G07D7/0047

DETERRING INFORMATION COPYING INCLUDING DETERRENCE OF CURRENCY COUNTERFEITING
20180076963 · 2018-03-15 ·

A method for deterring information copying, includes: combining a watermark serial number incorporate in a given medium with a content serial number to create a combined serial number, the watermark serial number uniquely identifies the given medium, and the content serial number uniquely identifies a content stored on the given medium; creating a digital signature by encoding the combined serial number using a private key of a public/private key pair; imprinting the content serial number and the digital signature on the given medium; decoding the digital signature imprinted on the given medium using a public key of the public/private key pair to obtain the combined serial number; comparing the decoded combined serial number with the watermark serial number and the content serial number imprinted of the given medium; and in response to determining that both match the combined serial number, determining that the content is authentic.

DETERRING INFORMATION COPYING INCLUDING DETERRENCE OF CURRENCY COUNTERFEITING
20180076963 · 2018-03-15 ·

A method for deterring information copying, includes: combining a watermark serial number incorporate in a given medium with a content serial number to create a combined serial number, the watermark serial number uniquely identifies the given medium, and the content serial number uniquely identifies a content stored on the given medium; creating a digital signature by encoding the combined serial number using a private key of a public/private key pair; imprinting the content serial number and the digital signature on the given medium; decoding the digital signature imprinted on the given medium using a public key of the public/private key pair to obtain the combined serial number; comparing the decoded combined serial number with the watermark serial number and the content serial number imprinted of the given medium; and in response to determining that both match the combined serial number, determining that the content is authentic.

Method and system for printing stock anti-counterfeiting by means of feature image

A method for printing stock anti-counterfeiting by using a feature image and a corresponding system is disclosed. The method comprises obtaining a feature code for identifying a printing stock by recognizing a first feature of the feature image printed on the printing stock; searching for pre-recorded first anti-counterfeiting information of the printing stock; obtaining second anti-counterfeiting information of the printing stock by recognizing a second feature of the feature image printed on the printing stock; and comparing whether a similarity between the second anti-counterfeiting information and the first anti-counterfeiting information reaches a first match threshold value to determine whether the printing stock is true or false. The first anti-counterfeiting information is embodied as a distinguishable material feature of the printing stock in a feature image region or features of color, shape and position of the image printed in the feature image region.

Method and system for printing stock anti-counterfeiting by means of feature image

A method for printing stock anti-counterfeiting by using a feature image and a corresponding system is disclosed. The method comprises obtaining a feature code for identifying a printing stock by recognizing a first feature of the feature image printed on the printing stock; searching for pre-recorded first anti-counterfeiting information of the printing stock; obtaining second anti-counterfeiting information of the printing stock by recognizing a second feature of the feature image printed on the printing stock; and comparing whether a similarity between the second anti-counterfeiting information and the first anti-counterfeiting information reaches a first match threshold value to determine whether the printing stock is true or false. The first anti-counterfeiting information is embodied as a distinguishable material feature of the printing stock in a feature image region or features of color, shape and position of the image printed in the feature image region.

Method and systems for authenticating and securing physical items with registering a 3D digital representation as a non-fungible token
12175479 · 2024-12-24 · ·

Embodiments relate to a non-fungible physical (NFP) item. The non-fungible physical (NFP) item comprises an identifier. The identifier is embedded and layered within the non-fungible physical item in an unplanned pattern. The identifier in the unplanned pattern is configured to provide high security against counterfeiting of the non-fungible physical (NFP) item. The identifier comprises at least one of a random marker and a unique marker. The unplanned pattern comprises at least one of a random pattern and a unique pattern. Further the non-fungible physical (NFP) item is registered as a non-fungible token on a blockchain. The NFP item is then paired with the non-fungible token for enabling two-way mutual authentication and enhanced authenticity. The pairing of the NFP item with the non-fungible token enables tracking condition, provenance, and grading of the NFP item.

Method and systems for authenticating and securing physical items with registering a 3D digital representation as a non-fungible token
12175479 · 2024-12-24 · ·

Embodiments relate to a non-fungible physical (NFP) item. The non-fungible physical (NFP) item comprises an identifier. The identifier is embedded and layered within the non-fungible physical item in an unplanned pattern. The identifier in the unplanned pattern is configured to provide high security against counterfeiting of the non-fungible physical (NFP) item. The identifier comprises at least one of a random marker and a unique marker. The unplanned pattern comprises at least one of a random pattern and a unique pattern. Further the non-fungible physical (NFP) item is registered as a non-fungible token on a blockchain. The NFP item is then paired with the non-fungible token for enabling two-way mutual authentication and enhanced authenticity. The pairing of the NFP item with the non-fungible token enables tracking condition, provenance, and grading of the NFP item.

Method for protecting the authenticity of an article from imitation and counterfeit
09754200 · 2017-09-05 ·

The method for protecting the authenticity of an article from imitation and counterfeit is characterized by the following. During the packaging process, a container label is affixed to the article, which container label comprises a national bank note having a serial number which is encoded with the aid of a cryptographic algorithm and is shown on the outer surface of the label as a verification code, which is decoded with the aid of cryptographic keys. The verification code is represented in the form of alphanumeric information or in the form of a two-dimensional QR barcode, wherein more than one verification code can be shown on the outer surface of the label.

Method for protecting the authenticity of an article from imitation and counterfeit
09754200 · 2017-09-05 ·

The method for protecting the authenticity of an article from imitation and counterfeit is characterized by the following. During the packaging process, a container label is affixed to the article, which container label comprises a national bank note having a serial number which is encoded with the aid of a cryptographic algorithm and is shown on the outer surface of the label as a verification code, which is decoded with the aid of cryptographic keys. The verification code is represented in the form of alphanumeric information or in the form of a two-dimensional QR barcode, wherein more than one verification code can be shown on the outer surface of the label.

Detecting duplicate deposit items at point of capture
09679431 · 2017-06-13 · ·

Methods, systems, and computer-readable media for detecting duplicate deposit items at a point of capture are presented. In some embodiments, a computing platform may receive image data of a deposit item presented for deposit. Subsequently, the computing platform may obtain magnetic ink character recognition (MICR) information for the deposit item. Then, the computing platform may extract information from one or more visible fields of the deposit item. Next, the computing platform may compare the MICR information and the information extracted from the one or more visible fields with item history information to determine a confidence score indicative of whether the deposit item is a duplicate of a previously-deposited item. If the confidence score is less than a threshold, the computing platform may reject the deposit item at the point of capture. Alternatively, if the confidence score is not less than the threshold, the computing platform may accept the deposit item.

Optically variable security device, and article employing same and method for verifying the authenticity of an article
09666008 · 2017-05-30 · ·

A security device and method are provided for verifying the authenticity of articles, tracking articles, detecting the diversion of articles, and detecting the production of unauthorized articles. The security device includes a substrate and an optically variable security code. The security device may further include a machine-readable representation of the security code. The security device may still further include a unique serial number, which may be machine-readable. The substrate may be an article or, alternatively, the security device may be affixed to an article. An article including at least one of the security devices is also disclosed.