WO2015042485A1 - Instrument and document authentication system - Google Patents
Instrument and document authentication system Download PDFInfo
- Publication number
- WO2015042485A1 WO2015042485A1 PCT/US2014/056685 US2014056685W WO2015042485A1 WO 2015042485 A1 WO2015042485 A1 WO 2015042485A1 US 2014056685 W US2014056685 W US 2014056685W WO 2015042485 A1 WO2015042485 A1 WO 2015042485A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- appearance
- pattern
- database
- image
- Prior art date
Links
- 238000007639 printing Methods 0.000 claims abstract description 40
- 238000000034 method Methods 0.000 claims abstract description 38
- 239000000356 contaminant Substances 0.000 claims abstract description 22
- 230000015654 memory Effects 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 8
- 238000004458 analytical method Methods 0.000 claims description 2
- 238000003860 storage Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 2
- 238000007667 floating Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- PLXMOAALOJOTIY-FPTXNFDTSA-N Aesculin Natural products OC[C@@H]1[C@@H](O)[C@H](O)[C@@H](O)[C@H](O)[C@H]1Oc2cc3C=CC(=O)Oc3cc2O PLXMOAALOJOTIY-FPTXNFDTSA-N 0.000 description 1
- 239000000654 additive Substances 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- -1 but not limited to Substances 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000011109 contamination Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 239000000049 pigment Substances 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000011524 similarity measure Methods 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0092—Payload characteristic determination in a watermarking scheme, e.g. number of bits to be embedded
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/206—Matching template patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0062—Embedding of the watermark in text images, e.g. watermarking text documents using letter skew, letter distance or row distance
Definitions
- a system for printing the documents so that they cannot be duplicated, as well as a system for storing unique identifying information about a detail of the document that cannot be duplicated, would enhance security and reduce counterfeiting and other types of forgery and identity theft.
- the present invention is a system and method that provides a deterrent to financial instrument or document forgery through the use of mobile, recognition and radio frequency identification technologies.
- a printing medium is purposefully contaminated with a reflective contaminant prior to printing the document.
- a printing medium is any substance used to print content onto a substrate, including, but not limited to, ink, toner, dye, pigment, etc.
- a system applying these technologies separately and in tandem to the printing or fabrication process, especially of a serial number or any printed control sequencing method used to account for financial instruments or documentation, would allow a corresponding database to record, maintain, validate and attest to authentication of, for example, a particular bill, another financial instrument such as a bond or credit card, or identifying documentation such as a passport or license.
- the present system would operate on both authentication (an instrument or document is found in the database) as well as exclusion (an instrument or document can't be validated and, thus, is invalid until or unless otherwise authenticated).
- a government or private entity would oversee the database and operate as a clearinghouse to authenticate included instruments and documents.
- a method of creating a document whose authenticity can be confirmed comprises the steps of, printing a character on the document using a combination, said combination comprising a printing medium having a first appearance and a contaminant having a second appearance, wherein the second appearance is distinct from the first appearance and wherein a first portion of the character has the first appearance but not the second appearance, and a second portion of the character has the second appearance; capturing an image containing the character; and storing the image and information relating to the document in a database.
- the first portion and the second portion are in random locations within the character.
- the printing medium or the contaminant is radio frequency conductive and the method further comprises the step of storing, in the database, radio frequency information relating to the document.
- the second appearance is distinct from the first appearance in a manner that is detectable through analysis of a photograph of the document taken with a camera within a smartphone.
- a method of authenticating a document comprises the steps of capturing an image of the document; identifying a pattern in the document, the pattern including a first appearance and a second appearance wherein the second appearance is distinct from the first appearance, wherein a portion of the pattern has the first appearance and does not have the second appearance, and a second portion of the pattern has the second appearance; comparing the pattern to information in a database relating to an original pattern present on an originally printed document to determine whether the pattern and the original pattern are within a specified level of similarity; and outputting the result of the comparing step.
- the capturing step is performed by a device, the device comprising a camera and a memory containing computer executable code, said code capable of instructing the device to capture an image and to transfer the image to a computer in communication with the database.
- the device is a smartphone.
- the method further comprises the step of storing an identifier of said device to be associated with an attempt to authenticate a document.
- the method further comprises the steps of recording radio frequency information from the document and querying the database to determine whether the radio frequency information matches original radio frequency information, stored in the database, relating to the originally printed document.
- the method further comprises the step of enforcing a rule to deny the authenticity of the document based on a characteristic of the document or a characteristic of an attempt to authenticate the document.
- the rule comprises determining whether a number of attempts to authenticate a document in the database exceeds a maximum number of attempts to authenticate a document in the database.
- the maximum number of attempts is a maximum number of attempts within a specified time period.
- the rule comprises determining whether a previous attempt to authenticate the document has been made at a geolocation further than a maximum acceptable distance from the geolocation at which the image was captured.
- the step of determining whether a previous attempt to authenticate the document has been made at a geolocation further than a maximum acceptable distance from the geolocation at which the image was captured is effective to deny the authenticity of the document only if the attempt to authenticate the document and the previous attempt occur within a specified length of time.
- the pattern is contained in a character.
- FIG. 1 is a flow chart of a method in accordance with one aspect of the present invention.
- FIG. 2 is a flow chart of a method in accordance with one aspect of the present invention.
- FIG. 3 is a diagram of a system architecture in accordance with one aspect of the present invention.
- FIG 1 and FIG 2 are block diagrams of aspects of the instrument or document authentication system.
- a contaminated printing medium is used.
- a printing medium would be mixed with a contaminant that, when combined, produces a random pattern each time the same character, word, image, etc. is printed.
- the contaminant is reflective, and specks of reflective material are printed along with the printing medium.
- the contaminant is such that it does not interfere with the printing process for the printers that are conventionally used to print with the type of printing medium used, and therefore no special printing equipment is necessary.
- the distribution of contaminant into a pattern will be different because the contaminant is free- floating and random. Thus, if the same character is printed on two documents, that character in each document would have different patterns of reflection caused by the contaminant.
- the contaminant is made up of free-floating reflective particles, a contrasting color, or another substance.
- the result is a contaminated printing medium causing randomized patterns in the printed characters, such that the contaminant impacts the reflected light (white/polychrome illumination or specific monochromatic one), its amplitude statistical distribution, and/or another property of the final printed product such that the printing medium can be distinguished from the contaminant.
- the contaminant would increase the light reflected amplitudes which would, in turn, change distribution parameters and shape.
- the pattern caused by the contaminant in the printing medium can be recognized by image recognition technology, and two patterns can be compared for similarity with varying degrees of precision.
- a matching algorithm calculates a similarity measure between images based on the Bayesian Mean Risk metrics and its different approximations specifically for the given physical observations.
- high speed binary, amplitude independent features are used for pattern recognition.
- the printing medium would be an electrically conductive printing medium capable of conducting radio frequency (“RF") waves that can be read using a Radio Frequency Identification (“RFID”) reader.
- RF Radio Frequency Identification
- the contaminated printing medium would be used to print the identifier of the document, e.g., a serial number on a currency note. Accordingly, the document could then be identified by its serial number and then that serial number can be linked to the pattern of reflective material contained within the document when the document bearing that serial number was printed.
- the contaminant is added to the printing medium.
- the contaminant is a reflective element, and in one aspect either the printing medium or the contaminant, or both, is also Radio Frequency Identification Element ("RFIE”) or Radio Frequency Identification Ink (“RFII”) compatible as well.
- the reflective element generates a random pattern or image within the printed characters.
- the document is printed with the contaminated printing medium.
- the document is printed with an identifier such as a serial number, and the identifier is printed with the contaminated printing medium.
- an image of the identifier is recorded.
- the stored image will contain the randomized pattern created by the contaminated printing medium.
- the document's RFI signature can also be recorded. Persons having skill in the art will realize that this is an optional step, in that the reflective contaminated printing medium can be used with non-RFII as well.
- the image and the RFI signature, if used, are stored in a centralized database for all documents using the printing medium of the present invention, or decentralized databases or document specific databases can be used in the database.
- FIG. 2 wherein a flow chart of a method in accordance with one aspect of the present invention is shown.
- Software for devices which contain or can be connected to cameras, such as cellular telephones, smartphones, tablets, or computers, can be distributed and installed in step 20. These devices can be held and used by retailers, travel desk personnel, notaries public, property closing agents, or any other person needing to authenticate documents. Persons having ordinary skill in the art will realize that this software can take various forms including executable code and can be stored in various places including on the device or on the internet.
- installation of the software is accompanied by registration of a unique identifier of the device. Other information for the device, including subscriber names and telephone numbers, can also be registered.
- This software in communication with a camera that is connected to or accessible by the device on which the software is installed, can record a photo of a document purporting to be an original that is recorded in the database in accordance with one aspect of the present invention in step 22.
- the software would send the photo to the database or another server or computing device in communication with the database in step 24.
- the database is then searched for the document identifier (e.g., serial number) in step 26 and also for a match to the image that was randomly created when the document was printed in step 28.
- a secondary check using Radio Frequency Identification Technology (“RFIT”) can also be used in step 30.
- the software then returns the result of the comparison to the user device running the software, which confirms whether the document contains the same randomized image as was contained in the identifier when it was originally printed in step 32.
- RFIT Radio Frequency Identification Technology
- Additional information can be stored with respect to the documents whose images are stored in the database.
- information relating to the type of document can be stored.
- Information relating to each attempt to authenticate a document purporting to match the document can be stored, including its geolocation, its time, and the identification of the device attempting to authenticate the document.
- rules can be used by the database or any computer or other device in communication with the database, that determine whether the document is deemed authentic.
- Documents can be rejected based on violation of a security rule, despite its image matching the stored image within the required variance threshold, which itself can be determined by users in various capacities, e.g., database administrator, retailer, etc.
- a document is deemed to have been queried in the database too many times in a particular time period, its authenticity might be rejected. If a document is deemed to have been queried in multiple locations too far away from each other within a specified time period, its authenticity might be rejected.
- different security rules can be used for different types of documents. For example, some documents circulate, such as currency, while other documents are personal to the owner and therefore should always be carried by the same person, such as a passport. Accordingly, different security rules can be used.
- the information relating to the frequency, time, and/or location of the prior attempts to authenticate the same document might be sent to the user device where the user of that device can make a determination regarding whether to accept the document as authentic.
- FIG. 3 is a diagram displaying a general purpose computer on which the system and method of the present disclosure may be implemented according to an aspect of present disclosure.
- the computer system 900 may execute at least some of the operations described above.
- Computer system 900 may include processor 910, memory 920, storage device 930, and input/ output devices 940. Some or all of the components 910, 920, 930, and 940 may be interconnected via system bus 950.
- Processor 910 may be single or multi-threaded and may have one or more cores.
- Processor 910 may execute instructions, such as those stored in memory 920 or in storage device 930. Information may be received and output using one or more input/output devices 940.
- Memory 920 may store information and may be a computer-readable medium, such as volatile or non-volatile memory.
- Storage device 930 may provide storage for system 900 and may be a computer-readable medium.
- storage device 930 may be a flash memory device, a floppy disk device, a hard disk device, an optical disk device, or a tape device.
- Input/output devices 940 may provide input/output operations for system 900.
- Input/output devices 940 may include a keyboard, pointing device, and microphone. Input/output devices 940 may further include a display unit for displaying graphical user interfaces, speaker, and printer. External data, such as financial data, may be stored in accessible external databases 960.
- the features described may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations thereof.
- the apparatus may be implemented in a computer program product tangibly embodied in an information carrier, e.g., in a machine -readable storage device or in a propagated signal, for execution by a programmable processor; and method steps may be performed by a programmable processor executing a program of instructions to perform functions of the described implementations by operating on input data and generating output.
- the described features may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device.
- a computer program may include set of instructions that may be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result.
- a computer program may be written in any form of programming language, including compiled or interpreted languages, and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- Suitable processors for the execution of a program of instructions may include, by way of example, both general and special purpose microprocessors, and the sole processor or one of multiple processors of any kind of computer.
- a processor may receive instructions and data from a read only memory or a random access memory or both.
- Such a computer may include a processor for executing instructions and one or more memories for storing instructions and data.
- a computer may also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable, disks; magneto-optical disks; and optical disks.
- Storage devices suitable for tangibly embodying computer program instructions and data may include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
- semiconductor memory devices such as EPROM, EEPROM, and flash memory devices
- magnetic disks such as internal hard disks and removable disks
- magneto-optical disks and CD-ROM and DVD-ROM disks.
- the processor and the memory may be supplemented by, or incorporated in, ASICs (application- specific integrated circuits).
- ASICs application- specific integrated circuits
- the features may be implemented on a computer having a display device such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user may provide input to the computer.
- a display device such as a CRT (cathode ray tube) or LCD (liquid crystal display) monitor for displaying information to the user and a keyboard and a pointing device such as a mouse or a trackball by which the user may provide input to the computer.
- the features may be implemented in a computer system that includes a back-end component, such as a data server, or that includes a middleware component, such as an application server or an Internet server, or that includes a front-end component, such as a client computer having a graphical user interface or an Internet browser, or any combination of them.
- the components of the system may be connected by any form or medium of digital data communication such as a communication network. Examples of communication networks may include, e.g., a LAN, a WAN, and the computers and networks forming the Internet.
- the computer system may include clients and servers.
- a client and server may be remote from each other and interact through a network, such as the described one.
- the relationship of client and server may arise by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Theoretical Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Collating Specific Patterns (AREA)
- Processing Or Creating Images (AREA)
- Document Processing Apparatus (AREA)
- Facsimile Image Signal Circuits (AREA)
- Editing Of Facsimile Originals (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (12)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2923743A CA2923743A1 (en) | 2013-09-20 | 2014-09-19 | Instrument and document authentication system |
AU2014321301A AU2014321301A1 (en) | 2013-09-20 | 2014-09-19 | Instrument and document authentication system |
KR1020167009939A KR20160061356A (en) | 2013-09-20 | 2014-09-19 | Instrument and document authentication system |
CN201480063460.7A CN105745667B (en) | 2013-09-20 | 2014-09-19 | tool and document authentication system |
MX2016003537A MX2016003537A (en) | 2013-09-20 | 2014-09-19 | Instrument and document authentication system. |
BR112016005997A BR112016005997A2 (en) | 2013-09-20 | 2014-09-19 | document and instrument authentication system |
JP2016544037A JP2016535375A (en) | 2013-09-20 | 2014-09-19 | Certificate and document authentication system |
EA201690449A EA201690449A1 (en) | 2013-09-20 | 2014-09-19 | CONFIRMATION SYSTEM AUTHENTICITY OF FINANCIAL INSTRUMENTS AND DOCUMENTS |
EP14845325.1A EP3047422A4 (en) | 2013-09-20 | 2014-09-19 | Instrument and document authentication system |
IL244520A IL244520A0 (en) | 2013-09-20 | 2016-03-09 | Instrument and document authentication system |
ZA2016/01732A ZA201601732B (en) | 2013-09-20 | 2016-03-14 | Instrument and document authentication system |
HK16109081.3A HK1221052A1 (en) | 2013-09-20 | 2016-07-29 | Instrument and document authentication system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361960504P | 2013-09-20 | 2013-09-20 | |
US61/960,504 | 2013-09-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015042485A1 true WO2015042485A1 (en) | 2015-03-26 |
Family
ID=52689484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2014/056685 WO2015042485A1 (en) | 2013-09-20 | 2014-09-19 | Instrument and document authentication system |
Country Status (16)
Country | Link |
---|---|
US (1) | US20150086068A1 (en) |
EP (1) | EP3047422A4 (en) |
JP (1) | JP2016535375A (en) |
KR (1) | KR20160061356A (en) |
CN (1) | CN105745667B (en) |
AU (2) | AU2014321301A1 (en) |
BR (1) | BR112016005997A2 (en) |
CA (1) | CA2923743A1 (en) |
CL (1) | CL2016000645A1 (en) |
EA (1) | EA201690449A1 (en) |
HK (1) | HK1221052A1 (en) |
IL (1) | IL244520A0 (en) |
MX (1) | MX2016003537A (en) |
PE (1) | PE20161144A1 (en) |
WO (1) | WO2015042485A1 (en) |
ZA (1) | ZA201601732B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170154343A1 (en) * | 2015-11-30 | 2017-06-01 | Universal Product Registration Corporation | Counterfeit Product Detection and Content Management System |
WO2017207064A1 (en) * | 2016-06-03 | 2017-12-07 | Veridas Digital Authentication Solutions, S.L. | A method for authenticating a document |
FR3062509A1 (en) * | 2017-01-31 | 2018-08-03 | Surys | METHOD FOR VERIFYING THE AUTHENTICITY OF A SENSITIVE PRODUCT |
FR3098320A1 (en) * | 2019-07-02 | 2021-01-08 | Imprimerie Perroux | Document transmission security system |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9443298B2 (en) | 2012-03-02 | 2016-09-13 | Authentect, Inc. | Digital fingerprinting object authentication and anti-counterfeiting system |
US8774455B2 (en) * | 2011-03-02 | 2014-07-08 | Raf Technology, Inc. | Document fingerprinting |
US10346852B2 (en) | 2016-02-19 | 2019-07-09 | Alitheon, Inc. | Preserving authentication under item change |
US9525802B2 (en) * | 2013-07-24 | 2016-12-20 | Georgetown University | Enhancing the legibility of images using monochromatic light sources |
EP3236401A1 (en) | 2016-04-18 | 2017-10-25 | Alitheon, Inc. | Authentication-triggered processes |
US10614302B2 (en) | 2016-05-26 | 2020-04-07 | Alitheon, Inc. | Controlled authentication of physical objects |
US10740767B2 (en) | 2016-06-28 | 2020-08-11 | Alitheon, Inc. | Centralized databases storing digital fingerprints of objects for collaborative authentication |
US10915612B2 (en) | 2016-07-05 | 2021-02-09 | Alitheon, Inc. | Authenticated production |
US10902540B2 (en) | 2016-08-12 | 2021-01-26 | Alitheon, Inc. | Event-driven authentication of physical objects |
US10839528B2 (en) | 2016-08-19 | 2020-11-17 | Alitheon, Inc. | Authentication-based tracking |
US10460153B2 (en) * | 2016-11-15 | 2019-10-29 | Futurewei Technologies, Inc. | Automatic identity detection |
EP3435287A3 (en) | 2017-07-25 | 2019-05-01 | Alitheon, Inc. | Model-based digital fingerprinting |
EP3514715A1 (en) | 2018-01-22 | 2019-07-24 | Alitheon, Inc. | Secure digital fingerprint key object database |
US10592782B2 (en) * | 2018-01-22 | 2020-03-17 | International Business Machines Corporation | Image analysis enhanced related item decision |
US10963670B2 (en) | 2019-02-06 | 2021-03-30 | Alitheon, Inc. | Object change detection and measurement using digital fingerprints |
EP3734506A1 (en) | 2019-05-02 | 2020-11-04 | Alitheon, Inc. | Automated authentication region localization and capture |
EP3736717A1 (en) | 2019-05-10 | 2020-11-11 | Alitheon, Inc. | Loop chain digital fingerprint method and system |
US11238146B2 (en) | 2019-10-17 | 2022-02-01 | Alitheon, Inc. | Securing composite objects using digital fingerprints |
US10960684B1 (en) * | 2019-11-14 | 2021-03-30 | Capital One Services, Llc | Schemes to validate and protect secure documents |
EP3859603A1 (en) | 2020-01-28 | 2021-08-04 | Alitheon, Inc. | Depth-based digital fingerprinting |
EP3885982A3 (en) | 2020-03-23 | 2021-12-22 | Alitheon, Inc. | Hand biometrics system and method using digital fingerprints |
US11568683B2 (en) | 2020-03-23 | 2023-01-31 | Alitheon, Inc. | Facial biometrics system and method using digital fingerprints |
EP3929806A3 (en) | 2020-04-06 | 2022-03-09 | Alitheon, Inc. | Local encoding of intrinsic authentication data |
US11663849B1 (en) | 2020-04-23 | 2023-05-30 | Alitheon, Inc. | Transform pyramiding for fingerprint matching system and method |
EP3926496A1 (en) | 2020-06-17 | 2021-12-22 | Alitheon, Inc. | Asset-backed digital security tokens |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5018830A (en) * | 1988-10-10 | 1991-05-28 | Homer, Hollandse Meet- En Regelsystemen B.V. | Authenticity mark, document carrying such mark, and process and device for reading and validating such mark |
US20070198632A1 (en) * | 2006-02-03 | 2007-08-23 | Microsoft Corporation | Transferring multimedia from a connected capture device |
US7969281B2 (en) * | 2006-09-14 | 2011-06-28 | Inksure Rf Inc. | Method and apparatus for identification of radio frequency tag |
US8220034B2 (en) * | 2007-12-17 | 2012-07-10 | International Business Machines Corporation | User authentication based on authentication credentials and location information |
US8291472B2 (en) * | 2010-01-28 | 2012-10-16 | International Business Machines Corporation | Real-time adjustments to authentication conditions |
US20130228619A1 (en) * | 2012-03-01 | 2013-09-05 | Sys-Tech Solutions, Inc. | Unique Identification Information From Marked Features |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5581257A (en) * | 1991-09-24 | 1996-12-03 | Gordian Holding Corporation | Radio frequency automatic identification system |
US6373965B1 (en) * | 1994-06-24 | 2002-04-16 | Angstrom Technologies, Inc. | Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters |
GB2417592B (en) * | 2004-08-13 | 2006-07-26 | Ingenia Technology Ltd | Authenticity verification of articles |
GB0617264D0 (en) * | 2006-09-04 | 2006-10-11 | Optaglio Sro | Security devices incorporating diffractive identification platelets and methods of manufacture and application |
GB2445966B (en) * | 2007-01-25 | 2011-05-18 | Hewlett Packard Development Co | Method of and system for authenticating an item |
US7972426B2 (en) * | 2007-05-09 | 2011-07-05 | Hewlett-Packard Development Company, L.P. | Printed security mark |
GB2464723A (en) * | 2008-10-24 | 2010-04-28 | Ian Smith | Product Identification and Authentication |
US8959353B2 (en) * | 2009-03-31 | 2015-02-17 | Topaz Systems, Inc. | Distributed system for multi-function secure verifiable signer authentication |
US20110195514A1 (en) * | 2010-02-05 | 2011-08-11 | Allen Wallace Apblett | Colorimetric reagent for prevention of peroxide formation in solvents |
JP4775727B1 (en) * | 2010-08-17 | 2011-09-21 | 貞宏 平山 | Authenticity judgment method that can be easily done by ordinary people with minute marks on printed matter |
US8869255B2 (en) * | 2010-11-30 | 2014-10-21 | Forticom Group Ltd | Method and system for abstracted and randomized one-time use passwords for transactional authentication |
CN103270539B (en) * | 2010-12-22 | 2016-12-21 | 尤尼卡技术股份有限公司 | For the certification method and apparatus of the file of light-induced variable colour system system labelling |
JP5834692B2 (en) * | 2011-09-26 | 2015-12-24 | 大日本印刷株式会社 | Individual identification device, individual identification method, and program |
CN202600756U (en) * | 2012-06-01 | 2012-12-12 | 北京物资学院 | RFID (Radio Frequency Identification Devices) tag with stress sensitive device and RFID system |
-
2014
- 2014-09-19 PE PE2016000372A patent/PE20161144A1/en not_active Application Discontinuation
- 2014-09-19 JP JP2016544037A patent/JP2016535375A/en active Pending
- 2014-09-19 BR BR112016005997A patent/BR112016005997A2/en not_active IP Right Cessation
- 2014-09-19 CA CA2923743A patent/CA2923743A1/en not_active Abandoned
- 2014-09-19 EP EP14845325.1A patent/EP3047422A4/en not_active Withdrawn
- 2014-09-19 AU AU2014321301A patent/AU2014321301A1/en not_active Abandoned
- 2014-09-19 US US14/491,941 patent/US20150086068A1/en not_active Abandoned
- 2014-09-19 EA EA201690449A patent/EA201690449A1/en unknown
- 2014-09-19 WO PCT/US2014/056685 patent/WO2015042485A1/en active Application Filing
- 2014-09-19 CN CN201480063460.7A patent/CN105745667B/en not_active Expired - Fee Related
- 2014-09-19 KR KR1020167009939A patent/KR20160061356A/en not_active Application Discontinuation
- 2014-09-19 MX MX2016003537A patent/MX2016003537A/en unknown
-
2016
- 2016-03-09 IL IL244520A patent/IL244520A0/en unknown
- 2016-03-14 ZA ZA2016/01732A patent/ZA201601732B/en unknown
- 2016-03-18 CL CL2016000645A patent/CL2016000645A1/en unknown
- 2016-04-18 AU AU2016100419A patent/AU2016100419A4/en not_active Ceased
- 2016-07-29 HK HK16109081.3A patent/HK1221052A1/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5018830A (en) * | 1988-10-10 | 1991-05-28 | Homer, Hollandse Meet- En Regelsystemen B.V. | Authenticity mark, document carrying such mark, and process and device for reading and validating such mark |
US20070198632A1 (en) * | 2006-02-03 | 2007-08-23 | Microsoft Corporation | Transferring multimedia from a connected capture device |
US7969281B2 (en) * | 2006-09-14 | 2011-06-28 | Inksure Rf Inc. | Method and apparatus for identification of radio frequency tag |
US8220034B2 (en) * | 2007-12-17 | 2012-07-10 | International Business Machines Corporation | User authentication based on authentication credentials and location information |
US8291472B2 (en) * | 2010-01-28 | 2012-10-16 | International Business Machines Corporation | Real-time adjustments to authentication conditions |
US20130228619A1 (en) * | 2012-03-01 | 2013-09-05 | Sys-Tech Solutions, Inc. | Unique Identification Information From Marked Features |
Non-Patent Citations (1)
Title |
---|
See also references of EP3047422A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170154343A1 (en) * | 2015-11-30 | 2017-06-01 | Universal Product Registration Corporation | Counterfeit Product Detection and Content Management System |
WO2017207064A1 (en) * | 2016-06-03 | 2017-12-07 | Veridas Digital Authentication Solutions, S.L. | A method for authenticating a document |
US10872488B2 (en) | 2016-06-03 | 2020-12-22 | Veridas Digital Authentication Solutions, S.L. | Method for authenticating a document |
FR3062509A1 (en) * | 2017-01-31 | 2018-08-03 | Surys | METHOD FOR VERIFYING THE AUTHENTICITY OF A SENSITIVE PRODUCT |
WO2018142054A1 (en) * | 2017-01-31 | 2018-08-09 | Surys | Method for verifying the authenticity of a sensitive product. |
FR3098320A1 (en) * | 2019-07-02 | 2021-01-08 | Imprimerie Perroux | Document transmission security system |
Also Published As
Publication number | Publication date |
---|---|
IL244520A0 (en) | 2016-04-21 |
CN105745667A (en) | 2016-07-06 |
PE20161144A1 (en) | 2016-11-16 |
AU2014321301A1 (en) | 2016-04-28 |
ZA201601732B (en) | 2018-11-28 |
US20150086068A1 (en) | 2015-03-26 |
KR20160061356A (en) | 2016-05-31 |
CN105745667B (en) | 2018-11-27 |
CL2016000645A1 (en) | 2016-10-28 |
EA201690449A1 (en) | 2016-09-30 |
BR112016005997A2 (en) | 2017-08-01 |
EP3047422A4 (en) | 2017-08-02 |
MX2016003537A (en) | 2016-06-28 |
HK1221052A1 (en) | 2017-05-19 |
CA2923743A1 (en) | 2015-03-26 |
EP3047422A1 (en) | 2016-07-27 |
JP2016535375A (en) | 2016-11-10 |
AU2016100419A4 (en) | 2016-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016100419A4 (en) | Instrument and document authentication system | |
US20200334681A1 (en) | Hardware and token based user authentication | |
US20190364038A1 (en) | Digital Identification Document | |
US10692167B2 (en) | System and method for digitally watermarking digital facial portraits | |
US20190362458A1 (en) | Digital Identification Document | |
US11087426B2 (en) | System and method for digital watermarking | |
US20130243266A1 (en) | iPassport Apparatus and Method | |
US10957005B2 (en) | System and method for digital watermarking | |
AU2007264675A1 (en) | System and method for traceless biometric identification | |
Khan et al. | A comprehensive study of document security system, open issues and challenges | |
US10460163B2 (en) | System and method for digitally watermarking digital facial portraits | |
IL285790B1 (en) | Verifiable access credential | |
KR20040006648A (en) | Forgery Prevention System for Smart Card Using Image Encryption | |
US11610013B2 (en) | Secure content augmentation systems and methods | |
KR102564395B1 (en) | Method of electronic documents authentication and storage | |
JP7419712B2 (en) | Information processing equipment and programs | |
Singh et al. | A proposed framework to prevent financial fraud through ATM card cloning | |
Tiwari et al. | Internet Security Using Biometrics | |
Mooney et al. | Send your smart cards to graduate school |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14845325 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2923743 Country of ref document: CA |
|
REEP | Request for entry into the european phase |
Ref document number: 2014845325 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014845325 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 244520 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 000372-2016 Country of ref document: PE |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2016/003537 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2016544037 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 201690449 Country of ref document: EA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 16076122 Country of ref document: CO |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112016005997 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20167009939 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2014321301 Country of ref document: AU Date of ref document: 20140919 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112016005997 Country of ref document: BR Kind code of ref document: A2 Effective date: 20160318 |