WO2010047686A1 - Enhanced security printing of a layout template - Google Patents
Enhanced security printing of a layout template Download PDFInfo
- Publication number
- WO2010047686A1 WO2010047686A1 PCT/US2008/080535 US2008080535W WO2010047686A1 WO 2010047686 A1 WO2010047686 A1 WO 2010047686A1 US 2008080535 W US2008080535 W US 2008080535W WO 2010047686 A1 WO2010047686 A1 WO 2010047686A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- varied
- layout template
- layout
- bits
- security
- Prior art date
Links
- 238000007639 printing Methods 0.000 title claims abstract description 19
- 238000000034 method Methods 0.000 claims abstract description 46
- 230000002708 enhancing effect Effects 0.000 claims abstract description 5
- 239000003086 colorant Substances 0.000 claims description 10
- 239000000126 substance Substances 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000004806 packaging method and process Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 3
- 238000002372 labelling Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000007641 inkjet printing Methods 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000010206 sensitivity analysis Methods 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M3/00—Printing processes to produce particular kinds of printed work, e.g. patterns
- B41M3/14—Security printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06103—Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/60—Editing figures and text; Combining figures or text
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32309—Methods relating to embedding, encoding, decoding, detection or retrieval operations in colour image data
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
- H04N2201/3205—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3226—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image
- H04N2201/323—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of identification information or the like, e.g. ID code, index, title, part of an image, reduced-size image for tracing or tracking, e.g. forensic tracing of unauthorized copies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3271—Printing or stamping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3274—Storage or retrieval of prestored additional information
- H04N2201/3276—Storage or retrieval of prestored additional information of a customised additional information profile, e.g. a profile specific to a user ID
Definitions
- the present disclosure relates generally to enhanced security printing of a layout template.
- Product labeling and security packaging are important components of brand protection, product tracking and authenticating, as well as of anti-counterfeiting initiatives.
- Product labeling and security packaging involve providing each package with a unique ID, in the form of, for example, a deterrent or mark.
- deterrents/marks may be overt and/or covert, and contain authenticable data.
- Such deterrents enable the product to be identified and tracked, and the product inventory to be maintained.
- measures are often taken to enhance the probability that the product cannot be counterfeited, for example, by making the packaging or labels difficult and/or time consuming to replicate and/or by using variable data printing (VDP).
- VDP variable data printing
- Security deterrents often compete with branding, sales and other product information for printed real estate. As such, it may be advantageous for the deterrent to simultaneously provide multiple levels of protection and functionality, or for the deterrence to be integrated into the printing process in such a way that the branding and/or product information contains authenticable data that is hidden in plain sight. 200800648 2
- Fig. 1 is a flow diagram depicting an embodiment of a method for enhancing security printing of a layout template
- Figs. 2A and 2B schematically depict embodiments of the layout template as received (Fig. 2A) and the layout template after variation (Fig. 2B); and
- Fig. 3 is a flow diagram depicting additional steps of the method after a varied layout template is generated.
- Embodiments of the method(s) disclosed herein advantageously adapt the package printing layout for use in security/steganography.
- the enhanced security of the printed layout may be particularly useful in product inspection, recall, warranty fraud prevention, and/or authentication.
- certain layout parameters are varied without deletehously affecting the brand identification, brand differentiation, product identification, product safety, or other intentions of the printing.
- the physical layout of a label, document, or the like is used to add security information. As such, data is added through a means not associated with the printed elements themselves, but rather through the relative position of these elements.
- the varied layout template that is deployed provides a first line of defense against counterfeiters, while the data encoded therein provides a second line of defense against counterfeiters. 200800648 3
- FIG. 1 an embodiment of the method for enhancing security printing is depicted. It is to be understood that Figs. 2A and 2B will also be referenced throughout the description of Fig. 1.
- the method generally begins when a layout template for a printed region on an object is received by a person or entity (i.e., a security printer) that adds security information to the layout template, as shown at reference numeral 100.
- the generator and/or supplier of the layout template may be the person or entity that owns the object that is to be branded, labeled and/or packaged with the layout, or a label converter hired by the object owner.
- the layout template is sent to the security printer for the addition of security information. This security information is generally implemented into the layout template prior to final branding, labeling and/or packaging of the object (shown as 1000 in Fig. 2B and described further hereinbelow).
- the layout template 10 generally includes branding information and any other information that is desirable to describe the product associated therewith.
- the layout template 10 may include the product name and description, and if applicable, any dosage information, concentration or strength information, expiration information, potential side effects, total count, lot number, and/or other like information.
- the layout template 10 may also include bar codes and/or other deterrents for product authentication.
- the original layout template 10 also specifies desirable variable copy holes for the printed region 12 (shown in Fig. 2B).
- the constraints for layout variation are determined by the person/entity that generates the original layout template 10, and may not be altered by the security 200800648 4
- Such constraints may be based upon aesthetic considerations, branding information concerns, product information concerns, the hardware of a printer to be used to print the printed region 12, at least one of hardware or software of a device to be used to read the printed region 12, or combinations thereof.
- the product logo has a particular design or is a trademark (e.g., see the element depicted at reference numeral 14 in Figs. 2A and 2B)
- this particular element of the layout template 10 is a constrained layout element.
- these particular copy holes are constrained layout elements and may not be varied (e.g., if the element in the copy hole is used as an anchor or fiducial mark for other elements outside the copy hole, then the relative location of the data within the copy hole should not be moved).
- the locations of the box containing the lot ID and the strength may be constrained layout elements. It is to be understood, however, that the constraints (and thus the constrained layout elements) may vary among different layout templates 10.
- the security printer acknowledges the constraint(s) of the layout template 10, as shown at reference numeral 102.
- constraints may be set by the person/entity that generates the original layout template 10.
- the particular constraints may be transmitted to the security printer with the layout template 10, or may be identified at some point after the layout template 10 is received.
- the security printer varies one or more of the unconstrained layout elements (as shown at reference numeral 104) in order to provide additional real estate for the addition of security information.
- the security printer By varying one or more of the unconstrained layout elements, the security printer generates a varied layout template 10', shown in Fig. 2B. Varying the unconstrained layout element(s) involves changing one or more of x-positional spacing, y-positional spacing, background centering, size, scaling, relative colors, absolute colors, color differences, density, intensity, or rotation of 200800648 5
- Such variation may create additional bits for encoding data in the layout itself and/or may generate variable holes for incorporating explicit security deterrents 16 (shown in Fig. 2B and described further in reference to Fig. 3), which may also encode data.
- the "10 mg" image is moved (in the varied layout template 10') in the x- and y- directions and is scaled, for example, by less than 5%, without changing the visual appeal of the original layout template 10.
- the line separating "XYZ TABLETS" from "100 tablets” could also be repositioned so that the two lines of text are above or below the line.
- the size of the 2D bar code 18 may be a constraint, it may be acceptable to alter its position within the layout template 10.
- the largest region of the layout template 10 or an explicit fiducial may be used as an anchor, and then the unconstrained layout element(s) may be varied as desired.
- one unconstrained layout element may be varied, or a plurality of unconstrained layout elements may be varied. Such variation may depend, at least in part, on the number of unconstrained layout elements available, and the required or desired security information to be incorporated into the layout template 10.
- one or more possible varied layout templates 10' may be generated. For example, if the original layout template 10 includes two unconstrained layout elements, three possible varied layout templates 10' include one in which one of the two elements is altered, one in which the other of the two elements is altered, or one in which both of the elements are altered.
- the varied layout template(s) 10' is printed and scanned, as shown at reference numeral 106 in Fig. 1. It is to be understood that if more than one varied layout template 10' is 200800648 6
- each allowable variation may be printed and scanned in order to determine which configuration will accommodate the desired or required data.
- the scanned varied layout template 10' enables the security printer, using, for example, a segmentation or machine vision based system, to determine a number of bits that can be added to the varied layout template 10'.
- the variance may be quantified from a scanned image of the printed varied layout template 10'.
- data may be encoded as 30, 32, 34 ... 60 pixels from the left edge of the box. This enables 16 different possible locations, which is 4 bits of information. This sensitivity analysis is performed for each of the varied layout templates 10' that is generated, printed, and scanned.
- varied layout templates 10' may accommodate different numbers of bits. While not shown in Fig. 1 , the security printer may then transmit one or more deployment recommendations to the supplier of the original layout template 10.
- the deployment recommendation may include a single varied layout template 10', or multiple varied layout templates 10'.
- the security printer transmits to the supplier the varied layout template(s) 10' that, without further modification, will accommodate a desired or required security bit stream.
- the security printer may transmit multiple varied layout templates 10' along with one or more suggestions as to which combinations will accommodate the desired or required security bit stream. Referring again to the example shown in Figs. 2A and 2B, if both the position and scaling of the "10 mg" indicia and the position of the 2D bar code 18 will accommodate the desired or required security bit stream, varied layout templates 200800648 7
- the supplier informs the security printer of such selection.
- This varied layout template 10' will then be used to generate the printed region 12 on each object 1000 (shown in Fig. 2B). It is to be understood that in other instances, the security printer may determine, without assistance or verification from the supplier, which varied layout template 10' will be utilized to generate the printed region 12.
- the security printer may determine, without assistance or verification from the supplier, which varied layout template 10' will be utilized to generate the printed region 12.
- the number of bits that can be accommodated by such template 10' is encoded therein. It is to be understood that such bits may be encrypted or scrambled prior to such encoding.
- the encoded data is often one or more payloads (e.g., any number of bits that make up part of a tacit (published) deterrent) of the template 10' and thus of the printed region 12.
- payloads e.g., any number of bits that make up part of a tacit (published) deterrent
- 38 bits may be designated for the variable bits in a 96-bit SGTIN EPC global identifier replicated in the bar code 18, and another 122 bits are left over for other payloads, such as, for example, password(s), product code(s), etc.
- any desirable scrambling, encryption or encoding scheme may be used in the embodiments disclosed herein.
- the encoded varied layout template 10' may then be printed on the object 1000 to form the printed region 12. Printing may be accomplished by any suitable 200800648 8
- printing technique including inkjet printing, dry electrophotography, liquid electrophotography, or other variable data printing techniques.
- the term "object” as used herein is to be interpreted broadly and may include, but is not limited to any type of object, product, document or package.
- the term “package” is to be interpreted broadly herein to include any unit for containing a product, displaying a product, or otherwise identifying a branded good.
- Non-limitative examples of such packages include labels, anti-tamper strips (which tear when removal is attempted, thereby damaging both visual and electrical aspects of any deterrents), boxes, bags, containers, clamshells, bands, tape, wraps, ties, bottles, vials, dispensers, inserts, other documents, or the like, or combinations thereof.
- a request for implementing a particular security bit stream into the printed region 12 may be received by the security printer. This request may be received from the product owner, or it may be generated internally at the security printer.
- the security printer will determine whether the required bit stream can be accommodated by the varied layout template 10', as shown at reference numeral 302. Such a determination may be made by subtracting the number of bits that can be encoded in the varied layout template 10' from the required security bit stream. If this calculation results in a number less than or equal to 0 bits, then the varied layout template 10' can accommodate the entire security bit stream. The method then includes encoding the bit stream in the varied layout template 10' (reference numeral 304) and deploying the encoded varied layout template 10' as the printed region 12 on the object 1000 (reference numeral 306).
- the varied layout template 10' can accommodate only a portion of the entire security bit stream.
- the security printer may suggest adding one or 200800648 9
- more explicit security deterrents 16 (shown in Fig. 2B) that are independent of the varied layout template 10' to the varied layout template 10', as shown at reference numeral 308. It is to be understood that the addition of one or more security deterrents 16 may, in some instances, require further repositioning of the unconstrained elements of varied layout template 10.
- the security deterrent(s) 16 that is/are suggested will generally be suitable for encoding the remaining bits of the required security bit stream.
- Non-limiting examples of such security deterrents 16 include color lines, fingerprints, color text, copy detection patterns (CDP), color tiles, letter sequences, number sequences, graphic sequences, target patterns, bar codes, guilloche patterns, planchettes, holographs, anti-tamper deterrents, or other relevant deterrents known to those skilled in the art, or combinations thereof.
- the security printer may inquire as to whether the addition of one or more deterrents 16 to the varied layout template 10' is acceptable, as shown at reference numeral 310. If the supplier of the original layout template 10 indicates that the suggested explicit security deterrent(s) 16 is/are unacceptable, then the security printer may add steganographic bits or forensic bits into the varied layout template 10'.
- steganographic bits include digital watermarks, altered characters/spacing, UV, IR or other invisible ink marks, or the like.
- Non-limiting examples of forensic bits include chemical bits, nano-bits, or fiducial-mark based bits. It is to be understood that steganographic or forensic bits may be more desirable as they do not further visually alter the appearance of the varied layout template 10'.
- the portion of the security bit stream that fits into the varied layout template 10' (without the explicit security deterrent(s) 16) is encoded therein, as shown at reference numeral 316.
- the explicit security deterrent(s) 16 is/are then implemented into the varied layout template 10'.
- Such explicit security deterrent(s) 16 have the remainder of the security bit stream encoded therein, as shown at reference numeral 318.
- the varied layout template 10' of Fig. 2B (without the security deterrents 16) can accommodate 48 bits with brand owner acceptance and the required security bit stream has 320 bits, then the additional security deterrents 16 will be configured to accommodate the remaining 272 bits. This creates a relationship between the final layout and the deterrent 16 features, which may increase the difficulty of successfully counterfeiting the printed region 12.
- any suitable encoding scheme may be utilized, and such data may be scrambled or encrypted prior to being encoded.
- the varied template layout 10', in this embodiment including explicit security deterrent(s) 16, is deployed as the printed region 12.
- these deterrents 16 may be considered unconstrained layout elements.
- a traditional deterrent 16 can provide additional layout bits based on its location, size, etc. (in addition to its content, or payload).
- these deterrents 16 may also be varied within the layout template 10' as long as the branding message is not offended, such deterrents 16 remain readable, and visual dissonance is not created.
- Fig. 2B illustrates one example of a varied layout template 10' that is deployed as the printed region 12 on the object 1000.
- This particular varied layout template 10' (and printed region 12) includes unconstrained elements that have been varied (e.g., the "10 mg" indicia and the position of the 2D bar code), constrained elements that have not been varied (e.g., the logo 14), and additional security deterrents 16.
- Fig. 2B are illustrative examples, and it is to be understood that many other variations of the varied layout template 10' may be implemented.
- the embodiments of the method disclosed advantageously ease the object 1000 inspection process.
- An inspector who is made privy to the changes to the original layout template 10 (as deployed in the printed region 12), can easily see or verify the differences and verify that the differences correspond to those that were authorized prior to deployment.
- Such visual inspections may be particularly useful for field inspectors and/or when low quality, poor contrast, or low resolution devices are used for authentication.
- an inspector who is privy to the fact that a printed region 12 of a particular product 1000 includes a shift down in one line accompanied by a left shift of the "10 mg" indicia can readily authenticate the product 1000. Since any constraints may be imposed into the variable layout, inspection of the varying layout images may be easier.
- the tacit relationship between the layout changes may be useful to inspectors without adding additional bits to the layout-based security payload.
- a method for enhancing security printing of a layout template comprising: receiving the layout template; acknowledging one or more constraints for the layout template; varying at least one unconstrained layout element of the layout template, thereby generating a varied layout template; printing and scanning the varied layout template; and determining a number of bits that can be encoded in the varied layout template, the number of bits depending on the varying of the at least one unconstrained layout element.
- Clause 2 The method as defined in clause 1 wherein a plurality of unconstrained layout elements are available in the layout template, and wherein the method further comprises: 200800648 12
- Clause 4 The method as defined in any of the preceding clauses wherein the one or more constraints are based upon aesthetic considerations, branding information concerns, product information concerns, hardware of a printer used to print the varied layout template, at least one of hardware or software of a device used to read the varied layout template, or combinations thereof.
- Clause 5 The method as defined in any of the preceding clauses, further comprising: transmitting a deployment recommendation including the varied layout template to a supplier of the layout template; and receiving verification from the supplier that the deployment recommendation is acceptable.
- Clause 6 The method as defined in any of the preceding clauses, further comprising encoding the number of bits in the varied layout template.
- Clause 7 The method as defined in clause 6, further comprising encrypting or scrambling the bits prior to encoding. 200800648 13
- Clause 8 The method as defined in any of the preceding clauses, further comprising: determining whether a required security bit stream can be accommodated in the varied layout template by: subtracting the number of bits that can be encoded in the varied layout template from the required security bit stream to determine a remaining number of bits; and ensuring that the remaining number of bits can be accommodated by explicit security deterrents incorporated into the varied layout template.
- Clause 9 The method as defined in any of the preceding clauses, further comprising: receiving a request for incorporating a security bit stream into the varied layout template; determining whether the requested security bit stream can be accommodated in the varied layout template; and i) if the requested security bit stream can be accommodated in the varied layout template, then: encoding the requested security bit stream in the varied layout template; and deploying the varied layout template with the requested security bit stream encoded therein; or ii) if the requested security bit stream cannot be accommodated in the varied layout template, then: suggesting addition of at least one explicit security deterrent that is independent of the varied layout template; determining if the addition of the at least one explicit security deterrent is acceptable; and when the addition of the at least one explicit security deterrent is acceptable, the method further includes: encoding the number of bits in the varied layout template; and 200800648 14
- Clause 10 The method as defined in clause 9 wherein when the requested security bit stream cannot be accommodated in the varied layout template and the addition of the at least one explicit security deterrent is not acceptable, the method further comprises adding at least one of steganographic bits or forensic bits into the varied layout template.
- Clause 11 The method as defined in clause 10 wherein the steganographic bits are selected from digital watermarks, altered characters, altered spacing, or invisible ink marks, or wherein the forensic bits are selected from chemical bits, nano bits or fiducial-mark based bits.
- Clause 12 The method as defined in any of the preceding clauses wherein varying the at least one unconstrained layout element is accomplished by changing at least one of x-positional spacing, y-positional spacing, background centering, size, scaling, relative colors, absolute colors, color differences, density, intensity, or rotation of the at least one unconstrained layout element.
- An object comprising: a printed region established thereon, the printed region based on a varied layout template including: at least one constrained layout element; and at least one unconstrained layout element having at least one of an original x- positional spacing, an original y-positional spacing, an original background centering, an original absolute color, a color difference, an original size, an original scaling, an original density, an original intensity, or an original rotation varied; and a security bit stream, at least a portion of which is encoded in the at least one unconstrained layout element.
- Clause 14 The object as defined in clause 13, further comprising an explicit security deterrent incorporated into the varied layout template and the printed region. 200800648 15
- Clause 15 The object as defined in any of clauses 13 or 14 wherein at least an other portion of the security bit stream is encoded in the explicit security deterrent.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Record Information Processing For Printing (AREA)
- Printing Methods (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2008/080535 WO2010047686A1 (en) | 2008-10-20 | 2008-10-20 | Enhanced security printing of a layout template |
US13/125,280 US8614836B2 (en) | 2008-10-20 | 2008-10-20 | Enhanced security printing of a layout template |
EP08877610.9A EP2361184A4 (en) | 2008-10-20 | 2008-10-20 | Enhanced security printing of a layout template |
CN200880132418.0A CN102256796B (en) | 2008-10-20 | 2008-10-20 | Method for enhanced security printing of a layout template and products as security printing object |
GB1108106.4A GB2477066B (en) | 2008-10-20 | 2008-10-20 | Enhanced security printing of a layout template |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2008/080535 WO2010047686A1 (en) | 2008-10-20 | 2008-10-20 | Enhanced security printing of a layout template |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010047686A1 true WO2010047686A1 (en) | 2010-04-29 |
Family
ID=42119545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/080535 WO2010047686A1 (en) | 2008-10-20 | 2008-10-20 | Enhanced security printing of a layout template |
Country Status (5)
Country | Link |
---|---|
US (1) | US8614836B2 (en) |
EP (1) | EP2361184A4 (en) |
CN (1) | CN102256796B (en) |
GB (1) | GB2477066B (en) |
WO (1) | WO2010047686A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013191916A1 (en) * | 2012-06-19 | 2013-12-27 | The Procter & Gamble Company | Consumer products packaging and methods for producing packaging |
WO2016202471A1 (en) * | 2015-06-19 | 2016-12-22 | Stevanato Group International A. S. | Methods and systems for linking specific information to individual product units |
CN108027916A (en) * | 2015-06-19 | 2018-05-11 | 斯泰瓦纳托集团股份有限公司 | For customizing messages to be linked to the method and system of each product unit |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10007794B2 (en) | 2013-12-16 | 2018-06-26 | Ctpg Operating, Llc | Methods and systems for ensuring printer looses ability to print security patterns if disconnected from approved system |
US9928561B2 (en) | 2015-05-29 | 2018-03-27 | Digimarc Corporation | Serialized digital watermarking for variable data printing |
US20180307447A1 (en) * | 2017-04-24 | 2018-10-25 | Just One Label, Llc | Data-dependent label transformation system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080099565A1 (en) * | 2006-10-31 | 2008-05-01 | Simske Steven J | Package security having a static element and a dynamic element |
US20080159588A1 (en) * | 1993-11-18 | 2008-07-03 | Rhoads Geoffrey B | Methods for marking images |
US20080181451A1 (en) * | 2007-01-30 | 2008-07-31 | Simske Steven J | Authentication system and method |
US20080181447A1 (en) * | 2007-01-25 | 2008-07-31 | Hewlett-Packard Development Company, L.P. | Method of and System for Authenticating An Item |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4782221A (en) * | 1985-04-01 | 1988-11-01 | Cauzin Systems, Incorporated | Printed data strip including bit-encoded information and scanner control |
US6919967B1 (en) * | 1999-11-18 | 2005-07-19 | Hewlett-Packard Development Company, L.P. | Printing performance enhancements for variable data publishing |
US6817539B2 (en) * | 2000-06-30 | 2004-11-16 | Silverbrook Research Pty Ltd | Generating landscape and portrait oriented tags |
DE60230445D1 (en) * | 2001-12-20 | 2009-01-29 | Seiko Epson Corp | RECORDING MATERIAL WITH FAKE PROTECTION |
EP1579622B1 (en) | 2002-11-28 | 2017-12-20 | Digimarc Corporation | Systems and methods for authentication of print media |
JP4165435B2 (en) * | 2004-04-13 | 2008-10-15 | 富士ゼロックス株式会社 | Image forming apparatus and program |
JP4332477B2 (en) * | 2004-08-06 | 2009-09-16 | キヤノン株式会社 | Layout adjusting method, apparatus and program |
US7455013B2 (en) * | 2005-03-08 | 2008-11-25 | Hewlett-Packard Development Company, L.P. | Secure printing method to thwart counterfeiting |
US8325969B2 (en) * | 2006-04-28 | 2012-12-04 | Hewlett-Packard Development Company, L.P. | Methods for making an authenticating system |
CN101146168A (en) | 2006-06-30 | 2008-03-19 | 株式会社理光 | Image processing apparatus and image processing method |
-
2008
- 2008-10-20 WO PCT/US2008/080535 patent/WO2010047686A1/en active Application Filing
- 2008-10-20 EP EP08877610.9A patent/EP2361184A4/en not_active Withdrawn
- 2008-10-20 GB GB1108106.4A patent/GB2477066B/en not_active Expired - Fee Related
- 2008-10-20 US US13/125,280 patent/US8614836B2/en active Active
- 2008-10-20 CN CN200880132418.0A patent/CN102256796B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080159588A1 (en) * | 1993-11-18 | 2008-07-03 | Rhoads Geoffrey B | Methods for marking images |
US20080099565A1 (en) * | 2006-10-31 | 2008-05-01 | Simske Steven J | Package security having a static element and a dynamic element |
US20080181447A1 (en) * | 2007-01-25 | 2008-07-31 | Hewlett-Packard Development Company, L.P. | Method of and System for Authenticating An Item |
US20080181451A1 (en) * | 2007-01-30 | 2008-07-31 | Simske Steven J | Authentication system and method |
Non-Patent Citations (1)
Title |
---|
See also references of EP2361184A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013191916A1 (en) * | 2012-06-19 | 2013-12-27 | The Procter & Gamble Company | Consumer products packaging and methods for producing packaging |
WO2016202471A1 (en) * | 2015-06-19 | 2016-12-22 | Stevanato Group International A. S. | Methods and systems for linking specific information to individual product units |
CN108027916A (en) * | 2015-06-19 | 2018-05-11 | 斯泰瓦纳托集团股份有限公司 | For customizing messages to be linked to the method and system of each product unit |
Also Published As
Publication number | Publication date |
---|---|
GB201108106D0 (en) | 2011-06-29 |
GB2477066A (en) | 2011-07-20 |
EP2361184A4 (en) | 2016-11-09 |
CN102256796A (en) | 2011-11-23 |
GB2477066B (en) | 2013-01-23 |
CN102256796B (en) | 2014-04-30 |
EP2361184A1 (en) | 2011-08-31 |
US8614836B2 (en) | 2013-12-24 |
US20110194152A1 (en) | 2011-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8056821B2 (en) | Security marks simulating natural defects for embedding information in documents | |
AU2004303346B2 (en) | System and method for authenticating an article | |
US8614836B2 (en) | Enhanced security printing of a layout template | |
US20100027851A1 (en) | Apparatus, method and process for the stochastic marking and tracking of printed products | |
US8090952B2 (en) | Counterfeit prevention system based on random positioning on a pattern | |
US7840028B2 (en) | Authentication system and method | |
JP2002190947A (en) | Printing method for preventing document forgery | |
CN103761656B (en) | Printing inspecting method and device of commodity information | |
US8325969B2 (en) | Methods for making an authenticating system | |
CN102285266A (en) | Document authentication enhancement processes | |
US20100188709A1 (en) | Variable data addition method and system | |
EP1861832B1 (en) | A secure printing method to thwart counterfeiting | |
US20110068181A1 (en) | Multi-modal Security Deterrents And Methods For Generating The Same | |
KR101287811B1 (en) | Hierarchical miniature security marks | |
JP2006018525A (en) | Method and apparatus for forming tag, the tag and article management system | |
WO2010047719A1 (en) | Security campaign and method of creating the same | |
JP2010167571A (en) | Printer, method for printing watermark by printer, and program for printing watermark | |
Weymans | A license to print: security printing | |
BAOSHI | Digital rights management for electronic documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880132418.0 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08877610 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13125280 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3192/CHENP/2011 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008877610 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 1108106 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20081020 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1108106.4 Country of ref document: GB |