Authentication Processor Using a Signature Part
First Claim
1. A method of authenticating an object using a processor, the method including, in the processor:
- receiving indicating data, the indicating data being generated in response to sensing of coded data provided on or in a surface associated with the object, the indicating data being indicative of;
an identity of the object; and
, at least part of a signature, the signature being a digital signature of at least a part of the identity;
determining from the indicating data, a received identity and at least one received signature part;
determining, using the received identity and a secret key, a determined signature;
comparing the determined signature to the at least one received signature part; and
, authenticating the object using the results of the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating an object using a processor that receives indicating data generated in response to sensing of coded data. The indicating data is indicative of an identity of the object and, at least part of a signature, the signature being a digital signature of at least a part of the identity. The processor determines from the indicating data, a received identity and at least one received signature part, and then uses the received identity and a secret key, to determine a determined signature. The determined signature is then compared to the at least one received signature part to authenticate the object.
38 Citations
20 Claims
-
1. A method of authenticating an object using a processor, the method including, in the processor:
-
receiving indicating data, the indicating data being generated in response to sensing of coded data provided on or in a surface associated with the object, the indicating data being indicative of;
an identity of the object; and
,at least part of a signature, the signature being a digital signature of at least a part of the identity;
determining from the indicating data, a received identity and at least one received signature part;
determining, using the received identity and a secret key, a determined signature;
comparing the determined signature to the at least one received signature part; and
,authenticating the object using the results of the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of authenticating an object using a processor, the method including, in a sensing device:
-
sensing coded data provided on or in a surface associated with the object;
determining, from the sensed coded data, indicating data indicative of;
an identity of the object; and
,at least part of a signature, the signature being a digital signature of at least a part of the identity;
providing the indicating data to the processor, the processor being responsive to the indicating data to;
generate, using the identity and a secret key, the signature;
compare the determined signature to the at least part of the signature; and
,authenticate the object using the results of the comparison.
-
-
20. A processor for authenticating an object, the object being associated with a surface having disposed thereon or therein coded data indicative of:
-
an identity of the object; and
,at least part of a signature, the signature being indicative of a digital signature of at least part of the identity. wherein the processor;
receives indicating data, the indicating data being generated in response to sensing of the coded data, the indicating data being indicative of the identity and at least part of the signature;
determines, using the indicating data, the identity and the at least part of the signature;
generates, using the determined identity and a secret key, a determined signature;
compares the determined signature to the at least part of the signature; and
,authenticates the object using the results of the comparison.
-
Specification