Method for identifying a counterfeit security document
First Claim
1. A method of determining a counterfeit security document, the security document having disposed thereon or therein coded data including a plurality of coded data portions, each coded data portion being indicative of:
- an identity of the security document; and
,a signature part, the signature part being a part of a digital signature of at least part of the identity;
wherein the method includes steps of;
in a sensing device;
sensing a plurality of coded data portions; and
,generating, using the sensed coded data portions, indicating data indicative of;
the identity;
the respective signature parts; and
an identifier for each signature part;
in a processor;
determining, from the indicating data;
a determined identity; and
,a determined signature from the plurality of signature parts by arranging signature parts according to respective identifiers;
determining a generated identity from the sensed signature; and
determining if the security document is a counterfeit document by comparing the determined identity and the generated identity.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of determining a counterfeit security document which includes a number of coded data portions indicative of an identity of the security document; and at least part of a digital signature of at least part of the identity. The method includes using a sensing device to sense at least one coded data portion and generate indicating data. The indicating data is used by a processor to obtain a determined identity and at least one determined signature part, which are then used to determine if the security document is a counterfeit document.
96 Citations
16 Claims
-
1. A method of determining a counterfeit security document, the security document having disposed thereon or therein coded data including a plurality of coded data portions, each coded data portion being indicative of:
-
an identity of the security document; and
,a signature part, the signature part being a part of a digital signature of at least part of the identity; wherein the method includes steps of; in a sensing device; sensing a plurality of coded data portions; and
,generating, using the sensed coded data portions, indicating data indicative of; the identity; the respective signature parts; and an identifier for each signature part; in a processor; determining, from the indicating data; a determined identity; and
,a determined signature from the plurality of signature parts by arranging signature parts according to respective identifiers; determining a generated identity from the sensed signature; and determining if the security document is a counterfeit document by comparing the determined identity and the generated identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification