Covert secure document registration system
First Claim
1. A method for creating a secure document and verifying that the secure document is authentic, the method comprising:
- receiving a print object, designating content to be printed, at a first processor;
the first processor generating a unique identifier for the print object associating the unique identifier with the content;
the first processor transmitting the print object content and associated unique identifier to storage;
the first processor generating decoy identifiers and overlaying the unique identifier with at least one decoy identifier;
the first processor transmitting the print object content and associated unique identifier overlayed with the decoy identifier to a printer for printing the print object content and the decoy overlayed unique identifier as a secure document;
detecting the printed secure document with the decoy overlaid unique identifier to verify authenticating of the secure document;
transmitting the detected print object content and decoy overlaid unique identifier to a second processor associated with the storage;
the second processor filtering the decoy identifier from the unique identifier;
the second processor comparing the unique identifier with unique identifiers stored in the storage; and
outputting an indicator that the unique identifier is in the storage, thereby authenticating the printed secure document.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for creating a secure document, registering the secure document and verifying the authenticity of the secure document includes receiving a print object that has content. A security feature, including an identifier, is created and is associated with the content. The identifier may be a barcode. The barcode may represent a character string. The security feature may include the identifier barcode and a decoy barcode that is not associated with the content. The identifier barcode (or the character string represented by the barcode) and the content are transmitted to a database for storage. Once stored, the identifier and the content are considered to be registered. A print object that includes the security feature and the content is then transmitted to a printer for printing.
26 Citations
9 Claims
-
1. A method for creating a secure document and verifying that the secure document is authentic, the method comprising:
-
receiving a print object, designating content to be printed, at a first processor; the first processor generating a unique identifier for the print object associating the unique identifier with the content; the first processor transmitting the print object content and associated unique identifier to storage; the first processor generating decoy identifiers and overlaying the unique identifier with at least one decoy identifier; the first processor transmitting the print object content and associated unique identifier overlayed with the decoy identifier to a printer for printing the print object content and the decoy overlayed unique identifier as a secure document; detecting the printed secure document with the decoy overlaid unique identifier to verify authenticating of the secure document; transmitting the detected print object content and decoy overlaid unique identifier to a second processor associated with the storage; the second processor filtering the decoy identifier from the unique identifier; the second processor comparing the unique identifier with unique identifiers stored in the storage; and outputting an indicator that the unique identifier is in the storage, thereby authenticating the printed secure document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification