Method of authenticating an object
First Claim
1. A method of authenticating an object comprising an identifier, said method comprising the steps of:
- reading the identifier using a data reader to generate identity data;
sending an authentication request from the data reader to a computer system, said request comprising the identity data;
receiving, in the data reader, an authentication message from the computer system, said authentication message comprising an indication of authenticity, a description of an object associated with the identity data and a digital signature of the authentication message;
verifying the digital signature; and
conveying the description of the object to a user if the signature is valid.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating an object comprising an identifier is provided. The method comprises the steps of: (i) reading the identifier using a data reader to generate identity data; (ii) sending an authentication request from the data reader to a computer system, the request comprising the identity data; (iii) receiving, in the data reader, an authentication message from the computer system, the authentication message comprising an indication of authenticity, a description of an object associated with the identity data and a digital signature of the authentication message; (iv) verifying the digital signature; and (v) conveying the description of the object to a user if the signature is valid.
55 Citations
20 Claims
-
1. A method of authenticating an object comprising an identifier, said method comprising the steps of:
-
reading the identifier using a data reader to generate identity data;
sending an authentication request from the data reader to a computer system, said request comprising the identity data;
receiving, in the data reader, an authentication message from the computer system, said authentication message comprising an indication of authenticity, a description of an object associated with the identity data and a digital signature of the authentication message;
verifying the digital signature; and
conveying the description of the object to a user if the signature is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of authenticating an object comprising an identifier, said method comprising the steps of:
-
receiving, in a computer system, an authentication request from a data reader, said request comprising identity data generated by reading the identifier;
sending, to the data reader, an authentication message from the computer system, said authentication message comprising an indication of authenticity, a description of an object associated with the identity data and a digital signature of the authentication message, thereby allowing the data reader to verify the digital signature and convey the description of the object to a user if the signature is valid.
-
-
18. A data reader for authenticating an object comprising an identifier, said data reader being configured for:
-
reading the identifier to generate identity data;
sending an authentication request from the data reader to a computer system, said request comprising the identity data;
receiving an authentication message from the computer system, said authentication message comprising an indication of authenticity, a description of an object associated with the identity data and a digital signature of the authentication message;
verifying the digital signature; and
conveying the description of the object to a user if the signature is valid.
-
-
19. The data reader of claim 19, which is a mobile phone.
-
20. A system for authenticating an object comprising an identifier, said system comprising a computer system configured for:
-
receiving an authentication request from a data reader, said request comprising identity data generated by reading the identifier;
sending, to the data reader, an authentication message, said authentication message comprising an indication of authenticity, a description of an object associated with the identity data and a digital signature of the authentication message, thereby allowing the data reader to verify the digital signature and convey the description of the object to a user if the signature is valid.
-
Specification