The following applications are related and were filed contemporaneously with this application: “PHYSICAL UNCLONABLE FUNCTIONS HAVING MAGNETIC AND NON-MAGNETIC PARTICLES”, “ROTATING MAGNETIC MEASUREMENTS OF PHYSICAL UNCLONABLE FUNCTIONS”, “ROTATING IMAGE MEASUREMENTS OF PHYSICAL UNCLONABLE FUNCTIONS”. “ROTATING POLARIZATION MEASUREMENTS OF PHYSICAL UNCLONABLE FUNCTIONS”, “PHYSICAL UNCLONABLE FUNCTION IMAGED THROUGH TWO FACES”.
1. Field of the Disclosure
The present disclosure relates generally to anti-counterfeit systems and more particularly to physical unclonable functions.
2. Description of the Related Art
Counterfeit printer supplies, such as toner bottles, are a problem for consumers. Counterfeit supplies may perform poorly and may damage printers. Printer manufacturers use authentication systems to deter counterfeiters. Physical unclonable functions (PUF) are a type of authentication system that implements a physical one-way function. Ideally, a PUF cannot be identically replicated and thus is difficult to counterfeit. Thus, it is advantageous to maximize the difficulty of replicating a PUF to deter counterfeiters. It is also advantageous for the PUF and PUF reader to be low cost.
The invention, in one form thereof, is directed to a method of making a security device including mixing a carrier, a plurality of magnetizable particles each having a diameter greater than 25 microns, and a plurality of non-magnetizable particles each having a diameter greater than 100 microns; causing the carrier to become solid; and magnetizing the magnetizable particles. The magnetizable particles have an average diameter of between 50 and 500 microns inclusive and the non-magnetizable particles have an average diameter of between 200 and 2000 microns inclusive.
The invention, in another form thereof, is directed to a method of making a security device including mixing a carrier having a volume of X, a plurality of magnetizable particles having a combined volume Y, and a plurality of non-magnetizable particles having a combined volume Z; causing the carrier to become solid; and magnetizing the magnetizable particles, 0.25*X>Y>0.000005*X and 0.5*X>Z>0.00003*X.
The invention, in yet another form thereof, is directed to a method of making a security device including mixing a carrier, a plurality of magnetizable particles, and a plurality of non-magnetizable particles; causing the carrier to become solid; and magnetizing the magnetizable particles. A ratio of the number of non-magnetic particles to the number of magnetic particles is between 1/10 and 2/1 inclusive.
The accompanying drawings incorporated in and forming a part of the specification, illustrate several aspects of the present disclosure, and together with the description serve to explain the principles of the present disclosure.
In the following description, reference is made to the accompanying drawings where like numerals represent like elements. The embodiments are described in sufficient detail to enable those skilled in the art to practice the present disclosure. It is to be understood that other embodiments may be utilized and that process, electrical, and mechanical changes, etc., may be made without departing from the scope of the present disclosure. Examples merely typify possible variations. Portions and features of some embodiments may be included in or substituted for those of others. The following description, therefore, is not to be taken in a limiting sense and the scope of the present disclosure is defined only by the appended claims and their equivalents.
Referring to the drawings and particularly to
In the example embodiment shown in
Controller 102 includes a processor unit and associated memory 103 and may be formed as one or more Application Specific Integrated Circuits (ASICs). Memory 103 may be any volatile or non-volatile memory or combination thereof such as, for example, random access memory (RAM), read only memory (ROM), flash memory and/or non-volatile RAM (NVRAM). Alternatively, memory 103 may be in the form of a separate electronic memory (e.g., RAM, ROM, and/or NVRAM), a hard drive, a CD or DVD drive, or any memory device convenient for use with controller 102. Controller 102 may be, for example, a combined printer and scanner controller.
In the example embodiment illustrated, controller 102 communicates with print engine 110 via a communications link 160. Controller 102 communicates with imaging unit(s) 300 and processing circuitry 301 on each imaging unit 300 via communications link(s) 161. Controller 102 communicates with toner cartridge(s) 200 and non-volatile memory 201 on each toner cartridge 200 via communications link(s) 162. Controller 102 communicates with fuser 120 and processing circuitry 121 thereon via a communications link 163. Controller 102 communicates with media feed system 130 via a communications link 164. Controller 102 communicates with scanner system 150 via a communications link 165. User interface 104 is communicatively coupled to controller 102 via a communications link 166. Processing circuitry 121 and 301 may include a processor and associated memory such as RAM, ROM, and/or non-volatile memory and may provide authentication functions, safety and operational interlocks, operating parameters and usage information related to fuser 120, toner cartridge(s) 200 and imaging unit(s) 300, respectively. Controller 102 processes print and scan data and operates print engine 110 during printing and scanner system 150 during scanning.
Computer 60, which is optional, may be, for example, a personal computer, including memory 62, such as RAM, ROM, and/or NVRAM, an input device 64, such as a keyboard and/or a mouse, and a display monitor 66. Computer 60 also includes a processor, input/output (I/O) interfaces, and may include at least one mass data storage device, such as a hard drive, a CD-ROM and/or a DVD unit (not shown). Computer 60 may also be a device capable of communicating with image forming device 100 other than a personal computer such as, for example, a tablet computer, a smartphone, or other electronic device.
In the example embodiment illustrated, computer 60 includes in its memory a software program including program instructions that function as an imaging driver 68, e.g., printer/scanner driver software, for image forming device 100. Imaging driver 68 is in communication with controller 102 of image forming device 100 via communications link 70. Imaging driver 68 facilitates communication between image forming device 100 and computer 60. One aspect of imaging driver 68 may be, for example, to provide formatted print data to image forming device 100, and more particularly to print engine 110, to print an image. Another aspect of imaging driver 68 may be, for example, to facilitate the collection of scanned data from scanner system 150.
In some circumstances, it may be desirable to operate image forming device 100 in a standalone mode. In the standalone mode, image forming device 100 is capable of functioning without computer 60. Accordingly, all or a portion of imaging driver 68, or a similar driver, may be located in controller 102 of image forming device 100 so as to accommodate printing and/or scanning functionality when operating in the standalone mode.
Several components of the image forming device 100 are user replaceable e.g. toner cartridge 200, fuser 120, and imaging unit 300. It is advantageous to prevent counterfeiting these user replaceable components. A PUF 202 may be attached to the toner cartridge 200 to prevent counterfeiting as described below. A PUF reader 203 may be integrated into the image forming device 100 to verify the authenticity of the PUF 202. Data related to the PUF 202 may reside in non-volatile memory 201.
The gear 310 is mounted to a body 320 via the shaft 312. A printed circuit board (PCB) 322 is also mounted to the body and contains a non-volatile memory 324 connected to a plurality of contacts 326. The contacts 326 are used by a PUF reader to provide electrical connection to the non-volatile memory 324. The coupling 318 is also mounted to the body 320 and contains a slot 328 used by the PUF reader to couple to the coupling 318. Of course, other interface geometries may be used instead of a slot 328.
The non-volatile memory 324 contains field data corresponding to the magnetic field generated by the magnetic particles 214 as measured along a first circular path 330 centered on the axis of rotation of the gear 310. The first circular path 330 has a radius 332. The non-volatile memory 324 also contains image data of the magnetic particles 214 and non-magnetic particles 212 as viewed from the first circular path 330.
Note that paths that approximate a circular path may be equivalent to a circular path if the resulting measurements are equivalent to measurements taken along a circular path. For example, wobble in the rotation of the gear 310 may cause deviation from a pure circular path that will generate data that is accepted by a PUF reader as authentic.
The field data in the non-volatile memory 324 was measured, for example, by the magnetic field sensor 410 and then written to the non-volatile memory 324. The field data may be computationally adjusted for more efficient computation and comparison before written to the non-volatile memory 324. For example, the field data may be clipped such that measurements below a clip threshold are set to a clip value e.g. set to zero. The magnetic field sensor may, for example, measure the magnetic field in one, two, or more orthogonal directions. Measurements in multiple directions are harder to counterfeit than measurements taken in a single direction. Measurements in a first direction may be used to determine when to clip measurements in a second direction e.g. if, at a given position along a path, the measured magnetic field in a first direction is less than a clip value the field data written to the non-volatile memory 324 corresponding to that position will be set to a clip value for both the first direction and for the second orthogonal direction. This may provide more uniform clipping and may make the PUF reader more repeatable.
The image data in the non-volatile memory 324 was measured, for example, by the image sensor 412 and then written to the non-volatile memory 324. The image data may be computationally adjusted before written to the non-volatile memory 324. The image sensor 412 may be, for example, a point sensor, a linear array of point sensors, a two dimensional array of point sensors, etc. The image data may be generated by illuminating the particles with a first illumination source 422 with light traveling along a first illumination line 424 and then illuminating the particles with a second illumination source 426 using a second illumination line 428. The first illumination line 424 is not the same as the second illumination line 428 such that differences in the rotation of individual particles will result in different image data generated by each illumination source. Thus, a counterfeit would need to reproduce the rotation of each particle. Preferably, some of the particles are flakes having an average thickness that is less than their average diameter to increase the contrast between image data generated by the two illumination sources. As used herein, average refers to number average. For example, average diameter is obtained by summing up the diameters of each particle in a set of particles and then dividing by the number of particles. Some particles may be excluded from a set such as, for example, particles with diameters less than 25 microns.
The field data may be measured while rotating the gear 310 next to a stationary magnetic field sensor 410, by moving the magnetic field sensor 410 next to a stationary gear 310, etc. Similarly, the image data may be measured while rotating the gear 310 next to a stationary image sensor 412, by moving the image sensor 412 next to a stationary gear 310, etc. The field data and the image data may be measured at the same time, measured sequentially, etc. The non-volatile memory 324 may contain field data, image data, or both field data and image data.
The non-volatile memory 324 may contain field data, image data or both field data and image data from more than one path, such as, for example, a second circular path 334 that encloses the first circular path 330. Multiple paths may be stored to allow for variability in the position of sensors in a PUF reader.
The non-volatile memory 324 may contain polarization data related to the angle of polarization of light passed through the gear 310, in addition to or instead of field data and image data. The polarization may be caused by stress-induced birefringence in the gear material, which may contain, for example, polystyrene, polycarbonate, etc. The birefringence modulates the angle of polarization of light passed through regions of the gear 310. The polarization data may correspond to measurements made along a path that encloses axis 420. Birefringence may be caused by the presence of magnetic particles 214, non-magnetic particles 212, circular or non-circular holes in the gear 310 that create stress due to non-uniform cooling during the manufacturing process, etc.
It is preferable to have at least 360 degrees of field data and image data so that the PUF reader may start reading at any position along a path. With this system, an absolute position indicator is not required e.g. an one-per-revolution sensor. Note that the field data in
Measuring field data and image data around a closed path is superior to measuring along a linear path. Multiple passes may be easily measured to tune sensor dynamic range, average readings to reduce noise, etc. Also, it is easier, and thus cheaper, to precisely control rotational motion than linear motion because fewer mechanical tolerances contribute to position inaccuracy.
The cubic region 1000 may be used as a PUF. A PUF reader contains a first image sensor positioned to view the particles through the second face 1008 while a first illumination source 1012 illuminates the particles through the first face 1006 to measure first image data. The first illumination source 1012 is positioned relative to the first face 1006 to minimize any surface reflections bouncing off the first face 1006 and striking the first image sensor 1010. In this example, the first illumination source 1012 is pointed orthogonally at the first face 1006. A second image sensor 1014 is positioned to view the particles through the first face 1006 while a second illumination source 1016 illuminates the particles through the second face 1008 to measure second image data. The PUF reader compares the first image data and the second image data to a master database to verify the authenticity of the PUF. The master database may be stored on a computer server, on a non-volatile memory associated with the PUF, etc. Preferably, the first illumination source 1012 and the second illumination source 1016 are not energized simultaneously to avoid surface reflections corrupting the image data.
At block 1302, a carrier having a volume of X, magnetizable particles having a volume Y, and non-magnetizable particles having a volume Z are mixed. Preferably, 0.25*X>Y>0.000005*X and 0.5*X>Z>0.00003*X to provide a sufficiently strong magnetic field for accurate measurement and provide a sufficiently complex image to prevent counterfeiting. Preferably, 50,000*Y>Z>0.002*Y to provide for both magnetic measurements and image measurements. For example, magnetic particles having a combined volume of 0.01% of the mixture and non-magnetic particles having a combined volume of 0.02% of the mixture are effective in this application. Preferably, the ratio of the number of non-magnetic particles to the number of magnetic particles is between 1/10 and 2/1 inclusive. For example, magnetic particles with an average diameter of 200 microns and non-magnetic particles with an average diameter of 500 microns are effective in this application.
The magnetizable particles may be flakes having an average thickness that is less than an average diameter of the flakes. Images of flakes vary with rotation of the flakes and provide additional complexity to the PUF. Preferably, the magnetizable particles have an average diameter of between 50 and 500 microns inclusive, and the non-magnetizable particles have an average diameter of between 200 and 2000 microns inclusive, to provide a sufficiently strong magnetic field for accurate measurement and provide a sufficiently complex image to prevent counterfeiting. Preferably, the non-magnetizable particles are much larger than the magnetizable particles e.g. the magnetizable particles have a first average diameter, the non-magnetizable particles have a second average diameter, and the second average diameter is at least twice as large as the first average diameter. This helps to reduce cost since smaller magnetic particles require less magnetic material and the larger non-magnetic particles are easier for an image sensor to measure. Preferably, the non-magnetizable particles are reflective to generate high contrast images and may include a low-cost metal such as aluminum. The magnetizable particles may contain neodymium and iron and boron. Alternatively, the magnetizable particles may contain samarium and cobalt. Preferably, the magnetic particles each have a diameter greater than 25 microns so they generate a sufficiently strong magnetic field to be detected with a low-cost detector.
At block 1304, the method causes the carrier to become solid. The carrier may be, for example, a liquid that is caused to become solid by adding a chemical, subjecting to ultraviolet light, increasing its temperature, etc. Alternatively, the carrier may be, for example, grains that are sintered. Causing the carrier to become solid locks the distribution and orientation of the particles.
At block 1306, the magnetizable particles are magnetized by, for example, subjecting the particles to a strong magnetic field. It is preferable to magnetize the particles after the carrier is caused to become solid to prevent the particles from clumping together due to magnetic attraction. Alternatively, if suitable substrate materials are used that allow unformed aggregate pellets of the substrate material, magnetic particles and optical particles to be magnetized and later formed, the magnetic field orientation of the magnetic particles may be more random, and therefore more difficult to clone. Further, the application of a magnetizing field with patterned or randomized orientation may be applied to a formed substrate in order to cause greater diversity of magnetic field orientation.
At block 1402, a non-volatile memory device is attached to a body. At block 1404, a substrate is attached to the body, the substrate is configured to rotate about an axis and contains a plurality of magnetic particles. At block 1406, first magnetic field data is generated by measuring along a first circular path centered on the first axis a first magnetic field generated by the magnetic particles. At block 1408, second magnetic field data is generated by measuring along a second circular path centered on the first axis a second magnetic field generated by the magnetic particles, the second circular path encloses the first circular path. At block 1410, first image data of the magnetic particles is generated as viewed along the first circular path.
At block 1412, the first magnetic field data, the second magnetic field data, and the first image data are encrypted. At block 1414, the encrypted first magnetic field data, the encrypted second magnetic field data, and the encrypted first image data are written to the non-volatile memory device. Encryption prevents a counterfeit authentication device from fooling a PUF reader by presenting data measured from counterfeit particles stored in a non-volatile memory device. A counterfeit authentication device must correctly encrypt the data or the PUF reader will not be fooled. Encrypting data may include obscuring all the data, obscuring only some of the data, cryptographically signing the data, etc.
Blocks need not be performed in the example order given. For example, blocks 1406, 1408, and 1410 may occur before or after block 1402.
At block 1502, a non-volatile memory device is attached to a body. At block 1504, a substrate is attached to the body, the substrate is configured to rotate about an axis, is non-opaque, and contains a plurality of particles. At block 1506, first image data of the particles is generated as viewed from a first circular path centered on the axis illuminated using a first illumination line, the first image data corresponds to at least 360 degrees around the first circular path. At block 1508, second image data of the particles is generated as viewed from the first circular path illuminated using a second illumination line, the second image data corresponds to at least 360 degrees around the second circular path.
At block 1510, encrypted image data is generated by encrypting the first image data and the second image data. At block 1512, encrypted image data is written to the non-volatile memory device. As discussed above, encrypted data makes the authentication device more difficult to counterfeit.
The foregoing description illustrates various aspects and examples of the present disclosure. It is not intended to be exhaustive. Rather, it is chosen to illustrate the principles of the present disclosure and its practical application to enable one of ordinary skill in the art to utilize the present disclosure, including its various modifications that naturally follow. All modifications and variations are contemplated within the scope of the present disclosure as determined by the appended claims. Relatively apparent modifications include combining one or more features of various embodiments with features of other embodiments.
Number | Name | Date | Kind |
---|---|---|---|
3675367 | Amburn | Jul 1972 | A |
3772200 | Livesay | Nov 1973 | A |
4190548 | Baermann | Feb 1980 | A |
4218674 | Brosow | Aug 1980 | A |
4462919 | Saito | Jul 1984 | A |
4734695 | Goldman | May 1988 | A |
5424917 | Hiruta | Jun 1995 | A |
5451759 | Hoshino | Sep 1995 | A |
5792380 | Wen | Aug 1998 | A |
5857129 | Harris | Jan 1999 | A |
5958283 | Schmid | Sep 1999 | A |
5981053 | Naylor | Nov 1999 | A |
6063647 | Chen | May 2000 | A |
6432559 | Tompkins | Aug 2002 | B1 |
6812707 | Yonezawa | Nov 2004 | B2 |
7218589 | Wisnudel | May 2007 | B2 |
7353994 | Farrall | Apr 2008 | B2 |
7427020 | Haraszti | Sep 2008 | B2 |
7704438 | Barlog | Apr 2010 | B2 |
7865722 | Moran | Jan 2011 | B2 |
8421625 | Cowburn | Apr 2013 | B2 |
8497983 | Cowburn | Jul 2013 | B2 |
8502668 | Cowburn | Aug 2013 | B2 |
8742891 | Greene | Jun 2014 | B2 |
9454125 | Bejat et al. | Sep 2016 | B1 |
9502356 | Parvarandeh | Nov 2016 | B1 |
9524456 | Ahne | Dec 2016 | B1 |
9542576 | Ahne | Jan 2017 | B1 |
9665748 | Ahne | May 2017 | B1 |
20010033012 | Kommerling | Oct 2001 | A1 |
20020021909 | Harumoto | Feb 2002 | A1 |
20030040129 | Shah | Feb 2003 | A1 |
20030059050 | Hohberger | Mar 2003 | A1 |
20040114944 | Urabe | Jun 2004 | A1 |
20050017082 | Moran | Jan 2005 | A1 |
20050111342 | Wisnudel | May 2005 | A1 |
20050116307 | DeJongh | Jun 2005 | A1 |
20050258962 | Phipps | Nov 2005 | A1 |
20060056021 | Yeo | Mar 2006 | A1 |
20070199991 | Haraszti | Aug 2007 | A1 |
20070222604 | Phipps | Sep 2007 | A1 |
20080052518 | Newton | Feb 2008 | A1 |
20090061226 | Banin | Mar 2009 | A1 |
20090141410 | Jogo | Jun 2009 | A1 |
20090218401 | Moran | Sep 2009 | A1 |
20100038598 | Bastiaansen | Feb 2010 | A1 |
20100061772 | Hayashi | Mar 2010 | A1 |
20100196056 | Ohkawa et al. | Aug 2010 | A1 |
20100215406 | Ozawa | Aug 2010 | A1 |
20100219251 | Decoux | Sep 2010 | A1 |
20110038649 | Miyabe | Feb 2011 | A1 |
20110099117 | Schepers | Apr 2011 | A1 |
20110121498 | Irie | May 2011 | A1 |
20110229211 | Ohashi | Sep 2011 | A1 |
20110234346 | Honkura | Sep 2011 | A1 |
20120020678 | Wilsher | Jan 2012 | A1 |
20120076543 | Rapkin | Mar 2012 | A1 |
20120104097 | Moran | May 2012 | A1 |
20120163872 | Hayashi et al. | Jun 2012 | A1 |
20130029112 | Bargin | Jan 2013 | A1 |
20140014715 | Moran | Jan 2014 | A1 |
20140270857 | Harpur | Sep 2014 | A1 |
20150071432 | Zhu | Mar 2015 | A1 |
20160105220 | Kim et al. | Apr 2016 | A1 |
20160245878 | Hwang et al. | Aug 2016 | A1 |
Number | Date | Country |
---|---|---|
04257203 | Sep 1992 | JP |
2013139536 | Sep 2013 | WO |
Entry |
---|
Roel Maes, Ingrid Verbauwhede, “Physically unclonable functions: A study on the state of the art and future research directions”, article, 2010. |
Pappu Srinivasa Ravikanth, “Physical One-Way Functions”, thesis, 2001. |
“About Bonded Neo Powders”, Magnequench Technical Resource Website, https://mqitechnology.com/support-contact/history, Revised 2017, Accessed Jun. 22, 2019 (Year: 2017). |
Material Safety Data Sheet for MQP-B by Magnequench, Revised Jun. 2, 2017 (Year:2017). |
USPTO Non-final Office action, U.S. Appl. No. 15/809,081 dated May 15, 2019. |
Number | Date | Country | |
---|---|---|---|
20170103834 A1 | Apr 2017 | US |