WO2019125203A1 - Method for provision of evidence reliability, device for its implementation and device operation concept - Google Patents

Method for provision of evidence reliability, device for its implementation and device operation concept Download PDF

Info

Publication number
WO2019125203A1
WO2019125203A1 PCT/RU2018/000192 RU2018000192W WO2019125203A1 WO 2019125203 A1 WO2019125203 A1 WO 2019125203A1 RU 2018000192 W RU2018000192 W RU 2018000192W WO 2019125203 A1 WO2019125203 A1 WO 2019125203A1
Authority
WO
WIPO (PCT)
Prior art keywords
video
modulation code
unit
data
hash
Prior art date
Application number
PCT/RU2018/000192
Other languages
French (fr)
Inventor
Maxim Alexandrovich BREUS
Original Assignee
Breus Maxim Alexandrovich
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Breus Maxim Alexandrovich filed Critical Breus Maxim Alexandrovich
Publication of WO2019125203A1 publication Critical patent/WO2019125203A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/207Surveillance aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G3/00Alarm indicators, e.g. bells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • This invention belongs to the field of computer engineering, in particular, to information security tools.
  • Patent of Invention No. 2416169, MPK H04L9/32, OBJECT AUTHENTICATION METHOD This method allows improving the cryptographic security by replacement of confidential information if compromised, and it also allows extending the functional capabilities by implementation of the algorithm of object authentication in the group of uniform objects by individual properties inherent only to the given object.
  • This method includes generation of at least one pseudorandom modulated light yield of the object image during the period of at least partial pseudorandom modulated light yield, in order to generate video stream, and further detection whether the light flux influences the video signal or not.
  • the method contains the first light yield generation phase, and detection of delay between the generation of the first light yield and registration of at least one artefact of the first light yield within the video stream after the first light yield generation phase.
  • Generation of pseudorandom modulated light flux includes generation of the sequence of light pulses, wherein the light pulses are separated by time sums.
  • Generation of pseudorandom modulated light yield includes generation of the sequence of light pulses, wherein the light pulses feature pseudorandom amplitude.
  • Visual authentication includes pseudorandom variation of light yield of the imaging device, object image during, at least, the portion of pseudorandom variation of light flux, in order to generate video stream; after that, decision is made on whether video signal stream influences light flux or not.
  • Pseudorandom variation of light flux includes the following: generation of one or several pseudorandom time points, where light yield can be measured; as well as maintenance of light output variation within the given time period.
  • Pseudorandom variation of light flux includes the following: generation of one or several pseudorandom time points in order to measure light flux; as well as maintenance of light output for pseudorandom time.
  • Decision on invention includes the receipt of request for access to a protected resource; if it is detected that video stream has been affected, and then access to the requested protected resource is provided, and if it is detected that video stream has not been affected, and access to the requested protected resource is denied.
  • an object is the one to be authenticated.
  • the object is a requested access to the protected resource.
  • the method where the object is pupil of the person requesting access to the protected resource.
  • Method of visual authentication includes application of pseudorandom and time-dependent light device output modulation signal for a given period of time; visualisation of the object for at least portion of the period of time; and detection of the affect on video stream, if any.
  • the object is a PC user requesting access to any resource of the PC.
  • PC display device is used for implementation of this method.
  • the light device sends modulation signal to generate pulse-like variations of optical radiation.
  • Authentication method includes a transmitter, operating in optical portion of the electromagnetic spectrum or infrared portion of the electromagnetic spectrum.
  • the image data input stream is requested for the object to be authenticated, pseudorandom time-dependent infrared radiation is generated, it is determined whether the image data input stream includes artefacts of infrared reflections correlated in time with at least part of the portion of the generated pseudorandom time-dependent infrared radiation.
  • generation of pseudorandom time- dependent infrared radiation includes generation of pseudorandom sequence of infrared pulses of almost fixed length. Otherwise, generation of pseudorandom time-dependent infrared radiation includes generation of pseudorandom sequence of infrared pulses featuring pseudorandomly generated pulse widths.
  • G06F21/32, Online User Authentication Method is the closest invention to the claimed one.
  • Authentication includes transmission of the code from server to user device, equipped with a light source and a camera capable of capturing video image of online user.
  • User device receives the code, and modulates light source accordingly, and captures video image of the user, while the light source is modulated as per the code. Captured video images of online user are sent to the server, where the images are analysed in order to identify evidences of lighting variations corresponding to the code. If good correspondence is detected, the user can be authenticated. Similar methods can be applied to other biometric data.
  • Method of online user authentication includes transmission of information from the server to the user device, and the user device includes the light source; video camera capable of capturing video image of online user; where the user device is capable of the following: receiving information; modulating light source based on the code received from agent; and transmitting the captured video images of online user to the server; receiving the captured video images of online user, transmitted by the user device, at the server; moreover, image is captured by the camera, whereas the light source is modulated as per the code received from agent; analysis of the received images in order to discover evidences of lighting variations matching the code; and generating the authentication answer based on the results of analysis of the video images received.
  • Disadvantage of this invention is its ability to solve only authentication problems related to validation of nickname and identity of the object performing certain actions on the server (banking transactions, etc.)
  • This method cannot be used for authentication of events (judicial proceedings, etc.)
  • prototype database can be falsified, thus, after some time, it cannot be reliably confirmed that image of the given object has been taken precisely at the given moment (agent’s database could be hacked and rewritten).
  • impossibility of ensuring the reliability of the entire system at the time of identification of the relying (third) party is the disadvantage, as reliability for outside users is determined by the degree of confidence in this third (relying) party.
  • Purpose of this invention is the provision of objective evidence of the fact that certain “events” have been captured exactly within the given time period and are valid.
  • the developed method of evidence reliability provision which includes creation of video of the object and video file using the given parameters of modulated lighting, with subsequent matching of the given parameters of light source modulation and parameters of modulated lighting of the video file analysed.
  • video recording is initiated after either starting up the modulation code generation process, or by using the last records available in the blockchain, or by generation of pseudorandom code upon entering this modulation code into blockchain.
  • request is created based on the user account data, such as date, time, device data stored in the device.
  • Light source modulation code which is unique for the given request, is generated. This modulation code is entered into the blockchain. After that, the resulting modulation code is converted into a control modulating signal, which is transmitted to the light source.
  • the object is exposed to light, and lighting intensity varies as per the modulating signal.
  • video is created for the given time interval.
  • hash function of the resulting video file is calculated, and hash video is recorded to the blockchain, and the modulation code, modulation code record ID, video file, hash video, hash video record ID, and data block ID are saved in the user device storage unit and in the external storage.
  • External user is granted with access to corresponding entries of the user device storage unit, entries of the external storage, and entries of the blockchain data block in order to match the data entered into the blockchain and the data received from the user, in particular, modulation code, modulation code record ID, video file, hash video, hash video record ID, for matching with the data stored in the blockchain, and analysis of the modulation code used for video file creation.
  • the system identifies the time interval between the entries in the blockchain data block containing modulation code and hash video. Based on this interval, the system calculates the time interval during which the considered video has been captured, and the reliability of the event recorded in this video file is evaluated.
  • the user computing device comprises of the user computing device, light source, video camera, blockchain servers, and an external storage.
  • the user computing device contains the request generation unit, user account unit, request transmission unit, hash function computation unit, data recording unit, modulation code conversion unit, light source control unit, video signal recording unit, video camera control unit, data generating and processing unit, user device storage unit.
  • Blockchain server contains the blockchain data blocks and decentralized application unit, comprising record request processing unit, modulation code generating unit, modulation code recording unit, hash video recording unit.
  • Blockchain data blocks contain modulation code, modulation code record ID, hash video, hash video record ID.
  • the user device storage unit and external storage contain modulation code, modulation code record ID, hash video, hash video record ID, and data block ID.
  • Video recording is initiated by starting up the request generation unit. It requests data of the user account unit. Request data are generated based on the data received from the account unit and the system data provided by the user computing device, such as date, time, device data and data stored in the device. Those data are sent to the request transmission unit.
  • This unit connects to any of the blockchain serves (nodes) by starting up the decentralized application unit, and transmits request data to the request processing unit to record the decentralized application.
  • the request processing unit sends request data to the modulation code generation unit of the decentralized application for recording. Based on data of the blockchain data block entries and the received request data, the latter unit generates the unique modulation code for the request provided.
  • the generated modulation code is transmitted to the record request processing unit for forwarding the code back to the request transmission unit. Then the code is transmitted to the modulation code recording unit of the decentralized application.
  • This unit records the modulation code to blockchain data blocks and returns the entry code of the modulation code to the record request processing unit for forwarding it back to the request transmission unit.
  • the record request processing unit transmits the received modulation code and modulation code record ID to the request transmission unit.
  • the last entries of the blockchain data blocks are used as the modulation code
  • the entry codes of the last entries in the blockchain data blocks are used as the modulation code record ID.
  • the request transmission unit reads the required data by connecting to any of the blockchain servers.
  • the request transmission unit transmits the received modulation code to the modulation code conversion unit, and transmits the modulation code record ID and the modulation code to the data generation and processing unit.
  • the video recording unit is started up.
  • the modulation code conversion unit converts the received modulation code into control modulating signal, characteristic for the given type of the user device.
  • Modulating signal is transmitted to the light source control unit.
  • Light source control unit controls intensity of light emitted by the light source, depending upon the received modulating signal.
  • Light source illuminates the object by light of varying intensity, following the modulating signal.
  • he video camera captures the object illuminated by the modulated light source.
  • Video recording unit starts recording video data, by starting up the video camera control unit.
  • Hash function computation unit computes the value of hash function related to the video file.
  • the computed hash function is transmitted to the data recording unit and the data generation and processing unit.
  • Data recording unit transmits hash video to the hash video recording unit of the decentralized application unit. Otherwise, hash vide is recorded to the blockchain data block without using the decentralized application.
  • Hash video recording unit records hash video into the blockchain data block, and returns the hash video code into the data recording unit.
  • Data recording unit transmits the hash video record ID into the data generation and processing unit.
  • the latter records the data containing the modulation code, modulation code record ID, video file, hash video, hash video record ID, as well as the data block ID, which enables search of any required entries in the user device storage unit or the external unit.
  • the data generation and processing unit of the user device provides the external user with access to corresponding entries of the user device storage unit or the external storage, or the abovementioned data are transmitted to the external user by any means available.
  • the external user checks if the modulation code entry is available in the blockchain.
  • the system performs the search as per the modulation code record ID and hash video record ID by searching in accordance with the hash video record ID.
  • the external user computes hash function related to video file data and matches the results with the hash video recorded in the blockchain data block.
  • the system analyses and identifies the light source modulation code.
  • the resulting modulation code is compared with the modulation code stored in the blockchain data block. If the resulting modulation code and the computed hash video matches the data recorded to the blockchain data blocks, it is proved that the considered event recorded in the video has taken place within time interval between the time marks associated with recording of the modulation code and recording of the hash video stored in blockchain data blocks.
  • Figure 1 Functional Diagram of the Evidence Reliability Validation Device.
  • Method of evidence reliability provision implemented as follows.
  • Video recording the object is captured, video file is created at the given parameters of modulated lighting. Matching of the given parameters of modulated lighting of the analysed video-file is performed.
  • video recording is initiated after either starting up modulation code generation process, or using the last records available in the blockchain, or by generation of pseudorandom code upon entering this modulation code into blockchain.
  • request is created based on the user account data, such as date, time, device data stored in the device.
  • Light source modulation code unique for the given request, is generated. This modulation code is entered into the blockchain. After that, the resulting modulation code is converted into a control modulating signal, which is transmitted to the light source.
  • the object is illuminated, and light intensity varies as per the modulating signal.
  • video stream is recorded for the given time interval.
  • hash function of the resulting video-file is computed, and hash video is recorded to the blockchain, and the modulation code, modulation code record ID, video file, hash video, hash video record ID, and data block ID is saved in the user device storage unit and in the external storage.
  • External user is granted with access to corresponding entries of the user device storage unit, the entries of the external storage, and the entries of the blockchain data block in order to match the data entered into the blockchain and the data received from the user, in particular, modulation code, video file, hash video, hash video record ID, for matching with the data stored in the blockchain, and analysis of the modulation code used for video-file recoding.
  • the system identifies the time interval between the entries in the blockchain data block containing modulation code and hash video. Based on this interval, the system calculates the time interval during which the considered video has been captured and, respectively, reliability of the event recorded in this videofile is evaluated.
  • Evidence Reliability Validation Device comprises the following components: user computing device 1 , light source 2, video camera 3, blockchain server (node) 4, external storage 5.
  • User computing device 1 comprises the following components: request generation unit 7, user account unit 8, request transmission unit 9, hash function computing unit 10, data recording unit 11 , modulation code conversion unit 12, light source control unit 13, video signal recording unit 14, video camera control unit 15, data generation and processing unit 16, user device storage unit 17.
  • user device storage unit 17 comprises the following components: modulation code 20, modulation code record ID 28, video file 21 , hash video 19, hash video record ID 18, data block ID 22.
  • Blockchain server (node) 4 comprises the following components: decentralized application unit 23, and blockchain data blocks 6.
  • decentralized application unit 23 comprises the following components: record request processing unit 24, modulation code generation unit 25, modulation code recording unit 26, hash video recording unit 27.
  • External storage 5 comprises the following components: modulation code 20, modulation code record ID 28, video file 21 , hash video 19, hash video record ID 18, data block ID 22.
  • Request generation unit 7 requests data from user account unit 8 of user 29. Based on the account data of user 29, received from user account unit 8, and the system data of user computing device 1 (including date, time, device data and other data stored in the device), request generation unit 7 generates the request data, for example, formatted as data strings, and transmits the request data to request transmission unit 9.
  • request transmission unit 9 connects to any of blockchain servers (nodes) 4. Otherwise, it initiates execution of record request processing unit 24 of decentralized application 23 (where the Etherium Platform is used as a blockchain, for example, and smart contract of the Etherium Platform is used as decentralized application 23). Otherwise, it uses the data of blockchain server (node) 4, and for this purpose request transmission unit 9 reads data of the last entries stored in blockchain data blocks 6 from blockchain server (node) 4, for example, this can be hash of the last block or hash of the last transactions, in the form of pseudorandom numbers. In this case, data of the last entries stored in blockchain data blocks 6 are used as modulation code 20, and the record IDs, which were used as modulation code 20 of data of the last entries stored in blockchain data blocks 6, are used as modulation code record ID 28.
  • Record request processing unit 24 transmits the request data to modulation code generation unit 25. 5. Based on the request data received and using pseudorandom data (data from blockchain data blocks 6, including hash of the last block or hash of the last transactions, can be used), modulation code generation unit 25 generates modulation code 20, which is unique for the given request. For example, hash function calculated for the request data and blockchain data blocks 6 can be used as the above code. Computed modulation code 20 is transmitted to record request processing unit 24 for forwarding back to request transmission unit 9, also it is transmitted to modulation code recording unit 26.
  • pseudorandom data data from blockchain data blocks 6, including hash of the last block or hash of the last transactions, can be used
  • Record request processing unit 26 records modulation code 20 to blockchain data block 6 and returns modulation code record ID 28 to record request processing unit 24 for forwarding back to request transmission unit 9. 7. Record request processing unit 24 transmits the received modulation code 20 and modulation code record ID 28 into request transmission unit 9.
  • Request transmission unit 9 sends the received modulation code 20 into modulation code conversion unit 12, and modulation code record ID 28 and modulation code 20 are sent into data generation and processing unit 16. Simultaneously, request transmission unit 9 starts up video signal recording unit 14.
  • Modulation code conversion unit 12 converts the received modulation code 20 into control modulating signal which is typical for the given type of user computing device 1. Modulating signal is transmitted to light source control unit 13.
  • Light source control unit 13 controls intensity of light source 2 in accordance with the modulating signal received.
  • Light source 2 illuminates object 30 and changes light intensity in accordance with the modulating signal.
  • Video camera 3 performs video recording of object 30 which is exposed to modulated light source 2.
  • Video signal recording unit 14 starts video recording by switching on video camera control unit 15.
  • Video is recorded until user 29 sends command to stop the recording. Upon receipt of the command, video recording is stopped, and video signal recording unit 14 transmits stop command to modulation code conversion unit 12. Recorded video file 21 is transmitted to hash function computing unit 11 and data generation and processing unit 16.
  • modulation code conversion unit 12 sends request to request transmission unit 9 to receive additional modulation code featuring the same request parameters.
  • Hash function computing unit 10 computes hash function which is related to video file 21. For example, the standard SHA-256 can be used for computation of hash function. Resulting value of hash video 19 is transmitted to data recording unit 11.
  • Data recording unit 11 sends hash video 19 to hash video recording unit 27 of decentralized application unit 23. Recording of hash video to blockchain data blocks 6 can be made without the use of decentralized application unit 23.
  • Hash video recording unit 27 records the received hash video 19 to blockchain data block 6 and returns hash video record ID 18 (as recorded to blockchain data block 6) into data recording unit 11.
  • Data recording unit 11 sends hash-video record ID 18 into data generation and processing unit 16.
  • Data generation and processing unit 16 records data, which contain modulation code 20, modulation code record ID 28, video file 21 , hash video 19, hash video record ID 18, and data block ID 22 enabling the search for the entries required, to user device storage unit 17 and/or external storage 5.
  • user 29 provides external user 31 with access to corresponding entries of user device storage unit 17 and/or entries of external storage 5 using data generation and processing unit 16, or provides external user 31 with the abovementioned information by any other means.
  • External user 31 checks the availability of modulation code 20 in blockchain data blocks 6 by searching within blockchain data blocks 6 as per modulation code record ID 28, and availability of hash video recording 19 as per hash video record ID 18.
  • External user 31 computes hash function related to the data of video file 21 and compares results with hash video 19 which is stored in blockchain data blocks 6.
  • the external user can analyse video 21 and extract the light source modulation code. The received modulation code is compared to modulation code 20. 25. If the modulation code obtained by external user 31 after analysis of video file 21 and the computed hash video match the data stored in blockchain data blocks 6, external user 31 can be sure that the event captured by video 21 has occurred within time interval limited by the time marks of recording of modulation code 20 and recording of hash video 18 in blockchain data blocks 6.
  • G930FZKUSER can be used as user computing device 1.
  • Units of the mobile application SilentNotary for Android 4.1 and above can be used as request generation unit 7, user account unit 8, request transmission unit 9, hash function computing unit 10, data recording unit 11 , modulation code conversion unit 12, video signal recording unit 14, data generation and processing unit 16, user device storage unit 17.
  • Standard SHA-256 can be used for computation of hash-function.
  • Service SilentNotary.io which is using Google cloud storage (https://cloud.google.com), can be used as the external storage.
  • Any server (node) on the Etherium platform (Ethereum.org) can be used as blockchain server (node) 4.
  • Smart contract on the Etherium platform which is coded using Solidity language, for example, can be used as decentralized application unit 23.
  • Ethereum blockchain blocks can be used as blockchain data blocks 6.
  • external user 31 can use any public system for reading the blockchain data block, for example, the system etherscan.io can be used for Ethereum platform.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to information security means, and consists in objective evidence of the reliability of an event due to the video recording device making an object with a user-defined recording interval of a video file with modulated illumination, with calculating the hash function of this video file, as well as the hash video recording code, and storing the data in blockchain. Moreover, in the reliability check, the light source modulation code is analyzed and the modulation code of the light source is extracted, and the obtained modulation code is compared with the modulation code of the blocking data recorded in the blockchain blocks, and if the found modulation code and the computed video hash match the data, recorded in the blockchain data blocks are match, make sure that the event recorded on the video occurred in the time interval between the timestamps of the modulation code record and the hash video record in the blockchain data blocks.

Description

METHOD FOR PROVISION OF EVIDENCE RELIABILITY,
DEVICE FOR ITS IMPLEMENTATION AND DEVICE OPERATION CONCEPT
Field of the Invention
This invention belongs to the field of computer engineering, in particular, to information security tools.
Background of the Invention Reference to decision on the Russian Federation
Patent of Invention No. 2416169, MPK H04L9/32, OBJECT AUTHENTICATION METHOD”. This method allows improving the cryptographic security by replacement of confidential information if compromised, and it also allows extending the functional capabilities by implementation of the algorithm of object authentication in the group of uniform objects by individual properties inherent only to the given object.
Reference to USA Patent of Invention No. 5933502, MPK G06F1/00; G06K9/20; H04N7/16, “Visual Authentication Method”. This method includes generation of at least one pseudorandom modulated light yield of the object image during the period of at least partial pseudorandom modulated light yield, in order to generate video stream, and further detection whether the light flux influences the video signal or not. In addition, the method contains the first light yield generation phase, and detection of delay between the generation of the first light yield and registration of at least one artefact of the first light yield within the video stream after the first light yield generation phase. Generation of pseudorandom modulated light flux includes generation of the sequence of light pulses, wherein the light pulses are separated by time sums. Generation of pseudorandom modulated light yield includes generation of the sequence of light pulses, wherein the light pulses feature pseudorandom amplitude. Visual authentication includes pseudorandom variation of light yield of the imaging device, object image during, at least, the portion of pseudorandom variation of light flux, in order to generate video stream; after that, decision is made on whether video signal stream influences light flux or not. Pseudorandom variation of light flux includes the following: generation of one or several pseudorandom time points, where light yield can be measured; as well as maintenance of light output variation within the given time period. Pseudorandom variation of light flux includes the following: generation of one or several pseudorandom time points in order to measure light flux; as well as maintenance of light output for pseudorandom time. Decision on invention includes the receipt of request for access to a protected resource; if it is detected that video stream has been affected, and then access to the requested protected resource is provided, and if it is detected that video stream has not been affected, and access to the requested protected resource is denied. In this invention, an object is the one to be authenticated. In such case, the object is a requested access to the protected resource. The method, where the object is pupil of the person requesting access to the protected resource. Method of visual authentication includes application of pseudorandom and time-dependent light device output modulation signal for a given period of time; visualisation of the object for at least portion of the period of time; and detection of the affect on video stream, if any. In this method, the object is a PC user requesting access to any resource of the PC. PC display device is used for implementation of this method. In this method, the light device sends modulation signal to generate pulse-like variations of optical radiation. Authentication method includes a transmitter, operating in optical portion of the electromagnetic spectrum or infrared portion of the electromagnetic spectrum. The image data input stream is requested for the object to be authenticated, pseudorandom time-dependent infrared radiation is generated, it is determined whether the image data input stream includes artefacts of infrared reflections correlated in time with at least part of the portion of the generated pseudorandom time-dependent infrared radiation. In this method, generation of pseudorandom time- dependent infrared radiation includes generation of pseudorandom sequence of infrared pulses of almost fixed length. Otherwise, generation of pseudorandom time-dependent infrared radiation includes generation of pseudorandom sequence of infrared pulses featuring pseudorandomly generated pulse widths.
USA Patent Application No. 20130219480, MPK
G06F21/32, Online User Authentication Method” is the closest invention to the claimed one. Methods, systems and computer software products for online-user authentication. Authentication includes transmission of the code from server to user device, equipped with a light source and a camera capable of capturing video image of online user. User device receives the code, and modulates light source accordingly, and captures video image of the user, while the light source is modulated as per the code. Captured video images of online user are sent to the server, where the images are analysed in order to identify evidences of lighting variations corresponding to the code. If good correspondence is detected, the user can be authenticated. Similar methods can be applied to other biometric data.
Authentication applications include identification of validation, verification of nicknames, and separation of human access attempts from non-human ones (robots). Method of online user authentication includes transmission of information from the server to the user device, and the user device includes the light source; video camera capable of capturing video image of online user; where the user device is capable of the following: receiving information; modulating light source based on the code received from agent; and transmitting the captured video images of online user to the server; receiving the captured video images of online user, transmitted by the user device, at the server; moreover, image is captured by the camera, whereas the light source is modulated as per the code received from agent; analysis of the received images in order to discover evidences of lighting variations matching the code; and generating the authentication answer based on the results of analysis of the video images received.
Disadvantage of this invention is its ability to solve only authentication problems related to validation of nickname and identity of the object performing certain actions on the server (banking transactions, etc.) This method cannot be used for authentication of events (judicial proceedings, etc.) Besides, prototype database can be falsified, thus, after some time, it cannot be reliably confirmed that image of the given object has been taken precisely at the given moment (agent’s database could be hacked and rewritten). Thus, impossibility of ensuring the reliability of the entire system at the time of identification of the relying (third) party is the disadvantage, as reliability for outside users is determined by the degree of confidence in this third (relying) party.
Disclosure of the Invention
Purpose of this invention is the provision of objective evidence of the fact that certain “events” have been captured exactly within the given time period and are valid.
Problem is solved by using the developed method of evidence reliability provision, which includes creation of video of the object and video file using the given parameters of modulated lighting, with subsequent matching of the given parameters of light source modulation and parameters of modulated lighting of the video file analysed. Whereby, video recording is initiated after either starting up the modulation code generation process, or by using the last records available in the blockchain, or by generation of pseudorandom code upon entering this modulation code into blockchain. For this purpose, request is created based on the user account data, such as date, time, device data stored in the device. Light source modulation code, which is unique for the given request, is generated. This modulation code is entered into the blockchain. After that, the resulting modulation code is converted into a control modulating signal, which is transmitted to the light source. Then, depending on the received modulating signal, the object is exposed to light, and lighting intensity varies as per the modulating signal. Simultaneously, video is created for the given time interval. Then, hash function of the resulting video file is calculated, and hash video is recorded to the blockchain, and the modulation code, modulation code record ID, video file, hash video, hash video record ID, and data block ID are saved in the user device storage unit and in the external storage. External user is granted with access to corresponding entries of the user device storage unit, entries of the external storage, and entries of the blockchain data block in order to match the data entered into the blockchain and the data received from the user, in particular, modulation code, modulation code record ID, video file, hash video, hash video record ID, for matching with the data stored in the blockchain, and analysis of the modulation code used for video file creation. Afterwards, the system identifies the time interval between the entries in the blockchain data block containing modulation code and hash video. Based on this interval, the system calculates the time interval during which the considered video has been captured, and the reliability of the event recorded in this video file is evaluated.
Device, which is used for implementation of the proposed method, comprises of the user computing device, light source, video camera, blockchain servers, and an external storage. Whereby, the user computing device contains the request generation unit, user account unit, request transmission unit, hash function computation unit, data recording unit, modulation code conversion unit, light source control unit, video signal recording unit, video camera control unit, data generating and processing unit, user device storage unit. Blockchain server contains the blockchain data blocks and decentralized application unit, comprising record request processing unit, modulation code generating unit, modulation code recording unit, hash video recording unit. Blockchain data blocks contain modulation code, modulation code record ID, hash video, hash video record ID. Whereby, the user device storage unit and external storage contain modulation code, modulation code record ID, hash video, hash video record ID, and data block ID.
Method of operation of the Evidence Reliability Validation Device is as follows. Video recording is initiated by starting up the request generation unit. It requests data of the user account unit. Request data are generated based on the data received from the account unit and the system data provided by the user computing device, such as date, time, device data and data stored in the device. Those data are sent to the request transmission unit. This unit connects to any of the blockchain serves (nodes) by starting up the decentralized application unit, and transmits request data to the request processing unit to record the decentralized application. Whereby, the request processing unit sends request data to the modulation code generation unit of the decentralized application for recording. Based on data of the blockchain data block entries and the received request data, the latter unit generates the unique modulation code for the request provided. The generated modulation code is transmitted to the record request processing unit for forwarding the code back to the request transmission unit. Then the code is transmitted to the modulation code recording unit of the decentralized application. This unit records the modulation code to blockchain data blocks and returns the entry code of the modulation code to the record request processing unit for forwarding it back to the request transmission unit. Whereby, the record request processing unit transmits the received modulation code and modulation code record ID to the request transmission unit. Otherwise, the last entries of the blockchain data blocks are used as the modulation code, and the entry codes of the last entries in the blockchain data blocks are used as the modulation code record ID. For this purpose the request transmission unit reads the required data by connecting to any of the blockchain servers. In turn, the request transmission unit transmits the received modulation code to the modulation code conversion unit, and transmits the modulation code record ID and the modulation code to the data generation and processing unit. Simultaneously, the video recording unit is started up. Whereby, the modulation code conversion unit converts the received modulation code into control modulating signal, characteristic for the given type of the user device. Modulating signal is transmitted to the light source control unit. Light source control unit controls intensity of light emitted by the light source, depending upon the received modulating signal. Light source illuminates the object by light of varying intensity, following the modulating signal. Simultaneously, he video camera captures the object illuminated by the modulated light source. Video recording unit starts recording video data, by starting up the video camera control unit. Whereby, video is recorded within the time interval set up by the user. Afterwards, video recording is stopped, lighting modulation is stopped, and the recorded video file is transmitted to the hash function computation unit and the data generation and processing unit. Hash function computation unit computes the value of hash function related to the video file. The computed hash function is transmitted to the data recording unit and the data generation and processing unit. Data recording unit transmits hash video to the hash video recording unit of the decentralized application unit. Otherwise, hash vide is recorded to the blockchain data block without using the decentralized application. Hash video recording unit records hash video into the blockchain data block, and returns the hash video code into the data recording unit. Data recording unit transmits the hash video record ID into the data generation and processing unit. The latter records the data containing the modulation code, modulation code record ID, video file, hash video, hash video record ID, as well as the data block ID, which enables search of any required entries in the user device storage unit or the external unit. Whereby, to enable the external user to validate the data, the data generation and processing unit of the user device provides the external user with access to corresponding entries of the user device storage unit or the external storage, or the abovementioned data are transmitted to the external user by any means available. Afterwards, the external user checks if the modulation code entry is available in the blockchain. Whereby, the system performs the search as per the modulation code record ID and hash video record ID by searching in accordance with the hash video record ID. The external user computes hash function related to video file data and matches the results with the hash video recorded in the blockchain data block. Using the given video file, the system analyses and identifies the light source modulation code. The resulting modulation code is compared with the modulation code stored in the blockchain data block. If the resulting modulation code and the computed hash video matches the data recorded to the blockchain data blocks, it is proved that the considered event recorded in the video has taken place within time interval between the time marks associated with recording of the modulation code and recording of the hash video stored in blockchain data blocks.
Brief description of figures
Figure 1 - Functional Diagram of the Evidence Reliability Validation Device.
In many cases, it is required to provide evidence of reliability of some past event. There are different methods of capturing the events in the form of video recording. Nevertheless, as techniques keep improving, video recording forgery becomes more simple.
Method of evidence reliability provision, implemented as follows. Video recording the object is captured, video file is created at the given parameters of modulated lighting. Matching of the given parameters of modulated lighting of the analysed video-file is performed. Whereby, video recording is initiated after either starting up modulation code generation process, or using the last records available in the blockchain, or by generation of pseudorandom code upon entering this modulation code into blockchain. For this purpose, request is created based on the user account data, such as date, time, device data stored in the device. Light source modulation code, unique for the given request, is generated. This modulation code is entered into the blockchain. After that, the resulting modulation code is converted into a control modulating signal, which is transmitted to the light source. Then, depending on the received modulating signal, the object is illuminated, and light intensity varies as per the modulating signal. Simultaneously, video stream is recorded for the given time interval. Then, hash function of the resulting video-file is computed, and hash video is recorded to the blockchain, and the modulation code, modulation code record ID, video file, hash video, hash video record ID, and data block ID is saved in the user device storage unit and in the external storage. External user is granted with access to corresponding entries of the user device storage unit, the entries of the external storage, and the entries of the blockchain data block in order to match the data entered into the blockchain and the data received from the user, in particular, modulation code, video file, hash video, hash video record ID, for matching with the data stored in the blockchain, and analysis of the modulation code used for video-file recoding. Afterwards, the system identifies the time interval between the entries in the blockchain data block containing modulation code and hash video. Based on this interval, the system calculates the time interval during which the considered video has been captured and, respectively, reliability of the event recorded in this videofile is evaluated.
Evidence Reliability Validation Device comprises the following components: user computing device 1 , light source 2, video camera 3, blockchain server (node) 4, external storage 5. User computing device 1 comprises the following components: request generation unit 7, user account unit 8, request transmission unit 9, hash function computing unit 10, data recording unit 11 , modulation code conversion unit 12, light source control unit 13, video signal recording unit 14, video camera control unit 15, data generation and processing unit 16, user device storage unit 17.
In turn, user device storage unit 17 comprises the following components: modulation code 20, modulation code record ID 28, video file 21 , hash video 19, hash video record ID 18, data block ID 22.
Blockchain server (node) 4 comprises the following components: decentralized application unit 23, and blockchain data blocks 6. In turn, decentralized application unit 23 comprises the following components: record request processing unit 24, modulation code generation unit 25, modulation code recording unit 26, hash video recording unit 27.
External storage 5 comprises the following components: modulation code 20, modulation code record ID 28, video file 21 , hash video 19, hash video record ID 18, data block ID 22.
Evidence Reliability Validation Device is implemented as
follows.
1. User 29 initiates video recording process by starting up request generation unit 7. 2. Request generation unit 7 requests data from user account unit 8 of user 29. Based on the account data of user 29, received from user account unit 8, and the system data of user computing device 1 (including date, time, device data and other data stored in the device), request generation unit 7 generates the request data, for example, formatted as data strings, and transmits the request data to request transmission unit 9.
3. In order to generate modulation code 20, request transmission unit 9 connects to any of blockchain servers (nodes) 4. Otherwise, it initiates execution of record request processing unit 24 of decentralized application 23 (where the Etherium Platform is used as a blockchain, for example, and smart contract of the Etherium Platform is used as decentralized application 23). Otherwise, it uses the data of blockchain server (node) 4, and for this purpose request transmission unit 9 reads data of the last entries stored in blockchain data blocks 6 from blockchain server (node) 4, for example, this can be hash of the last block or hash of the last transactions, in the form of pseudorandom numbers. In this case, data of the last entries stored in blockchain data blocks 6 are used as modulation code 20, and the record IDs, which were used as modulation code 20 of data of the last entries stored in blockchain data blocks 6, are used as modulation code record ID 28.
4. Record request processing unit 24 transmits the request data to modulation code generation unit 25. 5. Based on the request data received and using pseudorandom data (data from blockchain data blocks 6, including hash of the last block or hash of the last transactions, can be used), modulation code generation unit 25 generates modulation code 20, which is unique for the given request. For example, hash function calculated for the request data and blockchain data blocks 6 can be used as the above code. Computed modulation code 20 is transmitted to record request processing unit 24 for forwarding back to request transmission unit 9, also it is transmitted to modulation code recording unit 26.
6. Record request processing unit 26 records modulation code 20 to blockchain data block 6 and returns modulation code record ID 28 to record request processing unit 24 for forwarding back to request transmission unit 9. 7. Record request processing unit 24 transmits the received modulation code 20 and modulation code record ID 28 into request transmission unit 9.
8. Request transmission unit 9 sends the received modulation code 20 into modulation code conversion unit 12, and modulation code record ID 28 and modulation code 20 are sent into data generation and processing unit 16. Simultaneously, request transmission unit 9 starts up video signal recording unit 14.
9. Modulation code conversion unit 12 converts the received modulation code 20 into control modulating signal which is typical for the given type of user computing device 1. Modulating signal is transmitted to light source control unit 13.
10. Light source control unit 13 controls intensity of light source 2 in accordance with the modulating signal received. 11. Light source 2 illuminates object 30 and changes light intensity in accordance with the modulating signal.
12. Video camera 3 performs video recording of object 30 which is exposed to modulated light source 2.
13. Video signal recording unit 14 starts video recording by switching on video camera control unit 15.
14. Video is recorded until user 29 sends command to stop the recording. Upon receipt of the command, video recording is stopped, and video signal recording unit 14 transmits stop command to modulation code conversion unit 12. Recorded video file 21 is transmitted to hash function computing unit 11 and data generation and processing unit 16.
15. In case of lengthy video recording, which is longer than duration of modulation code 20, modulation code conversion unit 12 sends request to request transmission unit 9 to receive additional modulation code featuring the same request parameters.
16. Hash function computing unit 10 computes hash function which is related to video file 21. For example, the standard SHA-256 can be used for computation of hash function. Resulting value of hash video 19 is transmitted to data recording unit 11.
17. Data recording unit 11 sends hash video 19 to hash video recording unit 27 of decentralized application unit 23. Recording of hash video to blockchain data blocks 6 can be made without the use of decentralized application unit 23.
18. Hash video recording unit 27 records the received hash video 19 to blockchain data block 6 and returns hash video record ID 18 (as recorded to blockchain data block 6) into data recording unit 11.
19. Data recording unit 11 sends hash-video record ID 18 into data generation and processing unit 16.
20. Data generation and processing unit 16 records data, which contain modulation code 20, modulation code record ID 28, video file 21 , hash video 19, hash video record ID 18, and data block ID 22 enabling the search for the entries required, to user device storage unit 17 and/or external storage 5.
21. To enable data verification by a third party (external user 31 ), user 29 provides external user 31 with access to corresponding entries of user device storage unit 17 and/or entries of external storage 5 using data generation and processing unit 16, or provides external user 31 with the abovementioned information by any other means.
22. External user 31 checks the availability of modulation code 20 in blockchain data blocks 6 by searching within blockchain data blocks 6 as per modulation code record ID 28, and availability of hash video recording 19 as per hash video record ID 18.
23. External user 31 computes hash function related to the data of video file 21 and compares results with hash video 19 which is stored in blockchain data blocks 6.
24. If required, the external user can analyse video 21 and extract the light source modulation code. The received modulation code is compared to modulation code 20. 25. If the modulation code obtained by external user 31 after analysis of video file 21 and the computed hash video match the data stored in blockchain data blocks 6, external user 31 can be sure that the event captured by video 21 has occurred within time interval limited by the time marks of recording of modulation code 20 and recording of hash video 18 in blockchain data blocks 6.
Example of the claimed method of validation of evidence
reliability.
1. Any smartphone with OS Android or iOS, with video camera and flash light, for example, Samsung Galaxy S7 SM-
G930FZKUSER, can be used as user computing device 1.
2. Units of the mobile application SilentNotary for Android 4.1 and above can be used as request generation unit 7, user account unit 8, request transmission unit 9, hash function computing unit 10, data recording unit 11 , modulation code conversion unit 12, video signal recording unit 14, data generation and processing unit 16, user device storage unit 17.
3. For example, Standard SHA-256 can be used for computation of hash-function. 4. Service SilentNotary.io, which is using Google cloud storage (https://cloud.google.com), can be used as the external storage.
5. Any server (node) on the Etherium platform (Ethereum.org) can be used as blockchain server (node) 4. Smart contract on the Etherium platform, which is coded using Solidity language, for example, can be used as decentralized application unit 23. Ethereum blockchain blocks can be used as blockchain data blocks 6.
6. To implement independent access to blockchain data blocks 6, external user 31 can use any public system for reading the blockchain data block, for example, the system etherscan.io can be used for Ethereum platform.
7. In addition to blockchain, other distributed ledger technologies can be used, which will ensure the invariability of the entries made and a reliable and trusted timestamp.
All the above, including the example, confirm that the formulated task (validation of the fact that the given events have been captured within the given time interval, and are valid), is solved and industrial applicability of the evidence reliability validation method has been confirmed, as well as the associated devices and operating techniques are applicable and valid.
List of Positions
1. User computing device
2. Light source
3. Video camera
4. Blockchain (node) server
5. External storage
6. Blockchain data blocks
7. Request generation unit
8. User account unit
9. Request transmission unit
10. Hash function computation unit
11. Data recording unit
12. Modulation code conversion unit
13. Light source control unit
14. Video signal recording unit
15. Video camera control unit
16. Data generation and processing unit
17. User device storage unit
18. Hash video record ID
19. Hash video
20. Modulation code
21. Video file 22. Data block ID
23. Decentralized application unit
24. Record request processing unit
25. Modulation code generation unit
26. Modulation code recording unit
27. Hash video recording unit
28. Modulation code record ID
29. User
30. Object
31. External user

Claims

Methods of validation of evidence reliability by video recording of an object with subsequent creation of video file using the preset parameters of modulated lighting and further matching of the preset parameters of modulation of light source with the parameters of modulated lighting of the video file being analysed, wherein, video recording is initiated after either starting up modulation code generation process, or by using the last records available in the blockchain, or by generation of pseudorandom code upon entering this modulation code into blockchain. For this purpose, request is created based on the user account data, such as date, time, device data stored in the device. Light source modulation code, which is unique for the given request, is generated. This modulation code is entered into the blockchain. After that, the resulting modulation code is converted into a control modulating signal, which is transmitted to the light source. Then, depending on the received modulating signal, the object is exposed to light, and light intensity changes in accordance with modulating signal. Simultaneously, video stream is recorded for the given time interval. Then, hash function of the resulting video file is computed, and hash video is recorded to the blockchain, and modulation code, modulation code record ID, video file, hash video, hash video record ID, and data block ID are saved in the user device storage unit and in the external storage. External user is provided with access to corresponding entries of the user device storage unit, entries of the external storage, and entries of the blockchain data block in order to match the data entered into the blockchain and the data received from the user, in particular, modulation code, modulation code record ID, video file, hash video, hash video record ID, for matching with the data stored in the blockchain, and for analysis of the modulation code used for video file recoding. Afterwards, the system identifies the time interval between the entries in the blockchain data block containing modulation code and hash video. Based on this interval, the system calculates the time interval during which the considered video has been captured and, respectively, reliability of the event, which was recorded in this video file, is evaluated.
2. Device, which is used for implementation of the method claimed in clause 1 , is implemented as follows. The device comprises of user computing device, light source, video camera, blockchain servers, external storage, and blockchain. Whereby, the user computing device contains request generation unit, user account unit, request transmission unit, hash function computation unit, data recording unit, modulation code conversion unit, light source control unit, video signal recording unit, video camera control unit, data generating and processing unit, user device storage unit. Blockchain server contains blockchain data blocks and decentralized application unit comprising record request processing unit, modulation code generating unit, modulation code recording unit, hash video recording unit. Blockchain data block contains modulation code, modulation code record ID, hash video, hash video record ID. Whereby, the user device storage unit and external storage contain modulation code, modulation code record ID, hash video, hash video record ID, and data block ID.
3. Method of operation of the present Evidence Reliability Validation Device, claimed in clauses 1 and 2, is implemented as follows. Video recording is initiated by starting up the request generation unit. It requests data of the user account unit. Request data are generated based on the data received from the account unit and the system data provided by the user computing device, such as date, time, device data and data stored in the device. Those data are sent to the request transmission unit. This unit connects to any of the blockchain serves (nodes) by starting up the decentralized application unit. Whereby, the record request processing unit sends request data to the modulation code generation unit of the decentralized application. Based on modulation code and the received request data, the latter unit generates the unique modulation code for the request provided. The generated modulation code is transmitted to the record request processing unit for forwarding the code back to the request transmission unit. Then the code is transmitted to the modulation code recording unit of the decentralized application. This unit records the modulation code to the blockchain data blocks and returns the entry code of the modulation code to the record request processing unit for forwarding it back to the request transmission unit. Whereby, the record request processing unit transmits the received modulation code and modulation code record ID to the request transmission unit. Otherwise, the last entries of blockchain data blocks are used as the modulation code, and the entry codes of the last entries in blockchain data blocks are used as the modulation code record ID. For this purpose the request transmission unit reads the required data by connecting to any of the blockchain servers. In turn, the request transmission unit transmits the received modulation code to the data generation and processing unit and video signal recording unit. Simultaneously, the signal video recording unit is started up. Whereby, the modulation code conversion unit converts the received modulation code into control modulating signal which is typical for the given type of the user device. Modulating signal is transmitted to the light source control unit. Light source control unit controls intensity of light emitted by the light source in accordance with the modulating signal received. Light source illuminates the object by light of varying intensity in accordance with the modulating signal. Simultaneously, the video camera captures the object illuminated by the modulated light source. Video recording unit, upon receiving the modulation code, starts recording video data by starting up the video camera control unit. Whereby, video is recorded within the time interval set up by the user. Afterwards, video recording is stopped, lighting modulation is stopped, and the recorded video file is transmitted to the hash function computation unit and data generation and processing unit. Hash function computation unit computes the value of hash function related to the video file. The computed hash function is transmitted to the data recording unit and data generation and processing unit. Data recording unit transmits hash video to the hash video recording unit of the decentralized application unit. Otherwise, hash video is recorded to the blockchain data block without using the decentralized application. Hash video recording unit records hash video to the blockchain data block, and returns the hash video code into the data recording unit. Data recording unit transmits the hash video record ID into the data generation and processing unit. The latter records the data containing the modulation code, modulation code record ID, video file, hash video, hash video record ID, as well as the data block ID, which enables the search for any required entries in the user device storage unit or in the external unit. Whereby, to enable the external user to validate the data, the data generation and processing unit of the user device provides the external user with access to corresponding entries of the user device storage unit or the external storage, or the abovementioned data are transmitted to the external user by any means available. Afterwards, the external user checks if the modulation code entry is available in the blockchain. Whereby, the system performs the search as per modulation code record ID and hash video record ID by searching in accordance with the hash video record ID. The external user computes hash function related to the video file data and matches the results with the hash video available in the blockchain data block. Using the given video file, the system analyses and identifies the light source modulation code. The resulting modulation code is compared to the modulation code stored in the blockchain data blocks. If the resulting modulation code and the computed hash-video matches the data recorded to the blockchain data block, it is proved that the considered event recorded in the video has taken place within time interval between the time marks associated with recording of the modulation code and recording of the hash video stored in the blockchain data blocks.
PCT/RU2018/000192 2017-12-20 2018-03-26 Method for provision of evidence reliability, device for its implementation and device operation concept WO2019125203A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
RU2017144897A RU2684513C1 (en) 2017-12-20 2017-12-20 Method for prove reliability of evidence and device for implementation thereof, method of this device operation
RU2017144897 2017-12-20

Publications (1)

Publication Number Publication Date
WO2019125203A1 true WO2019125203A1 (en) 2019-06-27

Family

ID=66089755

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/RU2018/000192 WO2019125203A1 (en) 2017-12-20 2018-03-26 Method for provision of evidence reliability, device for its implementation and device operation concept

Country Status (2)

Country Link
RU (1) RU2684513C1 (en)
WO (1) WO2019125203A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111242625B (en) * 2020-02-26 2023-06-20 恬家(上海)信息科技有限公司 Skin block, skin chain network and realization method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130219480A1 (en) * 2012-02-21 2013-08-22 Andrew Bud Online Pseudonym Verification and Identity Validation
US20160283920A1 (en) * 2015-03-28 2016-09-29 Justin Fisher Authentication and verification of digital data utilizing blockchain technology
RU2015145232A (en) * 2015-10-21 2017-05-03 Дмитрий Сергеевич Ермолаев METHOD FOR ACCOUNTING AND STORAGE OF TEMPORARY ACCOUNTING UNITS IN SINGLE-LEVEL BLOCKCHAIN MEDIA
US20170161304A1 (en) * 2014-06-24 2017-06-08 Snell Advanced Media Limited Hash-based media search

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130219480A1 (en) * 2012-02-21 2013-08-22 Andrew Bud Online Pseudonym Verification and Identity Validation
US20170161304A1 (en) * 2014-06-24 2017-06-08 Snell Advanced Media Limited Hash-based media search
US20160283920A1 (en) * 2015-03-28 2016-09-29 Justin Fisher Authentication and verification of digital data utilizing blockchain technology
RU2015145232A (en) * 2015-10-21 2017-05-03 Дмитрий Сергеевич Ермолаев METHOD FOR ACCOUNTING AND STORAGE OF TEMPORARY ACCOUNTING UNITS IN SINGLE-LEVEL BLOCKCHAIN MEDIA

Also Published As

Publication number Publication date
RU2684513C1 (en) 2019-04-09

Similar Documents

Publication Publication Date Title
US10680808B2 (en) 1:N biometric authentication, encryption, signature system
US10135818B2 (en) User biological feature authentication method and system
KR102139548B1 (en) System and method for decentralized identifier based on face recognition
US11190355B2 (en) Secure biometric authentication using electronic identity
JP5260504B2 (en) Verification engine, method, data processing system (validation engine)
TWI701934B (en) Method and device for verifying availability of biometric image
ZA200501202B (en) Trusted biometric device
RU2016148406A (en) CHECKING IMAGES CAPTURED USING A TEMPORARY LABEL DECODED FROM LIGHTING FROM A MODULATED LIGHT SOURCE
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
KR102079952B1 (en) Method of managing access using face recognition and apparatus using the same
CN111815842A (en) Health information uplink method and device, storage medium and electronic device
US20200293760A1 (en) Multi-modal identity recognition
WO2023049695A1 (en) Systems and methods for tracking chain of custody of body worn cameras
WO2019125203A1 (en) Method for provision of evidence reliability, device for its implementation and device operation concept
JP2019095872A (en) Search system, search device, terminal device, search method, and program
JP2018129750A (en) Image monitoring system
CN107680218B (en) Security inspection method and system based on multi-biometric feature recognition and instant license technology
KR102187545B1 (en) Document management apparatus for providing secure document through user authentication based on face recognition and operating method thereof
US11496469B2 (en) Apparatus and method for registering biometric information, apparatus and method for biometric authentication
CN111339829B (en) User identity authentication method, device, computer equipment and storage medium
US20210160287A1 (en) Security audit and notification processing
CN112784285A (en) Evidence obtaining system
KR102486585B1 (en) Method for Verifying User Credentials in Network, and Service Providing Server Used Therein
KR102399524B1 (en) System and method for collectin, depositing and managing personal identification information
JP7511847B2 (en) Biometric Public Key System Providing Revocable Certificates

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18892690

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/10/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18892690

Country of ref document: EP

Kind code of ref document: A1