Protection of identification documents using open cryptography
First Claim
1. An identification document comprising a photographic representation of a bearer of the identification document and indicia provided on the document, the identification document further comprising a security feature printed on a surface of the identification document in a two-dimensional symbology, the security feature including:
- a first set of information corresponding to at least one of the identification document, the bearer of the identification document and an issuer of the identification document, wherein the first set of information comprises an unencrypted form; and
a cryptographic measure associated with the first set of information, the cryptographic measure identifying at least a record of fabrication for the identification document.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides methods and apparatus to uniquely determine fabrication details associated with objects, such as identification documents, artwork and limited issue works, using open cryptographic techniques. A cryptographic signature is created using a private key. The private key is uniquely associated with fabrication details such as a workstation, operator, fabrication equipment, fabrication materials, etc. A public key corresponds with the private key; and therefore, the public key is associated with the fabrication details. Successfully decoding the cryptographic signature with the public key uniquely identifies the fabrication details.
146 Citations
41 Claims
-
1. An identification document comprising a photographic representation of a bearer of the identification document and indicia provided on the document, the identification document further comprising a security feature printed on a surface of the identification document in a two-dimensional symbology, the security feature including:
-
a first set of information corresponding to at least one of the identification document, the bearer of the identification document and an issuer of the identification document, wherein the first set of information comprises an unencrypted form; and
a cryptographic measure associated with the first set of information, the cryptographic measure identifying at least a record of fabrication for the identification document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of analyzing an identification document, the identification document comprising a first set of information and a cryptographic signature corresponding to the first set of information, wherein the first set of information and the cryptographic signature are encoded in a machine-readable format, the encoding being printed or engraved on a surface of the identification document, said method comprising:
-
machine-sensing the first set of information and the cryptographic signature; and
determining fabrication details of the identification document from at least the cryptographic signature. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of identifying unauthorized issuance of an identification document, wherein unauthorized issuance occurs when the identification document is fabricated on authorized equipment but is issued in an unauthorized manner, the identification document including first data and a digital signature corresponding to at least the first data, the digital signature further including a date indicator associated with the fabrication of the identification document, said method comprising:
-
machine-sensing the identification document to obtain the first data and the digital signature;
validating the digital signature in accordance with a certificate associated with the digital signature;
determining whether the certificate has been revoked, and if so revoked, determining whether the date indicator corresponds with a date associated with the certificate'"'"'s revocation, and if so associated, identifying the identification document as being issued without authority. - View Dependent Claims (28)
-
-
29. A method to establish whether an identification document should be trusted comprising:
-
randomly or pseudo-randomly selecting a unique serial number;
associating the unique serial number and fabrication details in a data record;
providing the unique serial number on the identification document; and
issuing the identification document. - View Dependent Claims (30, 31, 32)
-
-
33. A method of binding a first feature to a second feature, the first and second features to be provided on an identification document, said method comprising:
-
receiving the first feature, the first feature comprising unique characteristics;
receiving the second feature, the second feature including a first data set;
computing a cryptographic signature over the first data set and the unique characteristics;
appending the cryptographic signature and information associated with the cryptographic signature to the first data set;
printing the first feature on the identification document;
printing the second feature including the appended first data set on the identification document. - View Dependent Claims (34, 35, 36)
-
-
37. A method of identifying unauthorized issuance of an identification document, wherein unauthorized issuance occurs when the identification document is fabricated on authentic equipment, but is issued in an unauthorized manner, the identification document including first data and a digital signature corresponding to at least the first data, said method comprising:
-
obtaining the first data and the digital signature;
validating the digital signature in accordance with a public key associated with the digital signature; and
determining whether the public key is associated with unauthorized issuance; and
if so associated,identifying the identification document as being issued without authority. - View Dependent Claims (38, 39, 40, 41)
-
Specification