WO2016112914A1 - A method and a system for proving authenticity of recorded data - Google Patents
A method and a system for proving authenticity of recorded data Download PDFInfo
- Publication number
- WO2016112914A1 WO2016112914A1 PCT/DK2016/000003 DK2016000003W WO2016112914A1 WO 2016112914 A1 WO2016112914 A1 WO 2016112914A1 DK 2016000003 W DK2016000003 W DK 2016000003W WO 2016112914 A1 WO2016112914 A1 WO 2016112914A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- recorded
- service provider
- user
- recorded data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present invention relates to a method and a system for a service provider to re- ceive and handle data and storing said recorded data whereby the authenticity of said recorded data can be proven.
- the invention relates more specifically to prove the authenticity of the data recorded during actions of different kinds, during discussions and negotiations and in a multitude of other situations where it could be convenient or even crucial to be able to, later to prove the authenticity of the recorded data.
- the recorded data could contain one or more of the following data items, pictures, voice and sound records, videos, time, date and location and all other data, which could possibly be collected by a smartphone, a pad computer, a laptop, a camera or any other device being able to record and transmit data.
- the object of the present invention is obtained by the steps of;
- a user of the mobile recording device initiates the steps of recording and transmission, whereas the step of storing is controlled and handled by the service provider and where this step is not accessible to the user, and the user only can access the recorded data via the service provider.
- the recorded data is being transmitted while recording or at least immediately after recording and in an embodiment the recorded data could be tagged with data identifying the position of the recording e.g. based on a GPS measurement and they could be tagged by a time stamp indicating date and time of the recording.
- the recorded data can, as the data are recorded, go through an encryption process performed by the mobile device where after the data is transmitted and stored at the data storage server and/or more specifically in a storage device or section of the data storage server, which is not directly accessible to the user during and/or after the storage process has been performed.
- This device or section of the storage server will have the characteristics of a ROM, a read only device, as seen from the user, and preferably, but not necessarily also as seen from the service and storage provider.
- the characteristics of a ROM were back in time obtained with memory devices where a link was broken when programming. These devices could not be reset and are hardly used today. Later came EPROMS which could be erased by ultraviolet light and these were followed by EEPROMS, which could be erased with an electric impulse. All these ROM types would be impracticable in a modern storage system, which stores millions of Terabyte.
- the storage provider secures the authenticity of the data by programming the storage sections used for storing data, which are stored according to the invention in a way where these sections are programmed to provide ROM characteristics.
- the data provider use protocols for accessing these sections, which do only allow writing data into these sections once, meaning that the files con- taining the data are not editable until the service provider perform certain processes.
- the data could also go through an encryption process at the data storage server when the data are received and are stored at the data storage server.
- the crucial elements of the invention are the immediate and real time recording and transmission of the recorded data and the storing of the data through a process where the authenticity can be guaranteed by the storage provider.
- the immediate and real time recording and transmission of data is crucial in situations with a violent aggressor and the proof of the recorded data is crucial in a later investigation or in a possible later court room procedure.
- FIG. 1 illustrates a method and a system according to the present invention.
- the recording device 101 is illustrated, typically comprising a transmitter / receiver section 102, with the antenna 103, the microcontroller 104, which interacts with the touch screen 105, the microphone and speaker module 106, the camera module 107, the GPS and time module 108, the spatial sensor module 109 and the general sensor module 10 for sensing temperature etc.
- the recorded data are preferably simultaneously with the recording, transmitted to the data storage system in an encrypted or decrypted state through the antenna 103 and the antenna 121 at the base station 120, which again communicate, preferably through the internet 122, with the server 123, which communicate with the storage system 130 through the safe link 124.
- the communication with the safe section 131 of the storage system 130 is via the safe control unit 132, which controls the data 133 going into the safe storage section 131 , giving this section ROM characteristics, either through the storage provider programming this section or through the data transfer protocol used by the storage provider in the storage process.
- the data stored in the safe storage section 131 may be interrogated, but not altered as the data 134, by the safe control unit 132 and transferred through the safe link 135 to the server 140, which preferably is provided with the internet connection 141.
- the servers 123 and 140 and the safe control unit 132 may, for reasons of simplicity and / or data integrity, preferably integrated into one or more units or be situated at the same location.
- the method and system according to the invention provide a data storage system where the storage service provider totally control the storage process, and therefore is able guarantee the authenticity and safety of the data, but also describe a system where the storage provider may preferably be able to provide a user with controlled read only access to the stored data, for example through the internet connection 141.
- the storage provider will, on demand, and preferably, but not necessarily, for maximal security let the data pass through another encryption process before retransmitting the data and will then be able on demand to provide a decryption key and or a certificate of authenticity to the user or possibly directly to an authority such as a court.
- the mobile recording device 101 is illustrated in Fig 1 as an advanced smartphone, but could according to the invention be any device, which comprises as a minimum a recording unit and a communication unit.
- the recording device could alternatively be just a camera or a microphone for recording respectively images and/or sound with a communication unit, which transmits data to the data storage server via any wireless communication network.
- the user could get access to a service where the provider of the transmission and / or the storage processes controls the encryption and transmission functionality at the mobile device through for example a software module installed at the mobile device, where the security of the software module is checked during processing by the service provider and/or through only the service provider having access to the installation and modification of the software module.
- the software module could be downloaded from the service provider or installed by adding an App distributed via an App store, with the security of the App being checked when used.
- the functionality could also be protected by hardware installed in the mobile device.
- the complete process of recording and possibly encryption of the different data items followed by an automatic and immediate real time transmission of the data could preferably be processed by calling an Application - an App - directly by a tile on the screen of the recording and transmitting device.
- the invention may include a method for transmitting, storing and receiving recorded data whereby the authenticity of said recorded data can be proven, wherein said method comprises the steps of; at a mobile recording device:
- the data may be audio, video, GPS coordinates, or any other data that may be recorded by a mobile recording device
- the data communication network may be a mobile network, wireless internet connection, Bluetooth connection, or any type of known communication network that may be accessed via a mobile recording device,
- a service provider to the secure data storage server, allowing the service provider to access the area of the secure data storage server, where the access may optionally be set as read only, to ensure that the service provider is only capable of accessing the recorded data without changing the format, structure or any of the contents of the recorded data, ensuring that the data is secured in the secure data storage server in excactly the same stat as it was when it was stored, and ensuring that it cannot be manipulated in any way.
- the server may be adapted to allow predeterimed manipulation of the data, where the nature and the way of manipulation is recorded by the storage server - , whereas the step of safe storing of data is controlled and handled solely by the service provider and where these steps are not accessible to the user, whereby the user can only access the recorded data via the service provider in a way where the user cannot tamper with the data.
- the data may be encrypted at the mobile recording device, at the data storage server, or at a third location between the mobile recording device and the data storage server.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The object of the present invention is obtained by is obtained by a method which comprises the steps of; at a mobile recording device: - recording said data in real time, - transmitting said recorded data to a data storage server, at a data storage server handled by said service provider: - receiving said recorded data, - storing said recorded data in a safe section which cannot be tampered with. The steps of recording and transmission are initiated by a user of the mobile recording device, whereas the step of storing is controlled and handled by the service provider and where this step is not accessible to the user, whereby the user only can access the recorded data via the service provider Thereby when determining the authenticity of the recorded data it is solely the processes handled by the service provider which can be questioned. The user only starts and stops a recording and transmission process e.g. a video and or a sound recording and transmission, whereas the remaining part of the storing and possible later retrieval of the data is handled by the service provider.
Description
[TITLE]
A method and a system for proving authenticity of recorded data [FIELD OF THE INVENTION]
The present invention relates to a method and a system for a service provider to re- ceive and handle data and storing said recorded data whereby the authenticity of said recorded data can be proven.
The invention relates more specifically to prove the authenticity of the data recorded during actions of different kinds, during discussions and negotiations and in a multitude of other situations where it could be convenient or even crucial to be able to, later to prove the authenticity of the recorded data.
The recorded data could contain one or more of the following data items, pictures, voice and sound records, videos, time, date and location and all other data, which could possibly be collected by a smartphone, a pad computer, a laptop, a camera or any other device being able to record and transmit data.
[BACKGROUND]
Every day, data in the form of pictures, voice and sound records, videos etc. are rec- orded by a variety of devices and normally these data are stored in the device itself or in YouTube, Facebook or in similar places.
If these records are later needed as evidence in a dispute, the authenticity could be questioned as it is comparatively easy to edit these records and in for example a pos- sible courtroom procedure they will therefore be of limited value.
It is the object of the invention to record and store data in a manner where the authenticity of the recorded data can be proven.
[GENERAL DESCRIPTION]
The object of the present invention is obtained by the steps of;
at a mobile recording device of a user:
- recording said data,
immediately transmitting said recorded data in real time to a data storage server,
at the data storage server handled by a service provider:
receiving said recorded possibly encrypted data,
- storing said recorded and possibly encrypted data in a protected and safe storage section which is not directly accessible to the user.
A user of the mobile recording device initiates the steps of recording and transmission, whereas the step of storing is controlled and handled by the service provider and where this step is not accessible to the user, and the user only can access the recorded data via the service provider.
Thereby when determining the authenticity of the recorded data it is solely the processes handled by the service provider, which can be questioned.
Further by possibly encrypting the recorded data the risk of the data being manipulated during communication from the mobile recording device to data storage server is minimised. The recorded data is being transmitted while recording or at least immediately after recording and in an embodiment the recorded data could be tagged with data identifying the position of the recording e.g. based on a GPS measurement and they could be tagged by a time stamp indicating date and time of the recording. The recorded data can, as the data are recorded, go through an encryption process performed by the mobile device where after the data is transmitted and stored at the data storage server and/or more specifically in a storage device or section of the data storage server, which is not directly accessible to the user during and/or after the storage process has been performed.
This device or section of the storage server will have the characteristics of a ROM, a read only device, as seen from the user, and preferably, but not necessarily also as seen from the service and storage provider. The characteristics of a ROM were back in time obtained with memory devices where a link was broken when programming. These devices could not be reset and are hardly used today. Later came EPROMS which could be erased by ultraviolet light and these were followed by EEPROMS, which could be erased with an electric impulse. All these ROM types would be impracticable in a modern storage system, which stores millions of Terabyte. According to the invention the storage provider secures the authenticity of the data by programming the storage sections used for storing data, which are stored according to the invention in a way where these sections are programmed to provide ROM characteristics. Alternatively, the data provider use protocols for accessing these sections, which do only allow writing data into these sections once, meaning that the files con- taining the data are not editable until the service provider perform certain processes.
As an alternative to the encryption at the mobile device or as a supplement, the data could also go through an encryption process at the data storage server when the data are received and are stored at the data storage server.
The crucial elements of the invention are the immediate and real time recording and transmission of the recorded data and the storing of the data through a process where the authenticity can be guaranteed by the storage provider. The immediate and real time recording and transmission of data is crucial in situations with a violent aggressor and the proof of the recorded data is crucial in a later investigation or in a possible later court room procedure.
[BRIEF DESCRIPTION OF DRAWINGS] The invention is explained in detail below with reference to the drawing, in which Fig. 1 illustrates a method and a system according to the present invention.
[DETAILED DESCRIPTION OF DRAWINGS]
In fig. 1 , the recording device 101 is illustrated, typically comprising a transmitter / receiver section 102, with the antenna 103, the microcontroller 104, which interacts with the touch screen 105, the microphone and speaker module 106, the camera module 107, the GPS and time module 108, the spatial sensor module 109 and the general sensor module 10 for sensing temperature etc.
When the recorded data are generated by the recording device 101 , the recorded data are preferably simultaneously with the recording, transmitted to the data storage system in an encrypted or decrypted state through the antenna 103 and the antenna 121 at the base station 120, which again communicate, preferably through the internet 122, with the server 123, which communicate with the storage system 130 through the safe link 124.
The communication with the safe section 131 of the storage system 130 is via the safe control unit 132, which controls the data 133 going into the safe storage section 131 , giving this section ROM characteristics, either through the storage provider programming this section or through the data transfer protocol used by the storage provider in the storage process.
The data stored in the safe storage section 131 may be interrogated, but not altered as the data 134, by the safe control unit 132 and transferred through the safe link 135 to the server 140, which preferably is provided with the internet connection 141.
The servers 123 and 140 and the safe control unit 132 may, for reasons of simplicity and / or data integrity, preferably integrated into one or more units or be situated at the same location.
As described above, the method and system according to the invention, provide a data storage system where the storage service provider totally control the storage process, and therefore is able guarantee the authenticity and safety of the data, but also describe a system where the storage provider may preferably be able to provide a user with controlled read only access to the stored data, for example through the internet connection 141.
When the stored data is recalled by the user, it could for example be:
Through the use of a password possessed by the user if the data are only requested in a decrypted state for printing, forwarding to interested parties, for discussions at the user, for being deleted or for other actions which do not need proof of authenticity .
For proving the authenticity of the data, the storage provider will, on demand, and preferably, but not necessarily, for maximal security let the data pass through another encryption process before retransmitting the data and will then be able on demand to provide a decryption key and or a certificate of authenticity to the user or possibly directly to an authority such as a court.
The mobile recording device 101 is illustrated in Fig 1 as an advanced smartphone, but could according to the invention be any device, which comprises as a minimum a recording unit and a communication unit. The recording device could alternatively be just a camera or a microphone for recording respectively images and/or sound with a communication unit, which transmits data to the data storage server via any wireless communication network.
Additionally the user could get access to a service where the provider of the transmission and / or the storage processes controls the encryption and transmission functionality at the mobile device through for example a software module installed at the mobile device, where the security of the software module is checked during processing by the service provider and/or through only the service provider having access to the installation and modification of the software module. The software module could be downloaded from the service provider or installed by adding an App distributed via an App store, with the security of the App being checked when used.
Alternatively the functionality could also be protected by hardware installed in the mobile device.
The complete process of recording and possibly encryption of the different data items followed by an automatic and immediate real time transmission of the data could preferably be processed by calling an Application - an App - directly by a tile on the screen of the recording and transmitting device.
Embodiments
In accordance with one embodiment the invention may include a method for transmitting, storing and receiving recorded data whereby the authenticity of said recorded data can be proven, wherein said method comprises the steps of;
at a mobile recording device:
- initiating recording of data
- recording said data in real time, where the data may be audio, video, GPS coordinates, or any other data that may be recorded by a mobile recording device,
- accessing a data communication network wirelessly from the recording device, where the data communication network may be a mobile network, wireless internet connection, Bluetooth connection, or any type of known communication network that may be accessed via a mobile recording device,
- transmitting said recorded data to a data storage server on an instantaneous and continuous basis, so that if an interruption of the data transmission occurs from the mobile device, the recorded data has already been transmitted from the device to the storage server, at a data storage server handled by said service provider and which is connected to a data communication network, and may be provided in data communication with the mobile recording device via the data communication network or a series of data communication networks.:
providing a secure data storage server,
- opening up access for said recorded data into the secure data storage server upon initial communication from the mobile recording device,
receiving said recorded data,
storing said recorded data in the secure data storage server,
- optionally providing a check whether there is continued transmission of recorded data from the mobile recording device into the secure data storage server, and upon termination of the transmission of the recorded data the stored recorded data is secured on the data storage server by closing off all access third party access to the area of the secure data storage server that comprises the recorded data,
- enabling predetermined access by a service provider to the secure data storage server, allowing the service provider to access the area of the secure data storage server, where the access may optionally be set as read only, to ensure that the service provider is only capable of accessing the recorded data without changing the format, structure or any of the contents of the recorded data, ensuring that the data is secured in the secure data storage server in excactly the same stat as it was when it was stored, and ensuring that it cannot be manipulated in any way.
Alternatively, the server may be adapted to allow predeterimed manipulation of the data, where the nature and the way of manipulation is recorded by the storage server - , whereas the step of safe storing of data is controlled and handled solely by the service provider and where these steps are not accessible to the user, whereby the user can only access the recorded data via the service provider in a way where the user cannot tamper with the data. The data may be encrypted at the mobile recording device, at the data storage server, or at a third location between the mobile recording device and the data storage server.
Claims
1. A method for a service provider to handle recorded data and storing said recorded data whereby the authenticity of said recorded data can be proven, wherein said method comprises the steps of;
at a mobile recording device:
recording said data,
- transmitting said recorded data to a data storage server,
at a data storage server handled by said service provider:
- receiving said recorded possibly encrypted data,
storing said recorded possibly encrypted data,
characterised in that
- the steps of immediate and real time recording and transmission of data are initiated by a user of the mobile recording device, whereas the step of safe storing of data is controlled and handled solely by the service provider and where these steps are not accessible to the user, whereby the user can only access the recorded data via the service provider in a way where the user cannot tamper with the data.
2. A system for handling recording data and storing said recorded data whereby the authenticity of said recorded data can be proven, said system comprises a mobile recording device and a data storage server,
said mobile recording device comprises
means for recording said data,
- means for encrypting said recorded data
means for transmitting said recorded encrypted data to a data storage server, said data storage server handled by said service provider comprises
means for receiving said recorded encrypted data,
means for storing said recorded encrypted data,
characterised in that
- the mobile recording device further comprises an authenticity unit handled by the service provider for handling the step of encrypting and transmitting, wherein the authenticity unit is not accessible to the user.
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DKPA201500029 | 2015-01-16 | ||
| DKPA201500029 | 2015-01-16 | ||
| DKPA201500112 | 2015-02-27 | ||
| DKPA201500112 | 2015-02-27 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016112914A1 true WO2016112914A1 (en) | 2016-07-21 |
Family
ID=55315259
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/DK2016/000003 Ceased WO2016112914A1 (en) | 2015-01-16 | 2016-01-15 | A method and a system for proving authenticity of recorded data |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2016112914A1 (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020083323A1 (en) * | 2000-12-22 | 2002-06-27 | Cromer Daryl Carvis | Method and system for enabling an image to be authenticated |
| US20040125208A1 (en) * | 2002-09-30 | 2004-07-01 | Malone Michael F. | Forensic communication apparatus and method |
-
2016
- 2016-01-15 WO PCT/DK2016/000003 patent/WO2016112914A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020083323A1 (en) * | 2000-12-22 | 2002-06-27 | Cromer Daryl Carvis | Method and system for enabling an image to be authenticated |
| US20040125208A1 (en) * | 2002-09-30 | 2004-07-01 | Malone Michael F. | Forensic communication apparatus and method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101502249B1 (en) | Device communication | |
| KR101981258B1 (en) | Method for sharing contents using personal cloud device, Electronic device and Personal Cloud System thereof | |
| EP3332505B1 (en) | Systems and methods for authenticating photographic image data | |
| US10834257B1 (en) | Email alert for unauthorized call | |
| EP3127309B1 (en) | Transmission of beacon message | |
| EP3884415B1 (en) | Method and operation of a portable device and a cloud server for preserving the chain of custody for digital evidence | |
| KR101665199B1 (en) | System and method for detecting image modulation of automobile blackbox | |
| US8272063B2 (en) | DRM scheme extension | |
| US7774023B2 (en) | System and method for associating device information with digital images | |
| EP3238200A1 (en) | Secure electronic entity, electronic apparatus and method for verifying the integrity of data stored in such a secure electronic entity | |
| WO2016013925A1 (en) | System and method for secure tracking of internet of things based goods in supply chain system | |
| JP5850270B2 (en) | Mobile terminal authentication system and method | |
| JP2016184917A (en) | Monitoring system and reproduction device | |
| WO2015115380A1 (en) | Identification information transmission device, communication system, and communication method | |
| CN104331672A (en) | Method and device for performing confidential treatment on pictures upon bracelet | |
| CN108989331B (en) | Use authentication method of data storage device, device and storage medium thereof | |
| WO2016112914A1 (en) | A method and a system for proving authenticity of recorded data | |
| KR101793540B1 (en) | Verification system and method of taking picture and recording in mobile | |
| KR102126571B1 (en) | Method for sharing contents using personal cloud device, Electronic device and Personal Cloud System thereof | |
| KR101853786B1 (en) | Security device unit for checking firmware verification code of CCTV | |
| CN108781173B (en) | Method for initializing and securing a bidirectional communication between a device and a home automation network | |
| US9736161B2 (en) | Method and system for preventing information leakage based on telephone | |
| WO2021134712A1 (en) | Load authentication method and system, mobile platform, load, and transfer device | |
| KR102049889B1 (en) | Apparatus and method for preventing forgery of data using hardware security module | |
| WO2016186610A1 (en) | Embedding information in an audio stream for connectivity |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16703425 Country of ref document: EP Kind code of ref document: A1 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16703425 Country of ref document: EP Kind code of ref document: A1 |