G07D7/2033

Method of authentication using surface paper texture

A method of authentication using surface paper texture includes steps of capturing a topographic pattern image of a surface of a region of interest of the paper artifact and extracting a plurality of specific features from the captured topographic pattern image. The method further identifies the location of the specific features of the paper artifact from the captured topographic pattern image. A bit map of the identified location of the specific features is generated. Then, a reference image of a reference bit map printed on the region of interest of the paper artifact is captured. Finally, the method compares the generated bit map with the captured reference bit map to generate a score. The score of the comparison determines the level of authentication. The method provides an offline method of authentication.

Method of authentication using surface paper texture

A method of authentication using surface paper texture includes steps of capturing a topographic pattern image of a surface of a region of interest of the paper artifact and extracting a plurality of specific features from the captured topographic pattern image. The method further identifies the location of the specific features of the paper artifact from the captured topographic pattern image. A bit map of the identified location of the specific features is generated. Then, a reference image of a reference bit map printed on the region of interest of the paper artifact is captured. Finally, the method compares the generated bit map with the captured reference bit map to generate a score. The score of the comparison determines the level of authentication. The method provides an offline method of authentication.

RARE EARTH SPATIAL/SPECTRAL BARCODES FOR MULTIPLEXED BIOCHEMICAL TESTING
20170226417 · 2017-08-10 ·

Hydrogel microparticles spatially and spectrally encoded using upconverting phosphor nanoparticles are described for use in biochemical testing. In each microparticle, upconversion nanocrystals having spectrally distinguishable emission spectra are disposed in different partions of an encoding region of the microparticle.

Systems, method and computer-accessible mediums for providing secure paper transactions using paper fiber identifiers

Exemplary systems, methods and computer-accessible mediums can receive information comprising a first speckle pattern(s) associated with a portion(s) of the paper. The information can be generated by an optical arrangement, and the first speckle pattern(s) can be compared with a second speckle pattern(s) to determine if a similarity measure based on local or global descriptors is of equal to a predetermined amount or within a predetermined range.

Systems, method and computer-accessible mediums for providing secure paper transactions using paper fiber identifiers

Exemplary systems, methods and computer-accessible mediums can receive information comprising a first speckle pattern(s) associated with a portion(s) of the paper. The information can be generated by an optical arrangement, and the first speckle pattern(s) can be compared with a second speckle pattern(s) to determine if a similarity measure based on local or global descriptors is of equal to a predetermined amount or within a predetermined range.

Authentication method and system

The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides a system and method for providing a dynamically reconfigurable watermark, and the use of the watermark to encode a stochastically variable property of the carrier medium for self-authentication purposes.

Payment card with light-based signature
11250304 · 2022-02-15 · ·

Systems, methods and apparatus are provided for light-based authentication of a payment card. The payment card may include a randomized mix of materials. The materials may include transparent or translucent materials. A light source may shine light on a surface of the payment card. Light passing through the card may generate a light pattern that is unique to the payment card. The light pattern may be captured and compared to a reference light pattern to authenticate the payment card. In some embodiments, photodetectors may detect light patterns generated through interactions with the card materials.

Systems, methods and computer-accessible mediums for authentication and verification of physical objects

Exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a non-digital medium of a physical object, by receiving at least one image of video of at least one marked or unmarked region, and comparing the first microscopic image or video of at least one marked or unmarked region with at least one second microscopic image or video relating to the non-digital medium to determine if a similarity between the first and second microscopic images or videos matches or exceeds a predetermined amount.

Systems, methods and computer-accessible mediums for authentication and verification of physical objects

Exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a non-digital medium of a physical object, by receiving at least one image of video of at least one marked or unmarked region, and comparing the first microscopic image or video of at least one marked or unmarked region with at least one second microscopic image or video relating to the non-digital medium to determine if a similarity between the first and second microscopic images or videos matches or exceeds a predetermined amount.

METHOD FOR ASCERTAINING THE AUTHENTICITY OF A DOCUMENT AND DEVICE FOR CARRYING OUT SUCH A METHOD
20210397832 · 2021-12-23 ·

A security element is applied to a document or an object in the form of a directly printed marking or in the form of a tag made of paper or another material, with or without an identifier. A user can take a picture of the marking or tag with a smartphone and then send the picture to a device including software provided with a recognition algorithm including neural networks. The device visualizes the fingerprint of the tag or marking, thus making it possible to ascertain the authenticity of the document or object. In order to establish the authenticity of the product protected by the device, the image, stored in a cloud or blockchain database, of the tag obtained after printing same or of the marking is compared with a new description.