EP1604338A2 - Document contenant des images securisees - Google Patents
Document contenant des images securiseesInfo
- Publication number
- EP1604338A2 EP1604338A2 EP04703643A EP04703643A EP1604338A2 EP 1604338 A2 EP1604338 A2 EP 1604338A2 EP 04703643 A EP04703643 A EP 04703643A EP 04703643 A EP04703643 A EP 04703643A EP 1604338 A2 EP1604338 A2 EP 1604338A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- document
- image
- lines
- color
- printed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 239000004020 conductor Substances 0.000 claims description 2
- 239000000523 sample Substances 0.000 abstract description 7
- 238000000034 method Methods 0.000 description 22
- 230000000694 effects Effects 0.000 description 11
- 239000003086 colorant Substances 0.000 description 10
- 238000007639 printing Methods 0.000 description 9
- 238000010276 construction Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 239000007787 solid Substances 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000010420 art technique Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000001459 lithography Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/02—Testing electrical properties of the materials thereof
- G07D7/023—Measuring conductivity by direct contact
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
-
- B42D2035/26—
Definitions
- This invention relates generally to document protection methods and products, and more particularly to methods and products for printing and obtaining original documents that can be readily differentiated from copies made of those documents.
- the document protection method and product also allow detection of an original document by a document reader.
- a document carrying an image may comprise a background portion printed at a first line frequency and at a first color; a first image portion printed at a second line frequency and a second color; and a second image portion printed at the second line frequency and a third color, wherein a combined image the first image portion and the second image portion appear to substantially the same color as the first color.
- the first image portion may include printed lines, dots or spots
- the second image portion includes printed lines dots or spots placed between adjacent printed lines dot or spots of the first image portion.
- the first image portion may be printed at a density between 5 percent and 95 percent of the combined image of the first and second image portions.
- a solid tonal color may be reproduced in the area of the first image portion and the second image portion in substantially the same color at the first color, thereby not reproducing the first image portion and the second image portion.
- a document carrying an image may comprises: a background portion having printed lines dots or spots at a first angle and at a first color; an image portion having printed lines dots or spots at substantially the same color as the first color and at a different angle than the first angle, wherein when the document is reproduced by a copying or scanning device, a solid tonal color may be reproduced in the area of the image portion in substantially the same color at the first color, thereby not reproducing the first image portion.
- at least one of the background portion and the image portion may be printed at a line frequency greater than about 175 lines per inch.
- a document carrying an image may comprise: a background portion having printed lines dots or spots at a first angle and at a first line frequency; an image portion have printed lines dots or spots at a second angle and at a second line frequency, wherein the first line frequency is at least two time greater than the second line frequency.
- the first line frequency may be greater than about 175 lines per inch.
- an image formed by the image portion may be substantially hidden, and when the document is reproduced by a copying or scanning device, the image formed by the image portion is not substantially hidden in the reproduced document.
- An apparatus for authenticating a document as an original document may comprise: a magnification unit capable of magnifying images contained on the document; a scanning unit capable of scanning images magnified by the magnification unit, and creating an electronic format of the images contained on the document; a microprocessor which receives the electronic format and determines if the document contains predetermined security images which are not reproduced when the a reproduction of the document is made by a copying or scanning device, wherein the microprocessor determines the document not to be an original document if predetermined security images are not detected.
- the microprocessor may compare a layout of the document to a layout of the original document, and the microprocessor may determine the document to be an original document if the layout of the document corresponds to the layout of an original document.
- the apparatus may further comprise a display which displays a message indicative of whether the document has been determined to be an original document.
- a method of authenticating a document as an original document may comprise the steps of: reviewing the document for the presence of predetermined security images which are not reproduced when a reproduction of the document is made by a copying or scanning device; and determining the document not to be an original if the predetermined security images are not present in the document.
- the method may further comprise the steps of comparing a layout of the document to a layout of the original document, and determining the document to be an original document if the layout of the document corresponds to the layout of an original document.
- the method may further comprise the step of displaying a message indicative of whether the document has been determined to be an original document.
- a computer readable medium may carry instructions to cause a computer to perform a method of authenticating a document as an original document comprising the steps of: reviewing the document for the presence of predetermined security images which are not reproduced when a reproduction of the document is made by a copying or scanning device; and determining the document not to be an original if the predetermined security images are not present in the document.
- the method may further comprise the steps of comparing a layout of the document to a layout of the original document, and determining the document to be an original document if the layout of the document corresponds to the layout of an original document.
- the method may further comprise the step of displaying a message indicative of whether the document has been determined to be an original document.
- Figure 1 illustrates a document having a latent security image
- Figure 2 illustrates another embodiment of a document having a latent security image which is hidden to the human eye
- Figure 3 illustrates another embodiment of a document with a latent image
- Figure 4 illustrates a document which contains a dedicated security image
- Figure 5 illustrates a document which contains a latent image in the form of a bar code
- Figure 6 illustrates a document 50 which contains an image 52 which contains distortion or moire inducing patterns
- Figures 7A and 7B illustrates an exemplary safety medium which prohibits reproduction of the information contained on the medium
- Figures 8A and 8B illustrates documents containing a plurality of security images
- Figure 9 illustrates an exemplary reading device for detecting security images in a document
- Figure 10 illustrates an exemplary method of authenticating a document to be an original using the exemplary reading device of Figure 9;
- Figure 11 illustrates an exemplary bar code reader capable of detecting a bar code as a latent image
- Figure 12 illustrates a document which contains an exemplary conductive image
- Figure 13 illustrates a an exemplary verification device for verifying a document with a conductive image.
- Figure 14 illustrates an exemplary apparatus for detecting illegal publishing of documents
- Figure 15 illustrate an exemplary method for detecting illegal publishing of documents.
- Figure 1 illustrates a document 1 having a latent security image 2 which is generally hidden to the human eye.
- a background area 3 is preferably printed at a high line frequency.
- An image 2 is printed with a first color 4 at a predetermined density and printed with a second color 5 also at a predetermined density. The result is that image 2 appears as a third color to the human eye.
- background area 3 is printed in the third color or a color similar to the third color, causing image 2 to be obscure to the eye.
- the image 2 may be formed by printing the first color 4, such as by printing lines 6 having a first color at predetermined pitch and thickness. Then the second color 5 may be printed such as by printing lines 7 having a second color between lines 5 at a predetermined pitch and thickness, such as by using a negative image of image 2.
- lines 6 and 7 may be printed in a single print operation as well, such as by using a laser printer or the like. Also, although only two colors are discussed for purposes of illustration, those of skill in the art will appreciate that more than two colors may be used, including six or more colors.
- the density of lines 6 and 7 are controlled by controlling the pitch
- the density of lines 6 and 7 may range from 5% to 95% depending on the colors selected for lines 6 and 7, the density of the medium, the thickness of the lines, and the desired appearance of image 2.
- a density of 50% for each of lines 6 and 7 may be used, with a red color for line 6 and a green color for line 7.
- lines 6 and 7 may be printed at a different angle than used to print background 3.
- Image 2 may be detected using a reading device which magnifies the image to reveal the two colors, or selectively screens one of the two colors.
- image 2 is substantially not reproduced in the copy.
- the copy of document 1 even if in the same color tone as the original document 1 , will contain background area 3 across the entire document, and will not contain image 2.
- the presence or absence of image 2 may be used to determine if a document is an original or a copy, respectively.
- Figure 2 illustrates a document 10 having a latent security image 14 which appears hidden to the human eye.
- document 10 preferably has a background area 11 which contains lines 12 of a high frequency, such as about 175 lines per inch or more.
- Lines 12 preferably have a color.
- Image 14 preferably contains lines at about the same frequency but at a different angle from lines 12.
- Lines 12 and or 15 may be lines, dots or spots.
- lines 12 may be printed in blue at an angle of 30 degrees with a frequency of 280 lines per inch, and lines 14 may be printed at 45 degrees in blue and also with a frequency of 280 lines per inch.
- Image 14 may be detected using a reading device which magnifies the image to reveal lines 15 or selectively screens lines 12 to reveal lines 15.
- a reading device which magnifies the image to reveal lines 15 or selectively screens lines 12 to reveal lines 15.
- image 14 is substantially not reproduced in the copy.
- the copy of document 10 even if in the same color tone as the original document 10, will contain background area 1 1 across the entire document, and will not contain image 14.
- the presence or absence of image 14 may be used to determine if a document is an original or a copy, respectively.
- Figure 3 illustrates a document 20 with a latent image 22.
- Document 20 contains a background area 21 which is preferably printed at a first frequency, such as 175 lines per inch or greater, and at a predetermined angle.
- Image 22 is preferably printed at lower frequency than the frequency of background area 21.
- the frequency of lines 24 in area 21 is greater than two times the screen frequency of lines 23 in image 22. More preferably, the line frequency in area 21 is at least three times greater than the line frequency of lines 23 in image 22.
- the angle of the lines 22 is preferably at a different angle than the angle of lines 24 by at least 5 degrees.
- the width of lines 24 and 23 may be selected to provide a continuous aesthetically pleasing appearance of the document. Both lines 24 and 23 preferably have the same color.
- lines 24 in background area 21 may have a frequency of at least 175 lines per inch and preferably of 300 lines per inch, and a line width of 0.0025 inches at a 45 degree angle
- lines 23 in image 14 may have a frequency between 100-133 lines per inch and preferably a frequency of 95 lines per inch at a 30 degree angle.
- Figure 4 illustrates a document 30 which contains a dedicated security image
- Image 33 having a plurality of high and low frequency portions.
- document 30 preferably has a background area 31.
- Image 33 preferably contains first segments 34 which contains lines 35 which range from a high frequency to a low frequency and second segments 36 which contain lines 37 which range from a low frequency to a high frequency. Although two segments are shown for each of the first and second segments 34 and 36, respectively, any number of segments may be used, including one segment for either segment
- the line frequency in each of segments 34 and 36 may change continuously in a linear or non-linear manner or stepwise from one terminal end of each of segments 34 and 36 to the opposite terminal end, respectively.
- Each of lines 35 and 37 may be printed in black or in any color.
- image 33 is reproduced by conventional copying or scanning devices, the reproduced image will preferably show significant distortions, such as moire patterns.
- Figure 5 illustrates a document 40 which contains a latent image 43 in the form of a bar code.
- document 40 contains a background area 41 which contain lines 42 at a predetermined frequency and predetermined angle.
- Image 43 preferably contains a plurality of bars 44 which may form a bar code which may contain information readable by a bar code reader.
- Bars 44 preferably contain lines 45 at a predetermined frequency, which may be the same frequency as lines 42.
- Lines 45 may preferably be printed at a different angle than lines 42 as discussed in the construction of Figure 3, or lines 45 and 42 may be printed in similar colors as discussed in the construction of Figure 2 and Figure 1. Any suitable technique for providing a latent bar code image that may not be reproduced may be used.
- lines 42 and 45 may each be printed at the same frequency, which is a frequency between 150 to 400 lines per inch.
- Image 43 may be detected using a reading device which magnifies the image to reveal lines 45 or selectively screens lines 42 to reveal lines 45.
- a bar code reader may then detect the bar code and read information from the bar code.
- the information provided by the bar code may include document identifying information or other security information.
- image 43 is substantially not reproduced in the copy.
- the copy of document 40 even if in the same color tone as the original document 40, will contain background area 41 across the entire document, and will not contain image 43.
- the presence or absence of image 43 may be used to determine if a document is an original or a copy, respectively.
- Figure 6 illustrates a document 50 which contains an image 52 which contains distortion or moire inducing patterns.
- document 50 contains a background portion 51.
- Image 52 preferably contains a background portion 53 containing lines 57 at a predetermined frequency and multiple portions 54, 55 and 56 which have various line frequencies which may be higher than or lower than the predetermined frequency of lines 57.
- the line frequencies in portions 54, 55 and 56 may be printed in one or more high frequencies, such as greater than about 175 lines per inch while, background portion 53 may be printed at a low frequency, such as about 100-135 lines per inch.
- the multi-frequency portions may range from a high frequency in an area to a low frequency in an area next to a high frequency area.
- Figures 7A and 7B illustrate an image printed on a medium that substantially stops reproduction of information contained on the medium.
- medium 701 such as paper
- a first set of printed images, represented by printed image 702 may be printed in a dark color such as black in negative form.
- a second set of printed images, represented by printed image 703 preferably is a contact positive of the first printed image 702 and may be printed in reflective ink, such as silver ink.
- one of the colors may be printed over all of medium 705 as a solid image 706.
- the second color in a negative form or a positive form image, depending on the form of the first image, respectively, may be printed on top of image 706.
- reproduction of medium 702 and 705, respectively will result in a black copy, making the information on medium 702 and 705, respectively, unreadable.
- Figure 8 A illustrates a document 100 containing a plurality of security images 1, 10, 20, 30, 40, and 52, which are discussed in connection with Figures 1-7.
- Figure 8B illustrates an identification card 200 containing a plurality of security images 1 , 10, 20, 30, 40, and 52, which are discussed in connection with Figures 1-7.
- Art work may be protected by applying a security image to a part of the work to enable an original work to be distinguished from a copy.
- Figure 9 illustrate an exemplary construction of a reading device which may be used to detect security images in document 100 or card 200.
- document 1001 containing security image 1007 may be magnified by magnifying unit 1002 which provides a magnified image to scanning unit 1003.
- Security image 1007 may formed in accordance with one or more of the techniques illustrated in Figures 1-5.
- Magnifying unit 1002 may be any conventional magnification device as known to those of skill in the art and may be integrally formed with scanning unit 1003 or may be independent of scanning unit 1003.
- Magnification unit 1002 may enable an optical and/or a digitally enhanced magnification as known to those of skill in the art.
- a prefe ⁇ ed magnification device is capable of providing a magnification of less than 100% of the document image up to 1000% of the document image.
- the scanning unit 1003 may be any conventional type of scanning unit, including scanning units capable of providing a digital image of a photograph or of providing an electronic word processor document from a text scan. Scanning unit 1003 may be of the type suitable for use with photographic and text scanners, photocopiers, facsimiles. Scanning unit 1003 preferably generates a scanned representation of a scan of document 1001 and security image 1007, such as a digital representation, and provides this information to a microprocessor 1004. Scanning unit 1003 may contain one or more storage devices (not shown), such as a RAM, floppy disk drive, writeable CD drive, or the like, which may be used to store the scanned representation prior to being sent to the microprocessor.
- storage devices not shown
- Microprocessor 1004 processes the scanned representation of document 1001 and particularly of security image 1007.
- microprocessor contains verification software that compares the scanned representation of the document against a representation of the original document previously stored in a memory associated with microprocessor 1004.
- microprocessor 1004 may retrieve the representation of the original document from a remote location, such as through a website or a secure communication link.
- Microprocessor 1005 may provide results of the comparison to a display 1005.
- Microprocessor 1004 may also instruct an access device to provide access to a user when a valid document or ID card is detected.
- an access device may include access to a room or building through a security door and access to information contained on a data base through a secure access port or a firewall, or may simply include access to complete a financial transaction.
- access is denied when microprocessor 1004 determines that scanned document 1004 is not an original document.
- Figure 10 illustrates an exemplary method of detecting valid original documents using the reading device depicted in Figure 9.
- the scanned representation of document 1001 and a representation of a co ⁇ esponding original document are retrieved by the microprocessor in step SI .
- the microprocessor 1004 reviews the scanned representation of document 1001 to determine if predetermined security images are present in the scanned document, the predetermined security images are preferably images which are latent security images which are not expected to be reproduced in a copy of the document, such as images constructed in accordance with the principles of Figure 3. If the predetermined security images are not present in document 1001, NO in step S2, then microprocessor 1004 determines that scanned document 1001 is not an original document, and may instruct display 1005 to display "COPY" or "INVALID” or the like instructions.
- microprocessor 1004 may indicate that the document is an original document, or as an increased security measure, microprocessor 1004 may analyze the layout of the scanned document 1001, as illustrated in step S3.
- the analysis of the layout may include analysis of the location of printed images, both visible images and latent images, analysis of the color, including black and white areas, and/or analysis of the frequency, pitch and/or angles of lines of an image.
- the layout of scanned document 1001 is compared to the expected layout of an original document, as illustrated in step S4.
- step S4 determines that scanned document 1001 is not an original document, and may instruct display 1005 to display "COPY” or "INVALID” or the like instructions. If the layout does match the expected layout, YES in step S4, microprocessor 1004 determines that scanned document 1001 is an original or valid document and may instruct display 1005 to display "ORIGINAL” or "VALID", or the like instructions.
- Figure 11 illustrates an exemplary device for reading a bar code image formed on a document.
- document 2001 preferably contains a bar code image 2007 which is hidden to the human eye.
- Magnifying unit 1002 preferably magnifies bar code image 2007 and provides the magnified image to bar code reader 2003.
- Bar code reader 2003 is preferably a conventional bar code reader capable of reading a plurality of substantially parallel lines and detecting at least one of the pitch, frequency and thickness of the plurality of the substantially parallel lines.
- Bar code reader 2003 provides the detected information to a microprocessor 2004, which uses the detected information to determine the content of recorded information in the bar code image 2007.
- the recorded information may preferably include information of the authenticity and identity of document 2007, such as the name of a person using an identification card as document 2001.
- Microprocessor may authenticate document 2001 carrying bar code 2007 in the same manner as illustrated in Figure 10, in which case bar code 2007, and the corresponding information recorded by bar code 2007, would preferably be one of the detected security images in step S2.
- bar code 2007 may be used with other security images and with the layout of document 2007 to determine if document 2007 is an original or valid document. In this manner, a counterfeit document or a copied document in which bar code 2007 may have been successfully reproduced would result in the denial of access.
- the architecture illustrated in each of Figures 9 and 11 may be entirely contained in a single device or multiple devices, and the functions associated with the architecture in Figures 9 and 11 may be performed by programmable software. Moreover, the operations illustrated in Figure 10 may be performed by programmable software on an internal or external memory (not shown) associated with microprocessor 1004 or 2004, respectively, such as a ROM or a RAM or any other memory. The software that performs the operations illustrated in Figure 10 may be embodied in the form of data in a computer readable medium.
- a computer readable medium within the scope of this disclosure includes any medium, physical or metaphysical, which is capable of carrying information in a form which can be read by an appropriately configured computer or mobile communication device and associated peripheral devices of the computer or station, including, but not limited to: an optical readable/writeable disc, a magnetic disk, a readable/writeable card, a magnetic tape, an electrical transmission signal for wireline or wireless transmission or optical transmission of data using electrical and or electromagnetic signals.
- the data associated with the programmable software may be in the form of packetized digital data.
- Figure 12 illustrates an exemplary conductive image 1200 on document 100, also containing a plurality of security images 1, 10, 20, 30, 40, and 52, which are discussed in connection with Figures 1-7.
- Exemplary conductive image 1200 preferably contains at least two contact areas 1201 which are connected by a conductive trace 1202.
- contact areas 1201 and conductive trace 1202 may be hidden or obscured from view by being elements of an image and/or being imbedded.
- the conductive image 1200 may be used to verify the validity of the document.
- contact areas 1201 and conductive trace 1202 may be made of any suitable conductive medium, such as metallic pads or strips, conductive ink, or suitable conductive materials.
- Figure 13 illustrates an exemplary reading device 1300 which may be used to with conductive image 1200 to verify the document.
- the reading device may preferably be in the shape of a pen.
- Exemplary reading device 1300 preferably contains a controller 1301 which provides a voltage across wires 1303 to cause a current to flow through probes 1304 when they are applied to a valid document 100 having a conductive trace 1200.
- the cu ⁇ ent provided preferably flows through one of probes 1304, one of contact areas 1201, conductive trace 1202 to the other probe through the other contact area and back to controller 1301 through wire 1303, i.e. completing an electrical circuit.
- indicator light 1302 is preferably provided which lights up when the cu ⁇ ent is passed through the conductive trace 1202 from one probe 1304 to the other, denoting a valid document.
- indicator light 1302 may consist of one or more single color LEDs, or LEDs of multiple colors, which light up when a sufficient amount of cu ⁇ ent or voltage is received. For example, when an activation switch (not shown) is pressed on reading device 1300, indicator light 1302 may light up green if the circuit has been completed (a valid document is detected), or may light up red, or not at all, if the circuit has not been completed (the document is not valid).
- indicator light 1302 may be replaced with an indicator display, such as a conventional voltmeter, which may display various attributes based on the received cu ⁇ ent, such as the amplitude of the cu ⁇ ent or voltage or the measured resistance of the conductive trace, and any of these values may be used to determine if a document is valid.
- an indicator display such as a conventional voltmeter, which may display various attributes based on the received cu ⁇ ent, such as the amplitude of the cu ⁇ ent or voltage or the measured resistance of the conductive trace, and any of these values may be used to determine if a document is valid.
- Figures 14 and 15 illustrate an exemplary embodiment for detecting and inhibiting illegal desk top publishing of documents.
- a document 1401 being scanned by scanning unit 1403 may contain a security image 1407.
- Security image may preferably be an image made in accordance with the principles discussed in connection with Figures 1-9 of this application.
- Microprocessor 1404 preferably contains a list of prohibited images in memory 1412, such as U.S. cu ⁇ ency (e.g. a U.S.
- $100 bill and preferably stores a plurality of attributes of the prohibited images, such as at least one of a predetermined hidden or non-hidden security image, the layout of the prohibited image or selected portions of the prohibited image, hidden or non-hidden artwork or bar codes on the prohibited image, the line characteristics such as line density, line style (e.g. lines, dots, spots) line patterns, and line color of a predetermined part or all of the prohibited image.
- a predetermined hidden or non-hidden security image the layout of the prohibited image or selected portions of the prohibited image, hidden or non-hidden artwork or bar codes on the prohibited image
- the line characteristics such as line density, line style (e.g. lines, dots, spots) line patterns, and line color of a predetermined part or all of the prohibited image.
- Microprocessor may receive images through the Internet from a web based server 1420 or from any other internal or external source, such as a hard drive, a CD, DVD or floppy disk drives, a memory card/stick or wireline and/or wireless communications, as illustrated in step SI 51 in Figure 15.
- a received image is evaluated to determine if it contains a predetermined security image which designates the image a prohibited image, as illustrated in step SI 52. If the image does not contain a predetermined security image, NO in step SI 52, then the document is evaluated by detecting for the presence of one or more predetermined attributes which are preferably uniquely associated with a prohibited document as discussed above, as illustrated in step SI 53. If the image is not determined to be a prohibited image to reproduce, microprocessor 1404 provides instruction to printer 1414 to print the image.
- microprocessor 1404 When a prohibited image is detected, YES in steps SI 52 and SI 54, microprocessor 1404 preferably inhibits printer 1414 from reproducing the document and stores illegal activity documentation information documenting the attempted illegal activity into a log on memory 1412.
- the illegal activity documentation is preferably held in memory 1412 so that law enforcement authorities may open up the database and review the illegal activity.
- the stored illegal activity documentation information may include an identification of the document attempted to be reproduced, such as an image of the document, identification of the source of the image of the document (e.g. from a web server, scanner, etc.), user identification such as the computer identification and user address, and date and time of attempted illegal activity.
- the illegal activity documentation may also include the path of the illegal document from emails and the Internet, such as web addresses, and the length of time the user spent on particular websites, the screen name and what servers the document came from. Servers that host the websites would preferably contain a similarly programmed microprocessor, such as having the same program or as having a specially designated guard chip. If the user is logged on the internet, microprocessor 1404 may also initiate a silent communication with law enforcement authorities by using communication software or device 1410 to connect to the authority's server 1421 without the user's knowledge or initiation and send the illegal activity documentation information. If the user is not logged onto the Internet, microprocessor 1404 will preferably cause the communication to be sent upon the next or later logon operations.
- Microprocessor 1404 may also cause a computer in which it resides (not shown) to be shut down, and/or to also shut down an email system if the document was received from another computer when an illegal operation is detected.
- the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Editing Of Facsimile Originals (AREA)
- Facsimile Image Signal Circuits (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Image Processing (AREA)
Abstract
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US44328903P | 2003-01-29 | 2003-01-29 | |
US44329003P | 2003-01-29 | 2003-01-29 | |
US44328803P | 2003-01-29 | 2003-01-29 | |
US443290P | 2003-01-29 | ||
US443288P | 2003-01-29 | ||
US443289P | 2003-01-29 | ||
PCT/US2004/001360 WO2004068421A2 (fr) | 2002-10-10 | 2004-01-20 | Document contenant des images securisees |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1604338A2 true EP1604338A2 (fr) | 2005-12-14 |
Family
ID=35206792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04703643A Withdrawn EP1604338A2 (fr) | 2003-01-29 | 2004-01-20 | Document contenant des images securisees |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1604338A2 (fr) |
JP (1) | JP2006521721A (fr) |
CA (1) | CA2514046A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8444181B2 (en) | 2002-10-10 | 2013-05-21 | Document Security Systems, Inc. | Single-color screen patterns for copy protection |
JP5178924B2 (ja) * | 2009-02-26 | 2013-04-10 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | ボイドパンタグラフを使用する方法 |
US11787220B2 (en) * | 2020-03-11 | 2023-10-17 | Koenig & Bauer Ag | Security element, security document including a security element, and device and method for producing a security element |
-
2004
- 2004-01-20 CA CA002514046A patent/CA2514046A1/fr not_active Abandoned
- 2004-01-20 EP EP04703643A patent/EP1604338A2/fr not_active Withdrawn
- 2004-01-20 JP JP2006502889A patent/JP2006521721A/ja active Pending
Non-Patent Citations (1)
Title |
---|
See references of WO2004068421A2 * |
Also Published As
Publication number | Publication date |
---|---|
CA2514046A1 (fr) | 2004-08-12 |
JP2006521721A (ja) | 2006-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7906198B2 (en) | Document containing security images | |
US20050219599A1 (en) | Document containing security images | |
CA2501513C (fr) | Document contenant des images de securite | |
JP3590812B2 (ja) | 高速文書確認システム及び確認用文書並びに文書確認方法 | |
JP3610079B2 (ja) | 記録記入をもつ文書の正当性評価を行う方法 | |
US6948657B2 (en) | Document verification system | |
EP1209897B1 (fr) | Systèmes et procédé pour l'impression à base de règles et pour la détection de contrefaçons | |
EP1514227B1 (fr) | Modeles d'authentification visibles pour documents imprimes | |
EP1297436B1 (fr) | Procede permettant d'emettre des tickets electroniques | |
EP2320389A2 (fr) | Motifs d'authentification visibles pour document imprimé | |
JP2011034535A (ja) | 本人確認書類真贋判定装置 | |
JP2005204250A (ja) | 証明書確認方法、証明書確認プログラム及び証明書 | |
EP1604338A2 (fr) | Document contenant des images securisees | |
CA2570983A1 (fr) | Protection contre le scannage d'un document tout en couleur | |
US20070133023A1 (en) | Document For Determining Interference Scanning Frequencies | |
ZA200505348B (en) | Document containing security images | |
KR20020003357A (ko) | 위조 억제 시스템 | |
CA2597184A1 (fr) | Document contenant des images de securite | |
KR100458494B1 (ko) | 온라인 상으로 발급된 출력물의 복사 방지를 위한 방법 및이를 이용한 시스템 | |
US20220398419A1 (en) | Automated calibration and optimized patch set creation for void pantograph | |
JP2003234892A (ja) | 画像処理装置およびその方法 | |
JP2006289776A (ja) | 通帳処理方法、その実施装置及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050704 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: WICKER, DAVID, M. Inventor name: WICKER, THOMAS, M. Inventor name: WHITE, PATRICK, J. |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20070801 |