Patent classifications
B42D25/333
Security element and method for producing the same
The present invention relates to a security element for a security paper, a valuable article or the like having a substrate (1), the substrate being at least partially furnished with a coating (2) that is substantially tack free at room temperature, and the coating (2) including at least one radiation-crosslinkable component.
Data sheet for a security and/or value document
The invention relates to a datasheet (1) for integrating into a preferably book-like security and/or value document. The datasheet (1) is made of at least two stacked layers (2, 3) made of an organic polymer material. A textile (5) is arranged at least in a sub-region between the layers (2, 3) and outside of the layers (2, 3) so as to form a tab (4), and the textile (5) is at least partly coated on one or both sides and/or saturated with an organic binder (6) at least in the region between the layers (2, 3) and is bonded to the two layers (2, 3) by means of the binder (6).
Data sheet for a security and/or value document
The invention relates to a datasheet (1) for integrating into a preferably book-like security and/or value document. The datasheet (1) is made of at least two stacked layers (2, 3) made of an organic polymer material. A textile (5) is arranged at least in a sub-region between the layers (2, 3) and outside of the layers (2, 3) so as to form a tab (4), and the textile (5) is at least partly coated on one or both sides and/or saturated with an organic binder (6) at least in the region between the layers (2, 3) and is bonded to the two layers (2, 3) by means of the binder (6).
MICROPRINTING TECHNIQUES FOR PRINTING SECURITY SYMBOLS ON A SUBSTRATE
Examples are directed toward a substrate offset printed with front side markings on a first side and back side markings on a second side. The front side markings and the back side markings have dimensions in a micrometer range. The front side when viewed with reflected light comprises first portions of a plurality of characters. The back side when viewed with reflected light comprises second portions of the plurality of characters. The first portions and the second portions are printed, when viewed with transmitted light, to show the plurality of characters as whole characters having dimensions in the micrometer range.
WATERMARK SECURITY
Apparatuses, methods, systems, and program products are disclosed for watermark security. An apparatus includes a watermark module configured to generate a digital watermark to be presented as part of a graphical interface based on data presented on the graphical interface. A digital watermark verifies an authenticity of data to be presented in a graphical interface. An apparatus includes a presentation module configured to embed the digital watermark into the graphical interface prior to the data being presented in the graphical interface such that the digital watermark is graphically imperceptible to a user, dynamically update the digital watermark during runtime in response to detecting a change in the at least a portion of the data that is encoded into the digital watermark, and re-embed the digital watermark into the graphical interface in response to the digital watermark being updated.
WATERMARK SECURITY
Apparatuses, methods, systems, and program products are disclosed for watermark security. An apparatus includes a watermark module configured to generate a digital watermark to be presented as part of a graphical interface based on data presented on the graphical interface. A digital watermark verifies an authenticity of data to be presented in a graphical interface. An apparatus includes a presentation module configured to embed the digital watermark into the graphical interface prior to the data being presented in the graphical interface such that the digital watermark is graphically imperceptible to a user, dynamically update the digital watermark during runtime in response to detecting a change in the at least a portion of the data that is encoded into the digital watermark, and re-embed the digital watermark into the graphical interface in response to the digital watermark being updated.
METHODS AND ARRANGEMENTS FOR SORTING ITEMS, USEFUL IN RECYCLING
A plastic item, such as a beverage bottle, can convey two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark may convey a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which may lack data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. In other embodiments the plastic item (or a label thereon) bears only a single watermark. A great number of other features and arrangements are also detailed.
System and Method for Identifying the Source of Counterfeit Copies of Multimedia Works Using Layered Simple Digital Watermarks
A system and method is provided for management of digital watermarks, including a system and method for identifying the source of counterfeit copies of multimedia works using layered simple digital watermarks which are difficult to locate, identify and circumvent. The layered digital watermarks may be modulated in a variety of ways, and may be individualized to assist in detection of unlawful copyrighted material infringement by endpoint device and/or the user committing the copyright infringement. In addition, multiple layers of watermarks may be selected and applied by various schemes, such as on-the-fly remotely by the distributor of the copyrighted material. This system and method for management of digital watermarks effectively makes it impossible for a potential copyright infringer to have complete confidence that they located and disabled all of the watermarks in the copyrighted material, and therefore substantially increases the risk of infringer identification and prosecution for copyright violations.
System and Method for Identifying the Source of Counterfeit Copies of Multimedia Works Using Layered Simple Digital Watermarks
A system and method is provided for management of digital watermarks, including a system and method for identifying the source of counterfeit copies of multimedia works using layered simple digital watermarks which are difficult to locate, identify and circumvent. The layered digital watermarks may be modulated in a variety of ways, and may be individualized to assist in detection of unlawful copyrighted material infringement by endpoint device and/or the user committing the copyright infringement. In addition, multiple layers of watermarks may be selected and applied by various schemes, such as on-the-fly remotely by the distributor of the copyrighted material. This system and method for management of digital watermarks effectively makes it impossible for a potential copyright infringer to have complete confidence that they located and disabled all of the watermarks in the copyrighted material, and therefore substantially increases the risk of infringer identification and prosecution for copyright violations.
SYSTEM AND METHOD FOR MULTI-LAYERED WATERMARKING
There is provided systems and methods for generating a multi-layered watermark. The watermark incorporating one or more symbols for placement on a document. The method including: positioning a base layer of the watermark at one or more locations on the document; positioning the one or more symbols overtop of at least a portion of the base layer; and positioning a braid layer of the watermark overtop of the ID, the braid layer and the base layer are substantially aligned, the braid layer including a copy of the base layer incorporating a pattern. The pattern can include one or more of discolorations, holes, and sections of increased opacity.