DOCUMENT AUTHENTICATION AND IDENTIFICATION
First Claim
1. A computer-implemented method for encoding identification information in a document, comprising:
- receiving a digitized document;
creating a set of markers associated with identification information;
selecting an encoding strategy to apply the set of markers to the digitized document as identifying tags to produce an encoded document, wherein the encoded document retains semantic content of the digitized document absent permission to modify the semantic content of the digitized document; and
applying the set of markers to the digitized document according to the encoding strategy using an encoder to produce an encoded document with one or more characters replaced.
2 Assignments
0 Petitions
Accused Products
Abstract
Computer-implemented methods, systems, and computer program products for document authentication and identification using encoding and decoding are provided. A method includes receiving a digitized document and comparing the digitized document to a set of markers to determine whether the digitized document is an encoded document with one or more characters replaced. In response to determining that the digitized document is encoded, information is extracted from the set of markers using a decoder according to an encoding strategy. The extracted information and the set of markers are compared with data stored in encoding history to authenticate and identify the received digitized document. Markers in the encoded document may be hidden in plain sight, such that the encoding is not readily apparent to a casual observer.
-
Citations
20 Claims
-
1. A computer-implemented method for encoding identification information in a document, comprising:
-
receiving a digitized document; creating a set of markers associated with identification information; selecting an encoding strategy to apply the set of markers to the digitized document as identifying tags to produce an encoded document, wherein the encoded document retains semantic content of the digitized document absent permission to modify the semantic content of the digitized document; and applying the set of markers to the digitized document according to the encoding strategy using an encoder to produce an encoded document with one or more characters replaced. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method for document authentication and identification, comprising:
-
receiving a digitized document; comparing the digitized document to a set of markers to determine whether the digitized document is an encoded document with one or more characters replaced; in response to determining that the digitized document is an encoded document with one or more characters replaced, extracting information from the set of markers using a decoder according to an encoding strategy; and comparing the extracted information and the set of markers with data stored in encoding history to authenticate and identify the received digitized document. - View Dependent Claims (9, 10, 11)
-
-
12. A system for document authentication and identification, comprising:
-
an encoder configured to execute on a processing unit and perform a method comprising; receiving a digitized document; creating a set of markers associated with identification information; selecting an encoding strategy to apply the set of markers to the digitized document as identifying tags to produce an encoded document, wherein the encoded document retains semantic content of the digitized document absent permission to modify the semantic content of the digitized document; applying the set of markers to the digitized document according to the encoding strategy to produce an encoded document with one or more characters replaced or rearranged; and storing a record of the set of markers and encoding strategy associated with the encoded document as encoding history; and a decoder configured to execute on the processing unit and perform a method comprising; receiving a returned digitized document; comparing the returned digitized document to the set of markers to determine whether the returned digitized document is the encoded document with one or more characters replaced or rearranged; in response to determining that the returned digitized document is the encoded with one or more characters replaced or rearranged, extracting information from the set of markers according to the encoding strategy; and comparing the extracted information and the set of markers with data stored in the encoding history to authenticate and identify the returned digitized document. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer program product for document identification and authentication, the computer program product comprising:
a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for implementing a method, the method comprising; receiving a digitized document; creating a set of markers associated with identification information; selecting an encoding strategy to apply the set of markers to the digitized document as identifying tags to produce an encoded document, wherein the encoded document retains semantic content of the digitized document absent permission to modify the semantic content of the digitized document; applying the set of markers to the digitized document according to the encoding strategy to produce an encoded document with one or more characters replaced; and storing a record of the set of markers and encoding strategy associated with the encoded document as encoding history. - View Dependent Claims (19, 20)
Specification