G07D7/2033

Systems and Methods for Authentication of Security Devices Having Chaosmetrics Features
20230052463 · 2023-02-16 ·

Systems, methods and devices for authentication of security devices having chaosmetrics features are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to perform authentication of a security device. In one embodiment, the method includes detecting a scan of the security device by a user device, identifying a rotational orientation of the user device in relation to the security device and/or generating a fingerprint of the security device specific to the user device having the rotational orientation in relation to the security device. An image similarity index of an authentication scan of the security device and the fingerprint generated for the security device can be determined and a positive authentication result can be identified for the authentication request of the security device responsive to determination that the image similarity index exceeds a threshold value.

3D ANTI-COUNTERFEITING PATTERN AND PROCESSING OF THE SAME
20220410607 · 2022-12-29 ·

A 3D physical unclonable functions (PUF) system produced based on harnessing the out-of-plane crumpling of a layer of 2D material during shrinkage of a substrate carrying such layer. The structural details of the so-formed 3D PUF pattern are extracted from the tags in a layer-by-layer fashion using confocal laser microscopy imaging and then reconstructed to form the 3D PUF keys and stored in the database, serving as a secure anti-counterfeiting PUF that demonstrates encoding capacity in excess of 10.sup.40,000,000. Authentication is performed with a customized trained Siamese neural network framework in a matter of few minutes in a fashion that does not depend on rotation, linear translation, tilt, variations of contrast and/or resolution of the extracted optical images.

Method of enrolling data to control an identity, and identity-control method

The present invention comprises an enrolment method comprising steps of: acquisition (100) of an image showing a photograph itself showing an individual, extraction (102), from the image of a characteristic of the image other than a biometric model, obtaining (104) personal data of the individual other than by the image-processing algorithm, generation (106) of a reference datum (W) from the characteristic of the image and the obtained personal data, calculation (108) of an encoded datum (s) by application of an encoding procedure to the reference datum (W) and to a random datum (c), calculation (110) of a hash (h(c) of the random datum, storage (112) in a database of the datum encoded (s) in association with the hash. The invention also comprises an identity-control method using such stored data.

Method of enrolling data to control an identity, and identity-control method

The present invention comprises an enrolment method comprising steps of: acquisition (100) of an image showing a photograph itself showing an individual, extraction (102), from the image of a characteristic of the image other than a biometric model, obtaining (104) personal data of the individual other than by the image-processing algorithm, generation (106) of a reference datum (W) from the characteristic of the image and the obtained personal data, calculation (108) of an encoded datum (s) by application of an encoding procedure to the reference datum (W) and to a random datum (c), calculation (110) of a hash (h(c) of the random datum, storage (112) in a database of the datum encoded (s) in association with the hash. The invention also comprises an identity-control method using such stored data.

MULTI-LEVEL AUTHENTICATION USING DIFFERENT MATERIALS

Among other concepts, this disclosure describes a thermal/optical/electronic authentication system (covert or non-covert) for device/system implementations. The authentication system may be based on different design parameters such as i) materials composition, ii) thickness of material, iii) geometry of material, iv) external effects including use of an external DC bias and curing, etc. The authentication testbeds can be configured to include one or more inks. Using such methods as discussed herein, the authentication can be broadened to include near-IR (700-900 nm), short wave IR (1-2.6 mm), and UVA (300-400 nm) or any spectrum. Printed resistors are very difficult to duplicate without Ag-BST13 ink. If necessary, a printed resistor network on a respective substrate can be hidden using a layer of non-sintered Ag-BST13 (non-conductive).

Method for reading a code stored in a halftone image and comparison with a retrievable value

A method for checking the authenticity of products, by checking an image (A) of a product. The proof of authenticity is not visible to the human eye and cannot be copied. This is characterized in that a code stored in a halftone image by manipulation of dots and/or a manipulated field bounded in the halftone image can be read by means of an optical device and compared with a retrievable value in at least one database. In at least one field (F1 to F5) a part of a serial number is determined which describes the structure of the serial number and a hash function used for transmitting the serial number to the database, and this is also characterized in that the serial number is subsequently assembled and encrypted with the corresponding hash function.

Payment card with light-based signature
11615281 · 2023-03-28 · ·

Systems, methods and apparatus are provided for light-based authentication of a payment card. The payment card may include a randomized mix of materials. The materials may include transparent or translucent materials. A light source may shine light on a surface of the payment card. Light passing through the card may generate a light pattern that is unique to the payment card. The light pattern may be captured and compared to a reference light pattern to authenticate the payment card. In some embodiments, photodetectors may detect light patterns generated through interactions with the card materials.

Authentication method and system
11600056 · 2023-03-07 · ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

Authentication method and system
11600056 · 2023-03-07 · ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

COLLATION DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM

A collation device includes a light source unit; a camera unit that receives light emitted from the light source unit and reflected in a collation area of an object to acquire a photographed image of the collation area; and a processor configured to, by executing a program: detect a positional relationship between the light source unit and the camera unit by using the photographed image, and notify of a collation result between the photographed image and a registered image prepared in advance by using the positional relationship.