Secure photo carrying identification device, as well as means and method for authenticating such an identification device
First Claim
1. A method for authenticating an identification device including a memory, comprising:
- scanning a photographic image included on the identification device, the photographic image including hidden information;
generating image data based on the scanned photographic image;
analyzing the image data in accordance with a predetermined image analysis procedure to derive the hidden information; and
providing the hidden information to a processor for verification of the photographic image based on said hidden information and authentication data stored in the memory.
0 Assignments
0 Petitions
Accused Products
Abstract
Means and a method for authenticating a photographic image (3) on an identification device (1), the identification device (1) being provided with: a photographic image of a person (3) and a microprocessor (8), the microprocessor (8) having: a) a processor (7), b) a memory (9) connected to the processor (7) and having stored authentication data, and c) interface means (5) connected to the processor (7) for communicating with an external device, wherein said photographic image (3) comprises stegano-graphically hidden information, the content of which together with said authentication data allows authentication of said photographic image (3), the method having the following steps: a′) scanning the photographic image (3) and generating image data. b′) analyzing these image data in accordance with a predetermined image analysis procedure to derive said hidden information, and c′) carrying out the authentication of the photographic image (3) based on the hidden information and the authentication data.
-
Citations
30 Claims
-
1. A method for authenticating an identification device including a memory, comprising:
-
scanning a photographic image included on the identification device, the photographic image including hidden information; generating image data based on the scanned photographic image; analyzing the image data in accordance with a predetermined image analysis procedure to derive the hidden information; and providing the hidden information to a processor for verification of the photographic image based on said hidden information and authentication data stored in the memory. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method performed by a system including a terminal device and an identification device including a photographic image, processor, and memory, the method comprising:
-
performing, by the terminal device, a first portion of an authentication process for the identification device based on hidden information included in the photographic image; and performing, by the processor, a second portion of the authentication process for the identification device based on the first portion of the authentication process, wherein the authentication process verifies the photographic image such that the identification device is authenticated. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
an identification device including a photographic image including hidden information, a first processor, and a memory including authentication data; and a terminal device including a second processor, an interface for communicating with the first processor, the terminal device deriving the hidden information from the photographic image and providing the hidden information to the first processor through the interface, wherein the first processor verifies the photographic image based on the hidden information and the authentication data. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A system including a terminal device and an identification device including a photographic image, the system comprising:
-
means for performing, in the terminal device, a first portion of an authentication process for the identification device based on hidden information included in the photographic image; and means for performing, in the identification device, a second portion of the authentication process for the identification device based on the first portion of the authentication process, wherein the authentication process verifies the photographic image such that the identification device is authenticated.
-
-
23. A method for authenticating an identification device embedded with a photographic image and including a processor and a memory, comprising:
-
receiving hidden information derived from a scanned image included on the identification device based on a predetermined image analysis process; and verifying, by the processor, the photographic image based on said hidden information and authentication data stored in the memory. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A smart card including:
-
a memory including authentication data; and a processor configured to receive hidden information derived from a scanned photographic image included on the smart card based on a predetermined image analysis process and verify the photographic image based on said hidden information and the authentication data.
-
Specification