Object identification uses prediction of data in distributed network
First Claim
1. An authentication object, the authentication object for use in a transaction, the transaction being authenticated at least in part via an authentication network, and at least one data packet having an itinerary in the authentication network, the itinerary being pre-determined in the at least one data packet, the authentication object comprising a predictor, the predictor enabled to predict at least a part of the pre-determined itinerary of the at least one data packet in the authentication network.
1 Assignment
0 Petitions
Accused Products
Abstract
A measure of security is provided by determining authenticity of an object (e.g., credit card, cell phone, car keys, etc.) by letting the object predict at which nodes multiple specific data packets are going to be in a distributed network in the next time slot.
-
Citations
20 Claims
- 1. An authentication object, the authentication object for use in a transaction, the transaction being authenticated at least in part via an authentication network, and at least one data packet having an itinerary in the authentication network, the itinerary being pre-determined in the at least one data packet, the authentication object comprising a predictor, the predictor enabled to predict at least a part of the pre-determined itinerary of the at least one data packet in the authentication network.
-
4. A method of determining authenticity of an authentication object, the authentication object being for use in a transaction, the transaction being authenticated at least in part via authentication network comprising plural nodes, and at least one data packet having an itinerary in the authentication network, the itinerary being pre-determined in the at least one data packet, the method comprising:
- receiving from the authentication object a prediction of at least a part of the pre-determined itinerary of the at least one data packet in the authentication network; and
verifying the prediction. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
- receiving from the authentication object a prediction of at least a part of the pre-determined itinerary of the at least one data packet in the authentication network; and
Specification