MXPA00003119A - System and method for authentication of goods - Google Patents

System and method for authentication of goods

Info

Publication number
MXPA00003119A
MXPA00003119A MXPA/A/2000/003119A MXPA00003119A MXPA00003119A MX PA00003119 A MXPA00003119 A MX PA00003119A MX PA00003119 A MXPA00003119 A MX PA00003119A MX PA00003119 A MXPA00003119 A MX PA00003119A
Authority
MX
Mexico
Prior art keywords
elements
attribute
fiber
authentication
medium
Prior art date
Application number
MXPA/A/2000/003119A
Other languages
Spanish (es)
Inventor
Norman Kaish
Jay Fraser
David I Durst
Original Assignee
Tracer Detection Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tracer Detection Technology Corp filed Critical Tracer Detection Technology Corp
Publication of MXPA00003119A publication Critical patent/MXPA00003119A/en

Links

Abstract

An authentication system comprising a medium (2) having a plurality of elements (3), the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation (4) of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a position reference, is detected. A processor generates an encrypted message (8-10) including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Description

SYSTEM AND METHOD FOR AUTHENTICATION OF ITEMS FIELD OF THE INVENTION The present invention relates to the field of authentication and detection of counterfeits and more specifically to systems that use self-authentication schemes that allow the determination of the authenticity of the object by evaluating code that can not be duplicated and / or encrypted code. BACKGROUND OF THE INVENTION Authentication and counterfeit deterrence issues can be important in many contexts. Cash accounts, certificates of securities and bonds, credit cards, passports, debit accounts, as well as most different legal documents (eg, shares, wills, etc.). In addition, they must be reliably authentic to be useful. Authentication and the ability to avoid counterfeiting can also be important in many obvious contexts. For example, improved mechanisms for verification / prevention of counterfeiting could be very useful, for example, verifying the contents of shipping containers, careful identification of individual health histories and particular criminals, etc. Counterfeit products are, by definition, unauthorized copies of a product, its packaging, labeling and / or its logos. Attractive targets for counterfeiters are items with significant brand equity or symbolic value, where the cost of production is below market value. In the world of commercial manufacturing, it is not common to falsify, or in any way, the manufacture, distribution and unauthorized sale of items in direct competition with authentic items. Counterfeiting has reached worldwide epidemic proportions, especially in the area of consumer items including articles made of cloth, plastic, leather, metal or combinations thereof, such as clothing, bags and purses, perfumes and other consumer items. Electronic and software products are also particular targets of counterfeiters, who appropriate the value of trademarks or copyrights without a license. Since cost savings based on increased production cost (exclusive of license fees) are not a necessary element in the counterfeit scheme, counterfeit items can obviously be of high quality and closely resemble authentic items. In addition, counterfeit items can closely resemble genuine items, so that consumers easily confuse counterfeit items with authentic items. In other circumstances, the manufacturer segments the world market for different sales and distribution practices, so that "counterfeit" items can be essentially identical to the authorized items. In addition, in many cases, a manufacturer produces articles under license from an owner of the intellectual property, and therefore, are also "fake" sales outside of the terms of the license agreement. In the United States alone, the prevention of crime and / or fraud is a multi-dollar market in dollars. In the commercial sector, the daily marking of registered products such as pants, cosmetics and compact discs / video tapes, software, etc., can prevent counterfeiting (smuggling) and import of fraudulent copies not authorized by legitimate producers. A wide variety of attempts have been made to limit the likelihood of falsification. For example, some have tried to ensure the authenticity of the articles by placing coded or non-decoded marks on them (eg, an artist's signature on his paintings). Unfortunately, as soon as the code breaks, eg, a forger learns to duplicate a signature, this method no longer has any value for authenticity purposes. In the context of paper products (v.gr., money), counterfeit prevention methods have also been used in two-dimensional authentication mechanisms, eg, special brands or threads incorporated into the paper used to produce money. These mechanisms are clearly effective, but they can also be invaded. For example, counterfeiters routinely blanch a dollar bill (so that the dye threads that mark the special currency paper are not damaged) and then print the marks of a hundred-dollar bill therein. Therefore, the release of physical security materials in the brand forms a limitation on its use without restrictions. Other authentication methods have used mechanisms that provide three dimensions of data. For example, the holograms provided on most credit cards provide more variables (ie, in relation to two-dimensional threads or watermarks) that can be pre-calibrated, and then used to verify the authenticity of an item. However, because holograms have a pre-established, determinant pattern, they can also be duplicated and false products can be made. In addition, since holograms are invariant, they are subject to theft before application to articles, or translocation of authorized items to unauthorized on the market. Authentication mechanisms, which use determinant patterns, are inherently vulnerable to falsification since the counterfeiter, in essence, has a "fixed" target to address. High security schemes, such as military codes, have encryption keys that change frequently. This method, however, helps prospectively in the sensitive information of valuable time for security and does not avoid the subsequent description of a previously transmitted message. At another end of the spectrum, an authentication mechanism based on a random element could provide a "movement" incessantly and a target without repetition that could be practically impossible to duplicate undetectably, without knowledge of the coding scheme.
Finally, through the existing authentication mechanism, adequate protection is provided against the falsification of some contexts, increasingly powerful tools are available for encrypted decoding messages; making the necessary schemes for long-term protection safer. For example, in conjunction with their monitoring and surveillance activities, governments routinely seek to break or save encryption codes. The technologies employed are then carefully adopted by the private sector, and really the government regulations seek to maintain the weak encryption standards, facilitating the breaking of the code. In addition, on computers, today's counterfeiters have access to extremely powerful tools for physical copy protection schemes without authorization, eg. , color photocopying equipment, reverse engineering of semiconductor microcircuits, etc. These factors have been combined with the strong demand continually provoked by new methods and mechanisms to authenticate articles, especially methods and mechanisms that are less vulnerable to counterfeiting and / or use of new copy protection mechanisms. The security issue for a broad class of consumer items tagged, in a sense, reduces the possibility that someone could mass-produce a false tag without a corresponding security code being detected. At one extreme, a simple photocopy of a label can actually work if the ^^^, ^^ ^ ^ m ^^^, the scanner simply searches for the starting location, such as the fibers located two-dimensionally. The use of fluorescent fibers could require that the scanner properly illuminate the fibers that cause fluorescence and discriminate against the fiber that is fluorescent with the wrong dye. Dichroic fibers may require discrimination against fibers that refract or differentially transmit light based on polarization as well as on the dye of the light source, and means to duplicate the pattern once detected. Clearly, most of the factors that are involved are the best. Therefore, the preferred measures are the security aspects, which require specialized equipment for measurement and duplication. One aspect that emerges from existing technologies is the strength of the scheme to distinguish between the authenticity of the counterfeit. If the authentication scheme is too strict, genuine items could be rejected due to minor variations, such as environmental changes or exposure, deformation, or the like. On the other hand, if the authentication scheme is not strict, counterfeit items may pass, or counterfeiters may learn to trick the authentication system into articles of authentication failures on a regular basis. PREVIOUS ICA TECHNIQUE ESQ U EMAS OF ETIQU ETA ANTI-FALS IFICATION The Patent of E. U .A. No. 5,592, 561, incorporated herein by reference, suggests a system that provides an authentication, tracking / anti-diversification, and anti-counterfeiting system that can track multiple items. The system includes a control computer, a host computer, a dialing system, and a field reading system, which are compatible and can be physically linked via the data transmission linkages. An identifiable and unique mark is placed on each item, or on the materials from which the items can be produced, which allow subsequent inspection. Brands and patterns include areas where the dialing agent is applied in an encrypted pattern and the areas where it is not applied. The pattern can be scanned or captured by a reader and deciphered in the encoding data. The input can then be directly compared to a group of authentic entries on a database or decoded and compared to a group of data on the centrally located guest database. The marking system provides control over printing, allowing a limited number of authorized codes to be printed before re-authorization is required. In order to provide dial validation, a camera captures the print images. After printing the coded mark, an image of the mark is obtained and centrally authorized as a valid code, which can be stored in a database together with pertinent information belonging to this specific product. Monitoring of marked items is facilitated by including a single encrypted pattern that has, for example, a unique property identifier, a manufacturer identifier Unique, a unique plant identifier, a unique destination identifier, and time and date information. The Patents of E.U.A. Nos. 5,367,148, 5,283,422 and 4,814,589, incorporated herein by reference, provide systems for detecting counterfeit objects using the ID codes having random number components that are stored in a database of authorized ID codes. The Patent of E.U.A. No. 5,367,319, incorporated herein by reference, provides a system in which an object, such as money, is randomly marked, such as with an inkjet printer. The falsification of the object by copying is detected by capturing the duplication of the random pattern. PRINTED SELF-AUTHENTICATION CODES WO 97/25177, by Shachrai et al., Incorporated herein by reference, refers to the method and apparatus for marking precious stones, in which, one modality provides an encryption code that is inscribed in the gemstone that is based, in part, on a random or irreproducible feature of the gemstone. The Patent of E.U.A. No. 5,499,924, incorporated herein by reference, refers to a digital camera with an image authentication apparatus produced from an image profile. The Patent of E.U.A. No. 5,351,302 incorporated herein by reference, refers to a method for object authentication based on a public-key cryptography method that encodes a particular feature of the object, such as a serial number. PHYSICAL SECURITY SCHEMES - OPTICS The Patent of E.U.A. No. 5,574,790, incorporated herein by reference, provides a multiple reader system for authentication of items based on multiple sense fluorescent discrimination variables, such as wavelengths, amplitudes, and time delays relative to a modular lighting light. The fluorescent clue incorporates spatial distributions such as bar codes as aspects of discrimination, to define a user-defined and programmable encryption of the authentic identity of the articles. The Patent of E.U.A. No. 4,623,579, incorporated herein by reference, discloses a decorative mixed materials article, which can be cut longitudinally to form an invented product, which has a combined phosphorescent and fluorescent decorative appearance. The mixed material article includes outer layers in pairs of a thermoplastic resin between which a decorative layer comprising a composition including a dye component having a fluorescent dye and a fluorescent dye, and a resin binder material is disposed. The fluorescent dye is present in a quantity by weight that is greater than an amount equal to that of the phosphorescent dye. The present binder material can be selected from polyester, polyurethane and acrylic polymers and copolymers, with a butadiene-acrylonitrile rubber mixture and a polyurethane composition is preferred. The mixed material article is prepared by coating two resin films with a composition, then contacting the films with one another on their coated surfaces and applying heat and pressure to the joint of the article to form the article of decorative mixed material. The Patent of E.U.A. No. 3,942,154, incorporated herein by reference, describes a method and apparatus for recognizing dye patterns. The method includes color coding of individual paint elements in a fabric pattern by comparing the level of transmission or reflectance of the paint element at pre-selected wavelengths with stored values representing a reference dye to generate a multiple code. bits that indicate the coloring of the paint element. A comparator used for this purpose incorporates an error already proportional to the wavelength or constant value so that the output of the comparator could indicate the identity with the stored value if the input value for the paint element is within certain scale of the stored value. The Patent of E.U.A. No. 3, 839,637, incorporated herein by reference, describes the impregnation of separate sources of the invention in a fabric with a material that is not visible under daylight, but that is visible only when subjected to ultraviolet light, so that provides guidance lines for cutting, or a measurement indication that allows visual counting The number of meters of fabric on a roller from the end of the roller without the need to unscrew the bolt. The Patent of E.U.A. No. 5,289,547, incorporated herein by reference, discloses a method for article authentication that includes incorporating into a carrier composition a mixture of at least two photochromic compounds having different maximum absorption in an activated state and other different properties. to form the authentication of data exhibited in the article, submitting the displayed data to several steps of the authentication method, the activation of all the photochromic compounds, the preferential discoloration of less than all the photochromic compounds, and / or the discoloration of all the photochromic compounds, and the subsequent examination of the displayed data after several activation and discoloration steps by means of verification to allow authentication. The Patent of E.U.A. No. 4,767,205, incorporated herein by reference, discloses a method of identification and identification equipment based on the formation of groups of microdimensional particles normally visible to the naked eye with each particle in each group being of a uniform size and dye size selected. The coded identification is established by transferring a population of particles from a selected number of groups in the article to be identified and then confirming said identification by examination of the item marked under high magnification with a light microscope.
The Patent of E.U.A. No. 4,883,332, incorporated herein by reference, describes a fluorescent detection system by scanning. The Patent of E.U.A. 5,591,527, incorporated herein by reference, provides optical security articles and methods for marking them, which have layers of refractive index of variation forming an image, which is visible only at a scale through a narrow scale of viewing angles and it is visible to the ambient light (diffuse), thus giving an evident verification of the authenticity of the substrate. The Patent of E.U.A. No. 5,580,950, incorporated herein by reference, provides negative birefringent rigid rod polymer films, formed of a class of soluble polymers having rigid rod structure, which when used for cast films, under a self-healing process. aligned orientation in the polymer structure parallel to the film surface, result in a film exhibiting birefringence.
The Patent of E.U.A. No. 5,549,953, incorporated herein by reference, provides an optical recording medium having optically variable security properties. Thin film structures, which have an inherent dye change with an angle of view, provide both optically variable security properties and optical data decodable by optical means. The multi-layer interference coating has a dielectric material, which is transparent, and a recording layer ^ t &gSl made of a light absorption material, a crystalline structural change material, or a magneto-optical material. The data is encoded optically or photolithographically as barcodes or digital data. PRINTED PHYSICAL SAFETY SCHEMES The use of optically variable pigments has been described in the art for a variety of applications, such as inks for counterfeit test applications such as banknotes, and generically for coating compositions. This is described, for example, in the Patents of E.U.A. Nos. 4,434,010, 4,704,356, 4,779,898, 4,838,648, 4,930,866, 5,059,245, 5,135,812, 5,171,363, and 5,214,530, incorporated herein by reference. The pigments of these types are prepared by the arrangement of the transparent, inorganic dielectric layers, semi-transparent metallic layers, and reflective layers of metal in a flexible mesh, and separating the layers of the mesh in such a way that the thin film layer structure deposited in the pigment particles is fragmented. These particles are shaped like irregularly shaped flat pigment lamellae. These pigments are capable of producing dramatic visual effects, including dichroic effects not observed in other types of pigments. A multilayer thin film interference structure is formed having at least one reflective layer of metals, at least one transparent dielectric layer, and at least one layer of semi-transparent metal. Various combinations of these layers can be used to achieve the optimally variable effect desired. The thickness of the layers may vary according to the particular convenient characteristics of the pigment. For example, the Patent of E. U.A. No. 5, 135, 813, incorporated herein by reference, describes a useful thickness being in the order of 80 nm for the reflective layer of metal, 5 nm for the semi-opaque metal layers, and the thickness of a plurality of wavelengths of the particular design wavelengths for transparent dielectric layers. The Patents of E. U.A. Nos. 5, 193, 853 and 5, 018, 767, incorporated herein by reference, provide methods for counterfeiting where the brand image has a minute of knit or line that varies from the normal scan resolution of the normal copying devices, the brand of said detectable mechanical copiers. The Patent of E. U.A. No. 4, 514, 084, incorporated herein by reference, provides a method for authenticating documents by marking the document with an encapsulated liquid crystal, and then observing the document under conditions that exploit the unique optical characteristics of the crystals. liquids. The Patent of E. U.A. No. 4, 507, 349, incorporated herein by reference, provides a money security system employing synthetic layers and images formed of sublimable dye on the layers.
What? The Patent of E.U.A. No. 5,601,683, incorporated herein by reference, provides a document resistant to photocopying, having an antecedent pattern or logo that is printed with a sensitive solvent, dye based on ink. The presence of a photocopy resistant background or logo limits copying. PHYSICAL SECURITY SCHEMES - ELECTROMAGNETIC The Patents of E.U.A. Nos. 5,602,381 and 5,601,931, incorporated herein by reference, refer to a system and method for authentication tags based on a random distribution of the magnetic particles within the tag and an encrypted code representing the printed distribution on the tag. , and possibly printed data on the label. The Patent of E.U.A. No. 3,701,165, incorporated herein by reference, discloses a method of marking garments with a detectable substance and magnetic detection devices. When the magnetized substance or part of the garment is detected in a garment marking process, the subsequent garment marking steps are updated in response to seam detection. The Patent of E.U.A. No. 4,820,912, incorporated herein by reference, provides a method and apparatus for using microwave for authentication of documents, which have a random distribution of stainless steel fibers embedded and distributed in a card base member. Microwaves are applied to a large number of metallic wires that are embedded and randomly distributed in a document or card, and an appropriate digital brand response to a microwave response signature is recorded in an appropriate region of the document or agreement card with the specific rules. To control the authenticity of the document or card, the microwaves are applied to the document or card, and a microwave alteration response is collected with the digital mark. The document or card will be determined to be authentic when the microwave signature and the brand correspond. PHYSICAL SECURITY ESQUEMAS - PELÍCU LAS Y FI LAM ENTOS EMBEBI DOS The Patent of E. U.A. No. 4, 157, 784, incorporated herein by reference, describes a document security system that optically reveals erasures or modifications of printed matter. The Patent of E. U.A. No. 3, 391, 479, incorporated herein by reference, describes a security card system that provides a dichroic film that covers the information on the card. The Patent of E. U.A. No. 3, 880, 706, incorporated herein by reference, discloses a document security system provided by a total fused polymer within a paper pulp substrate.
The Patent of E.U.A. No. 4,247,318, incorporated herein by reference, provides a security paper formed from film sheets-non-woven polyethylene fibers. The Patent of E.U.A. No. 4,186,943, incorporated herein by reference, discloses a banknote or document security system that provides an optically distinguishable thin film in the body of the banknote or document. The Patent of E.U.A. No. 4,445,039, incorporated herein by reference, discloses a coded document security system having a security element with a physical characteristics that can be read. The Patent of E.U.A. No. 4,652,015, incorporated herein by reference, discloses a security paper for bank notes and money having a metallized film having an imprint thereon. The Patent of E.U.A. No. 4,552,617, incorporated herein by reference, discloses a document security system that provides dissolvable tips of a microcarrier material having a coding thereof which persists after the vehicle dissolves. The Patent of E.U.A. No. 4,437,935, incorporated herein by reference, describes a document security system that provides a dissolvable carrier mesh material having a coding thereof. which binds to the paper fibers and persists after dissolving the mesh. The Patent of E.U.A. No. 5,393,099, incorporated herein by reference, provides a counterfeiting method for money and the like having an embedded micro image security feature, such as holograms and diffraction gratings. ENCRYPTION AND ENCODING SCHEMES The Patent of E.U.A. No. 5,426,700, incorporated herein by reference, provides a key system, key public / private for the verification of document types, to verify the information of the content of them. The Patents of E.U.A. Nos. 5,420,924 and 5,384,846, incorporated herein by reference, provide security identification cards that carry an image of the object to be authenticated. The Patent of E.U.A. No. 5,388,158, incorporated herein by reference, provides a method for the secure marking of a document against tampering or alteration. The Patents of E.U.A. Nos. 5,375,170, 5,263,085 and 4,405,829, incorporated herein by reference, provide schemes for encryption and digital alteration. The Patents of E.U.A. Nos. 5,600,725 and 5,604,804, incorporated herein by reference, provide a private key encryption key system. The Patent of E.U.A. No. 5,166,978, incorporated herein by reference, provides a microcontroller for the implementation of RSA schemes so-called an encryption key protocol ^^^^^ .. -v ^ * * ** ^. * so-called public / private key, such as that available from RSA, Redwood CA, can be used for the label of a work piece with a "digital alteration". See, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems" by R.L. Rívest, A. Shamir and L. Adelmann, Communications of ACC 21 (2): 120-126 (February 1978), expressly incorporated herein by reference. In this case, a coding part that encodes the data using an appropriate algorithm, with a private key, so called. To decode the message, you can have a second code, called a public key because they can be distributed publicly and be associated with the coding part. To use this public key, the encrypted message is decrypted, and the identity of the coding part is verified. In this scheme, the coding part is not necessarily informed of the verification procedure. The known variations in this scheme allow private communications between pairs and keys in trust for data security except under exceptional authentication procedures. See also, W. Diffie and M. E. Hellman, "New directives in cir- phography," IEEE Trans, Information Theory, Vol. IT-22, p. 644-654, November 1976; R.C. Mekle and M. E. Hellman, "Hinding information and symbols in trapdoor knapsacks", IEEE Trans. Information Theory, Vol. IT-24, p. 525-530, September 1978; Fiat and Shamir, "How to prove yourself: practical solutions to identification and signature problems", Proc. Crypto 86, pgs. 186-194 (August 1986); "DSS: specifications of a digital signature ^ H ._ £ J ^ t, Sgafe £ < faith tS? '- :. algorithm ", National Institute of Standards and Technology, Fraft, August 1991, and H. Fell and W. Difgle," Analysis of a public key approach based on polynomial substitution ", Proc. Crypto. (1985), pp.340- 349, expressly incorporated herein by reference.Other coding scheme uses a type encryption system DES, which does not allow the decoding of the message by the public, but only by authorized persons who possess the codes. Therefore, this requires a relation of the coding part, which decodes the message and assists in the authentication of precious stones. The Patents of E.U.A. Nos. 5,191,624, 5,163,091, 5,606,609 and 4,981,370, incorporated herein by reference, provide document authentication systems using authorized electronic techniques. The Patents of E.U.A. Nos. 5, 142,577, 5,073,935 and 4,853,961, incorporated herein by reference, provide digital notary schemes for the authentication of electronic documents. The Patent of E.U.A. No. 4,816,655, incorporated herein by reference, provides a document authentication scheme that employs a key private key scheme and which also employs information without detaching from the document. The Patent of E.U.A. No. 4,637,051, incorporated herein by reference, provides a system for printing encrypted messages that are difficult to forge or alter.
, -J The Patent of E.U.A. No. 4,630,201, incorporated herein by reference, provides an electronic transaction verification system that employs random number values to encode transaction data. The Patent of E.U.A. No. 4,463,250, incorporated herein by reference, provides a method for detecting counterfeit codes based on a low density coding scheme and an authentication algorithm. The Patents of E.U.A. Nos. 5,464,690 and 4,913,858, incorporated herein by reference, refer to certificates having holographic security devices. See also the Patents of E.U.A. Nos. 4,150,781; 4,494,381 4,637,051; 4,864,618 4,972,475; 4,982,437; 5,075,862; 5,142,577 ,227,617; 5,283,422 5,285,382; 5,337,361; 5,337,362; 5,380,047 ,370,763; 5,243,641 4,514,085; 4,199,615; 4,059,471; 4,178,404 4,121,003, 5,422,954 5,113,445; 4,893,338; 4,995,081; 4,879,747 4,868,877; 4,853,961; 4,812,965; 4,507,744; and EP 0,328,320, incorporated herein by reference. Therefore, there is a need for a system and method to control, authorize and direct the marking of articles during the manufacturing process and detection of authorization / cross-validation of the marks so that the articles are only identified and tracked through the trading matrix. Furthermore, there is a need for a method and system for marking so that the marks that are not easily reproduced with commonly available devices and so that the marks contain sufficient information for the authentication, identification and tracking of the product. There also remains a need for a method of marking articles where the mark is particularized for an individual item and thus avoiding placing an authentic mark on a different item, preventing it from adulterating the label or the associated object. There continues to be a need to improve the systems and methods that provide security aspects for the labeling and anti-counterfeiting scheme, that provides physical security, that is applicable to the articles for the consumer in the market, that is, a system that is low cost, easy to apply, having safe hardware designs, and that are reliably authentic for physical security and identification codes. Therefore, such systems have several defects. COMPENDIUM AND OBJECTIVES OF THE INVENTION The present invention, therefore, refers to a system that provides authentication of an object, providing at least two levels of security, a physical level, provided by an observable characteristic of an authentication certificate, and a level of information, provided by coding a single characteristic of an authentication certificate (such as the observable characteristics) and / or object to be authenticated in a marking on the certificate.
To provide a tracking level that prevents trans-location (removal of authentic items and re-association with counterfeit items) of tags, a feature of the tagged object can be encoded on an authentication certificate (tag) in the encrypted format. Therefore, the label can be made specific to the object. In this case, the particular characteristic of the object is not made public, for example it is selected from a group of potential characteristics. In this case, authentication at this level is not carried out directly by authorized personnel, or is completely automated in a secure environment. For example, a particular random or non-deterministic pattern or object relationship, preferably involving the relationship of the label to the object, can be measured as the characteristic. Differentiation classes of objects can be limited, for example eight or more different configurations and randomly destroyed. The tag is encoded with an object class, the duplication of dialing is hindered, due to the class that can be determined and then properly encoded in order to be authentic. The required degree of certainty can determine the attributes of the object and the method of measuring it, delay as the attribute can be measured reliably in the field of authentication; conversely, the selection of the attributes and measurement methods are affected with the reliability and robustness of the authentication of the same. Obviously, multiple attributes can also be encoded for additional security.
As used herein, the phrase "irregularly separated" includes the randomly separated one, e.g., which has the pattern not imposed and is subject to statistical variations, and separated pseudo-randomly, eg, separated into a pattern determined by a complex formula so that, within the scope of the common analysis, no repetition or deciphering of the complex formula is observed as possible. Therefore, in order to address the secondary problem of reassociation of an authentic certificate with counterfeit items, attached or random attributes of the items can be measured and stored in a form associated with the item or printed on the certificate. Therefore, for authentication of the certificate, an analysis of the original articles can also be done in addition to the label. For any characteristic, the population may have a limited number of classes, given the need to provide a tolerance of measurement reliability to allow for manufacturing and measurement tolerances as well as allowing slight changes of the articles over time can still be classified as authentic. Therefore, the coding of the authenticity characteristics of the certificate and object, when appropriate, are provided with predetermined precision, to provide reliable authentication with some errors. In one modality, the characteristic of the object to be measured is surely encoded by itself in the authentication certificate, so that ^,. ^ * ~ ¿^ ^ .- ..... t until it is decoded, it is not known which characteristic will be measured. The printing of the coding can be formed in a known manner, for example, inkjet printer, laser, mechanical printer, or the like, financial instruments, such as checks, coded printing is advantageously printed, as a magnetic encoded register of ink (RCMT), to be compatible with existing check reading devices. In the case of bank checks, authentication is used advantageously in conjunction with the check truncation system, where authentic checks are verified, their image is formed and then the physical check is destroyed and the image is processed and used to clarify the funds. See, for example, Patents of the U.S.A. Nos. 5,668,897 and 5,748,780, incorporated herein by reference. 15 In many cases, such as bank and check notes, the authentication certificate, by itself, is the valuable item, and external items are not associated; however, these certificates may have individual marks (eg, those specific to a check) or serial numbers. In this case, these brands can code in the code, to avoid manipulation or forging. In contrast to the above methods, in accordance with the present invention, bank notes and checks are self-authenticating, that is, they may contain sufficient information and sufficient security of the known information to provide a high probability of authenticity. Although one can provide indication by reference to a remote database, in a preferred embodiment, a reference for this remote database is not required for a presentation authentication point. The present invention, therefore, encompasses an authentication device that can be used for the authenticity of a certificate by relatively non-specialized users, to provide a certificate validation (eg, tag, bank note, check, article). tissue, etc.,) while maintaining the safety of the scheme. For example, security aspects can be provided to avoid the use of the authentication device to "break" the coding scheme. Therefore, a number of features may be convenient for the authentication device: (1) small size, for example less than 0.5 cubic meters, preferably less than 0.01 cubic meters; (2) low energy consumption, for example less than 100 Watts on average, more preferably at least about 1 Watt almost inactive, 20 Watts of peak power established from an energy supply; (3) physical security against reverse engineering disassembly and treatment; (4) electronic security against reverse engineering treatment or code reading; (5) operational security against repeated attempts to verify counterfeit certificates; (5) time loss authorization, which requires period reauthorization to remain operational; (7) audit tracking capability, to track users and private use; (8) adoptive capabilities to compensate for changes over time, such as dirt, defective pixels, wear, etc.; (9) non-predictable authentication schemes, for example, by selectively analyzing different sub-portions of the certificate in greater detail for normal analyzes; (10) high security encryption algorithms and optionally support for redundant and multiple independent encryption schemes. The label or certificate can be provided with codes that have a multiplicity of levels. Therefore, even if the first level code is broken, then one or more backup codes may be used. The advantage of this system over a single level compel code is that the complexity of the detection devices is used in the first case that can be reduced, and the nature and existence of the higher level codes are not revealed until it is necessary In order to avoid massive duplication of labels or certificates, it is preferable to encrypt and print a code that represents the variation characteristics of the label or certificate. In the verification of the code, the associated characteristics may correspond. These systems add the complexity mark of any counterfeit scheme, although labeling is still allowed or the articles and products certificates proceed. In a simple system, the mere repetition of supposedly random or pseudo-random codes is detected, indicating simple copying.
In order to avoid replacing the authentic label in a different article, a unique or almost unique random feature of over-tagging coding articles. In this way, the relocation of the label in other articles can be detected. In order to provide robustness against the breaking of the encryption, a plurality of coding schemes may be employed, for example, to avoid the failure of the entire system of one of the coding schemes that is "broken". For example, three different codes can be provided on the certificate, using three different algorithms, and potentially based on three different criteria groups. Preferably, the encoding and authentication employs a system that avoids manipulation, reverse engineering or mass interrogation, which could be directed to a determination of the underlying algorithm and / or generation of valid codes of counterfeit goods. Therefore, for example, a central security server can provide authentication service, in the secure communications channels. Self-authentication can be based on a public test algorithm, however, the loss of the algorithm is highly secure, this can not be preferred for high security applications, but may be acceptable in moderate security applications. The risk is that if the private (secret) encryption key is discovered or released, the usefulness of the encoding is lost and, in addition, until the combination of authentic items that have broken coding is exhausted, the falsifiers can continue without be detected The self-authentication schemes are subjected to attempts of sequential cuts until it breaks, ft code; once an authentication code (private key) is discovered, it can be used 5 repeatedly. It should be noted that the printed code on the necessary certificate is not visible and / or understandable, but in its place can be in itself a security feature. Therefore, inks, printing technologies or a printing scheme can be used special data storage. For example, intentional or "pseudorandom" irregularities (apparently random, but having information in a data pattern) can be imposed on the mark, in order to encode the additional information in the part superior of an explicit dialing pattern. Such irregularities in the marking process can influence a point position, intensity and / or size modulation, and degrees of variation overlap the points. Without knowledge of the coding pattern, the irregularities of positions should appear as restlessness random and intensity irregularities may be considered random. Because a pseudo-random pattern is placed on a random noise pattern, it may be desirable to differentially code the pseudorandom noise with respect to an actual coding position or intensity of formed markings. previously, with frontal error correction codes and / or later. Therefore, by blurring the feedback of the current dialing pattern instead of the theoretical pattern, the amplitude of the pseudo-random signal can actually be as long as it is reliable. By reducing pseudorandom signal levels and modulating the pseudorandom signal on real noise, it becomes more difficult to duplicate the marks due to the random noise itself and near or far from the accuracy of the marking system, and harder to detect the code without prior knowledge of the coding scheme. While alphanumeric codes and other easily visible codes can be read with the naked eye, light coding methods may require specialized equipment for reading. Therefore, another aspect of the invention provides an automatic system for the reading codes inscribed in a certificate. The capacity for image analysis could be returned or generally adapted to the types of coding used, reducing the analysis for relevant details of the brand. Therefore, where a pseudo-random code appears in the dialing pattern, the locations of the individual mark and their interrelationships are analyzed. One embodiment of the present invention thus solves the observed problems and brings together the inherent sub-optimizations of the prior art by providing an authentication mechanism using fluorescent dichroic fibers. The fibers are randomly embedded and not determinantly apart from ? .-? JSSto? ¡& k & r & "> a substrate." This means that by studying any substrate, the pattern on any other substrate, and therefore, a code representing the pattern, does not become apparent. database with a substrate identification, indication of the storage characteristics of the substrate and / or coding on the substrate with a printed encrypted code.The preferred system incorporates a sheet of material, the authentication certificate or label, impregnated with dichroic fibers containing a fluorescent dye, which combines to form a high-security system to thwart counterfeiting in a wide range of applications, dichroic polymeric fibers can also be part of the object to be authenticated.These fibers are relatively difficult to produce, and embed themselves in paper or woven items that require special equipment.In addition, these fibers are observed At first sight, discouraging the alleged falsification of certificates of low sophistication without these characteristics. This system allows, for example, the verification of the label field while maintaining a high level of security against counterfeiting making the reverse engineering process difficult and expensive. Two labels are never the same and can be produced very economically. In order to determine if the printed code corresponds to the certificate itself, the fiber pattern, which is completely random, is illuminated by a light and read by a scanner. The resulting pattern te itiMitit Éffl is then compared to the coded pattern to determine authenticity. According to a preferred embodiment, the pattern on the certificate is presented as a projected image on a surface, the surface necessarily not being a flat sheet. Therefore, the relative deformations of the certificate pattern can be solved by mathematical analysis using known techniques. Relative deformations, as well as any other deviation from the encoded patterns, which for example may represent lost or obscured fibers, noise, environmental contamination with interfering substances, errors or interference in the original encoding process, etc. , then they can be used to determine a probability of the same certificate that corresponds to the originally coded certificate. Therefore, the determined authenticity is associated with a trustworthiness of the same, based on fortuitous variations in the ownership of the authentication certificate and random variations in the generation of the associated security code, then a threshold can be applied to define an acceptable error rate (false positive and false negative) in an authentication process. To produce an information security level that allows authentication without access to a central information store (database), the location or particular characteristics of the dichroic fibers, which are random or unique, are determined, and are used to generate a code encrypted, where the key of the encryption algorithm (or private key) is kept secret. Therefore, the code can be attached to the location of dichroic fiber or features for certificate authentication. Since dichroic properties provide a feature that can not be controlled by existing duplication systems, the certificate with the encoding is very difficult to duplicate undetectably. In one embodiment, the object is labeled with one or more dichroic fibers, whose location, orientation or characteristics are encoded in the certificate. For example, an apparatus can be made from a small number of dichroic fibers in the garment to a unique or semi-unique position. These fibers can be almost invisible, since they are easily detectable by the specialized detection device; alternatively, the dichroic fibers can appear visibly, in such a way that a logo is formed. Such a logo can appear as distinctive visible features, allowing people to authenticate the object, at least at a security level. According to another embodiment of the invention, the fibers that can be provided with spatial variations in patterns, such as dichroism, colorant, coating thickness or the like, further providing difficulty in reproducing the degrees of freedom in the safety scheme. These variations may be random or relatively unique, and, for example, may include enough information content to identify only the object. For example, the polarization angle along the length of the dichroic fiber can be controlled by altering a "strength" of the fiber during manufacture, or after modification, for example by heating diodes to form a laser. Polarization angle pattern on fiber that varies over distance. The pattern can be truly random, or pseudorandom, with an arbitrarily large repeat or a regular pattern. In any case, as fiber (either by the object or the same certificate) is coded on an authentication certificate, the fiber is analyzed by a particular property, and this property and possible relationship in other properties, used, in part, to encode the certificate, it will be noted that the replication of such patterns or fibers are particularly difficult, the mark of this is useful additional security characterized towards the mere presence of dichroic fibers. As stated above, the yarn or fiber can be divided with a dichroic characteristic of variation by the coloration or decoloration of a fiber selectively or by inducing the dichroism of selectively resistant portions of the fiber. In one embodiment, a beam of light, e.g., a laser, can be used to selectively excite and whiten the colorant within the fiber, providing a system for the "writing" information of the fiber. In another embodiment, the fiber or substrate is coated with a magneto-optical recording layer that is selectively heated prior to the Curie temperature and selectively subjected to a magnetic field to induce the measurable light polarization effect.? - S ^ I? &FeAr:.,: ...
Fiber can be modified during or along with the manufacturing process, or at a certain point of use. When a laser is used to modify the fiber, the fiber is heated thus altering the alignment of the molecules and / or the dye can be bleached in the fiber, thus reducing the concentration of fluorescent species. The laser can be transmitted in a regular pattern, a random pattern, a pseudorandom pattern, or in a chaotic state of operation. In the latter case, the inherent instability of the layer is employed. It should be noted that, according to the method of VanWiggeren and Roy, "Communication with Cahotic Lasers", Science, 279: 1198-1200 (February 20, 1998), an information signal can be modulated in the laser output and hidden by chaotic variations, providing an encrypted data signal. Replicating the state of a laser of the receiving system having similar characteristics, including operating parameters and starting state, it is possible to decode the data of the output signal. See also, Gauthier, D.J., "Chaos Has Come Again", Science. 2979: 1156-1157 (February 20, 1998). Therefore, for example, a serial number or other coding can be divided into the fiber that could be difficult to detect or duplicate without knowledge of the parameters of the coding system, providing a level of security. Since the dichroism of the fiber is related to the dye molecules, it is possible to include a plurality of dye types within the fiber. Each dye, which has a different absorption and fluorescence spectrum, can be detected by * & ** »*, & separated. In addition, the respective dye concentrations may vary during the manufacturing process, or selectively decolorize the last mediant t for example, a laser at an absorption wavelength of a dye species. particular. Thus, for example, by using commonly available triple-dye image detectors, the three separate colors can be detected, providing additional degrees of freedom for an authentication scheme. It should be noted that while dichroic fibers are preferred, it is not necessary for each dye which is associated with the dichroic property or a distinct dichroic property. Therefore, the characteristics of dichroism, fluorescence and absorption and / or transmission may be potentially different characteristics of the fiber. In another embodiment of the invention, the microspheres are provided having dichroic properties. In this case, the data map includes the position and orientation of the polarization axes of the microspheres, which should be understood to be a dimensional vector in the case of a linear fluorescent emission axis of a dye and a two-dimensional vector in the case fluorescent emission radially symmetrical of a dye. Advantageously, these microspheres can be applied to an object using a printing process, for example lithography, inkjet printing, specialized laser printing (taking care to avoid undesired changes in the dichroism in the flux), and the like. ^^^. ^^^. ^^^^^ f i | According to one embodiment of the invention, the dichroic fibers are formed from nylon having a fluorescent dye mixed with the polymer matrix. During the formation process, the fiber is resistant, which tends to align the molecules to the 5 of the resistance axis. This anisotropic characteristic leads to dichroism, which differentially affects the light of the polarization axis of variation. Therefore, due to this differential effect, the fiber has a rotation of polarization of light, especially at wavelengths corresponding to the absorption and / or emission of the dye fluorescent. It should be noted that nylon by itself can be dichroic, but normally the effect is not easily observable at visible or easily measured wavelengths; on the other hand, the dye is specifically selected for having useful optical interactions and for obtaining a high degree of anisotropism under the process conditions. The preferred nylon dichroic fibers allow a number of identification variations, for example the amount or type of dye in each fiber, optical, heat, physical or chemical mediations (e.g., chemical or photo-decolorization, heating, fiber strength or deformation) of the fiber during or after manufacture, or after being placed on an identification substrate. As noted above, a number of degrees of freedom are possible, providing a number of detection strategies and hindering the duplication of the brand. The variations Preferred are the amount of colorant and the physical strength, both fMM of the strands can be easily controlled in the fiber manufacturing process. Preferably, these two variations are provided over relatively short distances such as millimeter scales or smaller, providing a capacity that transparently displays relatively high information, and this allows relatively short lengths of the fiber to provide sufficient information to identify the substrate. Alternatively, a modulated laser can be used to modify the fiber, to alter the dye and / or molecular chain organization. Said laser coding can be applied on a physical ladder scale, and can be controlled to adjust the tolerances. Microscopic scale variations; however, they may be hidden during the labeling process and the compounds may be present in the fiber with respect to the obstruction elements; therefore, the total system designed to read such microscopic variations can be robust and provide statistical thresholds to avoid lack of identification and / or lack of verification. Fibers that are selectively sensitive to environmental conditions, such as temperature, can also be used. humidity, gases and similar, so that a change in characteristics, v. gr, optical characteristics, is measured based on a change in said conditions. The label formed with fibers can be identified based on the identification location of the fibers and / or the identification characteristics of the fibers the fibers can be randomly dispersed in a carrier material, at said density to measure the reliable identification, but without characteristics of obscuration of identification. For example, the fibers can be mixed in the pulp to form paper, such as in the process used for US notes. The location of the fibers is then determined, allowing a correlation between the fiber locations and the identity of the substrate. Preferably, the use of labels is kept in the low acceptable range, in order to control and minimize the public release of the fiber material and labels. If large amounts of fiber material or labels become publicly available, then the risk of reusing these fibers or reusing the label is increased, thereby undetermining the presence of the fibers as a safety measure. According to another aspect of the invention, the fibers can include a component that varies irreversibly during a time or environmental exposure, the long-term persistence of marking of fibers in the most difficult marking. Said component is, for example, a colorant or additive that degrades with ambient light or oxygen exposure under normal conditions, or even if it is the result of a progressive chemical reaction within the fibers formed. Of course, this degradation limits the ability to invent and ship normal items that are intended to be considered genuine after a long time, and competes with the authentication of issuance of suspicious items. For the Thus, the selection of implementation of this procedure is limited to appropriate conditions. Preferably, the coding characteristics of this fiber can be determined automatically at a relatively high speed, allowing the original labeling and the authentication process proceeds efficiently, without highly specialized operators or authorized personnel. Where the fibers are incorporated into a label attached to an object, the scanner of the preferred image is a two-dimensional image scanner, while the notes of banks, certificates and checks, an in-line scan image sensor are preferred. In another embodiment of the invention, a fabric tag is formed by including the security threads, e.g., dichroic fibers, and / or various fibers encoded as a part of their structure. Dichroic fibers can also be intercepted with almost identical fibers that have low dichroism. Special fibers are provided at a sufficient density to provide the desired safety label (defining a minimum information content) and limited in maximum density to avoid interference in the detection of the particular property of interest. The label can be included as little as a single short fiber length, or it can still be formed entirely of coded or special fibers. This label may be printed by itself with an identification code security, or such printed code or other substrate associated with the object, such as a mounted label or other label.
The dichroic fibers can thus be incorporated into a product label. For example, most garments have woven labels. The dichroic fiber can therefore be incorporated into the weaving process to form an integral part of the label, using reels of dichroic fiber in the fabric or sewing process. In order to provide increased safety over the presence of dichroic fibers, the fibers, which are, for example, nylon fibers having a fluorescent dye and a dichroic characteristic, are non-uniform dye and / or dichroic throughout their length. This deformation can be integral in the nylon fibers forming the process, or a post-modification of a formed fiber. Dichroism can be altered by mechanical strength of the fiber during a manufacturing step, to alter the relative alignment of the molecules, altering the axis of polarization, resulting in dichroism. These manufacturing variations can be truly random, regular, or pseudorandom, that is, apparently random, but generated by a known algorithm. A relatively small number of dichroic fibers can be used, carrying out sufficient information to uniquely or almost exclusively identify the label. However, the total woven label can be formed by mixed decoded encoded or coded fibers, or any portion thereof. In the case of fabrics or woven articles, the dichroic fibers can form a part of the articles themselves and can be woven into a logo or brand. For example, in a garment, a particular stitch pattern or sewing stitch ratio for an underlying fabric fabric, may be the characteristic one. The garment class can have, for example, 10 different randomly distributed configurations, based on the random alignment of the sewing needle and the fabric of the fabric. A relationship of a stitch pattern with the sewing threads in a main portion of the garment will normally be random as well as stable. For other products, a dimension or tolerance, distribution of dye or pigment, distribution of invisible marking or the like can be measured. In order to detect dichroism, an embodiment of the invention is provided for the use of two light sources having different characteristics, such as wavelength or polarization angle, to illustrate the dichroic fibers in sequence for greater accuracy and security. Alternatively, a single light source can be sequentially filtered. The present invention, therefore, encompasses a system that reads a unique feature of a label or certificate of impressions thereof in an encrypted message that differs from the unique feature, the label of the label or self-authentication certificate. Optionally, a unique or identifying feature of an objective associated with the label or certificate can be secured and printed further as an encrypted message on the label, only by associating the label or certificate with the object. Preferably, the feature of the object is a random tolerance or highly variable aspect, which is difficult to Kg can be recreated, which is still comparatively stable for a time as the measurements are relatively repeated, where the characteristic changes over time, preferably these changes are predictable or provide identification, such as the date of manufacture. As stated above, the authentication algorithm can compensate or take into account "normal" changes or variations, thus minimizing reverifications or manual examination of certificates or labels. The labeling system therefore includes a reader, for reading the unique characteristics of the label or certificate, such as a polarization sensitive imaging device for reading a chronic fiber distribution embedded in the paper, and optionally a device which measures an identification characteristic of the object that will be labeled, such as a dimension, tolerance, sewing dye or thread pattern, etc. This information is then encrypted using an algorithm, to produce an encrypted message, which is then printed on the label, for example using a pigment sublimation or inkjet printer. The encryption is preferably a multi-level system, including for example, a 40 character algorithm, a 56 character algorithm, a 128 character elliptic algorithm and a 1024 character algorithm. Each message level is preferably printed separately on the label, for example, the encrypted message of 40 characters as an alphanumeric tape, the encrypted message of 56 characters as a binary or bar code, the S¿ * k? Í £ «al-S ^^^^^^^^^^^^^^^^^ * ^^^ r; ^ &t - "... ^ k & amp;! & amp; 128-character elliptical encrypted message as a two-dimensional matrix code and the 1024-character algorithm as a pseudo-random replacement of dots of one or more colors on the face of the label. Alternatively, higher level messages can be encrypted by lower level algorithms, providing a multiple enrollment system. Preferably, each encrypted message corresponds to the successively more detailed information around the tag and / or the object. Optionally, with reduced coding or potentially without any overlap of coded information. This system allows readers to place in the field that will be replaced or updated successively over time, with readers that can decode the most complex codes. By limiting the use of more complex codes and releasing the corresponding code readers until necessary, the risk of allowed breakage of these codes is reduced. In addition, the use of variance complexity codes allows international use even when export restrictions or use of reading devices are in place. The invention also provides a reader adapted to read the characteristic of the label corresponding to the coded characteristic, optionally captures or introduces the characteristic of the associated object and manually or automatically verifies the code printed on the label. If the code is verified, the label and / or object is authentic.
Preferably, both dialing systems and the reader have a security memory for the algorithms, which are lost in the case of manipulation with the devices. In addition, the devices preferably have a forgery mode that clears the algorithms in the case of significant irrevocable errors. Finally, the systems preferably include protections against trivial marking or continuous interrogation, while allowing high production or marking and revision of objects and labels. Because the memory of the algorithm within the reader can be fragile, a central database or server can be provided to reprogram the unit in the case of data loss, after it is investigated that it caused the loss. Any transmission preferably over the security channels, for example, the exception of 128 characters or the so-called security receptacle layer (CRS), through the TCP / IP communication protocol. Each reader and dialing system preferably has a unique identification number and group of encryption keys for any communication with the central system and a mark placed on the label indicative of the dialing conditions, for example the ID dialing system, date , location, serial number of dialing and the like. The labels can be fixed in any number of consumer applications and high security, including, for example, DC / software, designer clothes, wine, cosmetics, stamps, video tapes, floppy disks, perfumes, electronics, tickets, tapes , books, recordings, documents and financial instruments. It is therefore an object of the invention to provide an authentication system comprising a means having a plurality of elements, the elements being distinctive, detectable and irregular, each element being characterized by a determinable attribute other than a two-dimensional coordination representation simple optical absorption or simple optimum reflection intensity; the detector, detecting an attribute and position of the plurality of elements with respect to a positional reference; a processor for processing an encrypted message including at least a portion of the attribute and position of the plurality of elements; and a recording system for recording the message encrypted in physical association with the medium. This simple optical absorption and the distributions of two-dimensional coordinates of simple optical reflection, are referred to herein as chromium-luminance maps (two-dimensional coordinate distributions of dye and / or intensity) and are independent optical polarization. Normal scanners are not able to detect the optical polarization angle, and therefore, it is difficult to detect and replicate the attribute without specialized equipment. It is also an object of the invention to provide an authentication system comprising a means having a plurality of detectable elements distinctive of or in them, each element comprising at least a determinable degree of instinctive freedom of dye, intensity and position. (optical absorption, optical reflection and two-dimensional position); a scanner to define a positional reference and detect at least one degree of freedom of the plurality of detectable elements, and a position thereof with respect to the positional reference; an encryption processor a message including detecting at least one degree of releasing and positioning the plurality of detectable elements; and a recording system to record the message encrypted in the medium. The medium preferably comprises the fiber that inhibits the dichroism and finally a degree of freeing comprising the polarization angle, variation of pigment density over the length, or the variation of optical polarization angle over the length. The distinctive detectable elements are arranged equally, randomly or pseudorandomly, and therefore the positions of the elements provide the useful information to distinguish the different medium. As used herein, the term "distinctive" refers to the fact that detectable elements are usually recognized from the bottom or debris, and therefore, the detection thereof is relatively reliable. It is also an object of the invention to provide an authentication system in which a processor receives a parameter in relation to an object associated with the medium, and encrypts the message based on the detection of at least one degree of freedom, position of the plurality of detectable elements and the parameter.
It is also an objective according to the invention to provide a tolerant fault that encodes the scheme that provides statistical correlation between a code derived from an image in an object in a first time and an image derived from an object in a second time, wherein Statistical correction distinguishes authenticity with falsification with specific degree of certainty or confidence, in the presence of noise, physical distortion, environmental changes and conditions and for a certain time. It is a further object of the invention to provide a system that provides mapping of vectors of the distinctive detectable elements on the medium, which allows marking a correspondence of a mapped encripted vector and measuring the vector mapping. In this way, the total image of the necessary medium can be recorded as an encrypted message with the purpose of authenticating the media with complement for the mediated tolerance and variations in the configuration of the medium over time while allowing sufficient degrees of freedom for reliable authenticity medium. As used herein, a medium having a plurality of distinctive irregular elements is provided. The elements, therefore, have a disposition or presentation that does not follow an easily decipherable pattern. Each element is further characterized by a distinctive determinable attribute of a bimodal coordinate representation of simple optical absorption or simple optical reflection. Therefore, the elements do not represent a pattern "**, ii * < fc¿ ^ itAfc" - ^ of simple reflection, of flat intensity or absorption intensity. It should be understood that in other modalities, or different techniques against additional copying and random or unique attributes of the certificate (label) and / or object, can be explained to provide security aspects. These and other objectives will be evident. For a complete understanding of the present invention, reference should now be made to the following detailed description of the preferred embodiments of the invention as illustrated in the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS The invention will now be described with respect to the drawings of the Figures, in which. Fig. 1 is a front view of an authentication certificate according to the present invention; Fig. 2 is a schematic view of an authentication certificate generating system according to the present invention; Fig. 3 is a schematic view of an authentication certificate reading system according to the present invention; Figs. 4A and 4B are flow charts, respectively, of a method for generating and authenticating an authentication certificate. DETAILED DESCRIPTION OF THE PREFERRED MODALITIES i ^ & U & ? j% && amp; - * M ^ - ** K * i »Detailed preferred embodiments of the invention will now be described with respect to the drawings. Similar aspects of the drawings are indicated by the same reference numbers. In order to provide improved authentication and avoid counterfeiting, the present invention uses fluorescent dichroic indicators. Materials that are dichroic may have different absorption coefficients for light (ie, electromagnetic energy, usually varying from infrared to ultraviolet wavelengths) polarized in different directions. When the energy of the incident photon (polarization) corresponds to the absorption transition of the molecule, the interaction between the absorption dipole and the incident photon is longer and the high absorption of incident photons is observed. For example, this energy is re-emitted by a fluorescent molecule with the plane of polarization of the emitted photons aligned with the emitting dipole of the fluorescent molecule. Most molecules have the approximately colinear absorbent and emitter dipole. When the polarization of the light that comes out is co-linear with the absorption dipole, the fluorescent emission will be higher. On the other hand, the normal polarized light for the absorption dipole is not absorbed to a greater degree, therefore, the emitted intensity resulting from this absorption is low. When the light source is not polarized, the dichroism of each fiber will result in respective polarized reflection, transmission and emission.5t- According to a preferred embodiment, the authentication indicator is a dichroic material. Preferably, the dichroic material will exhibit a high degree of dichroism. However, it is not important in which form the dichroic materials are introduced into the medium being authenticated. For example, there may be a situation where authentication is facilitated using dichroic indicators in the form of tapes, rectangles, pyramids, spheres, etc. As long as the dichroism of the indicator is reasonably maintained during the formation of the article (ie the incorporation of the dichroic indicators with the article), the configuration / form of the dichroic indicator is not important. The fibers can be advantageously used to incorporate the desired dichroic behavior in the article since the fibers can be incorporated into many processes without harming the process (e.g., production, interlacing, paper stitching) or dichroic fiber. The fibers can have widely varying cross sections and lengths. Essentially, the only requirement is that the configuration of the fiber does not alter the underlying manufacturing process (eg, with aerosol applications the fibers should be small enough to be sprayed). When it is in some way feasible, the dichroic fibers are somewhat elongated since the elongated fibers are easier to identify within a matrix of material and can potentially provide more data than the shorter fibers (e.g., since the different points along the length of a long fiber can be more or less obscured by paper fibers, be narrower to, or from, the surface of the paper, etc., and therefore, exhibit more or less dichroism) . Finally, in some cases it may be possible to use fibers of uniform lengths to provide easily verifiable data points, that is, when it is questioned whether a marked article is authentic or not, one can quickly see if the fibers of appropriate lengths are present. Synthetic polymeric materials are preferred for the fiber material, e.g., Nylon 6,6. A wide variety of acceptable indicator materials is available at very low cost. For example, polyesters, polyamides, poly (amide-imides) and poly (ester-imides) can be birefringent. Examples of polymers used to prepare stretched films having a birefringence include polycarbonates, polyarylates, polyethylene terephthalate, polyether sulfone, polyphenylene sulfide, polyphenylene oxide, polyallyl sulfone, polyamide-imides, poly-imides, polyolefins, polyvinyl, cellulose and polyarylates and polyesters. Examples of films drawn from intrinsic negative birefringence include styrene polymers, acrylic ether polymers, methacrylic ester polymers, acrylonitrile polymers and methacrylonitrile polymers Suitable dyes, when necessary or desirable, include naphthalimides, coumarins, xanthenes, thioxanthines, naphtolactones, azlactones, methines, oxazines and thiazines. For visible fluorescence, Rhodoles, rhodamines (see US 5,227,487, and US 5,442,045), fluoresceins and flavins are preferred. To use dyes, it should be evident that instead of using a single dye or modulating the content of a single dye, different dyes can be added to the fiber matrix, potentially providing different and relatively orthogonal coding schemes. For example, the series of dyes Alexa of Molecular Probes, includes five fluorescent dyes, normally used to prepare bioconjugates. The absorption spectrum of these five spectrally different sulfonated rhodamine derivatives, Alexa 488, Alexa 532, Alexa 546, Alexa 568 and Alexa 594 dyes, equal the main wavelengths of the common excitation source output, thus allowing the coding of - multiple colors. Of course, several different dyes or compatible sets of dyes can be used. Fluorescent resonant energy transfer (TERF) techniques can also be used to mark fibers and detect marks. It is noted that dichroism is not necessary, especially where a complex optical effect, such as fluorescence or TERF, is present. Again, by combining techniques, more efficient coding and greater difficulty in falsifying fibers are provided. The dichroic agent can be associated with the indicator in a variety of ways. In order to maximize dichroism, dichroic agents (eg, dye molecules) are alienated to the maximum; the absence of dichroism is achieved by a random distribution of dye molecules. Normally, the alienation of dye is achieved by stretching the polymer matrix during manufacturing, which alters anisotropy and alignment of the polymer chains. The dye is bound or bound to the chains and is therefore aligned simultaneously. If the fiber is selectively stretched, or the color is selectively fixed after stretching, the spatial variations in the dichroism will be evident. The colorant can also be bleached, e.g., photobleached, in a secondary process. Since many dyes have a narrow absorption band, said dyes can be selectively bleached, allowing independent control over the spatial dye concentration. Normally, heating and other color fixing processes are not selective and alter the crystal structure of the entire portion of the fiber. Said selective heating is possible, for example, with infrared laser diodes or even infrared LEDs. Preferably, when using single fibers such as the indicator, the dichroic labeling material is aligned along the length of the fiber. In this way, the fibers will have very different emission spectra (ie, with respect to intensity) when they come out with polarized light parallel to perpendicular to the fiber axis, assuming that the absorption dipole is along the axis of the fiber. the fibers. In general, the absorption dipole of the fluorescent labeling molecule will not be perfectly aligned with the fiber axis. This can be allowed, but it is preferred that the absorption dipole be almost parallel or orthogonal to the axis of the fibers.
Where more complex fibers are used, transitions preferably involve rotation of polarization between ends. For example, fibers can "co-start" along axes displaced 90 degrees along their length. Other techniques can be used to selectively orient the molecules in the fiber, for example, using magneto-optical etching techniques. It is also noted that, when the label itself is foamed with dichroic fibers, a pattern can be formed on the fibers by photobleaching or annealing using light or heat, respectively, for example, from a laser. Therefore, the absence of dícroísmo can be determinant of a pattern on it. Likewise, in a paper label with embedded dichroic fibers, a code can be provided by whitening or selectively heating fibers within the label to alter their absorption of photons or dichroism, respectively. The marking material (eg, a fluorescent dye) may be associated with the indicator material (eg, fibers) during formation (i.e., the marking material may be incorporated into another indicator by itself) , or the marking material can be added to the indicator after the indicator is formed. For example, when fibers are used as the indicators and luminescent dye is used as the marking material, a preferred method to ensure maximum dichroism (ie, the maximum coalition of the dye molecules) is to blend the fibers and the coloring and then stretch the fiber. With other fiber / marking dye combinations, it may be possible to achieve satisfactory dichroism without a stretch step, e.g. , immersing the fiber in a colorant container. Preferred dyes in the present invention are luminescent (i.e., fluorescent or phosphorescent). More preferably, fluorescent dyes are used as the marking material. However, phosphorescent marking materials can also be used. The colorant suitable for use in a particular application will depend on the specific situation. In general, a fluorescent dye is most preferably selected so that dye dichroism is maximized at the intended detection wavelength. The marking dye can be made for very specific applications. For example, a dye that emits in the infrared portion of the spectrum, can be used to create an authentication signature that is invisible to the naked eye but can be easily detected with appropriate instruments. The fluorescence signal is preferably provided by a fluorescent dye or combined pigment in the polymer matrix of the fiber, having a long major axis to align with the polymer chains of the fiber during the extraction process. Known dyes can be used, for example, organic fluorescent dyes having absorption and emission on the infrared to near ultraviolet scale. These dyes are also known for a variety of other uses, such as microscopy ? & & ü2) ^^^ fluorescence, chemical detection, physical photon capture applications, and the like. A fluorescent dye or pigment should also be sufficiently stable, thermally, to support the fiber production process as well as uncontrolled environmental exposure. The required / preferred dye concentrations track those used in fiber technology, generally, that is, no special processing is required to combine the indicator and marking materials, except perhaps for one step of the aggregate process in order to coaline the dye molecules within / along the indicator fibers as discussed above. Method The indicator and marking materials of the present invention provide an extremely reliable method as an authentication means (eg, paper, plastic, etc.). After the polymer matrix and suitable fiber coloring materials have been selected for a particular application, the materials are combined (eg, a dichroic fluorescent fiber is assembled). Then, the authentication / indicator material can be incorporated into various manufacturing processes without adversely affecting the process, the finished product or the authentication material. For example, fluorescent dichroic fibers can be incorporated into processes for producing paper, such as fibers within the pulp matrix or applied to the surface of the paper, and furthermore, the substrate does not need to be paper. The marking materials can be incorporated into a vast variety of other manufacturing processes, v. Gr., Laminated or in some way incorporated into plastic products; be incorporated in aerosol sprayers, etc. As discussed above, the fluorescent dichroic fibers can be used to provide several levels of incremental authentication / detection of falsification. For example, if paper containing fluorescent dichroic fibers is used to print labels, a first level of authentication is provided by checking that the label contains fluorescent fibers. The next level of authentication may comprise evaluating whether the fluorescent fibers are dichroic. The next level ensures if the fiber pattern is equal to a coded or stored pattern. The final level ensures if an attribute of the associated object corresponds to a code in the label. As shown in Fig. 1, an authentication certificate is provided as a product label. The certificate, in this case, is a sheet of nonwoven material such as paper or the like, which has embedded therein, during the manufacturing process, dícroicas fibers 3, on a random basis. The authentication certificate 1 may also include other aspects, such as a trademark 5, product identification 6, trademark text 7 (provided to help obtain a legal remedy in the case of simple copying), text of RCMT 8 ( to allow the automatic reading by means of an RCMT reader of a limited amount of information), a two-dimensional bar code 9 and a pattern of taps 10) may include an encrypted message that | J¡j «tf¡ís ^ ßs * ítt ^^^ J defines a spatial relationship between the dichroic fibers 3 and a reference position 4, which in? Ff is a printed rectangular box. It is noted that the three dimensional arrows do not need to be circumscribed by a square and can have any relatively fixed relation to the positional reference. The positional reference 4 can also be defined by a dichroic fiber within the authentication certificate 1. To duplicate labels containing the fluorescent dícroicas fibers, a forger, among other things, might need to duplicate the fluorescent dye used (to produce the same emission behavior at the selected detection wavelength); use of fibers of the same general length and shape; and produce fake label raw material that has the general number of fibers for a given area of paper, any attempt to falsify the label containing fibers through a printing-based process could fail since the printing could not reproduce the dichroism of the fibers and even fluorescence could be difficult to achieve. Therefore, at higher levels of authentication, the fluorescent dichroic fiber pattern is detected and achieved during the initial processing thereof (i.e., before the label is circulated). When a particular label is examined, a detector can be used to ensure the position of the fibers within the paper, as well as its dichroism, eg, polarization angle,?. A three-dimensional authentication mechanism (it is g | & í ?? ^ g ^^ fgi g ^ t ^ y, x, y,?), therefore, can be easily provided using an imaging device, such as a CCD imaging arrangement | with associated polarizers. This CCD imaging arrangement may be a linear sweep area or array arrangement, the latter requiring a separate sweep system. The polarimeter can include fixed or rotating (variable) polarizers. At a higher level of security and authentication, the tag marked is measured before it is circulated to record the trajectory (x, y), ?? x, y (angle of polarization at the wavelength? at a position x, y) A ?? x, y (specific absorption at the wavelength? in a position x, y), physical arrangement of the fibers within the medium (eg, label). It could be very difficult to duplicate these parameters. This data, or a subgroup thereof, is formulated as a text message only and is encrypted in encrypted text by an encryption algorithm, such as the 56-character triple DES encryption algorithm or the secure, public or private key algorithm. of private key. In the first case, authentication requires a secure and reliable part, which contains a symmetric key. In the latter case, the public key is published and can be used to decrypt the message in order to determine if it corresponds to the characteristics of the tag. Apparatus Fig. 2, shows a schematic representation of a detector suitable for use in an authentication system of ^^^^^^, ^^^^, _ in accordance with the present invention. This unit can be used both to read the patterns of the indicator fibers during production (ie, to achieve the purposes), and / or to provide detection of the fibers in the medium during the authentication of a specimen. Figure 3 shows an authentication only mode. The circularly polarized radiation from a source 39, such as a laser beam, flash lamp, or light-emitting diode at maximum absorption of the dye expands and focuses on the label 40. The fluorescent radiation emitted by the fibers is collected by a lens 38, isolated with a bandpass filter 41 at the fluorescent wave length and the image formed by a CCD imaging system, which in this case includes a crystal of calcite 37 (birefringent crystal) to separate the light from the differential polarization and two CCD imagers 35, 36. Alternatively, a moving or rotating polarizer or pair of crossed polarizers may be present in the light source or in the imager to allow resolution of the polarization axis for that each fiber is analyzed or for a small region of the label 40 which may contain any number of fibers. In fact, any known dichroism detection system can be employed. The fibers or areas are then mapped by location, fluorescent intensity and polarization angle. In another modality, an online scanner is provided with a resolution of, for example, 300-1200 dpi. Therefore, the technology It is similar to the one used. The technology is similar to that used in facsimile machines and manual image scanners. However, between the label 43 and jgj optical line scanner (not shown) a unfofflarizer is peeled, which moves in synchrony with the relative movement of the tag 43 and the optical line scan sensor. This polarization mechanism effectively provides two different polarization states for reading the fibers, allowing the calculation of a polarization axis. Where multiple optical wavelengths are measured, the illumination wavelength varies and / or the different filters are removed or provided with adequate replacements. The filters, in this case, can be integral with the detector, for example, allowing the use of a normal type color CCD or CMOS image detector. In this case, it is preferred that the wavelengths, e.g., fluorescent emissions, correspond to the filters used in the normal type sensor. A normal algorithm for determining the polarization angle for each data point is Signal = (D2-D1) / (D2 + D1) where D2 is the intensity of the parallel polarized light and D1 is the intensity of the perpendicular-polarized light . The absolute value of the signal is compared to a threshold value, which is defined by the anisotropy of the fiber and its local environment on paper. The sum of D2 and D1 will also be compared against a threshold value to ensure that the information is due to fluorescence (or ü? sia .._ ^ zássse t luminescence) and not due to the antecedent signal or detector noise. This allows to measure the variations in dichroism along the length of the fiber, especially where a binary pattern is represented. To designate a detection system based on fluorescent dichroic fibers, the fluorescence intensity of the paper (medium) in relation to the fiber establishes the optimum pixel size in the image; the reinforcement signal increases with the area of the pixel while the fiber emission signal increases with the linear dimension of the pixel. For example, an effective pixel dimension of 0.3 x 0.3 mm can provide an acceptable signal-to-noise ratio. It is noted that when a high pass is not required, the image signal will be averaged over a number of lighting cycles, reducing a non-specific noise and allowing a more accurate detection of dichroism; however, the reinforcement fluorescence is a signal and will not be removed on average. On the other hand, the reinforcement is normally not dichroic, so that repeated or long-time measurements can allow sensitive measurements of the polarization angle. When the optical sensor has a pixel size smaller than the desired effective pixel dimension, a certain number of real pixels can be added to give an effective pixel. However, it is observed that mathematical operations more complex than the sum can be used to obtain superior quality results. In addition, if the optical sensor has a resolution higher than that required for most readings, an adapter algorithm can be used to optimize data acquisition and analysis.
When a laser is used to illuminate the fluorescent dichroic fibers, the photon power required, Ps? The head of the laser is given by the equation: Ps = SdNd / AcQcdffalcOc, where: S is the power of the photon per detector element, Nd is the number of detector elements, Ac is the probability of the absorption of photons by the fluorophore , Qc is the quantum efficiency of the fluorophore, df is the fraction of light collected by the optics of the detector, fa is the fraction of the pixel area occupied by the fiber, lc is the transmission efficiency of the optical input system, Oc is the transmission efficiency of the detector's optical system. Assuming that the reinforcement signal should be at least 10X the square root noise measured from the detector and preamplifier and 005 as the probability for Ac and Qc, we obtain a value of approximately 1 watt for Pc. With the temporary average, average power lighting sources can be used, while the reading step is maintained, for example, approximately 5 to 60 readings per minute. Lesa power is Aifcai ^^ a ^ ¿^ g ^^^ ¡. ^ j | readily available commercially available lasers, such as argon-ion lasers, krypton and diodes. Self-authentication code In a modality, the marks are encrypted using a code 5 of own authentication, and therefore are processed with a key, v. gr. , a public key, to determine the authenticity. When the current characteristics of the tag and the object are part of the encrypted message, the decrypted message is compared with the current characteristics of the tag and the object. Thus, authenticity can be determined. Alternatively, the marks can include a code that identifies the object, allowing the retrieval of information that refers to the work piece of a database, which can be local or remote. The database therefore stores the characterization information. 15 As shown in Fig. 2, a microcomputer 20 receives the signal from the CCD sensors 35, 36. These optical signals are processed according to a program, which can be stored in random access memory 21, read only memory 22 or ensure memory 23. To generate an encrypted message, the keys are stored in secure memory only and are not transmitted in a way that could allow interception or external reading. In fact, secure memory 23 may also include an encryption processor, which receives the clear text message and returns an encrypted text message. The secure memory module 23 receives the input of an alteration sensor 23 and a surveillance sensor 28.
^^^^^^^^^^ M ^^^: ^, ..,. , ^ ^ "^. ,, _ If any of these sensors detects an error condition, v. gr. , the alteration or lack or recent reauthorization, control the secure memory to erase (lose) its content, especially the encryption key. The microcomputer 20 also receives 5 inputs from these sensors. The encrypted message is transmitted by the microcomputer 20, through an interface, to the certificate printer 34, which in this case, is an ink jet printer, which produces a bar code 9 and pattern of faucets 10 in the label 40. The microcomputer 20 also provides an interface of the user 30 having an LCD screen and a keyboard 32 to allow, for example, the entry of user authentication and authorization codes and for various types of programming. An accounting system 24 is provided, having its own secure memory 25, to allow secure transactions and provide audit capacity. For example, the device may be authorized for a number of label impressions 40 between reauthorizations by a central control system. Therefore, it is preferred that the coding device has a communication device, e.g. , modem 26, for communication with a system to reset the time control of the surveillance sensor 28 and provides the proper count and limitations in the use of the device. In the case of manipulating the security memory 25 of the accounting system, it stores its contents and blocks the substantial operations of the device.
^^ ... MtMMiir ^ É ^ l ^^^^^^^^ ai ^ In a second mode, the authentication process involves a remote system. Therefore, the marks are transmitted to a central system. The characteristics of the label and the object are read or extracted and also transmitted to the central system. The central system 5 then authenticates marking and features, for example, against a stored database of features and the tag and object marked. The result of the authentication is then transmitted to the remote site. As shown in Fig. 3, a device is shown authentication, which lacks the printing capabilities. In this case, the scanner 44 shown is of an in-line scan type, instead of the type of area sensor shown in Figure 2. In the in-line scan sensor, it is usually slower than an area sensor, but potentially less complex in construction and less expensive. This on-line scan sensor can also be used to read the message encrypted on the tag 43. The signal from the optical sensor within the scanner 44 of the reading of the encoded tag 43 is received by a microcomputer 45, which is associated with a random access memory 46 and a single memory reading 47. As in the modality according to Fig. 2, a secure memory 52, stores the decryption keys. In the case of an asymmetric encryption algorithm, the keys may differ from those employed by the encoding device and may also be permissibly stored in a less secure manner.
A manipulation sensor 53 and surveillance sensor 54 monitor ^^. ^^^^ - ^^^^ ¿¿^. ^ .. ^ r the physical and electronic use of the device in an attempt to forge a label or to use the device without continuous authorization. An accounting system 55 is provided, which, in contrast to the mode of Fig. 2, does not require a highly secure memory. The accounting system, which may be a software construction of the microcomputer 45, monitors the user, use and optionally false label readings. A modem 56 is provided for communication with a central system, so that it loads data from an accounting system 55 and obtains continuous authorization by resetting the time control of the surveillance sensor 54. A user interface 48 optionally includes a security screen. LCD 51, a keypad 50 and an alarm 44 or other output to indicate a state of the device, such as an authentic tag, a forged tag, a badly read tag and the like. Figure 4A shows a flow diagram detailing the operation of the coding device. When initiating an operation 100, the device first performs a self-diagnosis 101, which includes reviewing memory corruption, sensor failure, time out of the monitoring time control and manipulation. If the system approves the self-diagnosis, then the user 102 is authenticated, and the dichroic fiber pattern is read on the label 103. The system then generates an encrypted message encompassing a description of the dichroic fiber pattern 104, which is printed on the tag 105. The transaction data is then recorded in an accounting database 106. Optionally, the image and / or message is stored in a database 107. The system then returns to a ready state for the next operation 108. Fig. 4B shows a flow diagram detailing the operation of the authentication device. When initiating an operation 109, the device first performs a self-diagnostic 110, which includes checking for memory corruption, sensor failure, time out of the monitoring time control or manipulation. If the system approves the self-diagnosis, the user then authenticates 111, and security routines are performed to detect the inappropriate use of the device, such as repeated attempts to authenticate an invalid or falsified tag 112. The pattern of the dichroic fibers in this tag 113. The system then reads an encrypted message from the tag 114, and compares the detected dichroic pattern with the encoded message 115, which is decoded internally to the authentication device. The processor within the authentication device then determines a trustworthiness of the authentication 116 and gives an indication of the authentication 1187. When the high reliability authentication fails, the security routines 112 are executed, to avoid the use of the device in order to generate false labels or in some way override the security provided. The system then returns to a state ready for the next operation 118. Modulated Point Limits The presence or absence of pixel markings in a set of coordinate locations generally defines the data pattern, while in more complex coding schemes, the data brand is not limited by the pixel limits. In this case, the marks are separated discontinuously or partially overlapping, so that a contour or partial contour of each marking point can be identified. Due to incidental processes, the actual placement of the center of a mark, or its resulting outline, may vary. However, the imposed modulation pattern may be larger in amplitude than the noise, or a differential coding technique employed so that the noise is compensated. Therefore, an array of points is formed at coordinate positions generally, with the exact positions modulated according to a pattern. In this case, without knowing the modulation scheme, it would be difficult to read the code, thus making it difficult to copy the code. Furthermore, to the extent that the amplitude of the noise is close to the obvious accuracy of the marking device, it can be very difficult to implement a copying system because very high precision is required. It is observed that, to the extent that the random characteristics of the marking are coded, for example, a pattern of ink absorption by paper fibers, the original marking system does not need to have the high precision detected by the detector, while the actual pattern is finally encodes on the label, for example, by an additional message after a primary message is printed and analyzed. ^ ^ ^^^^^^^ g ^^ systemYes Forgery This tag and reader authentication are combined to form a high security to prevent forgery in a wide range of applications. Billions of dollars are requested every year due to fraudulent copying or unauthorized manufacturing from clothing and clothing items to DC and software. The present system allows instant field verification of labels while maintaining a high level of security against counterfeiting making the reverse engineering process extremely difficult and expensive. Neither of two labels are the same, they can also be produced very economically. The authentication tag system comprises a sheet of material, impregnated with dichroic fibers containing a fluorescent dye. The fiber pattern, which is random (irregular), is illuminated by a special light and read by a scanner during the production process. A code number representing this pattern is then printed on the label, along with, for example, manufacturing information such as serial number, date, location, lot number, notification trademark, and other product information . The code is based on a secure algorithm, with specific coding for each manufacturer using the tag system. In the field, an inspector may validate the pattern (authenticate the label) with a manual scanner. The label is only authentic if the scanner determines that the characteristics of the label and annexed items corresponds to the code printed on the label, which may be, for example, displacement of a number, which is manually compared with the printed code. Alternatively, the scanner can read the code and 5 provide a pass / no pass indication. For example, you can also add a bar code to make the validation process completely automatic. The production of a false label requires duplication not only of the length and width of the dichroic fibers and the dye fluorescent, it also requires duplication of the location of fibers and orientation of dichroism or knowledge of the coding algorithm, which remains a secret. Image Processing The pattern scanned on the certificate is captured as a As the set of pixels is represented internally in the image processor projected on a surface, said surface is not necessarily restricted to a flat sheet. This processor can provide a raster to vector conversion process. An image of the printed code is also formed and captured by the Processor 20, for example, optical character recognition, barcode recognition, pattern recognition, logreader magnetically encoded ink (RCMT), or other known means. The projected image is then compared with the ideal image represented by the code printed on the certificate.
An incidental analysis was made of the types and magnitudes of any deviation, as well as correlations of deviations from the ideal. Deflection pattern, and any other deviation of coded patterns which, for example, represent lost or obscured fibers, noise, pollution with interfering substances, errors or interference in the original encoding process, etc., used to determine a probability that the certificate itself corresponds to the originally coded certificate. Therefore, the determined authenticity is associated with a reliability of the same, based on random variations in the properties of the authentication certificate and the random variations in the code generation associated security. A threshold can then be applied to define an acceptable error rate (false positive and false negative) in the authentication process. Authentication reliability or a pass / fail indication is then produced. In order to avoid the requirement to encrypt all or a substantial portion of a certificate image, the medium can be subdivided into a plurality of regions, each region associated with a vector, which, for example, is two-dimensional or of larger dimensions. The vector, which represents an irreversible compression of data derived from the region, is then encoded and encrypted in the encrypted message. For verification, the mapping of the vector is decrypted and decoded of the registered message. The medium is then scanned and an analogous vector mapping of the newly scanned image is derived. The registered vector map is compare with the map of the vector measured, allowing a correlation to be determined. In this case, given the large number of degrees of freedom, eg a polarization vector for each region or zone can be tolerated even relatively large deviations between maps vector registered and measured in the authentication process. Therefore, an initial alignment and unwinding correction algorithm can be used to initially align regional boundaries in order to achieve maximum cross-correlation. Said algorithms and image processing systems are known in the art. Cross-over 0.1 tenths or hundreds of degrees of freedom, correlation may be sufficient to allow highly reliable authentication with a low number of false positives and false negatives. The tag can therefore be subdivided into a plurality of zones, each associated with an encrypted portion of code. In this case, given that each subdivided zone is single, any zone or set of zones with sufficient degrees of freedom can be used to authenticate the entire tag. When the zones are small or have a limited number of degrees of freedom, the reliability of the authentication of the entire label by any zone may be insufficient. Therefore, a plurality of zones can be authenticated, each zone authenticated, adding to the reliability of the resulting authentication. Any zone that can not be authenticated can also be weighed in the analysis, although usually with a lower weight than the areas that are authenticated correctly.
Ggg ^ ^ = ^^^^ ^^ So have been shown and described novel receptacles and novel aspects of counterfeiting systems, which meet all the objectives and advantages sought therefor. However, it is evident many changes, modifications, variations, combinations, subcombinations and other uses and applications of the present invention, to those skilled in the art after considering this specification and the accompanying drawings which describe preferred embodiments thereof. All such changes, modifications, variations and other uses and applications which do not stay the spirit and scope of the invention are considered covered by the invention which will be limited only by the following claims.

Claims (42)

  1. CLAIMS 1. An authentication system comprising: (a) a medium having a plurality of elements, each element having an irregularity selected from the group consisting of one or more of an irregular spatial arrangement and an irregular feature and having a determinable attribute different from a two-dimensional chromoluminescent map; (b) a detector, detecting the attribute and position, with respect to a position reference, of the plurality of elements, including the irregularity; (c) a processor for generating an encrypted message including at least a portion of the attribute and position of the plurality of elements, including a description of the irregularity; and (d) a registration system for recording the encrypted message in physical association with the medium. The system according to claim 1, wherein the irregularity of the plurality of elements comprises an irregular arrangement of elements in the middle. The system according to claim 1, wherein the irregularity of the plurality of elements comprises an irregular characteristic of a respective element. The system according to claim 1, wherein the irregularity of the plurality of elements comprises both an irregular arrangement of elements in the medium and an irregular characteristic of each respective element. 5. The system according to claim 1, wherein the attribute comprises a directional vector of a characteristic of a respective element. The system according to claim 1, wherein the detector detects a mapping of location vectors and an associated directional vector of the elements. The system according to claim 1, wherein the encrypted message is coded in such a way that the encrypted portion of the respective attribute and position can be retrieved from it. The system according to claim 1, wherein the encrypted message is encoded in compressed form to prevent complete decoding of the respective attributes and positions of the elements. The system according to claim 1, wherein the means is logically subdivided into a plurality of regions, wherein a respective attribute and position of the plurality of elements is separately detected and coded for each region, as a basis to form the encrypted message. The system according to claim 9, wherein the encrypted message incompletely defines a mapping of respective positions and associated attributes of the plurality of elements, wherein a separate code is generated from each region of the medium, defining a mathematical function of positions and "> has" < < < ^ > > * "A" 'associated attributes of the plurality of elements within said region. The system according to claim 1, further comprising a processor for determining a correspondence of the recorded encrypted message and a detected attribute and position of the plurality of elements. The system according to claim 1, further comprising a processor for determining a correspondence and an associated trustworthiness of the registered encrypted message and the detected attribute and position of the plurality of elements. The system according to claim 1, wherein the plurality of elements comprises dichroism of fiber display, the attribute comprising an optical polarization angle. The system according to claim 1, wherein the plurality of elements comprises dichroism of fiber display, the attribute comprises an optical polarization angle, the irregularity comprising a variation in a selected characteristic of one or more of the group consisting of of the intensity of dye and dichroism over the length of the fiber. The system according to claim 1, wherein the plurality of elements comprises dichroism of fiber display, the attribute comprising an optical polarization angle, and wherein the medium comprises a woven mesh in which the elements of fibers. 16. The system according to claim 1, wherein the elements comprise dichroism of fiber display, the attribute comprising an optical polarization angle, wherein the medium is a fabric that is part of an article of clothing. The system according to claim 1, wherein the medium comprises a non-woven sheet, wherein the element comprises dichroism of fiber display and a variation in dye intensity. 18. The system according to claim 1, wherein the medium comprises paper. 19. The system according to claim 1, wherein the elements are deposited in the medium by a printing process. The system according to claim 1, wherein the processor also receives a parameter, different from the elements, referring to an object associated with the medium and encrypts the message based on the detected tribute and respective position of the plurality of elements and the parameter. The system according to claim 1, wherein the object and means each comprise woven fabric, the element comprising a dichroism that exhibits fiber and the attribute being an optical polarization angle of the fiber, wherein the processor additionally receives a physical parameter that refers to an object associated with the medium and encrypts the message based on the detected attribute and respective position of the plurality of elements and the parameter. 22. The system according to claim 1, wherein the element comprises dichroism of fiber display and the attribute comprises an optical polarization angle, wherein the dichroism is exhibited at characteristic wavelengths of a dye within the fiber, wherein A concentration of colorant varies over the length of the fiber. 23. The system according to claim 22, wherein variations in fiber dye concentration are effected by varying a dye concentration over the length during fiber formation. 24. The system according to claim 22, wherein variations in fiber dye concentration are effected by altering the dye concentration after fiber formation. 25. The system according to claim 24, wherein the dye concentration of the fiber is altered by a bleaching process. 26. The system according to claim 1, wherein the elements comprise dichroism of fiber display and the attribute comprises an optical polarization angle, wherein the optical polarization angle varies over the length of a fiber. 27. The system according to claim 26, wherein the variations in the optical polarization angle are effected by a mechanical deformation of the fiber. 28. The system according to claim 26, wherein the variations in optical polarization angle are effected by a thermal process applied to a formed fiber. 29. The system according to I to claim 1, wherein the processor encrypts a plurality of messages, the plurality of messages differing in degree of algorithm respecting calculation complexity. 30. The system according to claim 1, wherein the processor stores an encryption algorithm in a volatile memory and further suppresses the contents of the volatile memory upon detection of an attempt to access or unauthorized use of the processor. The system according to claim 1, wherein the processor is associated with an identification, wherein the encrypted message further includes the associated identification. 32. The system according to claim 1, wherein the plurality of elements comprises fluorescent dichroic fibers having a fluorescent dye within a polymeric matrix, selectively absorbing the light having a first wavelength and fluorescent light having an angle. of characteristic polarization at a second wavelength. 33. The system according to claim 1, wherein said irregularity includes a degree of freedom that can not be characterized by a circularly polarized light sensor. 34. An authentication system comprising: (a) an authentication certificate that has anisotropic optical properties; (b) a security code associated with the authentication certificate defining the anisotropic optical properties based on a received input characterizing the anisotropic optical properties; (c) an optical system for reading the anisotropic optical properties of the authentication certificate; and (d) a processor for comparing the anisotropic optical properties read from the authentication certificate with the associated security code to determine an authenticity of the authentication certificate, the authenticity being associated with a reliability of the same, based on: random variations in the anisotropic optical reading properties of the authentication certificate; and random variations in the received input used to generate the associated security code. 35. The system according to claim 34, wherein the security code is a public key / private key authentication code. 36. The system according to claim 34, wherein the anisotropic optical properties are imparted to the certificate by visible dichroic fibers. 37. The system according to claim 36, wherein the dichroic fibers vary in one or more characteristics selected from the group consisting of the optical polarization angle, variations of the polarization angle over length, dye concentration and dye concentration variations. over length. 38. A method for authenticating a means, comprising: (a) providing a medium having a plurality of elements, the elements being distinct, detectable and irregular, each element being characterized by a determinable attribute other than a two-dimensional absorption coordinate representation simple optics or simple optical reflection intensity; (b) detecting an attribute and position of the plurality of elements, with respect to a positional reference; (c) generating an encrypted message including at least a portion of the attribute and position of the plurality of elements; and (d) registering the encrypted message in physical association with the medium. 39. The method according to claim 38, further comprising the steps of: reading and decrypting the message in physical association with the medium, detecting a second attribute and second position of the plurality of elements, with respect to a second positional reference; Y & h ^ t- ^ x s - ^. and compare the attribute portion and position of the plurality of message elements with the second attribute and the second position of the plurality of elements. 40. The method according to claim 39, further comprising the step of determining a reliability of a roasted authentication in statistical tolerances. 41. The method according to claim 38, wherein the attribute is different from a two-dimensional coordinate representation of independent absorption of optical polarization or reflection intensity independent of optical polarization. 42. a method for authenticating a medium, comprising the steps of providing a plurality of optically complex, irregular elements in the medium; detecting an optically complex attribute and associated position of the plurality of elements; generating an encrypted message including data describing the optically complex attribute and associated position of the plurality of elements; store the encrypted message; examine the medium after storing the encrypted message to determine the characteristics thereof; and compare the stored encrypted message with characteristics of the medium.
MXPA/A/2000/003119A 1997-09-30 2000-03-29 System and method for authentication of goods MXPA00003119A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60/061,398 1997-09-30
US09110315 1998-07-06

Publications (1)

Publication Number Publication Date
MXPA00003119A true MXPA00003119A (en) 2001-12-04

Family

ID=

Similar Documents

Publication Publication Date Title
AU734643B2 (en) System and method for authentication of goods
US11924356B2 (en) Authentication method and system
US10019586B1 (en) Authentication method and system
US10089478B1 (en) Authentication method and system
US10291411B1 (en) Authentication method and system
US7152047B1 (en) System and method for production and authentication of original documents
CN101505220A (en) System and method for authentication of goods
MXPA00003119A (en) System and method for authentication of goods
Fraser Exploiting Random Patterns of Optically Readable Materials to Ensure Authentication of Documents, Media & Substrates