Authenticity Verification
First Claim
1. A method for authenticity verification, the method comprising:
- conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the transfer of title to goods and/or services from the first party to the second party;
capturing data describing a value entitlement token of the second party to create a signature for the value entitlement token, the signature being created by directing a coherent beam onto the value entitlement token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the value entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the value entitlement token, and processing the set of groups of data points;
transmitting the signature from the second party to a third party;
comparing the signature to a database of stored signatures at the third party; and
transmitting from the third party to the first party a validation result indicating whether the value entitlement token corresponds to a value entitlement token signature in the database.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticity verification. The method can comprise conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the transfer of title to goods and/or services from the first party to the second party. Data describing a value entitlement token of the second party can be captured to create a signature for the value entitlement token, the signature being based upon an intrinsic property of the value entitlement token. The signature can be transmitted from the second party to a third party which can compare the signature to a database of stored signatures. A validation result indicating whether the value entitlement token corresponds to a value entitlement token signature in the database can be transmitted from the third party to the first party.
-
Citations
29 Claims
-
1. A method for authenticity verification, the method comprising:
-
conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the transfer of title to goods and/or services from the first party to the second party;
capturing data describing a value entitlement token of the second party to create a signature for the value entitlement token, the signature being created by directing a coherent beam onto the value entitlement token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the value entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the value entitlement token, and processing the set of groups of data points;
transmitting the signature from the second party to a third party;
comparing the signature to a database of stored signatures at the third party; and
transmitting from the third party to the first party a validation result indicating whether the value entitlement token corresponds to a value entitlement token signature in the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for authenticity verification, the system comprising:
-
first and second computer systems remote one-another and operable to communicate therebetween via a data communications channel, wherein the first computer system is operable to enable a user at the second computer system to conduct a transaction with the first computer system, the outcome of the transaction being the provision by the first computer system to the user of entitlement to goods and/or services;
a signature generator co-located with the second computer system and operable to create a signature for a value entitlement token of the user, the signature generator operable to create the signature by directing a coherent beam onto the value entitlement token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the value entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the value entitlement token, and processing the set of groups of data points, the second computer system being operable to transmit the signature to a third computer system;
the third computer system being operable to compare the signature to a database of stored signatures, to produce a validation result indicating whether the value entitlement token corresponds to a value entitlement token signature in the database and the third computer system being further operable to transmitting the validation result to the first computer system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for authenticating a value transfer token, the method comprising:
-
scanning a value transfer token, selected from a group comprising a credit card, a bank card, a loyalty card, a voucher, a certificate and a token, to create a signature by directing a coherent beam onto the value transfer token, collecting a set comprising groups of data points from signals obtained when the coherent beam scatters from the value entitlement token, wherein different ones of the groups of data points relate to scatter from respective different parts of the value entitlement token, and processing the set of groups of data points;
transmitting the signature to a comparison entity operable to compare the signature to a database of stored signatures; and
creating an authentication result based upon an outcome of the comparison. - View Dependent Claims (27, 28, 29)
-
Specification