Authenticity Verification
First Claim
1. A method for authenticity verification, the method comprising:
- conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the provision by the first party to the second party of the right to an entitlement token;
transmitting data describing a written format for the entitlement token from the first party to the second party;
writing the entitlement token using the data describing the written format at the second location;
creating a first signature for the written entitlement token at the second location, the first signature being created by directing a coherent beam onto the written entitlement token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the written entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the written entitlement token, and processing the set of groups of data points;
transmitting the first signature to the first party; and
retaining the first signature or an attribute thereof for subsequent authenticity verification of the written entitlement token.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticity verification. The method can comprise conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the provision by the first party to the second party of the right to an entitlement token. Following the transaction outcome, data describing a written format for the entitlement token can be transmitted from the first party to the second party. The entitlement token can be written at the second location using the data describing the written format. The method can further comprise creating a first signature for the written entitlement token at the second location, the signature being based upon an intrinsic property of the written entitlement token, and storing the first signature in a signature database. Further, the method can comprise creating a second signature for the written entitlement token at a third location remote from the second location, the second signature being based upon the intrinsic property of the written entitlement token; and comparing attributes of the second signature with attributes of the first stored in the database to verify the authenticity of the written entitlement token.
-
Citations
58 Claims
-
1. A method for authenticity verification, the method comprising:
-
conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the provision by the first party to the second party of the right to an entitlement token;
transmitting data describing a written format for the entitlement token from the first party to the second party;
writing the entitlement token using the data describing the written format at the second location;
creating a first signature for the written entitlement token at the second location, the first signature being created by directing a coherent beam onto the written entitlement token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the written entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the written entitlement token, and processing the set of groups of data points;
transmitting the first signature to the first party; and
retaining the first signature or an attribute thereof for subsequent authenticity verification of the written entitlement token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for authenticity verification, the system comprising:
-
first and second computer systems remote one-another and operable to communicate therebetween via a data communications channel, wherein the first computer system is operable to enable to user at the second computer system to conduct a transaction with the first computer system, the outcome of the transaction being the provision by the first computer system to the user of the right to an entitlement token, wherein the first computer system is further operable to transmit data describing the entitlement token to the second computer system via the data communications channel;
a writer co-located with the second computer system and operable to write the entitlement token using the data describing the token; and
a first signature generator co-located with the second computer system and operable to create a first signature for the written entitlement token, the signature generator operable to create the signature by directing a coherent beam onto the written entitlement token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the written entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the written entitlement token, and processing the set of groups of data points, and to transmit the first signature to the first party. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
-
53. A method for authenticating a ticket, the method comprising:
-
creating a ticket at a location remote from an issue entity therefor;
scanning the ticket at the creation location to create a first signature therefor by directing a coherent beam onto the ticket, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the ticket, wherein different ones of the groups of data points relate to scatter from respective different parts of the ticket, and processing the set of groups of data points;
transmitting the first signature to the issue entity and retaining the first signature or an attribute thereof for subsequent ticket verification;
in response to presentation of the ticket for redemption, scanning the ticket to create a second signature therefor by directing a coherent beam onto the ticket, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the ticket, wherein different ones of the groups of data points relate to scatter from respective different parts of the ticket, and processing the set of groups of data points; and
comparing attributes of the first and second signatures to determine a validity confidence for the ticket. - View Dependent Claims (54, 55)
-
-
56. A method for authenticating an access permit, the method comprising:
-
creating a access permit at a location remote from an issue entity therefor;
scanning the access permit at the creation location to create a first signature therefor by directing a coherent beam onto the access permit, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the access permit, wherein different ones of the groups of data points relate to scatter from respective different parts of the access permit, and processing the set of groups of data points;
transmitting the first signature to the issue entity and retaining the first signature or an attribute thereof for subsequent access permit verification;
in response to presentation of the access permit for redemption, scanning the access permit to create a second signature therefor by directing a coherent beam onto the access permit, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the access permit, wherein different ones of the groups of data points relate to scatter from respective different parts of the access permit, and processing the set of groups of data points; and
comparing attributes of the first and second signatures to determine a validity confidence for the access permit. - View Dependent Claims (57, 58)
-
Specification