{"search_session":{},"preferences":{"l":"en","queryLanguage":"en"},"patentId":"198-827-824-802-628","frontPageModel":{"patentViewModel":{"ref":{"entityRefType":"PATENT","entityRefId":"198-827-824-802-628"},"entityMetadata":{"linkedIds":{"empty":true},"tags":[],"collections":[],"notes":[],"inventorships":[],"privateCollections":[],"publicCollections":[],"privateNotes":[],"landscapeCollections":[],"landscapeNotes":[]},"document":{"record_lens_id":"198-827-824-802-628","lens_id":["198-827-824-802-628","039-167-071-885-062"],"doc_key":"EP_2615773_B1_20151216","created":"2016-01-15T20:29:00.111","docdb_id":446135596,"lens_internal":{"earliest_lens_id_created_time":"2016-01-15T20:29:00.111","last_modified":"2024-03-25T06:52:18.89","legacy_pub_key":"EP_2615773_B1","has_doc_lang":true,"has_biblio_lang":true,"has_all_title_lang":true,"has_all_abstract_lang":true,"has_all_claims_lang":true,"has_description_lang":true},"jurisdiction":"EP","doc_number":"2615773","kind":"B1","date_published":"2015-12-16","year_published":2015,"ids":["EP_2615773_B1","198-827-824-802-628","039-167-071-885-062","EP_2615773_B1_20151216","EP","2615773","B1","EP2615773B1","EP2615773","2615773B1"],"lang":"en","publication_type":"GRANTED_PATENT","application_reference":{"jurisdiction":"EP","doc_number":"13150339","kind":"A","date":"2013-01-07"},"priority_claim":[{"jurisdiction":"EP","doc_number":"12305037","kind":"A","date":"2012-01-10"},{"jurisdiction":"EP","doc_number":"12305152","kind":"A","date":"2012-02-13"},{"jurisdiction":"EP","doc_number":"12305180","kind":"A","date":"2012-02-16"},{"jurisdiction":"EP","doc_number":"13150339","kind":"A","date":"2013-01-07"}],"priority_claim.source":"DOCDB","earliest_priority_claim_date":"2012-01-10","title":{"de":[{"text":"VERFAHREN UND VORRICHTUNG ZUM ZEITSTEMPELN VON DATEN UND VERFAHREN UND VORRICHTUNG ZUR VERIFIZIERUNG EINES ZEITSTEMPELS","lang":"de","source":"DOCDB","data_format":"DOCDBA"}],"en":[{"text":"METHOD AND DEVICE FOR TIMESTAMPING DATA AND METHOD AND DEVICE FOR VERIFICATION OF A TIMESTAMP","lang":"en","source":"DOCDB","data_format":"DOCDBA"}],"fr":[{"text":"PROCÉDÉ ET DISPOSITIF D'HORODATAGE DE DONNÉES ET PROCÉDÉ ET DISPOSITIF DE VÉRIFICATION D'UN HORODATAGE","lang":"fr","source":"DOCDB","data_format":"DOCDBA"}]},"title_lang":["de","en","fr"],"has_title":true,"applicant":[{"name":"THOMSON LICENSING","residence":"FR","sequence":1,"app_type":"applicant"}],"applicant_count":1,"has_applicant":true,"inventor":[{"name":"NEUMANN CHRISTOPH","residence":"FR","sequence":1},{"name":"HEEN OLIVIER","residence":"FR","sequence":2},{"name":"ONNO STÉPHANE","residence":"FR","sequence":3}],"inventor_count":3,"has_inventor":true,"agent":[{"name":"Ståhl, Björn Niclas","address":"Technicolor \n1, rue Jeanne d'Arc, 92443 Issy-les-Moulineaux","country":"FR"}],"agent_count":1,"has_agent":true,"owner":[],"owner_count":0,"owner_all":[],"owner_all_count":0,"has_owner":false,"has_examiner":false,"class_ipcr":[{"symbol":"H04L9/32","version_indicator":"2006-01-01","class_symbol_position":"F","class_value":"I","action_date":"2013-04-08","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":1},{"symbol":"H04L29/06","version_indicator":"2006-01-01","class_symbol_position":"L","class_value":"I","action_date":"2013-04-08","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":2}],"class_ipcr.first_symbol":"H04L9/32","class_ipcr.later_symbol":["H04L29/06"],"class_ipcr.inv_symbol":["H04L9/32","H04L29/06"],"class_ipcr.add_symbol":[],"class_ipcr.source":"DOCDB","class_cpc":[{"symbol":"H04L61/35","version_indicator":"2013-01-01","class_symbol_position":"L","class_value":"A","action_date":"2013-02-11","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":1},{"symbol":"H04L9/3297","version_indicator":"2013-01-01","class_symbol_position":"F","class_value":"I","action_date":"2013-12-03","class_status":"B","class_data_source":"H","generating_office":"EP","sequence":2},{"symbol":"H04L61/4511","version_indicator":"2022-05-01","class_symbol_position":"L","class_value":"I","action_date":"2022-05-01","class_status":"R","class_data_source":"H","generating_office":"EP","sequence":3},{"symbol":"G06F17/00","version_indicator":"2013-01-01","class_symbol_position":"F","class_value":"I","action_date":"2016-09-01","class_status":"B","class_data_source":"H","generating_office":"KR","sequence":4}],"class_cpc_cset":[],"class_cpc.first_symbol":"H04L9/3297","class_cpc.later_symbol":["H04L61/35","H04L61/4511"],"class_cpc.inv_symbol":["H04L9/3297","H04L61/4511","G06F17/00"],"class_cpc.add_symbol":["H04L61/35"],"class_cpc.source":"DOCDB","class_national":[],"class_national.later_symbol":[],"reference_cited":[{"patent":{"document_id":{},"category":[],"us_category":[],"rel_claims":[]}},{"npl":{"text":"CLAUDE CASTELLUCCIA ET AL: \"EphPub: Toward robust Ephemeral Publishing\", NETWORK PROTOCOLS (ICNP), 2011 19TH IEEE INTERNATIONAL CONFERENCE ON, IEEE, 17 October 2011 (2011-10-17), pages 165-175, XP032028951, DOI: 10.1109/ICNP.2011.6089048 ISBN: 978-1-4577-1392-7","external_id":[],"lens_id":[],"category":[],"us_category":[],"rel_claims":[]}},{"npl":{"text":"WEI GUO ET AL: \"Study on the Security of Time-Stamping Service Architecture\", ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, 2009. ECBI 2009. INTERNATIONAL CONFERENCE ON, IEEE, PISCATAWAY, NJ, USA, 6 June 2009 (2009-06-06), pages 28-32, XP031499247, ISBN: 978-0-7695-3661-3","external_id":[],"lens_id":[],"category":[],"us_category":[],"rel_claims":[]}}],"reference_cited.source":"EPO_FULLTEXT","reference_cited.patent_count":1,"cites_patent":true,"reference_cited.npl_count":2,"reference_cited.npl_resolved_count":0,"cites_npl":true,"cites_resolved_npl":false,"cited_by":{"patent_count":0,"patent":[]},"cited_by_patent":false,"family":{"simple":{"size":5,"id":207369793,"member":[{"lens_id":"010-944-122-412-937","document_id":{"jurisdiction":"CN","doc_number":"103281292","kind":"A","date":"2013-09-04"}},{"lens_id":"161-695-883-495-969","document_id":{"jurisdiction":"JP","doc_number":"2013143146","kind":"A","date":"2013-07-22"}},{"lens_id":"138-571-246-007-40X","document_id":{"jurisdiction":"KR","doc_number":"20130082114","kind":"A","date":"2013-07-18"}},{"lens_id":"198-827-824-802-628","document_id":{"jurisdiction":"EP","doc_number":"2615773","kind":"B1","date":"2015-12-16"}},{"lens_id":"151-997-935-879-800","document_id":{"jurisdiction":"EP","doc_number":"2615773","kind":"A1","date":"2013-07-17"}}]},"extended":{"size":7,"id":206769534,"member":[{"lens_id":"198-827-824-802-628","document_id":{"jurisdiction":"EP","doc_number":"2615773","kind":"B1","date":"2015-12-16"}},{"lens_id":"151-997-935-879-800","document_id":{"jurisdiction":"EP","doc_number":"2615773","kind":"A1","date":"2013-07-17"}},{"lens_id":"010-944-122-412-937","document_id":{"jurisdiction":"CN","doc_number":"103281292","kind":"A","date":"2013-09-04"}},{"lens_id":"161-695-883-495-969","document_id":{"jurisdiction":"JP","doc_number":"2013143146","kind":"A","date":"2013-07-22"}},{"lens_id":"138-571-246-007-40X","document_id":{"jurisdiction":"KR","doc_number":"20130082114","kind":"A","date":"2013-07-18"}},{"lens_id":"058-217-873-205-630","document_id":{"jurisdiction":"EP","doc_number":"2615772","kind":"A1","date":"2013-07-17"}},{"lens_id":"119-044-695-835-135","document_id":{"jurisdiction":"US","doc_number":"20130179555","kind":"A1","date":"2013-07-11"}}]}},"has_sequence":false,"legal_status":{"ipr_type":"patent for invention","granted":true,"earliest_filing_date":"2012-02-16","grant_date":"2015-12-16","anticipated_term_date":"2032-02-16","has_disclaimer":false,"patent_status":"ACTIVE","publication_count":2,"has_spc":false,"has_grant_event":true,"has_entry_into_national_phase":false,"has_intention_to_grant":true},"abstract":{},"abstract_lang":[],"has_abstract":false,"claim":{"en":[{"text":"A method of verifying a timestamp for data f, the method comprising in a device (340):\n generating (S21) at least one domain name D from a timestamping time t and a value based on the data f by:\n using a one-way function on the data f and the timestamping time t to obtain an intermediate value; \n generating at least one IP address from the intermediate value; \n sending a DNS reverse-resolution request for each of the at least one IP addresses; and \n receiving a domain name in response to each DNS reverse-resolution request; \n sending (S22) a DNS resolution request for each of the generated domain names D; \n receiving (S23) a resolution response for each sent DNS resolution request, each resolution response comprising a Time-to-Live value; \n retrieving (S24) a reference Time-to-Live value from each DNS server to which a DNS resolution request was sent; \n for each resolution response, comparing (S25) a current time, the timestamping time t , the received Time-to-Live value and the reference Time-to-Live value for the DNS server from which the resolution response was received; and \n determining (S26) that the timestamp is correct if at least a predetermined number of comparisons are correct.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"A device (310) for timestamping data f, the device comprising a processor (311) configured to:\n use a one-way function on the data f and a timestamping time t to obtain an intermediate value; \n generate at least one IP address from the intermediate value; \n send a DNS reverse-resolution request for each of the at least one IP addresses; \n receive a domain name in response to each DNS reverse-resolution request \n send a DNS resolution request for each of the generated domain names D ; and \n output a timestamp comprising the data f.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"A device (340) for verifying a timestamp for data f, the device (340) comprising a processor (341) configured to:\n generate at least one domain name D from a timestamping time t and a value based on the data f by:\n using a one-way function on the data f and the timestamping time t to obtain an intermediate value; \n generating at least one IP address from the intermediate value; \n sending a DNS reverse-resolution request for each of the at least one IP addresses; and \n receiving a domain name in response to each DNS reverse-resolution request; \n send a DNS resolution request for each of the generated domain names D; \n receive a resolution response for each sent DNS resolution request, each resolution response comprising a Time-to-Live value; \n retrieve a reference Time-to-Live value from each DNS server to which a DNS resolution request was sent; \n for each resolution response, compare a current time, the timestamping time t, the received Time-to-Live value and the reference Time-to-Live value for the DNS server from which the resolution response was received; and \n determine that the timestamp is correct if at least a predetermined number of comparisons are correct.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"The device of claim 3, wherein the processor (341) is further configured to select a DNS server by obtaining a numerical value from at least the data f , and using the numerical value to select the DNS server from a list of DNS servers, and to send at least one of the DNS resolution request to the selected DNS server.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"A method for timestamping data f, the method comprising in a device (310):\n using a one-way function on the data f and a timestamping time t to obtain an intermediate value; \n generating at least one IP address from the intermediate value; \n sending a DNS reverse-resolution request for each of the at least one IP addresses; \n receiving a domain name in response to each DNS reverse-resolution request \n sending a DNS resolution request for each of the generated domain names D; and \n outputting a timestamp comprising the data f.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"A computable readable storage medium (360) comprising stored instructions that when executed by a processor performs the method of claim 5.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"A computable readable storage medium (370) comprising stored instructions that when executed by a processor performs the method of claim 1.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"}],"de":[{"text":"Verfahren zum Überprüfen eines Zeitstempels für Daten f, wobei das Verfahren in einer Vorrichtung (340) umfasst:\n Erzeugen (S21) mindestens eines Domänennamens D aus einem Zeitstempelzeitpunkt t und aus einem Wert, der auf den Daten f beruht, durch:\n Anwenden einer Einwegfunktion auf die Daten f und auf den Zeitstempelzeitpunkt t, um einen Zwischenwert zu erhalten; \n Erzeugen mindestens einer IP-Adresse aus dem Zwischenwert; \n Senden einer DNS-Rückwärtsauflösungsanforderung für jede der mindestens einen IP-Adressen; und \n Empfangen eines Domänennamens als Antwort auf jede DNS-Rückwärtsauflösungsanforderung; \n Senden (S22) einer DNS-Auflösungsanforderung für jeden der erzeugten Domänennamen D; \n Empfangen (S23) einer Auflösungsantwort für jede gesendete DNS-Auflösungsanforderung, wobei jede Auflösungsantwort einen Lebensdauerwert umfasst; \n Abrufen (S24) eines Referenzlebensdauerwerts von jedem DNS-Server, an den eine DNS-Auflösungsanforderung gesendet wurde; \n Vergleichen (S25) eines gegenwärtigen Zeitpunkts, des Zeitstempelungszeitpunkts t, des empfangenen Lebensdauerwerts und des Referenzlebensdauerwerts für den DNS-Server, von dem die Auflösungsantwort empfangen wurde, für jede Auflösungsantwort; und Bestimmen (S26), dass der Zeitstempel richtig ist, \n falls mindestens eine vorgegebene Anzahl von Vergleichen richtig sind.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Vorrichtung (310) zum Zeitstempeln von Daten f, wobei die Vorrichtung einen Prozessor (311) umfasst, der konfiguriert ist zum:\n Anwenden einer Einwegfunktion auf die Daten f und auf einen Zeitstempelungszeitpunkt t, um einen Zwischenwert zu erhalten; \n Erzeugen mindestens einer IP-Adresse aus dem Zwischenwert; \n Senden einer DNS-Rückwärtsauflösungsanforderung für jede der mindestens einen IP-Adressen; \n Empfangen eines Domänennamens als Antwort auf jede DNS-Rückwärtsauflösungsanforderung; \n Senden einer DNS-Auflösungsanforderung für jeden der erzeugten Domänennamen D; und \n Ausgeben eines Zeitstempels, der die Daten f umfasst.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Vorrichtung (340) zum Überprüfen eines Zeitstempels für Daten f, wobei die Vorrichtung (340) einen Prozessor (341) umfasst, der konfiguriert ist zum:\n Erzeugen mindestens eines Domänennamens D aus einem Zeitstempelungszeitpunkt t und aus einem Wert, der auf den Daten f beruht, durch:\n Anwenden einer Einwegfunktion auf die Daten f und auf den Zeitstempelungszeitpunkt t, um einen Zwischenwert zu erhalten; \n Erzeugen mindestens einer IP-Adresse aus dem Zwischenwert; \n Senden einer DNS-Rückwärtsauflösungsanforderung für jede der mindestens eine IP-Adressen; und \n Empfangen eines Domänennamens als Antwort auf jede DNS-Rückwärtsauflösungsanforderung; \n Senden einer DNS-Auflösungsanforderung für jeden der erzeugten Domänennamen D; \n Empfangen einer Auflösungsantwort für jede gesendete DNS-Auflösungsanforderung, wobei jede \n Auflösungsantwort einen Lebensdauerwert umfasst; \n Abrufen eines Referenzlebensdauerwerts von jedem DNS-Server, an den eine DNS-Auflösungsanforderung gesendet wurde; \n Vergleichen eines gegenwärtigen Zeitpunkts, des Zeitstempelungszeitpunkts t, des empfangenen Lebensdauerwerts und des Referenzlebensdauerwerts für den DNS-Server, von dem die Auflösungsantwort empfangen wurde, für jede Auflösungsantwort; und \n Bestimmen, dass der Zeitstempel richtig ist, falls mindestens eine vorgegebene Anzahl der Vergleiche richtig sind.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Vorrichtung nach Anspruch 3, wobei der Prozessor (341) ferner dafür konfiguriert ist, einen DNS-Server auszuwählen, indem er mindestens aus den Daten f einen Zahlenwert erhält, und den Zahlenwert zum Auswählen des DNS-Servers aus einer Liste von DNS-Servern verwendet und mindestens eine der DNS-Auflösungsanforderungen an den ausgewählten DNS-Server sendet.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Verfahren zum Zeitstempeln von Daten f, wobei das Verfahren in einer Vorrichtung (310) umfasst:\n Anwenden einer Einwegfunktion auf die Daten f und auf einen Zeitstempelungszeitpunkt t, um einen Zwischenwert zu erhalten; \n Erzeugen mindestens einer IP-Adresse aus dem Zwischenwert; \n Senden einer DNS-Rückwärtsauflösungsanforderung für jede der mindestens einen IP-Adressen; \n Empfangen eines Domänennamens als Antwort auf jede DNS-Rückwärtsauflösungsanforderung; \n Senden einer DNS-Auflösungsanforderung für jeden der erzeugten Domänennamen D; und \n Ausgeben eines Zeitstempels, der die Daten f umfasst.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Computerlesbares Speichermedium (360), das gespeicherte Anweisungen umfasst, die, wenn sie durch einen Prozessor ausgeführt werden, das Verfahren nach Anspruch 5 durchführen.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Computerlesbares Speichermedium (370), das gespeicherte Anweisungen umfasst, die, wenn sie durch einen Prozessor ausgeführt werden, das Verfahren nach Anspruch 1 durchführen.","lang":"de","source":"EPO_FULLTEXT","data_format":"ORIGINAL"}],"fr":[{"text":"Procédé de vérification d'un horodatage de données f, le procédé comprenant un dispositif (340) :\n générant (S21) au minimum un nom de domaine D à partir d'une heure d'horodatage t et une valeur basée sur les données f :\n en utilisant une fonction à sens unique sur les données f et l'heure d'horodatage t pour obtenir une valeur intermédiaire ; \n en générant au minimum une adresse IP à partir la valeur intermédiaire ; \n en envoyant une demande de résolution inverse DNS pour chaque adresse IP ; et \n en recevant un nom de domaine en réponse à chaque demande de résolution inverse DNS ; \n envoyant (S22) une demande de résolution DNS pour chaque nom de domaine généré D ; \n recevant (S23) une réponse de résolution pour chaque demande de résolution DNS incluant une valeur Durée de vie ; \n récupérant (S24) une valeur Durée de vie de référence de chaque serveur DNS auquel la demande de résolution DNS a été envoyée ; \n pour chaque réponse de résolution, comparant (S25) une heure actuelle, l'heure d'horodatage t, la valeur Durée de vie reçue et la valeur Durée de vie de référence pour le serveur DNS dont la réponse de résolution provient ; et \n déterminant (S26) que l'horodatage est correct si, au minimum, un nombre prédéterminé de comparaisons sont correctes.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Un dispositif (310) d'horodatage de données f, le dispositif comprenant un processeur (311) configuré pour :\n utiliser une fonction à sens unique sur les données f et une heure d'horodatage pour obtenir une valeur intermédiaire ; \n générer au minimum une adresse IP à partir de la valeur intermédiaire ; \n envoyer une demande de résolution inverse DNS pour chaque adresse IP ; \n recevoir un nom de domaine en réponse à chaque demande de résolution inverse DNS \n envoyer une demande de résolution DNS pour chaque nom de domaine généré D; et \n générer un horodatage comprenant les données f.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Un dispositif (340) de vérification d'un horodatage de données f, le dispositif (340) \ncomprenant un processeur (341) configuré pour :\n générer au minimum un nom de domaine D à partir d'une heure d'horodatage t et une valeur basée sur les données ; \nen utilisant une fonction à sens unique sur les données f ainsi que l'heure d'horodatage t pour obtenir une valeur intermédiaire ; \nen générant au moins une adresse IP à partir la valeur intermédiaire ; \nen envoyant une demande de résolution inverse DNS pour chaque adresse IP ; et \nen recevant un nom de domaine en réponse à chaque demande de résolution inverse DNS ;\n envoyer une demande de résolution DNS pour chaque nom de domaine généré D; \n recevoir (S23) une réponse de résolution pour chaque demande de résolution DNS, chaque réponse de résolution incluant une valeur Durée de vie ; \n récupérer (S24) une valeur Durée de vie de référence de chaque serveur DNS auquel la demande de résolution DNS a été envoyée ; \n pour chaque réponse de résolution, comparer une heure actuelle, l'heure d'horodatage t, la valeur Durée de vie reçue et la valeur Durée de vie de référence pour le serveur DNS dont la réponse de résolution provient ; et \n déterminer que l'horodatage est correct si, au minimum, un nombre prédéterminé de comparaisons sont correctes.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Le dispositif selon la revendication 6, dans lequel le processeur (341) est également configuré pour sélectionner un serveur DNS en obtenant une valeur numérique à partir des données f, au minimum, et en utilisant la valeur numérique pour sélectionner le serveur DNS dans une liste de serveurs DNS, et pour envoyer au moins une demande de résolution DNS au serveur DNS sélectionné.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Procédé d'horodatage de données f, le procédé comprenant un dispositif (310) :\n utilisant une fonction à sens unique sur les données f et une heure d'horodatage pour obtenir une valeur intermédiaire ; \n générant au minimum une adresse IP à partir la valeur intermédiaire ; \n envoyant une demande de résolution inverse DNS pour chaque adresse IP ; \n recevant un nom de domaine en réponse à chaque demande de résolution inverse DNS \n envoyant une demande de résolution DNS pour chaque nom de domaine généré D; et en générant un horodatage incluant les données f.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Un support de stockage lisible par ordinateur (360) comprenant des instructions stockées qui, lorsqu'elles sont exécutées par un processeur, effectuent le procédé selon la revendication 5.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"},{"text":"Un support de stockage lisible par ordinateur (370) comprenant des instructions stockées qui, lorsqu'elles sont exécutées par un processeur, effectuent le procédé selon la revendication 1.","lang":"fr","source":"EPO_FULLTEXT","data_format":"ORIGINAL"}]},"claim_lang":["en","de","fr"],"has_claim":true,"description":{"en":{"text":"TECHNICAL FIELD The present invention relates to timestamping of digital documents. BACKGROUND This section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present invention that are described and/or claimed below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present invention. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art. Digital timestamping can be defined as how to enable a principal p to prove a posteriori that at a given time t it knew digital data f . In the digital world there are many situations that require reliable timestamping, i.e. proof that a certain file or document existed at a certain time. Examples of such situations include:\n on-line auctions, to ensure correct order of bids; electronic voting, to ensure that the vote was cast at an allowable time; publications, to prove that a document was published at a given time; on-line betting, to make sure that a bet is placed before the event; and Digital Rights Management, to ensure that an item of content is used only when allowed. The prior art provides many different solutions related to time. Network Time Protocol, NTP, is a common protocol for providing reliable time measure for events. It allows parties to estimate the simultaneity of events, or the time difference between events. However, it does not provide the ability to strongly link a proof of possession and a time indication. Wikipedia's page on Trusted timestamping, http://en.wikipedia.org/wiki/ Trusted_timestamping, describes different solutions based on timestamping authorities. These solution rely on a trusted third party that provides the timestamp. In one solution, the third party receives a document, processes the document, e.g. by hashing the document together with the present time, in order to prove upon request when the document was timestamped. In another solution, a user sends a hash of the document to a third party that includes the hash in a hash tree, which enables timestamping; the document was clearly extant when the 'master' hash value was published. BitCoin - see \"A Peer-to-Peer Electronic Cash System\", http://www.bitcoin.org/bitcoin.pdf - provides a timestamping server that adds a timestamp to each item to be timestamped, hashes all the received documents, and widely publishes the hash in a newspaper or in Usenet posts. The timestamp proves that the data must have existed at the time, obviously, in order to get into the hash. Each timestamp includes the previous timestamp in its hash, forming a chain, with each additional timestamp reinforcing the ones before it. Ephemeral Publishing - see \"Ephemeral Publishing\", C. Castelluccia et al., http://code.google.com/p/ephpub/ - system uses the Domain Name System to store cryptographic keys. The keys are stored by forcing the insertion of domains in DNS caches. The entries are automatically removed from the cache by the DNS server once the TTL expired. Thus the cryptographic key is automatically forgotten after a while. This system does not address the problem of proving the existence of information at a certain time; it only focuses on the erasure of a key. Castelluccia et al. also describe the solution in a paper \"EphPub: Toward Robust Ephemeral Publishing\". One known drawback of prior art time-stamping is the need of a trusted third party to provide both the reliable time and the processes for making and verifying the timestamps. This can cause trust issues and also reliability issues as the system fails if the third party becomes unavailable. It will thus be appreciated that there is a need for a time-stamping solution that overcomes the problems of the prior art. The system of the present application provides such a solution. SUMMARY OF INVENTION In a first aspect, the invention is directed to a method of timestamping according to claim 5. In a second aspect, the invention is directed to a method of verifying a timestamp for according to claim 1. In a third aspect, the invention is directed to a device for timestamping data according to claim 2. In a preferred embodiment, the processor is further configured to select a DNS server by obtaining a numerical value from at least the data, and using the numerical value to select the DNS server from a list of DNS servers, wherein at least one of the DNS resolution request is sent to the selected DNS server. In a fourth aspect, the invention is directed to a device for verifying a timestamp for data according to claim 3. In a fifth aspect, the invention is directed to a computable readable storage medium according to claim 6. In a sixth aspect, the invention is directed to a computable readable storage medium according to claim 7. BRIEF DESCRIPTION OF DRAWINGS Preferred features of the present invention will now be described, by way of non-limiting example, with reference to the accompanying drawings, in which\n Figure 1 illustrates timestamping of digital data according to a preferred embodiment of the present invention; Figure 2 illustrates verification of a timestamp according to a preferred embodiment of the present invention; and Figure 3 illustrates a timestamping system according to a preferred embodiment of the present invention. DESCRIPTION OF EMBODIMENTS The invention relates to reliable timestamping of digital data. The entity that makes the timestamp is called 'the owner' and the entity that checks the timestamp is called 'the verifier'. Since the invention makes use of the Domain Name System (DNS), the necessary concepts will now be described. DNS resolution: The DNS is a worldwide database that turns Fully Qualified Domain Names (FQDN), e.g. www.example.com, into its corresponding IP address, e.g. 192.0.43.10. This process is called the 'resolution'. An example is shown in the following shell session:\n C:\\ >nslookup > www.example.com Non-authoritative answer: Name: 192.0.43.10 DNS reverse-resolution: The DNS also performs the inverse operation, i.e. turning an IP address into its corresponding FQDN. This process is called the 'reverse-resolution'. An example is shown in the following shell session:\n C:\\ >nslookup > 192.0.43.10 Name: www.example.com Top level Domain (TLD): The top level domain is the root (the last part) of a FQDN. The TLD of www.example.com is '.com'. Some of the most popular TLD are '.com', and '.org'. An embodiment of the invention uses '.com'. Authoritative DNS: The crucial constraints for the DNS are high availability and consistency. Therefore, the DNS is highly distributed over the world, with many local or regional replicas. A DNS server is said authoritative for a domain if it has the ability to define the corresponding IP addresses and other attributes such as the Time-To-Live (will be explained hereinafter). All other DNS servers are said non-authoritative. Non-authoritative DNS servers in a domain can only replicate the information from the domain's authoritative server in their local DNS cache for a period of time. DNS cache: Each DNS server maintains a cache of DNS entries. When a resolution request is received by a server, it first checks if the requested domain is stored in its cache; if this is the case, the server directly responds. However, if the domain is not in the cache, then the server normally forwards the request to its hierarchical server that repeats the checking process. The hierarchical server that succeeds the resolution sends the response down the hierarchy towards the originating server. The subordinate DNS servers add the domain of the request to their caches. Recursive resolution: It is possible for a client to specify in a DNS resolution request whether or not the server should forward the request to its hierarchical servers. If the server cache does not store the requested domain and if the server does not forward the request, then the server returns an empty response to the resolution request. DNS Time-To-Live: A DNS server does not store the DNS entries in its cache indefinitely. Each entry is associated with a Time-To-Live (TTL) period that only an authoritative server can define. This TTL period will herein be called a 'reference TTL'. A typical value is 86400 seconds (one day) but values up to 7 days are supported. A non-authoritative server is allowed to replicate the resolution information until the TTL expires. When answering a resolution request, the non-authoritative server also returns the remaining TTL value. When the TTL value expires for an entry, the non-authoritative server no longer resolves requests for the entry. In order to respond to subsequent requests, the non-authoritative server must get the resolution again from the authoritative server. The present invention makes use of the DNS features described hereinbefore The invention comprises to distinct but related parts: timestamping of digital data and the verification of an existing timestamp. Timestamping of digital data Figure 1 illustrates timestamping of digital data according to a preferred embodiment of the present invention. The owner p has data f that is to be timestamped with a time t . The owner uses S11 a deterministic one-way function g to generate a set of domain names D ; D = g ( f,t ) - see hereinafter for details. The one-way function g binds the generated domain names D to the data f and the time t . The one-way function g is advantageously a cryptographic hash function, but it can also be a block cipher using Cipher Block Chaining (CBC). The skilled person will appreciate that it is possible to generate the set of domain names D without using the time t . While this does not allow timestamping in the traditional sense, it can still allow an owner to prove that prior possession of the data (in particular if he renews the DNS resolutions regularly). It is alternatively possible to include in the generation further data, such as a secret value. The owner p resolves each of the domain names in D by sending DNS resolution requests to one or more DNS servers, step S12. The owner preferably forces recursive resolution by including this option in the DNS resolution requests. As an effect, DNS servers that does not cache a requested domain name will (when the response returns from the authoritative DNS server) add the domain name to their cache and set the TTL value, step S13. The DNS servers store the domain name in their caches until the TTL reaches 0, as defined in the DNS standard. It should be noted that a DNS server that already caches a domain name does not update the TTL value. To avoid the impact of very popular DNS domains (e.g. google.com that is very likely cached everywhere) and to avoid collision between several DNS timestamps, the following is recommended:\n Requested DNS domains should be generated using a pseudorandom or cryptographic function. A plurality of resolution requests should be sent for one timestamp. The skilled person will appreciate that the reliability of the timestamp increases with the number of resolution requests. On the other hand, the resource use increases with the number or requests. Typical trade-offs result in e.g. 64, 128, 256 or 512 requests. The request should be spread over different DNS servers. This is in order to decrease the reliability on a single (or a few) DNS servers. It will be appreciated that the difficulty for the owner p (or another party) to \"hack\" the system increases with the number of servers. As the DNS servers often are independently operated, it is likely that control of one DNS server does not provide control of other DNS servers. Verification of an existing timestamp Figure 2 illustrates verification of timestamp according to a preferred embodiment of the present invention. It is assumed that a verifier has retrieved the data f and the 'timestamping' time t , and has knowledge of the one-way function g . The verifier first calculates D = g ( f,t ) in the same way as the owner (i.e. possibly without the time t and possibly with further data), step S21. Then the verifier sends resolution requests for the calculated domain names to the same DNS servers as the owner p , step S22. For the domain name calculation, the verifier uses an algorithm that is equivalent to (preferably the same as) the algorithm used by the owner. It is preferred that the DNS infrastructure is publicly available since this makes the timestamping method (both the timestamping and the verification) public. When the verifier receives the resolution responses, it retrieves the remaining TTL for each domain name in D , step S23. In addition the verifier retrieves the reference TTL values for each domain name in D , step 24. This is achieved by querying the authoritative servers for each domain. The verifier then, step S25, compares the current time with the 'timestamping' time t and, for each domain name, the received reference TTL and the remaining TTL; i.e. the verifier checks if current time ≈ t + (reference TTL - remaining TTL). The verifier finally, step S26, judges that verification succeeds if for at least a portion (1-ε) of the domain names out of D the difference between the reference TTL values and the remaining TTL values is consistent with the 'timestamping' time t provided with the proof. In other cases the verification is judged to be unsuccessful. In case the timestamp does not include the time t , then the verification is preferably made by checking that the remaining TTL values (or reference TTL - remaining TTL ) for at least a portion (1-ε) of the domain names out of D are at least roughly identical. Illustrative example The following example illustrates the verification of a timestamp. The PERL command line results are:\n Generate the timestamp for the text \"You lost the game\":\n Mon 06/20/2011 14h52:00> perl dnstamp.pl -text \"You lost the game\" - time \"Mon 06/20/2011 14h52:00\" -generate In this example, the resolution requests are not shown, but it will be understood that two domain names are generated and that two resolution requests are sent by the owner and that the verifier sends two resolution requests for each verification attempt. The number of seconds for each verification come from two different DNS servers and gives the 'age' of the timestamp. The slight variations (i.e. the variations in the differences between the two values, ranging between 4 and 19 seconds) may come from network delays or from minor synchronization differences; it will however be understood that such minor differences do not impact the confidence in the system as the reference TTL is much, much greater, 86400 seconds. \nVerify the timestamp for the text \"You lost the game\" and the time:\n Mon 06/20/2011 14h53:00> perl dnstamp.pl -text \"You lost the game\" - time \"Mon 06/20/2011 14h52:00\" -verify\n 56 seconds 37 seconds Mon 06/20/2011 14h53:30> perl dnstamp.pl -text \"You lost the game\" - time \"Mon 06/20/2011 14h52:00\" -verify\n 93 seconds 80 seconds Mon 06/20/2011 16h07:00> perl dnstamp.pl -text \"You lost the game\" - time \"Mon 06/20/2011 14h52:00\" -verify\n 4453 seconds 4449 seconds Mon 06/27/2011 11h02:42> perl dnstamp.pl -text \"You lost the game\" - time \"Mon 06/20/2011 14h52:00\" -verify\n Expired Expired It can be seen that the timestamp was performed at 14:52:00, that first verification, at 14:53:00, i.e. one minute after the timestamp, yields 'ages' of 56 and 37 seconds, respectively. Further, the verification at 14:53:30, i.e. 1,5 minutes after the timestamp, yields 'ages' of 93 and 80 seconds, respectively and that the verification at 16:07:00, i.e. 1 hour and 15 minutes (4500 seconds) after the timestamp, yields 'ages' of 4453 and 4449 seconds, respectively. The final example shows that the timestamp has expired; the verification was made almost 7 days after the creation of the timestamp and the reference TTL was 86400 seconds, i.e. one day. Preferred embodiment Timestamping Here follows more details of the timestamping method of the present application. An example is used for illustration of the abstract points. In the example, a timestamp is generated on digital data f at time t and a single DNS server is used for the resolutions; naturally a plurality of DNS servers could be used.\n Step 1: generate random domain names.\n Step 1.1: compute α =h ( f.t ) where '.' denotes concatenation and h is a cryptographic hash function. In the example a 256-bit wide hash function, sha256, was used. α is thus a 256-bit number. Step 1.2: eight IP addresses A 1 - A 8 are generated from α : A 1 = α [1..32], A 2 = α[33..64],..., A 8 = α[224..256], where α[X..Y] denotes bits X to Y of α . Step 1.3: send inverse resolutions requests for the eight IP addresses, A 1 to A 8 . This generally results in eight FQDNs D 1 ,..., D 8 being returned to the owner. Step 2: resolve FQDNs\n Request the resolutions for the eight FQDNs D 1 ,..., D 8 by forcing recursive resolution. The queried domains are automatically added to the DNS server's cache and the maximum TTL values TTLMaxD 1 ,..., TTLMaxD 8 are set by the DNS server unless the DNS server already caches the domain in question. There are different ways of determining to which the resolution requests shall be sent. A first option is to send all the requests to one or more pre-determined DNS servers. These servers could be 'standard' servers that always are used. In case more than one server is used, it is possible to send a predetermined (possibly varying) number of resolution requests to each server, where the number may be one or a greater number. A second option is for the owner to make the decision and attach the necessary information to the timestamp. A third, preferred, option is to use information related to the data f to decide which DNS servers to use. The data f could for example be hashed (with or without the time t ) one or more times to come up with a number of values. The values could then be mapped onto a list of DNS servers that are to be used for timestamping; the list could be included in the software program that performs the timestamp and in the software program that performs the verification thereof, but it could also be mapped onto a publicly available list of DNS servers. It is particularly advantageous to use the value α, either directly and/or as a seed. The data f could also be interpreted as a series of numbers that are mapped to such a list. As an example, imagine that the list comprises 128 different DNS servers. If the value α (256 bits in the example) is used it may be split into e.g. 42 groups of 6 bits and the first 8 (or other desired number) of these may be used to select the DNS servers from the list. The skilled person will appreciate that many other well-known alternatives for (quasi-)random selection of values from a seed are available. Sending proof The owner publishes the data f and the time t . It should be noted that it is also possible to publish the value α (or the resulting IP addresses A 1 -A 8 ) instead of f . The proof can be published to the world (in a newspaper or on the web), to a certain group (e.g. a social network) or directly to a verifier (e.g. by email). The details of the publication are beyond the scope of the invention. Verification The verifier generates the same DNS resolution requests as the owner did during the timestamping, for example using α= h ( f.t ) and the generation of the IP addresses therefrom. The verifier sends the generated requests to the same DNS server (or, as the case may be, the same DNS servers) as the owner. To do so, the verifier uses the pre-determined DNS servers, retrieves the information from the timestamp or selects the DNS servers in the same way as the owner. In response, the verifier receives the remaining TTL values. The verifier also queries the corresponding authoritative servers in order to get the reference TTL values. The verification succeeds if the difference between the remaining TTL values and the reference TTL values is at least generally consistent with the time that has really passed since the timestamp. It will be appreciated that it is preferred to disregard the remaining TTL values that correspond to reference TTL values that are lower than the difference between the present time and the timestamping time t. More precisely:\n Step 1: The verifier gets f and t . He computes the eight FQDN domains D 1 ,..., D 8 as in Step 1 of the timestamping method. Step 2: The verifier resolves the eight domains using the authoritative server of the (or each) domain. The verifier stores the returned maximum TTL values TTLMaxD 1 ..., TTLMaxD 8 for each domain. Step 3: The verifier resolves the eight domains using the standard DNS server, i.e. the same as the owner. The DNS server returns the decremented TTL TTLD 1 ..., TTLD 8 for each entry. It should be noted that unless the TTL has expired, the DNS server stores all these entries as these were cached in response to the owners requests, but, as mentioned hereinbefore, the cache entry is not updated if it already existed at the time of the owners request. This may cause the DNS server to return lower TTLD values than expected; which is one of the reasons why it is important to use multiple requests. Step 4: The verifier now calculates the difference for each domain: TTLMaxD 1 - TTLD 1 ..., TTLMaxD 8 - TTLD 8 . If most resulting values are equal (minor differences are tolerated) and if the elapsed time is consistent with the announced time t the proof succeeded. The tolerance for the time and the required ratio of consistent times is up to the verifier to decide; for example time differences of 10 seconds or 600 seconds (10 minutes) may be tolerated and at least a fourth, a third or half of the times may be required to be consistent to trust the timestamp. Variant embodiments Using a dedicated domain Instead of randomly choosing IP addresses during timestamping, one or more given domains, such as \"example.com\", could be used. This makes it possible to know in advance which the authoritative server of the domain is. To achieve this, the random function h ( f.t ) still returns a set of n random strings s 1 ...s n and the resolution request are generated using the FQNDs s 1 .example.com,..., s n .example.com. Additional information for the verifier In the preferred embodiment, the verifier ends up with the following information: \"the proof is valid\" or \"the proof is not valid\". This can be extended in a more verbose mode that gives precisions about for example the shortest TTL in the timestamping process, the longest TTL, the average value of TTLs, and combinations thereof. Figure 3 illustrates a timestamping system 300 according to a preferred embodiment of the present invention. The system 300 comprises an owner device 310 and a verifier device 340, each comprising at least one processor 311, 341, memory 312, 342, preferably a user interface 313, 343, and at least one input/output unit 314, 344. Both the owner device 310 and the verifier device 340 may for example be a personal computer, a workstation, a television set, a tablet, a smartphone, and a set-top box. The owner device 310 is configured to timestamp data according to any embodiment of the timestamping method described herein and the verifier device 340 is configured to verify a timestamp according to any embodiment of the verification method described herein. The system 300 also comprises a non-authoritative DNS server 320 and an authoritative DNS server 330. It will however be appreciated that while these servers perform a part of the methods, their functionality is not modified by the present invention. A first computable readable storage medium 360 comprises stored instructions that when executed by the processor 311 of the owner device 310 timestamps data as described. A second computable readable storage medium 370 comprises stored instructions that when executed by the processor 341 of the verifier device 340 verifies a timestamp as described. It will be appreciated that the present solution does not require that the owner and the verifier share information prior to the timestamping operations. In particular, the owner and the verifier do not need to trust one common timestamping authority, one common certificate authority, one common Network Time Protocol server, etc. It will also be appreciated that the present solution can allow massive public verification. First, the owner publishes the proof elements, for instance on a web site. Then, anyone connected to the Internet may verify the timestamp (until it 'expires'). Since the DNS system has a very high availably and since the present solution can use many different DNS servers, many verifiers can proceed at the same time. It will further be appreciated that the requests according to the present solution appear as normal requests to DNS servers. Moreover, the DNS servers are preferably selected randomly; thus, a malicious DNS server, different from the owner's primary server, has no advantage in attacking a timestamp. A timestamp of the present invention typically requires dozens of DNS requests, which is comparable to the number of requests generated by normal web surfing. Even if massively used, the invention does not induce more than negligible overhead for the overall DNS system. Further, the invention can allow reliable timestamping even in the absence of a trusted third party. The only requirement is that all participants have access to the Internet Domain Name System (DNS). As there is no Single Point Of Failure (SPOF) and no need of pre-existing trust, the inventions allows for large scale timestamping use cases, involving very large number of users in a very large number of places over the world. However, due to present limitations of the DNS, the invention is at present limited to a validity of at most 7 days for the timestamp, although this limitation is does not apply to the variant where the timestamp does not include the time t . Each feature disclosed in the description and (where appropriate) the claims and drawings may be provided independently or in any appropriate combination. Features described as being implemented in hardware may also be implemented in software, and vice versa. Reference numerals appearing in the claims are by way of illustration only and shall have no limiting effect on the scope of the claims.","lang":"en","source":"EPO_FULLTEXT","data_format":"ORIGINAL"}},"description_lang":["en"],"has_description":true,"has_docdb":true,"has_inpadoc":true,"has_full_text":true,"biblio_lang":"en"},"jurisdiction":"EP","collections":[],"usersTags":[],"lensId":"198-827-824-802-628","publicationKey":"EP_2615773_B1","displayKey":"EP 2615773 B1","docAssets":{"lensId":"198-827-824-802-628","pdfUrl":"https://www.lens.org/images/patent/EP/2615773/B1/EP_2615773_B1.pdf","images":[{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000001.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000001.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000002.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000002.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000003.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000003.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000004.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000004.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000005.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000005.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000006.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000006.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000007.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000007.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000008.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000008.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000009.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000009.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000010.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000010.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000011.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000011.png"},{"thumb":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/10pc/00000012.png","full":"https://s3-us-west-2.amazonaws.com/lens-resource/patent/EP/B1/2615/2615773/image/page/full/00000012.png"}],"fallover":false},"countryName":"EUROPEAN PATENT OFFICE","inventorModel":{"inventors":[{"name":{"value":"NEUMANN CHRISTOPH","valueNormalised":"Neumann Christoph"},"inventorship":null},{"name":{"value":"HEEN OLIVIER","valueNormalised":"Heen Olivier"},"inventorship":null},{"name":{"value":"ONNO STÉPHANE","valueNormalised":"Onno Stéphane"},"inventorship":null}],"inventorships":[],"unmatchedInventorships":[],"activeUserHasInventorship":false},"simpleFamilyId":207369793,"citesPatentCount":1,"countrySpec":{"countryName":"EUROPEAN PATENT OFFICE","description":"PATENT SPECIFICATION","rule":"","docType":"GRANTED_PATENT"},"pageTitle":"EP 2615773 B1 - Method And Device For Timestamping Data And Method And Device For Verification Of A Timestamp","documentTitle":"Method And Device For Timestamping Data And Method And Device For Verification Of A Timestamp"},"claims":{"source":"xml_claims","claims":[{"lines":["A method of verifying a timestamp for data f, the method comprising in a device (340):
generating (S21) at least one domain name D from a timestamping time t and a value based on the data f by:using a one-way function on the data f and the timestamping time t to obtain an intermediate value;generating at least one IP address from the intermediate value;sending a DNS reverse-resolution request for each of the at least one IP addresses; andreceiving a domain name in response to each DNS reverse-resolution request;
sending (S22) a DNS resolution request for each of the generated domain names D;
receiving (S23) a resolution response for each sent DNS resolution request, each resolution response comprising a Time-to-Live value;
retrieving (S24) a reference Time-to-Live value from each DNS server to which a DNS resolution request was sent;
for each resolution response, comparing (S25) a current time, the timestamping time t, the received Time-to-Live value and the reference Time-to-Live value for the DNS server from which the resolution response was received; and
determining (S26) that the timestamp is correct if at least a predetermined number of comparisons are correct."],"number":1,"annotation":false,"title":false,"claim":true},{"lines":["A device (310) for timestamping data f, the device comprising a processor (311) configured to:
use a one-way function on the data f and a timestamping time t to obtain an intermediate value;
generate at least one IP address from the intermediate value;
send a DNS reverse-resolution request for each of the at least one IP addresses;
receive a domain name in response to each DNS reverse-resolution request
send a DNS resolution request for each of the generated domain names D; and
output a timestamp comprising the data f."],"number":2,"annotation":false,"title":false,"claim":true},{"lines":["A device (340) for verifying a timestamp for data f, the device (340) comprising a processor (341) configured to:
generate at least one domain name D from a timestamping time t and a value based on the data f by:using a one-way function on the data f and the timestamping time t to obtain an intermediate value;generating at least one IP address from the intermediate value;sending a DNS reverse-resolution request for each of the at least one IP addresses; andreceiving a domain name in response to each DNS reverse-resolution request;
send a DNS resolution request for each of the generated domain names D;
receive a resolution response for each sent DNS resolution request, each resolution response comprising a Time-to-Live value;
retrieve a reference Time-to-Live value from each DNS server to which a DNS resolution request was sent;
for each resolution response, compare a current time, the timestamping time t, the received Time-to-Live value and the reference Time-to-Live value for the DNS server from which the resolution response was received; and
determine that the timestamp is correct if at least a predetermined number of comparisons are correct."],"number":3,"annotation":false,"title":false,"claim":true},{"lines":["The device of claim 3, wherein the processor (341) is further configured to select a DNS server by obtaining a numerical value from at least the data f, and using the numerical value to select the DNS server from a list of DNS servers, and to send at least one of the DNS resolution request to the selected DNS server."],"number":4,"annotation":false,"title":false,"claim":true},{"lines":["A method for timestamping data f, the method comprising in a device (310):
using a one-way function on the data f and a timestamping time t to obtain an intermediate value;
generating at least one IP address from the intermediate value;
sending a DNS reverse-resolution request for each of the at least one IP addresses;
receiving a domain name in response to each DNS reverse-resolution request
sending a DNS resolution request for each of the generated domain names D; and
outputting a timestamp comprising the data f."],"number":5,"annotation":false,"title":false,"claim":true},{"lines":["A computable readable storage medium (360) comprising stored instructions that when executed by a processor performs the method of claim 5."],"number":6,"annotation":false,"title":false,"claim":true},{"lines":["A computable readable storage medium (370) comprising stored instructions that when executed by a processor performs the method of claim 1."],"number":7,"annotation":false,"title":false,"claim":true}]}},"filters":{"npl":[],"notNpl":[],"applicant":[],"notApplicant":[],"inventor":[],"notInventor":[],"owner":[],"notOwner":[],"tags":[],"dates":[],"types":[],"notTypes":[],"j":[],"notJ":[],"fj":[],"notFj":[],"classIpcr":[],"notClassIpcr":[],"classNat":[],"notClassNat":[],"classCpc":[],"notClassCpc":[],"so":[],"notSo":[],"sat":[]},"sequenceFilters":{"s":"SEQIDNO","d":"ASCENDING","p":0,"n":10,"sp":[],"si":[],"len":[],"t":[],"loc":[]}}