Method Of Providing Security Document
First Claim
Patent Images
1. A method of providing a security document, the method comprising the steps of, performed by a computer system:
- generating a digital signature of at least part of an identity associated with the security document;
generating a plurality of coded data tags to each encode data on the identity and a respective part of the digital signature; and
printing, with a printer networked with the computer system, the security document with the tags tiled thereacross,wherein the tags are generated and printed so that interaction with only one of the tags to detect the identity and respective signature part encoded thereby allows authentication of the entire digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing a security document is provided in which a computer system generates a digital signature of at least part of an identity associated with the security document, generates a plurality of coded data tags to each encode data on the identity and a respective part of the digital signature, and prints, with a printer networked therewith, the security document with the tags tiled thereacross. The tags are generated and printed so that interaction with only one of the tags to detect the identity and respective signature part encoded thereby allows authentication of the entire digital signature.
-
Citations
9 Claims
-
1. A method of providing a security document, the method comprising the steps of, performed by a computer system:
-
generating a digital signature of at least part of an identity associated with the security document; generating a plurality of coded data tags to each encode data on the identity and a respective part of the digital signature; and printing, with a printer networked with the computer system, the security document with the tags tiled thereacross, wherein the tags are generated and printed so that interaction with only one of the tags to detect the identity and respective signature part encoded thereby allows authentication of the entire digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification