Abstract:
Systems and methods for secured printing are provided. The method includes receiving a nominally print-ready document with the nominally print-ready document including one or more references to one or more security elements. The method also includes replacing the one or more references with one or more identifiers, to generate an intermediate document, and associating the one or more security elements with the one or more identifiers. The method further includes transmitting instructions to a printing device, with the instructions being configured to cause the printing device to associate the one or more identifiers with the one or more security elements. The operations further include transmitting the intermediate document to the printing device.
Abstract:
A method of defining a three-dimensional structure having multiple facets, such as a package, identifies an image that is to be printed on a first facet. It also identifies a second facet of the package that has a functional relationship with the first facet, determines whether the functional relationship is that of a crease, an edge, or another functional relationship, and automatically defines a bleed area by accessing a rule set and applying the rule set to the determined functional relationship. The bleed area includes an area in which the first image will be printed and that is outside of the location of the first facet.
Abstract:
A method and system of producing a three-dimensional object with an anti-counterfeiting measure uses a processor to access a data file including a plurality of parameters for producing a three-dimensional object, wherein the parameters comprise a plurality of structural parameters. The processor may also cause a three dimensional printing device to form the three dimensional object that exhibits the structural parameters by identifying a build material, identifying at least one anti-counterfeiting measure that when included in the 3D object will prevent creation of a digital model of the three-dimensional object by causing the 3D object to obstruct a possible 3D scanning method, and causing the three dimensional printing device to form the three-dimensional object with the anti-counterfeiting measure using the build material.
Abstract:
A method and system for embedding a database in a 3D object uses a 3D dimensional printing device and a computer-readable memory that stores a build sequence comprising instructions that, when executed by a processor, will cause the 3D printing device to form a three-dimensional object by depositing layers of build material and by including, in one or more of the layers, physical representations that represent a data set that includes a record of information for production of the 3D object.
Abstract:
A document generation system creates a secure document by: receiving document content to be printed onto a substrate; creating a stencil mask comprising an image of at least a portion of the document content; receiving an image of a watermark to be printed on the substrate; modifying the watermark to remove portions of the watermark that will correspond to locations of the stencil mask; causing a print device to print the document content on the substrate; and causing the print device to print the modified watermark through the stencil mask on the substrate.
Abstract:
A package design system creates one or more package design files by creating cut line instructions and fold line instructions. If the system determines that the package should be split across two or more substrates, it will select a fold line and convert the selected fold line to a seam. Conversion to a seam may occur by creating cut line instructions for the selected fold line, imparting a first set of functional elements on a first side of the seam, and imparting a second set of functional elements on a second side of the seam. The first set of functional elements and the second set of functional elements will form a functional connection when the three-dimensional structure is formed.
Abstract:
A document validation system receives a scan of a certified document. The system identifies a security template for the document, prompts a user to enter a validation document into the scanning device, receives the validation document, uses the security template identify the location of one or more security elements on the certified document, and analyzes the validation document to identify expected content that should appear on the certified document at the security element locations. The system determines whether the expected content matches actual content of the scan at the security element locations and generates a report of the result.
Abstract:
A printing system receives a graphic document having a security area. The graphic document identifies a secure color to print in the security area. The graphic document is converted for printing by a printing engine of the printing system. This converting substitutes a secure patterned color in place of the secure color. The specific printing engine prints the printing bitmap to output a printed version of the graphic document with the secure patterned color in the security area. The security area of the printed version of the graphic document has a color appearance, and the secure color does not identify the type of security feature within the secure patterned color.
Abstract:
A system generates a secure barcode by: identifying a primary pattern for a two-dimensional barcode to be printed on a substrate, wherein the primary pattern comprises of a set of dark cells and a set of light cells; identifying a two-dimensional micro-shape, wherein the micro-shape has a size that is no larger than a size of each cell of the two-dimensional barcode; generating a secondary pattern comprising a plurality of the micro-shapes; and superimposing the secondary pattern with the primary pattern for the two-dimensional barcode to yield a secure barcode. The resulting two-dimensional barcode includes a primary pattern comprising a set of dark cells and a set of light cells, where the sets represent encoded data, along with a secondary pattern of micro-shapes that are superimposed with the primary pattern.
Abstract:
A document validation system receives a scan image of a document to be certified, analyzes the scan image to identify one or more characteristics of the scan image, and uses the identified characteristics to identify a security template. In response to a validation request, the system uses the identified security template to create a validation document that includes descriptive material comprising the location of one or more security elements on the document to be certified.