WO2009129600A1 - System and apparatus for authenticating a value item and method of controlling use thereof - Google Patents

System and apparatus for authenticating a value item and method of controlling use thereof Download PDF

Info

Publication number
WO2009129600A1
WO2009129600A1 PCT/CA2009/000460 CA2009000460W WO2009129600A1 WO 2009129600 A1 WO2009129600 A1 WO 2009129600A1 CA 2009000460 W CA2009000460 W CA 2009000460W WO 2009129600 A1 WO2009129600 A1 WO 2009129600A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
operable
electromagnetic energy
wavelength
value item
Prior art date
Application number
PCT/CA2009/000460
Other languages
French (fr)
Inventor
Mehdi Talwerdi
Original Assignee
Verichk Global Technology Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verichk Global Technology Inc. filed Critical Verichk Global Technology Inc.
Priority to CA2721672A priority Critical patent/CA2721672A1/en
Publication of WO2009129600A1 publication Critical patent/WO2009129600A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/128Viewing devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation

Definitions

  • This invention relates to authenticating value items and, in particular, to a system and apparatus for authenticating a value item and a method of controlling the use of the system and apparatus.
  • security features For security reasons, including fraud prevention and for the detection of counterfeit items, various security features have been incorporated in and on value items such as bank notes, checks, credit and debit cards, stock certificates, identification documents such as passports and visas, and valuable artwork such as paintings.
  • security features include security inks (single or multicolored, either fluorescent or non-fluorescent), security fibers (single color, multi color, fluorescent color, and non-fluorescent color), and planchettes incorporated into or applied onto the substrate of the value item. The substrate of the value item may then be examined to recognize the security features and thereby be verified as authentic.
  • United States patent No. 6,994,201 to Yu et al. discloses a bill acceptor that includes a housing, the housing having a base for holding a banknote for examination, a first light emitter adapted to emit infrared light onto the banknote carried on the base of the housing for examination, a second light emitter adapted to emit ultraviolet light onto the banknote for visual examination, an image sensor adapted to pick up infrared light reflected from the banknote carried on the base of the housing and to convert a received light signal into an image signal, and a display adapted to display the image signal obtained from the image sensor for verifying the authenticity of the banknote.
  • the incorporation of a base in the housing limits the range of positions beneath the first and second light emitters at which the banknote can be placed.
  • the bill acceptor is not secured against unauthorized use.
  • a system for authenticating a value item having a security feature includes: a controller operable to receive login information and operable to select a first wavelength when the login information correctly identifies an authorized user; and an apparatus comprising a source for producing electromagnetic energy, the apparatus being operable to render detectable the security feature of the value item the when source is producing the electromagnetic energy at the first wavelength.
  • the controller may be operable to select a second wavelength when no authorized user is correctly identified by the login information.
  • the apparatus may be operable to not render detectable the security feature of the value item when the source is producing the electromagnetic energy at the second wavelength.
  • the controller may be operable to select an intensity in response to a measure of ambient light.
  • the source may be operable to produce the electromagnetic energy in accordance with the intensity.
  • the apparatus may include a plurality of the sources.
  • the controller may be operable to receive an indication selected from the group consisting of a first indication of a value item type and a second indication of an operating circumstance of the system.
  • the controller may be operable to select in accordance with the indication one or more sources of the plurality of sources.
  • the controller may be operable to select a duration and to cause the one or more sources to produce the electromagnetic energy for the duration.
  • the apparatus may include the controller.
  • the apparatus may be operable to conduct communications with a computing device.
  • the computing device may include the controller.
  • the apparatus may include an optical detector operable to produce a detector response.
  • the apparatus may be operable to communicate the detector response to the computing device.
  • the controller may be operable to authenticate the value item in response to the detector response.
  • a method of authenticating a value item having a security feature involves: receiving login information from a user; determining in response to the login information whether the user is an authorized user; and, if the user is the authorized user, producing electromagnetic energy at a first wavelength such that the security feature of the value item is detectable.
  • the method may involve producing, if the user is not the authorized user, the electromagnetic energy at a second wavelength such that the security feature of the value item is not rendered detectable.
  • the method may involve selecting an intensity in response to a measure of ambient light.
  • the method may involve producing the electromagnetic energy in accordance with the intensity.
  • the method may involve selecting a projection angle.
  • the method may involve producing the electromagnetic energy in accordance with the projection angle.
  • the method may involve selecting a beam width.
  • the method may involve producing the electromagnetic energy in accordance with the beam width.
  • the method may involve producing by an optical detector a detector response.
  • the method may involve authenticating the value item in response to the detector response.
  • a system for authenticating a value item having a security feature includes: source means for producing electromagnetic energy; and controller means for controlling the source means, the controller means being operable to receive login information from a user, determine in response to the login information whetherthe user is an authorized user, and cause the source means to produce, if the user is the authorized user, electromagnetic energy at a first wavelength such that the security feature of the value item is detectable.
  • the controller means may be operable to cause the source means to produce, if the user is not the authorized user, electromagnetic energy at a second wavelength such that the security feature of the value item is not rendered detectable.
  • a system for authenticating a value item includes an apparatus having a source for producing electromagnetic energy; and a controller operable to control the use of the apparatus.
  • the controller may be operable to receive login information as user input and to cause the system to operate in an operating mode selected in response to the received login information.
  • the controller may be operable to receive user input and cause said source to produce said electromagnetic energy at a wavelength determined in response to said user input.
  • the controller may be operable to receive login information as user input and cause said source to produce said electromagnetic energy at a wavelength determined in response to said login information.
  • the controller may be operable to transmit and receive digital communications via a communications connection.
  • the controller may be operable to execute methods for interfacing with a user.
  • the controller may be operable to cause a connected computer to execute methods for interfacing with a user.
  • the controller may be operable to cause said source to produce said electromagnetic energy at a wavelength selected from the group consisting of a first wavelength and a second wavelength, the apparatus being operable to render detectable a security feature of the value item when said first wavelength is selected and the apparatus being operable to not render detectable said security feature of the value item when said second wavelength is selected.
  • the controller may be operable to receive user input indicating an operating mode. Such operating mode may include a guest mode, a user mode and a privileged mode.
  • the controller may be operable to receive user input indicating a user identification and a passcode in association with the user identification.
  • a method of controlling the use of an apparatus of a system for authenticating a value item having one or more security features involves receiving user input; determining in response to the received user input whether the user is authorized to use the apparatus; and causing a source of electromagnetic energy of the apparatus to produce said electromagnetic energy at a wavelength for rendering detectable the one or more security features if the user is authorized.
  • the method may involve determining an operating mode of the system in response to the received user input.
  • the method may involve causing a source of electromagnetic energy to produce said electromagnetic energy at a wavelength determined in response to said user input.
  • the method may involve selecting said wavelength from a group consisting of a first wavelength and a second wavelength.
  • Selecting said wavelength may involve selecting the first wavelength selected to render detectable the one or more security features of the value item. Selecting said wavelength may involve selecting the second wavelength selected to not render detectable the one or more security features of the value item.
  • Figure 1 is an upper perspective view of an apparatus of a system for authenticating a value item according to a first embodiment of the invention, showing a portion of a laptop computer to which the apparatus is attached and showing a document located beneath the apparatus;
  • Figure 2 is a lower perspective view of the apparatus shown in Figure 1 , showing a plurality of sources of electromagnetic energy and a centrally located detector;
  • Figure 3 is a flow diagram of a method of the system for authenticating a value item according to the first embodiment, showing steps for determining an operating mode of the system
  • Figure 4 is a flow diagram of a method of operating the system in accordance with the operating mode determined by the method shown in Figure 3, showing a step for selecting a wavelength
  • Figure 5 is a flow diagram of a method of implementing the step of selecting a wavelength shown in Figure 4, showing steps for assigning a wavelength parameter.
  • a system for authenticating a value item comprises an apparatus, the apparatus comprising source means for emitting electromagnetic energy; and . controller means for controlling the use of the apparatus.
  • the system 10 functions to authenticate value items such as bank notes, checks, credit and debit cards, stock certificates, identification documents such as driver's licences, birth certificates, passports and visas, and valuable artwork such as paintings.
  • the value item may be any object in any of the solid, liquid or gas phases, including any product associated with a trademark, certification mark, quality standard, measurable attribute or otherwise having an identification.
  • the value item may be a product or product packaging, such as a cigarette package or clothing item, displaying a trademark which may be authenticated against counterfeit items;
  • the value item may be a chemical or pharmaceutical substance in the solid, liquid or gaseous phase having a quality or purity associated therewith;
  • the value item may be a beverage, such as wine or spirits, having a quality, purity, dilution factor or other measure of authenticity such as brand authenticity associated therewith;
  • the value item may be a gaseous substance or other fluid housed within a transparent or other container and having associated therewith a purity or other quality factor; and any combination thereof.
  • the system 10 includes an apparatus 12, which is shown in Figure 1 in proximity to a document 14, which may be a bank note for example.
  • the document 14 can be suitably held in position by any means, including being held in place by hand (not shown) or placed on any surface, including a keyboard area of a laptop computer or the surface 16 shown in Figure 1.
  • the document 14 has security features 18 incorporated into or applied onto the substrate 20 of the document 14.
  • Security features 18 can include or be comprised of security inks (single or multi-colored, either fluorescent or non-fluorescent), security fibers (single color, multi color, fluorescent color, and non-fluorescent color), and planchettes.
  • the apparatus 12 is housed within a housing 22 of suitable dimensions to advantageously render the apparatus 12 portable.
  • the apparatus 12 may be held in hand (not shown) or supported by any means above or otherwise in proximity to the document 14, for example.
  • the apparatus 12 is preferably operable to be attachable to other objects, thereby advantageously permitting the apparatus 12 to be positioned for authenticating value items.
  • Figure 1 shows an attachment member 24 and a hinge 26 of the attachment member 24.
  • the attachment member 24 is preferably operable to perform a clamping function for removably attaching the apparatus 12 to other objects.
  • the attachment member 24 facilitates resilient attachment of the apparatus 12 to other objects.
  • the apparatus 12 includes fastening means such as one or more brackets and/or fastening apertures for permanently fastening the apparatus 12 to other objects.
  • Figure 1 shows portions of a laptop computer 28 to which the apparatus 12 is removably attached for support. Placing the apparatus 12 near the upper end of an opened laptop computer 28 advantageously facilitates use of the apparatus 12 in conjunction with the laptop computer 28 without obscuring the display screen 30 of the laptop computer 28.
  • the apparatus 12 may be removably or permanently attachable or incorporated within.
  • the apparatus 12 is removably or permanently attachable to structural components of office equipment such as an output tray of a printer.
  • the apparatus 12 is removably or permanently attachable to moving components of office equipment such as being incorporated within the printer head of a printer.
  • the apparatus 12 includes an actuator, such as any suitable switch or the push button 31 shown in Figure 1 for actuating operations (described further below) of the apparatus 12. Additionally or alternatively, the apparatus 12 may include a power switch (not shown) for turning the apparatus 12 on and off.
  • an actuator such as any suitable switch or the push button 31 shown in Figure 1 for actuating operations (described further below) of the apparatus 12.
  • the apparatus 12 may include a power switch (not shown) for turning the apparatus 12 on and off.
  • Figure 2 shows the apparatus 12 from the side, not visible in Figure 1 , that generally faces the document 14 during typical operation.
  • the apparatus 12 in the first embodiment includes a circuit board 32, mounted within the housing 22, upon which one or more sources of electromagnetic energy, such as direct chemical light sources, incandescent light sources, gas or other discharge-based lighting sources, x-ray emitters, solid state sources, lasers, and/or the light emitting diodes (LEDs) 34, are mounted. While Figure 2 shows four rows of ten LEDs 34 in each row mounted to the circuit board 32, in general any number of LEDs 34 may be arranged according to any suitable spatial pattern.
  • sources of electromagnetic energy such as direct chemical light sources, incandescent light sources, gas or other discharge-based lighting sources, x-ray emitters, solid state sources, lasers, and/or the light emitting diodes (LEDs) 34.
  • LEDs light emitting diodes
  • the LEDs 34 and other sources of the apparatus 12 are preferably operable to produce and emit electromagnetic energy within one or more ranges of wavelengths of the electromagnetic spectrum, such as hard x-ray (HX) radiation, soft x-ray (SX) radiation, extreme ultraviolet (EUV) radiation, near ultraviolet (NUV) radiation, light within the visible region of the electromagnetic spectrum, near infra-red (NIR) radiation, mid-infra-red (MIR) radiation, far infra- red (FIR) radiation, and any combination thereof.
  • HX hard x-ray
  • SX soft x-ray
  • EUV extreme ultraviolet
  • NUV near ultraviolet
  • NIR near infra-red
  • MIR mid-infra-red
  • FIR far infra- red
  • the apparatus 12 preferably includes at least one source, such as one or more LEDs 34, for emitting UV radiation at a wavelength suitable for rendering detectable one or more security features 18, possibly including rendering detectable by an electronic detector the one or more security features 18 and rendering visible to the human eye one or more security features 18 that are of the fluorescing type.
  • activating one or more LEDs 34 such as by pressing the push button 31 ( Figure 1 ) to emit UV radiation towards the document 14 will render such security features 18 visible, thereby advantageously facilitating the authentication of the document 14 by a human observer.
  • each LED 34 includes a lens 36 for directing the electromagnetic energy being emitted by the LED 34 at a specifiable angle or ranges of angles of direction. Additionally or alternatively, each lens 36 may cause diffusion of the intensity of the electromagnetic energy such that the distribution of electromagnetic energy emitted from each LED 34 across a given area subtended by the specifiable solid angle or range of solid angles is substantially uniform or otherwise in accordance with a specifiable distribution pattern.
  • the LEDs 34 are preferably mounted onto the circuit board 32 at specifiable angles such that specific groups of LEDs 34 produce uniform illumination. in some embodiments, a series of specific groups of LEDs 34 are included in the apparatus 12, with each group of LEDs 34 being arranged for optimal . illumination in different circumstances.
  • Examples of such circumstances include illumination under different ambient light conditions; illumination at different ranges of solid angles; illumination causing different distribution patterns across a given area subtended by the specifiable range of solid angles; illumination at different projection angles causing electromagnetic energy to be emitted at an angle relative to the surface of the circuit board 32, including being emitted at right angles to the circuit board 32 for illuminating the document 14 when placed directly beneath the apparatus 12; illumination of particular types of value items, such as value items having particular dimensions, value items having security features disposed therein at particular locations of the value items, or other value items having particular known characteristics.
  • a given group of LEDs 34 may be arranged to protrude from the circuit board 32 at specifiable projection angles from specifiable locations with lenses 36 of specifiable properties such that bank notes are optimally illuminated, and a different group of LEDs 34 may be arranged such that passports are optimally illuminated, for example.
  • the LEDs 34 within a given group or otherwise, need not all produce electromagnetic energy at the same wavelength or in the same wavelength ranges, but may be operable to produce electromagnetic energy at specifiable wavelengths such that the overall illumination produced may include multiple wavelengths within the same or different ranges of wavelengths.
  • the system 10 is in some embodiments operable to produce illumination of electromagnetic energy at multiple wavelengths simultaneously, altematingly or in other temporal patterns.
  • the apparatus 12 includes one or more optical detectors, such as the camera 38 shown in Figure 2.
  • the camera 38 is operable to detect radiation reflected off a surface of the substrate 20 during or after exposure to illumination from one or more of the LEDs 34, and to produce a detector response therefrom.
  • the camera 38 is operable to detect radiation that has transmitted through the value item, including possibly through the substrate 20 or other solid, liquid or gaseous substance, and reflected off the surface 16 toward the camera 38.
  • Such detector response can be used to facilitate authentication of the document 14, including authentication by digital processing or other automated means. Additionally or alternatively, such detector response can be used to facilitate the detection and/or human observation of one or more security features 18, including by magnification, filtering, display processing, and any combination thereof for example.
  • the apparatus 12 includes in some embodiments a filter (not shown) for selectively detecting electromagnetic radiation having wavelengths in a desired range of the electromagnetic spectrum. Some embodiments of the invention include multiple detectors, with each detector being particularly suitable to detecting electromagnetic radiation having wavelengths in a particular range of the electromagnetic spectrum. Additionally or alternatively, the camera 38 may include a filter for passing and/or rejecting electromagnetic radiation at specifiable wavelengths.
  • the housing 22 preferably has dimensions sufficiently large to accommodate the detectors and sources installed in the apparatus 12, while maintaining a size sufficiently small for portability.
  • the dimensions of the housing 22 will vary with the number and arrangement of sources and detectors.
  • the housing 22 has a length in the range of 3 to 30 cm (1.2" to 12"), a width in the range of 1 to 10 cm (0.39" to 3.9") and a height in the range of 1 to 5 cm (0.39" to 2.0").
  • different LEDs 34 may be operable to produce electromagnetic energy in different ranges of wavelengths.
  • the apparatus 12 includes one or more LEDs 34 operable to emit UV radiation at a wavelength suitable for rendering detectable security features 18 that are of the fluorescing type, thereby facilitating the authentication of value items; and includes one or more LEDs 34 operable to produce white light in the visible region of the electromagnetic spectrum, thereby advantageously providing the convenience of general lighting when desired by the user.
  • the LEDs 34 that are operable to emit UV radiation may be the same or different from those operable to produce the white lighting, for example.
  • the apparatus 12 includes a bottom cover (not visible in the Figures) attachable to or forming part of the housing 22 adjacent the LEDs 34.
  • a bottom cover attachable to or forming part of the housing 22 adjacent the LEDs 34.
  • Such bottom cover preferably causes minimal transmission loss of electromagnetic energy passing therethrough, and may be transparent, while physically protecting the LEDs 34.
  • the apparatus 12 in some embodiments does not include a bottom cover.
  • the apparatus 12 is shown in cut-out to reveal the circuit board 32 (from its side opposite to that visible in Figure 2) and source drive circuitry 40 mounted on the circuit board 32.
  • the source drive circuitry 40 is preferably operable to supply electrical energy for selectively activating the LEDs 34 at selected bias points and power levels.
  • the source drive circuitry 40 is represented pictorially in Figure 1 in the form of an integrated circuit chip, however, the source drive circuitry 40 may in general include any number of components for selectively activating the LEDs 34.
  • the source drive circuitry 40 may include any of a separate drive circuit for each LED 34 or for groups of LEDs 34; distribution circuitry for distributing drive voltages and currents to the LEDs 34, including electrical connections such as the circuit board traces 42 shown in Figure 1 ; analog conditioning circuitry for conditioning, including amplifying and/or filtering, drive voltages and currents applied to the LEDs 34; digital to analog conversion circuitry for converting digital representations of desired drive levels to analog drive voltages and currents; digital processing circuitry for determining the digital representations of desired drive levels; digital communications circuitry for receiving digital transmissions of the digital representations of desired drive levels; and combinations thereof, for example.
  • the source drive circuitry 40 by itself or in conjunction with other suitable components, is preferably operable to activate, for specified durations, one or more selected LEDs 34 to produce electromagnetic energy at a specified wavelength and at a specified output intensity.
  • the system 10 includes a memory circuit 44, which is shown in Figure 1 mounted on the circuit board 32.
  • the memory circuit 44 is preferably operable to store information in the form of digital data, and can be any part or all of a digital electronic integrated circuit.
  • the memory circuit 44 may be implemented as Read-Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Oniy Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash memory, one or more flash drives, universal serial bus (USB) connected memory units, magnetic storage, optical storage, magneto-optical storage, etc. or any combination thereof, for example.
  • the memory circuit 44 may be operable to store memory as volatile memory, non-volatile memory, dynamic memory, etc. or any combination thereof.
  • the system 10 includes a processor 46, which is shown in Figure 1 mounted on the circuit board 32.
  • the processor 46 is preferably operable to perform digital computations, and can be any processing circuit having one or more circuit units, such as a central processing unit (CPU), digital signal processor (DSP), embedded processor, etc., and any combination thereof operating independently or in parallel, including possibly operating redundantly.
  • the processor 46 may be implemented by one or more integrated circuits (IC), including being implemented by a monolithic integrated circuit (MIC), an
  • the processor 46 may be implemented as a programmable logic controller (PLC), for example.
  • PLC programmable logic controller
  • the processor 46 may include circuitry for storing memory, such as digital data, and may comprise the memory circuit 44 or be in wired communication with the memory circuit 44, for example.
  • the processor 46 is operable to perform some or all of the functions performed by the source drive circuitry 40, and may comprise any part or all of the source drive circuitry 40.
  • the processor 46 in conjunction with the memory circuit 44 is operable to control the operation of the source drive circuitry 40.
  • the apparatus 12 is operable to conduct digital communications with other computing devices, and includes the communications connector 48 shown in Figure 1 , which is dimensioned to receive a cable (not shown) for connecting between the apparatus 12 and such other computing device, including the laptop computer 28 shown in Figure 1.
  • a USB (Universal Serial Bus) camera cable may be used, for example.
  • the apparatus 12 is operable to conduct communications via a wireless connection, including a satellite link or line-of-sight free optical link for example. Additionally or alternatively, the apparatus 12 may be operable to conduct communications via a fiber-optic transmission link.
  • the apparatus 10 is operable to receive electrical power from the laptop computer 28 via the cable and connector 48. Additionally or alternatively, the apparatus 10 may be operable to receive battery power, including being dimensioned to house one or more batteries such as the electrical storage battery 50 shown in Figure 1.
  • the memory circuit 44, the processor 46, or both the memory circuit 44 and the processor 46 are implemented separate from the apparatus 10, including being incorporated within a separate computing device such as the laptop computer 28. Additionally or alternatively, the apparatus 10 may include memory circuitry and/or information processing circuitry identical, similar or analogous to the memory circuit 44 and/or the processor 46, respectively.
  • any portion or all of the functionality of the memory circuit 44 and the processor 46 may be performed within the apparatus 12 or may be performed within a separate computing device in communication with the apparatus 12, such as the laptop computer 28, another computing device (not shown) or a remote computing device (not shown) in communication with the laptop computer 28 or other computing device.
  • the memory circuit 44 in accordance with the first embodiment of the invention contains blocks of code comprising computer executable instructions for directing the processor 46 to perform the steps of a method shown generally at 52. Additionally or alternatively, such blocks of code may form part of a computer program product comprising computer executable instructions embodied in a signal bearing medium, which may be a recordable computer readable medium or a signal transmission type medium, for example.
  • Block 54 directs the processor 46 to generate a user interface, which generally permits a user to input information for processing by the processor 46 and provides information to the user, such as by displaying information on the display screen 30 of the laptop computer 28.
  • Generating the user interface typically involves prompting the user for user login information, for example, which may involve prompting the user for a user identification and a password, passphrase or other forms of a passcode.
  • Block 56 then directs the processor 46 to receive, as user input, the user login information.
  • Block 58 directs the processor 46 to determine whether the user identification (or user ID) received by executing block 56 is a known user ID. In some embodiments, determining whether the user ID is known involves comparing the user ID received by executing block 56 with one or more user identifications stored by the system 10, such as being stored in the memory circuit 44, and determining that the user ID is known if it matches one of the stored user identifications. If the user ID is not known, then the processor 46 is directed to execute block 60, which directs the processor 46 to cause operation of the system 10 in a guest mode. When operation in the guest mode is completed, such as by the user terminating execution of block 60, then the method 52 proceeds to end.
  • block 62 directs the processor 46 to determine whether the user ID is a privileged user ID. Determining whether the user ID is a privileged user ID typically involves comparing the user ID received by executing block 56 with one or more previously stored user identifications having a privileged status. For example, the system 10 in some embodiments is operable to define the user identification "ADMIN" as having privileged status. In some embodiments, the system 10 is operable to permit the user to specify which user accounts created through use of the user interface should have privileged status.
  • the processor 46 is directed to execute block 64, which directs the processor 46 to determine whether the passcode of the login information is correct. Determining whether a passcode is correct typically involves comparing the passcode received as user input with a previously stored passcode associated with the user ID received by executing block 56.
  • processor 46 determines by executing block 64 that the passcode associated with the known, but not privileged, user ID is not correct, then the processor 46 is directed to execute block 60 described above, thereby causing operation of the system 10 in guest mode.
  • the processor 46 determines that the passcode for the known, but not privileged, user ID is correct, then the processor 46 is directed to execute block 66, which directs the processor 46 to cause operation of the system 10 in a user mode. When operation in the user mode is completed, such as by the user terminating execution of block 66, then the method 52 proceeds to end.
  • the processor 46 is directed to execute block 68, which directs the processor 46 to determine whether the passcode received by executing block 56 is correct.
  • block 70 is implemented in a similar manner to that of block 60 described above.
  • the processor 46 is directed to execute block 72, which causes the system 10 to operate in a privileged mode.
  • the system 10 is generally operable to provide enhanced functionality as compared to operation in the user mode.
  • the user interface may include additional menus not available in other modes of operation.
  • the user may be permitted to set up other user accounts only when the system 10 is operating in privileged mode.
  • the system 10 is operable to direct the processor 46 to perform logging functions that store in the memory circuit 44 records of user input, including user login information, and operations of the apparatus 12, including time and dates of such operations, for subsequent analysis of the use of the apparatus 12.
  • logging functions that store in the memory circuit 44 records of user input, including user login information, and operations of the apparatus 12, including time and dates of such operations, for subsequent analysis of the use of the apparatus 12.
  • such logged information is made available to the user through the user interface only when the system 10 is operating in the privileged mode.
  • the system 10 is in some embodiments operable to permit the user to attempt to provide as user input multiple times where either the user ID received by executing block 56 is not known or the passcode received by executing block 56 is not correct.
  • the processor 46 is directed to cause the display an error message, such as on the display screen 28; and to prompt the user to indicate whether the user would like to retry inputting login information or would prefer to use the system 10 and apparatus 12 in a guest mode.
  • the system 10 is operable to provide reduced functionality when in the guest mode as compared to operation in the user mode and the privileged mode, and in some embodiments all use of the apparatus 12 is prevented when the system 10 is operating in the guest mode.
  • an exemplary method for directing the processor 46 to perform steps of block 60, 66, 70 and 72 is shown generally at 74.
  • the method 74 begins execution at block 76, which directs the processor 46 to receive as user input an indication of a value item type, such as bank note, passport, stock certificate, etc. Receiving such indication may involve prompting the user for the type of value item to be illuminated by the apparatus 12, and receiving user input in response to such prompt, for example.
  • a value item type such as bank note, passport, stock certificate, etc.
  • receiving user input involves receiving user input that overrides the default type.
  • system 10 is operable to permit the user through the user interface to change a current value item type through a menu selection, thereby causing the processor 46 to receive the indication of value item type. Additionally or alternatively, the system 10 is operable in some embodiments to receive an indication of dimensions of a given value item, position of the value item in relation to the apparatus 10, information regarding the location of security features on or within the given value item, or other information suitably useabie by the system 10 to enhance or optimize the effectiveness of the apparatus 10.
  • Block 78 then directs the processor 46 to select a sources group in response to the received indication. Selecting a sources group may involve selecting one or more sources, such as the LEDs 32, associated with the indication of value item type received by executing block 76.
  • the sources associated with a given value item type is preferably those sources that will result in enhanced or optimal illumination of value items of that type. Selecting a given LED 32 may involve storing in the memory circuit 44 a true value for an activation flag associated with the given LED 32 such that the given LED 32 is activated upon request from the user, for example.
  • the system 10 in some embodiments and in respect of one or more operating modes is operable to select a sources group in response to an indication, including an indication received as user input, of operating circumstances.
  • the system 10 may provide through the user interface a menu permitting the user to choose between any number of projection angles, or ranges thereof, such as 0, 30, 60 and 90 degrees.
  • the system 10 will select a sources group such that a document 14 is optimally illuminated when placed directly beneath the apparatus 12; if the user chooses 30 degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed generally beneath and slightly forward of the apparatus 12; if the user chooses 60 degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed further forward (relative to the case of choosing 30 degrees) and tilted toward the apparatus 12; and if the user chooses 90 degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed directly in front of the apparatus 12 or nearly directly in front of the apparatus 12, for example.
  • the system 10 may provide through the user interface a menu permitting the user to choose between any number of solid angles or ranges thereof such as respective ranges of solid angles associated with a "narrow beam", “nominal beam” and “wide beam".
  • the system 10 is operable in such embodiments to select a sources group in response to such operating circumstances to achieve illumination of different beam widths.
  • Block 80 directs the processor 46 to select an intensity associated with the selected sources group. Selecting the intensity typically involves assigning a value to an intensity parameter stored in the memory circuit 44 such that the output intensity of any activated sources are regulated by the source drive circuitry 40 in accordance with the assigned value.
  • selecting the intensity involves prompting the user for a desired intensity; receiving as user input the desired intensity; determining whether the desired intensity is within a range of permitted or possible intensities; and assigning a value to the intensity parameter in accordance with the desired intensity, including in accordance with an extreme value within the range of permitted or possible intensities.
  • the system 10 is operable in some embodiments to prompt the user for an indication of the level of ambient light in proximity to the apparatus 12, or otherwise determine a measure of the ambient light in proximity to the apparatus 12; and to assign a value to the intensity parameter in accordance with the level of ambient light such that the intensity increases proportionally with increasing amounts of ambient light.
  • the system 10 is operable to store a default intensity in the memory circuit 44; permit the user through the user interface to change a currently desired intensity through a menu selection; assign a value to the intensity parameter equal to the default intensity if no change is made by the user; and assign a value to the intensity parameter equal to the currently desired intensity as maybe changed by the user from time to time.
  • Block 82 directs the processor 46 to select the duration of each activation of the sources of the selected sources group. Selecting the duration typically involves assigning a value to a duration parameter stored in the memory circuit 44 such that the sources are activated for a set period of time, such as four seconds, at each or a given activation in accordance with the assigned value. In some embodiments, selecting the duration involves prompting the user for a desired duration; receiving as user input the desired duration; determining whether the desired duration is within a range of permitted or possible durations; and assigning a value to the duration parameter in accordance with the desired duration, including in accordance with an extreme value within the range of permitted or possible durations.
  • the system 10 is operable to store a default duration in the memory circuit 44; permit the user through the user interface to change a currently desired duration through a menu selection; assign a value to the duration parameter equal to the default duration if no change is made by the user; and assign a value to the duration parameter equal to the currently desired duration as maybe changed by the user from time to time.
  • any of blocks 76 and 78, block 80 and block 82 may be executed only when the system 10 is operating in the privileged mode, such that default values are used for the selection of sources group, intensity and duration when the system 10 is not operating in the privileged mode.
  • blocks 76 and 78 are not implemented, a default set of sources, such as all sources present in the apparatus 12, are activated every time activation occurs, and the method 74 begins execution at block 80. In embodiments where block 80 and/or block 82 are not implemented, default values for intensity and duration are used, respectively. In general, blocks 76 to 84 can be executed in any order, including being executed in parallel or in response to computer interrupts having no predetermined order, with the exception that block 78 is preferably executed after block 76.
  • Block 84 directs the processor 46 to select the wavelength such that, when activated, a given source produces electromagnetic energy at the selected wavelength, including at a range of wavelengths that includes the selected wavelength.
  • FIG. 5 an exemplary method for directing the processor 46 to perform steps of block 84 ( Figure 4) is shown generally at 86.
  • the method 86 begins execution at block 88, which directs the processor 46 to determine whether the system is being operated in the privileged mode.
  • the processor 46 is directed to execute block 90, which directs the processor 46 to determine whether the system 10 has received an indication of a desired wavelength. Determining whether a desired wavelength indication has been received may involve prompting the user for the desired wavelength indication, and receiving user input in response to such prompt. Additionally or alternatively, the system 10 is operable in some embodiments to store a default wavelength in the memory circuit 44; permit the user through the user interface to change a currently desired wavelength through a menu selection; and determine that a desired wavelength is received each time the user changes the currently desired wavelength.
  • the processor 46 determines that a desired wavelength has been received, the processor 46 is directed to execute block 92, which directs the processor 46 to assign a value to a wavelength parameter, preferably stored in the memory circuit 44, in accordance with the desired wavelength. Assigning this value may involve determining whether the desired wavelength is within a range of permitted or possible wavelengths; assigning the wavelength parameter value to the desired wavelength if the desired wavelength is within the permitted range; and assigning the wavelength parameter value to an extreme value within the permitted range closest to the desired wavelength if the desired wavelength is not within the permitted range.
  • Executing block 92 advantageously permits a user having privileged access to directly control the wavelength of the electromagnetic energy emitted by activated sources, thereby facilitating testing of the apparatus 12 and/or value items and security features of value items, for example.
  • the processor 46 is directed to execute block 94, which directs the processor 46 to assign a value to the wavelength parameter that is equal to a standard wavelength.
  • the standard wavelength may be a wavelength such that exposing a value item to electromagnetic energy at the standard wavelength causes fluorescing security features to be rendered detectable.
  • the standard wavelength may be determined in accordance with an industry standard for fluorescing security features, for example.
  • the system 10 is operable to store a default wavelength parameter value, which may be equal to the standard wavelength value.
  • the processor 46 is directed to end the method 86. Referring back to block 88, if the system 10 is not being operated in the privileged mode, the processor 46 is directed to execute block 96, which directs the processor 46 to determine whether the system 10 is being operated in the user mode.
  • the processor 46 is directed to execute block 94 described above, and then to end the method 86.
  • the processor 46 is directed to execute block 98 associated with the guest mode of system 10 operation.
  • the system 10 is operable in some embodiments to determine whether the system 10 is operating in the guest mode and, if so, execute block 98 and, if not, to conduct error processing or perform other suitable steps.
  • Block 98 directs the processor 46 to assign a value to the wavelength parameter that is equal to an off-standard wavelength.
  • the off-standard wavelength typically differs from the standard wavelength sufficiently that activating a source at the off-standard wavelength produces electromagnetic energy within a range of wavelengths that does not include the standard wavelength and does not cause industry standard fluorescing security features to be rendered detectable.
  • Executing block 98 advantageously reduces functionality of the system 10 in response to an unknown user identification or an incorrect passcode, thereby securing the apparatus 12 against unauthorized use while having the appearance of normal operation. Executing block 98 thus advantageously impedes unauthorized persons from using the apparatus 12 to test and develop counterfeit value items, for example, while not ostensibly appearing to cause such impediments.
  • block 100 directs the processor 46 to receive a user request for activation of the selected sources group.
  • Receiving the user request for activation may involve permitting the user through the user interface to request activation by a menu selection; may involve receiving an indication of actuation by a hardware component such as the push button 31 ( Figure 1 ); or any combination thereof, for example.
  • Block 102 directs the processor 46 to activate the detector, such as the camera 38, for detecting electromagnetic radiation reflected from a surface of the value item, such as the document 14, when being exposed to electromagnetic radiation emitted from activated sources.
  • Block 104 directs the processor 46 to activate, for the selected duration, the sources of the selected sources group in accordance with the selected wavelength and the selected intensity. Activating may involve starting a timer or other counter; providing an output to the source driver circuitry 40 such that the source driver circuitry 40 supplies electrical energy to the LEDs 34 of the selected sources group at the necessary bias points and power levels to result in illumination from the LEDs 34 of electromagnetic energy at selected wavelength and the selected intensity; determining when the counter has reached a count corresponding to the selected duration; and removing the output to the source driver circuitry 40 such that the LEDs 34 become de-activated.
  • Block 106 directs the processor 46 to de-activate the detector.
  • the system 10 is operable in some embodiments to activate the detector for a duration less than, equal to, or greater than the duration of activation for the sources.
  • the detector is activated to produce a single capture in one instant during the activation duration.
  • the system 10 is operable in some embodiments to maintain continuous sensing by the detector during intervals of time greater than the duration of activation for the sources, including having continuous sensing whenever electrical power is applied to the apparatus 10.
  • a method of securing the use of an apparatus for authenticating a value item the method involving receiving login information; and causing a source of electromagnetic energy to produce said electromagnetic energy at a wavelength determined in response to said login information.
  • the system 10 may be operable to function in an operating mode other than the privileged mode, user mode and guest mode; may provide variations of the user mode for different users; and may provide all of the functionality permitted in the privileged mode when operating in the user mode.
  • the embodiments described and illustrated herein should not be considered to limit the invention as construed in accordance with the accompanying claims.

Abstract

A system and method for authenticating a value item having security features is provided. The system includes an apparatus having a source for producing electromagnetic energy; and a controller operable to control the use of the apparatus. The controller receives login information from a user, and determines an operating mode in response to the login information. If the user is authorized to use the apparatus, the system permits the source to produce electromagnetic energy. When operating in a user mode or in a privileged mode, the system controls the source to produce electromagnetic energy at a wavelength selected to render detectable the security features. When operating in a guest mode, the system controls the source to produce electromagnetic energy at a wavelength selected to not render detectable the security features.

Description

SYSTEM AND APPARATUS FOR AUTHENTICATING A VALUE ITEM AND METHOD OF CONTROLLING USE THEREOF
BACKGROUND OF THE INVENTION
1. Field of Invention
This invention relates to authenticating value items and, in particular, to a system and apparatus for authenticating a value item and a method of controlling the use of the system and apparatus.
2. Description of Related Art
For security reasons, including fraud prevention and for the detection of counterfeit items, various security features have been incorporated in and on value items such as bank notes, checks, credit and debit cards, stock certificates, identification documents such as passports and visas, and valuable artwork such as paintings. Examples of security features include security inks (single or multicolored, either fluorescent or non-fluorescent), security fibers (single color, multi color, fluorescent color, and non-fluorescent color), and planchettes incorporated into or applied onto the substrate of the value item. The substrate of the value item may then be examined to recognize the security features and thereby be verified as authentic.
United States patent No. 6,994,201 to Yu et al. discloses a bill acceptor that includes a housing, the housing having a base for holding a banknote for examination, a first light emitter adapted to emit infrared light onto the banknote carried on the base of the housing for examination, a second light emitter adapted to emit ultraviolet light onto the banknote for visual examination, an image sensor adapted to pick up infrared light reflected from the banknote carried on the base of the housing and to convert a received light signal into an image signal, and a display adapted to display the image signal obtained from the image sensor for verifying the authenticity of the banknote. However, the incorporation of a base in the housing limits the range of positions beneath the first and second light emitters at which the banknote can be placed. Also, the bill acceptor is not secured against unauthorized use.
SUMMARY
The above shortcomings may be addressed by providing, in accordance with one aspect of the invention, a system for authenticating a value item having a security feature. The system includes: a controller operable to receive login information and operable to select a first wavelength when the login information correctly identifies an authorized user; and an apparatus comprising a source for producing electromagnetic energy, the apparatus being operable to render detectable the security feature of the value item the when source is producing the electromagnetic energy at the first wavelength.
The controller may be operable to select a second wavelength when no authorized user is correctly identified by the login information. The apparatus may be operable to not render detectable the security feature of the value item when the source is producing the electromagnetic energy at the second wavelength. The controller may be operable to select an intensity in response to a measure of ambient light. The source may be operable to produce the electromagnetic energy in accordance with the intensity. The apparatus may include a plurality of the sources. The controller may be operable to receive an indication selected from the group consisting of a first indication of a value item type and a second indication of an operating circumstance of the system. The controller may be operable to select in accordance with the indication one or more sources of the plurality of sources. The controller may be operable to select a duration and to cause the one or more sources to produce the electromagnetic energy for the duration. The apparatus may include the controller. The apparatus may be operable to conduct communications with a computing device. The computing device may include the controller. The apparatus may include an optical detector operable to produce a detector response. The apparatus may be operable to communicate the detector response to the computing device. The controller may be operable to authenticate the value item in response to the detector response. In accordance with another aspect of the invention, there is provided a method of authenticating a value item having a security feature. The method involves: receiving login information from a user; determining in response to the login information whether the user is an authorized user; and, if the user is the authorized user, producing electromagnetic energy at a first wavelength such that the security feature of the value item is detectable.
The method may involve producing, if the user is not the authorized user, the electromagnetic energy at a second wavelength such that the security feature of the value item is not rendered detectable. The method may involve selecting an intensity in response to a measure of ambient light. The method may involve producing the electromagnetic energy in accordance with the intensity. The method may involve selecting a projection angle. The method may involve producing the electromagnetic energy in accordance with the projection angle. The method may involve selecting a beam width. The method may involve producing the electromagnetic energy in accordance with the beam width. The method may involve producing by an optical detector a detector response. The method may involve authenticating the value item in response to the detector response.
In accordance with another aspect of the invention, there is provided a system for authenticating a value item having a security feature. The system includes: source means for producing electromagnetic energy; and controller means for controlling the source means, the controller means being operable to receive login information from a user, determine in response to the login information whetherthe user is an authorized user, and cause the source means to produce, if the user is the authorized user, electromagnetic energy at a first wavelength such that the security feature of the value item is detectable.
The controller means may be operable to cause the source means to produce, if the user is not the authorized user, electromagnetic energy at a second wavelength such that the security feature of the value item is not rendered detectable.
In accordance with another aspect of the invention, there is provided a system for authenticating a value item. The system includes an apparatus having a source for producing electromagnetic energy; and a controller operable to control the use of the apparatus. The controller may be operable to receive login information as user input and to cause the system to operate in an operating mode selected in response to the received login information. The controller may be operable to receive user input and cause said source to produce said electromagnetic energy at a wavelength determined in response to said user input. The controller may be operable to receive login information as user input and cause said source to produce said electromagnetic energy at a wavelength determined in response to said login information. The controller may be operable to transmit and receive digital communications via a communications connection. The controller may be operable to execute methods for interfacing with a user. The controller may be operable to cause a connected computer to execute methods for interfacing with a user. The controller may be operable to cause said source to produce said electromagnetic energy at a wavelength selected from the group consisting of a first wavelength and a second wavelength, the apparatus being operable to render detectable a security feature of the value item when said first wavelength is selected and the apparatus being operable to not render detectable said security feature of the value item when said second wavelength is selected. The controller may be operable to receive user input indicating an operating mode. Such operating mode may include a guest mode, a user mode and a privileged mode. The controller may be operable to receive user input indicating a user identification and a passcode in association with the user identification.
In accordance with another aspect of the invention, there is provided a method of controlling the use of an apparatus of a system for authenticating a value item having one or more security features. The method involves receiving user input; determining in response to the received user input whether the user is authorized to use the apparatus; and causing a source of electromagnetic energy of the apparatus to produce said electromagnetic energy at a wavelength for rendering detectable the one or more security features if the user is authorized. The method may involve determining an operating mode of the system in response to the received user input. The method may involve causing a source of electromagnetic energy to produce said electromagnetic energy at a wavelength determined in response to said user input. The method may involve selecting said wavelength from a group consisting of a first wavelength and a second wavelength. Selecting said wavelength may involve selecting the first wavelength selected to render detectable the one or more security features of the value item. Selecting said wavelength may involve selecting the second wavelength selected to not render detectable the one or more security features of the value item. Other aspects and features of the present invention will become apparent to those of ordinary skill in the art upon review of the following description of embodiments of the invention in conjunction with the accompanying figures and claims.
BRIEF DESCRIPTION OF THE DRAWINGS
In drawings which illustrate by way of example only embodiments of the invention:
Figure 1 is an upper perspective view of an apparatus of a system for authenticating a value item according to a first embodiment of the invention, showing a portion of a laptop computer to which the apparatus is attached and showing a document located beneath the apparatus;
Figure 2 is a lower perspective view of the apparatus shown in Figure 1 , showing a plurality of sources of electromagnetic energy and a centrally located detector;
Figure 3 is a flow diagram of a method of the system for authenticating a value item according to the first embodiment, showing steps for determining an operating mode of the system; Figure 4 is a flow diagram of a method of operating the system in accordance with the operating mode determined by the method shown in Figure 3, showing a step for selecting a wavelength; and Figure 5 is a flow diagram of a method of implementing the step of selecting a wavelength shown in Figure 4, showing steps for assigning a wavelength parameter.
DETAILED DESCRIPTION
A system for authenticating a value item comprises an apparatus, the apparatus comprising source means for emitting electromagnetic energy; and . controller means for controlling the use of the apparatus.
Referring to Figure 1 , the system according to a first and preferred embodiment of the invention is shown generally at 10. The system 10 functions to authenticate value items such as bank notes, checks, credit and debit cards, stock certificates, identification documents such as driver's licences, birth certificates, passports and visas, and valuable artwork such as paintings.
In general, the value item may be any object in any of the solid, liquid or gas phases, including any product associated with a trademark, certification mark, quality standard, measurable attribute or otherwise having an identification. For example, the value item may be a product or product packaging, such as a cigarette package or clothing item, displaying a trademark which may be authenticated against counterfeit items; the value item may be a chemical or pharmaceutical substance in the solid, liquid or gaseous phase having a quality or purity associated therewith; the value item may be a beverage, such as wine or spirits, having a quality, purity, dilution factor or other measure of authenticity such as brand authenticity associated therewith; the value item may be a gaseous substance or other fluid housed within a transparent or other container and having associated therewith a purity or other quality factor; and any combination thereof.
The system 10 includes an apparatus 12, which is shown in Figure 1 in proximity to a document 14, which may be a bank note for example. The document 14 can be suitably held in position by any means, including being held in place by hand (not shown) or placed on any surface, including a keyboard area of a laptop computer or the surface 16 shown in Figure 1. The document 14 has security features 18 incorporated into or applied onto the substrate 20 of the document 14. Security features 18 can include or be comprised of security inks (single or multi-colored, either fluorescent or non-fluorescent), security fibers (single color, multi color, fluorescent color, and non-fluorescent color), and planchettes. In the first embodiment shown in Figure 1 , the apparatus 12 is housed within a housing 22 of suitable dimensions to advantageously render the apparatus 12 portable. The apparatus 12 may be held in hand (not shown) or supported by any means above or otherwise in proximity to the document 14, for example. The apparatus 12 is preferably operable to be attachable to other objects, thereby advantageously permitting the apparatus 12 to be positioned for authenticating value items. By way of example, Figure 1 shows an attachment member 24 and a hinge 26 of the attachment member 24. The attachment member 24 is preferably operable to perform a clamping function for removably attaching the apparatus 12 to other objects. In some embodiments of the invention, the attachment member 24 facilitates resilient attachment of the apparatus 12 to other objects. In some embodiments, the apparatus 12 includes fastening means such as one or more brackets and/or fastening apertures for permanently fastening the apparatus 12 to other objects. Such other objects may take any material form suitable for supporting the apparatus 12. By way of example, Figure 1 shows portions of a laptop computer 28 to which the apparatus 12 is removably attached for support. Placing the apparatus 12 near the upper end of an opened laptop computer 28 advantageously facilitates use of the apparatus 12 in conjunction with the laptop computer 28 without obscuring the display screen 30 of the laptop computer 28.
Other examples of objects to which the apparatus 12 may be removably or permanently attachable or incorporated within include any mechanical or electrical equipment. In some embodiments, the apparatus 12 is removably or permanently attachable to structural components of office equipment such as an output tray of a printer. In those or other embodiments, the apparatus 12 is removably or permanently attachable to moving components of office equipment such as being incorporated within the printer head of a printer.
In some embodiments, the apparatus 12 includes an actuator, such as any suitable switch or the push button 31 shown in Figure 1 for actuating operations (described further below) of the apparatus 12. Additionally or alternatively, the apparatus 12 may include a power switch (not shown) for turning the apparatus 12 on and off.
Figure 2 shows the apparatus 12 from the side, not visible in Figure 1 , that generally faces the document 14 during typical operation. Referring to Figure 2, the apparatus 12 in the first embodiment includes a circuit board 32, mounted within the housing 22, upon which one or more sources of electromagnetic energy, such as direct chemical light sources, incandescent light sources, gas or other discharge-based lighting sources, x-ray emitters, solid state sources, lasers, and/or the light emitting diodes (LEDs) 34, are mounted. While Figure 2 shows four rows of ten LEDs 34 in each row mounted to the circuit board 32, in general any number of LEDs 34 may be arranged according to any suitable spatial pattern.
The LEDs 34 and other sources of the apparatus 12 are preferably operable to produce and emit electromagnetic energy within one or more ranges of wavelengths of the electromagnetic spectrum, such as hard x-ray (HX) radiation, soft x-ray (SX) radiation, extreme ultraviolet (EUV) radiation, near ultraviolet (NUV) radiation, light within the visible region of the electromagnetic spectrum, near infra-red (NIR) radiation, mid-infra-red (MIR) radiation, far infra- red (FIR) radiation, and any combination thereof.
The apparatus 12 preferably includes at least one source, such as one or more LEDs 34, for emitting UV radiation at a wavelength suitable for rendering detectable one or more security features 18, possibly including rendering detectable by an electronic detector the one or more security features 18 and rendering visible to the human eye one or more security features 18 that are of the fluorescing type. In cases where the document 14 has fluorescing security features 18 and is suitably placed in proximity to the apparatus 12, activating one or more LEDs 34, such as by pressing the push button 31 (Figure 1 ) to emit UV radiation towards the document 14 will render such security features 18 visible, thereby advantageously facilitating the authentication of the document 14 by a human observer.
Typically, each LED 34 includes a lens 36 for directing the electromagnetic energy being emitted by the LED 34 at a specifiable angle or ranges of angles of direction. Additionally or alternatively, each lens 36 may cause diffusion of the intensity of the electromagnetic energy such that the distribution of electromagnetic energy emitted from each LED 34 across a given area subtended by the specifiable solid angle or range of solid angles is substantially uniform or otherwise in accordance with a specifiable distribution pattern. The LEDs 34 are preferably mounted onto the circuit board 32 at specifiable angles such that specific groups of LEDs 34 produce uniform illumination. in some embodiments, a series of specific groups of LEDs 34 are included in the apparatus 12, with each group of LEDs 34 being arranged for optimal . illumination in different circumstances. Examples of such circumstances include illumination under different ambient light conditions; illumination at different ranges of solid angles; illumination causing different distribution patterns across a given area subtended by the specifiable range of solid angles; illumination at different projection angles causing electromagnetic energy to be emitted at an angle relative to the surface of the circuit board 32, including being emitted at right angles to the circuit board 32 for illuminating the document 14 when placed directly beneath the apparatus 12; illumination of particular types of value items, such as value items having particular dimensions, value items having security features disposed therein at particular locations of the value items, or other value items having particular known characteristics. A given group of LEDs 34 may be arranged to protrude from the circuit board 32 at specifiable projection angles from specifiable locations with lenses 36 of specifiable properties such that bank notes are optimally illuminated, and a different group of LEDs 34 may be arranged such that passports are optimally illuminated, for example. The LEDs 34, within a given group or otherwise, need not all produce electromagnetic energy at the same wavelength or in the same wavelength ranges, but may be operable to produce electromagnetic energy at specifiable wavelengths such that the overall illumination produced may include multiple wavelengths within the same or different ranges of wavelengths. The system 10 is in some embodiments operable to produce illumination of electromagnetic energy at multiple wavelengths simultaneously, altematingly or in other temporal patterns.
In some embodiments, the apparatus 12 includes one or more optical detectors, such as the camera 38 shown in Figure 2. The camera 38 is operable to detect radiation reflected off a surface of the substrate 20 during or after exposure to illumination from one or more of the LEDs 34, and to produce a detector response therefrom.
In cases where the surface 16 (Figure 1 ) is present and is a reflective surface 16, the camera 38 is operable to detect radiation that has transmitted through the value item, including possibly through the substrate 20 or other solid, liquid or gaseous substance, and reflected off the surface 16 toward the camera 38.
Such detector response can be used to facilitate authentication of the document 14, including authentication by digital processing or other automated means. Additionally or alternatively, such detector response can be used to facilitate the detection and/or human observation of one or more security features 18, including by magnification, filtering, display processing, and any combination thereof for example. The apparatus 12 includes in some embodiments a filter (not shown) for selectively detecting electromagnetic radiation having wavelengths in a desired range of the electromagnetic spectrum. Some embodiments of the invention include multiple detectors, with each detector being particularly suitable to detecting electromagnetic radiation having wavelengths in a particular range of the electromagnetic spectrum. Additionally or alternatively, the camera 38 may include a filter for passing and/or rejecting electromagnetic radiation at specifiable wavelengths.
While Figure 2 shows one camera 38 centrally located between two pairs of rows of LEDs 34, in general any number of cameras 38 and any number of LEDs 34 may be arranged according to any suitable spatial patterns. The housing 22 preferably has dimensions sufficiently large to accommodate the detectors and sources installed in the apparatus 12, while maintaining a size sufficiently small for portability. The dimensions of the housing 22 will vary with the number and arrangement of sources and detectors. In some embodiments, the housing 22 has a length in the range of 3 to 30 cm (1.2" to 12"), a width in the range of 1 to 10 cm (0.39" to 3.9") and a height in the range of 1 to 5 cm (0.39" to 2.0").
In embodiments having more than one source, different LEDs 34 may be operable to produce electromagnetic energy in different ranges of wavelengths. For example, in some embodiments the apparatus 12 includes one or more LEDs 34 operable to emit UV radiation at a wavelength suitable for rendering detectable security features 18 that are of the fluorescing type, thereby facilitating the authentication of value items; and includes one or more LEDs 34 operable to produce white light in the visible region of the electromagnetic spectrum, thereby advantageously providing the convenience of general lighting when desired by the user. The LEDs 34 that are operable to emit UV radiation may be the same or different from those operable to produce the white lighting, for example.
In some embodiments, the apparatus 12 includes a bottom cover (not visible in the Figures) attachable to or forming part of the housing 22 adjacent the LEDs 34. Such bottom cover preferably causes minimal transmission loss of electromagnetic energy passing therethrough, and may be transparent, while physically protecting the LEDs 34. The apparatus 12 in some embodiments does not include a bottom cover.
Referring back to Figure 1 , the apparatus 12 is shown in cut-out to reveal the circuit board 32 (from its side opposite to that visible in Figure 2) and source drive circuitry 40 mounted on the circuit board 32. The source drive circuitry 40 is preferably operable to supply electrical energy for selectively activating the LEDs 34 at selected bias points and power levels. The source drive circuitry 40 is represented pictorially in Figure 1 in the form of an integrated circuit chip, however, the source drive circuitry 40 may in general include any number of components for selectively activating the LEDs 34. The source drive circuitry 40 may include any of a separate drive circuit for each LED 34 or for groups of LEDs 34; distribution circuitry for distributing drive voltages and currents to the LEDs 34, including electrical connections such as the circuit board traces 42 shown in Figure 1 ; analog conditioning circuitry for conditioning, including amplifying and/or filtering, drive voltages and currents applied to the LEDs 34; digital to analog conversion circuitry for converting digital representations of desired drive levels to analog drive voltages and currents; digital processing circuitry for determining the digital representations of desired drive levels; digital communications circuitry for receiving digital transmissions of the digital representations of desired drive levels; and combinations thereof, for example. The source drive circuitry 40, by itself or in conjunction with other suitable components, is preferably operable to activate, for specified durations, one or more selected LEDs 34 to produce electromagnetic energy at a specified wavelength and at a specified output intensity.
The system 10 includes a memory circuit 44, which is shown in Figure 1 mounted on the circuit board 32. The memory circuit 44 is preferably operable to store information in the form of digital data, and can be any part or all of a digital electronic integrated circuit. The memory circuit 44 may be implemented as Read-Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Oniy Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash memory, one or more flash drives, universal serial bus (USB) connected memory units, magnetic storage, optical storage, magneto-optical storage, etc. or any combination thereof, for example. The memory circuit 44 may be operable to store memory as volatile memory, non-volatile memory, dynamic memory, etc. or any combination thereof.
The system 10 includes a processor 46, which is shown in Figure 1 mounted on the circuit board 32. The processor 46 is preferably operable to perform digital computations, and can be any processing circuit having one or more circuit units, such as a central processing unit (CPU), digital signal processor (DSP), embedded processor, etc., and any combination thereof operating independently or in parallel, including possibly operating redundantly. The processor 46 may be implemented by one or more integrated circuits (IC), including being implemented by a monolithic integrated circuit (MIC), an
Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), etc. or any combination thereof. Additionally or alternatively, the processor 46 may be implemented as a programmable logic controller (PLC), for example. The processor 46 may include circuitry for storing memory, such as digital data, and may comprise the memory circuit 44 or be in wired communication with the memory circuit 44, for example. In some embodiments, the processor 46 is operable to perform some or all of the functions performed by the source drive circuitry 40, and may comprise any part or all of the source drive circuitry 40. In the first embodiment, the processor 46 in conjunction with the memory circuit 44 is operable to control the operation of the source drive circuitry 40.
In the first embodiment, the apparatus 12 is operable to conduct digital communications with other computing devices, and includes the communications connector 48 shown in Figure 1 , which is dimensioned to receive a cable (not shown) for connecting between the apparatus 12 and such other computing device, including the laptop computer 28 shown in Figure 1. A USB (Universal Serial Bus) camera cable may be used, for example. In some embodiments, the apparatus 12 is operable to conduct communications via a wireless connection, including a satellite link or line-of-sight free optical link for example. Additionally or alternatively, the apparatus 12 may be operable to conduct communications via a fiber-optic transmission link.
In embodiments having a cable (not shown) connected at the connector 48 between the apparatus 10 and the laptop computer 28 shown in Figure 1 , the apparatus 10 is operable to receive electrical power from the laptop computer 28 via the cable and connector 48. Additionally or alternatively, the apparatus 10 may be operable to receive battery power, including being dimensioned to house one or more batteries such as the electrical storage battery 50 shown in Figure 1. In some embodiments of the system 10, the memory circuit 44, the processor 46, or both the memory circuit 44 and the processor 46, are implemented separate from the apparatus 10, including being incorporated within a separate computing device such as the laptop computer 28. Additionally or alternatively, the apparatus 10 may include memory circuitry and/or information processing circuitry identical, similar or analogous to the memory circuit 44 and/or the processor 46, respectively. Thus, any portion or all of the functionality of the memory circuit 44 and the processor 46 may be performed within the apparatus 12 or may be performed within a separate computing device in communication with the apparatus 12, such as the laptop computer 28, another computing device (not shown) or a remote computing device (not shown) in communication with the laptop computer 28 or other computing device.
Methods of Operation
Referring to Figure 3, the memory circuit 44 in accordance with the first embodiment of the invention contains blocks of code comprising computer executable instructions for directing the processor 46 to perform the steps of a method shown generally at 52. Additionally or alternatively, such blocks of code may form part of a computer program product comprising computer executable instructions embodied in a signal bearing medium, which may be a recordable computer readable medium or a signal transmission type medium, for example.
When electrical power is being supplied to the processor 46 and the memory circuit 44, the processor 46 is directed to begin executing the instructions of block 54. Block 54 directs the processor 46 to generate a user interface, which generally permits a user to input information for processing by the processor 46 and provides information to the user, such as by displaying information on the display screen 30 of the laptop computer 28. Generating the user interface typically involves prompting the user for user login information, for example, which may involve prompting the user for a user identification and a password, passphrase or other forms of a passcode.
Block 56 then directs the processor 46 to receive, as user input, the user login information.
Block 58 directs the processor 46 to determine whether the user identification (or user ID) received by executing block 56 is a known user ID. In some embodiments, determining whether the user ID is known involves comparing the user ID received by executing block 56 with one or more user identifications stored by the system 10, such as being stored in the memory circuit 44, and determining that the user ID is known if it matches one of the stored user identifications. If the user ID is not known, then the processor 46 is directed to execute block 60, which directs the processor 46 to cause operation of the system 10 in a guest mode. When operation in the guest mode is completed, such as by the user terminating execution of block 60, then the method 52 proceeds to end. If the user ID is known, then block 62 directs the processor 46 to determine whether the user ID is a privileged user ID. Determining whether the user ID is a privileged user ID typically involves comparing the user ID received by executing block 56 with one or more previously stored user identifications having a privileged status. For example, the system 10 in some embodiments is operable to define the user identification "ADMIN" as having privileged status. In some embodiments, the system 10 is operable to permit the user to specify which user accounts created through use of the user interface should have privileged status.
If the user ID is not a privileged user ID, then the processor 46 is directed to execute block 64, which directs the processor 46 to determine whether the passcode of the login information is correct. Determining whether a passcode is correct typically involves comparing the passcode received as user input with a previously stored passcode associated with the user ID received by executing block 56.
If the processor 46 determines by executing block 64 that the passcode associated with the known, but not privileged, user ID is not correct, then the processor 46 is directed to execute block 60 described above, thereby causing operation of the system 10 in guest mode.
If the processor 46 determines that the passcode for the known, but not privileged, user ID is correct, then the processor 46 is directed to execute block 66, which directs the processor 46 to cause operation of the system 10 in a user mode. When operation in the user mode is completed, such as by the user terminating execution of block 66, then the method 52 proceeds to end.
Referring back to block 62, if the user ID is a privileged user ID, then the processor 46 is directed to execute block 68, which directs the processor 46 to determine whether the passcode received by executing block 56 is correct.
If the passcode associated with the privileged user ID is not correct, then the processor 46 is directed to execute block 70, which causes the system 10 to operate in the guest mode. Typically, block 70 is implemented in a similar manner to that of block 60 described above.
If the passcode associated with the privileged user ID is correct, then the processor 46 is directed to execute block 72, which causes the system 10 to operate in a privileged mode. When operating in the privileged mode, the system 10 is generally operable to provide enhanced functionality as compared to operation in the user mode. For example, the user interface may include additional menus not available in other modes of operation. By way of further example, the user may be permitted to set up other user accounts only when the system 10 is operating in privileged mode. In some embodiments, the system 10 is operable to direct the processor 46 to perform logging functions that store in the memory circuit 44 records of user input, including user login information, and operations of the apparatus 12, including time and dates of such operations, for subsequent analysis of the use of the apparatus 12. Typically, such logged information is made available to the user through the user interface only when the system 10 is operating in the privileged mode. When operation in the privileged mode is completed, such as by the user terminating execution of block 72, then the method 52 proceeds to end.
While not shown in Figure 3, the system 10 is in some embodiments operable to permit the user to attempt to provide as user input multiple times where either the user ID received by executing block 56 is not known or the passcode received by executing block 56 is not correct. In such embodiments, the processor 46 is directed to cause the display an error message, such as on the display screen 28; and to prompt the user to indicate whether the user would like to retry inputting login information or would prefer to use the system 10 and apparatus 12 in a guest mode. Generally, the system 10 is operable to provide reduced functionality when in the guest mode as compared to operation in the user mode and the privileged mode, and in some embodiments all use of the apparatus 12 is prevented when the system 10 is operating in the guest mode. Referring to Figure 4, an exemplary method for directing the processor 46 to perform steps of block 60, 66, 70 and 72 is shown generally at 74. The method 74 begins execution at block 76, which directs the processor 46 to receive as user input an indication of a value item type, such as bank note, passport, stock certificate, etc. Receiving such indication may involve prompting the user for the type of value item to be illuminated by the apparatus 12, and receiving user input in response to such prompt, for example. In some embodiments, one type of value item is stored as a default value item type, and receiving user input involves receiving user input that overrides the default type. In some embodiments, the system 10 is operable to permit the user through the user interface to change a current value item type through a menu selection, thereby causing the processor 46 to receive the indication of value item type. Additionally or alternatively, the system 10 is operable in some embodiments to receive an indication of dimensions of a given value item, position of the value item in relation to the apparatus 10, information regarding the location of security features on or within the given value item, or other information suitably useabie by the system 10 to enhance or optimize the effectiveness of the apparatus 10.
Block 78 then directs the processor 46 to select a sources group in response to the received indication. Selecting a sources group may involve selecting one or more sources, such as the LEDs 32, associated with the indication of value item type received by executing block 76. The sources associated with a given value item type is preferably those sources that will result in enhanced or optimal illumination of value items of that type. Selecting a given LED 32 may involve storing in the memory circuit 44 a true value for an activation flag associated with the given LED 32 such that the given LED 32 is activated upon request from the user, for example. Additionally or alternatively to the execution of blocks 76 and 78 as shown in Figure 4, the system 10 in some embodiments and in respect of one or more operating modes is operable to select a sources group in response to an indication, including an indication received as user input, of operating circumstances. For example, the system 10 may provide through the user interface a menu permitting the user to choose between any number of projection angles, or ranges thereof, such as 0, 30, 60 and 90 degrees. If the user chooses 0 (zero) degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed directly beneath the apparatus 12; if the user chooses 30 degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed generally beneath and slightly forward of the apparatus 12; if the user chooses 60 degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed further forward (relative to the case of choosing 30 degrees) and tilted toward the apparatus 12; and if the user chooses 90 degrees, the system 10 will select a sources group such that a document 14 is optimally illuminated when placed directly in front of the apparatus 12 or nearly directly in front of the apparatus 12, for example. By way of further example, the system 10 may provide through the user interface a menu permitting the user to choose between any number of solid angles or ranges thereof such as respective ranges of solid angles associated with a "narrow beam", "nominal beam" and "wide beam". In a manner similar to that of the projection angles, the system 10 is operable in such embodiments to select a sources group in response to such operating circumstances to achieve illumination of different beam widths. Block 80 directs the processor 46 to select an intensity associated with the selected sources group. Selecting the intensity typically involves assigning a value to an intensity parameter stored in the memory circuit 44 such that the output intensity of any activated sources are regulated by the source drive circuitry 40 in accordance with the assigned value. In some embodiments, selecting the intensity involves prompting the user for a desired intensity; receiving as user input the desired intensity; determining whether the desired intensity is within a range of permitted or possible intensities; and assigning a value to the intensity parameter in accordance with the desired intensity, including in accordance with an extreme value within the range of permitted or possible intensities. Additionally or alternatively, the system 10 is operable in some embodiments to prompt the user for an indication of the level of ambient light in proximity to the apparatus 12, or otherwise determine a measure of the ambient light in proximity to the apparatus 12; and to assign a value to the intensity parameter in accordance with the level of ambient light such that the intensity increases proportionally with increasing amounts of ambient light. In some embodiments, the system 10 is operable to store a default intensity in the memory circuit 44; permit the user through the user interface to change a currently desired intensity through a menu selection; assign a value to the intensity parameter equal to the default intensity if no change is made by the user; and assign a value to the intensity parameter equal to the currently desired intensity as maybe changed by the user from time to time.
Block 82 directs the processor 46 to select the duration of each activation of the sources of the selected sources group. Selecting the duration typically involves assigning a value to a duration parameter stored in the memory circuit 44 such that the sources are activated for a set period of time, such as four seconds, at each or a given activation in accordance with the assigned value. In some embodiments, selecting the duration involves prompting the user for a desired duration; receiving as user input the desired duration; determining whether the desired duration is within a range of permitted or possible durations; and assigning a value to the duration parameter in accordance with the desired duration, including in accordance with an extreme value within the range of permitted or possible durations. In some embodiments, the system 10 is operable to store a default duration in the memory circuit 44; permit the user through the user interface to change a currently desired duration through a menu selection; assign a value to the duration parameter equal to the default duration if no change is made by the user; and assign a value to the duration parameter equal to the currently desired duration as maybe changed by the user from time to time. In variations of embodiments of the invention, any of blocks 76 and 78, block 80 and block 82 may be executed only when the system 10 is operating in the privileged mode, such that default values are used for the selection of sources group, intensity and duration when the system 10 is not operating in the privileged mode. In embodiments where blocks 76 and 78 are not implemented, a default set of sources, such as all sources present in the apparatus 12, are activated every time activation occurs, and the method 74 begins execution at block 80. In embodiments where block 80 and/or block 82 are not implemented, default values for intensity and duration are used, respectively. In general, blocks 76 to 84 can be executed in any order, including being executed in parallel or in response to computer interrupts having no predetermined order, with the exception that block 78 is preferably executed after block 76.
Block 84 directs the processor 46 to select the wavelength such that, when activated, a given source produces electromagnetic energy at the selected wavelength, including at a range of wavelengths that includes the selected wavelength.
Referring to Figure 5, an exemplary method for directing the processor 46 to perform steps of block 84 (Figure 4) is shown generally at 86. The method 86 begins execution at block 88, which directs the processor 46 to determine whether the system is being operated in the privileged mode.
If operation is in privileged mode, the processor 46 is directed to execute block 90, which directs the processor 46 to determine whether the system 10 has received an indication of a desired wavelength. Determining whether a desired wavelength indication has been received may involve prompting the user for the desired wavelength indication, and receiving user input in response to such prompt. Additionally or alternatively, the system 10 is operable in some embodiments to store a default wavelength in the memory circuit 44; permit the user through the user interface to change a currently desired wavelength through a menu selection; and determine that a desired wavelength is received each time the user changes the currently desired wavelength.
If the processor 46 by executing block 90 determines that a desired wavelength has been received, the processor 46 is directed to execute block 92, which directs the processor 46 to assign a value to a wavelength parameter, preferably stored in the memory circuit 44, in accordance with the desired wavelength. Assigning this value may involve determining whether the desired wavelength is within a range of permitted or possible wavelengths; assigning the wavelength parameter value to the desired wavelength if the desired wavelength is within the permitted range; and assigning the wavelength parameter value to an extreme value within the permitted range closest to the desired wavelength if the desired wavelength is not within the permitted range.
Executing block 92 advantageously permits a user having privileged access to directly control the wavelength of the electromagnetic energy emitted by activated sources, thereby facilitating testing of the apparatus 12 and/or value items and security features of value items, for example.
After block 92 has been executed, the processor 46 is directed to end the method 86.
Referring back to block 90, if no desired wavelength has been received, then the processor 46 is directed to execute block 94, which directs the processor 46 to assign a value to the wavelength parameter that is equal to a standard wavelength. The standard wavelength may be a wavelength such that exposing a value item to electromagnetic energy at the standard wavelength causes fluorescing security features to be rendered detectable. The standard wavelength may be determined in accordance with an industry standard for fluorescing security features, for example. Preferably, the system 10 is operable to store a default wavelength parameter value, which may be equal to the standard wavelength value.
After block 92 has been executed, the processor 46 is directed to end the method 86. Referring back to block 88, if the system 10 is not being operated in the privileged mode, the processor 46 is directed to execute block 96, which directs the processor 46 to determine whether the system 10 is being operated in the user mode.
If the system 10 is operating in the user mode, the processor 46 is directed to execute block 94 described above, and then to end the method 86.
If the apparatus 12 is not being operated in the user mode, the processor 46 is directed to execute block 98 associated with the guest mode of system 10 operation. Although not shown in Figure 5, the system 10 is operable in some embodiments to determine whether the system 10 is operating in the guest mode and, if so, execute block 98 and, if not, to conduct error processing or perform other suitable steps.
Block 98 directs the processor 46 to assign a value to the wavelength parameter that is equal to an off-standard wavelength. The off-standard wavelength typically differs from the standard wavelength sufficiently that activating a source at the off-standard wavelength produces electromagnetic energy within a range of wavelengths that does not include the standard wavelength and does not cause industry standard fluorescing security features to be rendered detectable. Executing block 98 advantageously reduces functionality of the system 10 in response to an unknown user identification or an incorrect passcode, thereby securing the apparatus 12 against unauthorized use while having the appearance of normal operation. Executing block 98 thus advantageously impedes unauthorized persons from using the apparatus 12 to test and develop counterfeit value items, for example, while not ostensibly appearing to cause such impediments.
After block 98 has been executed, the processor 46 is directed to end the method 86.
Referring back to Figure 4, block 100 directs the processor 46 to receive a user request for activation of the selected sources group. Receiving the user request for activation may involve permitting the user through the user interface to request activation by a menu selection; may involve receiving an indication of actuation by a hardware component such as the push button 31 (Figure 1 ); or any combination thereof, for example.
Block 102 directs the processor 46 to activate the detector, such as the camera 38, for detecting electromagnetic radiation reflected from a surface of the value item, such as the document 14, when being exposed to electromagnetic radiation emitted from activated sources.
Block 104 directs the processor 46 to activate, for the selected duration, the sources of the selected sources group in accordance with the selected wavelength and the selected intensity. Activating may involve starting a timer or other counter; providing an output to the source driver circuitry 40 such that the source driver circuitry 40 supplies electrical energy to the LEDs 34 of the selected sources group at the necessary bias points and power levels to result in illumination from the LEDs 34 of electromagnetic energy at selected wavelength and the selected intensity; determining when the counter has reached a count corresponding to the selected duration; and removing the output to the source driver circuitry 40 such that the LEDs 34 become de-activated.
Block 106 directs the processor 46 to de-activate the detector.
After block 106 is executed, the processor 46 is directed to return from the method 74.
Additionally or alternatively to the execution of blocks 102 and 106, the system 10 is operable in some embodiments to activate the detector for a duration less than, equal to, or greater than the duration of activation for the sources. In some embodiments, the detector is activated to produce a single capture in one instant during the activation duration. Additionally or alternatively, the system 10 is operable in some embodiments to maintain continuous sensing by the detector during intervals of time greater than the duration of activation for the sources, including having continuous sensing whenever electrical power is applied to the apparatus 10.
Thus, there is provided a method of securing the use of an apparatus for authenticating a value item, the method involving receiving login information; and causing a source of electromagnetic energy to produce said electromagnetic energy at a wavelength determined in response to said login information. While embodiments of the invention have been described and illustrated, such embodiments should be considered illustrative of the invention only. The invention may include variants not described or illustrated herein in detail. For example, the system 10 may be operable to function in an operating mode other than the privileged mode, user mode and guest mode; may provide variations of the user mode for different users; and may provide all of the functionality permitted in the privileged mode when operating in the user mode. Thus, the embodiments described and illustrated herein should not be considered to limit the invention as construed in accordance with the accompanying claims.

Claims

What is claimed is:
1. A system for authenticating a value item having a security feature, the system comprising:
(a) a controller operable to receive login information and operable to select a first wavelength when said login information correctly identifies an authorized user; and
(b) an apparatus comprising a source for producing electromagnetic energy, said apparatus being operable to render detectable the security feature of the value item said when source is producing said electromagnetic energy at said first wavelength.
2. The system of claim 1 wherein said controller is operable to select a second wavelength when no authorized user is correctly identified by said login information, and wherein said apparatus is operable to not render detectable the security feature of the value item when said source is producing said electromagnetic energy at said second wavelength.
3. The system of claim 2 wherein said controller is operable to select an intensity in response to a measure of ambient light, and wherein said source is operable to produce said electromagnetic energy in accordance with said intensity.
4. The system of claim 2 wherein said apparatus comprises a plurality of said sources, said controller is operable to receive an indication selected from the group consisting of a first indication of a value item type and a second indication of an operating circumstance of the system, and said controller is operable to select in accordance with said indication one or more sources of said plurality of sources.
5. The system of claim 4 wherein said controller is operable to select a duration and to cause said one or more sources to produce said electromagnetic energy for said duration.
6. The system of claim 1 wherein said apparatus comprises said controller.
7. The system of claim 1 wherein said apparatus is operable to conduct communications with a computing device, said computing device comprising said controller.
8. The system of claim 7 wherein said apparatus further comprises an optical detector operable to produce a detector response, said apparatus being operable to communicate said detector response to said computing device.
9. The system of claim 8 wherein said controller is operable to authenticate the value item in response to said detector response.
10. A method of authenticating a value item having a security feature, the method comprising:
(a) receiving login information from a user;
(b) determining in response to said login information whether said user is an authorized user; and
(c) if said user is said authorized user, producing electromagnetic energy at a first wavelength such that the security feature of the value item is detectable.
11. The method of claim 10 further comprising producing, if said user is not said authorized user, said electromagnetic energy at a second wavelength such that the security feature of the value item is not rendered detectable.
12. The method of claim 10 further comprising selecting an intensity in response to a measure of ambient light, and producing said electromagnetic energy in accordance with said intensity.
13. The method of claim 10 further comprising selecting a projection angle and producing said electromagnetic energy in accordance with said projection angle.
14. The method of claim 10 further comprising selecting a beam width and producing said electromagnetic energy in accordance with said beam width.
15. The method of claim 11 further comprising producing by an optical detector a detector response.
16. The method of claim 15 further comprising authenticating the value item in response to said detector response.
17. A system for authenticating a value item having a security feature, the system comprising:
(a) source means for producing electromagnetic energy; and
(b) controller means for controlling said source means, said controller means being operable to receive login information from a user, determine in response to said login information whether said user is an authorized user, and cause said source means to produce, if said user is said authorized user, electromagnetic energy at a first wavelength such that the security feature of the value item is detectable.
18. The system of claim 17 wherein said controller means is operable to cause said source means to produce, if said user is not said authorized user, electromagnetic energy at a second wavelength such that the security feature of the value item is not rendered detectable.
PCT/CA2009/000460 2008-04-21 2009-04-19 System and apparatus for authenticating a value item and method of controlling use thereof WO2009129600A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2721672A CA2721672A1 (en) 2008-04-21 2009-04-19 System and apparatus for authenticating a value item and method of controlling use thereof

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US4664408P 2008-04-21 2008-04-21
US61/046,644 2008-04-21

Publications (1)

Publication Number Publication Date
WO2009129600A1 true WO2009129600A1 (en) 2009-10-29

Family

ID=41216361

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2009/000460 WO2009129600A1 (en) 2008-04-21 2009-04-19 System and apparatus for authenticating a value item and method of controlling use thereof

Country Status (2)

Country Link
CA (1) CA2721672A1 (en)
WO (1) WO2009129600A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012073241A1 (en) * 2010-11-30 2012-06-07 Bsecure Ltd. Device for product authentication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050061878A1 (en) * 2003-09-23 2005-03-24 Ronald Barenburg Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
US20050071295A1 (en) * 2003-08-21 2005-03-31 Pitney Bowes Incorporated Document security utilizing color gradients
WO2007076610A1 (en) * 2006-01-06 2007-07-12 Verichk Global Technologies Inc. Secure access to information associated with a value item
US20080048106A1 (en) * 2006-08-23 2008-02-28 Elwood Neal Blanchard Method and apparatus for verifying the authenticity of an item by detecting encoded luminescent security markers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050071295A1 (en) * 2003-08-21 2005-03-31 Pitney Bowes Incorporated Document security utilizing color gradients
US20050061878A1 (en) * 2003-09-23 2005-03-24 Ronald Barenburg Method for improving security and enhancing information storage capability, the system and apparatus for producing the method, and products produced by the system and apparatus using the method
WO2007076610A1 (en) * 2006-01-06 2007-07-12 Verichk Global Technologies Inc. Secure access to information associated with a value item
US20080048106A1 (en) * 2006-08-23 2008-02-28 Elwood Neal Blanchard Method and apparatus for verifying the authenticity of an item by detecting encoded luminescent security markers

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012073241A1 (en) * 2010-11-30 2012-06-07 Bsecure Ltd. Device for product authentication

Also Published As

Publication number Publication date
CA2721672A1 (en) 2009-10-29

Similar Documents

Publication Publication Date Title
US11854333B2 (en) Devices, systems, and methods for optical validation
US7244043B2 (en) Method and system for a processor controlled illumination system for reading and analyzing materials
US7715613B2 (en) UV counterfeit currency detector
US8542094B2 (en) Apparatus and method for secure detection of an item and a method of securing access to information associated with the item
CA2522940C (en) Method and device for the authentication of documents and goods
US7850077B2 (en) Apparatus and method for secure identification of security features in value items
CN109716353A (en) Fingerprint identification method, fingerprint identification device and electronic equipment
US20180330135A1 (en) Anti-counterfeiting barcode reader and associated methods
CN105321252A (en) Terminal unit and method for verification of a security document and terminal
US8531652B2 (en) Three way desktop UV counterfeit detector
JPS59177690A (en) Method and apparatus for inspecting authenticity of certificate
JP2006285775A (en) Paper sheet discrimination device
US7755747B2 (en) Device and method for checking the authenticity of an anti-forgery marking
JP6486371B2 (en) Document verification device
US6858856B2 (en) Counterfeit detector cash register
WO2009129600A1 (en) System and apparatus for authenticating a value item and method of controlling use thereof
JP6185801B2 (en) Determination system and determination apparatus
EP3076332B1 (en) Method to check the authenticity of articles, each provided with at least one optical reading marking
KR100717679B1 (en) Portable infrared viewer
CN112689838B (en) Photoluminescence identification apparatus, system and method
RU177072U1 (en) DEVICE FOR INSTALLING THE CONTENT OF DOCUMENTS DAMAGED BY THE MECHANICAL METHOD
JPH0962894A (en) Method and device for reading printed matter
KR20210011741A (en) Playing card having invisible security material and recognition apparatus and method of the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09735139

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2721672

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09735139

Country of ref document: EP

Kind code of ref document: A1