This invention is related in general to information transmission systems and, more particularly, to an information transmission system that is operable to be stored at a remote location as a secure file in a trusted environment.
With the popularity of wireless “digital” computing devices, such as, Personal Digital Assistants (PDA's) cell phones, cameras, video, audio recorders and other digital recorders, users have been afforded the ability to record and transmit digital media within seconds.
With the advent of digital media, it has become increasingly easy to copy, counterfeit, falsify and misuse digital information of all kinds. This includes digital photographs, video & audio recordings of speech or musical performances, motion pictures and recordings of physical phenomena, such as meter readings or “black box” records. This digital media can be altered in ways that defy detection, audio recordings can be compressed and anonymously offered to the public with impunity, and time and date stamps on any of the media just listed can be easily changed with freely available tools.
An attendant problem is that of secure storage. While a flash memory card within these digital recording devices (in any of its currently popular forms) can hold hundreds of pictures, images, video and audio, the problem with securely storing, indexing and retrieving thousands of media files has still not been solved. When the works of intellectual property (music, software, images and movies, to name a few) are much more valuable than the equipment on which they reside, the temptation for theft and alteration becomes great.
Furthermore, this invention provides for the secure non-repudiation by embedding Certificate Authorities non-repudiation Digital Certificates of the digital files for forensic or other evidentiary purposes that are sent and received across the transmission networks.
This works for any kind of media file—photographs, images, music, audio spoken word, video, physical phenomena—anything. Obvious applications range from taking a photograph, video clip to “black boxes” embedded in transportation facilities. Following an incident, information could be transmitted using the above schemes to a storage facility. Only authorized personnel could then retrieve the encrypted messages and return the data to cleartext form.
The present invention disclosed and claimed herein, in one aspect thereof, comprises an apparatus for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from a first source. A processor is provided for associating with the captured information the date and time of the capture of the information, such that the date and time information in association with the captured information forms augmented captured information. The processor is provided for placing the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings in which:
Referring now to
Once the captured image 108 is formed and temporarily stored, it then goes to the next step of the operation. In this step of the operation, a process block 112 is provided to obtain local certification. Local certification, in this example, is some certification that is viewed as providing information in such a manner that there is a high level of confidence in that information which is to be associated with the image as an integral part thereof and will, as described herein below, follow the image. For example, the information that is obtained will be time and date information and longitude and latitude information that is received from a GPS system (global positioning system), a conventional system. The time information, the date information and the longitude and latitude information are provided in such a manner that, when associated with the capture file 108, this provides some current validation that the file was created at that particular time and, at a later time, it could be identified by the fact that it has that information associated therewith. For example, a user could make a log, either printed or electronic of the image captured and, at a later time, by merely knowing what the time and data information was and the longitude and latitude information was, this would provide a higher degree of confidence that the later viewed file and the original captured file was the same and had not been tampered with or had not been reproduced at a later time and location.
In order to provide this verification, the trusted entity is the GPS system, since this is a system that provides a time stamp and a longitude and latitude from the calibrated system. If this is implemented in such a manner that it is an integral part of the capture operation, i.e., it is integrated into the phone, for example, then a high degree of confidence is maintained that this was obtained basically at the time the capture was complete. The GPS system, as noted herein above, is a conventional system that utilizes a GPS receiver 114 that has an antenna 116 that is operable to receive information from a plurality of satellites 118. Typically, there can be anywhere from three to ten or more satellites from which information can be received to obtain an accurate location. Alternate techniques for recovering time, date and position information includes differential and Doppler analysis of very precise timing signals coming from a plurality of cellular/PCS base stations. A third technique for recovering time, date and position information includes retrieving information directly from the Mobility Management (MM) sub layer of the cellular protocol, where the mobile telephone service provider is a party to the transactions. Finally, another technique of retrieving accurate time and date information include use of a network time server.
The result of the local certification is a locally certified captured image 120 which is illustrated with the image and a time stamp, “TS,” disposed on the edge thereof, this location by way of example only, as other methods of disposing this information are described herein below. This “TS” indicates that there is some information that is “embedded” into the captured file or captured image that is now part of the file. For example, as will be described in more detail herein below, there is a science of embedding information referred to as “Steganography” that allows information to be embedded in some expression of intellectual property (a photograph, a musical recording, or other expression), such that (a) the information is hidden from casual observers and (b) the information is not easily altered or destroyed. One such type is a “water mark” that basically is disposed in the background of a document, for example. In images, there are encoding techniques such as “glifs” that can be disposed in the image which is an optical type encoding that appears as a random background to a viewer, but actually contains digitized information. The result is that the document, file image, etc., is indelibly marked with the date, the time and the location, in addition to associating therewith information about the user in the form of a user ID, which is provided in a user ID block 122. The local certification block 112, therefore, is operable to merge the captured file 108, the GPS information as to time stamp and location and the user information into the single document 120. At this point, the document 120 is still a “clear” document such that it can be viewed by any individual. The image 120 is stored in a temporary image buffer 121.
After the document 120 has been created with the local certification, the system then compresses the file using any of a number of well-known methods. In the case of an image, the compression technique may be a lossy algorithm such as JPEG or (in the case of motion pictures) MPEG, or for a data set, the compression technique may be a lossless method such as Lempel-Ziv-Welch.
After compression, the file 120 is processed through an encryption operation wherein the file is first encrypted in accordance with predetermined encryption algorithms, this being performed in a block 124. The encryption, as will be described herein below, is a double encryption operation which wraps the local certified captured file with a first level of encryption 126 and a second level of encryption 128 to provide an encrypted document 130. This is then stored in a temporary storage buffer 132. The file 130 is then subjected to a non-repudiation certification process to acquire a Certificate of Authenticity (CA) from a certification authority 135, this certification authority 135 being a trusted third party that can “digitally sign” a file, image, etc. and provide a level of authenticity to that file. This is conventional technology. The document 130, in its encrypted form, is converted to a “hash” file and this hash file, which is a representation of the encrypted file, is sent to the certification authority 135 via a transmitter and antenna 136 along a wireless path, and received by an antenna 137 at the certification authority 135 location. Again, this is a wireless operation. The hash file is then signed and a combination hash file and certificate of authenticity is then sent back to the antenna 136 which is then stored in a temporary memory 133 as a certified document. This is illustrated with the attached certification authority certificate 139. This is the file that is sent to the secure storage facility, this being a file 130′.
After encryption, certification by the CA and compression, the encrypted file is then passed to the transmitter 134 for transmission via the antenna 136 along a wireless path to a secure storage facility 138 having a receiving antenna 140 associated therewith. The secure storage facility 138 is a repository. In one embodiment, this repository 138 does nothing more than to store the image 130 in a large database 142 for access at a later time. Additionally, the secure storage facility 138 could be a trusted storage facility, which trusted storage facility has the ability to “unwrap” the encryption from the document 120 such that it can transmit the document 120 at a later time upon request. Alternatively, the secure storage facility 138 could merely be a place to store the information with secure measures as to restricting access to only authorized individuals. In that scenario, the secure storage facility 138 would not be able to decrypt the image 130 and would merely be able to transfer the image to the individual or entity authorized to access that information.
For access, a remote access site 144 is operable to send requests to the secure storage facility 138, identify themselves with the appropriate passwords to comply with the security procedures of the secure storage facility 138 and then have the image requested sent thereto. This image can then be stored in a memory 146 and decrypted with a decryption algorithm in a block 148 for storage of the decrypted file 120 in a storage space 150. This can then be extracted by a user for whatever purpose. In general, all of the encryption ensures that there has been no “tampering” with the file before it is decrypted. Once decrypted, then the time date stamp and location information, in addition to the user information, is still embedded in the picture, document, audio file, etc. that makes up the captured file to show that there was some local indelible certification that verifies the captured file as being authentic and which was embedded at the time of creation.
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
After encryption in the “first layer,” the program then flows to function block 806 to create the first ciphertext file. This first ciphertext file is then processed with an asymmetrical encryption algorithm, as indicated by a function block 808 to further encrypt or protect the captured file. The second general type of cryptosystem is asymmetrical encryption. This encryption scheme uses mathematical functions called one-way or trapdoor functions that are easy to perform but extremely difficult to reverse. Examples of these one-way functions are factoring large composite numbers (two large numbers are easy to multiply, but finding the two large numbers given the product alone is difficult) and the discrete logarithm problem (raising a number to a power modulo some value is easy, but finding the number given the result is difficult). In an asymmetrical cryptosystem, one key (referred to as the public key) is used to encrypt the plaintext and a second, related key (called the private key) is used to decrypt the ciphertext. In a public-key encryption scheme, it is common to publish the public key. In this way, anyone can send a secure message, but only the holder of the private key can decrypt the message and reveal the plaintext.
Asymmetrical cryptosystems have another use as well: by encrypting a file under his or her private key, a party can prove that he or she is the author of the message. If others can decrypt the file using the associated public key, then nobody but the holder of the private key could have created the message. This leads to properties favorable to the present invention: proof of ownership and non-repudiation. The result of the asymmetrical encryption step will be the creation of the second ciphertext file as an encrypted stamped and certified captured file, as indicated by function block 810. The program then proceeds to a Return block 812.
To illustrate how the system of the present disclosure operates, one example of an application of the capture device 102—a wireless digital camera—will be described.
The user takes a picture, video, audio, or acquires any other data set, or any combination of these. The apparatus then sends a request to a certificate authority to obtain a certification of the time and date of the recording. This certificate, as well as time, date and location information obtained from the GPS receiver or other techniques for determining this information, as well as an identifying number unique to the wireless digital video camera, is steganographically encoded onto the image and/or audio files.
The image is now marked, but it is still “in the clear.” That is, anyone who gains access to the image file will be able to reproduce the image. It must now be secured so that unauthorized parties cannot view the image.
After compression, the next step is to encrypt the file in such a way that the file cannot be used without access to a secret key.
Once the image file has been indelibly marked and compressed, and it is about to be encrypted using a symmetrical cryptosystem, a decision must be made as to what key to use. There are several methods of establishing a key. The first is to have a single, fixed key assigned to the wireless digital recorder (i.e. camera) at the factory. The problem with this method is that if this key becomes compromised, then all images taken by the wireless digital recorder (i.e. camera) are compromised. A second method is to create a new, random key each time a photograph is taken, and store the table of keys in the wireless digital recorder (i.e. camera) for subsequent download. This, although feasible, may be undesirable for the same reason that storing the images themselves in the wireless digital recorder (i.e. camera) is undesirable: memory in the wireless digital recorder (i.e. camera) is fragile, and if the keys are lost, the images are useless.
Instead, a preferred method of key management is used. In this scheme, the serial number of the wireless digital recorder (i.e. camera) and other pertinent information that can be recovered without recovering the file (like the filename, the time and date, etc.) are securely hashed. Hashing refers to a practice of creating a short dataset that represents a larger dataset. For example, if one were to assign all the letters in a document a number (A=1, B=2, etc.), add those numbers together modulo 26, one would come up with a single number between 0 and 25. If any letter in the document changed, the result of the function would change as well, and thus could be used as an indication that the document had changed. In a way, the short dataset (the modulo sum) would stand in for the larger dataset (the document). Note that the short dataset cannot be used to reproduce the document, but that changing the document in a way that doesn't affect the modulo sum is difficult.
Hashing works in just this way, but with much larger numbers. In the disclosed system, the serial number is hashed with other information to create a key. If the key is compromised (by technical or legal means) then no other photograph taken by the wireless digital recorder (i.e. camera) is compromised. It is impossible—not just difficult—to go from the hashed key to the source material, in the same way it is impossible to deduce this document from one modulo sum character.
Now the file is encrypted, and only the holder of the secret key can unlock the file. Two more steps remain before the file is transmitted to the secure storage facility. First, the entire encrypted file is passed through a message authentication algorithm, which produces a hash (similar to the way the symmetrical encryption key was calculated, above) over the whole file. In this way, if any byte of the message file is corrupted in transmission, it will be discovered. The file is then encrypted using an asymmetrical cryptosystem under the user's private key, effectively signing the file.
Finally, identifying information is added to the (now doubly) encrypted file, and the file is encrypted again—this time, under the storage facility's public key. Now, observe the properties of the file thus created:
Should it become necessary to prove the authenticity of the photograph, the storage facility 138 can testify to all the above facts. Additionally, the originator of the photograph is the only one who can unlock the inner wrapper and produce the photograph. Finally, the photograph itself is steganographically marked, and this final information is clinching proof that the provenance of the photograph is accurate.
To return to the example wherein the picture is ready for transmission at this point, the wireless digital recorder (i.e. camera) attempts to connect to the server at the secure storage facility 138 or other recipients who have access the network (i.e. PDA's, other wireless digital devices) using any of a number of well-known wireless methods. Among these are data channels associated with IS-95 CDMA, IS-136 TDMA, CDPD, GSM as well as purely data paths such as 802.11b. The exact mechanism of data transmission is not germane.
However the data is transmitted, the storage facility 138 receives the triply-encrypted data file and performs the following steps:
The user can also transmit these files over various networks to other recipients (PDA's, cell camera phones, “IP Addresses, E-mail to name a few) for their review and storage. However the users' unique identity and other certificates described in this document are embedded within the file(s).
The wireless digital recorder (i.e. camera), upon receipt of the certificate, transmits an acknowledgment and removes the photograph from its temporary store. The certificate can be stored or discarded—it is not required to retrieve the photograph. If stored, it becomes further evidence of the provenance of the photograph.
Image retrieval from the storage facility 138 is simple. At login, the storage facility presents a random string encrypted under the user's public key. The user must decrypt the string and re-encrypt it under the storage facility's public key. Only the holder of the secret key can do this and it proves beyond doubt to the storage facility that they are communicating with the owner of the photograph.
Once identity is established, the user can download any file from the storage facility. Once downloaded, the user can open the final wrapper and extract the image.
Again, this works for any kind of media file—photographs, images, music, audio spoken word, video, physical phenomena—anything. An obvious application would be in “black boxes” embedded in transportation facilities. Following an accident, information could be transmitted using the above schemes to a storage facility. Only authorized personnel could then retrieve the encrypted messages and return the data to cleartext form.
Some of the features provided by the system of the present disclosure are as follow:
With the disclosed system, this provides for a method of storing, cataloging, viewing, playback and printing of images, video, audio and photographs change as well. Instead of relying on photo finishers, anyone with an inexpensive printer can reproduce images, anyone with a CD reader/writer can reproduce audio, and anyone with a DVD player/recorder can reproduce both images and audio.
Additionally, instead of a fireproof safe, image, video, audio and photograph storage involves digital media. And, instead of couriers and the mail, transmitting images, video, audio and photographs from one place to another is likely to involve the Internet.
This new world of opportunities has its problems as well. Once images, video, audio and photographs are in the digital domain, there are opportunities to modify these so that it no longer represents the events that actually occurred. Digital cameras or other digital recorders at the time of this submission, typically include a clock of dubious accuracy that can, in any event, be set back or forward to make it seem as though an event occurred at a time other than the actual time of the event. And the metadata—the time, date, and location of the images, video, audio and photographs—is not stored using any secure method. Anyone knowledgeable in the field can modify the metadata to make the images, video, audio and photographs appear that it was taken at a time and place other than the real time and place.
Another problem solved with the system of the present disclosure is that of storage. For many users (photographers, musicians, forensic, video/audio personnel, governmental, military personnel, public service, professional and non professional personnel and others) the value of the images, video, audio and photographs taken far exceeds the value of the equipment used to take them. For these users, it is important that the images, video, audio and photographs themselves be transported to a secure location at the earliest possible opportunity. Digital recording devices (i.e. digital cameras and other digital recording devices) rely on memory cards that contain non-volatile solid-state memory that, while robust for a solid-state device, is easily damaged by mechanical shock or static electricity. Unlike film, in which a defect may only cause a minor blemish in the image, a single defect in the memory card of a digital recording device may be enough to render all the information on the card useless.
It is noted that the images, video, audio and photographs not be disclosed to an unauthorized third party. While traditional analog film images, video and audio recordings can be physically locked into a secure facility, digital images, audio, and video reside on computers. These computers can be the subjects of network attacks and information on them can be compromised in two ways. First, a knowledgeable opponent can read information from an internet-connected computer—that is, an opponent can view images, video, audio and photographs he or she is unauthorized to view. Second, a knowledgeable opponent can obtain write permission and modify the images, video, audio and photographs in a way that is difficult to detect.
Finally, the user is provided the ability to attach, mix, and modify media files easily and indelibly mark each image, video, audio, photograph or media file as his or her own work, to eliminate the possibility of plagiarism and to provide a certificate authority while wirelessly transmitting said media files for secure storage or to another recipient or source.
In the days of film cameras (analog), security usually meant placing the negatives into a photo safe. Prints made from the negatives could be marked with an identifier that clearly indicated the pedigree of the photograph. Those who would use the photograph without permission of the owner would be subject to a copyright infringement suit—and it would be sufficient evidence in court for the user to produce the negatives and testifies that, in fact, he or she took the photographs.
With the advent of digital media and the proliferation of the Internet, images, video, audio, photographs and other forms of digital documents stored on digital computers are no longer secure.
This invention addresses all of these concerns. It provides a mechanism for recording, attaching, mixing, appending to, modifying images, video, audio and photographs, marking the images, video, audio and photographs indelibly with a provable time, date, location and identity of the individual taking the images, video, audio and photographs. It then provides a means to transport the images, video, audio and photographs to a secure, off-site storage facility and to obtain positive confirmation that the transmission occurred error-free. It provides a method for securely rendering the image, video, and audio and photograph useless to anyone but the original user. Finally, it provides the ability to demonstrate, with legal certainty, that the image, video, audio and photograph was taken at the location and at the time indicated, and that the image or audio file has not been altered, as well as, tracks ongoing changes made by the originator or other user identities within the original file.
Although the preferred embodiment has been described in detail, it should be understood that various changes, substitutions and alterations can be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
This application is a continuation of U.S. patent application Ser. No. 14/175,331, filed Feb. 7, 2014, and entitled APPARATUS AND METHOD FOR EMBEDDING SEARCHABLE INFORMATION, ENCRYPTION, TRANSMISSION, STORAGE AND RETRIEVAL, published as U.S. Patent Application Publication No. US/2014/0153721, now U.S. Pat. No. 9,159,113, which application is a continuation of U.S. patent application Ser. No. 13/306,732, filed Nov. 29, 2011, and entitled APPARATUS AND METHOD FOR EMBEDDING SEARCHABLE INFORMATION INTO A FILE, ENCRYPTION, TRANSMISSION, STORAGE AND RETRIEVAL, published as U.S. Patent Application Publication No. US/2012/0071133, now U.S. Pat. No. 8,687,841, which application Ser. No. 13/306,732 is a continuation of U.S. patent application Ser. No. 12/857,731, filed Aug. 17, 2010, and entitled APPARATUS AND METHOD FOR EMBEDDING SEARCHABLE INFORMATION INTO A FILE FOR TRANSMISSION, STORAGE AND RETRIEVAL, published as U.S. Patent Application Publication No. US 2010/0310071, now U.S. Pat. No. 8,068,638, which application Ser. No. 12/857,731 is a continuation of U.S. patent application Ser. No. 11/679,533, filed Feb. 27, 2007, and entitled APPARATUS AND METHOD FOR EMBEDDING SEARCHABLE INFORMATION INTO A FILE FOR TRANSMISSION, STORAGE AND RETRIEVAL, published as U.S. Patent Application Publication No. US 2007/0201721, now U.S. Pat. No. 7,778,440, which application Ser. No. 11/679,533 is a continuation of U.S. patent application Ser. No. 11/325,373, filed Jan. 4, 2006, and entitled APPARATUS FOR CAPTURING INFORMATION AS A FILE AND ENHANCING THE FILE WITH EMBEDDED INFORMATION, published as U.S. Patent Application Publication No. US 2006/0115111, now U.S. Pat. No. 7,184,573, which application Ser. No. 11/325,373 is a continuation of U.S. patent application Ser. No. 10/674,910, filed Sep. 29, 2003, and entitled FORENSIC COMMUNICATION APPARATUS AND METHOD, published as U.S. Patent Application Publication No. US 2004/0125208, now U.S. Pat. No. 6,996,251, which application Ser. No. 10/674,910 claims the benefit of U.S. Provisional Application No. 60/414,449, filed Sep. 30, 2002, and entitled FORENSIC COMMUNICATION APPARATUS AND METHOD. U.S. Patent Application Publication Nos. US 2012/0071133, US 2010/0310071, US 2007/0201721, US 2006/0115111, US 2004/0125208 and U.S. Pat. Nos. 8,068,638, 7,778,440, 7,184,573, 6,996,251 are incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
55422 | Roustaei | Jun 1866 | A |
2950971 | Lewin | Aug 1960 | A |
3439598 | Weitzner et al. | Apr 1969 | A |
4015240 | Swonger et al. | Mar 1977 | A |
4109237 | Hill | Aug 1978 | A |
4115805 | Morton | Sep 1978 | A |
4270853 | Hatada et al. | Jun 1981 | A |
4270854 | Stemme et al. | Jun 1981 | A |
4334241 | Kashioka et al. | Jun 1982 | A |
4344682 | Hattori | Aug 1982 | A |
4389109 | Taniguchi et al. | Jun 1983 | A |
4443077 | Tanikawa | Apr 1984 | A |
4528588 | Lofberg | Jul 1985 | A |
4574319 | Konishi | Mar 1986 | A |
4613911 | Ohta | Sep 1986 | A |
4620318 | Hill | Oct 1986 | A |
4642717 | Matsuda et al. | Feb 1987 | A |
4742369 | Ishii et al. | May 1988 | A |
4905029 | Kelley | Feb 1990 | A |
4951079 | Hoshino et al. | Aug 1990 | A |
4965626 | Robison et al. | Oct 1990 | A |
4977419 | Wash et al. | Dec 1990 | A |
4983996 | Kinoshita | Jan 1991 | A |
4994831 | Marandi | Feb 1991 | A |
4995086 | Lilley et al. | Feb 1991 | A |
5023635 | Nealon | Jun 1991 | A |
5025283 | Robison | Jun 1991 | A |
5027149 | Hoshino et al. | Jun 1991 | A |
5031122 | Witty | Jul 1991 | A |
5070355 | Inoue et al. | Dec 1991 | A |
5097278 | Tamamura et al. | Mar 1992 | A |
5099262 | Tanaka et al. | Mar 1992 | A |
5103486 | Grippi | Apr 1992 | A |
5128700 | Inoue et al. | Jul 1992 | A |
5142310 | Taniguchi et al. | Aug 1992 | A |
5146249 | Hoda et al. | Sep 1992 | A |
5160952 | Iwashita et al. | Nov 1992 | A |
5245372 | Oashima | Sep 1993 | A |
5247300 | Sohn | Sep 1993 | A |
5267042 | Tsuchiya et al. | Nov 1993 | A |
5276472 | Bell et al. | Jan 1994 | A |
5313235 | Inoue et al. | May 1994 | A |
5335072 | Tanaka et al. | Aug 1994 | A |
5410598 | Shear | Apr 1995 | A |
5426745 | Baji et al. | Jun 1995 | A |
5493677 | Balogh et al. | Feb 1996 | A |
5499294 | Friedman | Mar 1996 | A |
5502576 | Ramsay et al. | Mar 1996 | A |
5506644 | Suzuki et al. | Apr 1996 | A |
5515042 | Nelson | May 1996 | A |
5519778 | Leighton et al. | May 1996 | A |
5530759 | Braudaway et al. | Jun 1996 | A |
5546145 | Bernardi et al. | Aug 1996 | A |
5568570 | Rabbani | Oct 1996 | A |
5581800 | Fardeau et al. | Dec 1996 | A |
5602458 | Dowe | Feb 1997 | A |
5617119 | Briggs et al. | Apr 1997 | A |
5629980 | Stefik et al. | May 1997 | A |
5633678 | Parulski et al. | May 1997 | A |
5642285 | Woo et al. | Jun 1997 | A |
5646990 | Li | Jul 1997 | A |
5646997 | Barton | Jul 1997 | A |
5657077 | DeAngelis et al. | Aug 1997 | A |
5682458 | Funazaki | Oct 1997 | A |
5692104 | Chow et al. | Nov 1997 | A |
5692225 | Bernardi et al. | Nov 1997 | A |
5706457 | Dwyer et al. | Jan 1998 | A |
5712679 | Coles | Jan 1998 | A |
5726660 | Purdy et al. | Mar 1998 | A |
5732354 | MacDonald | Mar 1998 | A |
5737491 | Allen et al. | Apr 1998 | A |
5740244 | Indeck et al. | Apr 1998 | A |
5765152 | Erickson | Jun 1998 | A |
5767496 | Swartz et al. | Jun 1998 | A |
5768640 | Takahashi et al. | Jun 1998 | A |
5786851 | Kondo et al. | Jul 1998 | A |
5787186 | Schroeder | Jul 1998 | A |
5796428 | Matsumoto et al. | Aug 1998 | A |
5799092 | Kristol et al. | Aug 1998 | A |
5806005 | Hull et al. | Sep 1998 | A |
5815201 | Hashimoto et al. | Sep 1998 | A |
5819289 | Sanford, II et al. | Oct 1998 | A |
5822432 | Moskowitz et al. | Oct 1998 | A |
5825890 | Elgamal et al. | Oct 1998 | A |
5828809 | Chang et al. | Oct 1998 | A |
5835667 | Wactlar et al. | Nov 1998 | A |
5841886 | Rhoads | Nov 1998 | A |
5841978 | Rhoads | Nov 1998 | A |
5845281 | Benson et al. | Dec 1998 | A |
5857038 | Owada et al. | Jan 1999 | A |
5862260 | Rhoads | Jan 1999 | A |
5872865 | Normile et al. | Feb 1999 | A |
5889578 | Jamzadeh | Mar 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5893095 | Jain et al. | Apr 1999 | A |
5907149 | Marckini | May 1999 | A |
5913078 | Kimura et al. | Jun 1999 | A |
5923327 | Smith et al. | Jul 1999 | A |
5940121 | McIntyre et al. | Aug 1999 | A |
5943422 | Van Wie et al. | Aug 1999 | A |
5978773 | Hudetz et al. | Nov 1999 | A |
5991876 | Johnson et al. | Nov 1999 | A |
5995630 | Borza | Nov 1999 | A |
5995936 | Brais et al. | Nov 1999 | A |
6005936 | Shimizu et al. | Dec 1999 | A |
6014183 | Hoang | Jan 2000 | A |
6014569 | Bottum | Jan 2000 | A |
6023241 | Clapper | Feb 2000 | A |
6031526 | Shipp | Feb 2000 | A |
6064764 | Bhaskaran et al. | May 2000 | A |
6065119 | Sandford, II et al. | May 2000 | A |
6104430 | Fukuoka | Aug 2000 | A |
6111605 | Suzuki | Aug 2000 | A |
6115137 | Ozawa et al. | Sep 2000 | A |
6115717 | Mehrotra et al. | Sep 2000 | A |
6122403 | Rhoads | Sep 2000 | A |
6141753 | Zhao et al. | Oct 2000 | A |
6148091 | DiMaria | Nov 2000 | A |
6160964 | Imoto | Dec 2000 | A |
6166729 | Acosta et al. | Dec 2000 | A |
6181373 | Coles | Jan 2001 | B1 |
6185316 | Buffam | Feb 2001 | B1 |
6185683 | Ginter et al. | Feb 2001 | B1 |
6198989 | Tankhilevich et al. | Mar 2001 | B1 |
6205249 | Moskowitz | Mar 2001 | B1 |
6208746 | Musgrave | Mar 2001 | B1 |
6212401 | Ackley | Apr 2001 | B1 |
6219560 | Erkkila et al. | Apr 2001 | B1 |
6222985 | Miyake | Apr 2001 | B1 |
6233684 | Stefik et al. | May 2001 | B1 |
6243480 | Zhao et al. | Jun 2001 | B1 |
6243481 | Tao | Jun 2001 | B1 |
6269446 | Schumacher et al. | Jul 2001 | B1 |
6282362 | Murphy et al. | Aug 2001 | B1 |
6282654 | Ikeda et al. | Aug 2001 | B1 |
6292092 | Chow et al. | Sep 2001 | B1 |
6292633 | Nakagawa | Sep 2001 | B1 |
6300880 | Sitnik | Oct 2001 | B1 |
6301368 | Bolle et al. | Oct 2001 | B1 |
6321981 | Ray et al. | Nov 2001 | B1 |
6332193 | Glass et al. | Dec 2001 | B1 |
6334187 | Kadono | Dec 2001 | B1 |
6359837 | Tsukamoto | Mar 2002 | B1 |
6363043 | Kondo | Mar 2002 | B1 |
6366680 | Brunk et al. | Apr 2002 | B1 |
6377699 | Musgrave et al. | Apr 2002 | B1 |
6389151 | Carr et al. | May 2002 | B1 |
6389538 | Gruse et al. | May 2002 | B1 |
6397334 | Chainer et al. | May 2002 | B1 |
6411328 | Franke et al. | Jun 2002 | B1 |
6421450 | Nakano | Jul 2002 | B2 |
6424968 | Broster et al. | Jul 2002 | B1 |
6437933 | Sugiyama et al. | Aug 2002 | B1 |
6449367 | Van Wie et al. | Sep 2002 | B2 |
6462778 | Abram et al. | Oct 2002 | B1 |
6469969 | Carson et al. | Oct 2002 | B2 |
6491217 | Catan | Dec 2002 | B2 |
6498586 | Pankinaho | Dec 2002 | B2 |
6505160 | Levy et al. | Jan 2003 | B1 |
6507371 | Hashimoto et al. | Jan 2003 | B1 |
6525768 | Obradovich | Feb 2003 | B2 |
6526215 | Hirai et al. | Feb 2003 | B2 |
6526351 | Whitham | Feb 2003 | B2 |
6532298 | Cambier et al. | Mar 2003 | B1 |
6535298 | Winter et al. | Mar 2003 | B2 |
6560339 | Iwamura | May 2003 | B1 |
6560660 | Flanagin | May 2003 | B1 |
6571271 | Savitzky et al. | May 2003 | B1 |
6577336 | Safai | Jun 2003 | B2 |
6591365 | Cookson | Jul 2003 | B1 |
6606117 | Windle | Aug 2003 | B1 |
6611607 | Davis et al. | Aug 2003 | B1 |
6628325 | Steinberg et al. | Sep 2003 | B1 |
6636158 | Bando et al. | Oct 2003 | B1 |
6636249 | Rekimoto | Oct 2003 | B1 |
6670984 | Tanaka et al. | Dec 2003 | B1 |
6681029 | Rhoads | Jan 2004 | B1 |
6683649 | Anderson | Jan 2004 | B1 |
6687383 | Kanevsky et al. | Feb 2004 | B1 |
6714778 | Nykanen et al. | Mar 2004 | B2 |
6720879 | Edwards | Apr 2004 | B2 |
6741864 | Wilcock et al. | May 2004 | B2 |
6747692 | Patel et al. | Jun 2004 | B2 |
6750902 | Steinberg et al. | Jun 2004 | B1 |
6786397 | Silverbrook et al. | Sep 2004 | B2 |
6788800 | Carr et al. | Sep 2004 | B1 |
6807534 | Erickson | Oct 2004 | B1 |
6831682 | Silverbrook et al. | Dec 2004 | B1 |
6833861 | Matsumoto et al. | Dec 2004 | B2 |
6853987 | Cook | Feb 2005 | B1 |
6856344 | Franz | Feb 2005 | B2 |
6889324 | Kanai et al. | May 2005 | B1 |
6895126 | Di Bernardo et al. | May 2005 | B2 |
6914695 | Walters et al. | Jul 2005 | B2 |
6947571 | Rhoads et al. | Sep 2005 | B1 |
6948066 | Hind | Sep 2005 | B2 |
6952164 | Junqua | Oct 2005 | B2 |
6956671 | Monty et al. | Oct 2005 | B2 |
6959868 | Tsikos et al. | Nov 2005 | B2 |
6965324 | Suggs, Sr. | Nov 2005 | B1 |
6968366 | Zhang et al. | Nov 2005 | B1 |
6968453 | Doyle | Nov 2005 | B2 |
6990444 | Hind et al. | Jan 2006 | B2 |
6996251 | Malone | Feb 2006 | B2 |
7010144 | Davis et al. | Mar 2006 | B1 |
7016899 | Stern et al. | Mar 2006 | B1 |
7043048 | Ellingson | May 2006 | B1 |
7053938 | Sherry | May 2006 | B1 |
7095871 | Jones et al. | Aug 2006 | B2 |
7184573 | Malone et al. | Feb 2007 | B2 |
RE39526 | Hull et al. | Mar 2007 | E |
7265779 | Sato et al. | Sep 2007 | B2 |
7319484 | Yoshida et al. | Jan 2008 | B2 |
7324943 | Rigazio et al. | Jan 2008 | B2 |
7391960 | Shinozaki et al. | Jun 2008 | B2 |
7617542 | Vataja | Nov 2009 | B2 |
7778438 | Malone | Aug 2010 | B2 |
7778440 | Malone | Aug 2010 | B2 |
7831598 | Ko | Nov 2010 | B2 |
7907199 | Seki et al. | Mar 2011 | B2 |
7961218 | Seki et al. | Jun 2011 | B2 |
8068638 | Malone et al. | Nov 2011 | B2 |
8099772 | Takada et al. | Jan 2012 | B2 |
8135169 | Malone | Mar 2012 | B2 |
8424227 | Harrington | Apr 2013 | B2 |
20010007130 | Takaragi | Jul 2001 | A1 |
20010011680 | Soltesz et al. | Aug 2001 | A1 |
20010012062 | Anderson | Aug 2001 | A1 |
20010012066 | Parulski et al. | Aug 2001 | A1 |
20010015759 | Squibbs | Aug 2001 | A1 |
20010018349 | Kinnunen et al. | Aug 2001 | A1 |
20010021144 | Oshima et al. | Sep 2001 | A1 |
20010021978 | Okayasu et al. | Sep 2001 | A1 |
20010025342 | Uchida | Sep 2001 | A1 |
20010034835 | Smith | Oct 2001 | A1 |
20010044824 | Hunter et al. | Nov 2001 | A1 |
20020001395 | Davis et al. | Jan 2002 | A1 |
20020010684 | Moskowitz | Jan 2002 | A1 |
20020015042 | Robotham et al. | Feb 2002 | A1 |
20020030907 | Ikeda et al. | Mar 2002 | A1 |
20020031240 | Levy et al. | Mar 2002 | A1 |
20020032502 | Russell | Mar 2002 | A1 |
20020033844 | Levy et al. | Mar 2002 | A1 |
20020046188 | Burges et al. | Apr 2002 | A1 |
20020051577 | Kinjo | May 2002 | A1 |
20020059162 | Shinoda et al. | May 2002 | A1 |
20020061120 | Carr et al. | May 2002 | A1 |
20020062382 | Rhoads et al. | May 2002 | A1 |
20020072935 | Rowse et al. | Jun 2002 | A1 |
20020073056 | Broster et al. | Jun 2002 | A1 |
20020075298 | Schena et al. | Jun 2002 | A1 |
20020080271 | Eveleens et al. | Jun 2002 | A1 |
20020080396 | Silverbrook et al. | Jun 2002 | A1 |
20020080964 | Stone et al. | Jun 2002 | A1 |
20020083123 | Freedman et al. | Jun 2002 | A1 |
20020102966 | Lev et al. | Aug 2002 | A1 |
20020146148 | Levy | Oct 2002 | A1 |
20020152388 | Linnartz et al. | Oct 2002 | A1 |
20020191087 | Hashimoto et al. | Dec 2002 | A1 |
20020194480 | Nagao | Dec 2002 | A1 |
20030011684 | Narayanaswami et al. | Jan 2003 | A1 |
20030032033 | Anglin et al. | Feb 2003 | A1 |
20030048921 | Cahall et al. | Mar 2003 | A1 |
20030177094 | Needham et al. | Sep 2003 | A1 |
20030187950 | Rising, III | Oct 2003 | A1 |
20040005078 | Tillotson | Jan 2004 | A1 |
20040022444 | Rhoads | Feb 2004 | A1 |
20040023686 | King et al. | Feb 2004 | A1 |
20040032499 | Silverbrook et al. | Feb 2004 | A1 |
20040039930 | Ohmori et al. | Feb 2004 | A1 |
20040044911 | Takada et al. | Mar 2004 | A1 |
20040049734 | Simske | Mar 2004 | A1 |
20040053637 | Iida | Mar 2004 | A1 |
20040068371 | Estep | Apr 2004 | A1 |
20040070670 | Foster | Apr 2004 | A1 |
20040073557 | Piccionelli et al. | Apr 2004 | A1 |
20040073568 | Yonaha | Apr 2004 | A1 |
20040085203 | Junqua | May 2004 | A1 |
20040091111 | Levy et al. | May 2004 | A1 |
20040101138 | Revital et al. | May 2004 | A1 |
20040103283 | Hornak | May 2004 | A1 |
20040109199 | Tsubaki | Jun 2004 | A1 |
20040114042 | Paolini et al. | Jun 2004 | A1 |
20040148518 | Grundback et al. | Jul 2004 | A1 |
20040183915 | Gotohda et al. | Sep 2004 | A1 |
20040197013 | Kamei | Oct 2004 | A1 |
20040203386 | Tischler et al. | Oct 2004 | A1 |
20040257431 | Girish et al. | Dec 2004 | A1 |
20050024493 | Nam | Feb 2005 | A1 |
20050041035 | Nagatomo et al. | Feb 2005 | A1 |
20050043018 | Kawamoto | Feb 2005 | A1 |
20050091311 | Lund et al. | Apr 2005 | A1 |
20050094000 | Son et al. | May 2005 | A1 |
20050134703 | Mittal | Jun 2005 | A1 |
20050143136 | Lev et al. | Jun 2005 | A1 |
20050185049 | Iwai et al. | Aug 2005 | A1 |
20050216580 | Raji et al. | Sep 2005 | A1 |
20050216949 | Candelora et al. | Sep 2005 | A1 |
20050219359 | Trela | Oct 2005 | A1 |
20050231752 | Sainio | Oct 2005 | A1 |
20060018506 | Rodriguez et al. | Jan 2006 | A1 |
20070055689 | Rhoads et al. | Mar 2007 | A1 |
20070098172 | Levy et al. | May 2007 | A1 |
20070250526 | Hanna | Oct 2007 | A1 |
20110038594 | Symons | Feb 2011 | A1 |
20130286248 | Alfarano | Oct 2013 | A1 |
Number | Date | Country |
---|---|---|
0905966 | Mar 1999 | EP |
1204277 | May 2002 | EP |
9603286 | Feb 1996 | WO |
9626494 | Aug 1996 | WO |
9743736 | Nov 1997 | WO |
9827510 | Jun 1998 | WO |
9901859 | Jan 1999 | WO |
9936876 | Jul 1999 | WO |
0036605 | Jun 2000 | WO |
0070585 | Nov 2000 | WO |
0115021 | Mar 2001 | WO |
0152178 | Jul 2001 | WO |
0161508 | Aug 2001 | WO |
0167707 | Sep 2001 | WO |
0173586 | Oct 2001 | WO |
0175629 | Oct 2001 | WO |
0197128 | Dec 2001 | WO |
0211446 | Feb 2002 | WO |
Entry |
---|
United States Patent and Trademark Office; Request for Ex Parte Reexamination in related re-exam application 90/013,265; dated Jun. 6, 2014; 1085 pages Jun. 6, 2014. |
United States Patent and Trademark Office; Request for Ex Parte Reexamination in related re-exam application 90/013,255; dated May 27, 2014; 906 pages May 27, 2014. |
United States Patent and Trademark Office; Response to Ex Parte Reexamination in related re-exam application 90/013,265; dated Feb. 16, 2015; 187 pages Feb. 16, 2015. |
United States Patent and Trademark Office; Response to Ex Parte Reexamination in related re-exam application 90/013,255; dated Feb. 27, 2015; 177 pages Feb. 27, 2015. |
H. Krawczyk, RFC 2104 (RFC2104) RFC 2104—HMAC: Keyed-Hashing for Message Authentication https://www.faqs.org/rfcs/rfc2104.htm, Feb. 1997. Feb. 1, 1997. |
G. Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, pp. 905-910, vol. 39, No. 4, Nov. 1993. Nov. 1, 1993. |
Franks, et al., “HTTP Authentication: Basic and Digest Access Authentication,” the Internet Society, Jun. 1999. Jun. 1, 1999. |
Franks, et al., “An Extension to HTTP: Digest Access Authentication,” The Internet Society, Jan. 1997, Jan. 1, 1997. |
Supplemental First Amended Complaint, MyPort IP, Inc. v. HTC Corporation, Civil Action No. 6:11-cv-00246 (E.D. Tex. Filed Mar. 8, 2012) (“MyPort Complaint”), 11 pages. Mar. 8, 2012. |
Digital Still Camera Image File Format Standard (Exchangeable image file format for Digital Still Cameras: Exit), Version 2.1, published Jun. 12, 1998 by the Japan Electronic Industry Development Association (JEIDA) (“Exit 2.1 Specification”), 172 pages. Jun. 12, 1998. |
TIFF Specification Revision 6.0, Aldus Developers Desk, Aldus Corporation, Jun. 3, 1992. |
James Bao-Yen Tsui, Fundamental of Global Positioning System Receivers: A Software Approach, pp. 256 (John Wiley & Sons, Inc, 2000) Jan. 1, 2000. |
PPP Encryption Control Prorocol, Internet Engineering Task Force (IETF), published Jun. 1996 Jun. 1, 1996. |
Alfred Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography (CRC Press 1996) Jan. 1, 1996. |
MyPort IP, Inc.'s Disclosure Pursuant to Patent Rule 3-1, MyPort IP, Inc. v. HTC Corporation, Civil Action No. 6:11-cv-00246 (E.D. Tex. Filed May 13, 2011). |
Stansell, Jr., “Civil GPS from a Future Perspective,” Proceedings of the IEEE, Oct. 1983, vol. 71, No. 10; pp. 1187-1192. Oct. 1, 1983. |
Dale, Diana & Rog, Ron, The Need for a Meta-Tag Standard for Audio and Visual Materials, Proc. Int. Conf. on Dublin Core and Metadata for e-Communities 2002: 205-206. Jan. 1, 2002. |
Kosovic, Douglas; Schroeter, Ronald; and Hunter, Jane, Collaborative Video Annotation, Indexing and Discussion over high-bandwidth networks, DSTC Technical Report TR247, 2002, DSTC Pty Ltd., St Lucia, Qld, Australia. Jan. 1, 2002. |
United States Patent and Trademark Office; Office Action in related re-exam application 95/001,957; dated May 18, 2012; 36 pages May 18, 2012. |
Response to Inter Partes Re-Exam Office Action in related re-exam application 95/001,957; dated Aug. 20, 2012; Attorney Gregory M. Howison; 122 pages Aug. 20, 2012. |
Corrected Response to Inter Partes Re-Exam Office Action in related re-exam application 95/001,957; dated Sep. 24, 2012; Attorney Gregory M. Howison; 40 pages Sep. 24, 2012. |
United States Patent and Trademark Office; Office Action in related re-exam application 95/002,056; dated Sep. 17, 2012; 41 pages Sep. 17, 2012. |
Response to Inter Partes Re-Exam Office Action in related re-exam application 95/002,056; dated Dec. 17, 2012; Attorney Gregory M. Howison; 123 pages Dec. 17, 2012. |
United States Patent and Trademark Office; Office Action in related re-exam application 90/013,255; dated Dec. 30, 2014; 36 pages Dec. 30, 2014. |
United States Patent and Trademark Office; Ex Parte Reexamination Advisory Action in related re-exam application 90/013,255; dated Nov. 5, 2015; 6 pages Nov. 5, 2015. |
United States Patent and Trademark Office; Ex Parte Reexamination Advisory Action in related re-exam application 90/013,255; dated Jan. 13, 2016; 5 pages Jan. 13, 2016. |
United States Patent and Trademark Office; Ex Parte Reexamination Advisory Action in related re-exam application 90/013,255; dated Feb. 4, 2016; 5 pages Feb. 4, 2016. |
United States Patent and Trademark Office; Appeal Brief in related re-exam application 90/013,255; dated Feb. 15, 2016; 72 pages Feb. 15, 2016. |
United States Patent and Trademark Office; Notice of Defective Paper in Ex Parte Reexamination—Third Party Requested in related re-exam application 90/013,255; dated Mar. 11, 2015; 4 pages Mar. 11, 2015. |
United States Patent and Trademark Office; Office Action in Ex Parte Reexam in related re-exam application 90/013,255; dated Aug. 14, 2015; 45 pages Aug. 14, 2015. |
United States Patent and Trademark Office; Examiner's Answer in related re-exam application 90/013,255; dated Apr. 19, 2016; 17 pages Apr. 19, 2016. |
United States Patent and Trademark Office; Response to Notice of Defective Paper in Ex Parte Reexamination in related re-exam application 90/013,255; dated Apr. 13, 2015; 21 pages Apr. 13, 2015. |
United States Patent and Trademark Office; Response After Final Action in Ex Parte Re-Exam in related re-exam application 90/013,255; dated Jan. 21, 2016; 42 pages Jan. 21, 2016. |
United States Patent and Trademark Office; Response After Final Action in Ex Parte Re-Exam in related re-exam application 90/013,255; dated Dec. 14, 2015; 42 pages Dec. 14, 2015. |
United States Patent and Trademark Office; Ex Parte Reexamination Advisory Action in related re-exam application 90/013,265; dated Jan. 12, 2016; 6 pages Jan. 12, 2016. |
United States Patent and Trademark Office; Ex Parte Reexamination Advisory Action in related re-exam application 90/013,265; dated Jan. 29, 2016; 5 pages Jan. 29, 2016. |
United States Patent and Trademark Office; Appeal Brief in related re-exam application 90/013,265; dated Feb. 15, 2016; 74 pages Feb. 15, 2016. |
United States Patent and Trademark Office; Examiner's Answer in related re-exam application 90/013,265; dated Apr. 13, 2016; 19 pages Apr. 13, 2016. |
United States Patent and Trademark Office; Office Action in Ex Parte Reexamination in related re-exam application 90/013,265; dated Aug. 14, 2015; 80 pages Aug. 14, 2015. |
United States Patent and Trademark Office; Response to Notice of Defective Paper in Ex Parte Reexamination in related re-exam application 90/013,265; dated Jun. 16, 2015; 23 pages Jun. 16, 2015. |
United States Patent and Trademark Office; Response After Final Action in Ex Parte Re-Exam in related re-exam application 90/013,265; dated Jan. 21, 2016; 42 pages Jan. 21, 2016. |
United States Patent and Trademark Office; Response After Final Action in Ex Parte Re-Exam in related re-exam application 90/013,265; dated Dec. 14, 2015; 42 pages Dec. 14, 2015. |
United States Patent and Trademark Office; Supplemental Response to Ex Parte Re-Examination in related re-exam application 90/013,265; dated Mar. 2, 2015; 1 page Mar. 2, 2015. |
United States Patent and Trademark Office; Office Action in Ex Parte Reexamination in related re-exam application 90/013,265; dated Dec. 16, 2014; 76 pages Dec. 16, 2014. |
Number | Date | Country | |
---|---|---|---|
20160267619 A1 | Sep 2016 | US |
Number | Date | Country | |
---|---|---|---|
60414449 | Sep 2002 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14175331 | Feb 2014 | US |
Child | 14881696 | US | |
Parent | 13306732 | Nov 2011 | US |
Child | 14175331 | US | |
Parent | 12857731 | Aug 2010 | US |
Child | 13306732 | US | |
Parent | 11679533 | Feb 2007 | US |
Child | 12857731 | US | |
Parent | 11325373 | Jan 2006 | US |
Child | 11679533 | US | |
Parent | 10674910 | Sep 2003 | US |
Child | 11325373 | US |