G06K5/00

Method, apparatus, and system for characterizing an optical system

Techniques for characterizing an optical system (for example, a printer verifier) are provided. In this regard, the optical system may be characterized for scanning a printed image. The characterization of the optical system includes determining an effective aperture size of the optical system, and correspondingly an effective resolution at which the optical system can be configured to scan a portion of the printed image according to verification requirements.

SECURITY ARTICLE AUTHENTICATION
20230001733 · 2023-01-05 ·

A user device may cause light to be emitted at a security article by one or more light emission devices of the user device. The user device may obtain from a first set of one or more optical sensor devices of the user device first sensor data associated with the security article, and may obtain from a second set of one or more optical sensor devices of the user device second sensor data associated with the security article. The user device may determine, based on the first sensor data and the second sensor data, one or more characteristics of a security feature of the security article. The user device may determine, based on the one or more characteristics of the security feature, whether the security article is authentic. The user device may cause, based on determining whether the security article is authentic, one or more actions to be performed.

Systems and methods for providing access to wireless gaming devices

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.

Aggregator of identification devices
11526593 · 2022-12-13 · ·

A personal identification device for physical access control systems, including: at least one reader capable of reading data from an identification badge, the data including at least identification data; a processing unit; a data storage member; at least one wireless communication module; and an internal battery arranged to supply power to the components of the device. The processing unit is arranged for: acquiring data from at least one identification badge by way of the reader; storing the acquired data in the data storage member; if the acquired data are encrypted, decrypting the data; and transmitting at least a portion of the acquired data, via the wireless communication module and on request from a reader external to the device.

Internet of things (IoT) box for mobile payment retail system and in store mobile charging solution
11501278 · 2022-11-15 · ·

Systems and methods for conducting sales transactions are provided. Embodiments include portable, electronic, point of purchase devices configured to acquire identification information from articles to be purchased, to determine a purchase price, and to acquire payment information for the purchase price. The point of purchase devices may include one or more input devices such as a communication device, a camera, a scanner, and a sensor system for acquiring identification information and/or the payment information. The point of purchase devices also may contain an electronic display, communication interfaces (such as a near field communication interface, a local area network interface, Bluetooth® configurations, etc.) for transmitting and/or receiving information to/from connectable devices such as a mobile phone, BLE beacon and/or an external server. Additional provision is made for an embodiment that avoids battery depletion anxiety by shoppers, through the provision of a handheld portable charging point device.

Identity document authentication

A device implementing a system for authenticating an identity document includes at least one processor configured to receive, from a service provider, a request associated with verifying an integrity of an identity document, and capture, responsive to receiving the request, image data of the identity document. The at least one processor is further configured to generate a representation based on the image data, the representation comprising form factor data of the identity document, and compare the representation with a prior representation of the identity document, the prior representation comprising prior form factor data of the identity document. The at least one processor is further configured to provide, to the service provider, a response to the request based on comparing the representation with the prior representation.

Digital identity authentication and verification system, method, and device
11574033 · 2023-02-07 · ·

This disclosure generally relates to a method for authenticating a user in a digital or physical environment. The method includes receiving an identity verification request based on input provided by a user to be verified, receiving a facial and audio recognition sample from the user, transmitting the facial and audio recognition sample to one or more third party entities with a request to verify that the facial and audio recognition sample represents the user, receiving an indication from at least one of the third party entities that the user is verified, and verifying that the user who provided the facial and audio recognition sample is the person the user purports to be.

Systems and methods for managing a customer account switch

Systems and methods for management of an account switch are disclosed. An account switch management system may include one or more memory devices storing software instructions, and one or more processors configured to execute the software instructions to receive a list of transaction entries to be switched from a first account to a second account and account information associated with the first account and the second account. The one or more processors may also determine a recommendation relating to a customer action based on the transaction entries and the account information. The one or more processors may provide the list of transaction entries and account information and the recommendation to the client device. The one or more processors may also receive a request from the client device to complete an action and transmit a notification to a processing device to complete the action.

UTILIZATION OF A BARCODE READER TO DETECT A PRINTING ANOMALY

A barcode reader for detecting a printing anomaly is described herein. The barcode reader may receive read data associated with a read operation involving a barcode reader and a barcode. The barcode reader may process, using an anomaly detection model, the read data to determine an anomaly status associated with the barcode being printed by a printer. The anomaly detection model may be trained based on reference decoding metric information associated with corresponding reference images that depict barcodes associated with one or more printing anomalies. The barcode reader may determine, based on the anomaly status, a printer status associated with the printer. The barcode reader may provide an indication of the printer status.

IMAGE FORMING DEVICE
20230032555 · 2023-02-02 ·

An image forming device capable of reducing resources related to destruction of a wireless tag is provided. The image forming device according to the present embodiment includes a reader and writer, a fixing unit, a determination unit, and a control unit. The reader and writer reads information from the wireless tag. The fixing unit heats and conveys a sheet having the wireless tag. The determination unit determines a defect of the wireless tag based on a reading result of the reader and writer. If the determination unit determines that the wireless tag is defective, the control unit controls the fixing unit to increase an amount of heat applied to the wireless tag such that information cannot be read from the wireless tag.