G07D7/0032

IDENTIFICATION DEVICE, IDENTIFICATION METHOD, AND COMPUTER-READABLE MEDIUM INCLUDING IDENTIFICATION PROGRAM
20180264868 · 2018-09-20 · ·

An identification device includes, an imaging condition determinator configured to determine an imaging condition as to whether or not an optical change in the anti-counterfeit medium is imageable from an observation angle that is an angle of captured image data in an imaging direction with respect to a reference line on an observation object surface of the anti-counterfeit medium being designed such that an observed pattern of light varies as the observation angle varies, a similarity calculator configured to obtain similarity between the captured image data and correct image data generated from the optical change corresponding to the observation angle when it is determined that the optical change is imageable under the imaging condition; and an authenticity determinator configured to perform authenticity determination as to whether or not the anti-counterfeit medium is correct based on whether or not the similarity exceeds a preset similarity threshold.

AUTHENTICATION AND ANTI-HARVESTING SECURITY FEATURE WITH MACHINE DETECTABLE INDICIA
20180247170 · 2018-08-30 · ·

A security feature, which is made up of a security device that is coupled to machine detectable indicia, is provided. The security feature may be used with a banknote, with the security feature serving to authenticate the banknote. Harvesting the security device will disturb the machine readable effect or signal generated by the machine detectable indicia, thereby allowing detection of the harvesting.

AZIMUTHALLY MODULATED SCATTERING DEVICE
20180231697 · 2018-08-16 · ·

Optical elements with anisotropic, patterned surface relief microstructures in which information is encoded in the distribution of the orientation of different zones. From the analysis of the distribution of the light scattered from the element, the orientation distribution in the element and therefore the encoded information can be evaluated. The elements are particularly useful for securing documents and articles against counterfeiting and falsification.

SECURITY DEVICE AND METHOD OF MANUFACTURE THEREOF
20180215189 · 2018-08-02 · ·

A diffractive security device is disclosed, including first and second diffractive structures defined in a carrier layer. The first diffractive structure is a diffractive zone plate structure of a continuously curved surface configured such that when the device is illuminated by on-axis light, a first diffraction pattern generated by the first diffractive structure can be viewed from at least a first side of the device at substantially all viewing angles, the first diffraction pattern exhibiting a reference point or reference line relative to which other features of the first diffraction pattern appear to move when the viewing angle is changed. The second diffractive structure is an off-axis diffractive structure configured such that when the device is illuminated by on-axis light a second diffraction pattern generated by the second diffractive structure can be viewed from at least the first side of the device at at least some off-axis viewing angles.

DIFFRACTIVE SECURITY DEVICE AND METHOD OF MANUFACTURE THEREOF
20180201044 · 2018-07-19 · ·

A diffractive security device is disclosed including at least a first diffractive structure defined in a carrier layer. The first diffractive structure is an on-axis diffractive zone plate structure of a continuously curved surface configured such that when the device is illuminated by on-axis light a first diffraction pattern generated by the first diffractive structure can be viewed from at least a first side of the device at substantially all viewing angles, the first diffraction pattern exhibiting a reference point or reference line relative to which other features of the first diffraction pattern appear to move when the viewing angle is changed.

METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF A DOCUMENT
20180154676 · 2018-06-07 ·

A system and a method for verifying authenticity of a physical copy and a digital copy of a document are disclosed. The method comprises registering a document in a repository by storing details related to the document in a location of the repository. A symbology for the document is generated. The symbology is an identifier of the location of the repository comprising the document. The symbology is associated with either a physical or a digital copy of the document. The digital copy of the document is printed to generate a printed copy. The printed copy or the physical copy of the document is scanned to generate a scanned image. The document and the details related to the document present at the location of the repository are accessed. The scanned image is compared with the document stored in the repository to determine the authenticity of either the physical copy or the digital copy of the document.

QR code containing machine readable DNA and nanoparticles
09944110 · 2018-04-17 ·

A security code is provided having a diffractive holographic code of a quick response type, a data-matrix two-dimensional code or other bar code types, formed by a metalized foil with the code embossed thereon. The diffractive holographic code is covered by layers of synthetic DNA and nanoparticles of highly variable properties. The imprinted layer of synthetic DNA and the imprinted layer of synthetic nanoparticles, are covered by a top layer formed of a protective transparent foil.

Method and systems for authenticating and securing physical items with registering a 3D digital representation as a non-fungible token
12175479 · 2024-12-24 · ·

Embodiments relate to a non-fungible physical (NFP) item. The non-fungible physical (NFP) item comprises an identifier. The identifier is embedded and layered within the non-fungible physical item in an unplanned pattern. The identifier in the unplanned pattern is configured to provide high security against counterfeiting of the non-fungible physical (NFP) item. The identifier comprises at least one of a random marker and a unique marker. The unplanned pattern comprises at least one of a random pattern and a unique pattern. Further the non-fungible physical (NFP) item is registered as a non-fungible token on a blockchain. The NFP item is then paired with the non-fungible token for enabling two-way mutual authentication and enhanced authenticity. The pairing of the NFP item with the non-fungible token enables tracking condition, provenance, and grading of the NFP item.

METHOD FOR MANUFACTURING A GROUP OF PACKAGING MEDIA
20170206494 · 2017-07-20 · ·

A method for manufacturing a group of packaging media includes producing a series of packaging media; generating a sequence of unique codes in a computer system, physically marking the series of packaging media with the unique codes; registering a first unique code marked on a first packaging media in a first end of the series, entering an ordered number of packaging media in the computer system, creating two or more sub-series of packaging media from the series of packaging media based on the ordered number, registering a last unique code marked on a last packaging media in a last end of the sub-series, calculating an expected number of packaging media in the sub-series, and accepting the sub-series if a difference between the expected number and the ordered number is within a pre-defined tolerance, or refusing the sub-series if the difference is outside the pre-defined tolerance.

Authentication of a physical credential

Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential. An image of a credential may be received. An optical characteristic of a secure feature of the credential may be determined. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based on a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.