Chain-of-Custody for Archived Data

ABSTRACT

A method that builds a chain-of-custody for archived data is disclosed to ensure the integrity and reliability of the archived data. In one implementation, by using a certified Time Stamp Authority (TSA), an indelible record of each time the archived data is touched (e.g. created, stored, retrieved, accessed, tested, moved, or transformed) is generated to build verifiable links between events to ensure the custody of the data can be audited and verified that it has remained intact throughout its lifetime. The chain-of-custody, in combination with the storage architecture that ensures archive data has not changed through various software and hardware means (e.g., multiple hash signatures to ensure integrity, timestamp authorities to pinpoint each time the archived data was touched, location information to pinpoint physical location, and coordinated chain of custody on multiple replicas of the digital artifact) validates that the archived data has not changed since it was archived.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of the filing date of U.S. provisional application No. 61/230,471, filed on 31 Jul. 2009, which is included herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This disclosure relates generally to the field of data storage and archiving and, in some embodiments, more specifically to establishing a reliable record of the chain of events and tracking of location and transfer (physical and/or virtual) of data objects for auditing custody of the same during the activities used to create, store, test, and/or retrieve archived data.

2. Description of the Related Art

Determining whether electronic data is “good” (original) or “bad” (manipulated) is demanding. Without mechanisms in place, the electronic data itself and the times associated with any changes to the data can be modified and manipulated, often without detection, creating challenges to establishing the reliability of the electronic data.

Currently there are two classes of electronic data certifications: certified Time Stamp Authorities, and non-repudiation services.

A Time Stamp Authority (TSA) issues a timestamp to prove the existence of certain data before a certain point in time without the possibility that the owner can backdate the timestamps. TSAs are used to timestamp on-line bills and orders (to prove when a transaction has occurred and that their contents have not been altered since then), creative works (the person with the earliest timestamp provides strong evidence in claiming ownership of a text, graphic, audio, and video work), or digital signatures (an accurate time from a trustworthy third party shows when a digital document was signed assigning the property of non-repudiation to the document). Non-repudiation services minimally build on the concept of a TSA to provide document time stamping. Their focus is generally on the legal concerns around electronic document non-repudiation. Exemplary TSA providers include ProofSpace, Inc. of Grand Rapids, Mich., and Formatta, Inc. of Fairfax, Va.

Due to increasing governance regulations, such as Sarbanes-Oxley, and the amplified value of Intellectual Property, such as patents or copyrighted material, it is desirable that a homogeneous, comprehensive set of records be used to ensure the integrity and reliability of archived data. More specifically, it can be desirable to have an indelible record of each time the archived data is touched (e.g. created, stored, retrieved, accessed, tested, moved, or transformed) to generate verifiable links between events in order to ensure the custody of the data can be audited and verified that it has remained intact throughout its lifetime, and to be able to detect any modification to the archived data, so that a proper copy can be retrieved to bring the archive copy back to its original state.

TSAs and non-repudiation services only provide a fragment of the functionality required to meet these types of needs for archived data.

SUMMARY

The presently disclosed technology overcomes the above-described limitations with timestamp authorities and non-repudiation services by defining a series of methods that create a reliable chain-of-custody for archived data.

In one embodiment of the invention, a machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of creating a chain-of-custody link for archived data. The method for creating the chain-of-custody link comprises creating a structure containing the link type, hash of the archived data for the link, and a hash of the archive metadata for the link. A hash of the structure is created and the hash is sent to a Time Stamp Authority (TSA). A certificate is received from the TSA and the Time Stamp certificate is appended to the archived data.

In an alternative embodiment of the invention, a machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of validating an Archive Chain for archived data. The method of validating an Archive Chain comprises examining a last link of the chain, comparing a previous hash to the entry in a previous link, comparing a Time Stamp of the previous link to ensure it is in descending order, and appending the link types, the metadata, and the Time Stamp to a report.

In still another embodiment of the invention, a method retrieving an archive, the method of retrieving an archive comprises the steps of initiating a retrieval request, generating a hash of an initial or replicated copy of archived data, appending the hash from a previous link in a chain, sending the hash to a Time Stamp Authority (TSA), receiving a certificate from the TSA, creating a link of type “retrieval” with a TSA Time Stamp token, appending the Time Stamp token and the “retrieval” link to the chain, appending a metadata describing a requester to the chain, appending request parameters to the chain, and appending the hash of actual archived data to the chain.

BRIEF DESCRIPTIONS OF THE DRAWINGS

The aspects, features, and advantages of the present invention will become more fully apparent from the following detailed description, the appended claims, and the accompanying drawings in which like reference numerals identify similar or identical elements.

FIG. 1 is a logical flow diagram illustrating the chain-of-custody link creation flow.

FIG. 2 is a logical flow diagram illustrating the construction of the Archive Chain.

FIG. 3 is a logical flow diagram illustrating the construction of the automatic archive verification part of the Archive Chain.

FIG. 4 is a logical flow diagram illustrating the construction of the manual archive verification part of the Archive Chain.

FIG. 5 is a logical flow diagram illustrating the construction of the archive retrieval part of the Archive Chain.

FIG. 6 is a logical flow diagram illustrating validation of the Archive Chain.

FIG. 7 is a logical flow diagram illustrating the chain-of-custody in hardware.

FIG. 8 is a logical flow diagram illustrating the construction of a link for an Archival Chain.

FIG. 9 illustrates an exemplary computing system that can be used to implement the present invention.

FIG. 10 is an exemplary block diagram of another example of a computing system that can be used to implement the present invention.

FIG. 11 is an exemplary block diagram illustrating details of an exemplary storage subsystem in FIG. 10.

DETAILED DESCRIPTIONS

The present invention can be embodied in the form of methods and apparatuses for practicing those methods. The present invention can also be embodied in the form of program code embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. The present invention can also be embodied in the form of program code, for example, whether stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium or carrier, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program code segments combine with the processor to provide a unique device that operates analogously to specific logic circuits.

A chain, also referred to herein as a custody chain, is a log of all the physical events in the life of an archived data set. The chain is a metadata construct about the archived data that is stored in the same physical container, folder, or volume (e.g., disk drive) with the corresponding archived data. The chain comprises of log entries (links) that contain information about each physical event as well as information tying each log entry to the previous entry and information that can be used to validate the integrity of the chain log entry at or to that point in time and/or place.

One core process in the presently disclosed embodiment can build links for a chain from various certificates authenticating the integrity of data, such as from a Time Stamp Authority (TSA), such as that provided by one of the above-mentioned companies. In this implementation, a Strong Link is constructed using an externally certified TSA, and is a way to construct a strong chain. Using Strong Links costs time and money because it involves going outside of the server, buying a certified time stamp, and waiting for the return. Time and money can be saved by producing links locally (e.g., creating a time-stamp without using an external TSA), referred to herein as a Weak Link, to create a weak chain, but such a chain may be unreliable as either a time certificate or a content certificate. However, a Weak Link can serve as an internal indicator of integrity of the chain, and, hence the chain-of-custody. A hybrid chain uses Weak and Strong links to provide some of the certainty of a strong chain, and the lower cost of a weak chain. A hybrid chain may be constructed with a Strong Link at the head of the chain, and occasional Strong Links down the chain at important events, interspersed with Weak Links at intermediate, less significant, events. A chain-of-custody may comprise strong, weak, or hybrid chains.

An Archive Chain comprises the archived data, additional information about the archived data (i.e., content metadata), and a chain, such as a hybrid chain constructed from Strong Links and Weak Links generated when the data archive is created, replicated, automatically verified, manually verified, and/or retrieved. The Archive Chain may, optionally, contain policy metadata and policy engines that enforce operations (like digital rights management or DRM, and decoding, formatting, etc.), and information about such things as the integrity of the original archived data or how the archived data can be accessed, used, stored, destroyed, etc.

Full or partial validation of the archived data may be requested. A data integrity validation merely involves comparing a current hash of the archive to the original hash. Access validations can report on the integrity of the archive from the beginning to any particular moment in time, and identify significant events, such as retrieval of the archived data by a given party. Each of these validation results may include a time stamp that is as guaranteed as the TSA is.

Chain-of-Custody Link Creation

FIG. 1 is a logical flow diagram illustrating a chain-of-custody link creation flow. In step 102 a structure is created containing the link type, a hash of the data for the link, and a hash of any metadata for this type of link. Following step 102, step 104 creates a new hash of the entire structure created in step 102. Step 104 is followed by step 106 where the hash is sent in a request to a Time Stamp Authority (TSA). The TSA returns a time stamp response that contains a status, and a Time Stamp Token containing signed data, which is the certificate. If the TSA is certified, then the resultant link is considered a Strong Link (step 110), otherwise the link is considered a Weak Link (step 112). If the time stamp response status is anything other than “granted,” then the link construction fails (step 116). If the status is “granted,” then the Time Stamp Token is examined (step 200) to ensure that the data is the same as the original (step 202), that the time reported is near the locally obtained time (step 206), and that the TSA's certificate is valid (step 210). If any of these conditions is not true, then the construction of the link fails (steps 204, 208 or 212). If the Time Stamp Token is deemed valid, it is retained in an audit log along with the requested information (step 118).

Archive Chain Construction

FIG. 2 is a logical flow diagram illustrating the construction of the Archive Chain. The links created by the flow diagramed in FIG. 1 are used for constructing the Archive Chain. In step 302, a hash is generated of the original data destined for archive. Step 302 is followed by step 304 where a certificate is obtained from the TSA to construct a link of type “initial” as outlined in FIG. 1. The resulting token is carried along with the archive in its transaction log (step 306). Next in step 308 the archived data is replicated. Following step 308, step 310 generates a hash of the replicated archived data. The hash in each replica is compared with the original hash (step 312). If all hash values are the same, a link of type “replicated” is obtained from the TSA (step 314) and the token is stored in the associated transaction log (step 316).

Automatic Archive Validation Chain Construction

FIG. 3 is a logical flow diagram illustrating the construction of the automatic archive verification part of the Archive Chain. An “automatic archive validation request” is a validation request initiated as part of the normal system flow (e.g., drive test, retrieval, migration to new technology, drive repair on failure). The automatic archive validation request becomes a part of the Archive Chain.

In step 402, an automatic verification request on the archived data is initiated by, for example, a user or an event such as a monthly archived data integrity test. Following step 402, step 404 generates a hash of the initial or replicated archived data. Following step 404, step 406 appends the hash from the previous link and next, in step 408, where a certificate is obtained from the TSA to construct a link of type “auto verify”. Finally, in step 410, this link is appended to the chain.

Manual Archive Validation Chain Construction

FIG. 4 is a logical flow diagram illustrating the construction of the manual archive verification part of the Archive Chain. A “manual archive validation request” is a validation request initiated external to the normal system flow—for instance, when a user requests validation of the archive. It can occur at any time, and is not part of the system flow for internal testing, retrieval, migration, etc. Note that a manual archive validation request, since it touches the archived data, causes the generation of a chain-of-custody event (a validation request) that becomes part of the Archive Chain.

In step 502, a manual verification request is initiated on the archived data. Following step 502, step 504 generates a hash of the initial or replicated archived data. Following step 504, step 506 appends the hash from the previous link and next, in step 508, where a certificate is obtained from the TSA to construct a link of type “requested verify.” Finally, in step 510, this link is appended to the chain.

Archive Retrieval Chain Construction

FIG. 5 is a logical flow diagram illustrating the construction of the archive retrieval part of the Archive Chain. In step 602, a request is initiated to retrieve all or part of the archived data. Following step 602, step 604 generates a hash of the initial or replicated archived data. Following step 604, step 606 appends the hash from the previous link and next, in step 608, where a certificate is obtained from the TSA to construct a link of type “retrieval.” Finally, in step 610, this link is appended to the chain along with metadata describing the requester, the request parameters, and a hash of the actual archived data retrieved.

Chain Validation

FIG. 6 is a logical flow diagram illustrating validation of the Archive Chain. The chain is examined backward from the last link to the first. Thus, in step 702 the last link of chain is examined by determining whether the value of the previous hash is equal to the entry in the previous link (step 704). If this comparison fails, then the archived data is described as compromised. If the comparison in step 704 succeeds, then the time stamps are compared to ensure they are in descending order (step 708). If this is not true, then the archive is considered compromised. If this test succeeds, then the link types, metadata, and time stamp are appended to the validation report (step 712). If the link is of type “retrieval,” then the metadata is added to the report (step 714). If the link is of type “requested verify,” then the metadata describing the requestor and the result is appended to the report (step 716). If the link is of type “auto verify,” then that fact is appended to the report (step 718). If the link is of type “replicated,” then the link for type “initial” is also examined (step 720). If the hash value of the “replicated” and “initial” links equals each other and the value of the newly calculated hash, then the archive is described as valid (step 726), otherwise it is described as compromised (step 724).

Hardware Chain-of-Custody Construction

FIG. 7 is a logical flow diagram illustrating the construction of the Archive Chain in hardware when an object is created (FIG. 7 a), modified (FIG. 7 b), or retrieved (FIG. 7 c). In addition to the standard control and data channels that exist in a hardware storage system, an audit channel is created and available. Stored objects can be tagged as “chain-of-custody”-enabled. In step 802 a storage object is created. Following step 802 is step 804 where the object is tested to see if it is “chain-of-custody”-enabled. If true, then step 808 raises an event of type “initial” such that the audit channel will send a message to the link building modules as described in FIG. 1. Similarly, in step 850 a storage object is modified. If “chain-of-custody” is enabled, then step 856 raises an event of type “modified” such that the audit channel will send a message to the link building modules as described above in connection with FIG. 1. Similarly, in step 870 a storage object is retrieved. If “chain-of-custody” is enabled, then step 876 raises an event of type “retrieved” such that the audit channel will send a message to the link building modules as described above in connection with FIG. 1.

FIG. 8 is a logical flow diagram illustrating a hardware event initiated an Archive Chain link creation. In step 902, an event in hardware occurs that is to be part of the chain-of-custody. In step 904 a data structure is created that stores the current time from a time-server (e.g., a system clock) and the physical location of the device processing the event, which is stored in the hardware. In step 906, all the unique hardware identifiers that are part of the hardware event are captured and stored in the data structure. In step 908, the system information comprising the event (e.g., reads, writes, and data) in the hardware is captured and stored in the structure. Step 910 is a wait step for the event to finish. If the event is complete, then (step 912) a new integrity hash is calculated from all the information captured in steps 904-908. In step 914 the new integrity hash (and optionally the information in the structure) is used to create a signature hash using a signature authority, e.g., a TSA. In step 916 the signature, integrity hash, and the structure containing the event information are used to create the link. Finally, in step 920, the event link is appended to the chain.

FIG. 9 illustrates an example computing system that can be used to implement the described technology. A general-purpose computer system 1000 is capable of executing a computer program product to execute a computer process. Data and program files may be input to the computer system 900, which reads the files and executes the programs therein. Some of the elements of a general-purpose computer system 1000 are shown in FIG. 9 wherein a processor 1002 is shown having an input/output (I/O) section 1004, a Central Processing Unit (CPU) 1006, and a memory section 1008. There may be one or more processors 1002, such that the processor 1002 of the computer system 1000 comprises a single central-processing unit 1006, or a plurality of processing units, commonly referred to as a parallel processing environment. The computer system 1000 may be a conventional computer, a distributed computer, or any other type of computer. The described technology is optionally implemented in software devices loaded in memory 1008, stored on a configured DVD/CD-ROM 1010 or storage unit 1012, and/or communicated via a wired or wireless network link 1014 on a carrier signal, thereby transforming the computer system 1000 in FIG. 9 to a special purpose machine for implementing the described operations.

The I/O section 1004 is connected to one or more user-interface devices (e.g., a keyboard 1016 and a display unit 1018), a disk storage unit 1012, and a disk drive unit 1020. Generally, in contemporary systems, the disk drive unit 1020 is a DVD/CD-ROM drive unit capable of reading the DVD/CD-ROM medium 1010, which typically contains programs and data 1022. Computer program products containing mechanisms to effectuate the systems and methods in accordance with the described technology may reside in the memory section 1004, on a disk storage unit 1012, or on the DVD/CD-ROM medium 1010 of such a system 1000. Alternatively, a disk drive unit 1020 may be replaced or supplemented by a floppy drive unit, a tape drive unit, or other storage medium drive unit. The network adapter 1024 is capable of connecting the computer system to a network via the network link 1014, through which the computer system can receive instructions and data embodied in a carrier wave. Examples of such systems include Intel and PowerPC systems offered by Apple Computer, Inc., personal computers offered by Dell Corporation and by other manufacturers of Intel-compatible personal computers, AMD-based computing systems and other systems running a Windows-based, UNIX-based, or other operating system. It should be understood that computing systems may also embody devices such as Personal Digital Assistants (PDAs), mobile phones, gaming consoles, set top boxes, Storage Area Network (SAN) systems, Network Area Storage systems, etc.

When used in a LAN-networking environment, the computer system 1000 is connected (by wired connection or wirelessly) to a local network through the network interface or adapter 1024, which is one type of communications device. When used in a WAN-networking environment, the computer system 1000 typically includes a modem, a network adapter, or any other type of communications device for establishing communications over the wide area network. In a networked environment, program modules depicted relative to the computer system 1000 or portions thereof, may be stored in a remote memory storage device. It is appreciated that the network connections shown are exemplary and other means of and communications devices for establishing a communications link between the computers may be used.

In an example implementation, a chain-of-custody link creation module, an Archive Chain construction module, an automatic archive validation chain construction module, a manual archive validation chain construction module, an archive retrieval chain construction module, a chain validation module, as described above in connection with FIGS. 1-8, respectively, and/or a hardware chain-of-custody module, may be incorporated as a computer program product (e.g., part of the operating system, application programs, or other program modules, including firmware), or as a hardware module (e.g., a disk drive controller, processor, etc.). A database or data structure containing a data archive as discussed above may be stored as data 1022 in the disk storage unit 1012 or other storage systems, such as the memory 1008 or the DVD/CD-ROM medium 1010.

In addition to the links described above, a globally unique identifier (GUID) can be generated for all processors, disk drives, hardware or software modules, and any other physical, code, data structure, or virtual component in the system. In one implementation, a GUID can be defined as a 128-bit integer (16 bytes) serial number that can be used across all computers and networks that has a very low probability of being duplicated, but the GUID can be extended to a more general universal ID market. As will be described in more detail below in relation to FIGS. 10 and 11, when the archived data passes through each system component, software or hardware associated with the component appends the GUID information about the operation being performed and a digital signature authenticating the operation and operators and components involved to the Archive Chain. This not only provides a record of precisely where the archived data has been for audit purposes, but also provides the ability to ensure the integrity of the archived data stored on different system components to protect the data from exposure to a systemic manufacturer's failure mechanism, e.g., disk drive failures. For example, an archive retrieval chain link could include the following information:

-   -   1. The content of the Archive Chain     -   2. The GUID for the volume on which the Archive Chain resides.     -   3. GUID for the RAID (Redundant Array of Independent Disks) set         on which the volume resides.     -   4. GUID for drives in the RAID set.     -   5. GUID for the SATA controller that the Archive Chain data         passes through.     -   6. Version of the software running on the system.

FIG. 10 is block diagram of a representative system 1100 that can implement the Archive Chain as described above. A representative processor and memory system 1102, as part of the archive chain information gathering, obtains a unique GUID stored in, for example, a read-only memory 1108 associated with the processor 1102. The creation of the Archive Chain also includes optionally obtaining physical coordinate information for processor 1102. Processor 1102 communicates on a regular basis during normal operation with a representative Digital Storage Subsystem 1104, such as a Disk Controller Subsystem, and a Communications Subsystem 1106. Subsystems 1104 and 1106 can also optionally communicate with each other independently of the processor 1102. Each subsystem obtains a unique GUID for itself from an associated read-only memory 1110, 1112 that also contain optional physical coordinates of each subsystem. The GUID and physical coordinate information is used by the processes described in FIGS. 1 and 9 to create an Archive Chain link for an event.

FIG. 11 is a block diagram of a representative Disk Controller Subsystem 1104 of FIG. 10, here comprising a Digital Storage Controller Subsystem 1202 and associated storage devices 1204-1208. Subsystem 1202 controls a group of one or more individual Digital Storage Devices 1204, 1206, and 1208, each of which, when requested, reads unique GUIDs from associated read-only memories 1210, 1212, and 1214, respectively, and communicates that information to subsystem 1202 as part of an Archive Chain creation event. In this embodiment, storage devices 1204, 1206, and 1208 are physically near or in subsystem 1202, so that physical coordinates for each of the Digital Storage Devices is not required. In another embodiment, storage devices 1204, 1206, and 1208 are physically remote from subsystem 1202, and physical coordinates thereof could be part of the information communicated along with the unique GUID.

Extension of the Technology to Other Tiers of Storage

The techniques described above can be applied to higher tiers of storage (e.g. so-called “Tier1” or “Tier2” storage) in the same way that they are applied to archived storage. Stored objects (e.g., files, blocks, physical sectors, volumes, RAID groups, etc.) can be tagged as chain-enabled. Storage software checks for this tag whenever a data storage, movement, transform, or retrieval event occurs. If the object is tagged, a message is sent to the link and chain modules. A storage system could obtain a higher level of integrity by building the custody chaining functions into hardware versus using the software layer. Processing units can be built to initiate and guarantee custody chaining at the hardware level. Memory objects can be tagged as chain-enabled and the process described above can initiate messages to construct links and chains. System components, like disk drives, can have chain-of-custody firmware and/or hardware added to them or can be built with the chain-of-custody functionality in hardware.

Virtualization Chain-of-Custody

Virtual data storage and manipulation systems can provide information for building custody chains as data is stored, moved, modified, and retrieved in virtual storage systems. Virtual storage systems are a class of storage systems that map the referencing system's (like a server or workstation) address (e.g., like mapping a network drive and folder in windows to a drive letter) to a physical location. That location can easily have little or no physical association with the other files in the same directory. Virtualized storage systems move files around to different storage tiers (physical kinds of storage that could be segregated based on performance and reliability, for example) transparently to the user of the file.

In one implementation, the front-end system stores locally the audit log of links describing what transpired in the virtual storage system. During setup and configuration of the virtual system defining how physical storage objects will be handled by the virtual system, it is specified that a storage object can be tagged as chain-enabled, and that access events will be reported back to the front-end system. These reports contain system identification, metadata, value hash, and event type information. The front-end system builds links containing this information and appends them to the chain.

Reference herein to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments necessarily mutually exclusive of other embodiments. The same applies to the terms “implementation” and “example.”

Although the elements in the following method claims, if any, are recited in a particular sequence with corresponding labeling, unless the claim recitations otherwise imply a particular sequence for implementing some or all of those elements, those elements are not necessarily intended to be limited to being implemented in that particular sequence.

Having described the preferred embodiment of this invention, it will now be apparent to one of skill in the art that other embodiments incorporating its concept may be used. Therefore, this invention should not be limited to the disclosed embodiment, but rather should be limited only by the spirit and scope of the appended claims. 

1. A machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of creating a chain-of-custody link for archived data, the method comprising: creating a structure containing the link type, hash of the archived data for the link, and a hash of the archive metadata for the link; creating a hash of the structure; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; and appending the Time Stamp certificate to the archived data.
 2. The method of creating a chain-of-custody link in claim 1 wherein the link is considered a Strong Link if the TSA is certified, otherwise the link is considered a Weak Link.
 3. The method of creating a chain-of-custody link in claim 1 wherein the link construction fails if the status from the TSA is not “Granted.”
 4. The method of creating a chain-of-custody link in claim 1 wherein the link construction fails if the data is not the same as the original.
 5. The method of creating a chain-of-custody link in claim 1 wherein the link construction fails if the time reported from the TSA is not near the locally reported time.
 6. The method of creating a chain-of-custody link in claim 1 wherein the link construction fails if the TSA certificate is not valid.
 7. The method of creating a chain-of-custody link in claim 1 whereby the link is constructed in hardware, the method comprising; creating a storage object; raising an event of type “initial” if “chain-of-custody” is enabled; and the event manager sending a message to the link building modules as described in claim
 1. 8. The method of creating a chain-of-custody link in claim 1 whereby the link is constructed in hardware, the method comprising; modifying a storage object; raising an event of type “modified” if “chain-of-custody” is enabled; and the event manager sending a message to the link building modules as described in claim
 1. 9. The method of creating a chain-of-custody link in claim 1 whereby the link is constructed in hardware, the method comprising; retrieving a storage object; raising an event of type “retrieved” if “chain-of-custody” is enabled; and the event manager sending a message to the link building modules as described in claim
 1. 10. A machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of creating a Archive Chain for archived data, the method comprising: generating a hash of the original data to be archived; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “initial” with the TSA Time Stamp token; appending the Time Stamp token and the “initial” link to the archived data. replicating the archived data; generating a hash of the replicated data; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “replicated” with the TSA Time Stamp token; and appending the Time Stamp token and the “initial” link to the replicated archived data.
 11. The method of constructing an Archive Chain in claim 10 whereby the link constructed is for an automatic verification of the archive, the method comprising: initiating an automatic verification request; generating a hash of the initial or replicated copy of the archived data; appending the hash from the previous link in the chain; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “auto verify” with the TSA Time Stamp token; and appending the Time Stamp token and the “auto verify” link to the chain.
 12. The method of constructing an Archive Chain in claim 10 whereby the link constructed is for a manual verification of the archive, the method comprising: initiating a manual verification request; generating a hash of the initial or replicated copy of the archived data; appending the hash from the previous link in the chain; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “requested verify” with the TSA Time Stamp token; appending the Time Stamp token and the “requested verify” link to the chain; and appending the metadata describing the requester to the chain.
 13. The method of constructing an Archive Chain in claim 10 whereby the link constructed is for a retrieval of the archive, the method comprising: initiating a retrieval request; generating a hash of the initial or replicated copy of the archived data; appending the hash from the previous link in the chain; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “retrieval” with the TSA Time Stamp token; appending the Time Stamp token and the “retrieval” link to the chain; appending the metadata describing the requester to the chain; appending the request parameters to the chain; and appending the hash of the actual archived data to the chain.
 14. A machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of validating a Archive Chain for archived data and generating a report, the method comprising: examining a last link of the chain; comparing a previous hash to an entry in a previous link; comparing a Time Stamp in the previous link to ensure it is in descending order; and appending link types, metadata, and the Time Stamp to a report.
 15. The method of validating an Archive Chain in claim 14 wherein if the link type is “replicated” then the link type “initial” is also examined, and if the hash of the “initial” and “replicated” do not match the new hash, then the archived is considered compromised.
 16. A machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of performing automatic verification of an archive, the method comprising: initiating an automatic verification request; generating a hash of the initial or replicated copy of archived data; appending the hash from a previous link in a chain; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “auto verify” with a TSA Time Stamp token; and appending the Time Stamp token and the “auto verify” link to the chain.
 17. A machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of performing manual verification of an archive, the method comprising: initiating a manual verification request; generating a hash of an initial or replicated copy of archived data; appending the hash from a previous link in a chain; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “requested verify” with a TSA Time Stamp token; appending the Time Stamp token and the “requested verify” link to the chain; and appending a metadata describing the requester to the chain.
 18. A machine-readable medium, having encoded thereon program code, wherein, when the program code is executed by a machine, the machine implements the steps of retrieving an archive, the method comprising: initiating a retrieval request; generating a hash of an initial or replicated copy of archived data; appending the hash from a previous link in a chain; sending the hash to a Time Stamp Authority (TSA); receiving a certificate from the TSA; creating a link of type “retrieval” with a TSA Time Stamp token; appending the Time Stamp token and the “retrieval” link to the chain; appending a metadata describing a requester to the chain; appending request parameters to the chain; and appending the hash of actual archived data to the chain. 