Controlled-Access Recording Generator
First Claim
1. A recording system for securely recording an event, the system comprising:
- (a) a capturing device for an owner to capture signals from the event, and for converting said signals into digital data;
(b) a public-key encrypting mechanism, configured to use a public key of an asymmetric key-pair, for encrypting said data into encrypted data;
(c) a non-volatile storage device for storing said encrypted data; and
(d) a private-key decrypting mechanism, configured to use a private key of said asymmetric key-pair, for decrypting said encrypted data stored in said storage device only upon using said private key, wherein said private key is securely maintained with a trusted private-key holder, and wherein said trusted private-key holder is at least one entity other than said owner of said capturing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A recording system for securely recording an event, the system including: a capturing device for an owner to capture signals from the event, and for converting the signals into digital data; a public-key encrypting mechanism, configured to use a public key of an asymmetric key-pair, for encrypting the data into encrypted data; a non-volatile storage device for storing the encrypted data; and a private-key decrypting mechanism, configured to use a private key of the asymmetric key-pair, for decrypting the encrypted data stored in the storage device only upon using the private key, wherein the private key is securely maintained with a trusted private-key holder, and wherein the trusted private-key holder is at least one entity other than the owner of the capturing device. Preferably, the trusted private-key holder is operative to decrypt the encrypted data only upon receiving an authorization from an authorized entity.
-
Citations
16 Claims
-
1. A recording system for securely recording an event, the system comprising:
-
(a) a capturing device for an owner to capture signals from the event, and for converting said signals into digital data;
(b) a public-key encrypting mechanism, configured to use a public key of an asymmetric key-pair, for encrypting said data into encrypted data;
(c) a non-volatile storage device for storing said encrypted data; and
(d) a private-key decrypting mechanism, configured to use a private key of said asymmetric key-pair, for decrypting said encrypted data stored in said storage device only upon using said private key, wherein said private key is securely maintained with a trusted private-key holder, and wherein said trusted private-key holder is at least one entity other than said owner of said capturing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for securely recording an event, the method comprising the steps of:
-
(a) capturing signals from the event in a capturing device by an owner;
(b) converting said signals to digital data in said capturing device;
(c) encrypting said data using a public-key encrypting mechanism, configured to use a public key of an asymmetric key-pair, for encrypting said data into encrypted data;
(d) storing said data after encryption in a storage device; and
(e) decrypting said data, using a private-key decrypting mechanism, configured to use a private key of said asymmetric key-pair, for decrypting said encrypted data stored in said storage device only upon using said private key, wherein said private key is securely maintained with a trusted private-key holder, and wherein said trusted private-key holder is at least one entity other than said owner of said capturing device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification