EP3049990A1 - Verfahren zur zertifizierung von daten im zusammenhang mit einem ereignis - Google Patents

Verfahren zur zertifizierung von daten im zusammenhang mit einem ereignis

Info

Publication number
EP3049990A1
EP3049990A1 EP13770902.8A EP13770902A EP3049990A1 EP 3049990 A1 EP3049990 A1 EP 3049990A1 EP 13770902 A EP13770902 A EP 13770902A EP 3049990 A1 EP3049990 A1 EP 3049990A1
Authority
EP
European Patent Office
Prior art keywords
file
electronic
multimedia file
occurrence
multimedia
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP13770902.8A
Other languages
English (en)
French (fr)
Inventor
Manuel GARDEÑES LIÑAN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP3049990A1 publication Critical patent/EP3049990A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Definitions

  • the present invention relates to a method for electronically certifying multimedia data relating to an occurrence in order to deliver one or more tangible and irrefutably unaltered records relating to the occurrence.
  • the invention also relates to a system, a computing program product and a computer system suitable for carrying out such method.
  • This invention has applications across all sectors including military, civilian, professional, scientific and industrial sectors.
  • BACKGROUND ART Currently, obtaining a certification of data relating to an occurrence requires the presence of one or more qualified witnesses or a certified notary. For instance, in order to be recognized as a new world record holder the feat must take place in front of qualified arbiters who attest to the information relating to the feat which may include identity details of the performer, the measurement or the extent of the new world record achieved, the date and the time to name a few. Similarly, if a person wishes to make a declaration of his will and testament, he would need to do this in the presence of a notary.
  • the notary attests to having verified the identity of the one or more signatories, that the signatories are sound of mind, that the signatures are signed in his presence and to the date and time of signing.
  • the signature of the US counterpart on the trade contract would need to be witnessed and attested by the local US chamber of commerce and then the US chamber of commerce's stamp or signature would further need to be authenticated by the US embassy in Egypt.
  • Examples of capturing data relating to occurrences may include: an unexpected event during a scientific experiment recorded by a transducer or a computer, or a fight in a night club caught by a security camera, or a street demonstration caught by a passerby on his mobile phone, or a person's artistic performance recorded on a video camera or another person's declaration of will and testament captured on a video camera and a scanner in the absence of a certified notary, or screen shots relating to an online transaction conducted on the Internet in the absence of witnesses. It is beyond a notary's physical or technical capabilities to attest to the authenticity and validity of data records (e.g. video, audio or data reading) relating to an occurrence or to attest that it has not been altered unless she/he was personally present at the recording or by using extensive resources and time consuming measures to validate such data records.
  • data records e.g. video, audio or data reading
  • the aim of this invention is to provide a method, a system, a computing system and a computer program product for electronically certifying one or more multimedia files or data streams relating to an occurrence by generating a unique certification seal certifying their authenticity.
  • a method for electronically certifying at least one multimedia file relating to an occurrence comprising: obtaining the multimedia file relating to the occurrence; digitally signing the multimedia file by generating an electronic fingerprint of said multimedia file; creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file; and processing at least the certification electronic file.
  • the occurrence may be a statement by a single party or a security occurrence or similar.
  • the occurrence may not be a procedure of signature of an agreement between at least two parties.
  • security occurrence or similar refers to an occurrence that involves or affects the security and wellbeing of persons, animals or property.
  • a security occurrence may apply in a civilian, professional or military context and may be a preventative, a proactive, a reactive, an administrative or simply an observational security measure.
  • Other occurrences, events and instants relating to security may also be included in this definition.
  • Multimedia files or records may comprise a combination of text, audio, still images, animation, video, rich media or interactivity content forms. In some cases, multimedia files may only include a single media. Multimedia may be recorded and played, displayed or accessed by information content processing devices, such as computerized and electronic devices, but may also be part of a live performance. Multimedia devices may be electronic media devices used to store and experience multimedia content. The term "rich media" may be synonymous with interactive multimedia.
  • Interactive media may refer to products and services on digital computer-based systems which respond to the user's actions by presenting content such as text, graphics, animation, video, audio, games, etc.
  • Other forms of multimedia content may include, voice or video over Internet Protocol, Instant messaging chat, Short Message Service, Multimedia Messaging Service.
  • the electronic fingerprint generated for each multimedia file is unique and confirms that the multimedia file has not been altered. More specifically, the electronic fingerprint of the multimedia file may comprise a cryptographic hash value that may be obtained by applying a cryptographic hash function to a consistent version of the multimedia file.
  • the expression "consistent version" refers to a format of the multimedia file that always produces the same hash value when applying the same cryptographic hash function.
  • a cryptographic hash function is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value.
  • the data to be encoded i.e. inputted to the hash function
  • the hash value i.e. the output of the hash function applied to the "message"
  • message digest or simply digest.
  • a hash function that may be used is the SHA-256 (a universal cryptography algorithm from the United States National Security Agency (NSA CSS)) that belongs to the standard SHA-2 cryptographic hash functions set, although another hash function may be used if e.g. it is demonstrated in the future that SHA-256 is not secure enough.
  • SHA-1 and MD5 where initially considered in the context of this invention, but they were finally discarded due to some reported security flaws.
  • the security of a hash function is determined by its resistance to collisions.
  • a hash function is collision resistant if its application to different messages (data to be encoded) produces different message digest.
  • SHA- 256 is currently used in the context of this invention (the probability of collision for said hash function is approximately 1 to 10 15 whereas the probability that a given file will generate two different hash codes is zero), it could be substituted in the future by another hash function with improved resistance to collisions (i.e. more secure), such as e.g. SHA-3, which is a new hash standard currently under development at the time of this patent application.
  • Such certified multimedia files or data streams may be regarded as tangible and irrefutably unaltered records relating to the occurrence, the statement of a single party or the security occurrence or similar.
  • the latter irretrievably loses its unique certifying seal and the record is known to have been altered or corrupted.
  • said sealed certified records may be stored in a repository for future access by authorized persons and may be used in cases of conflict resolution, legal or scientific proceedings or other purposes depending on the application field.
  • obtaining the multimedia file may comprise capturing data relating to the occurrence and converting the captured data into the at least one multimedia file.
  • the method may comprise storing the obtained multimedia file in a repository, associated to a unique identifier.
  • obtaining the multimedia file may comprise obtaining a timestamp relating to the beginning of capture of data relating to the occurrence; adding the obtained timestamp to the multimedia file, before digitally signing said multimedia file.
  • obtaining the multimedia file may comprise obtaining a timestamp relating to the completion of capture of data relating to the occurrence; adding the obtained timestamp to the multimedia file, before digitally signing said multimedia file.
  • the method may comprise storing the obtained timestamp(s) in a repository, associated to a unique identifier.
  • the aim of the obtained timestamp token is to establish the precise date and time at which the beginning and/or completion of capture of data relating to the occurrence is performed.
  • This timestamp may be provided by an RFC 3161 compliant independent Time Stamping Authority (TSA).
  • TSA Time Stamping Authority
  • the timestamp may be provided by an independent offline clock that has been calibrated by a Time Stamp Authority.
  • a trusted timestamp is a timestamp issued by a trusted third party (TTP) acting as a Time Stamping Authority (TSA). It is used to prove the existence of certain data before a certain point (e.g. contracts, research data, medical records, etc.) whilst preventing anyone from backdating the timestamps. Multiple TSAs can be used to increase reliability and reduce vulnerability.
  • TTP trusted third party
  • TSA Time Stamping Authority
  • the method may comprise linking metadata to the multimedia file and may comprise storing the metadata linked to the multimedia file in a repository, associated to a unique identifier.
  • Said metadata may be obtained from different sources and may be used to confirm and/or certify the veracity of the recording of the occurrence.
  • the metadata may be obtained from the recording device and the associated local system (e.g. the serial number, the Media Access Control (MAC) address, etc.) or from other external sources (e.g. the name of the proprietor of the recording device, etc.).
  • the metadata may be added to the nnultinnedia file, before digitally signing said nnultinnedia file (it further reinforces the irrefutable proof of the occurrence.
  • creating a certification electronic file may comprise giving the multimedia file a name based on its associated electronic fingerprint; wherein the certification electronic file comprises the multimedia file and its associated electronic fingerprint as a renamed file.
  • the certification file comprises the multimedia file and its associated electronic fingerprint, said electronic fingerprint being the name of the certified multimedia file.
  • the method may comprise creating a file comprising the electronic fingerprint of the multimedia file and storing the electronic fingerprint file in a repository, associated to a unique identifier.
  • certification file may refer to a file that collects information from a multimedia file related or generated as part of the method in regards to the certification of the multimedia file, and the hash value or fingerprint of the multimedia file.
  • this certification file may be ultimately digitally signed and time stamped so as to grant the integrity of the data contained on it, reliably set the date when it was created and, finally, enabling to compare the information contained on it with the original data from which this information was obtained and prove the integrity of this original data.
  • creating a certification electronic file may comprise creating a packed file, for example a compressed and/or encrypted file, comprising the multimedia file and its associated electronic fingerprint file; wherein the certification electronic file comprises the multimedia file and its associated electronic fingerprint file as a packed file. Creating a file comprising the generated electronic fingerprint of the multimedia file is required prior to creating the packed file.
  • the method may also comprise storing the certification electronic file in a repository, associated to a unique identifier. It is important to highlight that all described files (e.g. the multimedia file, the metadata linked to the multimedia file, the electronic fingerprint file, the certification electronic file, the obtained timestamps) may be stored in a repository of certification data. A unique identifier of the occurrence may be generated and said described files may be stored in the repository of certification data, associated to said unique identifier.
  • the unique identifier may have the form of an alphanumeric string. If the repository of certification data is a relational database, the unique identifier may be the primary key of the database.
  • data stored in the repository of certification data may optionally be encrypted.
  • the digital signature of a digitally signed file may be considered valid for a limited period of time, after which the signature may expire. This period of time may be of a few years.
  • some embodiments of the method may comprise periodically digitally signing over the certification file and adding a timestamp to the new digital signature. This periodic signature and timestamp may be generated e.g. a reasonably short time before the expiration of the current signature and related timestamp.
  • the method may comprise obtaining identification data of at least one party (e.g. the proprietor of the recording device or the proprietor of a store to be secured) relating to the occurrence.
  • the method may also comprise adding the obtained identification data in the multimedia file, before digitally signing said multimedia file.
  • the obtained identification data may comprise at least an electronic message address, wherein the electronic message address may be an electronic mail address.
  • processing at least the certification electronic file may comprise sending an electronic message comprising the certification electronic file (e.g. the certification file may be attached to the electronic mail message) to the obtained electronic message address with an electronic message comprising a path for accessing to the certification electronic file.
  • the method may comprise receiving an electronic message confirmation file of acceptance or refusal for each sent electronic message from the electronic server managing the electronic message address. Furthermore, the method may comprise receiving a timestamp of the generation of the electronic message confirmation file, Furthermore, the method may comprise storing the received timestamp in a repository, associated to a unique identifier or in any other repository of data.
  • the identification data may be a biometric identifier or environment conditions data.
  • Biometric identifiers may be the distinctive, measurable physiological characteristics used to label and describe individuals. Biometrics may be captured with devices such as fingerprint readers, iris scanners or voice analysers. A physiological biometric would uniquely identify a person by his/her voice, DNA, handprint or behaviour. Behavioural biometrics are related to the behaviour of a person, including but not limited to: typing rhythm, gait, and voice.
  • Multi-factor authentication is as an approach to security authentication, which requires that the user of a system provide more than one form of verification in order to prove their identity and allow access to the system.
  • Multi-factor authentication takes advantage of a combination of several factors of authentication; three major factors include verification by something a user knows such as a password, something the user has such as a smart card or a security token, and something the user is such as the use of biometrics. Due to their increased complexity, authentication systems using a multi-factor configuration are harder to compromise than ones using a single factor.
  • a signatory's signature may be in ink on paper which is subsequently scanned and entered into a computing system or an electronic signature comprising a combination of letters, numbers and symbols which the signatory has chosen as his/her personal electronic signature or a unique cryptographically generated digital signature.
  • the signature may also consist of a biometric identifier or one or more multi-factor authentication data.
  • processing at least the certification electronic file may comprise causing the download of the certification electronic file in a computing system relating to the obtained identification data.
  • the certification file may be made available in any of the described options for future use as evidence of the occurrence.
  • the multimedia file may comprise any of the following multimedia data: audio data captured by a microphone comprised in a computing system; video data captured by a camera comprised in a computing system; text data generated in a computing system; snapshot data captured by a camera comprised in a computing system; screen shot data captured from the computing system; or any combination of them or any other apparatus capable of converting information from the physical world into one or more multimedia data file.
  • the system may issue a request to the corresponding computing system to use the microphone and/or the camera (e.g. a webcam) associated to it.
  • the response to the request may be generated automatically by the computing system or may be generated by a user of said computing system.
  • the computing system that accepts this condition begins to transmit a video and/or an audio signal (multimedia data) to the system, which captures and records them and finally generates the at least one multimedia file.
  • capturing data relating to the occurrence may comprise capturing the temporal evolution of the display of a computing system and/or a copy of image displayed on the screen of a computing system.
  • the multimedia file may be a consistent electronic file.
  • display usually refers to an output device for presentation of information for visual or tactile reception.
  • this output device may be, for example, a screen, a LCD or LED television or similar, an electromechanical device for displaying Braille characters, or a volumetric display that form a visual representation of an object in three physical dimensions.
  • a computer program product comprising program instructions for causing a system (e.g. the system or the computing system described above) to perform a method of electronically certifying at least one multimedia file relating to an occurrence.
  • the invention may also relate to such a computer program product embodied on a storage medium (for example, a CD-ROM, a DVD, a USB drive, on a computer memory or on a read-only memory) or carried on a carrier signal (for example, on an electrical or optical carrier signal).
  • a storage medium for example, a CD-ROM, a DVD, a USB drive, on a computer memory or on a read-only memory
  • a carrier signal for example, on an electrical or optical carrier signal
  • a system for electronically certifying at least one multimedia file relating to an occurrence comprising: electronic/computing means for obtaining the multimedia file relating to the occurrence; electronic/computing means for digitally signing the nnultinnedia file by generating an electronic fingerprint of said nnultinnedia file; electronic/computing means for creating a certification electronic file comprising at least the multimedia file and the generated electronic fingerprint of said multimedia file; electronic/computing means for processing at least the certification electronic file.
  • said system may comprise electronic/computing means for connecting the system to a communication network.
  • This connection may be suitable, for example, for obtaining timestamps from a TSA or for providing the certification file.
  • the invention discloses a computing system comprising a processor and a memory, embodying instructions stored in the memory and executable by the processor, the instructions comprising functionality to execute a method for electronically certifying at least one multimedia file relating to an occurrence.
  • the described computing system may comprise a communication module for connecting the computing system to a communication network.
  • This connection may be suitable, for example, for obtaining timestamps from a TSA or for providing the certification file.
  • the term "communication network” is a collection of terminals, links and nodes that connect to enable telecommunication between users of the terminals. Each terminal in the network has a unique address so messages or connections can be routed to the correct recipients.
  • Examples of telecommunications networks are computer networks, the Internet, the telephone network, the global Telex network or the aeronautical ACARS network.
  • the telecommunication network may be essential when obtaining a timestamp from a timestamp authority and/or for making available the certification electronic file.
  • Figure 1 illustrates a flow chart for a range of embodiments of the invention.
  • the method may be applied by security personnel in a nightclub for the purpose of certifying video multimedia data relating to an occurrence such as a fight between two people.
  • Another example may be to certify video footage of skateboarding feat captured by a passerby with the camera of his mobile phone.
  • the method may be initiated at step 700 by the security guard at a touch of a button upon seeing a fight between two customers which he wishes to record and to certify as irrefutable evidence.
  • This step may be a manual step initiated by a person or it may be an automatic step according to a computer program.
  • the passer-by he or she may initiate the certifying process by a touch of a button, or a mobile app, on his or her mobile device, whereby the mobile device uses the signal carrier or the mobile Internet to initiate a process of remote certification of the data captured on his mobile device.
  • a unique session identifier or number may be optionally generated and used as a common reference to all recorded multimedia data files and data streams relating to the same occurrence.
  • a timestamp may be obtained online from a timestamp authority or from an offline timestamp device which may have been previously calibrated by a time stamp authority.
  • the method may comprise the optional provision for more than one and for different types of multimedia data recordings of the same occurrence to take place in parallel, thus generating multiple perspectives of the same occurrence. In some cases, these multiple perspectives may be synchronized.
  • Capturing data relating to the occurrence may be achieved with any apparatus capable of transforming information from the physical and/or the digital world into a multimedia data format ready for being processed by a computing system and which may be processed according tothe method of this invention.
  • Examples of such apparatuses may include digital thermometers capturing data relating to an experiment or an outdoor event in freezing conditions, mobile phones with built in video, audio and geographic positioning systems, digital scanners, medical inspection machines such as x- ray machines. There exists an infinite range of such apparatuses which may serve this purpose.
  • Steps 703A, 703B & 703C represent three different channels through which different perspectives or data relating to the occurrence may be recorded in one or more multimedia data files.
  • the three channels are shown as an example and should not be regarded as a limitation of the invention.
  • the method may equally be implemented with only one channel recording a single data file or one or more multimedia files, such as a video device recording images and sound, or with an unlimited number of multimedia data recording channels.
  • data recording channel 703A may be a light-weight video camera attached to the security guard's headgear
  • data recording channel 703B may be an audio recorder capturing the voice interaction the security guard may be using a mobile device to call the police for assistance
  • the third channel 703C used in this example may be capturing geographic positioning information from the security guard's mobile device.
  • channel 703A may be the video camera within the mobile device
  • channel 703B may be geographic positioning information
  • the third channel 703C may be data relating to the unique serial number and/or other built in characteristics of the mobile device used to capture the event.
  • the certification process may begin for the multimedia data files or data streams obtained so far.
  • the multimedia recording may have been terminated or may still be recording.
  • the certification process may be done on the fly, by breaking up recorded multimedia data files and data streams into smaller data packet sizes and certifying each of these individually.
  • timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps may not be required. However, if obtained, they may be useful in establishing the correct date and time prior to generating electronic fingerprints. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
  • an electronic fingerprint may be generated for each of the multimedia data files or data streams obtained during the session.
  • An electronic fingerprint is a hash code generated using the SHA256 universal cryptography algorithm from the United States National Security Agency. Based on the SHA256 algorithm, the probability of collision, whereby two different files generate the same exact hash code, is approximately 1 in 10 18 , however the probability that a given file will generate two different hash codes is zero. The hash codes are unique and ensure non-manipulation.
  • timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential however if obtained, they may be useful in establishing the correct date and time prior to generating electronic fingerprints. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
  • the certified multimedia data files or data streams may be created by combining the multimedia data files or data streams with their respective electronic fingerprints and may include the obtained one or more timestamps and may include the unique session number. The newly certified multimedia data files and data streams may each be named with a name based on its electronic fingerprint. In other embodiments, all the obtained multimedia data files and data streams may be combined into a single file or folder before having an electronic fingerprint generated.
  • timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential. However if obtained, they may be useful in establishing the correct date and time immediately after certifying the multimedia data files relating to the occurrence. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
  • the one or more certified multimedia data files or data streams are processed whereby the system may generate a single certificates list comprising one or more of the sealed certified multimedia data file names associated with the unique session identifier.
  • the one or more certified multimedia data files and/or the certificates list may be stored in a repository and associated with the unique session identifier.
  • One or more of the unique electronic fingerprints generated during the process may also serve as a unique session identifier.
  • one or more timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential however if obtained, they may be useful in establishing the correct date and time at specific steps of the method. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
  • the system may send at least one electronic message communication such as an email, a certified email, or a text message, for example on Facebook, twitter or other messaging media, comprising at least the unique session identifier and a path for accessing the one or more sealed certified multimedia data files or data streams relating to the occurrence in the repository to one or more electronic communication addresses.
  • the certified multimedia data files may be accessed at a later date as and when required by authorised people or entities.
  • At least one electronic communication address may be pre-programed by the proprietor of the certifying method or system. Additional electronic communication addresses may be pre-programmed into the system or may be added as part of the multimedia data captured during one or more multimedia recording session.
  • one or more timestamps may optionally be obtained online from a timestamp authority or from a timestamp device previously calibrated by a timestamp authority. Timestamps are not essential however if obtained, they may be useful in establishing the correct date and time at specific steps of the method. Alternatively, timestamps maybe obtained throughout the session at regular intermittent intervals.
  • the method may be terminated at step 715.
  • the method may be used to certify data relating to a person writing or verbally declaring his will and testament in the absence of any witnesses.
  • the declarer may start the process in his own home, whereby the system would obtain a timestamp online from a timestamp authority using the Internet or from an offline apparatus which was previously calibrated by a timestamp authority.
  • the multimedia data relating to this occurrence may include one or more channels.
  • the step of capturing data 703A may be executed using a web camera recording the declarer's oral comments, if any, and actions while drafting a written statement
  • 703B may be a scanner for scanning the handwritten written document
  • 703C may be a digital fingerprint reader with which the declarer confirms his or her identity.
  • Additional multimedia data channels may include recording the person's credentials, identity details and his electronic communication address by typing this information into a computer or simply by reading these out aloud, whereby a voice recognition system would capture and translate his words into multimedia data to be including in the one or more files to be certified. Note that the invention may be implemented with only one data channel. However, it can be deduced that certifying multiple synchronised channels would provide stronger certified data relating to the occurrence.
  • the person may add a list of recipients' electronic communication addresses whom he wishes to receive a copy of his will and testament or any other declaration upon termination of the certification session or at a later date of his choice, or upon his death.
  • Additional timestamps may be obtained at regular intervals and added to each of the multimedia data files or data streams being recorded.
  • electronic fingerprints may be generated for each of the multimedia data files and/or data streams.
  • the multimedia data files may each be combined with their electronic fingerprints, timestamps and the unique session identifier.
  • the names of these certified multimedia data files may comprise their respective electronic fingerprints.
  • the system may generate a certificates list comprising the unique session identifier and one or more of the certified multimedia file names relating to the occurrence.
  • the certified multimedia data files and the certificates list may be stored in a repository wherein they are associated to the unique session identifier.
  • the system may send an electronic message (e.g. an email, a certified email via a certified email server or a short message service or an instant messaging text) to the one or more electronic communication addresses captured during the session.
  • the message may include at least the unique session identifier and a path for accessing the one or more sealed certified data files relating to the occurrence in the repository.
  • the invention may be performed by a scientist for scientific investigation wherein data relating to a scientific occurrence and which is to be certified is captured using one or more transducers.
  • the certifying process may be initiated at 700 by a pre-programmed triggering threshold, for example the triggering threshold may be the temperature of a material under examination which rises beyond a specific temperature as measured by an electronic thermometer connected to a computing system (for example, a PDA, a tablet, a smartphone, a personal computer, etc.) for carrying out the method.
  • the data recording channel 703A may be an electronic thermometer connected to a material under inspection
  • 703B may be an extensometer also attached to the same material
  • 703C may be the readings from the material testing machine applying the tensile force to the material.
  • a further embodiment of the invention may include capturing metadata relating to the occurrence, for instance, geo-location data or a unique identifier number of a device present in the occurrence (e.g. a video camera capturing the occurrence) may be electronically mined or obtained and added to the file to be certified.
  • capturing metadata relating to the occurrence for instance, geo-location data or a unique identifier number of a device present in the occurrence (e.g. a video camera capturing the occurrence) may be electronically mined or obtained and added to the file to be certified.
  • the embodiments of the invention described with reference to the drawings comprise computer apparatus and processes performed in computer apparatus, the invention also extends to computer programs, particularly computer programs on or in a carrier, adapted for putting the invention into practice.
  • the program may be in the form of source code, object code, a code intermediate source and object code such as in partially compiled form, or in any other form suitable for use in the implementation of the processes according to the invention.
  • the carrier may be any entity or device capable of carrying the program.
  • the carrier may comprise a storage medium, such as a ROM, for example a CD ROM or a semiconductor ROM, or a magnetic recording medium, for example a floppy disc or hard disk.
  • the carrier may be a transmissible carrier such as an electrical or optical signal, which may be conveyed via electrical or optical cable or by radio or other means.
  • the carrier may be constituted by such cable or other device or means.
  • the carrier may be an integrated circuit in which the program is embedded, the integrated circuit being adapted for performing, or for use in the performance of, the relevant processes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
EP13770902.8A 2013-09-27 2013-09-27 Verfahren zur zertifizierung von daten im zusammenhang mit einem ereignis Withdrawn EP3049990A1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2013/070302 WO2015043668A1 (en) 2013-09-27 2013-09-27 A method for certifying data relating to an occurrence

Publications (1)

Publication Number Publication Date
EP3049990A1 true EP3049990A1 (de) 2016-08-03

Family

ID=49274641

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13770902.8A Withdrawn EP3049990A1 (de) 2013-09-27 2013-09-27 Verfahren zur zertifizierung von daten im zusammenhang mit einem ereignis

Country Status (2)

Country Link
EP (1) EP3049990A1 (de)
WO (1) WO2015043668A1 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016192777A1 (en) * 2015-06-02 2016-12-08 Egarante, S.L. Generating digital evidence

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7689900B1 (en) * 2000-06-05 2010-03-30 Fifield Davin J Apparatus, system, and method for electronically signing electronic transcripts
US20030065619A1 (en) * 2001-09-28 2003-04-03 Canon Kabushiki Kaisha Information processing device, information processing method, network system, security method for digital information, storage medium and program
US7065650B2 (en) * 2004-05-10 2006-06-20 Aladdin Knowledge Systems Ltd. Method for indicating the integrity of a collection of digital objects
DE202010018382U1 (de) * 2010-10-04 2016-03-07 cp.media AG Datenverarbeitungseinrichtung zum Erzeugen eines sicheren Datensatzes und Vorrichtung zum Auswerten
KR20140119691A (ko) * 2012-01-05 2014-10-10 엘지전자 주식회사 영상 표시 장치 및 그 동작 방법

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2015043668A1 *

Also Published As

Publication number Publication date
WO2015043668A1 (en) 2015-04-02

Similar Documents

Publication Publication Date Title
US10476888B2 (en) Systems and methods for using video for user and message authentication
EP3326096B1 (de) System und verfahren zur validierung der urheberschaft einer elektronischen signatursitzung
CN102722931B (zh) 基于智能移动通讯设备的投票系统及其方法
US20160020909A1 (en) A method, a system, a computer system and a computer program product for certifying a procedure of signature of an electronic file relating to an agreement between at least two parties
US11531746B2 (en) Method for electronic signing of a document by a plurality of signatories
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
WO2014111022A1 (zh) 一种移动终端用户信息的显示方法、移动终端和服务系统
CN103888442A (zh) 集成可视化生物特征及一次性数字签名的系统与方法
CN105825446A (zh) 一种互联网陪审系统
CN108833431A (zh) 一种密码重置的方法、装置、设备及存储介质
AU2018217081B2 (en) System and method for synchronizing notary meeting interactions between multiple software clients
US20180113717A1 (en) Method for processing innovation-creativity data information, user equipment and cloud server
CN110943960B (zh) 一种庭审笔录电子签名生成方法、装置、设备及介质
CN106230860A (zh) 发送流媒体的方法和装置
EP3435601B1 (de) Zertifiziertes messaging-system und verfahren
WO2015043668A1 (en) A method for certifying data relating to an occurrence
CN106254341A (zh) 针对集中式电子数据保全系统的数据指纹提取方法及系统
TWM624495U (zh) 可記錄簽章流程的電子簽章裝置
AU2018455995A1 (en) Universal certified and qualified contracting method
US11582044B2 (en) Systems and methods to timestamp and authenticate digital documents using a secure ledger
US20220231868A1 (en) Method of binding a digital representation of an actual event with the real time of its occurrence
RU2772345C2 (ru) Система и способ для синхронизации взаимодействий между несколькими программными клиентами во встрече с нотариусом
CN110708302B (zh) 一种基于定位传感数据的动态二维码密钥管理器及其方法
TW202321963A (zh) 可記錄簽章流程的電子簽章裝置及方法
CN111986166A (zh) 一种针对多媒体证据内容的有效性识别方法及系统

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20160428

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20200603