Method and system for authenticating objects and object data
First Claim
Patent Images
1. A system comprising:
- at least one identifier associated with the object;
a receiver for interrogating said at least one identifier to produce identification information;
a camera system for recording a first image from the object in a first state including said at least one identifier;
a composite generator for encoding said identification information from said receiver, as encoded data, along with said first image acquired by said camera system, and generating a first set of composite data;
a camera system for recording a second image from the object in a second state including said at least one identifier; and
a composite generator for encoding said identification information from said receiver, as encoded data, along with said second image acquired by said camera system, and generating a second set of composite data.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for authenticating an image of an object, include at least one identifier associated with the object, a receiver for interrogating the at least one identifier to produce identification information, a camera system for recording an image from the object including the at least one identifier, and a composite generator for encoding the identification information from the receiver along with the image acquired by the camera system, to produce composite data.
185 Citations
68 Claims
-
1. A system comprising:
-
at least one identifier associated with the object;
a receiver for interrogating said at least one identifier to produce identification information;
a camera system for recording a first image from the object in a first state including said at least one identifier;
a composite generator for encoding said identification information from said receiver, as encoded data, along with said first image acquired by said camera system, and generating a first set of composite data;
a camera system for recording a second image from the object in a second state including said at least one identifier; and
a composite generator for encoding said identification information from said receiver, as encoded data, along with said second image acquired by said camera system, and generating a second set of composite data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 59, 60, 61, 62)
a delay sensing subsystem, coupled to said receiver, for measuring a delay time between initiation of a pulse of said receiver directed to said object and reception thereof by said receiver.
-
-
12. The system according to claim 1, wherein said identification information includes at least one of a distance between said camera system and the object and a focal length of said camera system.
-
13. The system according to claim 12, further comprising:
a delay sensing subsystem, coupled to said receiver, for measuring a delay time between initiation of a pulse of said receiver directed to said object and reception thereof by said receiver.
-
14. The system according to claim 13, wherein said delay time is recorded and encoded into the composite data by said composite generator.
-
15. The system according to claim 1, further comprising:
an encryption device coupled to said composite generator, wherein each of said first and second images are authenticated by encoding of the identification information from said at least one identifier and predetermined information are input from said composite generator to said encryption device using one of a public key and a private key.
-
16. The system according to claim 1, wherein said camera system includes a zoom lens system and automatically forms a plurality of images with a plurality of different zoom settings of said zoom lens system.
-
17. The system according to claim 16, wherein said zoom settings comprise random zoom settings.
-
18. The system according to claim 16, wherein said zoom settings are encoded into at least one of the plurality of images.
-
19. The system according to claim 1, wherein said receiver includes an identifier attached thereto, such that both said identifier of said receiver and said at least one identifier of said object are recorded when said camera system takes an image of said object.
-
20. The system according to claim 1, wherein said at least one identifier contains a plurality of dipoles.
-
21. The system according to claim 1, wherein said at least one identifier comprises silicon.
-
22. The system according to claim 1, wherein a signature corresponding to said at least one identifier is prerecorded.
-
23. The system according to claim 22, wherein the signature of said at least one identifier is prerecorded by using radio frequency.
-
24. The system according to claim 1, wherein said at least one identifier comprises a radio frequency identification tag.
-
25. The system according to claim 1, wherein each of said first and second images is encoded with a time stamp.
-
26. The system according to claim 1, further comprising means for encrypting a time stamp in each of said first and second images,
said time stamp representing a time at which each of said first and second images was recorded by said camera system. -
27. The system according to claim 1, further comprising means for sensing a time that each of said first and second images is recorded by said camera system, embedding a time stamp in each of said first and second images, and for encrypting each of said first and second images including said time stamp.
-
28. The system according to claim 1, wherein said object comprises an inanimate object.
-
29. The system according to claim 28, wherein said object comprises one of a motor vehicle and artwork.
-
30. The system according to claim 1, wherein said object comprises an animate object.
-
31. The system according to claim 1, wherein said at least one identifier comprises a tamper-resistant identifier such that any of alteration and removal of said at least one identifier nullifies said at least one identifier.
-
59. The system of claim 1, wherein said first state of said object is damaged.
60.The system of claim 1, wherein said second state of said object is repaired. -
60. The system of claim 1, wherein said first set of composite data and said second set of composite data are submitted to an insurance company.
-
61. The system of claim 1, wherein said first set of composite data is compared to said second set of composite data.
-
62. The system of claim 1, wherein each set of said first and second sets of composite data comprises a composite photograph.
-
32. A method of authenticating an object, comprising:
-
associating at least one identifier with the object;
interrogating said at least one identifier to generate identification information;
recording a first image from the object in a first state including the at least one identifier; and
encoding said identification information, based on said interrogating said at least one identifier, along with said first image recorded, to generate a first set of composite data;
recording a second image from the object in a second state including the at least one identifier; and
encoding said identification information, based on said interrogating said at least one identifier, along with said second image recorded, to generate a second set of composite data. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 63, 64, 65, 66, 67)
said method further comprising nullifying said tamper-resistant identifier responsive to any of alteration and removal of said at least one identifier. -
63. The method of claim 32, wherein said first state of said object is damaged.
-
64. The method of claim 32, wherein said second state of said object is repaired.
-
65. The method of claim 32, further comprising:
submitting said first set of composite data and said second set of composite data to an insurance company.
-
66. The method of claim 32, further comprising:
comparing said first set of composite data to said second set of composite data.
-
67. The method of claim 32, wherein each set of said first and second sets of composite data comprises a composite photograph.
-
-
41. A method of authenticating an object, comprising:
-
simultaneously extracting at least two kinds of information associated with said object in a first state;
simultaneously, with said extracting, jointly encrypting said at least two kinds of information; and
decrypting said at least two kinds of information, to verify authenticity of said object in a first state;
simultaneously extracting at least two kinds of information associated with said object in a second state;
simultaneously, with said extracting, jointly encrypting said at least two kinds of information; and
decrypting said at least two kinds of information, to verify authenticity of said object in a second state. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 68)
said method further comprising nullifying said tamper-resistant identifier responsive to any of alteration and removal of said at least one identifier. -
68. The method of claim 41, further comprising:
placing said first state and said second state in a time-sequenced order.
-
Specification