Management of digital copies of registrations using mobile devices

ABSTRACT

A master digital copy of a registration is transmitted. The registration is proof that a physical object has been registered with a registration authority. A valid peripheral digital copy of the registration is received. The valid peripheral digital copy of the registration was made from the master digital copy of the registration and is incapable of being used to make other valid digital copies of the registration.

BACKGROUND

The present disclosure relates to registrations associated with physicalobjects, and more specifically, to managing digital copies of theseregistrations.

In many contexts, systems for the voluntary or compulsory registering ofphysical objects may be helpful in promoting group organization,responsible ownership, revenue generation, and theft deterrence. Anentity (e.g., a government, an organization, or a business) can use oneor more of many different types of registration systems. Despite theirdifferences, these registration systems may share commoncharacteristics. Specifically, each system can have one or moreregistration authorities that are responsible for managing the issuanceof registrations for given physical objects of a certain class orclasses provided that the requirements for registration are met by aregistrant (e.g., an owner of a physical object). Given the widespreaduse of certain registration systems, it is important that these systemscontinue to evolve and embrace new technologies in the face of theever-changing security challenges that are part of our modern society.

SUMMARY

According to embodiments of the present disclosure, aspects of thedisclosure include a method, a system, and a computer program productfor managing digital copies of a registration. The method, system, andcomputer program product include transmitting a master digital copy ofthe registration. The registration acts as proof that a physical objecthas been registered with a registration authority. The method, system,and computer program product include receiving a valid peripheraldigital copy of the registration. The valid peripheral digital copy ofthe registration was made from the master digital copy of theregistration and is incapable of being used to make other valid digitalcopies of the registration.

The above summary is not intended to describe each illustratedembodiment or every implementation of the present disclosure.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The drawings included in the present application are incorporated into,and form part of, the specification. They illustrate embodiments of thepresent disclosure and, along with the description, serve to explain theprinciples of the disclosure. The drawings are only illustrative of someembodiments and do not limit the disclosure.

FIG. 1 is a diagrammatic illustration showing various interactions thatmay occur between mobile devices and other computer systems, inaccordance with embodiments of a registration system of the presentinvention.

FIG. 2 is a diagrammatic illustration showing various interactions thatmay occur among mobile devices, in accordance with embodiments of aregistration system of the present invention.

FIG. 3 is a flow chart of a method for sharing digital copies of aregistration between two mobile devices, in accordance with embodimentsof the present invention.

FIG. 4 is a flow chart illustrating a method for managing the use of aregistered physical object and the sharing of digital copies of anassociated registration, in accordance with embodiments of the presentinvention.

FIG. 5 is a flow chart of a method for challenging a user of a physicalobject using a challenger's device, in accordance with embodiments ofthe present invention.

FIG. 6 depicts a high-level block diagram of an example computer systemthat may be used in implementing one or more embodiments of the presentinvention.

While the invention is amenable to various modifications and alternativeforms, specifics thereof have been shown by way of example in thedrawings and will be described in detail. It should be understood,however, that the intention is not to limit the invention to theparticular embodiments described. On the contrary, the intention is tocover all modifications, equivalents, and alternatives falling withinthe spirit and scope of the invention.

DETAILED DESCRIPTION

Aspects of the present disclosure relate to managing digital copies ofregistrations. While the present disclosure is not necessarily limitedto such applications, various aspects of the disclosure may beappreciated through a discussion of various examples using this context.

As used herein, a physical object may refer to tangible movable objects.For example, physical objects include vehicles (watercraft, automobiles,trailers, etc.) and animals (pets, wild animals, livestock, etc.). Aphysical object may further refer to a real property object; forexample, land and physical structures attached to land (houses, barns,hotel rooms, etc.).

As used herein, a registration authority refers to the entity thatcontrols or requires a registration system (e.g., a state government, anapartment complex owner, etc.) or agents or subagents that manage theregistration process on that entity's behalf (e.g., a department ofmotor vehicles). Further, as used herein, a registration refers to adocument (i.e., electronic or printed matter containing information)that is created upon the registering of a physical object with aregistration authority by a registrant (e.g., an owner), which may actas proof that the physical object has been registered.

In some embodiments of the present invention, a registration authoritymay allow, encourage, or require a registrant to provide a copy of aregistration to any other individual he allows to use the physicalobject that is the subject of the registration. For example, in someembodiments, a copy of the registration is required to be with the userof a physical object whenever he uses the object and may be associatedwith certain rights of the object's registrant. When this type ofregistration sharing occurs, certain difficulties with authentication ofcopies of registrations can arise; that is to say, registrations canbecome more difficult for a registration authority to track or verifywhen they are allowed to be shared among users of a registered object.For illustrative purposes, consider that a driver's license (which istypically not a registration) will typically have a single lawful userand include an image of that user. This makes the license easier for agiven challenger to verify as being authentic and belonging to thelicense user than, say, a vehicle registration, which typically can belawfully used by anyone who is lawfully entitled to use a particularvehicle, and which typically is not associated with an image of thevehicle user.

Using some embodiments of the present invention, a registrationauthority may be able to better overcome these challenges and increasethe security surrounding a registration system by limiting the issuancecopies of registrations or limiting the rights associated with certaincopies of registrations. In some embodiments, such efforts take the formof limiting the issuance or distribution of master digital copies ofregistrations. As used herein, a master digital copy of a registrationrefers to a valid digital copy of a registration that can be used tomake other valid digital copies of the registration. In someembodiments, a registration authority will only issue digital copies ofregistrations that are master digital copies or will issue masterdigital copies of registrations only under certain conditions. Forexample, in some embodiments, master digital copies of registrations canonly be issued by a registration authority to registrants. Further, insome embodiments, a particular master digital copy of a registration isassociated with only a single device (e.g., a mobile device of aregistrant) and certain rights associated with that particular masterdigital copy of the registration are not transferable, or thatparticular master digital copy itself is not transferable (i.e., movablebetween devices). Further, in some embodiments, a master digital copy ofa registration can only be used to create (i.e., copied to create) othervalid copies of registrations when those copies of the master digitalcopy are themselves incapable of being used to create other validcopies. This may occur, for example, where the registration authoritywants to limit or prevent secondary copying (i.e., secondary borrowing)of registrations. Further, in some embodiments, master digital copies ofregistrations are digitally signed.

It is contemplated that within a given registration system of thepresent invention, a registration authority can issue copies of one ormore registrations (e.g., master digital copies) for hundreds orthousands of physical objects of the same type or class (e.g., vehicles,animals, etc.). In some embodiments, the validity of each of thesecopies of the registration is revocable or the copies of theregistration are subject to expiration. In some embodiments, the sale ortransfer of a registered physical object will serve to invalidate a copyof a registration and require that a new registration be obtained. Insome embodiments, a registration authority will have a set of policiesdetailing which physical objects may or must be registered (orre-registered) and which interested individuals or entities areresponsible for making sure that these physical objects are registeredwith the registration authority.

Numerous individuals or entities may be associated with roles within thecontext of an embodiment of a registration system of the presentinvention. In some embodiments, applicable roles include owners,borrowers, challengers, secondary borrowers, and thieves.

Consistent with embodiments, an owner is any entity or individual thathas significant use or access rights associated with a particularphysical object that is subject to being registered with a registrationauthority and has the right control the ability of others to use oraccess that physical object. Examples of owners include the purchaser ofa wild animal, the lessee of automobile, and the renter of an apartmentor hotel room.

In some embodiments, another role is a borrower. In this context, aborrower is an entity or individual that obtains temporary use or accessrights in a physical object from an owner. The owner may or may notreceive payment for granting the temporary rights. One example of aborrower includes an individual who is loaned a car for a week by thecar owner. In another example, a borrower would be a brother who isgiven permission to a stay at an apartment overnight by the apartmentlessee, his sister.

In some embodiments, a third role is associated with a challenger. Achallenger refers to an individual or entity that is entrusted byanother individual or entity with the responsibility to review ormonitor the use of certain physical objects, or classes of physicalobjects, by others. The challenger may or may not be directly associatedwith, or be an employee of, a registration authority. In someembodiments, the challenger is responsible for ensuring that physicalobject users have lawful use rights and have registrations proving thatthe physical objects they are using are registered with one or moreregistration authorities. A challenger could include, for example, astate police officer responsible for checking vehicle registrations(issued by the state's department of motor vehicles) during trafficstops. Another example is an apartment complex supervisor tasked by theapartment complex administration with making sure that people in thecomplex's individual apartments have apartment registration documents.Yet another example is a state department of natural resources officerauthorized to check state vessel registrations during periodic or randomvessel inspections.

In some embodiments, a fourth role is a secondary borrower. As usedherein, a secondary borrower refers to an entity or individual thatobtains use or access rights in a physical object from a borrower oranother secondary borrower. The party that lends a physical object tothe secondary borrower may do so with or without the permission (orknowledge) of the owner of the physical object. An example of asecondary borrower includes a son who is loaned a boat for a night byhis father during a week where the father has been loaned the boat by afriend of his who is the boat owner.

In some embodiments, a fifth role is that of a thief. In the context ofsome embodiments, a thief is an individual or entity that uses aphysical object without the permission of an owner, a borrower, or asecondary borrower. The thief may or may not intend to return thephysical object upon completion of his use of it. In some embodiments, athief includes an individual or entity that has obtained a fraudulentcopy of a registration for a physical object, the fraudulent copy havingpossibly been generated or derived from a genuine copy of aregistration. An example of a thief is an employee who takes aphotograph of the vehicle registration for his boss's car with his smartphone and then steals the car. Another example of a thief is a teenagerwho downloads onto his smart phone a forged copy of a stranger's hotelregistration document for a hotel room and then breaks into the hotelroom.

It is contemplated that the roles discussed above are context dependentand are determined in each instance based on an individual'srelationship to a given physical object. In addition, in someembodiments, an individual can have multiple roles in instances wherethe individual has relationships with multiple objects. For example, ahusband could be the owner of his vehicle, a borrower of his wife'svehicle, and a secondary borrower of his brother's boss's cottage (theboss having previously loaned out the cottage to the brother), all atthe same time.

Turning to the figures, FIG. 1 is a diagrammatic illustration showingvarious interactions that may occur between mobile devices and othercomputer systems, in accordance with embodiments of a registrationsystem 100 of the present invention.

In some embodiments, per registration system 100, each mobile device110-118 is associated with (e.g., belongs to) an individual or entitythat has one or more of the roles discussed in detail above. In theillustrated embodiment, mobile devices 110, 112, 114, 116, and 118 areassociated with individuals having the roles of owner, borrower,challenger, secondary borrower, and thief, respectively. The mobiledevices 110-118 may include, for example, any mobile or handheldelectronic devices, such as laptops, mobile phones, smart phones,tablets, personal or enterprise digital assistants, and the like. Thefive mobile devices 110-118 of FIG. 1 are shown for illustrativepurposes only; it is contemplated that dozens, hundreds, or eventhousands of mobile devices may be used, consistent with someembodiments of the present invention. Further, in some embodiments, aparticular mobile device can be associated with multiple roles (i.e.,different roles in relationship to different physical objects).

In some embodiments, computer systems 102 and 104 are associated with aregistration authority and a mobile application database manager,respectively. As is discussed in more detail below and shown in FIG. 6,computer systems 102 and 104 may comprise a wide variety of computersand computing environments. In some embodiments, the mobile applicationdatabase manager of computer system 104 refers to the operator of adigital distribution platform for delivering software to an end user. Anexample of such a platform is an application store having downloadableapplications (i.e., apps) for use on smart phones or other mobiledevices. In some embodiments of registration system 100, a specificmobile application (or one of several similar mobile applications thatare each designed to be compatible with a different operating system) isrequired in order for a registrant to use registration system 100. Forexample, a copy of a mobile application may be required to download adigital copy of a registration from a registration authority (e.g., theregistration authority operating computer system 102). In someembodiments, a registrant has the option of not using registrationsystem 100 or only uses a portion of the components of the system. Thiscan occur, for example, where a registrant chooses to receive a papercopy of a registration from a registration authority or a copy that isdigital but does not otherwise meet the requirements to be used withregistration system 100 (e.g., in some embodiments, a pdf-copy of aregistration that is not digitally-signed).

In some embodiments, a separate computer system 104 for a mobileapplication database manager is not required. This occurs, for example,where a registration authority allows the downloading of mobileapplications from its own network (e.g., from computer system 102) orotherwise effectively acts as a mobile application database manager forits own mobile applications. It is further contemplated that in someembodiments no specialized mobile application are required for a user toeffectively utilize a digital registration system according toembodiments. This occurs, for instance, where general purpose softwarepreinstalled on a user's mobile device can be used instead of adownloaded mobile application.

Consistent with embodiments, there may be several different digitalinteractions 130-142 between the mobile devices 110-118 and the othercomputer systems 102 and 104 of the registration system 100. Each of130-142 represent one or more interactions between a particular mobiledevice and a particular other computer system during the use ofregistration system 100. In some embodiments, the digital interactions130-142 can be implemented by any number of any suitable communicationsmedia (e.g., wide area network (WAN), local area network (LAN),Internet, Intranet, etc.). Alternatively, mobile devices 110-118 andother computer systems 102 and 104 may be local to each other duringdigital interactions 130-142, and communicate via any appropriate localcommunication medium (e.g., local area network (LAN), hardwire, wirelesslink, Intranet, near field communication, Bluetooth connection, ad hocwireless network, etc.). As discussed in more detail below and shown inFIG. 2, similar interactions amongst the mobile devices 110-118 as partof registration system 100 are also be contemplated in some embodiments.

Digital interactions 130, 132, 134, 136, and 138 represent interactionsbetween a mobile application database manager (i.e., computer system104) and mobile devices 110, 112, 114, 116, and 118, respectively. Insome embodiments, the digital interactions 130-138 can includedownloading (or, more specifically, taking the steps necessary todownload) one or more mobile applications from the mobile applicationdatabase manager to each applicable mobile device. In some embodiments,a downloaded application includes the software necessary to use andmanage (e.g., receive, transmit, copy, share, etc.) digital copies ofregistrations in accordance with registration system 100. In someembodiments, digital interactions 130-138 can also include downloadingperiodic updates, patches, or new versions of applicable software.Further, some embodiments do not require any special permissions orverification steps for interactions 130-138 to occur, as the applicablesoftware is designed and designated for use by the public generally. Asan example of digital interaction 130, an owner of a vehicle candownload a copy of his state's digital vehicle registration app from anapplication store (e.g., computer system 104) onto his smart phone(e.g., mobile device 110) so he can obtain a digital copy of his vehicleregistration for his vehicle from his state's department of motorvehicles. An example of electronic interaction 132 is an individual(i.e., borrower) who wants to transport his friend's tiger across town,downloading his country's exotic animal registration software from adatabase (e.g., computer system 104) to his mobile phone (e.g., mobiledevice 112), so he can later get a digital copy of the tiger'sregistration certificate from his friend. Further, as an example ofdigital interaction 138, a professional criminal (i.e., thief) mightdownload a copy of a city's boater registration mobile application tohis tablet (e.g., mobile device 118) in the hopes of finding a way tomodify or reverse engineer the application in order to create fraudulentcopies of boater registrations.

In some embodiments, in contrast with digital interactions 130-138,digital interactions 140 and 142 represent interactions between thecomputer system 102 of a registration authority and mobile devices 110and 114, respectively. In some embodiments, digital interactions 140 and142 are the means by which a registration authority communicates withmobile devices regarding particular registered physical objects,specifically, or a given registration system, generally. In someembodiments, the computer system 102 of a registration authority canrequire that specific credentials (e.g., passwords, etc.) be provided inorder for a user of the computer system to access specific contentregarding the registration system 100 or content regarding a particularregistered physical object within the system. In some embodiments, thismeans that access to content stored by the registration authority can beless broadly disseminated than content stored by its associated mobileapplication database manager (e.g., in situations where the applicablemobile applications are downloadable by the public generally).

In some embodiments, digital interactions 140 (i.e., between thecomputer system 102 of a registration authority and a mobile device 110of an owner) include, for example, downloading master digital copies ofregistrations or updated master digital copies of registrations,uploading information about registrants or registered objects, orexchanging information regarding the validity of one or more digitalcopies of a registration. More specifically, an example of an electronicinteraction 140 includes an owner of an automobile downloading a masterdigital copy of a vehicle registration for his vehicle on his smartphone. Another example is an apartment tenant updating her last name onher apartment registration document after she is married.

In some embodiments, a digital interaction 142 is between a registrationauthority (102) and a challenger (114) associated with the registrationauthority. Examples of digital interactions 142 include downloading adigital registration verification database and downloading updates to adigital registration verification database. More specifically, anexample of a digital interaction 142 includes a state wildlife officerdownloading the state's database of valid digital copies of wild animalregistrations.

In some embodiments, each of the digital interactions 130-142incorporate one or more security features. Per embodiments, the computersystems 102 and 104 incorporate digital certificates (e.g., one or moreelectronic documents managed in accordance with the X.509 standard for apublic key infrastructure) in interactions with the devices 110-118. Forexample, an owner's mobile device 110 may be able to use a digitalcertificate sent in conjunction with a downloaded copy of a mobileapplication in order to verify that the app was sent by the mobileapplication database manager (104).

In some embodiments, security features incorporated in digitalinteractions 130-142 take the form of key pairs, including asymmetrickey pairs. For example, in a digital interaction 140,Rivest-Shamir-Adleman (RSA) public-key encryption could be used whentransmitting a particular digitally-signed digital copy of aregistration from a registration authority (102) to an owner of aparticular registered physical object (110). As another example, thesame encryption scheme could be used to transfer an entire digitalregistration verification database from a registration authority (102)to a challenger (114) associated with that authority. One skilled in theart would appreciate that many other encryption schemes could besuitable for use with some embodiments of the invention.

Turning to FIG. 2, shown is a diagram illustrating various interactionsthat may occur among mobile devices, in accordance with embodiments of aregistration system of the present invention. In some embodiments,mobile devices 210-218 correspond to mobile devices 110-118 ofregistration system 100.

In some embodiments, the digital interactions 220-230 among mobiledevices 210-218 are similar to the digital interactions 130-142 ofregistration system 100. In some embodiments, each of digitalinteractions 220-230 represent one or more interactions between aparticular mobile device and a particular other mobile device during theuse of a registration system. In some embodiments, the digitalinteractions 220-230 can be implemented by any number of any suitablecommunications media (e.g., wide area network (WAN), local area network(LAN), Internet, Intranet, etc.). Alternatively, mobile devices 210-218are local to each other during applicable digital interactions 220-230,and communicate via any appropriate local communication medium (e.g.,local area network (LAN), hardwire, wireless link, Intranet, near fieldcommunication, Bluetooth connection, ad hoc wireless network, etc.). Insome embodiments, short range communications not requiringintermediaries may be used for these digital interactions. In someembodiments, digital interactions 220-230 incorporate security features,that are the same or different from those features discussed withreference to the digital interactions 130-142 of FIG. 1. (e.g., digitalcertificates, public key encryption schemes, HTTPS (i.e., TSL or SSL assublayers under HTTP), etc.)

In some embodiments, digital interaction 220 is between an owner'smobile device 210 and a borrower's mobile device 212. In someembodiments, electronic interaction 220 includes creating andtransmitting a digital copy of a registration from an owner (210) to aborrower (212). Further, examples of embodiments of such digitalinteractions 220 are discussed in more detail below and shown in FIG. 3.

Taking the sharing of registrations a step further, digital interaction222 may include creating a second digital copy of the digital copy ofthe registration received by the borrower (212) (from the owner (210))and transmitting (or attempting to transmit) the second digital copy ofthe registration to a secondary borrower (216). In some embodiments, oneor more security barriers are in place to prevent a borrower (212) fromcopying or re-transmitting a digital copy of a registration to asecondary borrower's mobile device 216. In some embodiments, to help toprohibit this secondary borrowing, a copy of a mobile application on aborrower's mobile device prohibits attempts at the sharing of any copiesof a particular registration with a secondary borrower and informs theborrower that such an action is not permissible (e.g., through an errormessage on a graphic user interface).

In some embodiments, certain security features include a requirementthat each digital copy of a registration incorporate a digitalcertificate (e.g., an X.509 digital certificate). Further, each digitalcopy may include multiple structural components (e.g., serial number,issuer, valid to and valid from dates, etc.). In some embodiments, anowner is able to adjust or control certain aspects of these componentsin a new digital copy of a registration that is transferred to aborrower. This can aid in limiting secondary borrowing as a borrower maynot be able to generate a new digital certificate for transfer to asecondary borrower. In some embodiments, another security featureincludes a requirement that a secret key be used when generating adigital copy of a registration. By storing such a secret key in thekeystore of an owner's mobile device 210, a borrower will not be able togenerate a new digital copy of the registration because he will lack theability to access that key.

In some embodiments, another security feature is that digitalinteractions 220 and 222 each involve a series a steps whereby a shortrange communication medium is used to establish a secure connectionbetween respective devices (e.g., between mobile devices 210 and 212 orbetween mobile devices 212 and 216). In some embodiments, near fieldcommunication and Bluetooth are suitable short range communicationprotocols.

Also included in FIG. 2 are digital interactions 224, 226, 228, and 230,which, in some embodiments, represent one or more digital interactionsbetween a challenger's mobile device 214 and other mobile devices belongto an owner 210, a borrower 212, a secondary borrower 216, and a thief218, respectively. These electronic interactions include, for example,challenges by the challenger (214) wherein the other mobile device isprompted to produce a valid digital copy of a registration. Suchchallenges are discussed in more detail below and shown in the flowchart of FIG. 5.

Turning now to FIG. 3, a flow chart of a method 300 for sharing digitalcopies of a registration between two mobile devices in accordance withembodiments of the present invention is shown. Per 301, in someembodiments, a copy of a mobile registration application is downloadedon both a first mobile device (e.g., an owner's mobile device) and asecond mobile device (e.g., a borrower's mobile device) prior to anapplicable digital interaction between the two devices. These downloadsare each be performed, for example, by using one of digital interactions130-138 of FIG. 1. Per 303, a first digital copy of a specificregistration is downloaded (e.g., by using the mobile application) ontothe first device. Per embodiments, a communication session is begunbetween the first device and the second device, as shown in block 305.Next, per 307 the two parties to the interaction use copies of themobile application on their respective devices to select the specificregistration that is desired to be shared with the user of the seconddevice by the user of the first device. This selection can be made, forexample, through a graphic user interface on each mobile device. In someembodiments, only those registrations for which the first device userhas the right to transfer a digital copy are shown. Per 309, upon theselection, by both parties, of the specific registration correspondingto the first digital copy, the first device prompts its user to selectlimitations on certain criteria for the second digital copy to becreated. For example, the first device may prompt the user to select anexpiration date for the new digital copy or prompt the user to determinewhether the new digital copy should be transferable from the seconddevice to other devices (e.g., a secondary borrower's device). Per 311,in some embodiments, once the selection is made by the user of the firstdevice, the first device generates the second digital copy of theregistration from the first digital copy of the registration andtransmits the second digital copy to the second device. Upon completionof a successful transmission of the second digital copy, thecommunication session, per block 313, is ended.

Turning now to FIG. 4, shown is a flow chart of a method 400 formanaging the use of a registered physical object and the sharing ofdigital copies of an associated registration, in accordance withembodiments of the present invention. Per block 401, an individual orentity registrant (e.g., an owner) registers a physical object with aregistration authority. In some embodiments, this can be done in person(e.g., at a department of motor vehicles office), via a website, or inany other suitable manner that is acceptable to the registrationauthority. In block 403, a physical copy of a registration is receivedby the registrant by appropriate means; for example, the physical copycould be a plastic laminated registration document that is receivedthrough the mail at the registrant's address. For another example, thephysical copy of the registration could be a temporary copy that is onlyvalid for a short period of time to allow for a more permanentregistration to be obtained by the registrant.

In some embodiments, per block 405, the registrant downloads a copy of amobile application on a mobile device; the application can include, forexample, a software application downloaded from the mobile applicationdatabase manager (100) of FIG. 1. It is contemplated that in someembodiments, an application can be downloaded by an individual prior tobeginning the registration process and used for initially registering aphysical object with a registration authority (i.e., used in block 401).Next, per block 407, the registrant receives a master digital copy ofhis registration on his mobile device. In some embodiments, the masterdigital copy of the registration can be received by the registrant'smobile device from the registration authority (e.g., from computersystem 102 of FIG. 1) or can be received from another entity authorizedby the registration authority to issue digital copies of registrations.In some embodiments, the master digital copy of the registrationreceived by the registrant is not validly transferable from theregistrant's mobile device to any other mobile device. In someembodiments, the registrant is required to enter certain credentials toprove his identity and relationship to the registered object before heis allowed to download the digital copy of the registration.

In block 409, the registrant chooses to loan the registered object to aborrower. In some embodiments, this occurs long after the registrantreceives the master digital copy of the registration from theregistration authority. Per block 411, the registrant creates a newdigital copy (e.g., a borrower's copy) from his master digital copy ofthe registration and transmits the new digital copy of the registrationto a mobile device belonging to the borrower of the object; for example,this process could correspond to electronic interaction 220, discussedin reference to FIG. 2 above. In some embodiments, the transferreddigital copy can take the form of a peripheral digital copy or astationary digital copy. In this context, a peripheral digital copyrefers to a valid digital copy of a registration that cannot be used tomake other valid digital copies of the registration. This occurs, forinstance, where the registrant does not want the borrower to be able tocreate other digital copies of the registration that he could thenprovide to multiple other potential users (e.g., secondary borrowers);or this could occur in instances where the mobile application does notallow an owner to create other master digital copies from his masterdigital copy of his registration. Further, in this context, a stationarydigital copy of a registration refers to a peripheral digital copy of aregistration that is further limited in that it can only be validlytransferred between electronic device when the receiving device is achallenger's device (e.g., challenger's mobile device 214) or when thetransmitting device is the device that created it (e.g., owner's mobiledevice 210 or a registration authority's computer system). This occurs,for instance, when the registrant does not want the borrower to be ableto lend his digital copy of the registration to any other mobile device(i.e., where the owner may be attempting to prohibit all secondaryborrowing).

Next, in some embodiments, per block 413, the registrant receives theregistered physical object back from the borrower. This occurs, forexample, after the borrower has finished using the registered object.Per block 415, the registrant uses his mobile device to revoke thevalidity of the digital copy of the registration on the borrower'smobile device. In some embodiments, the borrower is notified by hisdevice that his digital copy of the registration has been revoked; forexample, the borrower may be notified by the fact that the registrationis no longer viewable on his device. In some embodiments, revoking thevalidity of the borrower's copy of the registration is required beforethe registrant's copy can be used. This occurs, for example, where theregistration authority only allows one digital copy of a registration tobe validly usable at a time. Per some embodiments, the revocation of theborrower's copy of the registration takes the form of a communication tothe registration authority from the registrant's mobile device, whereinthe registrant notifies the registration authority that the validity ofan individually numbered copy of a digital certificate (i.e., thecertificate copy associated with the borrower's digital copy of theregistration) has been revoked. The registration authority adds thisnotification to an appropriate digital registration verificationdatabase. Per some embodiments, this notification serves to effectively“black-list” the borrower's copy of the registration.

Continuing method 400 at block 417, the registrant resumes use of theregistered object that was returned to him by the borrower. In someembodiments, a registrant may not revoke a borrower's copy of aregistration until after he has resumed using the physical object (i.e.,the registrant may perform block 417 before performing block 415). Insome embodiments, the registrant may choose not to revoke the validityof the borrower's copy at all (i.e., the registrant may avoid performingblock 415 altogether). This may occur, for example, where the borroweris a trusted individual or someone who the registrant is likely to letborrow the registered physical object often (e.g., where a father plansto let his son borrow his boat every other weekend during a summer).Further, a registrant also may choose not to manually revoke aborrower's copy of a registration in instances where the borrower'scopy, as part of its original generation, is scheduled to be revoked(and, in some embodiments, expunged from the GUI of the borrower'smobile device) automatically within a given time period. In someembodiments of method 400, the registrant uses the registered objectwithout lending it out first (i.e., the registrant performs 417 withoutperforming any of 409-415). Further, it is contemplated that, in someembodiments, multiple borrowers could be provided with different digitalcopies of a registration, all of which are copied (i.e. generated) fromthe same master digital copy of the registration residing theregistrant's mobile device; further, in some embodiments, all of theborrowers' copies could be valid at the same time or for differentterms.

Next, per block 419, the registrant transmits his master digital copy ofthe registration to a challenger. This occurs, for example, when theregistrant is subject to a face to face challenge by the challengerwhile he is using the registered object. Such a challenge is discussedin more detail below in reference to FIG. 5. Upon completion of thechallenge, per block 421, the registrant continues his use of theregistered object.

It is contemplated that in some embodiments many iterations of all or aportion of method 400 can occur for a given registrant. Further, manyregistrants within a given registration system could each performiterations of all or a portion of the method 400. Moreover, a givenregistrant may have multiple registered objects (i.e., multipledifferent registrations) at the same time (e.g., an individual who ownstwo or more registered vehicles).

Turning now to FIG. 5, a flow chart of a method 500 for challenging auser of a physical object using a challenger's device, in accordancewith embodiments of the present invention, is shown. In this context, achallenger's device refers to an electronic device that can be used by achallenger to determine whether digital copies of registrations arevalid. Such a device includes, for example, a mobile device, such asmobile device 114 of FIG. 1. Per 501, a challenger downloads a copy of amobile application onto an electronic device. This could occur, forexample, per electronic interaction 114 of FIG. 1. In some embodiments,this is the same mobile application that is intended for download byother (non-challenger) users of a registration system; if such is thecase, the challenger could be required to enter special credentials intothe application once it is downloaded in order to access features thatare specific to challengers authorized by a given registrationauthority. In some embodiments, the version of the application used by achallenger is entirely different from the version of the mobileapplication used by registrants under the same registration system.

In some embodiments, per block 503, the challenger receives a copy of adigital registration verification database. In some embodiments, thistakes the form of a download from the computer system of theregistration authority to the challenger's electronic device. In someembodiments, the database includes information that can be used by thechallenger to verify the validity of digital copies of registrations(e.g., digital keys, lists of expired or otherwise invalidated digitalcopies of registrations, etc.). Per block 505, the challenger could alsoreceive updates to the copy of the database stored on his challenger'sdevice. These updates could, for example, take the form of regularly orperiodically sent lists of newly expired digital certificates that aredelivered from the registration authority.

Per 507, the challenger stops (i.e., temporarily detains) and challengesa user of an object that is subject to registration requirements. Thisoccurs, for instance, where the challenger has reason to believe thatthe object has not been properly registered. In some embodiments, thechallenger issues the challenge during a face to face encounter betweenthe challenger and the object user (e.g., during a traffic stop of avehicle by a police officer). In some embodiments, digital interactionscorresponding to one or more of the digital interactions 224-230 of FIG.2, are initiated. Per 509, a digital connection is established betweenthe object user's mobile device and the challenger's electronic device.In some embodiments, this connection is through a secure short rangecommunication medium (e.g., near field communication, Bluetoothconnection, ad hoc wireless network, etc.). In some embodiments, thephysical object user downloaded an appropriate mobile application from adatabase prior to the encounter. The user then selects a desired digitalcopy of a registration and sends the desired copy (i.e., transmits aduplicate of the desired copy) to the challenger's electronic device.Per 511, the copy is received by the challenger's electronic device.

The challenger then uses the challenger's electronic device, per block513, to analyze the transmitted copy of the registration. Severalcomponents could be included in the digital copy that may aid in thisanalysis. In some embodiments, valid digital copies of registrationsincorporate certain visual indicators of authenticity (e.g., colorpatterns, holographic images, etc.), which are analyzed by thechallenger, per block 513A. In addition, a copy of a registration couldhave an expiration date that the challenger can use to verify that thecopy is not expired. Further, in some embodiments, digital copiesincorporate steganographic indicators of authenticity. Per block 513B,the challenger's device may be able to detect these steganographicindicators or be able to use these indicators to present a coherentimage to the challenger (e.g., where digital watermarking is used) whenthe challenged copy of a registration is valid. Further, per 513C, insome embodiments, valid digital copies of registrations use digitalsignatures (e.g., incorporated as part of a digital certificate) thatare analyzed by the challenger to determine the validity of a given copyof a registration.

In some embodiments, block 513 further incorporates use of the digitalregistration verification database. For example, a serial number of theuser's digital copy of the registration could be compared against a listof serial numbers associated with known expired or otherwise invalidateddigital copies of registrations.

Per 515, the challenger determines, based on the analysis, whether thedigital copy of the registration on the user's mobile device is valid.There are many alternative scenarios for how an analysis 513 anddetermination 515 could proceed. In one example, the user is the ownerof the physical object and his copy of the registration includes a validdigital signature that is authenticated by the challenger's device. Inanother example, the user is a thief who stole the physical object andused specialized software to make a fraudulent digital copy of aregistration. In this example, the visual indicators may be good enoughto fool the challenger, but the challenger's device reveals that thedigital signature on the fraudulent copy is invalid. In yet anotherexample, the user of the object is a secondary borrower who, having beenunable to transfer a valid copy of the registration for the object froma borrower's device, used his mobile device to take a photograph of thevalid digital copy of the registration. In this example, upon receivingthe photograph, the challenger's device is unable to recognize the filetype and notifies the challenger that the copy is invalid. Yet anotherexample might be that the user is a borrower who received a valid copyof the registration from the owner, but the owner revoked the borrower'scopy a week before the challenger intercepted the borrower. In thisexample, the challenger's device compares the serial number of the copywith the serial numbers in the digital verification database and, uponlocating that serial number in the database, rejects the copy as expiredand invalid.

In some embodiments, the challenger may respond differently depending onhis analysis and determination. For example, if the challengerdetermines that the digital copy of the registration is a forgery, hemight arrest the user of the physical object. As another example, if thechallenger determines that the digital copy of the registration wasproperly issued but is now expired, he may let the user leave with awarning or a citation. As yet another example, if the challengerdetermines that the digital copy is valid, he may allow the user toleave without penalty. In some embodiments, the challenger deletes thetransmitted copy of the registration upon completion of the encounterwith the physical object user.

It is contemplated that, in some embodiments, the challenger of method500 is not associated with the registration authority for the physicalobject. This may occur, for example, where the registration authority isthe department of motor vehicles for one state and the challenger is apeace officer for another state.

It is further contemplated that, in some embodiments, one or more stepsof method 500 could occur remotely from the challenger's device and themobile device of the object user. This could occur for instance wherethe challenger does not download a copy of a verification database, butinstead transmits the digital copy of a registration obtained from theuser directly to the registration authority (e.g. through an internetconnection), whereupon the registration authority makes the comparisonof the database with that digital copy and transmits the results back tothe challenger's device.

FIG. 6 depicts a high-level block diagram of an example computer systemthat could be used in implementing one or more embodiments of theinvention. For example, one or more computer systems described inreference to this figure could correspond to computer systems 102 and104 or mobile devices 110-118 of FIG. 1. The major components of thecomputer system 601 comprise one or more CPUs 602, a memory subsystem604, a terminal interface 612, a storage interface 614, an I/O(Input/Output) device interface 616, and a network interface 618, all ofwhich are communicatively coupled, directly or indirectly, forinter-component communication via a memory bus 603, an I/O bus 608, andan I/O bus interface unit 610.

The computer system 601 contains one or more general-purposeprogrammable central processing units (CPUs) 602A, 602B, 602C, and 602D,herein generically referred to as the CPU 602. In an embodiment, thecomputer system 601 contains multiple processors typical of a relativelylarge system; however, in another embodiment the computer system 601alternatively is a single CPU system. Each CPU 602 executes instructionsstored in the memory subsystem 604 and comprises one or more levels ofon-board cache.

In an embodiment, the memory subsystem 604 comprises a random-accesssemiconductor memory, storage device, or storage medium (either volatileor non-volatile) for storing data and programs. In another embodiment,the memory subsystem 604 represents the entire virtual memory of thecomputer system 601, and also includes the virtual memory of othercomputer systems coupled to the computer system 601 or connected via anetwork. The memory subsystem 604 may be conceptually a singlemonolithic entity, but in other embodiments the memory subsystem 604 maybe a more complex arrangement, such as a hierarchy of caches and othermemory devices. For example, memory could exist in multiple levels ofcaches, and these caches could be further divided by function, so thatone cache holds instructions while another holds non-instruction data,which is used by the processor or processors. Memory may be furtherdistributed and associated with different CPUs or sets of CPUs, as isknown in any of various so-called non-uniform memory access (NUMA)computer architectures.

The main memory or memory subsystem 604 contains elements for controland flow of memory used by the CPU 602. This includes all or a portionof the following: a memory controller 605, one or more memory buffers606A and 606B and one or more memory devices 625A and 625B. In theillustrated embodiment, the memory devices 625A and 625B are dualin-line memory modules (DIMMs), which are a series of dynamicrandom-access memory (DRAM) chips 607A-607D (collectively referred to as607) mounted on a printed circuit board and designed for use in personalcomputers, workstations, and servers. The use of DRAMs 607 in theillustration is exemplary only and the memory array used may vary intype as previously mentioned. In various embodiments, these elements areconnected with buses for communication of data and instructions. Inother embodiments, these elements are combined into single chips thatperform multiple duties or integrated into various types of memorymodules. The illustrated elements are shown as being contained withinthe memory subsystem 604 in the computer system 601. In otherembodiments the components are arranged differently and have a varietyof configurations. For example, the memory controller 605 may be on theCPU 602 side of the memory bus 603. In other embodiments, some or all ofthem are on different computer systems and may be accessed remotely,e.g., via a network.

Although the memory bus 603 is shown in FIG. 6 as a single bus structureproviding a direct communication path among the CPUs 602, the memorysubsystem 604, and the I/O bus interface 610, the memory bus 603 couldin fact comprise multiple different buses or communication paths, whichare arranged in any of various forms, such as point-to-point links inhierarchical, star or web configurations, multiple hierarchical buses,parallel and redundant paths, or any other appropriate type ofconfiguration. Furthermore, while the I/O bus interface 610 and the I/Obus 608 are shown as single respective units, the computer system 601could, in fact, contain multiple I/O bus interface units 610, multipleI/O buses 608, or both. While multiple I/O interface units are shown,which separate the I/O bus 608 from various communications paths runningto the various I/O devices, in other embodiments some or all of the I/Odevices are connected directly to one or more system I/O buses.

In various embodiments, the computer system 601 is a multi-usermainframe computer system, a single-user system, or a server computer orsimilar device that has little or no direct user interface, but receivesrequests from other computer systems (clients). In other embodiments,the computer system 601 is implemented as a desktop computer, portablecomputer, laptop or notebook computer, tablet computer, pocket computer,telephone, smart phone, network switches or routers, or any otherappropriate type of electronic device.

FIG. 6 is intended to depict the representative major components of anexemplary computer system 601. But individual components may havegreater complexity than represented in FIG. 6, components other than orin addition to those shown in FIG. 6 may be present, and the number,type, and configuration of such components may vary. Several particularexamples of such complexities or additional variations are disclosedherein. The particular examples disclosed are for example only and arenot necessarily the only such variations.

The memory buffers 606A and 606B, in this embodiment, may be intelligentmemory buffers, each of which includes an exemplary type of logicmodule. Such logic modules may include hardware, firmware, or both for avariety of operations and tasks, examples of which include: databuffering, data splitting, and data routing. The logic module for memorybuffers 606A and 606B control the DIMMs 607A and 607B, the data flowbetween the DIMMs 607A and 607B and memory buffers 606A and 606B, anddata flow with outside elements, such as the memory controller 605.Outside elements, such as the memory controller 605 have their own logicmodules that the logic modules of memory buffers 606A and 607B interactwith. The logic modules can be used for failure detection and correctingtechniques for failures that may occur in the DIMMs 607A and 607B.Examples of such techniques include: Error Correcting Code (ECC),Built-In-Self-Test (BIST), extended exercisers, and scrub functions. Thefirmware or hardware could add additional sections of data for failuredetermination as the data is passed through the system. Logic modulesthroughout the system, including but not limited to the memory buffers606A and 606B, memory controller 605, CPU 602, and even the DRAM 607 mayuse these techniques in the same or different forms. These logic modulescould communicate failures and changes to memory usage to a hypervisoror operating system. The hypervisor or the operating system is a systemthat is used to map memory in the system 601 and tracks the location ofdata in memory systems used by the CPU 602. In some embodiments thatcombine or rearrange elements, aspects of the firmware, hardware, orlogic modules capabilities may be combined or redistributed. Thesevariations would be apparent to one skilled in the art.

The present invention may be a system, a method, and/or a computerprogram product. The computer program product may include a computerreadable storage medium (or media) having computer readable programinstructions thereon for causing a processor to carry out aspects of thepresent invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

The descriptions of the various embodiments of the present disclosurehave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

What is claimed is:
 1. A computer program product for managing digital copies of a registration of a specified physical object with a registration authority, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by at least one computer to cause the at least one computer to: transmit a master digital copy of the registration to a first mobile device, the registration being proof that the specified physical object has been registered with the registration authority; and receive from a second mobile device a valid peripheral digital copy of the registration showing that the specified physical object has been registered with the registration authority, the valid peripheral digital copy of the registration having been made by the first mobile device from the master digital copy of the registration and sent from the first mobile device to the second mobile device, and including a security feature preventing the valid peripheral digital copy of the registration from being used to make other valid digital copies of the registration that would show registration of the specified physical object with the registration authority to limit copying of the registration.
 2. The computer program product of claim 1, the program instructions executable by the at least one computer to further cause the at least one computer to: analyze the peripheral digital copy of the registration; and based on the analysis of the peripheral digital copy of the registration, determine that the peripheral digital copy of the registration is valid.
 3. The computer program product of claim 1, wherein the peripheral digital copy of the registration comprises a digital signature, the program instructions executable by the at least one computer to further cause the at least one computer to: analyze the digital signature; and based on the analysis of the digital signature, determine that the peripheral digital copy of the registration is valid.
 4. The computer program product of claim 3, wherein the peripheral digital copy of the registration further comprises a steganographic indicator of authenticity and a visual indicator of authenticity, the program instructions executable by the at least one computer to further cause the at least one computer to: analyze the steganographic indicator of authenticity and the visual indicator of authenticity.
 5. The computer program product of claim 2, wherein the at least one computer comprises a computer system of a representative of the registration authority and an electronic device, wherein the transmitting the master digital copy of the registration is from the computer system of the representative and to the first mobile device, and wherein the receiving the peripheral digital copy of the registration is by the electronic device from the second mobile device, the second mobile device having previously received the peripheral digital copy of the registration from the first mobile device.
 6. The computer program product of claim 5, wherein the electronic device is a third mobile device of a challenger, and wherein the analyzing the peripheral digital copy of the registration is performed by the challenger by using the third mobile device.
 7. The computer program product of claim 6, wherein the receiving the peripheral digital copy is performed via a direct wireless connection between the second mobile device and the third mobile device.
 8. The computer program product of claim 5, wherein the peripheral digital registration comprises a stationary registration, the stationary registration being only validly transferable between a transmitting device and a receiving device when the receiving device is an electronic device of an authorized challenger or the transmitting device is the first mobile device.
 9. The computer program product of claim 5, wherein the physical object is a first vehicle, wherein the registration is a first vehicle registration, wherein the registration authority is a governmental entity, wherein the first mobile device belongs to a first owner of the first vehicle, the first owner having previously registered the first vehicle with the governmental entity, wherein the second mobile device belongs to a first borrower of the first vehicle, wherein the electronic device belongs to a peace officer, and wherein the receiving the peripheral digital copy of the registration occurs both during a face to face interaction between the first borrower and the peace officer and contemporaneously with the operation of the first vehicle by the first borrower.
 10. A system for managing digital copies of a registration of a specified physical object with a registration authority, the system comprising: at least one computer, the at least one computer configured to: transmit a master digital copy of the registration to a first mobile device, the registration being proof that the specified physical object has been registered with the registration authority; and receive from a second mobile device a valid peripheral digital copy of the registration showing that the specified physical object has been registered with the registration authority, the valid peripheral digital copy of the registration having been made by the first mobile device from the master digital copy of the registration and sent from the first mobile device to the second mobile device and including a security feature preventing the valid peripheral digital copy of the registration from being used to make other valid digital copies of the registration that would show registration of the specified physical object with the registration authority to limit copying of the registration.
 11. The system of claim 10, wherein the peripheral digital copy of the registration comprises a digital signature, and wherein the at least one computer is further configured to: analyze the digital signature; and based on the analysis of the digital signature, determine that the peripheral digital copy of the registration is valid.
 12. The system of claim 11, wherein the at least one computer comprises a computer system of a representative of the registration authority and an electronic device, wherein the transmitting the master digital copy of the registration is from the computer system of the representative and to the first mobile device, and wherein the receiving the peripheral digital copy of the registration is by the electronic device from the second mobile device, the second mobile device having previously received the peripheral digital copy of the registration from the first mobile device.
 13. The system of claim 12, wherein the electronic device is a third mobile device of a challenger, wherein the receiving the peripheral digital copy is performed via a direct wireless connection between the second mobile device and the electronic device, the direct wireless connection comprising at least one of an ad hoc wireless network, a Bluetooth connection, and a near field communication, and wherein the analyzing the digital signature is performed by the challenger by using the third mobile device.
 14. The system of claim 12, wherein the peripheral digital registration comprises a stationary registration, the stationary registration being only validly transferable between a transmitting device and a receiving device when the receiving device is an electronic device of an authorized challenger or the transmitting device is the first mobile device, wherein the physical object is a first vehicle, wherein the registration is a first vehicle registration, wherein the registration authority is a governmental entity, wherein the first mobile device belongs to a first owner of the first vehicle, the first owner having previously registered the first vehicle with the governmental entity, wherein the second mobile device belongs to a first borrower of the first vehicle, wherein the electronic device belongs to a peace officer, and wherein the receiving the peripheral digital copy of the registration occurs both during a face to face interaction between the first borrower and the peace officer and contemporaneously with the operation of the first vehicle by the first borrower.
 15. The system of claim 10, wherein: the at least one computer comprises a computer system of a representative of the registration authority, and first and second mobile devices; the computer system is configured to transmit the master digital copy of the registration to the first mobile device; and the first mobile device is configured for: transferring the valid peripheral digital copy of the registration to the second mobile device; and prompting a user of the first mobile device, prior to the transferring the valid peripheral digital copy of the registration to the second mobile device, to select a limitation to prevent the valid peripheral copy of the registration from being used on the second mobile device to make other valid digital copies of the registration.
 16. The system of claim 15, wherein the first mobile device is further configured for: notifying the registration authority that the validity of the peripheral digital copy of the registration has been revoked.
 17. A computer program product for managing digital copies of a registration of a specified physical object with a registration authority, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a computer to cause the computer to: receive at a first mobile device a master digital copy of the registration, the registration being proof that the specified physical object has been registered with a registration authority; and transmit at a first mobile device a valid peripheral digital copy of the registration showing that the specified physical object has been registered with the registration authority, the valid peripheral digital copy of the registration having been made by the first mobile device from the master digital copy of the registration and sent from the first mobile device to the second mobile device and including a security feature preventing the valid peripheral digital copy of the registration from being used to make other valid digital copies of the registration that would show registration of the specified physical object with the registration authority to limit copying of the registration.
 18. The computer program product of claim 17, the program instructions executable by the computer to further cause the computer to: transmit the master digital copy of the registration to an electronic device, whereby the electronic device is capable of being used to determine that the master digital copy of the registration is valid.
 19. The computer program product of claim 18, wherein the computer comprises the first mobile device, and wherein the receiving the master digital copy of the registration, the transmitting the valid peripheral digital copy of the registration, and the transmitting the master digital copy of the registration are all performed by the first mobile device.
 20. The computer program product of claim 18, wherein the receiving the master digital copy of the registration is by the first mobile device, wherein the transmitting the valid peripheral digital copy of the registration is from the first mobile device to the second mobile device and occurs during a first face to face encounter between a user of the first mobile device and a user of the second mobile device, and wherein the transmitting the master digital copy of the registration to the electronic device is from the first mobile device and occurs during a second face to face encounter between the user of the first mobile device and a user of the electronic device. 