Authenticating images identified by a software application
First Claim
1. A method of checking the authenticity of an identified image, the method including the steps of:
- receiving, in a software application, the identified image;
checking if the identified image is an encoded image, whereby an encoded image includes at least an original image and link information in an encoded form; and
if the identified image is an encoded image;
(A) decoding the identified image to obtain the link information and a first reference image file and a second reference image file;
(B) comparing the first reference image file and the second reference image file, and if a match is identified, providing the link information.
0 Assignments
0 Petitions
Accused Products
Abstract
Method 300 facilitates the authentication of images, for example on a web-site (380). The method includes encoding images (310). In one embodiment, a search request is received (330) from a terminal (340) and the Internet is searched (350) in accordance with the search request and one or more web-sites identified (if any). An image associated with the identified web-site is checked (360) to see if the image is authentic. This can be achieved by decoding the image to obtain embedded identification information. If the image is authenticated, the image is transmitted (390) as part of a search results list. If the image is not authenticated, the image is not transmitted (395) or a warning that the image has not been authenticated can be provided. A method which facilitates the authentication of an email or other type of electronic document is also disclosed.
-
Citations
34 Claims
-
1. A method of checking the authenticity of an identified image, the method including the steps of:
-
receiving, in a software application, the identified image;
checking if the identified image is an encoded image, whereby an encoded image includes at least an original image and link information in an encoded form; and
if the identified image is an encoded image;
(A) decoding the identified image to obtain the link information and a first reference image file and a second reference image file;
(B) comparing the first reference image file and the second reference image file, and if a match is identified, providing the link information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 30)
-
-
15. A method of facilitating the authentication of a web-site, the method including the steps of:
-
receiving an original image and link information at a server to be encoded into an encoded image;
providing a software application adapted to check if an identified image, from a search results list, is an encoded image, and if the identified image is an encoded image;
(A) decoding the identified image to obtain the link information and a first reference image file and a second reference image file; and
(B) comparing the first reference image file and the second reference image file, and if a match is identified, providing the link information to enable linking to the web-site. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A system for checking the authenticity of an identified image, the system including:
-
a software application to receive the identified image and to check if the identified image is an encoded image, whereby an encoded image includes at least an original image and link information in an encoded form;
at least one decoder to decode the identified image to obtain the link information and a first reference image file and a second reference image file; and
a comparison component to compare the first reference image file and the second reference image file, and if a match is identified, provide the link information. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A computer readable medium of instructions for checking the authenticity of an identified image, the computer readable medium of instructions performing the steps of:
-
receiving the identified image;
checking if the identified image is an encoded image, whereby an encoded image includes at least an original image and link information in an encoded form; and
if the identified image is an encoded image;
(A) decoding the identified image to obtain the link information and a first reference image file and a second reference image file; and
(B) comparing the first reference image file and the second reference image file, and if a match is identified, providing the link information. - View Dependent Claims (28)
-
-
29. A system for checking the authenticity of an image, the system including:
-
a server adapted to receive an original image and link information associated with the original image and to generate a reference image file and an encoded image;
a terminal adapted to receive an identified image, the terminal also adapted to;
check if the identified image is an encoded image;
if the identified image is an encoded image, decode the identified image to obtain the link information and at least two reference image files;
compare the at least two reference image files; and
if a match is identified, use the link information. - View Dependent Claims (31, 32)
-
-
33. A system for providing a searchable database of images, the system including:
-
an encoder to encode an original image with link information to provide an encoded image;
a database to store the encoded image;
a server associated with the database to facilitate searching of the database;
a software application to receive an identified image and to check if the identified image is an encoded image, whereby the encoded image is part of the searchable database and includes at least an original image and link information in an encoded form;
at least one decoder to decode the identified image to obtain the link information and a first reference image file and a second reference image file; and
,a comparison component to compare the first reference image file and the second reference image file, and if a match is identified, provide the link information. - View Dependent Claims (34)
-
Specification