Patent classifications
G07D7/0034
Authentication of a physical credential
Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential. An image of a credential may be received. An optical characteristic of a secure feature of the credential may be determined. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based on a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.
Game system
A game system includes: a bill identifying apparatus for identifying bills of different currencies and an amount of the bills and then outputting data representing the identified result; a player tracking device which is integrated with each of gaming machines, for converting data outputted from the bill identifying apparatus to credit data for executing a game, based on an exchange rate; and an information card device which is integrated with the player tracking device, the information card device causing an information card to store data equivalent to an amount awarded to a player in accordance with a game result of the gaming machines and sending out the credit data for executing the game to the gaming machines, based on the data equivalent to the amount read from the information card.
Printer driver separately applying watermark and information
The present invention provides a printer responsive to commands from printer driver software. The printer driver software is characterized by being responsive to two types of input data. One of the types includes text data, and the other of the types includes watermark data. The two types of data are separately applied to printer driver software, rather than integrated together prior to application to the printer driver software.
Forming, authenticating and securing non-fungible items
Embodiments relate to a non-fungible physical (NFP) item. The non-fungible physical (NFP) item comprises an identifier. The identifier is embedded and layered within the non-fungible physical item in an unplanned pattern. The identifier in the unplanned pattern is configured to provide high security against counterfeiting of the non-fungible physical (NFP) item. The identifier comprises at least one of a random marker and a unique marker. The unplanned pattern comprises at least one of a random pattern and a unique pattern. Further the non-fungible physical (NFP) item is registered as a non-fungible token on a blockchain. The NFP item is then paired with the non-fungible token for enabling two-way mutual authentication and enhanced authenticity. The pairing of the NFP item with the non-fungible token enables tracking condition, provenance, and grading of the NFP item.
FORMING, AUTHENTICATING AND SECURING NON-FUNGIBLE ITEMS
Embodiments relate to a non-fungible physical (NFP) item. The non-fungible physical (NW) item comprises an identifier. The identifier is embedded and layered within the non-fungible physical item in an unplanned pattern. The identifier in the unplanned pattern is configured to provide high security against counterfeiting of the non-fungible physical (NFP) item. The identifier comprises at least one of a random marker and a unique marker. The unplanned pattern comprises at least one of a random pattern and a unique pattern. Further the non-fungible physical (NFP) item is registered as a non-fungible token on a blockchain. The NFP item is then paired with the non-fungible token for enabling two-way mutual authentication and enhanced authenticity. The pairing of the NFP item with the non-fungible token enables tracking condition, provenance, and grading of the NFP item.
Security article authentication
A user device may cause light to be emitted at a security article by one or more light emission devices of the user device. The user device may obtain from a first set of one or more optical sensor devices of the user device first sensor data associated with the security article, and may obtain from a second set of one or more optical sensor devices of the user device second sensor data associated with the security article. The user device may determine, based on the first sensor data and the second sensor data, one or more characteristics of a security feature of the security article. The user device may determine, based on the one or more characteristics of the security feature, whether the security article is authentic. The user device may cause, based on determining whether the security article is authentic, one or more actions to be performed.
AUTHENTICATING MULTI-LAYERED OBJECTS USING ENCODED SIGNALS
Systems, methods and technology for authenticating multi-layered objects using encoded signals such as digital watermarking. In one implementation, a value document includes a substrate and a removable overlayer, with a security feature comprising a digital watermark signal printed to cover portions of both the substrate and overlayer. The digital watermark signal includes spatially arranged signal elements forming a frame of reference. Tampering is detected by evaluating offset values associated with the signal elements, where misalignment within the frame of reference indicates tampering. In some implementations, the value document includes a first digital watermark on the substrate with synchronization and payload components, a token with a second digital watermark, and a removable sticker with a third digital watermark. Additional security features include split-mark configurations, tamper mark configurations, holographic foils with overprinted digital watermarks, and fragile tamper-deterrent features that deform upon tampering attempts, causing detectable signal distortion. Other combinations are also provided.
SECURITY ARTICLE AUTHENTICATION
A user device may cause light to be emitted at a security article by one or more light emission devices of the user device. The user device may obtain from a first set of one or more optical sensor devices of the user device first sensor data associated with the security article, and may obtain from a second set of one or more optical sensor devices of the user device second sensor data associated with the security article. The user device may determine, based on the first sensor data and the second sensor data, one or more characteristics of a security feature of the security article. The user device may determine, based on the one or more characteristics of the security feature, whether the security article is authentic. The user device may cause, based on determining whether the security article is authentic, one or more actions to be performed.
FORMING, AUTHENTICATING AND SECURING NON-FUNGIBLE ITEMS
Embodiments relate to a non-fungible physical (NFP) item. The non-fungible physical (NW) item comprises an identifier. The identifier is embedded and layered within the non-fungible physical item in an unplanned pattern. The identifier in the unplanned pattern is configured to provide high security against counterfeiting of the non-fungible physical (NFP) item. The identifier comprises at least one of a random marker and a unique marker. The unplanned pattern comprises at least one of a random pattern and a unique pattern. Further the non-fungible physical (NFP) item is registered as a non-fungible token on a blockchain. The NFP item is then paired with the non-fungible token for enabling two-way mutual authentication and enhanced authenticity. The pairing of the NFP item with the non-fungible token enables tracking condition, provenance, and grading of the NFP item.