Patent classifications
G06K19/14
Information processing system, information code generating system, information processing method, and information code generating method
To easily determine whether an information code has been replaced, an information processing device obtains, based on original information obtained by photographing an optically readable information code and decoding the same, first class information indicating a class into which an object visually represented by first visual information which should be displayed together with an information code is classified. The information processing device obtains second class information indicating a class into which an object visually represented by second visual information photographed together with the information code because of display together with the information code is classified. The information processing device compares the first class information with the second class information. The information processing device controls, based on a result of the comparison, execution of predetermined processing using the original information.
Information processing system, information code generating system, information processing method, and information code generating method
To easily determine whether an information code has been replaced, an information processing device obtains, based on original information obtained by photographing an optically readable information code and decoding the same, first class information indicating a class into which an object visually represented by first visual information which should be displayed together with an information code is classified. The information processing device obtains second class information indicating a class into which an object visually represented by second visual information photographed together with the information code because of display together with the information code is classified. The information processing device compares the first class information with the second class information. The information processing device controls, based on a result of the comparison, execution of predetermined processing using the original information.
APPARATUS AND METHOD FOR IDENTIFYING AND AUTHENTICATING AN OBJECT
Aspects of the subject disclosure may include, for example, obtaining a first image of a random distribution of items overlaying an encoded region of an object identification tag affixed to an object, wherein the first image comprises a first pattern obtained according to a first image capture configuration. A second image of the random distribution of items is also obtained, wherein the second image comprises a second pattern obtained according to a second image capture configuration. First and second stored reference patterns are identified according to decoded information obtained from the encoded region of the object identification tag and the first and second patterns are compared to the first and second stored reference patterns to obtain a comparison result. An authenticity of the object is determined according to the comparison result. Other embodiments are disclosed.
EMBEDDING PROTECTED MEMORY ACCESS INTO A RFID AUTHENTICATION PROCESS BASED ON A CHALLENGE-RESPONSE MECHANISM
A RFID tag, a reader and a protocol allow a protected read operation in a two-step tag authentication with cipher-block cryptography. A challenge-response mechanism using a shared secret symmetric key for tag authentication includes a challenge and information to read data from a tag's memory. Tag's enhanced reply to the challenge-response mechanism includes a response to the reader's challenge and data from the tag's memory. A method embeds a protected write operation in a four-step reader authentication with cipher-block cryptography. The protocol allows a challenge-response mechanism using the shared secret symmetric key for reader authentication including a challenge and information to write data to the tag's memory. Reader's enhanced reply to the challenge-response mechanism includes a response to the tag's challenge and data for writing to the tag's memory. Authenticated read and write data may be in plaintext, message authentication code (MAC)-protected, encrypted, or both encrypted and MAC protected.
EMBEDDING PROTECTED MEMORY ACCESS INTO A RFID AUTHENTICATION PROCESS BASED ON A CHALLENGE-RESPONSE MECHANISM
A RFID tag, a reader and a protocol allow a protected read operation in a two-step tag authentication with cipher-block cryptography. A challenge-response mechanism using a shared secret symmetric key for tag authentication includes a challenge and information to read data from a tag's memory. Tag's enhanced reply to the challenge-response mechanism includes a response to the reader's challenge and data from the tag's memory. A method embeds a protected write operation in a four-step reader authentication with cipher-block cryptography. The protocol allows a challenge-response mechanism using the shared secret symmetric key for reader authentication including a challenge and information to write data to the tag's memory. Reader's enhanced reply to the challenge-response mechanism includes a response to the tag's challenge and data for writing to the tag's memory. Authenticated read and write data may be in plaintext, message authentication code (MAC)-protected, encrypted, or both encrypted and MAC protected.
Apparatus and method for identifying and authenticating an object
Aspects of the subject disclosure may include, for example, obtaining a first image of a random distribution of particles overlaying an encoded region of an object identification tag, wherein the first image is obtained according to a first image capture configuration comprising a first image capture angle. The first image is associated with a decoded message determined according to the encoded region resulting in an association between the object identification tag and the first reflection pattern. A second image of the random distribution of particles is obtained according to a second image capture configuration including a second image capture angle, and an authenticity of the object identification tag is determined according to the association, the first image, and the second image. Other embodiments are disclosed.
Method and device for detecting unauthorized transfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Method and device for detecting unauthorized transfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Information processing system, information code generating system, information processing method, and information code generating method
To easily determine whether an information code has been replaced, an information processing device obtains, based on original information obtained by photographing an optically readable information code and decoding the same, first class information indicating a class into which an object visually represented by first visual information which should be displayed together with an information code is classified. The information processing device obtains second class information indicating a class into which an object visually represented by second visual information photographed together with the information code because of display together with the information code is classified. The information processing device compares the first class information with the second class information. The information processing device controls, based on a result of the comparison, execution of predetermined processing using the original information.
Information processing system, information code generating system, information processing method, and information code generating method
To easily determine whether an information code has been replaced, an information processing device obtains, based on original information obtained by photographing an optically readable information code and decoding the same, first class information indicating a class into which an object visually represented by first visual information which should be displayed together with an information code is classified. The information processing device obtains second class information indicating a class into which an object visually represented by second visual information photographed together with the information code because of display together with the information code is classified. The information processing device compares the first class information with the second class information. The information processing device controls, based on a result of the comparison, execution of predetermined processing using the original information.