WO2000065771A1 - Mechanism for securing reliable evidence from computers and listening devices - Google Patents
Mechanism for securing reliable evidence from computers and listening devices Download PDFInfo
- Publication number
- WO2000065771A1 WO2000065771A1 PCT/GB2000/001354 GB0001354W WO0065771A1 WO 2000065771 A1 WO2000065771 A1 WO 2000065771A1 GB 0001354 W GB0001354 W GB 0001354W WO 0065771 A1 WO0065771 A1 WO 0065771A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- header
- unit
- serial number
- date
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- This invention relates to methods and apparatus for securing and preserving evidence from computers and listening devices in a form which eliminates or reduces the need for corroborative or supporting evidence regarding the circumstances of the making of the recording.
- DataFreeze a computer peripheral
- a device for use in validating recorded digitised voice, video, telemetry or computer generated information or the like characterised in that the device includes a tamper-proof unit accommodating means for identifying the date, time and serial number of the device and the private key of a Public key encryption pair allocated to the device, the device being arranged in operation to produce a data file for recording on recording media having a header and an enciphered message, the recorded message being enciphered with the date, time and serial number of the device and the header containing the private key encrypted date, time and serial number used in the cipher process.
- a process for use in validating recorded digitised voice, video, telemetry or digital computer generated information or the like in which the process produces a data file of the recorded information enciphered with the date, time and serial number of the recording equipment and forms a file header containing the private key encrypted date, time and serial number used in the enciphering process.
- the cipher process and encrypted header also include geophysical location information indicative of the actual location of the device making the validated recording.
- the device according to the invention may be a micro-processor controlled arrangement and the process of the invention may be performed by a computer program.
- the equipment of the invention performs these operations in real-time without adding any significant delay to the recording of the data, without the need for a powerful encryption microprocessor and without the need for skilled personnel.
- the resulting disk, tape, electronic recording, magnetic recording or optical recording is re-playable on any conventional replay device for the replay of that type of media running special DataFreeze deciphering software. Consequently, in one possible implementation, a prosecuting authority could supply to an accused's lawyers with a CDROM produced by the arresting officers on a DataFreeze peripheral which was readable by the accused's lawyers on their conventional windows personal computer with the DataFreeze decryption/deciphering software running. No additional hardware would be required by the defence lawyers. The date, time, geophysical or CURSOR location and serial number of the DataFreeze peripheral used to make the recording would however always be available to the defence in confirmation of when, where and on what equipment the data had been frozen by the police or security forces.
- a DataFreeze peripheral could be used as an archival storage device in banking and financial services or as a tachograph or other work monitoring device in medical and in health and safety applications.
- the manufacturer, DataFreeze generates a Public Key encryption pair for each unit to be manufactured - the public key being published as an X500 Digital Certificate and the private key being kept secret.
- Each private key is built into a private key register PCR on a custom chip in a tamper-proof module TPB.
- a DataFreeze peripheral is the custom chip in a tamper-proof module TPB which is connected to a standard recording device RD (e.g. A CDROM writer or a floppy disk drive).
- the custom chip embodies a micro-processor and contains a geophysical positioning system GU (in one implementation of the invention a CURSOR mobile telephone positioning system), a real-time clock RTC and a unique serial number SRN.
- the output from these three devices is converted into a 512 bit number with the left portion containing the data and time D, the middle containing the positioning system's location (the CURSOR location) C and the right portion containing the Serial Number S in a cipher data register CDR.
- the 512 bit number in the cipher data register CDR is encrypted using the private key from the private key register PCR of the particular unit in the encryption unit EU.
- the resulting encrypted stream is called "H-Data". Because the volume of data (512 bits) being encrypted by the private key is very small, the vulnerability of the data to cryptoanalysis to discover the private key is very low.
- the DataFreeze unit receives data from an external source LS (line under Surveillance) (e.g. a computer or a listening device). The DataFreeze unit notes the "H-Data" and writes this to the recording media RD as a header to the recording, padding any spare space in the header with zeros.
- LS line under Surveillance
- the DataFreeze unit now takes the first block of data received from the external source stored in the cipher unit CU. It performs three simple Caesar cipher operations on the block of data e.g. Multiplying the block of data by the new date and time and adding the cursor location and the square of the serial number.
- DataFreeze block ([Data]*Dl) + C+(S*S)
- the next block of data it performs a different calculation e.g. Multiplying the block of data by the CURSOR location, adding the square of the new date and time (which will have increased a defined amount during the writing of the first block) and adding the serial number.
- a different calculation e.g. Multiplying the block of data by the CURSOR location, adding the square of the new date and time (which will have increased a defined amount during the writing of the first block) and adding the serial number.
- DataFreeze block ([Data]*C) + (D2*D2)+S
- the next block of data it performs a different calculation e.g. Multiplying the block of data by the square of the serial number, adding the square of the CURSOR location and adding the new date and time (which will have increased a defined amount during the writing of the second block).
- a different calculation e.g. Multiplying the block of data by the square of the serial number, adding the square of the CURSOR location and adding the new date and time (which will have increased a defined amount during the writing of the second block).
- DataFreeze block ([Data]*S*S) + D3+C
- the DataFreeze peripheral would revert to enciphering using the algorithm used for the first block of data.
- the objective of the DataFreeze enciphering is not to make the data cryptographically secure i.e. secret. Rather it is to freeze the data as recorded with the date and time when it was recorded, the location where it was recorded and the unit on which it was recorded. For proof of no tampering it has to do this in real-time.
- the simple manipulations of data are performed in a few cycles of the microprocessor running on the DataFreeze peripheral and cause no material delay in the writing of the data.
- the computer controlling the device would run the DataFreeze decryption/deciphering software. This would read the "H-data" from the header and decrypt it using the DataFreeze public key, which would be published as an X500 digital certificate. Once the header had been decrypted the left, middle and right portions of the header would be stored in buffers and used as the seed data for a computer program to step through the obverse of the enciphering process.
- the first block of DataFreeze data would have the CURSOR location subtracted and the square of the serial number subtracted with the result being divided by the date and time.
- the second block of DataFreeze data would have the square of the new date and time (which will have increased a defined amount during the writing of the first block) subtracted, the serial number subtracted and the result divided by the CURSOR location.
- the third block of data would have the square of the CURSOR location subtracted, the new date and time (which will have increased a defined amount during the writing of the second block) subtracted and the result divided by the square of the serial number.
- a more sophisticated version of the invention could include a "digital fingerprint" in the header along with the H-Data. This would be produced by simultaneously passing a duplicate of the entire data session through a one-way algorithm while it was being written to disk to produce a unique value known as a message digest which would, in effect, be a "digital fingerprint" of the session.
- This message digest could then be encrypted by the DataFreeze unit's private key and written to the header field H-data of the recording. When decrypted in software by using the DataFreeze unit's X500 public key this message digest could be used to confirm the integrity and coherence of the recording of the data session.
- a further version of the invention could contain a dummy or non-functional CURSOR unit located in the tamper-proof module. This would not determine the location of the unit but would simply give out a default location for inclusion in the H-Data.
- DataFreeze unit would thus only stamp the data with the time and specific unit and the default location. Such a unit would have two main uses: Use in situations where it was not possible to get a location signal and use in situations where the cost of the
- DataFreeze unit needed to be low and the location information was not considered to be important.
- the geophysical information may be used to control the use of the recording equipment by having an inbuilt location identifier LI which is programmable (i.e. lead PL is set with the geophysical location of the device) and is used to prevent use of the recording equipment if it is located outside the geophysical area indicated by the inbuilt location identifier LI by inhibiting the cipher unit CU and encryption unit EU if the values of PL and C do not equate.
- the geophysical positioning unit may be the Global positioning system used in mobile telephones by including a complete mobile telephone instrument in the Position Unit GU.
- the standard recording medium is of the "Write once read many times" type where it is impossible to purge a record once it has been written.
- the invention may be used with erasable media.
- the invention has application beyond that involving criminal investigation.
- copyright rights are traditionally allocated by physical territories.
- a copyright owner can license one publisher to publish his work in a specific territory (e.g. USA) and another publisher to publish his work in a different territory (e.g. Europe) each paying different royalties.
- the ability to segregate territories is important for copyright owners to maximise their income through taking account of the relative wealth of particular territories.
- the author of a book on soil science might reasonably wish to sell his book at $15 a copy to people living in a wealthy country (E.g. USA) and at $0.50 per copy to people living in a poor country (e.g. Cambodia) and make the material available free to a charitable foundation.
- An enhancement of the DataFreeze technology makes such a segregation possible.
- the DataFreeze unit becomes part of a media recording device (e.g. a set top box supplied by a media company).
- a media recording device e.g. a set top box supplied by a media company.
- the SMS message transmitted would consist of five parts: the normal encrypted DataFreeze header (with check sum to prove that the recording was complete); the ISBN (or equivalent) of the downloaded work (thereby identifying the work), the Location Information, the serial number of the set -top box and the date & time of download. These five parts would be encrypted using the public key of the set- top box maker.
- the consumer Based upon the SMS data received the consumer would be sent (or directly debited) with his bill for the materials downloaded by his set-box and the media company would be able to account to the copyright owner and the national government for royalties, duty and taxes due for downloading in the territory where the set-top box was located. So if the set top box was registered to a charity in a specific location it would be possible for the bills to be waived.
- the security of the rights management system depends upon the private key being kept secret - consequently the company which generates and supplies the media company with its private and public key pair must be as trustworthy as a bank note supplier to governments.
- One further variant on all forms of the DataFreeze unit according to the invention could have a biometric sensor attached to the unit. In this enhancement when a recording were to be made the biometric sensor would check the relevant biometric of the user (e.g. the fingerprint). If it found this to be valid it would then encrypt the DataFreeze header data with the private key associated with the user. This re- encrypted DataFreeze header would be written to the unit and, in an enhanced version, sent by SMS to the external store for audit purposes.
- the decryption process has one further stage.
- the DataFreeze software would have to obtain the public key associated with the user. Using this public key it would decrypt the message to reveal the original encrypted DataFreeze header. Using the public key of the recording device the unit would then decrypt the DataFreeze header itself revealing the date, location, serial number (and checksum).
- Both the user's public keys and the recording devices public keys could be obtained from a web site.
- a further header could preceded the DataFreeze header on the recording giving the URLs of the public key of the user and the public key of the recording device.
- this information could be downloaded and cached so that no material delay would occur when reading records produced by people or devices in frequent correspondence with each other.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU39802/00A AU3980200A (en) | 1999-04-26 | 2000-04-10 | Mechanism for securing reliable evidence from computers and listening devices |
EP00919046A EP1173951A1 (en) | 1999-04-26 | 2000-04-10 | Mechanism for securing reliable evidence from computers and listening devices |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9909590.3 | 1999-04-26 | ||
GB9909590A GB9909590D0 (en) | 1999-04-26 | 1999-04-26 | Mechanism for securing reliable evidence from computers and listening devices |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000065771A1 true WO2000065771A1 (en) | 2000-11-02 |
Family
ID=10852292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2000/001354 WO2000065771A1 (en) | 1999-04-26 | 2000-04-10 | Mechanism for securing reliable evidence from computers and listening devices |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1173951A1 (en) |
AU (1) | AU3980200A (en) |
GB (1) | GB9909590D0 (en) |
WO (1) | WO2000065771A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8971932B2 (en) | 2011-12-24 | 2015-03-03 | Secure Sigint, LLC | Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5499294A (en) * | 1993-11-24 | 1996-03-12 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Digital camera with apparatus for authentication of images produced from an image file |
EP0715241A2 (en) * | 1994-10-27 | 1996-06-05 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5801856A (en) * | 1996-07-24 | 1998-09-01 | Eastman Kodak Company | Secure photographic systems |
-
1999
- 1999-04-26 GB GB9909590A patent/GB9909590D0/en not_active Ceased
-
2000
- 2000-04-10 EP EP00919046A patent/EP1173951A1/en not_active Withdrawn
- 2000-04-10 WO PCT/GB2000/001354 patent/WO2000065771A1/en not_active Application Discontinuation
- 2000-04-10 AU AU39802/00A patent/AU3980200A/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5499294A (en) * | 1993-11-24 | 1996-03-12 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Digital camera with apparatus for authentication of images produced from an image file |
EP0715241A2 (en) * | 1994-10-27 | 1996-06-05 | Mitsubishi Corporation | Apparatus for data copyright management system |
US5801856A (en) * | 1996-07-24 | 1998-09-01 | Eastman Kodak Company | Secure photographic systems |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8971932B2 (en) | 2011-12-24 | 2015-03-03 | Secure Sigint, LLC | Secure witness or criminal participant location or position and time recording information apparatus, systemts and methods |
Also Published As
Publication number | Publication date |
---|---|
EP1173951A1 (en) | 2002-01-23 |
GB9909590D0 (en) | 1999-06-23 |
AU3980200A (en) | 2000-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1431864B1 (en) | Systems and methods for secure transaction management and electronic rights protection | |
US6871278B1 (en) | Secure transactions with passive storage media | |
CN109376504A (en) | A kind of picture method for secret protection based on block chain technology | |
AU709381B2 (en) | Ciphering and deciphering of multimedia data | |
US20050195975A1 (en) | Digital media distribution cryptography using media ticket smart cards | |
CN111027028A (en) | Copyright data processing method and device based on intelligent contract | |
JP3173352B2 (en) | Digital work distribution system | |
US20140123218A1 (en) | System for controlling access and distribution of digital property | |
US20050039022A1 (en) | License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer | |
JP4561146B2 (en) | Content distribution system, encryption apparatus, encryption method, information processing program, and storage medium | |
JPWO2004109972A1 (en) | User terminal for license reception | |
JP2002503838A (en) | Secure delivery of digital expressions | |
CN108363929B (en) | System and method for generating information elimination report of storage device and preventing tampering | |
JP2008529044A (en) | Secure encryption system, apparatus and method | |
WO2007106798A2 (en) | Systems and methods for authoring and protecting digital property | |
CA2405401A1 (en) | Secure data transmission system and method | |
CN110992218A (en) | Music copyright protection method, device and medium based on block chain | |
CN111198888A (en) | Method and system for dynamically generating and monitoring digital currency crown number | |
CN1932832B (en) | Information provision system, content information copying device, user terminal device and user management device | |
US20050060544A1 (en) | System and method for digital content management and controlling copyright protection | |
CN101488171B (en) | File authentication method based on separating electronic label | |
EP1173951A1 (en) | Mechanism for securing reliable evidence from computers and listening devices | |
CN113806785B (en) | Method and system for carrying out security protection on electronic document | |
CN109829322A (en) | Number matchmaker's file real-time encryption and decryption method and system based on authorization message | |
Zhu et al. | Research on Modify Protection of Metrology Electronic Certificate Based on Blockchain Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09980731 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2001/01032/DE Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000919046 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000919046 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000919046 Country of ref document: EP |