G06K19/16

PROVISIONING A NOTE BACKED BY CRYPTOCURRENCY
20210312145 · 2021-10-07 ·

A method of provisioning a note for use as currency is provided, including receiving a base material and printing a note from the base material. The note includes a first unique identifier and a second unique identifier. The method further includes covering the second unique identifier with a tamper-proof material and covering a back of the second unique identifier with a tamper-evident material. The method also includes recording a transaction associating the first unique identifier and the second unique identifier with a predetermined amount of cryptocurrency in a recordation facility accessible for validation of the cryptocurrency.

PROVISIONING A NOTE BACKED BY CRYPTOCURRENCY
20210312145 · 2021-10-07 ·

A method of provisioning a note for use as currency is provided, including receiving a base material and printing a note from the base material. The note includes a first unique identifier and a second unique identifier. The method further includes covering the second unique identifier with a tamper-proof material and covering a back of the second unique identifier with a tamper-evident material. The method also includes recording a transaction associating the first unique identifier and the second unique identifier with a predetermined amount of cryptocurrency in a recordation facility accessible for validation of the cryptocurrency.

Sheet-Like Product And Method For Authenticating A Security Tag
20210264231 · 2021-08-26 ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

Sheet-Like Product And Method For Authenticating A Security Tag
20210264231 · 2021-08-26 ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

Photopolymer composition

The present invention relates to a photopolymer composition comprising: a polymer matrix or a precursor thereof including a reaction product of a polyol including a polyrotaxane compound and a compound containing at least one isocyanate group; a photoreactive monomer; and a photoinitiator. The present invention also relates to a hologram recording medium produced from the photopolymer composition, an optical element comprising the hologram recording medium, and a holographic recording method using the photopolymer composition.

Photopolymer composition

The present invention relates to a photopolymer composition comprising: a polymer matrix or a precursor thereof including a reaction product of a polyol including a polyrotaxane compound and a compound containing at least one isocyanate group; a photoreactive monomer; and a photoinitiator. The present invention also relates to a hologram recording medium produced from the photopolymer composition, an optical element comprising the hologram recording medium, and a holographic recording method using the photopolymer composition.

SYSTEMS, METHODS AND APPARATUSES OF A SECURITY DEVICE
20210248338 · 2021-08-12 ·

Systems, methods, and apparatuses of a security device are disclosed. In one aspect, embodiments of the present disclosure include a security device having an optical arrangement as an authenticity component and an encoded element as an identity component and/or a content component. The encoded element uniquely identifies the authenticity component. The physical positioning between the authenticity component, the identity component and the content component within the security device is such that each of the authenticity component, the identity component and the content component are optically detectable.

SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
20230401415 · 2023-12-14 · ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.

AZIMUTHALLY MODULATED SCATTERING DEVICE
20210173130 · 2021-06-10 · ·

Optical elements with anisotropic, patterned surface relief microstructures in which information is encoded in the distribution of the orientation of different zones. From the analysis of the distribution of the light scattered from the element, the orientation distribution in the element and therefore the encoded information can be evaluated. The elements are particularly useful for securing documents and articles against counterfeiting and falsification.

Systems and methods for capturing visible information

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.