Identification and protection of security documents
First Claim
1. A method comprising:
- receiving digital data corresponding to a physical document;
transforming the digital data into a frequency domain;
comparing characteristics associated with the transformed digital data to predetermined characteristics that are associated with a first document type, and if the characteristics coincide, determining that the physical document is of the first document type; and
if the characteristics do not coincide,comparing the characteristics of the transformed digital data to predetermined characteristics that are associated with a second document type, and if the characteristics coincide, determining that the physical document is of the second document type.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides methods and systems that are helpful for authenticating or protecting physical and electronic documents like financial documents and identification documents. In one implementation, a method is provided including: accessing a data repository including a library; obtaining a graphic or image from the library, wherein the graphic or image comprises a plural-bit identifier steganographically embedded therein; and, once obtained, applying the steganographically embedded image or graphic to a security document, the plural-bit identifier providing information associated with an authorized bearer of the security document or with the security document. Of course, other implementations are provided as well.
-
Citations
24 Claims
-
1. A method comprising:
-
receiving digital data corresponding to a physical document; transforming the digital data into a frequency domain; comparing characteristics associated with the transformed digital data to predetermined characteristics that are associated with a first document type, and if the characteristics coincide, determining that the physical document is of the first document type; and if the characteristics do not coincide, comparing the characteristics of the transformed digital data to predetermined characteristics that are associated with a second document type, and if the characteristics coincide, determining that the physical document is of the second document type. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
accessing a data repository including a library; obtaining a graphic or image from the library, wherein the graphic or image comprises a plural-bit identifier steganographically embedded therein; and once obtained, applying the steganographically embedded image or graphic to a security document, the plural-bit identifier providing or linking to information associated with an authorized bearer of the security document or with the security document. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A computer readable medium comprising instructions stored thereon, the instructions comprising instructions to:
-
receive digital data corresponding to a physical document; transform the digital data into a frequency domain; compare characteristics associated with the transformed digital data to predetermined characteristics that are associated with a first document type, and if the characteristics coincide, determine that the physical document is of the first document type; and if the characteristics do not coincide, compare the characteristics of the transformed digital data to predetermined characteristics that are associated with a second document type, and if the characteristics coincide, determine that the physical document is of the second document type. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
hosting a data repository comprising a library having a plurality of images or graphics stored therein; upon receiving a request for a graphic or image in the library, steganographically embedding a plural-bit identifier in the graphic or image, the plural-bit identifier providing or linking to information associated with an authorized bearer of a security document or with the security document; and providing the steganographically embedded graphic or image. - View Dependent Claims (22, 23, 24)
-
Specification