Patent classifications
G07D7/0043
Jewelry including etched or printed information and method to optically or wirelessly access digital replica of the etched or printed information
A jewelry article, and systems and methods for accessing human readable information printed or etched on the jewelry article are disclosed. The printed or etched human readable information included in the jewelry article cannot be viewed without a visual aid. The jewelry article includes a wireless or optical tag corresponding to the printed or etched human readable information. The wireless or optical tag is associated with an electronic file corresponding to the printed or etched human readable information. The wireless or optical tag is configured to be readable by an external reader connected to an external database that stores the electronic file corresponding to the printed or etched human readable information. The external reader is configured to read the wireless or optical tag to access the associated electronic file stored in the external database. Information included in the electronic file may be displayed on a display.
AUTHENTICATION METHOD AND SYSTEM
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
AUTHENTICATION METHOD AND SYSTEM
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
Collation device and non-transitory computer readable medium storing program
A collation device includes a light source unit; a camera unit that receives light emitted from the light source unit and reflected in a collation area of an object to acquire a photographed image of the collation area; and a processor configured to, by executing a program: detect a positional relationship between the light source unit and the camera unit by using the photographed image, and notify of a collation result between the photographed image and a registered image prepared in advance by using the positional relationship.
VIRTUAL CHECK SYSTEM AND METHOD
This disclosure includes devices, systems, and methods for providing a virtual check blank. The virtual check blank includes data tags, including an issuer data tag, the issuer data tag including issuer check data and an issuer digital signature, and check image data configured to generate an image related to the virtual check blank and at least some of the data tags. The virtual check blank is configured to be modified by a payer in a transaction, wherein the virtual check blank is configured to add a payer data tag of the data tags, the payer data tag including: the issuer data tag, payer check data, a payer digital signature.
VIRTUAL CHECK SYSTEM AND METHOD
This disclosure includes devices, systems, and methods for providing a virtual check blank. The virtual check blank includes data tags, including an issuer data tag, the issuer data tag including issuer check data and an issuer digital signature, and check image data configured to generate an image related to the virtual check blank and at least some of the data tags. The virtual check blank is configured to be modified by a payer in a transaction, wherein the virtual check blank is configured to add a payer data tag of the data tags, the payer data tag including: the issuer data tag, payer check data, a payer digital signature.
SECURE AND TRACEABLE SECURITY FEATURES FOR DOCUMENTS
A system for providing document authenticity, securing, and tracing includes a mark, an invisible code and a serial number. A user desiring to create a secure, verifiable document can receive one or more codes or indicia to put on the physical document.
Methods and systems for providing labels to prevent counterfeiting of products
Embodiments provide methods and systems for providing labels to prevent counterfeiting of products. In an embodiment, the method includes accessing, by a processor, one or more biometric data associated with a manufacturer. The one or more biometric data include fingerprint data, iris pattern, facial pattern, heart rate, electrical activity of skeletal muscles and deoxyribonucleic acid (DNA) data that are encrypted using a first encryption method for generating a first encrypted data. From the first encrypted data, a biometric pattern is extracted. The biometric pattern is appended with one or more product identification codes for generating a product encoded data. The product encoded data is encrypted using a second encryption method. An error checksum data is appended to the second encrypted data and a unique identifier is prefixed to the second encrypted data. The second encrypted data is added to product labels of the products for securing the products from counterfeiting.
Methods and systems for providing labels to prevent counterfeiting of products
Embodiments provide methods and systems for providing labels to prevent counterfeiting of products. In an embodiment, the method includes accessing, by a processor, one or more biometric data associated with a manufacturer. The one or more biometric data include fingerprint data, iris pattern, facial pattern, heart rate, electrical activity of skeletal muscles and deoxyribonucleic acid (DNA) data that are encrypted using a first encryption method for generating a first encrypted data. From the first encrypted data, a biometric pattern is extracted. The biometric pattern is appended with one or more product identification codes for generating a product encoded data. The product encoded data is encrypted using a second encryption method. An error checksum data is appended to the second encrypted data and a unique identifier is prefixed to the second encrypted data. The second encrypted data is added to product labels of the products for securing the products from counterfeiting.
Systems and methods for counterfeit check detection
Techniques for detecting counterfeit checks include using sensors to determine correspondence between a portion of sensed check information and related information; analyzing behavior related to accounts to a check deposit transaction; and controlling check depositing through user interface controls or communication. These techniques can be employed individually or in combination.