Uniquely Linking Security Elements in Identification Documents
First Claim
1. A method of verifying a document with a smart card chip comprising:
- computing a hash of a digital watermark to be embedded in the document;
storing the hash in the smart card chip;
computing a hash of data stored in the smart card chip; and
embedding the hash of the data stored in the smart card chip in a digital watermark on the document.
1 Assignment
0 Petitions
Accused Products
Abstract
We provide techniques for uniquely linking security elements in identification documents. In one implementation we provide a digital watermark embedded on, and a smartcard chip embedded in, an identification document. The smart card chip includes a hash or a reduced-bit representation of the digital watermark, while the digital watermark includes a hash of information stored on the smartcard chip. In another implementation we cross-correlate encryption keys carried by various machine-readable features on an identification document. In still another implementation, we embed biometric information, which is stored in smartcard electronic circuitry, with a digital watermark. In one case the watermark is reversible, so that it can be removed to yield unmarked biometric information. In another case the watermark is fragile, to reveal whether the biometric information has been subjected to a transformation. In yet another implementation, we provide a jurisdictional indicator on an identification document. The jurisdictional indicator helps in decoding a digital watermark on the identification document.
42 Citations
27 Claims
-
1. A method of verifying a document with a smart card chip comprising:
-
computing a hash of a digital watermark to be embedded in the document; storing the hash in the smart card chip; computing a hash of data stored in the smart card chip; and embedding the hash of the data stored in the smart card chip in a digital watermark on the document. - View Dependent Claims (2, 3, 4, 5, 6, 10)
-
-
7. A method of verifying integrity of a document comprising:
-
capturing an image scan of the document, including a scan of an optically variable device; extracting a digital watermark from the image to check the integrity of the optically variable device; comparing information in the digital watermark with information in another security element captured in the image; and extracting a printer or issuer identifier from the image to check the source of the document. - View Dependent Claims (8, 9)
-
-
11. A method of verifying a document comprising:
-
extracting a public key from a machine readable feature on the document; extracting a message payload from another machine readable feature on the document, the message payload being encrypted by a private key that forms part of a public-private key pair with the public key; and using the public key to de-scramble the message payload. - View Dependent Claims (12, 13, 14)
-
-
15. A document comprising:
-
a substrate; and an optically variable device attached to the substrate, the optically variable device having a diffraction pattern that conveys a first image at a first orientation of the document, and a second image at a second orientation of the document, wherein the first and second images form a figure ground reversal enabling visual verification of the document. - View Dependent Claims (16, 17, 18)
-
- 19. A document having a smart card chip, the smart card chip carrying a digital watermark used to authenticate the data stored on the smart card chip.
-
26. A method of verifying a document, the document comprising optical memory having first information stored therein and a digital watermark carrying second information, said method comprising:
-
reading the optical memory to obtain the first information, wherein the first information is related to the digital watermark; and using at least the first information, extracting the digital watermark embedded in the document to obtain the second information. - View Dependent Claims (27)
-
Specification