G06K19/10

METHODS AND SYSTEMS FOR ACCESSING A SECURE SYSTEM
20170364674 · 2017-12-21 ·

Systems and methods are described for accessing a secure system requiring multi-point authentication by receiving an optical image, wherein the optical image includes at least a portion of an identification badge; determining a plurality of characteristics from the optical image of at least a portion of the identification badge; comparing one or more of the plurality of characteristics to a database of characteristics of authorized users; assigning a confidence factor based on the comparison; and prompting for a second form of authentication if the confidence factor meets or exceeds a threshold or denying access to the secure system if the confidence factor does not meet or exceed the threshold.

Systems and methods of identification verification using near-field communication and optical authentication

Systems and methods for identification (ID) document verification using hybrid near-field communications (NFC) authentication and optical authentication are provided. An exemplary method includes receiving, by a client device, an image of an ID document. Based on the image of the ID document, a determination is made whether the ID document includes a near-field communications (NFC) chip that stores data comprising identifying information for an owner of the identification. Based on this determination of whether the ID document includes an NFC chip, the ID document is verified by selectively using at least one of NFC chip authentication and optical authentication, to obtain a verification result.

DIGITAL FIND SECURITY SYSTEM, METHOD, AND PROGRAM
20170352256 · 2017-12-07 ·

Provided are a digital find security system, method, and program which can reliably make a report to an employee closest to an event point and allow the employee to more promptly rush to the scene. In a digital find security system (100), a control unit (110) refers to facility layout information stored in a layout information storage unit (114A), and calculates moving distances between a suspicious person and respective mobile terminal devices close to a position of the suspicious person on the facility layout. Then, the control unit (110) corrects moving distances extracted for the respective employees by adding correction coefficients and converts these into moving time distances, and transmits information regarding the suspicious person to a mobile terminal device (30) at the shortest moving time distance to the position of the suspicious person.

DIGITAL FIND SECURITY SYSTEM, METHOD, AND PROGRAM
20170352256 · 2017-12-07 ·

Provided are a digital find security system, method, and program which can reliably make a report to an employee closest to an event point and allow the employee to more promptly rush to the scene. In a digital find security system (100), a control unit (110) refers to facility layout information stored in a layout information storage unit (114A), and calculates moving distances between a suspicious person and respective mobile terminal devices close to a position of the suspicious person on the facility layout. Then, the control unit (110) corrects moving distances extracted for the respective employees by adding correction coefficients and converts these into moving time distances, and transmits information regarding the suspicious person to a mobile terminal device (30) at the shortest moving time distance to the position of the suspicious person.

AUTHENTICATION OF RETAILERS AND DISTRIBUTORS
20170345020 · 2017-11-30 ·

Methods and systems for authentication of retailers and distributors are disclosed. In one example, a purchaser can authenticate a retailer at the time of purchase. The method includes scanning an authentication code on a product at the retailer. A retailer code is obtained to identify the retailer. The authentication information is transmitted to an authentication server. The authentication information includes at least one of the authentication code or the retailer code. A response is received from the authentication server indicating the retailer authentication.

AUTHENTICATION OF RETAILERS AND DISTRIBUTORS
20170345020 · 2017-11-30 ·

Methods and systems for authentication of retailers and distributors are disclosed. In one example, a purchaser can authenticate a retailer at the time of purchase. The method includes scanning an authentication code on a product at the retailer. A retailer code is obtained to identify the retailer. The authentication information is transmitted to an authentication server. The authentication information includes at least one of the authentication code or the retailer code. A response is received from the authentication server indicating the retailer authentication.

OPEN REGISTRY FOR INTERNET OF THINGS
20170345019 · 2017-11-30 ·

An identity system for the Internet of Things (IOT) that enables users and machines to identify, authenticate and interact with products and collectibles without relying on a third-party-controlled authentication service. The system includes wireless tamperproof tags coupled to products and an open registry database where a chain of ownership of the items is able to be stored. The open registry enables public access to the item identity and data combined with item registration anonymity.

System incorporating actively authenticated multifactor proximity card
09830550 · 2017-11-28 · ·

A portable card includes a resonance circuit of the portable card that wirelessly receives power from an external source, a processor of the portable card that wirelessly transmits a predetermined data sequence in response to the resonance circuit receiving power from the external source, and a set of at least three contacts on an exterior of the portable card, wherein a user bridges the contacts with the user's fingers in a predetermined combination to create a circuit and activate the processor for transmission of the predetermined data sequence.

System incorporating actively authenticated multifactor proximity card
09830550 · 2017-11-28 · ·

A portable card includes a resonance circuit of the portable card that wirelessly receives power from an external source, a processor of the portable card that wirelessly transmits a predetermined data sequence in response to the resonance circuit receiving power from the external source, and a set of at least three contacts on an exterior of the portable card, wherein a user bridges the contacts with the user's fingers in a predetermined combination to create a circuit and activate the processor for transmission of the predetermined data sequence.

COUNTERFEIT PREVENTION
20170330200 · 2017-11-16 · ·

Generating a uniquely authentic copy of information uses a physical device that consistently produces unpredictable outputs based on inputs and the microstructure of the device. The device is verified to satisfy a given property. It is substantially difficult to manufacture another device that satisfies the given property and that produces a particular output in response to a particular input. Generating the uniquely authentic copy of information includes causing the device to be provided with a specific input to produce a specific output, causing the generation of a digital signature of the response and the information, and causing at least the device and the digital signature to be made available. Generating the uniquely authentic copy of information may also include making available the information, the specific input, and/or the specific output. The information may be a value of a banknote. The digital signature may be produced on behalf of an issuer.