摘要:
A computer is provided with software that looks for certain activities that may be illicit (e.g. processing of a graphic file corresponding to a banknote). If such an activity is detected, tracer data detailing the activity is generated and secretly stored. in the computer. If the computer is later searched or seized, the tracer data can be recovered and employed as evidence of the computer's use, e.g. in counterfeiting.
摘要:
A host device is disclosed. The host device includes a processor and a control mechanism. The processor operates to receive primary and associated data, decode and separate the associated data from the primary data, and cause the associated data to be rendered on a separate hand held device. The processor also operates the control mechanism to control a separate display apparatus to separately receive and render the primary data.
摘要:
An interactive video system is disclosed that processes a video data stream and an associated data stream corresponding to the video data stream. The interactive video system displays a video image defined by the video data stream on a display device and performs interactive command functions specified by the associated data stream. The interactive command functions include commands that specify placement of a video display window, commands that specify parameters of graphical objects that are associated with the video image and commands that specify pixel data or graphics description for the graphical object and commands for placement of selection windows and that specify interactive functions for the selection windows.
摘要:
A host device is disclosed. The host device includes a processor and a control mechanism. The processor operates to receive primary and associated data, decode and separate the associated data from the primary data, and cause the associated data to be rendered on a separate hand held device. The processor also operates the control mechanism to control a separate display apparatus to separately receive and render the primary data.
摘要:
The present invention relates generally to identification documents. In one implementation, a provided method includes: obtaining optical scan data associated with text characters provided on an identification document to obtain first data; using at least a portion of the first data to facilitate decryption of information—not the text characters—carried on or in the identification document. The information corresponds to the identification document or to an authorized bearer of the identification document. In another implementation, a method is providing including: obtaining optical scan data associated with an identification document to obtain first data; obtaining second data from the identification document, the second data comprising encrypted data; communicating the encrypted data and the first data to a remote device, the remote device decrypting the encrypted data with at least reference to the first data; and receiving decrypted data from the remote device. Other implementations and embodiments are provided as well.
摘要:
The present invention provides methods and systems for authenticating identification documents. We also teach an identification document including two or more digital watermarks. The watermarks correspond with each other or with indicia carried by the identification document. The correspondence can be verified to determine authenticity. We also provide digital watermark detection methods and systems to identify the different watermarks through embedded orientation components. We then focus watermark message-decoding efforts on areas identified as likely including watermark orientation components. In another implementation we provide a watermark detection trigger to identify so-called legacy documents. The trigger may indicate the presence or expected absence of a digital watermark. In other implementations we provide a versatile document authenticator to toggle between watermarking and non-watermarking authentication processes depending on a detection trigger. Other implementations are provided as well.
摘要:
Security documents which has multiple fields or areas each of which contains information that is perceptible in more than one way: One field can contain a visually perceptible image and a digital watermark that can be detected when the image is scanned and processed, and another field can contain watermark data which can be correlated to the output of a fingerprint reader or of apparatus which scans a user's iris. The watermarks in the different graphic elements of the document are correlated to each other and correlated to the visual material on the document. Thus, the document can not be forged by replacing one element (such as a picture) with a similar element from another document. An automatic validation system of the present invention reads multiple fields on the document, and it also automatically detects information about the user. The various information is correlated to validate the document.
摘要:
An interactive video system is disclosed that processes a video data stream and an associated data stream corresponding to the video data stream. The interactive video system displays a video image defined by the video data stream on a display device and performs interactive command functions specified by the associated data stream. The interactive command functions include commands that specify placement of a video display window, commands that specify parameters of graphical objects that are associated with the video image and commands that specify pixel data or graphics description for the graphical object and commands for placement of selection windows and that specify interactive functions for the selection windows.
摘要:
The present invention relates generally to validating and providing physical objects. In one implementation, a physical object includes a first digital watermark carried thereon. The first digital watermark includes a first plural-bit message representing at least a reduced-bit representation of a biometric corresponding to an authorized bearer of the physical object. The physical object further includes semantic information carried thereon. At least a portion of the semantic information corresponds to the authorized bearer of the physical object. In another implementation, an apparatus is provided to validate physical objects. In some cases the objects include identification documents.
摘要:
This disclosure details systems and methods for embedding and reading auxiliary code signals in documents, and for using the code signals to enable a variety of forensic tracking, monitoring and usage control functions.