1. A user wants to time stamp a document in order to prove its existence.
  2. The user's computer generates a Hash ( cryptographic summary ) of the document.
  3. The Hash is attached in the time stamp request which is sent to the TimeStamp Authority (TSA).
  4. The TSA generates a time stamp for that hash code. The date and time included in the time stamp is originated from a trusted source. The TSA signs electronically the time stamp.
  5. The user retrieves the time stamp.