GB2304077A - Security device comprising reflective particles - Google Patents
Security device comprising reflective particles Download PDFInfo
- Publication number
- GB2304077A GB2304077A GB9525734A GB9525734A GB2304077A GB 2304077 A GB2304077 A GB 2304077A GB 9525734 A GB9525734 A GB 9525734A GB 9525734 A GB9525734 A GB 9525734A GB 2304077 A GB2304077 A GB 2304077A
- Authority
- GB
- United Kingdom
- Prior art keywords
- security device
- card
- reflective particles
- signature
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 239000002245 particle Substances 0.000 title claims abstract description 21
- 238000001514 detection method Methods 0.000 claims abstract description 3
- 239000000463 material Substances 0.000 claims description 8
- 238000000034 method Methods 0.000 claims description 6
- 239000012876 carrier material Substances 0.000 claims description 3
- 230000015572 biosynthetic process Effects 0.000 claims description 2
- 239000011159 matrix material Substances 0.000 claims description 2
- 239000008187 granular material Substances 0.000 abstract description 11
- 239000011248 coating agent Substances 0.000 abstract description 4
- 238000000576 coating method Methods 0.000 abstract description 4
- 239000002184 metal Substances 0.000 abstract description 2
- 239000000758 substrate Substances 0.000 abstract 1
- 239000013078 crystal Substances 0.000 description 9
- 238000004519 manufacturing process Methods 0.000 description 5
- 238000009826 distribution Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 239000004744 fabric Substances 0.000 description 4
- 239000012634 fragment Substances 0.000 description 4
- 229920003023 plastic Polymers 0.000 description 4
- 239000000853 adhesive Substances 0.000 description 3
- 230000001070 adhesive effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 239000004033 plastic Substances 0.000 description 3
- 239000011253 protective coating Substances 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- 229920005439 Perspex® Polymers 0.000 description 2
- 230000001154 acute effect Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000005286 illumination Methods 0.000 description 2
- 239000012528 membrane Substances 0.000 description 2
- 239000002923 metal particle Substances 0.000 description 2
- 239000013528 metallic particle Substances 0.000 description 2
- 239000004926 polymethyl methacrylate Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000002775 capsule Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 239000003973 paint Substances 0.000 description 1
- 239000002985 plastic film Substances 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000003756 stirring Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/21—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for multiple purposes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/373—Metallic materials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/083—Constructional details
- G06K19/086—Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/80—Recognising image objects characterised by unique random patterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
- G09F3/0291—Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time
- G09F3/0294—Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time where the change is not permanent, e.g. labels only readable under a special light, temperature indicating labels and the like
-
- B42D2033/18—
-
- B42D2035/20—
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Credit Cards Or The Like (AREA)
Abstract
A security device comprises reflective particles in the form of flakes or granules 50 randomly distributed in three dimensions throughout the substrate 10 or in a coating 53. The particles reflect light at different angles and directions thereby creating a unique reflected light signature for detection by a reading device. The flakes may be of metal. The device may be a credit card or identity card, tag or label.
Description
A SECURITY DEVICE
The present invention relates to a security device and relates particularly, but not exclusively, to such a device incorporating a plurality of reflective elements used to create a unique reflected light signature.
Most commercial security systems rely - to a greater or lesser extent - on security passes or identity cards of one kind or another. There are many types in use, from identity cards controlling physical access by specified personnel, to credit cards allowing cash to be drawn from a specified bank account. If even a single card is illegally duplicated then, at best, the security of the system will be compromised and, at worst, the system will fail completely.
Of course, modern identity cards carry numerous devices designed to make duplication very difficult. These range from photographs of the authorised holder, and laser-etched copies of the authorised signature, through to laser holograms attached to the surface of the card. However, it has to be said that such devices can only make duplication difficult, from a practical point of view they do not make it impossible.
It is an object of the present invention to provide a security device which reduces and possibly eliminates the disadvantages associated with the abovementioned systems.
Accordingly, the present invention provides a security device or card having a unique and massive set of characteristics ("signatures") which - in practical terms - can never be duplicated.
In particular the present invention provides a security device comprising a plurality of reflective particles randomly distributed in three dimensions throughout a carrier material, said reflective particles in use acting to reflect light from a source thereof at a plurality of different angles and directions thereby to create a unique reflected light signature for detection by a signature reading device.
The present invention will now be more particularly described by way of example only with reference to the accompanying drawings, in which:
Figure 1 is a diagrammatic representation of a security device in accordance with the present invention;
Figure 2 is a graphic representation of the effect of rotation of the reflective particles in X/Y plane;
Figure 3 is illustrates the signature reading device which forms part of the present invention; and
Figures 4 and 5 are full and expanded cross sectional views respectively of a further embodiment of the present invention.
Consider a plastic card such as that used for credit or access control. Devices such as holograms and magnetic stripes attached to the card are man-made; hence, by logical extension, they are capable of duplication by man. The present device 10, on the other hand, relies on a signature set derived from a totally random feature - the presence of shiny metallic particles 12 randomly distributed in three dimensions throughout the very fabric of the device which is conveniently illustrated in the form of a card. When light L, in the form of narrow beams, is shone through the card 10 it may, or may not, be reflected depending upon whether or not it strikes a metal particle 12.
Random distribution of the metal particles 12 is achieved by stirring them into the bulk plastic material during manufacture, and before any individual cards are moulded or cut out. Hence the final position of any given particle inside any given card is defined purely by chance.
A number of anti-fraud systems have already been proposed which rely on reflective material of some kind embedded within the fabric of the card. The present invention, as explained below, is a radical new departure because it reacts not just to the presence (or absence) of reflective particles but also to the spatial orientation of each individual particle.
If metallic particles 12 in the form of thin flakes, rather than (say) spheroids, are used as reflectors then two distinct random factors come into play: the distribution of the flakes within the fabric of the card, and the orientations of those flakes with respect to the card boundaries. Orientation within the card 10 is vitally important because the angle at which any light L is reflected will depend upon both the angle at which the light strikes the card and the angle at which the particle is laying inside the card.The effect of orientation in just one dimension is shown schematically in Figure 2. (The importance of orientation will become apparent when we discuss the way in which a card signature is decoded.)
Anybody attempting to duplicate a card made by the Crystal Chip process faces the problem of duplicating the exact individual distribution - and orientation - of
possibly hundreds of minute metal fragments. If even one fragment is out of position, or incorrectly rotated, then the fraudster runs the risk of the fake being detected because one flake out of alignment may mean the card giving the wrong "response" when scanned by the security system.
Before going on to discuss how signatures are decoded it may be as well to look in a little more detail at the topic of flake distribution within the card fabric.
The following assumptions will be made:
1) that the card has external dimensions of 8.00cm x 5.00cm x 0.2cm (i.e. approximately credit card size, but a little thicker)
2) that each flake is laminar and 0.10cm square.
The maximum number of flakes possible across the horizontal (major) face of the card is given by the simple equation:
(8.00 x 10) x (5.00 x 10) = 4,000 flakes
It is, of course, theoretically possible to have many parallel horizontal layers of flakes distributed throughout the thickness of the card since the flakes are of negligible thickness, but for the purposes of this "minimal" analysis those additional flakes will be ignored.
So, if one major face of the card can contain 4,000 flakes then it follows that both major faces could contain a total of 8,000 flakes. Ignoring the flakes held deep inside the card, and assuming that the card only holds approximately 5% of the theoretical maximum it follows that a card can easily hold some 300 - 400 flakes randomly distributed throughout its length, breadth and thickness.
The counterfeiter is faced with the task of duplicating the position and orientation of these 300 - 400 tiny flakes if he is to make an accurate copy of the card capable of analysis by the security system, i.e. signature decoding.
To decode the signature the card is placed in a series of narrow light beams which strike the card at an acute angle. If a beam hits a flake then it will be reflected and detected by one of a number of photoelectric cells 20 positioned in a group above the card. These "hits" are used to specify the card's signature, and can be recorded in binary form with (say) a miss being 0 and a hit being 1. The system shown in Figure 3 is just one example of how the signature of a card can be interrogated; factors such as the positioning of lights and photodetectors can be arranged to suit particular system requirements.
The factors controlling which photodetector is hit by which light beam are numerous (an obvious one is the positioning of the light sources with regards to the detectors) but, as was explained above, there are two totally independent factors which result directly from the card's structure - the depth of each flake under the surface of the card, and the respective orientations of these flakes.
Depth in the flake
Consider Figure 1. Assume that a beam is striking the card at an acute angle. If the flake is just under, yet parallel to, the surface of the card position "A'1 then the beam will be reflected away and - in accordance with the laws of physics - the angle of reflection will equal the angle of incidence.
Now consider the case where the flake is some distance under the surface of the card but still parallel to the surface [Position "B'1. As before the angle of reflection will equal the angle of incidence, but geometry dictates that the beam will emerge from the card at a point further along the card's surface. If the group of detectors is kept small in relation to the dimensions of the card then the beam reflected from Position "A" will hit a different detector to the beam reflected from Position "B".
NOTE: For the purposes of this analysis any possible effects due to refraction at the cardl air boundary have been ignored.
Orientation of the flake
This is a primary factor in determining the signature set of any given card. As
Figure 2 demonstrates, the incident beam can be reflected in any direction, not only away from the light source but even towards it. In other words, a beam entering the card through the top surface can exit from virtually any point on any surface of that card.
Reference has been made to any one card having a number of signatures. This arises from the fact that the card can be illuminated at different angles, from different light sources, and from different positions (e.g. first from the front, then from the side). Altering the source of light, or altering the angle of illumination relative to the card, will generate a different set of reflected beams and hence a different signature.
Most importantly, note that moving (or rotating) the light source(s) will mean that a different set of reflectors will be illuminated because the light beams will enter the card at a new angle(s) and at a new point(s) on the card surface.
This means that a counterfeiter trying to copy a card which will be scanned in two or more ways by the security system has no option but to try and accurately duplicate the position (in three dimensions) and the rotation (in three dimensions) of maybe 400 reflective particles. He cannot afford to ignore any reflector because he has no way of knowing which reflectors will be scanned by the system.
NOTE: The signature decoded by the system is a function of the system, NOT of the card.
Any given card contains a large (if not infinite) set of passive random signatures. The particular signature detected at any given time can be changed very simply by, for example:
- changing the layout of the beams and sensors,
- by scanning the card from a different direction,
- by scanning the card from a different angle, or
- by changing the order in which the sensors are interrogated.
As has been demonstrated above, the number of detectable signatures in a card is a function both of the number of narrow beams used to illuminate the card and the number of detectors used to identify the reflected beams.
Mathematically the signature can be expressed as the selection of sensors illuminated by the card's reflectors taken from the total number of sensors available in the decoder.
For example; consider an arrangement whereby the card is illuminated using the arrangement shown in Figure 3. [Note that this is just an example arrangement - the layout of sensorsi llght sources can be changed to meet individual system requirements]. Light source "A" contains 5 independently rotatable lights shining down from left to right, and light source "B" similarly contains 5 independently rotatable lights beaming down from right to left.
The reflected beams are detected by a bank of 50 photodetectors arranged as a 10x5 matrix positioned between the light sources. The signature of the card on this occasion is thus represented by a random selection of 10 sensors being activated by the card out of a total of 50 equally available sensors.
Expressed mathematically this choice is given by the expression: nCr = ni(n-l n(n-1)(n-2 + where n = total number of sensors available for illumination
r = actual number of sensors illuminated.
Inserting the figures for this example gives the result:
50 [C] 10 = 10,272,278,170 which means that there are over ten billion different ways in which any ten sensors can be illuminated at random out of a group of 50.
Put another way, the odds against two cards having an identical signature are in excess of 1:5,000,000,000 (over 5 billion to one against).
From a practical engineering point of view it might be decided to use fewer light beams or sensors. If the above calculation is repeated using only 30 sensors (in an array of 6x5) illuminated by 10 beams the number of possible random combinations becomes:
30 [Cl 10 = 30,045,015
Odds against any two cards having identical signatures are now some 15 million to one against.
The basic card is envisaged as a piece of transparent perspex 8.00cm long by 5.00cm wide by 0.2cm thick, with laminar 0.10cm square fragments of reflecting material dispersed randomly throughout the card material.
This, however, is a very simplistic model of the Crystal Chip card because the parameters can be changed in a wide variety of ways. For example:
1) depending upon the number and width of the light beams the card can be made thinner, or made in a different shape entirely. The reflecting fragments could also be made smaller; 2) one face of the card could be overprinted with normal security information, such as the holder's photograph or card serial number, and the card then scanned through the opposite face; 3) magnetic striping could be applied to the card as an additional feature so as make it acceptable (for other purposes) to swipe card readers; 4) by systematically changing the configuration of the sensors, and/ or their interrogation order, and/ or the relative angles between card, lights and sensors, the designer can carry out an automatic "sweep" to identify forgeries.
(The true card will generate a series of signatures as the system configuration changes: a forger may be able to duplicate one of those signatures, but he will never be able to duplicate the full series since that would require the building of an exact replica of the true card).
5) the card can be used in conjunction with other standard features such as PIN numbers and/ or passwords; 6) the raw binary information recording hits and misses can be encrypted before the result of the card's scan is transmitted to the central control.
Examples of the system in use
System I - industrial access control
In this case the cards are used in conjunction with the normal keypad/ PIN number system to relate personnel to the card held.
At the time of its issue a new card is "initialized" in that it is put through a master scanner held by the Security Manager (or his designated officer) and the result of this scan entered on the recipient's file in the security system computer.
Also held in this secure file is the recipient's PIN number or password (of a suitable arbitrary type and length), details of the area(s) to which access is authorised, and any other information which the Security Manager has deemed appropriate.
To access a controlled area the holder places the card in the scanner and keys in his PIN/ password on the scanner's keypad. The computer compares the card's signature with the password/ access details held on file and - if a match is found - permits access.
If the signature of the card used does not match the PIN keyed in then access will be denied. Similarly, if a correctly issued card is used to attempt access to the wrong area then, again, such access will be denied.
The card's ability to give more than one signature can be exploited by arranging for scanners for different areas to have different light sensor configurations. In such a case the new card would have to be "initialized" into the system using master scanners appropriate to each permitted area. Using multiple signatures in this way allows for a very high level of access control to be set up.
If it were felt that the link between the individual entry control points and the master computer were a security weakness then the signature generated by the card could be encrypted using normal electronic techniques prior to transmission to the master computer.
To facilitate ordinary security procedures the card could be printed on one side with normal details such as photograph, signature etc, and then be scanned from the other side.
System II- - credit card system The purpose of this system is to identify the card offered and to compare its
Crystal signature with the cardholder details held on file.
As with the industrial system the card's signature is first established prior to issue and recorded on the system.
Each Automatic Teller Machine (ATM) would have the same sensor/ detector configuration fitted as standard so that the card was always read the same way. The signature derived from the card would be compared with the PIN code to confirm whether the card was the original or a forgery (a forgery would generate the wrong electronic signature). Once the validation checks were completed the transaction could continue in the normal way.
For this system to be effective the ATM would need to communicate with the bank's central computer in real-time to compare the signatures PIN offered with the signatures PIN held on file for that particular customer.
Since the card could also bear a magnetic strip it could carry other information, such as credit limits etc, required by the banking system.
System 111- - document identification This system is aimed at the identification of valuable original documents such as wills, contracts etc.
Instead of a perspex card a thin transparent sheet of security plastic (see below) containing an encapsulated Crystal Chip is attached to the document by strong adhesive. The idea is that during production this sheet's Chip - the "document tag" - is initialized by a standardised scanner and the decoded identity is printed on the tag in the form of a visible, indelible, unique reference number. This number is obtained by converting the binary output from the detectors (the register of "hits" and "misses") into a series of numbers and/ or letters using an agreed pre-determined protocol.
The transparent plastic sheet encapsulating the Crystal Chip has an adhesive lower face and contains two chemicals separated by a thin membrane. If the sheet is subjected to mechanical stresses, such as cutting or twisting, the membrane will rupture allowing the two chemicals to react together. These chemicals are chosen so that a permanent irreversible reaction will occur causing the immediate formation of an opaque layer blanking out both the face of the tag and its border. Not only is the tag rendered useless but it becomes immediately obvious that it has been attacked.
When the document is ready for signing etc. a clause is inserted to the effect that the original ".... is identified by the attached document tag, serial number * ". In the presence of witnesses that tag is then permanently affixed to the document ensurina that the adhesive transDarent sheet covers the clause identifvina the tag number and the signatures of the witnesses.
A person attempting to forge a copy of the original would also have to forge the identity tag - which is a practical impossibility. Realistically his only options are either to transfer the tag from the original to the forgery, or to affix another tag. However:
- transference is thwarted by the fact that the original and its tag are permanently bonded together: separating them will - at best - rupture the security cover on the tag (so blacking it out) and may even destroy both components;
- affixing another tag to a forgery is not a viable alternative since each tag carries, permanently displayed on it, the unique reference number generated by its Crystal Chip capsule during manufacture. The number of the original tag will be shown on the original document and will not match that permanently displayed on the new tag.If, as a matter of routine, a controlled (and protected) record is kept of original documents and their tag numbers then undetected substitution of a second tag should be impossible.
System IV - passport/ ID card identification
This is an enhanced version of System Ill designed to deal with the special problems associated with detecting forged passports, national ID cards, vehicle documents and so on.
During its manufacture the original document is overlaid with a Crystal Chip tag which has been constructed and labelled as in System Ill. The reference number of the tag is printed onto the document prior to the tag being overlaid, and the tag is positioned so as to cover that printed number.
Since the document may be examined at any time by any authorised official it is essential that the generation of the tag number, and the official inspection of the tag when it is in place, are carried out according to an agreed national (or international) protocol. It is vital that standards are laid down covering such matters as:
- the conversion of the tag's binary output into its unique reference number1 and;
- the configuration of the lights and photodetectors in the scanner.
To ensure that the document is correctly aligned in the scanner prior to examination the document would have two or more holes drilled in it by which it would be held accurately in place in the scanner during examination. The configuration/ placing of these holes would again be governed by an agreed protocol.
It is envisaged that the scanner used in this system would be based broadly upon that shown in Figure 3, but with the following additional features: 1) be hand held in use 2) be totally portable 3) contain suitable electronic systems to decode the signature 4) contain an integral screen, similar to that on a pocket calculator, on which would be shown the detected signature in the form of a numeric, or alphanumeric, display.
Having obtained a readout from the scanner the official would compare that readout with the printed tag number shown on the document. If they do not match then the document would immediately be treated as suspect and the necessary enquiries would be carried out.
It is assumed that a competent forger making (say) a complete passport, rather than modifying an existing real one, would apply a Crystal Chip tag whose number matched that of his forgery.
However, as a matter of course, documents such as passports and identity cards carry an ordinary sequential serial number. Comparing that serial number with both the name of the authorised holder and the number of the tag originally issued would quickly reveal a forgery. Either the serial number would not match the authorised holder, or the serial number would not match the tag number.
For the system to work as described above it would be necessary to record details of the authorised passport holder, the passport serial number, and the passport tag number on a secure computerised database which could be quickly accessed by the official carrying out the check. Setting up such a system would be both cheap and simple.
The system described above could be used to protect a range of official documents including:
- passports
- identity cards
- vehicle MoT test certificates
- driving licences
- vehicle excise licences
- high value theatre tickets
- gift vouchers
- banknotes
- cheques.
System V - counterfeit goods protection
This is another variation of System ill designed to protect high value goods from the threat of counterfeiting.
In this process the Chip manufacturer mass produces small Crystal Chips which are overprinted during manufacture with their unique signature numbers (derived using a standardised process). The signature is displayed both as a printed number (or combination of letters and numbers) and as a barcode. Batches of Chips are then sold on to approved manufacturers of videos, CDs, high value aircraft components, high value electrical goods, etc.
By selling only to approved manufacturers access to the Chips can.be carefully controlled, thus ensuring they do not fall into the hands of counterfeiters.
The approved manufacturers then attach a Chip to each item they produce, while at the same time, by means of the barcode, keeping a secure record of the Chip numbers assigned to each individual item.
Should a product be suspected of being counterfeit it would be a simple matter to scan the Chip and then compare the derived signature with the supposed manufacturer's records.
Note that the check is done by scanning the Chip itself: barcodes may be forged, but the Chip's true signature cannot be altered.
Turning now to figures 4 and 5, from which it will be appreciated that the present invention could make use of three dimensional granules 50 of reflective material ( rather than flakes ) in which each granule comprises a plurality of randomly distributed and orientated reflective surfaces 52.
These surfaces may be employed in much the same way as those described above but, as each granule 50 comprises a plurality of reflective surfaces 52, each granule can provide a plurality of reflected light beams for creation of a significantly more complex "signature". Each granule can be as small as 100 microns in diameter and still provide a unique and identifiable reflection. Such a granular arrangement may employ granules 50 in the body of the security device itself or in a transparent coating 53 applied to the security device. Indeed, the coating may even comprise the security device itself and may be applied to, for example, an aircraft component requiring a unique identification marking.Clearly, the flake arrangement might also be employed in this manner. the granules 50 may be held in suspension in the coating or applied to the surface 54 of a base 56 before a protective coating is applied. When applied to the base 56, one or other of the reflective surfaces 54 will tend to act as a bottom surface 58 securely locating the particle itself. In practice, it will be appreciated that the protective coating and granules 50 may be mixed together and applied to a surface of an object or the security device in much the same way as one would apply paint to a surface.
Further to the above, it will be appreciated that the protective coating 53 need not be visually transparent as on e could employ materials transparent only to infra red or ultra violet or other wavelengths of light.
Counterfeiting of the granular based system is considerably more difficult than the flake based system as it is necessary to replicate the position of each granule and the angular orientation of a plurality of randomly distributed reflective surfaces provided thereon. For all practical purposes, such replication is impossible.
For the purpose of a multi-level security device, one could interrogate the granules from a number of different angles, each angle creating a unique "signature". Such an arrangement could be employed when a user is entitled to have access to one restricted area but must be denied access to other, more sensitive, areas.
Claims (1)
1/ A security device comprising a plurality of reflective particles randomly distributed in three dimensions throughout a carrier material, said reflective particles in use acting to reflect light from a source thereof at a plurality of different angles and directions thereby to create a unique reflected light signature for detection by a signature reading device.
2/ A security device as claimed in claim 1 in which the reflective particles comprise flakes of reflective material.
3/ A security device as claimed in claim 1 in which the reflective particles comprise three dimensional granular elements having a plurality of randomly distributed and orientated surfaces provided thereon.
4/ A security device as claimed in any one of claims 1 to 3 in which said reflective particles form an integral part of the carrier.
5/ A security device as claimed in any one of claims 1 to 4 in which the security device comprises the carrier material and reflective particles themselves.
6/ A security device as claimed in any one of claiims 1 to 5 in which said device comprises a credit card, an identity card , an identity tag or identity label.
7/ A security device as claimed in any one of claims 1 to 6 in which said reflective particles are randomly distributed throughout the entire body of the security device.
8/ A security device as claimed in any one of claims 1 to 7 including means for presenting further security information on a surface of the device itself.
9/ A security device as claimed in any one of claims 1 to 8 including a magnetically stored PIN number or password.
10/ A security device as claimed in any one of claims 1 to 9 when manufactured by mixing the reflective particles into the buik of material used to form said device and then forming said device with said particles embedded therein.
11/ A security device as claimed in any one of claims 1 to 10 further including a signature reading device comprising a light source for directing light onto a surface of the device, light detector means for detecting the presence or absence of reflected light at a plurality of points adjacent the device and means for decoding a signal generated by said detectors thereby to create an electric signal for subsequent use in an automatic identification procedure.
12/ A security device as claimed in claiml 1 in which said signature reading device includes a plurality of photo detectors positioned in a matrix formation and configured for creating a binary coded signal upon being hit or nissed by reflected light.
13/ A security device substantially as described herein with reference to and as illustrated in the accompanying drawings.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9513361.7A GB9513361D0 (en) | 1995-06-30 | 1995-06-30 | A security device |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9525734D0 GB9525734D0 (en) | 1996-02-14 |
GB2304077A true GB2304077A (en) | 1997-03-12 |
Family
ID=10776930
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB9513361.7A Pending GB9513361D0 (en) | 1995-06-30 | 1995-06-30 | A security device |
GB9525734A Withdrawn GB2304077A (en) | 1995-06-30 | 1995-12-15 | Security device comprising reflective particles |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB9513361.7A Pending GB9513361D0 (en) | 1995-06-30 | 1995-06-30 | A security device |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB9513361D0 (en) |
Cited By (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2324065A (en) * | 1997-04-09 | 1998-10-14 | James Howard Slater | An identification code for banknotes or credit cards comprising a pattern of random beads |
WO2001057831A1 (en) * | 2000-02-04 | 2001-08-09 | Societe Novatec S.A. | Method and device for reading authentication means and adapted identification means |
FR2804783A1 (en) * | 2000-02-04 | 2001-08-10 | Novatec Sa Soc | Method for identifying and authenticating objects, human beings, or transactions designed to optimize reading of a non reproducible identifier |
WO2001080236A1 (en) * | 2000-04-13 | 2001-10-25 | De La Rue International Limited | Recording medium and manufacturing method |
WO2002018155A2 (en) * | 2000-08-29 | 2002-03-07 | november Aktiengesellschaft Gesellschaft für Molekulare Medizin | Method for forgery-proof labeling of items, and forgery-proof label |
WO2002050790A1 (en) * | 2000-12-20 | 2002-06-27 | Alphafox Systems Limited | Security, identification and verification systems |
US6830192B1 (en) | 1998-04-20 | 2004-12-14 | Vhp Veiligheidspapierfabriek Ugchelen B.V. | Substrate which is made from paper and is provided with an integrated circuit |
EP1674286A1 (en) * | 2004-12-23 | 2006-06-28 | Arjowiggins Security | Security element having a digitised mark and security support or document comprising same |
GB2423615A (en) * | 2005-02-25 | 2006-08-30 | Hewlett Packard Development Co | Identifier for a memory tag |
GB2426100A (en) * | 2005-05-11 | 2006-11-15 | Ingenia Technology Ltd | Authenticity verification of printed token |
WO2007012816A1 (en) * | 2005-07-27 | 2007-02-01 | Ingenia Technology Limited | Verification of authenticity |
GB2428846A (en) * | 2005-07-27 | 2007-02-07 | Ingenia Technology Ltd | Prescription authentication utilising networked system |
GB2429092A (en) * | 2005-07-27 | 2007-02-14 | Ingenia Technology Ltd | Access to data using a token with intrinsic signature |
GB2429096A (en) * | 2005-07-27 | 2007-02-14 | Ingenia Technology Ltd | Online authenticity verification utilising third party |
FR2890666A1 (en) * | 2005-09-15 | 2007-03-16 | Arjowiggins Security Soc Par A | Structure for making safety and/or value document, comprises a fibrous material substrate, a surface layer deposited on face of the substrate, substrate heterogeneities, authentication and/or identification information, and a data carrier |
FR2893595A1 (en) * | 2005-11-23 | 2007-05-25 | Novatec Sa Sa Soc | Tamper proof seal for e.g. controlling and proving non intrusion, has authenticators moved with respect to each other in open position and fixed in closed position, where authenticators are evolved in chaotic manner each time seal is opened |
WO2007090437A1 (en) * | 2006-02-06 | 2007-08-16 | Veil, Marc | Protection system, protection method and an element protected in this way |
GB2440325A (en) * | 2006-07-21 | 2008-01-30 | Hewlett Packard Development Co | Tamper label, random distribution pattern, memory chip |
US20080142671A1 (en) * | 2004-11-04 | 2008-06-19 | Novatec Sa | Method and Device for Verification of Non Intrusion Into a System and/or Non-Violation of the Integrity of an Object or the Contents Thereof |
US7438237B2 (en) * | 2002-12-13 | 2008-10-21 | Novatec Sa | Method for identification and authenticating without specific reader an identifier |
US7647279B2 (en) * | 2003-10-02 | 2010-01-12 | Novatec Sa | Method to make transactions secure by means of cards having unique and non-reproducible identifiers |
DE102008051409A1 (en) * | 2008-10-11 | 2010-04-15 | Bayer Materialscience Ag | security element |
EP2236311A1 (en) * | 2009-03-31 | 2010-10-06 | Gemalto SA | Secure identification document and method for producing it |
US7812935B2 (en) | 2005-12-23 | 2010-10-12 | Ingenia Holdings Limited | Optical authentication |
US7853792B2 (en) | 2004-03-12 | 2010-12-14 | Ingenia Holdings Limited | Authenticity verification methods, products and apparatuses |
US7898648B2 (en) | 2004-12-17 | 2011-03-01 | Koninklijke Philips Electronics N.V. | Optical identifier comprising randomly oriented partial faces |
US8056822B2 (en) | 2005-12-21 | 2011-11-15 | Novatec Sa | Method for certifying and subsequently authenticating original, paper of digital documents for evidences |
US8103046B2 (en) | 2004-08-13 | 2012-01-24 | Ingenia Holdings Limited | Authenticity verification of articles using a database |
CN101258528B (en) * | 2005-07-27 | 2012-03-21 | 英根亚控股有限公司 | Authenticity verification |
ITLU20100013A1 (en) * | 2010-10-06 | 2012-04-07 | Cosimo Antonio Prete | METHOD TO VERIFY AUTHENTICITY AND INTEGRITY OF A PRODUCT WITH PARTIES MADE THROUGH MERGER AND SOLIDIFICATION OF MATERIALS THAT ASSUMES CAOTIC PROVISIONS |
RU2447501C2 (en) * | 2007-02-02 | 2012-04-10 | Фракчер Коуд Корпорейшн Апс | Method of graphic code application and device for its implementation |
US20120125999A1 (en) * | 2009-05-29 | 2012-05-24 | International Frontier Technology Laboratory, Inc. | Keycard and keycard-lock |
WO2012136902A1 (en) | 2011-04-05 | 2012-10-11 | Franck Guigan | Security barcode |
WO2012177845A3 (en) * | 2011-06-23 | 2013-09-26 | Covectra, Inc. | Systems and methods for tracking and authenticating goods |
WO2013168962A1 (en) | 2012-05-07 | 2013-11-14 | Cho Han Yong | Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label |
US8615475B2 (en) | 2008-12-19 | 2013-12-24 | Ingenia Holdings Limited | Self-calibration |
KR101379420B1 (en) | 2012-05-07 | 2014-03-28 | 조한용 | Label for detremining authenticity of a product, method for producing authentication code of the label, methdo and system for determining authenticity of the label, mobile phone for determining authenticity of the label, and computer readable medium for determining authenticity of the label |
US8699088B2 (en) | 2004-03-12 | 2014-04-15 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
EP2722192A1 (en) * | 2012-10-18 | 2014-04-23 | Bundesdruckerei GmbH | Identity card with a physical unclonable function |
EP2722191A1 (en) * | 2012-10-18 | 2014-04-23 | Bundesdruckerei GmbH | Identity card with physical unclonable function |
US8892556B2 (en) | 2009-11-10 | 2014-11-18 | Ingenia Holdings Limited | Optimisation |
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
CN109968860A (en) * | 2019-03-24 | 2019-07-05 | 东莞市将为防伪科技有限公司 | A characteristic particle vibration device |
WO2019170293A1 (en) * | 2018-03-08 | 2019-09-12 | Cypheme | Method for determining the authenticity of a document and device for implementing such a method |
US11295126B1 (en) | 2021-06-24 | 2022-04-05 | Covectra, Inc. | Methods for authenticating goods using randomly distributed flecks and serialization codes |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10685199B2 (en) * | 2016-03-08 | 2020-06-16 | Dust Identity, Inc. | Generating a unique code from orientation information |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4218674A (en) * | 1975-09-09 | 1980-08-19 | Dasy Inter S.A. | Method and a system for verifying authenticity safe against forgery |
US4423415A (en) * | 1980-06-23 | 1983-12-27 | Light Signatures, Inc. | Non-counterfeitable document system |
EP0230497A1 (en) * | 1986-01-28 | 1987-08-05 | Maurer Electronics Gmbh | Record carrier and method of producing it |
EP0364029A1 (en) * | 1988-10-10 | 1990-04-18 | Homer Hollandse Meet- En Regelsystemen B.V. | Authenticity mark, document carrying such mark, and process and device for reading and validating such mark |
EP0388713A2 (en) * | 1989-03-22 | 1990-09-26 | Unilever N.V. | Composite film |
EP0570162A2 (en) * | 1992-05-11 | 1993-11-18 | Canon Kabushiki Kaisha | Record document authentication by microscopic grain structure and method |
-
1995
- 1995-06-30 GB GBGB9513361.7A patent/GB9513361D0/en active Pending
- 1995-12-15 GB GB9525734A patent/GB2304077A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4218674A (en) * | 1975-09-09 | 1980-08-19 | Dasy Inter S.A. | Method and a system for verifying authenticity safe against forgery |
US4423415A (en) * | 1980-06-23 | 1983-12-27 | Light Signatures, Inc. | Non-counterfeitable document system |
EP0230497A1 (en) * | 1986-01-28 | 1987-08-05 | Maurer Electronics Gmbh | Record carrier and method of producing it |
EP0364029A1 (en) * | 1988-10-10 | 1990-04-18 | Homer Hollandse Meet- En Regelsystemen B.V. | Authenticity mark, document carrying such mark, and process and device for reading and validating such mark |
EP0388713A2 (en) * | 1989-03-22 | 1990-09-26 | Unilever N.V. | Composite film |
EP0570162A2 (en) * | 1992-05-11 | 1993-11-18 | Canon Kabushiki Kaisha | Record document authentication by microscopic grain structure and method |
Cited By (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2324065A (en) * | 1997-04-09 | 1998-10-14 | James Howard Slater | An identification code for banknotes or credit cards comprising a pattern of random beads |
US6830192B1 (en) | 1998-04-20 | 2004-12-14 | Vhp Veiligheidspapierfabriek Ugchelen B.V. | Substrate which is made from paper and is provided with an integrated circuit |
US7032828B2 (en) | 1998-04-20 | 2006-04-25 | Vhp Veiligheidspapierfabriek Ugchelen B.V. | Substrate which is made from paper and is provided with an integrated circuit |
JP2003521717A (en) * | 2000-02-04 | 2003-07-15 | ソシエテ ノヴァテク ソシエテ アノニム | The steps of the authentication method, the reader therefor and the identification means compatible therewith |
JP4944332B2 (en) * | 2000-02-04 | 2012-05-30 | ノヴァテク エス.ア. | Authentication method steps, reader for the same, and identification means adapted thereto |
WO2001057831A1 (en) * | 2000-02-04 | 2001-08-09 | Societe Novatec S.A. | Method and device for reading authentication means and adapted identification means |
US7380128B2 (en) | 2000-02-04 | 2008-05-27 | Novatec Sa | Method and device for reading authentication means and adapted identification means |
FR2804784A1 (en) * | 2000-02-04 | 2001-08-10 | Novatec | UNIVERSAL METHOD OF IDENTIFYING AND AUTHENTICATING LIVING OBJECTS, PLANTS OR PLACES |
FR2804783A1 (en) * | 2000-02-04 | 2001-08-10 | Novatec Sa Soc | Method for identifying and authenticating objects, human beings, or transactions designed to optimize reading of a non reproducible identifier |
WO2001080236A1 (en) * | 2000-04-13 | 2001-10-25 | De La Rue International Limited | Recording medium and manufacturing method |
WO2002018155A2 (en) * | 2000-08-29 | 2002-03-07 | november Aktiengesellschaft Gesellschaft für Molekulare Medizin | Method for forgery-proof labeling of items, and forgery-proof label |
WO2002018155A3 (en) * | 2000-08-29 | 2003-10-16 | November Ag Molekulare Medizin | Method for forgery-proof labeling of items, and forgery-proof label |
US7396557B2 (en) | 2000-08-29 | 2008-07-08 | November Aktiengesellschaft Gesellschaft Fur Molekulare Medizin | Method for forgery-proof labeling of items, and forgery-proof label |
US7353994B2 (en) | 2000-12-20 | 2008-04-08 | Andrew John Farrall | Security, identification and verification systems |
GB2374831B (en) * | 2000-12-20 | 2004-07-14 | Alphafox Systems Ltd | Security systems |
GB2374831A (en) * | 2000-12-20 | 2002-10-30 | Alphafox Systems Ltd | Security tags with random particles |
WO2002050790A1 (en) * | 2000-12-20 | 2002-06-27 | Alphafox Systems Limited | Security, identification and verification systems |
US9818249B1 (en) | 2002-09-04 | 2017-11-14 | Copilot Ventures Fund Iii Llc | Authentication method and system |
US7438237B2 (en) * | 2002-12-13 | 2008-10-21 | Novatec Sa | Method for identification and authenticating without specific reader an identifier |
US7647279B2 (en) * | 2003-10-02 | 2010-01-12 | Novatec Sa | Method to make transactions secure by means of cards having unique and non-reproducible identifiers |
US7853792B2 (en) | 2004-03-12 | 2010-12-14 | Ingenia Holdings Limited | Authenticity verification methods, products and apparatuses |
US20110109428A1 (en) * | 2004-03-12 | 2011-05-12 | Ingenia Holdings Limited | System and Method for Article Authentication Using Signatures |
US8749386B2 (en) * | 2004-03-12 | 2014-06-10 | Ingenia Holdings Limited | System and method for article authentication using signatures |
US8766800B2 (en) | 2004-03-12 | 2014-07-01 | Ingenia Holdings Limited | Authenticity verification methods, products, and apparatuses |
US8699088B2 (en) | 2004-03-12 | 2014-04-15 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
US9019567B2 (en) | 2004-03-12 | 2015-04-28 | Ingenia Holdings Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
US8757493B2 (en) | 2004-03-12 | 2014-06-24 | Ingenia Holdings Limited | System and method for article authentication using encoded signatures |
US8421625B2 (en) | 2004-03-12 | 2013-04-16 | Ingenia Holdings Limited | System and method for article authentication using thumbnail signatures |
US8896885B2 (en) | 2004-03-12 | 2014-11-25 | Ingenia Holdings Limited | Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure |
US8502668B2 (en) | 2004-03-12 | 2013-08-06 | Ingenia Holdings Limited | System and method for article authentication using blanket illumination |
US8103046B2 (en) | 2004-08-13 | 2012-01-24 | Ingenia Holdings Limited | Authenticity verification of articles using a database |
US20080142671A1 (en) * | 2004-11-04 | 2008-06-19 | Novatec Sa | Method and Device for Verification of Non Intrusion Into a System and/or Non-Violation of the Integrity of an Object or the Contents Thereof |
US8576070B2 (en) * | 2004-11-04 | 2013-11-05 | Francis Bourrieres | Method and device for verification of non intrusion into a system and/or non-violation of the integrity of an object or the contents thereof |
US7898648B2 (en) | 2004-12-17 | 2011-03-01 | Koninklijke Philips Electronics N.V. | Optical identifier comprising randomly oriented partial faces |
EP1674286A1 (en) * | 2004-12-23 | 2006-06-28 | Arjowiggins Security | Security element having a digitised mark and security support or document comprising same |
WO2006066927A3 (en) * | 2004-12-23 | 2006-09-28 | Arjowiggins Security | Security element having a digitised mark and security support or document comprising same |
US8684417B2 (en) | 2004-12-23 | 2014-04-01 | Arjowiggins Security | Security element having a digitised mark and security support or document comprising same |
US7789307B2 (en) | 2005-02-25 | 2010-09-07 | Hewlett-Packard Development Company, L.P. | Identifier for memory tags |
GB2423615A (en) * | 2005-02-25 | 2006-08-30 | Hewlett Packard Development Co | Identifier for a memory tag |
GB2426100B (en) * | 2005-05-11 | 2007-08-22 | Ingenia Technology Ltd | Authenticity vertification |
GB2426100A (en) * | 2005-05-11 | 2006-11-15 | Ingenia Technology Ltd | Authenticity verification of printed token |
GB2428846A (en) * | 2005-07-27 | 2007-02-07 | Ingenia Technology Ltd | Prescription authentication utilising networked system |
GB2429092B (en) * | 2005-07-27 | 2007-10-24 | Ingenia Technology Ltd | Token Signature Based Record Access |
GB2429096A (en) * | 2005-07-27 | 2007-02-14 | Ingenia Technology Ltd | Online authenticity verification utilising third party |
GB2429092A (en) * | 2005-07-27 | 2007-02-14 | Ingenia Technology Ltd | Access to data using a token with intrinsic signature |
WO2007012816A1 (en) * | 2005-07-27 | 2007-02-01 | Ingenia Technology Limited | Verification of authenticity |
US8078875B2 (en) | 2005-07-27 | 2011-12-13 | Ingenia Holdings Limited | Verification of authenticity |
GB2429096B (en) * | 2005-07-27 | 2008-11-05 | Ingenia Technology Ltd | Authenticity verification |
CN101258528B (en) * | 2005-07-27 | 2012-03-21 | 英根亚控股有限公司 | Authenticity verification |
GB2428846B (en) * | 2005-07-27 | 2008-08-13 | Ingenia Technology Ltd | Prescription Authentication |
FR2890666A1 (en) * | 2005-09-15 | 2007-03-16 | Arjowiggins Security Soc Par A | Structure for making safety and/or value document, comprises a fibrous material substrate, a surface layer deposited on face of the substrate, substrate heterogeneities, authentication and/or identification information, and a data carrier |
WO2007031694A1 (en) | 2005-09-15 | 2007-03-22 | Arjowiggins Security | Structure comprising a fibrous material substrate and method for authenticating and/or identifying such a structure |
US8558995B2 (en) | 2005-09-15 | 2013-10-15 | Arjowiggins Security | Structure comprising a fibrous material substrate and method for authenticating and/or identifying such a structure |
US20090033914A1 (en) * | 2005-09-15 | 2009-02-05 | Arjowiggins Security | Structure Comprising a Fibrous Material Substrate and Method for Authenticating and/or Identifying Such a Structure |
WO2007060323A1 (en) * | 2005-11-23 | 2007-05-31 | Novatec Sa | Tamper-proof and reusable high security seal |
FR2893595A1 (en) * | 2005-11-23 | 2007-05-25 | Novatec Sa Sa Soc | Tamper proof seal for e.g. controlling and proving non intrusion, has authenticators moved with respect to each other in open position and fixed in closed position, where authenticators are evolved in chaotic manner each time seal is opened |
US7726708B2 (en) | 2005-11-23 | 2010-06-01 | Novatec Sa | Tamper-proof and reusable high security seal |
US8056822B2 (en) | 2005-12-21 | 2011-11-15 | Novatec Sa | Method for certifying and subsequently authenticating original, paper of digital documents for evidences |
US8256688B2 (en) | 2005-12-21 | 2012-09-04 | Francis Bourrieres | Method for certifying and subsequently authenticating original, paper or digital documents for evidences |
US8497983B2 (en) | 2005-12-23 | 2013-07-30 | Ingenia Holdings Limited | Optical authentication |
US7812935B2 (en) | 2005-12-23 | 2010-10-12 | Ingenia Holdings Limited | Optical authentication |
WO2007090437A1 (en) * | 2006-02-06 | 2007-08-16 | Veil, Marc | Protection system, protection method and an element protected in this way |
GB2440325B (en) * | 2006-07-21 | 2009-11-04 | Hewlett Packard Development Co | Anti-Counterfeit Packaging |
GB2440325A (en) * | 2006-07-21 | 2008-01-30 | Hewlett Packard Development Co | Tamper label, random distribution pattern, memory chip |
RU2447501C2 (en) * | 2007-02-02 | 2012-04-10 | Фракчер Коуд Корпорейшн Апс | Method of graphic code application and device for its implementation |
DE102008051409A1 (en) * | 2008-10-11 | 2010-04-15 | Bayer Materialscience Ag | security element |
US8615475B2 (en) | 2008-12-19 | 2013-12-24 | Ingenia Holdings Limited | Self-calibration |
WO2010115788A1 (en) * | 2009-03-31 | 2010-10-14 | Gemalto Sa | Secure identification document and method for producing it |
EP2236311A1 (en) * | 2009-03-31 | 2010-10-06 | Gemalto SA | Secure identification document and method for producing it |
US20120125999A1 (en) * | 2009-05-29 | 2012-05-24 | International Frontier Technology Laboratory, Inc. | Keycard and keycard-lock |
US8892556B2 (en) | 2009-11-10 | 2014-11-18 | Ingenia Holdings Limited | Optimisation |
ITLU20100013A1 (en) * | 2010-10-06 | 2012-04-07 | Cosimo Antonio Prete | METHOD TO VERIFY AUTHENTICITY AND INTEGRITY OF A PRODUCT WITH PARTIES MADE THROUGH MERGER AND SOLIDIFICATION OF MATERIALS THAT ASSUMES CAOTIC PROVISIONS |
WO2012136902A1 (en) | 2011-04-05 | 2012-10-11 | Franck Guigan | Security barcode |
US9058535B2 (en) | 2011-04-05 | 2015-06-16 | Franck Guigan | Security barcode |
WO2012177845A3 (en) * | 2011-06-23 | 2013-09-26 | Covectra, Inc. | Systems and methods for tracking and authenticating goods |
US8908920B2 (en) | 2011-06-23 | 2014-12-09 | Covectra, Inc. | Systems and methods for tracking and authenticating goods |
CN104145278B (en) * | 2012-05-07 | 2017-12-12 | 北京谱福溯码信息技术开发有限公司 | The computer readable recording medium of certified products authentication label, the authentication codes generation method of the label, the authentication method of the label and system, the portable terminal device for the certification label and the certification for the label |
US9342773B2 (en) | 2012-05-07 | 2016-05-17 | Han Yong Cho | Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label |
EP2849118A4 (en) * | 2012-05-07 | 2016-01-27 | Han Yong Cho | Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label |
CN104145278A (en) * | 2012-05-07 | 2014-11-12 | 赵韩龙 | Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label |
KR101379420B1 (en) | 2012-05-07 | 2014-03-28 | 조한용 | Label for detremining authenticity of a product, method for producing authentication code of the label, methdo and system for determining authenticity of the label, mobile phone for determining authenticity of the label, and computer readable medium for determining authenticity of the label |
WO2013168962A1 (en) | 2012-05-07 | 2013-11-14 | Cho Han Yong | Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label |
WO2014060125A1 (en) * | 2012-10-18 | 2014-04-24 | Bundesdruckerei Gmbh | Identity card with a physical unclonable function |
WO2014060126A1 (en) * | 2012-10-18 | 2014-04-24 | Bundesdruckerei Gmbh | Identity card with physical unclonable function |
US9495626B2 (en) | 2012-10-18 | 2016-11-15 | Bundesdruckerei Gmbh | Identity card with physical unclonable function |
EP2722191A1 (en) * | 2012-10-18 | 2014-04-23 | Bundesdruckerei GmbH | Identity card with physical unclonable function |
EP2722192A1 (en) * | 2012-10-18 | 2014-04-23 | Bundesdruckerei GmbH | Identity card with a physical unclonable function |
US9953253B2 (en) | 2012-10-18 | 2018-04-24 | Bundesdruckerei Gmbh | Identity card with physical unclonable function |
WO2019170293A1 (en) * | 2018-03-08 | 2019-09-12 | Cypheme | Method for determining the authenticity of a document and device for implementing such a method |
FR3078800A1 (en) * | 2018-03-08 | 2019-09-13 | Cypheme | METHOD FOR DETERMINING THE AUTHENTICITY OF A DOCUMENT AND DEVICE FOR IMPLEMENTING SUCH A METHOD |
FR3078801A1 (en) * | 2018-03-08 | 2019-09-13 | Cypheme | METHOD FOR DETERMINING THE AUTHENTICITY OF A DOCUMENT AND DEVICE FOR IMPLEMENTING SUCH A METHOD |
WO2020088797A1 (en) * | 2018-03-08 | 2020-05-07 | Cypheme | Method for ascertaining the authenticity of a document, and device for carrying out such a method |
US11967163B2 (en) | 2018-03-08 | 2024-04-23 | Cypheme | Method for ascertaining the authenticity of a document and device for carrying out such a method |
CN109968860A (en) * | 2019-03-24 | 2019-07-05 | 东莞市将为防伪科技有限公司 | A characteristic particle vibration device |
US11295126B1 (en) | 2021-06-24 | 2022-04-05 | Covectra, Inc. | Methods for authenticating goods using randomly distributed flecks and serialization codes |
US11776285B2 (en) | 2021-06-24 | 2023-10-03 | Covectra, Inc. | Methods for authenticating goods using randomly distributed flecks and serialization codes |
Also Published As
Publication number | Publication date |
---|---|
GB9525734D0 (en) | 1996-02-14 |
GB9513361D0 (en) | 1995-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2304077A (en) | Security device comprising reflective particles | |
EP1354304B2 (en) | Security, identification and verification systems | |
EP1099199B1 (en) | Secure document reader and method therefor | |
US4013894A (en) | Secure property document and system | |
US7264169B2 (en) | Coaligned bar codes and validation means | |
US8223964B2 (en) | Three-dimensional authentication of mircoparticle mark | |
US4641017A (en) | Fraud resistant credit card system | |
US9058535B2 (en) | Security barcode | |
US4921278A (en) | Identification system using computer generated moire | |
US5442433A (en) | Identification system for an article having individually attached patches | |
US8985471B2 (en) | Optically readable identification security tag or stamp | |
US7259841B2 (en) | Security reader for automatic detection of tampering and alteration | |
US8360317B2 (en) | Apparatus and method for enhancing card security | |
US8469282B2 (en) | Optically readable identification security tag or stamp | |
JPS62502573A (en) | holographic security system | |
van Renesse | Paper based document security-a review | |
CN107486627A (en) | Method of forming identification mark and identification mark formed by the method | |
JP2004077954A (en) | Medium and method for confirming authenticity | |
JPH0550788A (en) | Card and card reader | |
EP0722597A1 (en) | Security reader for automatic detection of tampering and alteration | |
EP0568186A2 (en) | Article identification system | |
JPH04176696A (en) | Forgery preventing card and discrimination thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |