SYSTEM AND MEDIA RECORDING DEVICE WITH SECURED ENCRYPTION
20230059826 · 2023-02-23
Inventors
Cpc classification
H04L63/0435
ELECTRICITY
H04L9/0825
ELECTRICITY
G06F21/64
PHYSICS
H04L63/0442
ELECTRICITY
G06F21/62
PHYSICS
H04L9/0631
ELECTRICITY
International classification
G06F21/62
PHYSICS
H04L9/06
ELECTRICITY
H04L9/08
ELECTRICITY
Abstract
In one aspect the present invention disclose system for recording and handling media for use as evidence in legal proceeding. In one other aspect the present invention discloses a device for recording media for use as evidence in legal proceedings. In another aspect the present disclosure provides a server also referred to herein as an evidence vault or vault for handling media from a media recording device for use as evidence in legal proceedings. The all three aspects the invention benefit from a double layer symmetrical and asymmetrical encryption method to protect the media recordings of the device, the server and the system as a whole as well as the transmission of media between different components.
Claims
1-20. (canceled)
21. A body-worn device for maintaining a chain of custody for media content, comprising: a recording unit producing unencrypted media content; a symmetric cryptography engine producing encrypted media content by encrypting the unencrypted media content using a symmetric encryption key; an asymmetric cryptography engine performing a cryptographic operation to secure the symmetric encryption key using a first asymmetric encryption key; and an interface module for: sharing, with a media server, an encrypted version of the symmetric encryption key and a first public encryption key of a first public-private key pair; and transmitting the encrypted media content to the media server; the body-worn device preventing external access to the unencrypted media and to the symmetric encryption key.
22. The device of claim 21, wherein the asymmetric cryptography engine securing the symmetric encryption key comprises performing asymmetric encryption of the symmetric encryption key using a public key associated with the server.
23. The device of claim 21, wherein the asymmetric cryptography engine securing the symmetric encryption key comprises obtaining the symmetric encryption key by performing asymmetric decryption of an encrypted version of the symmetric encryption key obtained from the media server using a private key associated with the device.
24. The device of claim 21, wherein the symmetric encryption key is generated by the symmetric cryptography engine, and wherein the interface module sharing the encrypted version of the symmetric encryption key comprises the interface module transmitting the encrypted version of the symmetric encryption key to the media server.
25. The device of claim 24, wherein the interface module sharing the first public encryption key comprises the interface module obtaining a public encryption key associated with the media server from the media server, and wherein the asymmetric cryptography engine performing a cryptographic operation to secure the symmetric encryption key comprises the asymmetric cryptography engine encrypting the symmetric encryption key using the public encryption key associated with the media server.
26. The device of claim 24, wherein the body-worn device preventing external access to the symmetric encryption key comprises the asymmetric cryptography engine encrypting the symmetric encryption key prior to storage within a memory of the device.
27. The device of claim 24, wherein the body-worn device preventing external access to the symmetric encryption key comprises the asymmetric cryptography engine encrypting the symmetric encryption key prior to the interface module transmitting the encrypted media content to the media server.
28. The device of claim 21, wherein the symmetric encryption key is generated by the media server, and wherein the interface module sharing the encrypted version of the symmetric encryption key comprises the interface module obtaining the encrypted version of the symmetric encryption key from the media server.
29. The device of claim 28, wherein the interface module sharing the first public encryption key comprises the interface module transmitting a public encryption key associated with the device to the media server, and wherein the asymmetric cryptography engine performing a cryptographic operation to secure the symmetric encryption key comprises the asymmetric cryptography engine decrypting an encrypted version of the symmetric encryption key using a private encryption key associated with the device.
30. The device of claim 28, wherein the body-worn device preventing external access to the symmetric encryption key comprises the asymmetric cryptography engine decrypting an encrypted version of the symmetric encryption key to obtain the symmetric encryption key without storing the symmetric encryption key within a memory of the device.
31. The device of claim 30, wherein the encrypted version of the symmetric encryption key is stored within a memory of the device.
32. The device of claim 21, wherein the symmetric cryptography engine producing encrypted media content comprises using a plurality of symmetric encryption keys to produce the encrypted media content, the interface module sharing, with the media server, a schedule for employing the plurality of symmetric encryption keys.
33. The device of claim 32, wherein the symmetric cryptography engine using the plurality of symmetric encryption keys to produce the encrypted media content comprises selecting a first one of the plurality of symmetric encryption keys to encrypt the unencrypted media content for a first period of time and selecting a second one of the plurality of symmetric encryption keys to encrypt the unencrypted media content for a second period of time.
34. The device of claim 21, wherein the body-worn device preventing external access to the unencrypted media content comprises the symmetric cryptography engine encrypting the unencrypted media content prior to storage within a memory of the device.
35. The device of claim 21, wherein the body-worn device preventing external access to the unencrypted media content comprises the recording unit storing, in a memory of the device, the unencrypted media content, and the symmetric cryptography engine encrypting the unencrypted media content to produce the encrypted media content in response to obtaining a request for the encrypted media content from the media server and prior to transmitting the encrypted media content to the media server.
36. The device of claim 21, comprising a signature module generating a signature value for a portion of the media content, the asymmetric cryptography engine: producing a digital signature for the portion of the media content by signing the signature value with a private encryption key associated with the device, and storing the digital signature within a memory of the device.
37. The device of claim 36, the interface module transmitting the digital signature to the media server.
38. The device of claim 1, wherein the interface module comprises a wireless transceiver.
39. The device of claim 1, wherein the device is a body-worn camera.
40. A method for maintaining a chain of custody for media content, comprising: recording, at a body-worn device, unencrypted media content; producing, at a symmetric cryptography engine of the body-worn device, encrypted media content by encrypting the unencrypted media content using a symmetric encryption key; performing, at an asymmetric cryptography engine of the body-worn device, a cryptographic operation to secure the symmetric encryption key using a first asymmetric encryption key; sharing, via an interface module of the body worn device, an encrypted version of the symmetric encryption key and a first public encryption key of a first public-private key pair with a media server; transmitting, via the interface module, the encrypted media content to the media server; and preventing external access to the unencrypted media and to the symmetric encryption key.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] The invention will be better understood by way of the following detailed description of embodiments of the invention with reference to the appended drawings, in which:
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
DETAILED DESCRIPTION
[0039] The Reference throughout this specification to “one embodiment,” “an embodiment,” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
[0040] Moreover, the described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the scope of the invention. Thus, it is intended that the present invention cover the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. Reference will now be made in detail to the preferred embodiments of the invention.
[0041] The methods and details of symmetrical and asymmetrical encryption and the double layer security measure used herein has been disclosed by the applicant's co-pending U.S. patent application Ser. No. 15/776,448 and the PCT application number PCT/CA2016/051350 which are incorporated herein by reference.
[0042] Throughout this application terms “recordings”, “media recordings” and “media” have been used interchangeably. Also, terms “server”, “evidence vault”, “vault” and server have been used interchangeably but it will be appreciated by those skilled in the art that while a vault can be a server with all the features but as referred to in some embodiments it may have a more simple structure and not have all the features of a server as defined herein.
[0043] This patent application provides complementary improvements that may be applied separately or in combination.
[0044] In one aspect the present invention disclose system for recording and handling media for use as evidence in legal proceeding. The system disclosed comprises of a device also referred to herein as a “camera” or a “media recording device” and a server also referred to herein as “a vault” or “evidence vault”. The media recording device comprises of a recording unit producing original, unencrypted media, a symmetric encryption module or unit configured to use a symmetric encryption key to encrypt said unencrypted media to produce encrypted media, a memory for storing at least one of said unencrypted media and the encrypted media, an interface module configured to transmit said encrypted media and to prevent external access to said unencrypted media and said symmetric encryption key.
[0045] The server comprises a decryption module having secure access to the symmetric encryption key configured to produce a decrypted copy of the encrypted media transmitted from the interface module, an authentication module configured to authenticate a user to access encrypted media, and an access control module configured to provide to said user either said decrypted copy or a re-encrypted version of said decrypted copy.
[0046] The server is configured to be able to encrypt and decrypt both symmetrical and asymmetrical encryption. The server connects directly to a device and receives encrypted media recordings of the device that can be only decrypted by the server reducing the risk of the recording being tampered. Furthermore, the system makes it easier to comply with the chain of custody requirement for the legal proceedings by reducing the number of people involved in the retrieval of the recordings. The system provides a solution for transferring both the symmetrically encrypted media recordings of a device and a asymmetrically encrypted key to the encrypted media recordings over a secure or an unsecure wireless, wired or cloud connection using a double layer security measure. It provides a direct mechanism for collecting the media recordings of the device without providing intermediaries access to the content of the recordings, hence reducing risk of tempering of the media recordings which is desirable especially for the purposes of legal proceedings.
[0047] In the embodiments and the drawings disclosed in this application, the symmetric encryption module has been referred to by its comprising elements. In the different embodiments the symmetric encryption module has been described as a symmetric encryption engine with or without a symmetric key unit which itself can be a symmetric key generator or a symmetric key store (
[0048] It will be appreciated by those skilled in the art that the device as claimed can be any media and video recording device but in preferred embodiments it refers to a device such as a body-worn camera, a dash camera or a security camera used by law enforcement.
[0049] Furthermore, while the symmetric encryption module may use any symmetric encryption methods, in some embodiments, it uses AES 128 bit or AES 256 bit encryption. Such encryption is generally recognized as being strong encryption. By changing the symmetric key periodically, it will be appreciated that the media encrypted can be considered to be sufficiently secured so as to eliminate any reasonable possibility of tampering.
[0050] The system can work in multiple different manners. In one embodiment further explained herein, the device generates symmetric encryption keys and encrypts the recording using those keys before transferring the encrypted media recordings to the evidence vault. The vault would need the symmetric encryption keys to decrypt the recording. To transfer these keys from the device to the server the system either uses a secure connection or encrypts the symmetric encryption keys and send them to the vault over a secure or unsecured connection. The encryption would be done using an asymmetric encryption method wherein the system sends a public encryption key of the server to the device and uses said public encryption key to asymmetrically encrypted the symmetric encryption keys. This encryption can be only decrypted using a private encryption key of the evidence vault. Therefore, only the server can decrypt the symmetric encryption keys and subsequently the recordings.
[0051] In another embodiment the system sends the symmetric encryption keys from the vault to the device so that the device uses the symmetric encryption key to symmetrically encrypt its media recordings. To transfer these keys from the to the server to the device the system either uses a secure connection or encrypts the symmetric encryption keys and send them to the device over a secure or unsecured connection. The encryption would be done using an asymmetric encryption method wherein the system sends a public encryption key of the device to the server and uses said public encryption key to asymmetrically encrypted the symmetric encryption keys. This encryption can be only decrypted using a private encryption key of the camera. Therefore, only the device can decrypt the symmetric encryption keys. The server also keeps a copy or a log of the symmetric encryption keys it sends to the device which it later uses to decrypt the encrypted media recordings it receives from the camera.
[0052] In another aspect, the present disclosure discloses a media recording device with video encryption ability which can be used for any kind of surveillance purposes such as body worn video (“BWV”) cameras, dashboard camera or police car cameras. The device disclosed is comprised of a recording unit producing original, unencrypted media, a symmetric encryption module configured to use a symmetric encryption key to encrypt said unencrypted media to produce encrypted media, a memory for storing at least one of said unencrypted media and said encrypted media, an interface module configured to transmit said encrypted media and to prevent external access to said unencrypted media and said symmetric encryption key.
[0053] In another aspect the present disclosure provides a server also referred to herein as an evidence vault or vault for handling media from a media recording device for use as evidence in legal proceedings, the server comprising a decryption module having secure access to a symmetric encryption key used by said media recording device providing encrypted media and configured to produce a decrypted copy of said encrypted media, an authentication module configured to authenticate a user to access encrypted media; and an access control module configured to provide to said user either said decrypted copy or a re-encrypted version of said decrypted copy.
[0054]
[0055]
[0056] In one embodiment, as illustrated in
[0057] It will be appreciated that the server that stores the encrypted media can be separate or integrated with the server that authenticates a user to be able to view or listen to the media. The media can be decrypted by the user's computer or device, or it can be decrypted at a server. It is possible to provide a user with the encrypted media with a lower level of authorization, if any, than for providing the user with the encryption keys. For example, what is called an evidence vault 216 can comprise a file server for encrypted media files that has reduced security and an access control server that securely provides decryption keys for encrypted media files to authorized users.
[0058] The symmetric encryption engine 210 can be a hardware encryption circuit as is known in the art. The encoding engine 206 can also be a hardware video and/or audio codec as is known in the art. Asymmetric encryption engine 214 is much easier to provide by way of software executed by a computer processor than in circuitry, however, complex hardware implementations of RSA encryption are known in the art. The device 200 can also make use of a processor and software to provide for engines 206, 210 and 214 if desired. Software media encoding and encryption are known in the art.
[0059]
[0060] Upon receiving the encrypted recording and the symmetric encryptions keys encrypted asymmetrically, the vault uses a private asymmetrical key to decrypt the symmetric encryptions keys encrypted asymmetrically. The private key is a unique key that matches its counterpart public key and can be used to decrypt the symmetric encryptions keys encrypted asymmetrically. Subsequently, it uses the decrypted symmetric encryptions keys to decrypt the recordings.
[0061]
[0062] The server then needs the symmetric encryption keys to decrypt the encrypted recording. In order to securely transmit the keys to the vault 216, the device asymmetrically encrypt the symmetric encryptions keys. This is achieved by use of the evidence vault's public key which may be shared by the device 200 through the interface module 215. The asymmetric encryption engine 214 used the vault's public key to encrypt the symmetric encryption keys to be saved on the memory 208 and transferred to the vault via the interface module 215. The encrypted keys may be transferred as a separate file or be attached to the encrypted recording file.
[0063] Upon receiving the asymmetrically encrypted symmetrical keys, the vault decrypts the symmetrical keys using its private key then uses the symmetrical keys to decrypt the encrypted recordings.
[0064] Referring to
[0065] Referring to
[0066] Upon receiving the asymmetrically encrypted symmetrical keys, the vault decrypts the symmetrical keys using its private key then uses the symmetrical keys to decrypt the encrypted recordings.
[0067] It will be appreciated that in presence of a secure connection the symmetric encryption keys may be transferred to the vault 216 without encryption.
[0068] In some embodiments, the symmetric key unit can be a symmetric key generator 602, as illustrated in
[0069] The flowchart shown in
[0070] It will be appreciated by those skilled in the art that the in presence of secure connection between the server and the camera, there will be no need to have the symmetrical encryption keys encrypted (asymmetrically) before transferring them through the interface module 215. In such scenarios, one layer of encryption, symmetrical encryption, may be enough to assure that only the server 216 can decrypt the recordings.
[0071] As illustrated in
[0072]
[0073] In some embodiments, the present invention has a GPS to provide the location the recordings. In one embodiment, the device connects to any secured or unsecured network upon detecting one and sends encrypted media recordings and the encrypted symmetrical encryption keys to the server using the network to create more space.
[0074] In one alternative embodiments, as illustrated in
[0075] Although various embodiments have been illustrated, this was for the purpose of describing, but not limiting, the present invention. Various possible modifications and different configurations will become apparent to those skilled in the art and are within the scope of the present invention, which is defined more particularly by the attached claims.