SYSTEMS, METHODS, AND COMPUTER PROGRAMS FOR IMAGING AN OBJECT AND GENERATING A MEASURE OF AUTHENTICITY OF THE OBJECT

    公开(公告)号:US20190236886A1

    公开(公告)日:2019-08-01

    申请号:US16311607

    申请日:2017-06-26

    申请人: SICPA HOLDING SA

    摘要: An imaging system (200) for imaging and generating a measure of authenticity of an object (10) comprises a dispersive imaging arrangement (30) and an image sensor arrangement (60). They are positioned so that, when electromagnetic radiation (20) from the object (10) illuminates the dispersive imaging arrangement (30), the radiation splits out in different directions into at least a non-dispersed part (40) and a dispersed part (50), and those are imaged by the image sensor arrangement (60). The imaging system (200) is configured to then generate a measure of authenticity of the object (10) depending at least on a relation between the imaged dispersed part, the imaged non-dispersed part, and reference spectral information. The invention also relates to imaging methods, computer programs, computer program products, and storage mediums.

    Authenticating Printed Paper Documents and Websites Against a Blockchain Record

    公开(公告)号:US20170329996A1

    公开(公告)日:2017-11-16

    申请号:US15665016

    申请日:2017-07-31

    申请人: Kelce S. Wilson

    发明人: Kelce S. Wilson

    IPC分类号: G06F21/64 H04N1/32 G07D7/202

    摘要: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can use a document's prior registration date in a blockchain to establish a no-later-than date-of-existence for that document. Embodiments can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.

    Page substitution verification preparation

    公开(公告)号:US09754131B2

    公开(公告)日:2017-09-05

    申请号:US15243657

    申请日:2016-08-22

    申请人: Kelce S Wilson

    发明人: Kelce S Wilson

    IPC分类号: G06F21/64 H04N1/32 G07D7/202

    摘要: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.

    COMPUTER-IMPLEMENTED METHOD FOR COPY PROTECTION, DATA PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT

    公开(公告)号:US20220415111A1

    公开(公告)日:2022-12-29

    申请号:US17779107

    申请日:2020-11-24

    摘要: A computer-implemented method for preventing unauthorized processing of a digital representation of at least a portion of a document, a device for data processing, and a computer program product are provided, wherein in particular the document is a banknote. The method comprises providing data, wherein the data is based on the digital representation of at least a portion of a test element. The digital representation may be an image file corresponding to the at least one portion of the test element. The method also involves analyzing the data with regard to data representing at least one characterizing feature of the at least one portion of the document. The method further comprises activating prohibiting means if the data being based on the digital representation of the at least one portion of the test element is similar to the data representing the at least one characterizing feature. The prohibiting means prohibit the data being based on the digital representation of the at least one portion of the test element to be further processed, in particular comprising copying and/or transmitting and/or printing and/or reproducing the data. Alternatively, the prohibiting means amend the data such that the data is prevented from being transmitted and/or printed and/or reproduced and/or further amended by data processing devices.

    Method of enrolling data to control an identity, and identity-control method

    公开(公告)号:US11507690B2

    公开(公告)日:2022-11-22

    申请号:US16360820

    申请日:2019-03-21

    摘要: The present invention comprises an enrolment method comprising steps of: acquisition (100) of an image showing a photograph itself showing an individual, extraction (102), from the image of a characteristic of the image other than a biometric model, obtaining (104) personal data of the individual other than by the image-processing algorithm, generation (106) of a reference datum (W) from the characteristic of the image and the obtained personal data, calculation (108) of an encoded datum (s) by application of an encoding procedure to the reference datum (W) and to a random datum (c), calculation (110) of a hash (h(c) of the random datum, storage (112) in a database of the datum encoded (s) in association with the hash. The invention also comprises an identity-control method using such stored data.