G07D7/0034

PRODUCT AUTHENTICATION SYSTEMS, METHODS, AND DEVICES
20220164806 · 2022-05-26 · ·

A method includes providing an image; analyzing the image to determine one or more encodable areas; determining a plurality of distinct serial numbers; adding the plurality of distinct serial numbers to a database; and producing a first plurality of first tags based on the image, each of the first tags including encoded information in at least one encodable area thereon, the encoded information for each particular first tag including a corresponding particular unique serial number of the distinct serial numbers, wherein at least some of the encoded information is encoded using steganography. Information in the image is used to authenticate a product.

Digital watermarking and data hiding with clear topcoats

The present disclosure relates to signal processing such as image processing, signal encoding, digital watermarking and data hiding. One claim recites a method including: capturing imagery corresponding to a printed object with a red or blue illumination source, the red or blue illumination source having an illumination wavelength at or around 660 nm or an illumination wavelength in the range of 60 nm centered around 460 nm, said capturing imagery yielding captured data; wherein the printed object includes a clear coat printed thereon, the clear coat including a material that has a peak absorbance at or around 660 nm or in the range of 60 nm centered around 460 nm, the clear coat printed in a manner to convey an encoded plural-bit message, the encoded plural-bit message corresponding to product information; analyzing the captured data with one or more programmed multi-core processors to decode the encoded plural-bit message, said analyzing yielding the product information; and providing the product information as an output. Of course, other claims, technology and combinations are disclosed.

SECURE EMBEDDED WATERMARKS
20220030702 · 2022-01-27 ·

An article comprises a superficial watermark located on a first surface. The article also comprises an embedded watermark that is embedded within the article. The embedded watermark may be viewed by an X-ray camera. A method comprises applying a metal-containing mixture to an inner layer of an article, resulting in an embedded watermark within the article. The method also comprises analyzing the properties of metal particles within the mixture. The method also comprises recording the first property.

SYSTEM AND METHOD FOR DETECTING CURRENCY GENIUNESS
20210358255 · 2021-11-18 ·

The present invention is a system and method to equip the ATM (Automated Teller Machine) with the special hardware to detect the each currency note to determine whether that note is a legal tender or not. The counterfeited currency hardware will work with computer executable instructions to detect counterfeited notes while feeding and dispensing in to and from the ATM machine respectively. The aim of the invention is to negligate the chance of counterfeited currency being fed and dispense from the ATM.

DIGITAL WATERMARKING AND DATA HIDING WITH NARROW-BAND ABSORPTION MATERIALS

The present disclosure relates to signal processing such as image processing, signal encoding, digital watermarking and data hiding. A sparse or dense digital watermark signal can be conveyed with a narrow-band absorption material corresponding to a center wavelength of a Point of Sale (POS) barcode scanner. The POS barcode scanner typically captures 2D imagery. Since the narrow-band absorption material absorbs over a narrow-band it is relatively imperceptible to the Human Visual System (HVS) but can be seen by the POS scanner.

Method for authenticating a secure document
11749048 · 2023-09-05 · ·

The invention relates to a method for authenticating a secure document comprising data printed by analogue or digital printing, said method comprising the following operations: —definition, from among a set of graphical and/or alphanumeric data of the secure document, of at least one distinct data area including at least one distinctive pattern; —during an operation of fabrication of the secure document, reading the distinct data area onto a storage device so as to form a distinct reference data area; —in the course of an operation of verification of the authenticity of the secure document, extracting the distinct data area from a digitized version of the secure document; and—comparing the extracted distinct data area with the distinct reference data area so as to determine a level of matching between said distinct data areas and to deduce therefrom a positive authentication or negative authentication.

Authentication of a physical credential

Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential. An image of a credential may be received. An optical characteristic of a secure feature of the credential may be determined. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based on a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.

LIGHT EMITTING APPARATUS FOR CASH VERIFICATION AND REMOTE DEPOSIT
20220245607 · 2022-08-04 ·

Systems and methods for cash verification and remote deposit are provided. A method may include receiving credentials to authenticate a login to a mobile app that is associated with a first financial entity; receiving an instruction to deposit a bill of cash at a physical location associated with a second financial entity that is different from the first financial entity; illuminating a front face of the bill; capturing an image of the illuminated front face; illuminating a back face of the bill; capturing an image of the illuminated back face; extracting a first tier of features from the images; determining a denomination and/or version of the bill; when the denomination and/or version exceeds a predetermined first threshold, extracting a second tier of features; when all of the extracted features are associated with the same denomination and/or version, and all of the features that are associated with said denomination and/or version are detected, verifying the bill; and when the bill is verified and a message is received, from the second financial entity, confirming that the second financial entity received the bill, depositing an amount corresponding to the denomination in an account at the first financial entity.

Authentication of a Physical Credential

Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential. An image of a credential may be received. An optical characteristic of a secure feature of the credential may be determined. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based on a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.

METHOD FOR AUTHENTICATING A SECURE DOCUMENT
20210174626 · 2021-06-10 ·

The invention relates to a method for authenticating a secure document comprising data printed by analogue or digital printing, said method comprising the following operations:—definition, from among a set of graphical and/or alphanumeric data of the secure document, of at least one distinct data area including at least one distinctive pattern;—during an operation of fabrication of the secure document, reading the distinct data area onto a storage device so as to form a distinct reference data area;—in the course of an operation of verification of the authenticity of the secure document, extracting the distinct data area from a digitized version of the secure document; and—comparing the extracted distinct data area with the distinct reference data area so as to determine a level of matching between said distinct data areas and to deduce therefrom a positive authentication or negative authentication.