摘要:
A variable data addition method and system are disclosed herein. The method includes generating an original image, and defining at least one sub-section of the original image to transform individually. A reversible transformation is applied to the defined at least one sub-section, thereby altering the original image to form an altered image that is non-readable until an inverse of the reversible transformation is applied to the altered image.
摘要:
An easily producible security feature according to the invention contains at least one luminescence device on and/or in a product carrier. Additionally, the security feature contains, in and/or on the product carrier, at least one absorptive spectral filter for luminescence radiation exiting from the at least one luminescence device, such that a color impression results both under illumination with visible radiation and under luminescence illumination conditions.
摘要:
In one implantation, a processor: (1) receives an image of a candidate mark from an image acquisition device, (2) uses the image to measure one or more characteristics at a plurality of locations on the candidate mark, resulting in a first set of metrics, (3) removes, from the first set of metrics, a metric having a dominant amplitude, resulting in a trimmed first set of metrics, (4) retrieves, from a computer-readable memory, a second set of metrics that represents one or more characteristics measured at a plurality of locations on an original mark, (5) removes, from the second set of metrics, a metric corresponding to the metric removed from the first set of metrics, resulting in a trimmed second set of metrics, (6) compares the trimmed first set of metrics with the trimmed second set of metrics, and (7) determines whether the candidate mark is genuine based on the comparison.
摘要:
An easily producible security feature according to the invention contains at least one luminescence device on and/or in a product carrier. Additionally, the security feature contains, in and/or on the product carrier, at least one absorptive spectral filter for luminescence radiation exiting from the at least one luminescence device, such that a color impression results both under illumination with visible radiation and under luminescence illumination conditions.
摘要:
The present invention provides methods, reagents, and apparatus for authenticating and identifying products. Methods of the invention are easy to implement but difficult to replicate, simulate, alter, transpose, or tamper with. In some embodiments, the present invention relates to a product authentication code defined by a frequency array of a population of entities, and an item identifier defined by the specific manifestation of the product authentication code.
摘要:
A variable data addition method and system are disclosed herein. The method includes generating an original image, and defining at least one sub-section of the original image to transform individually. A reversible transformation is applied to the defined at least one sub-section, thereby altering the original image to form an altered image that is non-readable until an inverse of the reversible transformation is applied to the altered image.
摘要:
The present invention provides methods, reagents, and apparatus for authenticating and identifying products. Methods of the invention are easy to implement but difficult to replicate, simulate, alter, transpose, or tamper with. In some embodiments, the present invention relates to a product authentication code defined by a frequency array of a population of entities, and an item identifier defined by the specific manifestation of the product authentication code.
摘要:
At least two luminescent materials are intermingled within a security feature. The materials are selected from among a larger set of luminescent materials each having a different individual exponential decay characteristic (decay constant and initial amplitude response to the degree of excitation) for photo-luminescent emission from the respective material following excitation. The ratio of the decay constants for any two materials is greater than or equal to about 1.5. The selected materials are mixed in one of a plurality of predetermined ratios. The combined emissions from the intermingled materials appear, to an unsophisticated measuring device, to have a single exponential decay constant. Based on measurements for the decay of the combined emissions following excitation, estimates of the individual decay constants and associated initial emission amplitudes allow decoding of the particular combination of materials and/or their ratios to validate the security feature, authenticating the article.
摘要:
A system for authenticating products and/or packages, comprising a unit for acquiring primary configurations which represent meaningful images and for generating secondary configurations for the authentication marking of products and/or packages; a unit for applying the generated secondary configurations to a product and/or package; and a unit for recognizing the secondary configurations applied to the product and/or package. All the units are provided with means for mutual connection in an active configuration for transmitting digital data. A method for authenticating products and/or packages comprises the acquisition of primary configurations which represent meaningful images; the generation of secondary configurations for marking; the application of the generated secondary configurations to a product and/or package; and the recognition of the authenticity of the product and/or package.
摘要:
In one implementation, a processor: (1) receives an image of a candidate mark from an image acquisition device, (2) uses the image to measure one or more characteristics at a plurality of locations on the candidate mark, resulting in a first set of metrics, (3) removes, from the first set of metrics, a metric having a dominant amplitude, resulting in a trimmed first set of metrics, (4) retrieves, from a computer-readable memory, a second set of metrics that represents one or more characteristics measured at a plurality of locations on an original mark, (5) removes, from the second set of metrics, a metric corresponding to the metric removed from the first set of metrics, resulting in a trimmed second set of metrics, (6) compares the trimmed first set of metrics with the trimmed second set of metrics, and (7) determines whether the candidate mark is genuine based on the comparison.