GB - Google Patents
Howarth et al.(43) Pub. Date: Apr. 8, 2021GB
View PDF- Document ID
- 6336440408942457604
- Author
- GB S
External Links
Snippet
Appl. No.: 17/060,309 (22) Filed: Oct. 1, 2020 (30) Foreign Application Priority Data According to a first aspect of the invention, there is provided a method of deriving information from an optically readable security element, comprising: optically reading the optically …
- 230000005284 excitation 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11328193B2 (en) | Optically deriving information from a security element | |
EP3013595B1 (en) | Security coding system & marker, optoelectronic scanner and method of coding articles | |
TW201830292A (en) | Composite security tag | |
JP2008536242A (en) | Appraisal of product unit | |
EP2008221A1 (en) | Versatile authenticity investigation | |
US11093726B2 (en) | Optical reading of a security element | |
US20040162828A1 (en) | System and methods for monitoring items | |
US11562611B2 (en) | Deriving information from an optically readable security element | |
GB | Howarth et al.(43) Pub. Date: Apr. 8, 2021 | |
KR102011604B1 (en) | Method and Apparatus for Providing Authenticity Determination | |
JP6482556B2 (en) | Method and apparatus for verifying security elements of a security document | |
RU2733702C2 (en) | Method of authenticity control and protection against counterfeit and falsification | |
GB2340931A (en) | Object colour validation | |
RU2311677C2 (en) | Method for optical marking of products | |
GB2632137A (en) | A method of monitoring an optically readable security element | |
US11188807B2 (en) | Data processing apparatus | |
GB2626208A (en) | A method of authenticating an optically readable security element | |
US8937712B2 (en) | Authentication device with access control and calibration | |
GB2632251A (en) | A method of authenticating and preventing spoofing of an optically readable security element | |
EP3699856A1 (en) | Tagging of an object | |
GB2631451A (en) | Method of reading an optically readable security element | |
GB2631779A (en) | A method of reading an optically readable security element comprising a first area and a second area | |
WO2025003671A1 (en) | Method of reading an optically readable security element | |
GB2631453A (en) | Method of determining coupling of objects using an image capturing device | |
WO2019155206A1 (en) | Determining a unique identifier for an optically read security element |