Event verification system
First Claim
1. An event verification system comprises:
- an input for the reception of information;
an encryption algorithm to encrypt the information;
an electronic recorder to record the encrypted information;
a decryption algorithm to decrypt recorded information;
at least one programmable memory to store at least one cryptographic key for use with the encryption and decryption algorithms;
a tamperproof enclosure to protect the input and at least one programmable memory from access or alteration; and
a trusted agent to generate at least one cryptographic key to be used in conjunction with the encryption and decryption algorithms, the trusted agent programming any generated cryptographic key into at least one programmable memory for use with the encryption and decryption algorithms and, upon request, verifying the authenticity of the recorded information by decrypting the recorded information using at least one cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
An event verification system comprises an input for the reception of information and an encryption algorithm to encrypt the information; an electronic recorder to record the encrypted information and a decryption algorithm to decrypt recorded information; at least one programmable memory to store at least one cryptographic key for use with the encryption and decryption algorithms; a tamperproof enclosure to protect the input and at least one programmable memory from access or alteration; and, a trusted agent to generate at least one cryptographic key to be used in conjunction with the encryption and decryption algorithms, the trusted agent programming any generated cryptographic key into at least one programmable memory for use with the encryption and decryption algorithms and, upon request, verifying the authenticity of the recorded information by decrypting the recorded information using at least one cryptographic key.
178 Citations
19 Claims
-
1. An event verification system comprises:
-
an input for the reception of information; an encryption algorithm to encrypt the information; an electronic recorder to record the encrypted information; a decryption algorithm to decrypt recorded information; at least one programmable memory to store at least one cryptographic key for use with the encryption and decryption algorithms; a tamperproof enclosure to protect the input and at least one programmable memory from access or alteration; and a trusted agent to generate at least one cryptographic key to be used in conjunction with the encryption and decryption algorithms, the trusted agent programming any generated cryptographic key into at least one programmable memory for use with the encryption and decryption algorithms and, upon request, verifying the authenticity of the recorded information by decrypting the recorded information using at least one cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An event verification system comprises:
-
a video camera for the reception of information; an encryption algorithm to encrypt the information; an electronic recorder to record the encrypted information; a decryption algorithm to decrypt recorded information; at least one programmable memory to store at least one cryptographic key for use with the encryption and decryption algorithms; a tamperproof enclosure to protect the input and at least one programmable memory from access or alteration; a trusted agent to generate at least one cryptographic key to be used in conjunction with the encryption and decryption algorithms, the trusted agent programming any generated cryptographic key into at least one programmable memory for use with the encryption and decryption algorithms and, upon request, verifying the authenticity of the recorded information by decrypting the recorded information using at least one cryptographic key; at least one range sensor whose output is encrypted by the encryption algorithm and recorded by the electronic recorder; a detector within the tamperproof enclosure to monitor the integrity of the tamperproof enclosure and, upon any breach of integrity, to send a signal that results in the destruction of any cryptographic key stored in a programmable memory within the tamperproof enclosure; an electronic security measure within the tamperproof enclosure that monitors the state of the tamperproof enclosure from the time of manufacture and reveals any breach of the tamperproof enclosure to the trusted third party; a Global Positioning System receiver for deriving time and location data which is encrypted by the encryption algorithm and recorded by the electronic recorder; and
,a transmitter to send at least a portion of the encrypted data to a remote location.
-
Specification