Security is an important requirement in many document printing applications. In situations such as official or government document printing, event ticket printing, financial instrument printing and the like, many printed documents must be protected against copying, forging and/or counterfeiting.
For these reasons, many documents have security marks, such as those that are visible only in the presence of infrared light, in the presence of ultraviolet light, under a specialized microscope, or with the use of a decoding “key” device. However, security marks that require additional hardware to decode are not always desirable, as the hardware is not always readily available in all use cases. For example, specialized infrared microscopes are not commonly available at government office, event venues or other locations where document verification will be performed. Additionally, people often prefer security elements that cannot simply be identified as such. For example, MicroText marks are easily identifiable as such.
This document describes methods and systems for creating and using a security mark that addresses at least some of the problems described above, and/or other problems.
A secure document includes a substrate on which secure content and non-secure content are printed. The secure content includes a security mark that is made of a background that exhibits a first color, and a foreground that exhibits a second color, all within a bordered area. The first color and the second color together exhibit a chrominance variation that is not visible to the unaided human eye or when viewed with the assistance of a magnifying glass, but that is visible when viewed with the assistance of a microscope.
In some embodiments, the first color and the second color each exhibit a substantially identical luminance, or the first color and second color may exhibit a luminance difference that is at least a factor of ten less than the chrominance variation. For example, one of the colors may be pure black, while the other color may be a mixture of black with cyan, magenta or yellow.
In some embodiments, the foreground comprises microtext having a spatial frequency corresponding to a maximum of 300 line pairs per inch, or the foreground may have a maximum font size of 1 point font.
This patent filing also discloses a system for printing a secure document such as that described above, where the system includes a processor and a printing device. The system also includes a computer-readable medium containing programming instructions that, when executed by the processor, cause the processor to: (i) identify secure content to print on a substrate within a security mark; (ii) identify a first color and a size or spatial frequency for the secure content; and (iii) identify a second color for a background of the security mark. The background will correspond to portions of the security mark where the secure content will not be printed, and the first color and the second color will together exhibit a chrominance variation that is not visible to the unaided human eye or when viewed with the assistance of a magnifying glass, but will be visible when the secure content will be viewed with the assistance of a microscope. The instructions also cause the processor to identify a first set of instructions for printing a document containing the security mark, and form the document by applying the security mark to a substrate so that the security mark includes a background that exhibits the first color, and that exhibits the second color and contains the security mark printed according to the identified size or spatial frequency. The foreground and background will be printed within a bordered area of a security mark.
In some embodiments, the instructions to identify the first color and the second color may include instructions to access a set of available color combinations stored in a memory of the system, and to select the colors from the set. Alternatively, the instructions to identify the first color and the second color may include instructions to: (i) determine a first luminance value and a first chrominance value for a first candidate color; (ii) determine a second luminance value and a second chrominance value for a second candidate color; (iii) compare the luminance values and chrominance values of the candidate colors; and (iv) select the first candidate color as the first color and the second candidate color as the second color only if the first luminance value and the second luminance value are substantially similar while the first chrominance value and the second chrominance value are substantially different, otherwise repeat the luminance and chrominance value determination and comparison steps for an additional pair of candidate colors.
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.
This disclosure is not limited to the particular systems, devices and methods described, as these may vary. The terminology used in the description is for the purpose of describing the particular versions or embodiments only, and is not intended to limit the scope.
As used in this document, the singular forms of any word, and defining adjectives such as “a,” “an” and “the,” each include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to.”
The term “security mark” refers to a marking made on a document that can be used to verify the authenticity of the document, and thus help prevent counterfeiting or unauthorized duplication of the document. Examples of such marks include those known as (i) MicroText marks (i.e., text or other graphics printed at smaller than 1 point size, readable only with a loupe or other magnifying glass); (ii) correlation marks (i.e., printed text that is only visible when superimposed by a “key” overlay; (iii) GlossMark® (a registered trademark of Xerox Corporation) printed characters (i.e., characters printed in a manner such that that is not visible in straight-on view, but becomes visible under inclined illumination); (iv) FluorescentMark characters (i.e., printed characters that are only visible under ultraviolet/black-light; and (v) infrared characters (i.e., printed characters that are only visible in the dark, with an infrared camera).
A “computing device” or “electronic device” is a device that includes a processor and non-transitory computer-readable memory. The memory contains programming instructions in the form of a software application that, when executed by the processor, causes the device to perform various operations according to the programming instructions. Examples of electronic devices include computers, servers, smartphones, personal digital assistants, cameras, tablet devices, electronic readers, personal computers, media players, satellite navigation devices and the like.
The terms “memory” and “computer-readable medium” each refer to a non-transitory device on which computer-readable data, programming instructions or both are stored. Unless the context specifically states that a single device is required or that multiple devices are required, the terms “memory” and “computer-readable medium” include both the singular and plural embodiments, as well as portions of such devices such as memory sectors.
A “microscope” is an optical instrument having a lens or combination of lenses that can be used to magnify and view objects that are too small to be seen in detail by the unaided eye. A microscope will magnify the object to a greater degree than a standard loupe or magnifying glass. For example, the lens of a loupe may cause up to 8×, up to 10× or even up to 12× magnification. A microscope will typically cause 20× or greater magnification. In some embodiments, a microscope may cause 40× or greater magnification. Other magnification levels are possible.
A “print device” is an electronic device that is capable of receiving commands and/or data, and in response printing characters and/or images on a substrate. Printing devices may include, but are not limited to, network printers, production printers, copiers and other devices using ink or toner, and scanners. A print device may also perform a combination of functions such as printing and scanning, in which case such a device may be considered a multifunction device.
A “processor” is a component of an electronic device that executes programming instructions. The term “processor” may refer to either a single processor or to multiple processors that together implement various steps of a process. Unless the context specifically states that a single processor is required or that multiple processors are required, the term “processor” includes both the singular and plural embodiments.
This document describes a security technology that provides a mark that can be decoded with simple tools such as a microscope, but which is not easily identified as a security element by a human user who uses an ordinary loupe or the unaided eye. The technology takes advantage of a characteristic of the human eye that is often overlooked: that a person's sensitivity to luminance (i.e., a measure of the difference between dark and light) is very different from the person's sensitivity to chrominance (a measure of color differentiation, e.g., color1/color2). Therefore, the human eye's sensitivity to luminance can be considered to be a function of spatial frequency—i.e., the characteristics of an object that it is viewing that are periodic across space.
This is illustrated in
In the example of
Thus, the methods and systems described in this document create a security mark with a low luminance variation—one that that is sufficiently small that it cannot be visible to either the unaided or the loupe-assisted human eye—but with a chrominance variation that can be detected by a microscope.
In operation, the printer 201 will print a document 211 that contains characters, images or other content items 214 that are visible and thus not secure, along with a security mark 212 containing secure content and created in accordance with the methods described below. The security mark 212 shown in
The first color (background) and the second color (foreground) also exhibit a luminance variation that is not visible to the to the unaided human eye. The luminance variation may or may not be visible when viewed with the assistance of a magnifying glass. In some embodiments, the two colors may exhibit no (or substantially no) luminance difference, resulting in a color difference that is almost purely chrominance. Thus, the two colors have a chrominance variation but a negligible luminance variation.
The foreground and background will thus be printed with ink or toner that are similar in color. For example, one of these elements may be solid black, while the other may be a mixture of solid black (K) with one or more of the other CMY colors. In some embodiments, for example, the second color will have a luminance component that matches some of the black. As an example if the first color is 100% K, the second color could be 50 parts K and 70 parts C. Thus, the two colors will exhibit substantially the same luminance but different chrominance. In various embodiments, this means that the luminance difference between the two colors will be at least a factor of ten less than the chrominance difference between the two colors. Examples of the second color (i.e., the one used with the black (K) may be include: (i) 2 parts solid K, 1 part of each of the other three inks (CMY); (ii) 10 parts solid black (K), 7 parts cyan (C), 3.5 parts magenta (M), and 4 parts yellow (Y); and (ii) 10 parts K, 3.5 parts C, 6 parts M, and 6 parts Y.
In some embodiments, the foreground may include or substantially consist of microtext having a maximum size threshold under 1 point. An example is 0.84 point font. Additional fonts ranging from 0.72 point font to 1.08 point font may be used, along with other sizes. Optionally, the size may be something less than a 1 point font, considering that a readable character could be described by as few as 3 line pairs in many instances where the text is in the English letters and numbers. (Other systems such as Chinese or Japanese may have larger minimum sizes.) Alternatively, the microtext may have a size corresponding to a maximum of 600 line pairs per degree.
The visible portion 221 will not normally be printed on a secure document, but is shown in
A document for printing a secure document may be created by a system such as that shown in
A user interface 507 is a device or system that provides output to, and receives input from, a user. The user interface may include a display, audio output, a printer, or another element that provides information to a user. The user interface 507 also may include a touch-sensitive component, microphone, audio port, keyboard, mouse, touch pad, or other input mechanism that is capable of receiving user input. The system also may include one or more printing devices 511, each of which contains hardware that enables it to print marks on a substrate. The printing device(s) will, individually or collectively, will contain toner reservoirs with various toners that are suitable for a security mark, such as CMYK reservoirs. As used in this document, the term “reservoir” means any structure that holds toner, which may be in liquid, solid, gel, or other form.
A system containing elements such as those described above in
The system will select content for a secure mark 602 to print on the substrate along with the non-secure content. The content may include a security code, other unique identifier, or any other set of alphanumeric characters that will serve as the foreground of the secure mark using methods described in this documents. The system may receive the content via the user interface, select it from a set of stored content, randomly generate it, or identify it through any other suitable means.
The system will also select a first color for a background of the secure mark 603 and select a second color for the secure content of the secure mark 604, and select a size 605 for the secure content. The first color and the second color will together exhibit a chrominance variation that is not visible to the unaided human eye or when viewed with the assistance of a magnifying glass. However, when the security mark is printed 606 with content corresponding to the size, the chrominance variation will be visible when viewed with the assistance of a microscope. The selected colors may be selected from a set of available color combinations stored in a memory of the system, or determined in real time based on known or calculated luminance and chrominance values of various available colors and color combinations. For example, the system may determine a first luminance value and a first chrominance value for a first candidate color, determine a second luminance value and a second chrominance value for a second candidate color, and compare the luminance values and chrominance values of the candidate colors. The values may be stored in a memory or received from an external source. The system will use the candidate colors only if their luminance values are substantially similar and chrominance values are substantially different; otherwise the system will repeat the luminance and chrominance value determination and comparison steps for an additional pair of candidate colors.
The features and functions disclosed above, as well as alternatives, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements may be made by those skilled in the art, each of which is also intended to be encompassed by the disclosed embodiments.