Abstract:
Various multi-modal security deterrents (10) and methods of generating the same are disclosed herein. One embodiment of the deterrent (10) includes first and second sets (12, 16) of 180° phase-insensitive glyphs (14). One or more of the glyphs (14, Gi8o) in the second set (16) are rotated 180° from corresponding glyphs (14, G0) in the first set (12) such that the sets (12, 16) of glyphs (14) have an identical signature pollable by a suitable transmitter/receiver operating in the GHz-THz range and such that the sets (12, 16) of glyphs (14) have a different visual appearance. Data is encoded in one or more of the glyphs (140 of the first set (12) and one or more of the glyphs (14) of the second set (16) such that each set encodes a different message.
Abstract:
Matching of an input document to documents in a document collection is described herein. In an example, a similarity correspondence between an input document and one or more documents in a base document collection is established. A set of base document segments and a set of message types associated to document segments in the set of base document segments is provided. The set of base document segments is derived from documents in the base document collection. The input document is segmented into input document segments corresponding to message types. Segment similarity between input document segments and base document segments corresponding to the same message types is computed. The similarity correspondence between the input document and at least one document in the base document collection is based on the computed segment similarity.
Abstract:
An electronic shutter is positioned over an image. The electronic shutter has an opaque state in which the electronic shutter is opaque to render the image optically unreadable by a machine, and a transparent state in which the electronic shutter is transparent to render the image optically readable by the machine. Electrodes are coupled to the electronic shutter. A change in an electrical characteristic between the electrodes causes the electronic shutter to transition from the opaque state to the transparent state or from the transparent state to the opaque state.
Abstract:
A printed information device (10) includes a region of interest (14) in an image, and at least two channels assigned to the region of interest (14) by different means of logical partitioning. The region of interest (14) represents a physical area of the image. Each of the channels has a different error tolerance. Continuous and/or cyclic information is independently encoded in each of the at least two channels. The deterrent (10) is configured to be read substantially simultaneously by at least two distinct reading strategies.
Abstract:
A counterfeit detection system is disclosed herein. The system includes an image reduction system for minimizing size of at least one original image using a plurality of different reduction strategies to generate a plurality of minimized images. The system further includes a classification system which includes a first sub-system for generating at least one accuracy comparative assessment metric for each of the plurality of minimized images, a second sub-system for comparing the at least one accuracy comparative assessment metric for each of the plurality of minimized images with an accuracy assessment metric for the at least one original image, and a third sub-system for determining if at least one of the plurality of minimized images can be transmitted with improved or equivalent classification accuracy at a reduced bandwidth when compared to the original image are also part of the system.
Abstract:
A method for decoding information from a physical image having a plurality of payload patches includes generating a digital representation of the physical image. A plurality of regions are mapped to the plurality of payload patches in the digital representation. A scramble pattern is identified and the plurality of mapped regions of the digital representation are reordered according to the identified scramble pattern. Information is decoded from the payload patches of the reordered plurality of mapped regions.
Abstract:
A method and system for providing recording device privileges through biometric assessment are disclosed herein. An embodiment of the method includes monitoring information associated with a recording device. The information includes a recording device location, dynamic biometric data, knowledge data, and recording device identification data. From the monitored information, an identity of a then-current user of the recording device is determined. An authorization level for the then-current user is determined, and recording device access privileges are dynamically adjusted based on the determined authorization level.
Abstract:
A method of determining whether a mass serialization engine is cryptographically secure is provided herein. The method includes performing (202) a specified number of mass serializations to generate a corresponding number of mass serialization sets. A size of the mass serialization sets is increased from a first portion size to a second portion size by the mass serialized engine. The method further includes determining (204) a corresponding number of collisions for each of the specified number of mass serializations. Additionally, the method includes comparing (206) the number of collisions to an expected number of collisions. Further, the method includes determining (208) whether the mass serialization engine is cryptographically secure based on the comparison.
Abstract:
A method and system for generating a document having a void pantograph highlight pattern is presented. The method includes computing a score for a void pantograph highlight pattern layer in relation to a document formatted content layer, incrementing a relative position of the void pantograph highlight pattern layer and the document formatted content layer, repeating the computing and the incrementing steps to obtain a plurality of scores at a plurality of relative positions, evaluating the plurality of scores to determine an optimal alignment, and printing the document using variable-data printing techniques, wherein the printed document has a multi-layer architecture including the document formatted content layer and the void pantograph highlight pattern layer. The system includes a control processor, a score computation unit and an evaluation unit. The control processor provides a printer with data containing a multi-layer architecture document having a document formatted content and a void pantograph highlight pattern.
Abstract:
A system (10) for generating an incrementally completed security mark (20''') includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20', 20'', 20'''); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20', 20'', 20''') and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.