US 9,811,671 B1
Authentication method and system
David I. Durst, Syosset, NY (US); Norman Kaish, Whitestone, NY (US); and Jay Fraser, San Antonio, TX (US)
Assigned to Copilot Ventures Fund III LLC, Wilmington, DE (US)
Filed by Copilot Ventures Fund III LLC, Wilmington, TX (US)
Filed on Jan. 22, 2016, as Appl. No. 15/4,518.
Application 11/621,252 is a division of application No. 09/577,959, filed on May 24, 2000, granted, now 7,162,035, issued on Jan. 9, 2009.
Application 15/004,518 is a continuation of application No. 14/754,003, filed on Jun. 29, 2015, granted, now 9,245,133, issued on Jan. 26, 2016.
Application 14/754,003 is a continuation of application No. 14/287,281, filed on May 27, 2014, granted, now 9,070,132, issued on Jun. 30, 2015.
Application 14/287,281 is a continuation of application No. 13/622,271, filed on Sep. 18, 2012, granted, now 8,737,609, issued on May 27, 2014.
Application 13/622,271 is a continuation of application No. 12/853,768, filed on Aug. 10, 2010, granted, now 8,270,603, issued on Sep. 18, 2012.
Application 12/853,768 is a continuation of application No. 11/621,252, filed on Jan. 9, 2007, granted, now 7,773,749, issued on Aug. 10, 2010.
This patent is subject to a terminal disclaimer.
Int. Cl. G06K 9/74 (2006.01); G06F 21/60 (2013.01); H04L 9/32 (2006.01); G09C 5/00 (2006.01); G06Q 30/00 (2012.01); G06K 7/14 (2006.01); G06K 19/08 (2006.01); G06K 7/12 (2006.01)
CPC G06F 21/602 (2013.01) [G06K 7/12 (2013.01); G06K 7/1404 (2013.01); G06K 19/086 (2013.01); G06Q 30/0185 (2013.01); G09C 5/00 (2013.01); H04L 9/3236 (2013.01); H04L 9/3247 (2013.01); H04L 2209/24 (2013.01); H04L 2209/56 (2013.01); H04L 2209/608 (2013.01); H04L 2209/805 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of authenticating an object, comprising:
providing an object having a surface having a first plurality of elements, each element having a position defined by a random process resulting from a manufacturing variation, representing an authentic pattern, and an associated digital file encoding the authentic pattern, comprising a cryptographic digital hash based of the positions of the first plurality of elements, the encoding being an irreversible compression of data and providing an error correction tolerance during authentication to a predetermined amount of statistical deviation from the authentic pattern represented by the positions of the first plurality of elements, from which authenticity of the object may be assured and from which the authentic pattern comprising the position defined by the random process resulting from the manufacturing variation, of each of the first plurality of elements, cannot be ascertained;
capturing at least two images of the surface of the object, comprising a second plurality of elements, having an image precision greater than the manufacturing variation;
analyzing the at least two different images with at least one automated processor to determine the positions of the second plurality of elements in the captured at least two images, wherein the second plurality of elements has at least one difference with respect to the first plurality of elements;
authenticating the object, by the at least one automated processor, based on the determined positions of the second plurality of elements from the captured at least two images, and the associated digital file, by verifying a correspondence of the determined positions of the second plurality of elements with respect to the authentic pattern of the positions of the first plurality of elements encoded in the associated digital file and the error correction tolerance to the predetermined amount of statistical deviation from the authentic pattern; and
outputting a message corresponding to a result of the authenticating.