Security, identification and verification systems
First Claim
Patent Images
1. A method of operating a security system, said method comprising:
- making a plurality of tags, each of which includes a plurality of particles randomly distributed in a light-transmitting matrix;
attaching the tags to objects to be authenticated;
providing a reader which includes means for causing light of one or more wavelengths to impinge on a tag and means for detecting, recording and interpreting the light reflected and/or refracted and/or diffracted by the particles in the matrix so as to produce images of the particles;
presenting said tags to said reader;
encrypting and storing information concerning the images of at least some of the particles of a particular tag on at least one of the particular tag and the object to which the particular tag is attached;
recalling and decrypting the encrypted image information; and
comparing the recalled and decrypted image information with the image information obtained by the reader when authentication is required.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of operating a security system includes making a plurality of security tags, each of which includes a plurality of particles randomly distributed in a light-transmitting matrix, providing a reader which includes means for causing light of one or more wavelengths to impinge on a security tag and means for interpreting the light reflected and/or refracted and/or diffracted by the particles in the matrix, and presenting said tags to said reader.
-
Citations
14 Claims
-
1. A method of operating a security system, said method comprising:
-
making a plurality of tags, each of which includes a plurality of particles randomly distributed in a light-transmitting matrix; attaching the tags to objects to be authenticated; providing a reader which includes means for causing light of one or more wavelengths to impinge on a tag and means for detecting, recording and interpreting the light reflected and/or refracted and/or diffracted by the particles in the matrix so as to produce images of the particles; presenting said tags to said reader; encrypting and storing information concerning the images of at least some of the particles of a particular tag on at least one of the particular tag and the object to which the particular tag is attached; recalling and decrypting the encrypted image information; and comparing the recalled and decrypted image information with the image information obtained by the reader when authentication is required. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification