WO2016057550A1 - System for producing secure documents containing secure bordering - Google Patents
System for producing secure documents containing secure bordering Download PDFInfo
- Publication number
- WO2016057550A1 WO2016057550A1 PCT/US2015/054289 US2015054289W WO2016057550A1 WO 2016057550 A1 WO2016057550 A1 WO 2016057550A1 US 2015054289 W US2015054289 W US 2015054289W WO 2016057550 A1 WO2016057550 A1 WO 2016057550A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ultraviolet
- secure
- text
- image
- print object
- Prior art date
Links
- 238000007639 printing Methods 0.000 claims description 87
- 238000013461 design Methods 0.000 claims description 23
- 238000000034 method Methods 0.000 claims description 16
- 238000012545 processing Methods 0.000 claims description 14
- 239000000758 substrate Substances 0.000 claims description 10
- 239000000945 filler Substances 0.000 claims description 6
- 230000004044 response Effects 0.000 claims description 3
- 230000004075 alteration Effects 0.000 abstract description 6
- 230000015654 memory Effects 0.000 description 21
- 239000000976 ink Substances 0.000 description 15
- 238000010586 diagram Methods 0.000 description 4
- 238000007645 offset printing Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000003384 imaging method Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 238000007641 inkjet printing Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000007651 thermal printing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/378—Special inks
- B42D25/387—Special inks absorbing or reflecting ultraviolet light
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/48—Controlling the manufacturing process
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M3/00—Printing processes to produce particular kinds of printed work, e.g. patterns
- B41M3/14—Security printing
- B41M3/144—Security printing using fluorescent, luminescent or iridescent effects
Definitions
- the present invention generally relates to secure documents and systems and methods for producing secure documents.
- the present invention relates to systems and methods for generating documents having an image and an ultraviolet component of the image.
- a document titled "Ultraviolet Technology: Q&A with Digital Check” discloses that a check can have a border that is filled with a pattern.
- the border and pattern can enclose an area in which the value of the check is to be written.
- checks are printed using offset printing which is only available to a handful of users and is a relatively expensive process. Furthermore, this offset printing of the border and pattern is not easily customizable to different situations.
- the present invention provides a secure document that protects against forgeries and alterations.
- the secure document includes a visible portion that includes one or more images and/or text.
- the visible portion can be viewed under normal lighting, such as in an office building having fluorescent lighting, or in sunlight.
- the secure document also includes an ultraviolet security feature that appears colorless under normal lighting and fluoresces when exposed to ultraviolet light.
- the ultraviolet security feature may correspond to the visible portion, in shape, size or the like and can include an outline of each image/character of the visible portion, a shadow of the visible portion and/or a border around some or all of the images/text that may also be filled with an ultraviolet pattern.
- the secure document can be created using a system, such as a printing terminal, that includes an input device, a processor and an output port.
- the input device receives input from a user that corresponds to the visible portion.
- the input may include, for example, text from a keyboard, an image from a scanner, or the like.
- the processor performs functions corresponding to a secure image design application, for example, receiving the text or image and receiving a request that the ultraviolet security feature be incorporated.
- the processor then generates a print object that corresponds to the visible portion or an ultraviolet security feature.
- the print object may be a file or other data capable of being interpreted by a printer.
- the output port transmits the print object to a security printer that uses ultraviolet ink or toner for printing the secure document.
- a system for printing secure documents may include a printing terminal as well as a security printing server.
- the printing terminal creates and transmits the visible portion of the print object to the security printing server.
- the security printing server includes an input port for receiving the print object from the printing terminal.
- the security printing server also includes a security printing processor that receives the print object, creates the ultraviolet security feature, based on features of the visible portion, and generates a new print object having the visible portion and the ultraviolet security feature.
- the security printing server includes an output port for transmitting the new print object to a security printer for printing.
- the secure document may be generated by one or more processors performing the method of the invention.
- the processor first receives an image or text, corresponding to a visible portion, from an input device.
- the processor generates a print object having the visible portion and an ultraviolet security feature. After generating the print object, the processor transmits the print object to a security printer.
- FIG. 1A is an illustration of a secure document having visible text and an ultraviolet secure outline as seen under normal lighting, according to an embodiment of the present invention
- FIG. IB is an illustration of the secure document of Fig. 1A as seen under ultraviolet lighting;
- FIG. 2A is an illustration of a secure document having visible text and an ultraviolet secure shadow as seen under normal lighting, according to an embodiment of the present invention
- FIG. 2B is an illustration showing the secure document of Fig. 2A as seen under ultraviolet lighting
- Fig. 3 A is an illustration showing a secure document having visible text and an ultraviolet secure border as seen under normal lighting, according to an embodiment of the present invention
- FIG. 3B is an illustration showing the secure document of Fig. 3A as seen under ultraviolet lighting;
- FIG. 4 is a block diagram of a system for printing a secure document having an ultraviolet security feature, according to an embodiment of the present invention
- FIG. 5 is a block diagram of a printing terminal capable of creating a secure document having an ultraviolet security feature, according to an embodiment of the present invention
- FIG. 6 is a block diagram showing features of a security printing server capable of adding an ultraviolet security feature to a print object, according to an embodiment of the present invention
- Fig. 7 is a block diagram showing features of a security printer capable of adding an ultraviolet security feature to a print object and for printing a secure document having an ultraviolet security feature, according to an embodiment of the present invention
- Fig. 8 is a flowchart illustrating a method for printing a secure document having an ultraviolet security feature, according to an embodiment of the present invention.
- a secure document 100 may include visible text 102 and an ultraviolet outline 104 of the visible text 102.
- the visible text 102 is printed using an ink or toner that is visible under normal lighting, as shown in Fig. 1A.
- the ultraviolet outline 104 is printed using an ultraviolet security toner such as a toner disclosed in Heilman et al, U.S. Patent Application No. 14/857,389.
- the ultraviolet security toner is colorless when exposed to normal light, as seen in Fig. 1A, and luminesces when exposed to ultraviolet light, as seen in Fig. IB.
- the ultraviolet outline 104 is shown as directly adjacent to the visible text 102. However, one skilled in the art will realize that features of the ultraviolet outline 104, such as distance between the ultraviolet outline 104 and the visible text 102, or line thickness of the ultraviolet outline 104, can vary without departing from the scope of the invention.
- Forgeries of the secure document 100 are relatively difficult to create due to the ultraviolet outline 104. This is because computers and word or image processing machines are not normally designed to create an outline of text. Furthermore, besides printers not being designed to print outlines of the visible text, they are not designed to print outlines using ultraviolet security toner. An attempted forgery or a secure document 100 can be quickly identified if the document image does not have an ultraviolet outline.
- an altered document is easily identified because the ultraviolet outline will not be aligned with or outline the newly-added visible text or image.
- the ultraviolet outline 104 reduces the risk of both forgery and alteration of the secure document 100.
- a secure document 200 may include visible text 202 and an ultraviolet shadow 204 of the visible text 202.
- the visible text 202 is printed using an ink or toner that is visible under normal lighting, as shown in Fig. 2A.
- the ultraviolet shadow 204 is printed using an ultraviolet security toner.
- the ultraviolet security toner is colorless when exposed to normal light, as shown in Fig. 2A, and will luminesce when exposed to ultraviolet light as shown in Fig. 2B.
- the ultraviolet shadow 204 shown in Fig. 2B is positioned downward and to the right of the visible text 202.
- certain features of an ultraviolet secure shadow such as line thickness, distance from visible text, or direction relative to visible text, can be altered without departing from the scope of the invention.
- the secure document 200 will protect against forgeries and alterations, in the same manner as the secure document 100 of Figs. 1A and IB.
- a secure document 300 may include visible text 302 and an ultraviolet border 304 of the visible text 302.
- the visible text 302 is printed using an ink or toner that is visible under normal lighting, as shown in Fig. 3A.
- the ultraviolet secure border 304 is printed using an ultraviolet security toner.
- the ultraviolet security toner is colorless when exposed to normal light, as seen in Fig. 3A, and luminesces when exposed to ultraviolet light, as seen in Fig. 3B.
- the ultraviolet secure border 304 may also include ultraviolet filler 306 positioned within the area defined by the ultraviolet border 304.
- the ultraviolet filler 306 may include a repeating pattern, repeating text, one or more images, a solid color, or the like.
- the ultraviolet secure border 304 is shown as being rectangular, being positioned near the visible text 302 and surrounding all of the visible text.
- an ultraviolet secure border such as shape, distance from visible text, portion of the visible text covered, or the like, can vary without departing from the scope of the invention.
- the ultraviolet secure border 304 protects against forgeries in the same manner as the secure document 100 of Figs. 1A and IB. Furthermore, the ultraviolet border 304 will appear smeared, smudged or otherwise altered after attempts have been made to remove or edit the visible text 302. For example, when an altered document is viewed under ultraviolet light, ultraviolet filling and/or an ultraviolet secure border near where edits are made will not match the ultraviolet filling and/or the ultraviolet secure border within the unedited portions of the document. This distortion of an original ultraviolet secure border indicates that the document has been altered.
- each of the ultraviolet outline 104, the ultraviolet secure shadow 204 and the ultraviolet secure border 304 may be referred to as an ultraviolet security feature.
- a system 400 for printing a document having an ultraviolet security feature may include a printing terminal 402, a security printing server 404 and a security printer 406.
- Other systems for printing a secure document may include some or all of the components shown in Fig. 4 and/or may include alternative or additional components without departing from the scope of the invention.
- Figs. 5, 6 and 7 show exemplary components of the printing terminal 402, the security printing server 404 and the security printer 406.
- Other printing terminals, printing servers and security printers may include some or all of the components shown in Figs. 5, 6 and 7 and/or may include alternative or additional components without departing from the scope of the invention.
- the printing terminal 402 may include an input device 500, such as a keyboard, a mouse, a joystick, a microphone, a scanner, or the like.
- the input device 500 can receive input such as text (i.e., the input device 500 could be a keyboard or microphone) or an image (i.e., the input device 500 could be a scanner or a mouse selecting an already- stored image).
- the printing terminal 402 may also include a processor 502.
- the processor 502 may include one or more processors and one or more tangible, non-transitory memories and be capable of implementing logic.
- the processor can be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- the memory 504 may be a non-transitory memory capable of storing data.
- the memory 504 may or may not be separate from the memory of the processor 502.
- the memory 216 may store instructions to be executed by the processor 502.
- the memory 504 may include instructions for performing ultraviolet image outlining 518, instructions for performing ultraviolet image shadowing 520 and/or instructions for performing ultraviolet image bordering 522.
- the processor 502 includes a word or image processing application (word processing application) 508, such as VisioTM or Word, each available from Microsoft Corporation of Redmond, WA.
- word processing application 508 can create a document having text and/or images based on input received from the input device 500.
- the word processing application 508 may utilize an ultraviolet security font 509 that includes ultraviolet security features.
- a font can include the visible text 102 and the ultraviolet secure outline 104 of Figs. 1A and IB, or the visible text 202 and the ultraviolet secure shadow 204 of Figs. 2A and 2B.
- the visible text and the ultraviolet security feature are generated concurrently by the word processing application 508.
- the printing terminal 402 may also include a secure image design application 518.
- the secure image design application 518 includes various functions.
- the secure image design application 518 includes features similar to the word processing application 508 and can create a document or documents including images and/or text.
- the secure image design application 518 may also, or instead, receive a document from the word processing application 508.
- the secure image design application 18 may also be used to add an ultraviolet security feature to the images and/or text.
- the secure image design application 518 can automatically add the feature to the visible image/text as it is received and/or in response to a request from a user. For example, a user can provide an input indicating that an ultraviolet shadow is desired for all text of a document. The secure image design application 518 will then apply the ultraviolet secure shadow to all text of the document.
- a user may select properties of the ultraviolet security feature, such as thickness of an ultraviolet outline, thickness and direction of an ultraviolet secure shadow, filler for an ultraviolet security border, or the like.
- the secure image design application 518 may also allow customization of the ultraviolet security feature(s). For example, a user can create a document using the secure image design application 518 or the word processing application 508 and then can apply an ultraviolet security feature. As described above, the user may select the properties of the ultraviolet security feature, such as a thickness or filler, and also select where the feature is to be applied. For example, the feature may only be applied to some text, or a portion of an image, or an ultraviolet secure border may be applied to cover a particular area of the document and not other areas. In other embodiments, the user may select to have multiple ultraviolet features, such as an ultraviolet shadow corresponding to all of the text, and an ultraviolet border enclosing all of the text of the document.
- properties of the ultraviolet security feature such as a thickness or filler
- a user may use the word processing application 508 and the secure image design application 518 to generate a secure document. For example, a user may create a document, such as a prescription, using the word processing application 508. The user may then open the document within the secure image design application and request that all of the text of the document includes an ultraviolet outline. The secure image design application 518 may then apply the ultraviolet outline to all of the text.
- the secure image design application 518 can intercept a document and apply the ultraviolet security feature.
- the processor 502 can include one or more logical printers 510 including a standard logical printer 512 and an ultraviolet logical printer 514.
- the standard logical printer 512 corresponds to a traditional printer that prints using only visible ink or toner
- the ultraviolet logical printer 514 corresponds to a printer that prints using both visible ink or toner and ultraviolet ink or toner.
- the user may then select to print the document using the ultraviolet logical printer 514 from a printers list.
- the ultraviolet logical printer 514 can transfer the document to the secure image design application 518.
- the secure image design application 518 will then add the ultraviolet security feature to the document.
- the ultraviolet logical printer 514 will, instead, include a print object editing sub- application 516 that automatically inserts the ultraviolet security feature.
- the secure image design application 518 or the print object editing sub-application 516 can either edit the original document or create a new document that includes the visible text and the ultraviolet security feature.
- the document may now be referred to as an ultraviolet print object 408.
- An ultraviolet print object has both visible text and an ultraviolet security feature and can be accepted by a physical printer for printing.
- the ultraviolet print object 408 includes visible text 410 and an ultraviolet security border 412.
- the printing terminal 402 may also include an output port 506 coupled to the processor 502.
- the output port 506 may include any type of output port capable of transmitting data, such as a print object or a document, to another device.
- the output port 506 Upon receipt of the ultraviolet print object 408 from the processor 502, the output port 506 transmits the ultraviolet print object 408 to a security printer 406 capable of printing in both ultraviolet and visible inks or toners.
- the security printer 406 then receives the ultraviolet print object 408 and prints the ultraviolet print object 408 onto a substrate.
- the visible ink or toner and the ultraviolet ink or toner may be printed on a substrate concurrently by the security printer 406.
- the substrate can receive the visible ink or toner and the ultraviolet ink or toner during a single pass of the substrate through the security printer 406.
- a user can create a document using the word processing application 508 and, upon desiring inclusion of an ultraviolet security feature, can select the ultraviolet logical printer 514 for printing the document.
- the document, without the ultraviolet security feature can then be output via the output port 506 as a print object 414.
- the print object 414 having only visible text 416, is readable by a printer and/or by another device.
- the print object 414 may then be received by the security printing server 404, which can add an ultraviolet security feature to the visible image or text.
- the security printing server 404 can add an ultraviolet security feature to the visible image or text.
- a user can select to print using the ultraviolet logical printer 514 and the print object 414 can be intercepted by the security printing server 404.
- the security printing server 404 may include an input port 600 that receives the print object 414 from the printing terminal 402.
- the print object 414 will be referred to as an inputted print object 414 after being received by the input port 600.
- the input port 600 may include any type of input port capable of receiving data, such as a print object or a document, from another device.
- the security printing server 404 may also include a security printing processor 602.
- the security printing processor 602 may include one or more processors and one or more tangible, non-transitory memories and be capable of implementing logic.
- the security printing processor 602 may be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- the memory 604 may be a non-transitory memory capable of storing data.
- the memory 604 may or may not be separate from the memory of the security printing processor 602.
- the memory 604 may store instructions to be executed by the security printing processor 602.
- the memory 604 may include instructions for performing ultraviolet image outlining 610, instructions for performing ultraviolet image shadowing 614 and/or instructions for performing ultraviolet image bordering 612.
- the security printing processor 602 may include a print object editing sub-application 608 having similar features as the print object editing sub-application 516 of the processor 502 of Fig. 5.
- the input port 600 will receive the print object 414, having only the visible text 416, from the printing terminal 402.
- the security printing processor 602 may receive the print object 414 via the input port 600.
- the print object editing sub- application 608 will add an ultraviolet security feature to the print object 414 and in some embodiments it will create a new ultraviolet print object 418 having both the visible text 420 and the ultraviolet security feature 422.
- the security printing server 404 may also include an output port 606 coupled to the security printing processor 602.
- the output port 606 may include any type of output port capable of transmitting data, such as a print object or a document, to another device.
- the output port 606 Upon receipt of the ultraviolet print object 418 from the security printing processor 602, the output port 606 will transmit the ultraviolet print object 418 to the security printer 406 to be printed.
- the system may not include the security printing server 404, and the print object 414 having only the visible text 416 will be received by the security printer 406.
- the security printer 406 may be any type of printer that is used in any of a variety of printing technologies.
- the security printer 406 may be associated with ionographic printing, magnetographic printing, electrophotographic printing, inkjet printing, thermal printing, offset printing, 3-dimensional (3D) printing, or other imaging techniques.
- the security printer 406 may include an input port 700 that receives the print object 414 from the printing terminal 402.
- the input port 700 may include any type of input port capable of receiving data, such as a print object or a document, from another device.
- the security printer 406 can also include a security printer processor 702.
- the security printer processor 702 may include one or more processors and one or more tangible, non-transitory memories and be capable of implementing logic.
- the security printer processor 702 may be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- the memory 704 may be a non-transitory memory capable of storing data.
- the memory 704 may or may not be separate from the memory of the security printer processor 702.
- the memory 704 may store instructions to be executed by the security printer processor 702.
- the memory 704 may include instructions for performing ultraviolet image outlining 710, instructions for performing ultraviolet image shadowing 714 and/or instructions for performing ultraviolet image bordering 712.
- the security printer processor 702 may include a print object editing sub-application 708 having similar features as the print object editing sub-application 516 of the processor 502 of Fig. 5.
- the input port 700 will receive the print object 414 having only the visible text 416 from the printing terminal 402.
- the print object editing sub-application 708 may receive the print object 414 from the input port 700.
- the print object editing sub- application 708 will add an ultraviolet security feature to the print object 414 and in some embodiments it will create a new print object having visible text and an ultraviolet security feature.
- the security printer 406 may also include security printing hardware 716.
- the security printing hardware 716 may receive a print object and print the feature of the print object (i.e., images and/or text) onto a substrate using both visible ink or toner and ultraviolet ink or toner. In that regard, upon receipt of the ultraviolet print object 408 or 418 at the input port 700, the ultraviolet print object 408 or 418 will be transferred to the security printing hardware 716. The security printing hardware 716 then prints the secure document onto a substrate.
- the security printer processor 702 may transmit the print object to the security printing hardware 716 where it is printed onto a substrate.
- a user may interface with the security printing processor 602 and/or the security printer processor 702 to select desired properties of the ultraviolet security feature. For example, the user can select a line thickness or a distance between visible text and an ultraviolet secure shadow. The security printing processor 602 and/or the security printer processor 702 will automatically add the ultraviolet secure shadow having the desired line thickness and distance.
- a method 800 for printing a document having an ultraviolet security feature is shown.
- the method 800 may be performed by a security printing server (such as the security printing server 404), a security printer (such as the security printer 406) or any other similar device.
- at least some of the method 800 may be performed by a printing terminal (such as the printing terminal 402).
- the method 800 may be performed by a processor such as the processor 502, the security printing processor 602 or the security printer processor 702 of Figs. 5, 6 and 7, respectively.
- the method 800 begins at block 802 where a print object is received.
- the print object includes visible text, but does not include at least one desired ultraviolet security feature.
- an application or sub-application of a processor can receive a print object or document created using a word processing application.
- the processor determines whether to add an ultraviolet outline, an ultraviolet shadow and/or an ultraviolet border to text or an image of the print object. In some embodiments, this decision may be made by a user and provided to the processor via an input device. In other embodiments, the processor may determine which ultraviolet security feature to add, based on a programmed set of rules.
- the processor determines properties of the ultraviolet security feature based on properties of the text or image.
- the property can include a size, area and/or shape based on properties of the visible image/text.
- the properties of the ultraviolet security feature relative to the visible image/text may be based on a programmed set of rules or may be selected by a user. For example, a user may select a desired line thickness or a fill pattern of an ultraviolet security border.
- the processor may determine where on the print object to add the ultraviolet security feature. This may be selected by a user or may be determined automatically by the processor. For example, a user can select an area to be enclosed within an ultraviolet secure border using a secure image design application or the processor can position an ultraviolet secure border around each image or block of text or around the entire area having images/text based on input or known rules.
- the processor adds the ultraviolet security feature to the print object based on the properties of the ultraviolet security feature determined in block 806 and the areas/locations determined in block 808.
- blocks 802-810 the print object having the visible image/text and the ultraviolet security feature is transmitted to a security printer for printing.
- blocks 802-810 may be performed by a security printer processor of a security printer, in which case the print object is transmitted directly to security printing hardware.
Landscapes
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
A secure document that protects against forgeries and alterations includes a visible portion that includes one or more images and/or text. The visible portion can be viewed under normal lighting, such as in an office building having fluorescent lighting, or in sunlight. The secure document also includes an ultraviolet security feature that corresponds to the visible portion. The ultraviolet security feature appears colorless under normal lighting and fluoresces when exposed to ultraviolet light. The ultraviolet security feature may include an outline of each image/character of the visible portion, a shadow of the visible portion and/or a border around some or all of the images/text that may also be filled with an ultraviolet pattern.
Description
SYSTEM FOR PRODUCING SECURE DOCUMENTS CONTAINING
SECURE BORDERING
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. provisional patent application serial number 62/060,314 filed on October 6, 2014 and titled "System For Producing Secure Documents Containing Secure Bordering" which is incorporated in this application as if fully set forth herein.
BACKGROUND OF THE INVENTION
1. Field of the Invention.
[0002] The present invention generally relates to secure documents and systems and methods for producing secure documents. In particular, the present invention relates to systems and methods for generating documents having an image and an ultraviolet component of the image.
2. Description of Related Art.
[0003] Forgeries and alterations of important or valuable documents appear to be relatively common. Security features, such as intricate patterns, new substrates, holographic images or the like, have been used in documents in order to combat these deceptive and lucrative practices. Unfortunately, new methods of forging and altering valuable documents continue to appear. Thus, new and improved document security features are needed.
[0004] The present inventors have previously developed an ultraviolet toner that can be used for document security. The toner is disclosed in Heilman et al. (United States Patent Application No. 14/857,389, titled "Colorless Ultraviolet Security Toner") which is incorporated in this application as if fully set forth herein. After developing the ultraviolet toner, the inventors conducted research and experiments to find the most effective uses of the ultraviolet toner in document security.
[0005] A document titled "Ultraviolet Technology: Q&A with Digital Check" (available at http://www.banking.com/2014/10/22/ultraviolet- technology-qa-with-digital-check/) discloses that a check can have a border that is filled with a pattern. For example, the border and pattern can enclose an area in which the value of the check is to be written. However, checks are printed using offset printing which is only available to a handful of users and is a relatively expensive process. Furthermore, this offset printing of the border and pattern is not easily customizable to different situations.
[0006] Due to the increasing use of personal computers and personal and corporate printing solutions, many organizations and individuals now print their own secure documents. For example, many doctors and hospitals now print prescriptions using a personal computer and printer. Preprinted documents having secure bordering are not desirable for these groups
because of the relatively high cost of offset printing and the lack of ability to customize the features.
[0007] For the foregoing reasons, improved systems and methods for printing customized secure documents using ultraviolet toner or ink are required.
SUMMARY OF THE INVENTION
[0008] The present invention provides a secure document that protects against forgeries and alterations. The secure document includes a visible portion that includes one or more images and/or text. The visible portion can be viewed under normal lighting, such as in an office building having fluorescent lighting, or in sunlight. The secure document also includes an ultraviolet security feature that appears colorless under normal lighting and fluoresces when exposed to ultraviolet light. The ultraviolet security feature may correspond to the visible portion, in shape, size or the like and can include an outline of each image/character of the visible portion, a shadow of the visible portion and/or a border around some or all of the images/text that may also be filled with an ultraviolet pattern.
[0009] According to the invention, the secure document can be created using a system, such as a printing terminal, that includes an input device, a processor and an output port. The input device receives input from a
user that corresponds to the visible portion. The input may include, for example, text from a keyboard, an image from a scanner, or the like. The processor performs functions corresponding to a secure image design application, for example, receiving the text or image and receiving a request that the ultraviolet security feature be incorporated. The processor then generates a print object that corresponds to the visible portion or an ultraviolet security feature. The print object may be a file or other data capable of being interpreted by a printer. Upon creation of the print object, the output port transmits the print object to a security printer that uses ultraviolet ink or toner for printing the secure document.
[0010] In a preferred embodiment, a system for printing secure documents may include a printing terminal as well as a security printing server. The printing terminal creates and transmits the visible portion of the print object to the security printing server. The security printing server includes an input port for receiving the print object from the printing terminal. The security printing server also includes a security printing processor that receives the print object, creates the ultraviolet security feature, based on features of the visible portion, and generates a new print object having the visible portion and the ultraviolet security feature. The security printing server includes an output port for transmitting the new print object to a security printer for printing.
[0011] The secure document may be generated by one or more processors performing the method of the invention. The processor first receives an image or text, corresponding to a visible portion, from an input device. The processor generates a print object having the visible portion and an ultraviolet security feature. After generating the print object, the processor transmits the print object to a security printer.
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] A more complete understanding of the present invention will become freely apparent by referring to the detailed description of the attached drawings which illustrate a preferred embodiment and wherein:
[0013] Fig. 1A is an illustration of a secure document having visible text and an ultraviolet secure outline as seen under normal lighting, according to an embodiment of the present invention;
[0014] Fig. IB is an illustration of the secure document of Fig. 1A as seen under ultraviolet lighting;
[0015] Fig. 2A is an illustration of a secure document having visible text and an ultraviolet secure shadow as seen under normal lighting, according to an embodiment of the present invention;
[0016] Fig. 2B is an illustration showing the secure document of Fig. 2A as seen under ultraviolet lighting;
[0017] Fig. 3 A is an illustration showing a secure document having visible text and an ultraviolet secure border as seen under normal lighting, according to an embodiment of the present invention;
[0018] Fig. 3B is an illustration showing the secure document of Fig. 3A as seen under ultraviolet lighting;
[0019] Fig. 4 is a block diagram of a system for printing a secure document having an ultraviolet security feature, according to an embodiment of the present invention;
[0020] Fig. 5 is a block diagram of a printing terminal capable of creating a secure document having an ultraviolet security feature, according to an embodiment of the present invention;
[0021] Fig. 6 is a block diagram showing features of a security printing server capable of adding an ultraviolet security feature to a print object, according to an embodiment of the present invention;
[0022] Fig. 7 is a block diagram showing features of a security printer capable of adding an ultraviolet security feature to a print object and for printing a secure document having an ultraviolet security feature, according to an embodiment of the present invention; and
[0023] Fig. 8 is a flowchart illustrating a method for printing a secure document having an ultraviolet security feature, according to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0024] The inventors have designed, and the present invention includes, a number of preferred embodiments for the security feature that can be added to documents for protecting against forgeries and alterations. For example, referring to Figs. 1A and IB, a secure document 100 may include visible text 102 and an ultraviolet outline 104 of the visible text 102. The visible text 102 is printed using an ink or toner that is visible under normal lighting, as shown in Fig. 1A. The ultraviolet outline 104 is printed using an ultraviolet security toner such as a toner disclosed in Heilman et al, U.S. Patent Application No. 14/857,389. The ultraviolet security toner is colorless when exposed to normal light, as seen in Fig. 1A, and luminesces when exposed to ultraviolet light, as seen in Fig. IB.
[0025] The ultraviolet outline 104 is shown as directly adjacent to the visible text 102. However, one skilled in the art will realize that features of the ultraviolet outline 104, such as distance between the ultraviolet outline 104 and the visible text 102, or line thickness of the ultraviolet outline 104, can vary without departing from the scope of the invention.
[0026] Forgeries of the secure document 100 are relatively difficult to create due to the ultraviolet outline 104. This is because computers and word or image processing machines are not normally designed to create an outline of text. Furthermore, besides printers not being designed to print outlines of the visible text, they are not designed to print outlines using ultraviolet security toner. An attempted forgery or a secure document 100 can be quickly identified if the document image does not have an ultraviolet outline.
[0027] Likewise, an altered document is easily identified because the ultraviolet outline will not be aligned with or outline the newly-added visible text or image. The ultraviolet outline 104 reduces the risk of both forgery and alteration of the secure document 100.
[0028] Referring now to Figs. 2A and 2B, another embodiment of a secure document 200 may include visible text 202 and an ultraviolet shadow 204 of the visible text 202. The visible text 202 is printed using an ink or toner that is visible under normal lighting, as shown in Fig. 2A. The ultraviolet shadow 204 is printed using an ultraviolet security toner. The ultraviolet security toner is colorless when exposed to normal light, as shown in Fig. 2A, and will luminesce when exposed to ultraviolet light as shown in Fig. 2B.
[0029] The ultraviolet shadow 204 shown in Fig. 2B is positioned downward and to the right of the visible text 202. However, one skilled in the
art will realize that certain features of an ultraviolet secure shadow, such as line thickness, distance from visible text, or direction relative to visible text, can be altered without departing from the scope of the invention. The secure document 200 will protect against forgeries and alterations, in the same manner as the secure document 100 of Figs. 1A and IB.
[0030] Referring now to Figs. 3A and 3B, another embodiment of a secure document 300 may include visible text 302 and an ultraviolet border 304 of the visible text 302. The visible text 302 is printed using an ink or toner that is visible under normal lighting, as shown in Fig. 3A. The ultraviolet secure border 304 is printed using an ultraviolet security toner. The ultraviolet security toner is colorless when exposed to normal light, as seen in Fig. 3A, and luminesces when exposed to ultraviolet light, as seen in Fig. 3B.
[0031] The ultraviolet secure border 304 may also include ultraviolet filler 306 positioned within the area defined by the ultraviolet border 304. The ultraviolet filler 306 may include a repeating pattern, repeating text, one or more images, a solid color, or the like.
[0032] The ultraviolet secure border 304 is shown as being rectangular, being positioned near the visible text 302 and surrounding all of the visible text. One skilled in the art will realize that certain features of an ultraviolet secure border, such as shape, distance from visible text, portion of
the visible text covered, or the like, can vary without departing from the scope of the invention.
[0033] The ultraviolet secure border 304 protects against forgeries in the same manner as the secure document 100 of Figs. 1A and IB. Furthermore, the ultraviolet border 304 will appear smeared, smudged or otherwise altered after attempts have been made to remove or edit the visible text 302. For example, when an altered document is viewed under ultraviolet light, ultraviolet filling and/or an ultraviolet secure border near where edits are made will not match the ultraviolet filling and/or the ultraviolet secure border within the unedited portions of the document. This distortion of an original ultraviolet secure border indicates that the document has been altered.
[0034] With reference to Figs. 1A through 3B, each of the ultraviolet outline 104, the ultraviolet secure shadow 204 and the ultraviolet secure border 304 (with or without the ultraviolet filler 306) may be referred to as an ultraviolet security feature.
[0035] Turning now to Fig. 4, a system 400 for printing a document having an ultraviolet security feature (ultraviolet secure document, secure document) may include a printing terminal 402, a security printing server 404 and a security printer 406. Other systems for printing a secure document may include some or all of the components shown in Fig. 4 and/or may include
alternative or additional components without departing from the scope of the invention.
[0036] Figs. 5, 6 and 7 show exemplary components of the printing terminal 402, the security printing server 404 and the security printer 406. Other printing terminals, printing servers and security printers may include some or all of the components shown in Figs. 5, 6 and 7 and/or may include alternative or additional components without departing from the scope of the invention.
[0037] Referring now to Figs. 4 and 5, the printing terminal 402 may include an input device 500, such as a keyboard, a mouse, a joystick, a microphone, a scanner, or the like. The input device 500 can receive input such as text (i.e., the input device 500 could be a keyboard or microphone) or an image (i.e., the input device 500 could be a scanner or a mouse selecting an already- stored image).
[0038] The printing terminal 402 may also include a processor 502. The processor 502 may include one or more processors and one or more tangible, non-transitory memories and be capable of implementing logic. The processor can be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate
array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
[0039] The memory 504 may be a non-transitory memory capable of storing data. The memory 504 may or may not be separate from the memory of the processor 502. In that regard, the memory 216 may store instructions to be executed by the processor 502. For example, the memory 504 may include instructions for performing ultraviolet image outlining 518, instructions for performing ultraviolet image shadowing 520 and/or instructions for performing ultraviolet image bordering 522.
[0040] The processor 502 includes a word or image processing application (word processing application) 508, such as Visio™ or Word, each available from Microsoft Corporation of Redmond, WA. The word processing application 508 can create a document having text and/or images based on input received from the input device 500.
[0041] In some embodiments, the word processing application 508 may utilize an ultraviolet security font 509 that includes ultraviolet security features. For example, a font can include the visible text 102 and the ultraviolet secure outline 104 of Figs. 1A and IB, or the visible text 202 and the ultraviolet secure shadow 204 of Figs. 2A and 2B. In that regard, as a user enters text in
the ultraviolet font style, the visible text and the ultraviolet security feature are generated concurrently by the word processing application 508.
[0042] In some embodiments, the printing terminal 402 may also include a secure image design application 518. The secure image design application 518 includes various functions. In one aspect, the secure image design application 518 includes features similar to the word processing application 508 and can create a document or documents including images and/or text. In some embodiments, the secure image design application 518 may also, or instead, receive a document from the word processing application 508.
[0043] The secure image design application 18 may also be used to add an ultraviolet security feature to the images and/or text. In some embodiments, the secure image design application 518 can automatically add the feature to the visible image/text as it is received and/or in response to a request from a user. For example, a user can provide an input indicating that an ultraviolet shadow is desired for all text of a document. The secure image design application 518 will then apply the ultraviolet secure shadow to all text of the document. In some embodiments, a user may select properties of the ultraviolet security feature, such as thickness of an ultraviolet outline, thickness
and direction of an ultraviolet secure shadow, filler for an ultraviolet security border, or the like.
[0044] The secure image design application 518 may also allow customization of the ultraviolet security feature(s). For example, a user can create a document using the secure image design application 518 or the word processing application 508 and then can apply an ultraviolet security feature. As described above, the user may select the properties of the ultraviolet security feature, such as a thickness or filler, and also select where the feature is to be applied. For example, the feature may only be applied to some text, or a portion of an image, or an ultraviolet secure border may be applied to cover a particular area of the document and not other areas. In other embodiments, the user may select to have multiple ultraviolet features, such as an ultraviolet shadow corresponding to all of the text, and an ultraviolet border enclosing all of the text of the document.
[0045] In some embodiments, a user may use the word processing application 508 and the secure image design application 518 to generate a secure document. For example, a user may create a document, such as a prescription, using the word processing application 508. The user may then open the document within the secure image design application and request that
all of the text of the document includes an ultraviolet outline. The secure image design application 518 may then apply the ultraviolet outline to all of the text.
[0046] In other embodiments, the secure image design application 518 can intercept a document and apply the ultraviolet security feature. For example, the processor 502 can include one or more logical printers 510 including a standard logical printer 512 and an ultraviolet logical printer 514. The standard logical printer 512 corresponds to a traditional printer that prints using only visible ink or toner and the ultraviolet logical printer 514 corresponds to a printer that prints using both visible ink or toner and ultraviolet ink or toner.
[0047] After creating the document and selecting the printed document to include an ultraviolet image, the user may then select to print the document using the ultraviolet logical printer 514 from a printers list.
[0048] In some embodiments, upon receipt of a document, the ultraviolet logical printer 514 can transfer the document to the secure image design application 518. The secure image design application 518 will then add the ultraviolet security feature to the document. In some embodiments, the ultraviolet logical printer 514 will, instead, include a print object editing sub- application 516 that automatically inserts the ultraviolet security feature.
[0049] The secure image design application 518 or the print object editing sub-application 516 can either edit the original document or create a new document that includes the visible text and the ultraviolet security feature. The document may now be referred to as an ultraviolet print object 408. An ultraviolet print object has both visible text and an ultraviolet security feature and can be accepted by a physical printer for printing. The ultraviolet print object 408 includes visible text 410 and an ultraviolet security border 412.
[0050] The printing terminal 402 may also include an output port 506 coupled to the processor 502. The output port 506 may include any type of output port capable of transmitting data, such as a print object or a document, to another device. Upon receipt of the ultraviolet print object 408 from the processor 502, the output port 506 transmits the ultraviolet print object 408 to a security printer 406 capable of printing in both ultraviolet and visible inks or toners.
[0051] The security printer 406 then receives the ultraviolet print object 408 and prints the ultraviolet print object 408 onto a substrate. The visible ink or toner and the ultraviolet ink or toner may be printed on a substrate concurrently by the security printer 406. Stated differently, the substrate can receive the visible ink or toner and the ultraviolet ink or toner during a single pass of the substrate through the security printer 406.
[0052] As described above, a user can create a document using the word processing application 508 and, upon desiring inclusion of an ultraviolet security feature, can select the ultraviolet logical printer 514 for printing the document. In some embodiments, the document, without the ultraviolet security feature, can then be output via the output port 506 as a print object 414. The print object 414, having only visible text 416, is readable by a printer and/or by another device.
[0053] The print object 414 may then be received by the security printing server 404, which can add an ultraviolet security feature to the visible image or text. Thus, in some embodiments, a user can select to print using the ultraviolet logical printer 514 and the print object 414 can be intercepted by the security printing server 404.
[0054] Referring now to Figs. 4 and 6, the security printing server 404 may include an input port 600 that receives the print object 414 from the printing terminal 402. The print object 414 will be referred to as an inputted print object 414 after being received by the input port 600. The input port 600 may include any type of input port capable of receiving data, such as a print object or a document, from another device.
[0055] The security printing server 404 may also include a security printing processor 602. The security printing processor 602 may include one or
more processors and one or more tangible, non-transitory memories and be capable of implementing logic. The security printing processor 602 may be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
[0056] The memory 604 may be a non-transitory memory capable of storing data. The memory 604 may or may not be separate from the memory of the security printing processor 602. In that regard, the memory 604 may store instructions to be executed by the security printing processor 602. For example, the memory 604 may include instructions for performing ultraviolet image outlining 610, instructions for performing ultraviolet image shadowing 614 and/or instructions for performing ultraviolet image bordering 612.
[0057] The security printing processor 602 may include a print object editing sub-application 608 having similar features as the print object editing sub-application 516 of the processor 502 of Fig. 5. In that regard, the input port 600 will receive the print object 414, having only the visible text 416, from the printing terminal 402. The security printing processor 602 may receive the print object 414 via the input port 600.
[0058] In some embodiments, the print object editing sub- application 608 will add an ultraviolet security feature to the print object 414 and in some embodiments it will create a new ultraviolet print object 418 having both the visible text 420 and the ultraviolet security feature 422.
[0059] The security printing server 404 may also include an output port 606 coupled to the security printing processor 602. The output port 606 may include any type of output port capable of transmitting data, such as a print object or a document, to another device. Upon receipt of the ultraviolet print object 418 from the security printing processor 602, the output port 606 will transmit the ultraviolet print object 418 to the security printer 406 to be printed.
[0060] In some embodiments, the system may not include the security printing server 404, and the print object 414 having only the visible text 416 will be received by the security printer 406.
[0061] Referring now to Figs. 4 and 7, the security printer 406 may be any type of printer that is used in any of a variety of printing technologies. For example, the security printer 406 may be associated with ionographic printing, magnetographic printing, electrophotographic printing, inkjet printing, thermal printing, offset printing, 3-dimensional (3D) printing, or other imaging techniques.
[0062] The security printer 406 may include an input port 700 that receives the print object 414 from the printing terminal 402. The input port 700 may include any type of input port capable of receiving data, such as a print object or a document, from another device.
[0063] The security printer 406 can also include a security printer processor 702. The security printer processor 702 may include one or more processors and one or more tangible, non-transitory memories and be capable of implementing logic. The security printer processor 702 may be a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
[0064] The memory 704 may be a non-transitory memory capable of storing data. The memory 704 may or may not be separate from the memory of the security printer processor 702. In that regard, the memory 704 may store instructions to be executed by the security printer processor 702. For example, the memory 704 may include instructions for performing ultraviolet image outlining 710, instructions for performing ultraviolet image shadowing 714 and/or instructions for performing ultraviolet image bordering 712.
[0065] The security printer processor 702 may include a print object editing sub-application 708 having similar features as the print object editing sub-application 516 of the processor 502 of Fig. 5. In that regard, the input port 700 will receive the print object 414 having only the visible text 416 from the printing terminal 402. The print object editing sub-application 708 may receive the print object 414 from the input port 700.
[0066] In some embodiments, the print object editing sub- application 708 will add an ultraviolet security feature to the print object 414 and in some embodiments it will create a new print object having visible text and an ultraviolet security feature.
[0067] The security printer 406 may also include security printing hardware 716. The security printing hardware 716 may receive a print object and print the feature of the print object (i.e., images and/or text) onto a substrate using both visible ink or toner and ultraviolet ink or toner. In that regard, upon receipt of the ultraviolet print object 408 or 418 at the input port 700, the ultraviolet print object 408 or 418 will be transferred to the security printing hardware 716. The security printing hardware 716 then prints the secure document onto a substrate.
[0068] Similarly, upon addition of a security feature to the print object 414 (or creation of a new print object) by the print object editing sub-
application 708, the security printer processor 702 may transmit the print object to the security printing hardware 716 where it is printed onto a substrate.
[0069] Referring to Figs. 6 and 7, a user may interface with the security printing processor 602 and/or the security printer processor 702 to select desired properties of the ultraviolet security feature. For example, the user can select a line thickness or a distance between visible text and an ultraviolet secure shadow. The security printing processor 602 and/or the security printer processor 702 will automatically add the ultraviolet secure shadow having the desired line thickness and distance.
[0070] Turning now to Fig. 8, a method 800 for printing a document having an ultraviolet security feature is shown. The method 800 may be performed by a security printing server (such as the security printing server 404), a security printer (such as the security printer 406) or any other similar device. In some embodiments, at least some of the method 800 may be performed by a printing terminal (such as the printing terminal 402). For example, the method 800 may be performed by a processor such as the processor 502, the security printing processor 602 or the security printer processor 702 of Figs. 5, 6 and 7, respectively.
[0071] The method 800 begins at block 802 where a print object is received. The print object includes visible text, but does not include at least one
desired ultraviolet security feature. In some embodiments, an application or sub-application of a processor can receive a print object or document created using a word processing application.
[0072] In block 804, the processor determines whether to add an ultraviolet outline, an ultraviolet shadow and/or an ultraviolet border to text or an image of the print object. In some embodiments, this decision may be made by a user and provided to the processor via an input device. In other embodiments, the processor may determine which ultraviolet security feature to add, based on a programmed set of rules.
[0073] In block 806, the processor determines properties of the ultraviolet security feature based on properties of the text or image. For example, the property can include a size, area and/or shape based on properties of the visible image/text. In some embodiments, the properties of the ultraviolet security feature relative to the visible image/text may be based on a programmed set of rules or may be selected by a user. For example, a user may select a desired line thickness or a fill pattern of an ultraviolet security border.
[0074] In block 808, the processor may determine where on the print object to add the ultraviolet security feature. This may be selected by a user or may be determined automatically by the processor. For example, a user can select an area to be enclosed within an ultraviolet secure border using a
secure image design application or the processor can position an ultraviolet secure border around each image or block of text or around the entire area having images/text based on input or known rules.
[0075] In block 810, the processor adds the ultraviolet security feature to the print object based on the properties of the ultraviolet security feature determined in block 806 and the areas/locations determined in block 808.
[0076] In block 810, the print object having the visible image/text and the ultraviolet security feature is transmitted to a security printer for printing. In some embodiments, blocks 802-810 may be performed by a security printer processor of a security printer, in which case the print object is transmitted directly to security printing hardware.
[0077] Although the present invention is set forth herein in the context of the appended drawing figure, it should be appreciated that the invention is not limited to the specific form shown. For example, while the invention is conveniently described in connection with electrostatic printing, the invention is not so limited; the present invention may be implemented using other forms of printing— such as ionographic, magnetographic, electrophotographic, inkjet, thermal, offset, 3D, and similar imaging techniques. Various other modifications, variations, and enhancements in the design and
arrangement of the method and device set forth herein, may be made without departing from the spirit and scope of the present invention as set forth in the appended claims.
Claims
1. A secure document comprising:
a visible image or text that is visible under normal lighting; and
an ultraviolet secure outline or an ultraviolet secure shadow of the image or text printed adjacent to the image or text.
2. The secure document of claim 1 wherein the ultraviolet secure outline or the ultraviolet secure shadow of the image or text luminesces when exposed to ultraviolet light.
3. The secure document of claim 1 wherein a print object including the text and the ultraviolet secure outline or the ultraviolet secure shadow of the text were created on a device using an ultraviolet security font, and the document is printed by sending the print object to a printer.
4. The secure document of claim 1 wherein a print object including the image or text was created on a device and transmitted to a security printing server configured to add the ultraviolet secure outline or the ultraviolet secure
shadow of the image or text and transmit the image or text and the ultraviolet secure outline or the ultraviolet secure shadow of the image or text to a printer.
5. The secure document of claim 1 wherein a print object including the image or text and the ultraviolet secure outline or the ultraviolet secure shadow was generated using a secure image design application.
6. The secure document of claim 1 wherein the secure document was printed on a substrate with a single pass of the substrate through a printer that printed both the visible image or text and the ultraviolet secure outline or the ultraviolet secure shadow concurrently.
7. A security printing server for creating secure documents comprising: an input port configured to receive an inputted print object including an image or text;
a security printing processor coupled to the input port and configured to receive the inputted print object and generate an ultraviolet print object having the image or text and an ultraviolet security feature including at least one of an ultraviolet secure outline of the image or text, an ultraviolet secure shadow of the image or text or an ultraviolet secure border enclosing the image or text; and
an output port coupled to the security printing processor and configured to transmit the ultraviolet print object to be received by a printer.
8. The security printing server of claim 7 wherein the security printing processor is further configured to determine where to add, relative to the image or text, the ultraviolet security feature based on a location of the image or text on the inputted print object and a size of the image or text on the inputted print object.
9. The security printing server of claim 8 wherein the security printing processor is further configured to determine where to add, relative to the image or text, the ultraviolet security feature based on a shape of the image or text.
10. The security printing server of claim 7 wherein the ultraviolet security feature luminesces when exposed to ultraviolet light after being printed by the printer.
11. The security printing server of claim 7 wherein the security printing processor automatically generates the ultraviolet print object in response to receiving the inputted print object.
12. The security printing server of claim 7 wherein the ultraviolet print object includes an ultraviolet filler positioned within the ultraviolet secure border.
13. A system for creating secure documents comprising:
an input device configured to receive input from a user;
a processor coupled to the input device and configured to execute a secure image design application that is adapted to:
receive user input corresponding to an image or text, receive user input requesting an ultraviolet security feature having at least one of an ultraviolet secure outline of the image or text, an ultraviolet secure shadow of the image or text or an ultraviolet secure border enclosing the image or text, and
generate an ultraviolet print object including the image or text and the ultraviolet security feature; and
an output port coupled to the processor and configured to transmit the ultraviolet print object to a printer.
14. The system of claim 13 further comprising the printer coupled to the output port and configured to print the ultraviolet print object.
15. The system of claim 13 wherein the secure image design application is further adapted to automatically add the ultraviolet security feature in response to receiving the user input requesting the ultraviolet security feature.
16. The system of claim 13 wherein the secure image design application is further adapted to receive user input corresponding to a customization of the ultraviolet security feature and wherein the ultraviolet print object includes the image or text and the customized ultraviolet security feature.
17. The system of claim 13 wherein the image or text was created using a word or image processing application.
18. A method for creating secure documents comprising:
receiving, by a processor, an image or text;
generating, by the processor, an ultraviolet print object having the image or text and an ultraviolet security feature including at least one of an ultraviolet secure outline of the image or text, an ultraviolet secure shadow of the image or text or an ultraviolet secure border enclosing the image or text; and
transmitting, via an output port, the ultraviolet print object to a printer.
19. The method of claim 18 further comprising automatically generating, by the processor, the ultraviolet security feature.
20. The method of claim 18 further comprising determining, by the processor, where to add, relative to the image or text, the ultraviolet security feature based on a location of the image or text and a size of the image or text.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462060314P | 2014-10-06 | 2014-10-06 | |
US62/060,314 | 2014-10-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016057550A1 true WO2016057550A1 (en) | 2016-04-14 |
Family
ID=55653659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2015/054289 WO2016057550A1 (en) | 2014-10-06 | 2015-10-06 | System for producing secure documents containing secure bordering |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2016057550A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190001734A1 (en) * | 2017-06-29 | 2019-01-03 | Entrust Datacard Corporation | Plastic card with enhanced laminate adhesion |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280331A1 (en) * | 2005-06-10 | 2006-12-14 | Sylvain Chosson | Authentication of secure items by shape level lines |
US20120024953A1 (en) * | 2006-10-18 | 2012-02-02 | Xerox Corporation | Detection of security marks simulating natural defects for embedding information in documents |
US20140267754A1 (en) * | 2013-03-15 | 2014-09-18 | Luxtreme Limited | Method for applying a security marking to an object and a hyper-spectral imaging reader |
-
2015
- 2015-10-06 WO PCT/US2015/054289 patent/WO2016057550A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280331A1 (en) * | 2005-06-10 | 2006-12-14 | Sylvain Chosson | Authentication of secure items by shape level lines |
US20120024953A1 (en) * | 2006-10-18 | 2012-02-02 | Xerox Corporation | Detection of security marks simulating natural defects for embedding information in documents |
US20140267754A1 (en) * | 2013-03-15 | 2014-09-18 | Luxtreme Limited | Method for applying a security marking to an object and a hyper-spectral imaging reader |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190001734A1 (en) * | 2017-06-29 | 2019-01-03 | Entrust Datacard Corporation | Plastic card with enhanced laminate adhesion |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9282215B2 (en) | Security mark with copyable and non-copyable elements | |
US20070029394A1 (en) | Covert document system | |
US10237442B2 (en) | Security mark with anti-copyable effect | |
US8245306B2 (en) | Digital rights management printing system | |
US20130215474A1 (en) | System and Method for Printing Documents Containing Dynamically Generated Security Features | |
US9137405B2 (en) | System for creating certified document copies | |
US8387870B2 (en) | Methods and systems for fabricating a transaction card incorporating a memory | |
RU2188514C2 (en) | Device for reliable generation of electronic signatures | |
US9961230B2 (en) | Method and system for applying a watermark to a document | |
WO2010019706A1 (en) | Trusted card system using secure exchange | |
US7753274B2 (en) | Writing information processing device, writing information processing method and computer-readable medium | |
US9736330B2 (en) | Method and system for applying a content-variable watermark to a document | |
US8282015B2 (en) | Document with linked viewer file for correlated printing | |
EP2488937A1 (en) | Method and system for printing | |
US8264707B2 (en) | Enforcing reproduction rights for hard copies of documents | |
US20160096393A1 (en) | Security mark with chroma-based encoding | |
US10942690B2 (en) | System and method for implementing a color shift security feature in a print job | |
WO2016057550A1 (en) | System for producing secure documents containing secure bordering | |
US9682590B1 (en) | Printed document security | |
WO2007016536A2 (en) | Covert document system | |
JP2009177470A (en) | Document management device and program | |
JP2004280816A (en) | Creation method and system of document with copy protection | |
US9088735B2 (en) | Computer-based system and method for adding variable security data in printing operations | |
KR102406769B1 (en) | Variable data vector graphic pattern ink pantograph | |
CN108551535B (en) | Image forming control system and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15848967 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15848967 Country of ref document: EP Kind code of ref document: A1 |