G07D7/14

Counterfeit detection apparatus

Embodiments disclosed herein generally relate to an apparatus for counterfeit detection and a method implementing the same. In one embodiment, as apparatus is disclosed herein. The apparatus includes a first end, a second end, an elongated body, an ink cartridge, a controller, and a trigger. The elongated body extends from the first end to the second end. The elongated body defines a cavity therein. The ink cartridge is disposed in the cavity. The controller is positioned within the cavity. The controller is configured to communicate with at least one computing system remote from the apparatus. The trigger is in electronic communication with the controller. The trigger extends at least partially though the elongated body. The trigger is actionable between a first position and a second position. A change from the first position to the second position transmits an electronic signal to the controller.

Marked Items and Verification Methods
20210332426 · 2021-10-28 ·

The invention provides methods for stably immobilizing nucleic acid tracers onto surfaces of products and objects. This method is applied for the identification and authentication of the marked object or product. The present invention further provides specific coated articles and their use in product verification; processes for manufacturing such coated articles, methods for the verification of the coated article, methods for the quantification of the coated article blending, and products suitable for such verification and quantification method.

PROVISIONING A NOTE BACKED BY CRYPTOCURRENCY
20210312145 · 2021-10-07 ·

A method of provisioning a note for use as currency is provided, including receiving a base material and printing a note from the base material. The note includes a first unique identifier and a second unique identifier. The method further includes covering the second unique identifier with a tamper-proof material and covering a back of the second unique identifier with a tamper-evident material. The method also includes recording a transaction associating the first unique identifier and the second unique identifier with a predetermined amount of cryptocurrency in a recordation facility accessible for validation of the cryptocurrency.

Counterfeit Detection Apparatus

Embodiments disclosed herein generally relate to an apparatus for counterfeit detection and a method implementing the same. In one embodiment, as apparatus is disclosed herein. The apparatus includes a first end, a second end, an elongated body, an ink cartridge, a controller, and a trigger. The elongated body extends from the first end to the second end. The elongated body defines a cavity therein. The ink cartridge is disposed in the cavity. The controller is positioned within the cavity. The controller is configured to communicate with at least one computing system remote from the apparatus. The trigger is in electronic communication with the controller. The trigger extends at least partially though the elongated body. The trigger is actionable between a first position and a second position. A change from the first position to the second position transmits an electronic signal to the controller.

Counterfeit Detection Apparatus

Embodiments disclosed herein generally relate to an apparatus for counterfeit detection and a method implementing the same. In one embodiment, as apparatus is disclosed herein. The apparatus includes a first end, a second end, an elongated body, an ink cartridge, a controller, and a trigger. The elongated body extends from the first end to the second end. The elongated body defines a cavity therein. The ink cartridge is disposed in the cavity. The controller is positioned within the cavity. The controller is configured to communicate with at least one computing system remote from the apparatus. The trigger is in electronic communication with the controller. The trigger extends at least partially though the elongated body. The trigger is actionable between a first position and a second position. A change from the first position to the second position transmits an electronic signal to the controller.

METHODS AND COMPOSITIONS FOR MOLECULAR AUTHENTICATION

Provided herein, in some embodiments, are molecular authentication methods, systems, and compositions.

METHODS AND COMPOSITIONS FOR MOLECULAR AUTHENTICATION

Provided herein, in some embodiments, are molecular authentication methods, systems, and compositions.

Counterfeit detection apparatus

Embodiments disclosed herein generally relate to an apparatus for counterfeit detection and a method implementing the same. In one embodiment, as apparatus is disclosed herein. The apparatus includes a first end, a second end, an elongated body, an ink cartridge, a controller, and a trigger. The elongated body extends from the first end to the second end. The elongated body defines a cavity therein. The ink cartridge is disposed in the cavity. The controller is positioned within the cavity. The controller is configured to communicate with at least one computing system remote from the apparatus. The trigger is in electronic communication with the controller. The trigger extends at least partially though the elongated body. The trigger is actionable between a first position and a second position. A change from the first position to the second position transmits an electronic signal to the controller.

Counterfeit detection apparatus

Embodiments disclosed herein generally relate to an apparatus for counterfeit detection and a method implementing the same. In one embodiment, as apparatus is disclosed herein. The apparatus includes a first end, a second end, an elongated body, an ink cartridge, a controller, and a trigger. The elongated body extends from the first end to the second end. The elongated body defines a cavity therein. The ink cartridge is disposed in the cavity. The controller is positioned within the cavity. The controller is configured to communicate with at least one computing system remote from the apparatus. The trigger is in electronic communication with the controller. The trigger extends at least partially though the elongated body. The trigger is actionable between a first position and a second position. A change from the first position to the second position transmits an electronic signal to the controller.

SYSTEMS FOR DETECTION OF VOLATILE IONS AND RELATED METHODS

Components, systems, and methods for detection of volatile ions and related methods are generally provided. In some embodiments, the components, systems, and methods are configured for use with mass and/or ion mobility spectrometry. In some embodiments, a characteristic of an article (e.g., identity, authenticity, property, adulteration, product associated information such as age or quality, etc.) may be determined by determining the presence (e.g., an amount) or absence of one or more ionic species emanating from the article. For example, the presence or absence of the one or more ionic species emanating from the article identifies a characteristic of the article. In some embodiments, the one or more ionic species have been proactively added to the article.