CN1161997C - Security device and method for capturing data transmitted between two sources - Google Patents
Security device and method for capturing data transmitted between two sources Download PDFInfo
- Publication number
- CN1161997C CN1161997C CNB971816069A CN97181606A CN1161997C CN 1161997 C CN1161997 C CN 1161997C CN B971816069 A CNB971816069 A CN B971816069A CN 97181606 A CN97181606 A CN 97181606A CN 1161997 C CN1161997 C CN 1161997C
- Authority
- CN
- China
- Prior art keywords
- swimming
- distance
- folder
- hashed value
- semiconductor device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
发明背景Background of the invention
本发明涉及用于数据保安的装置和方法。更具体地,本发明涉及这样的半导体装置,它防止由捕获装置捕获的数据被未知地改变,并且它提供用于维持数据完整性的机制。The present invention relates to devices and methods for data security. More specifically, the present invention relates to a semiconductor device that prevents data captured by a capture device from being unknowingly altered and that provides a mechanism for maintaining data integrity.
技术领域technical field
随着个人电脑(“PC”)、网络和其它支持数字数据传送的设备变得更普遍,数据保安性的重要性剧增。为了数据保安性高度可靠,就必须确保在两个源之间传输的数据是“真实的”。用于保护数据完整性的一种有限的技术是通过存取控制(即用户识别和授权)。现在,当前所做的努力是利用一种称作为”生物测定学”的存取控制技术,它使用基本上用于设备保安性(例如:楼宇、房间等等)的捕获装置。生物测定学技术通常包括数字地扫描用户的特征(例如:指纹、虹膜、视网膜等等),以捕获该特征的至少一个或更多相似的多个数据帧(通常被称作为“数据夹”),并且将捕获的数据夹与先前存储的正本比较。如果捕获数据夹的某些特征与存储的母模的那些特征匹配,则该用户被识别并被授权。As personal computers ("PCs"), networks, and other devices that support the transfer of digital data become more common, the importance of data security increases dramatically. For data security to be highly reliable, it must be ensured that the data transmitted between two sources is "authentic". One limited technique for protecting data integrity is through access control (ie, user identification and authorization). Now, current efforts are using an access control technique called "biometrics," which uses capture devices that are basically used for equipment security (eg, buildings, rooms, etc.). Biometrics techniques typically involve digitally scanning a characteristic of a user (e.g., fingerprint, iris, retina, etc.) to capture at least one or more similar multiple frames of data (commonly referred to as "data clips") of that characteristic , and compare the captured folder with the previously stored copy. If certain characteristics of the capture folder match those of the stored master, the user is identified and authorized.
近几年,电子技术变得如此成熟,以致于如在目前特征胶片中由某些专门效果证明的那样数字地捕获的数据夹的改变变得更难以检测。结果,利用生物测定学的保安系统(此后单独地被称作为“生物系统”)现在被认为受制于捕获数据夹(data clip)的篡改,如果该生物系统没有实际连接到系统或分量处理或存储捕获数据夹的话。其原因是通信通道将最可能是向公众开放的,这就使黑客有这样的机会:将捕获的数据夹(i)替代原先记录的数据夹,(ii)从另一个位置实时传送或(iii)与其它不存在的图像或特征组合。In recent years, electronic technology has become so sophisticated that changes to digitally captured folders, as evidenced by certain specialized effects in current feature films, have become more difficult to detect. As a result, security systems utilizing biometrics (hereafter referred to individually as "biosystems") are now considered subject to tampering with captured data clips if the biometric system is not physically connected to the system or component processing or storage Capture folder words. The reason for this is that the communication channel will most likely be open to the public, giving the hacker the opportunity to (i) replace an originally recorded folder with a captured folder, (ii) transmit it in real time from another location or (iii) ) combined with other images or features that do not exist.
在保护数据完整性的努力方面,一种称为“时间标记”(time stamp)的技术最近已经被开发出来,并且由新译西州Chatham的Surety技术公司提供到商业上。如图1所示,由用户通过储存在本地源100中的加密保安散列(hash)算法120(例如:由加尼福尼亚Redwood市的RSA数据保安公司开发的“MD5”算法)处理数据组110(即数据流)来完成时间标记的一个例子。这就导致数字数据组合110从其任何尺寸映射到明显变小、固定尺寸,通常称作为没有信息内容的“文摘”130。In an effort to protect data integrity, a technology called "time stamping" has recently been developed and made commercially available by Surety Technologies of Chatham, New York. As shown in FIG. 1, data is processed by the user through a cryptographically secure hash algorithm 120 (e.g., the "MD5" algorithm developed by RSA Data Security, Inc. of Redwood, California) stored at a
典型地,文摘130被传送(最好是电子化地)到由虚线140表示的中心源150并且以后被散列并与从不同源来的一些其它文摘160按如所示的“二进制树”方式组合,因此,产生了许多“中间文摘”170,最后产生了合成的文摘180。接下来,合成的文摘180被广泛地公开(例如:打印在出版物上,分发到所有源,存储在置信数据库中,等等),以确立该数据组110至少在合成的文摘180公开之前已经存在了。可是,当前没有用于“时间分类”(time-bracketing)文摘130的机制,以确保数据组110在公开前存在于特定的时间点之后。捕获的数据夹的定时分类对于防止先前捕获的数据夹的伪冒是有用的。而且,也没有用于固定“顺序排列”数据夹的数据帧的机制,以防止数据帧的顺序被改变出现的次序,以达到出现所出现事件的某些序列。Typically, a digest 130 is transmitted (preferably electronically) to a
发明内容Contents of the invention
基于上面的描述,很明显需要在捕获装置中采用保安数据捕获装置,该捕获装置防止捕获的数据夹未经检测就被改变。另外,为了进一步保护数据夹的完整性,该保安数据捕获装置最好包括“时间分类”机制,它计算和建立数据夹必须由捕获装置捕获的时间周期,以及可选择地包括“顺序排列”机制,它确保多个数据帧出现在数据夹中的顺序。Based on the above description, it is apparent that there is a need to employ a secure data capture device in the capture device which prevents the captured data folder from being altered without detection. In addition, to further protect the integrity of the data folder, the security data capture device preferably includes a "time classification" mechanism that calculates and establishes the time period during which a data folder must be captured by the capture device, and optionally includes a "sequencing" mechanism , which ensures the order in which multiple dataframes appear in the folder.
根据本发明的一种半导体装置,包括A semiconductor device according to the present invention, comprising
传感装置,用于捕获数据夹;和a sensing device for capturing data folders; and
加密装置,连接到所述传感装置,用于保护所述数据夹的完整性,所述加密装置包括:An encryption device, connected to the sensing device, for protecting the integrity of the data folder, the encryption device comprising:
存储装置,用于存储唯一密钥对、游程散列值和状态值,storage means for storing the unique key pair, the run-length hash value, and the state value,
处理器装置,用于对所述数据夹执行操作,以确立该数据夹是在所述状态值公开之后且在对所述游程散列值进行时间标记操作之前被捕获,和processor means for performing an operation on said data folder to establish that the data folder was captured after said state value was disclosed and before said run hash value was time-stamped, and
总线装置,使所述处理器装置和所述存储装置通信,所述总线装置连接到所述处理器装置与所述存储装置。bus means for communicating said processor means and said memory means, said bus means being connected to said processor means and said memory means.
根据本发明的一种半导体装置,包括:A semiconductor device according to the present invention includes:
用于捕获数据夹的传感装置;和Sensing devices for capturing data folders; and
一个加密电路,它连接到所述传感装置,所述加密电路包括:an encryption circuit connected to said sensing device, said encryption circuit comprising:
多个存储单元,能包含一个状态值和一个游程散列值,该游程散列值是同所述状态值组合的所述数据夹的散列结果,在所述传感器被用于捕获所述数据夹之前,将所述状态值装载入所述多个存储单元的其中一个单元,a plurality of storage locations that can contain a state value and a run-length hash value that is the result of hashing the data folder combined with the state value at the time the sensor is used to capture the data Before clamping, loading the state value into one of the plurality of storage units,
一个处理器,它能够(i)在所述数据夹上执行操作产生所述散列值,(ii)数字地标志所述游程散列值和(iii)输出所述游程散列值,以用于时间-标记操作,和a processor capable of (i) performing operations on said data folder to generate said hash value, (ii) digitally marking said run-length hash value and (iii) outputting said run-length hash value for use in for time-stamping operations, and
一个总线,连接到所述多个存储单元和所述处理器,该总线使所述处理器与所述多个存储单元连通。A bus is connected to the plurality of memory units and the processor, the bus communicating the processor with the plurality of memory units.
根据本发明的一种保持从第一源发射至第二源的数据夹的完整性的方法,该方法包括步骤:A method of maintaining the integrity of a data folder transmitted from a first source to a second source according to the present invention, the method comprising the steps of:
将一个状态值装载到一个星系状态(SOTU)存储单元;load a state value into a system state (SOTU) memory unit;
捕获所述数据夹的第一数据帧;capture the first data frame of the folder;
通过至少对所述第一数据帧进行散列产生第一连续的数据帧;generating a first consecutive frame of data by hashing at least said first frame of data;
将所述第一连续的数据帧加到游程散列值;adding said first consecutive data frame to a run-length hash value;
将所述状态值加到所述游程散列值;adding the state value to the run hash value;
数字地标志所述游程散列值;和digitally sign the run hash value; and
对所述游程散列值执行时间-标记操作。A time-stamping operation is performed on the run hash value.
根据本发明的一种半导体装置,包括:A semiconductor device according to the present invention includes:
一个传感器,用于捕获数据夹;和a sensor to capture data clips; and
一个加密电路,连接到该传感器,所述加密电路包括:an encryption circuit connected to the sensor, said encryption circuit comprising:
多个存储单元,它能包含一个游程散列值和在捕获该数据夹之前装载的一个状态值,multiple storage locations, which can contain a run-length hash value and a state value loaded prior to capturing the folder,
一个处理器,连接到所述多个存储单元,所述处理器能时所述数据夹执行操作,以确立所述数据夹是在该状态值公开之后并且在所述游程散列值从加密电路输出之前被捕获的。a processor coupled to said plurality of storage units, said processor capable of performing operations on said data folder to establish that said data folder is after the state value is disclosed and after said run hash value is retrieved from the encryption circuit Output was previously captured.
根据本发明的一种加密电路,包括:A kind of encryption circuit according to the present invention comprises:
多个存储单元,包含一个游程散列值和先于捕获一数据夹装载的一个状态值;和memory locations containing a run-length hash value and a state value prior to capturing a folder load; and
处理器,连接到所述多个存储单元,所述处理器对所述数据夹执行操作,以确立该数据夹是在该状态值公开之后并且在包括一个游程散列值的信息公开之前被捕获的。a processor coupled to the plurality of storage units, the processor performing an operation on the data folder to establish that the data folder was captured after the state value was disclosed and before information including a run hash value was disclosed of.
根据本发明的一种用于保持被传输数据的完整性的方法,所述方法包括步骤:A method for maintaining the integrity of transmitted data according to the present invention, said method comprising the steps of:
从一个远程源得到一个状态值;get a state value from a remote source;
捕获第一数据帧;Capture the first data frame;
产生所述第一数据帧的散列结果;generating a hash result of the first data frame;
根据散列结果和一个状态值产生一个游程散列值;和generate a run-length hash value based on the hash result and a state value; and
对所述游程散列值执行时间-标记操作。A time-stamping operation is performed on the run hash value.
附图说明Description of drawings
从下面对本发明的详细描述,本发明的特征和优点将变得更清楚。The features and advantages of the present invention will become more apparent from the following detailed description of the present invention.
图1是产生合成的文摘的常规时标的流程图。Figure 1 is a flowchart of a conventional time stamp for generating a synthesized abstract.
图2是与保安数据捕获装置中采用的捕获装置组合工作的计算机系统的实施例的方框图。Figure 2 is a block diagram of an embodiment of a computer system operating in combination with a capture device employed in a security data capture device.
图3是由保安数据捕获装置完成的加密操作的方框图。Fig. 3 is a block diagram of the encryption operation performed by the security data capture device.
图4是保安数据捕获装置的一个实施例的方框图。Figure 4 is a block diagram of one embodiment of a security data capture device.
图5是一个流程图,它显示了为了保护捕获数据夹的完整性通过定时和顺序排列由保安数据捕获装置执行的那些处理步骤。Figure 5 is a flow chart showing those process steps performed by the secure data capture device in a timed and sequential order to protect the integrity of the captured data folder.
图6是一个定时流程图,它显示了数据夹是怎样被定时在两个时间点之间的。Figure 6 is a timing flow diagram showing how data folders are timed between two points in time.
具体实施方式Detailed ways
本发明涉及到一种最好是在捕获装置中采用的保安数据捕获装置以及其相应的操作方法。在下面的描述中,某些术语用于讨论某些公知的加密功能。例如,数据夹是为显示视频、音频和文本所需而被数字化为二进制数据的信息。该信息至少包括一个数据帧。“密钥”是编码和/或解码参数,由常规加密算法使用;即:公开密钥加密算法例如Rivest,Shamir和Adleman(“RSA”)、对称密钥加密算法如数据加密标准(“DES”)中规定的数据加密算法(“DEA”)等等。“证书”被定义为与一个实体相关的任何数字信息(典型地为一个公用密钥),用私人密钥加密,该私人密钥由另一个实体比如制造商或广泛公开的置信机构(例如:银行、政府部门、贸易协会等等)所掌握。“数字签名”类似于证书,但用于证实数据,而不是其发送者。The present invention relates to a security data capture device, preferably employed in a capture device, and a corresponding method of operation thereof. In the following description, certain terms are used to discuss certain well-known cryptographic functions. For example, data folders are information digitized into binary data required to display video, audio, and text. The information includes at least one data frame. "Keys" are encoding and/or decoding parameters used by conventional encryption algorithms; namely: public key encryption algorithms such as Rivest, Shamir and Adleman ("RSA"), symmetric key encryption algorithms such as Data Encryption Standard ("DES") ), the Data Encryption Algorithm ("DEA"), etc. A "certificate" is defined as any digital information (typically a public key) associated with an entity, encrypted with a private key issued by another entity such as a manufacturer or a widely publicized trusted authority (eg: owned by banks, government departments, trade associations, etc.). A "digital signature" is similar to a certificate, but authenticates data, not its sender.
现在参见图2,其中图示了采用了本发明且与计算机系统200关联操作的捕获装置215的说明性实施例。该计算机系统200包括具有内含存储器的PC平台的显示监示器205,处理硬件等。捕获装置215(例如摄像机、数字照相机等等)是与显示监示器205分离的,它可放入显示监示器205的外壳内,或如图所示将它安装在显示监示器205上面。当捕获装置215捕获所需数据的数据夹(例如,计算机用户220的物理特征)时,它通过通信线225将捕获到的数据传输到PC平台。通信线225可被描绘为一个电的或光纤的电缆,一个无线通信链路或类似物。Referring now to FIG. 2 , there is shown an illustrative embodiment of a
由于通信线225是公众可存取的,这就威协了所捕获的数据夹的完整性,在捕获装置215中就采用了保安数据捕获装置230。该保安数据捕获装置230捕获数据夹,并且通过对每个捕获的数据帧或整个数据夹按照该实施实体采用的方法进行数字标志,将所捕获的数据夹安全地传输到PC平台210。Since the
可是,应该想到存在着采用保安数据捕获装置的捕获装置的其它实施例。例如,捕获装置可包括内部存储能力。在那种情况下,保安数据捕获装置230在存储之前对数据夹进行标志,而不需要通信线225来建立与计算机系统的电连接。当然,应该想到的是捕获装置可以是一种音频记录装置,类似于图4(下面)的保安数据捕获装置,它对数字标志的音频夹进行数字化,而不是针对下面描述的可视图象。本发明的精神和范围保持在远离第二源的第一源中的保安数据捕获装置的实现,其努力的目的是保护两者之间数据传输的完整性。However, it is contemplated that there are other embodiments of capture devices that employ security data capture devices. For example, a capture device may include internal storage capabilities. In that case, the security
如上所述,数字签名用于上述的实施例,以保护从捕获装置传输来的数据夹内容的完整性,并证实计算机用户的身份,而不需要没有必要地修改数据夹。如图3所示,数字310从数据夹315中产生,由第一源300(例如图2的捕获装置215)获得,有选择地与所示的附加信息335组合,由第一源300中的加密保安散列算法320完成算术“散列”操作。这就使得数据夹315从其任意尺寸(典型大小)映射成明显小的尺寸,通常称为“文摘”330。文摘330在时间方式上的反向工程实际上是不可能的。因此,该文摘330用保安数据捕获装置230的私人密钥“PRK1”340来加密。数字310伴随着加密数据325,该加密数据可能使用第二源350的公众密钥(“PUK2”)355由RSA加密或者使用DES由公认的对称密钥加密,尽管加密是不需要的,因为它被传输到第二个源350(例如PC平台,存储器或任何其它可接收数据的装置)。As noted above, digital signatures are used in the embodiments described above to protect the integrity of folder contents transferred from the capture device and to verify the identity of the computer user without unnecessarily modifying the folder. As shown in FIG. 3 ,
如果必要的话,第二个源350使用其私人密钥“PRK2”360(或公认的DES密钥)对数据325进行解密,并对接收的数据进行散列操作,最好还有附加信息335,该操作与在第一源300中进行的散列操作相同,以产生第二文摘370。同时,第二源350也使用保安数据捕获装置的公众密钥“PUK1”345来解密数字签名310,以获得数字签名310的文摘。“PUK1”345可以通过传输证书(例如制造者的证书)由第一源来提供,这是现有技术中的公知技术。文摘330和370比较,并且如果它们相同,就可确保数据的完整性和发送者的授权。If necessary, the
参见图4,它显示了保安数据捕获装置230的一个实施例。保安数据捕获装置230包括数据捕获电路235和加密电路240,两者最好是集成到一个集成电路包中,以减少物理窜改的弱点。数据捕获电路235是一个常规的传感器,比如电荷耦合装置“CCD”(摄录机中使用的标准传感器)、由苏格兰爱丁堡的VLSI Vision有限公司开发的基于DRAM的视频传感器,或任何其它类似的技术。总体来说,视频捕获电路235包括象素捕获阵列400和用于控制象素捕获阵列400的控制逻辑405。Referring to FIG. 4, one embodiment of a security
加密电路240包括处理单元410,它通过内部总线435连接到非易失性存储器415(例如:EPROM,闪速EPROM VROM EEPROM等,夹序列(“CS”)存储单元420,帧序列(“FS”)存储单元421,星系状态(“SOTU”)存储单元425,以及可选择地,随机数发生器430,该加密电路最好与数据捕获电路235在相同的硅片上形成。处理电路410包括硬件411(例如:闪速存储器、只读存储器“ROM”、随机存取存储器“RAM”等等)用于对数字标志的信息执行RSA算法并完成散列操作,并且存储游程散列值(在后面描述)。可选择地,加密加速硬件412可以采用到该处理单元410,如虚线所示的。The
为了授权的目的,非易失性存储器415也存储与保安数据捕获装置230和制造商证书440相关的唯一公众/私人密钥对340和345。该唯一的公众/私人密钥对340和345的内部存储允许在从处理单元410传输到远端位于第二源的另一个处理器或存储装置之前对捕获的数据夹进行加密和/或在保安数据捕获装置230之内进行数字标志。另外,该唯一的公众/私人密钥对240,245和制造商的证书440允许远端系统(例如PC平台)唯一地识别捕获装置,并授予它候选/响应协议,并且如果需要的话建立对称的“对话”密钥,以支持“对称密钥加密”,以减少加密和解密数据的等待时间。结果,就不可能在这些源之间的通信通道之间进行搭接窃听并且替代先前记录的夹或改变捕获的数据夹,而不被第二源检测到。
最好是CS存储单元420和FS存储单元421为32比特寄存器,它收集地存储64比特的序列号,该序列号在数据帧的每次捕获后增加。因此,该64比特序列号对由保安数据捕获装置230捕获的每个数据帧是终身唯一的。理想地,该序列号每次增加时,它被永久地存储并在掉电的情况下能恢复。可是,这就需要异常的高速(例如:对于视频捕获为60次/秒)来存储该序列号。Preferably, the
为了避免产生高存储速率,该序列号被存储在两个部分。更具体地,该序列号的“最重要”部分被存储在CS存储单元420中,而该序列号的“不重要”部分被存储在FS存储单元421中。结果,FS存储单元421在每次数据帧捕获之后增加;可是,CS寄存器420只在下列条件出现时才增加:To avoid high storage rates, the sequence number is stored in two parts. More specifically, the “most significant” part of the serial number is stored in the
(1)FS存储单元出现满载时(即FS存储单元从“FFFFFFFF“滚动到”0000000”);或(1) When the FS storage unit is fully loaded (that is, the FS storage unit rolls from "FFFFFFFF" to "0000000"); or
(2)保安数据捕获装置被加电时。(2) When the security data capture device is powered on.
用这种结构,FS存储单元421可位于易失性的存储器中,而CS存储单元420位于非易失性存储器中。当电源被维持时,该序列号顺序地增加(从不重复),还有在保安数据捕获装置断电之前,在每232个连续捕获之后该序列号的所需状态只是“逻辑的”。With this structure, the FS storage unit 421 can be located in volatile memory, while the
如果保安数据捕获装置掉电,存储在FS存储单元421中的值(即“帧序列”)被丢失,但存储在CS存储装置420中的值(即“夹序列”)在下一个通电时增加,结果导致新捕获数据夹的唯一序列号的新设置。因此,即使某些帧序列号被重新使用,确保了该数据夹的每个数据帧的唯一性。If the security data capture device is powered down, the value stored in FS storage unit 421 (i.e., the "frame sequence") is lost, but the value stored in CS storage unit 420 (i.e., the "clip sequence") is incremented on the next power-up, The result is a new setting of unique serial numbers for newly captured folders. Therefore, even if some frame sequence numbers are reused, the uniqueness of each data frame of the folder is ensured.
最好是,SOTU存储单元425能够存储表示大数的288个数据比特。该SOTU存储单元425在系统控制从保安数据捕获装置外部(例如从相关的PC系统)装载有状态信息状态值,并可在捕获数据夹之前的任何时间重新装载,这依赖于该状态信息。该状态信息是在特定的位置按时以这样一种方式产生的,即在该位置之前的任何时间是不可预见的。例如,该状态信息可以是一个合成的文摘,它是可能的百万个数据组的散列值,在由时标业务提供商对其公开的时刻之前,实际上是不可预测的。该SOTU存储单元425在断电时可以或不可以清除。Preferably,
随机号产生发生器430用于产生唯一的公众和私人密钥,如在名称为“提供保安通信的装置和方法”的待审申请(申请系列号为08/251486)中,它是由本发明的共同发明人Derek L.Davis提出的。其使用最好是依据是否需要加密功能而定的,但是可选择的(如由虚线所示的那样)。Random
现在参考图5,它图示了在传输保安数据到第二源中由保安数据捕获装置完成的操作步骤。SOTU存储单元包含从该装置外部先前装载的状态信息(“状态值”),一旦图5中描述的步骤开始,它就不能改变。换句话说,图5表示“原子”过程,其间,SOTU存储单元的内容不能修改。Reference is now made to FIG. 5, which illustrates the operational steps performed by the security data capture device in transmitting security data to a second source. The SOTU storage unit contains previously loaded state information ("state value") from outside the device, which cannot be changed once the steps described in FIG. 5 have started. In other words, Figure 5 represents an "atomic" process during which the contents of the SOTU memory unit cannot be modified.
在捕获数据夹之前,在步骤505内部存储的”游程散列”值被初始化为0。游程散列是在传输时间分类之前存储在计算机中的连续更新的散列值。在步骤510,数据夹的数据帧由装置的传感器(例如:CCD象素传感器阵列)捕获,并且在步骤515序列号增加1。如果帧序列是需要的(步骤520),那么序列号是与数据帧关联的,以在步骤525产生序列的数据帧。之后,数据帧或序列化的数据帧被散列,以合成为游程散列值(步骤530)。在单帧捕获的情况下(与夹相对),游程散列值将只表示数据帧的散列值或序列化的数据夹,由于没有数据帧先前被包括到该游程散列值中。The "run hash" value stored internally at step 505 is initialized to zero before capturing the folder. A run-length hash is a continuously updated hash value stored in the computer prior to transmission time classification. At step 510, the data frame of the folder is captured by the device's sensor (eg, CCD pixel sensor array), and at step 515 the sequence number is incremented by one. If a frame sequence is desired (step 520 ), then a sequence number is associated with the data frame to generate a sequence of data frames at step 525 . Thereafter, the data frame or serialized data frame is hashed to synthesize a run-length hash value (step 530). In the case of a single frame capture (as opposed to clips), the run hash value will only represent the hash value of the data frame or the serialized data clip since no data frame was previously included in the run hash value.
下面,数据帧或序列化数据可以传送到第二个源或存储在外部(步骤535)。另外,数据帧或序列化数据夹可以在这种传输或存储之前选择地被加密(为了私人的目的)。如果该数据夹被捕获,其中对于每个单独的数据帧不需要标志,而且更多的帧被捕获作为数据夹的部分,然后该过程捕获与该数据夹相关的其它数据帧(步骤540)。如果在该数据夹中没有包括更多的帧,或数据夹只是唯一的数据帧,则过程进入到步骤545。Next, the data frame or serialized data can be transmitted to a second source or stored externally (step 535). Additionally, data frames or serialized folders may optionally be encrypted (for privacy purposes) prior to such transmission or storage. If the folder is captured, where no flags are required for each individual data frame, and more frames are captured as part of the folder, then the process captures other data frames associated with the folder (step 540). If no more frames are included in the folder, or the folder is the only data frame, then the process proceeds to step 545 .
在步骤545,决定关于该数据夹是否复用包含在SOTU存储单元中的状态值进行了时间分类。如果如此,在步骤550该状态值包括在游程散列值中(例如,按照包括通过附加、级联和任何其它的比特处理的方式相组合)。在步骤555,游程散列值利用捕获装置的私人密钥被数字化地标志。最终,在步骤560,状态值,如果时间分类则选择性地有游程散列值,以及签名被传输或存储在第二源中。然后该数据夹,序列号,状态值和数字签名可以在第二源中分析,以确定有效性,如图3所示。At step 545, a determination is made as to whether the folder reuses the state value contained in the SOTU storage unit for time sorting. If so, the state value is included in the run-length hash value (eg, combined in a manner including by appending, concatenation, and any other bit manipulation) at step 550 . At step 555, the run-length hash value is digitally signed using the capture device's private key. Finally, at step 560, the state value, optionally the run-length hash value if time sorted, and the signature are transmitted or stored in the second source. This data folder, serial number, state value and digital signature can then be analyzed in a second source to determine validity, as shown in Figure 3.
应该理解的是:当捕获数据夹的操作和对数据夹的数字标志数据夹不是原子时,该时间分类技术不能有效地使用(即操作是独立的)。原因是如果对于软件或其它固有不保安数据处理系统该数据夹是可获得的,就不能确保数据夹不在较早位置准时产生,并且之后在数字签名执行之前插入的状态值和/或序列号。该显著的特征在于SOTU存储单元的内容在数据夹捕获之前就被建立。该SOTU存储单元不能在步骤515和540之间装载(由装置的设计)。It should be appreciated that this temporal classification technique cannot be used effectively when the operations that capture the folder and the digital identification of the folder are not atomic (ie, the operations are independent). The reason is that if the data folder is available to software or other inherently insecure data processing systems, there is no way to ensure that the data folder is not generated on time at an earlier location and then inserted with status values and/or serial numbers before the digital signature is executed. This notable feature is that the contents of the SOTU storage unit are established prior to folder capture. The SOTU storage unit cannot be loaded between steps 515 and 540 (by device design).
参见图6,它显示了提供捕获数据夹的时间分类的时序事件的示例性时间线。第一个时间线600包括周期“Tx”,它表示每秒、分、小时、天、周或任何规定的时期所出现的周期性公开日。指数“n”和“m”表示整数,其中“Tn”出现在“Tn+m”之前。第二时间线610表示由捕获装置(更具体地是保安数据捕获装置)执行的所需连续的操作步骤(“Ot”,1≤t≥9),以便“时间分类”信息。这些操作步骤独立于上述的公开日期,它们被简单地用于示例目的。首先,在“Tn”之后,状态值被装入SOTU存储单元,比如公开的复合文摘或报纸首页电子版的散列。在其公开之前预测任何这些号的值都是不可能的。Referring to FIG. 6 , an exemplary timeline of time-series events providing a temporal classification of capture folders is shown. The first timeline 600 includes a period "Tx" which represents periodic public dates that occur every second, minute, hour, day, week, or any specified period of time. The indices "n" and "m" denote integers where "Tn" appears before "Tn+m". A
因此,第一个数据夹的数据帧的捕获在O2时开始,但一旦开始,SOTU存储单元可以不装载,直到当前操作结束。在第一数据帧被捕获之后,做出是否需要帧序列的决定。如果是,第一个序列号与第一数据帧关联,以产生第一序列化的数据帧,如O3所示。在该帧序列是不需要的情况下,该第一序列化的数据帧或第一数据帧被散列并在游程散列步骤O4中被存储。对于该数据夹的第二数据帧,该过程连续(如O5-O7所示),以及形成该数据夹的任何随后的数据帧。Therefore, the capture of the data frame of the first folder starts at O 2 , but once started, the SOTU memory unit may not be loaded until the current operation ends. After the first frame of data is captured, a decision is made whether a sequence of frames is required. If yes, the first serial number is associated with the first data frame to produce the first serialized data frame, as indicated by O3 . In case the frame sequence is not required, the first serialized data frame or first data frame is hashed and stored in a run-length hashing step 04 . This process continues (shown as 05-07 ) for the second data frame of the data folder, as well as forming any subsequent data frames of the data folder.
对于O8,在所有相关的操作完成之后,SOTU存储单元的状态值与该数据夹关联,以产生预期的数据夹。并且状态值包括到被数字化标志的游程散列值中。一旦标志完成,该SOTU存储单元可以在准备捕获下一个数据夹之时被装载。可是,应该理解的是游程散列值和其数字签名必须送到时间标记提供商业务,以对O9完成时间分类操作。For O 8 , after all related operations are completed, the status value of the SOTU storage unit is associated with the folder to generate the expected folder. And the state value is included in the hash value of the run length that is digitized. Once marked, the SOTU location can be loaded in preparation for capturing the next folder. However, it should be understood that the run-length hash value and its digital signature must be sent to the time stamp provider service to perform the time classification operation on the O9 .
通过设计硬件比如SOTU存储单元不能加载用于先前捕获数据夹,就可确保标志有特定状态值的任何数据夹必须在该状态值公开(在图6中标为时间点“Tn”)后由该装置捕获。通过将游程散列值送到时间标记业务提供商,就确保了在该点(在图6中标为时间点“Tn+m”)之前必须准时捕获该数据夹。因此,捕获的数据夹被“分类”在时间点Tn与Tn+m之间。By designing hardware such as SOTU storage units that cannot be loaded for previously captured data folders, it is ensured that any data folder marked with a particular state value must be retrieved by the device after that state value is disclosed (labeled as time point "Tn" in FIG. 6 ). capture. By sending the run-length hash value to the time-stamping service provider, it is ensured that the folder must be captured on time before this point (labeled time point "Tn+m" in FIG. 6). Thus, captured data folders are "categorized" between time points Tn and Tn+m.
尽管已经描述了本发明的各种实施例,但在不脱离本发明的精神和范围的情况下,本专业技术人员实现本发明的其它实施例是显而易见的。并且公知的电路和操作步骤没有详细地描述,以免不必要地限制本发明。因此本发明的范围应该由权利要求确定。While various embodiments of the invention have been described, it will be apparent to those skilled in the art that other embodiments of the invention can be practiced without departing from the spirit and scope of the invention. Also, well-known circuits and operating procedures have not been described in detail in order not to unnecessarily limit the invention. The scope of the invention should therefore be determined by the appended claims.
Claims (36)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/US1997/000958 WO1998034403A1 (en) | 1995-09-29 | 1997-01-30 | Apparatus and method for securing captured data transmitted between two sources |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1245612A CN1245612A (en) | 2000-02-23 |
| CN1161997C true CN1161997C (en) | 2004-08-11 |
Family
ID=22260267
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNB971816069A Expired - Fee Related CN1161997C (en) | 1997-01-30 | 1997-01-30 | Security device and method for capturing data transmitted between two sources |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN1161997C (en) |
| AU (1) | AU1834297A (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ATE505905T1 (en) * | 2001-02-09 | 2011-04-15 | Canon Kk | INFORMATION PROCESSING DEVICE AND ITS CONTROL METHODS, COMPUTER PROGRAM, AND STORAGE MEDIUM |
-
1997
- 1997-01-30 CN CNB971816069A patent/CN1161997C/en not_active Expired - Fee Related
- 1997-01-30 AU AU18342/97A patent/AU1834297A/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| CN1245612A (en) | 2000-02-23 |
| AU1834297A (en) | 1998-08-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5751809A (en) | Apparatus and method for securing captured data transmitted between two sources | |
| US5966446A (en) | Time-bracketing infrastructure implementation | |
| US5907619A (en) | Secure compressed imaging | |
| US8543825B2 (en) | Method and apparatus for input of coded image data | |
| US20070283158A1 (en) | System and method for generating a forensic file | |
| KR102523416B1 (en) | Security Device providing Security function for image, Camera Device having the same and System on Chip controlling Camera Device | |
| EP1750389A1 (en) | System and method for updating keys used for public key cryptography | |
| JPH10164549A (en) | System for hiding authentication information in images and image authentication system | |
| CN101039186A (en) | Method for auditing safely system log | |
| US20080276092A1 (en) | Method for Authentication of Sensor Data, and an Associated Sensor | |
| KR20220023992A (en) | Encryption key generation device and encryption key generation method | |
| US5946396A (en) | System and method for ensuring integrity of audio | |
| JP4261724B2 (en) | Signature data generation apparatus and image verification apparatus | |
| JP2023056492A (en) | signed video data with salted hash | |
| WO2014003497A1 (en) | Generation and verification of alternate data having specific format | |
| CN115412696A (en) | Digital evidence-obtaining image verification system | |
| CN1778065A (en) | Encryption method and device based on biometric identity | |
| US7389419B2 (en) | Methods for supplying cryptographic algorithm constants to a storage-constrained target | |
| CN117454442A (en) | Anonymous, secure and traceable distributed digital forensics methods and systems | |
| EP1271958A2 (en) | A method for authenticating animation | |
| CN108596050A (en) | The endorsement method and device and sign test method and apparatus of image | |
| CN1484901A (en) | Threshold Cipher Scheme for Message Authentication System | |
| US7930544B2 (en) | Data processing apparatus and its method | |
| CN1161997C (en) | Security device and method for capturing data transmitted between two sources | |
| US20110208969A1 (en) | Method and apparatus for providing authenticity and integrity to stored data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20040811 Termination date: 20160130 |
|
| EXPY | Termination of patent right or utility model |