Security marks simulating natural defects for embedding information in documents
First Claim
1. A system for generating a security mark comprising:
- a data reception component that receives information;
a security mark generation component in communication with the data reception component, the security mark generation component comprising a computing device with a processing component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising at least one simulation mark which resembles a natural defect, the at least one simulation mark being irregularly shaped, the irregular shape of the irregularly-shaped simulation mark being determined by the generation component according to predefined rules;
an orientation and a location of the simulation mark or a group of simulation marks being determined by the generation component according to predefined rules; and
an application component that applies one configuration of the at least one security mark configurations to a recipient, the applied security mark configuration obeying at least one rule whereby the security mark is distinguishable from the natural defect which it resembles, by a system for detection of security marks, with an acceptable level of confidence.
6 Assignments
0 Petitions
Accused Products
Abstract
A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication with the data reception component generates at least one security mark configuration based at least in part upon the received information. The at least one security mark configuration includes at least one simulation mark which resembles a natural feature. An application component applies one configuration of the at least one security mark configurations to a recipient. The applied security mark configuration obeys at least one rule whereby the security mark is distinguishable from the natural feature which it resembles by a system for detection of security marks.
21 Citations
24 Claims
-
1. A system for generating a security mark comprising:
-
a data reception component that receives information; a security mark generation component in communication with the data reception component, the security mark generation component comprising a computing device with a processing component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising at least one simulation mark which resembles a natural defect, the at least one simulation mark being irregularly shaped, the irregular shape of the irregularly-shaped simulation mark being determined by the generation component according to predefined rules; an orientation and a location of the simulation mark or a group of simulation marks being determined by the generation component according to predefined rules; and an application component that applies one configuration of the at least one security mark configurations to a recipient, the applied security mark configuration obeying at least one rule whereby the security mark is distinguishable from the natural defect which it resembles, by a system for detection of security marks, with an acceptable level of confidence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 21)
-
-
8. A system for generating a security mark comprising:
-
a data reception component that receives information; a security mark generation component in communication with the data reception component, the security mark generation component comprising a computing device with a processing component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising at least one simulation mark which resembles a natural defect; an orientation, a shape, and a location of the simulation mark or a group of simulation marks being determined by the generation component according to predefined rules; and an application component that applies one configuration of the at least one security mark configurations to a recipient, the applied security mark configuration obeying at least one rule whereby the security mark is distinguishable from the natural defect which it resembles, by a system for detection of security marks, with an acceptable level of confidence, the natural defect resembled by the security mark comprising at least one of a stain, a dust particle, an irregularly shaped ink spot, a printer defect, a fingerprint, and a paper fiber.
-
-
14. A method for applying a security mark to a recipient comprising:
-
with a security mark generation component comprising a computing device with a processing component, generating a plurality of security mark configurations representative of information to be applied to a recipient, each security mark configuration comprising at least one simulation mark, which configuration only resembles a natural defect but is not a natural defect, the at least one simulation mark being irregularly shaped, the irregular shape of the irregularly-shaped simulation mark being determined by the generation component according to predefined rules; and applying one configuration of the plurality of security mark configurations to a recipient by at least one of printing, engraving, embossing, discoloration and material removal of the recipient, the applied security mark configuration obeying at least one rule, whereby the security mark is distinguishable from the defect which it only resembles, by a system for detection of security marks, with an acceptable level of confidence. - View Dependent Claims (15, 16, 17, 18, 23, 24)
-
-
19. A recipient comprising an image and a machine readable security mark embedded therein by at least one of printing, engraving, embossing, discoloration and material removal of the recipient, the security mark comprising a group of simulation marks which resemble a natural defect, the group of simulation marks obeying at least one predefined rule specifying an orientation and a location of the group of simulation marks, whereby the security mark is distinguishable from the natural defect which it resembles, the group of simulation marks comprising a plurality of being irregularly shaped simulation marks generated utilizing one or more algorithms that determine the size, shape, color, orientation and location of the simulation marks, whereby the shape of the simulation marks is analyzable to extract information.
-
20. A system for generating a security mark comprising:
-
a data reception component that receives information; a security mark generation component in communication with the data reception component that generates at least one security mark configuration based at least in part upon the received information, the at least one security mark configuration comprising a collection of simulation marks, the simulation marks being irregularly shaped, wherein the irregular shape, an orientation, and a location of the simulation marks being according to predefined rules, the security mark configuration resembling a natural defect and which is indistinguishable therefrom to the unaided eye when applied to a recipient, the security mark configuration encoding the received information; and an application component that applies one configuration of the at least one security mark configurations to the recipient, the applied security mark configuration obeying at least one rule whereby the applied security mark is distinguishable, on the recipient, from the natural defect which it resembles, by a system for detection of security marks which determines the location of the simulation marks relative to each other, with an acceptable level of confidence. - View Dependent Claims (22)
-
Specification