Patent classifications
G06K19/06178
SECURE CHIPS WITH SERIAL NUMBERS
An electronic device comprising a semiconductor chip which comprises a plurality of structures formed in the semiconductor chip, wherein the semiconductor chip is a member of a set of semiconductor chips, the set of semiconductor chips comprises a plurality of subsets of semiconductor chips, and the semiconductor chip is a member of only one of the subsets. The plurality of structures of the semiconductor chip includes a set of common structures which is the same for all of the semiconductor chips of the set, and a set of non-common structures, wherein the non-common structures of the semiconductor chip of the subset is different from a non-common circuit of the semiconductor chips in every other subset. At least a first portion of the non-common structures and a first portion of the common structures form a first non-common circuit, wherein the first non-common circuit of the semiconductor chips of each subset is different from a non-common circuit of the semiconductor chips in every other subset. At least a second portion of the non-common structures is adapted to store or generate a first predetermined value which uniquely identifies the first non-common circuit, wherein the first predetermined value is readable from outside the semiconductor chip by automated reading means.
Printed products having machine-readable code for creating secure links
Access is provided to a variable data printing app and a code detection app on a computer server. The variable data printing app is adapted to add machine-readable code to printable items and create a decoder app capable of decoding the machine-readable code. The code detection app is adapted to receive user identification information and transmit the user identification information to designer devices. The printable items are printed as printed products. The designer devices validate a user device based on the validity of the user identification information. In response, the variable data printing app is adapted to transmit the decoder app to validated user devices. The code detection app, operating on the user device, is adapted to decode the machine-readable code in user-acquired images into an optional secure link with the designer devices.
Method for storing information on a spectacles lens, spectacles lens blank or spectacles lens semi-finished product
Information is stored in an optical element in the form of a glass or plastic body embodied as spectacles lens, spectacles lens blank or spectacles lens semi-finished product. The information in the form of data is stored on or in the glass or plastic body by creating at least one marking with a marking system. The marking can be read by a reading apparatus. The marking system has an interface for reading information individualizing the optical element. The marking is created permanently by the marking system on or in the optical element at a definition point of a local body-specific coordinate system set by two points on or in the optical element. In this body coordinate system, the manufacturer specifies the position of the lens horizontal and/or the far and/or the near and/or the prism reference point.
Method and system for authentication and anti-counterfeiting using coffee-ring effect
A method and system providing an anti-counterfeiting label or mark, using ordinary inkjet printers, take advantage of a phenomenon called a coffee ring pattern, something that inkjet printers. Even the same inkjet printer can output different patterns under different conditions. As a result, the likelihood of reproduction of a particular printer's coffee ring pattern using another printer is so low as to be negligible. It is possible to capture images of the coffee rings using a smartphone camera. The coffee ring approach may be used on any labels or packages on which inkjet printing can be used.
Graphical indicator
A graphical indicator comprising a plurality of first header blocks, a plurality of second header blocks and a plurality of data blocks for forming an indicator matrix is provided. Each of the first and second header blocks has a header graphical micro-unit, and each of the data blocks has a data graphical micro-unit. An array area is formed by the second header blocks and the data blocks. A first virtual line and a second virtual line are respectively formed by virtual centers of the first and second header blocks, and an included angle between the first and second virtual lines is less than 90 degrees.
System and method for using an unobtrusive and discrete embedded barcode for debugging
Aspects of the present disclosure involve systems, methods, devices, and the like for generating an unobtrusive and discrete barcode used for debugging. In one embodiment, a system is introduced that enables the tracking of application interactions on a user device. The tracking can include the generation of a debug id which can include a discrete string used to describe locations, preferences, and interactions with a user device application. The string may then be converted into a corresponding barcode which can be discretely displayed on the user interface of the application. In another embodiment, the barcode may be captured and/or retrieved for use in debugging the application, in an instance where an application malfunction is encountered.
Transient pliant encryption with indicative nano display cards
Embodiments of the present invention provide a system for secure communication of information that may be used to authorize communications or transfer of resources by use of a transient pliant encryption mechanism in conjunction with an indicative nano-display. The provided systems, methods, and computer program products are designed to select and apply multiple encryption algorithms in a varied fashion and update displayed information on a nano-display. Credentials for a user may be stored and securely communicated via a transient nano-display that is updated at a configured interval of time and is indecipherable to unauthorized third parties.
SYSTEMS AND METHODS FOR GENERATING SECURE TAGS
Systems and methods are provided for decoding secure tags using an authentication server and secure tag reader. The system can include at least one processor and at least one non-transitory memory. The memory can contain instructions that, when executed by the at least one processor, cause the secure tag reader to perform operations. The operations can include detecting a potential secure tag in an image and generating a normalized secure tag image using the image and a stylesheet. The operations can further include providing an identification request to an authentication server, the identification request including the normalized secure tag image. The operations can additionally include receiving rules for decoding tag data encoded into the secure tag as tag feature options and decoding the tag data using the received rules.
Holographic security element and method of forming thereof
There is provided a holographic security element including a substrate; and an array of nano-reflectors configured to form a pattern on the substrate and to generate a holographic image corresponding to the pattern at a predetermined distance from the substrate when irradiated with a predetermined light source. In particular, the array of nano-reflectors is configured to generate the holographic image at the predetermined distance to have a size that is larger than a size of the pattern. There is also provided a method of forming the holographic security element, and an article having one or more holographic security elements incorporated therein.
PROVISIONING A NOTE BACKED BY CRYPTOCURRENCY
A method of provisioning a note for use as currency is provided, including receiving a base material and printing a note from the base material. The note includes a first unique identifier and a second unique identifier. The method further includes covering the second unique identifier with a tamper-proof material and covering a back of the second unique identifier with a tamper-evident material. The method also includes recording a transaction associating the first unique identifier and the second unique identifier with a predetermined amount of cryptocurrency in a recordation facility accessible for validation of the cryptocurrency.