Patent classifications
G06K19/14
Use of luminescent nanosystems for authenticating security documents
The present invention relates to the use of nanosystems as non deactivable security markers comprising metal atomic quantum clusters (AQCs) of at least two different size distributions encapsulated in a cavity with an inner diameter less than or equal to approximately 10 nm. These nanosystems are luminescence, particularly fluorescence after external excitation. The invention also relates to security documents, articles or elements incorporating these markers as well as to a method and a system for detecting the same.
Identification mark with a predetermined color difference
An identification mark may have a calibration color, a predetermined authentication color, and a predetermined difference between the calibration color and the predetermined authentication color that is associated with a product; and a visual code with a mechanism that identifies the predetermined difference.
Identification mark with a predetermined color difference
An identification mark may have a calibration color, a predetermined authentication color, and a predetermined difference between the calibration color and the predetermined authentication color that is associated with a product; and a visual code with a mechanism that identifies the predetermined difference.
Chip card arrangement, chip card, apparatus for contactless interaction with a chip card arrangement or a chip card, and method for operating and method for producing a chip card arrangement or chip card
In various embodiments, a chip card arrangement for carrying out contactless interaction with an external apparatus is provided. The chip card arrangement may include: a chip card, which has an electronic circuit, and having an optical coding element, which can be used to present an optically capturable code, wherein the electronic circuit is designed such that the interaction requires at least the code.
PRINTING INK, ITS USE FOR THE AUTHENTICATION OF ARTICLES, ARTICLES OBTAINED THEREBY AND AUTHENTICATION METHODS
A printing ink having a first fluorescent dye acting as donor and a second fluorescent dye acting as acceptor. The first fluorescent dye, upon excitation by electromagnetic radiation falling within an excitation wavelength range λ.sub.1a of the first fluorescent dye, is capable of emitting electromagnetic radiation in at least one first emission wavelength range λ.sub.1e, said first emission wavelength range λ.sub.1e of the first fluorescent dye overlapping with at least one excitation wavelength range λ.sub.2a of the second fluorescent dye, to thereby excite the second fluorescent dye to emit electromagnetic radiation in a second emission wavelength range λ.sub.2e.
PRINTING INK, ITS USE FOR THE AUTHENTICATION OF ARTICLES, ARTICLES OBTAINED THEREBY AND AUTHENTICATION METHODS
A printing ink having a first fluorescent dye acting as donor and a second fluorescent dye acting as acceptor. The first fluorescent dye, upon excitation by electromagnetic radiation falling within an excitation wavelength range λ.sub.1a of the first fluorescent dye, is capable of emitting electromagnetic radiation in at least one first emission wavelength range λ.sub.1e, said first emission wavelength range λ.sub.1e of the first fluorescent dye overlapping with at least one excitation wavelength range λ.sub.2a of the second fluorescent dye, to thereby excite the second fluorescent dye to emit electromagnetic radiation in a second emission wavelength range λ.sub.2e.
Method For Deploying Large Numbers of Waste Containers In A Waste Collection System
A method of redeploying waste containers in a waste collection system with an active or passive signal means requires a user to aim an optical character recognition reader at a waste container comprising a unique optical waste container identifier. The optical character recognition reader reads unique waste container optical identifier. The unique waste container optical identifier is converted to a unique electronically formatted waste container identifier. A unique radio frequency signal identifier is stored on a radio frequency emitting tag and associated with the unique electronically formatted waste container identifier. The radio frequency emitting tag is attached to the waste container.
Composite information bearing devices
A composite information bearing device comprising an image pattern and a human readable data device. The human readable data device includes a set of human readable data symbols representing a first set of data. The first set of data includes a first data portion and a second data portion. The image pattern represents a second set of data and comprises a third data portion. One of the first or said second data portions is to form an identification code upon combination or concatenation with said third data portion, and the other one of said first or said second data portions not forming part of said identification code is to form a verification code, the verification code being related to said identification code by a scheme of operation.
Method and device for detecting unauthorized tranfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Method and device for detecting unauthorized tranfer between persons
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.