Security marks simulating natural defects for embedding information in documents
First Claim
1. A system for generating a security mark comprising:
- a data reception component that receives information;
a security mark generation component in communication with the data reception component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising at least one simulation mark which resembles a natural defect; and
an application component that applies one configuration of the at least one security mark configurations to a recipient, the applied security mark configuration obeying at least one rule whereby the security mark is distinguishable from the natural defect which it resembles, by a system for detection of security marks, with an acceptable level of confidence.
6 Assignments
0 Petitions
Accused Products
Abstract
A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication with the data reception component generates at least one security mark configuration based at least in part upon the received information. The at least one security mark configuration includes at least one simulation mark which resembles a natural feature. An application component applies one configuration of the at least one security mark configurations to a recipient. The applied security mark configuration obeys at least one rule whereby the security mark is distinguishable from the natural feature which it resembles by a system for detection of security marks.
39 Citations
23 Claims
-
1. A system for generating a security mark comprising:
-
a data reception component that receives information; a security mark generation component in communication with the data reception component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising at least one simulation mark which resembles a natural defect; and an application component that applies one configuration of the at least one security mark configurations to a recipient, the applied security mark configuration obeying at least one rule whereby the security mark is distinguishable from the natural defect which it resembles, by a system for detection of security marks, with an acceptable level of confidence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for applying a security mark to a recipient comprising:
-
generating at least one security mark configuration representative of information to be applied to a recipient, the at least one security mark configuration comprising at least one simulation mark, which configuration only resembles a natural defect but is not a natural defect; and applying one configuration of the at least one security mark configurations to a recipient, the applied security mark configuration obeying at least one rule, whereby the security mark is distinguishable from the defect which it only resembles, by a system for detection of security marks, with an acceptable level of confidence. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A recipient comprising an image and a machine readable security mark embedded therein, the security mark comprising at least one simulation mark which resembles a natural defect, the at least one simulation mark obeying at least one predefined rule whereby the security mark is distinguishable from the natural defect which it resembles.
-
20. (canceled)
-
21. (canceled)
-
22. (canceled)
-
23. A system for generating a security mark comprising:
-
a data reception component that receives information; a security mark generation component in communication with the data reception component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising a collection of simulation marks, the security mark configuration resembling a natural defect and which is indistinguishable therefrom to the unaided eye when applied to a recipient, the security mark configuration encoding the received information; and an application component that applies one configuration of the at least one security mark configurations to the recipient, the applied security mark configuration obeying at least one rule whereby the applied security mark is distinguishable, on the recipient, from the natural defect which it resembles, by a system for detection of security marks, with an acceptable level of confidence.
-
Specification