Methods for requesting and authenticating photographic image data

    公开(公告)号:US10360668B1

    公开(公告)日:2019-07-23

    申请号:US16101833

    申请日:2018-08-13

    Applicant: TRUEPIC INC.

    Abstract: A system and method include obtaining and authenticating image files from users, such as insured users, at the request of an entity, such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. An authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

    System and method for capturing authenticatable digital media files on connected media-capture devices

    公开(公告)号:US12231577B2

    公开(公告)日:2025-02-18

    申请号:US17685877

    申请日:2022-03-03

    Applicant: TruePic Inc.

    Abstract: A media-capture device initiates acquisition of sensor data samples representing analog phenomena; encodes the samples; generates a to-be-signed data structure comprising the encoded samples and/or cryptographic hashes of the samples; generates a cryptographic hash of the to-be-signed data structure; transmits a time-stamping request to a time-stamping server, the time-stamping request comprises the cryptographic hash of the to-be-signed data structure, wherein the time-stamping server generates a signed time-stamp; generates a digital signature using the to-be-signed data structure, the signed time-stamp, a private cryptographic key, and a signed certificate for the corresponding public cryptographic key; and generates a second data structure comprising the samples, the to-be-signed data structure, and the digital signature.

    Methods for requesting and authenticating photographic image data

    公开(公告)号:US10726533B2

    公开(公告)日:2020-07-28

    申请号:US16518408

    申请日:2019-07-22

    Applicant: TruePic Inc.

    Abstract: A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

    Proof of image authentication on a blockchain

    公开(公告)号:US10361866B1

    公开(公告)日:2019-07-23

    申请号:US16101819

    申请日:2018-08-13

    Applicant: TRUEPIC INC.

    Abstract: Disclosed is improved technology for authenticating electronic images and storing proof of tampering or non-tampering on the blockchain. An image authentication application of a user device may generate an image. The user device may generate an image hash of the image using a hash function. The image hash may be written to the blockchain. This may occur immediately after the image has been taken. The user device may upload the image to an authentication server, which authenticates the image. At various times, such as after receipt, during authentication, and/or after authentication, the authentication server may generate an image hash of the image using the hash function. The authentication server may write the image hash(es) to the blockchain. As such, a state of the image at various times may be recorded on the blockchain to determine whether or not the image has been tampered with between various times.

Patent Agency Ranking