G06K19/10

System and method for providing secure identification solutions

The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.

Systems, Methods, and Devices for Authentication of a Product
20230104498 · 2023-04-06 · ·

A system, a method, and a device for authentication of a product includes one or more databases configured to store data of one or more products, and a user device communicatively coupled to the databases via a network. The user device includes at least one memory configured to store computer executable instructions, and at least one processor configured to execute the computer-executable instructions to receive, from an authenticator, product search data of the product, and to search the product in the databases based on the product search data. The product is listed by a user for authentication, and the product is authenticated by scanning an authentication tag attached to the product. The authentication tag is pre-programmed and becomes inactive when detached from the product. There is also a dual-purpose device for authenticating a commercial product and associating a brand with the authentication of the product.

Systems, Methods, and Devices for Authentication of a Product
20230104498 · 2023-04-06 · ·

A system, a method, and a device for authentication of a product includes one or more databases configured to store data of one or more products, and a user device communicatively coupled to the databases via a network. The user device includes at least one memory configured to store computer executable instructions, and at least one processor configured to execute the computer-executable instructions to receive, from an authenticator, product search data of the product, and to search the product in the databases based on the product search data. The product is listed by a user for authentication, and the product is authenticated by scanning an authentication tag attached to the product. The authentication tag is pre-programmed and becomes inactive when detached from the product. There is also a dual-purpose device for authenticating a commercial product and associating a brand with the authentication of the product.

System for protection against counterfeiting and forgery

The essence of the invention consists in recognition technique using means for telecommunication that are equipped with a unique program for recognizing identification codes located inside lengthy products. An identification code contains information about the manufacturer, as well as information about physical characteristics of the product as described in the certificate of quality.

System for protection against counterfeiting and forgery

The essence of the invention consists in recognition technique using means for telecommunication that are equipped with a unique program for recognizing identification codes located inside lengthy products. An identification code contains information about the manufacturer, as well as information about physical characteristics of the product as described in the certificate of quality.

Disposable Comprising A Security Element, Security Element and Method for Protecting, by the Manufacturer, Permissible Usage
20230138052 · 2023-05-04 ·

The present disclosure relates to disposables for a usage application of a consumable in a medical apparatus, comprising a security element to protect against tampering or misuse by unauthorised third parties, wherein the security element has a first identification marking which materially forms a first manufacturer's identification code; the first identification marking is connected in a non-detachable manner to the disposable and is configured for uniquely identifying the disposable, such as with regard to a product type and/or product usage property, and is partially or completely concealed with a concealing means which is detachable in a non-destructive-free manner. Furthermore, methods for marking a disposable, methods for enabling a disposable in an associated consumption device, and methods for system-control of both aforementioned methods are proposed. Furthermore, the disclosure relates to associated control systems or associated computer programs for performing an aforementioned method, and to security elements.

METHOD FOR PRODUCING AN ELECTRONIC MODULE FOR A SMART CARD WITH SECURITY PATTERNS

A method for producing security patterns on an electronic module for a security document includes providing a dielectric film; producing through-holes in the dielectric film; depositing at least one metallic layer on upper and lower faces of the dielectric film leaving the through-holes open; engraving a set of functional metallic zones comprising a central zone forming an electrical ground and a set of electrical contacts separated from one another and separated from the electrical ground by non-metallized zones that expose the dielectric film, and a set of non-functional or decorative zones; and simultaneously engraving a first hollow security pattern by removing material in one of the functional metallic zones, and a second security pattern in relief relative to the dielectric film and obtained by removing material in a zone located outside the functional metallic zones forming the electrical contacts of the terminal block.

METHOD FOR PRODUCING AN ELECTRONIC MODULE FOR A SMART CARD WITH SECURITY PATTERNS

A method for producing security patterns on an electronic module for a security document includes providing a dielectric film; producing through-holes in the dielectric film; depositing at least one metallic layer on upper and lower faces of the dielectric film leaving the through-holes open; engraving a set of functional metallic zones comprising a central zone forming an electrical ground and a set of electrical contacts separated from one another and separated from the electrical ground by non-metallized zones that expose the dielectric film, and a set of non-functional or decorative zones; and simultaneously engraving a first hollow security pattern by removing material in one of the functional metallic zones, and a second security pattern in relief relative to the dielectric film and obtained by removing material in a zone located outside the functional metallic zones forming the electrical contacts of the terminal block.

AUTHENTICATION OF ARTICLES OF MANUFACTURE
20170372328 · 2017-12-28 ·

An authentication system configured to identify counterfeit articles. The authentication system configured to capture and scan an optical code engraved on an artifact, decode the optical code to determine a unique code associated with an article, transmitting the unique code to the authentication server and receiving a result of authentication from the authentication server to verify the authenticity of the article being scanned.

METHODS AND SYSTEMS FOR ACCESSING A SECURE SYSTEM
20170364674 · 2017-12-21 ·

Systems and methods are described for accessing a secure system requiring multi-point authentication by receiving an optical image, wherein the optical image includes at least a portion of an identification badge; determining a plurality of characteristics from the optical image of at least a portion of the identification badge; comparing one or more of the plurality of characteristics to a database of characteristics of authorized users; assigning a confidence factor based on the comparison; and prompting for a second form of authentication if the confidence factor meets or exceeds a threshold or denying access to the secure system if the confidence factor does not meet or exceed the threshold.