Tamper-resistant authentication techniques for identification documents
First Claim
Patent Images
1. A method comprising:
- selecting a set of data from at least one of a photograph and information, wherein the information and photograph are carried by a physical document, the document further including a design;
reducing the selected set of data to a first number; and
altering characteristics of the design according to the first number, wherein evidence of the altered design characteristics is found through analysis of data corresponding to the altered design characteristics in both a spatial domain and a frequency domain, and wherein the evidence in either of the spatial domain or the frequency domain provides an authentication clue.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides methods and systems that are helpful authentication of physical and electronic documents like financial documents and identification documents. Steganographic indicia plays a role in some of our implementations. In other implementations we bind design features to a user or to a document. In still other implementations we provide authentication methods to evaluate security documents.
-
Citations
20 Claims
-
1. A method comprising:
-
selecting a set of data from at least one of a photograph and information, wherein the information and photograph are carried by a physical document, the document further including a design;
reducing the selected set of data to a first number; and
altering characteristics of the design according to the first number, wherein evidence of the altered design characteristics is found through analysis of data corresponding to the altered design characteristics in both a spatial domain and a frequency domain, and wherein the evidence in either of the spatial domain or the frequency domain provides an authentication clue. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
optically capturing image data corresponding to a physical document;
transforming the optically captured image data into a frequency domain;
comparing frequency characteristics of the transformed image to predetermined frequency characteristics that are associated with a first document type, and if the characteristics coincide, determining that the document is of the first document type; and
if the characteristics do not coincide, comparing the frequency characteristics of the transformed image to predetermined frequency characteristics that are associated with a second document type, and if the characteristics coincide, determining that the document is of the second document type. - View Dependent Claims (13, 14, 15)
-
-
16. A method comprising:
-
accessing a data repository including a library, obtaining a graphic or image from the library of graphics or images, wherein the graphic or image comprises a plural-bit identifier steganographically embedded therein;
once obtained, applying the steganographically embedded image to a security document, the plural-bit identifier providing information associated with an authorized bearer of the security document or with the security document. - View Dependent Claims (17, 18, 19, 20)
-
Specification