| CPC G06F 21/64 (2013.01) [G06F 21/60 (2013.01); H04L 9/0637 (2013.01); H04L 9/3242 (2013.01); H04L 9/3247 (2013.01); H04L 9/3263 (2013.01); H04L 9/3268 (2013.01)] | 18 Claims |

|
1. Method for certifying authenticity of one or more digital files consisting of photos, video recordings, screenshots or screen recordings generated by an electronic communication device or generated by a device synchronised or directly coupled with said electronic communication device, the method being executed by a user via said electronic communication device and comprising, for each digital file, steps of:
receiving a digital file as an input,
wherein:
before receiving said digital file as the input, an acquisition session is started consisting of generating said digital file and applying to said digital file a unique temporary code identifying the acquisition session in a format readable by a software and in a text format, and saving said digital file on which said unique temporary code is applied in a photo and video library of operating system of said electronic communication device; and
before ending the acquisition session, the receiving of said digital file as the input consists of importing said digital file from the photo and video library of the operating system of said electronic communication device, the importing of said digital file is available only for a limited time window during which the user can import the said digital file;
determining, in response to the receiving of said digital file, type of said digital file and checking that said digital file belongs to one of certifiable categories;
after having determined the type of said digital file in previous step, a series of verification steps are carried out, comprising:
verifying that said digital file has been generated by the electronic communication device on which said method is executed or by the device synchronised or directly coupled with said electronic communication device;
verifying that the operating system of said electronic communication device, on which said method is executed, has not been tampered with;
verifying that said digital file, at time of receiving as the input, has not been modified in any way;
allowing to the user to proceed with certification of the authenticity of said digital file only if all of the series of previous-verification steps have been successful.
|