×

Auditing system for misuse of an image information

  • US 8,781,296 B2
  • Filed: 12/08/2011
  • Issued: 07/15/2014
  • Est. Priority Date: 12/14/2010
  • Status: Active Grant
First Claim
Patent Images

1. An auditing system of misuse of an image information comprising:

  • a first image recording device recording the image information, and storing the recorded image information as a file,a second image recording device recording an image of a person who approaches toward the first image recording device in order to determine whether the person is authorized to access to the first image recording device, wherein the image of the person captured by the second image recording device is transmitted to an auditing server,an agent located in the first image recording device, said agent is configured to check a change of a hash value of the image information, a change of a size of the file, and a change of the file content without changing the size of the file, and said agent generates a modification data if any one of changes to the hash value, the size of the file, and the file content is detected, and the agent monitors a plurality of behaviors to detect misuse and generates an image information log including an event data that records any detected misuse behavior to the stored image information; and

    the auditing server comprising,a receiving unit receiving the modification data and the image information log;

    a storing unit storing the modification data and the image information log;

    a misuse condition database storing the predetermined misuse condition data whether the misuse occurs by a comparison with the image information log can be determined; and

    a control unit being operative to compare the event data with the predetermined misuse condition data,generating the misuse alarm data if the event data included in the image information log is compared with and corresponds to the predetermined misuse condition data, further including information of such misuse occurrence in the image information log, and storing the image information log with the information of such misuse occurrence, orif the event data does not corresponds to the predetermined misuse condition data, including information that the misuse comparison has been conducted in the image information log, and storing the image information log in the storing unit,the auditing server receiving the modification data from the image recording device, generating a misuse alarm data when the modification occurs, receiving the image information log, generating the misuse alarm data when the event data that records the misuse behavior in the image information log is compared with all of predetermined misuse condition data, and a portion of the image information log corresponds to the predetermined misuse condition data, the predetermined misuse condition data includes the following cases;

    an attempt to watch the image information in which a storage period for the image information expires;

    an unauthorized attempt to copy the image information;

    an attempt to remotely transmit the file; and

    a transmission of a number of the image information that is greater than a predetermined number of transmission made within a predetermined time,wherein the auditing server stores the modification data and image information log in a Write Once Read Many (WORM) format so that misuse can be detected if there are any change to at least one of modification data and image information log.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×