Method and apparatus for uniquely and authoritatively identifying tangible objects
First Claim
1. A method for using verified information concerning a tangible object, comprising the steps of:
- accessing descriptor data associated with the tangible object, said descriptor data including an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing information concerning said tangible object, and a digital signature;
verifying that said digital signature matches said identity public key and said attribute data;
performing a pair of complementary data transformations on source test data to produce resultant test data, said pair of complementary data transformations being performed by;
(a) performing a first data transformation according to said first public/private key encryption algorithm using said identity public key, and(b) accessing a digital protection system physically attached to said tangible object to perform a second data transformation according to said first public/private key encryption algorithm using an identity private key in said digital protection system, said identity private key corresponding to said identity public key according to said first public/private key encryption algorithm, said second data transformation being complementary to said first data transformation, said digital protection system being a tangible device which receives input data, processes data, and produces output data independently of said tangible object;
comparing said source test data with said resultant test data; and
using said attribute data in a manner dependent on the results of said step of verifying that said digital signature matches said identity public key and said attribute data, and said step of comparing said source test data with said resultant test data.
1 Assignment
0 Petitions
Accused Products
Abstract
A smart chip protection system contains a unique public/private identity key pair and uses a separate public/private signature key pair. The identity private key is stored in permanent, secure storage such that it can not be read outside the chip. An issuing entity generates a descriptor containing the identity public key, attribute data, and a digital signature. The digital signature is generated by enciphering a derivation of the identity public key and the attribute data with the signature private key known only to the issuer. The authenticity of the descriptor data is verified by decrypting the signature with the signature public key using a known algorithm, and comparing the result to the derivation of the descriptor data. The identity of the object can be verified requesting the smart chip ro perform an encryption/decryption operation using its identity private key, and performing the complement using the public key.
-
Citations
83 Claims
-
1. A method for using verified information concerning a tangible object, comprising the steps of:
-
accessing descriptor data associated with the tangible object, said descriptor data including an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing information concerning said tangible object, and a digital signature; verifying that said digital signature matches said identity public key and said attribute data; performing a pair of complementary data transformations on source test data to produce resultant test data, said pair of complementary data transformations being performed by; (a) performing a first data transformation according to said first public/private key encryption algorithm using said identity public key, and (b) accessing a digital protection system physically attached to said tangible object to perform a second data transformation according to said first public/private key encryption algorithm using an identity private key in said digital protection system, said identity private key corresponding to said identity public key according to said first public/private key encryption algorithm, said second data transformation being complementary to said first data transformation, said digital protection system being a tangible device which receives input data, processes data, and produces output data independently of said tangible object; comparing said source test data with said resultant test data; and using said attribute data in a manner dependent on the results of said step of verifying that said digital signature matches said identity public key and said attribute data, and said step of comparing said source test data with said resultant test data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A program product for using verified information concerning a tangible object, said program product comprising a plurality of processor executable instructions recorded on signal-bearing media, wherein said instructions, when executed by a processor of a digital data processing device, cause the digital data processing device to perform the steps of:
-
accessing descriptor data associated with the tangible object, said descriptor data including an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing information concerning said tangible object, and a digital signature; verifying that said digital signature matches said identity public key and said attribute data; performing a pair of complementary data transformations on source test data to produce resultant test data, said pair of complementary data transformations being performed by; (a) performing a first data transformation according to said first public/private key encryption algorithm using said identity public key, and (b) accessing a digital protection system physically attached to said tangible object to perform a second data transformation according to said first public/private key encryption algorithm using an identity private key in said digital protection system, said identity private key corresponding to said identity public key according to said first public/private key encryption algorithm, said second data transformation being complementary to said first data transformation, said digital protection system being a tangible device which receives input data, processes data, and produces output data independently of said tangible object; comparing said source test data with said resultant test data; and using said attribute data in a manner dependent on the results of said step of verifying that said digital signature matches said identity public key and said attribute data, and said step of comparing said source test data with said resultant test data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for updating attribute data associated with a tangible object, comprising the steps of:
-
receiving a request to a service provider from a requestor to update said attribute data, the request including an identity public key for transforming data according to a first public/private key encryption algorithm, old attribute data, and an old digital signature of said old attribute data and said identity public key; verifying that said old digital signature matches said identity public key and said old attribute data; performing a pair of complementary data transformations of source test data to produce resultant test data, a first of said pair of complementary data transformations being performed by said service provider according to said first public/private key encryption algorithm using said identity public key, and a second of said pair of complementary data transformations being performed by requesting a digital protection system physically attached to said tangible object to perform said second data transformation according to said first public/private key encryption algorithm using an identity private key in said digital protection system, said identity private key corresponding to said identity public key according to said first public/private key encryption algorithm, said digital protection system being a tangible device which receives input data, processes data, and produces output data independently of said tangible object; comparing said source test data with said resultant test data, said comparing step being performed by said service provider; and depending on the results of said step of comparing said source test data with said resultant test data, generating an updated descriptor, said updated descriptor comprising said identity public key, updated attribute data, and an updated digital signature of said identity public key and said updated attribute data. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 73)
-
-
28. A method for using verified information concerning a tangible object, comprising the steps of:
-
accessing descriptor data associated with the tangible object, said descriptor data including an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing information concerning said tangible object, and a digital signature, wherein said digital signature represents an encryption of data derived from said identity public key and said attribute data according to a derivation algorithm, said encryption being according to a second public/private key encryption algorithm using a signature private key; decrypting said digital signature according to said second public/private key encryption algorithm using a signature public key; deriving data from said identity public key and said attribute data using said derivation algorithm; comparing the decrypted digital signature to the data derived from said identity public key and said attribute data according to said derivation algorithm; generating random source test data; performing a pair of complementary data transformations of said source test data to produce resultant test data, including; (a) performing a first data transformation of said pair of complementary data transformations according to said first public/private key encryption algorithm using said identity public key, and (b) accessing a digital protection system physically attached to said tangible object to perform a second data transformation of said pair of complementary data transformations, said second data transformation being according to said first public/private key encryption algorithm using an identity private key in said digital protection system, said identity private key corresponding to said identity public key according to said first public/private key encryption algorithm, said digital protection system being a tangible device which receives input data, processes data, and produces output data independently of said tangible object; comparing said random source test data with said resultant test data; and using said attribute data in a manner dependent on the results of said step of comparing the decrypted digital signature to the data derived from said identity public key and said attribute data, and said step of comparing said random source test data with said resultant test data. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. An apparatus for verifying information concerning a tangible object, comprising:
-
a programmable processor; a memory for storing instructions executable on said programmable processor; a digital protection system interface coupled to said processor, said interface communicating with a digital protection system for said tangible object, said digital protection system being a tangible device physically attached to said tangible object which receives input data, processes data, and produces output data independently of said tangible object; a protection system verification program executable on said programmable processor, wherein said protection system verification program (a) obtains a data descriptor from a said digital protection system through said interface, said data descriptor comprising an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing information concerning said tangible object, and a digital signature; (b) verifies that said digital signature matches said identity public key and said attribute data; (c) performs a first data transformation of a pair of complementary data transformations of source test data which produce resultant test data, said first data transformation being according to said first public/private key encryption algorithm using said identity public key; (d) directs said digital protection system to perform a second data transformation of said pair of complementary data transformations of source test data which produce resultant test data, said second data transformation being complementary to said first data transformation; (e) compares said source test data with said resultant test data; and (f) verifies information concerning the tangible object responsive to steps (b) and (e). - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. A personal identity document for a natural person, comprising:
-
a portable, tangible carrier for carrying by said natural person; and a digital protection system physically attached to said carrier, said digital protection system comprising; (a) an external interface for receiving data requests, (b) a processor coupled to said external interface, said processor capable of performing a data transformation according to a first public/private key encryption algorithm, and (c) an internal data storage, said internal data storage storing an identity private key and a data descriptor, said identity private key being inaccessible outside said external interface, said data descriptor including an identity public key, attribute data relating to attributes of said natural person, and a digital signature of said identity public key and said attribute data, said identity public key corresponding to said identity private key according to said first public/private key encryption algorithm; wherein said processor performs said data transformation of data responsive to a request received through said external interface, said processor performing said data transformation according to said first public/private key encryption algorithm using said identity private key. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 74)
-
-
51. A control station for verifying the respective personal identities of multiple natural persons, comprising:
-
a programmable processor; a memory, said memory storing a control program which executes on said programmable processor and controls at least some operations of said control station; a digital personal identity document interface, said interface communicating with a digital personal identity document of a natural person, said digital personal identity document being a portable, tangible device carried by said natural person; wherein said control program verifies a personal identity of a natural person by; (a) obtaining a data descriptor from said digital personal identity document of the subject through said interface, said descriptor comprising an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing identifying information concerning said natural person, and a digital signature; (b) verifying that said digital signature matches said identity public key and said attribute data; (c) performing a pair of complementary data transformations of source test data to produce resultant test data, said pair of complementary data transformations including (i) a first data transformation according to said first public/private key encryption algorithm using said identity public key, said first data transformation being performed externally to said digital personal identity document, and (ii) a second data transformation according to said first public/private key encryption algorithm, said second data transformation being performed by said digital personal identity document responsive to a request by said control program; (d) comparing said source test data with said resultant test data; and (e) verifying the identity of said natural person depending on the results of said step of verifying that said digital signature matches said identity public key and said attribute data, and said step of comparing said source test data with said resultant test data. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61)
-
-
62. A method for verifying the identity of a natural person, comprising the steps of:
-
(a) obtaining a data descriptor from a digital personal identity document of the natural person, said digital personal identity document being a portable, tangible device carried by said natural person, said descriptor comprising an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing identifying information concerning said natural person, and a digital signature; (b) verifying that said digital signature matches said identity public key and said attribute data; (c) performing a pair of complementary data transformations of source test data to produce resultant test data, wherein a first data transformation of said pair is performed by a verifying device according to said first public/private key encryption algorithm using said identity public key, and wherein a second data transformation of said pair is performed by said digital personal identity document responsive to a request from a verifying device, said second data transformation being complementary to said first data transformation; (d) comparing said source test data with said resultant test data; and (e) verifying the identity of said natural person responsive to the results of steps (b) and (d). - View Dependent Claims (63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
-
75. A method for using verified information concerning a tangible object, comprising the steps of:
-
accessing descriptor data associated with the tangible object, said tangible object being other than a data processing device, said descriptor data including an identity public key for transforming data according to a first public/private key encryption algorithm, attribute data containing information concerning said tangible object, and a digital signature; verifying that said digital signature matches said identity public key and said attribute data; performing a pair of complementary data transformations on source test data to produce resultant test data, said pair of complementary data transformations being performed by; (a) performing a first data transformation according to said first public/private key encryption algorithm using said identity public key, and (b) accessing a digital protection system physically attached to said tangible object to perform a second data transformation according to said first public/private key encryption algorithm using an identity private key in said digital protection system, said identity private key corresponding to said identity public key according to said first public/private key encryption algorithm, said second data transformation being complementary to said first data transformation; comparing said source test data with said resultant test data; and using said attribute data in a manner dependent on the results of said step of verifying that said digital signature matches said identity public key and said attribute data, and said step of comparing said source test data with said resultant test data. - View Dependent Claims (76, 77, 78, 79, 80, 81, 82, 83)
-
Specification