Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture
First Claim
1. A computer-implemented method for certifying a security document, comprising:
- providing a security document which is the result of a plurality of independent manufacturing processes that provide each an image, said security document having thus a set of unique characteristics related to the use of different supplies for manufacturing the security document;
obtaining, via the one or more processors, a digital image of the security document;
selecting, via one or more processors, a determined set of locations in images of each of the plurality of different manufacturing processes in the document image;
determining a reference location in an image of a manufacturing process of the plurality of different manufacturing processes;
calculating relative positions (register data) of a location within the determined set of locations in images of each of the different manufacturing processes with respect to the reference location;
constructing, via the one or more processors, a message from said register data measured from the determined set of locations of the document image;
constructing, via the one or more processors, a hashed message, wherein the hashed message is obtained by encoding the message with a unidirectional cryptographic hash function;
encrypting, via the one or more processors, the hashed message using a private key, by a public key cryptographic system, to obtain a digital certificate;
visibly printing the digital certificate on the security document; and
storing, via the one or more processors, the digital certificate in an external database.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods for certifying a security document comprising the steps of: a) selecting a set of unique characteristics, obtained as the result of the variations in the manufacturing process and supplies, b) getting a digital image of a security document and obtaining data of the relative position between features selected from different manufacturing processes (register), c) constructing a message by measuring the register of selected features from the document and the document ID data, d) constructing a hashed message, the hashed message being the message obtained after being encoded by means of a unidirectional cryptographic hash function, e) encrypting the hashed message using a public key cryptographic system to obtain a digital certificate by means of a private key, and f) storing the digital certificate in an external database.
90 Citations
7 Claims
-
1. A computer-implemented method for certifying a security document, comprising:
-
providing a security document which is the result of a plurality of independent manufacturing processes that provide each an image, said security document having thus a set of unique characteristics related to the use of different supplies for manufacturing the security document; obtaining, via the one or more processors, a digital image of the security document; selecting, via one or more processors, a determined set of locations in images of each of the plurality of different manufacturing processes in the document image; determining a reference location in an image of a manufacturing process of the plurality of different manufacturing processes; calculating relative positions (register data) of a location within the determined set of locations in images of each of the different manufacturing processes with respect to the reference location; constructing, via the one or more processors, a message from said register data measured from the determined set of locations of the document image; constructing, via the one or more processors, a hashed message, wherein the hashed message is obtained by encoding the message with a unidirectional cryptographic hash function; encrypting, via the one or more processors, the hashed message using a private key, by a public key cryptographic system, to obtain a digital certificate; visibly printing the digital certificate on the security document; and storing, via the one or more processors, the digital certificate in an external database. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification