signal value or intermediate value T#2-T# 8 depends upon at least one previous such value T#1-T# 7 by this value being used as input value into one-way function #2. This is preferred since it creates a chain of dependence making it very difficult to reproduce the time-stamping signal value for third parties. In particular, it is preferred that at least regularly, rather substantially every time, a time-stamping signal value or intermediate value T#2-T# 8 is calculated, it is caused to depend upon at least one previous value T#1-T# 7, most preferably the immediately preceding such value T#1-T# 7. It is realized that the corresponding can be applied to the calculation of P2-P8.
  • It is realized that some or most time-stamping signal values T#1-T# 3, T#6-T# 8 depend upon at least one externally provided reference document A, B, D1-D9 and are calculated as a direct consequence of the selection of a new corresponding reference document. Some signal values T#4-T# 5, however, are not created as the direct consequence of the selection of a new corresponding reference document, but of the selection of some internally generated piece of information. In this case, such information may as such be dependent upon externally provided reference documents and preferably comprises at least one previously calculated signal value. The latter type of signal values is preferably used in order to increase the updating frequency of the time-stamping signal. According to one preferred embodiment, over time the number of signal values based upon selection of a new respective externally provided reference document are in minority, preferably there are over time at least 10, preferably 100, signal values based upon an internally generated piece of information for each signal value which is based upon an externally provided reference document.
  • One way to achieve such time-stamping signal values which do not depend upon any externally provided reference document is to re-iterate tree nodes, such as the current tree root, in the tree structure shown in FIG. 2, back to leaf level, by making the re-iterated tree node an additional leaf node. This may be done at any interval, and may be used to increase the publication rate of documents P1-P6 above the rate of actual additions of new reference documents. Hence, in combination with what was described above regarding addition of new tree leafs T#1-T# 6 that do not result in a new publication of a document P1-P6, the publication of new time-stamping signals P1-P6 can be made independent upon the addition of reference documents. For instance, even if the inflow of new reference documents varies, a time-stamping signal which is updated at regular intervals, even very frequently, can be achieved with high reliability and security. It is preferred that the system 100 internal data used to calculate such time-stamping signal values have not been specified to third parties beforehand, since this could make it possible to foresee the future values of the time-stamping signal.
  • According to one preferred embodiment, also illustrated in FIG. 2, a certain reference document B is time-stamped using the current respective value P6 of the time-stamping signal, and at least a part of a digitally stored version of the certain time-stamped document B, or the output value of a one-way function an input value of which is the certain document B, is used as an input value for the calculation of a subsequent time-stamping signal value T# 8.
  • Such time-stamping of a document B is described in closer detail below, but can for instance include the incorporation of the time-stamping signal value P6 into the document B in the form of an image or a piece of text. Such incorporation of the current value of the time-stamping signal into a reference document which is used to produce the signal will affect the value of the subsequent time-stamping signal T# 8 or P8. Hence, by retroactively consulting reference document 8, the then current time-stamping signal value may be read, and at the same time the existence of reference document B is a necessary requirement for the existence of T# 8. Hence, such iteration of the time-stamping signal production process involving a reference document B adds an additional layer of security to the method.
  • It is preferred that each published time-stamping signal value P1-P8 comprises a one-way function output value according to the above, such as a hash value, of at least 256 bits. Furthermore, it is preferred that it comprises a date and time information specifying a time after which the signal value in question was publically known and/or a date and time information specifying a time before which the signal value in question was not publically known. The latter may for instance be the time of creation of a corresponding reference document. For such timing activities, the clock 107 is used for reference.
  • FIG. 2 also illustrates another aspect of the present invention, namely to use the repeatedly or continuously updated time-stamping signal to create a time-constrained digital signature of a document A, B, D1-D9. In the exemplifying case with document B, this document is provided by the user 131 and not automatically selected by the system 100, for creation of a digital signature of the document B. However, what is said herein in relation to creating a signature of document B is also applicable to document A and to reference documents D1-D9.
  • According to this aspect, the said signature is created so that it is constituted by, comprises or is calculated based upon the output value of a certain signature one-way function, which in FIG. 2 is exemplified by one-way function # 2 but which may be any one-way function as defined herein. An input value to the signature one-way function is at least a part of a digitally stored version of the document B. In this exemplifying embodiment, the input value is document B in its entirety, even if any well-defined, predetermined part may be used as long as it is practically impossible to calculate the corresponding one-way function output value without knowledge of the contents of document B. The output value is T# 8. However, the downstream value P8 may also be selected constitute a signature of document B.
  • It is preferred that each signature created by or received by the system 100 for a document is stored in database 106 and associated with the document in question, for future use for instance as a proof signature.
  • Further according to this embodiment, a time-stamping signal value is created according to the above described, the current value of which signal, or a value which has been calculated based upon the current value of which signal, is also used, together with document B, as an input value to said signature one-way function. In this example, the time-stamping signal value is T# 7.
  • In the corresponding example using document A, the input value is the whole or a part of document A in combination with D123#, which in this case constitutes the time-stamping signal value, and the output value may be T# 1 or P1.
  • The created signature, or a value which has been calculated based upon the signature, is then publically published, as P8 in the exemplifying case of document B, over at least one, preferably several parallel, publication channel(s) as described above, making it possible to third parties to later verify the publication time of the signature. This provides a way to be able to prove that document B in its form when selected by system 100 did exist at least at the publication time of P6, and that the signature was not created before the time of selection of documents D7 or D8 by the system 100. Also, if P6 is incorporated into document B as described above before calculating T# 8, it can later be proven that document B in its form when selected by system 100, with the incorporated P6, did not exist prior to the creation of P6. The use of this is elaborated on below.
  • According to a preferred embodiment, respective signatures are calculated for a plurality of documents A, B, D1-D9 at different points in time, and logically stored in a tree structure as described above, wherein a distinct tree one-way function # 3 output value of the tree root, or a distinct value which has been calculated based upon this output value, is publically published for each document in said plurality of documents.
  • In analogy to what has been described above for the production of T# 4 and T# 5 not as a direct consequence of the selection of a certain external reference document, according to a preferred embodiment the tree one-way function #3 output value of the tree root, or a value which has been calculated based upon this output value, is publically published also without being the consequence of a signature having been created for a document, and that such publication is preceded by the addition to the tree structure of a value which is not the freshly calculated signature of a document. An example of such value is an internally generated piece of information as described above.
  • It is particularly preferred that such an internally generated piece of information is one of the previously calculated output values of the tree one-way function #3.
  • It is realized that such re-use of the tree one-way function #3 output values in order to create intermediate public publications of values between the creation of signatures of documents is similar to the re-use of previously used time-stamping signal values as described above and used to provide updated time-stamping signal values based only on internally generated information, and that these two methods may both be used both for the generation of the time-stamping signal as such and for the presently described aspect of creating digital signatures of documents.
  • Furthermore, it is preferred that the digital version of the document A, B used for the calculation of the said signature one-way function output value is associated with the created and/or published signature and stored, preferably in the database 106, for future reference and use when a third party requires a verification of the created signature.
  • Some digitally stored documents may comprise too little information for providing sufficient security for the present purposes, since a brute force attack may be successful in guessing the contents of such a document and that way calculate the corresponding one-way function output value. Examples include documents containing 10 bytes or less of significant information. Therefore, and in particular for such small documents, it is preferred that a random number is also used as an input value to the signature one-way function, in addition to the document itself. In this case, it is also preferred that the said random number is associated with the small document and/or the signature one-way function output value and stored in the database 106 for future reference when re-calculating the output value of the one-way function in question. Preferably, such a random number is a random alphanumerical string containing at least 16, preferably at least 256, random bytes.
  • It is preferred that the system 100 is arranged to continuously produce the above described time-stamping signal, and to provide it to third parties in substantially real-time via the described publications of the signal value via interface 103. It is also preferred that the system 100, via interface 104, accepts digitally stored documents from third parties, such as user 131, for which documents a signature is created and published as described above. It is also preferred that any document which is accepted for signature creation is also used as an input into at least one one-way function the output value of which is used to calculate the said time-stamping signal value. This way, any document provided by a third party automatically becomes part of the time-stamping signal process, so that the document and evolvement of the time-stamping signal over time engage in a mutually dependent manner, making it substantially impossible for third parties to fake signatures produced according to embodiments of the present invention since this would require the whole historic time-stamping signal process to be reconstructed or faked.
  • According to a method for time-stamping a document according to embodiments of the present invention, a time-stamping signal according to embodiments of the present invention is embedded or incorporated into a document, such as document B in FIG. 2, which has previously been provided to the system 100 by a third party or which after embedding or incorporating is provided to the system 100, such as user 131. The embedding or incorporation is done in such a way so that it is possible to read the value of the embedded or incorporated time-stamping signal from or based upon the document. Then, a signature of the document B with the embedded or incorporated signal value is created, so that the said signature can be re-calculated only with knowledge of the contents of document B with the embedded or incorporated signal. This way, it is possible to, at a later point, prove that document B with the embedded or incorporated signal did not exist prior to the time-stamping time of the embedded or embedded or incorporated time-stamping signal, and that document B at least existed when the signature was created.
  • Therefore, a time interval during which document B with the embedded or incorporated signal must have been created can be established and publically proved with high certainty. It is particularly preferred that the time-stamping signal is in fact embedded or incorporated into the document in immediate connection to the creation or updating of the document in question. It is especially preferred that such incorporation takes place using a piece of standalone technical document-creating equipment which is arranged to read a time-stamping signal from the system 100 directly via interface 103 or via publications P1-P8, to embed or incorporate the time-stamping signal value as an integrated part of the document-creating process, and to substantially immediately provide the created document to the system 100, via interface 104, for creation of a signature and publishing of the corresponding time-stamping signal. Examples of such methods are given in the following.
  • As an alternative to embedding or incorporating the current value of the time-stamping signal at the time of time-stamping of the document, the said current value may be associated and stored together with the document on a central server, such as in the database 106, for future reference. Alternatively, the document may be available from an external source, in which case only a one-way function output value from a one-way function to which the document is input value may be stored in database 106.
  • FIGS. 4a, 4b and 4c show three different ways of embedding the time-stamping signal 402 into a digitally stored document 400, where the embedded time-stamping signal is in the form of a piece of information from which the value of the signal can be deduced. The three examples are all applied to a document 400 comprising image data 401, but it is realized that the corresponding time-stamping techniques can be applied to other types of documents, such as documents comprising video footage, plain text, audio, a web page and so on, or combinations thereof.
  • In FIG. 4a , the time-stamping signal 402 is introduced in the form of a graphical element, such as a string of alphanumeric characters, a QR code or a barcode, into a visual representation of the document, which graphical element carries said piece of information. Hence, by viewing the document 400 image and interpreting the graphical element, the value of the time-stamping signal is readily available.
  • In FIG. 4b , the document 400 comprises, apart from the image data 401, also conceptually illustrated metadata information 403, 404. Then, said piece of information 402 is added to a digitally stored version of the document as a metadata field. Such metadata field is of course only visible when read by a metadata reading algorithm, which may be conventional as such.
  • In FIG. 4c , said piece of information 402 is in the form of a digitally coded watermark 402 which is incorporated into a digitally stored version of the document 400. In the exemplifying case shown in FIG. 4c , the image data 401 and the time-stamping signal value 402 are merged using a per se conventional digital watermarking algorithm, so that the resulting document 400 comprises an image which is substantially unaffected when viewed in the normal way, but which reveals the encoded time-stamping signal value 402 when subjected to a predetermined, per se conventional watermark decoding algorithm.
  • It is preferred to incorporate a current value of a time-stamping signal, for instance a time-stamping signal such as the one described above, automatically upon production of a document. Preferably, this takes place at the same instance as, or in immediate connection to, the production of the document. In the case of a document which is only available in a digital form once produced, such as a digitally stored image obtained by sampling light inciding towards a digital image sensor, it is preferred that the said incorporation takes place as a part of the sampling process, or at least as an integrated step of the image production process before a final digitally stored image is obtained and can be used.
  • FIGS. 5a, 5b and 5c illustrate the use of a piece of document producing hardware sampling equipment 500, arranged to sample a real world physical phenomenon, such as taking a digital photography, and to produce a digitally stored sampled document 501 reflecting a corresponding state of the real world. The equipment 500 is specifically adapted to perform a time-stamping method according to the above described.
  • In FIGS. 5a-5c , the document 501 produced is exemplified by an image, and the piece of equipment 500 is an optical camera. It is, however, realized that other types of documents can also be contemplated in corresponding ways, as elaborated on above in connection to FIGS. 4a-4c . Hence, the camera 500 may instead be for example a digital audio recorder or a digital video camera.
  • A real-world item 510 is depicted by the camera 500 in the form of the digitally stored, conceptually illustrated document 501, and it is preferred that the document 501 is substantially immediately transferred, by the camera 500, to a system 100 according to the present invention, via interface 104 to which the camera 500 is connected via a communication channel to which the camera 500 has been provided access, for instance via wired or wireless Internet.
  • Then, the system 100 preferably uses the document 501 as input variable into a one-way function so that later produced time-stamping signal values depend upon the existence of the document 501. Specifically, it is preferred that a digital signature of the time-stamped document 501 is created according to the above described, and that the produced signature is associated with the document 501 and stored in the database 106.
  • According to one preferred embodiment, the equipment 500 is caused to calculate a one-way function output value of the document 501, in connection to performing the sampling, which sampled physical phenomenon constitutes the document 501, and said output value is then communicated from the equipment 500 to the central system 100 over said communication channel.
  • It is also possible, in other embodiments, for the equipment 500 to calculate the signature of the document 501 itself. In this case, the equipment 500 first receives the current value of the time-stamping signal from interface 103, via a communication channel provided between the system 100 and the equipment 500, such as a communication channel via wired or wireless Internet.
  • In particular when the document 501 comprises at least one still image, or one frame in a moving image, it is preferred that the current signal value at the time of sampling the document 501 is embedded 502 into the image or frame by positioning a graphics-presenting device 520, arranged to show a graphical element carrying said piece of information such as an alphanumerical code, a barcode or a QR code, in the image or frame as viewed by camera 500, so that the graphical element is captured as a part of the sampled document. This is illustrated in FIG. 5a , in which the graphics-presenting device 520 has been provided access to said communications channel to interface 103 of system 100, over which the current time-stamping signal value is communicated to the device 520 for display. The device 520 may, for instance, be in the form of a small screen.
  • FIGS. 5b and 5c , on the other hand, both illustrate situations in which the camera 500 itself is provided access to a communication channel over which the current value of the time-stamping signal is communicated to the camera 500 from interface 103, and wherein the camera 500 itself embeds the current signal value into the document 501 in connection to performing the sampling.
  • In FIG. 5b , there is a graphics-presenting device 530 which is an integrated part of the same general device as the image-capturing device 500. For instance, the device 530 may be in the form of a small screen located on the front side of the camera 500, such as the screen on a so-called smartphone the front camera of which is used to capture the document 501 image. The graphics-presenting device 530 is arranged to present said graphical element at the same time as the camera 500 captures the document 501 image. A mirror 531 is used, so that the device 530 is visible in the view of the captured document 501 image. Hence, the document 501 depicts, via mirror 531, an image covering the device 530.
  • Both the method illustrated in FIGS. 5b and 5c are particularly suitable when the document 501 comprises at least one still image, or one frame in a moving image. In the latter case, it is preferred that the subsequent frames in the moving image are treated as described herein for one frame, iteratively.
  • In FIG. 5c , the current signal value at the time of capturing the image or frame is embedded into the document 501 image by feeding the signal to the camera 500, from interface 103, and causing the camera 500 to embed the said piece of information digitally into the document 501 image. This is achieved by a digital image-manipulation means 540, which may be software-implemented but for security reasons preferably is in the form of a dedicated piece of hardware equipment which is integrated into the camera 500 and arranged to receive and automatically embed the piece of information into the document 501 upon sampling.
  • It is realized that the embedding techniques illustrated in FIGS. 4a-4c can be used together with embedding techniques illustrated in FIGS. 5a-5c in any combination, both for image documents and any other type of applicable document.
  • By incorporating the current value of the time-stamping signal into the document 501, the document can be securely time-stamped in a way which can be verified by third parties in retrospect. If the document 501 is also substantially immediately fed to the system 100 so that it is used for the calculation of future time-stamping signal values, the captured document 501 can be securely time-stamped within a very short time interval within which the document must have been produced.
  • FIG. 5d illustrates schematically a timeline T and associated events between a real-world event involving a ball 600 bouncing on the ground 601, which is depicted using camera or video camera 500 which is in turn connected to a system 100 according to the present invention.
  • The camera 500 is arranged to sample 610 the light incident from the scene with the ball 600 towards the camera 500, and to produce 611 a series of digitally stored images 501, each depicting the bouncing ball 600 at different points in time. This series of images 501 may preferably be in the form of a video footage, such that each image 501 constitutes a respective frame in a video film of the bouncing ball 600.
  • Preferably, the current respective value of the time-stamping signal is received 613 from the system 100, via interface 103 and is embedded 502, as described above, into the sequence of images 501 by individual images being caused to contain the respective current value of the signal at the time of capturing the image in question, or at least the last known updated such value at the time of capturing the image 501.
  • As illustrated in FIG. 5d , all images 501 need not have an embedded signal value 502. However, in order to improve security, it is preferred that at least one frame every second of a captured video stream includes such a value 502, and preferably at least 10% of the individual images 501 in a sequence of images captured by the camera 500 in accordance with what is described herein.
  • This makes the image sequence difficult to fake for a third party, since the progression of the time-stamping signal can be traced afterwards in the sequence of images 501.
  • In order to further improve security, it is preferred that at least one image 501, preferably at least one image every second of a captured video stream, and preferably at least 10% of the individual images 501 in a sequence of images captured by the camera 500 in accordance with what is described herein, is or are communicated to the system 100, via interface 104, so that the image can be used as a reference document for producing the time-stamping signal as described above. This way, the updated time-stamping signal embedded in at least one later captured image will contain an embedded time-stamping signal which is dependent upon a previously captured image in the same series of images or the same video stream. Preferably, at least one such previously captured image had the then current value of the time-stamping signal embedded in such a way so that it affects the value of the time-stamping signal calculated based upon that image. This makes the sequence of images or video stream an integrated part of the evolvement of the time-stamping signal, which in turn makes it possible to at a later point in time verify the time of capturing the sequence or stream with very high certainty, by referring to publically public information as described above.
  • In other words, a signature, or a value which has been calculated based upon a signature, of one sampling is first published. Then, the published value is used as an input value to the signature one-way function used to create a signature for a later sampling in a subsequent iteration.
  • Hence, a video sequence or stream used in this way is a document with an inherent time aspect, the state of which changes over time. At the same time, because of the described feedback mechanism, the video sequence or stream constitutes a reference source, the current state of which is sampled and used as a basis for the calculation of the time-stamping signal, which in turn is embedded into the video sequence or stream hence affecting both future states of the video itself and future values of the time-stamping signal. The corresponding is true regarding other types of documents with inherent time dimensions, apart from video footage.
  • According to one aspect of the invention, different versions of a version-handled document constitute different such states, in case each version has a defined time at which the version existed. According to another aspect of the invention, such version-handled document versions are not covered by the present invention. In the latter case, only documents that directly reflect the development of a particular changing real-life, physical phenomenon are covered by the invention.
  • According to a preferred embodiment, the document the state of which changes over time is a sequence of samplings of an interactive session between a first party and a second party. Such an interactive session can be considered to be a reference source as defined herein, the state of which changes over time. Examples of such sessions comprise a remote dialog, over the Internet and via a desktop computer of a user, between the user in question and a helpdesk; a chat conversation between two parties; a video chat between two parties; or the like. Preferably, the session is between two parties, each using an electronic device such as a server, computer or mobile phone to communicate with the other party. Preferably, both parties are human, but in some embodiments one or both of the parties are automated. More than two parties may also join in the session.
  • The “state” of the session may, for instance, be screen contents of one or both of the electronic devices; captured audio from the session; a text message sent from one party and shown to the other party; or the like.
  • According to this embodiment, the interactive session, more precisely the current state of the interactive session, is sampled repeatedly during the duration of the session, and the sampled document states are provided to and saved in a central server, such as the system 100, together with the created signature values.
  • The signature is then used for producing a code which is incorporated into a subsequent state of the interactive session, in a way analogous to that described above in connection to FIGS. 4a-4c . Preferably, and also as described above, both the signature and the current value of the time-stamping signal are used as input values to a one-way function producing the value to be incorporated, so that the incorporated value depends both on a previous value of the time-stamping signal and a previously sampled state of the same interactive session. Furthermore, the signature, or a value calculated based upon the signature, such as a later calculated time-stamping value which is dependent upon the signature value, is publically published.
  • The said incorporation of said value preferably is in the form of an embedded item which is embedded so that it is graphically visible on at least one of the displays of the electronic devices used by the parties as a part of the interactive session. In particular, the incorporation is preferably made so that the value can be directly or indirectly deduced from a sampling of the state of the interactive session performed at a point in time at which the value in question was incorporated.
  • This way, the interactive session will constitute an integrated part of the process of creating and publishing the time-stamping signal, and a third party gaining access to the performed samplings can verify, at a later point in time and using publically available data, both the time and the contents of the interactive session.
  • FIG. 12a illustrates a first preferred variant of such a method, in which the interactive session is a remote session conducted over the Internet between a first party 1221 using an electronic device 1220 in the form of a computer and a second party 1230. A current state of the session is illustrated by the contents 1201 of a web browser 1202 displayed on the screen 1222 of the electronic device 1220. The state 1201 comprises an incorporated item 1205 which is or is based upon a calculated signature of a previously captured state of the interactive session.
  • Preferably, the series of samplings of the session comprise screen dumps, such as a copy of the contents 1201, and/or audio capture, of the session as seen from at least one of the two parties 1221, 1230. According to one preferred embodiment, the samplings are performed using a software application executed on or from at least one of the electronic devices 1220, 1230, using which a party participates in the interactive session. In the example shown in FIG. 12a , the software is executed on or from the computer 1220.
  • Preferably, the software application is arranged to sense state changes concerning the interactive session, in terms of screen updates and/or audio events, and to trigger samplings as a reaction to such state changes. Such sensing and triggering can take place in ways that are completely conventional as such, for instance by installing the software as a plugin to the web browser 1202.
  • As seen in FIG. 12a , the computer is arranged to communicate with the interface 104 of the system 100 for providing sampled states for time-stamping and also for receiving updated time-stamping signal values.
  • FIG. 12b illustrates a similar setup as in FIG. 12a , but wherein the sampling does not take place using a software application of the electronic device 1220 itself, but rather using a camera 1223, which is preferably a video camera, for capturing image material such as video material. Then, the said samplings comprise said image material, captured by the camera 1223 so that the screen 1222 of the electronic device 1220 using which one of said parties 1221 participates in the interactive session is visible for the camera's 1223 view. Furthermore, the camera 1223 is in communication with a central server, such as the system 100 via interface 104, for delivering the captured document states to the system 100. The capturing may but need not be synchronized with events of the interactive session. It is preferred that the captured image material comprises audio, and also that the image material covers a view in which an input means of the electronic device 1220, such as a keyboard 1224 or a mouse, is visible, so that it is possible to, at a later point in time, follow physical interactions by the user 1221 with the device 1220, using such input means, by viewing the sequence of samplings of the document state, such as viewing a video film captured by the video camera 1223.
  • FIG. 12c illustrates another preferred way of implementing a method for time-stamping an interactive session. Herein, the said central server, such as the system 100, or a separately arranged central server 1210 which in turn is in communication with the system 100 via interface 104, is arranged to initiate the said samplings, and the corresponding creation of signatures for each such sampling, upon a request from at least one of the parties 1221, 1230. In the particular example shown in FIG. 12c , the interactive session is a web session conducted using interconnected devices 1220, 1230, and the communication between the parties is routed via the server 1210. For instance, the user 1221 may request the server 1210 to act as an intermediary for a web session with the other party 1230 in connection to setting up the interactive web session. In reaction to this request, the server 1210 then enters as an intermediary in said session, forwarding all web traffic from the device 1220 to the device 1230 and vice versa, and at the same time performing continuous, periodical or intermittent sampling of the current state of the session and also incorporating the said value into the state in a way making it visible to at least user 1221 via device 1220 during the duration of the interactive session. This may take place in a way which is otherwise transparent to the parties 1221, 1230, in particular to the device 1230, apart from the fact that the IP address of the server 1210 is used instead of that of the opposite party for the session.
  • The embodiments shown in FIGS. 12a-12c can be freely combinable. For instance, an intermediary server 1210 can be used in combination with a piece of software on the computer 1220 arranged to incorporate a current time-sampling signal value in the current state of the session as viewed by the user 1221. Furthermore, the sampled information can be digital information which is simply intercepted from the interactive session, such as a screen dump or a piece of text; analog information which is digitally sampled, such as a digital photograph of the screen 1222 or a digitally stored audio uptake from the room in which the device 1220 is arranged; or any combination of the two. Also, any metadata available to the central server 1210 may be recorded from the interactive session.
  • Moreover, a piece of software as described in connection to FIG. 12a may also be arranged to provide a user-activatable means, for instance as a control in the web browser 1202, for activating the recording by system 1210 of activities in the web browser 1202.
  • Instead of using for instance a single frame of a video footage, it is preferred to as reference document use a long enough section of a stream, such as a video and/or audio stream, in order for a human taking part of the said section at a later point to obtain a good understanding of the contents of the stream at that point. For instance, the selected section should be at least 10 seconds, preferably at least 1 minute, preferably at least 2 minutes long. The time stamp associated with the reference document would in this case be the actual end time of the section, and this time information should be associated with the reference document and stored in database 106. It is preferred that data from substantially the whole time frame of the selected section is used as input value to the corresponding one-way function.
  • Furthermore, reference documents from the same stream reference source will in this case preferably be produced at more frequent intervals than the length of each section. Then, it is preferred that the stream itself, that is the reference source data or a converted or sampled form of the same, is stored in its entirety in database 106, together with information regarding how to extract which reference documents from the stored stream. This way, there is no obligation to store each selected section for each reference document also in cases where such sections overlap.
  • To further add additional security, it is preferred that a number of consecutive images 501 comprise footage of a natural phenomenon the development of which is foreseeable by a viewer. This is illustrated in FIG. 5d in the form of the bouncing ball 600, and makes it more difficult to fake the series of images by for instance image manipulation. Such a deterministic phenomenon is useful, but it is even more preferred to, instead of the bouncing ball 600 described herein, use in the corresponding manner a phenomenon the general development of which is foreseeable and clearly time-directed, but the details of which comprise chaotic elements. Examples include a fire developing and a road with traffic passing by.
  • Such a method is particularly suitable for use in a video conference system or a video surveillance system which is arranged to capture video footage in accordance to what has been described in connection to FIG. 5d , possibly in combination with what has been described in connection to FIGS. 5a -5 c.
  • For instance, a video conference or surveillance system may comprise an image-displaying device 520, positioned in the view of a video camera and arranged to display a current and preferably continuously updated value of the time-stamping signal to be captured as a part of the captured video footage, while the video footage data is continuously fed to the system 100, creating a feedback loop in turn making it easy to later verify the time of recording of the video stream. In another example, a natural phenomenon, such as a moving pendulum, is arranged in the view of the video camera.
  • In other words, in these embodiments the sampling equipment 500 is caused to sample 611 the physical phenomenon repeatedly over some period of time T so that several reference documents 501 are produced, at least one such document is time-stamped as described above, at least a part of a digitally stored version of the said time-stamped document is used, by the system 100, as an input value for calculating the time-stamping signal as described above, and the time-stamping signal value after being updated using the said time-stamped reference document is embedded into a later produced reference document as captured by the equipment 500.
  • FIG. 6 illustrates a web server 600 arranged to provide a web page 601 to a requesting computer device 610, upon the command of a user 611. The web page 601 is merely schematically illustrated in FIG. 6, for reasons of clarity.
  • The web page 601 comprises an embedded time-stamping signal value 602, which can be embedded in any of the ways described above in connection to FIGS. 4a-4c , but is preferably a component on the web page 601 which is visible to the user 611 viewing the web page on the screen of the computer device 610.
  • Hence, the web page 601 constitutes the digitally stored document referred to above.
  • The web page 601 further comprises programming code 603, schematically illustrated in FIG. 6, which code 603 is arranged to initiate a time-stamping of the document, i.e. the web page 601, according to what has been described above. Hence, the programming code 603 is arranged to receive from the server 100, via a communication channel such as the Internet and via interface 103, an updated time-stamping signal value from the server 100, and to update the embedded value 602 in accordance with this updated signal received from the server 100. Preferably, this reception of the updated time-stamping signal value is preceded by the programming code 603 communicating a current state, such as the current visual look, of the web page 601 to the server 100, via a corresponding communication channel and via interface 104, so that the updated signal value is based upon said communicated state.
  • It is preferred that such an update procedure of the embedded code 602 is initiated by the programming code 603 as a consequence of the web page 601 being requested by computer device 610, and hence being viewed. This way, it is guaranteed that the user always sees an embedded code 602 which was the most recent one available at the time of the requesting of the web page 601. Also, it can later be proven how often and when a web page has been requested, by consulting system 100 via interface 105.
  • The programming code may be of a conventional type, such as Javascript (registered trademark).
  • In other words, a non-static web page may be viewed as a document with an inherent time dimension according to the discussion above in connection to FIGS. 12a-12c , and in particular the state of which document changes over time. As a result, the viewing of such a web page can be interpreted of such a state change.
  • FIG. 7a illustrates the setup, and FIG. 7b the method steps, of a method according to a preferred embodiment of the present invention of providing a way to verify the integrity of a document 701, which document may but need not be digitally stored, and may for instance be a document which is printed in a magazine or an outdoor commercial spot, or displayed on an electronic display. It is preferred that the document 701 is printed in a permanent way, integrated within the document.
  • In this method, the document is firstly time-stamped according to what has been described above, in the sense that the system 100 calculates an updated time-stamping signal value and associates a digitally stored version of the document 701, such as a digital sampling of the document or an original, digitally stored master copy of the document 701, in the database 106 with the said updated signal value.
  • In a next step, the document is published with a visibly embedded piece of information 702, such as described above in connection to FIG. 4a . This publishing is done by a publishing device 700, which may for instance be a print shop or -office, arranged to receive the above said updated time-stamping signal and to embed it into the image 701 as information 702. It is preferred that the information 702 is published as an integrated and inseparable part of the document 701. It is further preferred that the information 702 is embedded in the form of a QR code or barcode, since such are easily recognized by image interpretation software in the system 100.
  • Then, a communication channel is provided, over which a third party user 710 can send, via interface 105 to the system 100, a depiction of the published document 701. The user 710 can typically use his normal Internet-connected camera 711 or smartphone to take a picture of the image 701, including the information 702, and send the digitally stored picture, via interface 105, to the system 100 for analysis.
  • The system 100, in turn, accepts the depiction of the published document, and deduces the value of the time-stamping signal from the piece of information 702 visible in the depiction. This is made in a way which is convention as such, and may comprise image interpretation logic, and specifically interpreting a QR code as an alphanumerical code which is or is associated with the signal value in question.
  • Then, based upon the said time-stamping signal value represented by information 702 and its association with the digitally stored version of the document 701 in the database 106, the system 100 finds said digitally stored version, if there is such a digitally stored version associated with the said time-stamping signal value in the database 106.
  • If such a document is found, the digitally stored version of the document itself, or information pertinent to that document, is communicated to the third party 710, via interface 105 from the system 100, and for instance to an internet-connected computer equipment 712 of the user 710. Pertinent information may, for instance be predetermined additional information, such as metadata, which has been associated with the document in the database 106 beforehand.
  • It is preferred that such metadata is a piece of information using which the user 710 can identify the image, and that way verify the authenticity of the image 701. For instance, the document itself may be sent, in which case it is easy for the user 710 to verify the image by simply comparing the image 701 to the document received to the computer equipment 712.
  • Such a method provides a way for the user 710 to, using only standard equipment such as a normal smartphone, quickly and reliably verify the authenticity of an image irrespective of where or in what format it is presented.
  • In a preferred embodiment, the image-capturing equipment 711 continuously analyzes imagery captured by equipment 711 and monitors for visual pieces of information 702 in the view of equipment 711. As soon as such information 702 has been detected by the equipment 711, the information is sent to system 100 for verification, as described above, and if the time-stamping signal value represented by the detected information 702 is found to correspond to a document previously time-stamped by the system 100, information relating to the time-stamped document is received by the equipment 711 from system 100, whereupon the equipment 711 displays an image with graphical overlay in connection to the detected information 702, giving information to the user 710 that the detected information 702 is associated with a time-stamped document. For instance, a smaller version of the image itself can be displayed on top of, or in connection to, the information 702 when visible in the view of the equipment 711.
  • According to a preferred embodiment, the document 701 is a frame in a video footage, and the piece of information 702 is embedded into the video footage by individual frames of the video being caused to contain a respective piece of information 702. The video footage may be as described above in connection to FIGS. 4a-5d , and respective information 702 may be inserted into each frame or only a subset of the frames, such as at least one frame for each second of video material. Also, the inserted information may represent a signature which is updated using continuously updated time-stampings signal values or only intermittently updated time-stamping signal values. The signature represented by the piece of information 702 is calculated based upon either the currently viewed frame 701; a predetermined subpart of video material; or the video material as a whole.
  • FIG. 8a illustrates the setup, and FIG. 8b the method steps, of a method according to a preferred embodiment of the present invention of providing a way to verify the integrity of a digitally stored document 801 which is published on the Internet and viewed using a web browser 802, for instance as a part of a web page 803.
  • Such a method comprises the step of, firstly, time-stamping the document 801 according to what has been described above and in analogy with the initial time-stamping of document 801 as described above in connection to FIG. 7a . The document 801 may be, for instance, an image, a video sequence, or other types of graphical material the authenticity of which may be desired to verify by a third party 810 user viewing the web page 803.
  • In a next step, the document 801 is published on the Internet, with associated programming code arranged to react upon some kind of activation by the user 810. The programming code is preferably a part of the web page 802, and may be integrated into the document 801 itself. Such activation may, for example, be in the form of activation of an activation means, such as a selection of or clicking on the document 810 in the web browser 803, or the activation of a user control 804 such as a graphically represented clickable field, for instance in the same web page 802 as the document 801.
  • Upon a detection of such activation, the document 801 is sent to the system 100, via interface 105. Upon receipt of the document 801 in the system 100, the system 100 is caused to lookup, in the database 106, if the document 100 has been time-stamped by calculating the corresponding digital signature and checking if a document with the same digital signature has previously been time-stamped. This check is preferably based upon previously calculated hash values rather than upon the previously stored underlying documents themselves. Alternatively, a one-way function output value is calculated, with the document 801 as an input value, and the said output value is communicated to the system 100, via interface 105. Then, the system 100 checks if a document with the same signature as the provided value has been time-stamped. In this latter case, the system 100 may not need to store the document 801 itself, but only the digitally stored signature of the document 801.
  • If such a document is found, the system 100 is arranged to communicate, to the third party user 810, some kind of information 805 pertinent to the document 801 and which allows the user 810 to verify that the document 801 is authentic in the meaning that it is verifiable that the document 801 has previously been time-stamped by system 100.
  • It is preferred that the said pertinent information is presented in the web browser 803, possibly in the same web page 802, in that case preferably as an embedded part of the document 801. In some embodiments, the pertinent information 805 is a symbol, such as a check-mark or such, simply signaling that a match was found in the database 106. In other embodiments, the pertinent information 805 is in the form of a graphical element similar to the element 402 as described above in connection to FIG. 4a , allowing the user to identify, directly or indirectly, a time-stamping signal value associated with the document 801, which then can be used to directly verify the time-stamping authenticity of the document 801 via interface 105. It is also preferred that the pertinent information comprises a time and date of the time-stamping of the document 801 by the system 100.
  • It is preferred that the interface 103 is arranged to provide the said pertinent information in the form of the document 801 itself, with the said pertinent information visually embedded in the document 801, and that the web browser 803 is arranged to replace the document 801 with the one provided via interface 103 upon said user 810 activation and database 106 lookup.
  • Moreover, in the particular case in which the document 801 is a still or moving image, it is preferred that, upon a first user 810 activation, the said pertinent information is published in connection to the image, such as communicating an updated document 801 with embedded pertinent information 805 as described above, but without the web browser 803 leaving the currently viewed web page 802.
  • Upon a second user 810 activation, it is in this example however preferred that the web browser 803 is redirected, preferably on the initiative of said programming code in the web page 802, to another page, where the document 801 together with pertinent information 805 is presented to the user 810 in the web browser 803. In this case, it is preferred that the web page redirected to is a trusted web page hosted by the operator of the system 100, where more detailed information about the document 801 and its time-stamping can be presented to the user 810.
  • In all the above described examples relating to FIGS. 8a and 8b , it is preferred that the said pertinent information 805 comprises the time of the document 801 time-stamp as stored in the database 106.
  • According to another, related, embodiment, a document which has not yet been time-stamped by system 100 is provided with a piece of programming code providing an activation means allowing a viewing user to activate a function which results in the sending of the document in question, via interface 104, to the system 100 for time-stamping. Preferably, metadata specific to the web page in which the document in question is shown, preferably also along with metadata specific to the activating user, is also sent to the system 100 for time-stamping in association with the document. According to one preferred embodiment, the programming code thereafter changes the activation means to the type discussed above, allowing a user viewing the webpage to verify the time-stamping of the document.
  • According to one preferred embodiment, a webpage is provided in which all documents contained in the webpage and that have already been time-stamped are provided with respective activation means allowing the user to verify a previously made time-stamp, while the remaining documents contained in the webpage that can be time-stamped by the system 100 are provided with respective activation means allowing the user to perform a time-stamping of the document in question.
  • FIG. 8c illustrates an embodiment of the present invention, in which the user 810 uses a computer device 811 to view a certain webpage provided by a server 820. 821 is a simplified illustration of how the webpage looks when viewed in a browser on the computer 811 as directly communicated from server 820 to computer 811, for instance via the Internet.
  • However, the user 810 can choose to view the webpage provided by server 820 through a filtering server 830, in which case the viewed webpage looks like the simplified illustration 831. In 831, the webpage is shown in a way corresponding to the way in 821, but with added or modified content. In 831, this content is exemplified by check-marks on documents that have been confirmed to have been time-stamped previously by system 100.
  • In order to produce the webpage view 831, the filtering server 830 fetches, upon the request of the user 810, the webpage in question from server 820, and investigates its contents. Preferably, both the webpage as a whole and its various constituent parts are examined individually, and each are sent to the system 100 for verification of any time-stamps made for the respective sent items. The procedure for performing such verification has been explained above. Then, each positive verification is stored by server 830, which then adds elements to or modifies documents verified to have been previously time-stamped by system 100 and sends the modified webpage to the user's 810 computer 811 for viewing as 831. In FIG. 8c , all three documents contained in the webpage, as well as the webpage itself, were verified to have been time-stamped.
  • It is preferred that the said added or modified content constitute respective activation means as described above, by the activating of which the user 810 may verify that the time-stamp is indeed authentic as described above.
  • Hence, the filtering server 830 is arranged to read webpage data from web server 820, to investigate if the received webpage data contains any documents of a type that may be time-stamped by system 100, to send a query to the system 100 requesting verification, for each one of the found documents, if any, of whether the respective documents have been previously time-stamped by the system 100, and then to produce updated webpage data with incorporated verification signaling elements for documents that have been verified to have been time-stamped, to the computer 811 operated by user 810. It is preferred that the signaling means are in the form of visual elements shown in connection to each verified document in the modified webpage.
  • It is furthermore preferred that the filtering server 830 is arranged to, as a consequence of the user 810 requesting the webpage data via filtering server 830, send to the system 100, via interface 104, each document contained in the webpage, and preferably also the webpage itself if applicable, that can be time-stamped by the system 100 and which has not yet been time-stamped by the system 100, for time-stamping such as been described above. Alternatively, one-way function output values of such documents may be sent to the system 100, using a predetermined one-way function which is known by the system 100.
  • Applying the above described techniques, and in particular the creation of a digital signature of a digitally stored version of a document, it is possible to achieve a way to be able to verify the integrity of a digitally stored document, in the sense that it is possible to establish that the document in question is identical to a document for which a digital signature was created at a historic point in time, which point in time can be specified with high certainty as described above.
  • In such a method according to a preferred embodiment of the present invention, which is illustrated in FIG. 9a , a digital proof signature is first created of the digitally stored original document, the integrity of a digital copy of which is later to be challenged. The creation of the digital signature is performed as described above, and the signature is associated with the document and stored in database 106. Then, at a later second point in time, the integrity of a digitally stored document, alleged to be an identical, untampered version of the same document as the one for which the proof signature was calculated, is challenged. Then, the system 100 receives, by a challenging third party person or system and via interface 105, a digitally stored copy of the challenged document, for which a corresponding digital verification signature is created of the received document. This verification signature is calculated in the same way as the proof signature, and using the same historic value of the time-stamping signal which was used for the creation of the digital proof signature. Hence, stored historic data regarding the time-stamping signal are sought out in the database 106 and used in the creation of the verification signature. Finally, the integrity of the received document is positively verified only in case the digital proof signature is equal to the digital verification signature. If such verification is possible, it will also be possible to, in a provable manner as described above, specify a point in time at which the original document existed in the same form as the challenged document.
  • Using the present method, it is also possible to verify the integrity of and time of time-stamping of one or several pieces of digitally stored metadata pertinent to a certain digitally stored document. For instance, an image of the scene of an accident to be used for insurance purposes may comprise metadata regarding photo time and date; geographic position; a text description; information about parties involved in the accident; and reference numbers of related insurance policies. Each of these pieces of metadata may be challenged at a later point in time, and need to be verified.
  • In general, a method according to a preferred embodiment of the present invention for verifying the integrity of a certain metadata information pertinent to a digitally stored document is similar to the method described above in connection to FIG. 9a , and involves the steps of, at a first point in time, creating a digital proof signature of the document as described above in relation to FIG. 9a , but wherein the signature one-way function is calculated based upon both at least a part of a digitally stored version of the document itself as well as upon said metadata information. The created digital proof signature is stored in database 106. Then, at a later second point in time, the integrity of the metadata in question is verified by receiving the metadata information from a challenging user person or system, creating a corresponding digital verification signature of the document as described above in connection to FIG. 9a and using the same value of the signal used for the creation of the digital proof signature. Lastly, the integrity of the metadata information is verified only in case the digital proof signature is equal to the digital verification signature pertinent to the document.
  • FIG. 9b illustrates a special case of this general method for verifying the integrity of a piece of metadata, which offers the added advantage that the integrity of one or several pieces of metadata information can be verified without any need to provide information from or to a challenging party or to third parties about other metadata, that may be sensitive. For instance, in the insurance example above the photo time may have to be verified without having to exchange information regarding the geographic position about the accident.
  • Hence, in this case there are several pieces of metadata # 1, #2 and #3 pertinent to the digitally stored document for each of which, at a first point in time, a separate digitally stored metadata signature is created as described above, for instance in relation to FIG. 2. To this end, the piece of metadata is treated as a document, and the metadata signature is then calculated in the same way as a signature would be calculated for a document, and stored in database 106. For pieces of metadata comprising only limited amounts of information, it is preferred that a random number is also used as input value to the respective signature function for calculating the respective metadata signature, as described above.
  • Thereafter, the digitally stored proof signature is created for the original document so that the used signature one-way function is calculated based upon also each digital metadata signature. It is preferred that the respective metadata signatures and the proof signature are arranged in the form of a tree structure, such as a hash tree similar to the one described above in relation to FIG. 2, in which the proof signature is located in the tree root and such that each leaf constitutes a respective metadata signature. The proof signature for the original document is stored in database 106.
  • At a later, second point in time, challenging third party user or system provides a subset of the several pieces of metadata, such as metadata # 1 and #2 but not #3, which is received by system 100 via interface 105. The challenger may also provide a digitally stored copy of the original document, in case the document itself is also to be challenged. Then, corresponding digital verification signatures are created first of the received pieces of metadata and then of the original document, or the provided digital copy, in the same way as the proof signature for the original document was created and using the same value of the signal used for the creation of the digital metadata signatures and the digital proof signature. However, the stored digital metadata signatures are used only for pieces of metadata not received at the second point in time. Provided pieces of metadata replace corresponding stored metadata information.
  • Finally, the integrity of the provided subset of the pieces of metadata is verified, via interface 105, only in case the digital proof signature is equal to the digital verification signature pertinent to the document.
  • FIG. 10 illustrates a method of providing a way to verify that a certain document 1001 is remotely published in realtime or near realtime for a user 1010 to view. In the figure, the document 1001 is published as a part of a web page 1002 in a web browser 1003, but it is realized that the document 1001 may be published in other ways, such as on a TV screen or the like. Such a document 1001 comprises information the nature of which is updated to reflect the development of a real course of events which is sampled and continuously published in form of the document 1001.
  • In such a method, the document 1001 is continuously time-stamped as described above, by being sent to the system 100, via interface 104, and by the system 100 continuously creating and publishing, via interface 103, an updated signature for the currently received document 1001. Preferably, the signature is used as an input variable to a one-way function used for calculating an updated value of the time-stamping signal according to the above described.
  • By “continuously” in this context is meant that a new signature is calculated either periodically using a short period such as at least once every minute or at least once every ten seconds and/or as soon as the contents of the document 1001 changes and/or as soon as the time-stamping signal is updated by the system 100.
  • Then, the third party user 1010 is provided access to a means for comparing a continuously updated piece of information 1005 which is embedded into the document 1001 with a corresponding current time-stamping signal value stored in the central server 100.
  • Such comparison can be performed directly or indirectly. For instance, a currently updated time-stamping signal, calculated based upon at least the updated signature of the document 1001, or the signature itself, can be embedded as a graphical item 1005 into the document 1001 itself, as described above in connection to FIG. 4a , and a corresponding value can be sent, via an independent communication channel, to the same or a different screen which can be viewed by the user, so that the two items can be compared directly and visually by the user 1010. Alternatively, the web page 1002 can incorporate a piece of programming code which is associated with the document and arranged to receive both the said signals and to automatically perform a comparison between them and signal the outcome of the comparison to the user 1010.
  • For instance, in case the signals match, the programming code can be arranged to publish a marker, such as a check mark 1006, for visual verification by the user 1010. Furthermore, the said programming code can be arranged to extract the value of the item 1005 and to request, via interface 105, the system to verify that the extracted value is indeed a correct and recently updated value, and in case the reply via interface 105 from the system 100 is affirmative, to display the check mark 1006. It is preferred that “recently updated” means that the system 100 can guarantee a time discrepancy of at the most 10 seconds.
  • There may also be provided a specific way for the user 1010 to explicitly verify that the document 1001 is indeed a realtime or near realtime representation of the said course of events, by for instance initiating one of the described verification processes by activating control, such as pressing a button 1004 in the web page 1002.
  • Specifically, the programming code can be arranged to, upon a first activation of a control 1004 or a clicking on the document 1001, perform a verification as described above, and to display a visual result signal 1006, and, upon a second such activation or clicking, redirect the web browser 1003 to another web page, preferably hosted by the operator of the system 100 and preferably presenting more detailed information to the user 1010 regarding, for instance, the current state of the document 1001 and/or a proof regarding the time of time-stamping of a recent state of the document 1001.
  • FIG. 11 shows a system configured for carrying out a method for verifying the integrity of data in a database 1100. The database 1100 can be any type of database comprising any type of digitally stored data, comprising a continuously updated datastream or the like. In such a method, at least one digital proof signature is created of all or a subset of said data, in a way similar to the ones described above, by communicating the said data to the system 100, via interface 104, and by the system 100 upon reception of such data calculating a signature based upon an updated time-stamping signal value, and preferably allowing the created signature to be input data into a one-way function the result of which is or is used to calculate a later time-stamping signal value. The created signature is stored in database 106.
  • Then, the integrity of the said data in the database 1100 is repeatedly, such as periodically, every day or more frequently, or as soon as the data in the database 1100 is accessed, checked by comparing the said stored digital proof signature with a corresponding but later created digital verification signature which is based upon the current value of the data to be verified and the same time-stamping signal value used for creation of the digital proof signature. In case any discrepancy between the digital verification signature and the digital proof signature is found, a report is sent.
  • It is preferred that a standalone module 1110, such as a software product run on the same computer as the database 1100 or another computer, is put into communication with the database 1100 and the system 100, via interfaces 104 and 105. Then, the module 1110 reads the data from the database 1100, sends the data to be signed to interface 104, and requests a verification of the previously created signature via interface 105. All these steps are described in closer detail above. Moreover, the module sends the report to a computer 1120 which is operated by user 1121 in case a discrepancy is found, indicating that data has been altered.
  • In a preferred embodiment, the value of the stored digital proof signature is updated repeatedly, by creating a new digital proof signature according above. Preferably, the updating of the value of the stored digital proof signature is triggered by access events to the database 1100, such that a new digital signature is created as a consequence of each database modification, such as insertions, updates or deletions, by any party. This can be implemented in practice using so called SQL (Structured Query Language) query triggers or the like. Preferably, a new comparison is made before each updating of the signal.
  • Such a method achieves a fast, low-profile method of continuously monitoring a database and alerting if some data, such as data which is supposed to be immutable, is altered by way of accident or abuse, and where the existence and timing of such modifications can be proven and tracked exactly and with high reliability and trustworthiness.
  • Above, a number of embodiments have been described. It is however realized that many modifications can be made to the described embodiments without departing from the basic idea of the invention.
  • For instance, the time-stamping signal can be used in other applications, such as simply being published in a continuously updated manner on a web page for general reference purposes.
  • A common purpose with all forms of time-stamping described herein is to retrospectively be able to determine what document or information was or was not available at a certain historic point in time. Therefore, time-stamping mentioned herein primarily relate to the creation time of documents, in contrast to their date of destruction.
  • In order to more fully understand the possible combinations of the different aspects of the present invention as described above, one may introduce the following additional definitions:
      • A positive time-stamp is a time-stamp that can be used to prove that a document existed at a certain specified time, in other words that the document had already been created at the specified point in time. If a document signature is created according to a present invention, and the signature is associated with the document and publically published according to the present invention, the time-stamping constitutes a positive time-stamp.
      • A negative time-stamp is a time-stamp that can be used to prove that a document could not have existed, thus been created, before a certain specified point in time. If a one-way function output value, into which a reference document is fed as an input value, is introduced into a document, and a signature for the resulting document with the said one-way function output value is created and associated with the document, this constitutes a negative time-stamp of the document. Then, the document with the time-stamping signal could not have existed before the creation of the time-stamping signal value in question. This has been described above in relation to FIG. 2.
      • A framed time-stamp is a combination of a positive and a negative time-stamp of the same document, whereby a time frame is set up that determines a first possible time when a document could have been created, using a negative time-stamp, and a last possible time when the document surely was created, using a positive time-stamp. One example is if the mentioned created signature of the negatively time-stamped document is publically published according to the present invention.
      • An absolute time-stamp is a framed time-stamp where both a positive and a subsequent negative time-stamp relate to the same reference source. In other words, the created signature is fed back to become a part of the same reference source as was used to create the signature. As the timeframe for manipulation decreases toward seconds or less, it becomes very difficult to spoof the time-stamps.
      • An integrated time-stamp can be applied to documents that have an inherent time dimension, in other words extend across a certain time period, such as video or audio that is captured between a start and an end time. An integrated time-stamp is applied at the very time of document creation, and comprises a repeatedly applied framed or absolute time-stamp. Hence, the document is first negatively time-stamped. Then, the document is positively time-stamped, and the resulting signature is fed back to a reference source so that it affects a subsequent negative time-stamp which is applied to the document at a later point in time during the creation of the document. This may go on for several or a large number of iterations. As the loop iterates is becomes increasingly impossible difficult to create a false time-stamp of the document.
  • The time-stamping signal according to the invention forms the basis for convenient, precise and large-scale digital negative time-stamping of documents, in which documents are time-stamped with time-stamping signal values as inputs.
  • In order to efficiently gain knowledge of a digital document's creation time, it is an advantage if the time-stamping process plays a part in the actual creation of the document. If the document is created in such a way so that the future value of the time-stamping signal will depend upon the process of creating the document, secure time-stamping verification will be possible despite the inherent characteristics of the digital domain, such as absolute stability and wide-ranging reversibility.
  • One particular class of documents that may be time-stamped using the present invention comprises digital images, in particular digital photographs. They have some significant properties, according to the following. Encoding and compression makes it non-trivial to change individual bits or add information without compromising the document's validity. Visual analysis will reveal non-realistic image manipulations. The higher the image resolution, the harder it gets to manipulate the document in a trustworthy manner. Visual elements in the photo that carry information can be accompanied with digitally stored meta information in the same document, or associated with the document in some sort of digital envelope. Verification of the correspondence of such metadata adds to the credibility of the time-stamping.
  • Image sequences, such as video, adds the additional possibility of using integrated time-stamps.
  • Furthermore, the time-stampling signal and/or calculated signatures as described above, may preferably be published, continuously, periodically or intermittently, in a dedicated electronic publishing space, such as a particular web address on the Internet, such as www.timebeat.com. According to one preferred embodiment, such publishing takes place in a read-only manner on a web address the sole or main contents of which, when read by a third party web reader or the like, is a recently updated value for the above described time-stamping signal and/or signature value. This provides a simple way for third parties to incorporate these values into their own applications for secure time-stamping or the like.
  • Hence, the invention is not limited to the disclosed embodiments, but can be modified within the full scope of the enclosed claims.

Claims (26)

1. Method for time-stamping a document the state of which changes over time, wherein the method comprises the following steps:
a) performing a digital description or sampling of a state of the document at a certain point in time;
b) creating a digital signature of the said state, where the signature is created so that it is constituted by, comprises or is calculated based upon an output value of a signature one-way function, where an input value to the signature one-way function is at least a part of the said description or at least a part of the result of the said sampling;
c) embedding or incorporating the said signature, or a value calculated based upon the signature, into the document, at a point in time which is later than the certain point in time, in such a way so that it is possible to read the embedded or incorporated signature or value from or based upon a state of the document at the said later point in time; and
d) repeating from a) at the said later point in time, wherein the signature embedded or incorporated in step c) affects the signature calculated in a later performed step b);
and wherein, for at least one of the created signatures, the signature in question, or a value which has been calculated based upon the signature in question, is publically published over at least one publication channel, which channel provides the possibility for third parties to, at a later point in time, verify the publication time in question.
2. Method according to claim 1, wherein the published signature or value is used as an input value to the signature one-way function used to create a signature in step b) in a subsequent iteration of the method.
3. Method according to claim 1, wherein an input value to the signature one-way function in step b) is also the current value, or a value which has been calculated based upon the current value, of a time-stamping signal created using the following steps:
2a) selecting a digitally stored reference document, which reference document is a digital description or sample of the current state of a certain physical reference source and/or information reference source at a certain first point in time, where the truthfulness of each reference document can be verified by consulting one or several publically available information sources concerning the historic state of said reference source;
2b) using the reference document as one of at least one input values to a timestam ping one-way function, and calculating the corresponding output value of the time-stamping one-way function;
2c) updating the signal based upon the said output value, so that the said output value is constituted by or can be determined based upon the value of the signal; and
2d) repeating from 2a) using another digitally stored reference document which is a digital description or sample of the current physical state and/or information state of the same or another reference source at a subsequent point in time.
4. (canceled)
5. Method according to claim 3, wherein a certain state of the document is time-stamped using the current value of the time-stamping signal, and in that at least a part of a digitally stored version of the certain time-stamped state of the document, or the output value of a one-way function an input value of which is the certain state of the document, is used as an input value in step 2b) in an iteration of the method for creating the time-stamping signal.
6. (canceled)
7. Method according to claim 1, wherein signatures are calculated for a plurality of documents at different times, in that said calculated signatures, or values calculated based upon such signatures, are logically stored as leaves in a tree structure, in that a respective output value of a tree one-way function is calculated for each parent node in the tree structure, where the signatures, said value and/or calculated tree one-way function output values of each respective child node for the parent node in question are used as input values for the tree one-way function, and in that it is the tree one-way function output value of a tree root, or a value which has been calculated based upon this output value, which is publically published.
8. (canceled)
9. Method according to claim 1, wherein, in step c), the signature, or the value calculated based upon the signature, is embedded into the document in the form of a piece of information from which the value of the signal can be deduced,
by introducing a graphical element, such as a string of alphanumeric characters, a QR code or a barcode, into a visual representation of the document, which graphical element carries said piece of information;
by adding said piece of information to a digitally stored version of the document as metadata; and/or
by adding said piece of information in the form of a digitally coded watermark to a digitally stored version of the document.
10. Method according to claim 2, wherein the document comprises information captured using a piece of sampling equipment for sampling a physical phenomenon, such as a video camera or an audio recorder, which sampled physical phenomenon constitutes the document, in that the sampling equipment is provided access to a communication channel over which the current value of the time-stamping signal is communicated to the sampling equipment, and in that the sampling equipment embeds the current time-stamping signal value into the document in connection to performing the sampling.
11. Method according to claim 10, wherein a document state is one frame in a moving image, captured using an image capturing device such as a video camera, and that the current time-stamping signal value at the time of capturing the image or frame is embedded into the frame by positioning a graphics-presenting device, arranged to show a graphical element carrying said piece of information, in the image or frame view so that the graphical element is captured as a part of the captured frame.
12. Method according to claim 11, wherein a number of consecutive frames comprise footage of a natural phenomenon the development of which is deterministic by nature.
13. (canceled)
14. Method according to claim 1, wherein the document is captured using a piece of sampling equipment for sampling a physical phenomenon, such as a video camera or an audio recorder, which sampling equipment is caused to calculate the said digital signature in connection to performing the sampling, which sampled physical phenomenon constitutes the document, and in that the sampling equipment is provided access to a communication channel over which the signature is communicated to a central server.
15. Method according to claim 3, wherein the sampling equipment is caused to sample the physical phenomenon repeatedly over some period of time, in that at least a part of a digitally stored version of at least one time-stamped document is used, by the central server, as an input value in step 2b), and in that the time-stamping signal value after being updated using the time-stamped document state is embedded into another document state produced later than the said at least one time-stamped document state.
16. Method according to claim 15, wherein the document is a web page.
17. Method according to claim 16, wherein the web page comprises programming code arranged to initiate a time-stamping as a consequence of the web page being viewed, and the state of the web page hence changes.
18. Method according to claim 1, wherein the document is a sequence of samplings of an interactive session between a first party and a second party, in that the interactive session is sampled repeatedly and in that the sampled document states are provided to and saved in a central server together with the created signature values.
19. Method according to claim 18, wherein the interactive session is a remote session conducted over the Internet, and in that said samplings comprise screen dumps or audio capture of the session as seen from at least one of the two parties using a software application executed on or from an electronic device using which the party in question participates in the interactive session.
20. (canceled)
21. Method according to claim 18, wherein the said samplings comprise image material captured so that a screen of an electronic device using which one of said parties participates in the interactive session is visible, and in that the image material is captured using a camera in communication with the central server.
22. Method according to claim 18, wherein the said central server, or another central server in communication to said central server, is arranged to initiate the said samplings, and the corresponding creation of signatures for each such sampling, upon a request from at least one of the parties.
23. (canceled)
24. Method of providing a way to verify that a certain document is published in realtime or near realtime, wherein the method comprises the following steps:
continuously time-stamping the document according to claim 2; and
providing access for a third party to a means for comparing a continuously updated piece of information which is embedded into the document with a corresponding current time-stamping signal value stored in the central server.
25. Method according to claim 24, wherein the document is published on the Internet, and
in that the said means for comparing the continuously updated piece of information is in the form of program code which is associated with the document and arranged to automatically perform such a comparison and to signal to the third party whether a time-stamping signal value deduced from the piece of information corresponds to the current value of the time-stamping signal.
26. System for time-stamping a document the state of which changes over time, wherein the system is arranged to:
a) perform a digital description or sampling of a state of the document at a certain point in time;
b) create a digital signature of the said state, where the signature is created so that it is constituted by, comprises or is calculated based upon an output value of a signature one-way function, where an input value to the signature one-way function is at least a part of the said description or at least a part of the result of the said sampling;
c) embed or incorporate the said signature, or a value calculated based upon the signature, into the document, at a point in time which is later than the certain point in time, in such a way so that it is possible to read the embedded or incorporated signature or value from or based upon a state of the document at the said later point in time; and
d) repeat from a) at the said later point in time, wherein the signature embedded or incorporated in step c) affects the signature calculated in a later performed step b);
and wherein, for at least one of the created signatures, the system is arranged to cause the signature in question, or a value which has been calculated based upon the signature in question, to be publically published over at least one publication channel, which channel provides the possibility for third parties to, at a later point in time, verify the publication time in question.
US14/909,925 2013-08-08 2014-08-07 Method and system for time-stamping a document the state of which changes over time Abandoned US20160196297A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SE1350947-6 2013-08-08
SE1350947A SE537697C2 (en) 2013-08-08 2013-08-08 Procedure for generating signals for time stamping of documents and procedure for time stamping of documents
PCT/SE2014/050921 WO2015020600A1 (en) 2013-08-08 2014-08-07 Method and system for time-stamping a document the state of which changes over time

Publications (1)

Publication Number Publication Date
US20160196297A1 true US20160196297A1 (en) 2016-07-07

Family

ID=52461771

Family Applications (3)

Application Number Title Priority Date Filing Date
US14/909,918 Active 2034-11-28 US10803049B2 (en) 2013-08-08 2014-08-07 Method for creating signals for time-stamping of documents and method for time-stamping of documents
US14/909,934 Active 2035-03-25 US10146825B2 (en) 2013-08-08 2014-08-07 Method and system for providing a way to verify the integrity of a document
US14/909,925 Abandoned US20160196297A1 (en) 2013-08-08 2014-08-07 Method and system for time-stamping a document the state of which changes over time

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US14/909,918 Active 2034-11-28 US10803049B2 (en) 2013-08-08 2014-08-07 Method for creating signals for time-stamping of documents and method for time-stamping of documents
US14/909,934 Active 2035-03-25 US10146825B2 (en) 2013-08-08 2014-08-07 Method and system for providing a way to verify the integrity of a document

Country Status (4)

Country Link
US (3) US10803049B2 (en)
EP (3) EP3031005B1 (en)
SE (1) SE537697C2 (en)
WO (3) WO2015020599A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190155968A1 (en) * 2017-11-17 2019-05-23 International Business Machines Corporation Generation of event transition model from event records
WO2019211669A3 (en) * 2018-05-03 2020-01-16 Entrust & Title (FZE) System and method for securing electronic document execution and authentication

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11714923B2 (en) * 2013-09-26 2023-08-01 Salesforce, Inc. Methods and systems for protecting data integrity
US9300678B1 (en) 2015-08-03 2016-03-29 Truepic Llc Systems and methods for authenticating photographic image data
US11386067B2 (en) * 2015-12-15 2022-07-12 Red Hat, Inc. Data integrity checking in a distributed filesystem using object versioning
KR101772554B1 (en) 2016-02-02 2017-08-30 주식회사 코인플러그 Method and server for providing notary service with respect to file and verifying the recorded file by using the notary service
US10102206B2 (en) * 2016-03-31 2018-10-16 Dropbox, Inc. Intelligently identifying and presenting digital documents
US10291604B2 (en) * 2016-06-03 2019-05-14 Docusign, Inc. Universal access to document transaction platform
US9922278B2 (en) * 2016-08-15 2018-03-20 Lenovo (Singapore) Pte. Ltd. Verifying integrity of physical documents
ES2763186T3 (en) * 2017-03-24 2020-05-27 Telefonica Digital Espana Slu A computer-implemented method for automatically certifying documents with guarantees of integrity and authenticity and computer programs thereof
SE541713C2 (en) * 2017-05-03 2019-12-03 Enigio Time Ab Method and system for registering digital documents
US10567177B2 (en) * 2017-06-26 2020-02-18 Sony Corporation Media channel monitoring to prove content presentation
US10375050B2 (en) 2017-10-10 2019-08-06 Truepic Inc. Methods for authenticating photographic image data
WO2019204314A1 (en) * 2018-04-17 2019-10-24 Filmio, Inc. Project creation system integrating proof of originality
KR102232003B1 (en) * 2018-06-20 2021-03-25 주식회사 파수 Method for object management using trace identifier, apparatus for the same, computer program for the same, and recording medium storing computer program thereof
US10361866B1 (en) 2018-08-13 2019-07-23 Truepic Inc. Proof of image authentication on a blockchain
US10360668B1 (en) 2018-08-13 2019-07-23 Truepic Inc. Methods for requesting and authenticating photographic image data
US11288347B2 (en) * 2019-03-07 2022-03-29 Paypal, Inc. Login from an alternate electronic device
JP7418084B2 (en) 2019-11-19 2024-01-19 キヤノン株式会社 Imaging device, image sorting device, and imaging system control method
US11037284B1 (en) * 2020-01-14 2021-06-15 Truepic Inc. Systems and methods for detecting image recapture
US10887476B1 (en) * 2020-01-30 2021-01-05 Linkbox, Inc., a Delaware Corporation Use of published electronic documents to enable automated communication between readers and authors
GB2589030B (en) * 2020-01-30 2021-12-15 Linkbox Inc Use of published electronic documents to enable automated communication between readers and authors
US11164333B2 (en) * 2020-01-31 2021-11-02 Gracenote, Inc. Monitoring icon status in a display from an external device
SE545318C2 (en) * 2021-03-01 2023-07-04 Enigio AB Method and system for registering digital documents

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6263438B1 (en) * 1996-03-21 2001-07-17 Walker Digital, Llc Method and apparatus for secure document timestamping
US7007166B1 (en) * 1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking
US20060253418A1 (en) * 2002-02-04 2006-11-09 Elizabeth Charnock Method and apparatus for sociological data mining
US20070192140A1 (en) * 2005-08-17 2007-08-16 Medcommons, Inc. Systems and methods for extending an information standard through compatible online access
US20080256138A1 (en) * 2007-03-30 2008-10-16 Siew Yong Sim-Tang Recovering a file system to any point-in-time in the past with guaranteed structure, content consistency and integrity
US20090125445A1 (en) * 2007-11-13 2009-05-14 Protecode Incorporated System and method for capturing and certifying digital content pedigree
US20100124967A1 (en) * 2008-08-20 2010-05-20 Lutnick Howard W Game of chance systems and methods
US20100250497A1 (en) * 2007-01-05 2010-09-30 Redlich Ron M Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
US20100299315A1 (en) * 2005-08-09 2010-11-25 Nexsan Technologies Canada Inc. Data archiving system
US20110057884A1 (en) * 2009-09-08 2011-03-10 Gormish Michael J Stroke and image aggregation and analytics
US20130239089A1 (en) * 2011-09-07 2013-09-12 Brick Eksten Systems and methods for computing applications
US8656189B2 (en) * 2010-08-11 2014-02-18 Security First Corp. Systems and methods for secure multi-tenant data storage
US20140268061A1 (en) * 2013-03-13 2014-09-18 Robert C. Weisgerber Method for selectively imparting a cinematic appearance to motion pictures photographed and exhibited at high frame rates
US9135312B2 (en) * 2009-11-02 2015-09-15 Google Inc. Timeslider

Family Cites Families (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4309569A (en) 1979-09-05 1982-01-05 The Board Of Trustees Of The Leland Stanford Junior University Method of providing digital signatures
US5136646A (en) * 1991-03-08 1992-08-04 Bell Communications Research, Inc. Digital document time-stamping with catenate certificate
US5136647A (en) 1990-08-02 1992-08-04 Bell Communications Research, Inc. Method for secure time-stamping of digital documents
US7298851B1 (en) * 1992-12-09 2007-11-20 Discovery Communications, Inc. Electronic book security and copyright protection system
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
NZ296340A (en) * 1994-10-28 2000-01-28 Surety Technologies Inc Digital identification and authentication of documents by creating repository of hash values based on documents
US7362775B1 (en) * 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US6381696B1 (en) 1998-09-22 2002-04-30 Proofspace, Inc. Method and system for transient key digital time stamps
US6601172B1 (en) 1997-12-31 2003-07-29 Philips Electronics North America Corp. Transmitting revisions with digital signatures
US6212504B1 (en) * 1998-01-12 2001-04-03 Unisys Corporation Self-authentication of value documents using encoded indices
US6226743B1 (en) 1998-01-22 2001-05-01 Yeda Research And Development Co., Ltd. Method for authentication item
US8868914B2 (en) * 1999-07-02 2014-10-21 Steven W. Teppler System and methods for distributing trusted time
US7409557B2 (en) * 1999-07-02 2008-08-05 Time Certain, Llc System and method for distributing trusted time
JP2001022848A (en) 1999-07-08 2001-01-26 Hitachi Ltd System and method for providing historical validity of electronic document
CA2317139C (en) 1999-09-01 2006-08-08 Nippon Telegraph And Telephone Corporation Folder type time stamping system and distributed time stamping system
US6868406B1 (en) * 1999-10-18 2005-03-15 Stamps.Com Auditing method and system for an on-line value-bearing item printing system
US6742119B1 (en) 1999-12-10 2004-05-25 International Business Machines Corporation Time stamping method using time delta in key certificate
US7490241B1 (en) 1999-12-10 2009-02-10 International Business Machines Corporation Time stamping method employing user specified time
JP2002169909A (en) 2000-12-04 2002-06-14 Fujitsu Ltd Public opening verifying system, recording server for browsing access log, recording server for publishing access log, server for digital signature and information terminal for browsing access
US20030093678A1 (en) * 2001-04-23 2003-05-15 Bowe John J. Server-side digital signature system
US20020169964A1 (en) * 2001-04-23 2002-11-14 Thorsten Klook Procedure and device for generating a signature
JP2003244139A (en) * 2002-02-20 2003-08-29 Amano Corp Time stamp imprinting system to electronic document, and program medium thereof
FR2844656B1 (en) 2002-09-18 2005-01-28 France Telecom ELECTRONIC SIGNATURE METHOD, PROGRAM AND SERVER FOR IMPLEMENTING THE METHOD
EP1642206B1 (en) * 2003-07-07 2017-12-20 Irdeto B.V. Reprogrammable security for controlling piracy and enabling interactive content
US20080028220A1 (en) * 2003-12-14 2008-01-31 The Thayn Firm, Limited Liability Company, A Limited Liability Company Method and System for Verifying Documents
US8719576B2 (en) * 2003-12-22 2014-05-06 Guardtime IP Holdings, Ltd Document verification with distributed calendar infrastructure
KR100576722B1 (en) 2003-12-26 2006-05-03 한국전자통신연구원 System and method for processing message security for web services
JP3998640B2 (en) * 2004-01-16 2007-10-31 株式会社東芝 Encryption and signature method, apparatus and program
JPWO2006075566A1 (en) 2005-01-12 2008-06-12 株式会社小松製作所 Work machine lock control device and work machine
US20090287931A1 (en) 2005-12-22 2009-11-19 Cian Kinsella Establishing Proof of Existence and Possession of Digital Content
JP4856433B2 (en) * 2006-01-27 2012-01-18 株式会社リコー Measuring device, measurement data editing device and measurement time verification device
US8086859B2 (en) * 2006-03-02 2011-12-27 Microsoft Corporation Generation of electronic signatures
US20100161993A1 (en) * 2006-10-25 2010-06-24 Darcy Mayer Notary document processing and storage system and methods
GB0622149D0 (en) * 2006-11-07 2006-12-20 Singlepoint Holdings Ltd System and method to validate and authenticate digital data
JP5099542B2 (en) 2007-02-28 2012-12-19 学校法人東京電機大学 Operation record correctness proof system and method using camera
US8306268B2 (en) 2007-09-12 2012-11-06 General Electric Company Method and system for image integrity determination
US20100031039A1 (en) * 2008-02-14 2010-02-04 Mathieu Ciet Method and apparatus for data protection system using geometry of fractals or other chaotic systems
US7676501B2 (en) * 2008-03-22 2010-03-09 Wilson Kelce S Document integrity verification
US7904450B2 (en) * 2008-04-25 2011-03-08 Wilson Kelce S Public electronic document dating list
US20100131558A1 (en) * 2008-11-19 2010-05-27 Logan James D System and method for managing copyright licensing
JP5387282B2 (en) * 2009-09-25 2014-01-15 富士通株式会社 Content processing device, program for guaranteeing partial integrity of content
US8312284B1 (en) 2009-11-06 2012-11-13 Google Inc. Verifiable timestamping of data objects, and applications thereof
US8472727B2 (en) * 2011-01-07 2013-06-25 Yuval Gronau Document comparison and analysis for improved OCR
AU2011202182B1 (en) * 2011-05-11 2011-10-13 Frequency Ip Holdings, Llc Creation and presentation of selective digital content feeds
JP5867875B2 (en) * 2011-07-11 2016-02-24 武 水沼 Signature verification program
US20130173754A1 (en) * 2011-12-08 2013-07-04 Scannx, Inc. Method and apparatus to exchange digital content between two devices without requiring the exchange of credentials
US9397902B2 (en) * 2013-01-28 2016-07-19 Rackspace Us, Inc. Methods and systems of tracking and verifying records of system change events in a distributed network system
US20140280377A1 (en) * 2013-03-14 2014-09-18 Scribestar Ltd. Systems and methods for collaborative document review
US10158491B2 (en) * 2013-04-08 2018-12-18 Antonio Salvatore Piero Vittorio Bonsignore Qualified electronic signature system, method and mobile processing terminal for qualified electronic signature
US10110540B2 (en) * 2013-05-31 2018-10-23 Nasdaq Technology Ab Apparatus, system, and method of elastically processing message information from multiple sources
US9501360B2 (en) * 2013-07-01 2016-11-22 International Business Machines Corporation Rebuilding data while reading data in a dispersed storage network

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7007166B1 (en) * 1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking
US6263438B1 (en) * 1996-03-21 2001-07-17 Walker Digital, Llc Method and apparatus for secure document timestamping
US20060253418A1 (en) * 2002-02-04 2006-11-09 Elizabeth Charnock Method and apparatus for sociological data mining
US20100299315A1 (en) * 2005-08-09 2010-11-25 Nexsan Technologies Canada Inc. Data archiving system
US20070192140A1 (en) * 2005-08-17 2007-08-16 Medcommons, Inc. Systems and methods for extending an information standard through compatible online access
US20100250497A1 (en) * 2007-01-05 2010-09-30 Redlich Ron M Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
US20080256138A1 (en) * 2007-03-30 2008-10-16 Siew Yong Sim-Tang Recovering a file system to any point-in-time in the past with guaranteed structure, content consistency and integrity
US20090125445A1 (en) * 2007-11-13 2009-05-14 Protecode Incorporated System and method for capturing and certifying digital content pedigree
US20100124967A1 (en) * 2008-08-20 2010-05-20 Lutnick Howard W Game of chance systems and methods
US20110057884A1 (en) * 2009-09-08 2011-03-10 Gormish Michael J Stroke and image aggregation and analytics
US9135312B2 (en) * 2009-11-02 2015-09-15 Google Inc. Timeslider
US8656189B2 (en) * 2010-08-11 2014-02-18 Security First Corp. Systems and methods for secure multi-tenant data storage
US20130239089A1 (en) * 2011-09-07 2013-09-12 Brick Eksten Systems and methods for computing applications
US20140268061A1 (en) * 2013-03-13 2014-09-18 Robert C. Weisgerber Method for selectively imparting a cinematic appearance to motion pictures photographed and exhibited at high frame rates

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190155968A1 (en) * 2017-11-17 2019-05-23 International Business Machines Corporation Generation of event transition model from event records
US11087044B2 (en) * 2017-11-17 2021-08-10 International Business Machines Corporation Generation of event transition model from event records
US11087050B2 (en) * 2017-11-17 2021-08-10 International Business Machines Corporation Generation of event transition model from event records
WO2019211669A3 (en) * 2018-05-03 2020-01-16 Entrust & Title (FZE) System and method for securing electronic document execution and authentication
US11042651B2 (en) 2018-05-03 2021-06-22 Entrust & Title (FZE) System and method for securing electronic document execution and authentication
US11636218B2 (en) 2018-05-03 2023-04-25 Entrust & Title (FZE) System and method for securing electronic document execution and authentication

Also Published As

Publication number Publication date
EP3031005B1 (en) 2022-06-01
SE1350947A1 (en) 2015-02-09
US20160182237A1 (en) 2016-06-23
SE537697C2 (en) 2015-09-29
WO2015020599A1 (en) 2015-02-12
EP3031005A4 (en) 2017-04-26
EP3055810A1 (en) 2016-08-17
EP3055810A4 (en) 2017-04-26
WO2015020600A1 (en) 2015-02-12
US10146825B2 (en) 2018-12-04
EP3031005A1 (en) 2016-06-15
WO2015020601A1 (en) 2015-02-12
EP3049991A4 (en) 2017-04-26
EP3049991A1 (en) 2016-08-03
EP3049991B1 (en) 2019-12-04
EP3055810B1 (en) 2022-05-11
US20160188907A1 (en) 2016-06-30
US10803049B2 (en) 2020-10-13

Similar Documents

Publication Publication Date Title
EP3055810B1 (en) Method and system for time-stamping a document the state of which changes over time
EP3570549B1 (en) Non-deterministic time systems and methods
EP1724658A1 (en) Structured document signature device, structured document adaptation device and structured document verification device
JP2017098806A (en) Existence proof program and existence proof server for electronic data
EP2438706A1 (en) Method for securely dematerialising the transfer of evidence in data-stream production systems, in particular video-surveillance systems
US10339283B2 (en) System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
US20090190189A1 (en) Information processing apparatus, control method therefor, information processing system, and program
EP3659311B1 (en) Data stream integrity
CN111475574A (en) Data acquisition device based on block chain
CN115982764A (en) Method, system, device and medium for storing electronic file based on block chain
US20160119152A1 (en) Non-deterministic time generation and event-association system
EP3389280A1 (en) Method for real-time certifying the integrity of a sequence of video and/or audio frames
US11770260B1 (en) Determining authenticity of digital content
CN109271811B (en) Group signature-based electronic material evidence tamper-proof storage method
FR3095874A1 (en) PROCESS FOR GENERATING AN ARCHIVING CODE TO CREATE A FOOTPRINT OF MULTIMEDIA CONTENT
CN111031356B (en) Multimedia information processing method and device, server and storage medium
Morigaki et al. An analysis of detailed electronic time-stamping using digital TV
CN116611948A (en) Method and device for mining identity data, storage medium and electronic equipment
Bennett Improvements to time bracketed authentication
JP2004234304A (en) Time stamp imprinting system to electronic information on internet and program medium thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: ENIGIO TIME AB, SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALMGREN, HANS;REEL/FRAME:037932/0138

Effective date: 20160128

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION