Identification Systems
First Claim
1. A method of generating an identity object electronically, comprisingcompiling a first identification data set comprising identification information of a first type and accessible by a first user;
- compiling a second identification data set comprising identification information of a second type and accessible by a second user;
encrypting the first and second identification data sets; and
generating the identity object electronically in a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
1 Assignment
0 Petitions
Accused Products
Abstract
An identification system where providing'"'"' identification data sets that contain different types of information accessible by different parties, removes the need for all potential readers of the object to be able to access all information, and to contact a third party during the verification process is disclosed. The identification data sets are encrypted and printed in a portable physical form as an identity object. Graphical symbols, such as a data matrix, or RFID tags or secure chips may be used to store encrypted data. These may be incorporated into a passport or other identification document. Additional identity objects may be printed for use in identifying objects connected with a user or source that contain a subset of the information in the original data matrix.
148 Citations
79 Claims
-
1. A method of generating an identity object electronically, comprising
compiling a first identification data set comprising identification information of a first type and accessible by a first user; -
compiling a second identification data set comprising identification information of a second type and accessible by a second user; encrypting the first and second identification data sets; and generating the identity object electronically in a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 78, 79)
-
-
6. A method of creating an identity object, comprising
compiling a first identification data set comprising identification information of a first type and accessible by a first user; -
compiling a second identification data set comprising identification information of a second type and accessible by a second user; encrypting the first and second identification sets; and creating the identity object by printing a graphical symbol having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
36. A method of creating a traceable identity object, comprising
compiling a first identification data set comprising article identification data; -
compiling a second identification data set comprising article processing history data; encrypting the first and second identification data sets; and generating the identity object by formatting a portable medium including a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location. - View Dependent Claims (37, 38, 39, 41, 42, 43, 44)
-
-
40. A method of creating a traceable identity object, comprising
compiling a first identification data set comprising article identification data; -
compiling a second identification data set comprising article processing history data; encrypting the first and second identification data sets; and generating the identity object by formatting a portable medium by encoding thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
45. A system for generating an identity object electronically, comprising
means for compiling a first identification data set comprising identification information of a first type and accessible by a first user; -
means for compiling a second identification data set comprising identification information of a second type and accessible by a second user; means for encrypting the first and second identification data sets; and means generating the identity object electronically in a secure format including means for creating a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location. - View Dependent Claims (46, 51, 52, 53, 54, 55, 59, 60)
-
-
47. A system for generating an identity object, comprising
means for compiling a first identification data set comprising identification information of a first type and accessible by a first user; -
means for compiling a second identification data set comprising identification information of a second type and accessible by a second user; means for encrypting the first and second identification data sets; and means for generating the identity object by formatting a portable medium including means for encoding on the portable medium a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location. - View Dependent Claims (48, 49, 50)
-
-
56. A system for creating an identity object, comprising
means for compiling a first identification data set comprising identification information of a first type and accessible by a first user; -
means for compiling a second identification data set comprising identification information of a second type and accessible by a second user; means for encrypting the first and second identification sets; and means for creating the identity object by printing a graphical symbol having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
57. A system for creating a traceable identity object, comprising
means for compiling a first identification data set comprising article identification data; -
means for compiling a second identification data set comprising article processing history data; means for encrypting the first and second identification sets; and means for creating the identity object by printing a graphical symbol having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
58. A system for creating a traceable identity object, comprising
means for compiling a first identification data set comprising article identification data; -
means for compiling a second identification data set comprising article processing history data; means for encrypting the first and second identification sets; and means for creating the identity object by printing a graphical symbol including encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
61. A computer program for generating an identity object electronically, which when run on a computer causes the computer to perform the steps of:
-
compiling a first identification data set comprising identification information of a first type and accessible by a first user; compiling a second identification data set comprising identification information of a second type and accessible by a second user; encrypting the first and second identification data sets; and generating the identity object electronically in a secure format the identity object comprising a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
62. A computer program for generating an identity object, which when run on a computer causes the computer to perform the steps of:
-
compiling a first identification data set comprising identification information of a first type and accessible by a first user; compiling a second identification data set comprising identification information of a second type and accessible by a second user; encrypting the first and second identification data sets; and generating the identity object by formatting a portable medium having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
63. A computer program for creating an identity object, which when run on a computer causes the computer to perform the steps of:
-
compiling a first identification data set comprising identification information of a first type and accessible by a first user; compiling a second identification data set comprising identification information of a second type and accessible by a second user; encrypting the first and second identification sets; and creating the identity object by printing a graphical symbol having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
64. A computer program for generating a traceable identity object, which when run on a computer causes the computer to perform the steps of:
-
compiling a first identification data set comprising article identification data; compiling a second identification data set comprising article processing history data; encrypting the first and second identification data sets; and generating the identity object by formatting a portable medium having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
65. A computer program for creating a traceable identity object, which when run on a computer causes the computer to perform the steps of:
-
compiling a first identification data set comprising article identification data; compiling a second identification data set comprising article processing history data; encrypting the first and second identification sets; and creating the identity object by printing a graphical symbol having encoded thereon a value based token having a header, a payload and security portion, the token including data related to the first and second identification data sets and comprising the encrypted first data set or a reference to the first encrypted data set for retrieval of the first data set from a remote location, and the encrypted second data set or a reference to the second encrypted data set for retrieval of the second data set from a remote location.
-
-
66. A method of authenticating an identity, comprising generating a first identity object for the identity electronically in a value based token having a header, a payload and security portion, the token including data related to a first identification data set and comprising the first data set in encrypted form or a reference to the first encrypted data set for retrieval of the first data set from a remote location;
- and
creating a further identity object electronically in a value based token having a header, a payload and security portion, the token including data related to a second identification data set and comprising the second data set in encrypted form or a reference to the second encrypted data set for retrieval of the first data set from a remote location, the second identity object including data linking the second identity object to the first identity object, and an indication that the first identity object has been authenticated. - View Dependent Claims (68, 69, 70, 71, 72, 73, 74, 75, 76, 77)
- and
-
67. A method of authenticating an identity over a series of related events involving the entity, comprising generating a first identity object for the identity electronically in a value based token having a header, a payload and security portion, the token including data related to a first identification data set and comprising the first data set in encrypted form or a reference to the first encrypted data set for retrieval of the first data set from a remote location;
- and
creating a further identity object electronically in a value based token having a header, a payload and security portion, the token including data related to a second identification data set and comprising the second data set in encrypted form or a reference to the second encrypted data set for retrieval of the first data set from a remote location, the second identity object including data linking the second identity object to the first identity object.
- and
Specification