DOCUMENT SECURITY SYSTEMS, INC.
|DOCUMENT SECURITY SYSTEMS, INC. Patent applications|
|Patent application number||Title||Published|
|20140355069||System and Method for Dynamic Generation of Embedded Security Features in a Document - A system for dynamically generating a digital image comprising a security feature for a document. The system includes a processor||12-04-2014|
|20140105449||System and Method for Analysis and Authentication of Covert Security Information Using a Smart Device - A system and method for hidden security feature detection, analysis and authentication using a smart device is disclosed. The smart device can detect and analyze hidden security features using the camera capability of the smart device to capture a digital image, and then analyze and authenticate that image using a security service including a database of security feature data, processing rules, and other information. The security service can support a variety of smart devices and security features. The smart device includes a security-specific autofocus function that allows the smart device to be positioned within a range of distances and angles from a target document that includes hidden/covert security feature(s). The smart device can display an enhanced image showing the hidden security feature(s) and/or report if the security feature is valid or invalid, along with related information, via beeps, vibration, display, text messaging, or other reporting capabilities.||04-17-2014|
|20130320099||Barcode Copy Protection System - A copy protection system for barcode includes a barcode pattern that is printed together with a security pattern that includes a line screen that intersects elements of the barcode pattern. A difference in print density between the barcode elements and the security pattern is sufficient to allow the barcode pattern to be read by a barcode scanner. However, upon reproduction of the printed barcode pattern and security pattern by a copier, the barcode pattern is not similarly readable on the resulting reproduction.||12-05-2013|
|20130262333||Systems and Methods for Identity Authentication Via Secured Chain of Custody of Verified Identity - A method for authenticating an identity of a test taker is provided. An online registration portal allows test takers to enter registration information including an uploaded picture. The registration information is sent to a trusted verifier, such as a school administrator or teacher, who verifies the picture matches the registration information. A secured registration ticket is then generated that includes the picture and one or more embedded security features. The registration ticket is mailed to the student in a tamper-evident enclosure with instructions to present the sealed mailer at the testing site for admission. The test proctors then unseal the registration document and confirm the authenticity of the registration ticket and that the person seeking entry matches the verified photo on the ticket before allowing entry.||10-03-2013|
|20130215474||System and Method for Printing Documents Containing Dynamically Generated Security Features - Systems and methods are provided for printing secure documents incorporating hidden security features. In one system, a printer firmware module embeds a security feature in printer instructions to print a secure document. In another system, a software module on a computing device embeds a security feature in printer instructions to print a secure document. In another system, a software module on a computing device provides data to a printer firmware module to embed a security feature in printer instructions to print a secure document. In another system, a print server pre-processor module embeds a security feature in printer instructions to print a secure document. In another system, a security appliance security module generates security features in the form of security instructions that are embedded into a secure document to be printed.||08-22-2013|
|20130155352||POLARIZATION DECODER - At least a portion of a polarizing layer in the display screen is omitted or removed to temporarily disable image generation but an equivalent polarizing layer is used as a replacement or as a substitute for enabling the display of images on the screen. For instance, the omitted or removed polarizing layer can be replaced in situ or a remote polarizing layer can be substituted through which the images on the display can be seen. The selective reassembly of the display can be used for purposes of security or promotion.||06-20-2013|
|20090001710||DOCUMENT CONTAINING SECURITY IMAGES - A document containing security images which enable original documents to be distinguished from copies of the originals. The document may include a background of a first color and an image formed of a second and third color which appear to be the first color when viewed together, providing a hidden image which does not appear in reproductions of the document. The document may contain a background of a first color printed with lines at a first angle, and an image of the first color but having lines printed at a different angle, providing a hidden image which does not appear in reproductions of the document. The document may contain a background of printed with lines at a first angle and a predetermined line frequency, and an image printed with lines at a second angle and at a line frequency less the one half of the line frequency of the background, providing a substantially hidden image which appears in a reproduction of the document. A document may be authenticated as an original document by detecting the presence of a predetermined hidden security image and/or by determining the layout of the document to be the same as the expected layout of an original document||01-01-2009|
Patent applications by DOCUMENT SECURITY SYSTEMS, INC.