1. Field of the Invention
The present invention relates to a system and method for storing digitally printable security features used in the creation of secure documents and, more particularly, to a system and method for storing incomplete portions of digitally printable security features (used in the creation of secure documents) on different devices/systems, and for merging the incomplete portions to form a fully formed complete security feature for printing by a printer.
2. Description of the Related Art
Security documents are used across a diverse marketplace to deter fraud, counterfeiting and theft. In most cases, the security documents are pre-printed on media. The pre-printed media must be stored in a secure location so that counterfeiters and thieves are not able to obtain the secure media which would allow them to freely print fraudulent documents.
Security printing relates to the practice of manufacturing media substrate with certain security indicia/features/patterns to prevent forgery and counterfeiting of security documents such as passports, checks, and prescription pads. As should be understood by those of ordinary skill in the art, security printing can include, for example, the inclusion of watermarks, UV coatings, security fibers, microprinting, holograms, phosphorescent inks, and pantographs (e.g., “void”) etc. in the manufacture of the media substrate.
There are digital printers that can print these secure features on demand on standard media. The advantage of these printers is that standard media does not have to be secured from theft as the secure documents can be created on demand. However, the digital printer must be set up with features/methods that disable printing of these secure features if a thief were to steal the printer.
Description of the Related Art Section Disclaimer: To the extent that specific patents/publications/products are discussed above in this Description of the Related Art Section or elsewhere in this Application, these discussions should not be taken as an admission that the discussed patents/publications/products are prior art for patent law purposes. For example, some or all of the discussed patents/publications/products may not be sufficiently early in time, may not reflect subject matter developed early enough in time and/or may not be sufficiently enabling so as to amount to prior art for patent law purposes. To the extent that specific patents/publications/products are discussed above in this Description of the Related Art Section and/or throughout the application, the descriptions/disclosures of which are all hereby incorporated by reference into this document in their respective entirety(ies).
The present invention recognizes that there are potential problems and/or disadvantages with the conventional technology used in the storage of security indicia/features/patterns. For example, typically one device (whether it is a computer or server connected to a printer or the printer itself) stores a complete security feature in memory. If a hacker was able to copy the security feature from the single device memory (e.g., from a printer memory), the hacker would be able to use the illegally obtained security feature to create unauthorized reproductions of the secure documents. Various embodiments of the present invention may be advantageous in that they may solve or reduce one or more of the potential problems and/or disadvantages discussed above.
Various embodiments of the present invention may exhibit one or more of the following objects, features and/or advantages:
It is therefore a principal object and advantage of the present invention to provide a system that is structured, configured, connected, and/or programmed to store incomplete parts/portions of security feature(s) such as pantographs (e.g., void), watermarks, microprinting, verification grids, validation marks, color, uv and/or IR marks, unique secure barcodes, serial numbers, anti-copying marks such as an Eurion mark, any combination thereof, and any other security feature as should be understood by those of skill in the art, on separate multiple devices and/or systems.
It is another object and advantage of the present invention to provide a system that is structured, configured, connected, and/or programmed to merge/combine the incomplete parts/portions of the security feature(s) to form a fully formed complete security feature suitable for printing by a printer (preferably a digital printer) on a media substrate (e.g., thermal media substrate by a thermal printer or standard media substrate by a thermal transfer printer, as should be understood by those of skill in the art). These security features can be used to prevent forgery and counterfeiting of items such as passports, checks, and prescription pads.
It is a further object and advantage of the present invention to provide a method for storing incomplete parts/portions of security feature(s) on separate multiple devices and/or systems, merging/combining the incomplete parts/portions of the security feature(s) to form a fully formed complete security feature, and printing the complete security feature by a printer (preferably a digital printer) on a media substrate. These steps can preferably be performed on demand and in real time.
In accordance with the foregoing objects and advantages, an embodiment of the present invention is directed to a system that is structured, configured, connected, and/or programmed to store incomplete parts/portions of security feature(s) on multiple devices/systems and can include, but is not limited to, (1) a printer with a memory that can store at least a first incomplete part/portion of at least a first security feature (and preferably, a plurality of security features), (2) a host computer with a memory connected to the printer (through a wired or wireless connection) that can store at least a second part/portion of the at least first security feature, and/or (3) at least one server computer with a memory connected to the printer and/or the host computer (through a wired or wireless connection) that can store at least a third part/portion of the at least first security feature. An embodiment of the present invention contemplates any number of incomplete portions of security features being stored on any number of devices/systems (preferably connected devices/systems that contain secure memory locations (e.g., password protected)). Another embodiment of the present invention contemplates that the printer is not required to store any incomplete parts of a security feature. The printer can be connected to other devices/systems that can store the incomplete parts of a security feature, and when needed, the incomplete parts can be combined to form the complete security feature and printed.
Any part of the system (including, but not limited to the printer, host computer, and/or server computer) can contain software or firmware to merge/combine the incomplete parts/portions of the security feature(s) to form a more complete security feature or to form the fully formed complete security feature. The fully formed complete security feature can then be transferred to the printer (if the printer is not the device that merged/combined certain incomplete parts/portions of the security feature(s) to form the complete security feature, which is can be). Once the fully formed complete security feature is received by the printer or formed by the printer (per its specific programming/firmware or instructions received by the host computer or server system), the printer is structured, configured, connected, and/or programmed to print the fully formed complete security feature on a media substrate on demand (e.g., thermal media substrate by a thermal printer or standard media substrate by a thermal transfer printer, as should be understood by those of skill in the art). The printer can also be structured, configured, connected, and/or programmed to store one or more fully formed complete security features in its local memory or in memory that is accessible by the printer (directly or indirectly) for later printing (as needed, but this is not preferable per the main security purpose of this system).
The printer's firmware can be programmed to print the at least one fully formed complete security feature(s) on demand that are stored in the printer's memory (or in the memory of a device/system connected to and accessible by the printer), and to merge the security feature(s) with variable data (such as receipt data, check data, financial data, identification data (birth certificate, pallet, container), contract data, ownership data (deeds, titles), legal data (trusts etc.), government data, prescription data, medical/healthcare data, public safety data (e.g., elevator inspections, health inspections), permit data (hunting licenses), ticket data, or label data (part identification), for example, as should be understood by those of skill in the art) preferably in real time depending on the particular application. The printer firmware can be updated by a host computer or other device/system (e.g., server computer) that is in wired or wireless communication with the firmware within the computer.
In accordance with a preferred embodiment of the present invention, a specialized improved computer system is created—here the devices and/or systems that are specifically structured, configured, connected, and/or programmed to store incomplete parts/portions of security feature(s), and work together to merge the incomplete parts/portions of security feature(s) to form a fully formed complete security feature, optionally to briefly store the fully formed complete security feature, and to print the fully formed complete security feature on demand with or without other data. This storage of incomplete parts/portions of security feature(s) of a security feature until needed makes it harder for a hacker to extract the complete digital image of the security pattern for unauthorized reproduction of secure documents.
The data transmission, communication, and any control signals between the at least one host computer, printer, and any server computers are sent and received pursuant to wired or wireless communication. The wireless communication/transmission can be over a network, which can be any suitable wired or wireless network capable of transmitting communication, including but not limited to a telephone network, Internet, Intranet, local area network, Ethernet, online communication, offline communications, wireless communications and/or similar communications means. The wireless transmission can be accomplished through any wireless protocol/technology, including, but not limited to, ZigBee standards-based protocol, Bluetooth technology, and/or Wi-Fi technology. Further, this data can be encrypted as needed based on the sensitivity of the data or the location the printer, for example. The devices can be located in the same room, in a different room in the same building, and/or in a completely different building and location from each other. A user using a host computer (or a different computer) can send data transmission, control or communication signals to instruct the printer to merge any incomplete parts/portions of security feature(s) to form a fully formed complete security feature, and/or to print a particular fully formed complete security feature (e.g., a particular pantograph loaded in memory of the printer) on a media substrate, and to merge the particular security feature with variable data.
The present invention will be more fully understood and appreciated by reading the following Detailed Description in conjunction with the accompanying drawings, in which:
The present invention will be more fully understood and appreciated by reading the following Detailed Description in conjunction with the accompanying drawings, wherein like reference numerals refer to like components.
Turning to
Turning to
In a preferred embodiment, when there is a need for the complete security feature to be printed, the printer 104 contains firmware 110 that is programmed to take the incomplete part of the security feature from its memory 112 and merge it with the other incomplete parts of the security feature that can be downloaded to the printer 104 from the external memory locations (e.g., 121 and 103) which can be in wired or wireless connection (106, 108) with the printer 104. The printer firmware 110 can be programmed to merge the incomplete parts/portions of the security feature in the non-permanent memory of the printer, and can be programmed to execute printing of the security feature and complete the secure document.
The receipt shown in
The computer 102 can include a personal computer, desktop, laptop, and tablet, as well as any other fixed or mobile computerized device comprising a processor and a network connection and capable of communicating with the other components (e.g., printer 104 and server computer(s) 120). The computer, therefore, can be any processor-based device that is capable of facilitating a user's 113 access and interaction with the printer 104 and server computer(s) 120.
The server computer(s) 120 can include any type and number of server computers that are used for the purposes of cloud computing and storage, as should generally be understood by those of skill in the art. The server computers can include a master server and database(s), and a plurality of sub-servers (virtual or otherwise), some of which can be private servers requiring permissions (e.g., login, password) to gain access, depending on the specifics of the implementation required as described herein.
Each of the printer 104, computer 102, and server computer(s) 120 can include a processor that can comprise or are in communication with a non-transitory computer-readable medium on which is stored computer-executable program instructions (software, or firmware in the case of a printer 104) that are executed by the processor to cause the processor to perform one or more of the functionalities and/or method step described herein. In an alternative embodiment, a processor that works with a particular component can be located remotely instead of locally, and can be in wired or wireless communication with the component.
Each of the printer 104, computer 102, and server computer(s) 120 can include a local memory (112, 103, and 121, respectively, as shown in
Each of the printer 104, computer 102, and server computer(s) 120 can be structured, configured, connected, and/or programmed to merge incomplete parts/portions of at least one security feature, whether or not one of the incomplete parts/portions to be merged is locally stored to the component performing a merging step, to form a more complete security feature and then to transmit the more complete security feature to another component to finalize and fully form the complete security feature (preferably at the printer, but it does not have to be finalized at the printer). An embodiment of the present invention contemplates that only one of the components “collect” each and every incomplete parts/portions of at least one security feature, and merge each and every incomplete part/portion of at least one security feature to finalize and fully form the complete security feature. This “collecting” and “merging” can be done directly by the printer automatically per the programming of the printer firmware (and/or as preferably controlled by the user giving commands at and through the computer 102) after each and every incomplete part/portion of at least one security feature are transmitted to and collected by the printer. The printer 14 can optionally store the fully formed complete security feature in memory 114, and print the fully formed complete security feature on demand with or without other data.
In accordance with an embodiment of the present invention, there is provided a method for performing the functions of the system components described herein. The method can include one or more of the following steps as shown in
Referring to
Advantages of the invention are illustrated by the following Exemplary System, Uses and Functionalities description, in addition to the disclosure provided above. However, the particular components, uses, functionalities and amounts thereof recited in this description (as well as the description above), as well as other conditions and details, are to be interpreted to apply broadly in the art and should not be construed to unduly restrict or limit embodiments of the invention in any way.
Exemplary System, Uses, and Functionalities
As discussed herein, the printed security media (e.g., a document) can include several components, including, but not limited to a standard document, a security feature component(s) (elements of a complete security pattern to be printed on the standard document) initially stored in and received from printer memory 112, and a security pattern(s) (elements of a complete security pattern to be printed on the standard document) initially stored in and received from a host computers 113 and/or a server computer's memory 121 and transmitted to a printer to be combined/merged with the security pattern stored in the printer memory 112 to form a complete security feature/pattern on the standard document (making the document a secured or security document).
Referring to
Referring to
Referring to
Referring to
Embodiments of a thermal printer, examples of which can be used as the printer in conjunction with embodiments of the methods and systems described herein and shown in the referenced Figures, exist and are possible. Applicant hereby incorporates by reference the embodiments of thermal printer 104 disclosed in paragraphs [0010]-[0014] and [0028]-[0031] and
Embodiments of a thermal transfer printer, examples of which can be used as the printer in conjunction with embodiments of the methods and systems described herein and shown in the referenced Figures, exist and are possible. The thermal transfer printer can be connected, configured, programmed and/or structured to perform the functions (e.g., storing, merging, and printing on standard media substrate) described herein.
In accordance with an embodiment, a thermal print head element can have a dot resolution of 300 dots per inch (DPI) or higher to print security features at an acceptable dot resolution as set forth herein.
Even though thermal printers and thermal transfer printers are specifically referenced and described in certain embodiments herein, other digital printers and corresponding appropriate media substrates are contemplated to be part of the systems and methods described herein.
A “module,” as may be used herein, can include, among other things, the identification of specific functionality represented by specific computer software code of a software program. A software program may contain code representing one or more modules, and the code representing a particular module can be represented by consecutive or non-consecutive lines of code.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied/implemented as a computer system, method or computer program product. The computer program product can have a computer processor or neural network, for example, which carries out the instructions of a computer program. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, and entirely firmware embodiment, or an embodiment combining software/firmware and hardware aspects that may all generally be referred to herein as a “circuit,” “module,” “system,” or an “engine.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction performance system, apparatus, or device.
The program code may perform entirely on the user's computer, partly on the user's computer, completely or partly on the printer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The flowcharts/block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowcharts/block diagrams may represent a module, segment, or portion of code, which comprises instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be performed substantially concurrently, or the blocks may sometimes be performed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
While several embodiments of the invention have been discussed, it will be appreciated by those skilled in the art that various modifications and variations of the present invention are possible. Such modifications do not depart from the spirit and scope of the present invention.
The present application claims priority to and the benefit of U.S. provisional patent application No. 61/947,111, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,121, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,135, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,143, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,152, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,160, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,174, filed on Mar. 3, 201; U.S. provisional patent application No. 61/947,197, filed on Mar. 3, 2014; U.S. provisional patent application No. 61/947,206, filed on Mar. 3, 2014; and U.S. provisional patent application No. 61/947,214, filed on Mar. 3, 2014, the entire contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4638340 | Iiyama | Jan 1987 | A |
4827425 | Linden | May 1989 | A |
5512977 | Imai | Apr 1996 | A |
5552009 | Zager | Sep 1996 | A |
5619026 | Chou | Apr 1997 | A |
5991411 | Kaufman | Nov 1999 | A |
6196459 | Goman | Mar 2001 | B1 |
6202155 | Tushie | Mar 2001 | B1 |
6203069 | Outwater | Mar 2001 | B1 |
6335799 | Provost | Jan 2002 | B1 |
6362869 | Silverbrook | Mar 2002 | B1 |
6362893 | Francis | Mar 2002 | B1 |
6367011 | Lee | Apr 2002 | B1 |
6390377 | Dlugos | May 2002 | B1 |
6394358 | Thaxton | May 2002 | B1 |
6396594 | French | May 2002 | B1 |
6597385 | Verdyck | Jul 2003 | B2 |
6650430 | Francis | Nov 2003 | B2 |
6738903 | Haines | May 2004 | B1 |
6750985 | Rhoads | Jun 2004 | B2 |
6985600 | Rhoads | Jan 2006 | B2 |
6991164 | Lemelson | Jan 2006 | B2 |
7025269 | Marshall | Apr 2006 | B2 |
7099026 | Hren | Aug 2006 | B1 |
7229025 | Sussmeier | Jun 2007 | B2 |
7233930 | Ryan, Jr. | Jun 2007 | B1 |
7284279 | Morrison | Oct 2007 | B2 |
7286150 | Hann | Oct 2007 | B2 |
7375844 | Kitahara | May 2008 | B2 |
7383768 | Reichwein | Jun 2008 | B2 |
7460252 | Campbell | Dec 2008 | B2 |
7535586 | Kumashio | May 2009 | B2 |
7546952 | Knowles | Jun 2009 | B2 |
7556444 | Kurashina | Jul 2009 | B2 |
7588188 | Knowles | Sep 2009 | B2 |
7614560 | Knowles | Nov 2009 | B2 |
7691280 | Waldrop | Apr 2010 | B2 |
7852359 | Evans | Dec 2010 | B2 |
7958359 | Sharma | Jun 2011 | B2 |
8033477 | Jones | Oct 2011 | B2 |
8045191 | Yamanaka | Oct 2011 | B2 |
8085438 | Hersch | Dec 2011 | B2 |
8100330 | Bulan | Jan 2012 | B2 |
8156416 | St Jacques, Jr. | Apr 2012 | B2 |
8203583 | Wilsher | Jun 2012 | B2 |
8240797 | Haas | Aug 2012 | B2 |
8335933 | Humphrey | Dec 2012 | B2 |
8339632 | Wasamoto | Dec 2012 | B2 |
8345316 | Bradley | Jan 2013 | B2 |
8347379 | Tsuzuki | Jan 2013 | B2 |
8355180 | Wu | Jan 2013 | B2 |
8395646 | Yamamoto | Mar 2013 | B2 |
8402371 | Tang | Mar 2013 | B2 |
8424751 | Liu | Apr 2013 | B2 |
8481108 | Roth | Jul 2013 | B2 |
8496186 | Ito | Jul 2013 | B2 |
8551387 | Feldman | Oct 2013 | B2 |
8593696 | Picard | Nov 2013 | B2 |
8687241 | Simske | Apr 2014 | B2 |
8736897 | Pierce | May 2014 | B2 |
8826004 | Euchner | Sep 2014 | B2 |
9577996 | Heinrich | Feb 2017 | B2 |
20020042884 | Wu | Apr 2002 | A1 |
20020051167 | Francis | May 2002 | A1 |
20030088160 | Halleck et al. | May 2003 | A1 |
20030145218 | Hutchison | Jul 2003 | A1 |
20040050936 | Look | Mar 2004 | A1 |
20040179078 | Gundjian | Sep 2004 | A1 |
20050057764 | Kobziar | Mar 2005 | A1 |
20060044589 | Nakagawaji | Mar 2006 | A1 |
20060082797 | Gardner | Apr 2006 | A1 |
20060212715 | Terao | Sep 2006 | A1 |
20060283939 | Hwang | Dec 2006 | A1 |
20070091377 | Smith | Apr 2007 | A1 |
20070103536 | Fujimaki | May 2007 | A1 |
20080144116 | Pauly | Jun 2008 | A1 |
20090086967 | Ozawa | Apr 2009 | A1 |
20090279143 | St Jacques, Jr. | Nov 2009 | A1 |
20100012736 | Wilds | Jan 2010 | A1 |
20100071077 | Morris | Mar 2010 | A1 |
20100108874 | Zahedi | May 2010 | A1 |
20100162004 | Dodgson | Jun 2010 | A1 |
20100208889 | Humphrey | Aug 2010 | A1 |
20110000967 | Labrec | Jan 2011 | A1 |
20110016388 | Tang | Jan 2011 | A1 |
20110045256 | Luther | Feb 2011 | A1 |
20110123132 | Schneck | May 2011 | A1 |
20120176651 | Pham | Jul 2012 | A1 |
20130015236 | Porter | Jan 2013 | A1 |
20130141755 | Miller | Jun 2013 | A1 |
20130215474 | Caton | Aug 2013 | A1 |
20130320099 | Acton | Dec 2013 | A1 |
20140185800 | Fallon | Jul 2014 | A1 |
20140233053 | Kakutani | Aug 2014 | A1 |
Number | Date | Country |
---|---|---|
101105837 | Jan 2008 | CN |
102509032 | Jun 2012 | CN |
102658739 | Sep 2012 | CN |
2003334997 | Nov 2003 | JP |
2005202553 | Jul 2005 | JP |
2007058535 | Mar 2007 | JP |
20040099065 | Nov 2004 | KR |
20040100540 | Dec 2004 | KR |
2005051676 | Jun 2005 | WO |
2009106107 | Sep 2009 | WO |
Entry |
---|
Wilson, S., The “Security Printer” Model for CA Operations, Lockstep White Paper No. 3, Sep. 2005, pp. 1-7, Lockstep Consulting Pty Ltd. |
Security Printing and Seals, Chapter 14, pp. 433-455. |
Simske, S., Aronoff, J., Sturgill, M., Security Printing Deterrents: A Comparison of Thermal Ink Jet, Dry Electrophotographic, and Liquid Electrophotographic Printing, Journal of Imaging Science and Technology, 2008, vol. 52(5). |
Jordan, F., Yribar, J., Turning Your Smartphone Into an Authentication Device, International Pharmaceutical Industry, 2013, pp. 104-112, vol. 5, Issue 3. |
Lexmark Cutting-Edge Security for Printers and MFPs brochure, Lexmark, 2011. |
Hattersley, J., Invisible and Fluorescing Bar Code Printing and Reading, InData Systems, Industrial Data Entry Automation Systems Incorporated, pp. 1-12. |
Digital Printing Security Solutions, Best Practices, Kodak, 2011. |
Extend Labeling Control Beyond the Enterprise, http://www.nicelabel.com/products/powerforms-web, Jun. 25, 2014. |
Security Features of Lexmark Laser Printers: Overview, Technical White Paper, Lexmark, copyright 2005. |
PCT International Search Report dated May 19, 2015. |
Data Splitting; Retrieved from https://web.archive.org/web/20110514225526/http://searchsecurity/techtarget.com/definition/data-splitting?vgnextfmt=print, retrieved on Aug. 18, 2015. |
Number | Date | Country | |
---|---|---|---|
20150249770 A1 | Sep 2015 | US |
Number | Date | Country | |
---|---|---|---|
61947111 | Mar 2014 | US | |
61947121 | Mar 2014 | US | |
61947135 | Mar 2014 | US | |
61947143 | Mar 2014 | US | |
61947152 | Mar 2014 | US | |
61947160 | Mar 2014 | US | |
61947174 | Mar 2014 | US | |
61947197 | Mar 2014 | US | |
61947206 | Mar 2014 | US | |
61947214 | Mar 2014 | US |