A system for authenticating records without reliance upon a trusted third party.
A first server provides a sequential series of certifications associated with discreet,
non-overlapping time Intervals. The server can provide selected information to
a second server which, in turn, incorporates the request and associated information
in a cross-certification. The cross-certification is then provided to more other
servers. Accordingly, a "chain-mail" of certifications among a variety of servers
is provided. The system thus provides effective protection against a breach of
security in any one server, resulting in increased reliability in the authentication
of records.