Digital watermarking security systems
First Claim
Patent Images
1. A method of providing security for a computer system comprising the steps of:
- receiving image data corresponding to a digitally watermarked document, the document including a digital watermark comprising access information; and
adapting the computer system to decode the digital watermark from the received image data to recover the access information, wherein the computer system allows user access when the access information matches or coincides with predetermined information.
6 Assignments
0 Petitions
Accused Products
Abstract
A variety of systems responsive to watermarked documents are detailed. In one, watermarking is employed to facilitate system access. In another, security is provided through analyzing digitally watermarked documents. In yet another, a digital watermark-based combination lock is adapted to analyze a sequence (and perhaps an orientation) of presented digitally watermarked cards.
161 Citations
29 Claims
-
1. A method of providing security for a computer system comprising the steps of:
-
receiving image data corresponding to a digitally watermarked document, the document including a digital watermark comprising access information; and
adapting the computer system to decode the digital watermark from the received image data to recover the access information, wherein the computer system allows user access when the access information matches or coincides with predetermined information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of providing security for a computer system, the computer system comprising a processor and memory including software instructions for execution on the processor, the software includes digital watermark decoding instructions, the memory further includes a predetermined card sequence, wherein the computer system communicates with an input device, said method comprising the steps of:
-
decoding with the digital watermark decoding instructions a digital watermark embedding in each of a plurality of cards, each digital watermark including an identifier;
determining an order in which the digitally watermarked cards are presented to the input device via the digital watermark identifiers; and
comparing the order to the predetermined card sequence to determine whether to allow access to the computer system. - View Dependent Claims (13, 14)
-
-
15. A digital watermark-based combination lock comprising:
-
an input device to capture image data;
electronic processing circuitry; and
memory having computer software stored therein, the computer software to be executed by said electronic processing circuitry, said software including code to;
decode a digital watermark embedded in each of a plurality of images captured in sequence by said input device, wherein each of the plurality of images respectively correspond to one document of a plurality of documents, and wherein each of the digital watermarks includes an identifier, said decoding step recovering the digital watermark identifiers; and
analyzing the recovered identifiers to determine whether to unlock the combination lock. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method of doing business, the business related to providing computer access security or facility access security, said method comprising the steps of:
-
providing a user with a first digitally watermarked document for a first length of time, the first document being inconspicuous in that it is not readily identified as an access key or identification document, the first digital watermark including first access information to facilitate access to the computer or facility;
collecting the first digitally watermarked document before or at the first length of time; and
providing the user with a second digitally watermark document, the second document being inconspicuous in that it is not readily identified as an access key or identification document, the second digital watermark including second access information to facilitate access to the computer or facility, wherein the first digitally watermarked document and the second digitally watermarked document differ in at least one of document type, document size, document substrate and printed matter on the document substrate. - View Dependent Claims (21)
-
-
22. A method of doing business, the business related to providing computer access security or facility access security, said method comprising the steps of:
-
providing a user with a first digitally watermarked document for a first length of time, the first digital watermark including first access information to facilitate access to the computer or facility, wherein the first access information comprises at least a first type or sample of biometric data;
collecting the first digitally watermarked document before or at the first length of time; and
providing the user with a second digitally watermark document, the second document the second digital watermark including second access information to facilitate access to the computer or facility, wherein the second access information comprises at least a second type or sample of biometric data, and wherein the first type or sample of biometric data and the second type or sample of biometric data are different types or samples. - View Dependent Claims (23, 24, 25)
-
- 26. A security document comprising information steganographically encoded thereon, the steganographic encoding comprising first data and second data, the first data uniquely identifying a bearer of the security document, and the second data providing a type indicator for a biometric sample to be taken from the bearer of the security document to authenticate the identity of the bearer of the security document.
Specification