WO2007055658A1 - Security system and method - Google Patents

Security system and method Download PDF

Info

Publication number
WO2007055658A1
WO2007055658A1 PCT/SG2006/000325 SG2006000325W WO2007055658A1 WO 2007055658 A1 WO2007055658 A1 WO 2007055658A1 SG 2006000325 W SG2006000325 W SG 2006000325W WO 2007055658 A1 WO2007055658 A1 WO 2007055658A1
Authority
WO
WIPO (PCT)
Prior art keywords
seal
exit
image data
data
photograph
Prior art date
Application number
PCT/SG2006/000325
Other languages
French (fr)
Inventor
Ko Khee Tay
Min Hui Ho
Chia Lee Wong
Khan Wea Wilbie Poh
Original Assignee
Ko Khee Tay
Min Hui Ho
Chia Lee Wong
Khan Wea Wilbie Poh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ko Khee Tay, Min Hui Ho, Chia Lee Wong, Khan Wea Wilbie Poh filed Critical Ko Khee Tay
Publication of WO2007055658A1 publication Critical patent/WO2007055658A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/21Intermediate information storage
    • H04N1/2104Intermediate information storage for one or a few pictures
    • H04N1/2112Intermediate information storage for one or a few pictures using still video cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems

Definitions

  • This invention relates to a security system and method and relates particularly, though not exclusively, a security system and method for image capturing apparatus.
  • an image capturing apparatus includes a camera (digital and analog), mobile telephonic apparatus with inbuilt camera, a mobile or cellular telephone with inbuilt camera, a personal digital assistant with telephone functionality and an inbuilt camera, and similar devices, particularly those with lenses of relatively small diameter.
  • Seals are devices used for indicating tamper and usage of a physical feature, for example, of a keypad or of a receptacle of a mobile device. These seals are commonly referred to as security seals and encompass anti-pilferage seals, anti- tamper devices and tamper indicating devices. Such seals are meant for one-time use only and are rarely reusable.
  • Seals have various industrial, governmental and military applications, including access control, records integrity authentication, inventory control and tracking, forwarding control, theft deterrence and detection, hazardous materials accountability, law enforcement, customs, sealforming instrument calibration, sealforming surveillance and monitoring equipment and protecting consumer products.
  • seals are not intended for physically restricting unauthorized access. Instead, seals are used for leaving unambiguous, non-erasable evidence of entry or tampering. Typically, seals function as psychological deterrents by making potential violators aware that security measures are in effect. Seals exist in various forms including frangible films, crimped cables and like irreversible mechanical assemblies, security containers, and enclosures that provide evidence of tampering by way of displaying irreversible damage or change when manipulated. However, seals that can easily be applied to an object for forming a seal thereof are known as adhesive seals.
  • Adhesive seals typically incorporate self-voiding mechanisms for tamper indication, for example, by disintegrating or tearing upon being removed or tampered.
  • Disintegrating adhesive seals are typically made from disintegrating or egg-shell vinyl, or perforated paper.
  • adhesive seals that tear are usually constructed from a plastics material with as low an elastic memory as possible. Therefore, removal of an adhesive seal that has already been applied to a surface causes permanent and obvious physical deformation to the adhesive seal.
  • An adhesive seal's basic ability to display irreversible damage or physical changes when subjected to tampering or removal is made possible the use of a high- strength adhesive for affixing the adhesive seal to a surface.
  • the properties of the material used, specific design of the adhesive seal and the high-strength adhesive used ensure destruction of the adhesive seal when tampered with, removed or opened.
  • the high-strength adhesive used by such adhesive seals causes other problems. Removal of an adhesive seal from a surface results in scars or stains being left on the surface. Some adhesive seals require forceful scraping or application of chemical solvents for facilitating removal. Therefore, adhesive seals cannot be used and applied to sensitive surfaces, for example over a camera lens or an optical communication port of a mobile communication device, for risk of damage or marking the lens or port.
  • adhesive seals that use low strength adhesive are not able to provide adequate indication of removal or tampering, and therefore encourage reuse of the adhesive seal.
  • Cameras can now be very small. Also, mobile telephones with in-built digital cameras are now very common. They provide a security problem as the camera may be used to take photographs in secure or confidential locations. As such, they are often required to be stored at security or like desk. Although that resolves the security problem, it means the owner of the mobile telephone is deprived of its telephone and messaging functionality for the time they are in the secure or confidential location. By sealing the lens of the camera the camera or telephone can be taken into a secure area. However, upon return, investigations are required to be certain the camera has not been used in the secure area.
  • a security system for a portable camera having a lens able to be covered by a seal
  • the security system comprising:
  • the image recognition module also being for determining tampering of the seal by use of the exit image data and seal data.
  • a security method for a portable camera comprising:
  • the seal data may be one or more of: an entry photograph of the seal when covering the lens, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal.
  • the entry photograph of the seal is preferably taken at a time that is before the taking of the exit photograph.
  • the at least one camera may be at least one digital camera.
  • the determining of tampering may be by extracting exit image data from the exit photograph and comparing the exit image data with the seal data.
  • the at least one camera may be mounted in an activator, the activator also having an ultra violet lamp.
  • the exit image data may be date and time stamped.
  • the exit image data may be tagged with an identifier. If the seal data is an entry photograph the entry photograph may also be tagged with the same identifier.
  • the identifier may be information pertaining to the portable camera.
  • the forensic examination module may comprise a communication module for communicating with and extracting data from the portable camera.
  • the portable camera may by part of a mobile telephonic apparatus.
  • the forensic examination module may further comprise an analysis module for analyzing the extracted data.
  • the seal may be hardened prior to the entry photograph being taken. This may be by use of an ultra violet lamp.
  • the entry photograph may have entry image data extracted therefrom, the entry image data preferably being date and time stamped. The difference of the exit image data over the seal data may be required to exceed predetermined parameters for the forensic examination to take place.
  • the extracted data may be from the portable camera.
  • the portable camera may be part of a telephonic apparatus.
  • the extracted data may be analyzed.
  • Figure 1 is a schematic view of the system of a preferred embodiment
  • Figure 2 is a system architecture diagram for the system of Figure 1
  • Figure 3 is an overall flow chart for the system of Figure 1
  • Figure 4 is a flowchart for the seal activation unit of Figures 1 and 2
  • Figure 5 is a flowchart for the image recognition module of Figures 1 and 2
  • Figure 6 is a flowchart for the forensic examination module of Figures 1 and 2.
  • FIG. 1 To refer to the drawings there is shown an apparatus and a system for security in relation to a portable camera 10, in this case a mobile telephonic apparatus 10 with an inbuilt camera 12.
  • the camera 12 includes a lens 14.
  • a seal 16 is to be used to cover and seal the lens 14.
  • the seal 16 may be any suitable form of seal such as described in Singapore patent application filed contemporaneously herewith for "A Tamper Evident Seal", (the contents of which one hereby incorporated herein by reference as if disclosed herein), a non-permanent paper seal with an overlay of a permanent or semipermanent frangible sticker, a settable liquid such as, for example, DYMAX, any combination of them, or otherwise as required or desired.
  • Data in relation to the seal 16 is obtained. This may be one or more of: an entry photograph of the seal 16 applied to the camera 12, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal.
  • the defined parameters may be those required to establish a seal that has not been the subject of tampering, or to establish that a seal has been the subject of tampering.
  • the seal activation unit 20 has a housing 21 with an open front 22, a hollow interior 24 and a base 23. When the seal 16 has been placed over lens 14 (300) the mobile telephonic apparatus 10 is placed on the base 23 inside the hollow interior 24 with the lens 14 and seal 16 uppermost.
  • the entry photograph is sent to computer 30 for extraction of entry image data (303).
  • An image recognition module 32 uses a processor 33 in computer 30 to process the entry photograph to extract entry image data relating to the characteristics of the seal 16.
  • the entry image data may be tagged with an identifier that links the entry photograph to the particular apparatus 10 (304).
  • the tag may be input by an operator using keyboard 35 or a bar code scanner, a magnetic card reader, an RF card interface, or the like.
  • the identifier may be, for example, an identifying characteristic of the apparatus 10 such as its serial number, telephone number, or it may be user identity card number, passport number, employee pass number, security pass number, or the like.
  • the tagged entry photograph is date and time stamped (305).
  • the extracted entry image data is stored in the storage 31 of the computer 30 by reference to the tag and/or date and time stamp (306).
  • the user is then allowed to carry the apparatus 10 into a secured area and use the telephone functionality.
  • the same process is followed.
  • the exit digital photograph is taken (307) and processed the tags are compared, and the user 10 compared (308) to ensure the same apparatus 10 is involved.
  • the data and time stamp is checked to ensure exit time is after the entry data and time stamp (309).
  • Further processing is as above, and the exit image data is extracted (310), the entry digital image data (311) is used in conjunction with the exit image data to determine if the seal 14 has been tampered with in any way during the intervening period such that its characteristics have been visually changed as determined by image recognition engine 32 (312). This may be by a comparison such as, for example, by comparing image data. Alternatively, it may be by use of the defined parameters. Such tampering may include removal and replacement to use the digital camera 12 in the secured area in contravention of stated security measures.
  • the camera 12 may have been used to take one or more photographs within the secure area. If any digital photographs have been taken they may be stored in the apparatus 10. They therefore can be found and deleted relatively easily. However, they may have been sent as an MMS or SMS message, saved into a flash memory card, saved to a portable disk drive, or the like. In such a case the digital photographs and message data may have subsequently been deleted from the memory of the apparatus 10.
  • the apparatus 10 is transferred to a forensic examination module 40 (318).
  • a forensic examination unit 40 is the "Cell Phone Seizure" product from Panaben Corporation of Pleasant Grove, Utah, USA; or Chippy Forensic IrDA from BK Forensics of Warrington, Pennsylvania, USA. After the result of the forensic examination is known, the process ends (315).
  • the apparatus 10 is inserted into the activator 20 (400).
  • the activator 20 may include an ultra violet lamp 26 for the setting of the seal 16 or any part of the seal 16 prior to the initial digital photograph being taken (402). If not (403) such as, for example, when taking the exit photograph (307), the photograph is taken (404/302) and sent for processing (405). The processing in the activator then ends (406).
  • the detail process of dealing with the digital image data is shown in Figure 5.
  • the entry photograph is received (500) and the entry image data extracted (501). This is to reduce the data stored so that only the entry image data relating to the required portion (i.e. that portion that includes the seal 16) of the entry photograph is stored.
  • the tag is applied (502) as is the data and time stamp (503), and the extracted entry image data is then stored (504) with the tag, and the date and time stamp.
  • the exit photograph is received (505) the same tag is used and a check is performed (506) to be certain that date and time stamp is subsequent to that of (503). If it is, the exit digital image data is located (508) and loaded (509). The entry and exit image data are then compared (510). If there are no differences (512), or if the differences to not exceed the predetermined parameters (516), the process end.
  • the predetermined parameters are to allow for the usual buffing, scuffing and scratching that may take place due to the apparatus 10 being transported via, for example, a pouch, pocket or handbag.
  • the apparatus 10 is passed to the forensic unit 40 (518) and the process in the computer 30 ends.
  • the forensic unit 40 receives the apparatus (600) and, using communication module 41 , communicates with apparatus 10 (601 ). All necessary data, including any call and image data, is located and extracted (602) and the data analyzed (603) using analyzer module 42. A report is prepared and sent (604) and the process ends (605). Appropriate measures can then be undertaken to determine if there has been a security breach and, if so, its extent.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Studio Devices (AREA)
  • Image Input (AREA)

Abstract

A security system for a portable camera is disclosed where the portable camera has a lens able to be covered by a seal. The security system has at least one camera for taking an exit photograph of the seal when covering the lens and an image recognition module for extracting exit image data from the exit photograph. The image recognition module is also used to determine tampering of the seal by use of the exit image data and seal data. The seal data is at least one of: an entry photograph of the seal when covering the lens, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal.

Description

Security System and Method
Field of the Invention
This invention relates to a security system and method and relates particularly, though not exclusively, a security system and method for image capturing apparatus.
Definition
Throughout this specification a reference to an image capturing apparatus includes a camera (digital and analog), mobile telephonic apparatus with inbuilt camera, a mobile or cellular telephone with inbuilt camera, a personal digital assistant with telephone functionality and an inbuilt camera, and similar devices, particularly those with lenses of relatively small diameter.
Background of the Invention
Seals are devices used for indicating tamper and usage of a physical feature, for example, of a keypad or of a receptacle of a mobile device. These seals are commonly referred to as security seals and encompass anti-pilferage seals, anti- tamper devices and tamper indicating devices. Such seals are meant for one-time use only and are rarely reusable.
Seals have various industrial, governmental and military applications, including access control, records integrity authentication, inventory control and tracking, forwarding control, theft deterrence and detection, hazardous materials accountability, law enforcement, customs, sealforming instrument calibration, sealforming surveillance and monitoring equipment and protecting consumer products.
Unlike locks, seals are not intended for physically restricting unauthorized access. Instead, seals are used for leaving unambiguous, non-erasable evidence of entry or tampering. Typically, seals function as psychological deterrents by making potential violators aware that security measures are in effect. Seals exist in various forms including frangible films, crimped cables and like irreversible mechanical assemblies, security containers, and enclosures that provide evidence of tampering by way of displaying irreversible damage or change when manipulated. However, seals that can easily be applied to an object for forming a seal thereof are known as adhesive seals.
Adhesive seals typically incorporate self-voiding mechanisms for tamper indication, for example, by disintegrating or tearing upon being removed or tampered.
Disintegrating adhesive seals are typically made from disintegrating or egg-shell vinyl, or perforated paper. In contrast, adhesive seals that tear are usually constructed from a plastics material with as low an elastic memory as possible. Therefore, removal of an adhesive seal that has already been applied to a surface causes permanent and obvious physical deformation to the adhesive seal.
An adhesive seal's basic ability to display irreversible damage or physical changes when subjected to tampering or removal is made possible the use of a high- strength adhesive for affixing the adhesive seal to a surface. The properties of the material used, specific design of the adhesive seal and the high-strength adhesive used ensure destruction of the adhesive seal when tampered with, removed or opened.
However, the high-strength adhesive used by such adhesive seals causes other problems. Removal of an adhesive seal from a surface results in scars or stains being left on the surface. Some adhesive seals require forceful scraping or application of chemical solvents for facilitating removal. Therefore, adhesive seals cannot be used and applied to sensitive surfaces, for example over a camera lens or an optical communication port of a mobile communication device, for risk of damage or marking the lens or port.
Additionally, adhesive seals that use low strength adhesive are not able to provide adequate indication of removal or tampering, and therefore encourage reuse of the adhesive seal.
Cameras can now be very small. Also, mobile telephones with in-built digital cameras are now very common. They provide a security problem as the camera may be used to take photographs in secure or confidential locations. As such, they are often required to be stored at security or like desk. Although that resolves the security problem, it means the owner of the mobile telephone is deprived of its telephone and messaging functionality for the time they are in the secure or confidential location. By sealing the lens of the camera the camera or telephone can be taken into a secure area. However, upon return, investigations are required to be certain the camera has not been used in the secure area.
Summary of the Invention
In accordance with a first preferred aspect there is provided a security system for a portable camera, the portable camera having a lens able to be covered by a seal, the security system comprising:
(a) at least one camera for taking an exit photograph of the seal when covering the lens; (b) an image recognition module for extracting exit image data from the exit photograph; and
(c) the image recognition module also being for determining tampering of the seal by use of the exit image data and seal data.
According to a second preferred aspect, there is provided a security method for a portable camera, the portable camera having a lens able to be covered by a seal, the security method comprising:
(a) obtaining seal data pertaining to the seal;
(b) taking at least one exit photograph of the seal when covering the lens;
(c) extracting exit image data from the exit photograph and determining if the seal has been tampered by use of the exit image data and the seal data.
The seal data may be one or more of: an entry photograph of the seal when covering the lens, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal. The entry photograph of the seal is preferably taken at a time that is before the taking of the exit photograph. The at least one camera may be at least one digital camera. There may be further included a forensic examination module for conducting a forensic examination of the portable camera if the exit image data is different to the seal data. The determining of tampering may be by extracting exit image data from the exit photograph and comparing the exit image data with the seal data.
The at least one camera may be mounted in an activator, the activator also having an ultra violet lamp. The exit image data may be date and time stamped. The exit image data may be tagged with an identifier. If the seal data is an entry photograph the entry photograph may also be tagged with the same identifier. The identifier may be information pertaining to the portable camera.
Preferably, the difference of the exit image data over the first digital image data must exceed predetermined parameters for the forensic examination to take place. The forensic examination module may comprise a communication module for communicating with and extracting data from the portable camera. The portable camera may by part of a mobile telephonic apparatus. The forensic examination module may further comprise an analysis module for analyzing the extracted data.
For the second aspect the seal may be hardened prior to the entry photograph being taken. This may be by use of an ultra violet lamp. The entry photograph may have entry image data extracted therefrom, the entry image data preferably being date and time stamped. The difference of the exit image data over the seal data may be required to exceed predetermined parameters for the forensic examination to take place. The extracted data may be from the portable camera. The portable camera may be part of a telephonic apparatus. The extracted data may be analyzed.
Brief Description of the Drawings
In order that the present invention may be fully understood and readily put into practical effect, there shall now be described by way of non-limitative example only preferred embodiments of the present invention, the description being with reference to the accompanying illustrative drawings.
In the drawings:
Figure 1 is a schematic view of the system of a preferred embodiment; Figure 2 is a system architecture diagram for the system of Figure 1 ; Figure 3 is an overall flow chart for the system of Figure 1 ; Figure 4 is a flowchart for the seal activation unit of Figures 1 and 2; Figure 5 is a flowchart for the image recognition module of Figures 1 and 2; and Figure 6 is a flowchart for the forensic examination module of Figures 1 and 2.
Detailed Description of the Preferred Embodiments
To refer to the drawings there is shown an apparatus and a system for security in relation to a portable camera 10, in this case a mobile telephonic apparatus 10 with an inbuilt camera 12. The camera 12 includes a lens 14. A seal 16 is to be used to cover and seal the lens 14.
The seal 16 may be any suitable form of seal such as described in Singapore patent application filed contemporaneously herewith for "A Tamper Evident Seal", (the contents of which one hereby incorporated herein by reference as if disclosed herein), a non-permanent paper seal with an overlay of a permanent or semipermanent frangible sticker, a settable liquid such as, for example, DYMAX, any combination of them, or otherwise as required or desired.
Data in relation to the seal 16 is obtained. This may be one or more of: an entry photograph of the seal 16 applied to the camera 12, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal. The defined parameters may be those required to establish a seal that has not been the subject of tampering, or to establish that a seal has been the subject of tampering. In the first case, the seal activation unit 20 has a housing 21 with an open front 22, a hollow interior 24 and a base 23. When the seal 16 has been placed over lens 14 (300) the mobile telephonic apparatus 10 is placed on the base 23 inside the hollow interior 24 with the lens 14 and seal 16 uppermost. At least one camera 25, preferably a digital camera, is mounted in the apparatus 10 and focus on the seal 14. An entry photograph, preferably a digital photograph, is taken of the seal 14 (302) before entry into the secure location. The entry photograph is sent to computer 30 for extraction of entry image data (303). An image recognition module 32 uses a processor 33 in computer 30 to process the entry photograph to extract entry image data relating to the characteristics of the seal 16. The entry image data may be tagged with an identifier that links the entry photograph to the particular apparatus 10 (304). The tag may be input by an operator using keyboard 35 or a bar code scanner, a magnetic card reader, an RF card interface, or the like. The identifier may be, for example, an identifying characteristic of the apparatus 10 such as its serial number, telephone number, or it may be user identity card number, passport number, employee pass number, security pass number, or the like. The tagged entry photograph is date and time stamped (305). The extracted entry image data is stored in the storage 31 of the computer 30 by reference to the tag and/or date and time stamp (306).
The user is then allowed to carry the apparatus 10 into a secured area and use the telephone functionality. When they exit the secured area, the same process is followed. However, when the exit digital photograph is taken (307) and processed the tags are compared, and the user 10 compared (308) to ensure the same apparatus 10 is involved. The data and time stamp is checked to ensure exit time is after the entry data and time stamp (309). Further processing is as above, and the exit image data is extracted (310), the entry digital image data (311) is used in conjunction with the exit image data to determine if the seal 14 has been tampered with in any way during the intervening period such that its characteristics have been visually changed as determined by image recognition engine 32 (312). This may be by a comparison such as, for example, by comparing image data. Alternatively, it may be by use of the defined parameters. Such tampering may include removal and replacement to use the digital camera 12 in the secured area in contravention of stated security measures.
If there is no change, or if any change (313) is within predetermined, allowable parameters (314), a signal is produced providing an audible and/or visual output on monitor 34. The apparatus 10 can then be returned to the user for removal of seal 14 (315).
However, if there is a change beyond the predetermined parameters (316, 317), it indicates there may have been an unauthorized tampering with, or removal and replacement of, the seal 16. As such, the camera 12 may have been used to take one or more photographs within the secure area. If any digital photographs have been taken they may be stored in the apparatus 10. They therefore can be found and deleted relatively easily. However, they may have been sent as an MMS or SMS message, saved into a flash memory card, saved to a portable disk drive, or the like. In such a case the digital photographs and message data may have subsequently been deleted from the memory of the apparatus 10.
If tampering is found, the apparatus 10 is transferred to a forensic examination module 40 (318). This contains a communication module 41 for communication with the apparatus 10, and obtaining data from the apparatus 10. That data is then analyzed by the analysis module 42 to determine if any MMS or SMS message was sent by the apparatus 10, or if there has been any downloading or saving of image data. This would be subsequent to the date and time stamp of the entry digital photograph of the apparatus 10. If any such message was sent, the message data can be recovered and a determination made if there has been a security breach. An example, of such a forensic examination unit 40 is the "Cell Phone Seizure" product from Panaben Corporation of Pleasant Grove, Utah, USA; or Chippy Forensic IrDA from BK Forensics of Warrington, Pennsylvania, USA. After the result of the forensic examination is known, the process ends (315).
As shown in Figure 4, the apparatus 10 is inserted into the activator 20 (400). If required or desired (401), the activator 20 may include an ultra violet lamp 26 for the setting of the seal 16 or any part of the seal 16 prior to the initial digital photograph being taken (402). If not (403) such as, for example, when taking the exit photograph (307), the photograph is taken (404/302) and sent for processing (405). The processing in the activator then ends (406).
The detail process of dealing with the digital image data is shown in Figure 5. The entry photograph is received (500) and the entry image data extracted (501). This is to reduce the data stored so that only the entry image data relating to the required portion (i.e. that portion that includes the seal 16) of the entry photograph is stored. The tag is applied (502) as is the data and time stamp (503), and the extracted entry image data is then stored (504) with the tag, and the date and time stamp.
When the exit photograph is received (505) the same tag is used and a check is performed (506) to be certain that date and time stamp is subsequent to that of (503). If it is, the exit digital image data is located (508) and loaded (509). The entry and exit image data are then compared (510). If there are no differences (512), or if the differences to not exceed the predetermined parameters (516), the process end. The predetermined parameters are to allow for the usual buffing, scuffing and scratching that may take place due to the apparatus 10 being transported via, for example, a pouch, pocket or handbag.
If the predetermined parameters are exceeded (517) the apparatus 10 is passed to the forensic unit 40 (518) and the process in the computer 30 ends.
The forensic unit 40 receives the apparatus (600) and, using communication module 41 , communicates with apparatus 10 (601 ). All necessary data, including any call and image data, is located and extracted (602) and the data analyzed (603) using analyzer module 42. A report is prepared and sent (604) and the process ends (605). Appropriate measures can then be undertaken to determine if there has been a security breach and, if so, its extent.
Whilst there has been described in the foregoing description preferred embodiments of the present invention, it will be understood by those skilled in the technology concerned that many variations or modifications in details of design or construction may be made without departing from the present invention.

Claims

THE CLAIMS
1. A security system for a portable camera, the portable camera having a lens able to be covered by a seal, the security system comprising: (a) at least one camera for taking an exit photograph of the seal when covering the lens;
(b) an image recognition module for extracting exit image data from the exit photograph;
(c) the image recognition module also being for determining tampering of the seal using the exit image data and seal data.
2. A security system as claimed in claim 1 , wherein the seal data is at least one selected from the group consisting of: an entry photograph of the seal when covering the lens, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal.
3. A security system as claimed in claim 2, wherein the entry photograph of the seal is taken at a time that is before the taking of the exit photograph.
4. A security system as claimed in any one of claims 1 to 3, wherein the at least one camera is at least one digital camera.
5. A security system as claimed in any one of claims 1 to 4, wherein the at least one camera is mounted in an activator, the activator also having an ultra violet lamp.
6. A security system as claimed in any one of claims 1 to 5, wherein the exit image data is date and time stamped.
7. A security system as claimed in any one of claims 2 to 6, wherein the entry image data is date and time stamped.
8. A security system as claimed in any one of claims 1 to 7 further comprising a forensic examination module for conducting a forensic examination of the portable camera if the exit image data is different to the seal data.
9. A security system as claimed in claim 8, wherein the difference of the exit image data over the seal data must exceed predetermined parameters for the forensic examination to take place.
10. A security system as claimed in claim 8 or claim 9, wherein the forensic examination unit comprises a communication module for communicating with and extracting data from the portable camera.
11. A security system as claimed in claim 10, wherein the forensic examination unit further comprises an analysis module for analyzing the extracted data.
12. A security system as claimed in any one of claims 1 to 11 , wherein the exit image data is tagged with an identifier.
13. A security system as claimed in claim 12 when appended to any one of claims 2 to 11 , wherein the entry image data is tagged with the identifier.
14. A security system as claimed in claim 12 or claim 13, wherein the identifier is information pertaining to the portable camera.
15. A security system as claimed in any one of claims 1 to 14, wherein the portable camera is part of a telephonic apparatus.
16. A security method for a portable camera, the portable camera having a lens able to be covered by a seal, the security method comprising:
(a) obtaining seal data pertaining to the seal;
(b) taking at least one exit photograph of the seal when covering the lens;
(c) extracting exit image data from the exit digital photograph and determining if the seal has been tampered by use of the exit image data and the seal data.
17. A security method as claimed in claim 16, wherein the seal data is at least one selected from the group consisting of: an entry photograph of the seal when covering the lens, a stored image of an untampered seal, a stored image of a tampered seal, defined parameters of an untampered seal, and defined parameters of a tampered seal.
18. A security method as claimed in claim 17, wherein the entry photograph of the seal is taken at a time that is before the taking of the exit photograph.
19. A security method as claimed in any one of claims 16 to 18, wherein the at least one camera is at least one digital camera.
20. A security method as claimed in any one of claims 16 to 19, wherein the exit image data is date and time stamped.
21. A security method as claimed in any one of claims 17 to 20, wherein the entry image data is date and time stamped.
22. A security method as claimed in any one of claims 16 to 21 further comprising conducting a forensic examination module of the portable camera if the exit image data is different to the seal data.
23. A security method as claimed in claim 22 further comprising determining if the difference of the exit image data over the seal data exceeds predetermined parameters, the forensic examination take place if the difference exceeds the predetermined parameters.
24. A security method as claimed in claim 22 or claim 23, wherein the forensic examination unit comprises a communication module that communicates with and extracts data from the portable camera.
25. A security method as claimed in claim 24, wherein the forensic examination unit further comprises an analysis module that analyzes the extracted data.
26. A security method as claimed in any one of claims 16 to 25, wherein the exit image data is tagged with an identifier.
27. A security method as claimed in claim 26 when appended to any one of claims 17 to 25, wherein the entry image data is tagged with the identifier.
28. A security method as claimed in claim 26 or claim 27, wherein the identifier is information pertaining to the portable camera.
29. A security method as claimed in any one of claims 16 to 28, wherein at least a portion of the seal is hardened prior to step (a) by use of an ultra violet lamp.
PCT/SG2006/000325 2005-11-08 2006-11-02 Security system and method WO2007055658A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG200508418-1A SG132560A1 (en) 2005-11-08 2005-11-08 Security system and method
SG20058418-1 2005-11-08

Publications (1)

Publication Number Publication Date
WO2007055658A1 true WO2007055658A1 (en) 2007-05-18

Family

ID=38023538

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2006/000325 WO2007055658A1 (en) 2005-11-08 2006-11-02 Security system and method

Country Status (2)

Country Link
SG (1) SG132560A1 (en)
WO (1) WO2007055658A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3179441A1 (en) * 2015-12-11 2017-06-14 Authentic Vision GmbH Seal tamper detection
CN107851365A (en) * 2015-04-29 2018-03-27 哈利法科技大学 For the equipment for the operation for suppressing image recording structure
CN110881116A (en) * 2018-09-05 2020-03-13 航天信息股份有限公司 Portable monitoring and recording equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6351550B1 (en) * 1997-09-17 2002-02-26 Fujitsu Limited Seal imprint verifying apparatus
EP0917113B1 (en) * 1997-11-13 2004-08-25 Xerox Corporation Seal detection system and method
JP2005227445A (en) * 2004-02-12 2005-08-25 Sealex Corp Photographing preventive security sticker and supplying sheet for the same

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6351550B1 (en) * 1997-09-17 2002-02-26 Fujitsu Limited Seal imprint verifying apparatus
EP0917113B1 (en) * 1997-11-13 2004-08-25 Xerox Corporation Seal detection system and method
JP2005227445A (en) * 2004-02-12 2005-08-25 Sealex Corp Photographing preventive security sticker and supplying sheet for the same

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DATABASE WPI Week 200556, Derwent World Patents Index; Class P82, AN 2005-549208 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107851365A (en) * 2015-04-29 2018-03-27 哈利法科技大学 For the equipment for the operation for suppressing image recording structure
EP3179441A1 (en) * 2015-12-11 2017-06-14 Authentic Vision GmbH Seal tamper detection
WO2017097962A1 (en) * 2015-12-11 2017-06-15 Authentic Vision Gmbh Seal tamper detection
CN108352066A (en) * 2015-12-11 2018-07-31 真视野股份有限公司 Sealing element tampering detection
US20180365818A1 (en) * 2015-12-11 2018-12-20 Authentic Vision Gmbh Seal Tamper Detection
US10891726B2 (en) 2015-12-11 2021-01-12 Authentic Vision Gmbh Seal tamper detection
CN108352066B (en) * 2015-12-11 2022-11-15 真视野股份有限公司 Seal tampering detection method
CN110881116A (en) * 2018-09-05 2020-03-13 航天信息股份有限公司 Portable monitoring and recording equipment

Also Published As

Publication number Publication date
SG132560A1 (en) 2007-06-28

Similar Documents

Publication Publication Date Title
CN101313118B (en) Tamper-proof and reusable high security seal
KR101765479B1 (en) System and method for managing secured belongings
US10017306B2 (en) Tamper resistant assembly for securing valuable material
EP1087334B1 (en) Multi-use electronic seal with passive transponder
CN101123008A (en) Noble dangerous goods monitoring system
CN105809868A (en) RFID-technology-based campus anti-theft system and method
KR20190035187A (en) Sound alarm broadcasting system in monitoring area
US20100287568A1 (en) System and method for generation of integrated reports for process management and compliance
WO2007055658A1 (en) Security system and method
JP4697942B2 (en) Shooting information management system
KR19980015298A (en) Financial security methods and devices
US20180218187A1 (en) Systems and methods for linking unique identifiers embedded in machine verifiable marks
KR101862686B1 (en) Entry and exit record management system and method thereof
CN103902866A (en) File protection system and method
CN110738077A (en) foreign matter detection method and device
JP2005128701A (en) Electronic article surveillance system and its method
JP5140270B2 (en) Property monitoring system
CN106603814A (en) Method and apparatus for operating false shutdown of mobile terminal
CN102087772A (en) Image notification on security panel for protected assets
KR200211094Y1 (en) Portable regidents-card checking system that is used wireless internet transmission system
Toyokawa et al. Secure digital photograph handling with watermarking technique in insurance claim process
KR100783160B1 (en) Security System using electronic dispay board
Garcia et al. New Tamper-Indicating Seals
CN115080938A (en) Privacy protection method, system, computer equipment and readable storage medium
Thamizhselvi et al. Drugex: The Drug Extinctor App

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06813105

Country of ref document: EP

Kind code of ref document: A1