Secure digital photography system
First Claim
1. A digital camera comprising:
- a memory to store image data of a captured image representing a scene in the physical world; and
an encryption module configured to digitally sign the image data prior to storage using a private key of an asymmetric key pair.
1 Assignment
0 Petitions
Accused Products
Abstract
A digital camera includes a memory to store image data of a captured image representing a scene in the physical world, and an encryption module configured to digitally sign the image data prior to storage using a private key of an asymmetric key pair and to obtain metadata associated with the image data. The digital camera is communicatively coupled to a digital photography subsystem. The host-based subsystem includes a decryption module to accept image data and metadata from the digital camera and to verify the digital signature of the image data to determine authenticity of the captured image represented by the image data using a public key of the asymmetric key pair, and a viewer module to display the image data when the decryption module indicates the image data is authentic. Metadata used in assisting a determination of authenticity may include at least one of date and time the image was captured by the digital camera, at least one of name and identifier of the camera owner, at least one of name and identifier of the photographer, focal distance, white levels, f-stop, brightness compensation, and distance for auto-focus, when the image was captured.
-
Citations
32 Claims
-
1. A digital camera comprising:
-
a memory to store image data of a captured image representing a scene in the physical world; and
an encryption module configured to digitally sign the image data prior to storage using a private key of an asymmetric key pair. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A digital photography subsystem comprising:
-
a decryption module to accept image data and metadata from a digital camera, the metadata including a digital signature of the image data, and to verify the digital signature of the image data to determine authenticity of an image represented by the image data; and
a viewer module to display the image data when the decryption module indicates the image data is authentic. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A secure digital photography system comprising:
-
a digital camera including a memory to store image data of a captured image representing a scene in the physical world, and an encryption module configured to digitally sign the image data prior to storage using a private key of an asymmetric key pair and to obtain metadata associated with the image data, the metadata including the digital signature of the image data; and
a digital photography subsystem including a decryption module to accept image data and metadata from the digital camera and to verify the digital signature of the image data to determine authenticity of the captured image represented by the image data using a public key of the asymmetric key pair, and a viewer module to display the image data when the decryption module indicates the image data is authentic. - View Dependent Claims (16, 17, 18)
-
-
19. A method of generating photograph data comprising:
-
capturing image data representing an image in the physical world by a digital camera;
obtaining metadata associated with the captured image;
digitally signing the image data with a private key of an asymmetric key pair; and
storing the image data and metadata in a memory of the digital camera. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A method of generating and authenticating digital photographs comprising:
-
capturing image data representing an image in the physical world by a digital camera;
obtaining metadata associated with the captured image, the metadata indicating characteristics of the image data;
digitally signing the image data with a private key of an asymmetric key pair; and
transferring the image data, the digital signature, and the metadata to a host system;
authenticating the image data by the host system using the digital signature, a corresponding public key of the asymmetric key pair, and the metadata. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
Specification