Secure tag validation

Information

  • Patent Application
  • 20070267581
  • Publication Number
    20070267581
  • Date Filed
    May 17, 2006
    18 years ago
  • Date Published
    November 22, 2007
    17 years ago
Abstract
A device for validating a secure tag comprises: an optical source (such as one or more LEDs); a processor coupled to the optical source for controlling emissions therefrom; and a luminescence detector coupled to the processor. The processor is programmed to control the optical source to create a first and a second pulse sequence having first and second excitation parameters respectfully. The processor is also programmed to control the luminescence detector to measure first and second luminescence in response to the first and second pulse sequences respectively. The processor is programmed to validate the secure tag in the event that the first and second luminescence meet an acceptance criterion. A method of validating a secure tag is also described.
Description

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings:



FIG. 1 is a prior art Jablonski energy diagram provided as background information;



FIG. 2 is a schematic diagram of a secure tag reader according to one embodiment of the present invention;



FIGS. 3A and 3B are two graphs illustrating differential rates of saturation from an excited state (the S1 excited state) to an intermediate state (the T1 state) for two different lanthanide ions;



FIG. 4 is a schematic diagram of a banknote incorporating a secure tag for validation by the reader of FIG. 1; and



FIG. 5 is a flowchart illustrating steps involved in validating the banknote of FIG. 4 using the reader of FIG. 1.





DETAILED DESCRIPTION

Reference is first made to FIG. 2, which is a schematic diagram of a secure tag reader 100 according to one embodiment of the present invention.


The reader 100 is a fixed position unit and comprises a housing 102 in which an optical excitation source 104 is mounted. The optical excitation source 104 is in the form of a pair of LEDs circumferentially spaced around a collecting lens 108, diametrically opposite each other. The LEDs emit at approximately 395 nm, which is visible to the human eye and corresponds to the deep blue region of the electromagnetic spectrum, and have a power of approximately 8 mW.


A Fresnel lens 110 is mounted at a window in the housing 102 to focus radiation (illustrated by arrows 112) from the excitation source 104 onto a focus spot (illustrated by broken line 114) at which a group of secure tags 116 will be located.


Luminescence emitted from the secure tags 116 (illustrated by broken arrows 118) is directed by the Fresnel lens 110 onto the collecting lens 108, which in turn focuses the luminescence onto a luminescence detector 120, which is an imaging sensor in the form of a CCD sensor.


The CCD sensor 120 is coupled to a controller 122, comprising a processor 124 and non-volatile memory (NVRAM) 126.


The processor 124 receives intensity data from the CCD sensor 120 and processes this data to validate the secure tags 116, as will be described in more detail below.


The NVRAM 126 stores: a processing algorithm 128, a parameter information file 130, and pre-stored luminescence signatures 132.


The processing algorithm 128 is used by the processor 124 to derive luminescence signatures from measured luminescence, and to compare the derived luminescence signatures with the pre-stored luminescence signatures 132.


The parameter information file 130 stores (i) excitation parameters used by the processor 124 to control activation and de-activation of the LEDs 104, and (ii) detection parameters used by the processor 124 to control activation of the CCD sensor 120.


There are a plurality of sets of excitation parameters (in this embodiment there are three sets of excitation parameters), where each set of excitation parameters is used to create a pulse sequence. There are also a plurality of pre-stored luminescence signatures 132, with one luminescence signature corresponding to each set of excitation parameters. In this embodiment there are three pre-stored luminescence signatures.


The detection parameters indicate when the CCD sensor 120 is to be activated, and how long an integration time is to be used to measure luminescence, so that the sensor 120 detects (or at least transmits to the processor 124) luminescence when activated by the controller 122. The sensor 120 may actually detect luminescence continually but the processor 124 may only receive (or only store) the detected luminescence when the CCD sensor 120 is “activated”. In this embodiment, the detection parameters are the same for each set of excitation parameters.


The controller 122 is coupled to a USB port 140 for outputting data, or the results of analysis on the data, and (in some embodiments) for receiving updated parameter information from a remote source via a network 142.


The reader 100 also includes a simple user interface 146 coupled to the controller 122. The user interface 146 comprises: a trigger 148, which allows a user to activate the reader 100; a red LED 152, which indicates a failure to validate a secure tag; a green LED 154, which indicates a successfully validated secure tag; and a loudspeaker 156, which emits a short beep when a secure tag is successfully validated, and a long beep when a secure tag is not successfully validated.


In this embodiment, the reader 100 is intended to read secure tags 116 comprising microbeads of borosilicate glass doped with 3 mol % of Europium and 3 mol % of Dysprosium. The principles of manufacturing borosilicate glass doped with Europium and Dysprosium are described in US patent application No. 2005/0143249, entitled “Security Labels which are Difficult to Counterfeit”.


Reference is now also made to FIGS. 3A and 3B, which are two graphs illustrating the differential rates of saturation from the S1 excited state to the T1 state for Eu and Dy. In each of these Figs., a single pulse of optical excitation is used; however, the pulse width in FIG. 3A is shorter than that used in FIG. 3B. Population of the triplet state in the Eu ion occurs more quickly than for the Dy ion, so the charging curve 180 of the Eu ion in FIG. 3A is steeper than the curve 182 of the Dy ion. Since the pulse width 184 in FIG. 3A is relatively short, neither the Eu ion nor the Dy ion reaches saturation. A detection window 186 is shown in FIG. 3A, at which the luminescence intensity from the Eu ion is disproportionately greater than the luminescence intensity from the Dy ion, because the Eu ion is nearer saturation (and therefore has a higher triplet state population).


In FIG. 3B, although the charging curve 190 of the Eu ion is steeper than the curve 192 of the Dy ion, both curves reach saturation because the pulse width 194 is relatively long. A detection window 196 is shown in FIG. 3B, at which the luminescence intensity from the Eu ion is only slightly greater than the luminescence intensity from the Dy ion, reflecting the steady state condition of saturation.


To program the secure tag reader 100 to read secure tags comprising Eu and Dy RE ions, excitation parameters are derived. The excitation frequency is 395 nm and the power is 8 mW, which are the characteristics of the LEDs mounted in the reader 100. The number of pulses, pulse width, and repetition rate can be selected from a number of different variables.


First excitation parameters comprise the pulse width, repetition rate, and number of pulses. The first excitation parameters are selected through trial and error to ensure that both the Eu and Dy ions are saturated as a result of a first pulse sequence based on the first excitation parameters.


Second excitation parameters comprise a shorter pulse width than for the first excitation parameters, but the same repetition rate, and the same number of pulses. The second excitation parameters are selected through trial and error to ensure that the Eu ion is saturated but the Dy ion is not saturated as a result of a second pulse sequence based on the second excitation parameters.


Third excitation parameters comprise a shorter pulse width than for the first or second excitation parameters, but the same repetition rate, and the same number of pulses. The third excitation parameters are selected through trial and error to ensure that neither the Eu ions nor the Dy ions are saturated as a result of a third pulse sequence based on the third excitation parameters.


The first, second, and third excitation parameters are loaded into the parameter information file 130 in reader 100. Detection parameters are also loaded into the parameter information file 130. In this embodiment, the detection parameters, which are used by the processor 124 to control activation of the CCD sensor 120, are set to ten microseconds (10 μs) after a pulse sequence has ceased. In this embodiment, the same detection parameter is used for each pulse sequence.


Once the parameter information file 130 has been loaded, the reader 100 is ready to validate secure tags, as will now be described with reference to FIG. 4 and FIG. 5. FIG. 4 is a schematic diagram of a valuable media item 200, in the form of a banknote, which is printed with ink incorporating secure tags 116 at a tag area 218 on the banknote 200. The tags 116 comprise small beads (typically having an average diameter of five microns or less) of borosilicate glass doped with 3 mol % of Dysprosium and 3 mol % of Europium. For clarity, in FIG. 4 the tags 116 are greatly enlarged with respect to the banknote 200, and only a few tags 116 are shown is a flowchart 250 illustrating steps involved in validating a secure tag. FIG. 5 is a flowchart illustrating steps involved in validating the banknote of FIG. 4 using the reader 100.


The first step (step 252) is for the user to locate the banknote 200 in the reader 100. Once the banknote 200 is correctly aligned, the user presses the trigger 148 (step 254). The banknote 200 and reader 100 are aligned when the reader's focus spot 114 is in registration with the tag area 218. This may be achieved either by moving the banknote 200 or by moving the reader 100, or both.


On receipt of a trigger press, the processor 124 accesses the parameter information file 130 to retrieve the first excitation parameters and detection parameters (step 256). Using the retrieved excitation parameters, the processor 124 creates a first pulse sequence, and applies this first pulse sequence to the LEDs 104 (step 258). The LEDs 104 illuminate the secure tags 116 using this first pulse sequence.


Once the first pulse sequence has ended, the processor 124 then applies the retrieved detection parameters to activate the CCD sensor 120 and measure luminescence from the secure tags 116 (step 260). In this embodiment, the detection parameters define a time delay of a hundred microseconds (100 μs), and an integration time (the length of time over which a measurement is recorded) of five hundred microseconds (500 μs).


The processor 124 then derives a luminescence signature from the measured luminescence spectrum of the secure tags 116 using the algorithm 128 (step 262). In this embodiment, the algorithm 128 identifies the peaks in the measured luminescence, normalizes the intensities of the identified peaks, compares the ratios of all of the peaks, and creates a unique code based on the peak ratios. This unique code is the luminescence signature for the secure tags 116 in response to the first pulse sequence.


The processor 124 then compares the derived luminescence signature with the corresponding luminescence signature 132 pre-stored in the NVRAM 126 (step 264) to ascertain if there is a match (step 266). If the two signatures do not meet an acceptance criterion, for example, if the two signatures do not match (within a predetermined tolerance) then the secure tag 116 is not validated (step 268), and the processor 124 activates the red LED 152 and causes the loudspeaker 156 to emit a long beep.


If the two signatures do meet an acceptance criterion, for example, if the two signatures match (within a predetermined tolerance) then the processor 124 ascertains if there are any unused sets of excitation parameters (step 270).


If there are more unused sets of excitation parameters then the processor 124 increments to the next set of excitation parameters and loops back to step 258 (step 272). The processor 124 then uses this next set of excitation parameters to generate a another pulse sequence. This continues until there are no more sets of excitation parameters.


If there are no more unused sets of excitation parameters then the secure tags 116 are validated (step 274) and the processor 124 activates the green LED 154 and causes the loudspeaker 156 to emit a short beep.


This embodiment provides increased security because different pulse sequences are used, each corresponding to a different charge state, so each stimulates a different luminescence signature. It would be extremely difficult to replicate these luminescence signatures using a different substance than the RE ions being used.


Various modifications may be made to the above described embodiment within the scope of the present invention, for example, in other embodiments a secure tag based on luminescent particles other than rare earth doped hosts may be used. Where rare earth doped hosts are used, more or fewer than two rare earth ions may be included in each secure tag. The rare earth ion or ions used may be different to Europium and Dysprosium. The rare earth ions may comprise lanthanide ions. In other embodiments, rare earth ions may be incorporated in hosts other than glass.


In the above embodiment, the same detection parameters are used for each pulse sequence; in other embodiments, each pulse sequence may have different detection parameters.


In the above embodiment, luminescence was measured after excitation ceased; however, in other embodiments, luminescence measurements may be recorded while the secure tag is being excited.


The detection parameters may be different to those described above.


In the above embodiment, the luminescence signatures were derived from the peaks in the wavelength range; in other embodiments, different parts of a luminescence spectrum may be used, for example, fewer than all of the peaks, areas of the wavelength range that are not peaks, for example, areas of background noise, or areas part-way between a peak and background noise.

Claims
  • 1. A secure tag validation method comprising: illuminating the secure tag using a first pulse sequence having first excitation parameters;measuring first luminescence emitted from the secure tag in response to the first pulse sequence;illuminating the secure tag using a second pulse sequence having second excitation parameters;measuring second luminescence emitted from the secure tag in response to the second pulse sequence; andvalidating the secure tag in the event that the first and second luminescence meet an acceptance criterion.
  • 2. The method of claim 1, wherein the first excitation parameters are selected to ensure that an intermediate state is saturated.
  • 3. The method of claim 1, wherein the second excitation parameters are selected to ensure that an intermediate state is not saturated.
  • 4. The method of claim 1, wherein the secure tag includes a plurality of rare earth ions, each rare earth ion having a different charging time.
  • 5. The method of claim 1, wherein the acceptance criterion is implemented by: deriving a first luminescence signature from the measured first luminescence;ascertaining if the derived first luminescence signature matches a first pre-stored luminescence signature;deriving a second luminescence signature from the measured second luminescence;ascertaining if the derived second luminescence signature matches a second pre-stored luminescence signature; andvalidating the secure tag in the event that the first luminescence signature matches the first pre-stored luminescence signature and the second luminescence signature matches the second pre-stored luminescence signature.
  • 6. The method of claim 5, wherein ascertaining if the derived first luminescence signature matches the first pre-stored luminescence signature comprises ascertaining whether the derived luminescence signature differs from the first pre-stored luminescence signature by less than a predetermined amount.
  • 7. The method of claim 1, wherein the excitation parameters include: excitation frequency, pulse width, repetition rate of each pulse, and the number of pulses in the sequence.
  • 8. A device for validating a secure tag, the device comprising: an optical source;a processor coupled to the optical source; anda luminescence detector coupled to the processor;
  • 9. The device of claim 8 further comprising a memory coupled to the processor, where the memory holds a plurality of pre-stored luminescence signatures.