Patent classifications
G06K19/10
SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.
SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS
The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader.
Systems and methods for authentication
An authentication method for a tag device includes exchanging authentication codes between the tag device and an authentication server to perform mutual authentication. A reader device acts as a communications bridge between the tag device and the authentication server. The reader device may observe mutual authentication between the tag device and the authentication server as an indicator that the tag device is authentic. A failure of mutual authentication indicates that the tag device is not authentic.
Smart chaining
Identification information is received at a transaction machine. The identification information is associated with a user associated with an account. Using an activity profile of the user, a determination is made to enable chained transactions during the user's use of the transaction machine. A sequence of user interfaces to display to the user is generated enabling the user to chain transactions based on the activity profile.
Smart chaining
Identification information is received at a transaction machine. The identification information is associated with a user associated with an account. Using an activity profile of the user, a determination is made to enable chained transactions during the user's use of the transaction machine. A sequence of user interfaces to display to the user is generated enabling the user to chain transactions based on the activity profile.
Method for authenticating a three-dimensional signature
An authentication method involves comparing a 2D description of an authentication device, referred to as a subsequent description, with an original 2D description by choosing, from several previously established original 2D descriptions, a 2D description established from a point of view similar to the one used to establish the subsequent 2D description. Advantageously, the optical characteristics of the authentication device vary so little when it is viewed from neighboring points of view that the device can be recognized from most of the points of view, and the original 2D descriptions have been established from neighboring points of view, which form a substantially continuous domain. In an improved version, a three-dimensional description of the authentication device, referred to as a 3D description, is reconstructed from several original 2D descriptions, which makes it possible to predict the appearance thereof from a plurality of different points of view.
Systems and methods for generating secure tags
Systems and methods are provided for decoding secure tags using an authentication server and secure tag reader. The system can include at least one processor and at least one non-transitory memory. The memory can contain instructions that, when executed by the at least one processor, cause the secure tag reader to perform operations. The operations can include detecting a potential secure tag in an image and generating a normalized secure tag image using the image and a stylesheet. The operations can further include providing an identification request to an authentication server, the identification request including the normalized secure tag image. The operations can additionally include receiving rules for decoding tag data encoded into the secure tag as tag feature options and decoding the tag data using the received rules.
SELF-DISABLING TAMPER-EVIDENT GIFT CARDS
The present invention provides self-disabling tamper evident gift cards, and methods for making and using the gift cards. The gift cards comprise a hidden lower level activation code, and an upper level activation code that is visible. The gift cards incorporate one or more features that render either the lower level or upper level, or both, activation codes unreadable once the lower level activation code is revealed. This prevents card activation at a later time after a first instance when the activation code is accessed.
METHOD OF OPTICALLY READING INFORMATION CODE AND CONTROL OF THE METHOD
A new reading method is recorded in a code region generated by arranging a plurality of kinds of cells according to a conventional reading method. Furthermore, the code region generated in such a manner that the reading method information is recoded according to the conventional reading method according to which reading is possible by a reading device is displayed together with a code region generated according to the new reading method.
Telecommunication call management and monitoring system with voiceprint verification
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.