Patent classifications
G07D7/0043
JEWELRY INCLUDING ETCHED OR PRINTED INFORMATION AND METHOD TO OPTICALLY OR WIRELESSLY ACCESS DIGITAL REPLICA OF THE ETCHED OR PRINTED INFORMATION
A jewelry article, and systems and methods for accessing human readable information printed or etched on the jewelry article are disclosed. The printed or etched human readable information included in the jewelry article cannot be viewed without a visual aid. The jewelry article includes a wireless or optical tag corresponding to the printed or etched human readable information. The wireless or optical tag is associated with an electronic file corresponding to the printed or etched human readable information. The wireless or optical tag is configured to be readable by an external reader connected to an external database that stores the electronic file corresponding to the printed or etched human readable information. The external reader is configured to read the wireless or optical tag to access the associated electronic file stored in the external database. Information included in the electronic file may be displayed on a display.
Method for preventing check fraud
Systems and methods for processing checks using 2D barcodes are provided. A user submits a digital image of a check that includes a 2D barcode. The 2D barcode has embedded positional information of one or more check features which can be decoded and compared to the check features optically identified on the digital image of the check. From this, a set of rotational and scaling adjustments can be computed by comparing estimated positional information with the positional information of the one or more check features retrieved from the barcode. A more accurate representation of the check is then produced by applying the set of rotational and scaling adjustments to the digital image of the check. Once a more accurate representation of the check has been produced, the check can be electronically processed using a routing transit number found on the check.
Method for preventing check fraud
Systems and methods for processing checks using 2D barcodes are provided. A user submits a digital image of a check that includes a 2D barcode. The 2D barcode has embedded positional information of one or more check features which can be decoded and compared to the check features optically identified on the digital image of the check. From this, a set of rotational and scaling adjustments can be computed by comparing estimated positional information with the positional information of the one or more check features retrieved from the barcode. A more accurate representation of the check is then produced by applying the set of rotational and scaling adjustments to the digital image of the check. Once a more accurate representation of the check has been produced, the check can be electronically processed using a routing transit number found on the check.
A SYSTEM FOR PRODUCT AUTHENTICATION AND METHOD THEREOF
The present disclosure envisages a system for product authentication comprises a non-replicable security tag, at least one mobile device and a server. The security tag comprises a background print layer and a foreground print layer. The foreground print layer includes a tag identifier and a variable image pattern. The mobile device scans the security tag and 5 facilitates a first level authentication of the tag locally on the mobile device. The server is configured facilitate a second level authentication for the tag over a network.
Dual code authentication process
A dual code authentication process combining a visible QR code with an invisible randomly generated code which can be alpha, numeric, symbol or image that can only be read with a reading device. A data generation engine is used to create the generated code which is assigned to the QR code and stored in a cloud based database. The QR code is decodable by a handheld reading device which communicates with the cloud based database releasing a copy of the generated code to the reading device. A reader is then used to decode the invisible printed code wherein the user can compare the printed code on the document and the code stored on the cloud based database to determine a match and authenticity.
SECURITY ELEMENT FORMED FROM AT LEAST TWO INKS APPLIED IN OVERLAPPING PATTERNS, ARTICLES CARRYING THE SECURITY ELEMENT, AND AUTHENTICATION METHODS
A security element comprising a first and a second pattern PAT1 and PAT2 formed in or on a substrate, the first pattern PAT1 being formed by a first material INK1 applied to a first region of the substrate, the second pattern PAT2 being formed by a second material INK2 applied to a second region of the substrate, said first and second regions of the substrate overlapping,
wherein a part of the first pattern PAT1 overlaps with a part of said second pattern PAT2, the first material INK1 comprises a first luminescent dye or pigment DYE1, which upon excitation by electromagnetic radiation falling within an excitation wavelength range 1a of the first luminescent dye or pigment DYE1 is capable of emitting electromagnetic radiation in at least one first emission wavelength range 1e, and the second material INK2 comprises a second luminescent dye or pigment DYE2, which upon excitation by electromagnetic radiation falling within an excitation wavelength range 2a of the second luminescent dye or pigment DYE2 is capable of emitting electromagnetic radiation in at least one second emission wavelength range 2e, and said first emission wavelength range 1e of the first luminescent dye or pigment DYE1 overlaps with the excitation wavelength range 2a of the second luminescent dye or pigment DYE2, so that upon irradiation with electromagnetic radiation within the excitation wavelength range 1a of the first luminescent dye or pigment DYE1 the second luminescent dye or pigment DYE2 is excited, in the area of overlap of the patterns, to emit electromagnetic radiation in the emission wavelength range 2e.
SECURITY ELEMENT FORMED FROM AT LEAST TWO INKS APPLIED IN OVERLAPPING PATTERNS, ARTICLES CARRYING THE SECURITY ELEMENT, AND AUTHENTICATION METHODS
A security element comprising a first and a second pattern PAT1 and PAT2 formed in or on a substrate, the first pattern PAT1 being formed by a first material INK1 applied to a first region of the substrate, the second pattern PAT2 being formed by a second material INK2 applied to a second region of the substrate, said first and second regions of the substrate overlapping,
wherein a part of the first pattern PAT1 overlaps with a part of said second pattern PAT2, the first material INK1 comprises a first luminescent dye or pigment DYE1, which upon excitation by electromagnetic radiation falling within an excitation wavelength range 1a of the first luminescent dye or pigment DYE1 is capable of emitting electromagnetic radiation in at least one first emission wavelength range 1e, and the second material INK2 comprises a second luminescent dye or pigment DYE2, which upon excitation by electromagnetic radiation falling within an excitation wavelength range 2a of the second luminescent dye or pigment DYE2 is capable of emitting electromagnetic radiation in at least one second emission wavelength range 2e, and said first emission wavelength range 1e of the first luminescent dye or pigment DYE1 overlaps with the excitation wavelength range 2a of the second luminescent dye or pigment DYE2, so that upon irradiation with electromagnetic radiation within the excitation wavelength range 1a of the first luminescent dye or pigment DYE1 the second luminescent dye or pigment DYE2 is excited, in the area of overlap of the patterns, to emit electromagnetic radiation in the emission wavelength range 2e.
Authentication method and system
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
Authentication method and system
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
SYSTEMS AND METHODS FOR PRODUCT AUTHENTICATION
The present invention relates to systems for product authentication. Unique identifiers are associated with products. Said identifiers are captured through a camera of the client device and transmitted to authentication server; whereupon said authentication server authenticates the products by contacting an authentication database which includes manufacturer-provided authentication information.