throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2004/0153649 A1
`(43) Pub. Date:
`Aug. 5, 2004
`Rhoads et al.
`
`US 2004O153649A1
`
`(54) DIGITAL AUTHENTICATION WITH
`DIGITAL AND ANALOG DOCUMENTS
`(76) Inventors: Geoffrey B. Rhoads, West Linn, OR
`(US); J. Scott Carr, Tualatin, OR (US);
`Burt W. Perry, Lake Oswego, OR
`(US)
`Correspondence Address:
`DIGIMARC CORPORATION
`19801 SW 72ND AVENUE
`SUTE 250
`TUALATIN, OR 97062 (US)
`(21) Appl. No.:
`10/656,930
`(22) Filed:
`Sep. 4, 2003
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 10/164,899,
`filed on Jun. 4, 2002, which is a continuation of
`application No. 09/198,022, filed on Nov. 23, 1998,
`now Pat. No. 6,546,112, which is a continuation of
`application No. 08/763,847, filed on Dec. 4, 1996,
`now Pat. No. 5,841,886, which is a continuation of
`application No. 08/512,993, filed on Aug. 9, 1995,
`now abandoned.
`Continuation-in-part of application No. 09/775,934,
`filed on Feb. 2, 2001, which is a continuation-in-part
`of application No. 09/625,577, filed on Jul. 25, 2000.
`
`
`
`Continuation-in-part of application No. 09/837,564,
`filed on Apr. 17, 2001, and which is a continuation
`in-part of application No. 09/503,881, filed on Feb.
`14, 2000, now Pat. No. 6,614,914, which is a con
`tinuation-in-part of application No. 09/186,962, filed
`on Nov. 5, 1998, which is a continuation of applica
`tion No. 08/649,419, filed on May 16, 1996, now Pat.
`No. 5,862,260, which is a continuation-in-part of
`application No. 08/637,531, filed on Apr. 25, 1996,
`now Pat. No. 5,822,436, which is a continuation-in
`part of application No. 08/512,993, filed on Aug. 9,
`1995, now abandoned.
`(List continued on next page.)
`Foreign Application Priority Data
`
`(30)
`
`May 7, 1996 (WO)........................... PCT/US96/06618
`
`Publication Classification
`
`(51) Int. Cl." ....................................................... H04L 9/00
`(52) U.S. Cl. .............................................................. 713/176
`(57)
`ABSTRACT
`The disclosure describes Systems for creating and authenti
`cating printed objects using authentication information.
`Techniques for incorporating authentication information
`into digital representations of objects and using the authen
`tication information to authenticate the objects are also
`provided.
`
`ORIGINAL DIGITAL MAGE
`WTH BARCODE AND
`FOUCIALSADDED
`
`COMPUTER GENERATES
`MASTER SNOWY MAGE
`WHICH IS GENERALLY
`ORTHOGONAL TO
`ORIGINAL MAGE AT LEF
`
`950
`
`
`
`i. ill,
`
`E.
`
`COMBINED TO FORMPERSONAL CASH CARD
`
`Petitioner's Exhibit 1009, Page 1
`
`

`

`US 2004/0153649 A1
`Page 2
`
`Related U.S. Application Data
`Continuation-in-part of application No. 09/571,422,
`filed on May 15, 2000, which is a continuation-in-part
`of application No. 09/343,104, filed on Jun. 29, 1999,
`now abandoned, and which is a continuation-in-part
`of application No. 09/342,688, filed on Jun. 29, 1999,
`now Pat. No. 6,650,761, and which is a continuation
`in-part of application No. 09/343,101, filed on Jun.
`29, 1999, and which is a continuation-in-part of
`application No. 09/314,648, filed on May 19, 1999,
`now Pat. No. 6,681,028.
`Continuation-in-part of application No. 10/011,129,
`filed on Nov. 9, 2001, which is a continuation of
`application No. 09/442,780, filed on Nov. 18, 1999,
`now Pat. No. 6,389,151, and which is a continuation
`in-part of application No. 09/074,034, filed on May 6,
`1998, now Pat. No. 6,449,377.
`Said application No. 10/011,129 is a continuation-in
`part of application No. 09/763,847, filed on Feb. 27,
`2001, now abandoned, which is a continuation of
`application No. 08/512,993, filed on Aug. 9, 1995,
`now abandoned.
`Continuation-in-part of application No. 09/465,418,
`
`filed on Dec. 16, 1999.
`Continuation-in-part of application No. 10/147.228,
`filed on May 15, 2002, which is a continuation-in-part
`of application No. 09/670,115, filed on Sep. 26, 2000,
`now abandoned, and which is a continuation-in-part
`of application No. 09/563,664, filed on May 2, 2000,
`now Pat. No. 6,505,160, and which is a continuation
`in-part of application No. 09/476,686, filed on Dec.
`30, 1999, and which is a continuation-in-part of
`application No. 08/746,613, filed on Nov. 12, 1996,
`now Pat. No. 6,122,403, which is a continuation-in
`part of application No. 08/649,419, filed on May 16,
`1996, now Pat. No. 5,862,260, and which is a con
`tinuation-in-part of application No. 08/508,083, filed
`on Jul 27, 1995, now Pat. No. 5,841,978.
`Provisional application No. 60/198,138, filed on Apr.
`17, 2000. Provisional application No. 60/198.849,
`filed on Apr. 21, 2000. Provisional application No.
`60/109,259, filed on Nov. 19, 1998. Provisional appli
`cation No. 60/112,955, filed on Dec. 18, 1998. Pro
`visional application No. 60/178,028, filed on Jan. 26,
`2000. Provisional application No. 60/134,782, filed
`on May 19, 1999.
`
`(60)
`
`Petitioner's Exhibit 1009, Page 2
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 1 of 15
`US 2004/0153649 A1
`FIG. 1
`FIG. 2
`
`
`
`identifier
`
`Prompt User for
`Product identifier
`
`Prompt User to
`Present Product
`for Scan
`
`Embed Hash
`
`Decode
`Embedded Data
`
`Validate
`Embedded Data
`Against Product
`ldentifier
`
`Petitioner's Exhibit 1009, Page 3
`
`

`

`Patent Application Publication Aug. 5, 2004
`FIG. 3
`
`72
`
`Sheet 2 of 15
`
`US 2004/0153649 A1
`
`Communication
`Application
`
`60
`
`66
`
`62
`
`D
`Database
`
`Database O
`Management
`System
`ID-Object
`Association
`Database
`
`
`
`64
`
`68
`
`
`
`Customer
`Database
`
`70
`
`
`
`
`
`Communication
`Application
`
`Embedder
`Application
`
`
`
`
`
`Printed Object
`
`Printed Object
`5 J.
`J.
`
`
`
`
`
`Machine Reader
`(Bar Code, mag.
`stripe, RF, etc.
`
`
`
`Image Capture
`(Digital Camera,
`Scanner, etc.)
`
`52
`
`User input/
`Output
`
`
`
`Watermark
`Decoder App.
`
`Communication
`Application
`
`54
`
`50
`
`Petitioner's Exhibit 1009, Page 4
`
`

`

`US 2004/0153649 A1
`
`DIGITAL IMAGE TAKEN
`OF CUSTOMER
`
`COMPUTER PROCESSESS
`NEW ENCODED IMAGE
`BarCOde D and/
`Or text 952
`
`
`
`PRINTS
`PROCESSED
`IMAGE ONTO
`PLASTIC CARD
`
`954
`
`950
`
`Petitioner's Exhibit 1009, Page 5
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 4 of 15
`
`US 2004/0153649 A1
`
`
`
`CABLE, 964
`TODATA LINE,
`966
`
`96.O
`
`958
`
`CONTAINS RUDIMENTARY OPTICAL SCANNER,
`MEMORY BUFFERS, COMMUNICATIONS DEVICES,
`AND MICROPROCESSOR
`
`CONSUMER MERELY PLACES CARD INTO WINDOW
`AND CAN, AT THEIR PREARRANGED OPTION, ETHER
`TYPE IN A PERSONAL IDENTIFICATION NUMBER (PIN,
`FOR ADDED SECURITY) OR NOT. THE TRANSACTION
`SAPPROVED OR DISAPPROVED WITHN SECONOS.
`
`F.G. 5
`
`Petitioner's Exhibit 1009, Page 6
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 5 of 15
`
`US 2004/0153649 A1
`
`972
`
`ORIGINAL DIGITAL IMAGE
`WITH BARCODE AND
`FIDUCALSADDED
`
`
`
`COMPUTER GENERATES
`MASTER SNOWY MAGE
`WHICH IS GENERALLY
`ORTHOGONAL TO
`ORIGINAL MAGE AT LEFT
`
`COMBINED TO FORMPERSONAL CASH CARD
`
`F.G. 6
`
`Petitioner's Exhibit 1009, Page 7
`
`

`

`US 2004/0153649 Al
`
`Patent Application Publication Aug. 5, 2004 Sheet 6 of 15
`
`
`
`
`
`
`
`
`
`
`
`LNVHOWAW‘Nid‘GISAlsIWaAMHOMLANLONILSIONSSLXISJOSLASHNOS-ALNAMLSALVYHANADWHOMLANIWHLNAD“XOol9JONVVdLNNOOOVGNV‘OJN!I
`WHLN3ODSMHOMLANWHLNADOLLNNOWYNOILLOVSNVHL
`
`
`
`
`
`dOLASVOLSSXAQNISUVSYSSWNANWOONVHYSHISHSHM‘SHASWNNWOCNVY
`SAYOLS'NVOSGHVOANYNYALLVdLNVLINSAYAOLONGOdLOGSWHOsYAdMYOMLANWHLNSDOLSLINSAYLONGOYdLOdYNOsA-ALNAMLSHLSLINSNVYLYa0Vad6LINSSAYHAQVSH=‘8B
`
`
`
`
`
`
`
`
`
`INNODOVGHVOS.LIGSYD‘LNNOOOVLNVHOYAWSLIGSGMHOMLANTWHLNSO“Sk
`
`
`
`
`
`
`
`
`
`
`
`SHSEWNNWOONVYSOSLASSHLONY“HOLSHIdSLINSNVYLHHOMLANIWHLN3OLZ
`GALSANDAYGNV‘NOILVWHOANILNVHOHSW(Nid)‘GiSGN3SHaqva"YSSYVHSGNYVH
`
`
`
`
`
`
`
`
`
`
`H3ALSVWLSNIVOYSLINSSYSMOSHOWHLNSO=‘OhMHOMLAN
`
`
`
`
`
`“MHOMLANVLVGLNNOOOYIWHLNADSTIVOYaqvaY
`
`
`
`
`GISNOSYAdSLOVHLX3‘AHOW3WNISSYOLS‘CHVNOSDVSNVOSHACVaY
`
`
`
`
`TWINAGHOWAOUddVIWNiaSONASMHOMLANWHLNSDCL
`SNHALLVdSOGVHaQVSY=V8TWNODOHLHO40LASHSHLSDOL
`
`
`
`
`SNYALLVdWILVdSIWNODOHLHOHI
`
`
`
`
`Sd3lSNOILOVSNVYLTVWOIdAL
`
`
`
`SLASHNOA-ALNAMLAHLHONOWHLSd3aLSYAQVAY
`YAEWONNidNISASMYSN“IWNOILdO
`
`ZSIs
`
`Petitioner's Exhibit 1009, Page 8
`
`Petitioner's Exhibit 1009, Page 8
`
`€
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 7 of 15
`
`US 2004/0153649 A1
`
`THE NEGLIGIBLE-FRAUD CASHCARD SYSTEM
`
`O
`
`O
`
`
`
`O
`
`984
`O
`
`O
`
`O
`
`CENTRAL
`NETWORK
`
`O
`
`O O
`
`O
`
`No O
`
`O
`
`O
`
`O
`
`C
`
`O
`
`A BASIC FOUNDATION OF THE CASH CARD SYSTEM ISA
`24-HOUR INFORMATION NETWORK, WHERE BOTH THE
`STATIONS WHICH CREATE THE PPHYSICAL CASHCARDS,
`950, AND THE POINT-OF-SALES, 984, ARE ALL HOOKED UP
`TO THE SAME NETWORK CONTINUOUSLY
`
`FIG. 8
`
`Petitioner's Exhibit 1009, Page 9
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 8 of 15
`
`US 2004/0153649 A1
`
`O 1 ON
`
`1 OOO
`
`1012
`
`
`
`NAME
`ADDRESS
`
`CITIZENSHIP ---
`
`Petitioner's Exhibit 1009, Page 10
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 9 of 15
`
`US 2004/0153649 Al
`
`
`
`
`ptepietET ligteie|||‘eeeP|oririretyErrottPtteeeeTpttitteeTTE
`
`
`pttteteypi
` ‘lieaitealie||leee—Heeeee|te!a@/«P|orPtrETa|Te
`
`
`
`FIG. 10
`
`Petitioner's Exhibit 1009, Page 11
`
`Petitioner's Exhibit 1009, Page 11
`
`
`
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 10 of 15
`
`US 2004/0153649 A1
`
`AUDIO OR
`VISUAL
`CONTENT
`
`USER CAPTURE
`DEVICE
`
`REMOTE
`PROCESSOR
`14
`
`
`
`
`
`
`
`
`
`
`
`FIG 11
`
`REPOSITORY
`
`
`
`DATABASE
`RECORD
`
`ir - DESTINATION
`:
`DEVICE
`
`--- S22
`
`Petitioner's Exhibit 1009, Page 12
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 11 of 15
`
`US 2004/0153649 A1
`
`
`
`s
`
`Petitioner's Exhibit 1009, Page 13
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 12 of 15
`
`US 2004/0153649 A1
`
`CONTROL
`COMPUTER N20
`
`:------ - - - - - - - -i--------------------------------......
`
`21
`
`TEMPLATE
`
`DOCUMENT
`LAYOUT Li
`
`a re - a
`
`-
`
`- -a-
`
`PICTURES
`
`ir-DIGITAL DATA
`.......
`GRAPHICS
`
`25
`
`ir - MERGING AND
`-> WATERMARKING
`UNIT
`
`27
`
`PRINTING
`ENGINE
`
`\-
`
`FINAL
`DOCUMENT | \l
`
`FIG. 13
`
`Petitioner's Exhibit 1009, Page 14
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 13 of 15
`
`US 2004/0153649 A1
`
`301
`
`MAG STRIPE
`
`READER
`
`m
`
`-
`OUTPUT
`DISPLAY
`
`320
`
`305
`
`SCANNER
`
`BARCODE
`READER
`
`302
`
`
`
`OCR
`PROGRAM
`
`WATERMARK
`DETECTOR
`
`312
`
`COMPARISON
`AUTHENTICATION
`
`303
`
`FNGER
`
`314
`
`Petitioner's Exhibit 1009, Page 15
`
`

`

`Patent Application Publication
`
`Aug. 5, 2004 Sheet 14 of 15
`
`US 2004/0153649 A1
`
`
`
`Petitioner's Exhibit 1009, Page 16
`
`

`

`Patent Application Publication Aug. 5, 2004 Sheet 15 of 15
`
`US 2004/0153649 A1
`
`
`
`(PDBK D h TIME OploKU
`OR
`BLOCK TIME CiploKU
`
`F.G. 16
`
`Petitioner's Exhibit 1009, Page 17
`
`

`

`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`DIGITALAUTHENTICATION WITH DIGITAL AND
`ANALOG DOCUMENTS
`
`RELATED APPLICATION DATA
`0001. The present application is a continuation in part of
`U.S. patent application Ser. No. 10/164,899, filed Jun. 4,
`2002 (published as U.S. 2003-0002710 A1). The 10/164,899
`application is a continuation of U.S. patent application Ser.
`No. 09/198,022, filed Nov. 23, 1998 (now U.S. Pat. No.
`6,546,112), which is a continuation of U.S. patent applica
`tion Ser. No. 08/763,847 (now U.S. Pat. No. 5,841,886),
`filed Dec. 4, 1996, which is a continuation of U.S. patent
`application Ser. No. 08/512,993, filed Aug. 9, 1995 (now
`abandoned). Each of these patent documents is herein incor
`porated by reference.
`0002 This patent application is also a continuation in part
`of U.S. patent application Ser. No. 09/775,934, filed Feb. 2,
`2001 (published as US 2002-0012445 A1). The 09/775,934
`patent application is a continuation in part of U.S. patent
`application Ser. No. 09/625,577, filed on Jul. 25, 2000. Each
`of these patent documents is herein incorporated by refer
`CCC.
`0003. This patent application is also a continuation in part
`of U.S. patent application Ser. No. 09/837,564, filed Apr. 17,
`2001 (published as US 2002-0009208 A1). The 09/837,564
`application claims the benefit of U.S. Provisional Patent
`Application Nos. 60/198,138, filed Apr. 17, 2000, and
`60/198.849, filed Apr. 21, 2000. The 09/837,564 application
`is also a continuation in part of U.S. patent application Ser.
`No. 09/503,881, filed Feb. 14, 2000 (now U.S. Pat. No.
`6,614.914), which is a continuation in part of U.S. patent
`application Ser. No. 09/186,962, filed Nov. 5, 1998, which
`is a continuation of U.S. patent application Ser. No. 08/649,
`419, filed May 16, 1996 (now U.S. Pat. No. 5,862.260),
`which is a continuation in part of U.S. patent application Ser.
`No. 08/637,531, filed Apr. 25, 1996 (now U.S. Pat. No.
`5,822,436), which is a continuation in part of U.S. patent
`application Ser. No. 08/512,993 filed Aug. 9, 1995 (aban
`doned in favor of FWC Ser. No. 08/763,847, now issued as
`U.S. Pat. No. 5,841,886). Each of these patent documents is
`herein incorporated by reference.
`0004. This patent application is also a continuation in part
`of U.S. patent application Ser. No. 09/571,422, filed May 15,
`2000. The 09/571,422 application is a continuation in part of
`each of U.S. patent application Nos. 09/343,104, 09/342,688
`and 09/343,101, each filed Jun. 29, 1999, and 09/314,648,
`filed May 19, 1999. Each of these patent documents is herein
`incorporated by reference.
`0005. This patent application is also a continuation in part
`of U.S. patent application Ser. No. 10/011,129, filed Nov. 9,
`2001 (published as US 2002-0061120 A1). The 10/011,129
`application is a continuation of U.S. patent application Ser.
`No. 09/442,780, filed Nov. 18, 1999 (now U.S. Pat. No.
`6,389,151). The 09/442,780 application claims the benefit of
`U.S. Provisional Patent Application No. 60/109,259 filed
`Nov. 19, 1998. The 09/442,780 application is also a con
`tinuation in part of U.S. patent application Ser. No. 09/074,
`034 filed May 6, 1998 (now U.S. Pat. No. 6,449,377) and a
`continuation in part of U.S. patent application Ser. No.
`09/763,847 filed Dec. 4, 1996 (now U.S. Pat. No. 5,841,
`886), which is a continuation of U.S. patent application Ser.
`
`No. 08/512,993, filed Aug. 9, 1995. Each of these patent
`documents is herein incorporated by reference.
`0006 The present application is also a continuation in
`part of U.S. patent application Ser. No. 09/465,418, filed
`Dec. 16, 1999. The 09/465,418 claims the benefit of U.S.
`Provisional Patent Application No. 60/112,955, filed Dec.
`18, 1998.
`0007. The present invention is also a continuation in part
`of U.S. patent application Ser. No. 10/147.228, filed May 15,
`2002 (published as US 2003-0012403 A1). The 10/147.228
`application is a continuation in part of U.S. patent applica
`tion Ser. No. 09/670,115, filed Sep. 26, 2000 (now aban
`doned). The 10/417.288 application is also a continuation in
`part of U.S. patent application Ser. No. 09/563,664, filed
`May 2, 2000 (issued as U.S. Pat. No. 6,505,160), and which
`claims the benefit of U.S. Provisional Application No.
`60/178,028, filed Jan. 26, 2000. The 09/563,664 application
`is a continuation in part of U.S. patent application Ser. No.
`09/476,686, filed Dec. 30, 1999, which claims priority to
`U.S. Provisional Application No. 60/134,782, filed May 19,
`1999. Application Ser. No. 09/563,664 is also a continuation
`in part of U.S. patent application Ser. No. 08/746,613 filed
`Nov. 12, 1996 (now U.S. Pat. No. 6,122,403), which is a
`continuation in part of U.S. patent application Ser. No.
`08/649,419, filed May 16, 1996 (now U.S. Pat. No. 5,862,
`260), PCT Application PCT/US96/06618, filed May 7, 1996
`(published as WO 96/36163), and U.S. patent application
`Ser. No. 08/508,083, filed Jul 27, 1995 (now U.S. Pat. No.
`5.841,978). Each of these patent documents is herein incor
`porated by reference.
`0008. The present application is also related to assignee's
`U.S. patent application Ser. No. 09/790,322, filed Feb. 21,
`2001 (published as US 2001-0037313 A1). The 09/790,322
`application claims the benefit of U.S. Provisional Patent
`Application No. 60/257,822, filed Dec. 21, 2000, and is a
`continuation in part of U.S. patent application Ser. No.
`09/562,049, filed May 1, 2000. Each of these patent docu
`ments is herein incorporated by reference.
`0009. The subject matter of the present application is
`related to that disclosed in U.S. Pat. Nos. 5,862,260 and
`6,614,914. Each of these patent documents is herein incor
`porated by reference.
`
`TECHNICAL FIELD
`0010. The invention relates to methods for authenticating
`objects, and in particular, relates to methods for embedding
`Security data into products, and methods for authenticating
`these products using the embedded Security data.
`
`BACKGROUND AND SUMMARY
`0011 Counterfeiting and piracy have a huge economic
`impact. While numerous product Security features have been
`developed, there remains a demand for cost effective Secu
`rity measures that inhibit counterfeiting and piracy.
`0012 Research in the field of steganography (also called
`“data hiding”) offers promising technology for combating
`counterfeiting and piracy. One form of Steganography is
`referred to in popular literature as digital watermarking.
`Digital watermarking is a process for modifying a host
`Signal or object to embed a machine-readable code into the
`host. The host may be modified such that the embedded code
`
`Petitioner's Exhibit 1009, Page 18
`
`

`

`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`is imperceptible or nearly imperceptible to the ordinary
`observer upon viewing or playback, yet may be detected
`through an automated detection process.
`0013 Most commonly, digital watermarking is applied to
`media Such as images, audio Signals, and Video signals.
`However, it may also be applied to other types of media,
`including documents (e.g., through Subtle line, word or
`character shifting), Software, multi-dimensional graphics
`models, and Surface textures of objects.
`0.014. The invention relates to methods for authenticating
`printed objects using digital watermarks embedded in the
`images on the objects. One aspect of the invention is a
`System for authenticating a printed object. The System
`includes a watermark decoder and a verification module.
`The watermark decoder detects a copy detection watermark
`in a printed object to determine whether the printed object
`has been reproduced. The verification module processes a
`message decoded from an authentication watermark on the
`printed object to authenticate the printed object or bearer of
`the printed object. The authentication and copy detection
`watermarks may be implemented as the same or different
`watermarkS. For example, the copy detection watermark
`may be a fragile watermark that carries the message and that
`degrades in response to a reproduction operation, Such as
`photocopying or Scanning and then re-printing the object.
`Alternatively, the authentication and copy detection water
`marks may be separate watermarks embedded in an image
`that is printed on the object. The authentication watermark,
`in Some applications, includes an identifier that links the
`object to a database entry with related information about the
`object. This related information can be used to check the
`bearer of the object by comparing it with attributes of the
`bearer (such as a user ID or photo) or the validity of the
`object by comparing it with attributes that are visible or
`machine readable on the object.
`0.015. Another aspect of the invention is a system for
`creating a printed object. The System includes a watermark
`encoder and communication application. The watermark
`encoder encodes a watermark in an image to be printed on
`a printed object. This watermark is used to authenticate the
`printed object. The communication application obtains an
`identifier from a database for embedding into a message
`payload of the watermark. It also provides to the database
`information to be associated with the identifier.
`0016. These and further features and aspects of the
`present invention will become even more apparent with
`reference to the following detailed description and accom
`panying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0017 FIG. 1 is a flow diagram illustrating a method for
`embedding an object identifier into an object.
`0.018
`FIG. 2 is a flow diagram illustrating a method for
`authenticating an object using the embedded object identi
`fier.
`FIG. 3 is a diagram of a system architecture for
`0.019
`creating and Verifying the authenticity of printed objects
`using digital watermarks for copy detection and authentica
`tion.
`0020 FIGS. 4-8 detail aspects of a security card accord
`ing to one embodiment of the present invention.
`
`FIG. 9 is a diagram of a photographic identifica
`0021
`tion document or Security card with which a Security System
`aspect of the present invention may be applied.
`0022 FIG. 10 is a diagram illustrating aspects of a
`watermark embedding proceSS where Sets of frequency
`coefficients are adjusted So that the Sets have a predeter
`mined relationship.
`0023 FIG. 11 is a general block diagram that illustrates
`various embodiments.
`0024 FIG. 12 illustrates a security document in accor
`dance with one aspect of the present invention.
`0025 FIG. 13 is an overall diagram of a system to
`produce Security documents in accordance with another
`aspect of the present invention.
`0026 FIG. 14 is a diagram of a document validation
`System that operates in accordance with various aspects of
`the present invention.
`0027 FIG. 15 illustrates a system according to an imple
`mentation of the present invention.
`0028 FIG. 16 illustrates various functionality of the
`FIG. 15 system.
`
`DETAILED DESCRIPTION
`0029 Introduction
`0030 The following sections describe a system and
`related methods for authenticating products. While the
`description illustrates the System with an example of pack
`aged Software product, it applies to a variety of types of
`objects. In this document, the term “product” broadly
`encompasses physical objects (e.g., goods), and other
`objects associated with them like packaging, tags, labels,
`documentation, and media Supplied on, by, or with the
`object. Within this broad product context, the embedding
`process may encode Security data on any of these types of
`products. To determine whether a product is authentic, the
`methods and Systems described in this document can be used
`to evaluate Security data embedded on the product itself, its
`packaging, labels, tags, media, etc. One implementation of
`these methods and Secure products employs a form of
`Steganography referred to as digital watermarking. How
`ever, other forms of Steganography may be used as well.
`There are two principal parts of the product authentication
`architecture: 1) a System for embedding authentication data
`into the product; and 2) a System for authenticating the
`product.
`0031 Typically, product makers assign unique identifi
`ers, Such as product Serial numbers, to each product. In the
`product Security Systems describe below, an embedder
`encodes the Serial number as a form of machine readable
`Security data into the product or its packaging. This embed
`ded Security data is then used to authenticate the product
`and/or control unauthorized use. In the case of Software
`products, for example, the embedded Security data may be
`used to ensure that the user is authorized during installation
`of the Software on the user's machine. In the case of financial
`or access cards (e.g., debit/credit cards, key cards, corporate
`badges), the embedded Security data may be used to activate
`the card. In the more general case, the embedded Security
`data may be used to check whether a product is authentic by
`
`Petitioner's Exhibit 1009, Page 19
`
`

`

`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`validating a conspicuous product identifier, Such as a visible
`serial number, with one imperceptibly embedded in the
`product or its packaging. These Systems are detailed further
`below.
`0032 Embedding Security Data Into a Product
`0033 (The reference numbers in this section correspond
`to FIGS. 1-3).
`0034 FIG. 1 is a flow diagram illustrating a method for
`embedding Security data into a product. The maker or
`distributor of the product assigns a unique identifier, Such as
`a Serial number, to the product. The embedding proceSS
`takes this identifier 20 and transforms it into a form of data
`for embedding in the product or its packaging. While the
`identifier need not be modified before embedding it, there
`are a number of reasons for doing So. One reason is to
`convert it into a more compact form for embedding. Another
`reason is to make the embedded data more Secure, i.e. more
`difficult for counterfeiters or pirates to replicate.
`0.035
`FIG. 1 depicts an example of a data conversion
`method called a hash 22. The hash is a function that converts
`the identifier into another number. One form of hash is a
`checksum, but there are many others. One example of a
`checksum is one that converts a number or Set of numbers
`(e.g., Serial number, product code, etc.) into another number
`using a Sequence of prime numbers. A cryptographic hash
`may be used to generate a new number from which the
`original identifier is difficult to derive. Whether hashed or
`not, the data to be embedded is referred to as “security data.”
`0.036 The embedding process embeds the security data
`into a machine readable code on the product or its packaging
`(24). In particular, the process Steganographically embeds
`the Security data into the machine-readable code on the
`product or on packaging or labels for the product. A Stega
`nographic process embeds information on the products
`Surface Such that is imperceptible or Substantially impercep
`tible upon ordinary inspection, yet readable by machine.
`0037. One form of steganography is called digital water
`marking. A variety of digital watermarking Schemes may be
`used to embed the watermark onto the print media. Some
`example watermark encoding and decoding Schemes are
`provided in U.S. Pat. Nos. 5,862,260 and 6,614,914.
`0.038. In digital watermarking of images printed on physi
`cal objects, there is a tradeoff between Visual perceptibility
`and Survivability of the watermark. In this application, the
`watermark is embedded so as to be sufficiently robust to
`Survive analog to digital conversion, digital to analog con
`version, and possible other forms of corruption, including
`geometric distortion, additive noise, and compression. The
`watermark may be encoded by altering the luminance or one
`or more other color channels of an image printed on the
`Surface of the product. Alternatively, the watermark may be
`encoded using clear inks that modulate the microtopology of
`the products Surface or that are readable when exposed to
`light in non-visible wavelengths, like UV or infrared. Also,
`the microtopology of the product Surface may be altered in
`the process of creating the product Surface So as to embed a
`watermark. Alternative machine readable codes may be used
`as well, Such as data glyphs, invisible bar codes, etc.
`0039. A digital watermark embedding process typically
`involves Several operations. For example, additional data
`
`may be appended to the Security data, Such as Synchroniza
`tion Symbols, error detection codes, etc. After adding this
`data, the Security data includes a Sequence of Symbols for
`embedding into the product. Additional operations include
`error correction and other forms of Symbol encoding (e.g.,
`convolution codes, turbo codes, BCH codes, Reed Solomon
`encoding, M Sequences, gold Sequences, etc.). These opera
`tions transform the original message Sequence into a mes
`Sage Signal. The message Signal may then be further repli
`cated and modulated using spread spectrum modulation
`techniques. For example, the message Signal may be spread
`over a pseudorandom number or Set of pseudorandom
`numbers and repetitively Scattered throughout a host signal.
`0040. The host signal (sometimes referred to as the cover
`Signal) is the signal in which the embedded data is hidden.
`This might be an image printed on an object, label or
`package, a layer of Visible or invisible inks, line art, text,
`Surface topology of an object, etc. The watermark Signal
`may be replicated in Several different contiguous or over
`lapping regions of the host Signal. Each instance of the
`watermark at these regions can be associated with a corre
`sponding imperceptible watermark template, Synchroniza
`tion or orientation Signal that enables the decoder to detect
`the presence of the watermark and determine its orientation
`parameters such as translation (x, y coordinates of an
`origin), rotation, Scale, shear, differential Scale, etc.
`0041) To embed the message signal, an embedding func
`tion Subtly changes the host Signal. Digital watermarks
`usually operate on a digital form of the host signal to create
`a digital watermarked Signal, which is then converted to
`analog form. However, the digital watermark may also be
`applied in the analog domain. A variety of embedding
`functions have been detailed in the literature about digital
`watermarking. These functions may be additive, multiplica
`tive (adding or multiplying a message signal with the host
`Signal), or Some other function, Such as a non-linear quan
`tization function. The quantization function embeds a mes
`Sage symbol (e.g., binary or M-ary) by quantizing a sample
`value or a characteristic of a set of Sample values of the host
`Signal to a quantization level associated with the Symbol
`being encoded. To decode the Symbol, the watermarked
`Signal is captured and evaluated (e.g., re-quantized) to
`determine which quantization level a Sample or character
`istic of a set of Samples most closely corresponds to. This
`quantization level is then mapped to the corresponding
`symbol.
`0042. The embedding functions may be applied to image
`Samples or characteristics in the Spatial domain or Some
`transform domain, like Discrete Cosine Transform, Discrete
`Wavelet Transform, Discrete Fourier Transform, etc.
`0043. For enhanced security, various elements of the
`embedded data may be encrypted. Some or all of the
`watermark message, including the Security data in the mes
`Sage may be encrypted. Various keys used to encode the
`watermark may be encrypted as well. For example, a key
`that defines the location of the watermark Signal in the host
`Signal may be encrypted. A key used to decode the spread
`message Signal (e.g., a pseudorandom number) may also be
`encrypted.
`0044) In implementations where instances of the water
`mark Signal are repeated in the host Signal, a key in the
`message payload of one instance of a watermark Signal may
`
`Petitioner's Exhibit 1009, Page 20
`
`

`

`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`be used to decrypt a message, Such as the Security data, in
`other instance of the watermark Signal. The key may be
`included in a message payload by appending the key to the
`message or combining it with the message using Some
`function Such as an XOR, or multiplication operation that
`combines the key with the message to create a composite
`meSSage.
`0.045 Keys used to decode the watermark or its message
`payload may also be derived from the host signal itself or
`from another watermark in the host signal.
`0.046
`Digital watermarks provide a low cost, yet secure
`method of embedding Security data into a product or its
`packaging. The embedding process can be integrated into
`the process of printing the object or its packaging. For
`example, for each product, the printing process may be
`adapted to print an image embedded with the products
`identifier or hashed form of it. This process may be inte
`grated in the mass production of a variety of printable
`objects, like packaging, containers, labels, product docu
`mentation, credit cards, etc.
`0047 Authenticating A Product Using Embedded Secu
`rity Data
`0.048
`FIG. 2 is a flow diagram illustrating a process for
`authenticating a product using embedded Security data. The
`authentication System includes a user interface, Scanner and
`embedded data decoder. In the case where the embedded
`data is encoded in a digital watermark, the System may be
`implemented in a personal computer equipped with an
`imaging device, Such as a CCD camera or Scanner.
`0049 Authentication begins by prompting the user for
`the product identifier (30). Typically, this identifier is a
`product Serial number in plain View on the product, its
`packaging or documentation. The user may enter the product
`number by Simply typing it on a keyboard, or using Some
`other user input device (voice recognition, bar code Scanner,
`etc.) In response to receiving the product identifier, the
`System prompts the user to present the product for Scanning
`(32). The user then Scans the product with a sensor device,
`Such as a CCD camera, to capture a product Scan.
`0050. Next, the system decodes

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket