Security scheme for authenticating object origins
First Claim
1. A method comprising:
- generating a first hash of a private manufacturer identifier and a product identifier;
generating a three-dimensional surface using a first portion of the first hash;
generating a texture pattern using a second portion of the first hash;
generating a surface-texture snapshot by mapping the texture pattern onto the three-dimensional surface; and
providing the surface-texture snapshot for imprinting on the product.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods subjecting a computer graphics object to a pseudo-random transformation to produce a surface-texture snapshot used to verify the authenticity of a host object. An example method includes generating a hash of a private manufacturer identifier, a product identifier, and a chain of ownership identifier and generating a three-dimensional surface using a first portion of the hash. The method also includes generating a texture pattern using a second portion of the hash and generating a surface-texture snapshot by mapping the texture pattern onto the three-dimensional surface. The surface-texture snapshot may be provided for imprinting on the host object. In some implementations, the surface-texture snapshot may be used as a first check in an authentication procedure.
32 Citations
20 Claims
-
1. A method comprising:
-
generating a first hash of a private manufacturer identifier and a product identifier; generating a three-dimensional surface using a first portion of the first hash; generating a texture pattern using a second portion of the first hash; generating a surface-texture snapshot by mapping the texture pattern onto the three-dimensional surface; and providing the surface-texture snapshot for imprinting on the product. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the system to; generate a first hash of a private manufacturer identifier and a product identifier, generate a three-dimensional surface using a first portion of the first hash, generate a texture pattern using a last portion of the first hash, generate a surface-texture snapshot by mapping the texture pattern onto the three-dimensional surface, and provide the surface-texture snapshot for imprinting on the product. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification