Sign In to Follow Application
View All Documents & Correspondence

System For Securing Digital Evidence

Abstract: SYSTEM FOR SECURING DIGITAL EVIDENCE ABSTRACT Disclosed is a system for securing digital evidence, comprising a computing device to receive at least one digital evidence from a plurality of sources, wherein the digital evidence is selected from the group consisting of audio recordings, camera footage, and digital documents; and a server arrangement communicatively coupled to the computing device through a network interface, wherein the server arrangement comprising a non-transitory computer-readable storage medium storing a set of executable instructions and a processor operatively coupled to the non-transitory computer-readable storage medium, wherein the processor executes the set of instructions to acquire each digital evidence from the computing device; process the acquired digital evidence; apply a fragile watermark seal to the processed digital evidence; verify the integrity of the digital evidence with the applied fragile watermark seal and generate an integrity status; and package the verified digital evidence based on the generated integrity status.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
26 April 2024
Publication Number
23/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MARWADI UNIVERSITY
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
PARTH PARMAR
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
PRANAVBHAI TANK
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
CHIRAG BHALODIA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA

Inventors

1. PARTH PARMAR
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
2. PRANAVBHAI TANK
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
3. CHIRAG BHALODIA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA

Specification

Description:Field of the Invention

The present disclosure generally relates to digital security systems. Particularly, the present disclosure relates to a system for securing digital evidence.

Background
The background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
In digital forensics and information security, the safeguarding of digital evidence is important. Digital evidence, encompassing audio recordings, camera footage, and digital documents, serves an important role in various sectors, together with law enforcement and legal adjudication. Providing the integrity and authenticity of such digital evidence is important and provides digital evidence impact on the outcomes of legal cases and security investigations. With the advent of digital technique, the sources of digital evidence have expanded, complicating management and security.
One conventional method employed for securing digital evidence comprises cryptographic techniques, for example the use of hash functions. Hash functions generate a unique digital fingerprint of the evidence, facilitating the verification of digital evidence integrity at any point by comparing hash values. Although effective in identifying alterations, hash functions approach does not prevent tampering or verify the source of the evidence. Digital watermarking represents another technique applied to secure digital evidence. Digital watermarking embeds information into the digital file, which can be used to verify the authenticity and integrity of the evidence. However, standard watermarking techniques often lack to protect against tampering without altering the original content of evidence. Furthermore, the application of digital signatures offers a means to authenticate the source of digital evidence while providing integrity of digital evidence. Digital signatures provide a secure and verifiable link between the evidence and digital source, offering protection against repudiation. Despite assistances, digital signatures and watermarking comprises the challenge of securing evidence in a manner which is both tamper-evident and resilient to digital manipulation techniques.
Additionally, the reliance on secure storage solutions for preserving the integrity of digital evidence has been explored. The said solutions comprise secure databases and storage mediums which restrict unauthorized access and modifications. While secure storage plays an important role in protecting digital evidence, which often requires additional layers of security to safeguard against internal threats and breaches.
In light of the above discussion, there exists an urgent need for solutions which overcome the limitations associated with conventional systems and techniques for securing digital evidence.
All publications herein are incorporated by reference to the same extent as if each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
In some embodiments, the numbers expressing quantities of ingredients, properties such as concentration, reaction conditions, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term “about.” Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all Markush groups used in the appended claims.

Summary

In an aspect, the present disclosure aims to provide a system for securing digital evidence which comprises a computing device capable of receiving digital evidence from multiple sources, for example audio recordings, camera footage, and digital documents, and a server arrangement. The server arrangement furnishes a non-transitory computer-readable storage medium and a processor. The processor is tasked with acquiring digital evidence from the computing device, processing digital evidence, applying a fragile watermark seal to provide digital evidence integrity, verifying the integrity of the digital evidence with the applied seal, and packaging the verified digital evidence based on digital evidence integrity status. Further, the fragile watermark seal comprises a digital fingerprint sensitive to alterations, improving the security of each piece of packaged digital evidence. Moreover, the packaging process comprises the use of tamper-obvious materials and mechanisms like specialized containers, envelopes, or storage devices with security structures like seals and holograms, safeguarding the digital evidence from tampering. Additionally, the processor utilizes blockchain technique to create a permanent record of all interactions with the acquired digital evidence, maintaining a chain of custody by logging details like the identity of individuals accessing the evidence and the time of access. The regeneration of the fragile watermark seal in response to the generated integrity status is facilitated without the need for physical access to the tamper-obvious packaging. Furthermore, the application of the fragile watermark using cryptographic techniques provides security of the watermark and verifiability without compromising the privacy of the digital evidence. The processor also conducts regular and on-demand audits of the integrity of the packaged digital evidence to detect any unauthorized alterations and to confirm authenticity of the evidence.
Various objects, features, aspects and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.

Brief Description of the Drawings

The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the present disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale. Wherever possible, like elements have been indicated by identical numbers.
Embodiments of the present disclosure will now be described, by way of example only, with reference to the following diagrams wherein:
FIG. 1 illustrates a system for securing digital evidence, in accordance with the embodiments of the present disclosure.
FIG. 2 illustrates a method for securing digital evidence in accordance with an embodiment of the present disclosure.
FIG. 3 illustrates architecture of tamper-evident packaging of digital evidence with fragile watermark seals, in accordance with the embodiments of the present disclosure.
In the accompanying drawings, a number in parentheses is employed to represent an item over which the number in parentheses is positioned or an item to which the number in parentheses is adjacent. A number not in parentheses relates to an item identified by a line linking the number not in parentheses to the item. When a number is not in parentheses and accompanied by an associated arrow, the number not in parentheses is used to identify a general item at which the arrow is pointing.

Detailed Description

The following detailed description illustrates embodiments of the present disclosure and ways in which they can be implemented. Although some modes of carrying out the present disclosure have been disclosed, those skilled in the art would recognise that other embodiments for carrying out or practising the present disclosure are also possible.
The description set forth below in connection with the appended drawings is intended as a description of certain embodiments of a motor of an electric vehicle and is not intended to represent the only forms that may be developed or utilised. The description sets forth the various structures and/or functions in connection with the illustrated embodiments; however, it is to be understood that the disclosed embodiments are merely exemplary of the disclosure that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimised to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however, that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.
The terms “comprise”, “comprises”, “comprising”, “include(s)”, or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a setup, system that comprises a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup or system. In other words, one or more elements in a system or apparatus preceded by “comprises... a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or apparatus.
In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings and which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
The present disclosure will be described herein below with reference to the accompanying drawings. In the following description, well known functions or constructions are not described in detail since they would obscure the description with unnecessary detail.
The term "computing device" as used throughout the present disclosure relates to an electronic apparatus considered to receive digital evidence from a multitude of sources. Digital evidence is selected from a group consisting of audio recordings, camera footage, and digital documents. The computing device acts as interface for the collection and transmission of digital evidence to the server arrangement for subsequent processing and security measures.
The term "server arrangement" as used throughout the present disclosure denotes a combination of hardware and software components considered to be communicatively coupled to the computing device through a network interface. The server arrangement encompasses a non-transitory computer-readable storage medium and a processor. The function of the server arrangement is to securely process and manage digital evidence received from the computing device. The server arrangement comprises acquiring the digital evidence, processing it, applying a fragile watermark seal for integrity verification, and packaging the verified digital evidence based on the integrity status generated.
The term "non-transitory computer-readable storage medium" within the server arrangement refers to a hardware component capable of storing a set of executable instructions. The set of executable instructions, when executed by the processor, facilitate the secure processing and handling of digital evidence. Execution comprises operations like the acquisition of digital evidence from the computing device, processing the evidence, and applying necessary security measures to maintain the integrity and confidentiality of the evidence.
The term "processor" as utilized within the server arrangement context signifies a computational unit operatively connected to the non-transitory computer-readable storage medium. The processor is responsible for executing the instructions stored on the medium. Execution of stored instructions enables the server arrangement to perform functions important to the security and integrity of digital evidence, together with but not limited to, the acquisition of digital evidence, application of a fragile watermark seal, verification of evidence integrity, and the packaging of verified evidence based on the generated integrity status.
FIG. 1 illustrates a system (100) for securing digital evidence, in accordance with the embodiments of the present disclosure. The system (100) comprises a computing device (102) considered to receive at least one piece of digital evidence from a plurality of sources. The evidence received is categorized into specific types, namely audio recordings, camera footage, and digital documents. The specific types of digital evidence provide the system (100) which is equipped to handle diverse formats of evidence, improving applicability in various legal and forensic scenarios. Further, the system (100) comprises a server arrangement (104) communicatively coupled to the computing device (102) through a network interface. The server arrangement (104) furnishes a non-transitory computer-readable storage medium, which stores a set of executable instructions. Additionally, a processor is operatively coupled to the storage medium. The role of processor is to execute the stored instructions, enabling the server arrangement (104) to acquire digital evidence from the computing device (102), process acquired digital evidence, apply a fragile watermark seal to provide integrity, verify the integrity of the digital evidence post-application of the fragile watermark seal, and finally, package the verified digital evidence based on the integrity status generated.
In an embodiment, the system (100) for securing digital evidence (100), the fragile watermark seal incorporates a digital fingerprint, uniquely considered to be sensitive to any modifications of the packaged digital evidence. The digital fingerprint acts as an important security factor, seamlessly integrated into the fragile watermark seal, to bolster the protective measures safeguarding the digital evidence. The digital fingerprint monitors the digital evidence for any unauthorized changes, thereby providing a robust mechanism for early detection of tampering. The sensitivity of the digital fingerprint to alterations provides the integrity of the digital evidence which is preserved from the point of digital evidence packaging through digital evidence entire lifecycle. By employing such a digital fingerprint within the fragile watermark seal, the system (100) effectively provides the authenticity and reliability of the digital evidence which are maintained, making the digital fingerprint a vital tool for legal and forensic analyses.
In another embodiment, the system (100) employs tamper-obvious materials and mechanisms for the packaging of verified digital evidence, introducing a security measure. Tamper-obvious materials and mechanisms are selected and considered to offer dual functionalities: one, to provide physical protection to the digital evidence, shielding the digital evidence from damage and unauthorized access; and another, to act as an immediate indicator of any tampering attempts. The presence of tamper-obvious structures is a deterrent to tampering, as any unauthorized attempt to access or alter the packaged evidence becomes visibly detectable. Maintaining integrity and authenticity of the digital evidence provides the digital evidence which remain uncompromised throughout lifecycle. The application of tamper-obvious packaging materials effectively adds an important layer of security, improving the overall reliability of the system (100) in safeguarding sensitive digital evidence.
In further embodiment, the system (100) improves the security of packaged digital evidence by utilizing tamper-obvious materials which comprise specialized containers, envelopes, or storage devices equipped with distinct security structures like seals and holograms. Distinct structures serve as a visible and physical deterrent against tampering, providing any unauthorized access attempts are immediately apparent. Seals and holograms are particularly effective and difficult to replicate or restore once broken or altered, thereby providing a clear indication of tampering. The selection of such security structures from a predefined group emphasizes strategic approach of the system (100) for evidence protection. By integrating security measures into the packaging process, the system (100) demonstrates a robust commitment to maintaining the integrity and authenticity of digital evidence. Integrating security measures is important in environments where the reliability of the evidence is paramount, for example in legal proceedings and forensic analysis.
In an embodiment, the system (100) incorporates an approach to securing digital evidence by blockchain technique through the processor of the server arrangement (104). Blockchain, decentralized nature and robust security structures, serves as the foundation for creating a permanent, tamper-evident ledger which records every interaction with the digital evidence. Blockchain method of documentation provides each action, from acquisition to access, which is securely and immutably logged, providing a transparent and unalterable history of the digital evidence lifecycle. The adoption of blockchain technique significantly bolsters capability of the system (100) to maintain the integrity and chain of custody for digital evidence. The blockchain technique does so by offering a verifiable record of all handling activities, making verifiable record virtually impossible to alter any recorded information without detection. The blockchain technique improves the reliability of the evidence for legal and forensic purposes and instills a greater level of trust in the system (100) handling and preserving digital evidence.
In further embodiment, the system (100) improves the security and integrity of digital evidence through logging of interactions by the processor. Every instance of access to the packaged digital evidence is recorded, comprising important details like the identity of the individual accessing the evidence and the time of access. Logging of interactions approach establishes a detailed and audit trail which is important for maintaining the chain of custody. By documenting each interaction in detailed and audit trail manner, the system (100) provides a transparent and traceable record of the evidence for handling history. Logging of interactions facilitates the verification of the evidence integrity by allowing for the detection of unauthorized access or alterations and reinforces the legal admissibility of the evidence by providing a verifiable log of evidence custody. The implementation of detailed logging is a measure which significantly bolsters overall security of the system (100). Detailed logging serves as a deterrent against tampering and unauthorized access, thereby preserving the authenticity and reliability of the digital evidence throughout digital evidence lifecycle
In an embodiment, the system (100) showcases an approach towards maintaining the integrity of digital evidence through the use of a fragile watermark seal. The processor regenerates the watermark seal based on the integrity status of the digital evidence. Unlike traditional methods which might require physical handling or access to the evidence for reapplication of security measures, the system (100) allows for the regeneration and application of the fragile watermark seal remotely. The ability to manage the security of digital evidence remotely addresses logistical challenges associated with physical access to evidence, particularly in environments where such access may be limited or impractical. Regeneration of the watermark seal by the processor provides continuous protection of the evidence integrity by allowing the system to respond promptly to any changes in the integrity status.
In yet another embodiment, the system (100) employs a method to improve the security and integrity of digital evidence through the application of a fragile watermark using cryptographic techniques. Cryptographic approach provides the watermark, which once applied to the verified digital evidence, achieves a dual purpose: the watermark acts as a marker for verifying the integrity of the evidence and safeguards the confidentiality of the data contained within. The utilization of cryptographic techniques in embedding the fragile watermark into the digital evidence introduces a robust layer of security which is important in maintaining the authenticity and trustworthiness of evidence. The cryptographic method provides the fragile watermark which is linked to the digital evidence in a manner which is both secure against unauthorized access and easily verifiable by authorized entities. The cryptographic method embedding the fragile watermark into the digital evidence provides any attempts to tamper with the evidence can be detected immediately, while also preserving the privacy and sensitivity of the information contained within the evidence. By cryptography, the system (100) addresses the important need for a balance between transparency in the integrity verification process and the imperative of protecting the privacy of digital evidence.
In an embodiment, the system (100) is considered to perform regular and on-demand audits of the integrity of the packaged digital evidence, a process important for upholding the authenticity and security of the evidence. The audits are facilitated by the processor, which plays an important role in the continuous monitoring and verification of the evidence integrity. The approach by auditing provides any compromises or alterations to the digital evidence which are identified and addressed promptly, thereby maintaining the evidence integrity over time. The capability to conduct audits both regularly and on demand provides a flexible and responsive situation for evidence management. Regular audits offer a systematic and consistent means of integrity verification, providing the security measures in place which are continually effective. On-demand audits, on the other hand, allow for immediate assessments in response to specific concerns or events, offering an additional layer of security when needed. By implementing such thorough auditing processes, the system (100) provides an ongoing assessment of the digital evidence authenticity and security status.
FIG. 2 illustrates, a method (200) for securing digital evidence in accordance with an embodiment of the present disclosure. The method (200) encompassing the following steps: At step (202), the computing device (102) receives at least one piece of digital evidence from a multitude of sources. The evidence comprises, but is not limited to, audio recordings, camera footage, and digital documents, providing the system (100) capability to handle various types of digital evidence. In step (204), the received digital evidence is transmitted from the computing device (102) to the server arrangement (104) via a network interface. Transmission facilitates the central processing and securing of the evidence by the server arrangement (104). Step (206) upon receipt, the processor of the server arrangement (104) acquires the transmitted digital evidence from the computing device (102). The step (206) initiates the evidence processing and securing procedures. Step (208), the processor processes the acquired digital evidence, preparing digital evidence for the application of security measures. The processing comprises the normalization and standardization of the evidence for further handling. In step (210), a fragile watermark seal is applied to the processed digital evidence by the processor. The fragile watermark seal is considered to maintain the integrity of the digital evidence by making unauthorized alterations detectable. In step (212), the integrity of the digital evidence with the applied fragile watermark seal is verified by the processor. The verification process detects any unauthorized alterations and generates an integrity status indicative of the evidence authenticity. In step (214), the processor packages the verified digital evidence based on the generated integrity status. Th packaging step (214) provides the evidence which is secured and prepared for storage or transmission in a manner which maintains digital integrity and authenticity.
FIG. 3 illustrates architecture of tamper-evident packaging of digital evidence with fragile watermark seals, in accordance with the embodiments of the present disclosure. The system (100) comprises a computing device (102) which serves as the reception point for digital evidence, which may comprise audio recordings, camera footage, and digital documents from various sources illustrated by the three distinct icons representing the types of digital evidence sources feeding into a central processing node. Once received, the computing device (102) transmits the digital evidence to the server arrangement (104), depicted by a connection leading to the 'Processing' and 'Evidence Packaging' stages. The server arrangement (104) comprises a non-transitory computer-readable storage medium, which stores executable instructions, and a processor which is operatively coupled to storage medium to perform various tasks. The processor role comprises acquiring the digital evidence from the computing device (102), as shown by the flow from the evidence sources to the processing hub. The processor processes evidence and applies a fragile watermark seal via the 'Watermarking Service,' denoted by a shield symbol. The fragile watermark seal provides the integrity of the evidence, making the evidence secure and verifiable, which is important for maintaining admissibility and credibility in legal contexts. Subsequently, the integrity of the evidence is verified, and evidence status is determined. Another step is packaging the evidence, which is then stored in the 'Evidence Repository,' as the image illustrates, maintaining the integrity status. Additionally, 'Watermark Logs' are stored, providing a record of all watermarking actions is kept for audit purposes, demonstrating an end-to-end secure management system for digital evidence.
Throughout the present disclosure, the term “computing device” relates to an electronic device, including but are not limited to, a cellular phone, a smart phone, a personal digital assistant (PDA), a handheld device, a wireless modem, a laptop, a computer, a server, a personal computer, a work station, a mobile terminal, a subscriber station, a remote station, a user terminal, a terminal, a subscriber unit, an access terminal, a wearable computer, a wearable computing device, a smart watch, a server etc. The computing device may include a casing, a memory, a processor, a network interface card, a microphone, a speaker, a keypad, and a display.
Throughout the present disclosure, the term ‘processing means’ or ‘microprocessor’ or ‘processor’ or ‘processors’ includes, but is not limited to, a microprocessor, a microcontroller, a complex instruction set computing (CISC) microprocessor, a reduced instruction set (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, or any other type of processing circuit.
In an aspect, any or a combination of machine learning mechanisms such as decision tree learning, Bayesian network, deep learning, random forest, supervised vector machines, reinforcement learning, prediction models, Statistical Algorithms, Classification, Logistic Regression, Support Vector Machines, Linear Discriminant Analysis, K-Nearest Neighbours, Decision Trees, Random Forests, Regression, Linear Regression, Support Vector Regression, Logistic Regression, Ridge Regression, Partial Least-Squares Regression, Non-Linear Regression, Clustering, Hierarchical Clustering – Agglomerative, Hierarchical Clustering – Divisive, K-Means Clustering, K-Nearest Neighbours Clustering, EM (Expectation Maximization) Clustering, Principal Components Analysis Clustering (PCA), Dimensionality Reduction, Non-Negative Matrix Factorization (NMF), Kernel PCA, Linear Discriminant Analysis (LDA), Generalized Discriminant Analysis (kernel trick again), Ensemble Algorithms, Deep Learning, Reinforcement Learning, AutoML (Bonus) and the like can be employed to learn sensor/hardware components.
The term “non-transitory storage device” or “storage” or “memory,” as used herein relates to a random access memory, read only memory and variants thereof, in which a computer can store data or software for any duration.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly specified or limited, the terms “disposed,” “mounted,” and “connected” are to be construed broadly, and may for example be fixedly connected, detachably connected, or integrally connected, either mechanically or electrically. They may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Modifications to embodiments and combination of different embodiments of the present disclosure described in the foregoing are possible without departing from the scope of the present disclosure as defined by the accompanying claims. Expressions such as “including”, “comprising”, “incorporating”, “have”, “is” used to describe ad claim the present disclosure are intended to be construed in a non- exclusive manner, namely allowing for items, components or elements not explicitly described also to be present. Reference to the singular is also to be construed to relate to the plural where appropriate.
Although embodiments have been described with reference to a number of illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this disclosure. More particularly, various variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the present disclosure, the drawings and the appended claims. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.

I/We claims:
1. A system (100) for securing digital evidence, comprising:
a computing device (102) to receive at least one digital evidence from a plurality of sources, wherein the digital evidence is selected from the group consisting of audio recordings, camera footage, and digital documents; and
a server arrangement (104) communicatively coupled to the computing device (102) through a network interface, wherein the server arrangement (104) comprising:
a non-transitory computer-readable storage medium storing a set of executable instructions; and
a processor operatively coupled to the non-transitory computer-readable storage medium, wherein the processor executes the set of instructions to:
acquire each digital evidence from the computing device (102);
process the acquired digital evidence;
apply a fragile watermark seal to the processed digital evidence;
verify the integrity of the digital evidence with the applied fragile watermark seal and generate an integrity status; and
package the verified digital evidence based on the generated integrity status.
2. The system (100) of claim 1, wherein the fragile watermark seal comprises a digital fingerprint which is sensitive to alterations of each packaged digital evidence.
3. The system (100) of claim 2, wherein the packaging of the verified digital evidence comprises tamper-obvious materials and mechanisms, which physically protects the packaged digital evidence and reveal any tampering attempts.
4. The system (100) of claim 3, wherein the tamper-obvious materials comprise at least one of the specialized containers, the envelopes, or the storage devices comprising security structures selected from the group consisting of seals and holograms.
5. The system (100) of claim 1, wherein the processor further utilizes a blockchain technique to create a permanent record of all the interactions with the each acquired digital evidence.
6. The system (100) of claim 5, wherein the processor logs all the recorded interactions with the digital evidence comprising at least the identification of the individual accessing the packaged digital evidence and the time of access, to uphold the chain of custody.
7. The system (100) of claim 1, wherein the processor regenerates the fragile watermark seal in response to generated integrity status, wherein the regenerated fragile watermark seal is applied without necessitating physical access to the tamper-obvious packaging.
8. The system (100) of claim 1, wherein the fragile watermark is applied to the verified digital evidence using a cryptographic technique which check the applied fragile watermark is both secure and verifiable without compromising the privacy of the digital evidence.
9. The system (100) of claim 1, wherein the processor performs regular and on-demand audits of the integrity of the packaged digital evidence.
10. A method for securing digital evidence, comprising:
receiving, by a computing device (102), at least one digital evidence from a plurality of sources, wherein the digital evidence is selected from the group consisting of audio recordings, camera footage, and digital documents;
transmitting the at least one digital evidence from the computing device (102) to a server arrangement (104) through a network interface;
acquiring, by a processor of the server arrangement (104), the at least one of digital evidence from the computing device (102);
processing, by the processor, the acquired digital evidence to prepare digital evidence for security measures;
applying, by the processor, a fragile watermark seal to the processed digital evidence, wherein the fragile watermark seal is purposed to maintain the integrity of the digital evidence by making unauthorized alterations detectable;
verifying, by the processor, the integrity of the digital evidence with the applied fragile watermark seal to detect any unauthorized alterations and to generate an integrity status indicative of the digital evidence authenticity; and
packaging, by the processor, the verified digital evidence based on the generated integrity status.

SYSTEM FOR SECURING DIGITAL EVIDENCE

ABSTRACT
Disclosed is a system for securing digital evidence, comprising a computing device to receive at least one digital evidence from a plurality of sources, wherein the digital evidence is selected from the group consisting of audio recordings, camera footage, and digital documents; and a server arrangement communicatively coupled to the computing device through a network interface, wherein the server arrangement comprising a non-transitory computer-readable storage medium storing a set of executable instructions and a processor operatively coupled to the non-transitory computer-readable storage medium, wherein the processor executes the set of instructions to acquire each digital evidence from the computing device; process the acquired digital evidence; apply a fragile watermark seal to the processed digital evidence; verify the integrity of the digital evidence with the applied fragile watermark seal and generate an integrity status; and package the verified digital evidence based on the generated integrity status.
, Claims:I/We claims:
1. A system (100) for securing digital evidence, comprising:
a computing device (102) to receive at least one digital evidence from a plurality of sources, wherein the digital evidence is selected from the group consisting of audio recordings, camera footage, and digital documents; and
a server arrangement (104) communicatively coupled to the computing device (102) through a network interface, wherein the server arrangement (104) comprising:
a non-transitory computer-readable storage medium storing a set of executable instructions; and
a processor operatively coupled to the non-transitory computer-readable storage medium, wherein the processor executes the set of instructions to:
acquire each digital evidence from the computing device (102);
process the acquired digital evidence;
apply a fragile watermark seal to the processed digital evidence;
verify the integrity of the digital evidence with the applied fragile watermark seal and generate an integrity status; and
package the verified digital evidence based on the generated integrity status.
2. The system (100) of claim 1, wherein the fragile watermark seal comprises a digital fingerprint which is sensitive to alterations of each packaged digital evidence.
3. The system (100) of claim 2, wherein the packaging of the verified digital evidence comprises tamper-obvious materials and mechanisms, which physically protects the packaged digital evidence and reveal any tampering attempts.
4. The system (100) of claim 3, wherein the tamper-obvious materials comprise at least one of the specialized containers, the envelopes, or the storage devices comprising security structures selected from the group consisting of seals and holograms.
5. The system (100) of claim 1, wherein the processor further utilizes a blockchain technique to create a permanent record of all the interactions with the each acquired digital evidence.
6. The system (100) of claim 5, wherein the processor logs all the recorded interactions with the digital evidence comprising at least the identification of the individual accessing the packaged digital evidence and the time of access, to uphold the chain of custody.
7. The system (100) of claim 1, wherein the processor regenerates the fragile watermark seal in response to generated integrity status, wherein the regenerated fragile watermark seal is applied without necessitating physical access to the tamper-obvious packaging.
8. The system (100) of claim 1, wherein the fragile watermark is applied to the verified digital evidence using a cryptographic technique which check the applied fragile watermark is both secure and verifiable without compromising the privacy of the digital evidence.
9. The system (100) of claim 1, wherein the processor performs regular and on-demand audits of the integrity of the packaged digital evidence.
10. A method for securing digital evidence, comprising:
receiving, by a computing device (102), at least one digital evidence from a plurality of sources, wherein the digital evidence is selected from the group consisting of audio recordings, camera footage, and digital documents;
transmitting the at least one digital evidence from the computing device (102) to a server arrangement (104) through a network interface;
acquiring, by a processor of the server arrangement (104), the at least one of digital evidence from the computing device (102);
processing, by the processor, the acquired digital evidence to prepare digital evidence for security measures;
applying, by the processor, a fragile watermark seal to the processed digital evidence, wherein the fragile watermark seal is purposed to maintain the integrity of the digital evidence by making unauthorized alterations detectable;
verifying, by the processor, the integrity of the digital evidence with the applied fragile watermark seal to detect any unauthorized alterations and to generate an integrity status indicative of the digital evidence authenticity; and
packaging, by the processor, the verified digital evidence based on the generated integrity status.

Documents

Application Documents

# Name Date
1 202421033141-OTHERS [26-04-2024(online)].pdf 2024-04-26
2 202421033141-FORM FOR SMALL ENTITY(FORM-28) [26-04-2024(online)].pdf 2024-04-26
3 202421033141-FORM 1 [26-04-2024(online)].pdf 2024-04-26
4 202421033141-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [26-04-2024(online)].pdf 2024-04-26
5 202421033141-EDUCATIONAL INSTITUTION(S) [26-04-2024(online)].pdf 2024-04-26
6 202421033141-DRAWINGS [26-04-2024(online)].pdf 2024-04-26
7 202421033141-DECLARATION OF INVENTORSHIP (FORM 5) [26-04-2024(online)].pdf 2024-04-26
8 202421033141-COMPLETE SPECIFICATION [26-04-2024(online)].pdf 2024-04-26
9 202421033141-FORM-9 [07-05-2024(online)].pdf 2024-05-07
10 202421033141-FORM 18 [08-05-2024(online)].pdf 2024-05-08
11 202421033141-FORM-26 [12-05-2024(online)].pdf 2024-05-12
12 202421033141-FORM 3 [13-06-2024(online)].pdf 2024-06-13
13 202421033141-RELEVANT DOCUMENTS [09-10-2024(online)].pdf 2024-10-09
14 202421033141-POA [09-10-2024(online)].pdf 2024-10-09
15 202421033141-FORM 13 [09-10-2024(online)].pdf 2024-10-09