GB2304077A - Security device comprising reflective particles - Google Patents

Security device comprising reflective particles Download PDF

Info

Publication number
GB2304077A
GB2304077A GB9525734A GB9525734A GB2304077A GB 2304077 A GB2304077 A GB 2304077A GB 9525734 A GB9525734 A GB 9525734A GB 9525734 A GB9525734 A GB 9525734A GB 2304077 A GB2304077 A GB 2304077A
Authority
GB
United Kingdom
Prior art keywords
security device
card
reflective particles
signature
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9525734A
Other versions
GB9525734D0 (en
Inventor
Andrew John Farrall
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of GB9525734D0 publication Critical patent/GB9525734D0/en
Publication of GB2304077A publication Critical patent/GB2304077A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/21Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for multiple purposes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/373Metallic materials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F3/0291Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time
    • G09F3/0294Labels or tickets undergoing a change under particular conditions, e.g. heat, radiation, passage of time where the change is not permanent, e.g. labels only readable under a special light, temperature indicating labels and the like
    • B42D2033/18
    • B42D2035/20

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A security device comprises reflective particles in the form of flakes or granules 50 randomly distributed in three dimensions throughout the substrate 10 or in a coating 53. The particles reflect light at different angles and directions thereby creating a unique reflected light signature for detection by a reading device. The flakes may be of metal. The device may be a credit card or identity card, tag or label.

Description

A SECURITY DEVICE The present invention relates to a security device and relates particularly, but not exclusively, to such a device incorporating a plurality of reflective elements used to create a unique reflected light signature.
Most commercial security systems rely - to a greater or lesser extent - on security passes or identity cards of one kind or another. There are many types in use, from identity cards controlling physical access by specified personnel, to credit cards allowing cash to be drawn from a specified bank account. If even a single card is illegally duplicated then, at best, the security of the system will be compromised and, at worst, the system will fail completely.
Of course, modern identity cards carry numerous devices designed to make duplication very difficult. These range from photographs of the authorised holder, and laser-etched copies of the authorised signature, through to laser holograms attached to the surface of the card. However, it has to be said that such devices can only make duplication difficult, from a practical point of view they do not make it impossible.
It is an object of the present invention to provide a security device which reduces and possibly eliminates the disadvantages associated with the abovementioned systems.
Accordingly, the present invention provides a security device or card having a unique and massive set of characteristics ("signatures") which - in practical terms - can never be duplicated.
In particular the present invention provides a security device comprising a plurality of reflective particles randomly distributed in three dimensions throughout a carrier material, said reflective particles in use acting to reflect light from a source thereof at a plurality of different angles and directions thereby to create a unique reflected light signature for detection by a signature reading device.
The present invention will now be more particularly described by way of example only with reference to the accompanying drawings, in which: Figure 1 is a diagrammatic representation of a security device in accordance with the present invention; Figure 2 is a graphic representation of the effect of rotation of the reflective particles in X/Y plane; Figure 3 is illustrates the signature reading device which forms part of the present invention; and Figures 4 and 5 are full and expanded cross sectional views respectively of a further embodiment of the present invention.
Consider a plastic card such as that used for credit or access control. Devices such as holograms and magnetic stripes attached to the card are man-made; hence, by logical extension, they are capable of duplication by man. The present device 10, on the other hand, relies on a signature set derived from a totally random feature - the presence of shiny metallic particles 12 randomly distributed in three dimensions throughout the very fabric of the device which is conveniently illustrated in the form of a card. When light L, in the form of narrow beams, is shone through the card 10 it may, or may not, be reflected depending upon whether or not it strikes a metal particle 12.
Random distribution of the metal particles 12 is achieved by stirring them into the bulk plastic material during manufacture, and before any individual cards are moulded or cut out. Hence the final position of any given particle inside any given card is defined purely by chance.
A number of anti-fraud systems have already been proposed which rely on reflective material of some kind embedded within the fabric of the card. The present invention, as explained below, is a radical new departure because it reacts not just to the presence (or absence) of reflective particles but also to the spatial orientation of each individual particle.
If metallic particles 12 in the form of thin flakes, rather than (say) spheroids, are used as reflectors then two distinct random factors come into play: the distribution of the flakes within the fabric of the card, and the orientations of those flakes with respect to the card boundaries. Orientation within the card 10 is vitally important because the angle at which any light L is reflected will depend upon both the angle at which the light strikes the card and the angle at which the particle is laying inside the card.The effect of orientation in just one dimension is shown schematically in Figure 2. (The importance of orientation will become apparent when we discuss the way in which a card signature is decoded.) Anybody attempting to duplicate a card made by the Crystal Chip process faces the problem of duplicating the exact individual distribution - and orientation - of possibly hundreds of minute metal fragments. If even one fragment is out of position, or incorrectly rotated, then the fraudster runs the risk of the fake being detected because one flake out of alignment may mean the card giving the wrong "response" when scanned by the security system.
Before going on to discuss how signatures are decoded it may be as well to look in a little more detail at the topic of flake distribution within the card fabric.
The following assumptions will be made: 1) that the card has external dimensions of 8.00cm x 5.00cm x 0.2cm (i.e. approximately credit card size, but a little thicker) 2) that each flake is laminar and 0.10cm square.
The maximum number of flakes possible across the horizontal (major) face of the card is given by the simple equation: (8.00 x 10) x (5.00 x 10) = 4,000 flakes It is, of course, theoretically possible to have many parallel horizontal layers of flakes distributed throughout the thickness of the card since the flakes are of negligible thickness, but for the purposes of this "minimal" analysis those additional flakes will be ignored.
So, if one major face of the card can contain 4,000 flakes then it follows that both major faces could contain a total of 8,000 flakes. Ignoring the flakes held deep inside the card, and assuming that the card only holds approximately 5% of the theoretical maximum it follows that a card can easily hold some 300 - 400 flakes randomly distributed throughout its length, breadth and thickness.
The counterfeiter is faced with the task of duplicating the position and orientation of these 300 - 400 tiny flakes if he is to make an accurate copy of the card capable of analysis by the security system, i.e. signature decoding.
To decode the signature the card is placed in a series of narrow light beams which strike the card at an acute angle. If a beam hits a flake then it will be reflected and detected by one of a number of photoelectric cells 20 positioned in a group above the card. These "hits" are used to specify the card's signature, and can be recorded in binary form with (say) a miss being 0 and a hit being 1. The system shown in Figure 3 is just one example of how the signature of a card can be interrogated; factors such as the positioning of lights and photodetectors can be arranged to suit particular system requirements.
The factors controlling which photodetector is hit by which light beam are numerous (an obvious one is the positioning of the light sources with regards to the detectors) but, as was explained above, there are two totally independent factors which result directly from the card's structure - the depth of each flake under the surface of the card, and the respective orientations of these flakes.
Depth in the flake Consider Figure 1. Assume that a beam is striking the card at an acute angle. If the flake is just under, yet parallel to, the surface of the card position "A'1 then the beam will be reflected away and - in accordance with the laws of physics - the angle of reflection will equal the angle of incidence.
Now consider the case where the flake is some distance under the surface of the card but still parallel to the surface [Position "B'1. As before the angle of reflection will equal the angle of incidence, but geometry dictates that the beam will emerge from the card at a point further along the card's surface. If the group of detectors is kept small in relation to the dimensions of the card then the beam reflected from Position "A" will hit a different detector to the beam reflected from Position "B".
NOTE: For the purposes of this analysis any possible effects due to refraction at the cardl air boundary have been ignored.
Orientation of the flake This is a primary factor in determining the signature set of any given card. As Figure 2 demonstrates, the incident beam can be reflected in any direction, not only away from the light source but even towards it. In other words, a beam entering the card through the top surface can exit from virtually any point on any surface of that card.
Reference has been made to any one card having a number of signatures. This arises from the fact that the card can be illuminated at different angles, from different light sources, and from different positions (e.g. first from the front, then from the side). Altering the source of light, or altering the angle of illumination relative to the card, will generate a different set of reflected beams and hence a different signature.
Most importantly, note that moving (or rotating) the light source(s) will mean that a different set of reflectors will be illuminated because the light beams will enter the card at a new angle(s) and at a new point(s) on the card surface.
This means that a counterfeiter trying to copy a card which will be scanned in two or more ways by the security system has no option but to try and accurately duplicate the position (in three dimensions) and the rotation (in three dimensions) of maybe 400 reflective particles. He cannot afford to ignore any reflector because he has no way of knowing which reflectors will be scanned by the system.
NOTE: The signature decoded by the system is a function of the system, NOT of the card.
Any given card contains a large (if not infinite) set of passive random signatures. The particular signature detected at any given time can be changed very simply by, for example: - changing the layout of the beams and sensors, - by scanning the card from a different direction, - by scanning the card from a different angle, or - by changing the order in which the sensors are interrogated.
As has been demonstrated above, the number of detectable signatures in a card is a function both of the number of narrow beams used to illuminate the card and the number of detectors used to identify the reflected beams.
Mathematically the signature can be expressed as the selection of sensors illuminated by the card's reflectors taken from the total number of sensors available in the decoder.
For example; consider an arrangement whereby the card is illuminated using the arrangement shown in Figure 3. [Note that this is just an example arrangement - the layout of sensorsi llght sources can be changed to meet individual system requirements]. Light source "A" contains 5 independently rotatable lights shining down from left to right, and light source "B" similarly contains 5 independently rotatable lights beaming down from right to left.
The reflected beams are detected by a bank of 50 photodetectors arranged as a 10x5 matrix positioned between the light sources. The signature of the card on this occasion is thus represented by a random selection of 10 sensors being activated by the card out of a total of 50 equally available sensors.
Expressed mathematically this choice is given by the expression: nCr = ni(n-l n(n-1)(n-2 + where n = total number of sensors available for illumination r = actual number of sensors illuminated.
Inserting the figures for this example gives the result: 50 [C] 10 = 10,272,278,170 which means that there are over ten billion different ways in which any ten sensors can be illuminated at random out of a group of 50.
Put another way, the odds against two cards having an identical signature are in excess of 1:5,000,000,000 (over 5 billion to one against).
From a practical engineering point of view it might be decided to use fewer light beams or sensors. If the above calculation is repeated using only 30 sensors (in an array of 6x5) illuminated by 10 beams the number of possible random combinations becomes: 30 [Cl 10 = 30,045,015 Odds against any two cards having identical signatures are now some 15 million to one against.
The basic card is envisaged as a piece of transparent perspex 8.00cm long by 5.00cm wide by 0.2cm thick, with laminar 0.10cm square fragments of reflecting material dispersed randomly throughout the card material.
This, however, is a very simplistic model of the Crystal Chip card because the parameters can be changed in a wide variety of ways. For example: 1) depending upon the number and width of the light beams the card can be made thinner, or made in a different shape entirely. The reflecting fragments could also be made smaller; 2) one face of the card could be overprinted with normal security information, such as the holder's photograph or card serial number, and the card then scanned through the opposite face; 3) magnetic striping could be applied to the card as an additional feature so as make it acceptable (for other purposes) to swipe card readers; 4) by systematically changing the configuration of the sensors, and/ or their interrogation order, and/ or the relative angles between card, lights and sensors, the designer can carry out an automatic "sweep" to identify forgeries.
(The true card will generate a series of signatures as the system configuration changes: a forger may be able to duplicate one of those signatures, but he will never be able to duplicate the full series since that would require the building of an exact replica of the true card).
5) the card can be used in conjunction with other standard features such as PIN numbers and/ or passwords; 6) the raw binary information recording hits and misses can be encrypted before the result of the card's scan is transmitted to the central control.
Examples of the system in use System I - industrial access control In this case the cards are used in conjunction with the normal keypad/ PIN number system to relate personnel to the card held.
At the time of its issue a new card is "initialized" in that it is put through a master scanner held by the Security Manager (or his designated officer) and the result of this scan entered on the recipient's file in the security system computer.
Also held in this secure file is the recipient's PIN number or password (of a suitable arbitrary type and length), details of the area(s) to which access is authorised, and any other information which the Security Manager has deemed appropriate.
To access a controlled area the holder places the card in the scanner and keys in his PIN/ password on the scanner's keypad. The computer compares the card's signature with the password/ access details held on file and - if a match is found - permits access.
If the signature of the card used does not match the PIN keyed in then access will be denied. Similarly, if a correctly issued card is used to attempt access to the wrong area then, again, such access will be denied.
The card's ability to give more than one signature can be exploited by arranging for scanners for different areas to have different light sensor configurations. In such a case the new card would have to be "initialized" into the system using master scanners appropriate to each permitted area. Using multiple signatures in this way allows for a very high level of access control to be set up.
If it were felt that the link between the individual entry control points and the master computer were a security weakness then the signature generated by the card could be encrypted using normal electronic techniques prior to transmission to the master computer.
To facilitate ordinary security procedures the card could be printed on one side with normal details such as photograph, signature etc, and then be scanned from the other side.
System II- - credit card system The purpose of this system is to identify the card offered and to compare its Crystal signature with the cardholder details held on file.
As with the industrial system the card's signature is first established prior to issue and recorded on the system.
Each Automatic Teller Machine (ATM) would have the same sensor/ detector configuration fitted as standard so that the card was always read the same way. The signature derived from the card would be compared with the PIN code to confirm whether the card was the original or a forgery (a forgery would generate the wrong electronic signature). Once the validation checks were completed the transaction could continue in the normal way.
For this system to be effective the ATM would need to communicate with the bank's central computer in real-time to compare the signatures PIN offered with the signatures PIN held on file for that particular customer.
Since the card could also bear a magnetic strip it could carry other information, such as credit limits etc, required by the banking system.
System 111- - document identification This system is aimed at the identification of valuable original documents such as wills, contracts etc.
Instead of a perspex card a thin transparent sheet of security plastic (see below) containing an encapsulated Crystal Chip is attached to the document by strong adhesive. The idea is that during production this sheet's Chip - the "document tag" - is initialized by a standardised scanner and the decoded identity is printed on the tag in the form of a visible, indelible, unique reference number. This number is obtained by converting the binary output from the detectors (the register of "hits" and "misses") into a series of numbers and/ or letters using an agreed pre-determined protocol.
The transparent plastic sheet encapsulating the Crystal Chip has an adhesive lower face and contains two chemicals separated by a thin membrane. If the sheet is subjected to mechanical stresses, such as cutting or twisting, the membrane will rupture allowing the two chemicals to react together. These chemicals are chosen so that a permanent irreversible reaction will occur causing the immediate formation of an opaque layer blanking out both the face of the tag and its border. Not only is the tag rendered useless but it becomes immediately obvious that it has been attacked.
When the document is ready for signing etc. a clause is inserted to the effect that the original ".... is identified by the attached document tag, serial number * ". In the presence of witnesses that tag is then permanently affixed to the document ensurina that the adhesive transDarent sheet covers the clause identifvina the tag number and the signatures of the witnesses.
A person attempting to forge a copy of the original would also have to forge the identity tag - which is a practical impossibility. Realistically his only options are either to transfer the tag from the original to the forgery, or to affix another tag. However: - transference is thwarted by the fact that the original and its tag are permanently bonded together: separating them will - at best - rupture the security cover on the tag (so blacking it out) and may even destroy both components; - affixing another tag to a forgery is not a viable alternative since each tag carries, permanently displayed on it, the unique reference number generated by its Crystal Chip capsule during manufacture. The number of the original tag will be shown on the original document and will not match that permanently displayed on the new tag.If, as a matter of routine, a controlled (and protected) record is kept of original documents and their tag numbers then undetected substitution of a second tag should be impossible.
System IV - passport/ ID card identification This is an enhanced version of System Ill designed to deal with the special problems associated with detecting forged passports, national ID cards, vehicle documents and so on.
During its manufacture the original document is overlaid with a Crystal Chip tag which has been constructed and labelled as in System Ill. The reference number of the tag is printed onto the document prior to the tag being overlaid, and the tag is positioned so as to cover that printed number.
Since the document may be examined at any time by any authorised official it is essential that the generation of the tag number, and the official inspection of the tag when it is in place, are carried out according to an agreed national (or international) protocol. It is vital that standards are laid down covering such matters as: - the conversion of the tag's binary output into its unique reference number1 and; - the configuration of the lights and photodetectors in the scanner.
To ensure that the document is correctly aligned in the scanner prior to examination the document would have two or more holes drilled in it by which it would be held accurately in place in the scanner during examination. The configuration/ placing of these holes would again be governed by an agreed protocol.
It is envisaged that the scanner used in this system would be based broadly upon that shown in Figure 3, but with the following additional features: 1) be hand held in use 2) be totally portable 3) contain suitable electronic systems to decode the signature 4) contain an integral screen, similar to that on a pocket calculator, on which would be shown the detected signature in the form of a numeric, or alphanumeric, display.
Having obtained a readout from the scanner the official would compare that readout with the printed tag number shown on the document. If they do not match then the document would immediately be treated as suspect and the necessary enquiries would be carried out.
It is assumed that a competent forger making (say) a complete passport, rather than modifying an existing real one, would apply a Crystal Chip tag whose number matched that of his forgery.
However, as a matter of course, documents such as passports and identity cards carry an ordinary sequential serial number. Comparing that serial number with both the name of the authorised holder and the number of the tag originally issued would quickly reveal a forgery. Either the serial number would not match the authorised holder, or the serial number would not match the tag number.
For the system to work as described above it would be necessary to record details of the authorised passport holder, the passport serial number, and the passport tag number on a secure computerised database which could be quickly accessed by the official carrying out the check. Setting up such a system would be both cheap and simple.
The system described above could be used to protect a range of official documents including: - passports - identity cards - vehicle MoT test certificates - driving licences - vehicle excise licences - high value theatre tickets - gift vouchers - banknotes - cheques.
System V - counterfeit goods protection This is another variation of System ill designed to protect high value goods from the threat of counterfeiting.
In this process the Chip manufacturer mass produces small Crystal Chips which are overprinted during manufacture with their unique signature numbers (derived using a standardised process). The signature is displayed both as a printed number (or combination of letters and numbers) and as a barcode. Batches of Chips are then sold on to approved manufacturers of videos, CDs, high value aircraft components, high value electrical goods, etc.
By selling only to approved manufacturers access to the Chips can.be carefully controlled, thus ensuring they do not fall into the hands of counterfeiters.
The approved manufacturers then attach a Chip to each item they produce, while at the same time, by means of the barcode, keeping a secure record of the Chip numbers assigned to each individual item.
Should a product be suspected of being counterfeit it would be a simple matter to scan the Chip and then compare the derived signature with the supposed manufacturer's records.
Note that the check is done by scanning the Chip itself: barcodes may be forged, but the Chip's true signature cannot be altered.
Turning now to figures 4 and 5, from which it will be appreciated that the present invention could make use of three dimensional granules 50 of reflective material ( rather than flakes ) in which each granule comprises a plurality of randomly distributed and orientated reflective surfaces 52.
These surfaces may be employed in much the same way as those described above but, as each granule 50 comprises a plurality of reflective surfaces 52, each granule can provide a plurality of reflected light beams for creation of a significantly more complex "signature". Each granule can be as small as 100 microns in diameter and still provide a unique and identifiable reflection. Such a granular arrangement may employ granules 50 in the body of the security device itself or in a transparent coating 53 applied to the security device. Indeed, the coating may even comprise the security device itself and may be applied to, for example, an aircraft component requiring a unique identification marking.Clearly, the flake arrangement might also be employed in this manner. the granules 50 may be held in suspension in the coating or applied to the surface 54 of a base 56 before a protective coating is applied. When applied to the base 56, one or other of the reflective surfaces 54 will tend to act as a bottom surface 58 securely locating the particle itself. In practice, it will be appreciated that the protective coating and granules 50 may be mixed together and applied to a surface of an object or the security device in much the same way as one would apply paint to a surface.
Further to the above, it will be appreciated that the protective coating 53 need not be visually transparent as on e could employ materials transparent only to infra red or ultra violet or other wavelengths of light.
Counterfeiting of the granular based system is considerably more difficult than the flake based system as it is necessary to replicate the position of each granule and the angular orientation of a plurality of randomly distributed reflective surfaces provided thereon. For all practical purposes, such replication is impossible.
For the purpose of a multi-level security device, one could interrogate the granules from a number of different angles, each angle creating a unique "signature". Such an arrangement could be employed when a user is entitled to have access to one restricted area but must be denied access to other, more sensitive, areas.

Claims (1)

1/ A security device comprising a plurality of reflective particles randomly distributed in three dimensions throughout a carrier material, said reflective particles in use acting to reflect light from a source thereof at a plurality of different angles and directions thereby to create a unique reflected light signature for detection by a signature reading device.
2/ A security device as claimed in claim 1 in which the reflective particles comprise flakes of reflective material.
3/ A security device as claimed in claim 1 in which the reflective particles comprise three dimensional granular elements having a plurality of randomly distributed and orientated surfaces provided thereon.
4/ A security device as claimed in any one of claims 1 to 3 in which said reflective particles form an integral part of the carrier.
5/ A security device as claimed in any one of claims 1 to 4 in which the security device comprises the carrier material and reflective particles themselves.
6/ A security device as claimed in any one of claiims 1 to 5 in which said device comprises a credit card, an identity card , an identity tag or identity label.
7/ A security device as claimed in any one of claims 1 to 6 in which said reflective particles are randomly distributed throughout the entire body of the security device.
8/ A security device as claimed in any one of claims 1 to 7 including means for presenting further security information on a surface of the device itself.
9/ A security device as claimed in any one of claims 1 to 8 including a magnetically stored PIN number or password.
10/ A security device as claimed in any one of claims 1 to 9 when manufactured by mixing the reflective particles into the buik of material used to form said device and then forming said device with said particles embedded therein.
11/ A security device as claimed in any one of claims 1 to 10 further including a signature reading device comprising a light source for directing light onto a surface of the device, light detector means for detecting the presence or absence of reflected light at a plurality of points adjacent the device and means for decoding a signal generated by said detectors thereby to create an electric signal for subsequent use in an automatic identification procedure.
12/ A security device as claimed in claiml 1 in which said signature reading device includes a plurality of photo detectors positioned in a matrix formation and configured for creating a binary coded signal upon being hit or nissed by reflected light.
13/ A security device substantially as described herein with reference to and as illustrated in the accompanying drawings.
GB9525734A 1995-06-30 1995-12-15 Security device comprising reflective particles Withdrawn GB2304077A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB9513361.7A GB9513361D0 (en) 1995-06-30 1995-06-30 A security device

Publications (2)

Publication Number Publication Date
GB9525734D0 GB9525734D0 (en) 1996-02-14
GB2304077A true GB2304077A (en) 1997-03-12

Family

ID=10776930

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB9513361.7A Pending GB9513361D0 (en) 1995-06-30 1995-06-30 A security device
GB9525734A Withdrawn GB2304077A (en) 1995-06-30 1995-12-15 Security device comprising reflective particles

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB9513361.7A Pending GB9513361D0 (en) 1995-06-30 1995-06-30 A security device

Country Status (1)

Country Link
GB (2) GB9513361D0 (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2324065A (en) * 1997-04-09 1998-10-14 James Howard Slater An identification code for banknotes or credit cards comprising a pattern of random beads
WO2001057831A1 (en) * 2000-02-04 2001-08-09 Societe Novatec S.A. Method and device for reading authentication means and adapted identification means
FR2804783A1 (en) * 2000-02-04 2001-08-10 Novatec Sa Soc Method for identifying and authenticating objects, human beings, or transactions designed to optimize reading of a non reproducible identifier
WO2001080236A1 (en) * 2000-04-13 2001-10-25 De La Rue International Limited Recording medium and manufacturing method
WO2002018155A2 (en) * 2000-08-29 2002-03-07 november Aktiengesellschaft Gesellschaft für Molekulare Medizin Method for forgery-proof labeling of items, and forgery-proof label
WO2002050790A1 (en) * 2000-12-20 2002-06-27 Alphafox Systems Limited Security, identification and verification systems
US6830192B1 (en) 1998-04-20 2004-12-14 Vhp Veiligheidspapierfabriek Ugchelen B.V. Substrate which is made from paper and is provided with an integrated circuit
EP1674286A1 (en) * 2004-12-23 2006-06-28 Arjowiggins Security Security element having a digitised mark and security support or document comprising same
GB2423615A (en) * 2005-02-25 2006-08-30 Hewlett Packard Development Co Identifier for a memory tag
GB2426100A (en) * 2005-05-11 2006-11-15 Ingenia Technology Ltd Authenticity verification of printed token
WO2007012816A1 (en) * 2005-07-27 2007-02-01 Ingenia Technology Limited Verification of authenticity
GB2428846A (en) * 2005-07-27 2007-02-07 Ingenia Technology Ltd Prescription authentication utilising networked system
GB2429092A (en) * 2005-07-27 2007-02-14 Ingenia Technology Ltd Access to data using a token with intrinsic signature
GB2429096A (en) * 2005-07-27 2007-02-14 Ingenia Technology Ltd Online authenticity verification utilising third party
FR2890666A1 (en) * 2005-09-15 2007-03-16 Arjowiggins Security Soc Par A Structure for making safety and/or value document, comprises a fibrous material substrate, a surface layer deposited on face of the substrate, substrate heterogeneities, authentication and/or identification information, and a data carrier
FR2893595A1 (en) * 2005-11-23 2007-05-25 Novatec Sa Sa Soc Tamper proof seal for e.g. controlling and proving non intrusion, has authenticators moved with respect to each other in open position and fixed in closed position, where authenticators are evolved in chaotic manner each time seal is opened
WO2007090437A1 (en) * 2006-02-06 2007-08-16 Veil, Marc Protection system, protection method and an element protected in this way
GB2440325A (en) * 2006-07-21 2008-01-30 Hewlett Packard Development Co Tamper label, random distribution pattern, memory chip
US20080142671A1 (en) * 2004-11-04 2008-06-19 Novatec Sa Method and Device for Verification of Non Intrusion Into a System and/or Non-Violation of the Integrity of an Object or the Contents Thereof
US7438237B2 (en) * 2002-12-13 2008-10-21 Novatec Sa Method for identification and authenticating without specific reader an identifier
US7647279B2 (en) * 2003-10-02 2010-01-12 Novatec Sa Method to make transactions secure by means of cards having unique and non-reproducible identifiers
DE102008051409A1 (en) * 2008-10-11 2010-04-15 Bayer Materialscience Ag security element
EP2236311A1 (en) * 2009-03-31 2010-10-06 Gemalto SA Secure identification document and method for producing it
US7812935B2 (en) 2005-12-23 2010-10-12 Ingenia Holdings Limited Optical authentication
US7853792B2 (en) 2004-03-12 2010-12-14 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
US7898648B2 (en) 2004-12-17 2011-03-01 Koninklijke Philips Electronics N.V. Optical identifier comprising randomly oriented partial faces
US8056822B2 (en) 2005-12-21 2011-11-15 Novatec Sa Method for certifying and subsequently authenticating original, paper of digital documents for evidences
US8103046B2 (en) 2004-08-13 2012-01-24 Ingenia Holdings Limited Authenticity verification of articles using a database
CN101258528B (en) * 2005-07-27 2012-03-21 英根亚控股有限公司 Authenticity verification
ITLU20100013A1 (en) * 2010-10-06 2012-04-07 Cosimo Antonio Prete METHOD TO VERIFY AUTHENTICITY AND INTEGRITY OF A PRODUCT WITH PARTIES MADE THROUGH MERGER AND SOLIDIFICATION OF MATERIALS THAT ASSUMES CAOTIC PROVISIONS
RU2447501C2 (en) * 2007-02-02 2012-04-10 Фракчер Коуд Корпорейшн Апс Method of graphic code application and device for its implementation
US20120125999A1 (en) * 2009-05-29 2012-05-24 International Frontier Technology Laboratory, Inc. Keycard and keycard-lock
WO2012136902A1 (en) 2011-04-05 2012-10-11 Franck Guigan Security barcode
WO2012177845A3 (en) * 2011-06-23 2013-09-26 Covectra, Inc. Systems and methods for tracking and authenticating goods
WO2013168962A1 (en) 2012-05-07 2013-11-14 Cho Han Yong Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
US8615475B2 (en) 2008-12-19 2013-12-24 Ingenia Holdings Limited Self-calibration
KR101379420B1 (en) 2012-05-07 2014-03-28 조한용 Label for detremining authenticity of a product, method for producing authentication code of the label, methdo and system for determining authenticity of the label, mobile phone for determining authenticity of the label, and computer readable medium for determining authenticity of the label
US8699088B2 (en) 2004-03-12 2014-04-15 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
EP2722192A1 (en) * 2012-10-18 2014-04-23 Bundesdruckerei GmbH Identity card with a physical unclonable function
EP2722191A1 (en) * 2012-10-18 2014-04-23 Bundesdruckerei GmbH Identity card with physical unclonable function
US8892556B2 (en) 2009-11-10 2014-11-18 Ingenia Holdings Limited Optimisation
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
CN109968860A (en) * 2019-03-24 2019-07-05 东莞市将为防伪科技有限公司 A kind of feature particulate matter shaking device
WO2019170293A1 (en) * 2018-03-08 2019-09-12 Cypheme Method for determining the authenticity of a document and device for implementing such a method
US11295126B1 (en) 2021-06-24 2022-04-05 Covectra, Inc. Methods for authenticating goods using randomly distributed flecks and serialization codes

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
US4423415A (en) * 1980-06-23 1983-12-27 Light Signatures, Inc. Non-counterfeitable document system
EP0230497A1 (en) * 1986-01-28 1987-08-05 Maurer Electronics Gmbh Record carrier and method of producing it
EP0364029A1 (en) * 1988-10-10 1990-04-18 Homer Hollandse Meet- En Regelsystemen B.V. Authenticity mark, document carrying such mark, and process and device for reading and validating such mark
EP0388713A2 (en) * 1989-03-22 1990-09-26 Unilever N.V. Composite film
EP0570162A2 (en) * 1992-05-11 1993-11-18 Canon Kabushiki Kaisha Record document authentication by microscopic grain structure and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
US4423415A (en) * 1980-06-23 1983-12-27 Light Signatures, Inc. Non-counterfeitable document system
EP0230497A1 (en) * 1986-01-28 1987-08-05 Maurer Electronics Gmbh Record carrier and method of producing it
EP0364029A1 (en) * 1988-10-10 1990-04-18 Homer Hollandse Meet- En Regelsystemen B.V. Authenticity mark, document carrying such mark, and process and device for reading and validating such mark
EP0388713A2 (en) * 1989-03-22 1990-09-26 Unilever N.V. Composite film
EP0570162A2 (en) * 1992-05-11 1993-11-18 Canon Kabushiki Kaisha Record document authentication by microscopic grain structure and method

Cited By (96)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2324065A (en) * 1997-04-09 1998-10-14 James Howard Slater An identification code for banknotes or credit cards comprising a pattern of random beads
US6830192B1 (en) 1998-04-20 2004-12-14 Vhp Veiligheidspapierfabriek Ugchelen B.V. Substrate which is made from paper and is provided with an integrated circuit
US7032828B2 (en) 1998-04-20 2006-04-25 Vhp Veiligheidspapierfabriek Ugchelen B.V. Substrate which is made from paper and is provided with an integrated circuit
JP2003521717A (en) * 2000-02-04 2003-07-15 ソシエテ ノヴァテク ソシエテ アノニム The steps of the authentication method, the reader therefor and the identification means compatible therewith
JP4944332B2 (en) * 2000-02-04 2012-05-30 ノヴァテク エス.ア. Authentication method steps, reader for the same, and identification means adapted thereto
WO2001057831A1 (en) * 2000-02-04 2001-08-09 Societe Novatec S.A. Method and device for reading authentication means and adapted identification means
US7380128B2 (en) 2000-02-04 2008-05-27 Novatec Sa Method and device for reading authentication means and adapted identification means
FR2804783A1 (en) * 2000-02-04 2001-08-10 Novatec Sa Soc Method for identifying and authenticating objects, human beings, or transactions designed to optimize reading of a non reproducible identifier
FR2804784A1 (en) * 2000-02-04 2001-08-10 Novatec UNIVERSAL METHOD OF IDENTIFYING AND AUTHENTICATING LIVING OBJECTS, PLANTS OR PLACES
WO2001080236A1 (en) * 2000-04-13 2001-10-25 De La Rue International Limited Recording medium and manufacturing method
US7396557B2 (en) 2000-08-29 2008-07-08 November Aktiengesellschaft Gesellschaft Fur Molekulare Medizin Method for forgery-proof labeling of items, and forgery-proof label
WO2002018155A2 (en) * 2000-08-29 2002-03-07 november Aktiengesellschaft Gesellschaft für Molekulare Medizin Method for forgery-proof labeling of items, and forgery-proof label
WO2002018155A3 (en) * 2000-08-29 2003-10-16 November Ag Molekulare Medizin Method for forgery-proof labeling of items, and forgery-proof label
GB2374831A (en) * 2000-12-20 2002-10-30 Alphafox Systems Ltd Security tags with random particles
GB2374831B (en) * 2000-12-20 2004-07-14 Alphafox Systems Ltd Security systems
US7353994B2 (en) 2000-12-20 2008-04-08 Andrew John Farrall Security, identification and verification systems
WO2002050790A1 (en) * 2000-12-20 2002-06-27 Alphafox Systems Limited Security, identification and verification systems
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US7438237B2 (en) * 2002-12-13 2008-10-21 Novatec Sa Method for identification and authenticating without specific reader an identifier
US7647279B2 (en) * 2003-10-02 2010-01-12 Novatec Sa Method to make transactions secure by means of cards having unique and non-reproducible identifiers
US8766800B2 (en) 2004-03-12 2014-07-01 Ingenia Holdings Limited Authenticity verification methods, products, and apparatuses
US8421625B2 (en) 2004-03-12 2013-04-16 Ingenia Holdings Limited System and method for article authentication using thumbnail signatures
US8749386B2 (en) * 2004-03-12 2014-06-10 Ingenia Holdings Limited System and method for article authentication using signatures
US20110109428A1 (en) * 2004-03-12 2011-05-12 Ingenia Holdings Limited System and Method for Article Authentication Using Signatures
US7853792B2 (en) 2004-03-12 2010-12-14 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
US9019567B2 (en) 2004-03-12 2015-04-28 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
US8757493B2 (en) 2004-03-12 2014-06-24 Ingenia Holdings Limited System and method for article authentication using encoded signatures
US8699088B2 (en) 2004-03-12 2014-04-15 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
US8896885B2 (en) 2004-03-12 2014-11-25 Ingenia Holdings Limited Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure
US8502668B2 (en) 2004-03-12 2013-08-06 Ingenia Holdings Limited System and method for article authentication using blanket illumination
US8103046B2 (en) 2004-08-13 2012-01-24 Ingenia Holdings Limited Authenticity verification of articles using a database
US20080142671A1 (en) * 2004-11-04 2008-06-19 Novatec Sa Method and Device for Verification of Non Intrusion Into a System and/or Non-Violation of the Integrity of an Object or the Contents Thereof
US8576070B2 (en) * 2004-11-04 2013-11-05 Francis Bourrieres Method and device for verification of non intrusion into a system and/or non-violation of the integrity of an object or the contents thereof
US7898648B2 (en) 2004-12-17 2011-03-01 Koninklijke Philips Electronics N.V. Optical identifier comprising randomly oriented partial faces
EP1674286A1 (en) * 2004-12-23 2006-06-28 Arjowiggins Security Security element having a digitised mark and security support or document comprising same
WO2006066927A3 (en) * 2004-12-23 2006-09-28 Arjowiggins Security Security element having a digitised mark and security support or document comprising same
US8684417B2 (en) 2004-12-23 2014-04-01 Arjowiggins Security Security element having a digitised mark and security support or document comprising same
US7789307B2 (en) 2005-02-25 2010-09-07 Hewlett-Packard Development Company, L.P. Identifier for memory tags
GB2423615A (en) * 2005-02-25 2006-08-30 Hewlett Packard Development Co Identifier for a memory tag
GB2426100B (en) * 2005-05-11 2007-08-22 Ingenia Technology Ltd Authenticity vertification
GB2426100A (en) * 2005-05-11 2006-11-15 Ingenia Technology Ltd Authenticity verification of printed token
GB2428846A (en) * 2005-07-27 2007-02-07 Ingenia Technology Ltd Prescription authentication utilising networked system
GB2429092B (en) * 2005-07-27 2007-10-24 Ingenia Technology Ltd Token Signature Based Record Access
GB2429096A (en) * 2005-07-27 2007-02-14 Ingenia Technology Ltd Online authenticity verification utilising third party
GB2429092A (en) * 2005-07-27 2007-02-14 Ingenia Technology Ltd Access to data using a token with intrinsic signature
WO2007012816A1 (en) * 2005-07-27 2007-02-01 Ingenia Technology Limited Verification of authenticity
US8078875B2 (en) 2005-07-27 2011-12-13 Ingenia Holdings Limited Verification of authenticity
GB2429096B (en) * 2005-07-27 2008-11-05 Ingenia Technology Ltd Authenticity verification
CN101258528B (en) * 2005-07-27 2012-03-21 英根亚控股有限公司 Authenticity verification
GB2428846B (en) * 2005-07-27 2008-08-13 Ingenia Technology Ltd Prescription Authentication
FR2890666A1 (en) * 2005-09-15 2007-03-16 Arjowiggins Security Soc Par A Structure for making safety and/or value document, comprises a fibrous material substrate, a surface layer deposited on face of the substrate, substrate heterogeneities, authentication and/or identification information, and a data carrier
WO2007031694A1 (en) 2005-09-15 2007-03-22 Arjowiggins Security Structure comprising a fibrous material substrate and method for authenticating and/or identifying such a structure
US8558995B2 (en) 2005-09-15 2013-10-15 Arjowiggins Security Structure comprising a fibrous material substrate and method for authenticating and/or identifying such a structure
US20090033914A1 (en) * 2005-09-15 2009-02-05 Arjowiggins Security Structure Comprising a Fibrous Material Substrate and Method for Authenticating and/or Identifying Such a Structure
WO2007060323A1 (en) * 2005-11-23 2007-05-31 Novatec Sa Tamper-proof and reusable high security seal
FR2893595A1 (en) * 2005-11-23 2007-05-25 Novatec Sa Sa Soc Tamper proof seal for e.g. controlling and proving non intrusion, has authenticators moved with respect to each other in open position and fixed in closed position, where authenticators are evolved in chaotic manner each time seal is opened
US7726708B2 (en) 2005-11-23 2010-06-01 Novatec Sa Tamper-proof and reusable high security seal
US8056822B2 (en) 2005-12-21 2011-11-15 Novatec Sa Method for certifying and subsequently authenticating original, paper of digital documents for evidences
US8256688B2 (en) 2005-12-21 2012-09-04 Francis Bourrieres Method for certifying and subsequently authenticating original, paper or digital documents for evidences
US8497983B2 (en) 2005-12-23 2013-07-30 Ingenia Holdings Limited Optical authentication
US7812935B2 (en) 2005-12-23 2010-10-12 Ingenia Holdings Limited Optical authentication
WO2007090437A1 (en) * 2006-02-06 2007-08-16 Veil, Marc Protection system, protection method and an element protected in this way
GB2440325B (en) * 2006-07-21 2009-11-04 Hewlett Packard Development Co Anti-Counterfeit Packaging
GB2440325A (en) * 2006-07-21 2008-01-30 Hewlett Packard Development Co Tamper label, random distribution pattern, memory chip
RU2447501C2 (en) * 2007-02-02 2012-04-10 Фракчер Коуд Корпорейшн Апс Method of graphic code application and device for its implementation
DE102008051409A1 (en) * 2008-10-11 2010-04-15 Bayer Materialscience Ag security element
US8615475B2 (en) 2008-12-19 2013-12-24 Ingenia Holdings Limited Self-calibration
WO2010115788A1 (en) * 2009-03-31 2010-10-14 Gemalto Sa Secure identification document and method for producing it
EP2236311A1 (en) * 2009-03-31 2010-10-06 Gemalto SA Secure identification document and method for producing it
US20120125999A1 (en) * 2009-05-29 2012-05-24 International Frontier Technology Laboratory, Inc. Keycard and keycard-lock
US8892556B2 (en) 2009-11-10 2014-11-18 Ingenia Holdings Limited Optimisation
ITLU20100013A1 (en) * 2010-10-06 2012-04-07 Cosimo Antonio Prete METHOD TO VERIFY AUTHENTICITY AND INTEGRITY OF A PRODUCT WITH PARTIES MADE THROUGH MERGER AND SOLIDIFICATION OF MATERIALS THAT ASSUMES CAOTIC PROVISIONS
WO2012136902A1 (en) 2011-04-05 2012-10-11 Franck Guigan Security barcode
US9058535B2 (en) 2011-04-05 2015-06-16 Franck Guigan Security barcode
WO2012177845A3 (en) * 2011-06-23 2013-09-26 Covectra, Inc. Systems and methods for tracking and authenticating goods
US8908920B2 (en) 2011-06-23 2014-12-09 Covectra, Inc. Systems and methods for tracking and authenticating goods
CN104145278B (en) * 2012-05-07 2017-12-12 北京谱福溯码信息技术开发有限公司 The computer readable recording medium of certified products authentication label, the authentication codes generation method of the label, the authentication method of the label and system, the portable terminal device for the certification label and the certification for the label
US9342773B2 (en) 2012-05-07 2016-05-17 Han Yong Cho Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
EP2849118A4 (en) * 2012-05-07 2016-01-27 Han Yong Cho Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
CN104145278A (en) * 2012-05-07 2014-11-12 赵韩龙 Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
KR101379420B1 (en) 2012-05-07 2014-03-28 조한용 Label for detremining authenticity of a product, method for producing authentication code of the label, methdo and system for determining authenticity of the label, mobile phone for determining authenticity of the label, and computer readable medium for determining authenticity of the label
WO2013168962A1 (en) 2012-05-07 2013-11-14 Cho Han Yong Label for product authentication, method for generating authentication code of label, method and system for authenticating label, portable terminal for authenticating label, and computer-readable recording medium for authenticating label
WO2014060125A1 (en) * 2012-10-18 2014-04-24 Bundesdruckerei Gmbh Identity card with a physical unclonable function
WO2014060126A1 (en) * 2012-10-18 2014-04-24 Bundesdruckerei Gmbh Identity card with physical unclonable function
US9495626B2 (en) 2012-10-18 2016-11-15 Bundesdruckerei Gmbh Identity card with physical unclonable function
EP2722191A1 (en) * 2012-10-18 2014-04-23 Bundesdruckerei GmbH Identity card with physical unclonable function
EP2722192A1 (en) * 2012-10-18 2014-04-23 Bundesdruckerei GmbH Identity card with a physical unclonable function
US9953253B2 (en) 2012-10-18 2018-04-24 Bundesdruckerei Gmbh Identity card with physical unclonable function
WO2019170293A1 (en) * 2018-03-08 2019-09-12 Cypheme Method for determining the authenticity of a document and device for implementing such a method
FR3078800A1 (en) * 2018-03-08 2019-09-13 Cypheme METHOD FOR DETERMINING THE AUTHENTICITY OF A DOCUMENT AND DEVICE FOR IMPLEMENTING SUCH A METHOD
FR3078801A1 (en) * 2018-03-08 2019-09-13 Cypheme METHOD FOR DETERMINING THE AUTHENTICITY OF A DOCUMENT AND DEVICE FOR IMPLEMENTING SUCH A METHOD
WO2020088797A1 (en) * 2018-03-08 2020-05-07 Cypheme Method for ascertaining the authenticity of a document, and device for carrying out such a method
US11967163B2 (en) 2018-03-08 2024-04-23 Cypheme Method for ascertaining the authenticity of a document and device for carrying out such a method
CN109968860A (en) * 2019-03-24 2019-07-05 东莞市将为防伪科技有限公司 A kind of feature particulate matter shaking device
US11295126B1 (en) 2021-06-24 2022-04-05 Covectra, Inc. Methods for authenticating goods using randomly distributed flecks and serialization codes
US11776285B2 (en) 2021-06-24 2023-10-03 Covectra, Inc. Methods for authenticating goods using randomly distributed flecks and serialization codes

Also Published As

Publication number Publication date
GB9525734D0 (en) 1996-02-14
GB9513361D0 (en) 1995-09-06

Similar Documents

Publication Publication Date Title
GB2304077A (en) Security device comprising reflective particles
EP1354304B2 (en) Security, identification and verification systems
EP1099199B1 (en) Secure document reader and method therefor
US4013894A (en) Secure property document and system
US7264169B2 (en) Coaligned bar codes and validation means
US8223964B2 (en) Three-dimensional authentication of mircoparticle mark
US4641017A (en) Fraud resistant credit card system
US9058535B2 (en) Security barcode
US4921278A (en) Identification system using computer generated moire
US8985471B2 (en) Optically readable identification security tag or stamp
US5442433A (en) Identification system for an article having individually attached patches
US7259841B2 (en) Security reader for automatic detection of tampering and alteration
CN107486627B (en) Method of forming identification mark and identification mark formed by the method
US8360317B2 (en) Apparatus and method for enhancing card security
US8469282B2 (en) Optically readable identification security tag or stamp
JPS62502573A (en) holographic security system
JP2004077954A (en) Medium and method for confirming authenticity
JPH0550788A (en) Card and card reader
CA2173230C (en) Security reader for automatic detection of tampering and alteration
EP0568186A2 (en) Article identification system
JPH04176696A (en) Forgery preventing card and discrimination thereof

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)