Abstract:
A method and system for enabling handwritten note taking and retrieval, whereby a user is able to electronically capture, manage and search notes handwritten on paper by the user using one or more forms printed on paper and using a sensing device which senses coded data included in the printed forms.
Abstract:
The invention relates to a replaceable cartridge for supplying consumable material to an ink jet printer, the printer having: a printhead assembly; means to provide air to the printhead assembly; and, binding means adapted to bind printed pages into a bound document (618); wherein, the replaceable cartridge includes: an air filter unit, such that in use the air provided to the printhead assembly is filtered by the air filter unit; and a storage chamber for binding material suitable for use in the binding means.
Abstract:
There is described a new coding approach for printed document authentication, one objective of which is to increase the difficulty of copying. In addition, this new coding approach provides better performance compared to other 2D coding technologies under certain constraints. The new coding technique requires less print space in comparison to other coding techniques. This is achieved by optimising some of the features which are used in standard 2D-codes for stabilisation and which are necessary for e.g. mobile applications. Furthermore, the code can be decomposed in elementary units, or "byte-units" which can be widely spread over a text document. Such "byte-units" can in particular be used for integration in text symbols. If a document protected with such a coding is copied, at least some of these symbols will be extensively degraded by the copying process. Therefore, copy detection is intrinsically achieved thanks to the new coding technique.
Abstract:
Disclosed herein are devices that change their appearance and / or physical properties when under an external influence, and methods for their production and use. Such devices may be used as features of any type of items, documents, billboards, posters, display devices, advertisements and other items etc. and may be adapted to include decipherable content. Such devices also afford new techniques for a user to check quickly and easily whether the item is a legitimate or a counterfeit copy, either by hand- manipulation of the device, or with the assistance of an additional screening tool.
Abstract:
First and second patterns are formed on a substrate. A spatial offset between the patterns is determined, and stored for later use in authenticating the substrate. (One or both of the patterns may convey steganographic information. One pattern may be printed, while the other may be embossed.) A smartphone can sense these patterns, determine the spatial offset, and check whether the determined offset matches the earlier- stored offset, to judge whether the substrate is authentic. Another arrangement effects serialization of product packaging by use of paired patterns (at least one of which is typically a steganographic watermark pattern) applied in a manner causing a spatial offset between the patterns to progressively vary along a length of a printed web. Still other arrangements involve substrates conveying patterns that degrade over time, e.g., indicating freshness or pressurization condition. A great variety of other features and arrangements are also detailed.
Abstract:
Described is a characteristic verification system that includes security marks, devices, systems and methods that may be used to authenticate a material good and to provide strong brand protection. A device, such as a smartphone, that includes a software application, a camera and a light source, may be used to interrogate the security mark and connect to remote servers to authenticate the material good at varying levels of assurance. In addition to authenticating the good, the system may also authenticate the user and provide different information to different users and/or limit information that is provided unauthenticated users.
Abstract:
Die Erfindung betrifft einen Sensor zur Prüfung verschiedener Merkmale von Wertdokumenten, der einen Selbsttest zur Überprüfung seiner Funktionsfähigkeit durchführt. Bevor der Sensor seinen Selbsttest durchführt, wird mindestens eines der Merkmale ausgewählt, das durch den Sensor geprüft werden soll. Bei dem Selbsttest ist vorgesehen, dass der Sensor eine bei dem Selbsttest feststellte Funktionsstörung in Abhängigkeit des ausgewählten Merkmals unterschiedlich bewertet und unterschiedlich auf die festgestellte Funktionsstörung reagiert. Während bisher eine Funktionsstörung des Sensors stets zu einem Ausfall des Sensors führt, kann der Sensor gemäß der Erfindung, trotz einer festgestellten Funktionsstörungen, die Prüfung bestimmter Merkmale dennoch durchführen. Durch die unterschiedlichen Reaktionen des Sensors auf die festgestellte Funktionsstörung in Abhängigkeit des Merkmals wird erreicht, dass die Anzahl der Funktionsausfälle des Sensors reduziert wird.
Abstract:
The invention relates to security technologies, in particular, holographic protection systems and can be applied to the high level protection of products from counterfeits. The proposed polarization-holographic protection system includes polarization-holographic protective elements, in which a polarization code is recorded and a device for identification of this code. The recording of a code on the polarization-holographic protective element is done by a polarization-holographic method in the form of one concrete combination of polarization state of two recording beams that is preselected from a great number of combinations of polarization states. The reading laser beam (3), when incident on the polarization-holographic protective element (4), diffracts on it and the polarization state of the diffracted beams is the code for identification of the authenticity of the element. Authenticity of a protective element is carried out by means of a special identifying device comprising a polarization-holographic element (5).
Abstract:
Provided are photoluminescent markings that contain a photoluminescent layer and one or more functional overlayers wherein the photoluminescent marking has an emission signature that lies partly or fully in the infrared region of the electromagnetic spectrum. One functional overlayer conceals the photoluminescent layer and blends into the background or blends with marks that are normally present, without significantly reducing the luminescent intensity of the photoluminescent layer. Another functional overlayer provides photolytic stability to the underlying photoluminescent layer. The invention also includes functional overlayers that enhance the daytime observability of the infrared emissions. A further functional overlayer prevents the observability of a printed message with the naked eye. A combination of functional overlayers each providing a different function is also included. As well, the present invention includes a multifunctional overlayer. The present invention also relates to methods of creating and using the inventive photoluminescent markings as well as objects containing the inventive photoluminescent markings.
Abstract:
A system and method for encoding and authenticating documents and data storage discs uniquely is described which can provide a means to authenticate a document such as a passport or identification document or driving licence or contract or a music compact disc (CD) or data CD or DVD or holographic DVD or credit card. The documents each comprise an encoding formed from a unique number or pattern or datagram image, which is either printed so that it can be read directly by a viewing device, or the encoding is cut by laser to create a pattern or perforation matrix into the document thereby leaving the unique number or pattern or datagram as a matrix of small holes or perforations in the document through which light may pass. The authentication process thus involves viewing and decoding the encoding and generating a computed result using a stored decoding algorithm. Different levels of decoding may be linked to subscriber access privileges and these may be controlled by subscriber identity data and or a finger print capture and validation sensor.