Abstract:
Example embodiments of a product authentication method may include triggering a first authentication process in response to sensing a conductive ink in proximity to a computing device having a set of sensors and performing a second authentication process. The first authentication process may include initiating an application on the computing device when the set of sensors senses the conductive ink. And the second authentication process may be performed by the application on the computing device and may include sending a code to a remote server and receiving a validity determination from the remote server.
Abstract:
A method, non-transitory computer readable medium, system and/or mobile device for authenticating security features, the mobile device for authenticating security features includes at least one sensor for detecting security features, a memory having stored thereon computer readable instructions, and at least one processor configured to execute the computer readable instructions to receive a target image of a product to be authenticated, the product including at least one security feature, identify the product to be authenticated based on the target image and product information stored in a product database, obtain sensor configuration information for the at least one sensor associated with the at least one security feature of the product based on the identified product, examine the at least one security feature of the product with the at least one sensor based on the obtained sensor configuration information, and authenticate the product based on results from the examination.
Abstract:
Example embodiments of a product authentication method may include triggering a first authentication process in response to sensing a conductive ink in proximity to a computing device having a set of sensors and performing a second authentication process. The first authentication process may include initiating an application on the computing device when the set of sensors senses the conductive ink. And the second authentication process may be performed by the application on the computing device and may include sending a code to a remote server and receiving a validity determination from the remote server.
Abstract:
Example embodiments of a product authentication method may include triggering a first authentication process in response to sensing a conductive ink in proximity to a computing device having a set of sensors and performing a second authentication process. The first authentication process may include initiating an application on the computing device when the set of sensors senses the conductive ink. And the second authentication process may be performed by the application on the computing device and may include sending a code to a remote server and receiving a validity determination from the remote server.
Abstract:
A method, non-transitory computer readable medium, system and/or mobile device for authenticating security features, the mobile device for authenticating security features includes at least one sensor for detecting security features, a memory having stored thereon computer readable instructions, and at least one processor configured to execute the computer readable instructions to receive a target image of a product to be authenticated, the product including at least one security feature, identify the product to be authenticated based on the target image and product information stored in a product database, obtain sensor configuration information for the at least one sensor associated with the at least one security feature of the product based on the identified product, examine the at least one security feature of the product with the at least one sensor based on the obtained sensor configuration information, and authenticate the product based on results from the examination.
Abstract:
A method, non-transitory computer readable medium, system and/or mobile device for authenticating security features, the mobile device for authenticating security features includes at least one sensor for detecting security features, a memory having stored thereon computer readable instructions, and at least one processor configured to execute the computer readable instructions to receive a target image of a product to be authenticated, the product including at least one security feature, identify the product to be authenticated based on the target image and product information stored in a product database, obtain sensor configuration information for the at least one sensor associated with the at least one security feature of the product based on the identified product, examine the at least one security feature of the product with the at least one sensor based on the obtained sensor configuration information, and authenticate the product based on results from the examination.