Patent classifications
G06K19/18
OBJECT MARKING, PRODUCTION AND AUTHENTICATION METHOD
An object marking including a first security element and at least a second security element, wherein each security element is associated with a set of data segments and each security element exhibits depending on the capturing conditions, in particular the viewing angle and/or the direction of illumination, a code segment which is an optoelectronically readable representation of one of the data segments of the set associated with the respective security element, wherein different distinct data segments are represented by different code segments and that the set associated with the first security element and the set associated with the second security element differ in at least one data segment; method for producing and method for authenticating the same.
Optically-passive magnetic signature and identification feature with electromagnetic tamper detection
An article is authenticated by providing a magnetic security mark in the form of an optically-passive randomly-generated nanoscale magnetic pattern. The pattern is pre-imaged and this reference image is uploaded to a secure database along with an identifier for the article such as a serial number. A user of the article verifies its authenticity by scanning it magnetically to obtain a scanned image of the magnetic pattern. The serial number is used to retrieve the previously uploaded reference image which is compared to the scanned image. If the images match, the article's authenticity is confirmed. A single article may have multiple magnetic security marks, each unique, placed at predetermined, non-uniform locations. The magnetic patterns are generated using thin film deposition of yttrium iron garnet. In one embodiment the article is a physical key having additional security features, such as mechanical features and a radio-frequency identification chip.
Optically-passive magnetic signature and identification feature with electromagnetic tamper detection
An article is authenticated by providing a magnetic security mark in the form of an optically-passive randomly-generated nanoscale magnetic pattern. The pattern is pre-imaged and this reference image is uploaded to a secure database along with an identifier for the article such as a serial number. A user of the article verifies its authenticity by scanning it magnetically to obtain a scanned image of the magnetic pattern. The serial number is used to retrieve the previously uploaded reference image which is compared to the scanned image. If the images match, the article's authenticity is confirmed. A single article may have multiple magnetic security marks, each unique, placed at predetermined, non-uniform locations. The magnetic patterns are generated using thin film deposition of yttrium iron garnet. In one embodiment the article is a physical key having additional security features, such as mechanical features and a radio-frequency identification chip.
METHOD FOR PRODUCING A LABEL COMPRISING A HIDDEN SECURITY CODE AND METHOD FOR IMPLEMENTING SAID LABEL
An authentication system includes a label having at least three codes which are not known from a single database when the label is produced, but from at least two databases generated by independent processes such that it is not possible, without consulting the different databases, to know if a label is authentic, even when the three codes become accessible in the public domain. More particularly, an authentication system includes a label having at least three codes for identifying and validating the authenticity of said label, where the system includes:—at least two independent databases in which said at least three codes are entered, and each database includes, an unknown code from the other database, and a known code from the two databases, said known code being paired with one of said unknown codes.
METHOD FOR PRODUCING A LABEL COMPRISING A HIDDEN SECURITY CODE AND METHOD FOR IMPLEMENTING SAID LABEL
An authentication system includes a label having at least three codes which are not known from a single database when the label is produced, but from at least two databases generated by independent processes such that it is not possible, without consulting the different databases, to know if a label is authentic, even when the three codes become accessible in the public domain. More particularly, an authentication system includes a label having at least three codes for identifying and validating the authenticity of said label, where the system includes:—at least two independent databases in which said at least three codes are entered, and each database includes, an unknown code from the other database, and a known code from the two databases, said known code being paired with one of said unknown codes.
ANTI-COUNTERFEIT VERIFICATION
A first reading can be determined of gaming chips in a gaming area using a first identification technology. The first reading can include a count of gaming chips. A second reading can be determined of gaming chips in a gaming area using a second identification technology. The second reading can include a count of gaming chips. A variance can be identified between the first reading and the second reading.
ANTI-COUNTERFEIT VERIFICATION
A first reading can be determined of gaming chips in a gaming area using a first identification technology. The first reading can include a count of gaming chips. A second reading can be determined of gaming chips in a gaming area using a second identification technology. The second reading can include a count of gaming chips. A variance can be identified between the first reading and the second reading.
Systems and methods for capturing visible information
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.
Systems and methods for capturing visible information
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.
SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.