Digital watermarking security systems
First Claim
1. A method of providing security for a computer system, the computer system comprising a processor and memory including software instructions for execution on the processor, the software includes digital watermark decoding instructions, the memory further includes a predetermined card sequence, wherein the computer system communicates with an input device, said method comprising:
- decoding with the digital watermark decoding instructions a digital watermark embedded in each of a plurality of cards, each respective digital watermark including an identifier;
determining an order in which the digital watermarked plurality of cards are presented to the input device via the respective digital watermark identifiers; and
comparing the order to the predetermined card sequence to determine whether to allow access to the computer system.
6 Assignments
0 Petitions
Accused Products
Abstract
A variety of systems responsive to watermarked documents are detailed. In one, watermarking is employed to facilitate system access. In another, security is provided through analyzing digitally watermarked documents. In yet another, a digital watermark-based combination lock is adapted to analyze a sequence (and perhaps an orientation) of presented digitally watermarked cards.
-
Citations
11 Claims
-
1. A method of providing security for a computer system, the computer system comprising a processor and memory including software instructions for execution on the processor, the software includes digital watermark decoding instructions, the memory further includes a predetermined card sequence, wherein the computer system communicates with an input device, said method comprising:
-
decoding with the digital watermark decoding instructions a digital watermark embedded in each of a plurality of cards, each respective digital watermark including an identifier; determining an order in which the digital watermarked plurality of cards are presented to the input device via the respective digital watermark identifiers; and comparing the order to the predetermined card sequence to determine whether to allow access to the computer system. - View Dependent Claims (2, 3)
-
-
4. A digital watermark-based combination lock comprising:
-
an input device to capture image data; electronic processing circuitry; and memory having instructions, the instructions to be executed by said electronic processing circuitry, said instructions including instructions to; decode a digital watermark embedded in each of a plurality of images captured in sequence by said input device, wherein each of the plurality of images respectively corresponds to one document of a plurality of documents, and wherein each digital watermark includes an identifier, said instructions to decode a digital watermark comprising instructions to recover each digital watermark identifier; and analyze recovered identifiers to determine whether to unlock the combination lock. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
providing a user with a first digital watermarked document for a first length of time, the first document being inconspicuous in that it is not readily identified as an access key or identification document, the first document comprising a first digital watermark including first access information to facilitate access to a computer or facility; collecting the first digital watermarked document before or at the first length of time; and providing the user with a second digital watermark document, the second document being inconspicuous in that it is not readily identified as an access key or identification document, the second document comprising a second digital watermark including second access information to facilitate access to the computer or facility, wherein the first digital watermarked document and the second digital watermarked document differ in at least one of document type, document size, document substrate or printed matter on the document substrate. - View Dependent Claims (11)
-
Specification