Authenticating concealed private data while maintaining concealment
First Claim
1. A method of authenticating an item, the method comprising:
- a) acquiring an unencrypted reference signal, Yref, of an item;
where Yref is an n-dimensional row vector {Y1(ref), Y2(ref), . . . , Yn(ref)} of unencrypted reference measurements subject to measurement error;
b) applying a transformation to the unencrypted reference signal, Yref, to generate an encrypted reference signal, Uref of the item;
where Uref is an n-dimensional row vector {U1(ref), U2(ref), . . . , Un(ref)} of encrypted reference measurements;
c) acquiring an unencrypted new signal, Ynew, of the item, where Ynew is an n-dimensional row vector {Y1(new), Y2(new), . . . , Yn(new)} of unencrypted new measurements subject to measurement error;
d) applying the transformation to the unencrypted new signal, Ynew, to generate an encrypted new signal, Unew, of the item;
where Unew is an n-dimensional row vector {U1(new), U2(new), . . . , Un(new)} of encrypted new measurements;
e) calculating an unencrypted Euclidean distance metric, E, between the unencrypted new and reference signals, Ynew and Yref;
f) calculating an encrypted Euclidean distance metric, D, between the encrypted new and reference measurements, Unew and Uref;
g) comparing the encrypted Euclidean distance metric, D, to a critical value, Dcrit,;
h) if D<
Dcrit, then deciding that the item is authentic; and
i) providing the result of the decision made in step h) to an authenticator or inspector, thereby allowing the authenticator or inspector to decide if the item is authentic;
wherein the transformation has the property that the unencrypted Euclidean distance metric, E, is equal to the encrypted Euclidean distance metric, D.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.
-
Citations
27 Claims
-
1. A method of authenticating an item, the method comprising:
-
a) acquiring an unencrypted reference signal, Yref, of an item;
where Yref is an n-dimensional row vector {Y1(ref), Y2(ref), . . . , Yn(ref)} of unencrypted reference measurements subject to measurement error;b) applying a transformation to the unencrypted reference signal, Yref, to generate an encrypted reference signal, Uref of the item;
where Uref is an n-dimensional row vector {U1(ref), U2(ref), . . . , Un(ref)} of encrypted reference measurements;c) acquiring an unencrypted new signal, Ynew, of the item, where Ynew is an n-dimensional row vector {Y1(new), Y2(new), . . . , Yn(new)} of unencrypted new measurements subject to measurement error; d) applying the transformation to the unencrypted new signal, Ynew, to generate an encrypted new signal, Unew, of the item;
where Unew is an n-dimensional row vector {U1(new), U2(new), . . . , Un(new)} of encrypted new measurements;e) calculating an unencrypted Euclidean distance metric, E, between the unencrypted new and reference signals, Ynew and Yref; f) calculating an encrypted Euclidean distance metric, D, between the encrypted new and reference measurements, Unew and Uref; g) comparing the encrypted Euclidean distance metric, D, to a critical value, Dcrit,; h) if D<
Dcrit, then deciding that the item is authentic; andi) providing the result of the decision made in step h) to an authenticator or inspector, thereby allowing the authenticator or inspector to decide if the item is authentic; wherein the transformation has the property that the unencrypted Euclidean distance metric, E, is equal to the encrypted Euclidean distance metric, D. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification