Method of identifying a copied security document
First Claim
1. A method of determining a counterfeit security document, the security document having disposed thereon or therein coded data including a number of coded data portions, each coded data portion being indicative of:
- an identity of the security document; and
a part of a signature, the signature being a digital signature of at least a part of the identity and comprising a plurality of signature parts;
wherein the method includes the steps of;
in a sensing device;
sensing one of the coded data portions; and
generating, using the sensed coded data portion, indicating data indicative of;
the identity;
the part of the signature; and
a signature part identifier;
in a processor;
determining, a determined signature using the identity;
determining a determined signature part using the determined signature and the signature part identifier; and
,determining if the security document is a counterfeit document by comparing the determined signature part and the part of the signature.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of determining a counterfeit security document which includes a number of coded data portions indicative of an identity of the security document; and at least part of a digital signature of at least part of the identity. The method includes using a sensing device to sense at least one coded data portion and generate indicating data. The indicating data is used by a processor to obtain a determined identity and at least one determined signature part, which are then used to determine if the security document is a counterfeit document.
-
Citations
7 Claims
-
1. A method of determining a counterfeit security document, the security document having disposed thereon or therein coded data including a number of coded data portions, each coded data portion being indicative of:
-
an identity of the security document; and a part of a signature, the signature being a digital signature of at least a part of the identity and comprising a plurality of signature parts; wherein the method includes the steps of; in a sensing device; sensing one of the coded data portions; and generating, using the sensed coded data portion, indicating data indicative of; the identity; the part of the signature; and a signature part identifier; in a processor; determining, a determined signature using the identity; determining a determined signature part using the determined signature and the signature part identifier; and
,determining if the security document is a counterfeit document by comparing the determined signature part and the part of the signature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification