Patent classifications
G07D7/0043
SECURITY PRINT MEDIA
A security print medium for forming security documents therefrom, the security print medium comprising a core having opposing first and second sides. The core comprises a radiation-responsive substance distributed within the core across at least a first region of the core, the radiation-responsive substance being responsive to a predetermined input radiation by producing a predetermined output radiation. The security print medium further comprises a first encoding layer disposed on the first side of the core and a second encoding layer disposed on the second side of the core, each of the first and second encoding layers comprising an encoding material that modifies the intensity of the predetermined input radiation and/or the predetermined output radiation produced by the radiation-responsive substance transmitted through the respective encoding layer, wherein the first and second encoding layers overlap each other across the first region. The optical density of each of the first and second encoding layers varies across the first region in accordance with a predetermined pattern, the predetermined pattern defining one or more encoding features, such that when the security print medium is exposed to the predetermined input radiation, the output radiation detectable from one or each side of the security print medium varies across the first region in accordance with the one or more encoding features. The first and second encoding layers are configured such that when the security print medium is viewed in transmitted visible light, the intensity of visible light transmitted through the first encoding layer, the core and the second encoding layer in combination is uniform across the first region, such that the one or more encoding features is concealed.
VIRTUAL AUTHENTICATION DETECTION
Methods, systems, and devices are provided for authentication system configured to authenticate a document. According to one aspect, the system can receive image capture data including one or more virtual images of the document. The system can detect one or more identification indicators in the one or more virtual images. The system can detect one or more authentication indicators in the one or more virtual images. And the system can detect whether the document is authentic based on a result including analyzing the one or more identification indicators and analyzing the one or more authentication indicators.
AUTHENTICATION METHOD AND SYSTEM
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
AUTHENTICATION METHOD AND SYSTEM
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
Devices, systems, and methods for optical validation
- Erik Van Horn ,
- Gennady GERMAINE ,
- Christopher Allen ,
- David J. RYDER ,
- Paul Poloniewicz ,
- Kevin SABER ,
- Sean Philip Kearney ,
- Edward HATTON ,
- Edward C. Bremer ,
- Michael Vincent Miraglia ,
- Robert PIERCE ,
- William Ross Rapoport ,
- James Vincent GUIHEEN ,
- Chirag PATEL ,
- Patrick Anthony Giordano ,
- Timothy Good ,
- Gregory M. Rueblinger
Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.
Devices, systems, and methods for optical validation
- Erik Van Horn ,
- Gennady GERMAINE ,
- Christopher Allen ,
- David J. RYDER ,
- Paul Poloniewicz ,
- Kevin SABER ,
- Sean Philip Kearney ,
- Edward HATTON ,
- Edward C. Bremer ,
- Michael Vincent Miraglia ,
- Robert PIERCE ,
- William Ross Rapoport ,
- James Vincent GUIHEEN ,
- Chirag PATEL ,
- Patrick Anthony Giordano ,
- Timothy Good ,
- Gregory M. Rueblinger
Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.
Tamper-activated authenticable security device
A security device and a method for verifying such a security device are disclosed. The security device has at least two security features. At least one of the security features is a tamper-evident security feature, which is configured to alter irreversibly upon mechanical tampering with the security device. At least one other of the security features is a robust security feature, which is robust against tampering with the security device. The at least two security features can be extracted from at least one image of the security device with a programmable device having a camera at least in an intact state of the security device.
Systems and methods for counterfeit check detection
Techniques for detecting counterfeit checks include using sensors to determine correspondence between items detected on a check using machine vision. Correspondence between different items on a received check is used to generate a check score, which is compared to a risk-based threshold to determine how a transaction involving the check should be handled.
SYSTEM AND METHOD FOR MOBILE DEVICE PHOSPHOR EXCITATION AND DETECTION
The present disclosure is drawn to a method and system for the excitation, identification, and authentication of light emitting materials using a mobile device comprising at least one Vertical Cavity Surface Emitting Laser (VCSEL), for use in a variety of applications.
SYSTEM AND METHOD FOR MOBILE DEVICE PHOSPHOR EXCITATION AND DETECTION
The present disclosure is drawn to a method and system for the excitation, identification, and authentication of light emitting materials using a mobile device comprising at least one Vertical Cavity Surface Emitting Laser (VCSEL), for use in a variety of applications.