AU2013100154A4 - Security document including at least one marker element and methods of their manufacture - Google Patents

Security document including at least one marker element and methods of their manufacture Download PDF

Info

Publication number
AU2013100154A4
AU2013100154A4 AU2013100154A AU2013100154A AU2013100154A4 AU 2013100154 A4 AU2013100154 A4 AU 2013100154A4 AU 2013100154 A AU2013100154 A AU 2013100154A AU 2013100154 A AU2013100154 A AU 2013100154A AU 2013100154 A4 AU2013100154 A4 AU 2013100154A4
Authority
AU
Australia
Prior art keywords
security document
security
marker element
augmented reality
reality system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2013100154A
Other versions
AU2013100154B4 (en
Inventor
Odisea Batistatos
Gary Power
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCL Security Pty Ltd
Original Assignee
Securency International Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Securency International Pty Ltd filed Critical Securency International Pty Ltd
Priority to AU2013100154A priority Critical patent/AU2013100154B4/en
Publication of AU2013100154A4 publication Critical patent/AU2013100154A4/en
Assigned to INNOVIA SECURITY PTY LTD reassignment INNOVIA SECURITY PTY LTD Request to Amend Deed and Register Assignors: SECURENCY INTERNATIONAL PTY LTD
Application granted granted Critical
Publication of AU2013100154B4 publication Critical patent/AU2013100154B4/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Abstract

A security document including at least one marker element, viewable by an imaging system of an augmented reality system, wherein at least one computer generated sensory input from the augmented reality system is triggerable by the at least one marker element to modify or enhance a displayed view from the imaging system of the augmented reality system of at least part of the security document. $99 Figure 1

Description

1 SECURITY DOCUMENT INCLUDING AT LEAST ONE MARKER ELEMENT AND METHODS OF THEIR MANUFACTURE FIELD OF THE INVENTION [0001] The present invention relates to a security document including at least one marker element viewable by an augmented reality system, and methods of their manufacture. BACKGROUND TO THE INVENTION [0002] Typically, there has been a need to introduce more complex security features to ensure the security of security documents from counterfeiters. This is due to the rapid rate that counterfeiters adjust their techniques to overcome each new and improved security feature. [0003] As the security elements become more complex and difficult to reproduce, they may also become less identifiable to the general public, due to the introduction of security features that are less visible. For instance, some features may be too small to be seen by the naked eye, and may require the use of expensive scientific instruments, such as atomic force microscopes (AFM), optical microscopes or scanning electron microscopes. These instruments are not readily available to the public and are not convenient for authenticating a security document during the normal course of use. [0004] A new technology has recently emerged where live, direct or indirect views of physical, real world environments where elements of that environment may be augmented with virtual information in the form of computer generated sensory input, such as sound, video, graphics or GPS data. The artificial information about the environment and its objects may be overlaid on the real world view.
2 [0005] These live, direct or indirect views effectively improve people's senses and skills, enhancing their perception of reality. This new technology is known colloquially as augmented reality or AR. [0006] The components used in AR systems include a combination of processors, displays and sensors. These sensors may include cameras, MEMS sensors such as accelerometers, GPS and solid state compasses, which are now becoming standard features in common devices such as smart phones. This now means that smart phones or tablet computers have the potential to become AR platforms and are thus are readily available to large segments of the general public. SUMMARY OF THE INVENTION [0007] According to a first aspect of the present invention, there is provided a security document including at least one marker element, viewable by an imaging system of an augmented reality system, wherein at least one computer generated sensory input from the augmented reality system is triggerable by the at least one marker element to modify or enhance a displayed view from the imaging system of the augmented reality system of at least part of the security document. This provides for a security document that may trigger a computer generated sensory input that allows an enhanced and/or modified view of a security document to a member of the public beyond what may be viewed with the unaided eye. [0008] Preferably, the displayed view from the imaging system of the at least part of the security document is a live or realtime view of the at least part of the security document. This allows a viewer of the security document to view the augmentations and modifications to the security document live. [0009] In an embodiment, the computer generated sensory input may indicate the authenticity of a genuine security document. Preferably, the computer generated sensory input may indicate the lack of authenticity of a non-genuine or 3 counterfeit security document. This gives that the advantage that a member of the public may be able to authenticate any security document with at least one marker element, if they have a portable augmented reality system, such as a smartphone, tablet or other device. [0010] Preferably, wherein the computer generated sensory input includes three-dimensional representations or may include one or more of a selection of text, pictures or photos, moving images or animated images, audio material or vibratory tones. The information may be provided to a user in a variety of ways, according to personal preference or to a specific need, such as an impairment of the senses or a work related/environmental use. The computer generated sensory input may be in the form of any educational or promotional information In particular, information may be presented to the public as part of a communications strategy by Central Banks. [0011] According to a preferred embodiment, at least one marker element may be at least one point and/or line or a geometric shape or an outline of a rectangular or square or is an object, such as a source of light, such as an LED or a QR code. Preferably, the at least one marker element may be at least part of an image, which may include at least one of a selection of: a portrait, a building, an animal, a plant or vehicle. The portrait, building, animal, plant or vehicle may be significant, familiar, recognisable or famous icons, such as the Sydney Harbour Bridge or political figures. Thus the marker elements may be part of the design of the security document and may or may not be obvious to a member of the public. [0012] More preferably, at least one marker element is not visible to the naked eye and is only visible when used in the AR system. [0013] The at least one marker element may be at least part of a window or half window or may be a security device or feature such as a DOE, diffraction grating, hologram or a security device or feature applied with UV or IR ink. Preferably, at least one marker element may be an outline of a security device or 4 feature such as a DOE, diffraction grating, hologram or a security device or feature applied with UV or IR ink or even an outline of the security document itself. These marker elements may be features that work both in reflection and in transmission. For instance, if the marker element was a transmissive DOE, hologram or window or half-window, an external source of light, such as a room light or bulb or LED, or sunlight may backlight the marker element. This provides the advantage of increasing the contrast of the DOEs, by increasing the sharpness and brightness of the features. [0014] In other embodiments, the augmented reality system includes at least one input device such as keyboards, buttons, touch-sensitive screens, sound or voice activation, pinch glove or tracking of head or eye movements. Preferably, the augmented reality system includes at least one sensor. More preferably, the at least one sensor is from a selection of an accelerometer, GPS or solid state compass. [0015] Other embodiments include that the augmented reality system includes at least one processor. Preferably, the at least one processor calculates position and/or orientation information from the at least one marker element. More preferably, the at least one processor calculates optical flow or movement information from the at least one marker element. Even more preferably, the at least one processor processes the at least one image using feature detection methods such as edge detection, corner detection, blob detection, edge detection or thresholding. [0016] The security document may include at least one security device. Security documents with at least one marker element and security devices would increase the difficulty of reproducing the security document. Preferably, these devices may be overt or covert security devices. More preferably, these devices may be optically variable. Further, these devices may be diffractive or non diffractive security devices.
5 [0017] According to another aspect of the present invention, there is provided a method of manufacturing a security document including the steps of applying at least one marker element to the security document; viewing at least one marker element through an augmented reality system; and wherein at least one marker element triggers at least one computer generated sensory input from the augmented reality system that modifies or enhances a displayed view from the augmented reality system of at least part of the security document. [0018] In an embodiment, the augmented reality system is able to communicate the authenticity or lack of authenticity of the security document and preferably, with at least one of a selection of devices, systems and/or the internet. [0019] According to yet another aspect of the present invention, there is provided a method of testing the authenticity of a security document including the steps of: applying at least one marker element to a security document, viewing at least one marker element through an augmented reality system; and comparing at least one marker element to a data representation of the at least one genuine marker element to determine the authenticity of the security document. [0020] The method of testing the authenticity of the security document may include the step of providing the security document with at least one security device. A security document including security devices would increase the difficulty of reproducing the security document. Preferably, these devices may be overt or covert security devices. More preferably, these devices may be optically variable. Further, these devices may be diffractive or non-diffractive security devices. [0021] The method may include the step of triggering at least one computer generated sensory input from the augmented reality system that modifies or 6 enhances a displayed view from the augmented reality system of at least part of the security document. [0022] The computer generated sensory input may indicate the authenticity of a genuine security document or the lack of authenticity of a non-genuine or counterfeit security document. [0023] The view from the imaging system of the at least part of the security document may be displayed as a live or real-time view of the at least part of the security document. [0024] In addition, the methods may include that the computer generated sensory input includes three-dimensional representations including one or more of a selection of text, pictures or photos, moving images or animated images, audio material, vibratory tones or in general, educational or promotional information. In particular, information may be presented to the public as part of a communications strategy by Central Banks. [0025] Other embodiments include that the least one marker element may be at least one point and/or line or may be a geometric shape, an outline of a rectangle or square or any object such as a source of light, such as an LED or a QR code. Preferably, the at least one marker element may be at least part of an image, which may include at least one of a selection of: a portrait, a building, an animal, a plant or vehicle. The portrait, building, animal, plant or vehicle may be significant, familiar, recognisable or famous icons, such as the Sydney Harbour Bridge or political figures. More preferably, at least one marker element is not visible to the naked eye and is only visible when used in the AR system. [0026] The at least one marker element may be applied as at least part of a window or half window or may be a security device or feature such as a DOE, diffraction grating, hologram or a security device or feature applied with UV or IR ink. Preferably, at least one marker element may be applied as an outline of a 7 security device or feature such as a DOE, diffraction grating, hologram or a security device or feature applied with UV or IR ink or even applied as an outline of the security document itself. These marker elements may be features that work both in reflection and in transmission. For instance, if the marker element was a transmissive DOE, hologram or window or half-window, an external source of light, such as a room light or bulb or LED, or sunlight may backlight the marker element. This provides the advantage of increasing the contrast of the DOEs, by increasing the sharpness and brightness of the features. [0027] Preferably, at least one marker element is applied as at least part of a window or half window. [0028] At least one marker element may be applied by a printing process such as gravure, intaglio, screen or offset printing. [0029] In further embodiments, the augmented reality system may include at least one input device from a selection of keyboards, buttons, touch-sensitive screens, sound or voice activation, pinch glove or tracking of head or eye movements. Preferably, the augmented reality system includes at least one sensor such as an accelerometer, GPS or solid state compass. [0030] More preferably, augmented reality system includes at least one processor which may be able to calculate position and/or orientation information or optical flow or movement information from at least one marker element [0031] Even more preferably, the at least one processor may process the at least one image using feature detection methods include edge detection, corner detection, blob detection, edge detection or thresholding. [0032] According to other aspects of the present invention are provided as an augmented reality system when used with any of the security documents or according to any one of the methods detailed in the embodiments above.
8 [0033] Further aspects of the present invention relate to a banknote or a polymer banknote as detailed in the above embodiments. Preferably, a banknote where computer generated sensory input such as graphic, audio material and/or vibratory tones are adapted to alert a user as to the genuineness of a banknote or information such as the denomination or country of origin BRIEF DESCRIPTION OF THE DRAWINGS [0034] Specific embodiments of the invention will now be described, by way of example only, and with reference to the accompanying drawings, in which: [0035] Figure 1 is a plan view of a security document including two security elements including marker elements. [0036] Figure 2 is a view of an augmented reality system of the security document of Figure 1. [0037] Figure 3 is a view of an augmented reality system of the security document of Figure 1 including the input of three-dimensional representations to the displayed view of the security document according to a first embodiment of the present invention. [0038] Figure 4 is a view of an augmented reality system of the security document of Figure 1 including the input of an animated or moving representation to the displayed view of the security document according to a further embodiment of the present invention. [0039] Figure 5 is a view of an augmented reality system of the security document of Figure 1 including the input of text to the displayed view of the security document according to an alternate embodiment of the present invention.
9 [0040] Figure 6 is a view of an augmented reality system of the security document of Figure 1 including the input of audio material to the displayed view of the security document according to yet another embodiment of the present invention. [0041] Figure 7 is a view of a security document including a security element of a two-dimensional portrait including a marker element. [0042] Figure 8 is a view of an augmented reality system of the security document of Figure 7 including the input of a three dimensional representation of the portrait to the displayed view of the security document according to a further embodiment of the present invention. DEFINITIONS [0043] Security Document or Token [0044] As used herein the term security documents includes all types of documents of value and identification documents including, but not limited to the following: banknotes, credit cards, cheques, passports, identity cards, securities and share certificates, driver's licenses, deeds of title, travel documents such as airline and train tickets, entrance cards and tickets, birth, death and marriage certificates, and academic transcripts. [0045] The invention is particularly, but not exclusively, applicable to security documents such as banknotes or identification documents such as identity cards or passports formed from a substrate to which one or more layers of printing are applied. The diffraction gratings and optically variable devices described herein may also have application in other products, such as packaging. [0046] Security Device or Feature 10 [0047] As used herein the term security device or feature includes any one of a large number of security devices, elements or features intended to protect the security document or token from counterfeiting, copying, and alteration or tampering. Security devices or features may be provided in or on the substrate of the security document or in or on one or more layers applied to the base substrate, and may take a wide variety of forms, such as security threads embedded in layers of the security document; security inks such as fluorescent, luminescent and phosphorescent inks, metallic inks, iridescent inks, ultraviolet or infrared, photochromic, thermochromic, hydrochromic or piezochromic inks; printed and embossed features, including relief structures; interference layers; liquid crystal devices; lenses and lenticular structures; optically variable devices (OVDs) such as diffractive devices including diffraction gratings, holograms and diffractive optical elements (DOEs). [0048] The security device or feature may be covert and overt. [0049] Examples of covert devices include devices applied in UV or IR inks, or devices with encrypted or encoded data such as scrambled indicia, moir6 images, carrier screen images or digital watermarking. [0050] Examples of overt devices includes both diffractive and non-diffractive devices such as diffraction gratings, holograms, DOEs, OVDs and other known optically varying devices. In particular, overt devices include lenticular devices as described in WO 2012/024718 and WO 2012/027779, the disclosure of these publications is herein incorporated by reference. The overt devices include those manufactured by soft embossing methods wherein optical lacquers are embossed then cured by UV radiation. [0051] Transparent Windows and Half Windows [0052] As used herein the term window refers to a transparent or translucent area in the security document compared to the substantially opaque region to 11 which printing is applied. The window may be fully transparent so that it allows the transmission of light substantially unaffected, or it may be partly transparent or translucent partially allowing the transmission of light but without allowing objects to be seen clearly through the window area. [0053] A window area may be formed in a polymeric security document which has at least one layer of transparent polymeric material and one or more opacifying layers applied to at least one side of a transparent polymeric substrate, by omitting least one opacifying layer in the region forming the window area. If opacifying layers are applied to both sides of a transparent substrate a fully transparent window may be formed by omitting the opacifying layers on both sides of the transparent substrate in the window area. [0054] A partly transparent or translucent area, hereinafter referred to as a "half-window", may be formed in a polymeric security document which has opacifying layers on both sides by omitting the opacifying layers on one side only of the security document in the window area so that the "half-window" is not fully transparent, but allows some light to pass through without allowing objects to be viewed clearly through the half-window. [0055] Alternatively, it is possible for the substrates to be formed from an substantially opaque material, such as paper or fibrous material, with an insert of transparent plastics material inserted into a cut-out, or recess in the paper or fibrous substrate to form a transparent window or a translucent half-window area. DESCRIPTION OF PREFERRED EMBODIMENT [0056] Generally, in the context of the present invention, Figures 1 to 8 show an AR system that has a real-time view of a security document 2 from a AR system 12 where displayed views of security documents 2, 54 are augmented by computer generated sensory input, such as three dimensional images or representations, audio material, text or moving or video representations. This AR 12 system can then be used by a viewer with an augmented reality system to obtain information from the computer generated sensory input and/or authenticate the security document as a genuine security document. [0057] These AR systems may include a set of hardware components such as a processor (CPU), display, sensors and input devices. The input devices include keyboards or touch screens or include imaging devices such as cameras. Sensors may include accelerometers, GPS, solid state compasses or other MEMS sensors. These hardware components are now present in smart phones, tablets or other portable devices which make it easy for a viewer such as a member of the public to easily view a security document and using an AR system as described below to authenticate or obtain information about the viewed security document. [0058] These AR system may also be used with augmented-reality 'goggles' or spectacles such as the newly invented 'Google glass', contact lenses or other head mounted augmented reality system. [0059] Referring to Figure 1-3, there is shown an augmented reality system for security documents; where Figure 1 shows a security document 2, Figure 2 shows the un-augmented displayed view of the security document 2 from an augmented reality system 12 and Figure 3 shows the augmented displayed or AR view of the security document 2 from the augmented reality system 12. [0060] In particular, Figure 1 shows a plan view of a security document 2. The security document 2 includes two marker elements 4, 6 which are represented by a dark bordered outline of a square. [0061] The marker elements 4, 6 of these Figures 1 and 2 are commonly known in the art as fiducial or fiduciary markers. These marker elements or fiduciary markers are defined as objects placed in the field of view of an imaging system which appears in the image produced for use as a point of reference or 13 measure. These marker elements may appear as points, lines, simple shapes or other types of objects such as LEDs which allow the imaging system to determine or process position, orientation or other data. Other processing using the marker elements may include feature detection methods such as corner detection, blob detection, edge detection, thresholding or other image processing methods known in the art. [0062] Further, Figure 1 shows a security feature 8, and in this embodiment includes indicia of the letters 'A X', although the security feature 8 could be any one of the security features as defined above. A denominator feature 10 is also shown in a second marker element 4. The security element 8 and denominator 10 may be also be set in a window or half window configuration to form the marker element 4, 6 of a dark bordered outline of a square. [0063] In Figure 2, there is shown an un-augmented or unmodified view 12 on an augmented reality system which displays a live or real-time view of the security document 2. This is the view conventionally seen by a viewer using an augmented reality system without the computer generated sensory inputs. As expected, the displayed view of the security device 20, marker elements 16, 18 and denominator feature of the security document 14 is substantially the same as the security document 2 of Figure 1. [0064] Marker elements 16, 18 could be existing security features for additional security, for example 'covert' or hidden features such as those applied with infrared (IR) ink or ultraviolet (UV) ink, window or half windows, DOEs, or diffraction gratings among others. Further, the marker elements 16,18 may be not visible to the naked eye yet may be clearly visible when viewed with an AR system, to indicate authenticity of the security document 2. For example, certain sensors such as a CMOS chip may be able to detect a marker feature applied in UV or IR ink as sensors may be more sensitive to electromagnetic radiation in some wavelength ranges than the human eye.
14 [0065] As a further example, the marker elements 16, 18 that are DOEs, windows or half windows or diffractions gratings may be features that work both in reflection and in transmission. For instance, if the marker element 16, 18 was a transmissive DOE or window or half-window, an external source of light, such as a room light or bulb or LED, or sunlight may backlight the marker element 16,18. This may increase the contrast of the DOEs, increasing the sharpness and brightness of the features. [0066] Figure 3 shows an augmented or modified view 24 on an augmented reality system which displays a live or real-time view of the security document 2. In this view, the displayed augmented security document 26 has now been modified such that the three-dimensional shapes (cubes) 28, 30 have replaced the marker elements 16, 18. In this embodiment, the security device including the indicia 'A X' 32 and denominator feature 34 are still visible. However, the view 24 may be augmented or modified in such a way that the indicia 32 and denominator feature 34 are not be visible or are instead modified in another way such as being represented as three-dimensional shapes. [0067] The view 24 of the security document 26 has been produced by first having an imaging device such as a camera, which scans the security document 2. The resulting digital image is then processed with reference to the marker elements 4, 6. One or more software programs or applications or 'apps' is pre programmed with a variety of computer generated sensor inputs which manifest as the augmentations and modifications, such as those described in these embodiments. The software program may then recognise one or more of the marker elements 4, 6 which triggers the application to modify or augment the digital image as programmed which is then displayed on the augmented reality system. For example, in Figure 1, the marker elements 4, 6 have triggered the addition of three dimensional cube representations into the scanned digital image of the security document 26. [0068] Similarly, Figure 4 shows an alternate view 36 of the security document that has also been augmented, according to another embodiment of 15 the present invention. The displayed security document 38 has now developed additional 'wing' type elements 38 and is revolving according to the curved arrows 40. Thus the augmentation or modification is of a video or animated representation. In this embodiment, it is possible that the shape and/or edges of the security document 2 may function as one or more marker elements. [0069] In Figure 5, the displayed view 42 of the security document 14 includes several areas 44, 46 and 48 where text, symbols, picture or other graphical data may be displayed. This may display information about displayed security document 2 and its features, including security feature 20 or denominator feature 16 as popup windows or other known types of augmentations for displaying text or graphics. For example, the area 44 may include information on the history of the security document, while the area 46 may include information on the particular security feature. The area 46 may also include confirmation of the authenticity of the security feature 8 and hence the security document 2, for example, text may appear such as 'This is a genuine security document'. The areas 44, 46 and 48 may include links to the internet, websites, other applications or other interactive connectivity. [0070] The security document 14 may also include at least one security device, whether overt or covert (not shown). These security devices include diffractive or non-diffractive devices or optically variable devices. [0071] Figure 6 shows a displayed view 50 of the security document 2 of Figure 1. However, the view 50 has been augmented by audio material 52, which may be in the form of voice spoken text, music or other sounds. The voice spoken text may give more information similar to the information given by the areas 44, 46 and 48 of Figure 5, but may be used by the visually impaired or others who prefer audio material. For example, spoken text may convey the denomination of a security document to a visually impaired person, 'This is a five dollar bill'. Again, the audio material 52 may serve as a confirmation of the authenticity of the security document 2 being viewed. For example, a spoken voice may state that 'This is a genuine security document'.
16 [0072] Further, vibratory tones may be used to convey information to a member of the public, or in particular the visually impaired. For example, in Figure 6, different vibratory tones that correspond to different security documents may alert a member of the public to differences between the security documents, such as denomination or country of origin, with or without the accompaniment of audio material. As a further example, the vibratory tones may be different when a genuine security document is viewed by the AR system, compared to when a non-genuine security document has been identified. [0073] The presence of any augmentation or modification to any of the views 12, 24, 36, 42 and 50 with a specifically programmed software application to authenticate the security document may also be understood to be an authenticating feature of a genuine security document 2. [0074] In another embodiment, a security document 54 is shown in Figure 7 with a portrait element 60. The portrait element 60 is shown as a profile on the security document 54, surrounded by a marker element 58. Similarly, a security device or feature 62 may also be surrounded by a marker element 56. The marker elements 56, 58 appear as a dark bordered outline of a square. Either of the portrait 60 or security feature 62 may be either partially or wholly configured as a window or half window of the security document 54. [0075] In Figure 8, there is shown a view 64 as seen displayed on an augmented reality system where the security document 54 of Figure 7 is shown live or in 'realtime'. The marker elements 66, 68 have triggered the augmentation of the portrait 60 and security feature 62. In particular, the portrait 60 on the security document 54 has been replaced by a bust 66 or three-dimensional representation of the two dimensional portrait 60 at a three quarter angle. The appearance of this 'bust' image may signal to the viewer that the security document 54 is a genuine security document. The portrait feature 60 may also act as a security feature of the security document 54, without the AR system. Similarly, the security feature 62 contains the indicia 'A X'. In the view 64 displayed, the marker element 56 has triggered the augmentation of the security 17 feature to display a three-dimensional representation of the letters 'A X'. This may also serve as a separate authentication signal to the viewer that the security document 54 viewed is a genuine security document. [0076] While a portrait 60 has been used as an example in Figure 8, any graphical representation of buildings, animals, plants or vehicles such as cars or trains may be used in the same way. The portraits, buildings, animal, plants or vehicles such as cars or trains may be significant, familiar, recognisable or famous icons, such as the Sydney Harbour Bridge or political figures. [0077] Further, while marker elements 66, 68 are used in Figure 8, it is possible that the portraits, buildings, animal, plants or vehicles such as cars or trains could be utilized as the marker elements in the AR system. [0078] The view 64 of the security document 54 has been produced by first having an imaging device such as a camera, which scans the security document 54. The resulting digital image is then processed with reference to the marker elements 56, 58. One or more software programs or applications or 'apps' is pre programmed with a variety of computer generated sensor inputs which manifest as the augmentations and modifications, such as three dimensional graphical representations of letters and images. The software program may then recognise one or more of the marker elements 56, 58 which triggers the application to modify or augment the digital image as programmed which is then displayed on the augmented reality system. For example, in Figure 7, the marker elements 56, 58 have triggered the addition of three dimensional graphical representations of letters 68 and a bust of a portrait 66 into the scanned digital image of the security document 54. [0079] The three-dimensional representations of the letters 'A X' 68 and bust 66 are also expected to be interactive, i.e. to be manipulable or otherwise responsive to a viewer, in either real space i.e. the area on or surrounding the security document 2, 54 or on the augmented reality system itself, such as a 18 responsive 'touch' screen, keyboard, mouse, button, pinch glove or other input device that may be responsive to head or eye movements. [0080] For example, if a viewer were to reach out towards the security document 54 proximal to the area of the marker element 58, the viewer may be able to manipulate the three-dimensional bust representation 66 of the two dimensional portrait 60 into rotating, changing scale or otherwise optically varying such as changing colours. Further, the letters 'A X' 62 may also be interactive, for example, if the viewer were to touch the area of the display where the three dimensional letters 68 are located, the image 68 may be manipulated by rotating, changing colour or otherwise changing graphically. A number of other modifications may also be triggered such as additional augmentations such as the display of text, audio material or other graphical representations. [0081] The interactivity may also extend to other applications or networks such as the internet or via a wired or wireless service. For instance, by manipulating the graphical representations 66 or 68, a link to a website may be displayed, such as to a website that displays additional information on the security documents 2, 54. The application for browsing the internet may also be triggered into becoming active by the manipulation of the graphical representations 66 or 68, for example by a pinch glove, wand or by tracking the users head or eye movements. [0082] As part of the additional functions of the AR system, the AR system could function as a counterfeit countermeasure by being able to detect and respond to a non-genuine security document. For example, if the AR system application scans a non-genuine security document, and identifies it as a non genuine security document, a signal could be sent via a wireless transmission that a non-genuine security document had been found. Specifically, a smart phone or tablet could scan a non-genuine security document, the AR system application may be able to detect that the marker elements and security features counterfeit and then a signal sent via the internet or mobile network could be sent indicating that a non-genuine document had been found. GPS data could be 19 included in the signal, allowing the appropriate authorities to respond to the location. In this way, counterfeit documents could be more quickly identified and removed from general circulation. [0083] This interactivity of the security documents 2, 54 and AR system applications as described above could serve as a further authentication of the genuine security document 2 or 54 or indication of non-genuine documents. This interactivity of the AR system is expected to be applicable to all the embodiments shown in Figures 1-8. [0084] Further modifications and improvements may be made without departing from the scope of the present invention. For instance, any type of augmented reality system with the hardware and software capacity to run an AR system according to the present invention, such as smart phones or tablets may be used in any embodiment of the invention, and may include goggles, spectacles, contact lenses, heads up displays or other head mounted augmented reality systems. The augmented reality systems would also include any sensors or input devices as commonly known by the person skilled in the art, such as optical sensors such as cameras, MEMS sensors such as accelerometers, solid state compasses, GPS, gyroscopes, RFID or wireless sensors and input devices such as touch sensitive screens, voice activation, keyboards, pinch glove, wand, mouse or by tracking a users head or eye movements. [0085] Further, the AR system would have an imaging device that may be a camera or any other type of device able to scan an image. The image may be augmented or otherwise digitally altered by a software application or 'app', and the augmentation or modification able to displayed on a display, such as an LED, retina, projector or other type of augmented reality system able to show a live, real-time view of 'reality'. [0086] As an example of further modifications and improvements to the present system, the AR system would also be able to use the marker elements or 20 fiducial markers on the security documents to determine any position, orientation or movement from the scanned images. The software application may also be able to use feature detection methods such as corner detection, blob detection, edge detection or thresholding. The marker elements may consists of any type of points, lines, images or objects such as shapes, lights such as LEDs or existing security devices such as DOEs, diffraction gratings, windows or half windows or objected applied with IR or UV inks. Although an outline of a square is used as a marker element in the embodiments, it may be understood that the present invention is not limited to the use of square outlines as marker elements. It is also envisaged that outlines of security features or even the shape and size of the security document itself may serve as a marker element. The marker elements may or may not be visible to a person viewing a security document without an AR system. [0087] Additionally, further examples of modifications and improvements of the software application would include that the application also be capable of including such computer generated sensory input such as voice, sounds, music, text, vibratory tones and any type of graphical representations such as pictures, photos, animations or any of the aforementioned in any combination as may be understood by the skilled artisan. Any element or aspect of the augmented or modified view may also be able to manipulated or responsive to the viewer to trigger further augmentations. The software application would be also capable of connecting to other applications, the internet or other devices as known in the art. [0088] It is envisaged that the security document may include at least one security device, in any of the above embodiments, as is known to a person skilled in the art, preferably when determining the authenticity of the security document. The security devices include any of the security devices defined earlier in the specification. [0089] Other examples of modifications and improvements include that the marker elements may be applied by printing process such as gravure, intaglio, screen or offset printing.

Claims (5)

1. A security document including at least one marker element, viewable by an imaging system of an augmented reality system, wherein at least one computer generated sensory input from the augmented reality system is triggerable by the at least one marker element to modify or enhance a displayed view from the imaging system of the augmented reality system of at least part of the security document.
2. A method of manufacturing a security document including the steps of applying at least one marker element to the security document; viewing the at least one marker element through an augmented reality system; and wherein the at least one marker element triggers at least one computer generated sensory input from the augmented reality system that modifies or enhances a displayed view from the augmented reality system of at least part of the security document.
3. A method of testing the authenticity of a security document including the steps of: applying at least one marker element to a security document, viewing the at least one marker element through an augmented reality system; and comparing the at least one marker element to a data representation of the at least one genuine marker element to determine the authenticity of the security document.
4. A security document of claim 1 or a method of claim 2 or claim 3 including that the computer generated sensory input indicates the authenticity of a genuine security document or lack of authenticity or a counterfeit or non-genuine security document. 22
5. A method according to any one of the preceding claims displaying the view from the imaging system of the at least part of the security document as a live or realtime view of the at least part of the security document. SECURENCY INTERNATIONAL PTY LTD WATERMARK PATENT AND TRADE MARKS ATTORNEYS UIP1354AU00
AU2013100154A 2013-02-14 2013-02-14 Security document including at least one marker element and methods of their manufacture Ceased AU2013100154B4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2013100154A AU2013100154B4 (en) 2013-02-14 2013-02-14 Security document including at least one marker element and methods of their manufacture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2013100154A AU2013100154B4 (en) 2013-02-14 2013-02-14 Security document including at least one marker element and methods of their manufacture

Publications (2)

Publication Number Publication Date
AU2013100154A4 true AU2013100154A4 (en) 2013-04-04
AU2013100154B4 AU2013100154B4 (en) 2013-10-10

Family

ID=47996860

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2013100154A Ceased AU2013100154B4 (en) 2013-02-14 2013-02-14 Security document including at least one marker element and methods of their manufacture

Country Status (1)

Country Link
AU (1) AU2013100154B4 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150371445A1 (en) * 2014-06-18 2015-12-24 Ovd Kinegram Ag Method for Inspecting a Security Document
EP3062253A1 (en) * 2015-02-25 2016-08-31 BAE Systems PLC Method and apparatus for data verification in a mixed reality system
WO2016135445A1 (en) * 2015-02-25 2016-09-01 Bae Systems Plc Method and apparatus for data verification in a mixed reality system
US9767585B1 (en) 2014-09-23 2017-09-19 Wells Fargo Bank, N.A. Augmented reality confidential view
WO2019119038A1 (en) * 2017-12-19 2019-06-27 Ccl Secure Pty Ltd System and method for generating a virtual representation of a security document
US10528838B1 (en) 2014-09-23 2020-01-07 Wells Fargo Bank, N.A. Augmented reality confidential view

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090286570A1 (en) * 2008-05-15 2009-11-19 Sony Ericsson Mobile Communications Ab Portable communication device and method of processing embedded visual cues

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150371445A1 (en) * 2014-06-18 2015-12-24 Ovd Kinegram Ag Method for Inspecting a Security Document
US9767585B1 (en) 2014-09-23 2017-09-19 Wells Fargo Bank, N.A. Augmented reality confidential view
US10360628B1 (en) 2014-09-23 2019-07-23 Wells Fargo Bank, N.A. Augmented reality confidential view
US10528838B1 (en) 2014-09-23 2020-01-07 Wells Fargo Bank, N.A. Augmented reality confidential view
US11836999B1 (en) 2014-09-23 2023-12-05 Wells Fargo Bank, N.A. Augmented reality confidential view
EP3062253A1 (en) * 2015-02-25 2016-08-31 BAE Systems PLC Method and apparatus for data verification in a mixed reality system
WO2016135445A1 (en) * 2015-02-25 2016-09-01 Bae Systems Plc Method and apparatus for data verification in a mixed reality system
WO2019119038A1 (en) * 2017-12-19 2019-06-27 Ccl Secure Pty Ltd System and method for generating a virtual representation of a security document

Also Published As

Publication number Publication date
AU2013100154B4 (en) 2013-10-10

Similar Documents

Publication Publication Date Title
US11548310B2 (en) Authenticating identification and security documents and other objects
US10019626B2 (en) Method for authenticating a security element, and optically variable security element
AU2013100154A4 (en) Security document including at least one marker element and methods of their manufacture
KR102380813B1 (en) optical switch device
JP4918364B2 (en) Micro optical security and image display system
JP5232779B2 (en) Micro optical security and image display system
RU2382415C2 (en) System for reading and authenticating composite image on sheet material
JP6311842B2 (en) IDENTIFICATION DEVICE, IDENTIFICATION METHOD, IDENTIFICATION PROGRAM, AND COMPUTER-READABLE MEDIUM CONTAINING IDENTIFICATION PROGRAM
CN108027521A (en) Optical articles, the mother matrix for making optical articles and the method for manufacturing mother matrix and optical articles
CN101855093A (en) Banknote with edge windows
JP6269897B2 (en) IDENTIFICATION DEVICE, IDENTIFICATION METHOD, IDENTIFICATION PROGRAM, AND COMPUTER-READABLE MEDIUM CONTAINING IDENTIFICATION PROGRAM
KR102269582B1 (en) Anti-counterfeiting sheet for preventing forgery and verifying authenticity and recognition method thereof
JP2007290181A (en) Authenticity discriminating structure
JP5500548B2 (en) Latent image forming body
JP4742725B2 (en) card
JP5540866B2 (en) Indicator
US20230264510A1 (en) Optical switch devices
TW578014B (en) Flat pattern capable of showing optical variation
FI20225103A1 (en) A camera, a system for detecting an optical identity tag and a method for identification
AU2015100393B4 (en) Modulated Surface Relief Structure
WO2019119038A1 (en) System and method for generating a virtual representation of a security document

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
DA2 Applications for amendment section 104

Free format text: THE NATURE OF THE AMENDMENT IS: AMEND THE PATENTEE TO READ INNOVIA SECURITY PTY LTD .

FF Certified innovation patent
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry