Patent classifications
G07D7/0047
Security document with attached security device which demonstrates increased harvesting resistance
A security document has a security substrate, a security device and a structural weakness element, wherein the security device is coupled to the security substrate, wherein the structural weakness element is integrated with at least one of the security substrate or the security device, the structural weakness element defining an anti-harvesting area and a bulk area, and wherein the anti-harvesting area has one or more of structural fidelity or optical fidelity with the bulk area.
Security document with attached security device which demonstrates increased harvesting resistance
A security document has a security substrate, a security device and a structural weakness element, wherein the security device is coupled to the security substrate, wherein the structural weakness element is integrated with at least one of the security substrate or the security device, the structural weakness element defining an anti-harvesting area and a bulk area, and wherein the anti-harvesting area has one or more of structural fidelity or optical fidelity with the bulk area.
Generating a Unique Code from Orientation Information
In a general aspect, orientation information is used to generate a unique code. In some aspects, orientation information is extracted from an object. The object includes multiple elements, and the orientation information indicates the relative spatial orientations of the respective elements. The orientation information can be extracted, for instance, by a scanner system that detects the elements. A unique code is generated for the object based on the orientation information. In some examples, the elements are diamond particles that each have one or more color centers, and the orientation information is extracted by detecting the color centers.
Generating a Unique Code from Orientation Information
In a general aspect, orientation information is used to generate a unique code. In some aspects, orientation information is extracted from an object. The object includes multiple elements, and the orientation information indicates the relative spatial orientations of the respective elements. The orientation information can be extracted, for instance, by a scanner system that detects the elements. A unique code is generated for the object based on the orientation information. In some examples, the elements are diamond particles that each have one or more color centers, and the orientation information is extracted by detecting the color centers.
BANKNOTE HANDLING APPARATUS AND BANKNOTE HANDLING METHOD
In order to meet a demand for banknote handling using serial numbers, a banknote handling apparatus is provided with a recognition unit configured to read a serial number of a banknote, and a control unit configured to determine a first type, of the banknote, related to the serial number, based on the serial number read by the recognition unit, and determine a second type, of the banknote, related to authenticity and fitness, based on the first type.
BANKNOTE HANDLING APPARATUS AND BANKNOTE HANDLING METHOD
In order to meet a demand for banknote handling using serial numbers, a banknote handling apparatus is provided with a recognition unit configured to read a serial number of a banknote, and a control unit configured to determine a first type, of the banknote, related to the serial number, based on the serial number read by the recognition unit, and determine a second type, of the banknote, related to authenticity and fitness, based on the first type.
AUTHENTICATION OF DEVICES
An example apparatus includes a packaging container, and any of a label and an electronic tag detachably connected to the packaging container and including an electrical code set for electrical authentication upon removal of any of the label and the electronic tag from the packaging container and being affixed to a device associated with the packaging container, wherein the electrical authentication is to validate the packaging container and the device as original equipment manufacturer components. Any of the label and the packaging container is altered upon removal of the label from the packaging container.
Generating a Unique Code from Orientation Information
In a general aspect, orientation information is used to generate a unique code. In some aspects, orientation information is extracted from an object. The object includes multiple elements, and the orientation information indicates the relative spatial orientations of the respective elements. The orientation information can be extracted, for instance, by a scanner system that detects the elements. A unique code is generated for the object based on the orientation information. In some examples, the elements are diamond particles that each have one or more color centers, and the orientation information is extracted by detecting the color centers.
Generating a Unique Code from Orientation Information
In a general aspect, orientation information is used to generate a unique code. In some aspects, orientation information is extracted from an object. The object includes multiple elements, and the orientation information indicates the relative spatial orientations of the respective elements. The orientation information can be extracted, for instance, by a scanner system that detects the elements. A unique code is generated for the object based on the orientation information. In some examples, the elements are diamond particles that each have one or more color centers, and the orientation information is extracted by detecting the color centers.
Biometric authentication for paper-based transactions
Apparatus and methods for protecting biometric authentication information associated with a paper document are provided. A mobile device application may pre-associate the document with a biometric input. The mobile device application may generate a first composite hash value based on a combination of a numerical representation of a first image of the paper document and a numerical representation of a first biometric input. Subsequently, an authentication server may generate a second composite hash value based on a combination of a numerical representation of a second image of the paper document and a numerical representation of a second biometric input. The authentication server may determine whether an edit distance separating the second composite hash value and the first composite hash value is less than a threshold distance. If the edit distance is less than a threshold distance, the paper document may be authenticated.