摘要:
A system and method for authenticating an image of an object, include at least one identifier associated with the object, a receiver for interrogating the at least one identifier to produce identification information, a camera system for recording an image from the object including the at least one identifier, and a composite generator for encoding the identification information from the receiver along with the image acquired by the camera system, to produce composite data.
摘要:
A detachable keyboard for a telephone set is provided in the form of a keyboard card clipped to the headset, which is completely detached from the body when unclipped. Wireless communication between the handset body and keyboard is used when the card is unclipped, while contacts are activated in the clipped position so that the wireless handset then functions as in the case of a non detachable keyboard.
摘要:
A system and method for detecting parallel marketing of an item, include forming at least one of a coating and a code on the item, interrogating the at least one of the coating and said code, and determining from the interrogating whether the item has been transferred from an authorized merchant to an unauthorized merchant.
摘要:
A system and method for detecting parallel marketing of an item, include forming at least one of a coating and a code on the item, interrogating the at least one of the coating and said code, and determining from the interrogating whether the item has been transferred from an authorized merchant to an unauthorized merchant.
摘要:
A method and system for preventing counterfeiting of an item, include an interrogatable tag attached to the item. The item includes visible indicia for comparison with secret, non-duplicable information stored in the tag designating authenticity.
摘要:
A visible seal or label containing a serial number is placed in plain view on the product packaging. The visible label contains the serial number as well as a first public key encrypted version of the serial number. A second or hidden label inside of the package has thereon a second a second encrypted version of the serial number made using a second public key. The hidden label may be secured inside of the package out of sight or may be placed on the back of the visible label and therefore viewable through a transparent case when opened or visible when peeled off. The private keys are known only to the manufacturer. Using a corresponding public key provided by the manufacturer, the consumer, law enforcement agent, or customs inspector can verify that the encrypted version matches the serial number. An advantage to this method is that only the manufacturer can produce matching pairs. Moreover, using a point of sale machine equipped with the public key the sales clerk can authenticate the product in front of the consumer at point of purchase. Additionally, in the case of a CD or other digital medium, the hidden label may comprise a digital watermark of the encrypted serial number such that a consumer, law enforcement agency, or customs inspector can readily detect a counterfeit product.
摘要:
In order to verify the authenticity of manufactured goods, a smart tag is attached to the goods containing encrypted authentication information, such as a serial number, a description of the good's physical appearance or chemical decomposition, its color, or digital images of the good etc. The encryption procedure comprises public/private key encryption with zero-knowledge protocols. Zero knowledge protocols allow a smart tag to be authenticatable and yet be duplication resistant by allowing the verifying agent to convince him/herself that the smart tag is authentic without revealing its authentication information. The verification procedure can be done using a reader at a point of sale (POS) machine equipped with the appropriate public key and zero-knowledge protocols to decrypt the authentication information. A printed version of the serial number or other authentication information may be placed on the goods in human readable form to quickly verify the information electronically read from the smart tag. With the present invention, only the manufacturer can create such smart tags with the associated data thus making it virtually impossible to pass off a counterfeit good as authentic. In addition to authenticating counterfeit goods, the present invention can be used to detect authentic goods being sold in a parallel market.
摘要:
A method and apparatus for matching the print outputs of two printers having different characteristics. For the purpose of laser printing, or more generally for reproduction on any printing device with limited number of printing levels, a color or grayscale image has to be transformed into an array of printing decisions at each pixel of the output image. Sometimes this array is the only available representation of the original image. One may desire to print this array on a printer with different characteristics from the printer for which the array was originally prepared. The method and apparatus solve this problem by generating a printing decision matrix which takes into account the differences between the two printers.
摘要:
A printing method and apparatus takes into account the errors in the amount of black due to dot shape and size at the pixel where these errors occur, propagates corrections of these errors in order to preserve the logics of error diffusion, and permits a trade-off between completeness of the correction and computational time. The method and apparatus corrects for the actual shape of the printer dots in most error diffusion methods usable in digital halftoning.
摘要:
A watermarking scheme is provided that allows the watermarked image to be authenticated by an authentication agent without revealing the human-readable content of the image. There is disclosed an approach that combines privacy control with watermarking and authentication mechanisms. The watermark can be made to be imperceptible to humans. Public key cryptography allows the authentication agent to authenticate without being able to watermark an image. Watermark information may also be encoded in a vector graphics image that includes at least one stroke defined by coordinate values of an ordered sequence of points. This may be obtained by providing watermark information as a bit sequence, identifying one or more redundant properties of the image, modifying the redundant properties based upon the bit sequence to generate a representation of the image and storing the representation of the image for subsequent use.