Prevention of unauthorized credential production in a credential production system
First Claim
1. A method for preventing unauthorized credential substrate processing in a credential production system including first and second credential production components, the method comprising steps of:
- generating a first security code using a random code and a first security key with the first credential production component;
communicating the first security code from the first credential production component to the second credential production component;
checking the validity of the first security key using the first security code, the random code and a second security key with the second credential production component; and
preventing processing of a credential substrate by the credential production system when the first security key is not valid.
1 Assignment
0 Petitions
Accused Products
Abstract
In a method for preventing unauthorized credential substrate processing in a credential production system that includes first and second credential production components, a first security code is generated using a random code and a first security key with the first credential production component. The first security code is communicated from the first credential production component to the second credential production component. The validity of the first security key is then checked using the first security code, the random code and a second security key with the second credential component. Finally, processing of the credential substrate by the credential production system is prevented when the first security key is not valid.
32 Citations
41 Claims
-
1. A method for preventing unauthorized credential substrate processing in a credential production system including first and second credential production components, the method comprising steps of:
-
generating a first security code using a random code and a first security key with the first credential production component;
communicating the first security code from the first credential production component to the second credential production component;
checking the validity of the first security key using the first security code, the random code and a second security key with the second credential production component; and
preventing processing of a credential substrate by the credential production system when the first security key is not valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for preventing unauthorized credential substrate processing in a credential production system including first and second credential production components, the method comprising steps of:
-
communicating a random code from the second credential production component to the first credential production component;
generating a first security code using the random code and a first security key;
communicating the first security code from the first credential production component to the second credential production component;
checking the validity of the first security key using the first security code, the random code and a second security key; and
preventing processing of a credential substrate by the credential production system when the first security key is not valid. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for preventing unauthorized credential substrate processing in a credential production system including first and second credential production components, the method comprising steps of:
-
generating a first security code using a random code and a first security key;
communicating the first security code from the first credential production component to the second credential production component;
communicating the random code from the first credential production component to the second credential production component;
checking the validity of the first security key using the first security code, the random code and a second security key; and
preventing of a credential substrate by the credential production system when the first security key is not valid. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification