×

Security system using keys encoded in holograms

  • US 9,779,227 B1
  • Filed: 10/24/2014
  • Issued: 10/03/2017
  • Est. Priority Date: 10/24/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of controlling access to secured resources using a security token having a hologram thereon, the method comprising:

  • 1) under control of one or more computer systems configured with executable instructions,a) generating a full key comprising a sequence of bits, wherein a sequence is such that each element in the sequence has a position in the sequence, and wherein each bit of the full key has a value that is in the set {“

    0”

    , “

    1”

    };

    b) generating a mask comprising a sequence of masking values, wherein each of the masking values has a position in the mask and a value that is in a set comprising a masked value of “

    1” and

    an unmasked value of “

    0”

    ;

    c) generating a user key, comprising a first sequence of digital values, from the full key and the mask, such that, at each position of the sequence of the user key, the digital value is the value at a corresponding position in the full key if the value at a corresponding position in the mask is the unmasked value of “

    0” and

    the digital value is an idle state value of “

    ?”

    if the value at the corresponding position in the mask is the masked value of “

    1”

    ; and

    d) generating a complimentary key, comprising a second sequence of digital values, from the full key and the mask, such that, at each position of the sequence of the complimentary key, the digital value is the value at a corresponding position in the full key if the value at a corresponding position in the mask is the masked value of “

    1” and

    the digital value is the idle state value of “

    ?”

    if the value at the corresponding position in the mask is the unmasked value of “

    0”

    ;

    2) illuminating a first substrate by a first selected wavelength of light;

    3) forming a first hologram on the first substrate such that a first readable image encoded in the first hologram corresponds to the user key;

    4) attaching the first substrate to the security token so that the first hologram is readable from the first substrate by an access card reader when the security token is inserted into the access card reader;

    5) illuminating a second substrate by a second selected wavelength of light; and

    6) forming a second hologram on the second substrate such that a second readable image encoded in the second hologram corresponds to the complimentary key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×