摘要:
Systems and methods for generating an incremental information object with an embedded information region (IIOEIR) are provided. A method includes analyzing an IIOEIR to determine a first code, wherein the IIOEIR includes a plurality of tiles, and wherein a first set of the plurality of tiles includes a first code and a second set of the plurality of tiles includes a second code. The first code is confirmed, and, if the confirmation succeeds, generating a new code comprising a bitstream, overwriting the bitstream onto the first region. A new second code is generated, wherein the new second code is related to the first code, and the new second code is overwritten onto a second region.
摘要:
In a method for providing differential access to a digital document among workflow participants, in which at least one of the workflow participants is outside of a common secure environment (300), a first set of keys including an encryption key, a signature key, and a verification key is associated with atomic unit(s) (304). The atomic unit(s) is encrypted using the encryption key and signed using the signature key (306, 308). A level of access to the atomic unit(s) to be granted to each of the workflow participants and the keys in the first set of keys to supply to each of the workflow participants based upon the identified level of access are identified (310, 312). In addition, each of the workflow participants is supplied with the identified one or more keys (314) and the encrypted and signed atomic unit(s) is supplied to a first workflow participant (316).
摘要:
Systems and methods for generating a grayscale incremental information object (IIO) are provided. A method includes analyzing a grayscale IIO to determine a first code, wherein the grayscale IIO comprises a plurality of tiles, and the intensity of a tile corresponds to the number of data bits written to the tile. The product is confirmed from the first code, and, if the product is confirmed a new code comprising a bitstream is generated. The bitstream is overwritten on the grayscale IIO. The grayscale IIO is the same size after writing of the bitstream.
摘要:
In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map files comprising subsets of access keys that provide access to the secure content-part during respective content access sessions are generated, in which at least one of the key-map files corresponds to the key reset point and comprises a first decryption key, a first verification key, a second encryption key, and a second signature key, in which the first decryption key does not correspond to the second encryption key, and in which the first verification key does not correspond to the second signature key. In addition, the plurality of key-map files are supplied to at least one of the participants.
摘要:
A forensic verification system (900) extracts a print signature via a print signature extractor (910) from a captured image of a printed halftone. The system (900) utilizes a comparator (920) to compare the print signature to a reference signature stored in a registry to determine differences between the print signature and the reference signature. The system (900) utilizes a forensic analyzer (930) to perform a forensic analysis on the signatures based on the comparison to authenticate the printed halftone.
摘要:
A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of blocks in a progressive barcode. The method and apparatus including, encoding information of a first data element within the matrix using black modules and, encoding information of a second data element within the matrix using color modules. The barcode being configured to be overprinted as it progresses through progressive states. The progressive barcode, resulting from the overprinting through the progressive states, masking the ability to conclusively determine the barcode in a previous state.
摘要:
A system (10) for generating an incrementally completed 3D security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program has computer readable code for selecting a color transformation process at each stage in a workflow associated with the 3D security mark (20′″); computer readable code for selecting a scrambling technique for data to be placed into a carrier object (20, 20′, 20″, 20′″) of the 3D security mark (20′″) at each stage in the workflow; computer readable code for selecting a manner in which a state change of the carrier object (20, 20′, 20″, 20′″) at each stage in the workflow results in a predictable change in the 3D security mark (20′″); and computer readable code for weighting writing schemes at each stage in the workflow. The system (10) further includes further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
摘要:
A method for tracking customer loyalty information using an incremental information object (IIO) includes capturing an information object (IO), wherein the IO include a number of tiles, and wherein the number of tiles include a standard code. The method also includes analyzing the IO to identify the standard code and analyzing the IO to determine if the IO is an IIO containing a progressive code, wherein the progressive code does not interfere with the reading of the standard. The method further include confirming the progressive code and, if the progressive code is successfully confirmed, obtaining customer loyalty data from the progressive code within the IIO.
摘要:
A counterfeit detection system is disclosed herein. The system includes an image reduction system for minimizing size of at least one original image using a plurality of different reduction strategies to generate a plurality of minimized images. The system further includes a classification system which includes a first sub-system for generating at least one accuracy comparative assessment metric for each of the plurality of minimized images, a second sub-system for comparing the at least one accuracy comparative assessment metric for each of the plurality of minimized images with an accuracy assessment metric for the at least one original image, and a third sub-system for determining if at least one of the plurality of minimized images can be transmitted with improved or equivalent classification accuracy at a reduced bandwidth when compared to the original image are also part of the system.
摘要:
A method and system for providing recording device privileges through biometric assessment are disclosed herein. An embodiment of the method includes monitoring information associated with a recording device. The information includes a recording device location, dynamic biometric data, knowledge data, and recording device identification data. From the monitored information, an identity of a then-current user of the recording device is determined. An authorization level for the then-current user is determined, and recording device access privileges are dynamically adjusted based on the determined authorization level.