Methods for authenticating photographic image data

ABSTRACT

Systems and methods are provided for authenticating image files when network connections should not or cannot be used to transfer image files. A user device application may capture an image at a user device, generate an image file, and generate a hash file based on the image file. Instead of sending the image file to an authentication server for authentication, the application may send the hash file. If desired, the application may transfer the image file when a desirable network connection is available. Any alteration to the image file in the meantime will result in a different hash file for the altered image file, thus allowing detection of altered image files. This approach offers decreases the amount of data that is required to be transmitted in low or undesirable signal conditions, while maintaining an ability to detect alterations to image files that may have been made in the meantime.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional of U.S. patent application Ser. No.16/531,620, filed Aug. 5, 2019, entitled “METHODS FOR AUTHENTICATINGPHOTOGRAPHIC DATA”, which is a continuation of U.S. patent applicationSer. No. 15/728,869, filed Oct. 10, 2017, entitled “METHODS FORAUTHENTICATING PHOTOGRAPHIC DATA” (which issued as U.S. Pat. No.10,375,050 on Aug. 6, 2019), the contents of which are herebyincorporated by reference in their entirety herein. This application isrelated to U.S. Pat. No. 10,095,877, filed on Mar. 9, 2016, entitled“SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC DATA,” which issuedon Oct. 9, 2018; U.S. Pat. No. 9,300,678, filed on Aug. 3, 2015,entitled “SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC DATA”which issued on Mar. 29, 2016; U.S. Pat. No. 9,621,565, filed on Nov.16, 2015, entitled “SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHICDATA,” which issued on Apr. 11, 2017; and PCT Application No.PCT/US16/45089, filed on Aug. 2, 2016, entitled “SYSTEMS AND METHODS FORAUTHENTICATING PHOTOGRAPHIC DATA;” which are all hereby incorporated byreference in their entireties.

TECHNICAL FIELD

The present disclosure relates to systems and methods for authenticatingphotographic image data, including a software application forcontrolling photography on a client device and metadata associatedtherewith and an authentication server for receiving data therefrom.

BACKGROUND OF THE INVENTION

Digital photography has grown steadily since its introduction. Socialnetworks and mobile computing devices have further accelerated thegrowth of photographic data made available to the public. The ability totake and share photographs anytime and anywhere has resulted in thegeneral public consuming more photographic data than ever and relying onthese photographs for up to the minute information. However, it is awell-known fact that digital photographs are easily edited and theinformation contained within a digital photograph may not be entirelytrustworthy.

U.S. Pat. 9,300,678, entitled “Systems and methods for authenticatingphotographic image data,” which issued Mar. 29, 2016, the contents ofwhich is incorporated by reference herein its entirety, discloses, inpart, a software application that resides on a client device (e.g., asmart phone or other client device) for controlling various aspects ofphotography on the client device where authentication of photos isdesired, an authentication server for receiving a photo and associateddata therefrom and creating an authenticated photo and a website forstoring the authenticated photos and which enables users whosubsequently receive a copy of the photo to determine if it is anauthentic photo. Collectively, the image authentication application andauthentication server are configured to be operable to control thetaking of photos to be authenticated and the association of metadatawith those photos. The image authentication application may requireusers, desiring to generate an authenticated photo, to invoke the imageauthentication application to take a picture. The image authenticationapplication and authentication server include functionality to reducethe likelihood of alteration of metadata associated with a picture takenunder control of the application.

Once a picture is taken under control of the image authenticationapplication, it is sent from the image authentication application to theauthentication server. The image authentication application may preventa photo that has been taken from being edited or sent from the imageauthentication application to any location other than the authenticationserver. This helps prevent alteration of the photo.

To take a picture the user may be required to open the imageauthentication application (if it is not already open on the device).After taking a picture using the image authentication application andselecting to use the photo, the image will be transmitted to theauthentication server along with various metadata, such as geographicinformation, e.g., the user's current latitude/longitude, time data ifdesired and/or other metadata.

According to one aspect, the time at which the image is received by theserver is recorded. This helps prevent alteration of the time metadataassociated with the photo. In various prior approaches to photoauthentication, the time data is generated solely by the client device.A problem with these prior approaches is that users can alter the systemtime of the client device.

In certain embodiments, the application may include a feature to ensurethat the time delay between opening the application and/or taking aphoto in the image authentication application and sending the image tothe authentication server is within an approved time frame. Similarly,the image authentication application may include a feature to ensurethat the location at which a photograph was taken is within an approveddistance limitation from the location from which the user transmits thephotograph to the authentication server.

According to another aspect, the authentication server performs varioussteps to facilitate authentication of photos received from theapplication. When a photo is received, the authentication server mayassign it a unique resource locator (e.g., a unique web address). Theauthenticated image (or a version of the authenticated image), andassociated metadata, is stored on the authentication server. The uniqueresource locator (e.g., a web address or a web address proxy such as abitly code or a tinyURL) may be provided along with the authenticatedimage for third party verification of the image. The website (and/orother distribution infrastructure) will allow third parties to check andreference the authenticated image to verify that it is authentic. Theauthentication server may host and/or be in communication with thewebsite. Any third party can visit the authentication server website tolook up the authenticated image they have been provided and to make surethat the picture they are viewing is also on the website. This insuresthat the image provided to the third party viewer has, in fact, beenauthenticated by the authentication server.

This approach has many advantages. However, it may present certainchallenges when the user does not have a strong data connection at thetime a picture is captured. It may also be less than desirable if theuser must transmit a large file (e.g., a video file) over cellularnetwork, particularly when the data rate is relatively expensive. Othernetwork issues may also present challenges.

SUMMARY OF THE INVENTION

The invention addresses these and other potential challenges with priorapproaches.

According to one aspect, the invention provides a solution to at leastsome of these issues by transferring a short, fixed length hash file atthe time of capture, instead of immediately sending the image file. Ifdesired, the application may transfer the full image or video file whena desirable (e.g., strong WiFi or acceptable cellular) connection isavailable. The file hash can be a relatively small file (e.g., less than1 kB or other desired size) relative to photos and/or video which canexceed 10 MB or more. This approach offers a significant decrease in theamount of data that is required to be transmitted in low or undesirablesignal conditions.

According to one aspect, the software application may be configured tooperate as follows. The software is invoked to capture an image (e.g.,still image, video image, etc.) on a device and create an image file(e.g., photograph file, video file, etc.) and capture desired metadata(e.g., user ID, latitude, longitude). The application then creates ahash of the image file. The application then transmits the metadata andthe hash of the contents of the image file to the authentication server,without sending the image file.

Upon receipt, the authentication server creates a temporary recordcontaining the hash value provided, the user ID, lat/long AND thetimestamp that this request reaches the server.

When the user device has access to a desirable network connection (e.g.,reaches a WIFI or strong cellular connection) the full image/video filemay be transferred to the authentication server. The authenticationserver then hashes this data file using the same algorithm that was usedon the device to create the hash. The authentication server thencompares this hash to the hash stored in the temporary records and if itmatches associates the image/video file with the corresponding record.

Alternatively, the application may send to the authentication serveronly the file hash and not the actual image file. The authenticationserver can store the hash and later use this, if necessary, toauthenticate an image file. This can be useful in high security or highsituations where it is not desirable to have a copy of the image orvideo content available on a networked authentication server, but forwhich authentication may be desired. In these cases, the hashes storedon the authentication server can be user to later validate content.

The application may determine whether to transmit a hash file or animage file based on a characteristic of an available network connection.The characteristic may include a type and/or quality of a networkconnection available at the time of capturing the image. For example,the user may wish for image files to be sent only via certain types ofnetwork connections (e.g., WiFi connections) but not others (e.g.cellular network connections). In this instance, the application maysend the hash file if the user device is connected via a cellularnetwork connection, but send the image file if the user device isconnected via a WiFi connection. Alternatively or additionally, theapplication may assess a quality of the network connection and, if thequality does not exceed a threshold quality level, the application maydetermine that a hash file should be sent instead of the image file.Later, if a WiFi connection becomes available and/or if the networkconnection quality improves, the application may send the image file.

These and other objects, features, and characteristics of the systemand/or method disclosed herein, as well as the methods of operation andfunctions of the related elements of structure and the combination ofparts and economies of manufacture, will become more apparent uponconsideration of the following description and the appended claims withreference to the accompanying drawings, all of which form a part of thisspecification, wherein like reference numerals designate correspondingparts in the various figures. It is to be expressly understood, however,that the drawings are for the purpose of illustration and descriptiononly and are not intended as a definition of the limits of theinvention. As used in the specification and in the claims, the singularform of “a”, “an”, and “the” include plural referents unless the contextclearly dictates otherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings are provided for purposes of illustration only and merelydepict typical or example implementations. These drawings are providedto facilitate the reader's understanding and shall not be consideredlimiting of the breadth, scope, or applicability of the disclosure. Forclarity and ease of illustration, these drawings are not necessarilydrawn to scale.

FIG. 1 illustrates a system for capturing an image at a device to beauthenticated in conjunction with an authentication server accessible tothe device via a network communication, according to an implementationof the invention.

FIG. 2 illustrates a process for capturing an image at a device to beauthenticated in conjunction with an authentication server accessible tothe device via a network communication, according to an implementationof the invention.

FIG. 3 illustrates a device for authenticating image files, captured atthe device, in conjunction with an authentication server, in accordancewith an embodiment of the present disclosure.

FIG. 4 illustrates a process of a device for authenticating image files,captured at the device, in conjunction with an authentication server, inaccordance with an embodiment of the present disclosure.

FIG. 5 illustrates an authentication server for authenticating imagescaptured at and provided by a device, according to an implementation ofthe invention.

FIG. 6 illustrates a process of an authentication server forauthenticating image files captured at a device in conjunction with anauthentication server, according to an implementation of the invention.

DETAILED DESCRIPTION

According to one aspect, the invention provides a solution to at leastsome of these issues by transferring a short, fixed length hash file atthe time of capture, instead of immediately sending the image file. Ifdesired, the application may transfer the full image or video file whena desirable (e.g., strong wifi or acceptable cellular) connection isavailable. The file hash can be a relatively small file (e.g., less than1 kB or other desired size) relative to photos and/or video which canexceed 10 MB or more. This approach offers a significant decrease in theamount of data that is required to be transmitted in low or undesirablesignal conditions.

FIG. 1 illustrates a system 100 for capturing an image at a device to beauthenticated in conjunction with an authentication server accessible tothe device via a network communication, according to an implementationof the invention. System 100 may include a user device 110, anauthentication server 120, third party requesters 130, a database 140,and/or other components. The components of system 110 may be incommunication with one another via a network 102.

Referring to FIG. 2, which illustrates a process for capturing an imageat a device to be authenticated in conjunction with an authenticationserver accessible to the device via a network communication, in anoperation 202, user device 110 may capture an image, generate an imagefile based on the captured image, generate a hash file based on a hashof the image file, and obtain metadata related to the image file.

In an operation 204, the user device 110 may transmit the hash file andinformation identifying the image file to the authentication server 120without transmitting the image file at a first time. In some instances,the user device 110 may transmit the metadata to the authenticationserver 120 with the hash file and the information identifying the imagefile.

In an operation 206, the authentication server 120 may receive the hashfile and the information identifying the image file and store them inassociation with one another, such as in a database 140. In this manner,the authentication server 120 may later retrieve a corresponding hashfile based on the information identifying the image file.

In an operation 208, the client user device 110 may transmit the imagefile (along with information identifying the image file) to theauthentication server 120 after the hash file and the informationidentifying the image file was transmitted.

In an operation 210, the authentication server 120 may receive the imagefile from the user device 110, and generate its own hash file based on ahash of the image file. The authentication server 120 may use the samehash function used by the user device 110 to generate its hash files.

In an operation 212, the authentication server 120 may compare theserver-generated hash file with the user device-generated hash file (thehash file received from the user device 110). If the server-generatedhash file matches the user device-generated hash file, theauthentication server 120 may determine that the image file has not beentampered with. This is because any such tampering will result innon-matching hash files. As would be appreciated, whether or not twohash files match may be determined based on conventional file comparisontechniques, such as executing a compare or diff function on the twofiles. Alternatively, upon receipt of the image file the authenticationserver 120 may store the image file in association with the informationidentifying the image file and the hash file received from the userdevice 110 for later authentication (e.g., in response to a request forauthentication).

In an operation 214, in response to determining that theserver-generated hash file matches the user device-generated hash file,the authentication server 120 may authenticate the image file byapplying a watermark to it, storing an indication in database 140 thatthe image file has been authenticated, and/or take other actions toindicate that the image file is authentic.

Operations 207 and 209 may be executed instead of or in addition tooperation 208. In an operation 207, the user device 110 may provide theimage file and the information identifying the image file to a thirdparty requester 130. In an operation 209, the third party requester 130may provide the image file and information identifying the image file toauthentication server 120 for authentication. For example, the thirdparty requester 130 may wish to authenticate an image file provided fromthe user device 110. The authentication server 120 may receive a requestto authenticate an image file from a third party requester 130 (e.g.,not from the user device 110), where the request includes an image fileto be authenticated and the information identifying the image file. Inthese implementations, the image file from the third party requester 130is purportedly the same as the image file from which the userdevice-generated hash file is based. In other words, if aserver-generated hash file of the image file from the third partyrequestor 130 matches the user device-generated hash file, then theimage file from the third party requestor has not been tampered with(and is the same image file—i.e., copy—as the image file that was usedto generate the user device-generated hash). In an operation 215, theimage authentication server 120 may provide an indication ofauthentication to the user device 110 and/or the third party requester130 as appropriate. Such indication may include the image file,authentication information (including results of the hash filecomparison, the hash file output, a watermark, etc.), and/or otherinformation indicating that the image file has been authenticated by theauthentication server 120.

Having addressed an overview of implementations of the system, attentionwill now be turned to the user device 110 and authentication server 120.

User Device 110

In an implementation, user device 110 may include any device capable ofcapturing images including, but not limited to, cell phones, smartphones, tablet computers, laptop computers, digital cameras, webcameras, laptop computers, desktop computers, security cameras,televisions, monitors, and the like. Referring to FIG. 3, whichillustrates a device for authenticating image files, captured at thedevice, in conjunction with an authentication server, user device 110may include an electronic imaging device 302, one or more networkdevices 304, location device 306, one or more processors 312, one ormore electronic storage devices 314, and/or other components.

When a user wishes to take an image to be authenticated, the user opensthe image authentication application 320 on the user device 110 tocapture an image. When it is opened, the image authenticationapplication 320 may record the time that the image authenticationapplication is opened, the geographic location of the client device atthe time the image authentication application is opened, and/or otherinformation relevant to capturing images using the image authenticationapplication. The foregoing and other information may be used later asmetadata for authentication. Once the user captures an image using theimage authentication application 320, the image authenticationapplication may generate an image file based on the captured image andmay assess an available network connection to determine whether theimage file may be transmitted via the available network connection. Theimage authentication application 320 may obtain time, location, and/orother metadata at the time of image capture. Alternatively, prior toallowing the user to capture the image, the image authenticationapplication 320 may assess an available network connection (or determinethat no network connection is available). In this instance, the imageauthentication application 320 may not permit the user to capture animage if no network connection is available (or if an available networkconnection is available but should not be used for various reasonsdescribed herein).

In some instances, the image authentication application 320 may receivea request from the user to send the image file for authentication inresponse to which it may determine one or more characteristics of anavailable network connection and determine that the image file shouldnot be sent via the network connection. In these instances, the imageauthentication application 320 may take one or more steps to confirmthat the user has not had the opportunity to edit the image file byensuring that certain time and/or geographic restrictions are satisfied.For example, the image authentication application 320 may note the timeat which the image authentication application was opened, and the timeat which the request to transmit the image file is made. If the requestto transmit the image file is made sufficiently soon after the imageauthentication application is opened (for example, within one minute orother threshold time), then the image authentication application mayauthorize further operations to send the image file to proceed.Otherwise, the request to transmit the image file may be denied and theimage file may be deleted or marked as unauthenticated. The imageauthentication application 320 may use other data for such verificationas well or instead of time information. For example, the imageauthentication application 320 may compare the geographic location ofthe user device 110 at the time the image authentication application wasopened and the geographic location of the device at the time the userrequests transmission of the image file to the authentication server 120to ensure that the user has not moved a great distance (e.g., less than200 feet or other threshold distance value). Otherwise, the request totransmit the image file may be denied and the image file may be deletedor marked as unauthenticated. The foregoing time and geographicrequirements help to ensure that the user has not had sufficient time toedit the image file.

Additional restrictions may be placed by the image authenticationapplication 320 to assist in this authentication process. For example,the image authentication application 320 may only allow images takenwithin the image authentication application 320 to be transmitted to theauthentication server 120. The image authentication application 320 mayalso prohibit the use of any editing tools within the imageauthentication application 320, or to prohibit exporting of image filesso that the user cannot export image files to another program forediting. In this way, the image authentication application 320 ensuresthat the image file has remained within the approved applicationenvironment for the entirety of the image file's existence, and that theuser has not been given the opportunity to revise any portion of theimage file, including the image itself or the associated metadata.

In implementations that use the foregoing and other restrictions, oncethe image authentication application 320 has confirmed that the imagefile satisfies such restrictions, it may generate a hash file based onthe image file and send the hash file to the authentication server 120.When the available network connection improves and/or another networkconnection becomes available, the image authentication application 320may send the image file. Metadata (e.g., time and location data)associated with the image file may be sent along with the hash fileand/or the image file. The authentication server 120 performs varioustasks to authenticate the image file, including storing the hash file inassociation with the identifying information.

When a copy of the image file is received from the user device 110, theauthentication server 120 may generate a server-generated hash filebased on the copy, and compare the server-generated hash file with theuser device-generated hash file. A match between the server-generatedhash file and the user device-generated hash file may indicate that thecopy of the image file has not been tampered with or altered since theoriginal copy was created (because the user device-generated hash filewas generated by the image authentication application 320 on theoriginal). Upon authentication the authentication server 120 may apply awatermark and/or provide another indication that the image file has beenauthenticated.

Electronic imaging device 302 may include an electronic image sensorconfigured to detect and convey information used to generate an image.For example, electronic imaging device 302 may include, withoutlimitation, a charge coupled device (“CCD”) sensor, a complementarymetal-oxide-semiconductor (“CMOS”) sensor, and/or other type of deviceconfigured to detect and convey information used to generate an image.The image may include a still image (e.g., a photograph), a video image,and/or other types of images.

Network device 304 may include a network interface device configured toconnect to and transmit data over a network, such as network 102(illustrated in FIG. 1). In some implementations, user device 110 mayinclude a network device 304 for each of different types of networkconnections that may be available. For example, and without limitation,one network device 304 may be configured to connect to a cellular dataconnection (e.g., “3G/4G/5G/etc.”) provided through a wireless serviceprovider, while another network device 304 may be configured to connectto a Wireless Fidelity “WiFi”) connection using a IEEE 802.XX or otherspecification. Other types of network connections through whichcommunication with authentication server 130 across a network may beused as well. In some implementations, a single network device 304 maybe configured to connect to multiple types of network connections aswell.

Location device 306 may include a device configured to detectinformation used identify a physical (e.g., geographic) location of thelocation device. For example, and without limitation, location device306 may include a Global Positioning System (“GPS”) sensor device, aWiFi device (for obtaining hotspot location information), a networkdevice (for obtaining IP address-based physical locations), and/or othertype of location device configured to produce information used toidentify a physical location of the location device 306 (and thereforethe user device 110).

In an implementation, the one or more processors 312 may be programmedby computer program instructions, such as those stored in the one ormore electronic storage devices 314. For example, the one or moreprocessors 312 may be programmed by, among other instructions, a nativecamera application 316 and an image authentication application 320. Thenative camera application 316 may be an executable application, which isa different executable application than the image authenticationapplication 320, that captures images using electronic imaging device302. Native camera application 316 typically stores image files itgenerates in an accessible file location, such as a camera directorythat is readable using an image album application. From the accessiblefile location, such image files are readily accessed and able to beedited. To help prevent such open access and editing functions, imageauthentication application 320 may be configured with its own imagecapture and storage functionality, as described herein.

In an implementation, image authentication application 320 may includevarious instructions such as, without limitation, a settings manager322, an image file generator 324, a hash file generator 326, a networkconnection analyzer 328, a decision engine 330, and/or otherinstructions. As used herein, for convenience, the various instructionswill be described as performing an operation, when, in fact, the variousinstructions program the processors 312 (and therefore user device 110)to perform the operation.

User-Defined Settings and System Rules That Control Operation of theImage Authentication Application

The settings manager 322 may obtain, from a user, one or moreuser-defined settings to be applied to operation of the imageauthentication application 330. For example, the settings manager 322may expose a user interface with input settings that allow a user toconfigure the behavior of the image authentication application 330. Theuser-defined settings may include, without limitation, a setting thatindicates types of network connections in which image files should notbe transferred, a setting that indicates types of network connections inwhich image files may be transferred, a setting that indicates a maximumfile size permissible for an image file to be transferred, and/or otheruser-definable settings that control the behavior of the imageauthentication application 330.

The various settings may be combined or otherwise used in connectionwith one another. For example, a user may specify that image filesshould not be sent over a cellular data connection, but can be sent overa WiFi connection. The user may specify that image files over a certainsize should not be sent over a cellular data connection. Other types ofnetwork connections may be specified as well or in the alternative. Insome instances, a user setting may specify that image files should notbe transmitted when an available network connection is of low quality(i.e., only when an available network connection is “strong”). Such “lowquality” or “strong” quality may be measured based on, for example,network latency, network error rates, and/or other network metrics thatmay be measured to determine whether or not they meet certain qualitythresholds (which may be specified by the user and/or predefined by theimage authentication application 330). In some instances, the imageauthentication application 330 may decide (whether or not based on auser-defined setting) whether to send an image file based on the qualityof an available network connection. For example, a predefined networkmetric threshold may be used to determine what is a “low quality”network connection and what is a “strong” network connection. It shouldbe noted that a single quality metric need not be used. For instance, acombination of quality metrics may be used, weighted, and scored togenerate an overall network quality score, which may be compared to anoverall network quality threshold. The foregoing threshold values may bepredefined by a user-defined setting and/or a system rule, discussedbelow.

In addition to or instead of the user-defined settings, the settingsmanager 322 may obtain predefined system rules that control operation ofthe image authentication application 330. The predefined system rulesmay include settings that are the same as the user-defined settings, butinstead of being set by the user, the predefined system rules may be setby a developer or others who are not an end user of user device 110. Inthis sense, in some implementations, one or more of the system rules mayprovide default settings for corresponding ones of the user-definedsettings. In other implementations, the system rules may prohibit anyuser-defined settings and require only the system rules to be used.

Capturing an Image and Generating an Image File

Using the electronic imaging device 302, image file generator 324 maycapture an image and generate an image file. Depending on the type ofimage that is captured (e.g., photograph, video, etc.), image filegenerator 324 may encode the captured image into an image file accordingto an appropriate encoding technique (e.g., JPEG/PNG/etc. forphotographs, MPEG/NTSC/etc. for videos, and so on). In someimplementations, image file generator 324 may store the image file in afile location on the electronic storage device 114 such as a hidden filelocation. Such hidden file location may not be exposed to the user ofuser device 110, but is accessible to the image authenticationapplication 330. For example, the hidden file location may be obfuscatedfrom the user using native operating system hidden file directorytechniques. Other file locations may be used as well.

Generating Hash Files

In some implementations, the hash file generator 326 may generate a hashfile based on an image file. For example, the hash file generator 326may generate a hash of the image file using a hash function and generatethe hash file based on the hash. In some implementations, the hashfunction may map data from the image file into data of a fixed size, inwhich the fixed size (e.g., memory footprint) is smaller than size ofthe image file. In some instances, the fixed size is orders ofmagnitudes smaller than the size of the image file (depending on thesize of the image file itself). The hash function may generate adeterministic hash according to the content of the image file. Forexample, using the hash function, a hash of the image file will be thesame as the hash of a copy of the image file if the copy is not altered.On the other hand, using the hash function, a hash of the image filewill be different than a hash of a copy of the image file that has beenaltered (and also different than a hash of another file altogether).Examples of hash functions that may be used include, without limitation,SHA-256 and SHA-512.

Assessing Network Characteristics

In an implementation, the network connection analyzer 328 may determineone or more characteristics of an available network connection. Anavailable network connection is a network connection detected by, or canbe established by, one or more of the network devices 304 has detected(e.g., a network connection in which the network devices 304 hasdetected broadcast network information from an access point associatedwith the network connection, a network connection in which communicationwith an access point associated with the network connection has beenestablished, a network connection in which an initial handshakecommunication has been initiated with an access point associated withthe network connection, etc.). The one or more characteristics mayinclude, without limitation, a type of an available network connection,a quality of an available network connection, and/or other types ofcharacteristics that describe an available network connection.

Types of Network Connections

In some implementations, the network connection analyzer 328 maydetermine types of available network connections. For instance, thenetwork connection analyzer 328 may identify a type of networkconnection currently used to transmit data to or from the user device110 via network 102. In some implementations, the network connectionanalyzer 328 may determine that a network device 304 for a cellularnetwork has indicated that a cellular network connection is available(and/or is currently being used to transmit and/or receive data from theuser device 110). Other types of network connections (e.g., WiFiconnections) may similarly be made. In some instances, the types ofavailable network connections may be obtained from the operating systemof user device 110 and/or from an operating system of a network device304 if so configured.

As will be described, the type of available network connection may beused by the decision engine 330 to determine whether or not to send ahash file of an image file and/or determine whether or not to send theimage file.

Quality of Network Connections

In some implementations, the network connection analyzer 328 maydetermine the quality of one or more available network connections. Thequality may be assessed based on one or more metrics that indicate aquality of an available network connection. The one or more metrics mayinclude, without limitation, a signal strength indicator, a number ofdropped packets, a ratio of received packets to dropped packets (or viceversa), a network latency, a network throughput, and/or other networkquality metrics that can be used to assess a quality of an availablenetwork connection.

In some instances, the network connection analyzer 328 may determine asignal strength of an available network connection. The signal strengthmay be obtained from, for example, a measurement of a signal transmittedfrom an access point such as a cellular base station, a signaltransmitted from WiFi router or other WiFi access point, a measurementfrom an access point of a signal transmitted from the user device 110 tothe access point, and/or other signal measurement.

In some instances, the network connection analyzer 328 may determine anumber of dropped packets from information exchanged between an accesspoint (e.g., a cellular network base station, a WiFi router, etc.) anduser device 110.

In some instances, the network connection analyzer 328 may obtain anumber of dropped packets versus received packets and/or a ratio of theforegoing. For instance, the network connection analyzer 328 may obtaina burst error rate and/or other network transmission metric thatdetermines a number or ratio of received packets and dropped packets.

In some instances, the network connection analyzer 328 may obtain acurrent throughput of the network connection available at the firsttime. In some instances, the throughput may be obtained based on networkperformance information exchanged between the user device 110 and anaccess point (e.g., using control channels). In some instances, thenetwork connection analyzer 328 may obtain an upload throughput bytransmitting one or more predefined sets of data with known size to anetworked device (such as authentication server 130). In thisimplementation, the network connection analyzer 328 may transmit apredefined set of data to the networked device and determine a length oftime it took for the set of data to reach the networked device (based onan acknowledgement receipt from the networked device). The networkconnection analyzer 328 may determine the throughput based on the sizeof the set of data and the length of time. Alternatively oradditionally, the network connection analyzer 328 may receive the lengthof time and/or the throughput calculation from the networked device.

In some instances, the network connection analyzer 328 may obtain adownload throughput using similar techniques as for an uploadthroughput, but instead of measuring transmission of a set of data fromthe user device 110 to the networked device, the user device 110 and/ornetworked device measures a set of data transmitted from the networkeddevice to the user device 110. It should be noted that the uploadthroughput and/or the download throughput may be used as a networkcharacteristic for the decision process described herein.

In some instances, the network connection analyzer 328 may obtain acurrent latency of the network connection available at the first time.In some instances, the latency may be obtained based on networkperformance information exchanged between the user device 110 and anaccess point (e.g., using control channels). In some instances, thenetwork connection analyzer 328 may obtain the latency by transmittingor receiving one or more predefined sets of data with known size to anetworked device (such as authentication server 130). In thisimplementation, the network connection analyzer 328 may transmit apredefined set of data to the networked device and determine a length oftime it took for the set of data to reach the networked device (based onan acknowledgement receipt from the networked device). The networkconnection analyzer 328 may determine the latency based on the length oftime. Alternatively or additionally, the network connection analyzer 328may receive the length of time and/or the latency calculation from thenetworked device. In some instances, the length of time is used as alatency value.

It should be noted that more than one network connection may be“available” as described herein. In these instances, the networkconnection analyzer 328 may assess the characteristic of an availablenetwork connection currently being used to transmit data to or from theuser device 110 over a network, such as network 102.

Decision Engine

In some implementations, a decision engine 330 may determine whether totransmit an image file and/or a hash file of the image file based on theone or more characteristics of an available network connection. Forexample, the decision engine 330 may obtain the one or morecharacteristics from the network connection analyzer 328 at a first timeand determine that a hash file should be sent instead of the image filebased on the one or more characteristics of a current network connectionavailable at the first time. Upon transmission of the hash file, thedecision engine 330 may periodically obtain characteristics of anavailable network connection at later times. For example, the decisionengine 330 may obtain characteristics of an available network connectionat a second time and determine that the image file may be sent.

Various examples of scenarios may cause the decision engine 330 todetermine that the image file should be sent at the second time (but notat the first time). In one example, network conditions (e.g., quality)on the same type of network connection may have improved from the firsttime to the second time. In this example, the signal strength, droppedversus successful packet ratio, latency, throughput, and/or otherquality metrics may have improved beyond a threshold quality level atthe second time whereas such quality metrics were below the thresholdquality level at the first time. In another example, a second type ofnetwork connection may have become available at the second time but wasnot available at the first time. The second type of network connectionmay be used to send image files while the first type of networkconnection may not. In this example, image files may be authorized to besent while on a WiFi network but not while on a cellular network. Acellular network connection (but not a WiFi connection) may have beenavailable at the first time, and a WiFi connection may have becomeavailable at the second time. In some instances, the decision logic ofthe foregoing examples may be dictated by the user-defined settingsand/or the system rules.

In some instances, the system rules and/or user-defined settings mayspecify one or more threshold quality values. The threshold qualityvalues may each correspond to a given type of network qualityassessment. For instance, the following may be used as a predefinedthreshold quality value: a minimal signal strength indicator value maybe used as a predefined threshold quality value (below which thedecision engine 330 considers a “poor quality” connection and abovewhich the decision engine 330 considers a “strong” connection), apredefined number dropped packets value (above which the decision engine330 considers a “poor quality” connection and below which the decisionengine 330 considers a “strong” connection), a ratio of received packetsto dropped packets (below which the decision engine 330 considers a“poor quality” connection and above which the decision engine 330considers a “strong” connection), a network latency value (below whichthe decision engine 330 considers a “poor quality” connection and abovewhich the decision engine 330 considers a “strong” connection), anetwork throughput value (below which the decision engine 330 considersa “poor quality” connection and above which the decision engine 330considers a “strong” connection), and/or other threshold values that canbe used to assess a poor quality or strong network connection. Inimplementations that use a combination of one or more of the foregoing,the threshold value may be predefined to reflect a combination qualityscore. In each of the foregoing examples of threshold values, thedecision engine 330 may determine whether or not a weak or strongconnection exists based on whether the current network quality metricdeviates from the threshold value (e.g., is above or below, depending onthe threshold value used).

Based on the comparison of a current quality metric and a correspondingthreshold value, the decision engine 330 may determine whether or notthe image file or a hash file should be sent. For example, for “poorquality” network connections, the hash file and not the image file maybe sent. For “strong” network connections, the image file may be sent.

FIG. 4 illustrates a process of a device for authenticating image files,captured at the device, in conjunction with an authentication server, inaccordance with an embodiment of the present disclosure.

In an operation 402, process 400 may include capturing an image. Forinstance, the image authentication application 320 may capture an imagevia the electronic imaging device 302.

In an operation 404, process 400 may include generating an image filebased on the captured image. For example, the image authenticationapplication 320 may generate the image file by encoding imageinformation from the electronic imaging device 302. The encoding formatmay include conventional still (e.g., JPEG, PNG, etc.), motion (MP4,MOV, etc.), or other appropriate encoding formats, which may depend onthe type of image file being created.

In an operation 406, process 400 may include capturing metadata relatingto the image. For example, the image authentication application 320 mayobtain metadata such as location information (indicating a geographiclocation at which the image was captured) from the location device 306,date and time information (indicating a date and time at which the imagewas captured) from a date and time source (in some implementations, asource external to user device 110 such as an online date and timeserver or image authentication server 230), and/or other informationrelevant to the captured image.

In an operation 408, process 400 may include generating a hash filebased on a hash of the image file. For example, the image authenticationapplication 320 may generate a hash of the image file and generate ahash file based on the hash.

In an operation 410, process 400 may include determining acharacteristic of a network connection available at a first time. Forexample, the image authentication application 320 may assess a type ofthe network connection available at the first time, a quality of thenetwork connection available at the first time, and/or othercharacteristic of the network connection.

In an operation 412, process 400 may include determining, based on thedetermined characteristic of the network connection available at thefirst time, whether to send the image file to the authentication servervia the network connection available at the first time. For example, theimage authentication application 320 may obtain system rules and/oruser-defined settings to determine whether to send the image file or thehash file based on the determined characteristic.

In an operation 414, process 400 may include in response to adetermination that the image file should not be sent, sending the hashfile and identifying information that identifies the image file to theauthentication server via the network connection available at the firsttime without sending the image file. For example, the imageauthentication application 320 may determine that the network connectionavailable at the first time is a cellular network connection anddetermine that the image file should not be sent over a cellular networkconnection (e.g., to reduce network usage via cellular networks). Inanother example, the image authentication application 320 may determinethat the network connection available at the second time is of “lowquality” based on quality threshold values and determine that the imagefile should not be sent over low quality network connections.

In an operation 416, process 400 may include determining acharacteristic of a network connection available at a second time,subsequent to having sent the hash file and identifying information thatidentifies the image file to the authentication server. For example, theimage authentication application 320 may periodically determine whetherthe image file can be sent at a later time after the hash file was sent(e.g., to determine whether a different type of network connection hasbecome available and/or whether a network connection quality hasimproved).

In an operation 418, process 400 may include determining, based on thedetermined characteristic of the network connection available at thesecond time, whether to send the image file to the authentication servervia the network connection available at the second time.

In an operation 420, process 400 may include in response to adetermination that the image file should be sent via the networkconnection available at the second time, causing the image file to besent to the authentication server via the network connection availableat the second time. In this manner, the image authentication application320 may send an image file at the time of image capture when the type ofavailable network connection is authorized to be used to send imagefiles and/or when the available network connection is of sufficientquality. If not, at the time of image capture, the image authenticationapplication 320 may send a hash file instead.

It should be noted that if no network connection is available at a giventime, the image authentication application 320 may not permit images tobe captured for authentication. Alternatively, the image authenticationapplication 320 may store the hash file (or encrypted version of thehash file) and/or the image file (or encrypted version of the imagefile) for later upload when a network connection is available.

FIG. 5 illustrates an authentication server 120 for authenticatingimages captured at and provided by a user device 110, according to animplementation of the invention.

In some implementations, the authentication server 120 may process atleast some or all of the time, geographic, and/or other restrictionsassessed by the user device 110. For example, the authentication server120 may receive, from the image authentication application 320, time,geolocation, and/or other information used to determine whether the userhad sufficient time to alter an image file. Authentication server 120may accordingly perform some or all of the assessments performed by theimage authentication application 320 discussed with reference to FIG. 3.In such implementations, authentication server 120 may proceed tofurther authenticate an image file as described herein only when suchassessments indicate that the user has not had sufficient time to alterthe image file.

In some instances, the authentication server 120 may use the geographicinformation (e.g., coordinates) received from the user device 110 invarious ways. For example, the image authentication application 320 mayrequest the user to indicate the location the photograph was taken(e.g., an address or name of location), and transmit that informationalong with application-recorded coordinate information to theauthentication server as part of the photographic image file. Theauthentication server 120 may then compare the recorded coordinateinformation with the address/point of interest information provided bythe user to insure that the user has provided accurate geographicinformation. Alternatively, the authentication server 120 may takecoordinate information provided by the image authentication application320 to search for a corresponding address or nearby points of interest,and suggest these addresses/points of interest to the user. The user maybe given the option to include geographic information with theauthenticated image file or remove it, but is prohibited from modifyinglocation information or adding unverifiable location information.

The authentication server 120 may create a resource location identifierassociated with an authenticated image file and/or the watermarked imageso that third party viewers can visit the URL and confirm that the imagehas been authenticated. The resource location identified may be a webaddress or a shortened web address to direct a third party viewer to awebpage where they can view the authenticated image and/or thewatermarked image. A copy of the authenticated image and/or thewatermarked image can be uploaded to the web address so that third partyviewers can view the authenticated image and/or compare an image theyhave received with the authenticated image at the web address. The thirdparty viewer may receive an allegedly authenticated image file from auser of the photographic data authentication system. The image file mayinclude a watermark that indicates that the photograph has beenauthenticated. However, it is possible that the user has falsely appliedthe watermark to an unauthenticated and/or edited image file. To confirmthat the image file has, in fact, been authenticated and has not beenedited in any way, the third party viewer may visit the web addressassociated with the watermarked image. The web address may appear on thewatermarked image itself (for example, may be part of the watermark), ormay be provided by the sender of the image, or may be embedded in theimage such that clicking on the watermarked image will lead the userdirectly to the web address. In certain embodiments, the web address maybe the full address, or a representation of the address (e.g., a QRcode, or a tinyURL, or a bitly address). By visiting the web address,the third party viewer can verify that the allegedly authenticatedphotograph has, in fact, been authenticated based on the functionsdescribed herein.

In some implementations, an authenticated image file may includeauthenticated metadata provided by the authentication server 120, suchas a server-applied time stamp, date stamp, and geographic information.The authenticated image file may also include a resource locationidentifier associated with the authenticated image file. In certainembodiments, this resource location identifier may be a web address or arepresentation of a web address (e.g., bitly code, tinyURL, or QR code).In this scenario, the authenticated image file, or certain portions ofthe authenticated image file may be uploaded to a website viewable bythird parties. The user can share the authenticated image file withthird party viewers (block 145) to represent that the image being sharedhas not been edited or revised. Third party viewers can view theauthenticated image file and access the web address to confirm that theimage has been verified by the authentication server and has not beenrevised.

The authenticated image file may comprise any combination of anauthenticated image (i.e., the original image once it has been verifiedby the authentication server), authenticated image metadata (e.g.,authentication server-provided or authentication server-approvedtimestamp, datestamp, and geographic data), and/or a watermarked image,the watermarked image being the authenticated image with a visualwatermark affixed to it to represent that it has been verified by theauthentication server. Attention will now be turned to the variouscomponents the foregoing and other implementations.

Having described various implementations of whether or not a user hashad time to alter an image file and results of authentication, attentionwill now be turned to various authentication server components 120 thatfacilitate these and other functions. Authentication server 120 mayinclude one or more physical processors 502, one or more electronicstorage devices 504, and/or other components.

In an implementation, the one or more processors 502 may be programmedby computer program instructions, such as those stored in the one ormore electronic storage devices 504. For example, the one or moreprocessors 502 may be programmed by, among other instructions, aserver-based image authentication application 510 (also referred tointerchangeably as server-based application 510 for convenience).

In an implementation, the server-based application 510 may includevarious instructions such as, without limitation, a hash file generator512, a network connection analyzer 514, an authentication engine 516,and/or other instructions 518. As used herein, for convenience, thevarious instructions will be described as performing an operation, when,in fact, the various instructions program the processors 502 (andtherefore authentication server 120) to perform the operation.

In an implementation, hash file generator 512 is the same as hash filegenerator 326 used by the image authentication application 320illustrated in FIG. 3. This is so that a hash file of a given image filecan be deterministically generated at both the authentication server 120and the user device 110. In some implementations, various versions ofhash file generators may be stored in a database, such as a database160. To the extent that different versions of hash file generators areused at different devices 110 (e.g., different versions of imageauthentication applications use different hash file generators),database 160 may be used to retrieve an appropriate version or type ofhash file generator. In these implementations, user device 110 maycommunicate information identifying the version or type of hash filegenerator used. Such information may be in the form of an imageauthentication application version, an identifier for the hash filegenerator, and/or other identifying information used by authenticationserver 120 to retrieve the appropriate hash file generator to use.

In an implementation, a network connection analyzer 514 may participatein network connection analysis and/or perform the functions of thenetwork connection analyzer 328 used by the image authenticationapplication 320 illustrated in FIG. 3. In this manner, theauthentication server 120 and/or the user device 110 may assess thequality of a network connection via which the server 120 and user device110 communicate.

In an implementation, the authentication engine 516 facilitatesauthentication of image files captured at devices 110 even if use of anetwork connection to send image files from the devices 110 to theauthentication server 120 should be limited (e.g., to minimize cellulardata plans and/or when the network connection is poor). For example, theauthentication engine 516 may receive a hash file of an image file foran image captured at user device 110. Because the hash file is smallerin size than the image file, sending the hash file over a cellularconnection or “poor” quality (as described herein) connection may bemore efficient.

To facilitate the foregoing, attention will now be turned to FIG. 6,which illustrates a process of an authentication server forauthenticating image files captured at a device in conjunction with anauthentication server, according to an implementation of the invention.

In an operation 602, process 600 may include receiving, from the userdevice via a network connection, a user device-generated hash file ofthe image file and identifying information that identifies the imagefile. For example, the server-based application 320 may receive a hashfile of the image file and identifying information that identifies theimage file.

In an operation 604, process 600 may include storing the userdevice-generated hash file in association with the identifyinginformation in the electronic storage device. In some instances, theuser device-generated hash file and the identifying information may bestored in association with one another in a database, such as database160. To be stored in association with one another means that firstinformation (such as a hash file) and second information (such asidentifying information that identifies an image file) are stored suchthat one can be retrieved as output given the other as input. Forexample, a database link between two data fields may be used to storetwo (or more) pieces of information in association with one another. Inanother example, two or more pieces of information may be stored inassociation with one another as a key-value pair. Other ways to storeinformation in association with one another may be used as well.

In an operation 606, process 600 may include receiving, from the userdevice, a copy of the image file that was used to generate the userdevice-generated hash file at the user device and the identifyinginformation that identifies the image file. The copy of the image filemay be received from the user device after the hash file was receivedfrom the user device. In some instances, the copy of the image file maybe received via the same type of network connection used to receive theuser device-generated hash file (in which case the quality of thenetwork connection has improved since the user device-generated hashfile was received) or via a different type of network connection used toreceive the user device-generated hash file (in which case a differenttype of network connection has become available since the userdevice-generated hash file was received).

In an operation 608, process 600 may include storing the copy of theimage file in association with the identifying information. In someinstances, operation 608 may include generating a hash of the copy ofthe image file, generating a server-generated hash file based on thehash, and storing the hash file in association with the identifyinginformation and/or the copy of the image file.

In an operation 610, process 600 may include receiving a request toobtain an authentication of the image file. The request may include theidentifying information that identifies the image file.

In an operation 612, process 600 may include, in response to therequest, obtaining the user device-generated hash file from theelectronic storage device based on the identifying information. If theserver-generated hash file was created in operation 608, operation 612may include retrieving the server-generated hash file from theelectronic storage device based on the identifying information.Otherwise, operation 612 may include retrieving the copy of the imagefile based on the identifying information and generating aserver-generated hash file based on the retrieved copy of the imagefile.

In an operation 614, process 600 may include comparing the userdevice-generated hash file obtained from the electronic storage devicewith the server-generated hash file.

In an operation 616, process 600 may include determining whether theuser device-generated hash file and the server-generated hash filematch. A non-match indicates that the copy of the image file from whichthe server-generated hash was generated has been altered relative to thecopy of the image file from which the user device-generated hash filewas generated. On the other hand, a match indicates that the copy of theimage file from which the server-generated hash was generated has beenunaltered relative to the image file from which the userdevice-generated hash file was generated.

In an operation 618, process 600 may include generating a result basedon the determination of whether the user device-generated hash file andthe server-generated hash file match, and transmitting an indication ofthe result in response to the request.

In some implementations, instead of or in addition to receiving a copyof the image file from the device that sent the hash file, a copy of theimage file may be received from a third party requester (with whom thedevice shared the copy of the image file). In this manner, the thirdparty requester may upload a copy of an image file and the identifyinginformation for authenticating the copy of the image file. In theseinstances, process 600 may include generating a server-generated hashfile based on the copy of the image file uploaded by the third partyrequester and compare the server-generated hash file to the userdevice-generated hash file. Upon a match, process 600 may provide anindication of authentication to the third party requester (upon anon-match provide an indication of potential tampering). Such indicationmay include metadata or other information available to the systemregarding the identifying information (including a copy of the imagefile from the device if such copy is available).

It should readily be appreciated that authenticated images can bebeneficial and useful in many different applications. By way of example,authenticated images can be used by dating websites, social networks,casting directors, and the like to ensure accurate and recent images ofusers. Parents may use authenticated images to verify the whereaboutsand activities of their children or employers the whereabouts of theiremployees. Social media users can share experiences and users can viewfriends' images with full faith that the image is an accuraterepresentation of their activities. Delivery services can providereliable package tracking and location information. Customers makingonline purchases or reservations can verify the condition of the itemthey are purchasing or the item/property/vehicle they are renting. Newsoutlets can verify source image information. Witnesses to a crime oraccident can provide reliable, verifiable images taken at the scene.These are but a few of the myriad of uses that are possible withauthenticated images.

Although illustrated in FIG. 1 as a single component, computer system110 and end user device 140 may each include a plurality of individualcomponents (e.g., computer devices) each programmed with at least someof the functions described herein. In this manner, some components ofcomputer system 110 and/or end user device 140 may perform somefunctions while other components may perform other functions, as wouldbe appreciated. The one or more processors 112 may each include one ormore physical processors that are programmed by computer programinstructions. The various instructions described herein are exemplaryonly. Other configurations and numbers of instructions may be used, solong as the processor(s) 112 are programmed to perform the functionsdescribed herein.

Furthermore, it should be appreciated that although the variousinstructions are illustrated in FIGS. 1, 3, and 5 as being co-locatedwithin a single processing unit, in implementations in whichprocessor(s) 312, 502 include multiple processing units, one or moreinstructions may be executed remotely from the other instructions.

The description of the functionality provided by the differentinstructions described herein is for illustrative purposes, and is notintended to be limiting, as any of instructions may provide more or lessfunctionality than is described. For example, one or more of theinstructions may be eliminated, and some or all of its functionality maybe provided by other ones of the instructions. As another example,processor(s) 312, 502 may be programmed by one or more additionalinstructions that may perform some or all of the functionalityattributed herein to one of the instructions.

The various instructions described herein may be stored in a storagedevice 314, 504, which may comprise random access memory (RAM), readonly memory (ROM), and/or other memory. The storage device may store thecomputer program instructions (e.g., the aforementioned instructions) tobe executed by processor 312, 502 as well as data that may bemanipulated by processor 312, 502. The electronic storage device maycomprise floppy disks, hard disks, optical disks, tapes, or otherstorage media for storing computer-executable instructions and/or data.

The various databases 160 described herein may be, include, or interfaceto, for example, an Oracle™ relational database sold commercially byOracle Corporation. Other databases, such as Informix™, DB2 (Database 2)or other data storage, including file-based, or query formats,platforms, or resources such as OLAP (On Line Analytical Processing),SQL (Structured Query Language), a SAN (storage area network), MicrosoftAccess™ or others may also be used, incorporated, or accessed. Thedatabase may comprise one or more such databases that reside in one ormore physical devices and in one or more physical locations. Thedatabase may store a plurality of types of data and/or files andassociated data or file descriptions, administrative information, or anyother data.

The various components illustrated in FIG. 1 may be coupled to at leastone other component via the network 102, which may include any one ormore of, for instance, the Internet, an intranet, a PAN (Personal AreaNetwork), a LAN (Local Area Network), a WAN (Wide Area Network), a SAN(Storage Area Network), a MAN (Metropolitan Area Network), a wirelessnetwork, a cellular communications network, a Public Switched TelephoneNetwork, and/or other network. In FIG. 1, as well as in other drawingFigures, different numbers of entities than those depicted may be used.Furthermore, according to various implementations, the componentsdescribed herein may be implemented in hardware and/or software thatconfigure hardware.

The various processing operations and/or data flows depicted in FIG. 2(and in the other drawing figures) are described in greater detailherein. The described operations may be accomplished using some or allof the system components described in detail above and, in someimplementations, various operations may be performed in differentsequences and various operations may be omitted. Additional operationsmay be performed along with some or all of the operations shown in thedepicted flow diagrams. One or more operations may be performedsimultaneously. Accordingly, the operations as illustrated (anddescribed in greater detail below) are exemplary by nature and, as such,should not be viewed as limiting.

While various embodiments of the present disclosure have been describedabove, it should be understood that they have been presented by way ofexample only, and not of limitation. Likewise, the various diagrams maydepict an example architectural or other configuration for thedisclosure, which is done to aid in understanding the features andfunctionality that can be included. The disclosure is not restricted tothe illustrated example architectures or configurations, but the desiredfeatures can be implemented using a variety of alternative architecturesand configurations. Indeed, it will be apparent to one of skill in theart how alternative functional, logical or physical partitioning andconfigurations can be implemented to implement the desired features.

Terms and phrases used in this document, and variations thereof, unlessotherwise expressly stated, should be construed as open ended as opposedto limiting. As examples of the foregoing: the term “including” shouldbe read as meaning “including, without limitation” or the like; the term“example” is used to provide exemplary instances of the item indiscussion, not an exhaustive or limiting list thereof; the terms “a” or“an” should be read as meaning “at least one,” “one or more” or thelike; and adjectives such as “conventional,” “traditional,” “normal,”“standard,” “known” and terms of similar meaning should not be construedas limiting the item described to a given time period or to an itemavailable as of a given time, but instead should be read to encompassconventional, traditional, normal, or standard technologies that may beavailable or known now or at any time in the future. Likewise, wherethis document refers to technologies that would be apparent or known toone of ordinary skill in the art, such technologies encompass thoseapparent or known to the skilled artisan now or at any time in thefuture.

Although the disclosure has been presented with reference only to thepresently preferred embodiments, those of ordinary skill in the art willappreciate that various modifications can be made without departing fromthis disclosure. As such, the disclosure is defined only by thefollowing claims and recited limitations.

What is claimed is:
 1. A networked authentication server forauthenticating image files generated at user devices, the servercomprising: one or more physical processors; and a non-transitorymachine-readable storage medium encoded with instructions executable bythe one or more physical processors to perform operations comprising:receiving, from a user device via a network connection, a userdevice-generated hash file based on an image file generated by the userdevice and first identifying information that identifies the image file;storing the user device-generated hash file in association with theidentifying information in an electronic storage device; receiving acopy of the image file that was used to generate the userdevice-generated hash file at the user device and the identifyinginformation that identifies the image file; storing the copy of theimage file in association with the identifying information; receiving arequest to obtain an authentication of the image file, the requestincluding the identifying information; in response to the request,obtaining the user device-generated hash from the electronic storagedevice based on the identifying information, and obtaining the copy ofthe image file; generating a server-generated hash file based on thecopy of the image file using the hash function; comparing the userdevice-generated hash file obtained from the electronic storage devicewith the server-generated hash file; determining whether the userdevice-generated hash file and the server-generated hash file match,wherein a non-match indicates that the copy of the image file from whichthe server-generated hash file was generated has been altered relativeto the image file from which the user device-generated hash file wasgenerated, and wherein a match indicates that the copy of the image fileis unaltered relative to the image file; generating a result based onthe determination of whether the user device-generated hash file and theserver-generated hash file match; and transmitting an indication of theresult in response to the request to authenticate the image file.
 2. Thenetworked authentication server of claim 1, wherein the operationsfurther comprise: receiving the copy of the image file and theidentifying information from the user device via the network connectionafter the user device-generated is received from the user device andbefore the request to obtain an authentication of the image file isreceived.
 3. The networked authentication server of claim 1, wherein theoperations further comprise: receiving the copy of the image file andthe identifying information from the user device via a second networkconnection, which is a different type of network connection than thenetwork connection, after the hash is received from the user device andbefore the request to verify whether the image file has been altered isreceived; and storing, in the electronic storage device, the copy of theimage file in association with the identifying information, wherein thecopy of the image file is obtained from the electronic storage device inresponse to the request.
 4. The networked authentication server of claim1, wherein the operations further comprise: receiving the copy of theimage file from an originator of the request.
 5. The networkedauthentication server of claim 1, wherein the operations furthercomprise: receiving the copy of the image file from the user device. 6.The networked authentication server of claim 5, wherein the operationsfurther comprise: receiving from the user device an indication of afirst date and/or time at which the image file was generated;determining a second date and/or time at which the hash file wasreceived from the user device; determining a time elapsed from the firstdate and/or time at which the image file was generated and the seconddate and/or time at which the hash file was received; determiningwhether the time elapsed exceeds a threshold value; and generating theresult based on whether or not the time elapsed exceeds the thresholdvalue.
 7. The networked authentication server of claim 1, wherein theoperations further comprise: receiving from the user device anindication of a first geolocation at which the image file was generated;receiving from the user device an indication of a second geolocationfrom which the hash file was sent; determining a distance between thefirst geolocation and the second geolocation; determining whether thedistance exceeds a threshold distance value; and generating the resultbased on whether or not the distance exceeds the threshold distancevalue.
 8. The networked authentication server of claim 1, wherein theoperations further comprise: receiving from the user device anindication of a first date and/or time at which the image file wasgenerated; determining a second date and/or time at which the hash filewas received from the user device; determining a time elapsed from thefirst date and/or time at which the image file was generated receivedand the second date and/or time at which the hash file was received;determining whether the time elapsed exceeds a threshold value; andgenerating the result based on whether or not the time elapsed exceedsthe threshold value.
 9. A non-transitory machine-readable storage mediumencoded with instructions executable by one or more physical processorsfor authenticating image files generated at user devices, themachine-readable storage medium comprising instructions to cause the oneor more physical processors to perform operations comprising: receiving,from a user device via a network connection, a user device-generatedhash file based on an image file generated by the user device and firstidentifying information that identifies the image file; storing the userdevice-generated hash file in association with the identifyinginformation in an electronic storage device; receiving a copy of theimage file that was used to generate the user device-generated hash fileat the user device and the identifying information that identifies theimage file; storing the copy of the image file in association with theidentifying information; receiving a request to obtain an authenticationof the image file, the request including the identifying information; inresponse to the request, obtaining the user device-generated hash fromthe electronic storage device based on the identifying information, andobtaining the copy of the image file; generating a server-generated hashfile based on the copy of the image file using the hash function;comparing the user device-generated hash file obtained from theelectronic storage device with the server-generated hash file;determining whether the user device-generated hash file and theserver-generated hash file match, wherein a non-match indicates that thecopy of the image file from which the server-generated hash file wasgenerated has been altered relative to the image file from which theuser device-generated hash file was generated, and wherein a matchindicates that the copy of the image file is unaltered relative to theimage file; generating a result based on the determination of whetherthe user device-generated hash file and the server-generated hash filematch; and causing transmission of an indication of the result inresponse to the request to authenticate the image file.
 10. Thenon-transitory machine-readable storage medium of claim 9, wherein theoperations further comprise: receiving the copy of the image file andthe identifying information from the user device via the networkconnection after the user device-generated is received from the userdevice and before the request to obtain an authentication of the imagefile is received.
 11. The non-transitory machine-readable storage mediumof claim 9, wherein the operations further comprise: receiving the copyof the image file and the identifying information from the user devicevia a second network connection, which is a different type of networkconnection than the network connection, after the hash is received fromthe user device and before the request to verify whether the image filehas been altered is received; and storing, in the electronic storagedevice, the copy of the image file in association with the identifyinginformation, wherein the copy of the image file is obtained from theelectronic storage device in response to the request.
 12. Thenon-transitory machine-readable storage medium of claim 9, wherein theoperations further comprise: receiving the copy of the image file froman originator of the request.
 13. The non-transitory machine-readablestorage medium of claim 9, wherein the operations further comprise:receiving the copy of the image file from the user device.
 14. Thenon-transitory machine-readable storage medium of claim 13, wherein theoperations further comprise: receiving from the user device anindication of a first date and/or time at which the image file wasgenerated; determining a second date and/or time at which the hash filewas received from the user device; determining a time elapsed from thefirst date and/or time at which the image file was generated and thesecond date and/or time at which the hash file was received; determiningwhether the time elapsed exceeds a threshold value; and generating theresult based on whether or not the time elapsed exceeds the thresholdvalue.
 15. The non-transitory machine-readable storage medium of claim9, wherein the operations further comprise: receiving from the userdevice an indication of a first geolocation at which the image file wasgenerated; receiving from the user device an indication of a secondgeolocation from which the hash file was sent; determining a distancebetween the first geolocation and the second geolocation; determiningwhether the distance exceeds a threshold distance value; and generatingthe result based on whether or not the distance exceeds the thresholddistance value.
 16. The non-transitory machine-readable storage mediumof claim 9, wherein the operations further comprise: receiving from theuser device an indication of a first date and/or time at which the imagefile was generated; determining a second date and/or time at which thehash file was received from the user device; determining a time elapsedfrom the first date and/or time at which the image file was generatedreceived and the second date and/or time at which the hash file wasreceived; determining whether the time elapsed exceeds a thresholdvalue; and generating the result based on whether or not the timeelapsed exceeds the threshold value.
 17. A computer-implemented methodfor authenticating image files generated at user devices, the methodcomprising: receiving, from a user device via a network connection, auser device-generated hash file based on an image file generated by theuser device and first identifying information that identifies the imagefile; storing the user device-generated hash file in association withthe identifying information in an electronic storage device; receiving acopy of the image file that was used to generate the userdevice-generated hash file at the user device and the identifyinginformation that identifies the image file; storing the copy of theimage file in association with the identifying information; receiving arequest to obtain an authentication of the image file, the requestincluding the identifying information; in response to the request,obtaining the user device-generated hash from the electronic storagedevice based on the identifying information, and obtaining the copy ofthe image file; generating a server-generated hash file based on thecopy of the image file using the hash function; comparing the userdevice-generated hash file obtained from the electronic storage devicewith the server-generated hash file; determining whether the userdevice-generated hash file and the server-generated hash file match,wherein a non-match indicates that the copy of the image file from whichthe server-generated hash file was generated has been altered relativeto the image file from which the user device-generated hash file wasgenerated, and wherein a match indicates that the copy of the image fileis unaltered relative to the image file; generating a result based onthe determination of whether the user device-generated hash file and theserver-generated hash file match; and causing transmission of anindication of the result in response to the request to authenticate theimage file.
 18. The computer-implemented method of claim 17, furthercomprising: receiving the copy of the image file and the identifyinginformation from the user device via the network connection after theuser device-generated is received from the user device and before therequest to obtain an authentication of the image file is received. 19.The computer-implemented method of claim 17, further comprising:receiving the copy of the image file and the identifying informationfrom the user device via a second network connection, which is adifferent type of network connection than the network connection, afterthe hash is received from the user device and before the request toverify whether the image file has been altered is received; and storing,in the electronic storage device, the copy of the image file inassociation with the identifying information, wherein the copy of theimage file is obtained from the electronic storage device in response tothe request.
 20. The computer-implemented method of claim 19, furthercomprising: receiving from the user device an indication of a first dateand/or time at which the image file was generated; determining a seconddate and/or time at which the hash file was received from the userdevice; determining a time elapsed from the first date and/or time atwhich the image file was generated and the second date and/or time atwhich the hash file was received; determining whether the time elapsedexceeds a threshold value; and generating the result based on whether ornot the time elapsed exceeds the threshold value.