Counterfeit prevention using miniature security marks
First Claim
Patent Images
1. A system that applies a security mark to a recipient, comprising:
- a data reception component that receives information from one or more sources;
a memory component which stores at least one of;
an algorithm, a formula, a method, a look up table, a database, and a process that is at least one of;
stored, viewed, edited, organized, and retrieved for use in generating a particular security mark configuration;
a security mark generation component that generates at least one security mark configuration comprising;
at least two anchor marks which provide reference points that allow detection and extraction of the security mark configuration regardless of the size, shift and/or rotation of the security mark configuration;
wherein at least one of the anchor marks includes a shape which is non-rectangular; and
at least one data mark which is different from the anchor marks in at least one of;
size, shape, and color; and
an application component that applies the at least one security mark configuration to one or more recipients,wherein the security mark configuration includes;
at least three data marks located within a proximity of the at least two anchor marks that is representative of the information received by the data reception component and placed in any location relative to each other.
5 Assignments
0 Petitions
Accused Products
Abstract
A system applies a security mark to a recipient. A data reception component receives information from one or more sources. A security mark generation component generates at least one miniature security mark (MSM) configuration based at least in part upon the information from the data reception component. An application component applies the at least one MSM configuration to one or more recipients.
4 Citations
11 Claims
-
1. A system that applies a security mark to a recipient, comprising:
-
a data reception component that receives information from one or more sources; a memory component which stores at least one of; an algorithm, a formula, a method, a look up table, a database, and a process that is at least one of; stored, viewed, edited, organized, and retrieved for use in generating a particular security mark configuration; a security mark generation component that generates at least one security mark configuration comprising; at least two anchor marks which provide reference points that allow detection and extraction of the security mark configuration regardless of the size, shift and/or rotation of the security mark configuration; wherein at least one of the anchor marks includes a shape which is non-rectangular; and at least one data mark which is different from the anchor marks in at least one of;
size, shape, and color; andan application component that applies the at least one security mark configuration to one or more recipients, wherein the security mark configuration includes; at least three data marks located within a proximity of the at least two anchor marks that is representative of the information received by the data reception component and placed in any location relative to each other. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for applying a security mark to a recipient, said method comprising:
-
receiving information from at least one source into a data reception component; employing said information to develop at least one security mark generation algorithm using machine learning by an artificial intelligence component, wherein said machine learning is achieved by employing at least one training set of data having examples of at least one of desired and undesired results for at least one of data format and processing techniques that can be utilized to train the system; generating at least one security mark configuration using said at least one security mark generation algorithm from said artificial intelligence component, wherein said at least one mark is based at least in part upon the association between the information received from the data component and the information received from the memory component, the security mark configuration includes; at least two anchor marks which provide reference points that allow detection and extraction of the security mark configuration regardless of the size, shift and/or rotation of the security mark configuration; wherein at least one anchor mark includes a shape which is non-rectangular; and at least three data marks located within a proximity of the at least two anchor marks that is representative of the information received by the data reception component and placed in any location relative to each other; and applying the at least one security mark configuration to one or more recipients. - View Dependent Claims (10)
-
-
11. A system that applies a security mark to a recipient, comprising:
-
a data reception component that receives information from one or more sources; a memory component, separate from said data reception component that stores at least one of an algorithm, a formula, a method, a look up table, a database, and a process that is at least one of stored, viewed, edited, organized, and retrieved for use in generating a particular security mark configuration; an artificial intelligence component that determines an appropriate security mark generation algorithm for generating a particular security mark configuration, said at least one security mark generation algorithm determined by machine learning, wherein said machine learning is achieved by employing at least one training set of data having examples of at least one of desired and undesired results for at least one of data format and processing techniques that can be utilized to train the system; a security mark generation component that generates at least one security mark configuration that includes; at least three data marks; and
at least two anchor marks which provide reference points that allow detection and extraction of the security mark configuration regardless of the size, shift and/or rotation of the security mark configuration, wherein said security mark is based upon the association between the information from the data reception component and the information received from the artificial intelligence component;wherein at least one of the anchor marks includes a shape which is non-rectangular; wherein the at least three data marks are located within a proximity of the at least two anchor marks that is representative of the information received by the data reception component and are placed in any location relative to each other; and an application component that applies the at least one security mark configuration to one or more recipients.
-
Specification