G06K19/06065

NOTE BACKED BY CRYPTOCURRENCY
20210312252 · 2021-10-07 ·

In an embodiment, a note for use as currency is provided. The note includes a base material having a first surface and a second surface opposite first surface. The note further includes identifying indicators printed on the first surface and the second surface providing an indication of a type and value of the note. The note also includes a first unique identifier printed on the note and a second unique identifier on the note. The note further includes a removable cover applied over the second unique identifier on one of the first surface and the second surface of the note. The note also includes an opaque backing applied over the second identifier on the note, the opaque backing applied to a surface of the note opposite the surface of the removable cover.

PROVISIONING A NOTE BACKED BY CRYPTOCURRENCY
20210312145 · 2021-10-07 ·

A method of provisioning a note for use as currency is provided, including receiving a base material and printing a note from the base material. The note includes a first unique identifier and a second unique identifier. The method further includes covering the second unique identifier with a tamper-proof material and covering a back of the second unique identifier with a tamper-evident material. The method also includes recording a transaction associating the first unique identifier and the second unique identifier with a predetermined amount of cryptocurrency in a recordation facility accessible for validation of the cryptocurrency.

Sheet-Like Product And Method For Authenticating A Security Tag
20210264231 · 2021-08-26 ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

METHODS AND ARRANGEMENTS FOR RECONCILING DATA FROM DISPARATE DATA CARRIERS

In an illustrative system, a point-of-sale scanner is equipped to respond to multiple different symbologies printed on a single product. The scanner captures many frames per second, as products are swiped through a viewing volume. Each frame is decoded, yielding one or more payloads. A reconciliation module compares each newly-decoded payload against a list of payloads previously output by the module, to determine if the current payload is semantically-equivalent to a previously-output payload. If so, the previously-output payload is output again, in lieu of the just-decoded payload. If no equivalent is found, the current payload is output and added to the list for comparison against future payloads. A great number of other features and arrangements are also detailed.

COMPUTER-GENERATED HOLOGRAM BASED-GENUINE PRODUCT AUTHENTICATION METHOD, COMPUTER-GENERATED HOLOGRAM BASED-GENUINE PRODUCT AUTHENTICATION SYSTEM, AND DIGITAL HOLOGRAM TAG GENERATOR FOR A COMPUTER-GENERATED HOLOGRAM BASED-GENUINE PRODUCT AUTHENTICATION SYSTEM

The present invention provides a genuine product authentication method, a genuine product authentication system, and a digital hologram tag generator for a genuine product authentication system, which increases a security level of a digital hologram tag. The computer-generated hologram based-genuine product authentication method, the computer-generated hologram based-genuine product authentication system, and the digital hologram tag generator for a computer-generated hologram based-genuine product authentication system are characterized in that a product unique code is set according to a predetermined rule, and the set product unique code is converted into digital hologram and encrypted according to a specific process, and the encrypted code is decrypted through a decryption process same as the encryption process and compared with the unique code stored in the server, thereby preventing illegal copying and allowing consumers to verify the authenticity very conveniently.

METHOD FOR AUTHENTICATING AN OBJECT, PARTICULARLY A SECURITY ELEMENT, AND A SECURITY ELEMENT
20210174374 · 2021-06-10 ·

A method for authenticating an object, particularly a security element for protecting value documents, ID documents and products, as well as a security element, a security document, a reader, an individualization device and a server for such a method. The method involves the steps: dividing a first code element into at least one first partial code element and one second partial code element, storing the second partial code element, arranging the first partial code element and/or a second code element on and/or in the object, jointly machine-capturing the first partial code element and the second code element by means of a reader, extracting the first partial code element and the second code element from the data captured by the reader, accessing the stored second partial code element using the second code element as a key, checking whether the code element resulting from merging the extracted first partial code element and the stored second partial code element corresponds to the first code element.

Sheet-like product and method for authenticating a security tag
11030501 · 2021-06-08 · ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

AUTHENTICATION MEDIUM, AUTHENTICATION MEDIUM MANUFACTURING METHOD, AUTHENTICATION MEDIUM READING METHOD, AND AUTHENTICATION MEDIUM VERIFICATION METHOD
20210150296 · 2021-05-20 · ·

An authentication medium includes a sheet-like laminate sheet; a first region that is formed on the laminate sheet and where personal identification information is recorded; and a second region that is formed on the laminate sheet and has a hologram structure where check data associated with first individual information is recorded.

Methods and arrangements for reconciling data from disparate data carriers

In an illustrative system, a point-of-sale scanner is equipped to respond to multiple different symbologies printed on a single product. The scanner captures many frames per second, as products are swiped through a viewing volume. Each frame is decoded, yielding one or more payloads. A reconciliation module compares each newly-decoded payload against a list of payloads previously output by the module, to determine if the current payload is semantically-equivalent to a previously-output payload. If so, the previously-output payload is output again, in lieu of the just-decoded payload. If no equivalent is found, the current payload is output and added to the list for comparison against future payloads. A great number of other features and arrangements are also detailed.

READING DEVICE, READING METHOD, READING PROGRAM, AND SETTLEMENT PROCESSING METHOD
20210133413 · 2021-05-06 · ·

A reading device, a reading method and a reading program that can easily and quickly read a composite symbol, and a settlement processing method are provided. A moving image of a composite symbol which includes a plurality of symbols emerging in the same location and whose appearance changes depending on a viewing angle, is captured. The symbols included in the composite symbol are detected from the moving image obtained by image-capturing. Authenticity of the composite symbol is determined based on the obtained moving image.