Indigenous authentication for sensor-recorders and other information capture devices
DCFirst Claim
1. A method for authenticating a data stream stored in a data file in memory, said method comprising the steps of:
- storing a data stream in a data file in a memory;
utilizing a sensor, which is tightly coupled to said memory, to generate at least one internal and unique parameter;
monitoring the integrity of the tight coupling between said memory and said sensor when said at least one internal and unique parameter is generated, and, if said integrity is compromised, then also providing an indication of said compromised integrity;
utilizing a signature protocol to generate a first signature based on said data stream and said at least one parameter, said first signature being generated without altering said data stream and being appended to said data file in said memory;
utilizing said signature protocol to generate a second signature based on said image;
comparing said first signature to said second signature, if said first and second signatures are not the same, then generating an error signal that is displayed to a user to indicate that said stored data stream is not authentic, and if said first and second signatures are the same, then generating an ok signal that is displayed to a user to indicate that said stored data stream is authentic.
5 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method and system of authentication for sensor-recorders and other information capture devices is disclosed. In accordance with aspects of the current invention, a digital sample of the environment is obtained. From this sample and at least one parameter representative of at least one condition under which the sample was generated, a digital signature is created. This signature is stored in memory with the sample to be checked at a later time for authenticity. The file is checked for authenticity by generating a second signature from the file and comparing that signature to the original signature. If the two signatures are identical, the sample is considered authentic and if the two signatures are different, the sample cannot be authenticated.
29 Citations
6 Claims
-
1. A method for authenticating a data stream stored in a data file in memory, said method comprising the steps of:
-
storing a data stream in a data file in a memory;
utilizing a sensor, which is tightly coupled to said memory, to generate at least one internal and unique parameter;
monitoring the integrity of the tight coupling between said memory and said sensor when said at least one internal and unique parameter is generated, and, if said integrity is compromised, then also providing an indication of said compromised integrity;
utilizing a signature protocol to generate a first signature based on said data stream and said at least one parameter, said first signature being generated without altering said data stream and being appended to said data file in said memory;
utilizing said signature protocol to generate a second signature based on said image;
comparing said first signature to said second signature, if said first and second signatures are not the same, then generating an error signal that is displayed to a user to indicate that said stored data stream is not authentic, and if said first and second signatures are the same, then generating an ok signal that is displayed to a user to indicate that said stored data stream is authentic. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification