G07D7/2033

METHOD FOR ASCERTAINING THE AUTHENTICITY OF A DOCUMENT AND DEVICE FOR CARRYING OUT SUCH A METHOD
20210397832 · 2021-12-23 ·

A security element is applied to a document or an object in the form of a directly printed marking or in the form of a tag made of paper or another material, with or without an identifier. A user can take a picture of the marking or tag with a smartphone and then send the picture to a device including software provided with a recognition algorithm including neural networks. The device visualizes the fingerprint of the tag or marking, thus making it possible to ascertain the authenticity of the document or object. In order to establish the authenticity of the product protected by the device, the image, stored in a cloud or blockchain database, of the tag obtained after printing same or of the marking is compared with a new description.

Authentication method and system
11200439 · 2021-12-14 · ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

Authentication method and system
11200439 · 2021-12-14 · ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

AUTHENTICATION OBJECT, AUTHENTICATION SYSTEM, AND AUTHENTICATION MEDIUM PRODUCTION METHOD
20220138305 · 2022-05-05 ·

[Problem] To easily and accurately perform authentication at low cost.

[Means to Solve Problem] Provided is an authentication object C1 that serves as a target of authentication performed by an authentication system, comprising an authentication medium M1 having authentication information that includes a feature related to a pattern of a part of a phase separation structure formed on a substrate from a resin composition for phase separation structure formation and is to be acquired by an acquisition device provided in the authentication system.

SECURING COMPOSITE OBJECTS USING DIGITAL FINGERPRINTS
20220138302 · 2022-05-05 ·

A system comprises a combination of digital fingerprint authentication techniques, processes, programs, and hardware to facilitate highly reliable authentication of a wide variety of composite physical objects. “Composite” in this case means that there are distinct regions of the object that must be authenticating individually and in tandem to authenticate the entire object. Preferably, a template is stored that defines for a class of objects what regions must be found, their locations, optionally semantic content of the regions, and other criteria. digital fingerprinting is utilized to locate and attempt to match candidate regions by querying a database of reference object records.

AUTHENTICATION METHOD AND SYSTEM
20230254157 · 2023-08-10 ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

AUTHENTICATION METHOD AND SYSTEM
20230254157 · 2023-08-10 ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

Loop chain digital fingerprint method and system
11321964 · 2022-05-03 · ·

Methods, devices, and systems enable an originating entity to use a digital fingerprint, alone or in conjunction with other data related to the physical object, to characterize the physical object so that the physical object may be confirmed as authentic when it is returned to the originating entity or another entity. A determination that expected changes to the object occurred, and/or that unexpected changes did not occur, while the physical object was outside the control of the originating entity can be made. The originating entity may induct the object into a repository before the physical object leaves the originating entity's control, and the originating entity may authenticate the physical object upon return by a process that queries the repository for matching records.

Means for using microstructure of materials surface as a unique identifier

The present application concerns the visual identification of materials or documents for tracking or authentication purposes. It describes methods to automatically authenticate an object by comparing some object images with reference images, the object images being characterized by the fact that visual elements used for comparison are non-disturbing for the naked eye. In some described approaches it provides the operator with visible features to locate the area to be imaged. It also proposes ways for real-time implementation enabling user friendly detection using mobile devices like smart phones.

Means for using microstructure of materials surface as a unique identifier

The present application concerns the visual identification of materials or documents for tracking or authentication purposes. It describes methods to automatically authenticate an object by comparing some object images with reference images, the object images being characterized by the fact that visual elements used for comparison are non-disturbing for the naked eye. In some described approaches it provides the operator with visible features to locate the area to be imaged. It also proposes ways for real-time implementation enabling user friendly detection using mobile devices like smart phones.