Patent classifications
G06K19/06178
SYSTEMS AND METHODS FOR GENERATING SECURE TAGS
Systems and methods are provided for decoding secure tags using an authentication server and secure tag reader. The system can include at least one processor and at least one non-transitory memory. The memory can contain instructions that, when executed by the at least one processor, cause the secure tag reader to perform operations. The operations can include detecting a potential secure tag in an image and generating a normalized secure tag image using the image and a stylesheet. The operations can further include providing an identification request to an authentication server, the identification request including the normalized secure tag image. The operations can additionally include receiving rules for decoding tag data encoded into the secure tag as tag feature options and decoding the tag data using the received rules.
Systems and methods for generating secure tags
Systems and methods are provided for decoding secure tags using an authentication server and secure tag reader. The system can include at least one processor and at least one non-transitory memory. The memory can contain instructions that, when executed by the at least one processor, cause the secure tag reader to perform operations. The operations can include detecting a potential secure tag in an image and generating a normalized secure tag image using the image and a stylesheet. The operations can further include providing an identification request to an authentication server, the identification request including the normalized secure tag image. The operations can additionally include receiving rules for decoding tag data encoded into the secure tag as tag feature options and decoding the tag data using the received rules.
Valuable object and a system and method for identifying and verifying a valuable object
The invention relates to a valuable object (1) comprising a gold base body (2) surrounded by a protective layer (3). The protective layer (3) comprises at least one readable security code for identification and verification purposes. The invention also relates to a system and method for identifying and verifying a valuable object (1), having at least one readable security code (6) being assigned thereto. The security code (6) of the valuable object (1) is stored in a secure database (4) for identifying and verifying a valuable object (1).
NANOTAGS FOR AUTHENTICATION
A method for creating a nanostructure surface, comprises creating a nanostructure master having a surface being the negative of a shape that, when illuminated with a predefined illumination, provides a unique optical pattern; and creating nanostructure molds from the nanostructure master, wherein each nanostructure mold has a negative of the master surface which, when illuminated with the predefined illumination, provides the unique optical pattern, which may be a hologram. A nanotag may incorporate an image for identification and a unique pattern that can be identified for authentication.
Method of rendering a document secure
A method of integrating a mark in a document. A frame to be printed is selected. At least one color of the selected frame is selected. A color density for each selected color for the selected frame is determined. A digital code is selected for each selected color. After printing, the digital code includes the density of the color. and is integrated into the frame of the corresponding color. The frame including the digital code is printed. Preferably, the digital code is a digital anti-copy mark designed to form, following the printing step, a printed anti-copy mark with an error rate of more than five percent.
Printed LEDs embedded in objects to provide optical security feature
In one embodiment, a printed LED area comprises a random arrangement of printed LEDs and a wavelength conversion layer. The LED area is embedded in an object to be authenticated, such as a credit card or a casino chip. The object may include a light guide for enabling the generated light to be emitted from any portion of the object. In one embodiment, when the LEDs are energized during authentication of the object, the existence of light emitted by the object is sufficient authentication and/or provides feedback to the user that the object is being detected. For added security, the emitted spectrum vs. intensity and persistence of the wavelength conversion layer is detected and encoded in a first code, then compared to valid codes stored in the database. If there is a match, the object is authenticated.
Modifying messages stored in mixtures of molecules using thin-layer chromatography
Storage media are provided. A substrate has an array of addressable locations thereon, each addressable location adapted to be physically associated with a collection of molecules, each collection comprising at least a first subcollection of molecules and a second subcollection of molecules. The molecules in the collection are selected from a set of unambiguously identifiable molecules, the set comprising at least a first subset of molecules and a second subset of molecules. Each molecule in the first subset is identifiable by a first physical property, and each molecule in the second subset is identifiable by a second physical property, different from the first physical property. Each molecule in the set is uniquely associated with a predetermined position in a numerical value, wherein the presence of the molecule in the collection indicates a predetermined digit at the associated position and the absence of said molecule in the collection indicates a zero at said associated position.
Access authorization system comprising at least one arrangement of a plurality of microparticles and at least one identification unit
An access authorization system comprising at least one arrangement of a plurality of microparticles and at least one identification unit. The arrangement of the microparticles is affixed to the identification unit. The arrangement of the microparticles forms a forgery-proof identification. A microparticle used in the arrangement has at least one first layer and at least one second layer.
SYSTEMS AND METHODS FOR GENERATING SECURE TAGS
Systems and methods are provided for decoding secure tags using an authentication server and secure tag reader. The system can include at least one processor and at least one non-transitory memory. The memory can contain instructions that, when executed by the at least one processor, cause the secure tag reader to perform operations. The operations can include detecting a potential secure tag in an image and generating a normalized secure tag image using the image and a stylesheet. The operations can further include providing an identification request to an authentication server, the identification request including the normalized secure tag image. The operations can additionally include receiving rules for decoding tag data encoded into the secure tag as tag feature options and decoding the tag data using the received rules.
EXTRACTING INFORMATION FROM SURFACE COATINGS
A method and system for extracting information from a surface coated with a coating containing quantum dots are disclosed. In embodiments, the method comprises charging the quantum dots in the surface coating, scanning the surface to retrieve information from the quantum dots, and processing the retrieved information to identify data encoded in the quantum dots. In embodiments of the invention, the processing includes filtering the retrieved information to adjust the received information based on defined effects of the coating. In embodiments of the invention, the filtering includes filtering the retrieved information to account for chromatic deviation due to the color of the coated surface. In embodiments of the invention, the quantum dots include a plurality of different types of quantum dots, and the processing the retrieved information includes processing the retrieved information to distinguish between the information retrieved from the different types of quantum dots.