G07D7/0043

Laser light detection and barcode display at mobile phone
10496909 · 2019-12-03 · ·

Systems and methods for utilizing one or more cameras at a mobile device to assist in the implementing anti-counterfeit measures for digital barcodes are disclosed. For example, the systems and methods use a mobile device's front camera to capture photographs (or images) at a certain frequency (e.g., capture a photograph every 0.20 seconds). The systems and methods then scan the captured photograph and retrieve relevant image data (for example, scan image vertically and utilize image data of every fourth pixel). The systems and methods compare certain properties of the retrieved image data with properties of one or more comparison light sources. When the systems and methods detect a match (for example, a match within certain threshold parameters), they identify a barcode among a set of barcodes and display the identified barcode at a display screen of the mobile device.

METHODS AND A SYSTEM FOR VERIFYING THE IDENTITY OF A PRINTED ITEM
20190362114 · 2019-11-28 ·

A method of verifying an identity of a printed item includes capturing an image of the unverified printed item, wherein the unverified printed item includes artifacts and at least some of the artifacts were not controllably producible in producing the unverified printed item; extracting information associated with the artifacts of the unverified printed item; ranking the information associated with the artifacts of the unverified printed item; retrieving stored ranked information associated with artifacts of an original printed item from a storage device; and in each of a first and second range of magnitudes, comparing the ranked information associated with the artifacts of the unverified printed item with the ranked information associated with the artifacts of the original printed item.

METHODS AND A SYSTEM FOR VERIFYING THE IDENTITY OF A PRINTED ITEM
20190362114 · 2019-11-28 ·

A method of verifying an identity of a printed item includes capturing an image of the unverified printed item, wherein the unverified printed item includes artifacts and at least some of the artifacts were not controllably producible in producing the unverified printed item; extracting information associated with the artifacts of the unverified printed item; ranking the information associated with the artifacts of the unverified printed item; retrieving stored ranked information associated with artifacts of an original printed item from a storage device; and in each of a first and second range of magnitudes, comparing the ranked information associated with the artifacts of the unverified printed item with the ranked information associated with the artifacts of the original printed item.

METHOD FOR AUTHENTICATING AN ILLUSTRATION
20190354822 · 2019-11-21 ·

The invention relates to a method for authenticating an illustration, comprisingencoding a message in the form of a two-dimensional barcode comprising blocks, each block coding a fragment of said message and comprising a set of coding sub-blocks, each sub-block comprising a set of binary elements. It is essentially characterised in that the encoding comprises prior steps consisting in:defining or identifying a set of noteworthy points in the illustration,calculating a set of attributes depending on certain at least of the noteworthy points,selecting, among the calculated attributes, at least one attribute allowing a digital fingerprint to be definedoptionally compressing said digital fingerprint,optionally signing said digital fingerprint by means of a cryptographic signature, andrecording in the message one among:a set of at least one attribute,the digital fingerprint,the compressed digital fingerprint, andthe signed and optionally compressed digital fingerprint.

METHOD FOR AUTHENTICATING AN ILLUSTRATION
20190354822 · 2019-11-21 ·

The invention relates to a method for authenticating an illustration, comprisingencoding a message in the form of a two-dimensional barcode comprising blocks, each block coding a fragment of said message and comprising a set of coding sub-blocks, each sub-block comprising a set of binary elements. It is essentially characterised in that the encoding comprises prior steps consisting in:defining or identifying a set of noteworthy points in the illustration,calculating a set of attributes depending on certain at least of the noteworthy points,selecting, among the calculated attributes, at least one attribute allowing a digital fingerprint to be definedoptionally compressing said digital fingerprint,optionally signing said digital fingerprint by means of a cryptographic signature, andrecording in the message one among:a set of at least one attribute,the digital fingerprint,the compressed digital fingerprint, andthe signed and optionally compressed digital fingerprint.

UNIQUE IDENTIFICATION INFORMATION FROM MARKED FEATURES
20190354994 · 2019-11-21 ·

A method for determining whether a candidate barcode is genuine includes acquiring an image of an original barcode; determining, from the image of the original barcode, a deviation of at least one of a plurality of modules from an idealized grid, a deviation of the continuous edge of the original barcode from a nominal shape, or a deviation in average color of a module of the original barcode from the average for neighboring modules of the original barcode; comparing the numeric data for an original barcode with equivalent numeric data in the candidate barcode; and making a determination that the candidate mark is genuine or not genuine based on a result of the comparison.

UNIQUE IDENTIFICATION INFORMATION FROM MARKED FEATURES
20190354994 · 2019-11-21 ·

A method for determining whether a candidate barcode is genuine includes acquiring an image of an original barcode; determining, from the image of the original barcode, a deviation of at least one of a plurality of modules from an idealized grid, a deviation of the continuous edge of the original barcode from a nominal shape, or a deviation in average color of a module of the original barcode from the average for neighboring modules of the original barcode; comparing the numeric data for an original barcode with equivalent numeric data in the candidate barcode; and making a determination that the candidate mark is genuine or not genuine based on a result of the comparison.

SECURE DIGITAL COUPON DISPLAY AND READING
20190347910 · 2019-11-14 ·

A code is displayed on a screen with a first set of indicia, the code designed to be read only by a computer system. A second code is displayed only when it is determined that the code is being read. This determination is made by an optical sensor, such as a camera, detecting a particular wavelength of light above a threshold, the wavelength associated with an expected reader device. While the particular wavelength is detected the second code is displayed. Once the light is no longer detected, the display reverts back to the first code. In this manner, the second code, such as a barcode to be read is only displayed while the barcode is actually being read, but is otherwise hidden from view. The entire process can take place in under a second or in a fraction of a second, such as 1/10th of a second or less.

SECURE DIGITAL COUPON DISPLAY AND READING
20190347910 · 2019-11-14 ·

A code is displayed on a screen with a first set of indicia, the code designed to be read only by a computer system. A second code is displayed only when it is determined that the code is being read. This determination is made by an optical sensor, such as a camera, detecting a particular wavelength of light above a threshold, the wavelength associated with an expected reader device. While the particular wavelength is detected the second code is displayed. Once the light is no longer detected, the display reverts back to the first code. In this manner, the second code, such as a barcode to be read is only displayed while the barcode is actually being read, but is otherwise hidden from view. The entire process can take place in under a second or in a fraction of a second, such as 1/10th of a second or less.

DOCUMENT AUTHENTICATION SYSTEM
20190347888 · 2019-11-14 ·

A secure document verification system is described, for verifying the authenticity of secure documents' The secure documents each comprise a paper document having a radio frequency tag, e.g. a NFC tag, and a document identification code. The system comprises a database storing data representing a plurality of signed secure documents, wherein each document is signed using a pairing of tag and document identification codes, received in a signing or calibration stage. The system is arranged responsive to receiving a verification request from a remote device, which request contains the tag identification data, to compare the tag identification data with the signed documents, and responsive to a match, to transmit back to the remote device a verification message.