Cryptographic Signature System and Related Systems and Methods

20170373859 · 2017-12-28

    Inventors

    Cpc classification

    International classification

    Abstract

    The disclosed devices, systems, and methods relate to a validation system which can be used to authenticate photos and videos. The system can have various steps including; a user taking a photo or video, sensor data being collected by a processing system, the sensor data being hashed to create a cryptographic signature, and the cryptographic signature being stored. The cryptographic signature can be later compared with the correspond photo or video for purposes of authentication.

    Claims

    1. A system for creating a cryptographic signature from a user taken photo or video, comprising: (a) a processing system, wherein: (i) a set of sensor data is collected from the photo or video; (ii) a sensor data packet is created from the set of sensor data; (iii) the sensor data packet is hashed for creation of a cryptographic signature; and (b) a storage medium in communication with the processing system, where the cryptographic signature is stored.

    2. The system of claim 1, wherein the storage medium is a database.

    3. The system of claim 1, wherein the storage medium is an internal ledger.

    4. The system of claim 1, the processing system further comprises a storage file creation step.

    5. The system of claim 1, wherein the storage medium is in communication with the processing system via a cellular connection.

    6. The system of claim 1, wherein the storage medium is in communication with the processing system via a Wi-Fi connection.

    7. The system of claim 1, wherein the cryptographic signature is stored locally until communication with the storage medium can be established.

    8. The system of claim 1, further comprising a comparison step, wherein the stored cryptographic signature can be compared to the photo or video for authentication.

    9. The system of claim 1, wherein the processing step is configured to compare the cryptographic signature to a recreated storage file signature to detect alterations.

    10. A validation system comprising: (a) a database, the database configured to store sensor data; (b) a processing system in communication with the database, wherein the processing system collects sensor data from a device.

    11. A validation system of claim 10, wherein the database is a block chain.

    12. A validation system of claim 11, wherein the processing system; (a) creates a sensor data packet from the sensor data; and (b) creates a storage file from the sensor data packet.

    13. A validation system of claim 12, wherein the storage file is sent to a server.

    14. A validation system of claim 12, wherein the storage file is held on the device until a network connection can be established.

    15. A validation system of claim 12, wherein a cryptographic signature is created from the storage file.

    16. A validation system of claim 12, wherein the cryptographic signature is uploaded to the database using a cellular connection.

    17. A validation system of claim 16, wherein the processing system of configured to measure and record a time lapse between storage of the sensor data and upload of the cryptographic signature.

    18. A validation system of claim 14, wherein the processing system uses the cryptographic signature to establish an internal ledger.

    19. A validation system of claim 18, wherein the internal ledger uploads periodically to the database.

    20. A validation system of claim 19, wherein the internal ledger is configured to compare the cryptographic signature to a recreated internal ledger signature to detect alterations.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0022] FIGS. 1A-B show exemplary embodiments of the validation system.

    [0023] FIG. 2 shows an exemplary system for creation of a cryptographic signature.

    [0024] FIG. 3 shows an exemplary implementation of the validation system.

    [0025] FIGS. 4A-B depict flowcharts showing model embodiments of the validation system.

    DETAILED DESCRIPTION

    [0026] The disclosed apparatus, systems, and methods relate to a validation system 10 capable of confirming the authenticity of data, such as digital photos, videos and other sensor information.

    [0027] It is understood that the various embodiments of the validation system and related methods, and devices disclosed herein can be incorporated into or used with any other known validation systems, methods, and associated devices. For example, the various embodiments disclosed herein may in incorporated into or used with any of the systems, methods, and associated devices disclosed in copending U.S. Applications 62/244,651 (filed on Oct. 21, 2015 and entitled “Devices, Systems and Methods and Ground Plane”), Ser. No. 15/331,531 (filed Oct. 21, 2016 and entitled “Apparatus, Systems and Methods for Ground Plane Extension”), and 62/511,603 (filed May 26, 2017 and entitled “Industrial Augmented Reality System, Methods and Devices”) all of which are hereby incorporated herein by reference in their entireties.

    [0028] As shown in the implementations of FIGS. 1A-4B, the validation system 10 generally comprises collecting photos, videos and/or sensor data from a device 12. Certain non-limiting examples of devices may include; tablets and mobile phones. The photos, videos and/or sensor data are then converted into a storage file 14 such as a zip file 14 which can contain any of the collected data such as a sensor packet (as discussed below). In various implementations, the storage file 14 is then stored on a server 16 in a database. The data is also hashed to create a cryptographic signature 24, validating the integrity of the data. In certain implementations, the cryptographic signature 24 and time stamp is stored on another database 18, such as a block chain 18. The cryptographic signature 24 of these implementations can then be compared to a recreated signature from the storage file 14 in evidentiary proceedings or other events where detection of alterations is needed for authentication. In alternate embodiments, the validation system may be configured and arraigned to execute comparisons between the recreated and stored cryptographic signature. While several embodiments are described in detail herein, further embodiments and configurations are possible.

    [0029] Turning to the drawings in greater detail, as show in FIG. 1A, an exemplary embodiment of the validation system 10, a device 12 contains a processing system 13 which can include a local database or other memory for collection and storage of the data. In these implementations, the device 12 is used to capture photos, videos and other associated sensor data for storage and transmission, as well as the assembly of the stored data. That is, the processing system 13 is used to convert the photos, videos, and sensor data (which can be a packet 14A) into a storage file 14 such as a zip file 14. In various embodiments the storage file 14 may contain only one photo or video, the storage file may contain many photos and videos, the storage file 14 many contain additional sensor data in addition to photos and videos. Certain non-limiting examples of additional sensor data may be the angle of the device, other cameras, location data, time and atmospheric pressure. In some embodiments more extensive sensor data, for example spatial information, could be collected. When the user 12 captures a photo or video, the processing system 13 stores sensor data locally in a sensor data packet which is converted into a storage file 14.

    [0030] In these implementations, the storage file 14, such as a zip file 14, is sent to a server 16 such as a private server 16, following arrow A, where the storage file 14 is stored in a database 20. Following arrow C, the storage file 14 is then hashed to create a cryptographic signature 24A that is also stored on the server 16. The hash function allows for validating the integrity of the data contained in the storage file 14. In these implementations, a duplicate cryptographic signature 24B is then uploaded to a public block chain 18, following arrow D, such that the duplicate cryptographic signature 24B is stored on the public block chain 18 and is therefore highly tamper resistant. It is therefore understood that these stored cryptographic signatures 24A, 24B can be compared, using a variety of systems and methods appreciated by one of skill in the art, with a recreated signature from the stored storage file 14 to detect any alterations as needed for authentication.

    [0031] FIG. 1B depicts an additional exemplary embodiment of the validation system 10. In this implementation, the device 12 contains a processing system 13. The device 12 captures photo, videos, and other sensor data. The processing system converts the data into a storage file 14 such as a zip file 14 that is uploaded to a server 16, following arrow Z, such as via a WiFi, cellular or other network. Some non-limiting examples of servers might include, but are not limited to, a client server, a company server, or cloud storage. In some embodiments the storage file 14 may be held in internal storage on the server 16 until a network connection can be established. Following arrow Y, according to these implementations, the storage file 14 is also uploaded for storage on a database 20 in a public block chain 44 in these implementations. The storage file 14 is converted into a cryptographic signature 24A, following arrow X, using a hash function to insure the integrity of the data. The cryptographic signature 24A is stored on a public block chain 18. The cryptographic signature 24A can then be compared to a recreated signature 24B from the storage file 14 as needed to detect alterations or for authentication.

    [0032] FIG. 2 depicts an exemplary embodiment of a processing system 10 as it creates a cryptographic signature 24 from a sensor data packet 104 or storage file (such as those shown in FIGS. 1A-1B at 14). In these implementations, a function such as a hash function 102 creates a storage file of the sensor data packet 104, as was discussed in relation to FIGS. 1A-1B. In these implementations, the storage file is hashed 108 with the private key 106. The result of these implementations is the creation of a cryptographic signature 24 that can be used to authenticate that the underlying data or sensor packet has not been disturbed or tampered with. That is, this process insures the integrity of the content by detecting modification via obvious changes to the hash output.

    [0033] FIG. 3 is an exemplary implementation of the validation system, according to one implementation. In this implementation, a device 12 contains a mobile application 86 and is equipped with a transmission component 74. The transmission component can be cellular, Wi-Fi, or other system for communication appreciated by a skilled artisan.

    [0034] In the implementation of FIG. 3, the device 12 is configured to record data from a sensor or sensors 76 when taking a photo or video, such as but not limited to; the angle of the device, other cameras, location data, time, and atmospheric pressure. In some embodiments more extensive sensor data, for example spatial information, could be collected. When the user 88 captures a photo or video, the processing system 13 stores sensor data locally in a data packet such as a sensor data packet 14A. It is understood that the data packets 14A can comprise one or more data modalities, such as audio, video, or other kinds of data. Other variations and implementations will be apparent to the skilled artisan.

    [0035] It is also understood that in these implementations, the processing system 13 creates the cryptographic signature 24 from the sensor data packet 14A or storage file 14 via the hashing process described herein. The cryptographic signature 24 is unique to a specific sensor data packet 14A or storage file 14. In various implementations, the cryptographic signature 24 can be uploaded to a database 18, such as a private or public database, for use in later authentication or validation of the integrity of the stored data. In one embodiment, a database can be a block chain 18, which has technical characteristics, known in the art, that make it impossible to alter or otherwise tamper with.

    [0036] FIG. 4A depicts a flowchart showing a model embodiment of the validation system. In this embodiment, the validation system 10 collects 200 photo/video and sensor data from a user device (shown in FIG. 3 at 12) to form a data packet such as a sensor data packet, as was described above. The photo/video and sensor data is stored 202 on the user device, thereby creating a sensor data packet (shown above at 14A). Here, the processing system 10 thereby creates 204 a zip file, or other storage file, (again as shown in FIG. 1A at 14) from the sensor data packet. Following arrow L, the storage file is sent 216 to a server where is it saved. In an alternate embodiment the storage file is stored internally 214 within the device, following arrow K, until a network connection can be achieved when the storage file is then uploaded 216 to a server.

    [0037] Continuing with FIG. 4A, in addition to saving 216 the storage file to a server, the system uses the storage file to create 206 a cryptographic signature for the contents of the sensor packet. The cryptographic signature is uploaded 208 to a database. In an alternate embodiment, following arrow P, the processing system can be configured to record 212 any lapse in time between when the photo/video and sensor data was captured and stored and when the cryptographic signature is uploaded. The cryptographic signature can then be compared 210 to a recreated signature from the stored storage file to detect any alterations and for authentication.

    [0038] FIG. 4B depicts a flowchart showing a model embodiment of the validation system 10. In this embodiment, the validation system collects 200 photo/video and sensor data from a user device, such as those shown above at 12. The photo/video and sensor data is stored 202 on the user device, thereby creating a sensor data packet as has been previously described. Here, the processing system creates 204 a storage file from the sensor data packet. Following arrow Q the storage file is uploaded 222 to an internal ledger. The internal ledger is periodically signed and may be uploaded 224 to a block chain.

    [0039] In addition to saving 222 the storage file to an internal ledger, the system 10 uses the storage file to create 206 a cryptographic signature for the contents of the sensor packet. The cryptographic signature is uploaded 208 to a database. In an alternate embodiment, following arrow P, the processing system can be configured to record 212 any lapse in time between when the photo/video and sensor data was captured and stored and when the cryptographic signature is uploaded. It is understood that the cryptographic signature can then be compared 220 to a recreated signature from the internal ledger to detect any alterations and for authentication.

    [0040] In the various approaches of the various embodiments and implementation the validation system allows one to verify the authenticity of a photo or video by creating a cryptographic signature 206 from the storage file contents 204 and comparing 210, 220 the signature uploaded to the database for that photo or video to the photo or video at a later point in time. Possible methods of validation include, but are not limited to: examining the image and whether it was consistent with an overall evidence narrative, comparing the stated location and weather of the photo or video with the recorded data, and verifying that the motion of the forward and rear facing cameras were consistent with the motion of the phone at the time the photo was taken. In certain embodiments, an insurance company might use the validation system to periodically document the condition of property. In other embodiments, the system may be configured to detect alterations between the recreated and stored cryptographic signatures.

    [0041] Although the disclosure has been described with reference to certain embodiments, persons skilled in the art will recognize that changes may be made in form and detail without departing from the spirit and scope of the disclosed apparatus, systems and methods. Such that the various embodiments and steps described can be performed in a variety of orders and combinations without departing from the scope of the disclosure.