Title of Invention

"SYSTEM FOR AUTHENTICATING DIGITAL DATA"

Abstract To provide a system for authenticating digital data capable of preventing change or disguise of data by improvement or interchange in case of no confidentiality in the data itself so as to maintain the data. [Constitution] When writing digital data from input device 100 to memory 200 and transferring the digital data from memory 200 to receiving device 300, device authentication is performed between the input device and the memory and between the memory and the receiving device respectively. At the same time, when writing digital data to memory 200, in the case of implementing on the digital data an electronic signature by a one-way hash function and also reading from memory 200 and transferring the digital data, the implemented electronic signature is decrypted so as to transfer the digital data after ensuring that it has not been changed since it was recorded. Thus, it is possible to prevent change or disguise of data by improvement or interchange in case of no confidentiality in the data itself so as to maintain the data
Full Text Detailed Description of the Invention:
[Field of the Invention]
The present invention relates to a system for recording digital data for maintenance, namely prevention of tampering or changing of digital data transferred via memory for temporarily storing data from a digital data input device such as a digital camera, particularly to a system capable of preventing changes to a digital photograph for assessment of non-life insurance or for recording work on a building site taken by a digital camera.
[Background art]
In recent years, digital data is increasingly used in a number of fields due to rapid proliferation of consumer digital devices such as a digital camera. However, digital data is accompanied by a risk to be used as evidence since there is a danger of contents being changed without leaving a trace. In order for a recipient of data to trust any data, there should be a means for assuring

that the data has not been changed since it was acquired.
As a method to prevent tampering or changing of digital data, there are methods such as MAC (Message Authentication Coding) where an electronic signature created by a one-way hash function is transferred being attached to the data. In the case of a digital image, it is also possible to further enhance conformity of the electronic signature with an embedded image by using an electronic watermark in the image (for instance, Japanese Unexamined Patent Publication No. Hei 10-164549) .
[Problems to be Solved by the Invention]
However, if application to a digital photograph which supposedly needs this technology most of all is considered, it will be inside a camera that an electronic signature is implemented. In that case, a more reliable system is desired since an encryption key stored in the camera is fixed in addition to high load of computation on the camera. Namely, a method which is implementable

within constraints of current hardware and capable of ensuring necessary and sufficient integrity of data has been required.
An object of the present invention is to resolve the above-mentioned problem and to provide a system for authenticating digital data capable of preventing change or disguise of data by improvement or interchange in case of no confidentiality in the data itself so as to maintain the data.
[Summary of the Invention]
The present invention covers a system for writing digital data entered from an input device to a memory and transferring the digital data written in the memory to a receiving device. In this system, first of all, when writing digital data from the input device to the memory and transferring the digital data from the memory to the receiving device, devices are authenticated between the input device and the memory and between the memory and the

receiving device respectively. At the same time, when writing digital data to the memory, in the case of implementing on the digital data an electronic signature by a one-way hash function and also reading from the memory and transferring the digital data, the implemented electronic signature is decrypted so as to transfer the digital data after ensuring that it has not been changed since it was recorded.
In the present invention, first of all, when writing data from an input device for digital data to a memory and transferring the data from the memory to a receiving device, it is possible to authenticate the respective device so as to limit a data transfer route to the receiving device via the memory from the input device of digital data. It is also possible, when recording data in the memory, to prevent any change of data caused by a direct access to the memory by implementing on the data an electronic signature by a one-way hash function, preferably by a built-in CPU. This can prevent change or disguise of data by improvement or interchange in case of

no confidentiality in the data itself so as to maintain the data.
4. Brief Description of the Drawings:
Fig. 1 is a drawing for describing an example of a system
for authenticating digital data of the present invention.
Fig. 2 is a drawing showing the concept of authentication
and data flow in the present invention.
Fig. 3 is a drawing showing an example of an internal
structure of Compact Flash.
Fig. 4 is a drawing showing an example of a physical
format of Compact Flash.
Fig. 5 is a drawing showing a page model in Compact Flash.
[Preferred Embodiments]
Fig. 1 is a drawing for describing an example of a system
for authenticating digital data of the present invention.
In the example shown in Fig. 1, input device 100 is a digital camera, memory 200 is a Compact Flash, receiving device 300 is a personal computer for managing image data. Memory 200 is not limited to a detachable style and may be a memory built into a camera. Moreover, in the following description, "ordinary data transfer" means data transfer which operates properly even with an unspecified device without authentication. Furthermore, a digital camera with an authentication feature related to the present invention is referred to as SDC (Secured Digital Camera), a memory with an authentication feature related to the present invention as SCF (Secured Compact Flash), and a personal computer with an authentication feature related to the present invention as SPC (Secured Personal Computer) . In addition, a DC, a CF and a PC refer to a
digital camera, a Compact Flash, and a personal computer in general respectively.
First, a prerequisite for implementing a system for
authenticating digital data of the present invention is
described. To begin with, specific and common commands
(Request Seed and Send Seed commands) are defined among
input device 100, memory 200 and receiving device 300
which are specified. While a general device returns an
error to these commands, it results in time-out. Request
Seed command is a command which requests to throw a seed
to a client, and Send Seed command is a command which
informs a client that a seed is to be thrown. Next,
between input device (SDC) 100 and memory (SCF) 200 which
are specified, they have a specific encryption function
Hdc and its key Kdc. Memory 200 also has a certain hash
function Hcf and an internal key Kef. They are stored in
a ROM of their respective devices and do not leak out of
the devices. Even in case Hdc or Hcf leaks out, however,
confidentiality is maintained.
Next, between memory (SCF) 200 and receiving device (SPC) 300 which are specified, they have a specific mutual encryption function Hpc and its key Kpc. In memory 200, Kpc is stored in NAND record space 210, encrypted by a certain encryption function Ex and its key Kx. Hpc, Ex and Kx are stored in a ROM of SCF. Also in receiving device 300, Kpc is encrypted by a certain encryption function E2pc and its key password. The password is either stored where an owner of SCF cannot access or itself encrypted. It is described in detail later. The functions of the devices in each process are described as follows, referring to Fig. 1.
(1) Recording a digital image to memory:
In Fig. 1, an image obtained at image capture section 110 is recorded in NAND record space 210 of memory 200 by way of image processing section 120. As for memory 200, when it receives a request for writing data from input device 100, authentication section 231 of memory 200 performs device authentication to authentication section 130 of

input device 100 by way of built-in CPU 220. If authentication is successful, an authentication flag is written when data recording is implemented from image processing section 120 to NAND record space 210. This authentication may also be configured to repeat intermittently even while data transfer continues so as to enhance a security level and so as not to have a device replaced after success of device authentication. Its contents are described later. The following explains an actual process.
(1.1) SDC throws a Request Seed command to CF and requests
a certain random number (= Rl). In this case, if an error
is returned or there is no response, SDC determines that
CF is not SCF and performs ordinary data transfer.
(1.2) SCF returns Rl to SDC. If an ordinary write command
is received before a seed is requested, SCF determines
that DC is not SDC and performs ordinary data transfer.
(1.3) SDC starts data transfer. CF usually repeats data
transfer of one page (= 512 bytes) 256 times at the
maximum per write command.

(1.4) If Rl is returned from CF in (1.2), SDC calculates
by the following expression (1) R_Ed which is Rl encrypted
by using a key Kdc and returns it to CF. Kdc is a secret
key between SDC and SCF.
R_Ed = Hdc (Kdc, Rl) (1)
(1.5) SCF calculates the above expression (1) by using Hdc
and Kdc which it has and Rl which was sent to DC, so as to
check if R_Ed matches what came from DC. If R_Ed does not
match it, it is determined that DC is not SDC, and data
transfer for the write command this time becomes an
ordinary data transfer including that page.
(2) Data protection in memory:
If R_Ed matches in the above (1.5), SCF further attaches, before next authentication is performed, an authentication mark (flag) generated at the CPU to an image to be recorded to a receiving page and implements an electronic signature to record it in NAND record space 210. If there is no authentication, it records it without attaching any authentication mark. CF has a redundant area of 16 bytes per page not to be calculated by ECC, and 4 bytes of the

area is a reserved area in which the flag can be written. Detailed configuration of a Compact Flash is described later. While an authentication mark is acquired by taking hash of the sent data, if it is costly to take hash for all of the data, data to be hashed may also be determined by cipher. In this case, although there should be concern about security because hash is not taken from the entire data, security is considered to be sufficiently maintained since data from DC is normally compressed by JPEG and changing data itself by swapping by the portion (1 byte for instance) is very difficult. Here, for calculation of hash, Kef which is a unique key to each SCF built into a ROM of SCF is used. As long as Kef is confidential, hash function Hcf itself does not need to be confidential.
When transferring data to receiving device 300, memory 200 decrypts with a built-in CPU an electronic signature attached to an image by using data authentication algorithm Hcf and nonpublic key Kcf, and returns a correct answer to authentication between SCF and PC mentioned later after ensuring that the image has not been changed

since it was recorded. In case change is detected, it returns an error to authentication between SCF and PC.
(3) Data transfer from a memory to a receiving device: Any data recorded in NAND record space 210 of memory 200 is transferred to record space 310 of receiving device 300. On this occasion, device authentication is performed between authentication section 232 of memory 200 and authentication section 320 of receiving device 300, and only if authentication is successful, data transfer is implemented from NAND record space 210 to record space 310. When reading data from memory 200, receiving device 300 performs authentication to authentication section 232 of memory 200 based on mutually common encryption function Hpc and nonpublic key Kpc specified by receiving device 300 so as to verify that it is the normal receiving device 300. In addition, as mentioned above, when transferring data to receiving device 300, memory 200 ensures with a built-in CPU that the image has not been changed since it was recorded by using data authentication algorithm Hcf and nonpublic key Kcf, and then transfers to receiving

device 300 the data indicating that it is already ensured. It is possible to verify that the data is the data which came trough a limited route from predetermined input device 100 based on authentication of memory 200 and information of "confirmation of no change" communicated from memory 200. The following shows a concrete process.
(?.l) SPG throws a Send Seed command to CF and informs that a certain random number (= R2) is to be thrown.
(3.2) SPC returns R2 to CF.
(3.3) SPC starts reading data. CF usually repeats data
transfer of one page (= 512 bytes) 256 times at the
maximum per read command.
(3.4) SCF first checks by using Hcf and Kef whether the
data to be read by PC is correctly flagged. If not
correctly flagged, it determines that the data is not
specified and returns an error to authentication for a
read command this time.
(3.5) If it is correctly flagged, SCF calculates the
following expression (2) for the transmitted R2 and
returns R Ep to PC. Kpc is a secret key between SCF and

SPC.
R_Ep = Hpc (Kpc, R2) (2)
(3.6) SPC calculates the above expression (2) by using Hpc
and Kpc which it has and R2 which was sent to CF, so as to
check if the calculated R_Ep matches what came from SCF.
If they do not match, it determines that CF or the data to
read is not what is specified.
(3.7) If a result of calculating R_Ep matches what came
from CF, to the read data to be covered, SPC sends a seed
and performs authentication at least once each time a read
command is sent until all has been read, and only in the
case that authentication was correctly performed to all
the pages, it determines that the data came from SDC by
way of SCF without being changed. By this series of
operations, SPC can verify a source of the received data
and whether or not it has been changed. Fig. 2 shows the
concept of the above-mentioned authentication and data
flow from SDC to SPC via SCF.
Next, a structure of a Compact Flash which is suitably usable in the above-mentioned system for authenticating

digital data of the present invention is described. Compact Flash is small nonvolatile memory released from SanDisk in 1994, PCMCIA-ATA compatible and electrically and mechanically usable as a PCMCIA card of Typell . It has capacity of 4MB, 8MB, 16MB and so on and has a wide range of uses including storage of a JPEG image (50KB to 100KB) taken by a digital camera. A major characteristic of Compact Flash is that it has a built-in CPU in spite of its small size and bulk. Fig. 3 shows an example of an internal structure of Compact Flash, Fig. 4 an example of physical format specifications (8MB) and Fig. 5 an example of a page model. In the present invention, flags are written to a Reserved Area which is a redundant area shown in Fig. 5.
The above concluded description of the main part of a system for authenticating digital data of the present invention. Next, with regard to the other alternatives of operation, examples of operation by a public key, multiplexing of an authentication sector and encryption of Kpc in a PC are described. First,

(4) Operation by a public key:
In an authentication facility between SDC and SCF, it is possible to utilize a public key system so as to make it more difficult to write to SCF any image changed by "disguise" of a camera. This can be attained by providing the camera side with a secret key for encrypting data for challenge and the SCF side with a public key for authenticating a reply from the camera.
(5) Multiplexing of an authentication sector: In device authentication, a subject device (SCF in the case of SDC and SCF, SPC in the case of SCF and SPC) sends data for challenge to the other party's device, and concludes it by verifying with cipher on hand the data translated by predetermined encryption and returned. If a device authentication process and following data transfer are separated, there is a danger that "disguise" of a device may occur by switching to a next input device as soon as authentication is completed. To prevent this, it is arranged so that authentication data, mixed with transfer data, is continuously sent from the input device.

A rule for mixing authentication data is to generate it from a reply after encrypting challenge data (R_Ed, R_Ep), and the other party's device is authenticated by both direct transfer of authentication data and a rule for transferring that data.
(6) An example of encryption of Kpc in a PC:
First, the restrictive conditions in this configuration
are as follows.
1. For any attack on contents of a ROM in SDC and SCF, it
is taper resist in which a code of a ROM cannot be
analyzed from outside and contents of a ROM cannot be
analyzed even if it is decomposed. Accordingly, the keys
in it (Kdc, Kcf and Kx) cannot be attacked, either.
2. Since Kpc, an encryption key for uploading in SPC is
managed by SPC administrator and encrypted, it cannot be
estimated by an owner of SCF. In case there is a
possibility that an owner of SCF may decrypt an uploaded
program of a PC and estimate Kpc in that PC, the following
measures may be taken.

(a) When installing Kpc:
When installing Kpc, a PC administrator calculates Kpc' which is Kpc encrypted by the following expression (3) and stores it in a PC.
Kpc1 = E2pc (password, Kpc) (3)
Here, E2pc is an encryption function for encrypting Kpc, and the password is one that only a PC administrator can know. It also stores in a PC a password' which is the password hashed by the following expression (4). In this case, the password itself is not stored.
Password' = Hpasw (password) (4)
Here, Hpasw is a one-way hash function.
(2) When authenticating between SCF and SPC
An SPC administrator enters a password. An uploaded program of SPC calculates expression (4) from the entered password, and if the calculated value matches the stored password', calculates Kpc from the following expression (5) and use it for authentication. Kpc = D2pc (password, Kpc1)

Here, D2pc is a decoding function for E2pc, and the following expression (6) holds for arbitrary values x, y.
x = D2pc (y, E2pc (y, x)) (6)
In this method, even if a malicious person successfully locates Kpc1, a password', E2pc, D2pc and Hpasw, it is impossible to estimate Kpc from there.
The above-mentioned advantages of the present invention are summarized as follows.
(1) Since device authentication is performed between SDC
and SCF and between SCF and SPC respectively, it is
possible to limit a data transfer route from an input
device to a receiving device.
(2) Data transfer between SDC and SCF and between SCF and
SPC are intermittently authenticated by multiplexing an
authentication sector to data so as to allow prevention of
substitution of an input device without authentication
after successful authentication of a device.
(3) When recording data in a memory area of SCF, since a
signature is implemented by a hash function using a secret
key in a ROM of SCF, it can prevent NAND record space 210

from being decomposed and replaced by any changed data.
(4) Since authentication keys with SDC and SPC (Kdc and
Kpc) are encrypted by a secret key in a ROM (Kx), they
cannot be stolen even if NAND record space 210 of SCF is
decomposed.
(5) Even if device authentication was not performed or
failed, data can be recorded in NAND record space 210 and
read out in the same manner as an ordinary CF. However,
it is not authenticated.
(6) Since the system of the present invention can be
implemented by modification of a program built into
existing hardware, it does not put much of a burden upon a
camera manufacturer so that it is expected to spread in
the market as a de facto standard.
[Advantages of the Invention]
As it is clear from the above description, the present invention can assure maintenance of data of an input device and a receiving device of digital data in an inexpensive and effective manner so as to allow a digital photograph to become admissible evidence. In addition,

since introduction of this technology can be materialized by modification of a program built into existing hardware, it does not put much of a burden upon a camera manufacturer so that it is expected to spread in the market as a de facto standard. It can also promote digitization of companies and the like which withhold from digitization in terms of safety of transfer data.



[Description of the Symbols] 100: Input device

110: Image capture section
120: Image processing section
130: Authentication section
200: Memory
210: NAND record space
220: CPU
230: ROM
231, 232: Authentication section
310: Record space
320: Mutual recording section




We Claim:
1. A system for authenticating digital data in a system for writing digital data entered from an input device (100) to a memory and transferring the digital data written in the memory (200) to a receiving device (300), said system comprising means for:
(1) means for authenticating devices between the input device and the memory and
between the memory and the receiving device respectively, when writing digital
data from the input device to the memory and transferring the digital data from
the memory to the receiving device; and
(2) means for decrypting the implemented electronic signature so as to transfer the
digital data after ensuring that it has not been changed since it was recorded, when
writing digital data to the memory, in the case of implementing on the digital data
an electronic signature by a one-way hash function and also reading from the
memory and transferring the digital data.
2. The system for authenticating digital data as claimed in claim 1 wherein said
authenticating means comprises:
means for mixing data for authenticating devices into the digital data to be written from said input device to said memory and the digital data to be transferred from said memory to said receiving device.
3. The system for authenticating digital data as claimed in claim 1 or claim 2
wherein a CPU is provided for implementing said memory authentication between
said input device and said receiving device and authentication to the digital data
in said memory and decryption of said implemented authentication.
4. The system for authenticating digital data as claimed in any of claims 1, 2 or 3
wherein said memory comprises means for:

performing the writing of digital data from said input device to said memory and
the transfer of digital data from said memory to said receiving device only if
authentication between said input device and said memory and between said
memory and said receiving device is successful and;
performing ordinary writing and transfer of digital data if the authentication is not
successful.
5. The system for authenticating digital data as claimed in any of claims 1 to 4
having:
a specific mutual encryption function Hdc and an internal key Kdc between said input device and said memory used for authenticating both of them; said memory comprises a hash function Hcf and an internal key Kcf used for an electronic signature in said memory; and said system comprises a specific mutual encryption function Hpc and its key Kpc between said memory and said input device used for authenticating both of them.
6. The system for authenticating digital data as claimed in claim 5 wherein said
functions Hdc, Hcf and Hpc and their keys Kdc, and Kcf are stored in a ROM of
said memory device.
7. The system for authenticating digital data as claimed in claim 6 wherein said key
Kpc is encrypted and stored in NAND record space.
8. The system for authenticating digital data as claimed in any of claims 1 to 7
wherein authentication from said input device to said memory is performed by
using a public key system.
9. The system for recording digital data as claimed in any of claims 1 to 8 wherein
said memory is a Compact Flash and stores said electronic signature on digital
data by said hash function into a redundant area not to be calculated by an ECC of
each page in a memory area.

10. A system for authenticating digital data in a system for writing digital data entered from an input device to a memory and transferring the digital data written in the memory to a receiving device substantially as herein described with reference to and as illustrated by the accompanying drawings.



Documents:

1523-del-1999-abstract.pdf

1523-del-1999-claims.pdf

1523-del-1999-correspondence-others.pdf

1523-del-1999-correspondence-po.pdf

1523-del-1999-description (complete).pdf

1523-del-1999-drawings.pdf

1523-del-1999-form-1.pdf

1523-del-1999-form-19.pdf

1523-del-1999-form-2.pdf

1523-del-1999-form-3.pdf

1523-del-1999-form-5.pdf

1523-del-1999-gpa.pdf

1523-del-1999-petition-138.pdf

abstract.jpg


Patent Number 215503
Indian Patent Application Number 1523/DEL/1999
PG Journal Number 11/2008
Publication Date 14-Mar-2008
Grant Date 27-Feb-2008
Date of Filing 06-Dec-1999
Name of Patentee INTERNATIONAL BUSINESS MACHINE CORPORATION
Applicant Address ARMONK,NEW YORK 10504,U.S.A
Inventors:
# Inventor's Name Inventor's Address
1 KAMIJO KOICHI 1-18-16-205 AOBADAI,AOBA-KU YOKOHAMA-SHI, KANAGAWA-KEN,JAPAN
2 MORIMOTO NORISHIGE 1-8-11-501,KINUTA,SETAGAYA-KU,TOKYO-TO JAPAN
3 KOIDE AKIO 1-3/13-709,MINAMIYAMADA,TSUZUKI-KU,YOKOHAMASHI KANAGAWA-KEN JAPAN
4 SAKAKURA TOHRU 1-4-B-306,WAKAKUSADAI, AOBA-KU,YOKOHAMA-SHI DANAGAWA-KEN JAPAN
PCT International Classification Number H04N 1/21
PCT International Application Number N/A
PCT International Filing date
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 10-372355 1998-12-28 Japan