Cryptographic Signature System and Related Systems and Methods
20170373859 · 2017-12-28
Inventors
Cpc classification
H04L9/32
ELECTRICITY
G09C5/00
PHYSICS
International classification
H04L9/32
ELECTRICITY
Abstract
The disclosed devices, systems, and methods relate to a validation system which can be used to authenticate photos and videos. The system can have various steps including; a user taking a photo or video, sensor data being collected by a processing system, the sensor data being hashed to create a cryptographic signature, and the cryptographic signature being stored. The cryptographic signature can be later compared with the correspond photo or video for purposes of authentication.
Claims
1. A system for creating a cryptographic signature from a user taken photo or video, comprising: (a) a processing system, wherein: (i) a set of sensor data is collected from the photo or video; (ii) a sensor data packet is created from the set of sensor data; (iii) the sensor data packet is hashed for creation of a cryptographic signature; and (b) a storage medium in communication with the processing system, where the cryptographic signature is stored.
2. The system of claim 1, wherein the storage medium is a database.
3. The system of claim 1, wherein the storage medium is an internal ledger.
4. The system of claim 1, the processing system further comprises a storage file creation step.
5. The system of claim 1, wherein the storage medium is in communication with the processing system via a cellular connection.
6. The system of claim 1, wherein the storage medium is in communication with the processing system via a Wi-Fi connection.
7. The system of claim 1, wherein the cryptographic signature is stored locally until communication with the storage medium can be established.
8. The system of claim 1, further comprising a comparison step, wherein the stored cryptographic signature can be compared to the photo or video for authentication.
9. The system of claim 1, wherein the processing step is configured to compare the cryptographic signature to a recreated storage file signature to detect alterations.
10. A validation system comprising: (a) a database, the database configured to store sensor data; (b) a processing system in communication with the database, wherein the processing system collects sensor data from a device.
11. A validation system of claim 10, wherein the database is a block chain.
12. A validation system of claim 11, wherein the processing system; (a) creates a sensor data packet from the sensor data; and (b) creates a storage file from the sensor data packet.
13. A validation system of claim 12, wherein the storage file is sent to a server.
14. A validation system of claim 12, wherein the storage file is held on the device until a network connection can be established.
15. A validation system of claim 12, wherein a cryptographic signature is created from the storage file.
16. A validation system of claim 12, wherein the cryptographic signature is uploaded to the database using a cellular connection.
17. A validation system of claim 16, wherein the processing system of configured to measure and record a time lapse between storage of the sensor data and upload of the cryptographic signature.
18. A validation system of claim 14, wherein the processing system uses the cryptographic signature to establish an internal ledger.
19. A validation system of claim 18, wherein the internal ledger uploads periodically to the database.
20. A validation system of claim 19, wherein the internal ledger is configured to compare the cryptographic signature to a recreated internal ledger signature to detect alterations.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0022]
[0023]
[0024]
[0025]
DETAILED DESCRIPTION
[0026] The disclosed apparatus, systems, and methods relate to a validation system 10 capable of confirming the authenticity of data, such as digital photos, videos and other sensor information.
[0027] It is understood that the various embodiments of the validation system and related methods, and devices disclosed herein can be incorporated into or used with any other known validation systems, methods, and associated devices. For example, the various embodiments disclosed herein may in incorporated into or used with any of the systems, methods, and associated devices disclosed in copending U.S. Applications 62/244,651 (filed on Oct. 21, 2015 and entitled “Devices, Systems and Methods and Ground Plane”), Ser. No. 15/331,531 (filed Oct. 21, 2016 and entitled “Apparatus, Systems and Methods for Ground Plane Extension”), and 62/511,603 (filed May 26, 2017 and entitled “Industrial Augmented Reality System, Methods and Devices”) all of which are hereby incorporated herein by reference in their entireties.
[0028] As shown in the implementations of
[0029] Turning to the drawings in greater detail, as show in
[0030] In these implementations, the storage file 14, such as a zip file 14, is sent to a server 16 such as a private server 16, following arrow A, where the storage file 14 is stored in a database 20. Following arrow C, the storage file 14 is then hashed to create a cryptographic signature 24A that is also stored on the server 16. The hash function allows for validating the integrity of the data contained in the storage file 14. In these implementations, a duplicate cryptographic signature 24B is then uploaded to a public block chain 18, following arrow D, such that the duplicate cryptographic signature 24B is stored on the public block chain 18 and is therefore highly tamper resistant. It is therefore understood that these stored cryptographic signatures 24A, 24B can be compared, using a variety of systems and methods appreciated by one of skill in the art, with a recreated signature from the stored storage file 14 to detect any alterations as needed for authentication.
[0031]
[0032]
[0033]
[0034] In the implementation of
[0035] It is also understood that in these implementations, the processing system 13 creates the cryptographic signature 24 from the sensor data packet 14A or storage file 14 via the hashing process described herein. The cryptographic signature 24 is unique to a specific sensor data packet 14A or storage file 14. In various implementations, the cryptographic signature 24 can be uploaded to a database 18, such as a private or public database, for use in later authentication or validation of the integrity of the stored data. In one embodiment, a database can be a block chain 18, which has technical characteristics, known in the art, that make it impossible to alter or otherwise tamper with.
[0036]
[0037] Continuing with
[0038]
[0039] In addition to saving 222 the storage file to an internal ledger, the system 10 uses the storage file to create 206 a cryptographic signature for the contents of the sensor packet. The cryptographic signature is uploaded 208 to a database. In an alternate embodiment, following arrow P, the processing system can be configured to record 212 any lapse in time between when the photo/video and sensor data was captured and stored and when the cryptographic signature is uploaded. It is understood that the cryptographic signature can then be compared 220 to a recreated signature from the internal ledger to detect any alterations and for authentication.
[0040] In the various approaches of the various embodiments and implementation the validation system allows one to verify the authenticity of a photo or video by creating a cryptographic signature 206 from the storage file contents 204 and comparing 210, 220 the signature uploaded to the database for that photo or video to the photo or video at a later point in time. Possible methods of validation include, but are not limited to: examining the image and whether it was consistent with an overall evidence narrative, comparing the stated location and weather of the photo or video with the recorded data, and verifying that the motion of the forward and rear facing cameras were consistent with the motion of the phone at the time the photo was taken. In certain embodiments, an insurance company might use the validation system to periodically document the condition of property. In other embodiments, the system may be configured to detect alterations between the recreated and stored cryptographic signatures.
[0041] Although the disclosure has been described with reference to certain embodiments, persons skilled in the art will recognize that changes may be made in form and detail without departing from the spirit and scope of the disclosed apparatus, systems and methods. Such that the various embodiments and steps described can be performed in a variety of orders and combinations without departing from the scope of the disclosure.