1. Field of the Invention
The subject invention relates to securing and controlling access to printed media.
2. Related Art
Full compliance with various Governmental regulations, such as, HIPPA, GLB and Sarbanes-Oxley, requires the retention of many documents (including paper documents). For example, Sarbanes-Oxley sections 103 (a), 104 (d), 104(e) and 105(b) are all concerned with the storage and retrieval of documents (including paper documents). Section 105(b) goes on to state that the documents must remain confidential and secure. Section 802(a) further states that the documents should not be altered in any way.
In the art of digital documents, there are many methods to provide security and control access to digital documents. Among the generally available methods are: requiring a password, encrypting the document, etc. However, there aren't many methods available to secure printed matter, such as paper documents. Conventionally, these are simply locked in a safe, drawer, room, etc. Additionally, printed documents may be sealed in an envelope.
There are at least two drawbacks to the conventional methods of securing printed matter. First, there is no secure way to track when a document has been viewed and who has viewed it. While a logbook may be used to track viewing of the document, there is no way to ensure that every view is indeed recorded in the logbook. Second, when documents are sealed, the seal must be broken for each viewing and another seal needs to be applied.
Accordingly, there is a need in the art for improved methods of securing printed documents that preferably also enable monitoring and logging access to the documents.
The subject invention describes methods and apparatus for securing printed documents and enabling monitoring of access to the documents. Various aspects of the invention enable securing paper and ePaper documents so that they cannot be read unless the correct key is attached. Printed documents that have been secured in this manner will appear completely or partially obscured until the proper key is applied. Access can be granted to all or portions of the page depending upon the security level of the key. The key may be a small device which may also supply power to the security device and/or the ePaper when used. By adding a new layer of security to traditional documents, this invention extends their usefulness and simplifies their secure storage and transportation.
Using the aspects of the invention is much like using any encrypted electronic file, in that an authorized viewing of the file doesn't destroy the security seal. The viewed secured documents don't need to be resealed after each authorized viewing. Additionally, according to aspects of the invention, as in many digital file encryption methods, each viewing could be automatically logged into a central monitoring system.
According to various aspects of the invention, an apparatus for securing documents is provided, comprising: a layered arrangement of a security layer sandwiched between two electrode layers at least one of which being transparent, the security layer assuming either an opaque state or a transparent state according to potential applied across the electrode layers, the arrangement being permanently fastened to a printed document and obscuring printed matter of the printed document when the security layer assumes the opaque state; and a coding circuitry permitting application of potential across the electrodes only when proper code has been received by the apparatus. The apparatus may further comprise a back layer forming a sleeve with the layered arrangement to enable insertion of the printed document there-between. The layered arrangement may be physically sealed to the back layer to prevent removal of the printed document without physical tempering. The apparatus may be provided such that upon application of the proper code, the security circuitry permits application of potential across the electrodes only about predefined regions to thereby cause the security layer to assume the transparent state only about the predefined regions. The apparatus may further comprise an ePaper layer, the ePaper layer capable of recording an image projected there-upon when connected to power supply, and maintaining the image after the removal of the power supply. The ePaper may be formed integrally to the layered arrangement or affixed to the layered arrangement so as to prevent separation of the ePaper and layered arrangement without physical tempering. Alternatively, the ePaper may be adhered to the layered arrangement so as to prevent separation of the ePaper and layered arrangement without physical tempering. The apparatus may be constructed so that the coding circuitry further functions to provide one or any combination of the following: enable application of power to areas of the security layer that are pre-approved for assuming the transparent state; store document metadata of the document; and store access information. The metadata may include one or combination of: document serial number, document security level, and creation date. The access information may comprise one or combination of: access time and access key ID.
According to other aspects of the invention, a system for securing printed documents is provided, comprising: a security ePaper comprising a security film and an ePaper film, the security film assuming either an opaque state or a transparent state according to potential applied across electrodes of the security film, and a coding circuitry permitting application of the potential across the electrodes only when proper code has been entered; the ePaper film fabricated to record an image projected there-upon when connected to power supply, and maintaining the image after the removal of the power supply; and an image printer, the image printer constructed to apply voltage to the ePaper for printing an image onto the ePaper; and a code key having the proper code stored therein and constructed to apply the proper code to the security film so as to cause the security film to assume the transparent state. The system may further comprise a server having stored therein serial numbers and corresponding codes of security ePapers. The server may further store access times and access key ID's relating to each access of any of the security ePapers.
According to further aspects of the invention, a method for securing printed matter is provided, comprising: physically sealing the printed matter onto a security film, the security film assuming either an opaque state or a transparent state according to potential applied across electrodes of the security film; causing the security film to assume the opaque state so as to obscure at least part of the printed matter; and monitoring security key input to the security film and applying potential across the electrodes only when the security key matches a pre-assigned code. The method may further comprise recording access information whenever a security key has been input. The access information may comprise at least an access time and an access key.
According to yet further aspects of the invention, a thin film apparatus is provided, comprising: a flat sheet-like substrate having a window section and a frame section, the window section comprising a film arrangement of a security layer sandwiched between two electrode layers at least one of which being transparent, the security layer assuming either an opaque state or a transparent state according to potential applied across the electrode layers; contact pads applied onto the frame section; and a coding circuitry provided in the frame section and coupled to the contact pads, the coding circuitry permitting application of potential across the electrodes only when proper code has been entered via the contact pads. The apparatus may further comprise means for physically sealing a document within the sheet-like substrate so that the document can be viewed only when the security layer assumes the transparent state. The substrate may further comprise an ePaper layer, the ePaper layer capable of recording an image projected there-upon when connected to power supply, and maintaining the image after the removal of the power supply. The coding circuitry may comprise printed polymer electronic circuit.
According to further aspects of the invention, an apparatus for securing documents is provided, comprising: a layered arrangement of a security layer sandwiched between two electrode layers, at least one of which being transparent, said security layer assuming either an opaque state or a transparent state according to a combination of potential applied across the electrode layers and a switching signal, the arrangement being permanently fastened to a printed document and obscuring printed matter of the printed document when the security layer assumes the opaque state; and a coding circuitry permitting application of at least one of the potential or switching signal only when proper code has been received by the apparatus. The switching signal may be an electrical or optical signal. The optical signal may be constituted by illumination of the security layer, or by lack of illumination, i.e., placement of the layer in the dark.
Additional aspects related to the invention will be set forth in part in the description which follows, and in part will be apparent from the description, or may be learned by practice of the invention. Aspects of the invention may be realized and attained by means of the elements and combinations of various elements and aspects particularly pointed out in the following detailed description and the appended claims.
It is to be understood that both the foregoing and the following descriptions are exemplary and explanatory only and are not intended to limit the claimed invention or application thereof in any manner whatsoever.
The accompanying drawings, which are incorporated in and constitute a part of this specification exemplify the embodiments of the present invention and, together with the description, serve to explain and illustrate principles of the inventive technique. Specifically:
The subject invention utilizes conventional layering technology to enable securing conventional paper documents and ePaper documents. Preliminary, ePaper technology has been developed by the subject assignee, Fuji-Xerox of Japan. The photo-addressable ePaper technology provides a photosensitive medium that, when energized, accepts a light input to generate an image that is maintained on display after the power is removed from the media. For example, if the media is energized and one uses a laser pointer to write on the ePaper, the writing will remain displayed on the ePaper after the power is removed. Similarly, if one projects an image onto the ePaper using, e.g., an LCD projector, when the ePaper is powered, the projected image will remain displayed by the ePaper after the power is removed. There are two different types of ePaper, one that is written to by light from behind, and one that is written to from the front. For further information relating to this technology the reader is directed to: H. Arisawa, et al., “Photoaddressable Electronic Paper Using Cholesteric Liquid Crystal” IS&T NIP17-228 (2001); T. Kakinuma, et al., “Black and White Photo-addressable Electronic Paper using Encapsulated Cholesteric Liquid Crystal and Organic Photoconductor” IDW '02, p. 1345 (2002); H. Kobayashi, et al., “A novel Photoaddressable Electronic Paper Using Organic Photoconductor Utilizing Hydroxy Gallium Phtalocryanine as a Charge Generation Material” Asia Display, p. 1731 (2001); S. Yamamoto, et al., “A Novel Photoaddressable Electronic Paper Utilizing Cholesteric LC Microcapsules and Organic Photoconductor” SID '01 Digest, p. 362 (2001); Hiroshi Arisawa and Kiyoshi Shigehiro, Photo-addressable E-Paper and Toner Display, IS&T's NIP20: International Conference on Digital Printing Technologies, Salt Lake City, Utah; Oct. 31, 2004; p. 922-926; and U.S. patent application Ser. No. 11/243,603, all of which are incorporated herein by reference in their entirety.
Any of the mentioned types of the ePaper may include a layer that can be switched from opaque to transparent and vice versa by applying a voltage. For example, Fuji Xerox's photoaddressable ePaper has a layer that can be made white when voltage is applied in the presence of a lot of light and will turn transparent if voltage is applied in the dark. Other types of ePaper can support this switch. For example, toner based ePaper goes from opaque to transparent when all of the toner particles are attracted to the side of each cell. Electrowetting ePaper becomes nearly transparent when the particles contract in the horizontal direction. The mechanism is illustrated in general term in
According to embodiments of the invention, this property is advantageously used to secure printed matter. According to various embodiments, such a layer is provided above the document to be secured and is set to the opaque state so as to obscure the contents of the document. When a prescribed voltage is applied, the layer turns to its transparent state. However, the voltage can only be applied to the security layer in the presence of a security key. The security key may be provided in the form of electrical signal, optical signal, etc.
The embodiment illustrated in
The double-layer ePaper of
Another embodiment may enable a single write, multiple lock function of the secure ePaper, in which only the electrodes connecting to the security layer are accessible. The document is created by writing to normal ePaper in the usual way, and only then attaching the security layer 230 together with layers that cover the electrodes to the written ePaper 205. This type of ePaper supports read-only tamperproof documents that can only be read by a person with the correct key.
Instead of obscuring the entire document, the security layer could contain regions which are always transparent and others that can be locked and unlocked. For example, a secure sleeve may be made in which the top of the sleeve is always transparent and may include identifying information that is not confidential. In this manner, the identity of the document can be easily deciphered without having to attach the key. As another example, standard contracts could be written on secure ePaper with only the regions with the added information lockable. Custom secure sleeve with a particular pattern of lockable and transparent zones could be manufactured as requested by customers. Furthermore, one pair of electrodes could control all the lockable regions, or multiple pairs could be provided so that one could unlock some regions while keeping others locked depending on, e.g., access permission.
Instead of obscuring preset areas, a user could select specific areas of the page to obscure. In this embodiment, an input device with the basic form factor of an eraser or a highlighting marker would be employed in addition to the power supply key. That is, the input device would be used to mark the areas of the document that the user wishes to obscure, while the key is inserted. Once the key is removed, the marked areas would be opaque until the proper key is re-inserted and the ePaper is energized.
Another embodiment enables multiple-party security. That is, according to this embodiment, more than one key is needed in order to view the document. This may be done either by having each key carry only part of the necessary code, or by using multi-layer secure sleeve. That is, by stacking security layers, one can create secure sleeve that can only be viewed if multiple parties are present. That is, each security layer may be enabled by one key; however, to view the document all of the security layers must be turned transparent. For example, a secure sleeve with three layers associated with keys belonging to three different people can only be read by any of them if they all agree to unlock their respective layer.
According to yet another embodiment, each sheet of secure paper has a unique serial number, or groups of secure papers could share a number associated with a key. During the “locking” process the key associates a code with the serial number of the secure paper, and the security layer is made opaque. The power supply key would only be able to provide the power needed to unlock the security layer of the secure paper document if it has provided the “lock” on the page with the correct code.
A central monitoring system could manage some or all power supply keys within a given system. This would prevent the loss of access to data if a key breaks. Upon encryption, the power supply key could inform the central monitoring system about which unlock code corresponds to which sheet of secure ePaper or security sleeve.
Notably, since both the power supply key and the security layer contain no information of the content being obscured, neither can be “hacked” in order to gain that information. For added protection, it is proposed that the central monitoring system would also be devoid of the content of secured documents.
Methods for defeating the “lock” might include cutting it away or bypassing it in order to power the security sleeve electrodes directly. Both methods would require piercing the page. Any obvious physical change to the document would be equivalent to breaking a security seal, making it obvious that the document was compromised. Also according to one embodiment the secure paper includes a fuse that, when it detects voltage between outer layers, it would change color to alert any later user of the document that someone tried to apply voltage directly as opposed to through the electrodes. When a legitimate user inserts the key, the fuse is bypassed by the lock and does not change color.
According to yet another embodiment, a switch is built into the secure paper that shorts out any attempt to apply voltage directly to the ITO layers. Alternatively an IC is specifically programmed to, when voltage is detected, check for the presence of the key and short out the connection if the key is not present. These mechanisms would render the security sleeve as secure as current smartcards.
According to further embodiments, coatings are added to the secure paper that would show attempts at other attacks. Such attacks could be electrical-mechanical, chemical or electromagnetic radiation. Also a mechanism could be added that would trigger the switch described above when such an attack is detected, with the result that the content layer would be left unharmed while the security layer would be permanently opaque.
According to another aspect of the invention, the ePaper printer 510 also serves as the security key 530. That is, when a secured ePaper or a security sleeve is inserted into the ePaper printer 510, the user may enter a code, such as via computer 500 or optional keypad 535 provided on the ePaper printer 510. The computer 500 or ePaper printer 510 would apply the code to the security sleeve. Coding circuitry in the security sleeve would then determine whether the entered code is correct and, if so, enable application of voltage to the security layer to turn it to the transparent state.
Thus, while only certain embodiments of the invention have been specifically described herein, it will be apparent that numerous modifications may be made thereto without departing from the spirit and scope of the invention. Further, certain terms have been used interchangeably merely to enhance the readability of the specification and claims. It should be noted that this is not intended to lessen the generality of the terms used and they should not be construed to restrict the scope of the claims to the embodiments described therein.