Image data verification
First Claim
1. An image verification system comprising:
- an image input apparatus;
an image verification apparatus;
a storage apparatus;
a user information input apparatus; and
a key generation apparatus,wherein said user information input apparatus sends user information relating to a user to said key generation apparatus, and sends the user information to said image input apparatus,wherein said key generation apparatus receives the user information from said user information input apparatus, generates a public key which corresponds to the user information, generates a private key which corresponds to the user information, sends the private key corresponding to the user information to said image input apparatus, and sends the user information and the public key corresponding to the user information to said storage apparatus,wherein said storage apparatus receives the user information and the public key corresponding to the user information from said key generation apparatus, and sends the public key corresponding to the user information to said image verification apparatus,wherein said image input apparatus receives the user information from said user information input apparatus, receives the private key corresponding to the user information from said key generation apparatus, generates verification data for image data using the private key corresponding to the user information, and sends the user information, the verification data, and the image data to one of said image verification apparatus and a storage medium, andwherein said image verification apparatus receives the user information, the verification data, and the image data from one of said image verification apparatus and the storage medium, receives the public key corresponding to the user information from said storage apparatus, and verifies whether the image data has been altered or not using the verification data and the public key corresponding to the user information.
1 Assignment
0 Petitions
Accused Products
Abstract
An image verification system includes an image input apparatus, image verification apparatus, and database apparatus. The image input apparatus generates verification information for image data by using a private key and adds the verification information and predetermined information unique to the image input apparatus to the image data. The image verification apparatus verifies that the image data has been altered or not by using the verification information and a public key corresponding to the private key. The database apparatus stores the public key in association with the predetermined information in the a storage unit and provides the public key to the image verification apparatus.
37 Citations
24 Claims
-
1. An image verification system comprising:
-
an image input apparatus; an image verification apparatus; a storage apparatus; a user information input apparatus; and a key generation apparatus, wherein said user information input apparatus sends user information relating to a user to said key generation apparatus, and sends the user information to said image input apparatus, wherein said key generation apparatus receives the user information from said user information input apparatus, generates a public key which corresponds to the user information, generates a private key which corresponds to the user information, sends the private key corresponding to the user information to said image input apparatus, and sends the user information and the public key corresponding to the user information to said storage apparatus, wherein said storage apparatus receives the user information and the public key corresponding to the user information from said key generation apparatus, and sends the public key corresponding to the user information to said image verification apparatus, wherein said image input apparatus receives the user information from said user information input apparatus, receives the private key corresponding to the user information from said key generation apparatus, generates verification data for image data using the private key corresponding to the user information, and sends the user information, the verification data, and the image data to one of said image verification apparatus and a storage medium, and wherein said image verification apparatus receives the user information, the verification data, and the image data from one of said image verification apparatus and the storage medium, receives the public key corresponding to the user information from said storage apparatus, and verifies whether the image data has been altered or not using the verification data and the public key corresponding to the user information. - View Dependent Claims (3, 4, 5, 6, 7)
-
-
2. An image verification system comprising:
-
an image input apparatus; an image verification apparatus; a storage apparatus; a user information input apparatus; and a key generation apparatus, wherein said user information input apparatus sends user information relating to a user to said key generation apparatus, and sends the user information to said image input apparatus, wherein said key generation apparatus receives the user information from said user information input apparatus, generates a private key which corresponds to the user information, sends the private key corresponding to the user information to said image input apparatus, and sends the user information and the private key corresponding to the user information to said storage apparatus, wherein said storage apparatus receives the user information and the private key corresponding to the user information from said key generation apparatus, and sends the private key corresponding to the user information to said image verification apparatus, wherein said image input apparatus receives the user information from said user information input apparatus, receives the private key corresponding to the user information from said key generation apparatus, generates verification data for image data using the private key corresponding to the user information, and sends the user information, the verification data, and the image data to one of said image verification apparatus and a storage medium, and wherein said image verification apparatus receives the user information, the verification data, and the image data from one of said image verification apparatus and the storage medium, receives the private key corresponding to the user information from said storage apparatus, and verifies whether the image data has been altered or not using the verification data and the private key corresponding to the user information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
sending, from a user information input apparatus to a key generation apparatus, user information relating to a user; sending, from the user information input apparatus to an image input apparatus, the user information; after the key generation apparatus receives the user information from the user information input apparatus, generating, by the key generation apparatus, a public key which corresponds to the user information; after the key generation apparatus receives the user information from the user information input apparatus, generating, by the key generation apparatus, a private key which corresponds to the user information; sending, from the key generation apparatus to the image input apparatus, the private key corresponding to the user information; sending, from the key generation apparatus to a storage apparatus, the user information and the public key corresponding to the user information; after the storage apparatus receives the user information and the public key corresponding to the user information from the key generation apparatus, sending, from the storage apparatus to an image verification apparatus, the public key corresponding to the user information; after the image input apparatus receives the user information from the user information input apparatus and receives the private key corresponding to the user information from the key generation apparatus, generating verification data for image data using the private key corresponding to the user information; sending, from the image input apparatus to one of the image verification apparatus and a storage medium, the user information, the verification data, and the image data; and after the image verification apparatus receives the user information, the verification data, and the image data from one of the image input apparatus and the storage medium, and receives the public key corresponding to the user information from the storage apparatus, verifying, by the image verification apparatus, whether the image data has been altered or not using the verification data and the public key corresponding to the user information. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
sending, from a user information input apparatus to a key generation apparatus, user information relating to a user; sending, from the user information input apparatus to an image input apparatus, the user information; after the key generation apparatus receives the user information from the user information input apparatus, generating, by the key generation apparatus, a private key which corresponds to the user information; sending, from the key generation apparatus to the image input apparatus, the private key corresponding to the user information; sending, from the key generation apparatus to a storage apparatus, the user information and the private key corresponding to the user information; after the storage apparatus receives the user information and the private key corresponding to the user information from the key generation apparatus, sending, from the storage apparatus to an image verification apparatus, the private key corresponding to the user information; after the image input apparatus receives the user information from the user information input apparatus and receives the private key corresponding to the user information from the key generation apparatus, generating verification data for image data using the private key corresponding to the user information; sending, from the image input apparatus to one of the image verification apparatus and a storage medium, the user information, the verification data, and the image data; and after the image verification apparatus receives the user information, the verification data, and the image data from one of the image input apparatus and the storage medium, and receives the private key corresponding to the user information from the storage apparatus, verifying, by the image verification apparatus, whether the image data has been altered or not using the verification data and the private key corresponding to the user information. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification