EP3049990A1 - A method for certifying data relating to an occurrence - Google Patents

A method for certifying data relating to an occurrence

Info

Publication number
EP3049990A1
EP3049990A1 EP13770902.8A EP13770902A EP3049990A1 EP 3049990 A1 EP3049990 A1 EP 3049990A1 EP 13770902 A EP13770902 A EP 13770902A EP 3049990 A1 EP3049990 A1 EP 3049990A1
Authority
EP
European Patent Office
Prior art keywords
file
electronic
multimedia file
occurrence
multimedia
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP13770902.8A
Other languages
German (de)
French (fr)
Inventor
Manuel GARDEÑES LIÑAN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP3049990A1 publication Critical patent/EP3049990A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

A method for electronically certifying at least one multimedia file relating to an occurrence, the method comprising: obtaining the multimedia file relating to the occurrence; digitally signing the multimedia file by generating an electronic fingerprint of said multimedia file; creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file and processing at least the certification electronic file.

Description

A METHOD FOR CERTIFYING DATA RELATING TO AN OCCURRENCE.
The present invention relates to a method for electronically certifying multimedia data relating to an occurrence in order to deliver one or more tangible and irrefutably unaltered records relating to the occurrence.
The invention also relates to a system, a computing program product and a computer system suitable for carrying out such method. This invention has applications across all sectors including military, civilian, professional, scientific and industrial sectors.
BACKGROUND ART Currently, obtaining a certification of data relating to an occurrence requires the presence of one or more qualified witnesses or a certified notary. For instance, in order to be recognized as a new world record holder the feat must take place in front of qualified arbiters who attest to the information relating to the feat which may include identity details of the performer, the measurement or the extent of the new world record achieved, the date and the time to name a few. Similarly, if a person wishes to make a declaration of his will and testament, he would need to do this in the presence of a notary. Normally, the notary attests to having verified the identity of the one or more signatories, that the signatories are sound of mind, that the signatures are signed in his presence and to the date and time of signing. In yet another example, if a company in Egypt seeks to certify a trade contract with a company in the United States of America (US), the signature of the US counterpart on the trade contract would need to be witnessed and attested by the local US chamber of commerce and then the US chamber of commerce's stamp or signature would further need to be authenticated by the US embassy in Egypt.
Currently, data relating to occurrences, events and communications is captured and recorded everyday using a wide range of apparatuses, transducers and computers. We often see examples of data relating to occurrences uploaded onto Internet websites. However, the authenticity of these videos remains doubtful until corroborated by additional data relating to the same occurrence.
The existing methods for certifying data relating to an occurrence in the physical or in the digital world are insufficient to meet the requirements of modern society and business practices where communication networks, such as the Internet and wireless networks, and technology such as computers and mobile devices, have enabled people and other legal entities to independently record data relating to events which are occurring around them wherever they are and to interact from remote locations 24 hours a day and 365 days a year.
Examples of capturing data relating to occurrences may include: an unexpected event during a scientific experiment recorded by a transducer or a computer, or a fight in a night club caught by a security camera, or a street demonstration caught by a passerby on his mobile phone, or a person's artistic performance recorded on a video camera or another person's declaration of will and testament captured on a video camera and a scanner in the absence of a certified notary, or screen shots relating to an online transaction conducted on the Internet in the absence of witnesses. It is beyond a notary's physical or technical capabilities to attest to the authenticity and validity of data records (e.g. video, audio or data reading) relating to an occurrence or to attest that it has not been altered unless she/he was personally present at the recording or by using extensive resources and time consuming measures to validate such data records.
International patent application PCT/EP2013/054915 by the same applicant as the present application discloses a method of certifying a procedure of signature of an electronic file relating to an agreement between at least two parties, the method comprises providing an electronic file relating to an agreement between at least two parties; and when acceptance data of the agreement is received from at least one party the method further comprises digitally signing the agreement electronic file by generating an electronic fingerprint of said agreement electronic file; creating a certification file comprising at least the agreement electronic file and the generated electronic fingerprint of said agreement electronic file; processing at least the certification file. Consequently, what is needed is an improved method for certifying data relating to a broad range of occurrences with the objective of delivering one or more tangible and irrefutably unaltered multimedia records relating to such occurrences.
SUMMARY OF THE INVENTION
The aim of this invention is to provide a method, a system, a computing system and a computer program product for electronically certifying one or more multimedia files or data streams relating to an occurrence by generating a unique certification seal certifying their authenticity.
To achieve the above, according to a first aspect, a method is disclosed for electronically certifying at least one multimedia file relating to an occurrence, the method comprising: obtaining the multimedia file relating to the occurrence; digitally signing the multimedia file by generating an electronic fingerprint of said multimedia file; creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file; and processing at least the certification electronic file.
According to embodiments, the occurrence may be a statement by a single party or a security occurrence or similar. On the other hand, the occurrencemay not be a procedure of signature of an agreement between at least two parties.
The term "security occurrence or similar" refers to an occurrence that involves or affects the security and wellbeing of persons, animals or property. A security occurrence may apply in a civilian, professional or military context and may be a preventative, a proactive, a reactive, an administrative or simply an observational security measure. Other occurrences, events and instants relating to security may also be included in this definition.
This way, the created certification electronic file may be cryptographically sealed and saved in a digital format for future use as evidence of the occurrence, said certification electronic file being a tangible and irrefutably unaltered multimedia record relating to the occurrence. Multimedia files or records may comprise a combination of text, audio, still images, animation, video, rich media or interactivity content forms. In some cases, multimedia files may only include a single media. Multimedia may be recorded and played, displayed or accessed by information content processing devices, such as computerized and electronic devices, but may also be part of a live performance. Multimedia devices may be electronic media devices used to store and experience multimedia content. The term "rich media" may be synonymous with interactive multimedia. Interactive media may refer to products and services on digital computer-based systems which respond to the user's actions by presenting content such as text, graphics, animation, video, audio, games, etc. Other forms of multimedia content may include, voice or video over Internet Protocol, Instant messaging chat, Short Message Service, Multimedia Messaging Service. The electronic fingerprint generated for each multimedia file is unique and confirms that the multimedia file has not been altered. More specifically, the electronic fingerprint of the multimedia file may comprise a cryptographic hash value that may be obtained by applying a cryptographic hash function to a consistent version of the multimedia file. The expression "consistent version" refers to a format of the multimedia file that always produces the same hash value when applying the same cryptographic hash function.
A cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value. The data to be encoded (i.e. inputted to the hash function) is often called the "message" and the hash value (i.e. the output of the hash function applied to the "message") is normally called message digest or simply digest.
A hash function that may be used is the SHA-256 (a universal cryptography algorithm from the United States National Security Agency (NSA CSS)) that belongs to the standard SHA-2 cryptographic hash functions set, although another hash function may be used if e.g. it is demonstrated in the future that SHA-256 is not secure enough. For example, SHA-1 and MD5 where initially considered in the context of this invention, but they were finally discarded due to some reported security flaws. The security of a hash function is determined by its resistance to collisions. A hash function is collision resistant if its application to different messages (data to be encoded) produces different message digest. Even though SHA- 256 is currently used in the context of this invention (the probability of collision for said hash function is approximately 1 to 1015 whereas the probability that a given file will generate two different hash codes is zero), it could be substituted in the future by another hash function with improved resistance to collisions (i.e. more secure), such as e.g. SHA-3, which is a new hash standard currently under development at the time of this patent application.
Such certified multimedia files or data streams may be regarded as tangible and irrefutably unaltered records relating to the occurrence, the statement of a single party or the security occurrence or similar. In the event of tampering any part of a sealed certified record, the latter irretrievably loses its unique certifying seal and the record is known to have been altered or corrupted.
On the other hand, said sealed certified records may be stored in a repository for future access by authorized persons and may be used in cases of conflict resolution, legal or scientific proceedings or other purposes depending on the application field.
In some embodiments, obtaining the multimedia file may comprise capturing data relating to the occurrence and converting the captured data into the at least one multimedia file.
Furthermore, the method may comprise storing the obtained multimedia file in a repository, associated to a unique identifier.
Furthermore, obtaining the multimedia file may comprise obtaining a timestamp relating to the beginning of capture of data relating to the occurrence; adding the obtained timestamp to the multimedia file, before digitally signing said multimedia file.
In further embodiments, obtaining the multimedia file may comprise obtaining a timestamp relating to the completion of capture of data relating to the occurrence; adding the obtained timestamp to the multimedia file, before digitally signing said multimedia file. Furthermore, the method may comprise storing the obtained timestamp(s) in a repository, associated to a unique identifier.
Obtaining a timestamp and adding said timestamp to the multimedia file before signing it further reinforces the irrefutable proof of the occurrence. Any modification of the timestamp will result in an irreversible change in the original electronic fingerprint associated to the multimedia file.
The aim of the obtained timestamp token is to establish the precise date and time at which the beginning and/or completion of capture of data relating to the occurrence is performed. This timestamp may be provided by an RFC 3161 compliant independent Time Stamping Authority (TSA). In some cases, the timestamp may be provided by an independent offline clock that has been calibrated by a Time Stamp Authority.
According to the RFC 3161 standard (a Request for Comments (RFC) is a publication of the Internet Engineering Task Force (IETF) and the Internet Society, the principal technical development and standards-setting bodies for the Internet), a trusted timestamp is a timestamp issued by a trusted third party (TTP) acting as a Time Stamping Authority (TSA). It is used to prove the existence of certain data before a certain point (e.g. contracts, research data, medical records, etc.) whilst preventing anyone from backdating the timestamps. Multiple TSAs can be used to increase reliability and reduce vulnerability.
In other embodiments, the method may comprise linking metadata to the multimedia file and may comprise storing the metadata linked to the multimedia file in a repository, associated to a unique identifier.
Said metadata may be obtained from different sources and may be used to confirm and/or certify the veracity of the recording of the occurrence. For example, the metadata may be obtained from the recording device and the associated local system (e.g. the serial number, the Media Access Control (MAC) address, etc.) or from other external sources (e.g. the name of the proprietor of the recording device, etc.). Additionally, the metadata may be added to the nnultinnedia file, before digitally signing said nnultinnedia file (it further reinforces the irrefutable proof of the occurrence.
In other embodiments, creating a certification electronic file may comprise giving the multimedia file a name based on its associated electronic fingerprint; wherein the certification electronic file comprises the multimedia file and its associated electronic fingerprint as a renamed file.
This way, the certification file comprises the multimedia file and its associated electronic fingerprint, said electronic fingerprint being the name of the certified multimedia file.
In a number of embodiments, the method may comprise creating a file comprising the electronic fingerprint of the multimedia file and storing the electronic fingerprint file in a repository, associated to a unique identifier.
The term "certification file" may refer to a file that collects information from a multimedia file related or generated as part of the method in regards to the certification of the multimedia file, and the hash value or fingerprint of the multimedia file.
For legal purposes and as detailed throughout this patent application, this certification file may be ultimately digitally signed and time stamped so as to grant the integrity of the data contained on it, reliably set the date when it was created and, finally, enabling to compare the information contained on it with the original data from which this information was obtained and prove the integrity of this original data.
In some embodiments creating a certification electronic file may comprise creating a packed file, for example a compressed and/or encrypted file, comprising the multimedia file and its associated electronic fingerprint file; wherein the certification electronic file comprises the multimedia file and its associated electronic fingerprint file as a packed file. Creating a file comprising the generated electronic fingerprint of the multimedia file is required prior to creating the packed file. The method may also comprise storing the certification electronic file in a repository, associated to a unique identifier. It is important to highlight that all described files (e.g. the multimedia file, the metadata linked to the multimedia file, the electronic fingerprint file, the certification electronic file, the obtained timestamps) may be stored in a repository of certification data. A unique identifier of the occurrence may be generated and said described files may be stored in the repository of certification data, associated to said unique identifier.
With reference to the unique identifier, it may have the form of an alphanumeric string. If the repository of certification data is a relational database, the unique identifier may be the primary key of the database.
In some cases, data stored in the repository of certification data may optionally be encrypted.
Due to the fact that digital signatures are based on cryptographic algorithms that can be broken in the future, the digital signature of a digitally signed file may be considered valid for a limited period of time, after which the signature may expire. This period of time may be of a few years. In order to keep the digital signature of the certification file in force, some embodiments of the method may comprise periodically digitally signing over the certification file and adding a timestamp to the new digital signature. This periodic signature and timestamp may be generated e.g. a reasonably short time before the expiration of the current signature and related timestamp.
Consequently, by signing the generated certification file and time stamping the generated digitally signed certification file it may be possible to prove the content of the multimedia file in a reliable way and when the occurrence and the certification process took place.
In some embodiments, the method may comprise obtaining identification data of at least one party (e.g. the proprietor of the recording device or the proprietor of a store to be secured) relating to the occurrence. The method may also comprise adding the obtained identification data in the multimedia file, before digitally signing said multimedia file. The obtained identification data may comprise at least an electronic message address, wherein the electronic message address may be an electronic mail address. Once the certification file has been created, processing the certification file to make it available may be required. This way, according to different embodiments, processing the certification file may comprise the following options (obviously other options may be possible).
In some embodiments, processing at least the certification electronic file may comprise sending an electronic message comprising the certification electronic file (e.g. the certification file may be attached to the electronic mail message) to the obtained electronic message address with an electronic message comprising a path for accessing to the certification electronic file.
In other embodiments, the method may comprise receiving an electronic message confirmation file of acceptance or refusal for each sent electronic message from the electronic server managing the electronic message address. Furthermore, the method may comprise receiving a timestamp of the generation of the electronic message confirmation file, Furthermore, the method may comprise storing the received timestamp in a repository, associated to a unique identifier or in any other repository of data.
This way, it can be easily ensured and certified that the electronic mail message has been delivered to the electronic mail server managing the electronic mail address. With reference to the obtained identification data, it may be added in the multimedia file, before signing said multimedia file. Again, this solution improves the certification of the multimedia file because any modification in the identification data would involve changes in the electronic fingerprint of the multimedia file.
In an embodiment, the identification data may be a biometric identifier or environment conditions data. Biometric identifiers may be the distinctive, measurable physiological characteristics used to label and describe individuals. Biometrics may be captured with devices such as fingerprint readers, iris scanners or voice analysers. A physiological biometric would uniquely identify a person by his/her voice, DNA, handprint or behaviour. Behavioural biometrics are related to the behaviour of a person, including but not limited to: typing rhythm, gait, and voice.
In this invention, according to another embodiment, multi-factor authentication may be used. Multi-factor authentication is as an approach to security authentication, which requires that the user of a system provide more than one form of verification in order to prove their identity and allow access to the system. Multi-factor authentication takes advantage of a combination of several factors of authentication; three major factors include verification by something a user knows such as a password, something the user has such as a smart card or a security token, and something the user is such as the use of biometrics. Due to their increased complexity, authentication systems using a multi-factor configuration are harder to compromise than ones using a single factor. A signatory's signature may be in ink on paper which is subsequently scanned and entered into a computing system or an electronic signature comprising a combination of letters, numbers and symbols which the signatory has chosen as his/her personal electronic signature or a unique cryptographically generated digital signature. The signature may also consist of a biometric identifier or one or more multi-factor authentication data.
In further embodiments, processing at least the certification electronic file may comprise causing the download of the certification electronic file in a computing system relating to the obtained identification data.
Consequently, the certification file may be made available in any of the described options for future use as evidence of the occurrence.
In other embodiments, the multimedia file may comprise any of the following multimedia data: audio data captured by a microphone comprised in a computing system; video data captured by a camera comprised in a computing system; text data generated in a computing system; snapshot data captured by a camera comprised in a computing system; screen shot data captured from the computing system; or any combination of them or any other apparatus capable of converting information from the physical world into one or more multimedia data file. In any case, the system may issue a request to the corresponding computing system to use the microphone and/or the camera (e.g. a webcam) associated to it. The response to the request may be generated automatically by the computing system or may be generated by a user of said computing system. The computing system that accepts this condition begins to transmit a video and/or an audio signal (multimedia data) to the system, which captures and records them and finally generates the at least one multimedia file.
In some embodiments, capturing data relating to the occurrence may comprise capturing the temporal evolution of the display of a computing system and/or a copy of image displayed on the screen of a computing system. Furthermore, the multimedia file may be a consistent electronic file.
This way, it is possible to reproduce the variations (e.g. modified elements, deleted elements or added elements during the occurrence) on the display (e.g. a screen) associated to a computing system.
The term "display" usually refers to an output device for presentation of information for visual or tactile reception. This way, this output device may be, for example, a screen, a LCD or LED television or similar, an electromechanical device for displaying Braille characters, or a volumetric display that form a visual representation of an object in three physical dimensions.
According to an aspect of the invention, provided is a computer program product comprising program instructions for causing a system (e.g. the system or the computing system described above) to perform a method of electronically certifying at least one multimedia file relating to an occurrence.
The invention may also relate to such a computer program product embodied on a storage medium (for example, a CD-ROM, a DVD, a USB drive, on a computer memory or on a read-only memory) or carried on a carrier signal (for example, on an electrical or optical carrier signal).
According to yet another aspect of the invention, provided is a system for electronically certifying at least one multimedia file relating to an occurrence, the system comprising: electronic/computing means for obtaining the multimedia file relating to the occurrence; electronic/computing means for digitally signing the nnultinnedia file by generating an electronic fingerprint of said nnultinnedia file; electronic/computing means for creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file; electronic/computing means for processing at least the certification electronic file.
According to an embodiment, said system may comprise electronic/computing means for connecting the system to a communication network. This connection may be suitable, for example, for obtaining timestamps from a TSA or for providing the certification file.
In another aspect, the invention discloses a computing system comprising a processor and a memory, embodying instructions stored in the memory and executable by the processor, the instructions comprising functionality to execute a method for electronically certifying at least one multimedia file relating to an occurrence.
The described computing system may comprise a communication module for connecting the computing system to a communication network. This connection may be suitable, for example, for obtaining timestamps from a TSA or for providing the certification file.
The term "communication network" is a collection of terminals, links and nodes that connect to enable telecommunication between users of the terminals. Each terminal in the network has a unique address so messages or connections can be routed to the correct recipients. Examples of telecommunications networks are computer networks, the Internet, the telephone network, the global Telex network or the aeronautical ACARS network. In this invention, the telecommunication network may be essential when obtaining a timestamp from a timestamp authority and/or for making available the certification electronic file.
Additional objects, advantages and features of embodiments of the invention will become apparent to those skilled in the art upon examination of the description, or may be learned by practice of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS Particular embodiments of the present invention will be described in the following by way of non-limiting examples, with reference to the appended drawing, Figure 1 , which illustrates a flow chart for a range of embodiments of the invention.
DETAILED DESCRIPTION OF EMBODIMENTS
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be understood by one skilled in the art however, that the present invention may be practiced without some or all of these specific details. In other instances, well known elements have not been described in detail in order not to unnecessarily obscure the description of the present invention.
Figure 1 illustrates a flow chart for a range of embodiments of the invention. For example, the method may be applied by security personnel in a nightclub for the purpose of certifying video multimedia data relating to an occurrence such as a fight between two people. Another example may be to certify video footage of skateboarding feat captured by a passerby with the camera of his mobile phone.
In Figure 1 , the method may be initiated at step 700 by the security guard at a touch of a button upon seeing a fight between two customers which he wishes to record and to certify as irrefutable evidence. This step may be a manual step initiated by a person or it may be an automatic step according to a computer program. In the case of the passer-by, he or she may initiate the certifying process by a touch of a button, or a mobile app, on his or her mobile device, whereby the mobile device uses the signal carrier or the mobile Internet to initiate a process of remote certification of the data captured on his mobile device.
At step 701 , a unique session identifier or number may be optionally generated and used as a common reference to all recorded multimedia data files and data streams relating to the same occurrence. Optionally, at step 702T a timestamp may be obtained online from a timestamp authority or from an offline timestamp device which may have been previously calibrated by a time stamp authority.
The method may comprise the optional provision for more than one and for different types of multimedia data recordings of the same occurrence to take place in parallel, thus generating multiple perspectives of the same occurrence. In some cases, these multiple perspectives may be synchronized. Capturing data relating to the occurrence may be achieved with any apparatus capable of transforming information from the physical and/or the digital world into a multimedia data format ready for being processed by a computing system and which may be processed according tothe method of this invention. Examples of such apparatuses may include digital thermometers capturing data relating to an experiment or an outdoor event in freezing conditions, mobile phones with built in video, audio and geographic positioning systems, digital scanners, medical inspection machines such as x- ray machines. There exists an infinite range of such apparatuses which may serve this purpose.
Steps 703A, 703B & 703C represent three different channels through which different perspectives or data relating to the occurrence may be recorded in one or more multimedia data files. The three channels are shown as an example and should not be regarded as a limitation of the invention. The method may equally be implemented with only one channel recording a single data file or one or more multimedia files, such as a video device recording images and sound, or with an unlimited number of multimedia data recording channels.
In the example of the security guard, data recording channel 703A may be a light-weight video camera attached to the security guard's headgear, while data recording channel 703B may be an audio recorder capturing the voice interaction the security guard may be using a mobile device to call the police for assistance, while the third channel 703C used in this example may be capturing geographic positioning information from the security guard's mobile device. Although having more than one channel would add further corroborative evidence to the non-refutable nature of the data relating to the occurrence, the method of certifying the data captured on the single channel relating to the occurrence or the incident may still be applied. In the example of the passer-by recording a skateboarding feat, the process of certifying the data relating to the event may be implemented remotely via a telecom or Internet based signal carrier. In this example, channel 703A may be the video camera within the mobile device, channel 703B may be geographic positioning information, while the third channel 703C may be data relating to the unique serial number and/or other built in characteristics of the mobile device used to capture the event.
At step 704A, 704B, and 704C, the certification process may begin for the multimedia data files or data streams obtained so far. The multimedia recording may have been terminated or may still be recording. Alternatively, the certification process may be done on the fly, by breaking up recorded multimedia data files and data streams into smaller data packet sizes and certifying each of these individually.
At steps 705TA, 705TB and 705TC, timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps may not be required. However, if obtained, they may be useful in establishing the correct date and time prior to generating electronic fingerprints. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
At steps, 706A, 706B and 706C, an electronic fingerprint may be generated for each of the multimedia data files or data streams obtained during the session. An electronic fingerprint is a hash code generated using the SHA256 universal cryptography algorithm from the United States National Security Agency. Based on the SHA256 algorithm, the probability of collision, whereby two different files generate the same exact hash code, is approximately 1 in 1018, however the probability that a given file will generate two different hash codes is zero. The hash codes are unique and ensure non-manipulation.
At steps 707TA, 707TB and 707TC, timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential however if obtained, they may be useful in establishing the correct date and time prior to generating electronic fingerprints. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals. At steps 708A, 708B and 708C, the certified multimedia data files or data streams may be created by combining the multimedia data files or data streams with their respective electronic fingerprints and may include the obtained one or more timestamps and may include the unique session number. The newly certified multimedia data files and data streams may each be named with a name based on its electronic fingerprint. In other embodiments, all the obtained multimedia data files and data streams may be combined into a single file or folder before having an electronic fingerprint generated.
At steps 709TA, 709TB and 709TC, timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential. However if obtained, they may be useful in establishing the correct date and time immediately after certifying the multimedia data files relating to the occurrence. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals. At step 710, the one or more certified multimedia data files or data streams are processed whereby the system may generate a single certificates list comprising one or more of the sealed certified multimedia data file names associated with the unique session identifier. At step 71 1 , the one or more certified multimedia data files and/or the certificates list may be stored in a repository and associated with the unique session identifier. One or more of the unique electronic fingerprints generated during the process may also serve as a unique session identifier. At step 712T, one or more timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential however if obtained, they may be useful in establishing the correct date and time at specific steps of the method. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
At step 713, the system may send at least one electronic message communication such as an email, a certified email, or a text message, for example on Facebook, twitter or other messaging media, comprising at least the unique session identifier and a path for accessing the one or more sealed certified multimedia data files or data streams relating to the occurrence in the repository to one or more electronic communication addresses. Furthermore, the certified multimedia data files may be accessed at a later date as and when required by authorised people or entities.
At least one electronic communication address may be pre-programed by the proprietor of the certifying method or system. Additional electronic communication addresses may be pre-programmed into the system or may be added as part of the multimedia data captured during one or more multimedia recording session. At step 714T, one or more timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential however if obtained, they may be useful in establishing the correct date and time at specific steps of the method. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
The method may be terminated at step 715.
In an alternative embodiment of the invention, the method may be used to certify data relating to a person writing or verbally declaring his will and testament in the absence of any witnesses. The declarer may start the process in his own home, whereby the system would obtain a timestamp online from a timestamp authority using the Internet or from an offline apparatus which was previously calibrated by a timestamp authority. The multimedia data relating to this occurrence may include one or more channels. For example, the step of capturing data 703A may be executed using a web camera recording the declarer's oral comments, if any, and actions while drafting a written statement, 703B may be a scanner for scanning the handwritten written document and 703C may be a digital fingerprint reader with which the declarer confirms his or her identity.
Additional multimedia data channels may include recording the person's credentials, identity details and his electronic communication address by typing this information into a computer or simply by reading these out aloud, whereby a voice recognition system would capture and translate his words into multimedia data to be including in the one or more files to be certified. Note that the invention may be implemented with only one data channel. However, it can be deduced that certifying multiple synchronised channels would provide stronger certified data relating to the occurrence.
The person may add a list of recipients' electronic communication addresses whom he wishes to receive a copy of his will and testament or any other declaration upon termination of the certification session or at a later date of his choice, or upon his death.
Additional timestamps may be obtained at regular intervals and added to each of the multimedia data files or data streams being recorded.
Once the session is completed, electronic fingerprints may be generated for each of the multimedia data files and/or data streams. The multimedia data files may each be combined with their electronic fingerprints, timestamps and the unique session identifier. The names of these certified multimedia data files may comprise their respective electronic fingerprints. The system may generate a certificates list comprising the unique session identifier and one or more of the certified multimedia file names relating to the occurrence. Finally, the certified multimedia data files and the certificates list may be stored in a repository wherein they are associated to the unique session identifier. The system may send an electronic message (e.g. an email, a certified email via a certified email server or a short message service or an instant messaging text) to the one or more electronic communication addresses captured during the session. The message may include at least the unique session identifier and a path for accessing the one or more sealed certified data files relating to the occurrence in the repository.
In another embodiment, the invention may be performed by a scientist for scientific investigation wherein data relating to a scientific occurrence and which is to be certified is captured using one or more transducers. In this example, the certifying process may be initiated at 700 by a pre-programmed triggering threshold, for example the triggering threshold may be the temperature of a material under examination which rises beyond a specific temperature as measured by an electronic thermometer connected to a computing system (for example, a PDA, a tablet, a smartphone, a personal computer, etc.) for carrying out the method. The data recording channel 703A may be an electronic thermometer connected to a material under inspection, 703B may be an extensometer also attached to the same material and 703C may be the readings from the material testing machine applying the tensile force to the material.
A further embodiment of the invention may include capturing metadata relating to the occurrence, for instance, geo-location data or a unique identifier number of a device present in the occurrence (e.g. a video camera capturing the occurrence) may be electronically mined or obtained and added to the file to be certified.
Other embodiments may be performed, for example, for military, security, commercial, civilian and professional applications. Furthermore, although the embodiments of the invention described with reference to the drawings comprise computer apparatus and processes performed in computer apparatus, the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice. The program may be in the form of source code, object code, a code intermediate source and object code such as in partially compiled form, or in any other form suitable for use in the implementation of the processes according to the invention. The carrier may be any entity or device capable of carrying the program. For example, the carrier may comprise a storage medium, such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a floppy disc or hard disk. Furthermore, the carrier may be a transmissible carrier such as an electrical or optical signal, which may be conveyed via electrical or optical cable or by radio or other means.
When the program is embodied in a signal that may be conveyed directly by a cable or other device or means, the carrier may be constituted by such cable or other device or means.
Alternatively, the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant processes.
Although only a number of particular embodiments and examples of the invention have been disclosed herein, it will be understood by those skilled in the art that other alternative embodiments and/or uses of the invention and obvious modifications and equivalents thereof are possible. Furthermore, the present invention covers all possible combinations of the particular embodiments described. Reference signs related to drawings and placed in parentheses in a claim, are solely for attempting to increase the intelligibility of the claim, and shall not be construed as limiting the scope of the claim. Thus, the scope of the present invention should not be limited by particular embodiments, but should be determined only by a fair reading of the claims that follow.

Claims

1 . A method for electronically certifying at least one multimedia file relating to an occurrence, the method comprising:
- Obtaining the multimedia file relating to the occurrence;
- Digitally signing the multimedia file by generating an electronic fingerprint of said multimedia file;
- Creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file;
- Processing at least the certification electronic file.
2. The method according to claim 1 , wherein the occurrence is not a procedure of signature of an agreement between at least two parties.
3. The method according to claim 1 , wherein the occurrence is a statement of a single party.
4. The method according to claim 1 , wherein the occurrence is a security occurrence or similar.
5. The method according to any of claims 1 to 4, wherein obtaining the multimedia file comprises:
- Capturing data relating to the occurrence;
- Converting the captured data into the at least one multimedia file.
6. The method according to claim 5, wherein obtaining the multimedia file comprises:
- Obtaining a timestamp relating to the beginning of capture of data relating to the occurrence;
- Adding the obtained timestamp to the multimedia file, before digitally signing said multimedia file.
7. The method according to any of claims 5 or 6, wherein obtaining the multimedia file comprises:
- Obtaining a timestamp relating to the completion of capture of data relating to the occurrence; - Adding the obtained timestamp to the nnultinnedia file, before digitally signing said nnultinnedia file.
8. The method according to claim any of claims 6 or 7, further comprising:
- Storing the obtained timestamp(s) in a repository, associated to a unique identifier.
9. The method according to any of claims 1 to 8, further comprising:
- Storing the obtained multimedia file in a repository, associated to a unique identifier.
10. The method according to any of claims 1 to 9, further comprising:
- linking metadata to the multimedia file.
1 1 . The method according to claim 10, further comprising:
- Storing the metadata linked to the multimedia file in a repository, associated to a unique identifier.
12. The method according to any of claims 1 to 1 1 , wherein creating a certification electronic file comprises:
- Giving the multimedia file a name based on its associated electronic fingerprint;
wherein the certification electronic file comprises the multimedia file and its associated electronic fingerprint as a renamed file.
13. The method according to any of claims 1 to 12, further comprising:
- Creating a file comprising the electronic fingerprint of the multimedia file.
14. The method according to claim 13, further comprising:
- Storing the electronic fingerprint file in a repository, associated to a unique identifier.
15. The method according to any of claims 13 or 14, wherein creating a certification electronic file comprises:
- Creating a packed file comprising the multimedia file and its associated electronic fingerprint file; wherein the certification electronic file comprises the multimedia file and its associated electronic fingerprint file as a packed file.
16. The method according to any of claims 1 to 15, wherein processing at least the certification electronic file comprises:
- Storing the certification electronic file in a repository, associated to a unique identifier.
17. The method according to any of claims 1 to 16, further comprising:
- Obtaining identification data of at least one party relating to the occurrence.
18. The method according to claim 17, further comprising:
- Adding the obtained identification data in the multimedia file, before digitally signing said multimedia file.
19. The method according to any of claims 17 to 18, wherein the obtained identification data comprises at least an electronic message address.
20. The method according to claim 19 wherein the electronic message address is an electronic mail address.
21 . The method according to any of claims 19 or 20, wherein processing at least the certification electronic file comprises:
- Sending an electronic message comprising the certification electronic file to the obtained electronic message address.
22. The method according to any of claims 19 to 21 , wherein processing at least the certification electronic file comprises:
- Sending to the obtained electronic message address an electronic message comprising a path for accessing to the certification electronic file.
23. The method according to any of claims 19 to 22, further comprising:
- Receiving an electronic message confirmation file of acceptance or refusal for each sent electronic message from the electronic server managing the electronic message address.
24. The method according to claim 23, further comprising:
- Receiving a timestamp of the generation of the electronic message confirmation file.
25. The method according to claim 24, further comprising:
- Storing the received timestamp in a repository, associated to a unique identifier.
26. The method according to any of claims 17 to 25, wherein processing at least the certification electronic file comprises:
- Causing the download of the certification electronic file in a computing system relating to the obtained identification data.
27. The method according to any of claims 1 to 26, wherein the multimedia file comprises any of the following multimedia data:
- Audio data captured by a microphone comprised in a computing system;
- Video data captured by a camera comprised in a computing system; - Text data generated in a computing system;
- Snapshot data captured by a camera comprised in a computing system;
- Screen shot data captured from the computing system
- Any combination of them.
28. The method according to claim 5, wherein capturing data relating to the occurrence comprises:
- Capturing the temporal evolution of the display of a computing system;
- Copy of image displayed on the screen of a computing system.
29. The method according to any of claims 1 to 28, wherein the multimedia file is a consistent electronic file.
30. A computer program product comprising program instructions for causing a system to perform a method of certifying at least one multimedia file relating to an occurrence according to any of claims 1 to 29.
31 . A computer program product according to claim 30, embodied on a storage medium.
32. A computer program product according to claim 30, carried on a carrier signal.
33. A system for electronically certifying at least one multimedia file relating to an occurrence, the system comprising:
- Electronic/computing means for obtaining the multimedia file relating to the occurrence;
- Electronic/computing means for digitally signing the multimedia file by generating an electronic fingerprint of said multimedia file;
- Electronic/computing means for creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file;
- Electronic/computing means for processing at least the certification electronic file.
34. The system according to claim 33, further comprising electronic/computing means for connecting the system to a communication network.
35. A computing system comprising a processor and a memory, embodying instructions stored in the memory and executable by the processor, the instructions comprising functionality to execute a method for electronically certifying at least one multimedia file relating to an occurrence according to any of claims 1 to 29.
36. The computing system according to claim 35, further comprising a communication module for connecting the computing system to a communication network.
EP13770902.8A 2013-09-27 2013-09-27 A method for certifying data relating to an occurrence Withdrawn EP3049990A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2013/070302 WO2015043668A1 (en) 2013-09-27 2013-09-27 A method for certifying data relating to an occurrence

Publications (1)

Publication Number Publication Date
EP3049990A1 true EP3049990A1 (en) 2016-08-03

Family

ID=49274641

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13770902.8A Withdrawn EP3049990A1 (en) 2013-09-27 2013-09-27 A method for certifying data relating to an occurrence

Country Status (2)

Country Link
EP (1) EP3049990A1 (en)
WO (1) WO2015043668A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016192777A1 (en) * 2015-06-02 2016-12-08 Egarante, S.L. Generating digital evidence

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7689900B1 (en) * 2000-06-05 2010-03-30 Fifield Davin J Apparatus, system, and method for electronically signing electronic transcripts
US20030065619A1 (en) * 2001-09-28 2003-04-03 Canon Kabushiki Kaisha Information processing device, information processing method, network system, security method for digital information, storage medium and program
US7065650B2 (en) * 2004-05-10 2006-06-20 Aladdin Knowledge Systems Ltd. Method for indicating the integrity of a collection of digital objects
DE202010018382U1 (en) * 2010-10-04 2016-03-07 cp.media AG Data processing device for generating a secure data record and device for evaluation
CA2862575C (en) * 2012-01-05 2018-01-23 Lg Electronics Inc. Video display apparatus and operating method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2015043668A1 *

Also Published As

Publication number Publication date
WO2015043668A1 (en) 2015-04-02

Similar Documents

Publication Publication Date Title
US10476888B2 (en) Systems and methods for using video for user and message authentication
TWI738659B (en) System and method for validating authorship of an electronic signature session
CN102722931B (en) Voting system and voting method based on intelligent mobile communication devices
US20130179692A1 (en) Systems and methods for three-factor authentication
US20160020909A1 (en) A method, a system, a computer system and a computer program product for certifying a procedure of signature of an electronic file relating to an agreement between at least two parties
US11531746B2 (en) Method for electronic signing of a document by a plurality of signatories
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
WO2014111022A1 (en) Mobile terminal user information display method, mobile terminal, and service system
CN103888442A (en) System with integration of visualization biological characteristics and one-time digital signature and method thereof
CN105825446A (en) Internet jury system
CN108833431A (en) A kind of method, apparatus, equipment and the storage medium of password resetting
AU2018217081B2 (en) System and method for synchronizing notary meeting interactions between multiple software clients
US10402211B2 (en) Method for processing innovation-creativity data information, user equipment and cloud server
CN110943960B (en) Court trial record electronic signature generation method, device, equipment and medium
CN106230860A (en) The method and apparatus sending Streaming Media
US20200322648A1 (en) Systems and methods of facilitating live streaming of content on multiple social media platforms
EP3435601B1 (en) Certified messaging system and method
WO2015043668A1 (en) A method for certifying data relating to an occurrence
CN106254341A (en) Data fingerprint extracting method and system for centralized electronic data safety system
US20150358318A1 (en) Biometric authentication of content for social networks
TWM624495U (en) Electronic signature device that can record the signature process
AU2018455995A1 (en) Universal certified and qualified contracting method
US11582044B2 (en) Systems and methods to timestamp and authenticate digital documents using a secure ledger
US20220231868A1 (en) Method of binding a digital representation of an actual event with the real time of its occurrence
CN110708302B (en) Dynamic two-dimensional code key manager based on positioning sensing data and method thereof

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20160428

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20200603