System and method for authentication
Abstract
Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.
- Inventors:
- Issue Date:
- Research Org.:
- ClearMark Systems, LLC, Longmont, CO (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1493605
- Patent Number(s):
- 10127447
- Application Number:
- 14/981,888
- Assignee:
- ClearMark Systems, LLC, Longmont, CO
- Patent Classifications (CPCs):
-
G - PHYSICS G06 - COMPUTING G06K - RECOGNITION OF DATA
G - PHYSICS G07 - CHECKING-DEVICES G07D - HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- DOE Contract Number:
- W911NF-14-C-0038
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2015 Dec 28
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Duerksen, Gary L., and Miller, Seth A. System and method for authentication. United States: N. p., 2018.
Web.
Duerksen, Gary L., & Miller, Seth A. System and method for authentication. United States.
Duerksen, Gary L., and Miller, Seth A. Tue .
"System and method for authentication". United States. https://www.osti.gov/servlets/purl/1493605.
@article{osti_1493605,
title = {System and method for authentication},
author = {Duerksen, Gary L. and Miller, Seth A.},
abstractNote = {Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {11}
}
Works referenced in this record:
Randomly driven fuzzy key extraction of unclonable images
conference, September 2010
- Shariati, Saloomeh; Jacques, Laurent; Standaert, Francois-Xavier
- 2010 17th IEEE International Conference on Image Processing (ICIP 2010), 2010 IEEE International Conference on Image Processing