TWI308451B - Method and apparatus to provide secured surveillance data to authorized entities - Google Patents

Method and apparatus to provide secured surveillance data to authorized entities Download PDF

Info

Publication number
TWI308451B
TWI308451B TW94141371A TW94141371A TWI308451B TW I308451 B TWI308451 B TW I308451B TW 94141371 A TW94141371 A TW 94141371A TW 94141371 A TW94141371 A TW 94141371A TW I308451 B TWI308451 B TW I308451B
Authority
TW
Taiwan
Prior art keywords
information
supervisory
mode
encrypted
privacy
Prior art date
Application number
TW94141371A
Other languages
Chinese (zh)
Other versions
TW200629860A (en
Inventor
Dan Herschaft Richard
Original Assignee
Interdigital Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Tech Corp filed Critical Interdigital Tech Corp
Publication of TW200629860A publication Critical patent/TW200629860A/en
Application granted granted Critical
Publication of TWI308451B publication Critical patent/TWI308451B/en

Links

Landscapes

  • Closed-Circuit Television Systems (AREA)
  • Alarm Systems (AREA)

Description

1308451 九、發明說明: 本發明關;^監督裝置。更特定言之,本發明關於一種用 “迴避及推鶴私模錢監督裝置的魏制之方法及裝 先前技術 小型化使得適用於光學及聲音的裝置能夠存在於 f法容納此等裝置的許多物品内。實例包含現在被喪入到行 =電話、PDAs及手錶内的相機、麥克風及擴音器。此種發 展=造成與未鋪區域性魏或將聲音及/或影像轉繼料 他展置的to私問題。此外,此等襄置的嵌入已經 行動電話之產品’使得在過去只是單純通訊工;= 變成可能侵犯人權、尊嚴及自由的潛在窺探機構。 為官制這些活動,有關此等裝置在特定區 令已被公布,或是進行對於料裝置的搜查。不幸的是= 續減小的尺相及影像和聲音偵㈣置與其 事 置的整合已經使得要禁止其软特定區域非常_裝 另-選擇’利用廣播射齡標的系統告 等裝置停用其照相功能。‘、、、相手機 等訊號送到譬如電話天線此=統中,有可能阻擋此 不是在-RF通訊裝置二::::有,些照相手機的相機 ❹料罢“置中(例如紅外線資料傳輸(IrDA))。 :此,_不會有任何無線通信能力。再者,由 常不限疋在指定d域,其可能_到其 在、 制區内的裝置。 〜曰不在管 1308451 … 一合作系統是否可行是有疑問的。就算是由政府主導, 仍可能發生不含有合作功能之裝置的生產,且就算被包含到 設備製程當中,仍有方法破解此等防護措施。 • 因此,期望有一機構及方法依據位置、情勢及/或其他 ··授權標準管制影像、聲音及其他感知裝置/功能的使用而無 須合作功能。如果此等感知裝置被後入一行動電話中,則期 望利用與其法疋規格及軟體相符的硬體技術管制此等行動1308451 IX. Description of the invention: The invention is closed; More specifically, the present invention relates to a method for "avoiding and pushing the crane model money supervision device and miniaturization of the prior art so that devices suitable for optical and sound can exist in the f method to accommodate many of these devices. Inside the article. Examples include cameras, microphones, and amplifiers that are now being lost in the line = phones, PDAs, and watches. This development = causing and unspacing regional Wei or turning the sound and / or image to his exhibition In addition, the embedded product of these devices has been a product of mobile phones' making it a mere communication worker in the past; = becoming a potential prying body that may violate human rights, dignity and freedom. For these activities, these activities are relevant. The device has been published in a specific zone, or a search for the device is unfortunately. Unfortunately, the continued reduction of the scale and the integration of the image and sound detection (4) and its affairs have made it necessary to prohibit the soft specific area. Install another - select 'use the system of the radio shooting age to suspend its camera function. ',,, phase mobile phone and other signals sent to the phone antenna such as the phone, this may block Not -RF communication device of two :::: there, some camera phone camera ❹ material strike "set in (such as infrared data transmission (IrDA)). : This, _ will not have any wireless communication capabilities. Furthermore, it is often not limited to the specified d-domain, which may be the device in its zone. ~曰不管 1308451 ... Whether a cooperative system is feasible is questionable. Even if it is led by the government, it is still possible to produce equipment that does not contain cooperative functions, and even if it is included in the equipment process, there are still ways to crack these protective measures. • Therefore, it is desirable to have an organization and method that controls the use of images, sounds, and other sensing devices/functions based on location, situation, and/or other licensing standards without the need for cooperative functions. If such sensory devices are later placed in a mobile phone, it is expected that these actions will be controlled using hardware technologies that are consistent with their specifications and software.

’、…、私的—邱/刀、’仰恢孭到的影像可被修改或消 除。保護隱私議題之-#代方案是徹麵免捕捉影像。 儘官有隱私考量’但有可能不希望一命令裝置從 想被錄下的對象。舉例來說,監輪: 此,在一Γ情、兄中之不想被錄下的對象。因 得影梅=二:^方:停用或處理從-攝 器譬如聲音感知裝置可::::=其他類型之感知 功能==:===為感知裝置之隱私 在隱私受保護的影像但這些技術未曾被用 來停用—感知裝置從攝^像期望有—種裝置及方法 能且同時保護這些被拍對^象^除不想被錄下的對象的功 1308451 _ 發明内容 提出一種為了授權理由而停用一監督裝置之隱私特徵 的方法及裝置。數位資訊被一監督裝置捕捉並記錄,該資訊 . 依據一正常隱私模式及一迴避模式被處理。該隱私模式處理 包含停用該監督裝置之感知功能的特徵。與此處理並用的是 « 一迴避模式處理,其包含加密作業以及可能存取捕獲資訊之 被信任實體的授權。一暫時儲存裝置保留一份捕獲資訊。一 處理器分析該儲存資訊以判斷所測得可能代表可疑活動之 _ 激烈活動的存在。一過濾器控制捕獲資訊流到一加密裝置的‘,..., private—Qiu/Knife,’ images from Yang Hui can be modified or eliminated. The protection of privacy issues - #代方案 is to avoid capturing images. There is privacy considerations in the end ‘but there may be no desire for a command device from the object that you want to be recorded. For example, the Supervisor: This, in a lyrical, brother who does not want to be recorded. Because of the shadow of the Mei = two: ^ side: disable or deal with the camera - such as the sound perception device can be :::: = other types of perception function ==: === for the privacy of the perception device in the privacy protected image However, these techniques have not been used to deactivate - the device and method that the sensing device expects to have, and at the same time, protect the images of the objects that are not recorded, and at the same time, protect the object 1308451. A method and apparatus for deactivating the privacy features of a supervisory device for reasons of authorization. The digital information is captured and recorded by a supervisory device, which is processed according to a normal privacy mode and an avoidance mode. The privacy mode processing includes features that disable the sensing function of the supervisory device. Used in conjunction with this process is an evasive mode process that includes encryption jobs and authorizations for trusted entities that may access the captured information. A temporary storage device retains a capture of information. A processor analyzes the stored information to determine the presence of _ intense activity that may be detected as representative of suspicious activity. A filter controls the capture of information streams to an encryption device

W 流動致使與可疑活動有關之捕獲資訊被加密以供隨後被一 授權實體存取。該過濾器亦可被用來濾除經該處理器判定是 屬於私密舉動的測得資訊。 該加密裝置加密該記錄資訊以防未授權者存取,且一儲 存裝置將該已加密資訊儲存在一加密庫内以供未來讓一授 權者存取。一位於一安全位置之解密裝置解密該已加密資 訊,且一位於一安全位置之監視器被用來授權觀看已解密資 • 訊。 在另一實施例中,一監督裝置可被停用。一感知功能感 測周遭環境之一刺激以產生捕獲資訊,此資訊被記錄下來。 對於該監督裝置建立一授權固定位置。一偵測器判斷該監督 裝置是否已被從該授權固定位置安裝處移開。作為一隱私特 徵,如果已偵測到該監督裝置移離其授權固定位置,則可停 用該裝置之感知功能或者可修改捕獲資訊。 1308451 實施方式 第1圖例示利用由監督設備進行之聲音和影像感知監 督一不想被錄下的對象。在一公開場所100,對象101之一 _ 影像110被一監督攝影機102拍下。一聲音111被一錄音機 112或一等效聲音感知裝置錄下。依據本發明,監督設備譬 * 如攝影機102和錄音機112可被安置在公共空間譬如街角、 地鐵站、及地鐵和公車上以捕捉並記錄不法活動。作為此監 督功能的一部分,監督設備102、112持續捕捉其周遭環境 _ 的聲音和影像。雖說以下是就捕捉可見影像及可聽訊號進行 說明,本發明亦可應用於任何用來監督的感知裝置,其中非 侷限性包含一化學感知裝置。在一較佳實施例中,所有聲音 和影像被留置當作捕獲資訊,但除非在一特定區域内發生犯 罪或被懷疑曾發生犯罪時才會被使用。在一替代實施例中, 影像、聲音或其部分可能是在處於一可供未授權者存取的格 式之時被消除,然該已消除資訊亦可被以一修改格式留存當 作一保安平行途徑的一部分。限制對於該捕獲資訊的存取保 φ 留了遵守不想被錄下的對象的法定隱私權。 該捕獲資訊可被留存在該監督設備自身内,或是卸載到 一與監督裝置安裝位置相去甚遠且有通訊能力之處。如第1 圖所示,一伺服器122藉由一來自監督裝置102和112之無 線通信接收該捕獲資訊,且在此處儲存並處理該資訊以供未 來讓授權者存取。另一選擇,該捕獲資訊可沿一安全有線網 路傳輸。 第2圖是監督資訊之不受限捕捉之模式選擇之一方法 1308451 流程圖。在步驟201中,作出監督裝置102、a ^ A* U, ^ Ί i 2疋否會被 知柄貫體用來進行監督的第一決策。若否,則選擇一正常隱 3式(步驟202)致使監督裝置102、212内任何隱私: ^隹持完整m些限制影像或聲音之㈣ 5隻不想被錄下的對象的隱私。 如果裝置1G2、m之監督經授權,則下—個決策是監 $貝訊之捕捉是否會是完全不受限的(步驟203)。4 a, 則選擇一優先模式(步驟205),其中監督裝置ι〇2°、Τ二能 夠推翻任何隱私功能。舉例來說,影像捕. i # 從之一停用狀態被 推翻。又,此-監督裝置的位置會被-授權程序檢查以確保 只有在授權位置的影像和聲音被捕捉。該撞避 詳細說明。 料序在下文更 如果不是要完全不受限的監督資訊捕捉, 禮裡 , 攸則在步驟204 選擇一迴避模式,其中監督裝置102、il7 &。 版 ^兀許迴避限击1丨鲁 像和聲音之捕捉的隱私功能。在迴避模式期門、雈 … 鲁 加密且之後跟著-授權程序以存取任何未力❿次捕獲身訊被 口在、貧訊。 第3圖是一用於一監督裝置之隱私功能之―、回、、 的監督資料處理的方塊圖。捕獲資料亦被迴避模式 授權實體即時觀看,或在耽擱一些時間後檢余 °。权 _ 京储存貢料時顧 不。儲存監督資料的作業係由一數位記錄器3〇3、一〜二,、,、貝 理器304、〆加密裝置305、一暫時儲存裝置3〇6進二全, 些敦置較佳被容納在監督設備102、112内。另—選择= 些農置當卜些或全部被設置在遠處,例如在遠^服, 122(第i圖)。-加密儲存裝f 326較佳被定位在監督事置 10 1308451 102、112之外部。 諸如一影像110及—聲音ιη之監督資料被受到處理器 304控制之數位記錄器3〇3接收。在一較佳實施例中,處理 裔304控制著紀錄資料是否沿著兩條平行訊號路徑32〇、 之一者被傳送,此二平行訊號路徑係被建立來維持隱私同時 允許監督攝影機102之保安功能持續運行。訊號32〇較佳經The W flow causes the capture information associated with the suspicious activity to be encrypted for subsequent access by an authorized entity. The filter can also be used to filter out measured information that is determined by the processor to be a private move. The encryption device encrypts the recorded information to prevent unauthorized access, and a storage device stores the encrypted information in an encryption library for future access by an author. A decryption device located in a secure location decrypts the encrypted information and a monitor located in a secure location is used to authorize viewing of the decrypted message. In another embodiment, a supervisory device can be deactivated. A perceptual function senses one of the surrounding environments to generate capture information, which is recorded. An authorized fixed position is established for the supervisory device. A detector determines if the supervisory device has been removed from the authorized fixed location installation. As a privacy feature, if it has been detected that the supervisory device has moved away from its authorized fixed location, the sensing function of the device may be disabled or the captured information may be modified. 1308451 Embodiments Fig. 1 illustrates the use of sound and image perception by a supervised device to monitor an object that is not intended to be recorded. At a public place 100, one of the objects 101, image 110, is taken by a supervised camera 102. A sound 111 is recorded by a recorder 112 or an equivalent sound sensing device. In accordance with the present invention, supervisory devices 譬 * such as camera 102 and recorder 112 can be placed in public spaces such as street corners, subway stations, and subways and buses to capture and record illegal activities. As part of this monitoring function, the supervisory devices 102, 112 continue to capture the sound and images of their surroundings. Although the following is a description of capturing visible images and audible signals, the present invention is also applicable to any sensing device for supervision, wherein non-limiting features include a chemical sensing device. In a preferred embodiment, all sounds and images are retained as capture information, but are used unless they are guilty of a crime in a particular area or suspected of having committed a crime. In an alternate embodiment, the image, sound, or portion thereof may be eliminated while in a format that is accessible to unauthorized persons, but the eliminated information may also be retained in a modified format as a security parallel. Part of the route. Restricting access to this captured information preserves the legal privacy of objects that do not want to be recorded. The captured information can be left in the supervisory device itself or offloaded to a location that is far from the location where the supervisory device is installed and has communication capabilities. As shown in Figure 1, a server 122 receives the captured information via a wireless communication from supervisory devices 102 and 112 and stores and processes the information therein for future access by the licensor. Alternatively, the capture information can be transmitted along a secure wired network. Figure 2 is a flow chart of one of the mode selection methods for unrestricted capture of supervisory information 1308451. In step 201, a first decision is made as to whether the supervisory device 102, a ^ A* U, ^ Ί i 2 会 will be used by the stalker for supervision. If not, then a normal implicit mode (step 202) is selected to cause any privacy in the supervising device 102, 212: ^ Hold the entire image to limit the privacy of the image or sound (4) 5 objects that do not want to be recorded. If the supervision of the device 1G2, m is authorized, then the next decision is whether the capture of the Bayesian is completely unrestricted (step 203). 4 a, then select a priority mode (step 205), in which the supervisory device ι〇2°, Τ2 can override any privacy function. For example, image capture. i # is overridden from one of the deactivated states. Again, the location of this - supervisory device will be checked by the -authorized program to ensure that only images and sounds at the authorized location are captured. This collision is detailed. In the following, if it is not to supervise the information capture that is completely unrestricted, then, in step 204, an avoidance mode is selected, in which the device 102, il7 & Version ^ 兀 回 回 限 丨 丨 丨 像 像 像 像 像 像 像 隐私 隐私 隐私In the evasive mode, the door is encrypted, and then followed by the -authorized program to access any unsuccessful captures of the body. Figure 3 is a block diagram of the supervised data processing for the privacy function of a supervisory device. The captured data is also evaded by the authorized entity for immediate viewing, or after a delay of some time. Right _ Beijing does not care when storing tribute. The operation of storing the supervisory data is carried out by a digital recorder 3〇3, a ~2, a, a zipper 304, a 〆 encrypting device 305, and a temporary storage device 3〇6, which are better accommodated. Within the supervision device 102, 112. Another - choice = some of the farms are set some or all of them in the distance, such as in the distance, 122 (figure i). The encrypted storage device f 326 is preferably located outside of the supervisory affairs 10 1308451 102, 112. Supervised data such as an image 110 and a sound i n are received by a digital recorder 3〇3 controlled by the processor 304. In a preferred embodiment, the processing person 304 controls whether the recorded data is transmitted along one of the two parallel signal paths 32. The two parallel signal paths are established to maintain privacy while allowing supervision of the security of the camera 102. The function continues to run. Signal 32

—過濾器325處理,該過濾器被用來濾過被認為有可疑之處 的捕獲資訊且/或濾除經判定屬隱私行為的捕獲資訊。另一 選擇,捕獲資訊未經過濾,且捕獲資訊之保護全然是加密的 戰貝文王暫時儲存裝置306搭配過濾、器325和處理器3〇4 。午可處理並分析捕獲資訊以判斷其本質然後判斷其應當是 被,過或濾除。較佳來說,一旦捕獲影像或聲音被過濾,則 #置3G5依據—將在下文詳述之較佳方法對已過濾的 貝七進行加密。此種加密和過濾的序列係依據—種暫時儲存 ㈣間的實施方式。另—選擇,萬—實施方式要求 ㈣_^供騎充分賴處理,則資訊會在被 Ϊ4Γ:6内之前經過加密裝置305加密以便確保捕獲資 Λ又到保護。儲存裝詈3 、 作一Λ妾收已加密資訊且將儲存資料當 作加畨庫留置直到準備好| 了田 止。授權實體34。譬如二授權貫體340存取為 道處進行監督影„ “二員或類似者在監視器 密裝置奶含有-或多種私密資料328之監視。一解 能被授權者340存取。ϋ在金鑰,使得党保護的資料 體類型之定時暫時記料m先進先出⑽〇)記憶 38暫盼性儲存已解密資訊,使 1308451 得該資訊得依授權實體340需求重播。由於已解密資訊有被 攔截的危險,故該資訊只被短時間儲存在該記憶裝置内然後 就予消除。 在安裝有多個監視器308的情況,每一監視器308應伴 隨著其自有解密裝置307,每一解密裝置有其自有私密金 «· 鑰。利用一含有公用金鑰及用來識別監視器之資訊的對應憑 證來向監督裝置102、112證明監視器的授權身份。此等私 密/公用金鑰亦被用來保護一會被用於影像資料傳輸的對稱 I 對話金錄。較佳來說,該對話金錄被定期更新,使得受一特 定金鑰保護的資料會有限。 第4圖示出依據第3圖所示裝置之迴避模式的方法流程 圖,更明確地說明加密特徵。監督裝置數位地捕捉資訊(步 驟401),且該資訊能在用於正常隱私模式(步驟402)或迴 避模式之平行途徑中受處理。在迴避模式中,過濾、決策發生 在步驟404,藉此使捕獲資訊未經過濾、被濾過、且/或被濾 除。有關迴避模式中之過濾的更多細節將在下文參照第5 φ 圖說明。 在一平行程序中,在步驟403形成一對稱加密金鍮。該 對稱金鑰在步驟406利用每一監視器308之公用金鑰被加 密。該對稱金鑰亦利用一第一被信任存取授權者之公用金鑰 被加密(步驟407),其隨後利用一第二被信任存取授權者 之公用金鑰被更進一步加密(步驟408 )。(要注意到得有一 或二以上的被信任存取授權者,在此情況中用公共金錄進行 的加密會據此以一串行方式含有被信任存取授權者的編 1308451 號。)已過濾的資訊在步驟409中被對稱金鑰加密。在步驟 410中,使已加密金鑰與已加密資訊建立邏輯性或實體性關 聯。所得已加密資訊此時受到保護且可被傳送到加密儲存裝 . 置(步驟411 )及任何相連監視器。 另一選擇,可在步驟403中形成一以上的對稱金鑰,致 使一不同對稱金鑰被用在步驟406和410中用於被送到一監 視器的資訊而非被用在步驟407-410中用於送到已加密儲存 器的資訊。又,對於對稱金鑰來說以一高變化率為較佳,但 _ 要考慮其結果之加大處理負荷。- Filter 325 processing, which is used to filter capture information that is considered suspicious and/or to filter out captured information that is determined to be a privacy act. Alternatively, the capture information is unfiltered, and the protection of the captured information is completely encrypted. The Battle King's temporary storage device 306 is coupled to the filter 325 and the processor 3〇4. The afternoon can process and analyze the captured information to determine its nature and then judge whether it should be, over or filtered out. Preferably, once the captured image or sound is filtered, #3G5 is based on - the filtered Bayer 7 will be encrypted in the preferred method detailed below. Such encrypted and filtered sequences are based on an implementation of temporary storage (4). In addition - selection, 10,000 - implementation requirements (4) _ ^ for riding is fully dependent on processing, the information will be encrypted by the encryption device 305 before being 被4Γ:6 to ensure that the captured assets are protected. Save the device 3, make a collection of encrypted information and use the stored data as a coronation library until it is ready | Authorized entity 34. For example, the authorized 340 access is used to supervise the scene. "Two members or similar monitors in the monitor device contain - or a variety of private data 328. A solution can be accessed by the licensor 340. ϋ 金 金 , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Since the decrypted information is in danger of being intercepted, the information is only stored in the memory device for a short period of time and then eliminated. In the case where a plurality of monitors 308 are installed, each monitor 308 should accompany its own decryption device 307, each having its own private key «· key. The supervisory device 102, 112 is authenticated to the supervisory device 102, 112 with a corresponding credential containing the public key and information used to identify the monitor. These private/public keys are also used to protect a symmetric I conversational record that will be used for video data transmission. Preferably, the dialogue is updated periodically so that data protected by a particular key is limited. Fig. 4 is a flow chart showing the method of avoiding the mode of the apparatus shown in Fig. 3, and the encryption feature is more clearly explained. The supervisory device captures the information digitally (step 401) and the information can be processed in a parallel path for the normal privacy mode (step 402) or the avoidance mode. In the avoidance mode, filtering, decision making occurs at step 404 whereby the captured information is unfiltered, filtered, and/or filtered. More details on the filtering in the avoidance mode will be explained below with reference to the 5th φ diagram. In a parallel procedure, a symmetric encryption key is formed in step 403. The symmetric key is encrypted at step 406 using the public key of each monitor 308. The symmetric key is also encrypted using a public key of a first trusted access grantor (step 407), which is then further encrypted using a public key of a second trusted access grantor (step 408) . (Note that there are one or more trusted access licensors, in which case the encryption with the public record will contain the number 1308451 of the trusted access licensor in a serial manner.) The filtered information is encrypted by the symmetric key in step 409. In step 410, the encrypted key is logically or physically associated with the encrypted information. The resulting encrypted information is now protected and can be transferred to the encrypted storage device (step 411) and any connected monitors. Alternatively, more than one symmetric key may be formed in step 403 such that a different symmetric key is used in steps 406 and 410 for information being sent to a monitor instead of being used in steps 407-410. Information used to send to encrypted storage. Also, it is preferable for the symmetric key to have a high rate of change, but _ should consider the result of increasing the processing load.

I 在步驟412,利用監視器的私密金鑰解密對稱金鑰,且 利用已解密對稱金鑰解密資訊。由於每一監視器有其自有的 私密金鑰,不同資訊可被送到不同監視器。此時可在一顯示 終端器看到或聽到影像或聲音資訊(步驟415)。此外,已 解密資訊被暫時儲存在監視器以供授權實體可能要重播(步 驟413),然後予以消除(步驟414)。 雖然本說明書敘述較佳加密方法,本發明亦可用會在資 φ 訊被傳輸到一監視器時維持資訊機密性的其他方法運作。如 第4圖所示,可被即時顯示的資料以及仍在一定時記憶體 (圖中示出一 FIFO)内可被重播的近期接收資料有著固定 的權利。另一選擇,本發明可利用對資訊分派使用權的DRM 技術,使得資料如何被送到複數個監視器及被這些監視器存 取的方式有變通彈性。 第5圖是一由過濾器325執行之迴避模式過濾功能的摘 要圖。如前所述,一監督裝置可以一正常隱私模式501運I At step 412, the symmetric key is decrypted using the private key of the monitor and the information is decrypted using the decrypted symmetric key. Since each monitor has its own private key, different information can be sent to different monitors. At this point, image or sound information can be seen or heard at a display terminal (step 415). In addition, the decrypted information is temporarily stored on the monitor for the authorized entity to replay (step 413) and then eliminated (step 414). Although this specification describes a preferred method of encryption, the present invention may also operate in other ways that maintain information confidentiality when transmitted to a monitor. As shown in Figure 4, the data that can be displayed immediately and the recent received data that can be replayed in a timed memory (shown in a FIFO) have a fixed right. Alternatively, the present invention may utilize DRM technology for the distribution of usage rights, such that the manner in which data is sent to and received by a plurality of monitors is flexible. Figure 5 is a schematic diagram of an avoidance mode filtering function performed by filter 325. As mentioned earlier, a supervisory device can be shipped in a normal privacy mode 501.

13 1308451 H私中=和聲音捕捉受到限制以保護不想被錄下的對象 思,此同時該裝置可以一迴避模 等限制條件在—平杆眘 遇卞”肀此 體以一安全方式存取^^理路;^依據—组許可授權實 模細步驟5。3 ::1:;之輪替限罐 、室 ^ _ 有一種較佳變異型,其可單獨應用或組合 錢不過濾、迴避模式5Q4、濾、過迴避模式邮、 及慮除506。 密,5〇4中’所有捕獲影像和聲音被加 像。::::::=,影像解密後存取影 ra , ., . _ 又到DRM或有條件存取技術保護,且 ζL 1監視站讓人觀看。監視站處的已解密資訊 後予已:密格式記錄’但是可從會在-段預定短時間 處進r在保4暫時儲存器重播。亦可能允許在監視站 丁 一 RM系統之控制下的資訊加密儲存。 秒有模式5G5中—捕獲資訊譬如1〇 密儲存3| 至數天有價值影像保存在安全未加密或已加 聲音處理軟體m存持續時間而定)’使得智慧型影像/ 权體⑧夠分析—影像串流並選擇該串流之—片段 之間:監/ °要較長持續時間儲存時,資訊會在儲存 觸师304較佳被建構為接收一觸發信號,該 測由-對象在監督裝置感測範圍内之突然移動的 量突^〇彳如仃人和車流之行動模式的快速變化)或是音 分析吼叫)引發。這_經 瓜負裝置所捕捉到的活動類型。捕獲資訊可被歸 14 1308451 _ ^一正常或一激動類別’後者代表可疑活動。此外 _貝訊可被加上一時間产$月/武 捕獲 標記,以及_類型,13 1308451 H Private = and sound capture is restricted to protect the object that you do not want to be recorded. At the same time, the device can avoid the restrictions such as avoidance and other conditions in the "Ping rod caution", this body is accessed in a safe way ^ ^理路;^由—Group license authorization actual module fine steps 5. 3 ::1:; Wheel replacement tank, room ^ _ There is a better variant, which can be applied alone or combined with money filtering, avoidance mode 5Q4 , filter, over-avoidance mode, and 506. In the dense, 5〇4 'all captured images and sounds are added.::::::=, after the image is decrypted, access the shadow ra, ., . _ again To DRM or conditional access technology protection, and ζL 1 monitoring station for viewing. The decrypted information at the monitoring station is given to the already: dense format record 'but can be entered in the short period of time Temporary storage replay. It may also allow encrypted storage of information under the control of the monitoring station Dingyi RM system. Second mode 5G5 - capture information such as 1 secret storage 3| to several days worth of images stored in secure unencrypted or Added sound processing software m duration depends on 'making wisdom Image/right 8 is sufficient for analysis - video streaming and selection of the stream - between segments: monitoring / ° for longer duration storage, information will be preferably stored in the storage toucher 304 to receive a trigger signal The test is triggered by the sudden movement of the object within the sensing range of the supervisory device, such as the rapid change of the action mode of the monk and the traffic flow, or the squeaking of the sound analysis. This is captured by the melon device. The type of activity that is reached. The capture information can be classified as 14 1308451 _ ^ a normal or an excited category 'the latter represents suspicious activity. In addition _ Bei Xun can be added a time to produce a month / Wu capture mark, and _ type,

廷會有助於搜尋、編列索引及槽譜化目的。 I 在遽除迴避模式506中’儲存預定量的捕獲 慧型影像/聲音處理軟#推许八 、 七'曰 乎山, 軟體進盯分析,使得某些可能經正式歸 γ 2㈣動的活動會在影像/聲音串流被加紅/或送到— :視站之前會被濾除或模糊化。一指定 是隱私的且應當•執二 法實體提“發備在r碼或偽碼中的實施可由該官方或合 或發佈。由於滤除内容限制資訊之捕捉,此方宰 與正常隱私模式501部分重疊。 万木 第6圖例示優先模式之一實施 m或錄音機112被指派在 :::夕攝-機 督。如果攝影機102或錄音機112#^進订该處的授權監 捕捉及Λ 被移離該位置,其感測、 :=!隱私功能。舉例來說,如果監督裝置二2 被移離其固疋位置,一制务戌口口 减知考η Μ 感 譬如—攝影機的光線 =χ=Γ 、或是—錄音機的聲音感知器會被停 用以阻止對於不想被錄下的 隱私。監督奘朁m J不孜櫂皿乇亚猎此保有 位季統(GPS'走未之固定位置的變化可由-全球定 内2 _ 6Q1或是藉由1入監督裝置 尸内之内部移動感知器602的使用來判斷。 弟7圖是優先模式之—方法流程圖。在步驟斯 斷4裝置之安置位置座標,此較佳是利用咖或-類似 15 1308451 _ 機構達成。在步驟702中,針對監督裝置之優先模式作業形 成一請求。該請求應當包含下述各項之一或多者:裝置位 置,監督裝置公用金鑰之一憑證,進行監督的時期(得為數 . 秒至數年),及為何需要進行監督的理由。該請求可包含該 裝置會依據法律被用在一指定位置以供保護生命及/或財產 安全的具結書。該具結書較佳是經由網際網路呈遞,且其内 資訊得經適當主管機關以檢查財產紀錄、後續電話確認、及 /或郵件確認之方式予以查核。 B 為維持該監督請求的機密性,其在步驟703中利用授權 實體之公用金鑰(用於公用金鑰憑證之一可信鏈的根公用金 鑰被安全地嵌入裝置内受到完整保護)被加密。該授權實體 或主管機關可包含一法庭、州警或市警、聯邦執法官、或任 何類似的政府主管機關或組織。在步驟704中,向該授權實 體呈遞一監督請求,此係利用該授權實體之網站(其中一 TLS連線可提供保密用的加密)或是利用監督裝置與授權實 體間之直接傳訊的網路服務來進行。如果被認可,則在步驟 φ 705中,授權實體形成至少由下列各項組成的認可憑證:被 許可位置以及被許可時期。其亦可包含:被許可監督理由, 及被許可的實測位置座標容差。在步驟706中,主管機關用 其私密金鑰簽署認可憑證且用監督裝置的公用金鑰加密該 憑證。此訊息係由一被授予合法授權允許在一記錄裝置推翻 感知器停用隱私特徵的個人或組織數位簽署。該已簽署訊息 可包含一有效日期,藉此使得到授權的人或組織必須再次申 請使用監督裝置的授權。授權内容詳列於一附有簽章的數位The court will help to search, index and channelize. I In the erasure avoidance mode 506, 'storing a predetermined amount of captured HC image/sound processing soft #推许八,七' 曰山, software into the line analysis, so that some activities that may be officially gamma 2 (four) move will be The image/sound stream is red-swapped/or sent to - : The station will be filtered or blurred before it is viewed. A designation is private and should be implemented by the entity. "The implementation in the r code or pseudocode can be issued by the official or the joint. Because of the filtering of the content restriction information, this party is slaughtered with the normal privacy mode 501. Partially overlapping. Wanmu Figure 6 illustrates one of the priority modes of implementation m or recorder 112 is assigned at::: 夕摄-机督. If the camera 102 or recorder 112#^ subscribes to the authorized surveillance capture and Λ is moved From this position, its sensing, :=! privacy function. For example, if the supervisory device 2 is removed from its fixed position, a control port is reduced to η Μ 譬 — — 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影 摄影=Γ , or — The sound sensor of the recorder will be deactivated to prevent privacy for those who do not want to be recorded. Supervised 奘朁m J does not 孜棹 乇 猎 此 此 此 保 保 保 保 保 GPS GPS GPS GPS GPS GPS GPS The change can be judged by the use of the internal mobile 2 _ 6Q1 or by the internal motion sensor 602 of the supervisory device. The brother 7 is the priority mode - the method flow chart. Placement coordinates, this is preferably using coffee or - similar 15 13 08451 _ Institutional reach. In step 702, a request is made for the priority mode job of the supervisory device. The request should include one or more of the following: device location, one of the public keys of the supervisory device, supervised The period (a number of seconds. to years) and why it is necessary to supervise. The request may include a binding statement that the device will be used in a designated location for the protection of life and/or property in accordance with the law. Preferably, the information is presented via the Internet, and the information therein is checked by the appropriate authority to check the property record, follow-up telephone confirmation, and/or mail confirmation. B In order to maintain the confidentiality of the supervision request, it is in the step The public key of the authorized entity in 703 (the root public key for one of the public key vouchers is securely embedded in the device is fully protected) is encrypted. The authorized entity or the authority may include a court, State police or city police, federal law enforcement officer, or any similar government authority or organization. In step 704, submit a supervision to the authorized entity The request is made by using the website of the authorized entity (wherein a TLS connection can provide encryption for confidentiality) or by using a network service for direct communication between the supervisory device and the authorized entity. If approved, then in step φ In 705, the authorized entity forms an accreditation certificate consisting of at least a permitted location and a permitted period. It may also include: a license supervised reason, and a licensed measured location coordinate tolerance. In step 706, the supervisor The authority signs the certificate with its private key and encrypts the certificate with the public key of the supervisory device. This message is signed by a person or organization that is granted a legal authorization to allow the recorder to override the privacy feature on a recording device. The signed message may contain a valid date whereby the authorized person or organization must re-apply for authorization to use the supervisory device. Authorized content is listed in a number with a signature

(S 16 1308451 憑證内。一由一官方或準官方組織發出之根憑證較佳被嵌入 記憶體603内被下載到每一監督裝置102、112或記憶體603 内。此種記錄裝置内的機制必須有防竄改能力。藉由將該認 . 可憑證與已加密資訊包封在一起,會顯示這是透過合法方式 取得的而且在該憑證永久性鏈結於該資訊時可將其呈上法 * 庭。此種包封方式可藉由將捕獲資訊與憑證證明一起加密來 達成。另一種方法是以該憑證當作一浮水印利用已知數位浮 水印技術加諸於捕獲資訊。為維持此關聯的完整性,元資料 B 及測得資料應當利用監督裝置之一私密金鑰予以數位簽署。 接下來將認可憑證放入監督裝置内、較佳是透過一網路 服務應答訊息進行(步驟707)。該訊息會含有該裝置的身 份、被許可位置、及一獨特(單次)循序增加的編號。該單 次編號被記錄裝置儲存,使得其可偵測到是否有人嘗試再次 輸入一已簽署訊息。 在步驟708中,監督裝置利用一嵌入其安全處理器内之 被信任根公用金鑰(暨一可能隨該認可發送的憑證鏈)檢查 φ 憑證簽章。在步驟709中,監督裝置利用一嵌入式GPS接 收器、一可物理性附接至該裝置之獨立被信任GPS接收器、 或任何等效機構判斷其位置以決定其確切位置。在步驟710 中,監督裝置内的安全處理器判斷其實測位置是否在針對被 許可位置指定之許可容差以内。若是,則監督裝置停用其限 制影像或聲音之捕捉的功能。此時監督裝置處於優先模式。 在步驟711中,監督裝置持續或定期監視其位置。此可 用一嵌入式GPS接收器或其自身所含能夠濾除正常攝影機(S 16 1308451. A root certificate issued by an official or quasi-official organization is preferably embedded in memory 603 and downloaded to each supervisory device 102, 112 or memory 603. Mechanisms within such a recording device Must have tamper resistance. By enclosing the certificate with the encrypted information, it will be shown that this is obtained through legal means and can be presented when the document is permanently linked to the information. * This method of encapsulation can be achieved by encrypting the captured information along with the voucher. Another method is to use the voucher as a watermark to capture information using known digital watermarking techniques. The integrity of the association, the metadata B and the measured data should be digitally signed using a private key of the supervisory device. Next, the approved certificate is placed in the supervisory device, preferably via a network service response message (step 707). The message will contain the identity of the device, the licensed location, and a unique (single) sequential increase. The single number is stored by the recording device so that it can be detected. No attempt is made to enter a signed message again. In step 708, the supervisory device checks the φ voucher signature with a trusted root public key embedded in its secure processor (and a credential chain that may be sent with the approval). In step 709, the supervisory device determines its location to determine its exact location using an embedded GPS receiver, an independent trusted GPS receiver physically attachable to the device, or any equivalent mechanism. The security processor in the supervisory device determines whether the measured location is within the tolerance tolerance specified for the licensed location. If so, the supervisory device disables its ability to limit the capture of video or sound. The supervisory device is in the priority mode. In step 711, the supervisory device monitors its position continuously or periodically. This can be used with an embedded GPS receiver or its own to filter out normal cameras.

(S 17 1308451 搖攝移動的移動偵測器達成。在步驟712中,若監督裝置被 移動則停用優先模式,並且啟用使影像或聲音之捕捉受限的 功能。另一選擇,得停用允許影像被捕捉的功能。在一附帶 實施例中’若依據該認可憑證之監督授權期限已經過期則停 •用該優先模式。此可藉由利用一内部安全真時時鐘或是如(S 17 1308451 The panning movement of the motion detector is achieved. In step 712, if the supervisory device is moved, the priority mode is disabled and the function of capturing the capture of the image or sound is enabled. Another option is to disable The function of allowing images to be captured. In an accompanying embodiment, 'If the time limit for the supervision of the approval certificate has expired, then the priority mode is stopped. This can be done by using an internal security time clock or

Trusted Computing Group 之 Trusted Platform Module 所能提 供之一滴答計數機構來施行。 最後,在步驟713中’監督裝置之優先模式得因將該裝 _ 置放回被許可位置且利用未逾期許可憑證或是因請求一用 於一不同位置的許可憑證而被再次啟用。 如果監督裝置必須被移到另一位置,則必須遵照上述程 序再來一次。相同技術得經些許修改用於其他感知裝置,譬 如下文所述者。 用於優先模式之上述授權程序之一施行實例是對於執 法單位進行之竊聽或類似監督提供一技術控制。舉例來說, 一已被授權去安裝一監督裝置的警官會直接在該裝置(例如 • 一攝影機或錄音機)内裝入一經法院授權的認可憑證以便進 行電子監督。 處於一隱私模式對上一優先模式之一監督裝置的另一 施行實例如下所述。在一監督裝置的正常隱私模式中,其感 知功能已被停用且其被收藏在一執法幹員的置物箱内。在經 過一優先模式請求後,授予一法院命令,且授予一授權認可 憑證。這個將感知裝置限制在一特定位置運作或在一特定時 期内運作或限制此二者的憑證被安裝在該憑證指定的該感 18 1308451 知裝置内。然後該感知裝置可進入優先模式,在此例中這意 味著j裝置從—感知停用狀態進入一感知啟用狀態。此實例 可從一執法幹員延伸到想要設立一監督裝置的任何團體,但 ‘ 通常在此情況中,該裝置在進入優先模式時會從一受到某些 條件限制的感知狀態進入一較少限制條件或不受限的狀態 (位置及/或時間限制除外)。 下述監督裝置1〇2、112之感知及報告功能是萬一裝置 102、1112被移離其授權固定位置時可能啟用或停用之功能 p 的實例:記錄功能,本地或遠端的通知或報警系統,資料扭 曲’向下取樣(downsampling)能力,捕獲資料之轉移,稽 核,加上浮水印或指紋。 關於資料扭曲,可能利用攝影機影像模糊化來解決攝影 機進行不想要的影像感知之問題。舉例來說,一干擾機構可 相反於影像感知裝置(例如攝影機)内之自動聚焦機構運作 致使一感知影像被模糊化。標題為、、Method and Implementation for Using Infrared Signals and Sonar to 鲁 Interfere with Camera Autofocus Mechanism"的共同待審申 請案提出連續或間歇發射器使攝影機内的自動聚焦機構混 淆。此等發射器可導致感知影像被模糊化且不可使用。變動 強度之多重紅外線發射也會導致感知影像曝光不足或是過 度曝光。此等發射器得為手控以蓄意改變捕獲的監督資訊做 為一隱私特徵,藉由手動輸入密碼,僅由具有一保密解碼構 件的裝置進行限制作業,且/或用適當認證身份及存取碼登 錄到一網路或存取點以獲得對於啟用資訊的存取。這種手動 19 1308451 控制在攝影機被移離其授權位置時可能被推翻。 監督裝置102、112與一無線 造出-用來以去電給一來 ㈤…果通心劍 方十白#Λ相1、 处中心或一特定電話號碼之 °㈤要注意之事件的機制。舉例來說,-行動電 话能在監督裝置102、112偵測到一 自動接收到該監督裝置内良 会活動時 詈 么射盗604發出的資訊。監督裝 Η)2 1彳i Γ 也會被傳送㈣助快速反應。監督裝置The Trusted Computing Module of the Trusted Computing Group can provide one of the tick counting mechanisms for implementation. Finally, in step 713, the priority mode of the 'supervising device' is re-enabled by placing the device back in the licensed location and utilizing the non-overdue license voucher or requesting a license voucher for a different location. If the supervisory device must be moved to another location, it must be followed by the above procedure. The same technique has been modified somewhat for other sensing devices, such as those described below. One example of the above-mentioned authorization procedure for the priority mode is to provide a technical control over eavesdropping or similar supervision by the enforcement unit. For example, a police officer who has been authorized to install a supervisory device will install a court-authorized certificate of accreditation directly in the device (e.g., a camera or tape recorder) for electronic surveillance. Another example of a supervisory device that is in one privacy mode to one of the last priority modes is as follows. In the normal privacy mode of a supervisory device, its sensing function has been deactivated and it is housed in a law enforcement officer's compartment. Upon request by a priority mode, a court order is granted and an authorization certificate is granted. This voucher that limits the sensing device to operate at a particular location or operates or limits both during a particular time period is installed in the device specified by the voucher. The sensing device can then enter a priority mode, which in this case means that the j device goes from a perceptually disabled state to a perceptually enabled state. This example can be extended from a law enforcement officer to any group that wants to set up a supervisory device, but 'in this case, the device will enter a priority mode from a perceived state that is subject to certain conditions when entering the priority mode. Restricted or unrestricted status (except for location and/or time limits). The sensing and reporting functions of the supervisory devices 1, 2, 112 described below are examples of functions p that may be enabled or disabled in the event that the devices 102, 1112 are removed from their authorized fixed location: recording function, local or remote notification or Alarm system, data distortion 'downsampling ability, capture data transfer, audit, plus watermark or fingerprint. With regard to data distortion, it is possible to use camera image blurring to solve the problem of unwanted image perception by the camera. For example, an interfering mechanism can operate in contrast to an autofocus mechanism within an image sensing device (e.g., a camera) causing a perceptual image to be blurred. The co-pending application titled, Method and Implementation for Using Infrared Signals and Sonar to Interfere with Camera Autofocus Mechanism, proposes that continuous or intermittent emitters confuse the autofocus mechanism within the camera. These emitters can cause the perceived image to be blurred and unusable. Multiple infrared emission of varying intensity can also result in under-exposed or over-exposed perceptual images. These transmitters are manually controlled to deliberately change the captured surveillance information as a privacy feature. By manually entering the password, only the device with a secure decoding component performs the restriction operation and/or uses the appropriate authentication identity and access. The code is logged into a network or access point to gain access to enabled information. This manual 19 1308451 control may be overturned when the camera is moved away from its authorized position. Supervising devices 102, 112 and a wireless device - used to send power to (5) ... fruit Tongxin sword Fang Shibai #Λ phase 1, at the center or a specific telephone number ° (f) the mechanism of attention to the event. For example, the mobile phone can detect the information sent by the pirate 604 when the supervisory device 102, 112 detects an automatic event in the supervisory device. Supervised installation 2) 2 1彳i Γ will also be transmitted (4) to help rapid response. Supervisory device

行動電話間之通信得透過紅外線㈤、藍^ 二或有線介面進行。-感知器的報告可為定期 進二疋⑨知裔於-預定運作範圍内偵測到-狀況時 進仃。如果監督奘署1μ m ^ ^ 通信功能會被停用、链如使^被移離其授權固定位置,此 ^ 庁用-如使發射器404停用。 f在::出—替代實施例,其中一目標詢問器801被安 805以供監視裝有電子標籤的目標呢、_ 置當;錄音機,在此用具備隱私功能的感知裝Communication between mobile phones can be done via infrared (five), blue^2 or wired interface. - The perceptron's report can be entered on a regular basis. If the supervisory authority 1 μ m ^ ^ communication function is disabled, the chain is removed from its authorized fixed position, such as the transmitter 404 is deactivated. f is in the following: an alternative embodiment in which a target interrogator 801 is used to monitor the target of the electronic tag, and the recorder is used in a perceptive device with privacy function.

予二理特定情勢:於其詢問範圍内 每週的特〜 ^ :月勢包含位置、每天的特定時間、 七…十、疋4、%境條件、以及任何其他會影響到目;p之 的可判定狀態。被監視的目標具有用來;別 這些標藏可為具備少量或不具備 可橋目標詢問器處理且/或交換 =戴 PDAs、仃動電話、智慧卡、或類似 、識有= 藏物件的保護可包含—機構以便不允許此 (§: 20To give specific consideration to the specific situation: the weekly specials in the scope of the inquiry ~ ^ : the monthly position includes the location, the specific time of the day, the seven... ten, the 疋4, the % condition, and any other influences; p The status can be determined. The monitored targets are used; these tags can be protected for small or non-bridgeable target interrogators and/or exchange = PDAs, squeaky calls, smart cards, or similar, protected with hidden objects Can include - agency to not allow this (§: 20

1308451 預定區域。舉例來—兒一 號、因該有標籤物件移~2^物件可因其詢㈤器失去其訊 越過該預定區域之一邊疋區域外、或是因該有標籤物件 載體、及/或其他人赤垂,之一出入口而被偵測到。處理器、 行動。 $男體會被告知此事發生且可採取適當 如第8圖所+, η α 的屮Λ Μ —目私詢問器8〇1被實施成門口 805 二=::^偵_内的裝置。雖說越 作咖t 域。雖說上述每一感知裝置被敘述為當 目㈣作,其亦有可能一單一組件可執行標籤或 之:問㈣功能。舉例來說,一電話機可當作一目標詢問 別目標詢問11來說是—標籤。上述任何出入口識 心目被應用在前文就監督裝置102、112說明的固定位置 程序,藉此使詢問器預先被授權用在其位置,且移離此 會使其停用。 雖然以上就特定組合說明本實施例的特徵和元件,每一 特徵或元件亦可被單獨使用(沒有較佳實施例之其他特徵和 元件)或是以有或沒有本發明其他特徵和元件之多樣組人 使用。 5 21 1308451 圖式簡單說明 第1圖是一在監督下之不想被錄下的對象; 第2圖疋監督資訊之不受限捕捉之 流程圖; 擇之一方法 第3圖是-用來在迴避模式期間向 錄監視的監督資訊之裝置的方塊圖; μ體k供記 圖 第4圖是監督資訊之迴避模式處理之—方法 ,5圖是一迴避模式過渡特徵的摘要圖;机 第6圖是一具備可因隱私理由而 監督裝置; 低丨了用之感知功能的 第7圖是監督資訊之優先模式處理之 例。 元件符號說明 100 公開場所 101 對象 102 監督攝影機 110 影像 111 聲音 112 錄音機 122 伺服器 320 、 330 平行訊號路徑 第8圖是一可因隱私理由 ^ °圖,且 片用之目標言句問器的圖 22 1308451 326 儲存裝置 338 定時暫時記憶裝置 308 監視器 318 影像資料 328 聲音資料 340 授權者 601 全球定位系統(GPS)訊號處理器 602 内部移動感知器 603 記憶體 604 發射器 605 刺激感知器 801 目標詢問器 802 、 803 目標 805 門口1308451 Reservation area. For example, the number one, because the tagged object moves ~2^ the object may be because of the inquiry (5) device lost its message beyond the side of the predetermined area, or because of the tagged object carrier, and / or others Red, one of the entrances and exits was detected. Processor, action. $Men's experience is told that this happened and can be taken as appropriate in Figure 8, + η Μ 目 目 目 目 目 目 目 目 目 目 目 目 目 目 805 805 805 805 805 805 805 805 805 805 805 805 805 805 805 Although the more the coffee field. Although each of the above-described sensing devices is described as being the same (4), it is also possible that a single component can execute the tag or the (four) function. For example, a telephone can be used as a target to ask the target to ask for the 11-label. Any of the above-described portals are applied to the fixed location procedure previously described for the supervisory devices 102, 112, whereby the interrogator is pre-authorized for use in its location and removed from it for deactivation. Although the features and elements of the present embodiments are described above in terms of specific combinations, each feature or element may be used alone (without other features and elements of the preferred embodiments) or with or without other features and elements of the present invention. Group people use. 5 21 1308451 Schematic description of the diagram Figure 1 is an object that is not intended to be recorded under supervision; Figure 2 is a flow chart of unrestricted capture of supervision information; Block diagram of the device that monitors the monitoring information during the avoidance mode; Figure 4 of the μ body k is used to record the avoidance mode of the supervisory information, and the figure 5 is a summary of the transition feature of the avoidance mode; The figure is an example of a device that can be supervised for privacy reasons. Figure 7 of the low-level perception function is an example of the priority mode of supervision information. Component Symbol Description 100 Public Site 101 Object 102 Supervisor Camera 110 Image 111 Sound 112 Recorder 122 Server 320, 330 Parallel Signal Path Figure 8 is a diagram of the target message for the privacy reasons. 22 1308451 326 Storage device 338 Timed temporary memory device 308 Monitor 318 Image data 328 Sound data 340 Authorizer 601 Global Positioning System (GPS) signal processor 602 Internal motion sensor 603 Memory 604 Transmitter 605 Stimulus sensor 801 Target query 802, 803 target 805 doorway

23twenty three

Claims (1)

13.08451 m: ^ ί ο- 年月日修正替換頁 十、申請專利範圍: 1. 一種用以安全處理因授權用途由一監督裝置所捕捉之數 位資訊的方法,包括: 記錄由一監督裝置所捕捉到的數位資訊,其中該數 位資訊是一視覺影像或一聲音訊號之一表現; 依據一隱私模式處理該記錄資訊,該模式禁止對該 資訊進行存取或是改變該資訊以求保護隱私權;以及 平行於該隱私模式依據一迴避模式處理該記錄資 訊,其中該迴避模式處理步驟迴避依據該隱私模式之處 理,該迴避模式包含加密該記錄資訊且授權一授權實體 擁有對於在一已解密格式下之已加密資訊的存取權。 2. 如申請專利範圍第1項之方法,其中該依據該迴避模式 之處理步驟更包括: 將該已加密資訊儲存在一加密儲存裝置内。 3. 如申請專利範圍第2項之方法,更包括: 藉由一解密裝置解密該數位資訊;以及 在一僅可供該授權實體存取之安全監視器顯示該已 解密資訊。 4. 如申請專利範圍第3項之方法,其中該加密步驟包括將 一公用金鑰嵌入該監督裝置内,且該解密步驟包括在該 解密裝置使用至少一私密金鑰。 5. 如申請專利範圍第4項之方法,其中該私密金鑰包括複 數個金錄。 6. 如申請專利範圍第5項之方法,其中該等複數個金鑰是 以一串行方式施用,使得一第一加密是由一第一金錄所 執行,且該第一加密作用隨後由一第二金錄加密以產生 24 1308451 月日修正替換頁 一第二加密作用。~~----- 7_Μ請專利_第6項之方法, r式施用’使得-第ν加密作用是由第, :8:請專利範圍第3項之方法’其,該顯示步驟是即時 9.如申請專利範圍第3項之方法,其中該顯示牛驟a ❺’且該已解密資訊是從該已加密儲存;延時 # 1G·如中請專利範圍第i項之方法,更^裝私索而得。 將°亥5己錄身訊儲存在一暫時儲存裝置内; 分析該暫時儲存裝置之儲存資訊 置捕捉到之激黯動的―徵兆;以及 4督震 11 w選擇關定表示激烈活動之資訊供加密。 .如申請專利範圍第1〇項之方法,i ;係以該監督裳置之感測範圍内:突j 突然加大的偵測為基礎。 或曰里 12. 如申請專利範圍項之方法,更包括·· 用一時間標記及一發+兮今捭+〜 數位資訊。 m錄之位置標明該記錄 13. 如申請專利範圍第丨項之方法,更包括: 藉由一自動程序判斷該監督裝置 :動類型,該自動程序分析該數 找出:=; =至少r的可區別特性:-受觀測模 變化、一移動、一響亮聲音及一尖叫。 疋大… 14.=專由=第=方法’其中該進行安全處理的 驟係由所讀-活動^是激烈的_正面判斷引 1308451 9B;~^7-1^- ’ 年-月2日修正替換頁 發,否則該數位資訊被消除。 15. —種用以處理由一授權監督裝置所捕捉資訊的方法,包 括: 從一監督裝置捕捉影像或聲音資訊; 在該監督裝置内建立至少一隱私保護特徵,包含停 用該監督裝置之一感知功能; 選擇一隱私保護模式用於該捕獲資訊,使得為了進 行完全不受限捕捉,選擇一會停用該隱私保護模式的優 先模式,且為了進行受限捕捉,選擇一採取另一種捕獲 資訊保護方式、包含資訊加密的迴避模式。 16. 如申請專利範圍第15項之方法,其中該優先模式包括 一授權程序,用於將該監督裝置安裝在一特定位置。 17. 如申請專利範圍第16項之方法,其中該授權程序包括: 利用GPS判斷該監督裝置之安裝位置的實體座標; 請求該監督裝置之一優先模式作業,包含下列各項 至少其一:該監督裝置之位置、該監督裝置之公用金鑰 的一憑證、一進行監督之時期及一為何需要進行監督的 理由。 18. 如申請專利範圍第17項之方法,其中該請求更包含該 監督裝置會被依法使用且被用來保護生命或財產之一 具結書。 19. 如申請專利範圍第17項之方法,其中該請求是經由網 際網路呈遞給一授權實體。 20. 如申請專利範圍第19項之方法,其中該授權程序更包 括: 利用該授權實體之一公用金鑰加密該請求。 26 1308451 、ci 1 年 &gt; 曰修正替換頁 21.如申請專利範圍第20項之方法,更包括: 利用該授權實體之一網站向該授權實體呈遞該請 求。 22.如申請專利範圍第16項之方法,其中該授權程序更包 括: 形成一數位認可憑證,其包含該監督裝置之一許可 安裝位置以及該監督裝置在優先模式下之一許可作業 時期。 23. 如申請專利範圍第22項之方法,更包括: 以一授權實體之一私密金鑰簽署該認可憑證;以及 以該監督裝置之一公用金鑰加密該認可憑證。 24. 如申請專利範圍第23項之方法,其中該認可憑證是以 該捕獲資訊進行加密,使得該憑證永久性鏈結於該捕獲 資訊。 25. 如申請專利範圍第23項之方法,其中該認可憑證係藉 由將一數位浮水印加諸於該捕獲資訊而與該捕獲資訊 鏈結,使得該憑證之證明與該捕獲資訊永久性鏈結。 26. 如申請專利範圍第23項之方法,更包括: 透過一包含一獨特循序增加編號的網路服務應答 訊息將該認可憑證置入該監督裝置内,以防止再次輸入 一已簽署訊息的嘗試。 27. 如申請專利範圍第22項之方法,更包括: 利用該監督裝置内一嵌入式偵測器確認該許可安 裝位置; 定期監視該許可安裝位置;以及 在該監視步驟判斷該監督裝置已被移離該許可安 27 130845113.08451 m: ^ ί ο- Year Month Day Correction Replacement Page 10, Patent Application Range: 1. A method for safely processing digital information captured by a supervisory device for authorized purposes, including: Recording is captured by a supervisory device The digital information obtained, wherein the digital information is a visual image or an audio signal; processing the recorded information according to a privacy mode, the mode prohibiting access to the information or changing the information to protect privacy; And processing the record information according to an avoidance mode parallel to the privacy mode, wherein the avoidance mode processing step bypasses processing according to the privacy mode, the avoidance mode includes encrypting the record information and authorizing an authorized entity to have a decrypted format Access to encrypted information. 2. The method of claim 1, wherein the processing step according to the avoidance mode further comprises: storing the encrypted information in an encrypted storage device. 3. The method of claim 2, further comprising: decrypting the digital information by a decryption device; and displaying the decrypted information on a security monitor accessible only by the authorized entity. 4. The method of claim 3, wherein the encrypting step comprises embedding a public key in the supervisory device, and the decrypting step comprises using at least one private key at the decrypting device. 5. The method of claim 4, wherein the private key comprises a plurality of gold records. 6. The method of claim 5, wherein the plurality of keys are applied in a serial manner such that a first encryption is performed by a first record and the first encryption is subsequently performed by A second transcript is encrypted to generate a second cryptographic effect of the 24 1308451 modified replacement page. ~~----- 7_ Μ 专利 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 9. The method of claim 3, wherein the display of the bullish a ❺ ' and the decrypted information is from the encrypted storage; the delay # 1G · the method of the patent scope i, Get it privately. Store the information recorded in the temporary storage device in a temporary storage device; analyze the storage information of the temporary storage device to capture the provoked "signs"; and 4 to monitor the 11 w select the information indicating the intense activity for encryption. For example, the method of applying for the first item of the patent scope, i; is based on the detection of the sudden presence of the supervision. Or 曰 12. If you apply for the patent scope item, it also includes a time stamp and a + 兮 捭 + ~ digital information. The position of the m record indicates the record. 13. The method of claim </ RTI> </ RTI> further includes: judging the supervisory device by an automatic program: the dynamic type, the automatic program analyzes the number to find: =; = at least r Distinguishable features: - subject to observed mode changes, a movement, a loud sound and a scream.疋大... 14.=专用为=第=方法' where the security process is handled by the read-activity ^ is fierce _ positive judgment lead 1308451 9B; ~^7-1^- ' year-month 2 Correct the replacement page, otherwise the digital information will be eliminated. 15. A method for processing information captured by an authorized supervisory device, comprising: capturing image or sound information from a supervisory device; establishing at least one privacy protection feature within the supervisory device, including deactivating one of the supervisory devices Perceptual function; select a privacy protection mode for the capture information, so that for a completely unrestricted capture, select a priority mode that will disable the privacy protection mode, and for limited capture, select one to take another capture information Protection mode, avoidance mode including information encryption. 16. The method of claim 15, wherein the priority mode comprises an authorization program for installing the supervisory device at a particular location. 17. The method of claim 16, wherein the authorization procedure comprises: using a GPS to determine a physical coordinate of the installation location of the supervisory device; requesting one of the supervisory devices to operate in a priority mode, comprising at least one of the following: The location of the supervisory device, a voucher for the public key of the supervisory device, a period of supervision, and a reason why supervision is required. 18. The method of claim 17, wherein the request further comprises the use of the supervisory device in accordance with the law and used to protect one of life or property. 19. The method of claim 17, wherein the request is presented to an authorized entity via the Internet. 20. The method of claim 19, wherein the authorization procedure further comprises: encrypting the request with a public key of the authorized entity. 26 1308451, ci 1 year &gt; 曰Revised replacement page 21. The method of claim 20, further comprising: presenting the request to the authorized entity using one of the authorized entities' websites. 22. The method of claim 16, wherein the authorization process further comprises: forming a digital identification certificate comprising one of the supervisory installation locations and the one of the supervisory devices in the priority mode. 23. The method of claim 22, further comprising: signing the endorsement voucher with a private key of one of the authorized entities; and encrypting the accreditation voucher with a public key of the one of the supervising devices. 24. The method of claim 23, wherein the approval voucher is encrypted with the capture information such that the voucher is permanently linked to the capture information. 25. The method of claim 23, wherein the approval voucher is linked to the capture information by applying a digital watermark to the capture information, such that the proof of the voucher and the capture information are permanently linked. . 26. The method of claim 23, further comprising: placing the approved voucher into the supervisory device via a network service response message containing a unique sequential number increase to prevent an attempt to re-enter a signed message . 27. The method of claim 22, further comprising: confirming the license installation location by using an embedded detector in the supervisory device; periodically monitoring the license installation location; and determining, in the monitoring step, that the supervisory device has been Moved away from the license An 27 1308451 襞位置時停用該優先模式„ 28·如申請專利範圍第27 於被切n — 版*此項之方去,其中在已經過一段長 如申;專利=模27==:用該優先模式。 是-㈣接收器。、之H其中紐人式摘㈣ 第27項之方法’其中該嵌入·器 31.;===r在該監督裝置被 处-種監督設備^置”新啟用該優先模式。 -監督裝置’其被建構时_呈—影像、一 或一化學物之形式的資訊; D己錄器,其被建構用來數位地記錄測得資訊; 過濾機構,其被建構用來過濾經判定與可疑活 有關的記錄資訊或是滤除經判定與隱私活動有關的資 =或二者之—組合,該軸機構包括-處理器、和-儲存 裝置; 一加密裝置,其加密已過濾資訊;及 一加岔儲存裝置,其用於儲存已加密資訊。 33. ^申請專利範圍第32項之設備,其中該過濾機構利用 一内嵌演算法、編碼、或偽碼判斷要被濾除的隱私、、舌 34·如申請專利範圍第32項之設備,其中該和慮機構利用 一軟體組件或應用程式判斷要被濾除的隱私活動。 35.如申請專利範圍第32項之設備,更包括: 一解密裝置被定位在一安全位置,其被建構用 密該已加密資訊;及 解 28 1308451 [*98r~The priority mode is deactivated when the location is „ 28. If the scope of the patent application is 27, the party that has been cut n-version* is selected, in which a long period of time has passed; patent = modulo 27 ==: use the priority mode Yes - (4) Receiver., H of the New Zealand type (4) Method 27 of the 'where the embedding device 31.; ===r is in the supervision device is placed - the type of supervision equipment ^ set" Priority mode. - a supervisory device 'when it is constructed_information, in the form of an image, a chemical or a chemical; a D recorder, which is constructed to digitally record measured information; a filtering mechanism that is constructed to filter Determining the recorded information related to the suspicious activity or filtering out the combination of the judgement and privacy activities, or the combination of the two, the axis mechanism includes a processor, and a storage device; and an encryption device that encrypts the filtered information And a twisted storage device for storing encrypted information. 33. ^Applicant of claim 32, wherein the filtering mechanism utilizes an inline algorithm, encoding, or pseudocode to determine the privacy to be filtered out, and the device of claim 32, such as the device of claim 32, The care organization utilizes a software component or application to determine the privacy activities to be filtered out. 35. The device of claim 32, further comprising: a decryption device positioned at a secure location, configured to encrypt the encrypted information; and solution 28 1308451 [*98r~ ’月曰修正替換I 一監視器,被定位在一安全位置,其用於觀看該已 解密資訊。 36. 如申請專利範圍第35項之設備,其中該解密裝置即時 解密資訊。 37. 如申請專利範圍第35項之設備,其中該解密裝置解密 被儲存在該儲存裝置内之已加密資訊。 38. —種包含如申請專利範圍第32項所述設備的系統,更 包括: 一發射器,用於將該已加密資訊傳輸到一遠端位置 的;及 一遠端伺服器,用於接收該已加密資訊,其中該遠 端伺服器包含一用來儲存該已加密資訊的遠端儲存裝 置。 39. 如申請專利範圍第32項之設備,其中該監督裝置是一 攝影機。 40. 如申請專利範圍第32項之設備,其中該監督裝置是一 錄音機。 41. 如申請專利範圍第32項之設備,其中該監督裝置是一 出入口識別器型目標詢問器。 42. 如申請專利範圍第32項之設備,其中該監督裝置是一 化學物偵測裝置。 29The 'Monthly Correction Replacement I' monitor is located in a secure location for viewing the decrypted information. 36. The device of claim 35, wherein the decryption device decrypts the information in real time. 37. The device of claim 35, wherein the decryption device decrypts the encrypted information stored in the storage device. 38. A system comprising the apparatus of claim 32, further comprising: a transmitter for transmitting the encrypted information to a remote location; and a remote server for receiving The encrypted information, wherein the remote server includes a remote storage device for storing the encrypted information. 39. The device of claim 32, wherein the supervisory device is a camera. 40. The device of claim 32, wherein the monitoring device is a tape recorder. 41. The device of claim 32, wherein the supervisory device is an entry identifier type target interrogator. 42. The device of claim 32, wherein the monitoring device is a chemical detecting device. 29
TW94141371A 2004-11-29 2005-11-24 Method and apparatus to provide secured surveillance data to authorized entities TWI308451B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US63132804P 2004-11-29 2004-11-29
US63352704P 2004-12-06 2004-12-06

Publications (2)

Publication Number Publication Date
TW200629860A TW200629860A (en) 2006-08-16
TWI308451B true TWI308451B (en) 2009-04-01

Family

ID=45071830

Family Applications (2)

Application Number Title Priority Date Filing Date
TW94141371A TWI308451B (en) 2004-11-29 2005-11-24 Method and apparatus to provide secured surveillance data to authorized entities
TW095120101A TW200715805A (en) 2004-11-29 2005-11-24 Method and apparatus to provide secured surveillance data to authorized entities

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW095120101A TW200715805A (en) 2004-11-29 2005-11-24 Method and apparatus to provide secured surveillance data to authorized entities

Country Status (1)

Country Link
TW (2) TWI308451B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI596499B (en) * 2014-02-28 2017-08-21 英特爾公司 Computing device and storage medium relating to sensor privacy technology

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201038035A (en) * 2009-04-10 2010-10-16 Nueteq Technology Inc Extending transmission system for transmitting video/audio signal and operation method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI596499B (en) * 2014-02-28 2017-08-21 英特爾公司 Computing device and storage medium relating to sensor privacy technology
US9740882B2 (en) 2014-02-28 2017-08-22 Intel Corporation Sensor privacy mode

Also Published As

Publication number Publication date
TW200715805A (en) 2007-04-16
TW200629860A (en) 2006-08-16

Similar Documents

Publication Publication Date Title
US20060137018A1 (en) Method and apparatus to provide secured surveillance data to authorized entities
US10297126B2 (en) Privacy masking video content of alarm exceptions and mask verification
US7508941B1 (en) Methods and apparatus for use in surveillance systems
CA2842782C (en) Systems and methods for dynamically assessing and mitigating risk of an insured entity
US8559914B2 (en) Interactive personal surveillance and security (IPSS) system
CN102084370A (en) System for mitigating the unauthorized use of a device
CN102084369A (en) System for monitoring the unauthorized use of a device
CN102084371A (en) System for mitigating the unauthorized use of a device
KR101058592B1 (en) System for auditing picture information abuse
US8272063B2 (en) DRM scheme extension
CN105637522A (en) World-driven access control using trusted certificates
KR101951605B1 (en) Cctv image security system to prevent image leakage
Winkler et al. A systematic approach towards user-centric privacy and security for smart camera networks
JP5757048B2 (en) Security camera system characterized by having information disclosure means to inform owner and person who can view images
JP2003319158A (en) Image processing system
US20210385408A1 (en) Authentication Module for Sensor Data
JP6671627B2 (en) Camera system that enables privacy protection
KR20140144398A (en) Method and system for sending CCTV video file to outside
TWI308451B (en) Method and apparatus to provide secured surveillance data to authorized entities
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN111311863A (en) Unattended financial indoor safety early warning method
JP5353147B2 (en) Face matching system
JP2007150559A (en) Security device
Vagts et al. Privacy-aware object representation for surveillance systems
JP2019086904A (en) Image management server and image management method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees