Method of identifying a copied security document
First Claim
1. A method of determining a counterfeit security document, the security document having disposed thereon or therein coded data including a number of coded data portions, each coded data portion being indicative of:
- an identity of the security document; and
, at least part of a signature, the signature being a digital signature of at least part of the identity;
wherein the method includes;
in a sensing device;
sensing at least one coded data portion; and
, generating, using the sensed coded data portion, indicating data indicative of;
the identity; and
, at least one signature part;
in a processor;
determining, from the indicating data;
a determined identity; and
, at least one determined signature part;
determining if the security document is a counterfeit document using the determined identity and the at least one determined signature part.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of determining a counterfeit security document which includes a number of coded data portions indicative of an identity of the security document; and at least part of a digital signature of at least part of the identity. The method includes using a sensing device to sense at least one coded data portion and generate indicating data. The indicating data is used by a processor to obtain a determined identity and at least one determined signature part, which are then used to determine if the security document is a counterfeit document.
-
Citations
20 Claims
-
1. A method of determining a counterfeit security document, the security document having disposed thereon or therein coded data including a number of coded data portions, each coded data portion being indicative of:
-
an identity of the security document; and
,at least part of a signature, the signature being a digital signature of at least part of the identity;
wherein the method includes;
in a sensing device;
sensing at least one coded data portion; and
,generating, using the sensed coded data portion, indicating data indicative of;
the identity; and
,at least one signature part;
in a processor;
determining, from the indicating data;
a determined identity; and
,at least one determined signature part;
determining if the security document is a counterfeit document using the determined identity and the at least one determined signature part. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification