Digitally watermaking holograms for use with smart cards
First Claim
1. A method to authenticate a smart card comprising the steps of:
- extracting information from a digital watermark, the digital watermark being embedded in an optically variable device, the optically variable device comprising a watermark image embedded within a holographic structure; and
extracting information from a smart card, the smart card carrying the optically variable device.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to digital watermarks integrated into holograms, watermarked hologram structures, and related applications as an authentication technique. One method creates a watermark image, and then embeds the watermark image into a holographic structure. The holographic structure is carried by a smart card. The smart card includes additional information. In one embodiment, the digital watermark includes information bits, and these information bits are used to authenticate the hologram, or the smart card. In another embodiment, the watermark'"'"'s information bits are compared with the additional information carried by the smart card. The result of the comparison is used to authenticate the smart card or the hologram.
40 Citations
18 Claims
-
1. A method to authenticate a smart card comprising the steps of:
-
extracting information from a digital watermark, the digital watermark being embedded in an optically variable device, the optically variable device comprising a watermark image embedded within a holographic structure; and
extracting information from a smart card, the smart card carrying the optically variable device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A reader operable to decode a watermark from a watermarked hologram, and to extract information from an information carrier, said reader comprising:
-
a watermark decoder for detecting a watermark signal in an image scanned from a watermarked hologram;
a message decoder for extracting a message from the watermark signal; and
a reader to extract information from the information carrier, the information carrier including the watermarked hologram. - View Dependent Claims (8)
-
-
9. A method to authenticate an information carrier comprising the steps of:
-
presenting an information carrier to a reader, the information carrier comprising a first data set and a second data set;
in the reader;
decoding the first data set; and
decoding the second data set;
authenticating the information carrier based at least in part on the first data set. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification