Secure digital fingerprint key object database

ABSTRACT

A data store to store and access digital records is provided, and a key object record is initialized in the data store to store data associated with a physical key object. A digital fingerprint of the physical key object is stored in the key object record. Another digital record is created in the data store that is not the key object record. The digital record is linked to the digital fingerprint of the physical key object. The linking is arranged to provide secure control access to the linked digital record. A tendered access key is received via a programmatic interface or user interface, and the data store is queried based on the tendered access key to identify a matching digital fingerprint of a key object. In a case that the querying identifies the matching digital fingerprint of the key object within a prescribed level of confidence, access to the linked digital record secured by the key object is granted.

CROSS REFERENCE TO RELATED APPLICATIONS

This patent application is a Continuation of U.S. patent applicationSer. No. 16/254,379, filed Jan. 22, 2019, which claims benefit of U.S.Provisional Patent Application No. 62/620,388, filed Jan. 22, 2018, theentirety of which are incorporated herein by reference.

COPYRIGHT NOTICE

COPYRIGHT© 2018-2021 Alitheon, Inc. A portion of the disclosure of thispatent document contains material which is subject to copyrightprotection. The copyright owner has no objection to the facsimilereproduction by anyone of the patent document or the patent disclosure,as it appears in the Patent and Trademark Office patent file or records,but otherwise reserves all copyright rights whatsoever. 37 C.F.R. §1.71(d).

BACKGROUND

Technical Field

The present disclosure generally relates to a granting or denying accessto digital information based on control of a physical device. Moreparticularly, but not exclusively, the present disclosure relates todevices, methods, and systems that utilize a physical object, which maybe called a “key object.” to securely control access to a digital objectthat may comprise, for example, a provenance history or pedigree of aphysical object.

DESCRIPTION OF THE RELATED ART

Some aspects of technologies and related art that may be useful inunderstanding the present invention are described in the followingpublications, which are each incorporated herein by reference in theirrespective entirety:

U.S. patent application Ser. No. 11/277,133, which is also U.S. Pat. No.7,676,433, to Ross et al, which describes, among other things, secureconfidential authentication with private data;

U.S. patent application Ser. No. 15/862,556, which is also publishedU.S. Patent Publication No. 2018/0144211 A1 by Ross et al., whichdescribes, among other things, a database for detecting counterfeititems using digital fingerprint records;

U.S. patent application Ser. No. 13/618,362, which is also U.S. Pat. No.9,152,862 by Ross et al., which describes, among other things,embodiments of digital fingerprinting;

U.S. patent application Ser. No. 13/618,362, which is also U.S. Pat. No.9,152,862 B2 by Ross et al., which describes, among other things,embodiments of object identification and inventory management;

U.S. patent application Ser. No. 14/531,724, which is also U.S. Pat. No.9,443,298 B2 by Ross et al., which describes, among other things,digital fingerprinting object authentication and anti-counterfeitingsystems;

U.S. patent application Ser. No. 15/436,631, which is also U.S. Pat. No.10,037,537 B2 by Withrow et al., which describes, among other things,personal history in track and trace systems; and

U.S. patent application Ser. No. 15/436,616, which is also U.S. PatentPublication No. 2017/0243230 A1 by Ross et al., which describes, amongother things, embodiments of preserving authentication under itemchange.

Property is commonly divided into two categories, real property (i.e.,realty or land) and personal property (i.e., personalty or chattels).Unlike real property registries, only a few centralized registries ofpersonal property are in operation. Common personalty registriescurrently employed are the vehicle and vessel registries operated byfederal and state agencies. Currently existing personalty registriesgenerally depend upon general object descriptions and/or external oraffixed identifiers to link a registered object, such as a licenseplate, to connect an object of personal property to the digital recordcontaining its object information. Currently, there exists nocentralized resource for recordation and verification of personalproperty provenance without the use of an externally affixed identifierand/or general description of the physical characteristics (e.g.,make/model, year, VIN number, dimensions, color, etc.). Known systemsare therefore vulnerable to the loss of an affixed identifier, confusionbetween similar objects, and to the counterfeiting of either an objectand/or an identifier.

In addition, there exists no centralized system for personal propertyregistration that offers certainty of identification as well asprovenance, without relying on affixed identifiers (i.e., identityproxies) or object descriptions. A system based on identifying objectsusing only the object's own inherent or native features is needed toprovide an effective barrier to theft, counterfeiting, and othermischief. Stolen and counterfeit personal property items represent asignificant problem in global commerce, causing participants,underwriters, law enforcement, and others billions in losses every year.Some conventional publications have recently estimated that the totalvalue of counterfeit goods sold worldwide per annum may be as high as$1.8 Trillion.

All of the subject matter discussed in the Background section is notnecessarily prior art and should not be assumed to be prior art merelyas a result of its discussion in the Background section. Along theselines, any recognition of problems in the prior art discussed in theBackground section or associated with such subject matter should not betreated as prior art unless expressly stated to be prior art. Instead,the discussion of any subject matter in the Background section should betreated as part of the inventor's approach to the particular problem,which, in and of itself, may also be inventive.

BRIEF SUMMARY

The following is a summary of the present disclosure to provide anintroductory understanding of some features and context. This summary isnot intended to identify key or critical elements of the presentdisclosure or to delineate the scope of the disclosure. This summarypresents certain concepts of the present disclosure in a simplified formas a prelude to the more detailed description that is later presented.

The device, method, and system embodiments described in this disclosure(i.e., the teachings of this disclosure) enable a physical object of anytype to be used as a key that grants access to a same or differentphysical object, or a digital object (e.g., a digital record, digitalfile, or any other type of digital information). A digital fingerprintfor the physical object is generated, and the digital fingerprint islinked to the object that will be secured. Subsequent access to thesecured object is granted to an interested entity when the interestedentity is able to generate or otherwise acquire access to a digitalfingerprint of the physical object (e.g., the physical key object).

The following is a summary of the present disclosure to provide a basicunderstanding of some features and context. This summary is not intendedto identify key or critical elements of the disclosure or to delineatethe scope of the disclosure. Its sole purpose is to present someconcepts of the present disclosure in simplified form as a prelude to amore detailed description that is presented later.

A non-transitory computer-readable storage medium whose stored contentsconfigure a computing system to perform a method may be summarized asincluding provisioning a data store operatively coupled to the computingsystem for storing and accessing digital records; initializing a keyobject record in the data store to store data associated with a physicalkey object; storing a digital fingerprint of the physical key object inthe key object record; creating a digital record in the data store thatis not the key object record; linking the digital record to the digitalfingerprint of the key object to securely control access to the linkeddigital record; receiving a tendered access key via a programmatic oruser interface coupled to the computing system; querying the data storebased on the tendered access key to identify a matching digitalfingerprint of a key object; and in a case that the querying stepidentifies a matching digital fingerprint of a key object within aprescribed level of confidence, granting access to the linked digitalrecord secured by the matching key object.

The method may further include authenticating a user as a proprietor ofthe linked digital record based on an access key tendered by the user;responsive to input from the authenticated user, modifying the digitalrecord to enable a second key object to grant access to the digitalrecord secured by the first key object; initializing a second key objectrecord in the data store to store data associated with the second keyobject; storing a digital fingerprint of the second key object in thesecond key object record; and further linking the linked digital recordto the digital fingerprint of the second key object. The first keyobject may permit first access rights to the linked digital record andthe second key object may permit second access rights to the linkeddigital record, where the second access rights are different from thefirst access rights. The linked digital record secured by the key objectmay correspond to a first physical object, and the digital record mayinclude a digital fingerprint acquired from the first physical objectfor uniquely and reliably identifying or authenticating the firstphysical object. The first physical object may be the physical keyobject. The first physical object may be a different object from thephysical key object. The linked digital record may include or link tohistorical provenance data of the physical object. The granted accessmay be circumscribed by permissions stored in the key object record orthe linked digital record. The linked digital record may include digitalpedigree data of the first physical object; and permissions stored inthe data store in association with the matching access key may permitadditions to the stored pedigree data. The pedigree data may includesupplemental context data comprising location and/or other metadata,media, or sensor data. The pedigree data may include supplementalcontext data comprising records of purchase or transfer of the firstphysical object. The first key object may be a certificate ofauthenticity of the first physical object.

The method may further include generating a digital companion as acomponent of the digital pedigree to the first physical object, whereinthe digital companion is a representation created by aggregating varioussensor data acquired in relation to the physical object over a selectedperiod of time.

The method may further include generating the digital companion based onoptical sensor data to create the structure and texture of the digitalcompanion; and creating an object-specific 3D digital re-creation of thefirst physical object based on the digital companion.

The method may further include forming an aggregate digital companion,by aggregating each component of the first physical object, using nestedauthentication.

The method may further include receiving an access key via a third-partyapp or user interface; authenticating the access key based onidentifying a matching key object record in the data store; andconditioned on the authenticated key granting rights to change accessrights, changing the access rights to the corresponding digital recordto enable use of credentials comprising at least one of a specified username, a specified password, and a second key object defined by a digitalfingerprint of the second key object.

The method may further include receiving an access key via a third-partyapp or user interface; authenticating the access key based onidentifying a matching key object record in the data store; receivingcertification data via the third-party app or user interface; andconditioned on the matching key object record permitting addition ofcertification data, storing the certification data as pedigree data of aphysical object record linked to the matching key object record.

A computer-implemented method may be summarized as including acquiring aunique digital fingerprint of a first key object; storing the digitalfingerprint of the first key object in a key object record of a datastore; creating a digital record in a data store that is not the keyobject record; linking the digital record in the data store to thedigital fingerprint of the first key object to securely control accessto the digital record; receiving a tendered access key; querying thedata store based on the tendered access key to identify a matchingdigital fingerprint of a key object; and in a case that the queryingstep identifies a matching digital fingerprint of a key object within aprescribed level of confidence, granting access to the linked digitalrecord secured by the matching key object.

Granting access to the linked digital record secured by the matching keyobject may include transferring the linked digital record to securelycomplete a transaction involving the linked digital record.

The computer-implemented method may further include receiving an accesskey tendered via a programmatic or user interface; authenticating a useras a proprietor of the digital record secured by the first key objectbased on the access key; responsive to input from the authenticateduser, modifying the digital record to enable a second key object togrant access to the digital record secured by the first key object;initializing a second key object record in the data store to store dataassociated with the second key object; storing a digital fingerprint ofthe second key object in the second key object record; and furtherlinking the digital record to the digital fingerprint of the second keyobject to enable access to the digital record without requiring thefirst key object. The first key object may permit first access rights tothe digital record and the second key object may permit second accessrights to the digital record, where the second access rights aredifferent from the first access rights. The linked digital record mayinclude sensitive data so that the sensitive data is protected byrequiring that a token comprising a digital fingerprint of the first orsecond key object be presented to access the sensitive data.

Additional aspects and advantages of this disclosure will be apparentfrom the following detailed description of preferred embodiments, whichproceeds with reference to the accompanying drawings.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

To enable the reader to realize one or more of the above-recited andother advantages and features of the present disclosure, a moreparticular description follows by reference to specific embodimentsthereof which are illustrated in the appended drawings. Non-limiting andnon-exhaustive embodiments are described with reference to the followingdrawings, wherein like labels refer to like parts throughout the variousviews unless otherwise specified. The sizes and relative positions ofelements in the drawings are not necessarily drawn to scale. Forexample, the shapes of various elements are selected, enlarged, andpositioned to improve drawing legibility. The particular shapes of theelements as drawn have been selected for ease of recognition in thedrawings.

Understanding that these drawings depict only some embodiments of thedisclosure and are not therefore to be considered limiting of its scope,the present disclosure will be described and explained with additionalspecificity and detail through the use of the accompanying drawings inwhich:

FIG. 1 is a simplified block diagram of one example of a secure digitalfingerprint key object database system consistent with the presentdisclosure.

FIG. 2 is a simplified block diagram of one example of a secure digitalfingerprint key object database system illustrating establishment of asecond provenance or certification or both in the pedigree of a digitalobject.

FIG. 3 is a simplified flow diagram of an example process to implement asecure digital fingerprint key object database.

FIG. 4 is a simplified illustration of selected features of securedigital fingerprint key object database system operation.

DETAILED DESCRIPTION

Reference will now be made in detail to embodiments of the inventiveconcept, examples of which are illustrated in the accompanying drawings.The accompanying drawings are not necessarily drawn to scale. In thefollowing detailed description, numerous specific details are set forthto enable a thorough understanding of the inventive concept. It shouldbe understood, however, that persons having ordinary skill in the artmay practice the inventive concept without these specific details. Inother instances, well-known methods, procedures, components, circuits,and networks have not been described in detail so as not tounnecessarily obscure aspects of the embodiments.

The device, method, and system embodiments described in this disclosure(i.e., the teachings of this disclosure) a physical object of any typeto be used as a key that grants access to a same or different physicalobject, or a digital object (e.g., a digital record, digital file, orany other type of digital information). A digital fingerprint for thephysical object is generated, and the digital fingerprint is linked tothe object that will be secured. Subsequent access to the secured objectis granted to an interested entity when the interested entity is able togenerate or otherwise acquire access to a digital fingerprint of thephysical object (e.g., the physical key object).

Digital pedigree” or simply “pedigree” in the present disclosure refersto a digital file that contains information about an object. The objectmay be physical or digital. For a physical object, the pedigree may alsobe called a “digital companion.” A digital companion supports the notionthat a physical object may have value separate from its physical makeup.Thus, for example, a bottle of wine once owned by Humphrey Bogart may beperceived by some to be more valuable than the same vintage not owned byHumphrey Bogart. Here, the information on ownership history (e.g.,historical provenance data) is the digital companion of the physicalbottle of wine. The digital companion may contain any type or volume ofdata. The digital companion may contain a digital fingerprint or link toa digital fingerprint, for example. The digital fingerprint will begenerated as described herein from the physical object. The digitalcompanion may contain a physical model of the physical object (e.g. likethe physical model created for model-based digital fingerprinting). Inthe present disclosure, for simplicity, the term digital pedigree (orsimply pedigree) will be used with the understanding that the digitalpedigree may include a digital companion as appropriate to the context.

Data associated with the digital pedigree may be referred to as digitalpedigree data. Various digital pedigree data, as described in thepresent disclosure, includes data associated with a particular physicalobject, context data, supplemental context data (e.g., location data,metadata, media such as audio and video, scientific data, sensor data,records of purchase, records of transfer of the associated physicalobject, certification data, authentication data, and many other types ofdata. The pedigree data may be added to, subtracted from, modified, oracted on in other ways at various times.

This disclosure provides for any physical object to be the means forcontrolled (i.e., secure) access to any digital object. The physicalobject may interchangeably be referred to as the “key object,” “physicalkey object,” or some other like term. The digital object may be anydigital asset or file, such as a digital data store record. The digitalobject may be referred to as a digital record, a digital file, or anyother like term. In some applications, the digital object may be orinclude a pedigree or some other information related to possession andownership interest of a physical asset or a digital asset. A physicalobject may give access to a digital record that contains its own historyand identification data (“pedigree”), but the present disclosure may beapplied for virtually any physical object to be used to grant or controlaccess to any digital object.

A physical object from which a digital fingerprint may be extracted(i.e., “a key object,” “physical key object,” or the like) may bedefined, and a second object (e.g., “a pedigreed object”) whose digitalpedigree may be accessed through the digital fingerprint of the keyobject may be defined. In some embodiments, the key object and thepedigreed object may be the same object. As discussed herein, onepurpose of a key object is to give its holder specific access or, inother words, control access, to a digital pedigree of the pedigreedobject. It should be understood where not specifically called out thataccess to a pedigree in some embodiments will always require possessionof the corresponding key object or to information such as a password orpersonal identification number (PIN) proving the accessor has alegitimate relationship with the key object. In some embodiments, accessmay be granted to a user who has additionally or only a digitalfingerprint of the key object.

When a protected digital record is created, the protected digital recordis linked to the digital fingerprint of a specific object (i.e., the keyobject). The digital record may comprise a digital asset, information,an outcome, or some other information. The digital record is protectedin the understanding that a digital fingerprint is required in at leastsome embodiments to access the digital record. The key object may or maynot have some other relationship to the contents of the digital recordbesides being its key, but such is not a requirement, at least in someembodiments. Access to the digital record then may be obtained in one ofseveral ways. In one simple case, access may be obtained by generatingthe digital fingerprint of the key object, and submitting the digitalfingerprint to a particular computing system. The computing systemreferred to here, which is further described herein, is configured torealize (e.g., provide, enable, support, facilitate, or the like) atrust proxy scheme consistent with the present disclosure. The computingsystem checks that the digital fingerprint properly matches the recordfor the key object in the digital record. If such a match isestablished, the computing system grants access to the digital record ordigital object secured by the key object, circumscribed by, or otherwisein accordance, with permissions specified by the key object record.Access may be granted to a pedigree and/or to any other type ofaccess-controlled object, information, or outcome, which may include,for example, access to a secure space, that the key object is designatedto unlock.

In some embodiments, the secured or otherwise protected digital recordmay be changed to allow another object or set of objects (i.e., keyobjects) to grant access. Additionally, or alternatively, the originaldigital record may be arranged to recognize multiple key objects ashaving sufficient authority to each grant the same or different accessrights. After the rights to access the protected digital record havebeen transferred or shared by a possessor of the original key object orits digital fingerprint, the other objects now become key objects.Hence, any one or more key objects may be understood as a digital key toa secure digital record or as a physical object capable of generating adigital key to the secure digital record. In some embodiments, multipledigital keys may be needed to gain access to a secure digital record, ora combination of digital keys may be needed to gain access to the securedigital record. Gaining access may include providing the ability toread, execute, unlock, modify, supplement, delete, or otherwise controlthe digital record. Gaining such access may include unlocking a digitalasset, unlocking a digital file, or permitting some other outcome. Inthese or other embodiments, one digital key may be arranged to controlmultiple outcomes.

In some scenarios, access granted might be limited or unlimited or evencompartmentalized, for example, because an object is owned by jointtenants or tenants-in-common or is involved in some other complexownership structure or is subject to some type of structured accessamong those who do or could potentially have access. Access examples arenot limiting. Access granting within preferred systems may be structuredin any desired manner, such as staggered, incremental, layered, partial,or access may take any other form or combinations of forms of knownmethods of access control and may require the use of one or many keys orkeys of different types or a particular combination of keys.

In some embodiments, instead of granting access rights to other objectsas described, the key object can allow access through, for example, auser name and password, a digital certificate, or any other means. Thekey object can also in some cases allow uncontrolled access to thedigital record. Key objects can establish when the digital record islinked to the digital fingerprint of the key object. Thereafter, in someembodiments, other key objects or user name/passwords may receive theaccess rights granted to them in that record, assuming that the keyobject used to make those changes had previously been used to grantaccess rights that allowed those changes.

One embodiment of this disclosure teaches a method to use a digitalfingerprint to create a digital companion as a component of the digitalpedigree to a physical object. A digital companion may be arepresentation created by snapshotting, accumulating, or otherwisestoring or referencing various sensor data from or related to the keyobject across time. Such techniques may be used to create anobject-specific three dimensional (3D) digital re-creation of theoriginal physical object. The digital companion may be made usingoptical sensor data, for example, to create the structure and texture ofthe digital companion or, for an aggregate digital companion, may beitself aggregated from each component of the original physical object,using nested authentication.

Digital Fingerprinting

The term “digital fingerprint” in all its grammatical forms andconstructs, is used throughout the present specification and claims torefer to a computationally unique digital identifier of a physicalobject or a portion of a physical object. To the limitations of theavailable computational resources, each and every digital fingerprintidentifying a determined portion of a physical object is different fromeach and every other digital fingerprint identifying a differentphysical object or identifying a different portion of the same physicalobject. And to the limitations of the available computational resourcesand the preservation of the determined portion of the physical object onwhich a first digital fingerprint is generated, each and everysubsequent digital fingerprint identifying the same determined portionof the same physical object is statistically the same as the firstdigital fingerprint. In at least some cases, a digital fingerprint, asthe term is used herein, is generated in a method that includesacquiring a digital image, finding points of interest within thatdigital image (e.g., generally, regions of disparity where “something”is happening, such as a white dot on a black background or the inverse),and characterizing those points of interest into one or more featurevectors extracted from the digital image. Characterizing the points ofinterest may include assigning image values, assigning or otherwisedetermining a plurality of gradients across the image region, orperforming some other technique. The extracted feature vectors may ormay not be analyzed or further processed. Instead, or in addition, theextracted feature vectors that characterize the points of interest in aregion are aggregated, alone or with other information (e.g., withlocation information) to form a digital fingerprint.

“In embodiments of the present disclosure, digital fingerprintingincludes the creation and use of digital fingerprints derived fromproperties of a physical object. The digital fingerprints are typicallystored in a repository such as a register, a physical memory, an array,a database, data store, or some other repository. Storing the digitalfingerprint in the repository may include or in some cases be referredto as inducting the respective physical object into the repository.Digital fingerprints, whether immediately generated or acquired from arepository, may be used to reliably and unambiguously identify orauthenticate corresponding physical objects to an acceptable level ofcertainty, track the physical objects through supply chains, and recordtheir provenance and changes over time. Many other uses of digitalfingerprints are of course contemplated.

Digital fingerprints store information, preferably in the form ofnumbers or “feature vectors,” that describes features that appear atparticular locations, called points of interest, of a two-dimensional(2-D) or three-dimensional (3-D) object. In the case of a 2-D object,the points of interest are preferably on a surface of the correspondingobject; in the 3-D case, the points of interest may be on the surface orin the interior of the object. In some applications, an object “featuretemplate” may be used to define locations or regions of interest for aclass of objects. The digital fingerprints may be derived or generatedfrom digital data of the object which may be, for example, image data.

While the data from which digital fingerprints are derived is oftenimages, a digital fingerprint may contain digital representations of anydata derived from or associated with the object. For example, digitalfingerprint data may be derived from an audio file. That audio file inturn may be associated or linked in a repository (e.g., a database, datastore, memory, or the like) to an object. Thus, in general, a digitalfingerprint may be derived from a first object directly, or it may bederived from a different object (e.g., a ile) linked to the firstobject, or a combination of two or more sources. In the audio example,the audio file may be a recording of a person speaking a particularphrase. The digital fingerprint of the audio recording may be stored aspart of a digital fingerprint of the person speaking. The digitalfingerprint (e.g., the digital fingerprint of the person) may be used aspart of a system and method to later identify or authenticate thatperson, based on their speaking the same phrase, in combination withother sources.

Returning to the 2-D and 3-D object examples discussed herein, featureextraction or feature detection may be used to characterize points ofinterest. In an embodiment, this may be done in various ways. Twoexamples include Scale-Invariant Feature Transform (or SIFT) and SpeededUp Robust features (or SURF). Both are described in the literature. Forexample: “Feature detection and matching are used in image registration,object tracking, object retrieval etc. There are number of approachesused to detect and matching of features as SIFT (Scale Invariant FeatureTransform), SURF (Speeded up Robust Feature), FAST, ORB etc. SIFT andSURF are most useful approaches to detect and matching of featuresbecause of it is invariant to scale, rotate, translation, illumination,and blur.” MISTRY, Darshana et al., Comparison of Feature Detection anMatching Approaches: SIFT and SURF, GRD Journals—Global Research andDevelopment Journal for Engineering|Volume 2|Issue 4|March 2017.

In an embodiment, features may be used to represent information derivedfrom a digital image in a machine-readable and useful way. Features maycomprise point, line, edges, blob of an image, etc. There are areas suchas image registration, object tracking, and object retrieval etc. thatrequire a system or processor to detect and match correct features.Therefore, it may be desirable to find features in ways that areinvariant to rotation, scale, translation, illumination, and/or noisyand blurred images. The search of interest points from one object imageto corresponding images can be very challenging work. The search maypreferably be done such that the same physical interest points may befound in different views. Once located, points of interest and theirrespective characteristics may be aggregated to form a digitalfingerprint, which may include 2-D or 3-D location parameters.

In an embodiment, features may be matched, for example, based on findinga minimum threshold distance. Distances can be found using Euclideandistance, Manhattan distance, or other suitable metrics. If distances oftwo points are less than a prescribed minimum threshold distance, thosekey points may be known as matching pairs. Matching a digitalfingerprint may comprise assessing a number of matching pairs, theirlocations, distance, or other characteristics. Many points may beassessed to calculate a likelihood of a match, since, generally, aperfect match will not be found. In some applications a “featuretemplate” may be used to define locations or regions of interest for aclass of objects.

The term, “induction,” as used in the present disclosure, refers to actsthat include generating and storing, or otherwise acquiring access to,at least one digital fingerprint of a physical object, and storing theone or more digital fingerprints in a repository. Each stored digitalfingerprint may be communicatively linked (i.e., associated) with otherinformation related to the physical object. Hence, induction may alsoinclude acts that store additional information related to the physicalobject in a same or different repository. The additional information maybe stored in association with any number of digital fingerprints. Theassociation may include storing associated data in a common or sharedrepository record, communicatively linking one or more repositoryrecords together, or via other techniques known in the art to linkinformation. For the sake of illustration and not limitation, inductionmay include storing one or more digital fingerprints in a new orexisting repository record and further storing some other type ofinformation, whether related to one or both of the physical object andthe digital fingerprint, in a same or linked repository record.

Scanning

In the present disclosure, the term, “scan,” in all of its grammaticalforms, refers illustratively and without limitation to any and all meansfor capturing an image or set of images, which may be in digital form ortransformed into digital form. Images may, for example, be twodimensional (2-D), three dimensional (3-D), or in the form of video.Thus a scan may refer to one or more images or digital data that definessuch an image or images captured by a scanner, a camera, an imager, a3D-sense device, a LiDAR-based device, a laser-based device, a speciallyadapted sensor or sensor array (e.g., a CCD array), a microscope, asmartphone camera, a video camera, an x-ray machine, a sonar, anultrasound machine, a microphone (i.e., any instrument for convertingsound waves into electrical energy variations), and the like. Broadly,any device that can sense and capture either electromagnetic radiationor a mechanical wave that has traveled through an object or reflectedoff an object, or any other means to capture surface or internalstructure of an object, is a candidate to create a scan of an object.Various means to extract features from an object may be used. Forexample, features may be extracted through sound, physical structure,chemical composition, or many other means. Accordingly, while the term,images, and cognates of the term, images, are used to form the digitalfingerprints described herein, the broader application of scanningtechnology will be understood by those of skill in the art. In otherwords, alternative means to extract features from an object should beconsidered equivalents within the scope of this disclosure. Along theselines, terms such as “scanner,” “scanning equipment,” and the like asused herein may be understood in a broad sense to refer to any equipmentcapable of carrying out scans as described above, or to equipment thatcarries out scans as described above, as part of their function.

Authentication

In this application, different forms of the words “authenticate” and“authentication” will be used broadly to describe both authenticationand attempts to authenticate, which comprise creating a digitalfingerprint of the object. Therefore, “authentication” is not limited tospecifically describing successful matching of inducted objects orgenerally describing the outcome of attempted authentications. As oneexample, a counterfeit object may be described as “authenticated” evenif the “authentication” fails to return a matching result. In anotherexample, in cases where unknown objects are “authenticated” withoutresulting in a match and the authentication attempt is entered into arepository (e.g., a database) for subsequent reference, this action toomay be described as “authentication” or “attempted authentication,” andthis action may also, post facto, be properly described as an induction.An authentication of an object may refer to the induction orauthentication of an entire object or of a portion of an object.

Physical Objects to Control Access to Digital Objects

A physical object from which a digital fingerprint may be extracted(i.e., “a key object”) is defined, and a second object (i.e., “thepedigreed object”) whose digital pedigree (or any information oroutcome) may be accessed through the digital fingerprint of the keyobject is defined, as introduced herein. In some embodiments, thepurpose of the key object is to give its holder specific access, inother words control access, to the digital pedigree of the pedigreedobject. It should be understood where not specifically called out thataccess to a pedigree in at least some embodiments always requirespossession of the corresponding key object or to information such as apassword or PIN proving the accessor has a legitimate relationship withthe key object. In some embodiments access may be granted to a user whohas additionally or only a digital fingerprint of the key object. Insome embodiments, the key object holder may modify the terms of access,including granting controlled access to others.

The key object and the pedigreed object need not be the same object.Indeed, the pedigreed object may be itself purely digital. For example,the pedigreed object may be a digital contract that can, for example, beset up so to only be read by possessors of the physical key object. Thepedigree may be or otherwise include certain digital information linkedto the digital fingerprint of the key object, including entirely digitalrepresentations, both visual and non-visual, such as a digitalcompanion. The pedigree may include any information, including actualpedigree information, that might be digitally associated with thepedigreed object and accessible through the key object's digitalfingerprint.

In at least some embodiments, one primary purpose of a key object is tobe a token for the pedigreed object. As an example of where the keyobject is a token for accessing a different pedigreed object, a digitalphotograph may be made accessible throughout the possession of a key,which may, for example, be a certificate of authenticity for the digitalphotograph. The digital fingerprint of the physical certificate thenprovides a mechanism for access to the digital photograph.

In an embodiment, each transaction related to a pedigreed object updatesa data store showing ownership or other relationships to the object.When the possessor has or is ready to engage in a transaction thatconcerns or relates to the object, such as insuring, renting, or sale ofthe object, the possessor may send information, for example a link suchas a secure URL, to a digital fingerprint pedigree and/or digitalcompanion data store containing the record and/or curated recordsrelated to the object.

FIG. 4 provides a simplified illustration. Diagram 400 is a simplifiedillustration of one example of system operation. Here, a “holder” 402 isa person or entity having possession (or an equivalent of possessionsuch as secure, exclusive physical access) of a physical key object 404.The key object will be used to secure access to a physical object 410 inthis example. A digital fingerprint 412 of the key object is generatedfrom scanned image data, for example, and the digital fingerprint isstored in a secure data store 420—here serving as the digital pedigreedatabase. In the data store, a stored digital companion 422 isassociated with the physical object 410. The holder of the key object404 may hold a copy of the digital fingerprint of the key object 404, orthe holder can re-generate the digital fingerprint as needed since hehas possession of the key object 404. That digital fingerprint gives theholder access to the companion 422, and the holder may be permitted toset permissions, for example, to read, write or update, by interactionwith the database system that manages or has access to the data store420.

As noted at block 428, the holder controls access to the digitalpedigree and can curate what is exposed to a third party. In oneexample, see block 430, the holder 402 may send a link such as a secureURL, to a buyer, bailee, renter, etc. The secure link in at least onecase is to the digital fingerprint pedigree 422 and/or digital companiondata store 420 containing the record or curated records related to thephysical object 410.

Data shared via this process may contain, for example:

Records showing information pertaining to the specific individual orobject

Digital companions or other representations of the individual or object

Digital pedigree and, optionally, a transaction history

Digital fingerprint(s) that may be used for authentication orverification

Contract terms, such as terms of sale, where pricing and/or otherpreferred transaction information is specified or negotiated

Regardless of the content of the digital pedigree, the teachings of thisdisclosure provide the ability for digital fingerprint holders to curatewhat data is exposed in the pedigree. Additional non-verified data mayin some cases be added to the pedigree by anyone, by a select group, bysomeone with access to the pedigreed object, or by the possessor of the“key” object. In these cases, however, the non-verified data will beflagged accordingly as non-verified.

In some cases, an object may serve as both the pedigreed object and itsown key object. Consider an example where digital pedigree data of avaluable painting is accessed from the painting itself. Here thepainting is acting as both the key object and the pedigreed object. Or,the pedigree information may be linked to a certificate of authenticityrelated to the painting. In this example, the certificate acts as a keyobject that can enable access to all pedigree information for thepainting, which again is the pedigreed object.

In at least one embodiment, the attributes of an object may reside intwo places. The attributes may reside physically in the object itself ifthe object is physical, and alternatively or additionally, theattributes may reside within the pedigree of the object, securely linkedthrough a digital fingerprint. The tight linkage of a physical object tothe digital pedigree of that object enables all relevant forms of value,whether physical or digital, to accrue to the object itself. In someembodiments, “physical object plus securely linked pedigree” may replacethe physical object itself in whole or in part as the bearer of value.

In embodiments described herein, the term, digital companion, is usedbroadly in reference to any unique digital representation within thedigital pedigree. A “digital companion” or object-specific,multi-dimensional model of the physical object is created at eachinduction or authentication of the object and linked into the object'sdigital pedigree. In some embodiments, a digital companion may be arepresentation created by snapshotting various sensor data from theobject across time. This data may be used to create an object-specific3D digital re-creation of the original physical object.

Throughout this disclosure, the term “sensitive” or “sensitive dataelements” is meant to broadly encompass all forms of data intended to besecured or kept private. In many cases, sensitive data is more valuableto an individual if the sensitive data is kept private.

Trust Proxy and Ownership

Digital Fingerprint Pedigree and Data Management

In one embodiment, the digital pedigree of an object may contain all therelevant activity and transaction history of the object, includingrecords of how the object was created, transferred, or sold in the past.This disclosure teaches, among other things, the ability to modify thepedigree through possession of a specific object (a key object) whosedigital fingerprint forms an access key to the digital pedigree. Thatis, modification of the pedigree may be controlled by possession of thekey object. If, for example, that pedigree includes data that allows thechain of ownership to be established from manufacturer to currentpossessor of the corresponding physical object, that digital pedigreebecomes a proof of ownership as well as proof of authenticity. While thedigital pedigree may only be altered by someone who has, or by someonewho has had, possession of the digitally-fingerprinted key object, thisdisclosure's teachings also have in view the idea that third parties maybe granted different levels of access. The granted access may becircumscribed by permissions stored in the key object record or thelinked digital record. The access may, for example, be defined such as“read only” views or non-sensitive views that may allow the user to viewor add non-sensitive data to the pedigree.

Approaches taught in embodiments described herein allow generalinformation to be stored digitally and linked to an object for commonuse. Common use in this case means that the data is not consideredsensitive. Consider an example, where a gallery hosts artwork such aspaintings. A visitor could use sensor data from a smartphone to create adigital fingerprint the painting. Here, the painting serves as both thekey object and the pedigreed object. This would allow the user to linkto non-sensitive elements of the public-facing view of the object'sdigital pedigree, where he could, optionally, add to or view dataprovided by other viewers. Consider for example, a gallery viewingmaking public comments or providing feedback on the specific painting oraccessing comments made by other viewers. In effect, this creates avirtual ‘comments section’ specific to each unique object. In at leastsome cases, each viewer will have confidence that all comments are addedonly by others who have actually viewed the artwork.

Referring now to FIG. 1 , a simplified block diagram of a system 1300 isshown, arranged to implement a secure digital fingerprint key objectdatabase system consistent with an embodiment of the present disclosure.Here, a pedigreed, or a to be pedigreed, physical object 1410, 410 (FIG.2 , FIG. 4 , respectively) is associated with a key object 1302. The keyobject is under possession or control of a proprietor of the pedigreedobject, for example an owner or manufacturer of the pedigreed object.The pedigreed object may be any digital asset or digital or physicalobject. The proprietor or possessor of the pedigreed object has accessto a pedigreed object proprietor system 1316 to carry out operationsdescribed herein. The system 1316 may be realized as an interface to acomputing server 1310. The key object is scanned, and a digitalfingerprint is formed, 1304. The digital fingerprint of the key objectmay serve as a key to the pedigreed object. A pedigree record or dataset may be initialized, block 1306. The key object digital fingerprintand initial pedigree data of the corresponding pedigreed object arestored in a secure digital fingerprint key object database system whichmay be realized, for example, by computing server 1310. The computingserver 1310 stores the data in a data store 1314, utilizing any ofvarious known database technologies.

A third-party client system, software application, programmaticinterface, user interface 1318 or the like enables third-partyoperations and access rights to the pedigree or other digital asset asdefined by the key object. In operation, a third-party may receive a keyobject digital fingerprint from the proprietor, block 1320, for example,stored in a portable memory (e.g., thumb drive, flash drive, Internet ofThings (IoT) device, wearable computing device, smart phone or othermobile device, or any other such portable memory), or accessed by asecure link or URL. Rights circumscribed or otherwise defined by theproprietor using system or interface 1316 may enable the third-party toaccess certain data, block 1322, for example, aspects of the pedigreedata provided from data store 1314 via path 1321. The third-party usermay be granted access to modify or supplement the pedigree data. Thecomputing server 1320 returns only data permitted to be exposed by therights associated with the key object digital signature that wasprovided, block 1324.

In another embodiment, the combination taught here of a digital pedigreewith a digital fingerprint key to that pedigree may allow theestablishment, management, and/or administration of shared or fracturedownership of at least one physical object and its pedigree, where one ormore parties are concurrently listed as owners in the pedigree, orhaving other types of concurrent legal interests in the object. Thisembodiment enables multiple parties to receive the object and shareownership interests and other legal interests, and includes all thevarious types of joint ownership or interest arrangement, includingpossession, bailment, use, lease, rent, and other forms of concurrentinterests in an object. These systems, methods, and devices allowparticipants, for example, to select from various ownership schemes andcreate their own terms. In one example, each participant may be grantedfull ownership, or a percentage of ownership, based upon their varyingfinancial contribution. Any or all contractual terms of thesearrangements may be built into the pedigree. Consider a scenario where avaluable painting was purchased and shared between several parties.Depending on the scheme selected, each participant may have partial orfull ownership of the painting. Each participant will have their ownrights to, or benefits from, the painting, including the rights to sellif the underlying contract permits. This example is not limiting, otherexisting structures of shared interest and ownership may be substitutedfor the one herein described.

Referring now to FIG. 2 , a simplified block diagram similar to FIG. 1is shown. Accordingly, description of the common elements of FIG. 1 willnot be repeated. In FIG. 2 , a pedigreed object 1402 may be loaned ormade available to an expert system or person to be authenticated. Inthis example, the pedigreed object is likely to be a physical object,but it may be a digital asset. The pedigreed object 1402 has beenpreviously inducted into a repository (e.g., a register, a physicalmemory, an array, a database, data store, or some other repository) suchas database 1314. The expert interacts with a suitable client softwareapplication 1410, arranged for interfacing with the computing server1310. If that authentication is successful, the expert may add acertification 1414 into the digital pedigree at the appropriate timingand place. In this example, the expert client system 1410 submits thecertification 1412, optionally over a computationally communicativenetwork, to the central secure server 1310 to update the pedigree indata store 1314.

If the object 1402 being authenticated requires a physical key objectdifferent from the object being authenticated, the expert must haveaccess to that key object or a digital fingerprint derived from that keyobject, as well as to the object 1402 being authenticated. If the objectbeing authenticated is purely a digital object, the key object's digitalfingerprint “unlocks” the expert's access to the digital object for thepurpose of attempted authentication. In any event, the expert'spossession of the key object allows him to modify the pedigree of theauthenticated object via the database server 1310 once he hasestablished its authenticity or unauthenticity.

In some embodiments, the combination taught here of a digital pedigreewith a digital fingerprint key to that pedigree may also allow theestablishment of second provenance. At the point when an expert, say,authenticates the object, digital proof of that authentication may beentered by the expert into the object's digital pedigree; see block1416. That information then follows the object from then on as part ofthat pedigree.

In a system of the type illustrated in FIGS. 1 and 2 , a wide variety ofdatabase tables and records can be arranged using known technologies.Here a few examples are provided. A sample record may correspond to onedigital pedigreed object. The record may be maintained, for example, ina data store 1314 as shown in FIG. 2 . The record may have fieldsincluding a record number, first pointers, an identifier of the object,security information, and second pointers. The first pointers mayinclude for example, pointers to digital fingerprints of the pedigreedobject, other identifiers, or models of the object, and other pedigreeand transaction history data. Other fields in the record may comprise orpoint to one or more of a chain of possession table, a chain of titletable, legal terms and conditions, or the like. Each of these maycomprise a variety of data and metadata or both, depending on theapplication and types of objects of interest.

This third-party lending of the ability to update or modify a pedigreeshown in the second provenance example is just one example of a generalidea within the view of this disclosure, which is the ability to allowanother party to modify the digital pedigree of an object (e.g., adigital object or a physical object) based on the rights to modificationgranted by the owner of the pedigree and the digital fingerprint of thekey object he has been given. Those rights may differ for different keyobjects. The granted rights may have time limitations. Access to thepedigree linked to a digital fingerprint may be requested by a thirdparty or other recipient/holder of the object, such as an inquiry madeby a potential purchaser or holder by using the digital fingerprint ofthe object.

In a related embodiment, the exposure of data within a digital pedigreemay also be enabled to allow access by any or all others withoutallowing that pedigree to be modified. This viewing access may begranted in many ways. One way to grant viewing access, for example, maybe by a user name and password; another way may be through a “reducedrights key object” whose digital fingerprint allows access to thedigital pedigree but no ability to modify it; and still other ways arecontemplated. Any method of strategically organizing and controllinginformation and data access, such as layered, tiered, staggered,incremental, Chinese-walled or otherwise controlled access may be usedin combination with a key object system.

FIG. 3 is a simplified flow diagram of an example process to implement asecure digital fingerprint key object database. In this process, themethod comprises the following acts: provisioning a data storeoperatively coupled to the computing system for storing and accessingdigital records, block 1502; initializing a key object record in thedata store to store data associated with a physical key object, block1504; storing a digital fingerprint of the key object in the key objectrecord, block 1506; creating a digital record in the data store, block1508; linking the digital record to the digital fingerprint of the keyobject to securely control access to the digital record, block 1510;receiving a tendered access key via a programmatic interface or userinterface coupled to the computing system, block 1512; querying the datastore based on the tendered access key to identify a matching digitalfingerprint of a key object, block 1514; and in a case that the queryingstep identifies a matching digital fingerprint of a key object within aprescribed level of confidence (e.g., 75% confidence, 95% confidence,99.999% confidence, or some other level of confidence), granting accessto the linked digital record secured by the matching key object, block1516.

Digital pedigree and contextual data about each transaction or pedigreemay be used by many parties, such as appraisers, distributors,resellers, and merchants. Data included as part of a pedigree may bepre-packaged or pre-authorized for use by the possessor of the object.Various applications may use data from the pre-packaged orpre-authorized pedigrees for a range of purposes, such as aiding inonline sale listings for the object.

In one embodiment, a digital fingerprint may be used to facilitate thereturn of lost or stolen objects to their owner or possessor of record.In an example of this application, an individual comes across aseemingly lost or misplaced item of value. The finder may generate adigital fingerprint of the object and, if the object has an existingdigital pedigree, use that to discover information relating to ownershipor possession. The finder may also use a provided means to contact thelast possessor, perhaps anonymously. The means may include informationstored in a public repository, information stored in a digital recordaccessed by the digital fingerprint, or some other means. The lastpossessor of the object in the scenario would also have the option tomark an object as lost or stolen in digital fingerprint database. Anowner may, using the teachings of this disclosure, add to the digitalpedigree of a valuable object a non-access-controlled notice of, say,the intent to pay a reward for the return of the object.

In one embodiment, the taught approach provides the ability toautomatically update specific or general data or media related to thedigital fingerprint records. This ensures records are up-to-date andprovides convenience to users. For example, if a product warranty orinstructions were updated for the model of the object, the system wouldperform automated search and replace to ensure its general warrantydocumentation and instructions are current. In a similar embodiment, thesystem monitors for events such as product recalls and, optionally,updates the digital pedigree and may push out an alert to the relevantparties.

In one embodiment, the taught approach provides the ability, inassociation with a transaction, to enable selected users to review andincorporate data from online pedigrees related to the transaction. Forexample, in an online marketplace transaction, the goods beingexchanged, the individuals or entities involved in the transaction, andeven the finance and escrow services may all have existing pedigreesthat can be accessed by parties to the transaction for the purpose of,for example, determining their suitability. As part of this capability,online bots or other processes may scour the web for availableinformation, such as LinkedIn profiles, and other relevant informationfor incorporation into the pedigree(s).

In one embodiment, the teachings of this disclosure could be used inconcert with the teachings of U.S. Pat. No. 7,676,433: Secure(Confidential Authentication with Private Data. That patent disclosed asystem that connects a user, a company, or other web site providingservices, and a trusted holder of sensitive data about the user. Theteachings of the current disclosure could, for example, enable thepossession of a key object provided by the trusted holder of sensitivedata to the user to be used as a key granting access to requests thatthe user makes of the trusted holder.

Other supplemental context records, verified or non-verified, may beadded to a digital pedigree to increase the object's value, liquidity,or to help the process of future sales. Examples include: addinglocation and/or other metadata, media, historical provenance data, orsensor data, to records of purchase or transfer. Adding contextual datamay reduce risk and add significant value to an object. An example ofvalue creation would include establishing proof of prior or currentownership or use by a collector, celebrity, or historical figure. Anexample of risk reduction would be a buyer viewing a history oftransactions for an object and seeing that a number of people had paid aprice in line with the buyer's expectations. Some illustrative recordsare introduced in FIG. 2 .

Aggregating similarities between digital fingerprints and other pedigreeinformation, either partial or complete pedigrees, may be used to createmeta-pedigrees for classes and subclasses of objects. This meta-pedigreecould be used in parallel to a nested authentication approach to createa “nested pedigree” of the object. This nested pedigree may be used, forexample, to create or use analytics related to their similar objectclasses. Such aggregate information may include trend information, suchas number of similar items sold in a lot. This aggregate data may beshared with third parties, object owners, or object manufacturers toprovide relationship information for their object against its relevantclass or subclass.

In one embodiment, storing and accessing data by tendering a digitalfingerprint allows sellers to set the terms of sale on individualobjects. This data could be made available for specific-object pricingalgorithms enabling precise price discrimination. The teachings, forexample, may be used to enable dynamic price adjusting of physical goodswhere algorithms, such as those that already determine prices forclasses of objects, determine the price of individual physical goods atpoint of sale in real-time, such as buyers and sellers specifying directtransfer of funds to digital wallets or other payment addresses. In thisscenario, the price and transaction information of the object may becalculated at the time of sale as a response to using a digitalfingerprint of the object to facilitate the transaction. Furtherembodiments may include incorporating external feedback by providing amechanism that a buyer or recipient may suggest terms of sale orincorporating dynamic pricing methods, such as time-based pricing ofindividual objects, like discounting objects when they are perishableand close to their sale-by date. As a further elaboration of theembodiment, the information relevant to the transaction may beincorporated with distributed ledger technologies (e.g., blockchain)and/or cryptography-based currencies.

Method to Establish Ownership to an Object, Digital Pedigree, andRepresentations

The devices, methods, and systems of this disclosure (i.e., theteachings of this disclosure) provide or otherwise enable a means toestablish ownership of digital assets or data that are tied to physicalobjects. Those physical objects (“key objects”), which do not requireany other connection to the digital data beyond being used as a key tothe digital data, may be used to establish ownership of the digitaldata.

In some examples, as noted, the digital assets or data may include apedigree of a physical object. The pedigree may be linked to or part ofa digital fingerprint of the physical (pedigreed) object. In oneembodiment, each induction or subsequent transaction involving thepedigreed object is used to update a ledger and/or database related toit. In some embodiments, the ledger or database may be managed by acentral server system such as the server 1310 in FIG. 1 , coupled to adata store 1314. The data store may also be distributed, and the servermay be coupled to a network for remote communications. This databaseand/or ledger is the basis for the pedigreed object's modifiable digitalpedigree, the control of which is granted through the key object, ormore conveniently, through a digital fingerprint of a physicallypossessed key object.

In one embodiment, the key object and the pedigreed object are the sameobject. Because a person must be in possession of an object to generatea digital fingerprint, the ability to generate the fingerprint providesproof of current physical possession of, in this case, the pedigreedobject. This is true whether the digital fingerprint is used forinduction or for re-identification. Ownership along with physicalpossession may be established by linking within the digital pedigreerecord information that establishes or tends to enhance or support thelegitimacy of each transfer in the object's history. It should be clearthat essentially any digital information may be part of the pedigree ofthe object, including information about the same or other objects.

In one embodiment, the digital pedigree and/or digital representationmay be used in hypothecation of the object with or without physicaltransfer. Hypothecation, in this instance, enables a debtor to obtaingreater liquidity for their physical possessions or any other objects inwhich the debtor may hold an interest. A digital pedigree and/orrepresentation may, for example, be used in a collateralization processfor a debtor to secure a debt or as a condition precedent to the debt. Adigital pedigree and/or representation may also be used by third partyas part of a collateral pledge for the debtor, where the debtor assignstemporary ownership rights of the object and its digital pedigree to thecreditor. This method allows the collateralization to be performeddigitally without the presence or movement of the object and, due to theincorporation of digital fingerprints, greatly enhances the reliabilityof future identification of collateral whose possession is nottransferred to the lender.

In one embodiment, the ownership rights to the digital pedigree may beused to mitigate the credit risk of a creditor by providing a method forthe creditor to seize sufficient assets of the debtor. If the debtor isunable to pay his debt, the creditor possesses the digital collateralrelated to the key object or pedigreed object and therefore may claimits ownership, rescind access rights, or otherwise “digitally repossess”the object. This method allows the creditor to prove ownership of thekey object or pedigreed object, and revoke the digital rights to theobject to compensate for the lack of payment by the debtor. In oneexample an individual uses a valuable painting as collateral to gaincapital. During the desired transaction where credit is needed, theowner of the painting assigns temporary rights of the painting to thecreditor. Once the underlying contract that supplied the capital hasbeen fulfilled, the creditor relinquishes ownership back to the debtor.

In one embodiment, access and/or digital rights to a digital fingerprintmay be sent or revoked by the possessor of the key object, the pedigreedobject, or a third party. The value of a physical object comprises twoparts: the object itself and the securely-linked pedigree of an object.A Rolex watch, for example, has a great deal more value if it may beproven to be genuine. The use of the teachings of this disclosure enableat least the digital part of the transfer to be revoked if something(e.g., payment) doesn't take place by a specific time. In some cases,the digital part of the object may only be loaned for a set period oftime or the object itself loaned to an appraiser, museum, or some otherentity. When that time is passed, unless the former holder of the objectdoes something, the digital fingerprint of the key object no longer mayaccess the digital pedigree. If the pedigreed object itself is purelydigital, this loss of access to the pedigree may effectively remove allaccess to the object itself, limit access to the object, cause attempteduse of the object to be reported to the former holder, access to theobject to be restored to the former holder, or any of a number ofdifferent actions. In one embodiment, the teachings of this disclosuremay be used as an alternative to escrow or an enhancer to escrow.

Method to Connect an Object to a Data Store and Pedigree of its DigitalFingerprint

In one embodiment, the taught approach allows not just generalinformation to be stored digitally and linked to an object, but alsoinformation specific to a particular transaction to be so linked. Theteaching of this disclosure may be applied to any transaction having asecure digital component that will benefit from affirmativelycontrolling access to the component. Exemplary, but not limiting,circumstances where the present secure digital fingerprint key objectteaching may apply include transactions involving the sale, loan, orother transfer of the object itself, transactions involving high valueitems that can be forged or counterfeited, and transactions involvingitems that are extremely large or extremely small. Many othertransactions are contemplated. The teaching disclosed herein establishesa standardized means to transfer specific objects without relying onserialization or the addition of any ancillary materials such as labelsor tags. It does so by using the unique digital fingerprint of theobject as the key to allowing the transfer of the pedigreed object.

Tokenization

In one set of embodiments a digital fingerprint may be used as asubstitute for sensitive data elements. Here, the digital fingerprint ofthe key object acts as a non-sensitive equivalent or stand-in to thesensitive data elements. As an example, the digital fingerprint of thekey object, which an object that may have no extrinsic or exploitablemeaning or value outside of the present teaching, is used as a token.The token may stand-in for user names, passwords, or other sensitivedata elements. The naturally occurring uniqueness of the digitalfingerprint of the object as generated by the present teaching providesa unique token that cannot be duplicated.

In a related but distinct embodiment, creation and/or access tosensitive information related to the use of an object may be associatedwith the digital fingerprint of the key object. In these cases, accessto the sensitive information will be limited, denied, or otherwisecontrolled without the possession of the key object.

In one embodiment, the use of the key object as a token via digitalfingerprinting may be used to ensure privacy, to prescribed level ofconfidence (e.g., 75% confidence, 95% confidence, 99.999% confidence, orsome other level of confidence), of object-specific information or tokeep the information hidden from anyone for whom it is not intended. Inan example of this embodiment, an individual seeks to encrypt sensitivefiles on a hard disk or other repository to prevent an intruder fromgaining access to the information in the sensitive files. The sensitivefiles are the “pedigreed object,” and access to them is granted throughthe key object. Access to the secure information (i.e., the sensitivefiles) may only be granted when the digital fingerprint of the keyobject is tendered or otherwise presented.

In one example of this use, a digital wallet or connection(s) to digitalcurrency, such as cryptocurrency, e.g., Bitcoin (or equivalent) privatekey(s) may be tied to a physical object token. The possession of the keyobject, possibly with other information such as PINs, establishes theright to use the object as a token. An existing technology replaceableby the teachings of this disclosure includes the creation of physicalcoins used as tokens to digital currency.

This secure tokenization may be used in a wide variety of applications,from cloaking private communications to transferring or accessingsensitive information in a vulnerable environment. A plurality of keyobjects (e.g., two or more) may, as an example, serve the purpose ofenabling one holder to create the secure information and the holder orholders of the other key object enable the recipient to access thesecure information.

Digital Fingerprints to establish Digital Companions

In some embodiments, a method comprises using a digital fingerprint tocreate a digital companion as a component of the digital pedigree to thephysical object. A digital companion in one example may include arepresentation created by snapshotting various sensor data from theobject over time. The data set captured in a snapshot is used to createan object-specific 3D digital re-creation of the original physicalobject. The digital companion may be created using optical sensor datato create the structure and texture of the digital companion or, for anaggregate digital companion, may be itself aggregated from eachcomponent of the original physical object, using nested authentication.This method enables digital companions to reflect the internal structureand texture of the specific object of interest. The teachings of thisdisclosure can replace existing technology for creating generic digitaltwins, which may be interpreted in at least some sense as an existing“digital companion” or pedigree, by creating object-specific twins thatreflect the individual characteristics of a single object, rather than aclass of objects or a low-resolution approximation of the object.

This method also integrates historical data from previous digitalfingerprints and sensor data into the object-specific digital pedigree,which may factor into the construction and viewing of the digitalcompanion. For example, a user may view the wear and tear of an objectby looking at changes in an object's surface characteristics at any timesuch surface information was added to the pedigree. In a relatedembodiment, specific objects may, in a digital reality, be re-createdand substituted for more generic objects to produce a better digitalreality. That is, replacing a class of objects with their unique digitalrepresentation that mirror specific physical objects the real world.Thus, for example, a digital world's garage does not contain a genericautomobile, but instead, the digital world's garage does contain adigital representation of a user's specific automobile.

In some embodiments, digital companions can be used to search for othervirtual replicas that may infringe ownership rights in digitalenvironments. Digital assets, such as movies and other creative works,are contemplated along with other digital assets. The term, “digitalenvironment” in this disclosure encompasses any digital environment,such as augmented/virtual/mixed reality environments, that enablesimulated interaction or digital assets presented in a physicalenvironment. These digital environments include hardware-lesstechnologies (e.g., holograms) and hardware-inclusive technologies(e.g., haptic devices, wearable computing devices, smart glasses (e.g.,“google glasses”), and the like). Consider an example, where a form ofdigital twin is used in commercial computer animation. Here the presentteaching that includes acts of creating a digital companion can be usedas a reference to search for any form of infringement or copying bycomparing digital fingerprints that have been previously inducted.

In some embodiments, a digital companion, properly equipped with dataand metadata relevant to the functioning of the object, may be used invirtual object-monitoring simulation models that update and change asthe digital companion's real-world physical counterpart changes. Othersupplementary data from various sensors may be incorporated to betterrepresent the individual object. The digital companion may be used formonitoring, diagnostics, or prognostics.

In one example, components of a system may be monitored so thatcomponent failure within a physical assembly is highlighted on a digitalcompanion and virtually inspected for error. This embodiment, and othersuch embodiments, mitigates the need for a technician to travel to thephysical object to inspect the assembly in person. Instead, thetechnician can view the digital companion virtually from a convenientlocation. In other embodiments, such as prognostics, digital companionsmay contribute as input to control theory-based modeling. As an example,digital fingerprint-based companions may be used to assist in predictingcomponent failure by feeding data into simulations that model theperformance of a critical part. Such modeling can predict the breakdownof that part.

Digital companions may be used to create representations in any digitalenvironment. In this example, the digital companion would containinformation on the appearance and physical behavior of the object orindividual person. As an example, this may enable virtual inspectionand/or manipulation of specific items via their digital companionwithout gaining physical access or opening the contents of an object.For example, a user in a digital environment might view a digitalcompanion of a semiconductor within a computer in cases whereinformation (e.g., electron microscopic image data, images of anelectronic device prior to sealing a final housing, and the like) of thesemiconductor was inducted into the computer's aggregate companion priorto the physical computer being sealed. The user can then validate thatthe correct part was installed, integrated, formed, or the like. Thisenables a method to validate the components without having to open themachine. Because the digital companion and its pedigree exist in thedigital world, they are protected separately from that of the physicalcomputer and these types of practices circumvent issues with breakingsecurity seals on the machine and other risks associated withdisassembly and reassembly or even destruction of the underlyingphysical object.

The digital companions of physical objects may have value after theunderlying physical item has been destroyed, lost, or stolen. Considerthe following examples:

In the case of forensic study of a crashed plane.

Where digital companions are analyzed for sources of failure.

In using the digital companion to recreate a replica of the originalobject. With a properly complete digital companion an object that hasbeen lost, destroyed, or is in accessible can be re-created.

In a scenario where the digital companion of an individual is used torecreate the individual or object in a virtual environments or digitalasset, such as a film or video game.

In one embodiment, digital companions and their related pedigrees may beused as a store for any biometric data for an individual or object.Consider examples, where specific data is collected related to anindividual or object:

Unique behavior, such as gait or keystroke habit

Specific audio such as voice patterns

Digital fingerprints of an iris

Digital fingerprints of fingerprints

Thermal signature

In some embodiments, the digital companion may be used for securitychallenges for users or third parties during authentication. In order toprevent the submission of fraud data, the authentication system may aska user or other party wanting to perform authentication to submit imagesor video from different orientations to further establish credibility ofpossession. These security challenge requests may be generated randomlyor designated by the object possessor of record. For example, the systemmay request the user to submit random images, used in digitalfingerprint comparisons, from different orientations. These challengescan be paired with any other biometric recording such as voice orthermal signature. In one such example, a user could be asked to movehis head in a pre-determined orientation and say his name. The movementsand voice would provide additional proof during authentication.

Progressive Induction

In some embodiments, a method of progressive induction, authentication,and identification of objects, which at least in this case may becollectively referred to as “authentication,” is realized where thedigital pedigree of a physical object is updated with higher-relevancydata as such data is obtained. In this way, the authentication may beprogressively improved.

Consider, as an example, an automated drone authenticating objectswithin a scene. The sensors on the drone can collect more data onobjects that are in closer proximity. As the drone moves closer to otherobjects, it obtains higher resolution images, and the original,lower-scored digital fingerprint may be supplanted for higher-scoredversions of those particular objects.

Authentications within a scene may be scored, and the highest-gradedauthentications of objects may be referred to as “anchors.” In oneembodiment using this teaching, a scene is graded into authenticationzones. Each authentication zone may have its own expectation about thequality of data that may be obtained through collection of digitalfingerprints. In this approach, objects within the determined highestqualified view of sensors may be scored as anchor authentications. Eachsubsequent zone may be indexed in parallel by collecting digitalfingerprints that may be scored appropriately to the quality of sensordata collected at that time. As sensors are moved through a scene,objects may be re-authenticated. Each object's digital fingerprint maybe flagged as an anchor within the digital pedigree when higher-qualitydata is collected by a sensor.

At least some embodiments of this feature may utilize any device withoptical sensors, such as all forms of robotics, drones, or manualdevices such as smartphones or smart glasses. Consider an example wherean individual wearing smart glasses authenticates all objects withinview during normal use of wearing the smart glasses. As the wearer ofsmart glasses moves through a scene, the authentications may beevaluated and flagged as anchors when there is a higher score.

This example facilitates convenient induction of objects in theircurrent location while leveraging the context of other inducted objectsto establish provenance. In this process, contextual data from eachscene is used to set or qualify context. For instance, if a drone isused to induct all objects in a warehouse, the system may assume theprovenance of the object to be that warehouse. Therefore, the system mayuse data attributes such as geolocation of the warehouse, the proximityto other items of its kind within the warehouse, proximity to otherexpected objects, and time to establish confidence in the provenance ofthe object. For example: an object inducted at a secure facility islikely to be genuine; an object in the proximity of 1,000 objects of itssame kind is more likely to be genuine; an object next to a uniquemachine that creates such objects is more likely to be genuine; anobject created at a certain time that may be cross-referenced with otherproduction records is likely to be genuine, and soon. Other likeexamples are contemplated.

Consider another example of a system that is used to induct, and laterto re-identify the artwork in a museum. As the induction device, whichmay in some cases be automated or worn or operated by a curator,approaches each object, the device acquires progressively better imagesfrom which digital fingerprints are created. These progressivelyimproved (e.g., more detailed) digital fingerprints allow better andbetter discrimination of the objects until the system decides it knowsenough to distinguish, for example, the one particular object (e.g.,painting or other artwork) from all copies of that object. At eachstage, the digital pedigree of the object (e.g., painting or otherartwork) may be updated and flagged as an anchor with higher-relevancydata as such data is obtained. This process can provide progressivelybetter re-identification of objects already inducted. The results arescored, and the highest-scored inductions preserved for later objectre-identification.

The same process, or processes along these lines, may be applied atre-identification. In these cases, the imager approaches an object whileextracting progressively better (i.e., more information-filled) digitalfingerprints until the system either successfully re-identifies theobject or determines the object is not in its database. The system thenreports the results as desired. Either the determined best induction, orsome set of inductions, is preserved for later use. If more than oneinduction is preserved, the digital fingerprints extracted from theplurality of inductions may be aggregated by various means to improvelater re-identification.

Hardware and Software

At least some of the structures (e.g., devices, apparatus, systems andthe like) discussed herein comprises electronic circuits and otherhardware along with associated software. For example, a conventionalportable device (e.g., mobile phone, smartphone, tablet, wearablecomputer, Internet of Things (IoT) device, and other such computingdevices) is likely to include one or more processors and softwareexecutable on those processors to carry out the operations described.The term software is used herein in its commonly understood sense torefer to programs or routines (e.g., subroutines, objects, plug-ins,etc.), as well as data, usable by a machine or processor. As is wellknown, computer programs generally comprise instructions that are storedin tangible, non-transitory machine-readable or computer-readable,storage media. Some embodiments of the present disclosure may includeexecutable programs or instructions that are stored in machine-readableor computer-readable storage media, such as a digital memory. One ofskill in the art will recognize that a computer, in the conventionalsense, is not required in any particular embodiment. For example,various processors, embedded or otherwise, may be used in equipmenttaught in the present disclosure.

Memory for storing software is well known. In some embodiments, memoryassociated with a given processor may be stored in the same physicaldevice as the processor (i.e., on-board memory); for example, RAM orFLASH memory disposed within an integrated circuit microprocessor or thelike. In other examples, the memory comprises an independent device,such as an external disk drive, storage array, or portable FLASH keyfob. In such cases, the memory becomes associated with the digitalprocessor when the two are operatively coupled together, or incommunication with each other, for example by an I/O port, acommunication bus, network connection, etc. such that the processor canread information (e.g., a file) stored on the memory. Associated memorymay be read-only memory by design (ROM) or by virtue of permissionsettings, or not. Other examples include, but are not limited to, WORM,EPROM, EEPROM, FLASH, etc. Those technologies often are implemented insolid state semiconductor devices such as integrated circuits. Othermemories may comprise moving parts, such as a conventional rotating diskdrive. All such memories are machine readable, computer-readable, oranother like term, and all such memories may be used to store executableinstructions for implementing one or more functions described herein.

A software product refers to a memory device in which a series ofexecutable instructions are stored in a machine-readable form so that asuitable machine or processor, with appropriate access to the softwareproduct, can execute the instructions to carry out a process implementedby the instructions. Software products are sometimes used to distributesoftware. Any type of machine-readable memory, including withoutlimitation those summarized above, may be used to make a softwareproduct. Those of ordinary skill in the art recognize that software canbe distributed via electronic transmission (e.g., download), in whichcase there will at least sometimes be a corresponding software productat the transmitting end of the transmission, the receiving end of thetransmission, or both the transmitting and receiving ends of thetransmission.

Additional Illustrative Applications

In some embodiments, a single physical object is scanned, and a uniquedigital fingerprint is generated from features in the structure of thematerial substance of which the physical object consists, so that theunique digital fingerprint will not generate an unequivocal match to anyother scanned physical object, even if that other object is apparentlyidentical in appearance to the human eye. This digital fingerprint,which is distinctive and unique is stored in an object digitalfingerprint record, to which records, physical or digital, are addedthat relate to the physical object, creating a secure archive of objectinformation and object history. In some embodiments, records that areadded to the object digital fingerprint record, such as paper-basedrecords relating to the physical object, may themselves be digitallyfingerprinted and the digital fingerprint of the records are stored inthe object digital fingerprint record and/or in a separate digitalfingerprint record.

In one embodiment, a property registry implementation may include orallow various components or aspects of property commonly classified asreal estate, either independently or as part of a land registry, asdigital fingerprinting allows a higher degree of reliability ofidentification of, for example, fixtures, which is not present intraditional forms of land registration.

In one embodiment, a central registry may be configured to track thepresence and/or condition of various fixtures, such as certain valuablebuilding materials (e.g., hardwood flooring, marble or other stonefinishes, plumbing fixtures, decorative elements, or other finishes), ortrade fixtures (e.g., custom fixtures, machinery, custom electricalparts, etc.). Such a registry would allow, for example, landlords toquickly and definitively ascertain whether a tenant has removed orrepaired fixtures without proper notice or permission. Also, a commondifficulty in land transactions can be the proper classification of landfixtures and chattels. A secure centralized property registry may beused to supplement land descriptions by creating or classifyingcomponent inventories in a manner that will prevent or reduce the riskof subsequent disputes.

The registry does not have to be indexed by object, it may be configuredto be indexed both by object or by object components, as desired by theregistry owner or property stakeholder. In one embodiment, the system isconfigured to read the object according to an automatic or manuallytailored object template. This allows the tracking of the presence orcondition of individual components of whole, composite, or assembledobjects—for example whether a key component that is part of the owner'sobject has been replaced with a different component (whether due totheft, conversion, repair, or other reasons). The owner or stakeholderin the property may define the template according to the type ofinterest desired to be tracked or protected. The fingerprint templatemay be configured to indicate the presence of alterations, such as bynormal wear or tear, or more serious adulterations such as thereplacement or absence of components or portions of the object.

In some embodiments, the system is configured specifically to allowstakeholders to create a general or custom documentation trail for thepurposes of ascertaining liability. In one embodiment, the system willtrack certain conditions of an object with a view to ascertain where andwhen an “alteration” (in the sense used in strict product liability) hasoccurred. Currently, proving the “alteration” element in cases involvingstrict product liability presents considerable difficulty for merchantsin the product distribution line, exposing the merchant to risk ofliability for the condition of the product. Proper tracking of object“alterations” (which may include the product and associated packaging)will provide merchants in a distribution line the opportunity to defendagainst liability by creating reliable business records of the presenceand condition of an ascertainable product during the time the product isin the merchant's possession. For example, an innocent merchant may beable to show that an electronic item which malfunctioned and causedinjury due to damage, was not (or likely not) damaged while it was inhis possession, e.g., due to the condition of the item (or its relevantcomponent) and its shipping box or other externalities upon arrival anddeparture from his warehouse.

In another embodiment, the system is configured to track objectattributes relevant to stakeholders who, for example, loan out theirobjects. Here, the system will be configured to track elements thatwould facilitate actions for trespass to chattel or conversion shouldthe object be unduly interfered with. A secure central property registrymay also serve to increase the availability or success of so-called“real actions” in personalty, i.e., where a dispossessed owner has hisproperty returned to him, rather than receiving monetary damages. Realactions are widely available in reality disputes but much less utilizedin personalty disputes, in part due to the difficulty of conclusivelyidentifying an object of personalty, or its components, which difficultythe proposed system may successfully overcome.

The language of the present disclosure centers on objects of personalproperty but the concepts discussed may be applied to any other types ofproperty, real or personal, tangible or intangible. Registries describedas centralized may also be distributed or otherwise decentralized.

As described herein, for simplicity, a user of the devices, systems, andmethods may in some cases be described in the context of the malegender. It is understood that a user can be of any gender, and the terms“he,” “his,” and the like as used herein are to be interpreted broadlyinclusive of all known gender definitions. As the context may require inthis disclosure, except as the context may dictate otherwise, thesingular shall mean the plural and vice versa; all pronouns shall meanand include the person, entity, firm or corporation to which theyrelate; and the masculine shall mean the feminine and vice versa.

Unless defined otherwise, the technical and scientific terms used hereinhave the same meaning as commonly understood by one of ordinary skill inthe art to which this invention belongs. Although any methods andmaterials similar or equivalent to those described herein can also beused in the practice or testing of the present invention, a limitednumber of the exemplary methods and materials are described herein.

In the present disclosure, when an element (e.g., component, circuit,device, apparatus, structure, layer, material, or the like) is referredto as being “on,” “coupled to,” or “connected to” another element, theelements can be directly on, directly coupled to, or directly connectedto each other, or intervening elements may be present. In contrast, whenan element is referred to as being “directly on,” “directly coupled to,”or “directly connected to” another element, there are no interveningelements present.

The terms “include” and “comprise” as well as derivatives and variationsthereof, in all of their syntactic contexts, are to be construed withoutlimitation in an open, inclusive sense, (e.g., “including, but notlimited to”). The term “or,” is inclusive, meaning and/or. The phrases“associated with” and “associated therewith,” as well as derivativesthereof, can be understood as meaning to include, be included within,interconnect with, contain, be contained within, connect to or with,couple to or with, be communicable with, cooperate with, interleave,juxtapose, be proximate to, be bound to or with, have, have a propertyof, or the like.

Reference throughout this specification to “one embodiment” or “anembodiment” and variations thereof means that a particular feature,structure, or characteristic described in connection with the embodimentis included in at least one embodiment. Thus, the appearances of thephrases “in one embodiment” or “in an embodiment” in various placesthroughout this specification are not necessarily all referring to thesame embodiment. Furthermore, the particular features, structures, orcharacteristics may be combined in any suitable manner in one or moreembodiments.

In the present disclosure, the terms first, second, etc., may be used todescribe various elements, however, these elements are not be limited bythese terms unless the context clearly requires such limitation. Theseterms are only used to distinguish one element from another. Forexample, a first machine could be termed a second machine, and,similarly, a second machine could be termed a first machine, withoutdeparting from the scope of the inventive concept.

The singular forms “a,” “an,” and “the” in the present disclosureinclude plural referents unless the content and context clearly dictatesotherwise. The conjunctive terms, “and” and “or” are generally employedin the broadest sense to include “and/or” unless the content and contextclearly dictates inclusivity or exclusivity as the case may be. Thecomposition of “and” and “or” when recited herein as “and/or”encompasses an embodiment that includes all of the elements associatedthereto and at least one more alternative embodiment that includes fewerthan all of the elements associated thereto.

In the present disclosure, conjunctive lists make use of a comma, whichmay be known as an Oxford comma, a Harvard comma, a serial comma, oranother like term. Such lists are intended to connect words, clauses orsentences such that the thing following the comma is also included inthe list.

The headings and Abstract of the Disclosure provided herein are forconvenience only and do not interpret the scope or meaning of theembodiments.

The trust-proxy embodiments as taught in the present disclosure provideseveral technical effects and advances to the field of authenticatedaccess to digital data based on a digital fingerprint of a physical keyobject. Rights to access the digital data may be exclusive ornon-exclusive. Authorized parties may share or transfer rights to accessthe digital data. One or more entities may have concurrent access to thedigital data. One entity may be a first set of rights with respect tothe digital data, and a second entity may have a different second set ofrights with respect to the digital data. Rights to the digital datastored in the data store are acquired by tendering an access key. Theaccess key may be received via a programmatic interface or userinterface. If the access key that is tendered includes data that matchesa digital fingerprint of the physical key object, then access to thedigital data will be granted. These and other technical effects areimplemented with scanning technology, digital image processingtechnology, and other computing technology.

The various embodiments described above can be combined to providefurther embodiments. All of the U.S. patents, U.S. patent applicationpublications, U.S. patent applications, foreign patents, foreign patentapplications and non-patent publications referred to in thisspecification and/or listed in the Application Data Sheet areincorporated herein by reference, in their entirety. Aspects of theembodiments can be modified, if necessary to employ concepts of thevarious patents, applications and publications to provide yet furtherembodiments.

These and other changes can be made to the embodiments in light of theabove-detailed description. In general, in the following claims, theterms used should not be construed to limit the claims to the specificembodiments disclosed in the specification and the claims, but should beconstrued to include all possible embodiments along with the full scopeof equivalents to which such claims are entitled. Accordingly, theclaims are not limited by the disclosure.

The invention claimed is:
 1. A method of operation in system thatcomprises at least one processor and at least one non-transitoryprocessor-readable medium that stores at least one data store, the atleast one data store comprising a plurality of secure digital records,comprising: receiving a first tendered access key that includes a firstdigital fingerprint that represents one or more physical features of afirst physical key object in the form of one or more feature vectors;determining whether the first digital fingerprint of the first tenderedaccess key sufficiently matches respective ones of one or more digitalfingerprints of a plurality of stored access keys that are stored as atleast part of the at least one data store; in response at least in partto a determination that the first digital fingerprint of the firsttendered access key sufficiently matches respective ones of one or moreof digital fingerprints of one or more of the stored access keys,providing at least a first level of access to each secure digital recordof the at least one data store that is logically associated the one ormore stored access keys to which the first digital fingerprint of thefirst tendered access key was determined to sufficiently match.
 2. Themethod of claim 1 wherein providing at least a first level of access toeach secure digital record of the at least one data store that islogically associated the one or more stored access keys to which thefirst digital fingerprint of the first tendered access key wasdetermined to sufficiently match, includes providing read access but notproviding any of: write access, delete access, update access, executeaccess, unlock access, and supplement access.
 3. The method of claim 1wherein providing at least a first level of access to each securedigital record of the at least one data store that is logicallyassociated the one or more stored access keys to which the first digitalfingerprint of the first tendered access key was determined tosufficiently match, includes providing read access to a provenancehistory or a pedigree for a physical object.
 4. The method of claim 1wherein providing at least a first level of access to each securedigital record of the at least one data store that is logicallyassociated the one or more stored access keys to which the first digitalfingerprint of the first tendered access key was determined tosufficiently match, includes providing read access to a provenancehistory or a pedigree for a physical object that is different from thefirst physical key object.
 5. The method of claim 4 wherein providingread access to a provenance history or a pedigree for a physical objectincludes providing read access to a provenance history or a pedigreethat includes supplemental context data for the physical object, thesupplemental context data including at least one of location data,metadata, media, or sensor data for the physical object.
 6. The methodof claim 4, further comprising: forming an aggregate digital companion,by aggregating one or more components of the first physical key object,using nested authentication.
 7. The method of claim 5 wherein providingread access to a provenance history or a pedigree that includessupplemental context data for the physical object, the supplementalcontext data including at least one of location data, metadata, media,or sensor data for the physical object includes providing read access toa provenance history or a pedigree for a physical object which includessupplemental context data that includes at least one of: records ofpurchase or records of transfer of the physical object.
 8. The method ofclaim 1, further comprising: for each secure digital record of the atleast one data store that is logically associated the one or more storedaccess keys to which the first digital fingerprint of the first tenderedaccess key was determined to sufficiently match, determining a level ofaccess to be provide to the respective secure digital record from a setof permission information stored in the respective secure digitalrecord.
 9. The method of claim 1 wherein the providing at least thefirst level of access to each secure digital record of the at least onedata store that is logically associated the one or more stored accesskeys to which the first digital fingerprint of the first tendered accesskey was determined to sufficiently match is responsive solely to thedetermination that the first digital fingerprint of the first tenderedaccess key sufficiently matches respective ones of one or more ofdigital fingerprints of one or more of the stored access keys withoutany additional tendered information.
 10. The method of claim 1 whereinthe providing at least the first level of access to each secure digitalrecord of the at least one data store that is logically associated theone or more stored access keys to which the first digital fingerprint ofthe first tendered access key was determined to sufficiently match isresponsive to a combination of the determination that the first digitalfingerprint of the first tendered access key sufficiently matchesrespective ones of one or more of digital fingerprints of one or more ofthe stored access keys and the at least one additional piece of tenderedinformation.
 11. The method of claim 1 wherein the providing at leastthe first level of access to each secure digital record of the at leastone data store that is logically associated the one or more storedaccess keys to which the first digital fingerprint of the first tenderedaccess key was determined to sufficiently match is responsive to acombination of the determination that the first digital fingerprint ofthe first tendered access key sufficiently matches respective ones ofone or more of digital fingerprints of one or more of the stored accesskeys and a determination that a second digital fingerprint of a firsttendered access key sufficiently matches respective ones of one or moreof digital fingerprints of one or more of the stored access keys, accessto a given secure digital record requiring at least two different accesskeys to be tendered.
 12. The method of claim 1 wherein the firstphysical key object is a first physical token having no monetary value,wherein receiving a first tendered access key that includes a firstdigital fingerprint that represents one or more physical features of afirst physical key object in the form of one or more feature vectorsincludes receiving a first tendered access key that includes a firstdigital fingerprint that represents one or more physical features of afirst physical token, and wherein providing at least a first level ofaccess to each secure digital record of the at least one data store thatis logically associated the one or more stored access keys to which thefirst digital fingerprint of the first tendered access key wasdetermined to sufficiently match includes providing access to adecentralized, distributed ledger.
 13. The method of claim 1 wherein thefirst physical key object is a first physical token having no monetaryvalue, wherein receiving a first tendered access key that includes afirst digital fingerprint that represents one or more physical featuresof a first physical key object in the form of one or more featurevectors includes receiving a first tendered access key that includes afirst digital fingerprint that represents one or more physical featuresof a first physical token, and wherein providing at least a first levelof access to each secure digital record of the at least one data storethat is logically associated the one or more stored access keys to whichthe first digital fingerprint of the first tendered access key wasdetermined to sufficiently match includes providing access to a digitalwallet.
 14. The method of claim 1 wherein receiving a first tenderedaccess key that includes a first digital fingerprint that represents oneor more physical features of a first physical key object in the form ofone or more feature vectors includes receiving a first tendered accesskey that includes a first digital fingerprint that represents one ormore physical features of a first physical key object in the form of oneor more feature vectors generated from at least one of images or adigital model of the first physical key object.
 15. The method of claim1 wherein receiving a first tendered access key includes receiving thefirst tendered access key submitted by a first user, and furthercomprising: authenticating the first user as a proprietor of one or moreof the secure digital records based on a determination that the firstdigital fingerprint of the first tendered access key sufficientlymatches respective ones of one or more of digital fingerprints of one ormore of the stored access keys logically associated with one or more ofthe secure digital records; and responsive to input from theauthenticated user, modifying at least one of the secure digital recordsthat is logically associated the one or more stored access keys to whichthe first digital fingerprint of the first tendered access key wasdetermined to sufficiently match to register a second physical keyobject to grant access to the respective secure digital record that isalso secured by the first physical key object.
 16. The method of claim15, further comprising: initializing a second key object record in thedata store, the second key object record arranged to store dataassociated with a second physical key object; storing a digitalfingerprint of the second physical key object in the second key objectrecord; and logically associating the secure digital record that islogically associated with the one or more stored access keys to whichthe first digital fingerprint of the first tendered access key wasdetermined to sufficiently match to the digital fingerprint of thesecond physical key object, wherein the first physical key objectpermits first access rights to a first secure digital record and thesecond physical key object permits second access rights to the firstsecure digital record, where the second access rights are different fromthe first access rights.
 17. The method of claim 1, further comprising:generating a digital companion as a component of digital pedigree dataaccessed via the first physical key object, wherein the digitalcompanion is a representation created by aggregating various sensor dataacquired in relation to the first physical key object over a selectedperiod of time.
 18. The method of claim 17 wherein generating a digitalcompanion includes generating the digital companion based on opticalsensor data to create a structure and a texture of the digitalcompanion, and further comprising: creating an object-specificthree-dimensional 3D) digital re-creation of the first physical keyobject based on the digital companion.
 19. The method of claim 1 whereinreceiving a first tendered access key includes receiving a firsttendered access key via a third-party software application or userinterface, and further comprising: authenticating the first tenderedaccess key based at least in part on the determination that the firstdigital fingerprint of the first tendered access key sufficientlymatches respective ones of one or more of digital fingerprints of one ormore of the stored access keys; and wherein providing at least a firstlevel of access to each secure digital record of the at least one datastore that is logically associated the one or more stored access keys towhich the first digital fingerprint of the first tendered access key wasdetermined to sufficiently match includes, conditioned at least in parton the authentication of the first tendered access key, granting rightsto change access rights, and changing the access rights to acorresponding secure digital record to enable use of credentials, thecredentials including at least one of a specified user name, a specifiedpassword, and a second physical key object defined by a digitalfingerprint of the second physical key object.
 20. The method of claim 1wherein receiving a first tendered access key includes receiving a firsttendered access key via a third-party software application or userinterface, further comprising: receiving an access key via a third-partysoftware application or user interface; authenticating the firsttendered access key based at least in part on the determination that thefirst digital fingerprint of the first tendered access key sufficientlymatches respective ones of one or more of digital fingerprints of one ormore of the stored access keys; receiving certification data via thethird-party software application or user interface; and whereinproviding at least a first level of access to each secure digital recordof the at least one data store that is logically associated the one ormore stored access keys to which the first digital fingerprint of thefirst tendered access key was determined to sufficiently match includes,conditioned at least in part on the determination that the first digitalfingerprint of the first tendered access key sufficiently matchesrespective ones of one or more of digital fingerprints of one or more ofthe stored access keys, permitting addition of the certification data,and storing the certification data as pedigree data of a physical objectrecord linked to the matching key object record.