Preserving a level of confidence of authenticity of an object
First Claim
1. A method, comprising:
- acquiring digital image data of an image of at least a portion of a physical object;
with one or more processors;
analyzing the digital image data to form a digital fingerprint of the physical object for an authentication of the physical object, wherein the digital fingerprint is responsive to a natural structure of the physical object;
initializing a database record associated with the physical object responsive to forming the digital fingerprint;
determining whether the digital fingerprint corresponds to original provenance for the physical object;
in response to determining that the digital fingerprint does not correspond to original provenance for the physical object, acquiring and storing in the database record first data including authenticity information available in association with formation of the digital fingerprint;
in response to determining that the digital fingerprint does correspond to original provenance for the physical object, retaining second data in the database record.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatuses and methods associated with preserving a level of confidence of authenticity of an object are disclosed herein. In embodiments, a method includes acquiring first information corresponding to a physical object; identifying first authentication data based on the first information; initializing a database record associated with the physical object responsive to identifying the first authentication data; determining whether the first authentication data corresponds to original provenance for the physical object; in response to determining that the first authentication data does not correspond to original provenance for the physical object, acquire and store in the database record first record data including authenticity information available in association with identification of the first authentication data; in response to determining that the first authentication data does correspond to original provenance for the physical object, retaining second record data in the database record. Other embodiments may be disclosed or claimed.
-
Citations
20 Claims
-
1. A method, comprising:
-
acquiring digital image data of an image of at least a portion of a physical object; with one or more processors; analyzing the digital image data to form a digital fingerprint of the physical object for an authentication of the physical object, wherein the digital fingerprint is responsive to a natural structure of the physical object; initializing a database record associated with the physical object responsive to forming the digital fingerprint; determining whether the digital fingerprint corresponds to original provenance for the physical object; in response to determining that the digital fingerprint does not correspond to original provenance for the physical object, acquiring and storing in the database record first data including authenticity information available in association with formation of the digital fingerprint; in response to determining that the digital fingerprint does correspond to original provenance for the physical object, retaining second data in the database record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
acquiring first information corresponding to a physical object; with one or more processors; identifying first authentication data based on the first information; initializing a database record associated with the physical object responsive to identifying the first authentication data; determining whether the first authentication data corresponds to original provenance for the physical object; in response to determining that the first authentication data does not correspond to original provenance for the physical object, acquiring and storing in the database record first record data including authenticity information available in association with identification of the first authentication data; in response to determining that the first authentication data does correspond to original provenance for the physical object, retaining second record data in the database record. - View Dependent Claims (19, 20)
-
Specification