Patent classifications
G07D7/0047
Methods and systems for providing labels to prevent counterfeiting of products
Embodiments provide methods and systems for providing labels to prevent counterfeiting of products. In an embodiment, the method includes accessing, by a processor, one or more biometric data associated with a manufacturer. The one or more biometric data include fingerprint data, iris pattern, facial pattern, heart rate, electrical activity of skeletal muscles and deoxyribonucleic acid (DNA) data that are encrypted using a first encryption method for generating a first encrypted data. From the first encrypted data, a biometric pattern is extracted. The biometric pattern is appended with one or more product identification codes for generating a product encoded data. The product encoded data is encrypted using a second encryption method. An error checksum data is appended to the second encrypted data and a unique identifier is prefixed to the second encrypted data. The second encrypted data is added to product labels of the products for securing the products from counterfeiting.
MOBILE APPLICATION FOR AUTOMATIC INFORMATION SYNTHESIS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for accessing information encoding an identification document of a subject. The identification document includes biometric information for the subject. A computing device determines that the identification document is authentic. In response to the device determining that the document is authentic, the device verifies the validity of personally identifiable information on the identification document. In response to a determination of validity, the device is used to obtain a live biometric of the subject. The obtained live biometric is compared with biometric information from the identification document that has been authenticated. In response to the comparison indicating a match, a system determines that the subject is the person identified by the identification document. The system extracts personally identifiable information from the identification document to register the subject.
Systems and methods for product authentication
The present invention relates to both systems and methods for product authentication. Unique identifiers are associated with products. Said identifiers are captured through a camera of the client device and transmitted to authentication server; whereupon said authentication server authenticates the products by contacting an authentication database would manufacturer-provided authentication information.
Authentication system and non-transitory computer readable medium
An authentication server 2 stores, for each of one or more objects to be registered, unique pattern information of a surface of the object to be registered and a personal identification number into a database in association with each other, acquires unique pattern information of a surface of an object to be authenticated which is related to an authentication request, and a personal identification number, extracts, from the database, unique pattern information stored in association with the personal identification number related to the authentication request, and determines whether the extracted unique pattern information includes unique pattern information corresponding to the unique pattern information related to the authentication request.
Authentication system and non-transitory computer readable medium
An authentication server 2 stores, for each of one or more objects to be registered, unique pattern information of a surface of the object to be registered and a personal identification number into a database in association with each other, acquires unique pattern information of a surface of an object to be authenticated which is related to an authentication request, and a personal identification number, extracts, from the database, unique pattern information stored in association with the personal identification number related to the authentication request, and determines whether the extracted unique pattern information includes unique pattern information corresponding to the unique pattern information related to the authentication request.
Method of marking a holographic matrix and holographic matrix produced by this method
A method of marking a holographic matrix. The method includes forming the holographic matrix, which is designed to produce holograms by printing. At least one anti-copy mark on the holographic matrix is formed and at least one copy-robust mark on the holographic matrix is formed. At least one of the steps for forming at least one mark on the holographic matrix uses laser-structuring of the holographic matrix surface. Preferably, the anti-copy mark represents a message and a plurality of redundancies of the message carried by the anti-copy mark. Also, preferably, a picosecond laser is used to form the anti-copy mark is formed.
Method of marking a holographic matrix and holographic matrix produced by this method
A method of marking a holographic matrix. The method includes forming the holographic matrix, which is designed to produce holograms by printing. At least one anti-copy mark on the holographic matrix is formed and at least one copy-robust mark on the holographic matrix is formed. At least one of the steps for forming at least one mark on the holographic matrix uses laser-structuring of the holographic matrix surface. Preferably, the anti-copy mark represents a message and a plurality of redundancies of the message carried by the anti-copy mark. Also, preferably, a picosecond laser is used to form the anti-copy mark is formed.
BIOMETRIC AUTHENTICATION FOR PAPER-BASED TRANSACTIONS
Apparatus and methods for protecting biometric authentication information associated with a paper document are provided. A mobile device application may pre-associate the document with a biometric input. The mobile device application may generate a first composite hash value based on a combination of a numerical representation of a first image of the paper document and a numerical representation of a first biometric input. Subsequently, an authentication server may generate a second composite hash value based on a combination of a numerical representation of a second image of the paper document and a numerical representation of a second biometric input. The authentication server may determine whether an edit distance separating the second composite hash value and the first composite hash value is less than a threshold distance. If the edit distance is less than a threshold distance, the paper document may be authenticated.
Method for generating a unique package identifier based on physical properties of a package
A method for generating a package identifier includes generating an image of a portion of a surface of a substrate of the package, generating a serial number of the package from the image, the serial number being based on at least one surface feature of the portion of the surface, and affixing a visual indicator on the package that is based on the serial number. The visual indicator affixed on the package is therefore based on the at least one surface feature of the package.
Method for generating a unique package identifier based on physical properties of a package
A method for generating a package identifier includes generating an image of a portion of a surface of a substrate of the package, generating a serial number of the package from the image, the serial number being based on at least one surface feature of the portion of the surface, and affixing a visual indicator on the package that is based on the serial number. The visual indicator affixed on the package is therefore based on the at least one surface feature of the package.