Secure digital data collection

ABSTRACT

Systems and methods for generating certified images and incident reports are disclosed. An image capture device can be used to capture an image and integrate metadata from camera sensors as well as other ancillary device sensors into the image. The image and its metadata can then be certified upon a check that the image and its metadata are authentic and unaltered. The image and its metadata can then be included in or as a part of an incident or other report describing an incident or event such as an accident or a crime. The image and/or incident report may be maintained at a cloud-based server for viewing, authorized editing, and subsequent distribution.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims the priority benefit of U.S. provisionalapplication No. 62/119,951 filed Feb. 24, 2015 and entitled “SecureDigital Data Collection, Processing and Digital Ecosystems,” thedisclosure of which is incorporated herein by reference.

BACKGROUND Field of the Invention

The present invention generally relates to digital imaging. Morespecifically, the present invention relates to certification of digitalimages captured by electronic devices.

Description of the Related Art

User devices such as smartphones or tablets can take photos using camerasoftware applications designed to interact with camera hardware embeddedin the user device. Some of these camera applications store photometadata along with the photo. Examples of metadata include the identitythe user device from which the photo was taken, latitude and longitudeat which the photo was taken, and information concerning use of filtersor other applications that may alter the digital image. The type,format, and details of such metadata are incomplete and inconsistentbetween camera software applications. A user of one software applicationcannot rely on a specific set of metadata to be present along with thesame photograph should it be taken in another application.

Some types of positional, sensor, and other software or hardware data,while available for use, are often not stored as photo metadata or in amanner that allows for pairing of the data with a particular image. Thisdata could be used in the context of other software applications or inthe review of certain photographs. As a result, users may not be able todetermine the exact positioning of a user device, an object beingphotographed, or the output of other sensors while or when the photo wasbeing taken.

Photographs are also often used in creating an incident report. Creatingan incident report usually involves transcribing details of an incidentdetails such as a car accident or structural damage to a home frompersonal or third-party observation to handwritten form. Thosehandwritten notes are then entered into a computer or program operatingthereon. Photographs related to the incident and showing the accident ordamage are usually scanned or uploaded into the aforementioned computeror program by way of a physical or network connection. Traditionally,these images would have be—as a matter of course and necessity—acceptedat face value with no reliable way to ascertain if the images wereauthentic or unaltered. The transcribed information such as the locationand physics of an incident, too, were not always accurate due to humantranscription or data entry error or a misreading of image data.

There is a need in the art to more completely collect available sourcesof metadata as they pertain to digital imagery—both still and moving.Further, there is a need in the art to better correlate such metadata tofiles or documents that may be associated with a digital image. Finally,there is a need in the art to be able to verify the accuracy of adigital image, the metadata therein, as well as any data that might bebased on, related to, or otherwise derived from that image.

SUMMARY OF THE PRESENTLY CLAIMED INVENTION

In a first claimed embodiment of the present invention, a method forgenerating an incident report is disclosed. Through the claimed method,a digital image is received. Sensor data associated with the image isalso received. A determination is then made with respect to theauthenticity and unaltered nature of the digital image and the sensordata. A determination is also made that the sensor data includes atleast a predetermined set of sensor readings. A certified image is thencreated by digitally joining the image with one or more of the sensordata or a subset thereof. A description of an incident is then receivedfrom which an incident report is generated said report including thecertified image. The incident report is then provided to a network basedserver for subsequent management.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an image capture and certification system combinedwith an incident reporting system.

FIG. 2 illustrates an image capture system that combines a camera imagewith sensor data set from a sensor system.

FIG. 3 illustrates exemplary functions and features of the image capturesystem.

FIG. 4 identifies exemplary image metadata as may be utilized in anembodiment of the presently disclosed image certification system.

FIG. 5 illustrates an exemplary image capture system and imagecertification system interfacing with different types of user devicesand camera devices.

FIG. 6 illustrates an exemplary incident report document with anintegrated certified image.

FIG. 7 further illustrates exemplary sensor data that can be included ametadata for a digital image of the image capture system.

FIG. 8 is a flow diagram illustrating an exemplary operation of a userdevice software application for image capture, image certification,network transfer, and incident reporting.

FIG. 9A is a first half of a flow diagram illustrating an exemplaryoperation of web portal software.

FIG. 9B is a second half of a flow diagram illustrating an exemplaryoperation of web portal software.

FIG. 10 illustrates various exemplary aspects of the incident reportingsystem.

FIG. 11 is an exemplary incident report document with an integratedimage and location map indicating where the image was taken

FIG. 12A illustrates an exemplary certified image within an exemplaryimage viewer application.

FIG. 12B is a flow diagram illustrating an exemplary operation of theintelligent image certification system.

FIG. 13 illustrates an exemplary image security system as performed bythe user device mobile application or by the web portal.

DETAILED DESCRIPTION

Systems and methods for generating certified images and incident reportsare disclosed. An image capture device can be used to capture an imageand integrate metadata from camera sensors as well as other ancillarydevice sensors into the image. The image and its metadata can then becertified upon a check that the image and its metadata are authentic andunaltered. The image and its metadata can then be included in or as apart of an incident or other report describing an incident or event suchas an accident or a crime. The image and/or incident report may bemaintained at a cloud-based server for viewing, authorized editing, andsubsequent distribution.

FIG. 1 illustrates an image capture and certification system combinedwith an incident reporting system. The system of FIG. 1 includes animage capture system 110 that is described further in FIG. 2 and FIG. 3,an image certification system 120 that is described further in FIG. 4, anetwork interface system 130 that is described further in FIG. 5, anincident report system 140 that is described further in FIG. 6, and aweb portal system 150 that is described further in FIG. 10. Specifics ofeach of the foregoing elements are described in greater detail herein.

A system like that illustrated in FIG. 1 may include a 3-axis imagesensor and a mobile digital data capture system with resident softwareapplication. Such an application may collect a variety of differenttypes of data, including location, orientation, navigation attributes,or position at the time of image capture. Other information may concernancillary or related support systems, networks, or hardware related tothe capture system: transmission and networking protocols, particularstorage or server systems, or information concerning web interfaces oraccess portals. The system also provides the ability to connect tospecific user domains or devices allowing for collaboration in real-timewhile concurrently capturing remote data as might be generated in onlinemeetings, such as whiteboards. This collaborative information isinclusive and extends to images, video, audio, and other forms of media(e.g., GIFs) as well as maps and various types of reports, includingincident reports. In some embodiments, the system may be coupled tohardware such as optical readers, NFC or Bluetooth interfaces, as wellas card interface readers.

Referring back to the 3-axis image sensor, such (x, y, z) technologyallows for the introduction of data into the system such that imagecertification may be implemented thereby certifying an image. Such asensor may also operate in conjunction with other software modules toinsert, display, or permissibility manipulate the data as well asimplement analytical tools to allow for utilization of the data indifferent market verticals. For example, certified image data could beused by the insurance industry, for surveying, with respect to farming,as well as manufacturing, security, drones, an autonomous conveyances.Law enforcement and the gaming industry could likewise utilizeembodiments of the present invention.

FIG. 2 illustrates an image capture system 110 that combines a cameraimage with sensor data set from a sensor system. The camera image istaken using a camera embedded as a part of an image capture device. Thisdevice can be a camera such as a digital or analog point-and-shootcamera, a digital or analog single-lens reflex “SLR” camera, a digitalor analog image-capturing telescope, a digital or analog image-capturingmicroscope, or a digital or analog camcorder. Consumer electronicdevices with imaging componentry may also be used. For example, the userdevice can be a portable consumer user device such as a smartphone, atablet device, a laptop computer, a wearable device, a portable gamingconsole, or a portable media player device. Less mobile devices may alsobe used such as desktop computers, television systems, gaming consoles,and various types of conveyances.

The image capture system 110 allows the user to capture images and videowith greater precision and, further, to collect and gain access tometadata about the images or video. The metadata can include, forexample, the exact location in latitude, longitude, and elevation of theimage capture device. Captured information may further or alternativelyinclude the roll of the image capture device, the pitch of the imagecapture device, the yaw of the image capture device, the velocity and/ordirection of the image capture device, the viewing angle of the imagecapture device, the azimuth and/or compass bearing of the image capturedevice. Information concerning the horizon angles of the image capturedevice and the inclination and declination of the image capture devicemay likewise be collected. Such metadata can be attached to both imagesand video.

The digital data organization process of the image capture system 110may be controlled manually by a user or automatically by computerhardware/software control processes. These may include organization byphotos, video, audio, location, position, by image capture device, byuser, by date, time, logged user, subscription user, or a number ofother attributes of an image/video/audio/media file. Likewise, theseimages may be made searchable via these attributes in a network based(including “cloud based”) storage system as well as a local storagesystem. In some embodiments, the captured image/video/media can also bestored and organized by facial recognition means and subsequentlysearched or made searchable by facial recognition applications.

FIG. 3 illustrates exemplary functions and features of the image capturesystem 110. The image capture system 110 may include a three-dimensionalimage sensor with internally embedded individual functions for providingnavigation, gyroscopic, processor, and communication technology. Thesevarious functionalities, which may be implemented through software,hardware, or a combination of the two, collect incident, event, and itemimages with sensor data.

As noted above, such information may include but is not limited toelevation, inclination, roll, pitch, yaw and bearing information. Othertypes of information might include position, time, altitude,zoom/telescope information, distance to/from a pictured object,elevation angles, XYZ position, global positioning system (GPS)coordinates, GPS differential corrections, 3-axis positions of an objectin the image, real-time kinematics (RTK) sensor data, real-time network(RTN) survey data, cell triangulation data, satellite map location data,street view map location data, map pointer data, map compass data,roll/pitch/yaw data, and world geodetic system (WGS) or world geodeticdatum (WGD) data. This collected information may also include customnotes, text, or recordings as well as custom image markers, logged data,attachments, or pointers to additional files.

FIG. 4 identifies exemplary image metadata as may be utilized in anembodiment of the presently disclosed image certification system. Theimage certification system can be used to certify images and sensor datarecorded by the image capture device. A certified image is one whoseimage data and sensor data have been ensured to be authentic andunaltered.

The image certification system can certify the image by creating a newdata form that will travel with each captured image. The system canculminate data into the image data file and organize it in a visual filethat is part of the image file. The data can be presented to a userthrough a traditional display device along with the image or can beviewed through a user control. The certification will be highlighted bycertain colors and integrated with systematically collected data at timeof capture and loaded into the appropriate location. A certified imagecan be signified as an image overlaid by a marker such as a barber pole,a “certified image” stamp, or a “certified by [image certifyingauthority]” stamp. FIG. 4 illustrates a barber pole logo and “certifiedby ImageKeeper stamp.”

A user seeing such a marker can be confident that an image certifyingauthority has certified the authenticity of the underlying digital data,video, image, and/or metadata. The image certification system may beused to ensure that digital image data is protected in an “originalcaptured state.” That state can be certified by the image capture system110 and/or a third party auditor system. That data can then be organizedand/or secured (e.g., encrypted). The image certification system maystore the images in network, cloud, or local area storage system likethose shown in FIG. 5. The storage system may require a subscriptionbefore a user is able to interact with the data.

Embodiments of the present invention may be extended to otherthird-party applications or services. For example, a user mayshare/post, via social networks and social media sites or mobileapplications (e.g., Twitter, Facebook, Instagram, Pinterest, Myspace), acertified image/video/audio/media, in either a secure (e.g., encrypted)or unsecure format. A user may also have the ability to send certifiedimages/media to another device/user via a messaging system (e.g., SMS,Apple iMessage, Google Hangouts, SnapChat, email, or anothercommunication method) in a secured (e.g., encrypted) or unsecuredmanner.

FIG. 5 illustrates an exemplary image capture system 110 and imagecertification system 120 interfacing with different types of userdevices and camera devices. The image capture device collects an imageas well as sensor data (as seen on the left side of FIG. 5). The data isthen autonomously sent to the internet/cloud system where the digitaldata is filed, stored and accessed through the web in a systematic orserialized format constant with image identification formed with theimage capture device (as seen on the right side of FIG. 5). This datacan be transferred over a wired or a wireless connection. In someembodiments, the image capture device can first synchronize its imageand/or sensor data with a second device. For example, a camera device(e.g., a digital point-and-shoot camera) may first be required tosynchronize its data with a user device such as a smartphone or wearabledevice, which can then form a connection to the internet/cloud system.

The internet/cloud system can include one or more server systems, whichmay be connected to each other. In one embodiment, this internet/cloudsystem is a wireless multiplexed system for securely storing digitaldata to and from mobile digital devices. In another embodiment, thedigital data (e.g., images, reports) are securely held in one centralplace, either by a hardware memory device, server, or a data center.

Once the data is in the Internet/cloud system, it may be accessiblethrough a web portal. This web portal may include image-editing tools,worldwide access, and collaboration mechanisms available to its users.Security, digital signature, watermarking, encryption physical access,password credentials area can be utilized throughout the system.Original digital data can be confirmed, saved and protected thoughvarious technologies and system controls.

In some embodiments, certain data integrity precautions can be taken.For example, all non-asset data can, in some embodiments, be secured ina local database with a globally unique identifier to ensure itsintegrity. The asset's security and integrity can be insured via aDigital Signature that is made up of a SHA1 digest, the time that theasset was captured and the device of origin. This allows the mobile appor server to detect changes due to storage or transmission errors aswell as any attempt to manipulate or change the content of the asset.The Digital Signature can be encrypted with a public/private key-pairthat was generated uniquely for that asset. The private key can bedestroyed and never written to disk or stored in memory; as such, thisensures that the asset cannot be re-signed or changed in a way thatcannot be tracked.

FIG. 6 illustrates an exemplary incident report document with anintegrated certified image. The incident report document may be adigital or physical document. The incident report can include acertified photo of an incident or event along with a description of theincident or event. This description of the incident or event can includeinformation such as an identification and/or contact information of theuser who took the certified photo using the image capture device and/orwho wrote the description of the incident or event, a location of theincident or event, and a brief textual or graphical description of theincident or event. The digital data organization process of the incidentreporting system may be controlled manually by a user or automaticallyby computer hardware/software control processes.

FIG. 7 further illustrates exemplary sensor data that can be included ametadata for a digital image of the image capture system 110. Forexample, the sensor data may include X/Y/Z location data of the imagecapture device and/or object(s) being photographed. Metadata may furtheror alternative include data about the distance from the image capturedevice to an object(s) being photographed, a time stamp of the imagecapture, GPS data for the image capture device and/or object(s) beingphotographed, elevation data for the image capture device and/orobject(s) being photographed, or an elevation difference between theimage capture device and the object(s) being photographed. Otherinformation might include a bearing between the image capture device andthe object(s) being photographed, a roll/pitch/yaw of the image capturedevice, an angle between the image capture device as compared to a levelsensor, an inclination of the image capture device, or a compass headingof the image capture device as compared to true north and/or magneticnorth. Still further examples of data include a distance to/from a celltower, a cell tower triangulation location, a cell tower bearing, an RTNand/or RTK interface, a differential GPS correction, and a surveyedbenchmark location/distance/elevation.

FIG. 8 is a flow diagram illustrating an exemplary operation of a userdevice software application for image capture, image certification,network transfer, and incident reporting. While the flow diagram in FIG.8 shows a particular order of operations performed by certainembodiments of the invention, it should be understood that such order isexemplary. Alternative embodiments can perform the operations in adifferent order, combine certain operations, and overlap certainoperations.

FIG. 9A and FIG. 9B are flow diagrams illustrating an exemplaryoperation of web portal software. While the flow diagrams in FIG. 9A-Bshow a particular order of operations performed by certain embodimentsof the invention, it should be understood that such order is exemplary.Alternative embodiments can perform the operations in a different order,combine certain operations, and overlap certain operations.

FIG. 10 illustrates various exemplary aspects of the incident reportingsystem. For example, the incident reporting system may include a mobilesoftware application for a portable user device such as a smartphone ortablet device. This mobile application may interface with the imagecapture system 110 and/or image certification system 120. This mobileapplication may interface with a network connection to the web portal,which may include a cloud/network storage module. The cloud/networkstorage module may be accessed in some embodiments through a dashboardinterface hosted at the web portal. This may be tied to multipleinterfaces for viewing images from the image capture system 110 and/orimage certification system 120, and for viewing incidents associatedwith those images. In some embodiments, these may include image viewswith detail annotations, visual incident reports, and mapping toolsoverlaying incident report locations and/or image locations.

FIG. 11 is an exemplary incident report document with an integratedimage and location map indicating where the image was taken. This issimilar to the exemplary incident report document of FIG. 6.

FIG. 12A illustrates an exemplary certified image within an exemplaryimage viewer application. The exemplary image viewer application shows a“certified image” stamp or “certified by [image certifying authority]”stamp graphic in the upper left corner, signifying that the image is acertified image. The exemplary image viewer also shows image metadata ina viewable box on the right-hand side. This metadata is also certifiedas part of the certification process, and may in some cases also bemarked with a “certified image” stamp or “certified by [image certifyingauthority]” stamp graphic.

FIG. 12B is a flow diagram illustrating an exemplary operation of theintelligent image certification system. The flow diagram includes fourparts: the capture of the certified image, generation of a Copy of thecertified image, the Image Security Process with an exemplary SecurityMeter, and the Screen Hosted Stamp.

Upon data capture, the digital watermarking and certification softwareprocesses may be applied to the digital image data as part of theimage/video certifying process. A certified Image/video may be createdalong with the “certified image” stamp or “certified by [imagecertifying authority]” stamp graphic that may be embedded into oroverlaid over the visual image. The certified image may be stored in acertified image file or bundle of files (e.g., a ZIP or RAR file) thatincludes the metadata for the image (e.g., location, direction, azimuth,sensor heading, and other potential metadata). The certified image filemay then be securely transmitted and received in the web portal.

The certified image file may continue to contain all the certified dataand certified image stamp/logo on the visual image as the file isaccessed, used, or inserted into a report or printed etc. Thecertification and watermark may be configurable by graphics, by levelsof security, location on the image, levels oftransparency/size/holographic, and visibility. This configuration may bedone automatically (e.g., based on media type, file size, device, user,etc) or manually via user control. Optionally, a user may choose toprint, download, or turn additional graphics (e.g., certified imagestamp) on or off.

A certified image may then synchronize or be transferred from the imagecapture device (e.g., camera device or user device) to the web portalserver to be accessible through the web portal. This example is embeddedinto the image digital file and is transparent/opaque and has anaccompanying logo of the user. This provides to the user a visual proofthe image is true, real, accurate, unmodified without the user having toexample the metadata file to manually verify, or the user attempting toverify that an image was unaltered. The process also allows users todetect image manipulation, changes, or attempts to change the originalimage data by researching the audit trail function of the system and todo so easily and quickly and without manual verification.

Multiple Certification Stamps based on the level of certification may beprovided. For example, “a”-“z,” “1”-“n,” “Level a,” and “chain ofcustody” stamps may be provided, each indicating a different level ofsecurity or a different aspect of authenticity, security, or unaltereddata checked and verified by the image certification system. Inaddition, a user with the proper authority and license can interact withthe image data, reports by applying yet a further certification stampinto the data file by applying a device authority stamp to the screenshowing the certified image or document and add that certification stampto the screen with the screen interactive stamping device and theauthority seal will appear on the document in the electronic file andbecome part of the document or image.

While the flow diagram in FIG. 12B shows a particular order ofoperations performed by certain embodiments of the invention, it shouldbe understood that such order is exemplary. Alternative embodiments canperform the operations in a different order, combine certain operations,and overlap certain operations.

FIG. 13 illustrates an exemplary image security system as performed bythe user device mobile application or by the web portal. FIG. 13 showsdigital signature and water marked images from the image capture system,which can be used in incident reports.

The presently disclosed invention may be implemented in the generalcontext of computer executable instructions via software located on andbetween a remotely operated user device (e.g., Smartphone, tablet, orother electronic device) with a computerized operating system. There maybe multiple user devices interacting with a web portal, which may belocal or may be geographically separated. The user devices may beremotely addressable with secure login, with or without password,biometric fingerprint, voice, retinal scan or encrypted log on webportal providing global internet access, either via fiber, radiofrequency, satellite, or data linking with bi-directional, cloud systemand or data center or location under user command.

The web portal and/or user device mobile application can includeannotation tools, allowing for creation of charts and graphics withcolor annotation incorporating picture in picture, with image numbersassociated with each image brought into the web portal workspace. Inaddition to annotation tools, any interface with all of the externaldata inputs, such as weather, news, Internet sites, other sensor datacan be integrated into the workspace and integrated into the image workareas.

In one embodiment, report generation is available in the web portal toolworkspace. Along with the report development is internal electronicsignature and annotation, with the ability to add images, text todocument, voice to text, language conversion, spelling corrections,assigning a number to the report, with associated event/incident numberalong with all the images captured for the specific event/incident andother associated data. All of this data is captured by the web portalsoftware application and integrated into the report either with the usercommands or pre-established data could be added or selected either bythe user or by the software program. The reports can be saved in manycomputer formats, and can be SMS, Emailed, Printed, Filed or stored online or off line as required by the user or pre-selected choices madeeither by the user or the software.

The foregoing detailed description of the technology herein has beenpresented for purposes of illustration and description. It is notintended to be exhaustive or to limit the technology to the precise formdisclosed. Many modifications and variations are possible in light ofthe above teaching. The described embodiments were chosen in order tobest explain the principles of the technology and its practicalapplication to thereby enable others skilled in the art to best utilizethe technology in various embodiments and with various modifications asare suited to the particular use contemplated. It is intended that thescope of the technology be defined by the claim.

What is claimed is:
 1. A method for generating certified media, themethod comprising: receiving, from a media capture device, a digitalmedia asset captured by the media capture device; receiving a sensordataset captured by one or more sensors, the sensor dataset associatedwith capture of the digital media asset; executing instructions storedin memory, wherein execution of the instructions by a processor causesthe processor to: retrieve metadata from the digital media asset, themetadata identifying at least the media capture device and a timeassociated with capture of the digital media asset, generate a hashdigest of the digital media asset, generate a unique key paircorresponding to the digital media asset, the unique key pair comprisinga private key and a public key, generate an encrypted digital signatureby encrypting both the hash digest and the metadata using the privatekey; and generate a certified media dataset by digitally joining thedigital media asset with the encrypted digital signature and the sensordataset, and transmitting the certified media dataset and the public keyto a network server.
 2. The method of claim 1, wherein the sensordataset includes elevation data.
 3. The method of claim 1, furthercomprising transmitting a description of an incident associated with thedigital media asset to the network server along with the certified mediadataset and the public key.
 4. The method of claim 3, further comprisingreceiving spoken audio, wherein execution of the instructions by theprocessor causes the processor to generate the description of theincident by converting the spoken audio to text via a voice-to-textconversion.
 5. The method of claim 1, wherein the digital media assetincludes media data of at least one of a set of media types, the set ofmedia types including an image data type, an audio data type, and avideo data type.
 6. The method of claim 1, wherein execution of theinstructions by the processor causes the processor to destroy theprivate key after generating the encrypted digital signature.
 7. Themethod of claim 1, wherein the sensor dataset includes at least locationdata.
 8. The method of claim 1, wherein the hash digest of the digitalmedia asset is a secure hash algorithm (SHA) digest.
 9. The method ofclaim 1, wherein execution of the instructions by the processor causesthe processor to verify that the digital media asset and the metadataare unaltered based on the encrypted digital signature.
 10. The methodof claim 1, wherein generating the certified media dataset furthercomprises encrypting the digital media asset.
 11. The method of claim 1,wherein generating the certified media dataset further comprisesidentifying a chain of custody of the digital media asset.
 12. A systemfor generating certified media, the system comprising: a communicationtransceiver communicatively coupled to a network server and to a mediacapture device that includes one or more sensors, wherein thecommunication transceiver receives from the media capture device adigital media asset captured by the media capture device, wherein thecommunication transceiver also receives from the media capture device asensor dataset captured by the one or more sensors, the sensor datasetassociated with capture of the digital media asset, and wherein thecommunication transceiver transmits a certified media dataset and apublic key to the network server; a memory that stores instructions; anda processor coupled to the memory and to the communication transceiver,wherein execution of the instructions by the processor causes theprocessor to: retrieve metadata from the digital media asset, themetadata identifying at least the media capture device and a timeassociated with capture of the digital media asset, generate a hashdigest of the digital media asset, generate a unique key paircorresponding to the digital media asset, the unique key pair comprisinga private key and the public key, and generate an encrypted digitalsignature by encrypting both the hash digest and the metadata using theprivate key, and generate the certified media dataset by digitallyjoining the digital media asset with the encrypted digital signature andthe sensor dataset.
 13. The system of claim 12, wherein the one or moresensors include an elevation sensor and the sensor dataset includeselevation data.
 14. The system of claim 12, wherein the communicationtransceiver receives a second certified media dataset from the networkserver during a data synchronization, wherein the communicationtransceiver transmits the certified media dataset and the public key tothe network server during the data synchronization.
 15. The system ofclaim 12, wherein the digital media asset includes media data of atleast one of a set of media types, the set of media types including animage data type, an audio data type, and a video data type.
 16. Thesystem of claim 12, wherein execution of the instructions by theprocessor causes the processor to destroy the private key aftergenerating the encrypted digital signature.
 17. The system of claim 12,wherein the sensor dataset includes at least distance measurement datameasuring a distance to an object pictured in the digital media asset.18. The system of claim 12, wherein the hash digest of the digital mediaasset is a secure hash algorithm (SHA) digest.
 19. The system of claim12, wherein generating the certified media dataset further comprisesmodifying the digital media asset to include at least one of a watermarkor a stamp.
 20. The system of claim 12, wherein generating the certifiedmedia dataset further comprises encrypting the digital media asset. 21.The system of claim 12, wherein the communication transceiver transmitsa description of an incident associated with the digital media asset tothe network server along with the certified media dataset and the publickey.
 22. A non-transitory computer-readable storage medium, havingembodied thereon a program executable by a processor to perform a methodfor generating certified media, the method comprising: receiving, from amedia capture device, a digital media asset captured by the mediacapture device; receiving a sensor dataset captured by one or moresensors, the sensor dataset associated with capture of the digital mediaasset; retrieving metadata from the digital media asset, the metadataidentifying at least the media capture device and a time associated withcapture of the digital media asset; generating a hash digest of thedigital media asset; generating a unique key pair corresponding to thedigital media asset, the unique key pair comprising a private key and apublic key; generating an encrypted digital signature by encrypting boththe hash digest and the metadata using the private key; generating acertified media dataset by digitally joining the digital media assetwith the encrypted digital signature and the sensor dataset; andtransmitting the certified media dataset and the public key to a networkserver.
 23. The non-transitory computer-readable storage medium of claim22, the method further comprising: receiving a description of anincident associated with the digital media asset; and transmitting thedescription of the incident to the network server along with thecertified media dataset and the public key.