Method for authenticating objects identified by images or other identifying information
First Claim
Patent Images
1. A method for authenticating an object identified by a data string, the data string including a digitized image of the object, comprising the steps of:
- generating a signature of the data string using a private key of a public-key cryptosystem pair, the public-key cryptosystem pair also having a public key M;
decrypting the signature using the public key M of the public-key cryptosystem pair; and
comparing the decrypted signature with the digitized image to thereby authenticate the object.
0 Assignments
0 Petitions
Accused Products
Abstract
The method and system of the present invention utilizes public-key cryptography to create "secure" titles for personal and real property such as vehicles and the like. The title preferably comprises a card in which is stored a digital signature of one or more identifiers such as a vehicle identification number, the vehicle license plate and the owner'"'"'s name. To effect a transfer of the property, the digital signature on the title must first be shown to have been generated from the one or more identifiers.
-
Citations
9 Claims
-
1. A method for authenticating an object identified by a data string, the data string including a digitized image of the object, comprising the steps of:
-
generating a signature of the data string using a private key of a public-key cryptosystem pair, the public-key cryptosystem pair also having a public key M; decrypting the signature using the public key M of the public-key cryptosystem pair; and comparing the decrypted signature with the digitized image to thereby authenticate the object. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for authenticating an object identified by a data string, the data string being stored on a storage media and including at least a digitized image of the object, comprising the steps of:
-
receiving the storage media and generating a signature of the data string using a first key of a cryptosystem pair, the cryptosystem pair also having a second key; decrypting the signature using the second key of the cryptosystem pair; and comparing the decrypted signature with the digitized image to thereby authenticate the object. - View Dependent Claims (9)
-
Specification