최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0625577 (2000-07-25) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 171 인용 특허 : 326 |
This disclosure describes a method of making a secure product using data hidden in the product itself and a method of using the hidden data to authenticate the product. The method assigns a product identifier to the product, such as a unique serial number. It also steganographically embeds security
This disclosure describes a method of making a secure product using data hidden in the product itself and a method of using the hidden data to authenticate the product. The method assigns a product identifier to the product, such as a unique serial number. It also steganographically embeds security data into the product. The security data includes the product identifier (e.g., a hashed version of it). The security data is embedded such that it is machine readable and enables automated authentication of the product by comparing the security data decoded from the product with the product identifier.
1. A method for authenticating a product comprising:receiving a product identifier associated with the product;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier, and in response to validat
1. A method for authenticating a product comprising:receiving a product identifier associated with the product;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier, and in response to validating the product, enabling use or transfer of software or content associated with the product. 2. The method of claim 1 wherein the security data is embedded in a digital watermark that is decoded from an image scanned of the product. 3. The method of claim 1 wherein the security data is decoded from a scan of product packaging for the product. 4. The method of claim 1 wherein the embedded security data comprises a hash of the product identifier. 5. A computer readable medium having software for performing the method of claim 1. 6. The method of claim 1 wherein the product comprises a physical storage medium and the software or content is stored on the physical storage medium. 7. A methods for authenticating a product comprising:receiving a product identifier associated with the product;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier;wherein the product comprises software and including:controlling installation of software in response to validating the product. 8. A method for authenticating a product comprising:receiving a product identifier associated with the product;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier;wherein the product comprises a financial or access card and including:controlling activation of the card in response to validating the product. 9. A method for authenticating a product comprising:receiving a product identifier associated with the product, including prompting a user to enter the product identifier;prompting the user to scan the product to capture a scan of the embedded security data;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier. 10. A method for authenticating a product comprising:receiving a product identifier associated with the product;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier; wherein a copy detection feature is printed on the product; and further including:using the copy detection feature to determine whether the product has been counterfeited. 11. The method of claim 10 wherein the copy detection feature comprises a watermark from which copying is detectable from analysis of a payload of the watermark. 12. A method for authenticating a product comprising:receiving a product identifier associated with the product;decoding security data steganographically embedded into the product; andvalidating the product by comparing the decoded security data with the product identifier;wherein a copy detection feature is included on the product; and the copy detection feature is used to determine whether the product has been counterfeited;wherein the copy detection feature comprises a watermark that changes when copied in a manner that enables copying of the product to be detected. 13. A product including:security data steganographically embedded into the product; the product being assigned a product identifier that is related to the security data such that authenticity of the product is evaluated by comparing the security data decoded from the product with the product identifier, wherein successful authentication of the product based on comparing the security data with the product identifier enables use or transfer of software or content associated with the product. 14. The method of claim 13 wherein the product comprises a physical storage medium and the s oftware or content is stored on the physical storage medium. 15. A method of making a product comprising:assigning a product identifier to the product;steganographically embedding security data into the product, the security data including the product identifier; wherein the security data is machine readable and enables automated authentication of the product by comparing the security data decoded from the product with the product identifier; wherein successful authentication of the product based on comparing the security data with the product identifier enables use or transfer of software or content associated with the product. 16. The method of claim 15 wherein the product comprises a physical storage medium and the software or content is stored on the physical storage medium. 17. A method of authenticating a product comprising:extracting embedded information steganographically encoded on a physical storage medium, the embedded information being carried in a code that is machine readable when exposed to visible, UV or infrared illumination; andusing the embedded information to enable use or transfer of software or media content stored on the medium. 18. The method of claim 17 wherein the embedded information is carried in a watermark on the physical storage medium. 19. The method of claim 18 wherein the physical storage medium comprises an optical disk. 20. The method of claim 19 wherein the watermark is embedded on the disk by altering the surface microtopology on the disk to carry machine readable information. 21. The method of claim 17 wherein the embedded information is compared with information on the storage medium to enable use or transfer of software or media content stored on the medium. 22. The method of claim 21 wherein the embedded information is carried in a watermark on the physical storage medium. 23. The method of claim 22 wherein the watermark is embedded on the storage medium by altering the surface microtopology on the storage medium to carry machine readable information. 24. The method of claim 17 wherein the embedded information is used to form a key for decrypting software or media content stored on the medium. 25. The method of claim 24 wherein the embedded information is carried in a watermark on the physical storage medium. 26. The method of claim 25 wherein the watermark is embedded on the storage medium by altering the surface microtopology on the storage medium to carry machine readable information. 27. A product including:security data steganographically embedded into the product; the product being assigned a product identifier that is related to the security data such that authenticity of the product is evaluated by comparing the security data decoded from the product with the product identifier; wherein the security data is carried in a digital watermark that is machine readable when illuminated by non-visible wavelengths; and wherein successful authentication of the product based on comparing the security data with the product identifier enables use or transfer of software or content associated with the product. 28. The product of claim 27 wherein the product comprises a physical storage medium and the software or content is stored on the physical storage medium. 29. The product of claim 28 wherein the security data is used to form a key for decrypting software or content stored on the storage medium.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.