Covert secure document registration system
First Claim
1. A method for creating a secure document and verifying that the secure document is authentic, the method comprising:
- receiving at a first processor, a print object having content to be printed;
the first processor generating a real identifier associating the real identifier with the content;
transmitting the content and associated real identifier to a database, for storage;
the first processor generating one or more decoy identifiers;
associating the one or more decoy identifiers with the content and real identifier;
printing the content and real and decoy identifiers as a secure document;
detecting the printed secure document with the real and decoy identifiers to verify authenticity of the secure document;
transmitting the detected content and real and decoy identifiers to a second processor associated with the database;
the second processor filtering the one or more decoy identifiers from the content;
the second processor comparing the real identifier on the content with the real identifiers stored in the database; and
outputting an indicator that the real identifier is in the database, thereby authenticating the printed secure document.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
19 Citations
6 Claims
-
1. A method for creating a secure document and verifying that the secure document is authentic, the method comprising:
-
receiving at a first processor, a print object having content to be printed; the first processor generating a real identifier associating the real identifier with the content; transmitting the content and associated real identifier to a database, for storage; the first processor generating one or more decoy identifiers; associating the one or more decoy identifiers with the content and real identifier; printing the content and real and decoy identifiers as a secure document; detecting the printed secure document with the real and decoy identifiers to verify authenticity of the secure document; transmitting the detected content and real and decoy identifiers to a second processor associated with the database; the second processor filtering the one or more decoy identifiers from the content; the second processor comparing the real identifier on the content with the real identifiers stored in the database; and outputting an indicator that the real identifier is in the database, thereby authenticating the printed secure document. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification