Anonymous identification tokens
First Claim
Patent Images
1. A method, comprising:
- receiving surveillance data;
deriving a first signature for the surveillance data;
storing the first signature;
associating extrinsic data with the first signature;
storing the extrinsic data separate from the surveillance data;
receiving identity data;
deriving a second signature for the identity data;
comparing the first signature to the second signature to determine if there is a match;
if the first signature matches the second signature, associating the identity data with the extrinsic data associated with the first signature, wherein the extrinsic data comprises a time the surveillance data was recorded, and a location at which the surveillance data was recorded, and the storing the extrinsic data separate from the surveillance data comprises;
deleting the surveillance data; and
storing the first signature and the extrinsic data comprising the time and the location in a database, wherein the first signature is stored in the database comprising a plurality of additional signatures derived from additional surveillance data; and
identifying a signature trend from the database, wherein the signature trend is identified as suspicious based on a number of times the second signature matches the first signature.
9 Assignments
0 Petitions
Accused Products
Abstract
Surveillance data is received from a source such as a traffic camera. The data is hashed and the signature is stored in a database. The data itself may be discarded after it is hashed. In an embodiment, extrinsic information such as time and location are associated with the signature. Identification data may be received and hashed. The signature belonging to the identification data may be compared to the database to determine if there is any matching surveillance data. If a match is found, the extrinsic information may be returned.
57 Citations
17 Claims
-
1. A method, comprising:
-
receiving surveillance data; deriving a first signature for the surveillance data; storing the first signature; associating extrinsic data with the first signature; storing the extrinsic data separate from the surveillance data; receiving identity data; deriving a second signature for the identity data; comparing the first signature to the second signature to determine if there is a match; if the first signature matches the second signature, associating the identity data with the extrinsic data associated with the first signature, wherein the extrinsic data comprises a time the surveillance data was recorded, and a location at which the surveillance data was recorded, and the storing the extrinsic data separate from the surveillance data comprises; deleting the surveillance data; and storing the first signature and the extrinsic data comprising the time and the location in a database, wherein the first signature is stored in the database comprising a plurality of additional signatures derived from additional surveillance data; and identifying a signature trend from the database, wherein the signature trend is identified as suspicious based on a number of times the second signature matches the first signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
a non-transitory storage device comprising a plurality of signatures derived from surveillance data; and a processor configured to; receive the surveillance data; derive a first signature for the surveillance data; store the first signature; associate extrinsic data with the first signature; store the extrinsic data separate from the surveillance data; receive identity data; derive a second signature for the identity data; compare the first signature to the second signature to determine if there is a match; if the first signature matches the second signature, associate the identity data with the extrinsic data associated with the first signature, wherein the extrinsic data comprises a time the surveillance data was recorded, and a location at which the surveillance data was recorded, and the storage of the extrinsic data separate from the surveillance data comprises; deletion of the surveillance data; and storage of the first signature and the extrinsic data comprising the time and the location in a database, wherein the first signature is stored in the database comprising a plurality of additional signatures derived from additional surveillance data; and identify a signature trend from the database, wherein the signature trend is identified as suspicious based on a number of times the second signature matches the first signature. - View Dependent Claims (15, 16)
-
-
17. A computer program product, comprising a non-transitory computer usable medium having machine readable code embodied therein for:
-
receiving surveillance data; deriving a first signature for the surveillance data; storing the first signature; associating extrinsic data with the first signature; storing the extrinsic data separate from the surveillance data; receiving identity data; deriving a second signature for the identity data; comparing the first signature to the second signature to determine if there is a match; if the first signature matches the second signature, associating the identity data with the extrinsic data associated with the first signature, wherein the extrinsic data comprises a time the surveillance data was recorded, and a location at which the surveillance data was recorded, and the storing the extrinsic data separate from the surveillance data comprises; deleting the surveillance data; and storing the first signature and the extrinsic data comprising the time and the location in a database, wherein the first signature is stored in the database comprising a plurality of additional signatures derived from additional surveillance data; and identifying a signature trend from the database, wherein the signature trend is identified as suspicious based on a number of times the second signature matches the first signature.
-
Specification