摘要:
We provide techniques for uniquely linking security elements in identification documents. In one implementation we provide a digital watermark embedded embedded on, and a smartcard chip embedded in, an identification document. The smart card chip includes a hash or a reduced-bit representation of the digital watermark, while the digital watermark includes a hash of information stored on the smartcard chip. In another implementation we cross-correlate encryption keys carried by various machine-readable features on an identification document. In still another implementation, we embed biometric information, which is stored in smartcard electronic circuitry, with a digital watermark. In one case the watermark is reversible, so that it can be removed to yield unmarked biometric information. In another case the watermark is fragile, to reveal whether the biometric information has been subjected to a transformation. In yet another implementation, we provide a jurisdictional indicator on an identification document. The jurisdictional indicator helps in decoding a digital watermark on the identification document.
摘要:
Systems and methods are disclosed for providing security to an identification document having at least one storage element capable of storing information. An encryption key is provided, the encryption key comprising a public key and a private key. An optically variable device (OVD) in a machine readable format is created, the OVD associated with the public key. A payload of data is generated for storage in the storage element. At least a portion of the payload of data is encrypted with the private key, and the encrypted payload of data is transmitted to at least one location on the identification document. At least a portion of the data payload can be based on data that is randomly selected from data stored in the storage element or that is encrypted from data that is stored in the storage element. The storage element can comprise an optically variable device (OVD), optical storage media, hologram, KINEGRAM, Exelgram, Pixelgram, three dimensional bar code, a two dimensional bar code, a magnetic stripe, and a chip. Transmitting the encrypted payload can comprise at least one of embedding, digitally watermarking, printing, and encoding encrypted data in at least one location on the identification document.
摘要:
A method of and system for scanning a bar code associated with a product with a mobile device to obtain (i) a list of online auctions for the product or a similar product; (ii) a list of commercial web sites in which the product or a similar product is being offered for sale; and/or (iii) a list of resellers of the product or a similar product where the product or similar product is located in a geographic region in predetermined proximity to the location. In addition, a seller may scan a bar code associated with a product that the seller would like to sell via an online auction service in order to obtain a predetermined product listing that the seller may modify prior to listing on the online auction service.
摘要:
A system for reading indicia such as bar code symbols having a scanner for generating a scanning light beam directed toward a symbol to be read; a first actuator manually displaceable from a first position to a second position for producing a first light beam for aiming or positioning the reader, and a second actuator manually displaceable from a first position to a second position for initiating a scanning beam pattern for reading the symbol. The actuators are independently operative of each other. A detector receives the reflected light from the symbol and produces electrical signals corresponding to data represented by the symbol. A graphical user interface with icons simplifies system control functions.
摘要:
The present invention provides methods and systems for authenticating identification documents. We also teach an identification document including two or more digital watermarks. The watermarks correspond with each other or with indicia carried by the identification document. The correspondence can be verified to determine authenticity. We also provide digital watermark detection methods and systems to identify the different watermarks through embedded orientation components. We then focus watermark message-decoding efforts on areas identified as likely including watermark orientation components. In another implementation we provide a watermark detection trigger to identify so-called legacy documents. The trigger may indicate the presence or expected absence of a digital watermark. In other implementations we provide a versatile document authenticator to toggle between watermarking and non-watermarking authentication processes depending on a detection trigger. Other implementations are provided as well.
摘要:
A system and method for capturing hand-marked cells from a lottery selection slip. The lottery slip includes a conventional play region of cells (labelled sequentially from 1 to 49, for example) for receiving indicia to be captured, after receiving indicia said play region of cells includes a plurality of occupied cells defined by marked cells and a plurality of non-occupied cells defined by unmarked cells. The lottery slip also includes row-identifier bar codes located at opposite boundaries of the play region. The bar codes are electro-optically scannable and readable and are arranged in a plurality of ordered rows tiered along the transverse direction over the transverse distance of the play region. A scanner is used to generate scan lines that extend over the play region of cells occupied by the indicia and over each bar code and for decoding the row identifer data for each scan line as each line transverses the boundaries of the play region of cells, the occupied cells having different light reflectivity than the non-occupied cells. A decoder captures the identity and the location of the occupied cells and the non-occupied cells and stores the digitized signal. A ticket receipt is then issued representative of the numbers selected by the player. By using a bar code scanner to read both the row identifier codes and the actual hand-marked play region the need for precise positioning within traditional terminals is obviated.
摘要:
A mechanism to allow hosts on the plaintext side of IP-layer encryptors to utilize Performance Enhancing Proxies (PEPs) on the ciphertext side of IP-layer encryptors is provided. Two processes are utilized for each IP-layer encryptor to extend a higher-level protocol (as represented, for example, by OSI layers 4-7) from the plaintext or red-side of the IP-layer encryptor to the ciphertext or black-side of the IP-layer encryptor. These two processes are known as the red-side Performance Enhancing Proxy Enabler (PEPE) and the black-side PEPE. The red-side and black-side PEPEs of a local IP-layer encryptor work together with red-side and black-side PEPEs of a remote IP-layer encryptor to transmit packets between the IP-layer encryptors using a higher-level protocol. Hence, PEPEs allow packets exchanged by red-side hosts separated by IP-layer encryptors to be transmitted on the black-side using a higher-level protocol. Therefore, PEPEs allow hosts on the red-side to take advantage of PEPs on the black-side.
摘要:
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. Biometric information may also be embedded in a machine readable code in the object or indexed via the machine readable code. This biometric information is used to generate biometric templates, and facilitate or enhance biometric comparison for one to one or one to many verification.
摘要:
The present invention provides methods and systems for authenticating identification documents. We also teach an identification document including two or more digital watermarks. The watermarks correspond with each other or with indicia carried by the identification document. The correspondence can be verified to determine authenticity. We also provide digital watermark detection methods and systems to identify the different watermarks through embedded orientation components. We then focus watermark message-decoding efforts on areas identified as likely including watermark orientation components. In one implementation we provide a watermark detection trigger to identify so-called legacy documents. The trigger may indicate the presence or expected absence of a digital watermark. In other implementations we provide a versatile document authenticator to toggle between watermarking and non-watermarking authentication processes depending on a detection trigger.
摘要:
A system for reading indicia such as bar code symbols having a scanner for generating a scanning light beam directed toward a symbol to be read; a first actuator manually displaceable from a first position to a second position for producing a first light beam for aiming or positioning the reader, and a second actuator manually displaceable from a first position to a second position for initiating a scanning beam pattern for reading the symbol. The actuators are independently operative of each other. A detector receives the reflected light from the symbol and produces electrical signals corresponding to data represented by the symbol. A graphical user interface simplifies system control functions.