Safeguarding private information through digital watermarking
First Claim
Patent Images
1. A method comprising:
- receiving permuted or encrypted data generated at a remote computing device, wherein the received data is encrypted or permuted according to a key carried by a digital watermark embedded in a security document;
determining whether the received data matches or corresponds to data stored in a data repository, wherein the data repository indexes data stored therein without associating indexed data to a particular person or to an issued security document; and
communicating an authentication indication to the remote computing device in accordance with a result of said act of determining.
3 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates generally to digital watermarking and steganography. In one implementation, a method includes receiving permuted or encrypted data generated at a remote computing device, wherein the received data is encrypted or permuted according to a key carried by a digital watermark embedded in a security document; determining whether the received data matches or corresponds to data stored in a data repository, where the data repository indexes data stored therein without associating indexed data to a particular person or to an issued security document; and communicating an authentication indication to the remote computing device in accordance with a result of the act of determining.
148 Citations
20 Claims
-
1. A method comprising:
-
receiving permuted or encrypted data generated at a remote computing device, wherein the received data is encrypted or permuted according to a key carried by a digital watermark embedded in a security document;
determining whether the received data matches or corresponds to data stored in a data repository, wherein the data repository indexes data stored therein without associating indexed data to a particular person or to an issued security document; and
communicating an authentication indication to the remote computing device in accordance with a result of said act of determining. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving optical scan data representing at least a portion of a security document, wherein the security document comprises steganographic encoding including at least a key;
decoding the steganographic encoding from the optical scan data to obtain the key;
obtaining at least some information carried by the security document, wherein the at least some information is associated with at least one of a bearer of the security document and the security document itself;
permuting or encrypting the at least some information carried by the security document according to the key;
communicating the encrypted or permuted information to a remote data repository, wherein the remote data repository indexes data stored therein without associating indexed data to a particular person or to an issued security document;
receiving an authentication indication communicated from the remote data repository, the authentication indication providing an indication of whether the security document is valid or was validly issued. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification