G06K5/00

System for user authentication
11556932 · 2023-01-17 · ·

A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a cell phone. The method involves obtaining a current geographical location of the cell phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.

Contactless card personal identification system

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

Industrial printer

A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags.

Industrial printer

A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags.

User identification device and method using radio frequency radar

A user identification device according to a disclosed embodiment includes a transmitter for scattering radio-frequency (RF) signals into tissues of a body part of a user, a receiver for receiving the RF signals having passed through the tissues of the body part of the user, a memory for storing parameters of a trained classification algorithm, and a processor for identifying the user by analyzing the received RF signals based on the trained classification algorithm by using the parameters of the trained classification algorithm in response to receiving the RF signals through the receiver.

Information processing apparatus, print system, and information processing method
11562154 · 2023-01-24 · ·

An information processing apparatus operates to acquire first information concerning a size of a print region where a barcode is printed, to generate, based on the acquired first information, image data of the barcode to be printed in the print region, and to set a lower limit of the width of each bar forming the barcode. The first information includes width information concerning a width of the print region and height information concerning a height of the print region. The generated image data includes, as a bar forming the barcode, a bar having a width based on the width information and a height based on the height information, and the image data is generated if a minimum width of each bar forming the barcode is equal to or larger than the set lower limit.

Counterfeit pharmaceutical and biologic product detection using progressive data analysis and machine learning

Techniques are provided for detecting counterfeit products. Measurements and images corresponding to a product are obtained, wherein at least a portion of the measurements or images are obtained from a mobile/IoT/IoB device. The measurements and images are provided to a trained machine learning model to progressively analyze the measurements and images. Based on the progressive analysis, a determination/prediction is made with an associated confidence score as to whether the product is real or counterfeit.

Systems and methods for item delivery using anonymized delivery points

Systems and methods for generating and implementing an anonymized delivery point processing system are disclosed. Anonymous addresses can be associated with actual physical delivery points. An item having an anonymous address thereon can be sorted and/or routed on item processing equipment based on the associated actual physical delivery point.

Payment system
11694199 · 2023-07-04 · ·

Methods, apparatus and computer software are provided for authorizing an EMV transaction between a user device and a point of sale terminal, particularly, but not exclusively, in situations where a secure element is not made available for the deployment of a payment application on the user device. The payment application is instead deployed to a processing environment that is outside of any secure element on the user device. An ICC Master Key corresponding to the payment application is held by a trusted authority, such as the issuing bank. The trusted authority is adapted generate time-limited session keys on the basis of the ICC Master Key and distribute session keys to the payment application. Receipt of a session key by the payment application enables the payment application to conduct an EMV payment transaction. The session key is used to authorize a single EMV payment transaction.

Method, apparatus, and system for characterizing an optical system

Techniques for characterizing an optical system (for example, a printer verifier) are provided. In this regard, the optical system may be characterized for scanning a printed image. The characterization of the optical system includes determining an effective aperture size of the optical system, and correspondingly an effective resolution at which the optical system can be configured to scan a portion of the printed image according to verification requirements.