Patent classifications
G06K7/1094
AUTOMATIC ANALYSER
A two-dimensional code is attached to a location of a reagent storage unit which is visually recognizable from the outside, and a coordinate position of the two-dimensional code in a coordinate system of the two-dimensional code and coordinate information of an installation position of a reagent bottle are held. After that, an image of the two-dimensional code is captured by a portable terminal so that a coordinate system of an image capture unit of the portable terminal is converted into the coordinate system of the two-dimensional code using AR technology. The coordinate information of the installation position of the reagent bottle in the coordinate system of the two-dimensional code is regarded as positional coordinates in the captured image on the basis of the conversion, thereby ascertaining the position of the reagent bottle on the captured image and displaying the ascertained position on a display unit.
Reading device, reading method, reading program, and settlement processing method
A reading device, a reading method and a reading program that can easily and quickly read a composite symbol, and a settlement processing method are provided. A moving image of a composite symbol which includes a plurality of symbols emerging in the same location and whose appearance changes depending on a viewing angle, is captured. The symbols included in the composite symbol are detected from the moving image obtained by image-capturing. Authenticity of the composite symbol is determined based on the obtained moving image.
COMPUTER-GENERATED HOLOGRAM BASED-GENUINE PRODUCT AUTHENTICATION METHOD, COMPUTER-GENERATED HOLOGRAM BASED-GENUINE PRODUCT AUTHENTICATION SYSTEM, AND DIGITAL HOLOGRAM TAG GENERATOR FOR A COMPUTER-GENERATED HOLOGRAM BASED-GENUINE PRODUCT AUTHENTICATION SYSTEM
The present invention provides a genuine product authentication method, a genuine product authentication system, and a digital hologram tag generator for a genuine product authentication system, which increases a security level of a digital hologram tag. The computer-generated hologram based-genuine product authentication method, the computer-generated hologram based-genuine product authentication system, and the digital hologram tag generator for a computer-generated hologram based-genuine product authentication system are characterized in that a product unique code is set according to a predetermined rule, and the set product unique code is converted into digital hologram and encrypted according to a specific process, and the encrypted code is decrypted through a decryption process same as the encryption process and compared with the unique code stored in the server, thereby preventing illegal copying and allowing consumers to verify the authenticity very conveniently.
READING DEVICE, READING METHOD, READING PROGRAM, AND SETTLEMENT PROCESSING METHOD
A reading device, a reading method and a reading program that can easily and quickly read a composite symbol, and a settlement processing method are provided. A moving image of a composite symbol which includes a plurality of symbols emerging in the same location and whose appearance changes depending on a viewing angle, is captured. The symbols included in the composite symbol are detected from the moving image obtained by image-capturing. Authenticity of the composite symbol is determined based on the obtained moving image.
AUTHENICATION SYSTEM FOR USE WITH PHARMACEUTICALS
An authentication system reads at random or in a predetermined sequence a few, typically 3 to 5, unique product identifiers inside the package to decide whether the content is authentic or not. This cross-referencing check does not require a database connection to a central repository or database. The unique product identifiers are produced when pharmaceutical products are manufactured using embossing, for example, and a product sequence is defined by physical attributes and locations of pharmaceutical products in the packaging, the product sequence then being encrypted and used to mark the packaging of the one or more packaging levels with a coding. The coding is used to authenticate the products in the packaging downstream in the supply chain.
PROJECTION SCREEN ANTICOUNTERFEITING SYSTEM AND METHOD OF IMPLEMENTATION THEREOF
The present disclosure provides an anticounterfeiting system based on optical technology that verify the authenticity of protected cinema screens. The optical technology includes taggants embedded or attached to the screen and an optical readout system that can interrogate the taggant layer and receive the taggant output. The taggants are capable of reflecting a pattern that unambiguously demonstrates that the screen contains the taggant. The taggants are covert because they are not visible under normal lighting conditions or during cinema operation, but are detected when interrogated by the optical readout system.
Automatic analyser
A two-dimensional code is attached to a location of a reagent storage unit which is visually recognizable from the outside, and a coordinate position of the two-dimensional code in a coordinate system of the two-dimensional code and coordinate information of an installation position of a reagent bottle are held. After that, an image of the two-dimensional code is captured by a portable terminal so that a coordinate system of an image capture unit of the portable terminal is converted into the coordinate system of the two-dimensional code using AR technology. The coordinate information of the installation position of the reagent bottle in the coordinate system of the two-dimensional code is regarded as positional coordinates in the captured image on the basis of the conversion, thereby ascertaining the position of the reagent bottle on the captured image and displaying the ascertained position on a display unit.
Real-time presence verification
A method for real time presence verification, comprising: capturing a first image of a machine-readable label by a first camera of a mobile device; automatically decoding the machine-readable label to extract a reference to a database entry in response to the capturing; automatically triggering at the mobile device a capturing of a second image by a second camera of the mobile device in response to at least one of the decoding and the capturing; and automatically forwarding the second image and at least one of the first image, the database entry, and the reference to a control network node for documentation of the second image in association with the database entry.
Method and device for authenticating a tag
A method for authenticating a tag, includes: a step (205) of capturing an image, with a communicating mobile terminal, of at least a portion of a tag having at least a portion of an identifier; a step (210) of transmitting the identifier to a server; a step (215) of reading, from a memory of tag images, the image of a tag having the identifier; a step (220) of transmitting, to the communicating mobile terminal, at least a portion of the image read from the memory; and a step (230) of displaying at least a portion of the transmitted image superimposed on an image captured by the terminal.
AUTHENTICATION SYSTEM FOR USE WITH PHARMACEUTICALS
An authentication system reads at random or in a predetermined sequence a few, typically 3 to 5, unique product identifiers inside the package to decide whether the content is authentic or not. This cross-referencing check does not require a database connection to a central repository or database. The unique product identifiers are produced when pharmaceutical products are manufactured using embossing, for example, and a product sequence is defined by physical attributes and locations of pharmaceutical products in the packaging, the product sequence then being encrypted and used to mark the packaging of the one or more packaging levels with a coding. The coding is used to authenticate the products in the packaging downstream in the supply chain.