专利摘要:
Method and device for guaranteeing the date of posteriority (P) and anteriority (A) of a digital image (IN) including the manufacture of an unknown code in advance (C) and sending the code on the date of posteriority (P) by a computer server, the acquisition of a digital image containing in its field a subject (S) and the code (C), the manufacture of a digital fingerprint (EIN) of the digital image (IN ), the receipt by the server on the prior date (A) of the digital fingerprint (EIN) and potentially the return of the dates of posteriority and anteriority recorded from a digital image. The invention is particularly intended to prove using images the proper execution of clinical study protocols.
公开号:FR3061792A1
申请号:FR1770032
申请日:2017-01-10
公开日:2018-07-13
发明作者:Jean Philippe Thirion
申请人:QUANTIFICARE;
IPC主号:
专利说明:

Holder (s):
Agent (s):
Applicant (s): QUANTIFICARE Société anonyme— FR.
THIRION JEAN PHILIPPE.
QUANTIFICARE Public limited company.
QUANTIFICARE Public limited company.
(54) METHOD AND DEVICE FOR TIMING DIGITAL IMAGES.
(57) Method and device making it possible to guarantee the posteriority (P) and anticipation (A) date of a digital image (IN) including the fabrication of an unknown code in advance (C) and sending the code to the posteriority date (P) by a computer server, the acquisition of a digital image containing in its field a subject (S) and the code (C), the making of a digital imprint (EIN) of the image digital (IN), the reception by the server on the priority date (A) of the digital fingerprint (EIN) and potentially the return of the posteriority and anticipation dates recorded from a digital image.
The invention is particularly intended to prove using images the proper execution of clinical study protocols.

- 1 AREA OF THE INVENTION
The present invention relates to a method and a device for time stamping of images which makes it possible to establish that a digital image has indeed been taken between two dates.
Being able to establish this proof by the image has a great interest from the legal point of view. The invention may relate to the proof that certain operations have been carried out at the designated time in the context of clinical studies, that the patients concerned were indeed present during the planned clinical visits and to be able to certify the dermatological or aesthetic condition of these subjects at a given time. But many other applications are possible, such as demonstrating by photographing it that a document was indeed signed at a given time.
TECHNOLOGICAL BACKGROUND
The date will be considered in the broad sense of an alphanumeric representation of a given time, preferably absolute and which may include, in addition to the identification of the day: the hour, the minute, the second and even fractions of a second. An example of absolute time is Greenwich Mean Time or “GMT”. Another example is Coordinated Universal Time or “UTC” and an electronic way of representing this date, in the broadest sense is described by ISO 8601 “Data Elements and Interchange formats - Information interchange Representation of dates and times ", 1988. another way computer to represent UTC is still 1" Unix Epoch time Stamp "is a number representing the count of seconds since January 1, 1970 UTC.
Cameras generally have systems for time stamping photographs, either by embedding a date in the form of characters in the image, or, for digital cameras, by including information in the header of the image file. Thus, in the JPEG standard (in English “Joint Photographies Experts Group”) for storing digital photographs, the header of the image file called EXIF (in English “EXchangeable Image File Format”) has fields for storing date information. However, there are
- 2 a very simple way to falsify this time-stamping system which consists quite simply in artificially changing the date of the camera just before shooting. There is also a lot of software allowing you to edit the EXIF header of the image to change the dates written on it. Using the means of a standard camera to time stamp images is therefore suitable for personal convenience, for a user who trusts the date of his own camera, but cannot be used as date proof in a legal framework because it is impossible, except for very specific photographic equipment, to trace with certainty that the camera was programmed at an exact UTC date at the time of shooting.
There are also many systems to prove that a digital or electronic document is older than a given date called "certified timestamp" (in English "Trusted timestamping"). A common way to obtain proof of prior art is to provide the digital document to a trusted third party, of recognized reputation, who will certify the date of reception of this digital data. Thus, the ANSI ASC X9.95-2016 standard "Trusted Time Stamp Management and Security", itself an extension of the RFC 3161 standard of 2001: "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)" defines a way in which a trusted third party can electronically certify that a digital document is older than a certain date. An example of an organization serving as a trusted third party is the “Société des Gens De Lettres” (SGDL) which has been authenticating literary creation in France since 1838 and which has recently computerized its services in order to provide this type of certification of digital documents.
Many certified time stamping systems use electronic signature means such as for example the public key infrastructure system "PKI" (in English "Public Key Infrastructure"), which acts by means of a public key and a private key; the private key being the sole possession of the trusted third party and the public key allowing anyone to be able to verify that an electronic document has been encrypted using the private key of the trusted third party, without this private key which must remain confidential is not revealed at any time.
- 3 It should be noted that it is not necessarily necessary to transmit an entire digital document to prove its date of precedence. In many cases, only a concise summary of the document called "digital fingerprint" or "hash code" (in English "Hashcode") is sent to the trusted third party, which generally returns a combination of digital fingerprint and date of reception encrypted with the private key of the trusted third party as proof to be preserved of authenticity. An example of a cryptographic hash function commonly used is “SHA” (in English “Secure Hash Algorithm”), standardized by the “National Institute of Standards and Technology” (NIST).
In order to fully dematerialize, at a global level, the proof of anteriority of digital documents it is possible to include the digital fingerprint of the digital document in a database distributed at a global level called "Blockchain" ("Blockchain" in English). This method makes it possible to distribute the evidence information publicly on enough independent websites worldwide to exceed the reputation of any trusted third party and avoid the disappearance of the evidence in the event of a major disaster, even of continental scope. A well known blockchain system is “Bitcoin” used to dematerialize monetary transactions (“Bitcoin: A Peer-to-Peer Electronic Cash System”, Nakamoto, Satoshi, May 24, 2009. An example of the use of the chain of "Bitcoin" blocks for the timestamping of electronic documents is described in "Decentralized Trusted Timestamping using the Crypto Currency Bitcoin", iConference 2015, Newport Beach, CA, USA, March 24-27, 2015, Bêla Gipp, Norman Meuschke and André Gernandt.
There are thus numerous electronic means of providing proof of the precedence of a digital document and a fortiori of a digital photograph. However, there are very few ways to guarantee its "posteriority", that is to say that an image was taken "after" a given date. Indeed, a person can very well acquire a digital photograph in the distant past and modify his time stamp data by a computer means or by having postdated the date of the camera at the time of the shooting and save this digital photograph much later in a timestamping system guaranteeing priority.
- 4 However, unlike many other digital data, it can be very difficult to falsify an image by introducing information that was not present in the real-world field of view. Indeed, the process of creating an image, like a photograph, is a very complex phenomenon which makes it possible to acquire simultaneously millions of points connected together by spatial relationships and representing very complex interdependencies of the real world. The more complex the photographed scene, including shadows, hidden parts and multiple inter-reflections, the more difficult it will be to introduce an element later that was not physically present in the image field without an image processing specialist is unable to detect falsification. At a closer level, any modification of the image causes a modification of the “noise” of the image, which corresponds to very small local variations in the light intensity and it is very difficult to introduce an element into this. image without disturbing this noise and making this disturbance detectable by those skilled in the art. Even if the eye can be deceived, a person skilled in the art has a whole series of tests which allow him to detect and certify whether the content of an image has been modified or not, which constitutes an area of forensic expertise.
Therefore, a timestamping mechanism to prove the posteriority of an image consists in including an external element difficult to invent in advance such as the first page of a daily newspaper, also called "A", because the " A "usually presents information that was unknown the day before. To be able to falsify this posteriority of the image, one must then be able to make in advance an impression of the first page of the day or to falsify the digital photography by introducing this page of newspaper undetectably for the man of art. It should however be noted the limits of this use of the newspaper, which relates in particular to a vague period of time during which this information may or may not be considered as being made public, because on the one hand the production of a newspaper involves many people able to know the "front page" before it is widely distributed and on the other hand the owners of the newspaper or certain journalists can influence the composition of the "front page" and therefore anticipate this "front page" to a certain extent.
- 5 SUMMARY OF THE INVENTION
The present invention is a method and a device for time stamping digital images providing both a guarantee of posteriority with respect to a first date and of anticipation with respect to a second date. It improves the state of the art of photographing the daily newspaper to define the posteriority date and then mark the anticipation using a certified timestamp. The present invention makes it possible to reduce to much less than a day the time interval between posteriority date and the anticipation date and thereby greatly reduces the risks of image falsification because this falsification must then occur in the very short time interval between the posteriority date and the anticipation date.
The present invention makes use of a first computer server capable of delivering a code unknown to the rest of the world before the posteriority date and of a second computer server capable of providing a certified time stamp of a joint and simultaneous digital image of the main subject and code unknown in advance.
The joint digital image of the subject and the unknown code in advance is understood in the broad sense and it may be a digital photograph having in its field of view a main subject and an unknown code in advance, the digitization of a photograph of the subject and the unknown code taken simultaneously or even the digitization of a document also presenting the unknown code in advance by means of a digital camera, a mobile phone, a digital scanner, a FAX, a video camera or any other image scanning system.
The concept of computer server is understood in the broad sense and may include a computer equipped with a processor or a group of computers, means for storing information and instructions, and communication capacities through a wired or non-wired network.
The posteriority and anticipation dates will be understood in the broadest sense and it will be advantageous to use a representation of universal time such as UTC for these.
The present invention may further comprise a third computer server making it possible to find in the data of the first and second servers the posteriority and anticipation dates from
- 6 of a digital image and transmit them. It may be advantageous for questions of data sharing and efficiency if the first, second and third computer servers are grouped into a single server which shares a single database and is able to both deliver the unknown code in advance, to certify the time stamp and to guarantee the posteriority and anticipation dates from the digital image.
One way of making this unknown code appear in advance in the digital image field consists in printing a representation of the unknown code in advance on the imaged subject or on one or more objects contained in the image field. This impression should be understood in the broad sense and it includes the possibility of manually drawing a representation of the unknown code in advance on the imaged subject, for example by writing on the skin of a human subject an alphanumeric representation of the unknown code in advance. by means of a dermographic marker or by writing this code manually on a document included in the shooting field.
Writing the code on the subject's skin has the advantage of making the common digital image of the subject and of the unknown code in advance extremely difficult to falsify by post image processing because of the strong interconnection between the subject and the code. Indeed, the subject and the code will have to present the same variations in image noise, lighting and reflections to be considered as non-falsified, which is very difficult to achieve afterwards undetectably, and moreover, the writing will present very local variations due to the texture of the skin which is also very difficult to counterfeit.
The printing means are understood in the broad sense. In addition to the possibility of manual writing, the invention can make use of a stand-alone printer or connected to a computer or a mobile phone, a FAX type device and many other printing means.
Another way to present the unknown code in advance in the image, which has the advantage of speed of updating, is that the first server is able to send the unknown code in advance to a computer terminal capable display a representation of this unknown code in advance and display this display in the shooting field of the digital image to be timestamped. This computer terminal is to be understood in the broad sense and it may be the screen of a computer, a computer tablet, a mobile phone or any other
- 7 electronic system with a screen. An important advantage is that in the case where this computer terminal is connected to the first computer server and the image scanning system is connected to the second server, the time interval between the posteriority and anticipation dates may be shorter. per second because the code can then be refreshed periodically and very frequently on this screen and the digital image or its digital fingerprint be transmitted immediately to the second server.
The advantage of greatly reducing the time thanks to this variant of the invention is that a person wishing to falsify a digital image taken very previously by including the information of the code unknown in advance will have only the time contained between the moment the first server sends the unknown code in advance and the second server receives the digital image or its digital fingerprint to falsify the digital image taken very early to make it appear the posteriority of the digital image compared to the code unknown in advance, which may prove in practice impossible.
Yet another way of presenting the code unknown in advance in the image field consists in projecting onto the subject the image of a representation of the code unknown in advance. An important advantage of this variant is the very strong interconnection between the subject and the code unknown in advance, which makes falsification of the common digital image of the subject and the code unknown in advance very difficult to achieve. There will then be an advantage in that the system which projects the unknown code in advance on the subject is connected to the first server in order to receive automatically and to be able to refresh periodically the projected image of the unknown code in advance on the subject and thus further reducing the time between the issuance of the unknown code in advance and the certified time stamp. It could for example be a digital video projector connected to a computer, itself connected to the first server, a portable projector connected to a mobile phone or other projection systems.
The image scanning system is to be understood in the broad sense. It could be a digital camera, a tablet or a mobile phone containing a camera, a scanner, a FAX, a video camera, a
- 8 x-ray instrument or any other device allowing to digitize an image.
In all cases, it will be advantageous for the digitization system to make it possible to transmit the digital image or the digital fingerprint of this digital image to the second server. There is indeed an advantage, for reasons of transmission rate, in transmitting to the second computer server a compact digital representation of the digital image such as a hash code obtained for example as a result of a cryptographic hash function. "SHA" standardized by NIST.
It will therefore be an advantage for the digitization system or the camera to be connected to a computer, itself connected to the second computer server, or even for the photographic system used for digitization to be integrated into a smart cell phone having a communication function with this second server, or else that the scanning system is a FAX type device capable of sending the digital image directly to the second server.
In all cases of the invention, except perhaps in the case of manual writing of the unknown code in advance on the subject, it will be advantageous to use instead of a simple alphanumeric representation of the unknown code d advance a representation by a two-dimensional image of the unknown code in advance. It could for example be a two-dimensional bar code, also called “2D bar code”, or a variant of 2D bar code called “QR code” (in English “QR Code”, for “Quick Response”). An important advantage of a two-dimensional representation of the unknown code in advance is the interconnection between the representation of the unknown code in advance and the subject, which makes the act of falsification even more complex.
Another advantage also of a representation by a two-dimensional image of the unknown code in advance and in particular of the 2D bar code is that it has the advantage of being able to be analyzed automatically from the digital image in order to be able to determine the previously unknown code in advance and deduce the exact date from which this code was released.
There may be an advantage if the representation by a 2D image of the unknown code in advance projected on the subject is visually undetectable in the common digital image of the subject and the unknown code
- 9 in advance but detectable only by image analysis algorithms known to those skilled in the art, using techniques very close to those used for digital watermarking of images (in English "Watermarking") . An example of a digital tattooing process is presented in "Embedding Secret Information into a Dithered Multilevel Image", Proceedings of IEEE Military Communications Conférence (1990), pp216-220, K. Tanaka, Y. Nakamura and K. Matsui. It could also be a watermark in the case of paper or screen printing.
Variants of the invention relate to the way in which the code unknown in advance is generated.
In the case where the owner of the first server is recognized as a trusted third party, a simple way of generating this unknown code in advance consists in maintaining on the first server a database containing a list of doublets consisting of a date and a '' a random code and to broadcast this random code only when this date is reached, the owner of the first server is responsible for ensuring the confidentiality of the code before its transmission. In the case of a random code calculated on a given date, it will be the responsibility of the owner of the first computer server to ensure that the algorithm for generating the random code cannot be determined by an outside person, for example by feeding the algorithm for generating the random code using a private digital key and also including in the code generation the date itself or external information.
The owner of the first server is then the guarantor of the correspondence between the code unknown in advance and its publication date, known as the posteriority date. It may be interesting for the owner of the first server to make public the list of correspondence between date and unknown code in advance once the posteriority date has passed in order to facilitate legal proof.
In another variant of the invention, still in which the owner of the first server is considered to be a trusted third party, the first server can encrypt an alphanumeric representation of the date by means of a private digital key known only to the owner of the first server . The advantage of this variant is that as long as the private key of the owner of the first server remains confidential to the latter, the posteriority certification has validated the reputation of the owner of the first server. Another
- 10 advantage is that if the owner of the first server makes his public key public, then any person is able to decrypt the date from the previously unknown code present in the digital image, which can have advantages in a part of the demonstration of legal proof. An example of embodiment consists for the owner of the first server to encrypt by means of a private key of PKI type a digital representation, for example Epoch, of UTC time and to make public the public key of the PKI doublet, which makes it possible to prove posteriority even if the owner of the first server or his private key disappears.
Another interesting variant of generating unknown code in advance, which eliminates the need to recognize the owner of the first server as a trusted third party, is to incorporate in the production of code unknown in advance, by means of of a deterministic algorithm, information which, while being public, could in no way be known in advance. An example of such information may be an instant share price, for example that of the CAC-40 or NASDAC, the evolution of which is unpredictable as a function of time. This type of information - value and instantaneous share price - is publicly disseminated and memorized by many financial websites. Another, scientific, way of generating the unknown code in advance may include unpredictable objective measures such as the intensity of the sun's activity at a given time, provided that one or more scientific sources are able to measure and to keep the list of these measures officially up to date. The code can be composed by means of one or more external sources of information unknown in advance and in this case there may be an interest in the owner of the first server making the deterministic algorithm for calculating the code public. from these public sources in order to allow everyone to be able to regenerate this code from a given date and associated public information and thus verify the posteriority date in complete independence from trusted third parties, independence which can have its importance in the context of a legal demonstration.
In all these variants, it may be advantageous to reduce the length of the unknown code in advance automatically generated from multiple information by using a digital fingerprint of the combination of this multiple information.
- 11 Variants of the invention also relate to the way in which time stamping is certified.
In the case where the owner of the second server is considered to be a trusted third party, a simple way of certifying the time stamp is for this owner of the second server to record in a database the digital image received or an electronic fingerprint of this digital image received as well as the date of receipt of this information by the second server. Thus, the owner of the second server can guarantee to have received the digital image before a given anticipation date.
It may be an advantage for the owner of the second server to make this database of fingerprint and date of reception public, in order to facilitate proof of prior art and in this case, the owner of the second server can also choose encrypt with a digital key which is private to him a couple consisting of the digital imprint and the date of reception, which allows him to transmit this information, as well as his public key and frees the owner of the second server from having to maintain this database itself.
It may also be an advantage for the owner of the second server to keep confidential this database of correspondences between digital images and reception dates and transmit the recorded reception date from the reception of a digital fingerprint by performing a search for this digital footprint in its own database.
In the event that the owner of the second server cannot be considered a trusted third party, there will be an advantage in having the owner of the second server use a blockchain mechanism in order to register with the global community. proof of earlier digital images or fingerprints received. An exemplary embodiment of this part of the invention is given in “Decentralized Trusted Timestamping using the Crypto Currency Bitcoin” already cited.
In all cases of embodiment of the invention, there is an advantage that a third computer server makes it possible to obtain the posteriority date from the code previously unknown in advance or from the digital image containing a representation previously unknown code in advance by searching the first server's database for
- 12 exists a previously unknown code corresponding in advance and in this case returning the corresponding posteriority date.
There is also an advantage in having a third computer server able to receive a digital image and calculate the digital fingerprint or to receive this digital fingerprint directly to search the data of the second server if this digital fingerprint is already registered and in this case return the associated anticipation date.
The advantage of the invention is thus to provide a method and a device in order to certify a posteriority date and an anticipation date of a digital image with a reduced time interval between these two dates in order to minimize the risk of counterfeiting of this digital image.
Another aspect of the invention relates to an image acquisition system comprising means for receiving an unknown code in advance and means for acquiring an image containing a representation of a subject (S) and a representation of 'an unknown code in advance. The image acquisition system is a separable element of the invention.
INTRODUCTION OF FIGURES
The accompanying drawings illustrate the invention:
- Figure 1 shows a method according to the invention.
- Figure 2 shows an additional step in the process for retrieving a priority date from a digital fingerprint.
- Figure 3 shows an additional step in the method for retrieving a posteriority date from a code previously unknown in advance.
- Figure 4 shows an additional step in the method for retrieving both a posteriority and anteriority date from a digital image.
- Figure 5 shows a device according to the invention.
- Figure 6 shows a variant of the device using a printing means.
- Figure 7 shows a variant of the device using a presentation screen.
- Figure 8 shows a variant of the device using a projector.
- Figure 9 shows a variant of the device for retrieving a priority date from a digital fingerprint.
- Figure 10 shows a variant of the device for retrieving a posteriority date from a code previously unknown in advance.
- Figure 11 shows a variant of the device for manufacturing an unknown code in advance from several sources of external information.
DETAILED DESCRIPTION
With reference to these drawings, a method of time stamping digital images according to the invention is presented in FIG. 1 and corresponds to the following steps:
- Manufacturing (100) on the posteriority date (P) by a first computer server of an unknown code in advance (C).
- Sending (200) by the first computer server of said unknown code in advance (C) to an image acquisition system.
- Memorization (300) by said first computer server of an association (C + P) between the posteriority date and said unknown code in advance.
- Acquisition (400) by the image acquisition system of an image (I) jointly containing a subject (S) and a representation of said previously unknown code (C).
- Digitization (500) of the image (I) and sending (610) of the digital image (IN) obtained, or failing this calculation and sending (620) of the digital imprint (EIN) of this digital image (IN ), to a second computer server which can be confused with said first computer server.
- Reception (710) on the priority date (A) by said second computer server of the digital image (IN) of which it calculates the digital imprint (EIN), or failing this reception (720) on the date of anteriority (A) of the digital imprint (EIN) of the digital image (IN).
- Storage (800) by this second computer server of a correspondence (EIN + A) between the digital fingerprint (EIN) and the priority date (A).
The dates (P) and (A) have a broad meaning and can include hours, minutes, seconds and fraction of a second; the Epoch representation of UTC is an interesting way to represent these dates. It will be interesting for the first server to be synchronized with the UTC, for example using the “NTP” protocol (in English “Network Time Protocol”) known to those skilled in the art.
The code unknown in advance (C) may only be known or knowable by the owner of the first computer server, or may be generated randomly on the posteriority date (P) by a method known only to the owner of the first computer server, or be generated using external data previously unknown by the owner of the first server. This unknown code in advance (C) can be encrypted with a private key specific to the owner of the first computer server who can choose whether or not to make this data public once the posteriority date (P) has been reached.
The image acquisition system is to be understood in a broad sense and may include a possibly digital camera, a mobile phone or a tablet equipped with a photographic device, a scanner, a FAX, a video camera or any other device. image acquisition and digitization. It may also include a computer connected to the second server and capable of collecting the digital image (IN), calculating the digital fingerprint (EIN) and transmitting it to the second server. There will be a particular interest in using a smart mobile phone equipped with a photographic lens because this mobile phone will even have without computer a computing capacity allowing to establish the digital footprint, as well as means of communication allowing to transmit this digital footprint to the second server.
Many ways to acquire a joint image of the subject (S) and a representation of the unknown code in advance (C) are available and may include the presence in the field of view of the image of a representation printed, displayed on a screen or projected with unknown code in advance (C). Various ways of representing the unknown code in advance (C) are possible, including an alphanumeric representation and / or a two-dimensional bar code or a QR code. In the case of a
- 15 printing, there is a particular interest in using a two-dimensional bar code or a QR code because these can be read automatically in a digital image by means of an image analysis algorithm known to the skilled in the art. Another simple way to display this unknown code in advance (C) by printing is to manually draw an alphanumeric representation of this unknown code in advance (C) on the subject (S) or on one or more objects close to the subject (S) and included in the image capture field (I). Printing can also be performed from a printer connected to a computer, a smart cell phone or a tablet, performed by a FAX or by any other electronic device capable of receiving a representation of the unknown code in advance and to print it. In the case of presentation on a screen, it may be the screen of a computer, a tablet, a smart mobile phone or any other electronic device including a screen and receiving the unknown code d advance (C) of the first computer server. In the case of projection, it may be a light projector connected to a computer, a smart mobile phone, a computer tablet or any other electronic device allowing to receive a representation of the unknown code in advance ( C) and project it.
The first and second computer servers may be separate or merged into a single computer server without changing the nature of the invention.
As indicated, the calculation of the digital footprint (EIN) of the digital image (IN) can be done either on the side of the image acquisition system or on the side of the second computer server without changing the nature of the invention. . Note that there is an advantage in calculating the digital footprint (EIN) on the side of the image acquisition system for reasons of information flow between this image acquisition system and the second computer server. . There is however also an interest, but without this being compulsory, in transmitting the digital image (IN) in order to be able to also store it on the second computer server and in this case the transfer of the digital image can be carried out in the background well after sending by the image acquisition system to the second computer server of the digital fingerprint (EIN). In the latter case, there will be an advantage if the priority date (A) is that of the first reception by the second
- 16 computer server between the reception of the digital fingerprint (EIN) and the reception of the digital image (IN).
At the time of the step of memorizing (800) the correspondence between digital fingerprint (EIN) and prior date (A), an interesting variant of the invention consists in adding a step of introducing a code formed to from the digital fingerprint (EIN) and the priority date (A) in a block chain. In this case, we can rely on the method proposed in “Decentralized Trusted Timestamping using the Crypto Currency Bitcoin” already mentioned.
A variant of the method according to the invention presented in the figure contains an additional step (900) which is executed after the memorization (800) of the correspondence (EIN + A) of the digital fingerprint (EIN) and the date of prior art (A) and is performed by a third server, possibly confused with the second server whose database it shares, said additional step (900) comprising the following sub-steps:
- Reception (910) of a second digital image (IN2) and calculation of a second digital imprint (EIN2), or failing this direct reception (920) of a second digital imprint (EIN2) of a second digital image ( IN2).
- Search (930) for the second digital fingerprint (EIN2) in the database of the second computer server.
- In the case where this second digital fingerprint (EIN2) corresponds (EIN2 = EIN) to the stored digital fingerprint (EIN), transmission (940) of the priority date (P) corresponding to the digital fingerprint (EIN) memorized.
This variant of the invention allows an external user to be able to recover or check the priority date (A) of a digital image (IN2) which he has or of which he has a digital fingerprint (EIN2).
A variant of the method according to the invention presented in the figure corresponds to an additional step (1000) which is executed after the memorization (800) of the correspondence (EIN + A) of the digital fingerprint (EIN) and of the date prior art (A) and is performed by a third server, possibly confused with the first server whose database it shares, said additional step (1000) comprising the following sub-steps:
- Reception (1010) of a second code previously unknown in advance (C2).
- Search (1020) for this second code previously unknown in advance (C2) in the database.
- In the case where this second previously unknown code in advance (C2) corresponds (C2 = C) to a previously unknown code in advance (C) memorized, returns (1030) the posteriority date (P) associated with the code previously unknown beforehand memorized.
This variant of the invention allows an external user to be able to retrieve or check the posteriority date (P) of a code previously unknown in advance (C2) which he has or which he reads, directly or by the through an image analysis algorithm, on a digital image (IN2) that it has.
A variant of the method according to the invention presented in FIG. 4 corresponds to an additional step (1100) which is executed after the memorization (800) of the correspondence (EIN + A) of the digital fingerprint (EIN) and the date prior art (A) and is performed by a third server, possibly confused with the first and the second server whose databases it shares, said additional step (1100) comprising the following sub-steps:
- Reception (1110) of a second digital image (IN2) containing a representation of a second code previously unknown in advance (C2),
- Determination (1120) of the second code previously unknown in advance (C2) from the digital image (IN2).
- Search (1130) for this previously unknown code in advance (C2) in the database of the first server.
- Calculation (1140) of a second digital fingerprint (EIN2) from the second digital image (IN2).
- Search (1150) of the second digital fingerprint (EIN2) in the database of the second server.
- In the case where the second previously unknown code in advance (C2) of step (1120) is equal (C2 = C) to the previously unknown code in advance (C) stored in step (100) and that the second digital fingerprint (EIN2) obtained in step (1150) is equal (EIN2 = EIN) to the stored digital fingerprint (EIN) obtained in step (710) or in step (720), transmits the posteriority date (P) associated with the previously unknown code in advance (C) stored and the anticipation date (A) corresponding to the stored digital fingerprint (EIN) corresponding to the digital image (IN2 = IN).
This particularly useful variant of the invention allows an external user to be able to obtain both the posteriority date (P) and the anticipation date (A) recorded from a digital image (IN2) which he has.
A device for time stamping digital images according to the invention presented in FIG. 5 consists of at least one computer server (1) capable of certifying the priority of digital documents, provided with a time measurement system ( 2), calculation means (3) and in particular the calculation of digital fingerprints of digital documents (31), means for storing (4), receiving (5) and sending (6) information, characterized in that said computer server has means enabling it:
- generate (32) an unknown code in advance (C) and store a pair (C + P) of data consisting of the unknown code in advance (C) and its creation date (P), date (P ) called posteriority,
- to transmit (6) this unknown code in advance (C),
- to receive (5) a digital image (IN) representation of this unknown code in advance (C) containing one and to calculate (31) the digital imprint (EIN) of the digital image (IN) or failing this directly receive the digital fingerprint (EIN) of this digital image (IN),
- memorize a pair of data (EIN + A) consisting of the digital imprint (EIN) of this digital image (IN) and the date of receipt (A) of the digital image (IN) or, failing that, the date of reception (A) of its digital fingerprint (EIN), date (A) known as of anticipation.
This device could be constituted by a computer connected to the Internet and able to receive and send information and provided with a computer program product able to chain the steps described in the process. One way to synchronize this computer with UTC time is to use the “NTP” protocol (in English “Network Time Protocol”) already mentioned for the process. One way to generate the unknown code in advance (C) is to generate a random number at time (P), for example using the "srand ()" function of the programming language
- 19 computing "C" to initialize a random sequence, possibly from the current time, then using the language function "C" "rand ()" to generate new random numbers. One way to calculate the digital footprint (EIN) of the electronic image (IN) is to use the “SHA” method (in English “Secure Hash Algorithm”), standardized by the “National Institute of Standards and Technology” (NIST ) American already mentioned.
In a variant of the device according to the invention, not shown in a figure, at least one computer server (1) according to the invention is able to insert a code formed from the digital fingerprint (EIN) and from the priority date (A) in a block chain. In this case, we can rely on an implementation of the method proposed in “Decentralized Trusted Timestamping using the Crypto Currency Bitcoin” already mentioned.
FIG. 6 presents a variant of the device according to the invention comprising a computer terminal (71) equipped with printing means capable of receiving a representation (RC) of the unknown code in advance (C) transmitted (6) by the computer server (1), computer terminal (71) capable of printing (RC1) this representation (RC) of the code unknown in advance (C).
Printing (RC1) is to be understood in the broad sense and it can be a simple paper or cardboard printing or a printing directly on the subject (S). The printing system (71) may be a printer connected to a computer, a smart cell phone or a tablet, a FAX or any other electronic device capable of receiving a representation of the unknown code in advance and the 'to print. The representation (RC) may be an alphanumeric code, a two-dimensional image of the 2D barcode or QR code type or any other representation of the code unknown in advance (C). The print (RC1) will be placed next to the subject (S) in the image capture field (I) or directly printed on the subject (S) which will be in the image capture field. the picture (I).
FIG. 7 presents a variant of the device according to the invention comprising a computer terminal (72) equipped with a screen capable of receiving from the computer server (1) a representation (RC) of the code unknown in advance (C), this terminal computer (72) being able to present (RC2) this representation (RC) of the unknown code in advance (C) on its screen. The computer terminal (72) can be a computer
- 20 provided with a screen, a tablet, a smart mobile phone or any other electronic device including a screen and capable of receiving and displaying the unknown code in advance (C) received from the computer server (1). The screen of this computer terminal (72) is placed next to the subject (S) in the image capture field (I) so that the presentation (RC2) is included in the image ( I). In a variant of the invention, the screen of the computer terminal (72) is the subject (S) itself.
FIG. 8 presents a variant of the device according to the invention comprising a computer terminal (73) capable of receiving from the computer server (1) a representation (RC) of the unknown code in advance (C) and of projecting (RC3) this representation (RC) of the unknown code in advance (C). The projection (RC3) is included in the image field (I).
The device according to the invention can be supplemented, according to FIGS. 6, 7 and 8 by an image acquisition and digitization system (8) capable of acquiring the joint image (I) of a subject (S) and a representation (RC) of the unknown code in advance (C) and to transmit (9) to one of the at least one computer server (1) a digitization (IN) of this image (I), or to defaults to a digital fingerprint (EIN) of this digital image (IN). The representation (RC) printed, shown on a screen or projected is placed next to the subject (S) or on the subject (S) in such a way that this representation (RC) is included in the field of view of the image acquisition system (8). The image acquisition and digitization system (8) is to be understood in the broad sense and it may be a photographic device associated with a scanner, a digital photographic device, a mobile telephone, '' a computer or tablet equipped with a photographic lens, a scanner, a FAX, a video camera or any other electronic image acquisition system. There will, however, be a particular interest in using a smart cell phone with a photographic lens because this cell phone will even have a computer capacity without a computer to establish the digital footprint and means of communication to transmit this digital fingerprint.
In a variant of the device according to the invention presented in FIG. 9, one of the at least one computer server (1) is able to receive (5) a second digital image (IN2) and to calculate its digital footprint (EIN2) , or failing that, able to receive a second
- 21 digital fingerprint (EIN2) of a second digital image (IN2), to search for in its storage capacity (4) the digital fingerprint (EIN) of the digital image (IN) and in the case where the two fingerprints numeric (EIN2) and (EIN) correspond, to transmit (6) the priority date (A) associated with the pair of stored data (EIN + A).
This variant of the invention allows an external user to be able to recover or check the priority date (A) of a digital image (IN2) which he has or of which he has a digital fingerprint (EIN2).
In a variant of the device according to the invention presented in FIG. 10, one of the at least one computer server (1) is able to receive (5) a second code previously unknown in advance (C2), to be searched for in its storage capacity (4) the previously unknown code in advance (C) stored and in the case where the second previously unknown code in advance (C2) and the previously unknown code in advance stored (C) match, to be transmitted (6) the posteriority date (P) associated with the stored data pair (C + P).
This variant of the invention allows an external user to be able to retrieve or check the posteriority date (P) of a code previously unknown in advance (C2) which he has or which he reads, directly or by the through an image analysis algorithm, on a digital image (IN2) that it has.
In a variant of the device according to the invention, still according to FIG. 10, one of the at least one computer server (1) is capable of receiving a new digital image (IN2) containing the representation of a second code previously unknown to advance (C2), to be analyzed using image analysis means (33) this second digital image (IN2) in order to extract the second code previously unknown in advance (C2), to be sought in its ability to storage (4) the previously unknown code in advance (C) stored and in the case where the second previously unknown code in advance (C2) and the previously unknown code in advance (C) stored correspond, to be transmitted (6 ) the posteriority date (P) associated with the stored data pair (C + P).
In a variant of the device according to the invention presented in FIG. 11, one of the at least one computer server (1) is able to receive (5) information from a set of computer servers (lb, le, ld, ...) capable of transmitting unknown information in advance (Cb, Ce, Cd, ...) and uses calculation means (34)
- 22 to establish the unknown code in advance (C) from this information unknown in advance (Cb, Ce, Cd, ...).
One way of establishing the unknown code in advance (C) in this case can consist in concatenating the various information previously unknown (Cb, Ce, Cd, ...) in a single digital document and in calculating a digital representation simplified of this digital document, such as for example a digital fingerprint of this document, by means of a hash code such as "SHA" (in English "Secure Hash Algorithm"), standardized by the "National Institute of Standards and Technology "(NIST) American already quoted. An example of an external source of information unknown in advance may be various stock market prices, streams of video data from continuous news channels or even scientific data of spatial origin from research institutes.
The method and the device according to the invention are particularly intended for establishing a posteriority date and an anticipation date for a digital image. The invention applies in particular to the case of clinical studies where digital images certified for their posteriority and anticipation dates make it possible to provide additional guarantees that the study protocol is well respected as regards is operations carried out and deadlines imposed in a study.
权利要求:
Claims (21)
[1" id="c-fr-0001]
1) Method for time stamping digital images making it possible to establish that a digital image has been acquired after a first date known as posteriority (P) and before a second date known as prior art (A), comprising the following steps:
- Manufacturing (100) before the posteriority date (P) by a first computer server of an unknown code in advance (C).
- Sending (200) on the posteriority date (P) by the first computer server of the unknown code in advance (C).
- Memorization (300) by said first computer server of an association (C + P) between the posteriority date (P) and said unknown code in advance (C).
- Reception (710) on the priority date (A) by a second computer server of the digital image (IN) of a subject (S) and a representation of the code unknown in advance (C) and calculation of a digital footprint (EIN) of the digital image (IN), or reception (720) on the priority date (A) by the second computer server of the digital footprint (EIN) of the digital image (IN).
- Memorization (800) by the second computer server of a correspondence (EIN + A) of the digital fingerprint (EIN) and the date of priority (A).
[2" id="c-fr-0002]
2) Method according to claim 1 characterized in that during the reception (710) of a digital image (IN) or the reception (720) of its digital footprint (EIN) by the second computer server, the second computer server inserts into a block chain a code (EIN + A) established from the digital fingerprint (EIN) of the digital image (IN) and the priority date (A).
[3" id="c-fr-0003]
3) Method according to one of claims 1 to 2 characterized in that in the step of calculating (100) the unknown code in advance (C), it is made from information unknown in advance from one or more external sources of information.
[4" id="c-fr-0004]
4) Method according to one of claims 1 to 3 characterized in that it comprises an additional step (900) which is executed after the memorization (800) of the correspondence (EIN + A) of the digital fingerprint (EIN ) and the priority date (A) and is performed by a third server having access to the database of the second server, said additional step (900) comprising the following sub-steps:
- Reception (910) of a second digital image (IN2) and calculation of a second digital imprint (EIN2), or failing this direct reception (920) of a second digital imprint (EIN2) of a second digital image ( IN2).
- Search (930) for the second digital fingerprint (EIN2) in the database of the second computer server.
- In the case where this second digital fingerprint (EIN2) corresponds (EIN2 = EIN) to the stored digital fingerprint (EIN), transmission (940) of the priority date (P) corresponding to the digital fingerprint (EIN) memorized.
[5" id="c-fr-0005]
5) Method according to one of claims 1 to 4 characterized in that it comprises an additional step (1000) which is executed after the memorization (800) of the correspondence (EIN + A) of the digital fingerprint (EIN ) and the priority date (A) and is performed by a third server having access to the database of the first server, said additional step (1000) comprising the following sub-steps:
- Reception (1010) of a second code previously unknown in advance (C2).
- Search (1020) for this second code previously unknown in advance (C2) in the database.
- In the case where this second previously unknown code in advance (C2) corresponds (C2 = C) to a previously unknown code in advance (C) memorized, returns (1030) the posteriority date (P) associated with the code previously unknown beforehand memorized.
[6" id="c-fr-0006]
6) Method according to one of claims 1 to 5 characterized in that it comprises an additional step (1100) which is executed after the memorization (800) of the correspondence (EIN + A) of the digital fingerprint (EIN ) and the priority date (A) and is performed by a third server having access to the databases of the first and of the second server, said additional step (1100) comprising the following substeps:
- Reception (1110) of a second digital image (IN2) containing a representation of a second code previously unknown in advance (C2),
- Determination (1120) of the second code previously unknown in advance (C2) from the digital image (IN2).
- Search (1130) for this previously unknown code in advance (C2) in the database of the first server.
- Calculation (1140) of a second digital fingerprint (EIN2) from the second digital image (IN2).
- Search (1150) of the second digital fingerprint (EIN2) in the database of the second server.
- In the case where the second previously unknown code in advance (C2) of step (1120) is equal (C2 = C) to the previously unknown code in advance (C) stored in step (100) and that the second digital fingerprint (EIN2) obtained in step (1150) is equal (EIN2 = EIN) to the stored digital fingerprint (EIN) obtained in step (710) or in step (720), transmits the posteriority date (P) associated with the previously unknown code in advance (C) stored and the anticipation date (A) corresponding to the stored digital fingerprint (EIN) corresponding to the digital image (IN2 = IN).
[7" id="c-fr-0007]
7) Method according to one of claims 1 to 6 characterized in that it comprises between the step of sending (200) the unknown code in advance (C) and that of receiving (710) of the digital image (IN) or reception (720) of the digital fingerprint (EIN) of the digital image (IN) the following steps:
- Acquisition (400) by the image acquisition system of an image (I) jointly containing a subject (S) and a representation of the unknown code in advance (C) sent by the first server.
- Digitization (500) of the image (I) and sending (610) of the digital image (IN) obtained, or calculation and sending (620) of the digital fingerprint (EIN) of this digital image (IN), to the second computer server.
[8" id="c-fr-0008]
8) Method according to one of claims 1 to 7 characterized in that a representation of the unknown code in advance (C) is printed on the subject or on one or more objects and that at least one representation of the unknown code d 'advance is contained in the field of view of said image (I).
[9" id="c-fr-0009]
9) Method according to one of claims 1 to 7 characterized in that a representation of the unknown code in advance (C) is displayed on one or more screens contained in the shooting field of said image (I).
[10" id="c-fr-0010]
10) Method according to one of claims 1 to 7 characterized in that a representation of the unknown code in advance (C) is projected onto the subject (S) or onto one or more objects and that the projection of at least a representation of the unknown code in advance (C) is contained in the shooting field of said image (I).
[11" id="c-fr-0011]
11) Time-stamping device for digital images comprising at least one computer server (1) capable of certifying the priority of digital documents, provided with a time measurement system (2), calculation means (3) and in particular the calculation of digital fingerprints of digital documents (31), of storage means (4), of reception (5) and of sending (6) of information, characterized in that said computer server has means allowing:
- generate (32) an unknown code in advance (C) and store a pair (C + P) of data consisting of the unknown code in advance (C) and its creation date (P), date (P ) called posteriority,
- to transmit (6) this unknown code in advance (C), to receive (5) a digital image (IN) of a subject (S) and of a representation of the unknown code in advance (C) and calculate (31) the digital footprint (EIN) of the digital image (IN), or receive directly
The digital imprint (EIN) of this digital image (IN), to memorize a data pair (EIN + A) consisting of the digital imprint (EIN) of this digital image (IN) and the date of reception (A ) of the digital image (IN) or, failing that, of the date of receipt (A) of its digital imprint (EIN), date (A) known as prior art.
[12" id="c-fr-0012]
12)
Device according to claim 11, characterized in that one of the at least one computer server (1) is capable of receiving (5) a second digital image (IN2) and of calculating its digital footprint (EIN2), or failing this suitable to receive a second digital imprint (EIN2) of a second digital image (IN2), to search in its storage capacity (4) for the digital imprint (EIN) of the digital image (IN) and in the case where the two digital fingerprints (EIN2) and (EIN) correspond, to transmit (6) the
- 27 anticipation date (A) associated with the stored data pair (EIN + A).
[13" id="c-fr-0013]
13) Device according to one of claims 11 to 12 characterized in that one of at least one computer server (1) is capable of receiving (5) a second code previously unknown in advance (C2), to be searched for in its storage capacity (4) the previously unknown code in advance (C) stored and in the case where the second previously unknown code in advance (C2) and the previously unknown code previously stored (C) correspond, to transmit (6) the posteriority date (P) associated with the pair of memorized data (C + P).
[14" id="c-fr-0014]
14) Device according to one of claims 11 to 13 characterized in that one of at least one computer server (1) is capable of receiving a new digital image (IN2) containing the representation of a second code previously unknown to advance (C2), to be analyzed using image analysis means (33) this second digital image (IN2) in order to extract the second code previously unknown in advance (C2), to be sought in its ability to storage (4) the previously unknown code in advance (C) stored and in the case where the second previously unknown code in advance (C2) and the previously unknown code in advance (C) stored correspond, to be transmitted (6 ) the posteriority date (P) corresponding to the stored data pair (C + P).
[15" id="c-fr-0015]
15) Device according to one of claims 11 to 14 characterized in that one of at least one computer server (1) is able to include in a block chain a code (EIN + A) established from the date anteriority (A) and the digital imprint (EIN) of the digital image (IN).
[16" id="c-fr-0016]
16) Device according to one of claims 11 to 15 characterized in that one of at least one computer server (1) is able to receive (5) information from a set of servers (lb, le, ld, ...) capable of transmitting information unknown in advance (Cb, Ce, Cd, ...) and uses calculation means (34) to establish the unknown code in advance (C) from this information unknown in advance (Cb, Ce, Cd, ...).
[17" id="c-fr-0017]
17) Device according to one of claims 11 to 16 characterized in that it comprises a computer terminal (71) equipped with printing means, that one of the at least one computer server is capable of transmitting (6) a representation (RC) of the unknown code in advance (C) to this computer terminal (71) and this computer terminal (71) is able to print (RC1) this representation (RC) of the unknown code in advance (C).
[18" id="c-fr-0018]
18) Device according to one of claims 11 to 16 characterized in that it comprises a computer terminal (72) equipped with a screen, that one of the at least one computer server (1) is capable of transmitting a representation (RC) of the unknown code in advance (C) to this computer terminal (72) and that this computer terminal (72) is able to present (RC2) this representation (RC) of the unknown code in advance (C) on its screen.
[19" id="c-fr-0019]
19) Device according to one of claims 11 to 16 characterized in that it comprises a computer terminal (73) capable of projecting an image, that the computer server is able to transmit a representation (RC) of the unknown code in advance to this computer terminal (73) and that this computer terminal is able to project (RC3) this representation (RC) of the code unknown in advance (C).
[20" id="c-fr-0020]
20) Device according to one of claims 11 to 19, characterized in that it comprises an image acquisition and digitization system (8) capable of acquiring the joint image (I) of a subject (S ) and a representation (RC) of the unknown code in advance (C) and to transmit (9) to one of the at least one computer server (1) a digitization (IN) of this image (I), or failing this, a digital imprint (EIN) of this digital image (IN).
[21" id="c-fr-0021]
21) A computer program product comprising instructions for, when executed by a processor, implementing the steps of the method according to one of claims 1 to 7.
1/7
类似技术:
公开号 | 公开日 | 专利标题
EP3346442B1|2022-02-02|Methods and devices for timestamping digital images
EP0763803B1|1999-12-15|Anonymous information counting system for statistics, particularly for electronic voting operations or periodical consumption inventory
EP2279581A1|2011-02-02|Method of secure broadcasting of digital data to an authorized third party
EP2301187A1|2011-03-30|Terminal for strong authentication of a user
EP1522168B1|2009-08-26|Method, system and computerized medium for making secure message transmission
EP1168810B1|2004-01-21|Mobile telephone equipped with a camera
FR3070079B1|2019-08-16|METHOD FOR ELECTRONIC SIGNATURE OF A DOCUMENT BY A PLURALITY OF SIGNATORIES
EP1040619B1|2007-06-06|Device for authenticating digital images
BE1023971B1|2017-09-26|METHOD FOR ELECTRONIC SIGNATURE OF A DOCUMENT
FR3073643A1|2019-05-17|METHOD FOR OBTAINING A DIGITAL IDENTITY OF HIGH LEVEL OF SECURITY
WO2018104114A1|2018-06-14|Method for recording a multimedia content, method for detecting a mark within a multimedia content, corresponding devices and computer programs
KR20220010613A|2022-01-25|How to combine digital representations of real-world events with real-time events as they occur
EP3940563A1|2022-01-19|Method for generating an authentication key from the image of a watermark and associated device
CA3012136C|2021-08-03|Standard method for anonymous transfer of digital data between two sides
EP3742699B1|2022-03-09|Method for strong authentication of an individual
EP3731116B1|2021-08-11|Method of authenticating an identification document of an individual and authenticating said individual.
WO2019129939A1|2019-07-04|Method for posterior timestamping of digital representations of analog variables as a result of conclusive acquisition set values based on the variate of a blockchain
FR3095874A1|2020-11-13|PROCESS FOR GENERATING AN ARCHIVING CODE TO CREATE A FOOTPRINT OF MULTIMEDIA CONTENT
EP2665016B1|2019-03-20|Communicating limited-access messages between devices
WO2019233951A1|2019-12-12|A software application and a computer server for authenticating the identity of a digital content creator and the integrity of the creator's published content
WO2022028788A1|2022-02-10|Method for generating a secure digital document stored on a mobile terminal and associated with a digital identity
FR3066292A1|2018-11-16|METHOD FOR RECORDING AND STORING DATA RELATING TO FOODSTUFFS
FR3032652A1|2016-08-19|METHOD FOR EDITING A SECURE DOCUMENT AND VERIFYING THE INTEGRITY AND AUTHENTICITY OF SUCH A DOCUMENT TRANSMITTED TO A THIRD PARTY
FR3046688A1|2017-07-14|DEVICE FOR ASSISTING THE REFERENCING OF DIGITAL DOCUMENTS
FR2892875A1|2007-05-04|METHOD OF SECURING PAYMENTS BY CUTTING AMOUNTS
同族专利:
公开号 | 公开日
EP3346442A1|2018-07-11|
US10924290B2|2021-02-16|
FR3061792B1|2020-11-06|
US20180197007A1|2018-07-12|
EP3346442B1|2022-02-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20160119152A1|2013-12-02|2016-04-28|Guardtime Ip Holdings Limited|Non-deterministic time generation and event-association system|
WO2015173001A1|2014-05-12|2015-11-19|Koninklijke Philips N.V.|Verification of images captured using a timestamp decoded from illumination from a modulated light source|
US20040039912A1|1999-02-26|2004-02-26|Bitwise Designs, Inc. To Authentidate Holding Corp.|Computer networked system and method of digital file management and authentication|
US6948069B1|1999-07-02|2005-09-20|Time Certain, Llc|Method and system for determining and maintaining trust in digital image files with certifiable time|
US6754657B2|2001-08-24|2004-06-22|Microsoft Corporation|Time stamping of database records|
US7055008B2|2003-01-22|2006-05-30|Falconstor Software, Inc.|System and method for backing up data|
JP4424422B2|2008-01-18|2010-03-03|富士ゼロックス株式会社|Information processing apparatus, information processing system, and program|
US20180205546A1|2016-12-31|2018-07-19|Assetvault Limited|Systems, methods,apparatusesfor secure management of legal documents|CN109754242B|2019-01-11|2020-07-17|北京阿尔山区块链联盟科技有限公司|Mnemonic generating method and device and electronic equipment|
GB2584317A|2019-05-30|2020-12-02|Hoptroff London Ltd|System for watermarking time, place and identity|
GR20200100185A|2020-04-09|2021-11-11|Δημητριος Χρηστου Πατουνας|Method for time-stamping a data set|
法律状态:
2017-12-22| PLFP| Fee payment|Year of fee payment: 2 |
2018-07-13| PLSC| Publication of the preliminary search report|Effective date: 20180713 |
2020-01-06| PLFP| Fee payment|Year of fee payment: 4 |
2020-12-11| PLFP| Fee payment|Year of fee payment: 5 |
2021-12-13| PLFP| Fee payment|Year of fee payment: 6 |
优先权:
申请号 | 申请日 | 专利标题
FR1770032A|FR3061792B1|2017-01-10|2017-01-10|METHOD AND DEVICE FOR TIME-STAMPING DIGITAL IMAGES|
FR1770032|2017-01-10|FR1770032A| FR3061792B1|2017-01-10|2017-01-10|METHOD AND DEVICE FOR TIME-STAMPING DIGITAL IMAGES|
US15/827,091| US10924290B2|2017-01-10|2017-11-30|Method and device to timestamp a digital image|
EP17020590.0A| EP3346442B1|2017-01-10|2017-12-22|Methods and devices for timestamping digital images|
[返回顶部]