With a constant increasing fraud problem both in documents as well as in products, there is a constant need for innovation in security features. To be effective, security must be applied in a layered manner and with functions towards the different users of the document or product (manufacturer, distributor, end user, official control entities, etc.).
As a general standard, different levels or classes of security features can be distinguished: a) Overt security features, or Level 1 features can be identified using the human sense (without the need of any additional tool—mainly vision and/or tact); b) Covert security features, or Level 2 features can be identified with the help of readily available tools such as ultraviolet (UV) lights or magnifying lenses; c) Forensic security features, or Level 3 features, can only be identified using microscopes or other specialized equipment. Additional to this, the use of digital elements like barcodes or other machine-readable marks have been named as Level 4 features or digital security features.
Previously, each of these different level security features have been used in a separate way (optical changing ink as Level 1 feature, invisible UV reactive ink as a Level 2 feature, etc.). The previous also applies to digital security features. As such, combinations of different level security features may be desirable.
Examples disclosed herein may be directed to security features that may hold multiple levels or classes of security features in one element. The security features may include a Level 1 feature in combination with a Level 4 feature. In examples, other levels (e.g., Level 2 feature, Level 3 feature, etc.) may be included with the security feature. For example, there are numerous variations of linear barcodes and/or 2D barcodes that besides a product/unit identification function also have a specific security function (Level 4 feature). Some of these barcodes have been printed in ink/toner that contains a Level 2 or Level 3 feature (UV reactive or taggant reactive materials). Such codes however, do not include a Level 1 feature. Examples herein accordingly may include a Level 1 feature in combination with a Level 4 feature. In examples, the Level 1 feature (can be identified using human sense) may have an advantage to allow an end user to authenticate a product without the use of any additional element.
In examples, the Level 1 feature may comprise an image element having a first image when the image element is viewed at a first angle and having a second image when the image element is viewed at a second angle.
Examples disclosed herein may include a security feature having Level 4 features of digital security, which may allow the security feature to comprise a code that, contrary to conventional technologies, is printed as a unique code.
Examples disclosed herein may be directed to light conductive/reflective technology applied with digital technology. Examples disclosed herein may be used with a variety of articles, including documents and products, which may include but are not limited to labels, packaging, or other articles, which may increase the variety of uses of the examples and the application of the security features.
Features disclosed herein may include one or more of the following, but are not limited to:
A system for the generation of a security feature to be printed that will have various levels of security included in the same element.
Variable data elements that may consist mainly but not exclusively of alphanumerical elements and/or other symbols.
Multiple variable data elements that may allow the combination of data elements to create unique codes.
Security features printed with, mainly but not exclusively, ink with a reflective aspect allowing for more than one data element to be read according to a viewing angle.
Variable data elements that may be mainly, but not exclusively, made up of line structures.
Variable data elements that in each view hold patterns or arrays generated in such a way that a pattern or array generates a first image that differs from a second image in the same structure but depending on the angle of view.
A security feature may hold at least two images due to the use of different angles in the patterns but can hold more images depending on the patterns or angles used.
Variable data elements printed with, mainly but not exclusively, ink with reflective aspects allowing, at least, a first image to be seen when viewed under a first angle and a second image when viewed under a different angle.
Variable data elements that under a reflection of normal light read the different images by a set of cameras and feed the data into a database for identification or control of the article on which the variable data elements have been applied.
Variable data elements that under the reflection of normal light are read by a camera of a smart phone and connect to a software program (application or “app”) to feed the data back into a database.
Variable data elements that under the reflection of normal light are read by the human eye and are entered into a software program (application or “app”) to feed the data back into a database.
Variable data elements that under ultraviolet (UV) light are identified as authentic.
The variation in the images (e.g., first image and second image) due to viewing angle may be produced in a variety of manners. In examples, different reflective or conductive aspects of light under different angles may be utilized. Such an effect may be obtained, although not exclusively, with high reflective ink or varnishes as well as with other reflective materials such as metallic foils, inks, and toners. In examples, the first image may be visible or revealed when viewed at an angle near vertical or normal to the surface of the image element 12, and the second image may be visible or revealed when viewed at a different angle. The different angle may comprise an angle closer to a horizontal plane (e.g., between the axis normal to the surface of the image element 12 and the plane of the image element 12).
In examples, the second image may comprise a latent image when the first image is visible or revealed at the first angle. Further, the first image may comprise a latent image when the second image is visible or revealed at the second angle. As such, a user may vary the viewing angle of the image element 12 to reveal the first image and the second image sequentially. In examples, more than two images may be included in the image element 12 as the use of different configurations of the image element 12 may produce multiple latent images at different viewing angles (e.g., at more than two viewing angles).
In examples, the image element 12 may be configured to have a first image when the image element 12 is viewed at a first angle and may have a second image when the image element 12 is viewed at a second angle by use of a plurality of raised features 14 of the image element 12. The plurality of raised features 14, for example, may be configured to produce different images at different viewing angles.
Referring to
The first portion 18 of the plurality of raised features 14 may differ from the second portion 20 in configuration to produce the different images at different viewing angles. For example, the first portion 18 of the plurality of raised features 14 may differ from the second portion 20 in one or more of a height, thickness, or angle of the plurality of raised features 14 of the first portion 18, among other features of the plurality of raised features 14.
The plurality of raised features 14, for example, may comprise a plurality of line structures that may extend parallel with each other. One or more sets of line structures may extend in a direction parallel with each other. For example, a first set 22 of the line structures may extend in a first direction vertically in the page as shown in
In examples, the thickness of the raised features 14 or line structures may differ to produce different images visible or revealed at different angles. For example, referring to
In examples, a height of the raised features 14 or line structures may differ to produce different images visible or revealed at different angles. For example, referring to
In the example of
The difference in angle of the raised features 14 forming the second image or letter “B” shown in
In examples, other differences between the raised features 14 may allow the image element 12 to have a first image when the image element 12 is viewed at a first angle and have a second image when the image element 12 is viewed at a second angle. In examples, the raised features 14 may each extend in a same direction (e.g., all parallel with each other) or may lack a direction (e.g., a series of dots). A height difference of the raised features solely may allow the image element to have a first image when the image element 12 is viewed at a first angle and have a second image when the image element 12 is viewed at a second angle. For example, an increased height of a first portion of the raised features relative to a second portion of raised features may allow the first portion to produce a second image at a lowered or more horizontal viewing angle (such as shown in
The raised features 14 may be formed by a printing or production method resulting in raised features. The raised features may be formed by printing processes that may allow the configuration of the raised features to be varied as desired and be varied repeatedly and/or rapidly.
For example, the raised features 14 may be formed with a printing device that may be configured to print varied configurations of raised features in sequence. A toner printer or an ink printer such as an inkjet printer or other form of printing device, for example, may be utilized to produce the raised features and accordingly produce the appearance of the image element 12. The printing device may be configured to vary the height, thickness, or angle of the raised features, among other properties of the raised features, to produce a desired configuration of raised features 14 and image element 12 as desired. The printing device may be configured to sequentially vary the configuration of the raised features 14 and image element 12 for different image elements as desired.
One or more of the first image or the second image may comprise a data element for a code that is unique within a set of a plurality of codes. For example, referring to
The data elements of the first image or the second image may comprise alphanumerical elements or symbols, or may have other forms as desired. The data elements may comprise data elements that may be identifiable by a human user visually, as a Level 1 security feature. As such, the data elements may be readable by a human user, and thus may comprise an identifiable code such as “8,” “B.” Other identifiable alphanumerical elements or symbols (e.g., !, @, #, %, &), may be similarly utilized.
Each image element may hold two variable data elements, which may be referred to as data pairs. The different data elements included in the data pair may be seen by tilting the image element.
Each data pair (first view+second view) exists of variable data so that unique codes are generated so that every article on which a code (which may be a combination of data pairs) is applied is uniquely identified.
The code may comprise a single data element in examples, or may comprise a plurality of data elements. The code may be produced via a plurality of the image elements utilized in combination. For example, referring to
The code may be utilized for security verification of the article that the security feature (e.g., a security feature 10 as shown in
The processor 52 may be operatively coupled to an output 54 that may be configured to communicate with a printing device 56. The output 54 may comprise a variety of forms of electrical connections, ports, or wireless connections, among other forms of output for communication with the printing device 56. In examples, any of the components disclosed herein may be integrated into the printing device 56 or may be positioned remote as desired.
The system 50 may include a memory 58. The memory 58 may comprise electronic memory such as RAM or ROM, a hard drive (which may be solid state or mechanical) or may comprise another form of memory 58. The memory 58 may be located with the processor 52 or may be remote (e.g., wireless or cloud computing) as desired. The memory 58 may store data for the processor 52 to operate upon. In examples, the memory 58 may include a database 60 of a set of the codes. The database 60 may be prepopulated with the set of codes, or the database 60 may be populated with the codes comprising the set of codes by the processor 52. For example, the processor 52, in examples, may be configured to generate the codes and store the generated codes in the database 60 to form the set of codes or add to the set of codes.
The database 60 may be utilized to store the set of codes for matching with a code of a security feature (e.g., a security feature 10 as shown in
Each code within the set of codes may be unique. As such, each code may be different from the other codes within the set for unique security verification of the article within the set of codes. The set of codes may encompass all codes produced for a particular article or type of article, or may comprise all codes produced for any security feature that is produced. As such, a unique identifier for the article may be provided for the code, which may be verified electronically (as a Level 4 security feature). The set of the plurality of codes may be stored within the database.
The system 50 may include an input 62 that may be configured to provide input into the system 50. The input 62 may comprise electrical connections, ports, or wireless connections, among other forms of input for the system. The input 62 may comprise an input device such as a keyboard, tablet, touchscreen, mouse, or other form of input for the system 50. The input 62 may be utilized for control of the system 50 and/or operation of the production of the security features with the printing device 56. In examples, the input 62 may be utilized to match a code of a security feature that is on an article with a corresponding code contained in the database 60 for a security verification.
In examples, the system 50 may communicate via a network 64 for communication with other devices. Such other devices may include, but are not limited to other input devices configured to receive an identification of a data element of a code of a security feature. Such other input devices may be utilized to identify and match the code with a corresponding code contained in the database 60. In examples, the network 64 may comprise an internet connection, mobile device connection, local area network connection, or other form of connection for communicating with other devices (which may comprise input devices).
The printing device 56 may comprise a device for producing the security feature (e.g., a security feature 10 as shown in
The printing device 56 may be configured to produce one or more image elements (such as the image element 12 shown in
In examples, the printing device 56 may print a security feature upon an article. The article may comprise a document 72 or a product 74 or any other form of article for security verification. For example, the article may comprise a financial document, a form of currency, labels, packaging, tickets, a certificate, electronic devices, household goods, medical or pharmaceutical products, or any other form of article for security verification. A document 72 in the form of a certificate is shown in
In exemplary methods of operation, the processor 52 may instruct the printing device 56 to produce a security feature. The processor 52 may generate the code of the security feature and the configuration of the image element (e.g., a configuration of raised features). The processor 52 may be programmed generate the code by itself or may generate the code based on retrieval from the database 60 or based on input from a user through the input 62. The printing device 56 may produce the security feature in a desired manner by itself or upon an article.
The data pair may be generated as a special font, a library of high-resolution images or through an application that generates line patterns/structures in which the angles, line width and distance are defined or a combination of techniques may be utilized to generate both data elements of a data pair as a dynamic element.
In examples, the image element produced by the printing device 56 may be a first image element, and a method may include providing a second image element (as represented in
Under the different viewing angles, the view contains different variable data that may consist of alphanumerical elements and/or other symbols so that a multitude of combinations may be created, thus allowing a unique identification of each article on which the codes are applied.
In examples, the printing device 56 may produce unique codes and security features sequentially. For example, a first security feature may be provided for a first article (e.g., article 74 as shown in
In examples, the processor 52 may populate the database 60 with the codes after the respective code has been produced for the article, or the database 60 may be prepopulated with the codes. In examples, a user may manually input the codes, which may be stored in the database 60.
Other systems, apparatuses, and methods may be utilized as desired. Features of systems, apparatuses, and methods may be varied, combined or substituted as desired.
The security feature may be provided upon the article and may be placed in circulation in trade or commerce or otherwise utilized in a manner in which security verification of the article may be desired. The security verification may occur at a time of production of the article in examples. At a desired time for security verification, the security feature may be utilized for security verification of the article.
In exemplary methods herein, a data element for a code on a security feature for an article may be identified. For example, referring to
In examples, the visual identification of the data elements for the codes may occur utilizing one or more input devices. The one or more input devices may be configured to receive an identification of a data element for the code. For example, referring to
As shown in
Upon identification of the one or more data elements comprising the code, the code may be matched with a corresponding code in a database for security verification of the article. For example, the code may be electronically transmitted or otherwise compared with a code stored in a database. In examples, the code may be stored locally in a database with an input device that identifies the code. In examples, the database may be remote such as a database 60 as shown in
Referring to
The system 90 may include a processor 94 that may be configured to produce a security verification of the code based on a match of the code with a corresponding code in a database. The processor 94 may comprise a microprocessor, CPU, or other form of processor for performing the processes disclosed herein. The processor 94 may be programmed to perform the processes disclosed herein. The processor 94 may receive the code and may match the code with the corresponding code in the database. The match of the code with the corresponding code in the database may produce the security verification.
The security verification may be presented to a user or otherwise utilized for security verification of the article (e.g., the security verification of the article may be stored electronically for future reference, among other uses). In an example in which the security verification is presented to a user, the security verification may be provided on a display 96 (as represented in
The processor 94 may match the code with a corresponding code in a database via use of an output 98, which may comprise electrical connections, ports, or wireless connections, among other forms of output for the system. The output 98 may be operatively linked to the network 64, which may be utilized to match the code with the corresponding code in remote database 60 as represented in
A system 90 as disclosed herein may have a variety of implementations. For example,
Referring to
The mobile device 100 may include a software program (an application or “app”) for performing the identification and security identification of the code. Referring to
Producing the security verification may include displaying the security verification 104 on the display 96 of the mobile device 100. Other forms of notifications may be utilized as desired (e.g., via email, text message, lights, sounds, or other forms of notifications).
Other systems may be utilized (e.g., static computers with access to an internet connection, or other forms of computers) in examples.
In examples, other forms of input to the input device may be utilized. For example,
In examples, other forms of input devices may be utilized. The input device may be utilized in a commercial or production line verification process. Systems dedicated for verification of a security feature may be utilized.
Other systems, apparatuses, and methods may be utilized as desired. Features of systems, apparatuses, and methods may be varied, combined or substituted as desired.
Examples disclosed herein may beneficially allow for a user to visually verify a security feature (a Level 1 feature), and for an electronic or digital security feature (a Level 4 feature). Each code may be unique within a set of a plurality of codes for unique security verification of an article. The physical properties of the reflective aspects of the image elements combined with the dynamic aspect of the data pairs may provide each security feature as a Level 1 security feature as well as a Level 4 security feature.
The technology may be utilized to create a three dimensional pattern that may create a variation in contrast (conduction of light) when viewing the image element under a different angle thus revealing different data elements in each view.
In examples, additional layers of security may be provided. For example, a Level 2 feature may be incorporated. UV reactive ink or other reactive materials may be incorporated with a security feature. For example, the security feature may be printed with UV reactive ink or other reactive materials. The Level 2 feature may be identified with a UV light (black light) or other device as desired. Alternatively or in combination, a Level 3 feature may be incorporated. For example, a taggant may be applied to the security feature or other form of identifying material may be utilized. A taggant reader or other device may be utilized.
Features may be utilized solely or in combination with other features disclosed herein.
While examples of the disclosure have been illustrated and described, it is not intended that these examples illustrate and describe all possible forms of the disclosure. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the examples of the disclosure.
The present application claims priority to U.S. Provisional Patent Application No. 63/221,353, filed Jul. 13, 2021, the entire contents of which are incorporated by reference herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2022/036819 | 7/12/2022 | WO |
Number | Date | Country | |
---|---|---|---|
63221353 | Jul 2021 | US |