G06K19/10

Telecommunication call management and monitoring system with voiceprint verification
11496621 · 2022-11-08 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Payment card with light-based signature
11615281 · 2023-03-28 · ·

Systems, methods and apparatus are provided for light-based authentication of a payment card. The payment card may include a randomized mix of materials. The materials may include transparent or translucent materials. A light source may shine light on a surface of the payment card. Light passing through the card may generate a light pattern that is unique to the payment card. The light pattern may be captured and compared to a reference light pattern to authenticate the payment card. In some embodiments, photodetectors may detect light patterns generated through interactions with the card materials.

Intrusion detection systems and methods
11488453 · 2022-11-01 · ·

An intrusion detection system and method includes an intrusion detection system processor communicatively coupled to multiple environmental change event sensors disposed within an enclosure housing a CPU of an ATM and independent of the CPU of the ATM. In response to receiving an environmental change event notification from one or more of the environmental change event sensors, the intrusion detection system processor commences a predetermined time-out period for entry of valid authentication credentials and deactivates a power supply of the automated teller machine upon expiry of the time-out period without receiving entry of valid authentication credentials.

Intrusion detection systems and methods
11488453 · 2022-11-01 · ·

An intrusion detection system and method includes an intrusion detection system processor communicatively coupled to multiple environmental change event sensors disposed within an enclosure housing a CPU of an ATM and independent of the CPU of the ATM. In response to receiving an environmental change event notification from one or more of the environmental change event sensors, the intrusion detection system processor commences a predetermined time-out period for entry of valid authentication credentials and deactivates a power supply of the automated teller machine upon expiry of the time-out period without receiving entry of valid authentication credentials.

METHODS FOR CONDUCTING ELECTRONIC PAYMENT TRANSACTIONS WITH SCANNABLE CODES
20230087051 · 2023-03-23 ·

One embodiment of the invention provides for making electronic payments by scanning a merchant 2D code located near the point of sale with the customer's cell phone and transmitting the code or data embodied by the code to a payment center where the merchant's account can be credited and the customer's account debited without transmitting account information over the airwaves. In another embodiment of the invention, both parties transmit the same randomly generated 2D code or data embodied by the code to the payment center where they are matched to each other and to the buyer and seller to process the transaction. In a further embodiment of the invention, an inked tattoo or barcode marking is employed as a password to authorize access to smartphone applications for example, to make an electronic payment over a threshold amount.

TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
20230127488 · 2023-04-27 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

TELECOMMUNICATION CALL MANAGEMENT AND MONITORING SYSTEM WITH VOICEPRINT VERIFICATION
20230127488 · 2023-04-27 · ·

Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.

Sheet-like product and method for authenticating a security tag
11599758 · 2023-03-07 · ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

Sheet-like product and method for authenticating a security tag
11599758 · 2023-03-07 · ·

Sheet-like product and method for authenticating a security tag including a section of the sheet-like product. The sheet-like product includes at least one security feature having optical properties that change with the viewing angle and, and at least one marker, wherein each marker is uniquely attributable to a position on the sheet-like product. The position of the at least one security feature on the sheet-like product is predetermined relative to the position of the at least one marker on the sheet-like product.

Tamper detection arrangements, and point of sales systems employing same

Authenticity of a sticker (e.g., a mark-down sticker on a retail item), or integrity of a closure (e.g., on a delivery bag or package), is confirmed by reference to spatial information. In some embodiments a fingerprint is formed from parameters describing spatial placement of a sticker or pattern on a substrate. In some embodiments a digital watermark pattern provides a spatial frame of reference within which one or more other features can be located. A great many other features and arrangements are also detailed.