G06K19/18

Sheet-like product and method for authenticating a security tag
11599758 · 2023-03-07 · ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

Sheet-like product and method for authenticating a security tag
11599758 · 2023-03-07 · ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
20230123428 · 2023-04-20 · ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.

SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
20230123428 · 2023-04-20 · ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.

Counterfeit Prevention and Detection of University and Academic Institutions Documents Using Unique Codes
20170352039 · 2017-12-07 ·

The invention is related to a system that includes an integrated system for online and real-time authentication of documents using uniquely generated codes and the verification of the authenticity of the documents using online verification data identified by the unique codes. The invention contains 3 independent claims.

In this invention, the unique code (3.8) uniquely identifies a document issued by any organization for any type of documents in any part of the world, and uniqueness is guaranteed. The invention also uses another type of code, a 16 hexadecimal digit code (3.7), which is unique across all documents belonging to a single organization. The invention also uses a KAPTCHA code (3.5), which safeguards the document against auto scan and image processing and optical character recognition.

The unique code (3.8) is embedded within a technology convenient for hiding, encrypting and easy readability of the code, which can be one of a quick response (QR) two dimensional code (3.1), a near filed communication tag (NFC) (3.2), an optical medium strip (3.3), a magnetic medium strip (3.4), or a radio frequency RFID tag (3.5).

The system stores the Meta data of the document (3) which is used to generate the codes as well as the generated codes themselves and a PDF file of the document (3) and/or a photocopy of the document (3) in a secure server for verification purposes.

The verifier (4) can verify the authenticity of the document by either scanning the QR code (3.1) or the NFC tag (3.2) or the optical strip (3.3) or the magnetic strip (3.4) or the RFID tag (3.5) using a special application and submits the code hidden within the QR, NFC, optical strip, magnetic strip, or RFID to the verification server. Alternatively, the verifier (4) can use the 16 hexadecimal digit code (3.7) to access the verification server and performs the verification.

The verification server presents to the verifier all information necessary to establish the authenticity and validity of the document.

Besides authentication, verification, and counterfeit prevention and detection, the invention is also a method for tracing the verified documents based on identity, and location of the verifier.

Counterfeit Prevention and Detection of University and Academic Institutions Documents Using Unique Codes
20170352039 · 2017-12-07 ·

The invention is related to a system that includes an integrated system for online and real-time authentication of documents using uniquely generated codes and the verification of the authenticity of the documents using online verification data identified by the unique codes. The invention contains 3 independent claims.

In this invention, the unique code (3.8) uniquely identifies a document issued by any organization for any type of documents in any part of the world, and uniqueness is guaranteed. The invention also uses another type of code, a 16 hexadecimal digit code (3.7), which is unique across all documents belonging to a single organization. The invention also uses a KAPTCHA code (3.5), which safeguards the document against auto scan and image processing and optical character recognition.

The unique code (3.8) is embedded within a technology convenient for hiding, encrypting and easy readability of the code, which can be one of a quick response (QR) two dimensional code (3.1), a near filed communication tag (NFC) (3.2), an optical medium strip (3.3), a magnetic medium strip (3.4), or a radio frequency RFID tag (3.5).

The system stores the Meta data of the document (3) which is used to generate the codes as well as the generated codes themselves and a PDF file of the document (3) and/or a photocopy of the document (3) in a secure server for verification purposes.

The verifier (4) can verify the authenticity of the document by either scanning the QR code (3.1) or the NFC tag (3.2) or the optical strip (3.3) or the magnetic strip (3.4) or the RFID tag (3.5) using a special application and submits the code hidden within the QR, NFC, optical strip, magnetic strip, or RFID to the verification server. Alternatively, the verifier (4) can use the 16 hexadecimal digit code (3.7) to access the verification server and performs the verification.

The verification server presents to the verifier all information necessary to establish the authenticity and validity of the document.

Besides authentication, verification, and counterfeit prevention and detection, the invention is also a method for tracing the verified documents based on identity, and location of the verifier.

TOUCH-SENSITIVE CARD SECURITY

A method can include obtaining contact data corresponding to a set of contacts of an authorization card. The contact data can indicate a set of engaged contacts among the set of contacts. The method can include obtaining activation data corresponding to a set of predetermined engaged contacts among the set of contacts. The method can include determining, by comparing the contact data to the activation data, that the set of engaged contacts matches the set of predetermined engaged contacts. The method can include changing, in response to the determining, a state of the authorization card from an inactive state to an active state. The method can include permitting, in response to the changing the state, an electronic transfer of authorization data from the authorization card.

TOUCH-SENSITIVE CARD SECURITY

A method can include obtaining contact data corresponding to a set of contacts of an authorization card. The contact data can indicate a set of engaged contacts among the set of contacts. The method can include obtaining activation data corresponding to a set of predetermined engaged contacts among the set of contacts. The method can include determining, by comparing the contact data to the activation data, that the set of engaged contacts matches the set of predetermined engaged contacts. The method can include changing, in response to the determining, a state of the authorization card from an inactive state to an active state. The method can include permitting, in response to the changing the state, an electronic transfer of authorization data from the authorization card.

Graphically Encoded Icons Having Intrinsic Attributes Embedded Therein and Systems and Methods for Using Same
20220351015 · 2022-11-03 ·

A user instrument for engaging in a transaction includes a graphically encoded icon having a static portion, and an intrinsic portion comprising an area of stimuli-responsive material defining a first machine-readable indicia. At least a portion of the stimuli-responsive material transforms from a first state to a second state in response to a trigger. The transformation from the first state to the second state of the portion of the stimuli-response material results in a second machine-readable indicia. The transformation of the stimuli-responsive material from the first state to the second state is semi-irreversible. The second machine-readable indicia comprises information to permit or deny the user to engage in a second transaction via the user instrument.

Graphically Encoded Icons Having Intrinsic Attributes Embedded Therein and Systems and Methods for Using Same
20220351015 · 2022-11-03 ·

A user instrument for engaging in a transaction includes a graphically encoded icon having a static portion, and an intrinsic portion comprising an area of stimuli-responsive material defining a first machine-readable indicia. At least a portion of the stimuli-responsive material transforms from a first state to a second state in response to a trigger. The transformation from the first state to the second state of the portion of the stimuli-response material results in a second machine-readable indicia. The transformation of the stimuli-responsive material from the first state to the second state is semi-irreversible. The second machine-readable indicia comprises information to permit or deny the user to engage in a second transaction via the user instrument.