Systems and methods for authenticating photographic image data
First Claim
1. A method of authenticating images received from a client device and providing authenticated image files, the method being implemented by an authentication server having one or more processors programmed to perform the method, the method comprising:
- receiving, by the authentication server, an image file from the client device via a network;
responsive to receipt of the image file, obtaining, by the authentication server, authentication information, wherein obtaining the authentication information comprises determining, by the authentication server, a server-derived date and time, wherein the server-derived date and time includes a date and time at which the image file was received from the client device at the authentication server and is independent of a client-derived date and time determined at the client device;
obtaining, by the authentication server, first date and time information from an image authentication application executing at the client device and in communication with the authentication server, wherein the first date and time information comprises information obtained by the image authentication application that indicates a date and time that the image authentication application was opened at the client device;
determining, by the authentication server, one or more timing requirements have been satisfied, wherein the one or more timing requirements includes a requirement that the image file be received by the authentication server, as indicated by the server-derived date and time, within a predefined time period after the date and time that the image authentication application was opened at the client device;
generating, by the authentication server, an authenticated image file based on the image file and the authentication information responsive to at least the determination that the one or more timing requirements have been met;
receiving, by the authentication server, through a third party site different from the client device and the authentication server, a request for the authenticated image file or the authentication information; and
responsive to the request, providing, by the authentication server, the authenticated image file or the authentication information.
2 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides systems and methods for authenticating photographic data. In one embodiment, a method comprises providing an image authentication application for use on a client device, the application configured to control image capture and transmission; receiving an image data file from the application at the authentication server comprising a photographic image captured by the application and metadata associated therewith; applying a watermark to the photographic image to create a watermarked image; applying date and time information to the tagged image; applying location information to the tagged image; creating a web address associated with the image data file; uploading the photographic image, the tagged image, or both to the web address; and transmitting an authenticated image file to the client device, the authenticated image file comprising one or more of: the watermarked image, the photographic image, the date and time information, geographic information, and the web address.
68 Citations
36 Claims
-
1. A method of authenticating images received from a client device and providing authenticated image files, the method being implemented by an authentication server having one or more processors programmed to perform the method, the method comprising:
-
receiving, by the authentication server, an image file from the client device via a network; responsive to receipt of the image file, obtaining, by the authentication server, authentication information, wherein obtaining the authentication information comprises determining, by the authentication server, a server-derived date and time, wherein the server-derived date and time includes a date and time at which the image file was received from the client device at the authentication server and is independent of a client-derived date and time determined at the client device; obtaining, by the authentication server, first date and time information from an image authentication application executing at the client device and in communication with the authentication server, wherein the first date and time information comprises information obtained by the image authentication application that indicates a date and time that the image authentication application was opened at the client device; determining, by the authentication server, one or more timing requirements have been satisfied, wherein the one or more timing requirements includes a requirement that the image file be received by the authentication server, as indicated by the server-derived date and time, within a predefined time period after the date and time that the image authentication application was opened at the client device; generating, by the authentication server, an authenticated image file based on the image file and the authentication information responsive to at least the determination that the one or more timing requirements have been met; receiving, by the authentication server, through a third party site different from the client device and the authentication server, a request for the authenticated image file or the authentication information; and responsive to the request, providing, by the authentication server, the authenticated image file or the authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 15, 16, 17, 18)
-
-
8. A system of authenticating images received from a client device and providing authenticated image files, the system comprising:
-
an authentication server comprising one or more hardware processors programmed to; receive an image file from the client device via a network; responsive to receipt of the image file, obtain authentication information, wherein to obtain the authentication information, the authentication server is programmed to determine a server-derived date and time, wherein the server-derived date and time includes a date and time at which the image file was received from the client device at the authentication server and is independent of a client-derived date and time determined at the client device; obtain first date and time information from an image authentication application executing at the client device and in communication with the authentication server, wherein the first date and time information comprises information obtained by the image authentication application that indicates a date and time that the image authentication application was opened at the client device; and determine one or more timing requirements have been satisfied, wherein the one or more timing requirements includes a requirement that the image file be received by the authentication server, as indicated by the server-derived date and time, within a predefined time period after the date and time that the image authentication application was opened at the client device; generate an authenticated image file based on the image file and the authentication information responsive to at least the determination that the one or more timing requirements have been met; receive through a third party site different from the client device and the authentication server, a request for the authenticated image file or the authentication information; and responsive to the request, provide the authenticated image file or the authentication information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
19. A method of authenticating images received from a client device and providing authenticated image files, the method being implemented by an authentication server having one or more processors programmed to perform the method, the method comprising:
-
receiving, by the authentication server, an image file from the client device via a network; responsive to receipt of the image file, obtaining, by the authentication server, authentication information, wherein obtaining the authentication information comprises determining, by the authentication server, a server-derived date and time, wherein the server-derived date and time includes a date and time at which the image file was received from the client device at the authentication server and is independent of a client-derived date and time determined at the client device; obtaining, by the authentication server, first geolocation information from an image authentication application executing at the client device and in communication with the authentication server, wherein the first geolocation information comprises information obtained by the image authentication application that indicates a first geolocation at which the image authentication application was opened at the client device; and obtaining, by the authentication server, second geolocation information from the image authentication application and in communication with the authentication server, wherein the second geolocation information comprises information obtained by the image authentication application that indicates a second geolocation at which the image file was created at the client device; determining, by the authentication server, one or more geographic requirements have been satisfied, wherein the one or more geographic requirements includes a requirement that the second location is within a predefined distance from the first location; generating, by the authentication server, an authenticated image file based on the image file and the authentication information responsive to the determination that the one or more geographic requirements have been met; receiving, by the authentication server, through a third party site different from the client device and the authentication server, a request for the authenticated image file or the authentication information; and responsive to the request, providing, by the authentication server, the authenticated image file or the authentication information. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A system of authenticating images received from a client device and providing authenticated image files, the system comprising:
-
an authentication server comprising one or more hardware processors programmed to; receive an image file from the client device via a network; responsive to receipt of the image file, obtain authentication information, wherein to obtain the authentication information, the authentication server is programmed to determine a server-derived date and time, wherein the server-derived date and time includes a date and time at which the image file was received from the client device at the authentication server and is independent of a client-derived date and time determined at the client device; obtain first geolocation information from an image authentication application executing at the client device and in communication with the authentication server, wherein the first geolocation information comprises information obtained by the image authentication application that indicates a first geolocation at which the image authentication application was opened at the client device; obtain second geolocation information from the image authentication application and in communication with the authentication server, wherein the second geolocation information comprises information obtained by the image authentication application that indicates a second geolocation at which the image file was created at the client device; determine one or more geographic requirements have been satisfied, wherein the one or more geographic requirements includes a requirement that the second location is within a predefined distance from the first location; generate an authenticated image file based on the image file and the authentication information responsive to at least the determination that the one or more geographic requirements have been met; receive through a third party site different from the client device and the authentication server, a request for the authenticated image file or the authentication information; and responsive to the request, provide the authenticated image file or the authentication information. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification