Electronic postmarking without directly utilizing an electronic postmark server

Information

  • Patent Grant
  • 7266696
  • Patent Number
    7,266,696
  • Date Filed
    Monday, December 17, 2001
    22 years ago
  • Date Issued
    Tuesday, September 4, 2007
    16 years ago
Abstract
Systems and methods for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server (110), including receiving data from a data acquisition device (102), generating a MicroEPM data structure (106) comprising a time stamp, a digital signature, and the received data and transferring the MicroEPM data structure (106) to a regular EPM server (110).
Description
FIELD OF THE INVENTION

The present invention relates to the field of generating electronic postmarks, and more specifically relates to the field of electronically postmarking data without directly utilizing a regular electronic postmark server.


BACKGROUND

An electronic postmark, or EPM, provides content and temporal integrity and identification authenticity for data, which is transferred over a network. The process of generating an EPM utilizing a regular EPM server is described in “Systems and Methods for Authenticating an Electronic Message,” U.S. Ser. No. 09/675,677 filed on Sep. 29, 2000, which is expressly incorporated herein by reference.


The MicroEPM is a system and method for performing electronic postmarking of data without directly utilizing a regular electronic postmark (EPM) server. The MicroEPM permits the generation of an electronic postmark off-line, which allows mobile devices or devices, which do not have a network, interface, to create EPMs for internally generated data. Furthermore, the invention also permits devices, which are connected to a network to generate EPMs without having to interface with an EPM server. This capability could be useful when the processing overhead of communication with an EPM server is too great, or if the EPM server is unavailable due to network problems or server downtime.


SUMMARY

In accordance with the invention, systems and methods for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server, include receiving data from a data acquisition device; generating a MicroEPM data structure comprising a time stamp, a digital signature, and the received data; and transferring the MicroEPM data structure to a regular EPM server.


Additional objects and advantages will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice. The objects and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims.


It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.





BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate several embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.



FIG. 1 depicts a top level block diagram showing the operation of a system consistent with the invention;



FIG. 2A depicts one embodiment consistent with the invention where the MicroEPM device is a separate, stand-alone unit;



FIG. 2B depicts an embodiment consistent with the invention where the MicroEPM device is physically incorporated into the data acquisition/generation device;



FIG. 3 shows a detailed block diagram of one embodiment consistent with the invention;



FIG. 4 provides an explanation of the trusted time boundaries; and



FIG. 5 depicts a flowchart showing the steps performed by MicroEPM device to generate a MicroEPM data structure.





DESCRIPTION OF THE EMBODIMENTS

Reference will now be made in detail to the exemplary embodiments illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.



FIG. 1 shows a top-level block diagram of a system 100 consistent with the invention. A sender 102 generates or captures digital data, such as an electronic mail message, using a data acquisition or generation device, such as a personal computer. The data is received by a MicroEPM device 104, which generates a MicroEPM data structure using the received data, and stores the MicroEPM data structure in internal memory. The MicroEPM data structure comprises a time and date stamp, a hash value of the received data, and a digital signature, and is described below in greater detail. One or more MicroEPM data structures may be generated and stored on MicroEPM device 104, this number being limited by the amount of internal storage available. Once a set, or batch, of MicroEPM data structures (consisting of one or more Micro EPM data structures) are accumulated on MicroEPM device 104 over some period of time, MicroEPM device 104 may download the MicroEPM data structures, as a batch 106, via a network 108 to a regular EPM server 110. This downloading process allows the MicroEPM data structures to be processed and logged by EPM server 110. Upon receiving the batch of MicroEPM data structures, EPM server 110 will generate a batch EPM data structure corresponding MicroEPM data structure batch 106. Batch EPM data structure 106 may therefore correspond to a single MicroEPM data structure, or to a plurality of MicroEPM data structures. EPM server 110 may then return the batch EPM data structure back to the sender 102 over a network 112, or optionally it may forward the batch EPM data structure to a receiver 116 via a network 114, who is the intended recipient of the data generated by sender 102.



FIG. 2A shows a MicroEPM device 104 as a separate, stand-alone unit. A user 202 operates a data acquisition/generation device 204 to generate data for electronic postmarking. Data acquisition/generation device 204 can be any kind of device, which stores information in a digital format. For example, it could be a digital camera, a digital video recorder, a personal digital assistant, a laptop computer, or any other type of electronic device, which generates or acquires digital data. Data acquisition/generation device 204 supplies digital data to an external MicroEPM device 104 through an electronic interface 206. Interface 206 could be, for example, a network such as TCP/IP, Local Area Network, or wireless network. The interface could also be a standard serial or parallel interface such as an RS-232, Universal Serial Bus (USB), IEEE-1394 (Firewire), or any other electronic interface known to those skilled in the art. The use of standard interface 206 allows MicroEPM device 104 to interface with a variety of different devices 204.


At the user's command, acquired digital data (not shown) is sent from data acquisition/generation device 204 over electronic interface 206 to external MicroEPM device 104. MicroEPM device 104 generates a MicroEPM data structure for the acquired digital data and stores the MicroEPM data structure locally. This process can be repeated for each data acquisition session, thereby storing a plurality of MicroEPM data structures in MicroEPM device 104. Afterwards, user 202 can download the MicroEPM data structures (either individually or in a batch) over network 108 to regular EPM server 110. EPM server 110 would then generate a single EPM data structure for the batch of MicroEPM data structure and send this to an electronic address (not shown).



FIG. 2B shows a system including a MicroEPM device 104′ physically incorporated into a data acquisition/generation device 204′. As above, data acquisition/generation device 204′ can be any kind of digital device which stores digital data. This digital data may be buffered in data acquisition/generation device 204′, and transferred to MicroEPM device 104′ at the command of user 202. Alternatively, the digital data may be automatically transferred to internal MicroEPM device 104′ upon its generation. In this embodiment, MicroEPM device 104′ must be small enough to fit into portable data generation/acquisition device 204′, and may therefore be implemented on one or more integrated circuits. Data acquisition/generation device 204′ may connect to network 108 whereby the processed MicroEPM data structures may be submitted to regular EPM sever 110 for the generation of a batch EPM of the MicroEPM data structures.



FIG. 3 shows a detailed block diagram of MicroEPM device 104. Digital data 301 arrives through an interface 302 from data acquisition/generation device 204 (not shown) using a standard protocol. A key interface 304 accepts a private key 303 from an official source, such as the United States Postal Service (USPS), or any other trusted entity which generates private keys (as described more fully in the aforementioned U.S. Postal application Ser. No. 675,677/09) for the generation of MicroEPM data structures.


A time signal providing time data is required to generate a MicroEPM data structure. The time data may be generated from external time signals 305 derived from a reference broadcast source or may be generated internally using an internal clock circuit 306. External time signals 305 may be received in the form of broadcast signals from a Global Positioning Satellite (GPS) system through a micro GPS receiver 308. Another source of broadcast time signals is National Institute of Standards Technology radio station WWV. Such broadcast sources supply highly accurate time signals that are a widely accepted reference, and therefore are considered a “trusted” time source. A source is trusted if it is both known to be accurate, and it is secure from tampering. Optionally, external time signals may also be fed directly into the MicroEPM device using an external interface (not shown). In addition, EPM server 110 may be the trusted time source.


Internal time data may be generated using timing circuits, such as quartz-oscillator/integrated circuit combinations that are used in wristwatches and are well known in the art. The user may have control over this time data, such as the ability to manually set start and stop times. Because this data is under the control of a user, it is not secure from tampering. Therefore, such time data would not be considered “trusted.”


Alternatively, internal time data could be a “quasi-trusted” time source that is set once and then runs without stopping. A quasi-trusted time source provides greater security of the time source and accuracy than a non-trusted source, but not the security and accuracy of the trusted time source.


Time data, which is not from a trusted source, requires additional time data, such as, for example, external trusted time signal 305, provided from a trusted source in order to generate time stamps for the MicroEPM. This additional data need not provide precise time data, but may provide a range of times providing trusted time “boundaries” for the internally generated time data. The time boundaries may come from official EPM server 110. Details regarding time boundaries are set forth below.


Further referring to FIG. 3, using the time data, acquired digital data 301 from device 204, and acquired private key 303, a postmark generation unit 310 creates a MicroEPM data structure. Postmark generation unit 310 could be a software module running on a general-purpose microprocessor, or a dedicated integrated circuit, such as an ASIC (Application Specific Integrated Circuit). Afterwards, the MicroEPM data structure is subsequently stored in a postmark storage unit 312. Postmark storage unit 312 typically comprises physical memory such as solid state RAM, or it could be a mass storage device such as a hard drive. A plurality of MicroEPM data structures may be stored in postmark storage unit 312 as a single batch. At the user's command, the batch may be downloaded to EPM server 110 through secure a EPM interface 314.



FIG. 4 provides an explanation of the trusted time boundaries mentioned above. If the internal time data MicroEPM device 104 uses for postmarking does not come from a trusted time source, another time source must be used to be able to provide some level of temporal authenticity. Time stamps generated by EPM server 110 could be used to provide trusted time boundaries, which “anchor” the MicroEPM data structure's time stamps.


In one embodiment, EPM server 110 or MicroEPM device 104 may wish to provide a single trusted time boundary. For example, some applications may only require authentication that digital data 301 was sent prior to a time certain. For such an application, a stop time reference received from a trusted time source, such as external time signals 305, can be added as a trusted time/date stamp. Therefore, all digital data acquired before the trusted stop time reference is known to have been acquired before the stop time reference. The trusted stop time reference may be received by EPM server 110 or from any other trusted source.


In addition, for other applications, it may be necessary to know only that digital data 301 was acquired by MicroEPM device 104 after a time certain. In one embodiment, MicroEPM device 104, which does not use a trusted time source/date stamp, will include a trusted start time reference. For example, MicroEPM device 104 may have interfaced with a trusted time source at some point before digital data 301 was acquired. From the trusted time source, MicroEPM will receive a trusted time/date stamp that may be stored in memory. MicroEPM device 104 may include this reference in a MicroEPM data structure as a trusted start time reference. In addition, it may also include a time/date stamp from a source other than a trusted source.


MicroEPM device 104 may also provide both a start time reference 402 and stop time reference 404. Start reference time 402 is encapsulated into each MicroEPM data structure. As such, it must be downloaded from EPM server 110 and stored locally on MicroEPM device 104. This downloading of start reference 402 may be done automatically after a batch of MicroEPM data structures are transferred to EPM server 110, or it may be done manually at the command of user 202. Therefore, the MicroEPM data structure may contain two separate pieces of time information: 1) a time stamp 408 which is generated by the internal clock, and 2) start-time reference 402 which bounds the initial time for each MicroEPM and may have been generated by EPM server 110. Stop time reference 404 is generated once EPM server 110 electronically postmarks the batch of MicroEPM data structures. All of the time stamps for the MicroEPM data structures 403, for a given batch, fall between start reference 402 and stop reference 404.



FIG. 5 shows the stages, which MicroEPM device 104 executes when generating a MicroEPM data structure. Initially, a trusted time stamp may be acquired, stage 502, to serve as start reference time 402 for the batch of MicroEPM data structures 403. Start time reference 402 may be received from EPM server 110. Start reference time 402 is stored in memory on MicroEPM device 104. Optionally, another trusted time data source may be used if desired, stage 504. In one embodiment, if the MicroEPM does not have a trusted time source, and must ensure that a digital message was acquired after a time certain, MicroEPM device 104 will acquire a trusted start time reference 402 at either stage 502 or stage 504. However, if MicroEPM device 104 includes a trusted time source, such as external signals 305, it may still acquire a trusted start time reference.


User 202 then acquires data, stage 506, which is passed to the MicroEPM device, stage 508. The data is hashed, stage 510, typically using a one-way hash function. Any known or later developed hash function may be used. In one embodiment, a hash function, which produces a 64-bit key, is used. Therefore, the digital data is “frozen” (i.e. the integrity of the data may be checked at any time). The hash is then time/date stamped, stage 512, using data generated by the internal time source. Alternatively, if the internal source is not a trusted source, EPM server start time reference 402, acquired prior to data acquisition, is also appended.


At stage 514, the MicroEPM device 104 produces a MicroEPM data structure. In one embodiment, the hash value, internal time stamp, and start time reference (if acquired) are digitally signed using private key 303. In one embodiment, the digital signature and hash value comprise the MicroEPM data structure, which is placed in batch storage, stage 514. In another embodiment, hash value, internal time stamp, start time reference (if acquired) as well as the digital data may be digitally signed. In such a case, a MicroEPM data structure may be comprised of the hash value, the digital signature and a copy of the digital data.


The process may loop back 516, to process additional MicroEPM data structures. After all the MicroEPM data structures are batched in memory, the batch may be optionally be hashed, stage 518, for additional security. The MicroEPM data structures are then sent to regular EPM server 110 over network 108 in order to generate a “standard” EPM data structure for the batch, such as by appending a new trusted time/date stamp to the batch of MicroEPM data structures and hashing the new time date stamp, and the batch of MicroEPM data structures, stage 520. User 202 may then acquire, stage 522, the current EPM time/date stamp from server 110 and store it as the new start reference.


Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.

Claims
  • 1. A method for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server, the method comprising: receiving data from a data acquisition device;generating a MicroEPM data structure comprising a hash value of the received data and a digital signature;transferring the MicroEPM data structure to a regular EPM server; andprocessing, by the regular EPM server, the transferred MicroEPM data structures,wherein processing includes: generating a trusted time/date stamp;hashing the time/date stamp and the batch of MicroEPM data structures to produce a second hash value; andgenerating an EPM data structure comprising the second hash value and the batch of MicroEPM data structures.
  • 2. An apparatus for performing electronic postmarking of data, without directly utilizing a regular electronic postmark (EPM) server, comprising: means for receiving data from a data acquisition device;means for generating a MicroEPM data structure comprising a hash value and a digital signature;an interface for transferring the MicroEPM data structure to a regular EPM sever;means for processing, by the regular EPM server, the transferred MicroEPM data structures;means for generating a trusted time/date stamp;means for hashing the time/date stamp and the batch of MicroEPM data structures to produce a second hash value; andmeans for generating an EPM data structure comprising the second hash value.
  • 3. The apparatus of claim 2, further including; means for generating an EPM data structure comprising the second hash value and the batch of MicroEPM data structures.
CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of provisional application “System and Method for Performing Electronic Postmarking without Directly utilizing an Electronic Postmark Server,” filed Dec. 15, 2000 and assigned Ser. No. 60/255,432. Application Ser. No. 60/255,432 is expressly incorporated herein by reference.

PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/US01/47720 12/17/2001 WO 00 6/13/2003
Publishing Document Publishing Date Country Kind
WO02/49269 6/20/2002 WO A
US Referenced Citations (89)
Number Name Date Kind
3978457 Check, Jr. et al. Aug 1976 A
4093999 Fuller et al. Jun 1978 A
4097923 Eckert, Jr. et al. Jun 1978 A
4271481 Check, Jr. et al. Jun 1981 A
4376299 Rivest Mar 1983 A
4637051 Clark Jan 1987 A
4641346 Clark et al. Feb 1987 A
4641347 Clark et al. Feb 1987 A
4660221 Dlugos Apr 1987 A
4675841 Check, Jr. et al. Jun 1987 A
4725718 Sansone et al. Feb 1988 A
4743747 Fougere et al. May 1988 A
4757537 Edelmann et al. Jul 1988 A
4760534 Fougere et al. Jul 1988 A
4775246 Edelmann et al. Oct 1988 A
4809185 Talmadge Feb 1989 A
4811234 Storace Mar 1989 A
4812965 Taylor Mar 1989 A
4812992 Storace et al. Mar 1989 A
4831555 Sansone et al. May 1989 A
4835713 Pastor May 1989 A
4837701 Sansone et al. Jun 1989 A
4853864 Hart et al. Aug 1989 A
4853865 Sansone et al. Aug 1989 A
4858138 Talmadge Aug 1989 A
4864506 Storace Sep 1989 A
4873645 Hunter et al. Oct 1989 A
4907161 Sansone et al. Mar 1990 A
4934846 Gilham Jun 1990 A
4949381 Pastor Aug 1990 A
4978839 Chen et al. Dec 1990 A
4999481 Baer et al. Mar 1991 A
5019991 Sansone et al. May 1991 A
5022080 Durst et al. Jun 1991 A
5181245 Jones Jan 1993 A
5186498 Dietrich Feb 1993 A
5189700 Blandford Feb 1993 A
5200903 Gilham Apr 1993 A
5202914 Kim et al. Apr 1993 A
5224046 Kim et al. Jun 1993 A
5257197 Gunther et al. Oct 1993 A
5258906 Kroll et al. Nov 1993 A
5280531 Hunter Jan 1994 A
5293319 DeSha et al. Mar 1994 A
5309363 Graves et al. May 1994 A
5319562 Whitehouse Jun 1994 A
5337361 Wang et al. Aug 1994 A
5375172 Chrosny Dec 1994 A
5390251 Pastor et al. Feb 1995 A
5422954 Berson Jun 1995 A
5457642 Brookner Oct 1995 A
5471533 Wang et al. Nov 1995 A
5490217 Wang et al. Feb 1996 A
5510922 Naito Apr 1996 A
5526271 Abumehdi Jun 1996 A
5535127 Uno et al. Jul 1996 A
5535279 Seestrom Jul 1996 A
5583779 Naclerio et al. Dec 1996 A
5586036 Pintsov Dec 1996 A
5606507 Kara Feb 1997 A
5612889 Pintsov et al. Mar 1997 A
5638283 Herbert Jun 1997 A
5717596 Bernard et al. Feb 1998 A
5774554 Gilham Jun 1998 A
5869819 Knowles et al. Feb 1999 A
5917924 Herbert Jun 1999 A
5923763 Walker et al. Jul 1999 A
5936865 Pintsov et al. Aug 1999 A
5978781 Sansone Nov 1999 A
6006211 Sansone et al. Dec 1999 A
6032138 McFiggans et al. Feb 2000 A
6064993 Ryan, Jr. May 2000 A
6064995 Sansone et al. May 2000 A
6112193 Dlugos et al. Aug 2000 A
6119228 Angelo et al. Sep 2000 A
6125357 Pintsov Sep 2000 A
6233568 Kara May 2001 B1
6285990 Lee et al. Sep 2001 B1
6311892 O'Callaghan et al. Nov 2001 B1
6321992 Knowles et al. Nov 2001 B1
6385504 Pintsov et al. May 2002 B1
6394354 Wilz, Sr. et al. May 2002 B1
6408286 Heiden Jun 2002 B1
6549892 Sansone Apr 2003 B1
20010002485 Bisbee et al. May 2001 A1
20010034716 Goodwin Oct 2001 A1
20010044783 Weisberg et al. Nov 2001 A1
20020019938 Aarons Feb 2002 A1
20030225711 Paping Dec 2003 A1
Foreign Referenced Citations (6)
Number Date Country
0 589 723 Mar 1994 EP
0 732 673 Sep 1996 EP
WO8801818 Mar 1988 WO
WO9714482 Apr 1997 WO
WO 0103363 Jan 2001 WO
WO 0221388 Mar 2002 WO
Related Publications (1)
Number Date Country
20040034780 A1 Feb 2004 US
Provisional Applications (1)
Number Date Country
60255432 Dec 2000 US