Indigenous authentication for sensor-recorders and other information capture devices
First Claim
1. An apparatus for allowing a data stream to be authenticated, comprising:
- a memory; and
a circuit that is adapted to store a data stream in said memory, said circuit allowing it to be determined whether or not the data stream has been altered after it has been stored in said memory by;
storing at least one parameter in said memory with said data string, said at least one parameter being generally representative of at least one condition under which said data stream was generated, utilizing said data stream and said at least one parameter to generate a first signature that is stored in said memory with said data stream, generating a second signature from said data stream and said stored at least one parameter, and determining whether said first and second signatures are the same.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system of authentication for sensor-recorders and other information capture devices is disclosed. In accordance with aspects of the current invention, a digital sample of the environment is obtained. From this sample and at least one parameter representative of at least one condition under which the sample was generated, a digital signature is created. This signature is stored in memory with the sample to be checked at a later time for authenticity. The file is checked for authenticity by generating a second signature from the file and comparing that signature to the original signature. If the two signatures are identical, the sample is considered authentic and if the two signatures are different, the sample cannot be authenticated.
-
Citations
27 Claims
-
1. An apparatus for allowing a data stream to be authenticated, comprising:
-
a memory; and
a circuit that is adapted to store a data stream in said memory, said circuit allowing it to be determined whether or not the data stream has been altered after it has been stored in said memory by;
storing at least one parameter in said memory with said data string, said at least one parameter being generally representative of at least one condition under which said data stream was generated, utilizing said data stream and said at least one parameter to generate a first signature that is stored in said memory with said data stream, generating a second signature from said data stream and said stored at least one parameter, and determining whether said first and second signatures are the same. - View Dependent Claims (2, 3, 4)
-
-
5. A method for allowing a data stream to be authenticated comprising the steps of:
-
storing a data stream in a memory;
storing at least one parameter in said memory, said at least one parameter being generally representative of at least one condition under which said data stream was generated;
utilizing said data stream and said at least one parameter to generate a first signature that is stored in said memory with said data stream;
generating a second signature from said data stream and parameters at a point in time subsequent to computation of said first signature; and
comparing said first and second signature to see whether said first and second signatures are the same. - View Dependent Claims (6, 7, 8)
-
-
9. An apparatus for generating a data stream that can be authenticated, said apparatus comprising:
-
a circuit that is adapted to generate a data stream;
a memory in which said data stream is stored after it is generated;
a sensor that is tightly coupled to said memory and that generates at least one internal and unique parameter at substantially the same time as when said data stream is generated;
means for monitoring the integrity of the tight coupling between said memory and said sensor when said at least one internal and unique parameter is generated; and
wherein, if said integrity is compromised, said monitoring means also providing an indication of said compromised integrity to a user. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for generating a data stream that can be authenticated, said apparatus comprising:
-
a circuit that is adapted to generate a data stream;
a memory in which said data stream is stored after it is generated;
a sensor that is tightly coupled to said memory and that generates at least one internal and unique parameter at substantially the same time as when said data stream is generated; and
wherein said circuit includes a contact or terminal that receives a signal which is representative of the integrity of the tight coupling between said memory and said sensor at least when said at least one internal and unique parameter is generated; and
wherein, if said integrity is compromised, said circuit being adapted to provide an indication of said compromised integrity to a user. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A digital camera, comprising:
-
a lens which is operatively coupled to a memory;
a sensor that is tightly coupled to said memory;
a circuit that is operatively coupled to said memory and said sensor, said circuit causing the lens to capture an image and store the image in a data file in said memory, said circuit also causing said sensor to generally simultaneously generate at least one internal and unique parameter that also is stored in said memory; and
wherein said circuit includes a contact or terminal that receives a signal which is representative of whether or not an unauthorized user has breached the integrity of the tight coupling between said memory and said sensor. - View Dependent Claims (24, 25, 26, 27)
-
Specification