This invention is in the field digital content and data authentication and providing verification.
Law enforcement agencies are required to record and maintain chains of custody for items of evidence involved in any investigation. Such a chain of custody serves the primary purpose of ensuring that evidence was not tampered with, while also documenting the initial collection time. On the occasion that disputes arise regarding the validity of evidence, the paper trail can be back-traced to provide information regarding the handling of evidence for the primary purpose of proving the evidence has not been tampered with or planted. There are many uses for this method in connection with many industries, and evidence in connection with legal issues is only one type of digital data or content that can be authenticated and receive the benefits if this method is used in connection with the digital data collection process.
Normally, this process would involve documenting time and location any person or system was permitted access to the evidence, either for examination or transport. However, if there existed a method for provably certifying that the evidence existed exactly as it had when the chain of custody was initially created, much of the chain of custody would become unnecessary.
The drawings constitute a part of this specification and include exemplary embodiments to the invention, which may be embodied in various forms. It is to be understood that in some instances various aspects of the invention may be shown exaggerated or enlarged to facilitate an understanding of the invention.
Detailed descriptions of particular embodiment are provided herein. It is to be understood, however, that the present invention may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but rather as a basis for the claims and as a representative basis for teaching one skilled in the art to employ the present invention in virtually any appropriately detailed system, structure or manner.
While the instant invention has been shown and described in accordance with preferred and practical embodiments thereof, it is recognized that departures from the instant disclosure are contemplated within the spirit and scope of the present invention. Therefore, the true scope of the invention should not be limited since other modifications will become apparent to those skilled in the art upon a study of the claims, drawings, descriptions, explanations, and specifications herein.
A portion of the disclosure of this patent document contains material to which a claim for copyright is made. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but reserves all other copyright rights whatsoever.
Following is a partial list of the components depicted in the drawings:
The process begins with digital document and/or digital content 1. SHA-256 is a publically available algorithm for encoding digital data, and in this example, digital document and/or digital content 1 is being acted upon by SHA-256 to produce content Hex conversion 2, which creates 64 hex characters to represent a unique signature of digital document and/or digital content 1. 64 Hex characters represents 256 bits of information, which represents approximately 1.15792 X ten to the 77th power, which is a huge number. The key to producing this 64 character hash is the extreme improbability of any other source of digital data producing this same hash. In the process depicted in this
Returning to
The user performs the log-in 51 function. The user then receives approval of log-in 52. The user then engages in acquiring of digital data 53, which can be and digital data and/or digital content from any source. The user then creates hash file from digital data 54, then transmits hash file and/or hash blockchain to server 55. The user then receives transaction confirmation and/or identifier from server 56. To confirm at some time in the future that the originating document that produced the original file is the same and has not been adulterated, the user must then create a second and/or other hash file from digital data 57. The user then receives hash file and timestamp from server 58. The user then, using the specialized user software application, compares hash file to second and/or other hash file 59. Then the determination must be made: Are they same or different? 591. Either the files are not equal 593 or the files are equal 594, and the results are displayed of comparison in at least one unique format 592.
These definitions are in addition to the words and phrases specifically defined in the body of this application.
As used herein, the term “and/or,” when used in a list of two or more items, means that any one of the listed items can be employed by itself, or any combination of two or more of the listed items can be employed. For example, if a device is described as containing components A, B, and/or C, the composition can contain A alone; B alone; C alone; A and B in combination; A and C in combination; B and C in combination; or A, B, and C in combination.
“Blockchain”: a peer to peer decentralized open ledger, like “bitcoin” architecture, relies on a distributed network shared between its users—everyone holds a public ledger of every transaction carried out using the architecture, which are then checked against one another to ensure accuracy. This ledger is called the “blockchain”. Blockchain is used instead of a centralized third party auditing and being responsible for transactions. The blockchain is a public ledger that records bitcoin or “cryptocurrency” transactions. A novel solution accomplishes this without any trusted central authority: maintenance of the blockchain is performed by a peer-to-peer network of communicating nodes running bitcoin or software. Transactions of the form payer X sends Y bitcoins to payee Z are broadcast to this network using readily available software applications. Network nodes can validate transactions, add them to their copy of the ledger, and then broadcast these ledger additions to other nodes. The blockchain is a distributed database; in order to independently verify the chain of ownership or validity of any and every bitcoin (amount), each network node stores its own copy of the block chain. Approximately six times per hour, a new group of accepted transactions, a block, is created, added to the block chain, and quickly published to all nodes. This allows bitcoin software to determine when a particular bitcoin amount has been spent, which is necessary in order to prevent double-spending in an environment without central oversight. Whereas a conventional ledger records the transfers of actual bills or promissory notes that exist apart from it, the block chain is the only place that bitcoins or a given cryptocurrency can be said to exist in the form of unspent outputs of transactions.
Tampering with transactions on the blockchain becomes exponentially harder as time progresses, and requires extreme quantities of computing power to attempt. Data stored in the blockchain is included in integrity checks—transactions are assembled into a transaction merkle tree and hashed to produce a block header. Any alterations to transactions in a blockchain database would become apparent as the block would be invalid when indexed. Rewriting blocks requires a network forking attack, and even read-write access to every peer on the network would not provide sufficient resources to alter a transaction included into the blockchain.
As such, the Blockchain of Consensus allows a file's hash to be published to the blockchain as irrefutable proof that the file existed at a given time in the past. Both the timestamp and the hash are unalterable barring attacks of extreme cost against the entire network.
“Cryptographic Hash” or “Hash”: a cryptographic hash function is a hash function which is considered practically impossible to reverse, more specifically, to recreate the input data from its hash value alone. These one-way hash functions are an essential part of the blockchain. The input data is often called the message, and the hash value is often called the message digest or simply the digest. The ideal cryptographic hash function has four main properties: (1) it is easy to compute the hash value for any given message; (2) it is infeasible to generate a message from its hash; (3) it is infeasible to modify a message without changing the hash; and (4) it is infeasible to find two different messages with the same hash. Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, or just hash values, even though all these terms stand for more general functions with rather different properties and purposes. HASH Examples: (
This application claims priority to U.S. Provisional Application No. 62/139,655, filed Mar. 28, 2015, which is incorporated herein by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
62139655 | Mar 2015 | US |