Counterfeit prevention using miniature security marks
First Claim
Patent Images
1. A system that applies a security mark to a recipient, comprising:
- a data reception component that receives information from one or more sources;
a security mark generation component that generates at least one miniature security mark (MSM) configuration based at least in part upon the information from the data reception component; and
an application component that applies the at least one MSM configuration to one or more recipients.
5 Assignments
0 Petitions
Accused Products
Abstract
A system applies a security mark to a recipient. A data reception component receives information from one or more sources. A security mark generation component generates at least one miniature security mark (MSM) configuration based at least in part upon the information from the data reception component. An application component applies the at least one MSM configuration to one or more recipients.
17 Citations
20 Claims
-
1. A system that applies a security mark to a recipient, comprising:
-
a data reception component that receives information from one or more sources;
a security mark generation component that generates at least one miniature security mark (MSM) configuration based at least in part upon the information from the data reception component; and
an application component that applies the at least one MSM configuration to one or more recipients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system that interprets data extracted from a security mark, comprising:
-
a detection component that detects one or more security marks applied to at least one recipient, the security mark is a MSM configuration that includes at least one data mark and at least two anchor marks;
an extraction component that extracts information from the one or more MSM configurations detected by the detection component; and
an interpretation component that determines the meaning of the information extracted from the one or more MSM configurations by the extraction component. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method for interpreting information represented by a security mark, comprising:
-
generating a MSM security mark that includes at least one data mark and at least two anchor marks that are from about 1 micron to 100 microns in diameter, the at least one data mark is different from the at least two anchor marks;
applying the MSM security mark to at least one recipient;
analyzing the at least one recipient that contains the MSM security mark;
detecting the location of the MSM security mark applied to the at least one recipient;
extracting information from the detected MSM security mark; and
interpreting the information extracted from the MSM security mark.
-
Specification