Methods, systems, and computer program products for securely transforming an audio stream to encoded text
First Claim
1. A system for securely transforming an audio stream to encoded text, comprising:
- a security core which provides security functions;
a plurality of components, comprising at least an audio recording component and one or more transformation components;
a security core operating module configured to operate the security core;
wherein the components are securely operably connected to the security core, such that the security core can vouch for authenticity of each securely operably connected component;
wherein the securely operably connected audio recording component is configured to record an audio stream;
wherein the at least one of the securely operably connected transformation components is configured to transform the audio stream to a text stream;
wherein the security core is configured to securely provide, for the text stream, an identification of the securely operably connected audio recording component and each of the at least one securely operably connected transformation components;
wherein the security core is configured to detect whether the audio recording component and the at least one transformation component remain operably connected to the security core during the recording and the transforming of the audio stream; and
wherein the security core is configured to abort the recording and the transforming if one or more of the audio recording component and the at least one transformation component fails to remain operably connected to the security core during the recording and the transforming of the audio stream.
3 Assignments
0 Petitions
Accused Products
Abstract
A method, system, computer program product, and method of doing business by providing improved audio compression wherein an audio stream is securely transformed to an encoded text stream (such as an ASCII, EBCDIC, or Unicode text stream). One or more components which are involved in the transformation process are authenticated. A unique identifier of each such component is included within cryptographically-protected information that is provided for the encoded text stream. A digital signature is preferably used for the cryptographic protection, thereby digitally notarizing the encoded text stream. The authenticity and integrity of the encoded text stream can therefore be verified. In preferred embodiments, the authenticated identities of components performing the transformation can also be determined from the cryptographically-protected information. The encoded text stream will typically require much less storage space than the audio stream, and providing the digital notarization along with the encoded text stream serves to reliably establish evidence of the contents of the audio stream (even though a perfect speech-to-text transformation might not be achieved).
136 Citations
69 Claims
-
1. A system for securely transforming an audio stream to encoded text, comprising:
-
a security core which provides security functions; a plurality of components, comprising at least an audio recording component and one or more transformation components; a security core operating module configured to operate the security core; wherein the components are securely operably connected to the security core, such that the security core can vouch for authenticity of each securely operably connected component; wherein the securely operably connected audio recording component is configured to record an audio stream; wherein the at least one of the securely operably connected transformation components is configured to transform the audio stream to a text stream; wherein the security core is configured to securely provide, for the text stream, an identification of the securely operably connected audio recording component and each of the at least one securely operably connected transformation components; wherein the security core is configured to detect whether the audio recording component and the at least one transformation component remain operably connected to the security core during the recording and the transforming of the audio stream; and wherein the security core is configured to abort the recording and the transforming if one or more of the audio recording component and the at least one transformation component fails to remain operably connected to the security core during the recording and the transforming of the audio stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of securely transforming an audio stream to encoded text, comprising:
-
operating a security core which provides security functions; providing a plurality of components, comprising at least an audio recording component and one or more transformation components; securely operably connecting the components to the security core, such that the security core can vouch for authenticity of each securely operably connected component; recording an audio stream by the securely operably connected audio recording component; transforming the audio stream to a text stream by at least one of the securely operably connected transformation components; securely providing, for the text stream by the security core, an identification of the securely operably connected audio recording component and each of the at least one securely operably connected transformation components; detecting whether the audio recording component and the at least one transformation component remain operably connected to the security core during operation of the recording and the transforming of the audio stream; and aborting the recording and the transforming if one or more of the audio recording component and the at least one transformation component fails to remain operably connected to the security core during the recording and the transforming of the audio stream. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A computer-usable storage medium having computer-usable program code embodied therein for securely transforming an audio stream to encoded text comprising:
-
computer-readable program code configured to operate a security core which provides security functions; computer-readable program code configured to securely operably connect one or more components, comprising at least an audio recording component and one or more transformation components, to the security core, such that the security core can vouch for authenticity of each securely operably connected component; computer-readable program code configured to transform an audio stream that is recorded by the securely operably connected audio recording component to a text stream, the transforming being performed by at least one of the securely operably connected transformation components; and computer-readable program code configured to securely provide, for the text stream by the security core, an identification of the securely operably connected audio recording component and each of the at least one securely operably connected transformation components; computer-readable program code configured to detect whether the audio recording component and the at least one transformation component remain operably connected to the security core during the recording and the transforming; and computer-readable program code configured to abort the recording and the transforming if one or more of the audio recording component and the at least one transformation component fails to remain operably connected to the security core during the recording and transforming. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
Specification