G07D7/004

LIGHT EMITTING APPARATUS FOR CASH VERIFICATION AND REMOTE DEPOSIT
20220245607 · 2022-08-04 ·

Systems and methods for cash verification and remote deposit are provided. A method may include receiving credentials to authenticate a login to a mobile app that is associated with a first financial entity; receiving an instruction to deposit a bill of cash at a physical location associated with a second financial entity that is different from the first financial entity; illuminating a front face of the bill; capturing an image of the illuminated front face; illuminating a back face of the bill; capturing an image of the illuminated back face; extracting a first tier of features from the images; determining a denomination and/or version of the bill; when the denomination and/or version exceeds a predetermined first threshold, extracting a second tier of features; when all of the extracted features are associated with the same denomination and/or version, and all of the features that are associated with said denomination and/or version are detected, verifying the bill; and when the bill is verified and a message is received, from the second financial entity, confirming that the second financial entity received the bill, depositing an amount corresponding to the denomination in an account at the first financial entity.

Authentication System And Method
20220111674 · 2022-04-14 ·

An authentication mark system and method are provided for authentication of an object having indicia associated therewith. The authentication mark system includes an inkjet printer configured to propel microscopic ink drops onto the object to form a pattern of ink on the object. A microscope camera has a lens directable at the pattern of ink on the object. The microscope camera records an enlarged image of the pattern of ink on the object. A processor is operatively connected to the microscope camera and is configured to transmit the enlarged image of the pattern of ink and the indicia associated with the object to a database for secure storage.

Security pattern capable of writing variable coding information and preparation method and device thereof
20220068072 · 2022-03-03 ·

Provided are a security pattern capable of writing variable coding information and a preparation method and device thereof. The preparation device includes a coating-printing device, a transmission device, a laser array light source, and an induced magnetic field, the induced magnetic field and the transmission device are synchronous. The laser array light source is used for optical signal output, the light source is programmable-formed, variable, and high in refinement degree, and may output a finer pattern. A point light source array may be controlled by a program and correspondingly prepare a variable code; and a crawler-type magnetic field is used for induction in a pattern transmission process, and the synchronous induction of the conveyor belt type takes a longer time than other inductions, and prepares a more stable pattern.

Security pattern capable of writing variable coding information and preparation method and device thereof
20220068072 · 2022-03-03 ·

Provided are a security pattern capable of writing variable coding information and a preparation method and device thereof. The preparation device includes a coating-printing device, a transmission device, a laser array light source, and an induced magnetic field, the induced magnetic field and the transmission device are synchronous. The laser array light source is used for optical signal output, the light source is programmable-formed, variable, and high in refinement degree, and may output a finer pattern. A point light source array may be controlled by a program and correspondingly prepare a variable code; and a crawler-type magnetic field is used for induction in a pattern transmission process, and the synchronous induction of the conveyor belt type takes a longer time than other inductions, and prepares a more stable pattern.

SECURITY DOCUMENT AND METHOD FOR THE AUTHENTICATION THEREOF
20210323337 · 2021-10-21 ·

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

SECURITY DOCUMENT AND METHOD FOR THE AUTHENTICATION THEREOF
20210323337 · 2021-10-21 ·

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

MACHINE-READABLE POLYMER SECURITY THREADS
20210327194 · 2021-10-21 ·

A method and associated system for authentication, including irradiating an item including a polymer security thread including a polymer material and a doping material within the polymer material and configured to produce a radiation spectrum in response to the irradiating, the doping material capable of absorbing, scattering, or emitting radiation, and detecting the produced radiation spectrum to confirm the presence of the polymer security thread.

MACHINE-READABLE POLYMER SECURITY THREADS
20210327194 · 2021-10-21 ·

A method and associated system for authentication, including irradiating an item including a polymer security thread including a polymer material and a doping material within the polymer material and configured to produce a radiation spectrum in response to the irradiating, the doping material capable of absorbing, scattering, or emitting radiation, and detecting the produced radiation spectrum to confirm the presence of the polymer security thread.

Extended convolutional neural network for document analysis

The invention refers to a computer-implemented method of analyzing security documents having visible information and at least one of infrared and ultraviolet detectable information, the method comprising the steps of: receiving visible-color data of a first set of pixels of a first region of the security document in a first image of the security document and feeding the visible-color data to a convolutional neural network, CNN; receiving infrared, IR, and/or ultraviolet, UV, data of a second and/or third set of pixels of a respective second and/or third region in a respective second and/or third image of the security document and feeding the IR and/or UV data to the CNN; analyzing the visible-color data of the first set of pixels using the CNN to extract characteristics of the security document from the visible information; and analyzing the IR and/or UV data of the second and/or third set of pixels using the CNN to extract characteristics of the security document from the IR and/or UV information. Further, a corresponding system is provided.

Extended convolutional neural network for document analysis

The invention refers to a computer-implemented method of analyzing security documents having visible information and at least one of infrared and ultraviolet detectable information, the method comprising the steps of: receiving visible-color data of a first set of pixels of a first region of the security document in a first image of the security document and feeding the visible-color data to a convolutional neural network, CNN; receiving infrared, IR, and/or ultraviolet, UV, data of a second and/or third set of pixels of a respective second and/or third region in a respective second and/or third image of the security document and feeding the IR and/or UV data to the CNN; analyzing the visible-color data of the first set of pixels using the CNN to extract characteristics of the security document from the visible information; and analyzing the IR and/or UV data of the second and/or third set of pixels using the CNN to extract characteristics of the security document from the IR and/or UV information. Further, a corresponding system is provided.