Identification documents and authentication of such documents
First Claim
1. An apparatus to authenticate an identification document, the identification document comprising:
- an image including steganographically encoded first machine-readable information including a first plural-bit message,a background including steganographically encoded second machine-readable information including a second plural-bit message, andsemantic information including authentication information carried on or in the identification document,the apparatus comprising;
a first reader configured to determine the first plural-bit message based on the first machine-readable information and determine the second plural-bit message based on the second machine-readable information;
a second reader configured to determine authentication information from the semantic information carried on or in the identification document; and
an electronic processor configured to;
decrypt the first plural-bit message or the authentication information; and
determine whether the identification document is authentic based at least in part on the first plural-bit message, the second plural-bit message, and the authentication information,wherein the second plural-bit message comprises information from the first plural-bit message and the authentication information.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates generally to identification documents. One claim recites an apparatus to authentic an identification document. The identification document comprising first machine-readable information including a first plural-bit message, and semantic information carried on or in the identification document. The apparatus includes: a first reader to read the first machine-readable information to obtain the first plural-bit message; a second reader to obtain information from the semantic information carried on or in the identification document; an electronic processor programmed as a decryption unit to decrypt the first plural-bit message or the information obtained from the semantic information; and an electronic processor programmed as a decision unit to determine whether the identification document is authentic based at least in part on the first plural-bit message and the semantic information. Other claims and combinations are provided as well.
253 Citations
22 Claims
-
1. An apparatus to authenticate an identification document, the identification document comprising:
-
an image including steganographically encoded first machine-readable information including a first plural-bit message, a background including steganographically encoded second machine-readable information including a second plural-bit message, and semantic information including authentication information carried on or in the identification document, the apparatus comprising; a first reader configured to determine the first plural-bit message based on the first machine-readable information and determine the second plural-bit message based on the second machine-readable information; a second reader configured to determine authentication information from the semantic information carried on or in the identification document; and an electronic processor configured to; decrypt the first plural-bit message or the authentication information; and determine whether the identification document is authentic based at least in part on the first plural-bit message, the second plural-bit message, and the authentication information, wherein the second plural-bit message comprises information from the first plural-bit message and the authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of authenticating an identification document, the identification document comprising:
-
an image including steganographically encoded first machine-readable information including a first plural-bit message, a background including steganographically encoded second machine-readable information including a second plural-bit message, and semantic information including authentication information carried on or in the identification document, the method comprising; determining, using a processor, the first plural-bit message based on the first machine-readable information; determining the second plural-bit message based on the second machine-readable information; determining the authentication information from the semantic information carried on or in the identification document; decrypting the first plural-bit message or the authentication information; and determining whether the identification document is authentic based at least in part on the first plural-bit message, the second plural-bit message, and the authentication information, wherein the second plural-bit message comprises information from the first plural-bit message and the authentication information. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium having instructions stored thereon that, if executed by a computing device, cause the computing device to perform operations for authenticating an identification document, the identification document comprising:
-
an image including steganographically encoded first machine-readable information including a first plural-bit message, a background including steganographically encoded second machine-readable information including a second plural-bit message, and semantic information including authentication information carried on or in the identification document, the operations comprising; determining the first plural-bit message based on the first machine-readable information; determining the second plural-bit message based on the second machine-readable information; determining the authentication information from the semantic information carried on or in the identification document; decrypting the first plural-bit message or the authentication information; and determining whether the identification document is authentic based at least in part on the first plural-bit message, the second plural-bit message, and the authentication information, wherein the second plural-bit message comprises information from the first plural-bit message and the authentication information. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification