Authentication of an object using a signature encoded in a number of data portions
First Claim
Patent Images
1. A method of authenticating an object, the method including the steps of:
- sensing coded data provided on a plurality of regions of a surface associated with the object;
determining, from the coded data of each region;
an identity of the object;
a signature fragment; and
a signature fragment identifier associated with the signature fragment of the region;
determining a determined signature by arranging the plurality of signature fragments according to their associated signature fragment identifiers;
generating, using the determined signature and a key, a generated identity;
comparing the identity to the generated identity; and
,authenticating the object using the results of the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating an object, the method including:
- sensing coded data provided on or in a surface associated with the object;
- determining, from the sensed coded data:
- an identity of the object;
- a plurality of signature fragments, the signature being a digital signature of at least part of the identity;
- determining, using the plurality of signature fragments, a determined signature;
- generating, using the determined signature and a key, a generated identity;
- comparing the identity to the generated identity; and,
- authenticating the object using the results of the comparison.
45 Citations
11 Claims
-
1. A method of authenticating an object, the method including the steps of:
-
sensing coded data provided on a plurality of regions of a surface associated with the object; determining, from the coded data of each region; an identity of the object; a signature fragment; and a signature fragment identifier associated with the signature fragment of the region; determining a determined signature by arranging the plurality of signature fragments according to their associated signature fragment identifiers; generating, using the determined signature and a key, a generated identity; comparing the identity to the generated identity; and
,authenticating the object using the results of the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification