Secure personal identification instrument and method for creating same
First Claim
Patent Images
1. A method of creating a personal identification instrument on which personal data and at least one of a picture and signature of a legitimate holder are retained, comprising the steps of:
- (a) acquiring a first digital representation of at least one of a picture and signature of said legitimate holder of said instrument, (b) extracting first feature data from said digital representation, (c) combining said feature data with said personal data into a single data sequence, (d) generating a security code by encrypting said single data sequence using a private secret key of a kind for which decrypting using a public key would allow authentication of the instrument, and (e) affixing the personal data, and said at least one of a picture and a signature of a legitimate holder and said encrypted security code to the instrument to provide a substantially forgery-proof instrument.
0 Assignments
0 Petitions
Accused Products
Abstract
A personal identification instrument is comprised of a substrate, and carried on the substrate: a photograph and/or a personal signature, personal information relating to the legitimate holder of the instrument, and an encrypted machine readable security code carried by the instrument, the code being comprised of a combination of digitized personal information and a digitized descriptor of the photograph and/or personal signature.
212 Citations
9 Claims
-
1. A method of creating a personal identification instrument on which personal data and at least one of a picture and signature of a legitimate holder are retained, comprising the steps of:
-
(a) acquiring a first digital representation of at least one of a picture and signature of said legitimate holder of said instrument, (b) extracting first feature data from said digital representation, (c) combining said feature data with said personal data into a single data sequence, (d) generating a security code by encrypting said single data sequence using a private secret key of a kind for which decrypting using a public key would allow authentication of the instrument, and (e) affixing the personal data, and said at least one of a picture and a signature of a legitimate holder and said encrypted security code to the instrument to provide a substantially forgery-proof instrument. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a personal identification instrument comprising a substrate, and carried on the substrate:
- a photograph and a personal signature, readable personal information relating to the legitimate holder of the instrument, and a private secret key encrypted machine readable security code, the private secret key being of a kind for which decrypting using a public key would allow authentication of the instrument, said code being comprised of a combination of a digitized form of said personal information and a digitized descriptor of a first feature data of said photograph, comprising;
i reading said personal data from the personal identification instrument, ii acquiring a second digital representation of the photograph from said instrument, iii extracting second feature data from the digitized representation corresponding to said first feature data of said photograph, iv processing the second feature data to obtain image descriptors, v reading and decrypting the security code using a public decryption key, vi separating personal data from feature data in the encrypted security code, vii comparing the personal data obtained in step vi with the personal data read in step i, viii in the event there is a discrepancy, between the personal data from step vi compared to step i, declaring the instrument as a fake, ix in the event the instrument is not declared as a fake in step viii, obtaining decrypted image descriptors from the decrypted security code and comparing decrypted feature data descriptors obtained in step iv with the decrypted image descriptors, x declaring the instrument as a fake in the event the compared descriptors in step ix and step iv are dissimilar to a predetermined degree. - View Dependent Claims (9)
- a photograph and a personal signature, readable personal information relating to the legitimate holder of the instrument, and a private secret key encrypted machine readable security code, the private secret key being of a kind for which decrypting using a public key would allow authentication of the instrument, said code being comprised of a combination of a digitized form of said personal information and a digitized descriptor of a first feature data of said photograph, comprising;
Specification