Abstract:
A quality management system for products including a multiplicity of product unit specific indicators, each operative to provide a machine-readable indication of exceedence of at least one threshold by at least one product quality determining parameter, an indicator reader operative to read the product unit specific indicators and to provide output indications and a product type specific indication interpreter operative to receive the output indications and to provide human sensible, product unit specific, product quality status outputs.
Abstract:
Methods, systems, and products create credit cards, debit cards, and other transactional cards. An image is received and provided on a transactional card. Account information is retrieved and associated with the transactional card. A machine-readable element is also provided on the transactional card and includes the account information.
Abstract:
A printer management system includes one or more printing devices having a printing area for printing according to a digital file, an access area through which a user may access the printing area, and a locking mechanism configured to lock the access area preventing access to the printing area. A management server is communicatively coupled to the one or more printing devices over a communication network and is configured to receive a print request from one or more user devices or one of the one or more printing devices to print the digital file, transmit the digital file to one of the one or more printing devices, and transmit commands to lock and unlock the locking mechanism of the one or more printing devices. In one embodiment the management system is configured to update a printing status of each of the one or more printing devices.
Abstract:
A method of securing a redundant initial two-dimensional barcode includes providing an initial message having a unique identifier, encoding the initial message as a set of predefined symbols so as to generate a redundant initial two-dimensional barcode having a redundant zone, generating a unique secret character string having a predefined fixed size, encoding the unique secret character string as a set of predefined symbols identical to the symbols used to generate the redundant initial two-dimensional barcode, and inserting the encoded unique secret character string into a redundant zone of the redundant initial two-dimensional barcode, each symbol of said encoded unique secret character string having a predefined position, so as to create a final two-dimensional barcode.
Abstract:
A device to secure an object receives a digital file representing a photograph as an input. The photogram represents at least one portion of the object. An encoder of the device encodes characteristic elements of the photograph into a matrix code. The device further includes a printer to print the matrix code on or in the object. The photograph can represent biometric data of a person, which are also visible on the object. An image sensor can be used to input the digital file representing the photograph and is configured to take an image of the object on which the matrix code is printed.
Abstract:
A computer-implemented method for displaying an animated digital watermark including the display of a mobile payment card on a mobile display screen, wherein the mobile payment card is linked to a payment system, and the display of an animated digital watermark on the mobile display screen to ensure authenticity of the displayed mobile payment card.
Abstract:
A printer with integral scanner obtains a digital signature from an article as it is printed. The integral scanner has a coherent source which directs a light beam to illuminate the article and a detector arrangement to collect data points from light scattered from many different parts of the article to collect a large number of independent data points. The digital signature derived from the data points is stored in a database with an image of what was printed on the article. The authenticity of an article purported to be the originally printed article can be verified by scanning the purported genuine article to obtain its digital signature. The database is then searched, to establish whether there is a match. If a match is found, the image is displayed with the matched digital signature to allow a further visual check that the article is genuine.
Abstract:
A label for enabling verification of an object includes a scannable region that enables determination of auto-acquired unique spatial orientation of the scannable region with respect to a reference thereby enabling determination of a spatial orientation of the label with respect to the reference. The label is applied onto the object and a change in the spatial orientation of the label indicates tampering of the label, thereby enabling verification of the object. Further, a method for detecting tampering of an object includes providing label on the object. The label has at least a portion which is scannable region with a plurality of patterns and is associated with an external reference point. Further, the method includes determining a first and a second spatial orientations of the label based on computation between the patterns and the reference point, and generating an alert on noticing a change between first and second spatial orientations.
Abstract:
A secure device can make contents of terminal application authentication information calculation a different complicated calculation process at each time while suppressing the processing load in the secure device and a card application code size to low values. When issuing of a terminal application (302) is requested from an application loader (301) to an application management unit (1011), an instruction content execution unit (1012) embeds authentication information used for calculation of an authentication key required for authentication with an application causing an information processing terminal (30) to perform a process, into the terminal application (302). A calculation complicating unit (1013) creates a calculation problem having a calculation result as an answer and embeds it as a part of the authentication information calculation into the terminal application (302). An authentication information calculation unit (1014) calculates authentication information with the calculation result to create an authentication key. An authentication processing unit (1032) performs authentication of the terminal application (302) by the authentication key. This does not complicate the calculation process while making the authentication information calculation of the terminal application (302) a different complicated calculation at each time.
Abstract:
A method is described for authenticating a portable object that includes a processor and a memory. The memory contains at least one code defining operations capable of being executed by the portable object, as well as a one-way function. The method comprises an authentication of the portable object which includes sending the portable object an order so that the latter executes a calculation of a result by applying to the one way function at least part of the code. This result enters into the implementation of a given operation, the operation being performed successfully only when the portable object is authentic.