-
公开(公告)号:US10360668B1
公开(公告)日:2019-07-23
申请号:US16101833
申请日:2018-08-13
Applicant: TRUEPIC INC.
Inventor: Jeffrey McGregor , Craig Stack , Jason Lyons , Matthew Robben
Abstract: A system and method include obtaining and authenticating image files from users, such as insured users, at the request of an entity, such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. An authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.
-
公开(公告)号:US11632363B2
公开(公告)日:2023-04-18
申请号:US17509236
申请日:2021-10-25
Applicant: TruePic Inc.
Inventor: Jason Lyons , Craig Stack , Francis Lyons , Jeffrey McGregor
Abstract: Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.
-
公开(公告)号:US10375050B2
公开(公告)日:2019-08-06
申请号:US15728869
申请日:2017-10-10
Applicant: TRUEPIC INC.
Inventor: Jason Lyons , Craig Stack , Francis Lyons , Jeffrey McGregor
Abstract: Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.
-
公开(公告)号:US11968199B2
公开(公告)日:2024-04-23
申请号:US18301375
申请日:2023-04-17
Applicant: TruePic Inc.
Inventor: Jason Lyons , Craig Stack , Francis Lyons , Jeffrey McGregor
CPC classification number: H04L63/08 , G06F21/645 , H04L9/0643 , H04L9/3236 , H04L9/3242 , H04L9/3297 , H04L63/123 , H04W12/06
Abstract: Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.
-
公开(公告)号:US10726533B2
公开(公告)日:2020-07-28
申请号:US16518408
申请日:2019-07-22
Applicant: TruePic Inc.
Inventor: Jeffrey McGregor , Craig Stack , Jason Lyons , Matthew Robben
Abstract: A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.
-
公开(公告)号:US10361866B1
公开(公告)日:2019-07-23
申请号:US16101819
申请日:2018-08-13
Applicant: TRUEPIC INC.
Inventor: Jeffrey McGregor , Craig Stack , Jason Lyons , Matthew Robben
Abstract: Disclosed is improved technology for authenticating electronic images and storing proof of tampering or non-tampering on the blockchain. An image authentication application of a user device may generate an image. The user device may generate an image hash of the image using a hash function. The image hash may be written to the blockchain. This may occur immediately after the image has been taken. The user device may upload the image to an authentication server, which authenticates the image. At various times, such as after receipt, during authentication, and/or after authentication, the authentication server may generate an image hash of the image using the hash function. The authentication server may write the image hash(es) to the blockchain. As such, a state of the image at various times may be recorded on the blockchain to determine whether or not the image has been tampered with between various times.
-
公开(公告)号:US12120255B2
公开(公告)日:2024-10-15
申请号:US18309432
申请日:2023-04-28
Applicant: TruePic Inc.
Inventor: Jeffrey McGregor , Craig Stack , Jason Lyons , Matthew Robben
CPC classification number: H04L9/50 , G06F16/152 , G06F16/5838 , G06F16/5866 , G06T7/0002 , H04L9/0637 , H04L9/3226 , H04L9/3239 , H04N1/32283
Abstract: A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.
-
公开(公告)号:US11646902B2
公开(公告)日:2023-05-09
申请号:US17745168
申请日:2022-05-16
Applicant: TruePic Inc.
Inventor: Jeffrey McGregor , Craig Stack , Jason Lyons , Matthew Robben
CPC classification number: H04L9/50 , G06F16/152 , G06F16/5838 , G06F16/5866 , G06T7/0002 , H04L9/0637 , H04L9/3226 , H04L9/3239 , H04N1/32283
Abstract: A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.
-
公开(公告)号:US11159504B2
公开(公告)日:2021-10-26
申请号:US16531620
申请日:2019-08-05
Applicant: TruePic Inc.
Inventor: Jason Lyons , Craig Stack , Francis Lyons , Jeffrey McGregor
Abstract: Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.
-
-
-
-
-
-
-
-