G07D7/0047

Biometric authentication for paper-based transactions

Apparatus and methods for protecting biometric authentication information associated with a paper document are provided. A mobile device application may pre-associate the document with a biometric input. The mobile device application may generate a first composite hash value based on a combination of a numerical representation of a first image of the paper document and a numerical representation of a first biometric input. Subsequently, an authentication server may generate a second composite hash value based on a combination of a numerical representation of a second image of the paper document and a numerical representation of a second biometric input. The authentication server may determine whether an edit distance separating the second composite hash value and the first composite hash value is less than a threshold distance. If the edit distance is less than a threshold distance, the paper document may be authenticated.

EMBEDDED VARIABLE CURVED SPIRAL PATTERNS

In general, the subject matter described in this specification relates to security credentials for documents, such as identification documents. One example is an identification document that includes a photographic image of an individual associated with the document, and a spiral pattern applied to a region of the identification document. The spiral pattern includes an elliptical spiral segmented into a plurality of arc segments, where wherein the arc segments of the spiral pattern encode identification data associated with the individual. Other implementations include corresponding processes, systems, apparatus, and computer programs related to generating and verifying identification documents with spiral patterns.

SECURE AND TRACEABLE SECURITY FEATURES FOR DOCUMENTS
20200202092 · 2020-06-25 ·

A system for providing document authenticity, securing, and tracing includes a mark, an invisible code and a serial number. A user desiring to create a secure, verifiable document can receive one or more codes or indicia to put on the physical document.

SECURE AND TRACEABLE SECURITY FEATURES FOR DOCUMENTS
20200202092 · 2020-06-25 ·

A system for providing document authenticity, securing, and tracing includes a mark, an invisible code and a serial number. A user desiring to create a secure, verifiable document can receive one or more codes or indicia to put on the physical document.

Generating a unique code from orientation information
10685199 · 2020-06-16 · ·

In a general aspect, orientation information is used to generate a unique code. In some aspects, orientation information is extracted from an object. The object includes multiple elements, and the orientation information indicates the relative spatial orientations of the respective elements. The orientation information can be extracted, for instance, by a scanner system that detects the elements. A unique code is generated for the object based on the orientation information. In some examples, the elements are diamond particles that each have one or more color centers, and the orientation information is extracted by detecting the color centers.

Generating a unique code from orientation information
10685199 · 2020-06-16 · ·

In a general aspect, orientation information is used to generate a unique code. In some aspects, orientation information is extracted from an object. The object includes multiple elements, and the orientation information indicates the relative spatial orientations of the respective elements. The orientation information can be extracted, for instance, by a scanner system that detects the elements. A unique code is generated for the object based on the orientation information. In some examples, the elements are diamond particles that each have one or more color centers, and the orientation information is extracted by detecting the color centers.

SYSTEM AND METHOD FOR FACILITATING SAFE HANDLING OF A PHYSICAL MEDIUM OF FINANCIAL EXCHANGE

A method 30 and system 10 for facilitating safe handling of a physical medium of financial exchange, such as cash notes is provided to prevent cash-in-transit heists. The method 30 includes physically marking 33, using a first processing device 8, cash with a unique owner identifier which is associated with the owner of the cash, and physically invalidating 34 the cash through cutting, staining or stamping it. Once invalidated, the worthless cash can be transported risk-free to a desired cash processing facility. Upon arrival, the method includes verifying 44, using an authentication module 24, authenticity of the unique owner identifier and cash notes themselves. If verification fails, law enforcement is notified. If passed, the cash is destroyed 38, using a second processing device 9 which digitizes, using a digitizer 22, the cash notes and transfers a digital equivalent value, which is credited to the owner's account, to an electronic record keeping system 12.

SYSTEM AND METHOD FOR FACILITATING SAFE HANDLING OF A PHYSICAL MEDIUM OF FINANCIAL EXCHANGE

A method 30 and system 10 for facilitating safe handling of a physical medium of financial exchange, such as cash notes is provided to prevent cash-in-transit heists. The method 30 includes physically marking 33, using a first processing device 8, cash with a unique owner identifier which is associated with the owner of the cash, and physically invalidating 34 the cash through cutting, staining or stamping it. Once invalidated, the worthless cash can be transported risk-free to a desired cash processing facility. Upon arrival, the method includes verifying 44, using an authentication module 24, authenticity of the unique owner identifier and cash notes themselves. If verification fails, law enforcement is notified. If passed, the cash is destroyed 38, using a second processing device 9 which digitizes, using a digitizer 22, the cash notes and transfers a digital equivalent value, which is credited to the owner's account, to an electronic record keeping system 12.

Systems and methods for product authentication
10581840 · 2020-03-03 · ·

The present invention relates to systems for product authentication. Unique identifiers are associated with products. Said identifiers are captured through a camera of the client device and transmitted to authentication server; whereupon said authentication server authenticates the products by contacting an authentication database which includes manufacturer-provided authentication information.

Systems and methods for product authentication
10581840 · 2020-03-03 · ·

The present invention relates to systems for product authentication. Unique identifiers are associated with products. Said identifiers are captured through a camera of the client device and transmitted to authentication server; whereupon said authentication server authenticates the products by contacting an authentication database which includes manufacturer-provided authentication information.