The inventors' original LetterScreen (LS) system (illustrated in
The second generation of LS was enhanced by using a slight wave in the text lines. The second generation of LS was even more difficult to reproduce than the first generation LS.
The verification of both original LS and second generation of LS was based on the comparison of text in the LetterScreen and the readable personal data, as well as data on the screen, when OCR lines were read. The verification of the document containing the letter screen required the use of a special magnifier. As such, verification was a slow tedious process.
In view of the inefficiencies of the original LS system and process, the inventors have devised further enhancements that provide enhanced security as well as automated high speed verification of the subject document. Among the enhancements are the use of a unique microtext wave in each document. Each image created utilizing this enhanced system and method is created with a unique wave-structure, created with an algorithm based on the personal data from the (MRZ) of the document.
To determine authenticity of a subject document, the inventors' Verification Module re-generates the required waves (based on the MRZ) and matches this wave with the structure scanned by a document reader, such as a full-page passport reader. If it is determined that the two waves match: an output, such as a green light, advises the operator that the document is authentic. On the other hand, if the two waves do not match an output, such as a red light, advises the operator that the document has been forged or manipulated.
In
In the present example, the ICAO standard OCR lines (from the Machine Readable Zone (MRZ)) are used for the unique personal identification 102. Name, document number, nationality, date of birth, sex, passport expiration date and personal identity number, etc. may be used for the personal data 104. It should be noted that some of this data may be redundant with that of the unique personal identification 102. A jpeg format may be used form image 106, for example.
A first Message Authentication Code (MAC) 108 is generated at step 107 by the processor based on the unique personal ID 102. A first wave structure 110 is generated at step 109 by the processor based on the first MAC 108.
x′y′=f(x,y,a,b,c,d)
where X represents the horizontal axis, Y is the vertical axis. MAC is abcd:
x′=x+a*sin(x)+b*sin(y)
y′=y+c*sin(x)+d*sin(y).
The transformed structure is not necessary a wave-structure.
x′=a+b*x*y
y′=c+d*x
x′=a+b*x+y
y′=c*x*x+d*y
A waved microtext structure 112 is generated at step 111 by the processor based on the personal data 104 and the first wave structure 110. The processor then uses the input image 106 and the wave microtext structure 112 to generate at step 113 a LetterScreen image 114. The LetterScreen image 114 is then output by the processor for display on a display device and/or printing on a printer 510 (see
Because the wave-structure is calculated by an unique individual property, each structure is therefore unique and thus more robust with respect to efforts to counterfeiting and identity theft. This has significant importance especially today due to ever increasing efforts in national security.
In comparison to the prior art methods, the position of lines are modified, resulting in wavy lines of slightly changed text size. Accordingly, the method is suitable not only for microtext-characters, but also for any kind of raster, able to modify not only the position, but the shape, color or any other property of the raster. In the case of a microtext-screen even the individual characters can be identified
As defined herein, a document reader may be a personal information manager (PIM), a smartphone, a laptop computer, a nettop computer, a netbook computer, a tablet computer or a dedicated authentication device.
At step 215 the document reader finds the wave structure 218 in the scanned image 216, and then at step 220 compares the second wave structure 218 to the wave structure 210. If the comparison determines that wave structure 218 matches wave structure 210 an output 222 is generated advising that the passport (image 216) is authentic and thus acceptable. Otherwise an output 220 is generated advising that the passport (image 216) is not authentic and should be rejected.
The aforementioned system and method provides advantages heretofore unrealized. Among these are:
While preferred embodiments of the invention have been shown and described herein, it will be understood that such embodiments are provided by way of example only. Numerous variations, changes and substitutions will occur to those skilled in the art without departing from the spirit of the invention. Accordingly, it is intended that the appended claims cover all such variations as fall within the spirit and scope of the invention.
This application is the U.S. National Phase Application of PCT/IB2012/000622, filed Mar. 27, 2012, which claims priority to U.S. Provisional Application No. 61/468,762, filed Mar. 29, 2011, the contents of such applications being incorporated by reference herein.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB2012/000622 | 3/27/2012 | WO | 00 | 9/19/2013 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2012/131474 | 10/4/2012 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4557596 | Mueller et al. | Dec 1985 | A |
5178418 | Merry | Jan 1993 | A |
5772249 | Guex | Jun 1998 | A |
6104812 | Koltai | Aug 2000 | A |
6473516 | Kawaguchi | Oct 2002 | B1 |
6692030 | Phillips | Feb 2004 | B1 |
8140358 | Ling | Mar 2012 | B1 |
8340421 | Sullender | Dec 2012 | B2 |
8797417 | Gayko | Aug 2014 | B2 |
8861791 | You | Oct 2014 | B2 |
20030011597 | Oizumi | Jan 2003 | A1 |
20040007145 | Franz | Jan 2004 | A1 |
20040066273 | Cortina | Apr 2004 | A1 |
20040247157 | Lages | Dec 2004 | A1 |
20050035590 | Jones | Feb 2005 | A1 |
20050100192 | Fujimura | May 2005 | A1 |
20050134884 | Rombola | Jun 2005 | A1 |
20070016790 | Brundage | Jan 2007 | A1 |
20070252838 | Hains | Nov 2007 | A1 |
20080040004 | Breed | Feb 2008 | A1 |
20080046150 | Breed | Feb 2008 | A1 |
20080101601 | Ramani et al. | May 2008 | A1 |
20080240512 | Nireki | Oct 2008 | A1 |
20090020999 | Kendrick | Jan 2009 | A1 |
20090021000 | McCartney | Jan 2009 | A1 |
20090059304 | Manfredi | Mar 2009 | A1 |
20090315319 | Kendrick | Dec 2009 | A1 |
20120027258 | Uchida | Feb 2012 | A1 |
20120306860 | Hatta | Dec 2012 | A1 |
20130314486 | Goldau | Nov 2013 | A1 |
20140343842 | Ranganathan | Nov 2014 | A1 |
20150165972 | Takemae | Jun 2015 | A1 |
20150165973 | Takemae | Jun 2015 | A1 |
Number | Date | Country |
---|---|---|
WO 2015024257 | Feb 2015 | CN |
102006029798 | Jan 2008 | DE |
1 231 767 | Aug 2002 | EP |
1231767 | Aug 2002 | EP |
2898986 | Sep 2007 | FR |
WO 2012131474 | Oct 2012 | HU |
WO 2005010684 | Feb 2005 | WO |
WO 2005010684 | Feb 2005 | WO |
Entry |
---|
International Preliminary Report on Patentability for PCT/IB2012/000622 dated Oct. 1, 2013. |
Written Opinion of the International Searching Authority for PCT/IB2012/000622 dated Oct. 1, 2013. |
Koltai et al., “Enhanced optical security by using information carrier digital screening,” Optical Security and Counterfeit Deterrence Techniques V, edited by Rudolf L. van Renesse, Proc. of SPIE-IS&T Electronic Imaging, SPIE vol. 5310, 2004, pp. 160-169. |
International Search Report for PCT/IB2012/000622 mailed Jul. 11, 2012. |
Patent Examination Report No. 1 issued in Australian Patent Application No. 2012235850 dated Dec. 11, 2015. |
First Office Action issued in Indonesian Patent Application No. W00 2013 04942 dated Nov. 10, 2015. |
European Examination Report for European Application No. 12717837.4, dated Jan. 27, 2017, 8 pages. |
EAPO Notification issued in Application No. 201391405 mailed Aug. 27, 2015. |
Patent Examination Report No. 2 issued in Australian Patent Application No. 2012235850 dated Nov. 28, 2016 (3 pages). |
Number | Date | Country | |
---|---|---|---|
20140010403 A1 | Jan 2014 | US |
Number | Date | Country | |
---|---|---|---|
61468762 | Mar 2011 | US |