Dynamic digital watermark
First Claim
1. A computer-implemented method for reading a digital identification document, the method comprising:
- receiving, at a computing device, the digital identification document comprising at least two digital watermarks, the digital identification document issued by a central entity;
retrieving a first digital watermark from the digital identification document, the first digital watermark visually presented at a first time point;
retrieving a second digital watermark from the digital identification document such that a sequence of digital watermarks is retrieved, the sequence comprising the first digital watermark and the second digital watermark, the second digital watermark visually presented at a second time point, the second digital watermark being different from the first digital watermark and the second time point being different from the first time point; and
validating the digital identification document as authentic based on the first digital watermark, the second digital watermark, as well as a sequential order of the sequence of digital watermarks.
2 Assignments
0 Petitions
Accused Products
Abstract
Some implementations may provide a computer-implemented method for validating a digital document, the method including: receiving, at a computing device, the digital document comprising at least two digital watermarks, the digital document issued by a central entity; retrieving a first digital watermark from the digital document, the first digital watermark visually presented at a first time point; retrieving a second digital watermark from the digital document, the second digital watermark visually presented at a second time point, the second digital watermark being different from the first digital watermark and the second time point being different from the first time point; and reading the digital document based on the retrieved first and second digital watermarks.
48 Citations
24 Claims
-
1. A computer-implemented method for reading a digital identification document, the method comprising:
-
receiving, at a computing device, the digital identification document comprising at least two digital watermarks, the digital identification document issued by a central entity; retrieving a first digital watermark from the digital identification document, the first digital watermark visually presented at a first time point; retrieving a second digital watermark from the digital identification document such that a sequence of digital watermarks is retrieved, the sequence comprising the first digital watermark and the second digital watermark, the second digital watermark visually presented at a second time point, the second digital watermark being different from the first digital watermark and the second time point being different from the first time point; and validating the digital identification document as authentic based on the first digital watermark, the second digital watermark, as well as a sequential order of the sequence of digital watermarks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A mobile computing device for authenticating a person, the mobile computing device comprising at least one processor configured to perform operations comprising:
-
receiving, at a mobile device, a digital identification document comprising at least two digital watermarks, the digital identification document issued by a central entity; retrieving a first digital watermark from the digital identification document, the first digital watermark visually presented at a first time point; retrieving a second digital watermark from the digital identification document such that a sequence of digital watermarks is retrieved, the sequence comprising the first digital watermark and the second digital watermark, the second digital watermark visually presented at a second time point, the second digital watermark being different from the first digital watermark and the second time point being different from the first time point; and validating the digital identification document as authentic based on the first digital watermark, the second digital watermark, as well as a sequential order of the sequence of digital watermarks. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A non-transitory computer-readable medium, on which software instructions are stored, which instructions, when executed by a computer processor, cause the computer processor to perform the operations of:
-
receiving a digital identification document comprising at least two digital watermarks, the digital identification document issued by a central entity; retrieving a first digital watermark from the digital identification document, the first digital watermark visually presented at a first time point; retrieving a second digital watermark from the digital identification document such that a sequence of digital watermarks is retrieved, the sequence comprising the first digital watermark and the second digital watermark, the second digital watermark visually presented at a second time point, the second digital watermark being different from the first digital watermark and the second time point being different from the first time point; and validating the digital identification document as authentic based on the first digital watermark, the second digital watermark, as well as a sequential order of the sequence of digital watermarks.
-
Specification