Counterfeiting printed materials, such as paper money, coupons, payroll checks, etc. has been going on for a long time. More recently, product packaging, such as is used for packaging counterfeited pharmaceuticals, software, or any other product, has fallen prey to counterfeiting. Typical methods for combating counterfeiting include disposing identifiers, such as watermarks or other patterns that are difficult to print on printed materials for visual inspection, e.g., by people who dispense or receive printed materials, such as salespeople, bank tellers, or the like. The idea here is to detect anomalies in an identifier or the absence of the identifier. However, the people who dispense or receive the printed materials often do not look for such identifiers. Moreover, many identifiers can be copied to a degree that is undetectable by visual inspection.
Various embodiments of the present invention provide apparatus and methods that use print mark data for verifying printed material. One embodiment of the present invention provides a method for producing machine-verifiable printed material. The method includes extracting print-mark data corresponding to a print mark on a hardcopy of printed material from data corresponding to the hardcopy of printed material. The method includes analyzing the print-mark data to quantify printing artifacts of the print mark resulting from printing variations occurring during printing of the hardcopy of printed material. Encrypting the quantified printing artifacts and encoding the encrypted printing artifacts into data corresponding to a machine-readable identifier are also included in the method. The method further includes printing the machine-readable identifier from the data corresponding to the machine-readable identifier on the hardcopy of printed material.
In the following detailed description of the present embodiments, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that process, electrical or mechanical changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims and equivalents thereof.
The images printed on printable media 121 of printed material 120 also include a print mark 124 that includes various printing patterns. The printing patterns include printing artifacts that result from variations (e.g., from print run to print run) occurring during printing of printed material 120, and in particular of print mark 124, by printer 102. For example, the variations can include variations in dot gain, line width, edge acuity, color, optical density, plate variations, plate-to-plate alignment (or registration) variations, etc. Print mark 124 can be a logo, an engineered mark, or printed text. For one embodiment, print mark 124 is designed to accentuate the various printing artifacts. For example, print mark may include a black line on a white background or a white line on a black background for accentuating edge acuity, a checker pattern to accentuate dot gain, a display of multiple bands of the same color in various shades and widths for accentuating color variation, line width, hue shift, and absolute color, etc. For another embodiment, print mark 124 includes regions 1261 to 126N, each for accentuating a different printing artifact.
Image processing system 106 of printing system 100 includes a scanner 108 for scanning a hardcopy of printed material 120. For one embodiment, scanner 108 is electrically connected to a computer 110, such as a mainframe computer, a personal computer (PC), network server, or the like. For another embodiment, computer 110 and scanner 108 are integrated to form a scanning system 111, as shown in
For some embodiments, computer-readable instructions that are supplied to a user of computer 110 on a removable computer-usable medium, such as a compact disc read-only memory (CD-ROM), are, for example, stored on a hard drive of computer 110. The computer-readable instructions cause computer 110 to perform various methods, such as controlling scanner 108 and printer 112. For another embodiment the computer-readable instructions are contained on a static or dynamic random access memory (SRAM or DRAM), electrically-erasable programmable ROM (EEPROM or flash memory), magnetic media, or optical media permanently or removably attached to computer 110.
Scanner 108 includes a scanning unit 117 that converts a hardcopy of printed material 120 into an analog data signal. For one embodiment, scanner 108 has a digitizer 118, such as an analog-to-digital converter, that converts the analog data signal into a digital data signal. The digital data corresponding to printed material 120 is transmitted to computer 110 for processing and analysis. For another embodiment, computer 110 converts the digital data into a printer-usable format, such as a bitmap format, Tag Image File Format (TIFF), Graphics Interchange Format (GIF), etc. For one embodiment, computer 110 converts the digital data corresponding to printed material 120 into gray scale data, such as a gray-scale bitmap.
For one embodiment, the computer-readable instructions cause computer 110 to perform a method 200, as illustrated by the flowchart in
For one embodiment, the computer-readable instructions include position vectors that use a reference mark 134 (
Computer 110 analyzes the print-mark data at block 220 to quantify at least a portion of the print-mark data that corresponds to printing artifacts of print mark 124. For example, computer 110 may quantify dot gain as a percent, line width in inches, edge acuity as a number, etc. For one embodiment, computer 110 converts the data corresponding to the printed material into gray-scale data before analyzing the data. At block 230, computer 110 encrypts the quantified printing artifacts using a private encryption key. Suitable encryption methods include elliptic-key cryptography, RSA (named for its inventors Rivest, Shamir, and Adleman), etc. More specifically, computer 110 converts each of the quantified printing artifacts into a digital representation thereof and then encrypts the digital data.
For another embodiment, the private key is contained in the computer-readable instructions or is generated by the computer-readable instructions. For some embodiments, computer 110 generates a public key that is linked to the private key for decrypting the quantified printing-artifact data encrypted using the private key. For one embodiment, the private and public keys are part of a private/public key (or asymmetric) encryption method. That is, data encrypted with the private key can only be decrypted using the public key and vice versa. For some embodiments, the private and public encryption keys are deactivated after a given period of time, such as a life span of a product.
The encrypted digital data is encoded into data corresponding to machine-readable identifier 152 at block 240. For one embodiment, an electronic representation of a sheet having the same dimensions as printed material 120 is created by computer 110, and the data corresponding to the machine-readable identifier 152 is added to a predetermined location on the blank electronic version corresponding to the predetermined location on printed material 120, e.g., region 139, using the position vectors described above. At block 250, the data corresponding to machine-readable identifier 152 is converted to printer-usable data. For one embodiment, data corresponding to the blank sheet with the machine-readable identifier 152 added thereto is converted to printer-usable data. At block 260, the printer-usable data is sent to printer 112.
For one embodiment, a hardcopy of printed material 120 is fed into printer 112, e.g., from a media tray (not shown) of printer 112 or of image processor 106 when image processor 106 is an integrated unit, and printer 112 prints machine-readable identifier 152 on the hardcopy of printed material 120 to produce machine-verifiable printed material 150. For one embodiment, machine-readable identifier 152 is printed at the predetermined location on printed material 120. For another embodiment, machine-readable identifier 152 is printed adjacent print mark 124, e.g., around periphery 154 of print mark 124 within the region 139. For another embodiment, machine-readable identifier 152 is printed, for example, by infrared or ultraviolet printing and is invisible to the naked eye.
A scanner 300, such as a bar-code scanner, shown in
For some embodiments, computer-readable instructions that are supplied to a user of computer 310 on a removable computer-usable medium, such as a compact disc read-only memory (CD-ROM), are, for example, stored on a hard drive of computer 310. The computer-readable instructions cause computer 310 to perform various methods, such as controlling scanner 300. For another embodiment the computer-readable instructions are contained on a static or dynamic random access memory (SRAM or DRAM), electrically-erasable programmable ROM (EEPROM or flash memory), magnetic media, or optical media permanently or removably attached to computer 310.
Scanner 300 includes a scanning unit 302 that converts machine-verifiable printed material 150 into an analog data signal. For one embodiment, scanner 300 has a digitizer 304, such as an analog-to-digital converter, that converts the analog data signal into a digital data signal. The digital data corresponding to printed material 150 is transmitted to computer 310 for processing and analysis. For one embodiment, computer 310 converts the digital data corresponding to printed material 150 into gray scale data, such as a gray-scale bitmap.
For one embodiment, the computer-readable instructions cause computer 310 to perform a method 400 for checking authenticity of printed material 150, as illustrated by the flowchart in
At block 430, computer 310 extracts encrypted printing-artifact data from machine-readable identifier 152 from the data corresponding to the scanned printed material 150. For some embodiments, scanner 300 includes the position vectors described above for locating machine-readable identifier 152, e.g., within the region 139. At block 440, computer 310 decrypts the print-artifact data, e.g., using the public encryption key discussed above.
At block 450, the decrypted printing-artifact data is compared to the quantified printing artifacts of print mark 124. When the decrypted printing-artifact data matches the quantified printing artifacts, printed material 150 is deemed to be genuine (or authentic). For some embodiments, a match between the decrypted printing-artifact data and the quantified printing artifacts occurs when the decrypted printing-artifact data and the quantified printing artifacts are within a predetermined percentage of each other, e.g. between about 0 and 50 percent of each other. This is because in the case of counterfeit printed material 150, the decrypted printing-artifact data and the quantified printing artifacts are often greater than about 50 percent of each other. When the decrypted printing-artifact data does not match the quantified printing artifacts, printed material 150 is deemed to be counterfeit, and computer 310 indicates that printed material 150 is counterfeit at block 460. For one embodiment, this involves computer 310 issuing a signal indicating that printed material 150 is counterfeit. For some embodiments, the signal is an electrical signal that activates an audible or visual (e.g., lighting of a lamp) alarm at the point-of-sale device. For other embodiments, the signal activates an audible or visual alarm of scanning system 320. For one embodiment, the signal causes the point-of-sale device to display a message indicative of counterfeit printed material.
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement that is calculated to achieve the same purpose may be substituted for the specific embodiments shown. Many adaptations of the invention will be apparent to those of ordinary skill in the art. Accordingly, this application is intended to cover any adaptations or variations of the invention. It is manifestly intended that this invention be limited only by the following claims and equivalents thereof.