Hierarchical electronic watermarks and method of use
First Claim
1. A system for providing a secure document, the system including:
- a computer network including a computer and an RFID transponder, the computer having a database, and the database containing a first authorization key and at least one additional authorization key;
the secure document, the secure document including an integrated RFID circuit coupled with a flexible substrate;
the flexible substrate having a surface, the surface visibly presenting an information;
the integrated RFID circuit coupled with the substrate, and the integrated RFID circuit having a durable memory, a controller, and a data security circuit;
the durable memory including an information storage sector and a protected sector, the information storage sector having a record of at least a portion of the information, and the protected sector having at least one datum not recorded within the information of the flexible substrate;
the controller coupled with the durable memory and the data security circuit, and the controller for enabling access to the durable memory by the RFID transponder as authorized by the data security circuit; and
the data security circuit for denying authority to the controller to execute instructions received in a message, where the message is not formatted at least partially in mathematical relationship to the first authorization key, wherein different authorization keys are provided to different parties to form a hierarchy of access to various portions of the information stored within the durable memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for authenticating currency and other important documents. A preferred embodiment may contain both a substrate, such as paper, and an embedded RFID transponder. An embedded RFID transponder or electronic watermark may contain multiple hierarchical layers of electronic passwords that are used to electronically protect the host currency from counterfeiting, or unauthorized modification. In addition, such intelligent RFID tags may uniquely identify a particular document and data related to the document. The authenticating agency can utilize a public or private Electronic Product Code database as a means for the authenticating agency and third parties to authenticate documents and data in documents. The intelligent interactive Electronic Product Code can be used as an anti-counterfeit mechanism enabling third parties requested to provide services, benefits or monetary payments to authenticate documents and prevent counterfeits.
112 Citations
34 Claims
-
1. A system for providing a secure document, the system including:
- a computer network including a computer and an RFID transponder, the computer having a database, and the database containing a first authorization key and at least one additional authorization key;
the secure document, the secure document including an integrated RFID circuit coupled with a flexible substrate;
the flexible substrate having a surface, the surface visibly presenting an information;
the integrated RFID circuit coupled with the substrate, and the integrated RFID circuit having a durable memory, a controller, and a data security circuit;
the durable memory including an information storage sector and a protected sector, the information storage sector having a record of at least a portion of the information, and the protected sector having at least one datum not recorded within the information of the flexible substrate;
the controller coupled with the durable memory and the data security circuit, and the controller for enabling access to the durable memory by the RFID transponder as authorized by the data security circuit; and
the data security circuit for denying authority to the controller to execute instructions received in a message, where the message is not formatted at least partially in mathematical relationship to the first authorization key, wherein different authorization keys are provided to different parties to form a hierarchy of access to various portions of the information stored within the durable memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
- a computer network including a computer and an RFID transponder, the computer having a database, and the database containing a first authorization key and at least one additional authorization key;
-
23. A secure document system comprising:
- a device comprising a flexible substrate coupled with an integrated circuit;
means for printing information onto a flexible substrate;
the integrated circuit including a durable memory storing digital data; and
the durable memory further storing at least two authorization keys, wherein at least one of the at least two authorization keys are written into the durable memory at approximately the time that visible information is added to the flexible substrate, the integrated circuit including a circuit that allows external access to certain portions or the stored digital data only to interrogators communicating the requisite authorization key or keys wherein different authorization keys are provided to different parties to form a hierarchy of access to various sectors of protected information. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
- a device comprising a flexible substrate coupled with an integrated circuit;
-
33. A system for providing a secure document, the system including:
- a computer network including a computer and an RFID transponder, the computer having a database, and the database containing at least two different authorization keys;
a secure document, the secure document including an integrated RFID circuit coupled with a flexible substrate;
the flexible substrate having a surface, the surface visibly presenting an information;
the integrated RFID circuit coupled with the substrate, and the integrated RFID circuit having a durable memory, a controller and a data security circuit;
the durable memory including at least two protected sectors, the each protected sector containing information not contained in any of the other sectors; and
the controller coupled with the durable memory and the data security circuit, and the controller for enabling access to the durable memory by the RFID transponder only when authorized by the data security circuit in response to the presentation to the data security circuit of data and instructions that have been encoded with one of a plurality authorization keys, wherein different authorization keys are provided to different parties to enable a hierarchy of access to various sectors of protected information. - View Dependent Claims (34)
- a computer network including a computer and an RFID transponder, the computer having a database, and the database containing at least two different authorization keys;
Specification