Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
Documents may be reproduced by copying, scanning, or otherwise imaging the documents and printing a reproduction based on the captured image. Some documents have an associated tangible value, such as documents used to negotiate transactions, including financial documents, checks, currency, certificates of deposit, titles to property, coupons, certificates, and so on. Authenticating such documents may include determining whether a document is an authentic original or an unauthorized reproduction. Unauthorized reproductions may also be referred to as forged or counterfeit documents.
A variety of printing technologies can be used to create printed documents, including intaglio printing processes, offset printing processes, laser jet or ink jet printing technologies in order to arrange ink, toner, or another dye on a document substrate in accordance with a specified pattern.
An authenticity-indicating region of a printed document includes a latent image printed with a field of regularly spaced shapes printed using a high carbon-content ink. The shapes are arranged at a line frequency less than about 50 per inch. The combination causes the latent image to become apparent in a reproduction made using a typical archival scanner that scans documents at a resolution of 72 dots per inch, for example. A non-authentic reproduction can be identified by both appearance of the latent image, and deformation of the individual regularly spaced printed shapes. For instance, corners of the squares may be rounded or otherwise malformed in reproductions.
In some examples, a document may be authenticated using a computer-implemented system that obtains an image of a document and analyzes the image to determine whether the document is authentic. The computing system may include image analysis modules that are configured to determine whether the individual shapes in the latent image region correspond to an original version of the document or a reproduction thereof. For instance, the computing system may estimate a degree of deformation of the shapes and then determine whether the document is authentic based on the degree of deformation. The degree of deformation may be based, for example, on a degree of correspondence between a shape in the imaged document and a shape used when creating an original version of the document.
The accompanying drawings, which are incorporated into this specification, illustrate one or more example embodiments disclosed herein and, together with the detailed description, serve to explain the principles and example implementations of the present disclosure. One of skill in the art will understand that the drawings are illustrative only, and that what is depicted therein may be adapted based on the text of the specification and the spirit and scope of the teachings herein.
In the following detailed description, reference is made to the accompanying figures, which form a part hereof. In the figures, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, figures, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the scope of the subject matter presented herein. It will be readily understood that the aspects of the present disclosure, as generally described herein, and illustrated in the figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.
One approach for identifying unauthorized reproductions is to configure a document with latent images that are not readily apparent in the original, but which become apparent in a reproduction. Some latent images can be rendered in patterns that are not readily apparent on an original, but which are differentially reproduced via scanning technologies relative to a background surrounding the latent image. The appearance of the latent image on a reproduction of the original document thus provides a visual cue that the document being examined is not authentic. Similarly, lack of appearance of such a latent image (i.e., on a document in which latent images, if present, are not readily apparent) provides a visual cue that the document being examined is authentic.
Disclosed herein are certain printed patterns for arranging printed elements on a substrate to form a latent image. The pattern is arranged such that the latent image becomes apparent in a reproduction of the original document, but is substantially indistinguishable from the surrounding areas of the document in an original version of the document. Such reproduction-apparent latent images are also referred to herein as authenticity-indicating printed features (or reproduction-altered printed features), because a document bearing a visually distinctive rendering of such a latent image can thereby be readily identified as a reproduction as opposed to an original version, and thus authentic version.
An intermediate view 130 of a portion of the latent image 120d shows a “Y” character 122. The “Y” character 122 is surrounded by the background setting 110. The “Y” character 122 is illustrated for purposes of explanation and understanding in the intermediate view 130 by a cross-hatched pattern that at least approximately complements the visual appearance (e.g., as influenced by color, tint, print density, etc.) of the background setting 110.
A. Latent Image Including Regularly Spaced Printed Shapes
An enhanced view 140 illustrates a portion of the “Y” character 122. As shown in the enhanced view 140, the “Y” character is formed by a two-dimensional array of regularly spaced shapes 150a-f. Each of the shapes 150 can be substantially identical. The shapes 150 are illustrated by way of example as four-sided shapes, and in particular as square shapes. However, shapes with alternative geometries may be employed, such as circles, triangles, pentagons, hexagons, etc. An example square shape 150 has a top side 152, an opposing bottom side 156 that is substantially parallel to the top side 152, and two substantially parallel opposing sides 158, 154 that connect the top side 152 and bottom side 156, respectively. The sides 152-158 of the square shape 150 meet at four perpendicular corners (e.g., the right-angle corner 151). Other shapes may have corners other than right-angle corners, such as corners on stars, hexagons, triangles, pentagons, etc. Additionally or alternatively, shapes occupying the region of the latent image can include other high spatial-frequency features other than corners, such as points, curves, etc. Such corners and/or other high spatial frequency features provide an additional authenticity-identifying feature similar to micro-printing, because fine, detailed, and/or high spatial frequency features of such shapes are not precisely and/or accurately rendered in a reproduction of the original. As such, a reproduction can be identified as non-original by examining distortions and/or deformations in corners and/or other fine features of the shapes in the region occupied by the latent image. For instance, in a reproduction at least one of the shapes can be compared with a shape associated with an original version of the document (i.e., a precisely formed square such as example shape 150). The extent of deviation from the precise square shape, in the analyzed reproduction, can be used as a basis for determining whether the analyzed document is an authentic original or a reproduction. These effects are discussed further in connection with
B. Spatial Frequency of Printed Shapes
The shapes 150a-f can be arranged in a regularly spaced two-dimensional array. For example, adjacent ones of the shapes 150a-f can be separated by the same amount both vertically and horizontally (e.g., the shapes 150a, 150d can be separated by the same distance as the shapes 150a, 150b). In some examples, the arrangement of shapes can be spaced apart from one another with a spatial frequency of about 45 shapes per inch (18 per centimeter). In some examples, the arrangement of shapes can be spaced apart from one another with a spatial frequency between about 40 shapes per inch and about 50 shapes per inch (16 per centimeter and about 20 per centimeter). In some examples, the arrangement of shapes can be spaced apart from one another with a spatial frequency less than about 65 shapes per inch (26 shapes per centimeter). As used herein, “shapes per inch” refers to the number of shapes encountered along a straight line with a length of one inch. The inter-element spacing (e.g., the distance between a common point on two adjacent ones of the shapes 150a-f, which is labeled dSPACE on
The region between the shapes 150a-f in the latent image can be a non-printed region. Separating the individual shapes 150a-f by non-printed regions (e.g., regions absent of any printed elements) increases the contrast between the individual shapes 150a-f and the immediately surrounding region that separates the shapes 150a-f from one another.
In some examples, the spatial frequency of the shapes 150a-f is selected to be below a typical scanning frequency of a low-resolution scanner, such as an archival scanner that samples scanned documents at about 72 dots per inch (28 dots per centimeter). By employing a spatial resolution less than the spatial sampling frequency of an archival scanner, the pattern of shapes 150a-f can be detected by an archival scanner. By contrast, printed authentication features that use arrangements of printed elements arranged with a spatial frequency greater than an archival scanner, (e.g., line screen patterns with line frequencies greater than about 100) may be substantially ignored by such a low-resolution scanner, because the resolution forces the scanner to integrate over fine features, and authenticity-indicating functionality may therefore fail to perform on such scanners (e.g., printed patterns which are differentially reproduced when scanned at 300 dpi may not be differentially reproduced at 72 dpi, because the line screen patterns responsible for the differential reproduction are simply integrated over by the low resolution scanner).
C. High-Carbon Content Ink, Toner, or Dye
In examples in which the shapes 150a-f are printed with ink, the ink can be an ink with a relatively high carbon content, or another additive that prevents the dye in the ink from being diluted by being absorbed into the substrate of the document 100. With reference to the PANTONE® Color Guide, one such example black is 908. The black ink desirably includes sufficient carbon (or another additive) to prevent at least some of the ink disposed on the substrate from readily absorbing into the paper fiber substrate of the document 100. For example, the carbon content can cause at least some of colored solvent in the water-based ink to be disposed on the surface of the paper substrate, rather than absorbed into the paper fibers. Because the ink disposed on the surface of the substrate is not diluted due to the absorption, the resulting pattern of printed shapes has a high contrast with the immediately surrounding area (e.g., the region between the printed shapes 150a-f).
Another exemplary black is black magnetic toner used to print Magnetic Ink Character Recognition (MICR) such as on banking numbers along the bottom of checks, for example. Similar to high carbon-content ink, at least some of the MICR ink or toner is not readily absorbed into the fibers paper-based substrate due to iron content (or other metallic/magnetic additive). In either case, the additive prevents at least some of the ink/toner from being absorbed into the paper and results in a top coating of non-absorbed ink/toner residing on the surface of the substrate of the document 100. Printing with an ink having carbon, metal, and/or magnetic additives thereby results in a pattern with high contrast relative to the immediately surrounding region of the arrangement of shapes (e.g., the region between the shapes 150a-f).
The ink is also a color that maximizes contrast with the area surrounding the printed shapes 150a-f, which may be a non-printed region. Thus, on white paper, the ink is preferably black, but may be another dark color, such as a blue, green, purple, red. In some examples, the area between the printed shapes 150a-f may be printed with one or more inks, toners, or dyes that are different from the high carbon content ink. In practice, if any print elements are included in the region between the regularly spaced shapes 150a-f, such print elements are rendered in a color and/or ink that provides a high degree of contrast with the ink used for the printed shapes 150a-f. In some examples, the ink is selected such that an archival black/white scanner perceives regions printed with the ink as black. Such a scanner may also perceive regions (e.g., surrounding areas) as white.
D. Print Density
The print density of the latent image (e.g., the “Y” character 122) is determined, at least in part, by the relative size of the shapes and the space in between the shapes. For example, the sides of the square shape 150 may have a length dimension dSQ, and may be separated from adjacent squares by the distance dSEP, as shown in
In some cases, rather than regularly spaced individual shapes, a pattern of regularly spaced substantially parallel line segments can occupy a region to create a latent image that is reproduced differentially relative to the background 110. The pattern of regularly spaced, substantially parallel line segments can be referred to herein as a line screen pattern. In some examples, a line screen pattern may have lines with thickness in a range from about 0.001 inches to about 0.003 inches (25 micrometers to 76 micrometers). In some examples, a line screen pattern may have lines with thickness in a range from about 0.001 inches to about 0.0035 inches (25 micrometers to 89 micrometers). The lines may be separated by an inter-line separation distance of about 0.013 inches (330 micrometers), for example. In some examples, the inter-line separation distance may be in a range from about 0.010 inches to about 0.016 inches (254 micrometers to 406 micrometers). In some examples, the inter-line separation distance may be in a range from about 0.010 inches to about 0.020 inches (254 micrometers to 508 micrometers). In an example with line screen patterns with line frequencies of about 70-80 lines per inch (28-31 lines per centimeter) can be selected to provide a complementary print density to the arrayed shape patterns discussed herein, a 10% print density can be achieved by lines having thickness of 0.001 inches (25 micrometers); a 12% print density can be achieved by lines having thickness of 0.002 inches (51 micrometers); a 15% print density can be achieved by lines having thickness of 0.0025 inches (64 micrometers); and a 20% print density can be achieved by lines having thickness of 0.003 inches (76 micrometers). Other examples are also possible, including examples at other line frequencies, line thicknesses, and/or at other print densities, although similar scaling relationships and dimension tradeoffs may be encountered with respect to line thickness and print density. The complementary print densities of the line screen patterns can then be included on the same document 100 as the pattern of regularly spaced shapes forming the latent image without the latent image being readily distinguishable from the background.
E. Background Setting
For purposes of facilitating explanation and understanding only, the background setting 110 is illustrated in
The background setting may also include an arrangement of distributed printed dots, which may be distributed in random or pseudo random fashion so as to have print densities similar to print densities of the shape pattern and/or line screen patterns included on the document. The similar print density of such a dot pattern thereby creates a visually integrated background setting for the latent images 120a-d. For example, the background setting 110 may include dots with diameters of about 0.002 inches (51 micrometers) that are distributed to be separated from one another by about 0.006 inches (152 micrometers). In some cases, the inter-element spacing of about 0.006 (152 micrometers) inches may be an average inter-element spacing between nearest neighbors in a pseudo-randomly distributed field of printed dots. In an example with a dot pattern selected to provide a complementary print density to the arrayed shape patterns discussed herein, a 10% print density can be achieved by dots having diameters about 0.002 inches (51 micrometers); a 12% print density can be achieved by dots having diameters about 0.002 inches (51 micrometers); a 15% print density can be achieved by dots having diameters about 0.0025 inches (64 micrometers); and a 20% print density can be achieved by dots having diameters about 0.003 inches (76 micrometers). Other examples are also possible, including examples at other spatial frequencies, dot sizes, and/or at other print densities, although similar scaling relationships and dimension tradeoffs may be encountered with respect to line thickness and print density.
The background setting 110 may or may not overlap with the region forming the latent images 120a-d (e.g., the region forming the “Y” character in
Further, as noted above, the background setting 110, in which the latent images 120a-d are embedded, may or may not occupy the entirety of the document 110. In particular, the background setting 110, and one or more latent images, which together form an authenticity-indicating printed feature may be included on a particular region of the document 100 that is less than the entire printable surface, such as a border, a defined section, or a more than one non-continuous regions of the document 100.
As noted above, the printed authenticity-indicating features can be used to distinguish between an original, and thus authentic, document, and a non-original reproduction of such document. In practice, the authenticity-indicating features described in connection with
A. Readily Distinguishable Latent Image(s)
B. Distinguishable by Deformation of Spaced Printed Shapes
Similarly, observing accurately formed corners and/or other fine features of the shapes 150a-f in the original document 100 can thus allow for the document 100 to be authenticated as an original. The authentication process can be similar to that used to authenticate a document on the basis of the presence of micro-printed text, which is not accurately reproduced. Authentication may require use of a magnifying visual aid in some cases.
At block 302, an image of a document can be obtained. For example, a document may be imaged using a flat bed scanner, a pass-through scanner that detects reflected light from the document using an array of light-sensitive elements. Alternatively, the document may be imaged using a device equipped with a camera, such as a mobile device (e.g., smart phone), a hand-held camera, a camera incorporated in a laptop computer, a hand-held scanner used in a retail environment for scanning/recognizing coded items, or another device operable to generate a digital representation of the document by measuring light reflected from the document and incident on a light-sensitive electronic array. In some examples, a hand-held mobile device or scanner may be used to image the document and generate the digital image.
At block 304, a region of the obtained image with the printed authentication feature can be identified based in part on a spatial frequency analysis of printed features on the imaged document. In some cases, such as examples in which an image is obtained from a hand-held scan, an image processing system may identify, within the obtained image, the document (e.g., using edge detection of edges of the document, pattern recognition of particular printed features, etc.). The image processing system can then characterize the spatial frequency of printed features amongst different regions of the imaged document. The spatial frequency analysis may involve, for example, segmented spatial frequency analysis of the printed features of the document (e.g., Fourier analysis of printed features, etc.). The printed authentication feature may then be identified based on one (or more) of the analyzed region(s) having a spatial frequency corresponding to a spatial frequency of printed shapes/lines used in printing the printed authentication feature.
In some cases, the spatial frequency analysis (and printed authentication feature identification) may involve a pattern recognition analysis in which a particular region of the document is identified that includes printed shapes and/or lines that are regularly spaced in an arrangement similar to the arrangement of printed elements in the latent image regions 120a-d of the authenticity-indicating feature, for example. Thus, the image processing system may be configured to search for a particular pattern/arrangement of printed elements/shapes that correspond to the latent image region used for a particular authenticity-indicating feature (e.g., an array of regularly spaced shapes of a given size and spacing).
At block 306, the shapes of individual printed features in the printed authentication feature depicted in the identified region are compared with corresponding shapes in an original version of the document. For instance, the computing system may estimate a degree of correspondence between the shapes in the identified region of the image, and the original shapes. In an example in which the regularly spaced shapes in the original document are squares, block 306 may involve determining a degree of deformation from the square shape for one or more of the shapes in the identified region. The comparison of block 306 may be focused, in particular, on finely detailed and/or high-frequency aspects of the regularly spaced shapes on the original version of the document. For example, the comparison may involve comparing the corners of the shapes and/or estimating a degree of deformation of the corners of the shapes in the identified region of the image. Estimating the degree of deformation (or degree of correspondence) may involve, for example, evaluating a percentage and/or number of deformed corners or other high-frequency features amongst the printed shapes. A given feature may be determined to be deformed if the computing system determines a given portion of the imaged shape (e.g., a corner) lacks more than a threshold amount of printed surface area, when compared to an original version of the shape. For instance, at least some of the deformed/rounded corners of the shapes 250a-f depicted in
At block 308, the computing system can determine whether the document is authentic based on the comparison between the shapes. For example, the computing system may evaluate a degree of correspondence between the shapes in the identified latent image region and the shape of regularly spaced printed shapes included in an original version. The authenticity determination can then be based on the degree of correspondence exceeding a threshold or not. Moreover, in some cases, the authenticity determination may be based on multiple factors related to the comparison of block 306 (e.g., a total number or percentage of deformations and an average degree of those deformations exceeding a threshold).
Once the authenticity determination is made in block 308, an indication of that determination can be generated by the computing system. The generated indication can then be used to provide an output to a user of the computer-implemented authentication system, for example. In some cases, data indicative of the generated indication may be encoded in a data transmission and transmitted to another computing system, or data indicative of the generated indication may be communicated by a user interface system (e.g., a display, etc.).
The authentication computing system 410 can be in communication with the image capture device 402 (to receive captured images). The authentication computing system 410 may perform one or more of the functions described in connection with
The user interface 408 is also in communication with the authentication computing system 410 and may function to receive inputs from users (e.g., an indication to initiate an authentication process) and also provide outputs to users (e.g., providing an indication of authenticity of a given document following performance of an authentication process). Thus, the user interface may include one or more user input devices, such as monitors, touchscreens, voice inputs, buttons, etc., and also one or more user output devices, such as speakers, displays, haptic feedback systems, indicator lights, etc. In some examples, the user interface may include a display system that displays indications of whether or not a given is document following completion of an authentication process using the authentication computing system 410.
As shown in
In some examples, the background surrounding the latent image (e.g., the background setting 110) can include additional anti-counterfeiting features, such as a field that includes a latent image in a visually integrated background setting. The latent image can be embedded in the background setting and indistinguishable from the background in an original printed version of the document. In some embodiments, the latent image can be distinguishable in a reproduction of the original printed version so as to verify an authenticity to an original printed version of the document by distinguishing the original printed version from the reproduction. In some embodiments, the latent image can be distinguishable in an original printed version of the document via a specialized viewer or visual aid configured to differentially interfere with the latent image or the background surrounding the latent image. The latent image can be indistinguishable in a reproduction of the original printed version so as to provide authenticity to the authenticated registration document by distinguishing the original printed version from the reproduction. In some embodiments, the latent image and/or the integrated background setting can be composed of line-screen patterns of printed elements oriented with selected line frequencies, print densities, colors, etc. to achieve the desired effects. Furthermore, the specialized viewer or visual aid can have a characteristic line frequency corresponding to a line frequency of a line screen pattern of the latent image or the background such that the latent image is distinguishable from the background in the original printed version by differential interference patterns between the latent image and the background. Examples of some embedded security features are disclosed, for example, in commonly assigned U.S. patent application Ser. No. 11/839,657, filed Aug. 16, 2007, published as U.S. Patent Publication No. 2008/0048433 on Feb. 28, 2008, and issued as U.S. Pat. No. 8,444,181, issued May 21, 2013; U.S. patent application Ser. No. 11/744,840, filed May 5, 2007, and published as U.S. Patent Publication No. 2007/0257977 on Nov. 8, 2007; and U.S. patent application Ser. No. 11/495,900, filed Jul. 31, 2006, and published as U.S. Patent Publication No. 2007/0029394, the contents of each of which are hereby incorporated herein by reference in their entireties.
Accordingly, in some embodiments, the background of the printed pattern forming the latent image is a reproduction altered security feature. As used herein, the term “reproduction altered” is used to describe a printed field having a foreground and a background which, when reproduced, causes the foreground and background to be altered with respect to one another in the reproduction relative to their relationship in an original version of the printed field. Thus, the inability to distinguish the latent image from the visually integrated setting can indicate an original, whereas distinguishing the latent image from the visually integrated setting can indicate a reproduction, which may therefore be an unauthorized copy (e.g., a counterfeit or unauthentic document).
Such a background surrounding the printed pattern forming the latent image and including an embedded security feature itself thus provides a multi-layered anti-counterfeiting feature. For example, in addition to the square pattern latent image described herein, which operate particularly well at relatively low scanning frequencies such as employed by archival scanners (e.g., 72 dpi), additional authenticity-indicating features can be included that are tuned or are otherwise known to be performant at other scanning frequencies (e.g., 300-600 dpi). For example, some reproduction devices, copy machines, etc., may indicate a counterfeit document by one of the authenticity-indicating features being activated, but not another. As a result, the integrated multi-layered anti-counterfeiting feature can result in activation of at least one of several authenticity-indicating features across a broad range of scanners, copiers, and other reproduction technologies, including those that operate at different scanning resolutions. The latent image and/or the background setting can be rendered as, for example, one or more line screen patterns that are distinguishable in a copy and can include characters to spell out a warning phrase, such as, for example, “Unauthorized Copy,” “Void,” etc.
In some embodiments, an embedded security feature in the background and/or printed pattern forming latent image(s) described herein can include a latent image that is not readily distinguishable from its surrounding background in an original printed version, but which becomes distinguishable in a reproduction of the original. As used herein, a reproduction generally refers to a physical copy of an original printed document reproduced using optical scanning technologies. In some embodiments, the embedded security feature can include a latent image that is not readily distinguishable from its surroundings in an original printed version, but which becomes distinguishable in an electronic display (“visual facsimile”) of an optically scanned version of the original printed document.
In some embodiments, the elements in the security pattern can be printed with ultraviolet (UV) or infrared (IR) inks (i.e., inks configured to selectively reflect or emit UV or IR light). Some photocopiers and other digital reproduction devices have been found to be sensitive to UV and/or IR inks and anti-copying features have been activated in at least some digital reproduction devices by security patterns printed with UV and/or IR inks
According to some embodiments, elements of this disclosure may be used to authenticate a variety of documents and related products, including but not limited to the following: protection/secondary authentication of product codes on product packaging (such as verification of destination country for pharmaceutical products), authentication of unique or expensive goods (such as signed memorabilia), control of imports/exports (such as for luxury goods commonly counterfeited), warehouse management and tracking (such as the destination information and expiration date of perishable items), authentication of important documents such as ID cards or title documents, verification of promotional materials or gaming tickets, identification of product recalls, and many other applications relying on the authentication, via a smart device, of hidden security information within a document.
Many functions described herein may be implemented in hardware, firmware, or software. Further, software descriptions of the disclosure can be used to produce hardware and/or firmware implementing the disclosed embodiments. According to some embodiments, software and/or firmware may be embodied on any known non-transitory computer-readable medium having embodied therein a computer program for storing data. In the context of this disclosure, computer-readable storage may be any tangible medium that can contain or store data for use by, or in connection with, an instruction execution system, apparatus, or device. For example, a non-volatile computer-readable medium may store software and/or firmware program logic executable by a processor to achieve one or more of the functions described herein in connection with
In view of the exemplary systems described above, methodologies that may be implemented in accordance with the described subject matter will be better appreciated with reference to the various figures. For simplicity of explanation, the methodologies are depicted and described as a series of acts. However, acts in accordance with this disclosure can occur in various orders and/or concurrently, and with other acts not presented and described herein. Furthermore, not all illustrated acts may be required to implement the methodologies in accordance with the disclosed subject matter. In addition, those skilled in the art will understand and appreciate that the methodologies could alternatively be represented as a series of interrelated states via a state diagram or events. Additionally, it should be appreciated that the methodologies described in this disclosure are capable of being stored on an article of manufacture to facilitate transporting and transferring such methodologies to computing devices.
Although some of various drawings illustrate a number of logical stages in a particular order, stages which are not order dependent can be reordered and other stages can be combined or broken out. Alternative orderings and groupings, whether described above or not, can be appropriate or obvious to those of ordinary skill in the art of computer science. In addition, some logical stages may be omitted entirely in a given implementation. Moreover, it should be recognized that the stages could be implemented in hardware, firmware, software or any combination thereof.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to be limiting to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the aspects and its practical applications, to thereby enable others skilled in the art to best utilize the aspects and various embodiments with various modifications as are suited to the particular use contemplated.
This application claims priority to U.S. Provisional Patent Application No. 61/834,799, filed Jun. 13, 2013, which is incorporated herein by reference in its entirety and for all purposes.
Number | Date | Country | |
---|---|---|---|
61834799 | Jun 2013 | US |