Patent application number | Description | Published |
20100025476 | SECURITY LABEL LAMINATE AND METHOD OF LABELING - A labeling method for marking a product with invisible information. The label includes a removable laminate formed from a light transmissive layer, and a light transmissive adhesive that detachably affixes the label to a product. The label includes an invisible marker that contains information, detectable by light of selected wavelength. The amount of marker selected is sufficient to allow information in the marker to be detected only when the laminate is affixed over a surface with a selected optical background. The label laminate is removed from the surface of the product and affixed to a surface having the selected optical background and is exposed to light that renders the information in the marker detectable. The method allows covert information in the label laminate to be reliably detected and read with the use of minimal quantities of marker material. | 02-04-2010 |
20100155679 | SIZE DEPENDENT MARKER CODES - A security marker material comprising emissive particles and the emissive particles can be grouped into at least two groups with different size distributions and the size distributions satisfy the formula: | 06-24-2010 |
20120138857 | SIZE DEPENDENT MARKER CODES - A security marker material comprising emissive particles selected from at least two groups with different size distributions and the size distributions satisfy the formula: | 06-07-2012 |
20120167666 | ARTICLES WITH POROUS PARTICLES FOR SECURITY PURPOSES - An article comprises one or more porous particles. Each porous particle comprises a polymer that provides a continuous solid phase including an external particle surface, and first and second discrete pores that are isolated from each other and dispersed within the continuous solid phase. The porous particle further comprises a first marker material present in the first discrete pores, and a second marker material that is detectably different from the first marker material and is present within the second discrete pores. The marker materials can provide a means for identifying documents, clothing, or other articles as genuine, and providing a detectable security system. | 07-05-2012 |
20120274467 | DEACTIVATION OF A SECURITY FEATURE - A method to deactivate a security measure includes applying a first covert optically active security marker to a product or document; completing a transaction for the product or document; and applying a second optically active security marker to the product or document which indicates completion of the transaction. | 11-01-2012 |
20120274789 | SIGNAL IMAGE EXTRACTION - An apparatus for eliminating background noise from a security marker authenticating system including a first sensor for capturing an image of a background of the security marker; a light source for illuminating the security marker; the first sensor or a second sensor or both captures a plurality images of the optical response of the security marker; a computer which averages the plurality of optical response images; the computer smoothes the background image; and the computer subtracts the smoothed background image from the average of the plurality of optical response images. | 11-01-2012 |
20120274819 | SIGNAL IMAGE EXTRACTION - A method of eliminating background noise from a system for authenticating security markers includes capturing an image of a background of the security marker; illuminating the security marker; capturing a plurality of images of the optical response of the security marker; averaging the plurality of optical response images; smoothing the background image; and subtracting the smoothed background image from the average of the plurality of optical response images. | 11-01-2012 |
20120275639 | IMAGE ALGORITHMS TO REJECT UNDESIRED IMAGE FEATURES - A method for detecting authorized security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a two-dimensional array on a microprocessor; counting a number of pixels at or above a predetermined brightness level in the image data with the microprocessor to determine a first score; eroding the image data; counting the pixels which remain at or above the predetermined brightness level after erosion to determine a second score; calculating a ratio of the second score to the first score; and producing a first authentication signal if the ratio meets a first predetermined criteria. | 11-01-2012 |
20120275640 | METHOD OF AUTHENTICATING SECURITY MARKER - A method for authenticating security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a two-dimensional array on a microprocessor; counting a number of pixels at or above a predetermined brightness level in the image data with the microprocessor to determine a first score; establishing an area within the image; counting a number of pixels within the area to determine a second score; calculating a ratio of the second score to the first score; and if the ratio is above a predetermined threshold the security marker is authenticated. | 11-01-2012 |
20120313747 | METHOD FOR AUTHENTICATING SECURITY MARKERS - A method for authenticating security markers includes preparing a security marker with at least two or more optically active compounds; applying the security marker to an article to be authenticated; illuminating the security marker with radiation; detecting the optical response of the security marker; and wherein the two or more optically active compounds have a complementary response to different wavelengths of the illuminating radiation. | 12-13-2012 |
20120313748 | AUTHENTICATION OF A SECURITY MARKER - A method for authenticating security markers includes illuminating the security marker with a laser, detecting an optical response from the security marker, changing a temperature of the laser to vary the wavelength of radiation produced by the laser; detecting changes in the optical response from the security marker as the wavelength of the radiation changes, comparing the optical response profile from the security marker as it varies with changes in wavelength to a reference profile; and authenticating the security marker if the optical response profile matches the reference profile. | 12-13-2012 |
20120313749 | AUTHENTICATION OF A SECURITY MARKER - An apparatus for authenticating security markers includes a laser or LED for illuminating the security marker; a detector for detecting an optical response from the security marker; an element for changing a temperature of the laser or LED to vary the wavelength of radiation produced by the LED; a detector for detecting changes in the optical response from the security marker as the wavelength of the radiation changes; a microprocessor for comparing the optical response profile from the security marker as it varies with changes in wavelength to a reference profile; and authenticating the security marker if the optical response profile matches the reference profile. | 12-13-2012 |
20130087699 | METHOD FOR VIEWING INVISIBLE INDICIA - A method for detecting and viewing invisible indicia includes illuminating the invisible indicia with radiation of a first wavelength with an illumination source; detecting emitted light from the invisible indicia at a second wavelength with a sensor array; eliminating reflected radiation at the first wavelength; focusing an image of the invisible indicia on the sensor array; displaying the image of the invisible indicia; spacing the sensor array at a fixed distance from the invisible indicia with a spacer; and adjusting sensitivity of the sensor array. | 04-11-2013 |
20130088603 | COMPACT VIEWER FOR INVISIBLE INDICIA - An apparatus for detecting and viewing an invisible indicia includes an illumination source for illuminating the invisible indicia with radiation of a first wavelength; a sensor array for detecting emitted light from the invisible indicia at a second wavelength; a filter between the sensor and the invisible indicia for eliminating reflected radiation at the first wavelength; a lens for focusing an image of the invisible indicia on the sensor array; a video display for displaying the image of the invisible indicia; a spacer for spacing the sensor array at a fixed distance from the invisible indicia; and a gain control for adjusting sensitivity of the sensor array. | 04-11-2013 |
20140048723 | AUTHENTICATION WITH ACCESS CONTROL AND CALIBRATION - A method of enabling an authenticating device ( | 02-20-2014 |
20140151445 | SYSTEM FOR DETECTING REPRODUCTION OF BARCODES - A system for detecting reproduction of barcodes ( | 06-05-2014 |
20140151454 | DECODER FOR BARCODES WITH ANTI-COPY FEATURE - A method for detecting reproduction of barcodes ( | 06-05-2014 |
20140312116 | SYSTEM FOR DETECTING REORIGINATION OF BARCODES - A system for detecting reproduction of barcodes ( | 10-23-2014 |
20140312120 | METHOD FOR DETECTING REORGINATION OF BARCODES - A method for detecting reorigination of barcodes ( | 10-23-2014 |