Identification document and related methods
First Claim
1. A method comprising:
- receiving data corresponding to a detection trigger of an identification document; and
determining whether to authenticate the identification document through digital watermarking or through an alternative process, including;
if the received data indicates an expected presence of digital watermarks, authenticating the identification document through the digital watermarking authentication process, wherein the digital watermark authentication process utilizes at least first and second digital watermarks and includes analyzing optical scan data that corresponds to the identification document to attempt to obtain information conveyed by the first and second digital watermarks;
if the information is obtained, cross-correlating at least some of the information conveyed by the first digital watermark with at least some of the information conveyed by the second digital watermark, and providing a signal corresponding to a result of the cross- correlation of the watermark information;
if the information is not obtained providing a signal representing that the identification document is considered suspect;
if the received data indicates an expected absence of digital watermarks, authenticating the identification document through the alternative authentication process, wherein the alternative authentication process utilizes bearer or document specific information and includes attempting to obtain the specific information from at least two sources related to the identification document;
if the specific information is obtained, cross-correlating the specific information, and providing a signal corresponding to a result of the cross-correlation of the specific information; and
if the specific information in not obtained, providing a signal representing that the identification document is suspect.
6 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates generally to identification documents and related methods and apparatus. One claim recites a method to determine whether to authenticate an identification document through digital watermarking or through an alternative process. The method includes: receiving data carried by the identification document corresponding to a detection trigger; if the received data indicates an expected presence of digital watermarks, attempting to authenticate the identification document by analyzing digital watermarking carried by the identification document; and if the received data indicates an expected absence of digital watermarks, attempting to authenticate the identification document through an alternative process. Other claims and combinations are provided too.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving data corresponding to a detection trigger of an identification document; and determining whether to authenticate the identification document through digital watermarking or through an alternative process, including; if the received data indicates an expected presence of digital watermarks, authenticating the identification document through the digital watermarking authentication process, wherein the digital watermark authentication process utilizes at least first and second digital watermarks and includes analyzing optical scan data that corresponds to the identification document to attempt to obtain information conveyed by the first and second digital watermarks; if the information is obtained, cross-correlating at least some of the information conveyed by the first digital watermark with at least some of the information conveyed by the second digital watermark, and providing a signal corresponding to a result of the cross- correlation of the watermark information; if the information is not obtained providing a signal representing that the identification document is considered suspect; if the received data indicates an expected absence of digital watermarks, authenticating the identification document through the alternative authentication process, wherein the alternative authentication process utilizes bearer or document specific information and includes attempting to obtain the specific information from at least two sources related to the identification document; if the specific information is obtained, cross-correlating the specific information, and providing a signal corresponding to a result of the cross-correlation of the specific information; and if the specific information in not obtained, providing a signal representing that the identification document is suspect. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
receiving data carried by an identification document corresponding to a detection trigger; and determining whether to authenticate the identification document through digital watermarking or through an alternative process, including; if the received data indicates an expected presence of digital watermarks, attempting to authenticate the identification document by analyzing digital watermarking carried by the identification document; and if the received data indicates an expected absence of digital watermarks, attempting to authenticate the identification document through an alternative process. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a memory for storing data associated with an identification document, the data corresponding to a detection trigger; and an electronic processor configured to; determine whether to authenticate the identification document through digital watermarking or through an alternative process, including; if the data indicates an expected presence of digital watermarks, attempting to authenticate the identification document by analyzing digital watermarking carried by the identification document; and if the data indicates an expected absence of digital watermarks, attempting to authenticate the identification document through an alternative process. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory computer-readable storage medium having instructions stored thereon that, if executed by a computing device, cause the computing device to perform operations comprising:
-
receiving data carried by an identification document corresponding to a detection trigger; and determining whether to authenticate the identification document through digital watermarking or through an alternative process, including; if the received data indicates an expected presence of digital watermarks, attempting to authenticate the identification document by analyzing digital watermarking carried by the identification document; and if the received data indicates an expected absence of digital watermarks, attempting to authenticate the identification document through an alternative process.
-
-
19. An apparatus comprising:
-
a processor configured to; receive data corresponding to a detection trigger of an identification document; and determine whether to authenticate the identification document through digital watermarking or through an alternative process, including; if the received data indicates an expected presence of digital watermarks, authenticating the identification document through the digital watermarking authentication process, wherein the digital watermark authentication process utilizes at least first and second digital watermarks and includes analyzing optical scan data that corresponds to the identification document to attempt to obtain information conveyed by the first and second digital watermarks; if the information is obtained, cross-correlating at least some of the information conveyed by the first digital watermark with at least some of the information conveyed by the second digital watermark, and providing a signal corresponding to a result of the cross- correlation of the watermark information; if the information is not obtained, providing a signal representing that the identification document is considered suspect; if the received data indicates an expected absence of digital watermarks, authenticating the identification document through the alternative authentication process, wherein the alternative authentication process utilizes bearer or document specific information and includes attempting to obtain the specific information from at least two sources related to the identification document; if the specific information is obtained, cross-correlating the specific information, and providing a signal corresponding to a result of the cross-correlation of the specific information; and if the specific information in not obtained, providing a signal representing that the identification document is suspect.
-
-
20. A non-transitory computer-readable storage medium having instructions stored thereon that, if executed by a computing device, cause the computing device to perform operations comprising:
-
receiving data corresponding to a detection trigger of an identification document; and determining whether to authenticate the identification document through digital watermarking or through an alternative process, including; if the received data indicates an expected presence of digital watermarks, authenticating the identification document through the digital watermarking authentication process, wherein the digital watermark authentication process utilizes at least first and second digital watermarks and includes analyzing optical scan data that corresponds to the identification document to attempt to obtain information conveyed by the first and second digital watermarks; if the information is obtained, cross-correlating at least some of the information conveyed by the first digital watermark with at least some of the information conveyed by the second digital watermark, and providing a signal corresponding to a result of the cross- correlation of the watermark information; if the information is not obtained, providing a signal representing that the identification document is considered suspect; if the received data indicates an expected absence of digital watermarks, authenticating the identification document through the alternative authentication process, wherein the alternative authentication process utilizes bearer or document specific information and includes attempting to obtain the specific information from at least two sources related to the identification document; if the specific information is obtained, cross-correlating the specific information, and providing a signal corresponding to a result of the cross-correlation of the specific information; and if the specific information in not obtained, providing a signal representing that the identification document is suspect.
-
Specification