Methods and systems for digital authentication using digitally signed images
First Claim
1. A method, comprising:
- obtaining, in at least one processor system, a first image for encoding;
encoding, in the at least one processor system, a first party digital signature in a first signature region of the first image and encoding a second party digital signature in a second signature region of the first image to produce a first encoded image; and
separating, in the at least one processor system, the first encoded image into a first portion and a second portion, the first portion including a first part of the first party digital signature and a first part of the second party digital signature and the second portion including a second part of the first party digital signature and a second part of the second party digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Various systems, methods, and programs embodied in computer-readable mediums are provided for digital authentication using digitally signed images. In one representative embodiment, a method includes extracting a first image portion from an image selected by a first party, where the first image portion including a first encoded part of an second party digital signature, and obtaining a second image portion associated with the first image portion, where the second image portion including a second encoded part of the second party digital signature. The first and second encoded parts of the second party digital signature are decoded and validity of the second party digital signature is confirmed based upon a second party public key.
56 Citations
40 Claims
-
1. A method, comprising:
-
obtaining, in at least one processor system, a first image for encoding; encoding, in the at least one processor system, a first party digital signature in a first signature region of the first image and encoding a second party digital signature in a second signature region of the first image to produce a first encoded image; and separating, in the at least one processor system, the first encoded image into a first portion and a second portion, the first portion including a first part of the first party digital signature and a first part of the second party digital signature and the second portion including a second part of the first party digital signature and a second part of the second party digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
obtaining, in at least one processor system, a first image for encoding; encoding, in the at least one processor system, a plurality of N digital signatures in N corresponding signature regions of the first image, each digital signature associated with at least one of N parties; and separating, in the at least one processor system, the first encoded image into a plurality of M portions, each portion including a first part of at least one of the N digital signatures. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method, comprising:
-
extracting, in at least one processor system, a first image portion from an image selected by a first party, the first image portion including a first encoded part of a second party digital signature; obtaining, in the at least one processor system, a second image portion associated with the first image portion, the second image portion including a second encoded part of the second party digital signature; decoding, in the at least one processor system, the first and second encoded parts of the second party digital signature from the first and second image portions; and confirming, in the at least one processor system, validity of the second party digital signature based upon a second party public key. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification