Patent classifications
G06K19/06084
SPHERICAL IDENTIFIERS
A spherical identifier may, in an example, include a sphere including a plurality of shells forming the sphere, a radially-defined code being discernable using the arrangement of the plurality of shells. A three-dimensional object identifier may, in an example, include a number of spheres manufactured into the body of the three-dimensional object wherein each of the spheres comprise a plurality of shells; the shells constituting a radially definable code.
Security feature using printed LEDs and wavelength conversion material
In one embodiment, a printed security mark comprises a random arrangement of printed LEDs and a wavelength conversion layer. During fabrication of the mark, the LEDs are energized, and the resulting dot pattern is converted into a unique digital first code and stored in a database. The emitted spectrum vs. intensity and persistence of the wavelength conversion layer is also encoded in the first code. The mark may be on a credit card, casino chip, banknote, passport, etc. to be authenticated. For authenticating the mark, the LEDs are energized and the dot pattern, spectrum vs. intensity, and persistence are converted into a code and compared to the first code stored in the database. If there is a match, the mark is authenticated.
Method for analyzing and verifying a microscopic imprint configured on an object for determining authenticity
The present invention is a method for analyzing an imprint configured on a surface of an object at a source location and verifying at a destination location to determine the object's authenticity. The method includes capturing at least one image at a source location and examining and analyzing the captured image. The analysis is performed by dividing the captured image into multiple layers. For each layer area, size, threshold points, distance between threshold points and angle of lines are determined and then stored in the first database. Afterwards this data is encrypted by a source user and uploaded to a blockchain. When the object reaches the destination location the destination user performs the same operation of capturing, examining and analyzing by dividing the captured image into multiple layers in the same fashion as performed by the source user and then stored in a second database. The destination user also decrypts the encrypted data of the first database and compares the data of first database with the data of the second database. The results of the comparison help to determine an object's authenticity.
OPTICAL AUTHENTICATION METHOD
The method comprises the steps: of applying the identifier (100) on an object; of making a first digital image and, subsequently, a second digital image of the identifier; of deriving first and second digital keys from the first and second images, respectively; and of comparing the second digital key with the first digital key; wherein the identifier (100) is made up of same-diameter microbeads (120) distributed in a random manner on the surface of the object, the microbeads being embedded in a layer (110) of binder, and deriving the first digital key comprises the steps of applying elliptical regression to a distribution of points representative of the positions of the microbeads in the first image in order to define an ellipse, and of applying a change of reference frame consisting in expressing the positions of said points in a reference frame based on the ellipse.
Non-contact rapid reader system for reflective particle tags
A reflective particle tag reader system includes a read head assembly having a camera, illuminators, and a rigid frame portion for supporting the camera and the illuminators. The illuminators illuminate a focal point located opposite the camera where a reflective particle tag is placed. A computer in data communication with the camera receives and store images of the reflective particle tag that are acquired by the camera. The computer is programmed to process video images and to quantify a positional alignment parameter and an angular alignment parameter of the reader with respect to the reflective particle tag. A rapid burst of image frames is obtained in response to the positional alignment and the angular alignment parameters being within a predetermined tolerance and identity of the reflective tag is established between a first image set and a second image set.
Structure for individual authentication, method for producing thereof, and individual authentication method
Provided is a structure for individual authentication in which a pillar pattern region including a plurality of nanopillars formed of synthetic quartz glass is formed on at least a part of a surface portion of a synthetic quartz glass substrate. In the pillar pattern region, the nanopillars have an indentation elastic modulus of 35 to 100 GPa as measured by a nanoindentation method, and the nanopillars are plastically deformed.
Three-dimensional authentication and identification methods, devices, and systems
In some embodiments, an apparatus includes a tag that may include an encapsulant and a plurality of three-dimensional objects randomly oriented within the encapsulant. Each three-dimensional object may include a plurality of characteristics defining at least one statistically unique signature. At least one of the characteristics may be dependent on the orientation of the object. In some instances, the plurality of three-dimensional objects may also be randomly distributed within the encapsulant, and at least one of the characteristics defining at least one statistically unique signature may be dependent on the distribution of the objects.
Printed LEDs embedded in objects to provide optical security feature
In one embodiment, a printed LED area comprises a random arrangement of printed LEDs and a wavelength conversion layer. The LED area is embedded in an object to be authenticated, such as a credit card or a casino chip. The object may include a light guide for enabling the generated light to be emitted from any portion of the object. In one embodiment, when the LEDs are energized during authentication of the object, the existence of light emitted by the object is sufficient authentication and/or provides feedback to the user that the object is being detected. For added security, the emitted spectrum vs. intensity and persistence of the wavelength conversion layer is detected and encoded in a first code, then compared to valid codes stored in the database. If there is a match, the object is authenticated.
SYSTEM AND METHOD OF PRODUCT AUTHENTICATION
A method and system are provided. The method involves generating a plurality of nanoparticles, isolating fluorescent nanoparticles, embedding the fluorescent nanoparticles in a resin and applying the resin on a product. The system is for product authentication and includes a light source, fluorescence nanoparticles, a detector and a resin for applying on a product. Furthermore, a non-transitory computer readable medium encoded with codes is provided to direct the system to carry out the method.
SECURE MACHINE READABLE CODE-EMBEDDED DIAGNOSTIC TEST
Disclosed herein is an information-augmented rapid diagnostic test in which control and test modules of a barcode, such as a QR code, are responsive to biomarkers in an analyte to become visible and form at least a portion of the barcode upon detection of the presence of such biomarkers. The barcode embeds test manufacturing details, serves as a trigger for image capture, enables registration for image analysis, and corrects for lighting effects. An accompanying mobile application preferably automatically captures an image of the test when the QR code is recognized, decodes the QR code, performs image processing to determine the concentration of the particular biomarker that is being diagnosed, and transmits the test results and QR code payload to a secure web portal.