WO2021229317A1 - A system that allows the testing and examining of the originality of the manufactured product - Google Patents

A system that allows the testing and examining of the originality of the manufactured product Download PDF

Info

Publication number
WO2021229317A1
WO2021229317A1 PCT/IB2021/052687 IB2021052687W WO2021229317A1 WO 2021229317 A1 WO2021229317 A1 WO 2021229317A1 IB 2021052687 W IB2021052687 W IB 2021052687W WO 2021229317 A1 WO2021229317 A1 WO 2021229317A1
Authority
WO
WIPO (PCT)
Prior art keywords
watermark
authenticity
test code
pixel
originality
Prior art date
Application number
PCT/IB2021/052687
Other languages
French (fr)
Inventor
Serra DEMİR
Mete KAYALAR
Original Assignee
Cosmodot Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cosmodot Inc filed Critical Cosmodot Inc
Publication of WO2021229317A1 publication Critical patent/WO2021229317A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • G07D7/0053Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings added to a pattern, e.g. interstitial points
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2008Testing patterns thereon using pre-processing, e.g. de-blurring, averaging, normalisation or rotation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2033Matching unique patterns, i.e. patterns that are unique to each individual paper

Definitions

  • the present invention relates to a system that allows the originality of the manufactured physical or digital products to be a hundred percent tested and examined by the product manufacturer and purchaser.
  • UV fluorescent products which are used to test counterfeiting, can perform the examination of hidden thread, hidden line, hologram and micro letters for a long time. This situation creates a disadvantage for the test and examination processes.
  • the invention aims to be created by being inspired by the current situations and to eliminate the disadvantages mentioned above.
  • the aim of the invention is to provide a system that allows the originality of the manufactured physical or digital objects to be tested and examined a hundred percent by the product manufacturer and purchaser.
  • Figure 1 is a schematic view of the system of the invention.
  • the present invention relates to a system (1) that allows the originality of the manufactured physical or digital objects to be tested and examined a hundred percent by the product manufacturer and purchaser.
  • the system (1) of which the schematic view is given in Figure 1 , comprises;
  • an image forming device (2) that creates a unique digital watermark (B) for a physical or digital object (A), adds the authenticity test code to this watermark (B) and places this watermark (B) on the object (A) and
  • a test device (3) which comprises an authenticity code added to the watermark (B) by the image forming device (2) in its library, which scans the object (A) to test if there is a watermark (B) or not, which generates a originality test code from the watermark (B) in case it finds a watermark (B), which decides whether the object (A) is original according to whether the originality test code matches the authenticity test code in its library.
  • the system (1) of the invention relates to the manner the unique digital watermark (B) is added to the physical or digital objects (A) and how the originality of these objects (A) can be tested.
  • the system (1) of the invention comprises an image forming device (2) adapted to perform the steps of; o adding the watermark (B) containing the authenticity test code to the physical or digital object (A), o creating pixel gaps corresponding to the authenticity test code, depending on whether there are multiple layers in the areas in the image used to produce the object (A), and o adding pixel gaps on top of each layer and between layers and a test device (3) adapted to perform the steps of; o scanning the physical or digital object (A) to which the unique digital watermark (B) is attached, o revealing the pixel gaps added to the object as a result of scanning, o generating the originality test code using numbers matching multiple pixel gaps, o comparing the created originality test code with the authenticity test code in the library and o deciding whether the object is original or not as a result of the comparison.
  • the object (A) stated in the system (1) to which the unique watermark (B) is added to can comprise documents, papers and currency notes.
  • the authenticity test code used in the system (1) of the invention refers to the code used to inspect a product to see if there is any case of counterfeit.
  • Such an authenticity test code can be made of a plural of binaries.
  • an authenticity test code can be 02011 , 02111 .
  • the image forming device (2) adds the authenticity test code to the watermark (B) and afterwards it places the watermark (B) to the object (A).
  • image forming device (2) creates more than one rows in the area to which the authenticity test code is added.
  • the image forming device (2) creates the pixel gaps that correspond to the authenticity test code and then adds these pixel gaps on and/or between multiple lines in the authenticity test code.
  • the image forming device (2) decides whether the corresponding binaries of the authenticity test code are 1 or 0, and then it creates a pixel space consisting of the corresponding preset number of points, respectively, and adds it to the authenticity test code.
  • the image forming device (2) generates authenticity test codes corresponding to the data to be inserted into different sized pixel gaps and places these into the area where the unique digital watermark (B) is added.
  • the image forming device (2) enlarges the image and adds the pixel spaces created according to the authenticity test code between and over multiple layers.
  • the image forming device (2) makes the pixel spacing preferably 0.00003 mm in size and adds invisible colors (for example light yellow) to the authenticity test code. Since the pixel gap is added by enlarging the image, the pixel consisting of very small dots does not appear when the image returns to its original size. [0028] When a malicious user wants to copy the object (A), the object (A) and therefore the pixel gaps will be eroded. Even if the malicious user copies the pixel gaps, this copying can be easily understood by the test device (3) due to the fact that these gaps will be worn out in the process.
  • invisible colors for example light yellow
  • test device (3) scans an object (A), it segregates the pixel gaps that are in more than one layer of the watermark (B) and generates an originality test code according to these pixel gaps.
  • the test device (3) determines binary values for different pixel gaps and then it generates an originality test code (for example 02011 , 02111 ) by using these binary values.
  • test device (3) In cases where the originality test code does not match the authenticity test code stored in the library of the test device (3), the test device (3) defines the object (A) as counterfeit. If there is a match between these two codes, the test device (3) defines the object (A) as original.
  • Examples of how the system can be adapted for various printed objects are provided below.
  • copy detection technology such as fragile watermarks, authentication hashes embedded in the watermark, or special authentication keys used to generate the watermark can be used to authenticate the printed object.
  • the watermark can carry information used for accessing information in a database or computer network as described above or for indexing.
  • the system can be used to generate print stock certificates and bonds with copy detection watermarks to verify their authenticity.
  • decoding systems can use the identifier embedded in the watermarks in the documents to connect to the database where the information is stored to verify the document and / or its owner.
  • the database can be updated to associate the current owner and other transaction information with the identifier embedded in the document.
  • the database management system can keep a record of when, where and by whom the document was submitted for authentication, and can generate detailed reports that provide this transaction information.
  • the system can be used to perform similar functions for visas and passports as well.
  • the database can be used to store information about the visa or the carrier of the passport, such as a photo, unique user identifier, or other information.
  • the decoder extracts information from the watermark and compares it with authentication credentials elsewhere in the document or database. If the information does not match, it is revealed that the passport or its holder is not valid.
  • the passport can be linked to a unique database entry via an embedded identifier in the watermark. For example, border control personnel can compare a photo which is obtained from the database with the person carrying the document for the purpose of verifying the identity of the passport holder.
  • the system can be used to verify and manage legal documents such as contracts, certificates of ownership and titles.
  • the watermark can connect to a database via the identifier for additional information about the document in the database. This information can be contact information for the contracting parties, version control information that indicates whether the contract is the most up-to-date and valid document in a respective set of documents, verification information regarding if a contract document is fully executed by all parties, etc.
  • the system provides an efficient way to verify debit and credit card statements.
  • the identifier extracted from the watermark in the statement can access personal financial records, account information, etc. This enables the user to display the statement to a digital camera or scanner in a decoding system and automatically link it to relevant financial records and account status information. Private user information provided by the user or embedded in the watermark can be used to generate an access code to access database records.
  • the system can be used to print and verify various transport cards and tickets, such as a single or multiple-use bus or train tickets, airline tickets and airline boarding passes.
  • the copy detection watermark is used to authenticate the passing.
  • the watermark load can be used to authenticate the user. For example, the user enters a code into a check-in or verification terminal, then this terminal compares the code with the information in the watermark load or the information linked to the pass through the watermark in the pass. If the user information entered by the user matches the authentication information on the card or in the database connected with the watermark, the terminal considers the user valid.
  • the transition can be associated with a series of transitions or travels through the identifier embedded in the watermark. Each time the pass is used, the watermark is decoded and the corresponding number of passes connected to the object via the watermark is reduced. The identifier in the watermark links the object to a database that stores information about the object, including the number of available passes.
  • the system can be used to validate event tickets and their users, as described above.
  • the watermark can be used to provide a link to additional information about a general event or ticket-specific events.
  • the system can be used to verify the identity of documents such as diploma, certificate of expertise, professional licenses and alike.
  • the system can be used for the verification of the document carrier.
  • the system can be used to verify the identity of permit documents such as building licenses and inspection permits.
  • the watermark may also contain an identifier that provides a link to a registry database that contains more information about the project to which the permit relates.
  • the system can be used to create and verify a variety of personal cards, such as voter registration cards, library cards, phone cards, financial cards, insurance cards, identification cards with photos and other membership cards (health club, etc.).
  • the decoding system can also be used to control access to certain places or things. For example, the system can verify a voter card and the voter in the voting booth. In addition to this, the system can keep a record of the votes to prevent any voter from voting multiple times.
  • the watermark on the library card can also be used to connect the user to a database of book return / delivery transactions and to inform the user when items are due.
  • the system can be used in product security applications for the authentication of clothing and commercial labels, authenticity certificates, etc.
  • the watermark may contain an identifier that links to a database entry or website with product information. It may contain information such as warranty information, user instructions, options to purchase respective products and accessories, etc.
  • the use of watermarks for product safety and information contacts also applies to the product packaging and the products themselves.
  • Fragile digital watermarks can be used to examine the status of a digital image regarding if it has been changed or not. Flowever, such applications do not cover situations where such photos are printed and stored in a physical file.
  • the system described above can be used to embed authentication watermarks in such images before they are printed.
  • the authentication watermark can be used to authenticate the printed image as well as connect to a database where an intact digital copy of the image is securely stored. This also applies to the printing of digitally taken insurance photographs, the printing of evidence photographs (crime scene, etc.) and various other applications.

Abstract

The invention relates to a system (1) that allows the originality of the manufactured physical or digital objects to be tested and examined a hundred percent by the product manufacturer and purchaser. The system comprises an image forming device (2) which creates a unique digital watermark (B) for a physical or digital object (A) and a test device (3) which decides whether the object (A) is original or not based on the authenticity test code in the said watermark (B).

Description

DESCRIPTION
A SYSTEM THAT ALLOWS THE TESTING AND EXAMINING OF THE ORIGINALITY
OF THE MANUFACTURED PRODUCT
Technical Field
[0001] The present invention relates to a system that allows the originality of the manufactured physical or digital products to be a hundred percent tested and examined by the product manufacturer and purchaser.
Known State of the Technique
[0002] Recently, as the economy continues to deteriorate, picture resolution has improved significantly, due to the fact that the performance of image -forming devices such as computer scanners, color printers, color copiers, laser beam printers and digital cameras greatly improved.
[0003] Today, in parallel with the development of such devices, a gradual increase is observed in the production of counterfeit money and products.
[0004] In order to prevent the production of counterfeit money and products; paper types that can be hardly imitated by ordinary people are being used. In addition, duplication and reproduction are prevented by creating hidden images and partial imitations.
[0005] In addition, different methods are used to prevent counterfeiting, such as a hologram, in which variations are recorded depending on the viewing angle of patterns and colors, intaglio printing felt at certain points when touched by hands, and micro letters that appear clearly when examined but rarely appear in copies.
[0006] UV fluorescent products, which are used to test counterfeiting, can perform the examination of hidden thread, hidden line, hologram and micro letters for a long time. This situation creates a disadvantage for the test and examination processes.
[0007] In literature, the patent application document with number TR2016/15086 describes a counterfeit product prevention system that aims to protect the producers and consumers against counterfeit products by verifying the originality of all kinds of raw, semi and final products produced in the world market with individual controls, which comprises a data recording centre, a smart device for reading data, and a product barcode. Invention mentioned in the said document has differences with the application of this description in terms of the devices and technology used.
[0008] The systems used today do not offer a structure that allows the unique digital watermark to be attached to physical or digital objects and the authenticity of these objects to be tested. In addition, existing implementations also do not offer a solution that tests authenticity based on whether the pixel gaps added between the layers of the unique watermark added to the objects are worn out or not.
[0009] Consequently, a development in the technical field is required due to the disadvantages mentioned above and the current applications being insufficient to solve these problems.
Aim of the Invention
[0010] The invention aims to be created by being inspired by the current situations and to eliminate the disadvantages mentioned above.
[0011] The aim of the invention is to provide a system that allows the originality of the manufactured physical or digital objects to be tested and examined a hundred percent by the product manufacturer and purchaser.
[0012] The structural and characteristic features of the invention and all its advantages will be understood more clearly through the figures below and detailed descriptions with reference to these figures. Therefore, the evaluation should be made based on these figures and detailed descriptions.
Brief Description of Drawings
Figure 1, is a schematic view of the system of the invention.
Description of References
[0013] 1. System
2. Image forming device
3. Test device
A. Object
B. Watermark Detailed Description of the Invention
[0014] In this detailed description, the preferred structuring of the system (1) of the invention is explained only for a better understanding of the subject.
[0015] The present invention relates to a system (1) that allows the originality of the manufactured physical or digital objects to be tested and examined a hundred percent by the product manufacturer and purchaser.
[0016] The system (1), of which the schematic view is given in Figure 1 , comprises;
❖ an image forming device (2) that creates a unique digital watermark (B) for a physical or digital object (A), adds the authenticity test code to this watermark (B) and places this watermark (B) on the object (A) and
❖ a test device (3) which comprises an authenticity code added to the watermark (B) by the image forming device (2) in its library, which scans the object (A) to test if there is a watermark (B) or not, which generates a originality test code from the watermark (B) in case it finds a watermark (B), which decides whether the object (A) is original according to whether the originality test code matches the authenticity test code in its library.
[0017] The system (1) of the invention relates to the manner the unique digital watermark (B) is added to the physical or digital objects (A) and how the originality of these objects (A) can be tested.
[0018] The system (1) of the invention comprises an image forming device (2) adapted to perform the steps of; o adding the watermark (B) containing the authenticity test code to the physical or digital object (A), o creating pixel gaps corresponding to the authenticity test code, depending on whether there are multiple layers in the areas in the image used to produce the object (A), and o adding pixel gaps on top of each layer and between layers and a test device (3) adapted to perform the steps of; o scanning the physical or digital object (A) to which the unique digital watermark (B) is attached, o revealing the pixel gaps added to the object as a result of scanning, o generating the originality test code using numbers matching multiple pixel gaps, o comparing the created originality test code with the authenticity test code in the library and o deciding whether the object is original or not as a result of the comparison.
[0019] The object (A) stated in the system (1) to which the unique watermark (B) is added to can comprise documents, papers and currency notes.
[0020] The authenticity test code used in the system (1) of the invention refers to the code used to inspect a product to see if there is any case of counterfeit. Such an authenticity test code can be made of a plural of binaries. For example, an authenticity test code can be 02011 , 02111 .
[0021] The image forming device (2) adds the authenticity test code to the watermark (B) and afterwards it places the watermark (B) to the object (A).
[0022] In case there are not more than one rows in the area to which the unique digital watermark (B) is being added, image forming device (2) creates more than one rows in the area to which the authenticity test code is added.
[0023] The image forming device (2) creates the pixel gaps that correspond to the authenticity test code and then adds these pixel gaps on and/or between multiple lines in the authenticity test code.
[0024] The image forming device (2) decides whether the corresponding binaries of the authenticity test code are 1 or 0, and then it creates a pixel space consisting of the corresponding preset number of points, respectively, and adds it to the authenticity test code.
[0025] By this manner, the image forming device (2) generates authenticity test codes corresponding to the data to be inserted into different sized pixel gaps and places these into the area where the unique digital watermark (B) is added.
[0026] The image forming device (2) enlarges the image and adds the pixel spaces created according to the authenticity test code between and over multiple layers.
[0027] The image forming device (2) makes the pixel spacing preferably 0.00003 mm in size and adds invisible colors (for example light yellow) to the authenticity test code. Since the pixel gap is added by enlarging the image, the pixel consisting of very small dots does not appear when the image returns to its original size. [0028] When a malicious user wants to copy the object (A), the object (A) and therefore the pixel gaps will be eroded. Even if the malicious user copies the pixel gaps, this copying can be easily understood by the test device (3) due to the fact that these gaps will be worn out in the process.
[0029] In a case where an object (A) is produced after the image is restored to its original size, although the pixel gaps added over a line in the area where the unique digital watermark (B) is added can be copied, the pixel gaps added between multiple lines cannot be copied. An attempt to copy these will erode the pixel gaps, as these pixel gaps will be squeezed between layers / lines.
[0030] When the test device (3) scans an object (A), it segregates the pixel gaps that are in more than one layer of the watermark (B) and generates an originality test code according to these pixel gaps. The test device (3) determines binary values for different pixel gaps and then it generates an originality test code (for example 02011 , 02111 ) by using these binary values.
[0031] In cases where the originality test code does not match the authenticity test code stored in the library of the test device (3), the test device (3) defines the object (A) as counterfeit. If there is a match between these two codes, the test device (3) defines the object (A) as original.
Implementations regarding the invention
[0032] Examples of how the system can be adapted for various printed objects are provided below. In each of these cases, copy detection technology such as fragile watermarks, authentication hashes embedded in the watermark, or special authentication keys used to generate the watermark can be used to authenticate the printed object. In addition, the watermark can carry information used for accessing information in a database or computer network as described above or for indexing.
Stocks and bonds
[0033] The system, of which a representative block diagram is given in Figure 1 , can be used to generate print stock certificates and bonds with copy detection watermarks to verify their authenticity. In addition, decoding systems can use the identifier embedded in the watermarks in the documents to connect to the database where the information is stored to verify the document and / or its owner. As the title changes, the database can be updated to associate the current owner and other transaction information with the identifier embedded in the document. In addition, the database management system can keep a record of when, where and by whom the document was submitted for authentication, and can generate detailed reports that provide this transaction information.
Visas and Passports
[0034] The system can be used to perform similar functions for visas and passports as well. In particular, the database can be used to store information about the visa or the carrier of the passport, such as a photo, unique user identifier, or other information. In the verification process, the decoder extracts information from the watermark and compares it with authentication credentials elsewhere in the document or database. If the information does not match, it is revealed that the passport or its holder is not valid. For database applications, the passport can be linked to a unique database entry via an embedded identifier in the watermark. For example, border control personnel can compare a photo which is obtained from the database with the person carrying the document for the purpose of verifying the identity of the passport holder.
Legal documents
[0035] The system can be used to verify and manage legal documents such as contracts, certificates of ownership and titles. In addition to its function of authentication verification, the watermark can connect to a database via the identifier for additional information about the document in the database. This information can be contact information for the contracting parties, version control information that indicates whether the contract is the most up-to-date and valid document in a respective set of documents, verification information regarding if a contract document is fully executed by all parties, etc.
Debit / Credit Card Summaries
[0036] The system provides an efficient way to verify debit and credit card statements. In addition, the identifier extracted from the watermark in the statement can access personal financial records, account information, etc. This enables the user to display the statement to a digital camera or scanner in a decoding system and automatically link it to relevant financial records and account status information. Private user information provided by the user or embedded in the watermark can be used to generate an access code to access database records.
Transportation tickets
[0037] The system can be used to print and verify various transport cards and tickets, such as a single or multiple-use bus or train tickets, airline tickets and airline boarding passes. In these implementations, the copy detection watermark is used to authenticate the passing. In addition, the watermark load can be used to authenticate the user. For example, the user enters a code into a check-in or verification terminal, then this terminal compares the code with the information in the watermark load or the information linked to the pass through the watermark in the pass. If the user information entered by the user matches the authentication information on the card or in the database connected with the watermark, the terminal considers the user valid. In addition, the transition can be associated with a series of transitions or travels through the identifier embedded in the watermark. Each time the pass is used, the watermark is decoded and the corresponding number of passes connected to the object via the watermark is reduced. The identifier in the watermark links the object to a database that stores information about the object, including the number of available passes.
Event tickets
[0038] The system can be used to validate event tickets and their users, as described above. In addition, the watermark can be used to provide a link to additional information about a general event or ticket-specific events.
Diplomas
[0039] The system can be used to verify the identity of documents such as diploma, certificate of expertise, professional licenses and alike. In addition, the system can be used for the verification of the document carrier.
Permits
[0040] The system can be used to verify the identity of permit documents such as building licenses and inspection permits. In addition, the watermark may also contain an identifier that provides a link to a registry database that contains more information about the project to which the permit relates.
Personal cards
[0041] The system can be used to create and verify a variety of personal cards, such as voter registration cards, library cards, phone cards, financial cards, insurance cards, identification cards with photos and other membership cards (health club, etc.). The decoding system can also be used to control access to certain places or things. For example, the system can verify a voter card and the voter in the voting booth. In addition to this, the system can keep a record of the votes to prevent any voter from voting multiple times. The watermark on the library card can also be used to connect the user to a database of book return / delivery transactions and to inform the user when items are due.
Products and Product Labels
[0042] As explained in detail above, the system can be used in product security applications for the authentication of clothing and commercial labels, authenticity certificates, etc. Also, the watermark may contain an identifier that links to a database entry or website with product information. It may contain information such as warranty information, user instructions, options to purchase respective products and accessories, etc. The use of watermarks for product safety and information contacts also applies to the product packaging and the products themselves.
Forensic photographs
[0043] Fragile digital watermarks can be used to examine the status of a digital image regarding if it has been changed or not. Flowever, such applications do not cover situations where such photos are printed and stored in a physical file. The system described above can be used to embed authentication watermarks in such images before they are printed. The authentication watermark can be used to authenticate the printed image as well as connect to a database where an intact digital copy of the image is securely stored. This also applies to the printing of digitally taken insurance photographs, the printing of evidence photographs (crime scene, etc.) and various other applications.

Claims

1. A system (1) that allows the originality of the manufactured physical or digital objects to be tested and examined a hundred percent by the product manufacturer and purchaser, characterized by comprising;
❖ an image forming device (2) that creates a unique digital watermark (B) for a physical or digital object (A), adds the authenticity test code to this watermark (B) and places this watermark (B) on the object (A) and
❖ a test device (3) which comprises an authenticity code added to the watermark (B) by the image forming device (2) in its library, which scans the object (A) to test if there is a watermark (B) or not, which generates a originality test code from the watermark (B) in case it finds a watermark (B), which decides whether the object (A) is original according to whether the originality test code matches the authenticity test code in its library.
2. The system (1) according to claim 1 , characterized by comprising; an image forming device (2) adapted to perform the steps of; o adding the watermark (B) that containing the authenticity test code to the physical or digital object (A), o creating pixel gaps corresponding to the authenticity test code, depending on whether there are multiple layers in the areas in the image used to produce the object (A), and o adding pixel gaps on top of each layer and between layers and a test device (3) adapted to perform the steps of; o scanning the physical or digital object (A) to which the unique digital watermark (B) is added, o revealing the pixel gaps added to the object as a result of scanning, o generating the originality test code using numbers matching multiple pixel gaps, o comparing the created originality test code with the authenticity test code in the library and o deciding whether the object is original or not as a result of the comparison.
3. The system (1) according to claim 1 , characterized by comprising; an image forming device (2) which determines whether the respective binaries of the authenticity code are 1 or 0 and generates a pixel gap comprised of a predetermined corresponding number of points and adds it to the authenticity test code, and which generates the authenticity test codes corresponding to data to be inserted in different sized pixel spaces by this manner and places these to the area where the unique digital watermark (B) is added.
4. A system (1) according to claim 1 , characterized by comprising; an image forming device (2), which makes the pixel spacing 0.00003 mm in size and adds invisible colors (for example light yellow) to the authenticity test code.
5. A system (1) according to claim 1 , characterized by comprising ; an image forming device (2) which enlarges the image and inserts the pixel gaps generated by the authenticity test code between and above multiple layers and which ensures that the pixel made up of very small dots is not visible when the image returns to its original size due to the fact that the pixel gap is added by enlarging the image.
6. The system (1) according to claim 5, characterized by comprising ; a test device (3) which easily determines copying, in case an object (A) is needed to be copied; even if the malicious user copies the pixel gaps because these gaps will be worn out due to wear and tear of pixel gaps that are trapped between layers / lines.
PCT/IB2021/052687 2020-05-12 2021-03-31 A system that allows the testing and examining of the originality of the manufactured product WO2021229317A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TR2020/07383 2020-05-12
TR2020/07383A TR202007383A2 (en) 2020-05-12 2020-05-12 A system for testing and testing the authenticity of the manufactured product

Publications (1)

Publication Number Publication Date
WO2021229317A1 true WO2021229317A1 (en) 2021-11-18

Family

ID=75850406

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2021/052687 WO2021229317A1 (en) 2020-05-12 2021-03-31 A system that allows the testing and examining of the originality of the manufactured product

Country Status (2)

Country Link
TR (1) TR202007383A2 (en)
WO (1) WO2021229317A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100142756A1 (en) * 2008-12-10 2010-06-10 Canon Kabushiki Kaisha Document security method
KR101535534B1 (en) * 2014-08-29 2015-07-13 대한민국 A Creating and Verifying Method Of A Document Having Printed Means Of Preventing From Forging/Manipulating
US20150228143A1 (en) * 2012-09-21 2015-08-13 Orell Füssli Sicherheitsdruck Ag Security document with microperforations

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100142756A1 (en) * 2008-12-10 2010-06-10 Canon Kabushiki Kaisha Document security method
US20150228143A1 (en) * 2012-09-21 2015-08-13 Orell Füssli Sicherheitsdruck Ag Security document with microperforations
KR101535534B1 (en) * 2014-08-29 2015-07-13 대한민국 A Creating and Verifying Method Of A Document Having Printed Means Of Preventing From Forging/Manipulating

Also Published As

Publication number Publication date
TR202007383A2 (en) 2021-11-22

Similar Documents

Publication Publication Date Title
US8059858B2 (en) Identification document and related methods
US8301893B2 (en) Detecting media areas likely of hosting watermarks
US20060157559A1 (en) Systems and methods for document verification
US5635012A (en) System for producing a personal ID card
EP1131769B1 (en) Printing and validation of self validating security documents
US7561308B2 (en) System and method for decoding digital encoded images
JP4071261B2 (en) Method and system using digital watermark
Zhu et al. Print signatures for document authentication
US20090187435A1 (en) Security methods employing drivers licenses and other documents
US20030056104A1 (en) Digitally watermarking checks and other value documents
US9594994B2 (en) Security element and method to inspect authenticity of a print
US20050132194A1 (en) Protection of identification documents using open cryptography
US10688822B1 (en) Embedding 3D information in documents
US20090200789A1 (en) Identification Document with Document Specific Reduced Scale Printing
WO2021229317A1 (en) A system that allows the testing and examining of the originality of the manufactured product
JP2003060890A (en) Individual authentication system using communication network
JP6575213B2 (en) Information printed matter, reading method and authentication method
Tolk Random patterns and biometrics for counterfeit deterrence
WO2003019449A2 (en) Digitally watermarking checks and other value documents
Potts The dark side of desktop: Detection and prevention of forgery and counterfeiting in the age of desktop publishing
EA006012B1 (en) Protection system of authenticity of printed information carrier

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21724029

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21724029

Country of ref document: EP

Kind code of ref document: A1