G07D7/0043

METHOD FOR AUTHENTICATING AN OBJECT, PARTICULARLY A SECURITY ELEMENT, AND A SECURITY ELEMENT
20210174374 · 2021-06-10 ·

A method for authenticating an object, particularly a security element for protecting value documents, ID documents and products, as well as a security element, a security document, a reader, an individualization device and a server for such a method. The method involves the steps: dividing a first code element into at least one first partial code element and one second partial code element, storing the second partial code element, arranging the first partial code element and/or a second code element on and/or in the object, jointly machine-capturing the first partial code element and the second code element by means of a reader, extracting the first partial code element and the second code element from the data captured by the reader, accessing the stored second partial code element using the second code element as a key, checking whether the code element resulting from merging the extracted first partial code element and the stored second partial code element corresponds to the first code element.

METHOD FOR AUTHENTICATING AN OBJECT, PARTICULARLY A SECURITY ELEMENT, AND A SECURITY ELEMENT
20210174374 · 2021-06-10 ·

A method for authenticating an object, particularly a security element for protecting value documents, ID documents and products, as well as a security element, a security document, a reader, an individualization device and a server for such a method. The method involves the steps: dividing a first code element into at least one first partial code element and one second partial code element, storing the second partial code element, arranging the first partial code element and/or a second code element on and/or in the object, jointly machine-capturing the first partial code element and the second code element by means of a reader, extracting the first partial code element and the second code element from the data captured by the reader, accessing the stored second partial code element using the second code element as a key, checking whether the code element resulting from merging the extracted first partial code element and the stored second partial code element corresponds to the first code element.

Methods for encoding a source color illustration, for authenticating an illustration, and related computer media
11042792 · 2021-06-22 · ·

The disclosure relates to a method for encoding an illustration, which involves writing the illustration in greyscale or in color, encoding a message in the form of a two-dimensional barcode comprising a set of blocks, each block encoding a fragment of the message and comprising a set of (M) rows and (N) columns, and each block comprising a set of encoding sub-blocks, each subblock comprising a set of bits. It is essentially characterized in that the encoding step comprises defining or identifying a set of remarkable points on the source illustration, calculating a set of attributes according to certain remarkable points, selecting, among the set of attributes, at least one attribute making it possible to define a digital fingerprint, optionally compressed, optionally sign the digital fingerprint, record in the message one of at least one attribute, the digital fingerprint, optionally compressed, the signed digital fingerprint in compressed or non-compressed form.

Method and system for determining whether a barcode is genuine using a deviation from a nominal shape
10922699 · 2021-02-16 · ·

A method for determining whether a candidate barcode is genuine involves acquiring an image of an original barcode; determining, from the image of the original barcode, a deviation of a continuous edge of the original barcode from a nominal shape; encoding the deviation as signature data for the original barcode; storing the signature data for the original barcode on a storage device; acquiring an image of the candidate barcode; determining, from the image of the candidate barcode, a deviation of a continuous edge of the candidate barcode from the nominal shape; retrieving the signature data for the original barcode from the storage device; comparing the signature data for the original barcode with the signature data for the candidate barcode; and making a determination that the candidate barcode is genuine or not genuine based on a result of the comparison.

Method and system for determining whether a barcode is genuine using a deviation from a nominal shape
10922699 · 2021-02-16 · ·

A method for determining whether a candidate barcode is genuine involves acquiring an image of an original barcode; determining, from the image of the original barcode, a deviation of a continuous edge of the original barcode from a nominal shape; encoding the deviation as signature data for the original barcode; storing the signature data for the original barcode on a storage device; acquiring an image of the candidate barcode; determining, from the image of the candidate barcode, a deviation of a continuous edge of the candidate barcode from the nominal shape; retrieving the signature data for the original barcode from the storage device; comparing the signature data for the original barcode with the signature data for the candidate barcode; and making a determination that the candidate barcode is genuine or not genuine based on a result of the comparison.

Security element formed from at least two inks applied in overlapping patterns, articles carrying the security element, and authentication methods

Security element including a first and second pattern formed by a first and second material respectively in or on a first and a second region of a substrate respectively, the first pattern partially overlapping with said second pattern, the first material comprising a first luminescent dye, which upon excitation by electromagnetic radiation falling within its excitation wavelength range emits electromagnetic radiation in a first emission wavelength range, the second material comprising a second luminescent dye, which upon excitation by electromagnetic radiation falling within its excitation wavelength range emits electromagnetic radiation in a second emission wavelength range, said first emission wavelength range overlapping with the excitation wavelength range of the second luminescent dye, so that upon irradiation within the excitation wavelength range of the first luminescent dye the second luminescent dye is excited, in the overlapping area of the patterns, to emit electromagnetic radiation in the emission wavelength range.

Security element formed from at least two inks applied in overlapping patterns, articles carrying the security element, and authentication methods

Security element including a first and second pattern formed by a first and second material respectively in or on a first and a second region of a substrate respectively, the first pattern partially overlapping with said second pattern, the first material comprising a first luminescent dye, which upon excitation by electromagnetic radiation falling within its excitation wavelength range emits electromagnetic radiation in a first emission wavelength range, the second material comprising a second luminescent dye, which upon excitation by electromagnetic radiation falling within its excitation wavelength range emits electromagnetic radiation in a second emission wavelength range, said first emission wavelength range overlapping with the excitation wavelength range of the second luminescent dye, so that upon irradiation within the excitation wavelength range of the first luminescent dye the second luminescent dye is excited, in the overlapping area of the patterns, to emit electromagnetic radiation in the emission wavelength range.

Devices, systems, and methods for optical validation

Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.

Devices, systems, and methods for optical validation

Existing currency validation (CVAL) devices, systems, and methods are too slow, costly, intrusive, and/or bulky to be routinely used in common transaction locations (e.g., at checkout, at an automatic teller machine, etc.). Presented herein are devices, systems, and methods to facilitate optical validation of documents, merchandise, or currency at common transaction locations and to do so in an obtrusive and convenient way. More specifically, the present invention embraces a validation device that may be used alone or integrated within a larger system (e.g., point of sale system, kiosk, etc.). The present invention also embraces methods for currency validation using the validation device, as well as methods for improving the quality and consistency of data captured by the validation device for validation.

Method for authenticating an illustration
11055589 · 2021-07-06 · ·

The invention relates to a method for authenticating an illustration, comprisingencoding a message in the form of a two-dimensional barcode comprising blocks, each block coding a fragment of said message and comprising a set of coding sub-blocks, each sub-block comprising a set of binary elements. It is essentially characterised in that the encoding comprises prior steps consisting in:defining or identifying a set of noteworthy points in the illustration,calculating a set of attributes depending on certain at least of the noteworthy points,selecting, among the calculated attributes, at least one attribute allowing a digital fingerprint to be definedoptionally compressing said digital fingerprint,optionally signing said digital fingerprint by means of a cryptographic signature, andrecording in the message one among:a set of at least one attribute,the digital fingerprint,the compressed digital fingerprint, andthe signed and optionally compressed digital fingerprint.