Authenticating objects using embedded data
First Claim
Patent Images
1. A method for authenticating a product comprising:
- receiving a product identifier associated with the product;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier, and in response to validating the product, enabling use or transfer of software or content associated with the product.
6 Assignments
0 Petitions
Accused Products
Abstract
This disclosure describes a method of making a secure product using data hidden in the product itself and a method of using the hidden data to authenticate the product. The method assigns a product identifier to the product, such as a unique serial number. It also steganographically embeds security data into the product. The security data includes the product identifier (e.g., a hashed version of it). The security data is embedded such that it is machine readable and enables automated authentication of the product by comparing the security data decoded from the product with the product identifier.
619 Citations
29 Claims
-
1. A method for authenticating a product comprising:
-
receiving a product identifier associated with the product;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier, and in response to validating the product, enabling use or transfer of software or content associated with the product. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A methods for authenticating a product comprising:
-
receiving a product identifier associated with the product;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier;
wherein the product comprises software and including;
controlling installation of software in response to validating the product.
-
-
8. A method for authenticating a product comprising:
-
receiving a product identifier associated with the product;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier;
wherein the product comprises a financial or access card and including;
controlling activation of the card in response to validating the product.
-
-
9. A method for authenticating a product comprising:
-
receiving a product identifier associated with the product, including prompting a user to enter the product identifier;
prompting the user to scan the product to capture a scan of the embedded security data;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier.
-
-
10. A method for authenticating a product comprising:
-
receiving a product identifier associated with the product;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier;
wherein a copy detection feature is printed on the product; and
further including;
using the copy detection feature to determine whether the product has been counterfeited. - View Dependent Claims (11)
-
-
12. A method for authenticating a product comprising:
-
receiving a product identifier associated with the product;
decoding security data steganographically embedded into the product; and
validating the product by comparing the decoded security data with the product identifier;
wherein a copy detection feature is included on the product; and
the copy detection feature is used to determine whether the product has been counterfeited;
wherein the copy detection feature comprises a watermark that changes when copied in a manner that enables copying of the product to be detected.
-
-
13. A product including:
security data steganographically embedded into the product;
the product being assigned a product identifier that is related to the security data such that authenticity of the product is evaluated by comparing the security data decoded from the product with the product identifier, wherein successful authentication of the product based on comparing the security data with the product identifier enables use or transfer of software or content associated with the product.- View Dependent Claims (14)
-
15. A method of making a product comprising:
-
assigning a product identifier to the product;
steganographically embedding security data into the product, the security data including the product identifier;
wherein the security data is machine readable and enables automated authentication of the product by comparing the security data decoded from the product with the product identifier;
wherein successful authentication of the product based on comparing the security data with the product identifier enables use or transfer of software or content associated with the product.- View Dependent Claims (16)
-
-
17. A method of authenticating a product comprising:
-
extracting embedded information steganographically encoded on a physical storage medium, the embedded information being carried in a code that is machine readable when exposed to visible, UV or infrared illumination; and
using the embedded information to enable use or transfer of software or media content stored on the medium. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A product including:
security data steganographically embedded into the product;
the product being assigned a product identifier that is related to the security data such that authenticity of the product is evaluated by comparing the security data decoded from the product with the product identifier;
wherein the security data is carried in a digital watermark that is machine readable when illuminated by non-visible wavelengths; and
wherein successful authentication of the product based on comparing the security data with the product identifier enables use or transfer of software or content associated with the product.- View Dependent Claims (28, 29)
Specification