Patent classifications
G07D7/0032
Method and System for Determining if Paper Currency Has Numismatic Value
Using software to process images and/or digital representations of paper currency to determine if currency has a value greater than the face value of the currency to any person or persons. Software that can determine from images and/or digital representations (known or unknown) numismatic value, or value greater than the face value of the currency to any person or persons and indicia of numismatic value, or increased value, including, but not limited to: ink smearing, misaligned serial numbers, misaligned seals on currency, non-matching serial numbers, off center printing, off-center cutting, paper currency of small or limited print runs, fancy serial numbers, missing or off-center watermarks, errors in security features, holograms, ultra-violet features, magnetic features, microprinting, etc. to determine a numismatic value.
Synthesis of curved surface moiré
The present disclosure describes a method and computerized means for creating dynamically evolving moiré shapes on curved surfaces. The method applies geometrical transformations in order to obtain curvilinear moirés and creates the moirés on curved surfaces by applying mappings from planar space to 3D space. The method relies on the superposition of a base layer with base bands and of a revealing layer with sampling elements. The dimensions of the revealing layer sampling elements such as cylindrical or spherical lenses as well as the distances between the base and revealing layer surfaces are adapted to the space between neighbouring isoparametric lines that define the curved surface. The resulting moiré shapes evolve smoothly on the specified curved surface and show recognizable shapes such as words, letters, numbers, flags, logos, graphic motifs, drawings, clip art, and faces.
SYSTEMS AND METHODS FOR VISUAL VERIFICATION
A system comprising: a document holder; an image sensor directed toward the document holder; a polarized filter between the image sensor and the document holder; a filter motor configured to rotate the polarized filter; one or more processors; and at least one memory having stored thereon computer program code that, when executed by the one or more processors, instructs the one or more processors to: control the filter motor to rotate the polarized filter; control the image sensors to capture a plurality of images of a document within the document holder, the plurality of images corresponding to a respective relative orientations of the polarized filter to the document; identify a feature of the document; and output, in response comparing respective visual characteristics of the feature of the document to corresponding expected visual characteristics of the first feature for the document, an indication of a verification of the document.
Verification of a security document
A method for verifying a security document by means of a reading device wherein first transmission and/or reflection properties of a first region of the security document are detected in a first spectral range by the reading device and a first data set specifying these properties is generated therefrom, wherein the first region at least in some regions overlaps an optical security element arranged on the security document or embedded in the security document and wherein second transmission and/or reflection properties of the first region of the security document are detected in a second spectral range by the reading device and a second data set specifying these properties is generated therefrom, wherein the first spectral range differs from the second spectral range, and wherein, the authenticity of the security document and/or of the security element is checked on the basis of at least the first data set and the second data set.
AZIMUTHALLY MODULATED SCATTERING DEVICE
Optical elements with anisotropic, patterned surface relief microstructures in which information is encoded in the distribution of the orientation of different zones. From the analysis of the distribution of the light scattered from the element, the orientation distribution in the element and therefore the encoded information can be evaluated. The elements are particularly useful for securing documents and articles against counterfeiting and falsification.
Sheet handling apparatus, sheet handling system and sheet handling method
A valuable medium handling apparatus configured to handle a plurality of types of valuable media. The valuable medium handling apparatus includes an inlet configured to deposit the plurality of types of valuable media, a setting unit configured to set the types of the valuable media being handled by the apparatus as a first type or a second type, a determination unit configured to determine whether a type of each of the valuable media deposited in the inlet is the first type or the second type based on the setting result of the setting unit and determine whether the valuable medium determined as the first type is a genuine medium or a counterfeit medium, and a plurality of stackers configured to stack the valuable medium of the type determined by the determination unit, the plurality of stackers including a first stacker and a second stacker.
Method for Detecting the Physical Characteristics of a Physical Credential in 3D Space for ID Authenticity
Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential in two or more orientations. A first image of a credential in a first orientation and a second image of the credential in a second orientation may be received. An optical characteristic of a secure feature of the credential may be determined based on light reflected from the secure feature in both the first image and the second image. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based how a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.
Systems and methods for visual verification
A system comprising: a document holder; an image sensor directed toward the document holder; a polarized filter between the image sensor and the document holder; a filter motor configured to rotate the polarized filter; one or more processors; and at least one memory having stored thereon computer program code that, when executed by the one or more processors, instructs the one or more processors to: control the filter motor to rotate the polarized filter; control the image sensors to capture a plurality of images of a document within the document holder, the plurality of images corresponding to a respective relative orientations of the polarized filter to the document; identify a feature of the document; and output, in response comparing respective visual characteristics of the feature of the document to corresponding expected visual characteristics of the first feature for the document, an indication of a verification of the document.
NB CONTROLLER AND FORM FACTORS
A system includes a plurality of optical identifiers and a reader for the optical identifiers. Each optical identifier has an optical substrate and a volume hologram (e.g., with unique data, such as a code page) in the optical substrate. The reader for the optical identifiers includes a laser, and a camera. The laser is configured to direct laser light into a selected one of the optical identifiers that has been placed into the reader to produce an image of the associated volume holograms at the camera. The camera is configured to capture the image. The captured image may be stored in a digital format by the system.
ID VERIFICATION WITH A MOBILE DEVICE
A system for remote identification of users. The system uses deep learning techniques for authenticating a user from an identification document and using automated verification of identification documents. Identification documents may be authenticated by validating security features. The system may determine features expected in a valid identification document and determine whether those features are present, employing techniques, such as determining whether direction-sensitive features are present. Liveness of a user indicated by the identification document may be determined with a deep learning model trained for identification of facial spoofing attacks.