Methods and Systems for Digital Authentication Using Digitally Signed Images
First Claim
1. A method, comprising:
- encoding a first party digital signature in a first signature region of a first image and encoding a second party digital signature in a second signature region of the first image to produce a first encoded image; and
separating the first encoded image into a first portion and a second portion, the first portion including a first part of the first party digital signature and a first part of the second party digital signature and the second portion including a second part of the first party digital signature and a second part of the second party digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Various systems, methods, and programs embodied in computer-readable mediums are provided for digital authentication using digitally signed images. In one representative embodiment, a method comprising: extracting a first image portion from an image selected by a first party, the first image portion including a first encoded part of an second party digital signature; obtaining a second image portion associated with the first image portion, the second image portion including a second encoded part of the second party digital signature; decoding the first and second encoded parts of the second party digital signature; and confirming validity of the second party digital signature based upon a second party public key.
99 Citations
40 Claims
-
1. A method, comprising:
-
encoding a first party digital signature in a first signature region of a first image and encoding a second party digital signature in a second signature region of the first image to produce a first encoded image; and separating the first encoded image into a first portion and a second portion, the first portion including a first part of the first party digital signature and a first part of the second party digital signature and the second portion including a second part of the first party digital signature and a second part of the second party digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
encoding N digital signatures in N corresponding signature regions of a first image, each digital signature associated with at least one of N parties; and separating the first encoded image into M portions, each portion including a first part of at least one of the N digital signatures. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method, comprising:
-
extracting a first image portion from an image selected by a first party, the first image portion including a first encoded part of an second party digital signature; obtaining a second image portion associated with the first image portion, the second image portion including a second encoded part of the second party digital signature; decoding the first and second encoded parts of the second party digital signature; and confirming validity of the second party digital signature based upon a second party public key. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification