Entity

Time filter

Source Type

Austin, TX, United States

Patent
Mach 1 Development | Date: 2014-04-08

The present invention is directed to security systems that utilize electromagnetic radiation. The security system includes an authentication security document, an authentication system, and a process for authenticating security documents. The security document includes a document body with an RFID and body information pertinent to the security document. The RFID inlay includes a radiopaque material or other material that is opaque to ranges of electromagnetic radiation. The authentication system for secured documents includes an electromagnetic scanning device, a document with a document body, and the RFID device. The scanning device includes a secured device inlet suitable to accept the document body and a display that shows the results of the electromagnetic bombardment of the document body. The process for authenticating security documents includes positioning within the scanning device the security document to create a radiated image thereof that displays the inlay information.


Patent
Mach 1 Development | Date: 2014-04-04

The present invention is a system and process for analyzing a marked image file. The system and process seeks a marker that is inertly placed in an image file such that the marker is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked and updated as required by a user.


Patent
Mach 1 Development | Date: 2014-04-04

The present invention is a system and process for inserting a marker inertly within an image file. The marker is inert in that it is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked.


Patent
Mach 1 Development | Date: 2014-04-04

The present invention is a system and process for updating a marked image file. The system and process seeks a marker that is inertly placed in an image file such that the marker is nonconforming to file type schema and is positioned within an image file such that the rendered image is not contorted. File activity related to the marked image file is tracked.


Trademark
Mach 1 Development | Date: 2012-06-26

Computer software for electronic file data security. Authentication in the field of electronic data; Software as a service (SAAS) services featuring software for electronic file data security, and monitoring, administration, and management of data records associated with electronic files.

Discover hidden collaborations