Authenticating objects using embedded data

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C235S375000

Reexamination Certificate

active

06788800

ABSTRACT:

TECHNICAL FIELD
The invention relates to methods for authenticating objects, and in particular, relates to methods for embedding security data into products, and methods for authenticating these products using the embedded security data.
BACKGROUND AND SUMMARY
Counterfeiting and piracy have a huge economic impact. While numerous product security features have been developed, there remains a demand for cost effective security measures that inhibit counterfeiting and piracy.
Research in the field of steganography (also called “data hiding”) offers promising technology for combating counterfeiting and piracy. One form of steganography is referred to in popular literature as digital watermarking. Digital watermarking is a process for modifying a host signal or object to embed a machine-readable code into the host. The host may be modified such that the embedded code is imperceptible or nearly imperceptible to the ordinary observer upon viewing or playback, yet may be detected through an automated detection process.
Most commonly, digital watermarking is applied to media such as images, audio signals, and video signals. However, it may also be applied to other types of media, including documents (e.g., through subtle line, word or character shifting), software, multi-dimensional graphics models, and surface textures of objects.
The invention relates to methods for authenticating products using embedded security data in the product. One aspect of the invention is a method of making a secure product using data hidden in the product itself. This method assigns a product identifier to the product, such as a unique serial number. It also steganographically embeds security data into the product. The security data includes the product identifier (e.g., a hashed version of it). The security data is embedded such that it is machine readable and enables automated authentication of the product by comparing the security data decoded from the product with the product identifier.
Another aspect of the invention is a method of authenticating a product using embedded security data. This method receives a product identifier associated with the product, and decodes security data steganographically embedded into the product. It then validates the product by comparing the decoded security data with the product identifier.
Another aspect of the invention is a product that includes security data steganographically embedded into it. The product is assigned a product identifier that is related to the security data. The relationship between the product identifier is defined such that authenticity of the product may be evaluated by comparing the security data decoded from the product with the product identifier.
In this document, the term “product” broadly encompasses physical objects (e.g., goods), and other objects associated with them like packaging, tags, labels, documentation, and media supplied on, by, or with the object. Within this broad product context, the embedding process may encode security data on any of these types of products. To determine whether a product is authentic, the methods and systems described in this document can be used to evaluate security data embedded on the product itself, its packaging, labels, tags, media, etc.
One implementation of these methods and secure products employs a form of steganography referred to as digital watermarking. However, other forms of steganography may be used as well. Further features will become apparent with reference to the following detailed description and accompanying drawings.


REFERENCES:
patent: 3493674 (1970-02-01), Houghton
patent: 3569619 (1971-03-01), Simijian
patent: 3576369 (1971-04-01), Wick et al.
patent: 3585290 (1971-06-01), Sanford
patent: 3655162 (1972-04-01), Yamamoto et al.
patent: 3703628 (1972-11-01), Philipson, Jr.
patent: 3809806 (1974-05-01), Walker et al.
patent: 3838444 (1974-09-01), Loughlin et al.
patent: 3914877 (1975-10-01), Hines
patent: 3922074 (1975-11-01), Ikegami et al
patent: 3971917 (1976-07-01), Maddox et al.
patent: 3977785 (1976-08-01), Harris
patent: 3982064 (1976-09-01), Barnaby
patent: 3984624 (1976-10-01), Waggener
patent: 4025851 (1977-05-01), Haselwood et al.
patent: 4184700 (1980-01-01), Greenaway
patent: 4225967 (1980-09-01), Miwa et al.
patent: 4230990 (1980-10-01), Lert, Jr. et al.
patent: 4231113 (1980-10-01), Blasbalg
patent: 4238849 (1980-12-01), Gassmann
patent: 4252995 (1981-02-01), Schmidt et al.
patent: 4262329 (1981-04-01), Bright et al.
patent: 4313197 (1982-01-01), Maxemchuk
patent: 4367488 (1983-01-01), Leventer et al.
patent: 4379947 (1983-04-01), Warner
patent: 4380027 (1983-04-01), Leventer et al.
patent: 4389671 (1983-06-01), Posner et al.
patent: 4395600 (1983-07-01), Lundy et al.
patent: 4416001 (1983-11-01), Ackerman et al.
patent: 4423415 (1983-12-01), Goldman
patent: 4425642 (1984-01-01), Moses et al.
patent: 4476468 (1984-10-01), Goldman
patent: 4528588 (1985-07-01), Löfberg
patent: 4532508 (1985-07-01), Ruell
patent: 4547804 (1985-10-01), Greenberg
patent: 4553261 (1985-11-01), Froessl
patent: 4590366 (1986-05-01), Rothfjell
patent: 4595950 (1986-06-01), Lofberg
patent: 4637051 (1987-01-01), Clark
patent: 4639779 (1987-01-01), Greenberg
patent: 4647974 (1987-03-01), Butler et al.
patent: 4654867 (1987-03-01), Labedz et al.
patent: 4660221 (1987-04-01), Dlugos
patent: 4663518 (1987-05-01), Borror et al.
patent: 4665431 (1987-05-01), Cooper
patent: 4672605 (1987-06-01), Hustig et al.
patent: 4675746 (1987-06-01), Tetrick et al.
patent: 4677435 (1987-06-01), D'Agraives et al.
patent: 4682794 (1987-07-01), Margolin
patent: 4703476 (1987-10-01), Howard
patent: 4712103 (1987-12-01), Gotanda
patent: 4718106 (1988-01-01), Weinblatt
patent: 4723149 (1988-02-01), Harada
patent: 4739377 (1988-04-01), Allen
patent: 4750173 (1988-06-01), Blüthgen
patent: 4765656 (1988-08-01), Becker et al.
patent: 4775901 (1988-10-01), Nakano
patent: 4776013 (1988-10-01), Kafri et al.
patent: 4805020 (1989-02-01), Greenberg
patent: 4807031 (1989-02-01), Broughton et al.
patent: 4811357 (1989-03-01), Betts et al.
patent: 4811408 (1989-03-01), Goldman
patent: 4820912 (1989-04-01), Samyn
patent: 4835517 (1989-05-01), van der Gracht et al.
patent: 4855827 (1989-08-01), Best
patent: 4864618 (1989-09-01), Wright et al.
patent: 4866771 (1989-09-01), Bain
patent: 4874936 (1989-10-01), Chandler et al.
patent: 4876617 (1989-10-01), Best et al.
patent: 4879747 (1989-11-01), Leighton et al.
patent: 4884139 (1989-11-01), Pommier
patent: 4885632 (1989-12-01), Mabey et al.
patent: 4888798 (1989-12-01), Earnest
patent: 4903301 (1990-02-01), Kondo et al.
patent: 4908836 (1990-03-01), Rushforth et al.
patent: 4908873 (1990-03-01), Philibert et al.
patent: 4918484 (1990-04-01), Ujiie et al.
patent: 4920503 (1990-04-01), Cook
patent: 4921278 (1990-05-01), Shiang et al.
patent: 4939515 (1990-07-01), Adelson
patent: 4941150 (1990-07-01), Iwasaki
patent: 4943973 (1990-07-01), Werner
patent: 4943976 (1990-07-01), Ishigaki
patent: 4944036 (1990-07-01), Hyatt
patent: 4947028 (1990-08-01), Gorog
patent: 4963998 (1990-10-01), Maufe
patent: 4965827 (1990-10-01), McDonald
patent: 4967273 (1990-10-01), Greenberg
patent: 4969041 (1990-11-01), O'Grady et al.
patent: 4972471 (1990-11-01), Gross et al.
patent: 4972475 (1990-11-01), Sant'Anselmo
patent: 4972476 (1990-11-01), Nathans
patent: 4977594 (1990-12-01), Shear
patent: 4979210 (1990-12-01), Nagata et al.
patent: 4996530 (1991-02-01), Hilton
patent: 5003590 (1991-03-01), Lechner et al.
patent: 5010405 (1991-04-01), Schreiber et al.
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5027401 (1991-06-01), Soltesz
patent: 5034982 (1991-07-01), Heninger et al.
patent: 5036513 (1991-07-01), Greenblatt
patent: 5053956 (1991-10-01), Donald
patent: 5063446 (1991-11-01), Gibson
patent: 5073899 (1991-12-01), Collier et al.
patent: 5073925 (1991-12-01), Nagata et al.
patent: 5075773 (1991-12-01), Pullen et al.
patent: 5077608 (1991-12-01), Dubner
patent: 5077795 (1991-12-01), Rourke et al.
patent: 5079648 (1992-01-01), Maufe
patent: 5091966 (1992-02-01), Bloomberg e

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authenticating objects using embedded data does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authenticating objects using embedded data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticating objects using embedded data will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3201949

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.