Patent classifications
G07D7/0043
Systems and Methods for Authentication of Security Devices Having Chaosmetrics Features
Systems, methods and devices for authentication of security devices having chaosmetrics features are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to perform authentication of a security device. In one embodiment, the method includes detecting a scan of the security device by a user device, identifying a rotational orientation of the user device in relation to the security device and/or generating a fingerprint of the security device specific to the user device having the rotational orientation in relation to the security device. An image similarity index of an authentication scan of the security device and the fingerprint generated for the security device can be determined and a positive authentication result can be identified for the authentication request of the security device responsive to determination that the image similarity index exceeds a threshold value.
Validation of Security Device Authentication in a Decentralized Network
Systems and methods to perform validation of authentication of a security device in a decentralized network are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to, identify telemetry associated with the successful authentication. The telemetry is further in a distributed ledger in the decentralized network and can be used to determine validity of an authentication attempt of the security device by a second user device.
Reader apparatus for upconverting nanoparticle ink printed images
An improved system and method for reading an upconversion response from nanoparticle inks is provided. A is adapted to direct a near-infrared excitation wavelength at a readable indicia, resulting in a near-infrared emission wavelength created by the upconverting nanoparticle inks. A short pass filter may filter the near-infrared excitation wavelength. A camera is in operable communication with the short pass filter and receives the near-infrared emission wavelength of the readable indicia. The system may further include an integrated circuit adapted to receive the near-infrared emission wavelength from the camera and generate a corresponding signal. A readable application may be in operable communication with the integrated circuit. The readable application receives the corresponding signal, manipulates the signal, decodes the signal into an output, and displays and/or stores the output.
Reader apparatus for upconverting nanoparticle ink printed images
An improved system and method for reading an upconversion response from nanoparticle inks is provided. A is adapted to direct a near-infrared excitation wavelength at a readable indicia, resulting in a near-infrared emission wavelength created by the upconverting nanoparticle inks. A short pass filter may filter the near-infrared excitation wavelength. A camera is in operable communication with the short pass filter and receives the near-infrared emission wavelength of the readable indicia. The system may further include an integrated circuit adapted to receive the near-infrared emission wavelength from the camera and generate a corresponding signal. A readable application may be in operable communication with the integrated circuit. The readable application receives the corresponding signal, manipulates the signal, decodes the signal into an output, and displays and/or stores the output.
Fraud confirmation assisting apparatus and fraud confirmation method including a light source irradiating an object in the invisible wavelength range and read by a reading sensor to output a plurality of pieces of fraud confirmation information
A fraud confirmation assisting apparatus includes a light source, a reading sensor, and processing circuitry. The light source irradiates an object to be read with light in at least an invisible wavelength range. The reading sensor has sensitivity at least in the invisible wavelength range. The processing circuitry performs a reading operation on the object to be read by a combination of the light source and the reading sensor, and outputs a plurality of pieces of fraud confirmation information based on read information output from the reading sensor by the reading operation.
ELECTROMAGNETIC SYSTEMS FOR THE SELECTIVE MANIPULATION OF MAGNETICALLY-BARCODED MATERIALS
Embodiments herein are directed to a system and a method of selectively manipulating magnetically-barcoded materials from background magnetic materials. Magnetic barcodes include layers of magnetic anisotropy. These are then manipulated by a magnetic system that can drive spatio-temporal magnetic fields that can “match” a barcode to drive a specific interaction, thereby providing a “lock-key” interaction. This technique is able to selectively manipulate magnetically-barcoded materials, and can have applications across a variety of magnetic systems such as cell separation, drug delivery, valves, and motors.
Authentication method and system
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
Authentication method and system
A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.
METHOD FOR AUTHENTICATING A SECURITY DOCUMENT
A method for authenticating a security document by means of at least one device includes: a) providing the security document having at least one first security element and at least one second security element; b) providing the at least one device, wherein the at least one device includes at least one sensor; c) capturing first items of optical information of the at least one first security element by means of the at least one sensor of the at least one device during a first illumination, wherein at least one first dataset specifying these items of information is generated therefrom; d) capturing second items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a second illumination, wherein at least one second dataset specifying these items of information is generated therefrom; e) capturing third items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a third illumination, wherein at least one third dataset specifying these items of information is generated therefrom, wherein the second illumination differs from the third illumination; f) checking the genuineness of the security document and/or the second security element at least on the basis of the at least one second dataset and the at least one third dataset.
METHOD FOR AUTHENTICATING A SECURITY DOCUMENT
A method for authenticating a security document by means of at least one device includes: a) providing the security document having at least one first security element and at least one second security element; b) providing the at least one device, wherein the at least one device includes at least one sensor; c) capturing first items of optical information of the at least one first security element by means of the at least one sensor of the at least one device during a first illumination, wherein at least one first dataset specifying these items of information is generated therefrom; d) capturing second items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a second illumination, wherein at least one second dataset specifying these items of information is generated therefrom; e) capturing third items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a third illumination, wherein at least one third dataset specifying these items of information is generated therefrom, wherein the second illumination differs from the third illumination; f) checking the genuineness of the security document and/or the second security element at least on the basis of the at least one second dataset and the at least one third dataset.