[go: up one dir, main page]

CN1161997C - Security device and method for capturing data transmitted between two sources - Google Patents

Security device and method for capturing data transmitted between two sources Download PDF

Info

Publication number
CN1161997C
CN1161997C CNB971816069A CN97181606A CN1161997C CN 1161997 C CN1161997 C CN 1161997C CN B971816069 A CNB971816069 A CN B971816069A CN 97181606 A CN97181606 A CN 97181606A CN 1161997 C CN1161997 C CN 1161997C
Authority
CN
China
Prior art keywords
swimming
distance
folder
hashed value
semiconductor device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB971816069A
Other languages
Chinese (zh)
Other versions
CN1245612A (en
Inventor
D・L・达维斯
D·L·达维斯
P·琼斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority claimed from PCT/US1997/000958 external-priority patent/WO1998034403A1/en
Publication of CN1245612A publication Critical patent/CN1245612A/en
Application granted granted Critical
Publication of CN1161997C publication Critical patent/CN1161997C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A security data capture device, preferably implemented in a video camera, is used to protect captured data clips from undetected tampering. The security data capture device performs "time sort" and/or "sequence order" operations to maintain data integrity by two registers that store a "star state" ("SOTU") number and a serial number, respectively. The time classification is done by digitally signing the running hash value representing the folder appended to the SOTU number before the digital signature is "time stamped". The sequence alignment is done by digitally marking the digest of the data frame or frames along the sequence number.

Description

在两个源之间传送的捕获数据的保安装置和方法Security device and method for capturing data transmitted between two sources

发明背景Background of the invention

本发明涉及用于数据保安的装置和方法。更具体地,本发明涉及这样的半导体装置,它防止由捕获装置捕获的数据被未知地改变,并且它提供用于维持数据完整性的机制。The present invention relates to devices and methods for data security. More specifically, the present invention relates to a semiconductor device that prevents data captured by a capture device from being unknowingly altered and that provides a mechanism for maintaining data integrity.

技术领域technical field

随着个人电脑(“PC”)、网络和其它支持数字数据传送的设备变得更普遍,数据保安性的重要性剧增。为了数据保安性高度可靠,就必须确保在两个源之间传输的数据是“真实的”。用于保护数据完整性的一种有限的技术是通过存取控制(即用户识别和授权)。现在,当前所做的努力是利用一种称作为”生物测定学”的存取控制技术,它使用基本上用于设备保安性(例如:楼宇、房间等等)的捕获装置。生物测定学技术通常包括数字地扫描用户的特征(例如:指纹、虹膜、视网膜等等),以捕获该特征的至少一个或更多相似的多个数据帧(通常被称作为“数据夹”),并且将捕获的数据夹与先前存储的正本比较。如果捕获数据夹的某些特征与存储的母模的那些特征匹配,则该用户被识别并被授权。As personal computers ("PCs"), networks, and other devices that support the transfer of digital data become more common, the importance of data security increases dramatically. For data security to be highly reliable, it must be ensured that the data transmitted between two sources is "authentic". One limited technique for protecting data integrity is through access control (ie, user identification and authorization). Now, current efforts are using an access control technique called "biometrics," which uses capture devices that are basically used for equipment security (eg, buildings, rooms, etc.). Biometrics techniques typically involve digitally scanning a characteristic of a user (e.g., fingerprint, iris, retina, etc.) to capture at least one or more similar multiple frames of data (commonly referred to as "data clips") of that characteristic , and compare the captured folder with the previously stored copy. If certain characteristics of the capture folder match those of the stored master, the user is identified and authorized.

近几年,电子技术变得如此成熟,以致于如在目前特征胶片中由某些专门效果证明的那样数字地捕获的数据夹的改变变得更难以检测。结果,利用生物测定学的保安系统(此后单独地被称作为“生物系统”)现在被认为受制于捕获数据夹(data clip)的篡改,如果该生物系统没有实际连接到系统或分量处理或存储捕获数据夹的话。其原因是通信通道将最可能是向公众开放的,这就使黑客有这样的机会:将捕获的数据夹(i)替代原先记录的数据夹,(ii)从另一个位置实时传送或(iii)与其它不存在的图像或特征组合。In recent years, electronic technology has become so sophisticated that changes to digitally captured folders, as evidenced by certain specialized effects in current feature films, have become more difficult to detect. As a result, security systems utilizing biometrics (hereafter referred to individually as "biosystems") are now considered subject to tampering with captured data clips if the biometric system is not physically connected to the system or component processing or storage Capture folder words. The reason for this is that the communication channel will most likely be open to the public, giving the hacker the opportunity to (i) replace an originally recorded folder with a captured folder, (ii) transmit it in real time from another location or (iii) ) combined with other images or features that do not exist.

在保护数据完整性的努力方面,一种称为“时间标记”(time stamp)的技术最近已经被开发出来,并且由新译西州Chatham的Surety技术公司提供到商业上。如图1所示,由用户通过储存在本地源100中的加密保安散列(hash)算法120(例如:由加尼福尼亚Redwood市的RSA数据保安公司开发的“MD5”算法)处理数据组110(即数据流)来完成时间标记的一个例子。这就导致数字数据组合110从其任何尺寸映射到明显变小、固定尺寸,通常称作为没有信息内容的“文摘”130。In an effort to protect data integrity, a technology called "time stamping" has recently been developed and made commercially available by Surety Technologies of Chatham, New York. As shown in FIG. 1, data is processed by the user through a cryptographically secure hash algorithm 120 (e.g., the "MD5" algorithm developed by RSA Data Security, Inc. of Redwood, California) stored at a local source 100. An example of time-stamping is done by groups 110 (ie, data streams). This results in the digital data assembly 110 being mapped from any size thereof to a significantly smaller, fixed size, often referred to as a "digest" 130 with no information content.

典型地,文摘130被传送(最好是电子化地)到由虚线140表示的中心源150并且以后被散列并与从不同源来的一些其它文摘160按如所示的“二进制树”方式组合,因此,产生了许多“中间文摘”170,最后产生了合成的文摘180。接下来,合成的文摘180被广泛地公开(例如:打印在出版物上,分发到所有源,存储在置信数据库中,等等),以确立该数据组110至少在合成的文摘180公开之前已经存在了。可是,当前没有用于“时间分类”(time-bracketing)文摘130的机制,以确保数据组110在公开前存在于特定的时间点之后。捕获的数据夹的定时分类对于防止先前捕获的数据夹的伪冒是有用的。而且,也没有用于固定“顺序排列”数据夹的数据帧的机制,以防止数据帧的顺序被改变出现的次序,以达到出现所出现事件的某些序列。Typically, a digest 130 is transmitted (preferably electronically) to a central source 150 represented by dashed line 140 and is thereafter hashed and linked with some other digest 160 from a different source in a "binary tree" fashion as shown Combining, therefore, produces a number of "intermediate digests" 170 , resulting in a composite digest 180 . Next, the synthesized abstract 180 is widely published (e.g., printed in a publication, distributed to all sources, stored in a trusted database, etc.), to establish that the data set 110 has been exists. However, there is currently no mechanism for "time-bracketing" abstracts 130 to ensure that data sets 110 exist after a certain point in time before publication. Timed classification of captured folders is useful to prevent spoofing of previously captured folders. Also, there is no mechanism for fixing the data frames of the "ordered" folder to prevent the order of the data frames from being altered in order of occurrence to achieve some sequence of events that occur.

发明内容Contents of the invention

基于上面的描述,很明显需要在捕获装置中采用保安数据捕获装置,该捕获装置防止捕获的数据夹未经检测就被改变。另外,为了进一步保护数据夹的完整性,该保安数据捕获装置最好包括“时间分类”机制,它计算和建立数据夹必须由捕获装置捕获的时间周期,以及可选择地包括“顺序排列”机制,它确保多个数据帧出现在数据夹中的顺序。Based on the above description, it is apparent that there is a need to employ a secure data capture device in the capture device which prevents the captured data folder from being altered without detection. In addition, to further protect the integrity of the data folder, the security data capture device preferably includes a "time classification" mechanism that calculates and establishes the time period during which a data folder must be captured by the capture device, and optionally includes a "sequencing" mechanism , which ensures the order in which multiple dataframes appear in the folder.

根据本发明的一种半导体装置,包括A semiconductor device according to the present invention, comprising

传感装置,用于捕获数据夹;和a sensing device for capturing data folders; and

加密装置,连接到所述传感装置,用于保护所述数据夹的完整性,所述加密装置包括:An encryption device, connected to the sensing device, for protecting the integrity of the data folder, the encryption device comprising:

存储装置,用于存储唯一密钥对、游程散列值和状态值,storage means for storing the unique key pair, the run-length hash value, and the state value,

处理器装置,用于对所述数据夹执行操作,以确立该数据夹是在所述状态值公开之后且在对所述游程散列值进行时间标记操作之前被捕获,和processor means for performing an operation on said data folder to establish that the data folder was captured after said state value was disclosed and before said run hash value was time-stamped, and

总线装置,使所述处理器装置和所述存储装置通信,所述总线装置连接到所述处理器装置与所述存储装置。bus means for communicating said processor means and said memory means, said bus means being connected to said processor means and said memory means.

根据本发明的一种半导体装置,包括:A semiconductor device according to the present invention includes:

用于捕获数据夹的传感装置;和Sensing devices for capturing data folders; and

一个加密电路,它连接到所述传感装置,所述加密电路包括:an encryption circuit connected to said sensing device, said encryption circuit comprising:

多个存储单元,能包含一个状态值和一个游程散列值,该游程散列值是同所述状态值组合的所述数据夹的散列结果,在所述传感器被用于捕获所述数据夹之前,将所述状态值装载入所述多个存储单元的其中一个单元,a plurality of storage locations that can contain a state value and a run-length hash value that is the result of hashing the data folder combined with the state value at the time the sensor is used to capture the data Before clamping, loading the state value into one of the plurality of storage units,

一个处理器,它能够(i)在所述数据夹上执行操作产生所述散列值,(ii)数字地标志所述游程散列值和(iii)输出所述游程散列值,以用于时间-标记操作,和a processor capable of (i) performing operations on said data folder to generate said hash value, (ii) digitally marking said run-length hash value and (iii) outputting said run-length hash value for use in for time-stamping operations, and

一个总线,连接到所述多个存储单元和所述处理器,该总线使所述处理器与所述多个存储单元连通。A bus is connected to the plurality of memory units and the processor, the bus communicating the processor with the plurality of memory units.

根据本发明的一种保持从第一源发射至第二源的数据夹的完整性的方法,该方法包括步骤:A method of maintaining the integrity of a data folder transmitted from a first source to a second source according to the present invention, the method comprising the steps of:

将一个状态值装载到一个星系状态(SOTU)存储单元;load a state value into a system state (SOTU) memory unit;

捕获所述数据夹的第一数据帧;capture the first data frame of the folder;

通过至少对所述第一数据帧进行散列产生第一连续的数据帧;generating a first consecutive frame of data by hashing at least said first frame of data;

将所述第一连续的数据帧加到游程散列值;adding said first consecutive data frame to a run-length hash value;

将所述状态值加到所述游程散列值;adding the state value to the run hash value;

数字地标志所述游程散列值;和digitally sign the run hash value; and

对所述游程散列值执行时间-标记操作。A time-stamping operation is performed on the run hash value.

根据本发明的一种半导体装置,包括:A semiconductor device according to the present invention includes:

一个传感器,用于捕获数据夹;和a sensor to capture data clips; and

一个加密电路,连接到该传感器,所述加密电路包括:an encryption circuit connected to the sensor, said encryption circuit comprising:

多个存储单元,它能包含一个游程散列值和在捕获该数据夹之前装载的一个状态值,multiple storage locations, which can contain a run-length hash value and a state value loaded prior to capturing the folder,

一个处理器,连接到所述多个存储单元,所述处理器能时所述数据夹执行操作,以确立所述数据夹是在该状态值公开之后并且在所述游程散列值从加密电路输出之前被捕获的。a processor coupled to said plurality of storage units, said processor capable of performing operations on said data folder to establish that said data folder is after the state value is disclosed and after said run hash value is retrieved from the encryption circuit Output was previously captured.

根据本发明的一种加密电路,包括:A kind of encryption circuit according to the present invention comprises:

多个存储单元,包含一个游程散列值和先于捕获一数据夹装载的一个状态值;和memory locations containing a run-length hash value and a state value prior to capturing a folder load; and

处理器,连接到所述多个存储单元,所述处理器对所述数据夹执行操作,以确立该数据夹是在该状态值公开之后并且在包括一个游程散列值的信息公开之前被捕获的。a processor coupled to the plurality of storage units, the processor performing an operation on the data folder to establish that the data folder was captured after the state value was disclosed and before information including a run hash value was disclosed of.

根据本发明的一种用于保持被传输数据的完整性的方法,所述方法包括步骤:A method for maintaining the integrity of transmitted data according to the present invention, said method comprising the steps of:

从一个远程源得到一个状态值;get a state value from a remote source;

捕获第一数据帧;Capture the first data frame;

产生所述第一数据帧的散列结果;generating a hash result of the first data frame;

根据散列结果和一个状态值产生一个游程散列值;和generate a run-length hash value based on the hash result and a state value; and

对所述游程散列值执行时间-标记操作。A time-stamping operation is performed on the run hash value.

附图说明Description of drawings

从下面对本发明的详细描述,本发明的特征和优点将变得更清楚。The features and advantages of the present invention will become more apparent from the following detailed description of the present invention.

图1是产生合成的文摘的常规时标的流程图。Figure 1 is a flowchart of a conventional time stamp for generating a synthesized abstract.

图2是与保安数据捕获装置中采用的捕获装置组合工作的计算机系统的实施例的方框图。Figure 2 is a block diagram of an embodiment of a computer system operating in combination with a capture device employed in a security data capture device.

图3是由保安数据捕获装置完成的加密操作的方框图。Fig. 3 is a block diagram of the encryption operation performed by the security data capture device.

图4是保安数据捕获装置的一个实施例的方框图。Figure 4 is a block diagram of one embodiment of a security data capture device.

图5是一个流程图,它显示了为了保护捕获数据夹的完整性通过定时和顺序排列由保安数据捕获装置执行的那些处理步骤。Figure 5 is a flow chart showing those process steps performed by the secure data capture device in a timed and sequential order to protect the integrity of the captured data folder.

图6是一个定时流程图,它显示了数据夹是怎样被定时在两个时间点之间的。Figure 6 is a timing flow diagram showing how data folders are timed between two points in time.

具体实施方式Detailed ways

本发明涉及到一种最好是在捕获装置中采用的保安数据捕获装置以及其相应的操作方法。在下面的描述中,某些术语用于讨论某些公知的加密功能。例如,数据夹是为显示视频、音频和文本所需而被数字化为二进制数据的信息。该信息至少包括一个数据帧。“密钥”是编码和/或解码参数,由常规加密算法使用;即:公开密钥加密算法例如Rivest,Shamir和Adleman(“RSA”)、对称密钥加密算法如数据加密标准(“DES”)中规定的数据加密算法(“DEA”)等等。“证书”被定义为与一个实体相关的任何数字信息(典型地为一个公用密钥),用私人密钥加密,该私人密钥由另一个实体比如制造商或广泛公开的置信机构(例如:银行、政府部门、贸易协会等等)所掌握。“数字签名”类似于证书,但用于证实数据,而不是其发送者。The present invention relates to a security data capture device, preferably employed in a capture device, and a corresponding method of operation thereof. In the following description, certain terms are used to discuss certain well-known cryptographic functions. For example, data folders are information digitized into binary data required to display video, audio, and text. The information includes at least one data frame. "Keys" are encoding and/or decoding parameters used by conventional encryption algorithms; namely: public key encryption algorithms such as Rivest, Shamir and Adleman ("RSA"), symmetric key encryption algorithms such as Data Encryption Standard ("DES") ), the Data Encryption Algorithm ("DEA"), etc. A "certificate" is defined as any digital information (typically a public key) associated with an entity, encrypted with a private key issued by another entity such as a manufacturer or a widely publicized trusted authority (eg: owned by banks, government departments, trade associations, etc.). A "digital signature" is similar to a certificate, but authenticates data, not its sender.

现在参见图2,其中图示了采用了本发明且与计算机系统200关联操作的捕获装置215的说明性实施例。该计算机系统200包括具有内含存储器的PC平台的显示监示器205,处理硬件等。捕获装置215(例如摄像机、数字照相机等等)是与显示监示器205分离的,它可放入显示监示器205的外壳内,或如图所示将它安装在显示监示器205上面。当捕获装置215捕获所需数据的数据夹(例如,计算机用户220的物理特征)时,它通过通信线225将捕获到的数据传输到PC平台。通信线225可被描绘为一个电的或光纤的电缆,一个无线通信链路或类似物。Referring now to FIG. 2 , there is shown an illustrative embodiment of a capture device 215 employing the present invention and operating in association with computer system 200 . The computer system 200 includes a display monitor 205 having a PC platform with built-in memory, processing hardware, and the like. A capture device 215 (such as a video camera, digital camera, etc.) is separate from the display monitor 205 and can be placed within the housing of the display monitor 205, or it can be mounted on the display monitor 205 as shown . When capture device 215 captures a folder of desired data (eg, physical characteristics of computer user 220 ), it transmits the captured data to the PC platform via communication line 225 . Communication line 225 may be depicted as an electrical or fiber optic cable, a wireless communication link or the like.

由于通信线225是公众可存取的,这就威协了所捕获的数据夹的完整性,在捕获装置215中就采用了保安数据捕获装置230。该保安数据捕获装置230捕获数据夹,并且通过对每个捕获的数据帧或整个数据夹按照该实施实体采用的方法进行数字标志,将所捕获的数据夹安全地传输到PC平台210。Since the communication line 225 is publicly accessible, which threatens the integrity of the captured data folder, a secure data capture device 230 is employed in the capture device 215 . The security data capture device 230 captures the data folder, and securely transmits the captured data folder to the PC platform 210 by digitally marking each captured data frame or the entire data folder according to the method adopted by the implementing entity.

可是,应该想到存在着采用保安数据捕获装置的捕获装置的其它实施例。例如,捕获装置可包括内部存储能力。在那种情况下,保安数据捕获装置230在存储之前对数据夹进行标志,而不需要通信线225来建立与计算机系统的电连接。当然,应该想到的是捕获装置可以是一种音频记录装置,类似于图4(下面)的保安数据捕获装置,它对数字标志的音频夹进行数字化,而不是针对下面描述的可视图象。本发明的精神和范围保持在远离第二源的第一源中的保安数据捕获装置的实现,其努力的目的是保护两者之间数据传输的完整性。However, it is contemplated that there are other embodiments of capture devices that employ security data capture devices. For example, a capture device may include internal storage capabilities. In that case, the security data capture device 230 marks the data folder prior to storage without requiring the communication line 225 to establish an electrical connection with the computer system. Of course, it is contemplated that the capture device could be an audio recording device, similar to the security data capture device of Figure 4 (below), which digitizes audio clips of digital signatures rather than visual images as described below. The spirit and scope of the present invention remains in the implementation of a secure data capture device in a first source remote from a second source, in an effort to protect the integrity of data transmissions between the two.

如上所述,数字签名用于上述的实施例,以保护从捕获装置传输来的数据夹内容的完整性,并证实计算机用户的身份,而不需要没有必要地修改数据夹。如图3所示,数字310从数据夹315中产生,由第一源300(例如图2的捕获装置215)获得,有选择地与所示的附加信息335组合,由第一源300中的加密保安散列算法320完成算术“散列”操作。这就使得数据夹315从其任意尺寸(典型大小)映射成明显小的尺寸,通常称为“文摘”330。文摘330在时间方式上的反向工程实际上是不可能的。因此,该文摘330用保安数据捕获装置230的私人密钥“PRK1”340来加密。数字310伴随着加密数据325,该加密数据可能使用第二源350的公众密钥(“PUK2”)355由RSA加密或者使用DES由公认的对称密钥加密,尽管加密是不需要的,因为它被传输到第二个源350(例如PC平台,存储器或任何其它可接收数据的装置)。As noted above, digital signatures are used in the embodiments described above to protect the integrity of folder contents transferred from the capture device and to verify the identity of the computer user without unnecessarily modifying the folder. As shown in FIG. 3 , numbers 310 are generated from data folder 315, obtained by first source 300 (e.g., capture device 215 of FIG. 2 ), optionally combined with additional information 335 as shown, obtained by A cryptographically secure hash algorithm 320 performs an arithmetic "hashing" operation. This allows data folder 315 to be mapped from its arbitrary size (typical size) to a significantly smaller size, commonly referred to as a "digest" 330 . Reverse engineering of Digest 330 in time mode is practically impossible. Accordingly, the digest 330 is encrypted with the private key “PRK1” 340 of the security data capture device 230 . The number 310 is accompanied by encrypted data 325 which may be encrypted by RSA using a public key ("PUK2") 355 of a second source 350 or by a recognized symmetric key using DES, although encryption is not required because it is transmitted to a second source 350 (eg PC platform, memory or any other device that can receive data).

如果必要的话,第二个源350使用其私人密钥“PRK2”360(或公认的DES密钥)对数据325进行解密,并对接收的数据进行散列操作,最好还有附加信息335,该操作与在第一源300中进行的散列操作相同,以产生第二文摘370。同时,第二源350也使用保安数据捕获装置的公众密钥“PUK1”345来解密数字签名310,以获得数字签名310的文摘。“PUK1”345可以通过传输证书(例如制造者的证书)由第一源来提供,这是现有技术中的公知技术。文摘330和370比较,并且如果它们相同,就可确保数据的完整性和发送者的授权。If necessary, the second source 350 decrypts the data 325 using its private key "PRK2" 360 (or a recognized DES key) and hashes the received data, preferably with additional information 335, This operation is the same as the hashing operation performed in the first source 300 to generate the second digest 370 . At the same time, the second source 350 also uses the public key “PUK1” 345 of the security data capture device to decrypt the digital signature 310 to obtain a digest of the digital signature 310 . "PUK1" 345 may be provided by the first source by transmitting a certificate, such as a manufacturer's certificate, which is well known in the art. Digests 330 and 370 are compared, and if they are identical, integrity of the data and authorization of the sender are ensured.

参见图4,它显示了保安数据捕获装置230的一个实施例。保安数据捕获装置230包括数据捕获电路235和加密电路240,两者最好是集成到一个集成电路包中,以减少物理窜改的弱点。数据捕获电路235是一个常规的传感器,比如电荷耦合装置“CCD”(摄录机中使用的标准传感器)、由苏格兰爱丁堡的VLSI Vision有限公司开发的基于DRAM的视频传感器,或任何其它类似的技术。总体来说,视频捕获电路235包括象素捕获阵列400和用于控制象素捕获阵列400的控制逻辑405。Referring to FIG. 4, one embodiment of a security data capture device 230 is shown. Security data capture device 230 includes data capture circuitry 235 and encryption circuitry 240, both preferably integrated into a single integrated circuit package to reduce vulnerability to physical tampering. The data capture circuit 235 is a conventional sensor such as a Charge Coupled Device "CCD" (the standard sensor used in camcorders), a DRAM based video sensor developed by VLSI Vision Ltd of Edinburgh, Scotland, or any other similar technology . In general, video capture circuitry 235 includes pixel capture array 400 and control logic 405 for controlling pixel capture array 400 .

加密电路240包括处理单元410,它通过内部总线435连接到非易失性存储器415(例如:EPROM,闪速EPROM VROM EEPROM等,夹序列(“CS”)存储单元420,帧序列(“FS”)存储单元421,星系状态(“SOTU”)存储单元425,以及可选择地,随机数发生器430,该加密电路最好与数据捕获电路235在相同的硅片上形成。处理电路410包括硬件411(例如:闪速存储器、只读存储器“ROM”、随机存取存储器“RAM”等等)用于对数字标志的信息执行RSA算法并完成散列操作,并且存储游程散列值(在后面描述)。可选择地,加密加速硬件412可以采用到该处理单元410,如虚线所示的。The encryption circuit 240 includes a processing unit 410, which is connected by an internal bus 435 to a non-volatile memory 415 (e.g., EPROM, Flash EPROM VROM EEPROM, etc., a clip sequence (“CS”) storage unit 420, a frame sequence (“FS”) ) storage unit 421, a state of the galaxy ("SOTU") storage unit 425, and optionally, a random number generator 430, the encryption circuit is preferably formed on the same silicon chip as the data capture circuit 235. The processing circuit 410 includes hardware 411 (for example: flash memory, read-only memory "ROM", random access memory "RAM", etc.) is used to perform the RSA algorithm on the information of the digital sign and complete the hash operation, and store the run-length hash value (later description). Optionally, encryption acceleration hardware 412 may be used in the processing unit 410, as shown by the dotted line.

为了授权的目的,非易失性存储器415也存储与保安数据捕获装置230和制造商证书440相关的唯一公众/私人密钥对340和345。该唯一的公众/私人密钥对340和345的内部存储允许在从处理单元410传输到远端位于第二源的另一个处理器或存储装置之前对捕获的数据夹进行加密和/或在保安数据捕获装置230之内进行数字标志。另外,该唯一的公众/私人密钥对240,245和制造商的证书440允许远端系统(例如PC平台)唯一地识别捕获装置,并授予它候选/响应协议,并且如果需要的话建立对称的“对话”密钥,以支持“对称密钥加密”,以减少加密和解密数据的等待时间。结果,就不可能在这些源之间的通信通道之间进行搭接窃听并且替代先前记录的夹或改变捕获的数据夹,而不被第二源检测到。Non-volatile memory 415 also stores unique public/private key pairs 340 and 345 associated with security data capture device 230 and manufacturer certificate 440 for authorization purposes. The internal storage of this unique public/private key pair 340 and 345 allows the captured data folder to be encrypted and/or secured in security prior to transmission from the processing unit 410 to another processor or storage device located remotely at a second source. Digital signage is performed within the data capture device 230 . In addition, the unique public/private key pair 240, 245 and manufacturer's certificate 440 allow the remote system (e.g. PC platform) to uniquely identify the capture device, grant it a candidate/response protocol, and establish a symmetric "Conversation" keys to support "symmetric key encryption" to reduce latency for encrypting and decrypting data. As a result, it is not possible to eavesdrop on the communication channels between these sources and replace previously recorded clips or alter captured data clips without being detected by a second source.

最好是CS存储单元420和FS存储单元421为32比特寄存器,它收集地存储64比特的序列号,该序列号在数据帧的每次捕获后增加。因此,该64比特序列号对由保安数据捕获装置230捕获的每个数据帧是终身唯一的。理想地,该序列号每次增加时,它被永久地存储并在掉电的情况下能恢复。可是,这就需要异常的高速(例如:对于视频捕获为60次/秒)来存储该序列号。Preferably, the CS storage unit 420 and the FS storage unit 421 are 32-bit registers which collectively store a 64-bit sequence number which increments after each capture of a data frame. Thus, the 64-bit sequence number is unique for the lifetime of each data frame captured by the security data capture device 230 . Ideally, each time the serial number is incremented, it is permanently stored and restored in the event of a power loss. However, this requires exceptionally high speed (eg: 60 times/sec for video capture) to store the serial number.

为了避免产生高存储速率,该序列号被存储在两个部分。更具体地,该序列号的“最重要”部分被存储在CS存储单元420中,而该序列号的“不重要”部分被存储在FS存储单元421中。结果,FS存储单元421在每次数据帧捕获之后增加;可是,CS寄存器420只在下列条件出现时才增加:To avoid high storage rates, the sequence number is stored in two parts. More specifically, the “most significant” part of the serial number is stored in the CS storage unit 420 , while the “unimportant” part of the serial number is stored in the FS storage unit 421 . As a result, FS storage location 421 is incremented after each data frame capture; however, CS register 420 is only incremented when the following conditions occur:

(1)FS存储单元出现满载时(即FS存储单元从“FFFFFFFF“滚动到”0000000”);或(1) When the FS storage unit is fully loaded (that is, the FS storage unit rolls from "FFFFFFFF" to "0000000"); or

(2)保安数据捕获装置被加电时。(2) When the security data capture device is powered on.

用这种结构,FS存储单元421可位于易失性的存储器中,而CS存储单元420位于非易失性存储器中。当电源被维持时,该序列号顺序地增加(从不重复),还有在保安数据捕获装置断电之前,在每232个连续捕获之后该序列号的所需状态只是“逻辑的”。With this structure, the FS storage unit 421 can be located in volatile memory, while the CS storage unit 420 is located in non-volatile memory. The serial number increments sequentially (never repeating) while power is maintained, and the required state of the serial number is only "logical" after every 232 consecutive captures until the security data capture device is powered down.

如果保安数据捕获装置掉电,存储在FS存储单元421中的值(即“帧序列”)被丢失,但存储在CS存储装置420中的值(即“夹序列”)在下一个通电时增加,结果导致新捕获数据夹的唯一序列号的新设置。因此,即使某些帧序列号被重新使用,确保了该数据夹的每个数据帧的唯一性。If the security data capture device is powered down, the value stored in FS storage unit 421 (i.e., the "frame sequence") is lost, but the value stored in CS storage unit 420 (i.e., the "clip sequence") is incremented on the next power-up, The result is a new setting of unique serial numbers for newly captured folders. Therefore, even if some frame sequence numbers are reused, the uniqueness of each data frame of the folder is ensured.

最好是,SOTU存储单元425能够存储表示大数的288个数据比特。该SOTU存储单元425在系统控制从保安数据捕获装置外部(例如从相关的PC系统)装载有状态信息状态值,并可在捕获数据夹之前的任何时间重新装载,这依赖于该状态信息。该状态信息是在特定的位置按时以这样一种方式产生的,即在该位置之前的任何时间是不可预见的。例如,该状态信息可以是一个合成的文摘,它是可能的百万个数据组的散列值,在由时标业务提供商对其公开的时刻之前,实际上是不可预测的。该SOTU存储单元425在断电时可以或不可以清除。Preferably, SOTU storage unit 425 is capable of storing 288 data bits representing a large number. The SOTU storage unit 425 is loaded with status information status values from outside the security data capture device (eg, from an associated PC system) at system control, and can be reloaded at any time prior to capturing a data folder, depending on the status information. The status information is generated at a particular location on time in such a way that any time prior to that location is unforeseeable. For example, the state information may be a composite digest, which is the hash value of potentially millions of data sets, virtually unpredictable until the moment it is made public by the time-stamping service provider. The SOTU storage unit 425 may or may not be cleared upon power down.

随机号产生发生器430用于产生唯一的公众和私人密钥,如在名称为“提供保安通信的装置和方法”的待审申请(申请系列号为08/251486)中,它是由本发明的共同发明人Derek L.Davis提出的。其使用最好是依据是否需要加密功能而定的,但是可选择的(如由虚线所示的那样)。Random Number Generation Generator 430 is used to generate unique public and private keys as in pending application entitled "Apparatus and Method for Providing Secure Communications" (Application Serial No. 08/251486) by the present invention Co-inventor Derek L. Davis proposed. Its use is preferably contingent on whether the encryption function is required, but is optional (as indicated by the dashed lines).

现在参考图5,它图示了在传输保安数据到第二源中由保安数据捕获装置完成的操作步骤。SOTU存储单元包含从该装置外部先前装载的状态信息(“状态值”),一旦图5中描述的步骤开始,它就不能改变。换句话说,图5表示“原子”过程,其间,SOTU存储单元的内容不能修改。Reference is now made to FIG. 5, which illustrates the operational steps performed by the security data capture device in transmitting security data to a second source. The SOTU storage unit contains previously loaded state information ("state value") from outside the device, which cannot be changed once the steps described in FIG. 5 have started. In other words, Figure 5 represents an "atomic" process during which the contents of the SOTU memory unit cannot be modified.

在捕获数据夹之前,在步骤505内部存储的”游程散列”值被初始化为0。游程散列是在传输时间分类之前存储在计算机中的连续更新的散列值。在步骤510,数据夹的数据帧由装置的传感器(例如:CCD象素传感器阵列)捕获,并且在步骤515序列号增加1。如果帧序列是需要的(步骤520),那么序列号是与数据帧关联的,以在步骤525产生序列的数据帧。之后,数据帧或序列化的数据帧被散列,以合成为游程散列值(步骤530)。在单帧捕获的情况下(与夹相对),游程散列值将只表示数据帧的散列值或序列化的数据夹,由于没有数据帧先前被包括到该游程散列值中。The "run hash" value stored internally at step 505 is initialized to zero before capturing the folder. A run-length hash is a continuously updated hash value stored in the computer prior to transmission time classification. At step 510, the data frame of the folder is captured by the device's sensor (eg, CCD pixel sensor array), and at step 515 the sequence number is incremented by one. If a frame sequence is desired (step 520 ), then a sequence number is associated with the data frame to generate a sequence of data frames at step 525 . Thereafter, the data frame or serialized data frame is hashed to synthesize a run-length hash value (step 530). In the case of a single frame capture (as opposed to clips), the run hash value will only represent the hash value of the data frame or the serialized data clip since no data frame was previously included in the run hash value.

下面,数据帧或序列化数据可以传送到第二个源或存储在外部(步骤535)。另外,数据帧或序列化数据夹可以在这种传输或存储之前选择地被加密(为了私人的目的)。如果该数据夹被捕获,其中对于每个单独的数据帧不需要标志,而且更多的帧被捕获作为数据夹的部分,然后该过程捕获与该数据夹相关的其它数据帧(步骤540)。如果在该数据夹中没有包括更多的帧,或数据夹只是唯一的数据帧,则过程进入到步骤545。Next, the data frame or serialized data can be transmitted to a second source or stored externally (step 535). Additionally, data frames or serialized folders may optionally be encrypted (for privacy purposes) prior to such transmission or storage. If the folder is captured, where no flags are required for each individual data frame, and more frames are captured as part of the folder, then the process captures other data frames associated with the folder (step 540). If no more frames are included in the folder, or the folder is the only data frame, then the process proceeds to step 545 .

在步骤545,决定关于该数据夹是否复用包含在SOTU存储单元中的状态值进行了时间分类。如果如此,在步骤550该状态值包括在游程散列值中(例如,按照包括通过附加、级联和任何其它的比特处理的方式相组合)。在步骤555,游程散列值利用捕获装置的私人密钥被数字化地标志。最终,在步骤560,状态值,如果时间分类则选择性地有游程散列值,以及签名被传输或存储在第二源中。然后该数据夹,序列号,状态值和数字签名可以在第二源中分析,以确定有效性,如图3所示。At step 545, a determination is made as to whether the folder reuses the state value contained in the SOTU storage unit for time sorting. If so, the state value is included in the run-length hash value (eg, combined in a manner including by appending, concatenation, and any other bit manipulation) at step 550 . At step 555, the run-length hash value is digitally signed using the capture device's private key. Finally, at step 560, the state value, optionally the run-length hash value if time sorted, and the signature are transmitted or stored in the second source. This data folder, serial number, state value and digital signature can then be analyzed in a second source to determine validity, as shown in Figure 3.

应该理解的是:当捕获数据夹的操作和对数据夹的数字标志数据夹不是原子时,该时间分类技术不能有效地使用(即操作是独立的)。原因是如果对于软件或其它固有不保安数据处理系统该数据夹是可获得的,就不能确保数据夹不在较早位置准时产生,并且之后在数字签名执行之前插入的状态值和/或序列号。该显著的特征在于SOTU存储单元的内容在数据夹捕获之前就被建立。该SOTU存储单元不能在步骤515和540之间装载(由装置的设计)。It should be appreciated that this temporal classification technique cannot be used effectively when the operations that capture the folder and the digital identification of the folder are not atomic (ie, the operations are independent). The reason is that if the data folder is available to software or other inherently insecure data processing systems, there is no way to ensure that the data folder is not generated on time at an earlier location and then inserted with status values and/or serial numbers before the digital signature is executed. This notable feature is that the contents of the SOTU storage unit are established prior to folder capture. The SOTU storage unit cannot be loaded between steps 515 and 540 (by device design).

参见图6,它显示了提供捕获数据夹的时间分类的时序事件的示例性时间线。第一个时间线600包括周期“Tx”,它表示每秒、分、小时、天、周或任何规定的时期所出现的周期性公开日。指数“n”和“m”表示整数,其中“Tn”出现在“Tn+m”之前。第二时间线610表示由捕获装置(更具体地是保安数据捕获装置)执行的所需连续的操作步骤(“Ot”,1≤t≥9),以便“时间分类”信息。这些操作步骤独立于上述的公开日期,它们被简单地用于示例目的。首先,在“Tn”之后,状态值被装入SOTU存储单元,比如公开的复合文摘或报纸首页电子版的散列。在其公开之前预测任何这些号的值都是不可能的。Referring to FIG. 6 , an exemplary timeline of time-series events providing a temporal classification of capture folders is shown. The first timeline 600 includes a period "Tx" which represents periodic public dates that occur every second, minute, hour, day, week, or any specified period of time. The indices "n" and "m" denote integers where "Tn" appears before "Tn+m". A second timeline 610 represents the required sequential operational steps ("Ot", 1≤t≥9) performed by a capture device, more specifically a security data capture device, in order to "time classify" information. These operational steps are independent of the publication date mentioned above and they are used simply for illustration purposes. First, after "Tn", a state value is loaded into a SOTU storage unit, such as a published compound abstract or a hash of the electronic version of a newspaper's front page. It is impossible to predict the value of any of these numbers prior to their publication.

因此,第一个数据夹的数据帧的捕获在O2时开始,但一旦开始,SOTU存储单元可以不装载,直到当前操作结束。在第一数据帧被捕获之后,做出是否需要帧序列的决定。如果是,第一个序列号与第一数据帧关联,以产生第一序列化的数据帧,如O3所示。在该帧序列是不需要的情况下,该第一序列化的数据帧或第一数据帧被散列并在游程散列步骤O4中被存储。对于该数据夹的第二数据帧,该过程连续(如O5-O7所示),以及形成该数据夹的任何随后的数据帧。Therefore, the capture of the data frame of the first folder starts at O 2 , but once started, the SOTU memory unit may not be loaded until the current operation ends. After the first frame of data is captured, a decision is made whether a sequence of frames is required. If yes, the first serial number is associated with the first data frame to produce the first serialized data frame, as indicated by O3 . In case the frame sequence is not required, the first serialized data frame or first data frame is hashed and stored in a run-length hashing step 04 . This process continues (shown as 05-07 ) for the second data frame of the data folder, as well as forming any subsequent data frames of the data folder.

对于O8,在所有相关的操作完成之后,SOTU存储单元的状态值与该数据夹关联,以产生预期的数据夹。并且状态值包括到被数字化标志的游程散列值中。一旦标志完成,该SOTU存储单元可以在准备捕获下一个数据夹之时被装载。可是,应该理解的是游程散列值和其数字签名必须送到时间标记提供商业务,以对O9完成时间分类操作。For O 8 , after all related operations are completed, the status value of the SOTU storage unit is associated with the folder to generate the expected folder. And the state value is included in the hash value of the run length that is digitized. Once marked, the SOTU location can be loaded in preparation for capturing the next folder. However, it should be understood that the run-length hash value and its digital signature must be sent to the time stamp provider service to perform the time classification operation on the O9 .

通过设计硬件比如SOTU存储单元不能加载用于先前捕获数据夹,就可确保标志有特定状态值的任何数据夹必须在该状态值公开(在图6中标为时间点“Tn”)后由该装置捕获。通过将游程散列值送到时间标记业务提供商,就确保了在该点(在图6中标为时间点“Tn+m”)之前必须准时捕获该数据夹。因此,捕获的数据夹被“分类”在时间点Tn与Tn+m之间。By designing hardware such as SOTU storage units that cannot be loaded for previously captured data folders, it is ensured that any data folder marked with a particular state value must be retrieved by the device after that state value is disclosed (labeled as time point "Tn" in FIG. 6 ). capture. By sending the run-length hash value to the time-stamping service provider, it is ensured that the folder must be captured on time before this point (labeled time point "Tn+m" in FIG. 6). Thus, captured data folders are "categorized" between time points Tn and Tn+m.

尽管已经描述了本发明的各种实施例,但在不脱离本发明的精神和范围的情况下,本专业技术人员实现本发明的其它实施例是显而易见的。并且公知的电路和操作步骤没有详细地描述,以免不必要地限制本发明。因此本发明的范围应该由权利要求确定。While various embodiments of the invention have been described, it will be apparent to those skilled in the art that other embodiments of the invention can be practiced without departing from the spirit and scope of the invention. Also, well-known circuits and operating procedures have not been described in detail in order not to unnecessarily limit the invention. The scope of the invention should therefore be determined by the appended claims.

Claims (36)

1. security personnel that catch data that are used for transmitting between two sources semiconductor device is used to comprise
Sensing device is used to catch data folder; With
Encryption device is connected to described sensing device, is used to protect the integrality of described data folder,
It is characterized in that,
Described encryption device comprises:
Storage device is used to store unique key to, distance of swimming hashed value and state value,
Processor device is used for described data folder executable operations, with establish this data folder be described state value openly after and described distance of swimming hashed value is being carried out time mark operation before be hunted down and
Bus unit makes described processor device and described storage communication, and described bus unit is connected to described processor device and described storage device.
2. according to the described semiconductor device of claim 1, it is characterized in that the described storage device of described encryption device is further stored a sequence number at least, for each Frame of described data folder, it is unique.
3. according to the described semiconductor device of claim 2, it is characterized in that the described storage device of described encryption device comprises a Nonvolatile memery unit.
4. according to the described semiconductor device of claim 3, it is characterized in that the described storage device of described encryption device also comprises a volatile memory-elements.
5. according to the described semiconductor device of claim 4, it is characterized in that, the described storage device of described encryption device also comprises a folder sequence memory cell, and described folder sequence memory cell is a nonvolatile memory, and it is included as the folder sequence number of more than first bit of described sequence number.
6. according to the described semiconductor device of claim 5, it is characterized in that, the described storage device of described encryption device also comprises a frame sequence memory cell, and described frame sequence memory cell is a volatile memory, and it is included as the number of frames of more than second bit of described sequence number.
7. according to the described semiconductor device of claim 6, it is characterized in that the described storage device of described encryption device also comprises a state storage unit, it is included in described sensing device and catches the described state value that loads before the described data folder.
8. according to the described semiconductor device of claim 1, it is characterized in that described sensing device is the transducer that comprises the pixel capture array and be used to control the control logic of described pixel capture array.
9. according to the described semiconductor device of claim 1, it is characterized in that, before described data folder was stored in the described storage device, described processing unit was carried out Hash operation to described data folder and is made it to become described distance of swimming hashed value, and described distance of swimming hashed value is the hashed value of a continuous updating.
10. according to the described semiconductor device of claim 9, it is characterized in that, described processor device produces the hash result to each Frame of described data folder, and wherein each hash result sequentially is stored in the described storage device, jointly to produce described distance of swimming hashed value.
11. according to the described semiconductor device of claim 10, it is characterized in that, described processor device links described distance of swimming hashed value and described state value, to produce the distance of swimming hashed value of a renewal, and the distance of swimming hashed value that digitally indicates described renewal is to output to an external source of time of implementation marking operation.
12. according to the described semiconductor device of claim 11, it is characterized in that, before described processor device links distance of swimming hashed value and described state value, described processing unit also links at least one hashed value and corresponding sequence number, to produce a continuous Frame that forms described data folder.
13., it is characterized in that described encryption device also comprises a randomizer according to the described semiconductor device of claim 1, right to produce described unique key.
14. a semiconductor device comprises:
Be used to catch the sensing device of data folder; With
An encrypted circuit, it is connected to described sensing device, and described encrypted circuit comprises:
A plurality of memory cell, can comprise a state value and a distance of swimming hashed value, this distance of swimming hashed value is the hash result with the described data folder of described state value combination, before described transducer is used to catch described data folder, described state value is loaded into one of them unit of described a plurality of memory cell
A processor, it can (i) executable operations on described data folder produce described hashed value, (ii) digitally indicate described distance of swimming hashed value and (iii) export described distance of swimming hashed value, be used for time-marking operation and
A bus is connected to described a plurality of memory cell and described processor, and this bus makes described processor be communicated with described a plurality of memory cell.
15., it is characterized in that described a plurality of memory cell of described encrypted circuit comprise according to the described semiconductor device of claim 14:
A non-volatile cell, it is right to comprise a unique key;
A memory cell can comprise described distance of swimming hashed value;
A galaxy state storage unit can be included in described transducer and catch the described state value that is loaded before the described data folder;
A folder sequence memory cell can comprise a folder sequence number that increases after this semiconductor device energized; With
A frame sequence memory cell can comprise one and catch the number of frames that increases behind the data folder at described transducer, and described number of frames is added to described folder sequence number to form a sequence number.
16., it is characterized in that the described non-volatile memory cells of described at least encrypted circuit and described folder sequence memory cell are made of nonvolatile memory according to the described semiconductor device of claim 15.
17., it is characterized in that the described frame sequence memory cell of described at least encrypted circuit is made of volatile memory according to the described semiconductor device of claim 16.
18., it is characterized in that described encrypted circuit also comprises a randomizer that is coupled to described bus according to the described semiconductor device of claim 14.
19., it is characterized in that described transducer comprises a pixel capture array and is used to control the control logic of described pixel capture array according to the described semiconductor device of claim 14.
20. according to the described semiconductor device of claim 14, it is characterized in that, before the described processor of described encrypted circuit produces described distance of swimming hash result, described processor to Frame of major general and corresponding sequence number links, to produce the continuous Frame that at least one forms described data folder.
21. wherein each the described semiconductor device according to claim 14 to 20 is characterized in that, described a plurality of memory cell constitute a single memory device.
22. a maintenance is emitted to the method for integrality of the data folder in second source from first source, the method comprising the steps of:
A state value is loaded into a galaxy state storage unit;
Catch first Frame of described data folder;
Produce the first continuous Frame by at least described first Frame being carried out hash;
The described first continuous Frame is added to distance of swimming hashed value;
After the described first continuous Frame is added to distance of swimming hashed value, described state value is added to described distance of swimming hashed value;
Digitally indicate described distance of swimming hashed value; With
To described distance of swimming hashed value time of implementation-marking operation.
23. in accordance with the method for claim 22, it is characterized in that before catching the described step of described first Frame, this method also comprises a sequence number update to described first source.
24. in accordance with the method for claim 23, it is characterized in that the loading of described sequence number comprises:
With a folder sequence number update that is stored in described first source, described folder sequence number is a plurality of higher bit that forms described sequence number.
25. in accordance with the method for claim 24, it is characterized in that the loading of described sequence number also comprises:
A number of frames that is stored in described first source is upgraded, and described number of frames is a plurality of bits of the described sequence number of formation except that the described a plurality of bits that form described folder sequence number.
26. in accordance with the method for claim 24, it is characterized in that the generation of the described first continuous Frame comprises:
The described sequence number that described first Frame is relevant with described first Frame links, to produce the described first continuous Frame.
27. a semiconductor device comprises:
A transducer is used to catch data folder; With
An encrypted circuit is connected to this transducer, and described encrypted circuit comprises:
A plurality of memory cell, the state value that it can comprise a distance of swimming hashed value and load before catching this data folder,
A processor is connected to described a plurality of memory cell, and described processor can be to described data folder executable operations, with establish described data folder be this state value openly after and captive before the described encrypted circuit output in described distance of swimming hashed value.
28., it is characterized in that described processor is carried out Hash function to described data folder according to the described semiconductor device of claim 27, so that produce a hash result, described distance of swimming hashed value is the hashed value of a continuous updating.
29., it is characterized in that described processor produces a hash result to each Frame of this data folder, so that produce described distance of swimming hashed value according to the described semiconductor device of claim 28.
30. the semiconductor device according to claim 26 is characterized in that, it plays a microprocessor.
31. an encrypted circuit comprises:
A plurality of memory cell comprise a distance of swimming hashed value and prior to catching the state value that a data folder loads; With
Processor is connected to described a plurality of memory cell, and described processor is to described data folder executable operations, with establish this data folder be this state value openly after and comprising the information disclosure of a distance of swimming hashed value before captive.
32., it is characterized in that the operation of processor is carried out Hash operation to described data folder before being included in and sequentially being stored in the described memory cell as described distance of swimming hashed value described data folder according to the described encrypted circuit of claim 31.
33., it is characterized in that the operation of described processor comprises that a Frame of the described data folder from described memory cell produces a hash result, produces described distance of swimming hashed value with the concentrated area according to the described encrypted circuit of claim 31.
34., it is characterized in that the operation of described processor comprises that described state value is attached to described distance of swimming hashed value and digitlization ground sign has the described distance of swimming hashed value of described state value according to the described encrypted circuit of claim 33.
35. according to the described encrypted circuit of claim 33, it is characterized in that, also described hash result linked to produce the continuous data frame that at least one forms data folder with corresponding sequence number.
36. a method that is used to keep be transmitted the integrality of data, described method comprises step:
Obtain a state value from a remote source;
Catch first Frame;
Produce the hash result of described first Frame;
Produce a distance of swimming hashed value according to hash result and described state value; With to described distance of swimming hashed value time of implementation-marking operation.
CNB971816069A 1997-01-30 1997-01-30 Security device and method for capturing data transmitted between two sources Expired - Fee Related CN1161997C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1997/000958 WO1998034403A1 (en) 1995-09-29 1997-01-30 Apparatus and method for securing captured data transmitted between two sources

Publications (2)

Publication Number Publication Date
CN1245612A CN1245612A (en) 2000-02-23
CN1161997C true CN1161997C (en) 2004-08-11

Family

ID=22260267

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB971816069A Expired - Fee Related CN1161997C (en) 1997-01-30 1997-01-30 Security device and method for capturing data transmitted between two sources

Country Status (2)

Country Link
CN (1) CN1161997C (en)
AU (1) AU1834297A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE505905T1 (en) * 2001-02-09 2011-04-15 Canon Kk INFORMATION PROCESSING DEVICE AND ITS CONTROL METHODS, COMPUTER PROGRAM, AND STORAGE MEDIUM

Also Published As

Publication number Publication date
CN1245612A (en) 2000-02-23
AU1834297A (en) 1998-08-25

Similar Documents

Publication Publication Date Title
US5751809A (en) Apparatus and method for securing captured data transmitted between two sources
US5966446A (en) Time-bracketing infrastructure implementation
US5907619A (en) Secure compressed imaging
US8543825B2 (en) Method and apparatus for input of coded image data
US20070283158A1 (en) System and method for generating a forensic file
KR102523416B1 (en) Security Device providing Security function for image, Camera Device having the same and System on Chip controlling Camera Device
EP1750389A1 (en) System and method for updating keys used for public key cryptography
JPH10164549A (en) System for hiding authentication information in images and image authentication system
CN101039186A (en) Method for auditing safely system log
US20080276092A1 (en) Method for Authentication of Sensor Data, and an Associated Sensor
KR20220023992A (en) Encryption key generation device and encryption key generation method
US5946396A (en) System and method for ensuring integrity of audio
JP4261724B2 (en) Signature data generation apparatus and image verification apparatus
JP2023056492A (en) signed video data with salted hash
WO2014003497A1 (en) Generation and verification of alternate data having specific format
CN115412696A (en) Digital evidence-obtaining image verification system
CN1778065A (en) Encryption method and device based on biometric identity
US7389419B2 (en) Methods for supplying cryptographic algorithm constants to a storage-constrained target
CN117454442A (en) Anonymous, secure and traceable distributed digital forensics methods and systems
EP1271958A2 (en) A method for authenticating animation
CN108596050A (en) The endorsement method and device and sign test method and apparatus of image
CN1484901A (en) Threshold Cipher Scheme for Message Authentication System
US7930544B2 (en) Data processing apparatus and its method
CN1161997C (en) Security device and method for capturing data transmitted between two sources
US20110208969A1 (en) Method and apparatus for providing authenticity and integrity to stored data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20040811

Termination date: 20160130

EXPY Termination of patent right or utility model