This invention relates to the field of document management, and, more particularly, to a system and method for identifying a genuine printed document.
Certain written or printed documents (hereinafter referred to as “documents”) are important and/or valuable. It may be desirable in certain circumstances to independently confirm that such a document is genuine, and not fraudulent. It may also be desirable in certain circumstances to confirm that such a document has not been altered in an unauthorized manner.
Embodiments of the invention provide for document authentication that confirms that a document is genuine. Embodiments of the invention provide for document authentication that confirms that a written or printed document is genuine, and has not been altered in an unauthorized manner. Embodiments of the invention provide for document authentication that not only confirms that a written or printed document is genuine, and has not be altered in an unauthorized manner, but also mitigates the risk of losing the document, such as by fire or theft.
A method for verifying that a document is included in a document management system is disclosed. This method includes radio frequency scanning at least a portion of the document, generating document data dependently upon the radio frequency scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior radio frequency scanning of at least a portion of the document, and outputting an indication of the document being included in the document management system as determined by the comparing.
A method for verifying that a document is included in a document management system is disclosed. This method includes optically scanning at least a portion of the document, generating document data dependently upon the optically scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior optical scan of at least a portion of the document, authenticating the document data using at least one radio frequency scan, outputting an indication of the document being included in the document management system as determined by the comparing and the authenticating, and the authenticating storing any variations in the generated document data as updated stored document data.
A system for verifying that a document is included in a document management system is disclosed. The system includes a radio frequency document scanner, a memory storing document verification data associated with the document, a computing system operatively connected to the radio frequency scanner and the memory, and computing system executable code accessible by the computing system and operative by the computing system to: receive data indicative of a radio frequency scan of at least a portion of the document from the radio frequency document scanner, generate document data dependently upon the received radio frequency, access the memory to recover the document verification data, compare the generated document data to the recovered document verification data, the document verification data being previously generated dependently upon a prior radio frequency scanning of the portion of the document, and provide an output indicative of the document being included in the document management system if the generated document data is substantially identical to the recovered document verification data as determined by the compare.
Understanding of the present invention will be facilitated by consideration of the following detailed description of the preferred embodiments of the present invention taken in conjunction with the accompanying drawings, in which like numerals refer to like parts:
It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for the purpose of clarity, many other elements found in typical document processing systems and methods. Those of ordinary skill in the art may recognize that other elements and/or steps are desirable and/or required in implementing the present invention. However, because such elements and steps are well known in the art, and because they do not facilitate a better understanding of the present invention, a discussion of such elements and steps is not provided herein. The disclosure herein is directed to all such variations and modifications to such elements and methods known to those skilled in the art.
Referring now to
Referring now also to
In the illustrated embodiment, information processing system 39 may include a computing device, such as, for example, a computer. “Computer”, as referred to herein, refers to a general purpose computing device that includes a processor. “Processor”, as used herein, refers generally to a device including a Central Processing Unit (CPU), such as a microprocessor: A CPU generally includes an arithmetic logic unit (ALU), which performs arithmetic and logical operations, and a control unit, which extracts instructions (e.g., code) from memory and decodes and executes them, calling on the ALU when necessary. “Memory”, as used herein, refers to one or more devices capable of storing data, such as in the form of chips, tapes, disks or drives. Memory may take the form of one or more random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), or electrically erasable programmable read-only memory (EEPROM) chips, by way of further non-limiting example only. Memory may be internal or external to an integrated unit including a processor. Memory may be internal or external to the computer. Such memory may typically store a computer program, such as, for example, code or sequence of instructions being operable by the processor.
It should be appreciated that when a substrate not incorporating resonators 5a-n is interrogated with system 10, output 38 will not be indicative of any particular substrate. However, when a substrate 1 incorporating responders 5a-n is interrogated with system 10, output 38 will be indicative of the existence and positioning of responders 5a-n, and hence substrate 1.
More particularly, transmitter 20 and receiver 30 may be positioned to interrogate a predetermined portion of substrate 1. Referring now also to
Referring now also to
Referring still to
Referring now also to
When dipoles are randomly distributed along scan track 100, 100a-n, the response created thereby may result in a RF amplitude versus position waveform, as illustrated by waveform 200 of
According to an embodiment of the present invention, one or more tables or databases may be stored so as to be accessible by computer 39 (
When a document is initially scanned and a code word identified, a user may be prompted to enter the information to be associated with the code word in the table(s)/database(s), such as by using computer 39 (
Referring now also to
For purposes of completeness, scanner 530 may generally take the form of a device that may detect markings, such as, for example, text or illustrations, printed on a substrate, paper, and translate the information into a form that a computer, such as computer 39, may use. Such a scanner may typically digitize the markings, dividing the markings into a grid of boxes and representing each box with a data value, depending on whether the box is marked. The resulting matrix of bits may be used to form a bit map that may be stored. Scanner 530 may not distinguish text from illustrations; as both types of markings may be represented as bit maps. Scanner 530 may utilize a charge-coupled device (CCD) array that includes a plurality of light receptors that detect variations in light intensity and frequency. Other conventional approaches, such as a photomultiplier tube (PMT) based scanner may alternatively be utilized. Scanner 530 may utilize any suitable resolution, such as up to or greater than 600 dots per inch (DPI), for example. Scanner 530 may be monochrome or color capable. Scanner 530 may use any suitable bit depth. Scanner 530 may be hand-held, page fed or page based. Where clocking signal 210 (
Referring now to Table-I, there is shown a table used to correlate data indicative of output signal 38 and 538, according to an embodiment of the present invention.
The illustrated Table-1 includes a single entry that may be generated by, or responsively to, computer 39. The entry indicates a codeword of “0010 . . . 0001” corresponds to a scanned document having a marked reference identifier “XXYY1122”. Information associated with the scanned document may is also be stored, consistently with the above-discussion. Table-1 may also include a data file identifier. The substrate used to generate the exemplary entry may be considered to be enrolled for later authentication.
In certain embodiments of the present invention, each identified data file includes data indicative of the markings on the corresponding document, such as the bitmap represented by output 538, for example. In certain embodiments of the present invention, the data file may include data generated by manipulating either the codeword using the markings indicative data or the markings indicative data using the codeword. In certain embodiments of the present invention, the data file may be protected, such as via conventional encryption techniques. In certain embodiments of the present invention, the markings indicative of data (for example, output 538 provided bit map data) may be encrypted using the codeword as an encryption key.
Referring now to
Referring now to
By way of non-limiting example, file retrieval at block 840 may be achieved using any conventional manner. For example, where the table/database containing the record is indexed by codeword, the codeword generated at block 810 may be used to recover the file. Where the table/database containing the record is indexed by reference identifier (e.g., 110,
In certain embodiments of the present invention, documents may be updated by re-enrolling or updating their enrollment. In such a case, the prior generated record may be appended or replaced, for example. In such embodiments, restrictive access/authorization techniques may be used to restrict enrollment updating. For example, when a document is enrolled, a password required to re-enroll or update the document enrollment may be associated with the record.
It should be appreciated that stored data files represent optical images of scanned documents. The table(s)/database(s) and associated data files may be stored in memory for later retrieval for any desired amount of time. Accordingly, a copy of a scanned document may be recovered at any point during this time, even if the original is lost or destroyed, by performing suitable queries of the stored table(s)/database(s), using computer 39 for example.
In certain embodiments of the present invention, substrate 1 may be preprinted with information, e.g., so as to serve a fill-able form, prior to being provided to a user. Referring now to
A desktop portable scanner may be utilized according to an aspect of the present invention. According to this aspect of the invention, a bootable compact disc or other storage and readable medium may contain software according to the current invention. In such a configuration, a radio frequency fingerprint may be included on the paper as discussed hereinabove. A similar radio frequency fingerprint may also reside on the compact disc or other storage medium. Matching or linking of the two fingerprints, such as by computerized means, may allow the desktop scanner to operate according to the present invention.
For example,
Further, in accordance with the present invention, the desktop unit may perform an optical scan in order to verify the visual aspects of the data associated with a subject document, and may additionally perform an RF scan wherein the paper on which the optical scan is performed is verified as authentic to the subject document, for example. In an exemplary embodiment, and in part because, in the known art, a document to be optically scanned is frequently placed facedown on a scan input tray, the present invention may include an optical scan head facing upward just inside the input slot of the desktop unit of the present invention, and may additionally include the RF scan head above the paper input slot and facing downward, for example. Thereby, a paper may be inserted to the desktop unit of the present invention, and may have obtained therefrom, simultaneously, an optical and RF scan of the subject paper. This information may then be communicated to a remote, secure database, as discussed hereinthroughout, in order to verify the optical subject matter of the document, and the RF authenticity of the paper on which the document is provided.
Further, in such exemplary embodiments, a response from the remote database that the subject document is, indeed, authentic, and that the subject matter of the document is likewise authentic, may allow for certain actions to be performed that are otherwise disabled if a non-authentic document is presented. For example, verification as an authentic document may allow for copies of the document to be printed from the printer portion of the desktop unit, or may provide a verification of authenticity on a computing monitor associated with the computing system to which the desktop unit of the present invention is associated.
Numerous exemplary embodiments employing the desktop unit of the present invention will be evident to those skilled in the art in light of the discussion herein. For example, local or remote verifications may be performed using one or more desktop units in accordance with the present invention. For example, ballots, such as those used in voting processes, may be verified on site, or, such as in the case of submission of absentee ballots, may be verified remotely from polling sites. Likewise, two or more persons communicatively connected together via, for example, a network, a conference system, email, or the like, may enable one party to place a document into the desktop unit of the present invention, and may enable at the least the other, remote, party to receive a verification of the document placed into the desktop unit of the first party.
According to an aspect of the present invention, the accuracy and/or ability to detect error in the present system may be related to the ability to detect the signal, that is, the signal strength. For example, an error of 1:200 million may result at 12 dB at a one foot distance. Such characteristics demonstrate that the signal level is the key to properly identifying the document. Of course, such distance may be consistently controlled through the use of the scanner of the present invention.
According to an aspect of the present invention, nanonumbers may be utilized to provide increased numbers of identifiable documents, and therefore more security in document mapping. As is known to those possessing an ordinary skill in the pertinent arts, nanonumbers may be defined as a random number raised to the power of another random number. By utilizing the serial code of the present invention, as discussed above, nanonumbers of unique RF codes may be provided, and thereby the security of the selection may be increased. In a particular embodiment of the present invention, a consumer may purchase foodstuffs having a nanonumber serial code associated with the foodstuff. The consumer may check an optical scan of the foodstuff against the nanonumber serial number, which may be an RF indicated nanonumber associated with an optically scannable bar code, for example, such as by sending the optical and RF scans to the database of the present invention to thereby allow the database to identify the nanonumber serial number and respond by confirming that the document is in the database, and/or matches the dictated optical scan. Alternatively, the database may respond by confirming that the serial number is counterfeit, such as, for example, by having the serial number not found in the database. Although such RF nanonumbering may be sufficient to determine if a document is, in fact, included in the database of documents, it may be unable to provide information regarding the veracity of the contents of the foodstuff. Thus, the optical scan of the document is relied upon to authenticate the content of the foodstuff.
Further, the security of documents in accordance with the present invention may be increased by allowing for circulations of certified document copies, or verifications, of the like, to occur without human intervention. For example, a request for a certified copy of a document in accordance with the present invention may cause an automated production of a copy of the requested document, automated facsimile, and/or automated placement into an envelop, for production to the requester. Such automated processes may be performed in accordance with U.S. Pat. No. 5,690,774 issued to the inventor of the instant application, now expired, the entirety of which is herein incorporated by reference.
Thus, according to an aspect of the present invention, a RF scan of a document may be performed. From the results of the RF scan, a comparison may be made to the database to determine if the RF signature is a valid signature as compared to the signatures stored in the database. In such a situation, the RF signature comparison may be sufficient to determine if a document is, in fact, included in the database of documents. An optical scan of the document may then or additionally be required in order to authenticate actual content.
According to an aspect of the present invention, the types of documentation that may be authenticated by the present invention may include, but are not limited to, testimony, documents that would otherwise be notarized, and documents that may be escrowed. Further, certified copies of documents of the present invention may be obtained from the system of the present invention. Such authenticated, certified copies may be requested from the system in order to replace missing or destroyed documents, for example. The system may therefore operate in a closed loop manner to identify, authenticate and/or recreate documents, and deliver those documents to the proper owner/holder as necessary.
According to an exemplary embodiment of the present invention, the document identifier of the present invention may be placed in the bottom left hand corner, such as not to extend beyond 1″ from the bottom of the paper and no farther than 3″ from the left edge, by way of non-limiting example. OCR A may be the font used. The document identifier may be formatted to take the form—YY-IN-A1A1A1. The first two characters (YY) may alphabetical and signify the year, starting from the year 2000. In such a configuration, two alphabetical characters may allow for 783 years, for example. A dash may be used as a separator. The next two characters (IN) may be a modified alpha numeric identifier that is indicative of the industry/section the document is associated with. In this configuration, there are combinations to allow for 1155 industry/sections. The final six characters (A1A1A1) may be separated by a dash, and may contain a modified alphanumeric. The final six characters may act as the unique identification, as described hereinabove. In such a configuration, there are approximately 1,544,804,000 possible unique identifications according to this exemplary aspect of the present invention.
The number and identification scheme described hereinabove may be subject to change. For example, the schema set forth may not use the following letters: O, S, Z, and I. Alternatively, for example, if more years are needed, the present system may be switched to employ a modified alphanumeric.
As is known to those possessing an ordinary skill in the pertinent arts, holography, the art of creating a hologram, is a technique that allows the light scatter from an object to be recorded and later reconstructed so that it appears as if the object is in the same position relative to the recording medium as the object was when recorded. The image of the recorded object may change as the position and orientation of the viewing changes in exactly the same way as if the object were still present, thus, making the recorded image or hologram appear three-dimensional. The technique of holography may also be used to optically store, retrieve, and process information. In addition to the systems and methods discussed hereinabove, a hologram may also be used for identifying a genuine document. The hologram may be used in conjunction with any one or more of the techniques discussed herein, and/or may be used as the primary or only verification technique according to an aspect of the present invention.
A hologram may be incorporated onto or within a paper and may be validated by a machine or other object when the paper is redeemed, used, or subject to planned or random verification of a product, for example. Additionally, a hologram may provide visual feedback, and greater difficulties in copying a document. When a machine validates a document, the validation may ensure accuracy in determining the holographic validity, and thereby the validity of the underlying document to which the hologram is applied. The machine to read the hologram and the hologram may create a secure, closed environment to identify a genuine printed document. The hologram labeling may be integrated into the printing and/or packaging process seamlessly, and may be used in the field by software manufacturers, passport producers, car manufacturers, creators of brand name products, credit card companies, CD producers and telephone card distributors, for example.
The hologram of the present invention may operate such that it may always be visible under normal light, or the hologram may be such that the hologram is only visible when held under certain lighting conditions, or alternatively, where the hologram is not visible under certain or any lighting conditions. Unique features of a hologram may also be used according to the present invention. For example, parallax, which is the ability to see a scene and colors from many angles and depths, may provide a more dynamic security feature. Generally, parallax comes from the microstructures within the hologram, and causes the refraction when light is incident upon the microstructures.
A hologram may include complex optical patterns that are contained within the hologram. These patterns may be used to encode information including the depth and photographic appearance of the image for the hologram. Using this information, it is possible to create a master security hologram that may allow a comparison between the master and a hologram contained within or on a document to be verified, such as to assure that the hologram is genuine thereby validating that which the hologram is marking, such as a document, for example.
Further, a picture may be associated with or within a hologram, such as a covert picture that is hidden and not recognized as being a hologram or being within the hologram. It may be embedded in the hologram itself and only be visible under certain types of light, by way of non-limiting example only. This may allow for additional or an added level of security and verification. The picture and hologram may be combined to provide a matched set, such that if either the picture or the hologram is lacking or altered, the pair would collectively be invalidated as authentic.
The hologram of the present invention may prevent scanning, or photocopying of documents and certificates. The hologram may be applied over a signature line or a signature itself on documents of increased value, for example. Additionally, sequential numbers may also be added to ensure an added benefit within or in addition to the hologram. The sequential numbers, or even random numbers, may be installed within the hologram, or separate, and may be included with the picture as well. Sequential numbers may be traditional serial numbers, may be of the form of the document identifier, such as the RF dipole identifiers discussed hereinabove, or may be nanonumbering, for example.
The hologram may also be created so that it is self-destructible, that is, if removed or attempted to be removed and/or applied to another document, the removal or reapplication process results in destruction of the hologram. The hologram may provide an added benefit in that the hologram may be designed to include a visual indication, in addition to the added security and visibility, to differentiate the product or goods from counterfeiters and to decrease potential liability issues.
The hologram may be used in addition to the RFID discussed herein throughout. The hologram may be placed within the same paper layer of the document as the RFID, or additionally may be placed in front of or behind the RFID paper. In the situation where the hologram is placed in front of the RFID tag paper, two sequential papers may be present and counterfeiters may not recognize that the RFID, paper behind the hologram exists. The hologram may also be incorporated within the same layer as the RFID. This will provide an additional level of security in using the RFID tag as discussed herein in addition to the hologram, at least in that hologram possibly provides visual document authentication to an observer.
Similarly, RF scanning and/or authentication of documents may be included in shredders and other office equipment, such as copiers, for example. Use of the RF scanning on office equipment may incorporate many of the functions disclosed herein, including but not limited to prevention of unwanted copying and prevention of unwanted destruction. For example, in the case of a copy machine, an RF scan may be performed by the copy machine prior to allowing a user to select the copy button, for example. In such a configuration, the unique RF fingerprint may be examined and reviewed in the database, and if the document is registered as a not allowable to copy, or has some secretive nature, then the copy machine may not activate to copy the document, or may blank out the copy.
In the case of a shredder, for example, the shredder may be equipped with an RF scanner that scans the RF signature of the document prior to activation of the shredding function. In the event that a particular signature is detected, the machine may shutdown. Alternatively, the machine may query the database to determine if a destruction clause is associated with the document fingerprint, or a no destruction tag, or a one-of a kind registration in the database, and, in one or more such cases, shredding may be precluded.
Those of ordinary skill in the art may recognize that many modifications and variations of the present invention may be implemented without departing from the spirit or scope of the invention. Thus, it is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents.
This application claims the benefit, under 35 U.S.C. §120, of pending U.S. patent application Ser. No. 12/462,126, filed on Jul. 29, 2009, which application claims the benefit, under 35 U.S.C. §120, of pending U.S. patent application Ser. No. 12/381,520, filed on Mar. 12, 2009, which application is a continuation of U.S. patent application Ser. No. 12/218,598, filed on Jul. 16, 2008, all of which applications are incorporated by reference herein as if set forth in their entirety.