Patent classifications
G09C5/00
Using middleware for generating vector graphics imaged security documents
A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.
Using middleware for generating vector graphics imaged security documents
A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.
Method and system for establishing secure communication between terminal device and target system
Disclosed herein is a method and system for establishing secure communication between a terminal device and a target system. The method comprises validating the terminal device and the target system based on a communication request received from the terminal device. Upon validation, the terminal device is signaled to generate a Quick Response (QR) code corresponding to the communication request. Subsequently, the QR code generated at the terminal device is processed using a predetermined verification interface configured in a user device for establishing the secure communication between the terminal device and the target system. In an embodiment, the present disclosure helps users in completing a transaction based on the QR code generated at the terminal device, and thereby eliminates requirement of using a credit card/debit card and the like for completing the transaction.
Method and system for establishing secure communication between terminal device and target system
Disclosed herein is a method and system for establishing secure communication between a terminal device and a target system. The method comprises validating the terminal device and the target system based on a communication request received from the terminal device. Upon validation, the terminal device is signaled to generate a Quick Response (QR) code corresponding to the communication request. Subsequently, the QR code generated at the terminal device is processed using a predetermined verification interface configured in a user device for establishing the secure communication between the terminal device and the target system. In an embodiment, the present disclosure helps users in completing a transaction based on the QR code generated at the terminal device, and thereby eliminates requirement of using a credit card/debit card and the like for completing the transaction.
Content encryption and in-place decryption using visually encoded ciphertext
Systems and methods are provided for encrypting and decrypting data using visually encoded ciphertext. The method includes selecting, using a graphical user interface coupled to an electronic device, one or more portions of a document to be encrypted, visually encoding the selected one or more portions of the document, generating a visual representation, wherein the visual representation corresponds to encrypted content, and replacing the selected one or more portions of the document with the visual representation. The method further includes displaying, to the user, the visual representation, capturing the visual representation using one or more cameras, decoding the visual representation, obtaining the encrypted content, and decrypting the encrypted content, generating decrypted content.
Content encryption and in-place decryption using visually encoded ciphertext
Systems and methods are provided for encrypting and decrypting data using visually encoded ciphertext. The method includes selecting, using a graphical user interface coupled to an electronic device, one or more portions of a document to be encrypted, visually encoding the selected one or more portions of the document, generating a visual representation, wherein the visual representation corresponds to encrypted content, and replacing the selected one or more portions of the document with the visual representation. The method further includes displaying, to the user, the visual representation, capturing the visual representation using one or more cameras, decoding the visual representation, obtaining the encrypted content, and decrypting the encrypted content, generating decrypted content.
BLOCKCHAIN BASED VERIFIABILTY OF USER STATUS
An example operation may include one or more of extracting a data object from a machine-readable code, where the data object comprises fields of data signed with a digital signature of a private key, detecting an identifier of an issuer of the data object from the extracted data object, retrieving a public key from a blockchain based on the identifier of the issuer detected from the field of the extracted data object, and verifying the digital signature of the private key based on the fetched public key
DENDRITIC STRUCTURES AND TAGS
The disclosure features dendritic tags, and methods and systems for fabricating and using such tags. The methods can include obtaining at least one image of a dendritic tag attached to an article, analyzing the at least one image to identify a set of features associated with the dendritic tag, and comparing the set of features to stored information to identify the article.
DENDRITIC STRUCTURES AND TAGS
The disclosure features dendritic tags, and methods and systems for fabricating and using such tags. The methods can include obtaining at least one image of a dendritic tag attached to an article, analyzing the at least one image to identify a set of features associated with the dendritic tag, and comparing the set of features to stored information to identify the article.
CONTENT FORMAT CONVERSION VERIFICATION
Content conversion verification, includes: converting, at a first computer system, an original content file to a target format, generating a converted content file in the target format; generating a checksum for the converted content file; and sending the original content file and the checksum to a second computer system. Key words include content verification and checksum.