Verifying authenticity of machine-readable identifiers
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein when executed the program causes the at least one computing device to at least:
- in response to receiving an image, determine a first machine-readable identifier present in a first portion of the image;
determine a second machine-readable identifier that is present in a second portion of the image and is separate from the first machine-readable identifier;
determine whether the first machine-readable identifier is authentic based at least in part on the second machine-readable identifier;
determine a uniform resource identifier (URI) encoded in the first machine-readable identifier;
request a resource corresponding to the URI in response to determining that the first machine-readable identifier is authentic; and
generate an alert in response to determining that the first machine-readable identifier is not authentic.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for verifying the authenticity of machine-readable identifiers, such as quick response (QR) codes or other identifiers. After data is received corresponding to a machine-readable identifier, environmental data may be acquired with respect to an environment of the machine-readable identifier. The authenticity of the machine-readable identifier may be verified based at least in part on the environmental data. In some embodiments, a verification request may be sent to a trusted authority.
-
Citations
23 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein when executed the program causes the at least one computing device to at least:
-
in response to receiving an image, determine a first machine-readable identifier present in a first portion of the image; determine a second machine-readable identifier that is present in a second portion of the image and is separate from the first machine-readable identifier; determine whether the first machine-readable identifier is authentic based at least in part on the second machine-readable identifier; determine a uniform resource identifier (URI) encoded in the first machine-readable identifier; request a resource corresponding to the URI in response to determining that the first machine-readable identifier is authentic; and generate an alert in response to determining that the first machine-readable identifier is not authentic. - View Dependent Claims (2, 3, 4)
-
-
5. A system, comprising:
-
at least one computing device; and a verification application executable in the at least one computing device, wherein when executed the verification application causes the at least one computing device to at least; in response to receiving, from a client device, image data comprising a first machine-readable identifier, identify, in the image data, a second machine-readable identifier that is separate from the first machine-readable identifier; acquire environmental data with respect to an environment of the first machine-readable identifier; and verify an authenticity of the first machine-readable identifier based at least in part on the environmental data and the second machine-readable identifier. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
sending, via at least one of the one or more computing devices, a verification request for a machine-readable identifier to a trusted authority, the verification request including image data comprising the machine-readable identifier and a verifying identifier, wherein the machine-readable identifier is a first type of optical code and the verifying identifier is a second type of optical code; receiving, via at least one of the one or more computing devices, a result of the verification request from the trusted authority; and performing, via at least one of the one or more computing devices, an action with respect to the machine-readable identifier based at least in part on the result of the verification request. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system, comprising:
-
at least one computing device; and a trusted authority executed in the at least one computing device that causes the at least one computing device to at least; in response to receiving from a client a verification request for a machine-readable identifier, verify an authenticity of the machine-readable identifier based at least in part on a verifying identifier, wherein the machine-readable identifier is a first type of optical code and the verifying identifier is a second type of optical code; and report the authenticity of the machine-readable identifier to the client. - View Dependent Claims (21, 22, 23)
-
Specification