This invention. relates in general to authentication objects having fluorescent indicia and in particular to authentication of objects using a cell phone.
Applying invisible covert marks and indicia to products, product packaging, documents and printed materials is a well established method for authenticating products and thus combating counterfeiting. In addition, when variable invisible information is printed, batch-level and item-level tracking of products can be accomplished in a covert manner. Common covert marking materials are ultraviolet (UV) fluorescent inks. The security information is invisible under normal, visible lighting but is revealed when a UV light source is used, such as a UV flashlight. The product or document of interest is authenticated by revealing the invisible indicia with the UV flashlight and visually verifying the image or human-readable text or code that is revealed. While this can be an effective security feature, the authentication process has limitations.
When authenticating products and documents in the field, it is desirable for investigators to perform their audits in a covert manner, often without handling the item to be authenticated or using extraneous or unusual devices to reveal the covert indicia. It is therefore useful to be able to authenticate an item from some distance, not require the revealing device be in close proximity to the product, and to use revealing devices that are commonplace and inconspicuous.
During investigations, it is often the case that many items need to be authenticated sequentially, and the results of the authentication audit transmitted to another location. It is therefore useful to be able to automate the method for recording and storing the results and to have a convenient means for transmitting the results once collected. In these cases, a UV flashlight alone is not adequate to support the required workflow.
It is also sometimes desirable to have an immediate response to a positive or negative authentication audit. It is therefore useful to have a system that can not only transmit the results of an authentication audit, but also receive a response to the authentication.
Because acquiring information in the field is frequently a requirement, mobile devices are extremely useful when conducting investigations. It is also useful to be able to acquire images of indicia, display such images and analyze them with mobile devices. For example, smart phones include useful sensors, flashes for light exposures, and microprocessors for processing data and images. However, such devices are designed to detect visible indicia and are not suitable for detecting covert invisible indicia.
It is also often desirable to encode a large amount of data in invisible indicia, for example an item-level serialized number. To reduce the amount of space required to print the data or to speed up reading the printed information, the data can be printed in the form of a machine-readable code rather than a human-readable code, for example a linear or two-dimensional bar code. It is therefore useful to be able to quickly and conveniently decode a revealed, covert machine-readable code to be able to quickly authenticate the item. Again, in these cases, a UV flashlight is insufficient to support the required workflow.
In addition to fluorescent materials, phosphorescent materials can be used to create invisible indicia. Phosphorescent materials not only have a signature wavelength of light that is emitted, they also have a signature rate of decay of that emission. It is well known that rates of decay can be determined by measuring the intensity of emission at varying time points. It is also well known that the wavelength of emission and rate of decay of emission are characteristics that can be used to identify phosphorescent materials.
Briefly, according to one aspect of the present invention, a method of authenticating an object includes applying indicia to the object, wherein the indicia includes at least two different types of particles which fluoresce upon exposure to light and which have different decay rates. The indicia is exposed to light from a lamp causing the plurality of particles to fluoresce. At least a first image of the indicia is captured with a sensor at a first time and a second image of the indicia at a second time different from the first time. The images are analyzed to determine decay rates of the at least two types of particles and object is authenticated if the decay rates match stored information.
In another embodiment of the present invention the conversion device comprises a photovoltaic device that converts the visible light emitted by the camera flash to electrical power, and a UV lamp that converts the electric power to UV light. The conversion device can also contain a capacitor.
The conversion device can be affixed to the camera in any of a number of ways including via adhesives, mechanical hardware, and magnets. The conversion device can also be incorporated into a case or a shell that is attached to the camera, for example in a manner similar to cases and shells that are used with mobile phones (also referred to as cell phones and smart phones) or tablet devices.
According to another aspect of the present invention, the method can further involve analyzing the captured image with a microprocessor, using the microprocessor to compare the analyzed image to stored, reference, or standard information to determine a match, and then authenticating the image if there is a match. By association, if the image is authentic then so is the item having the image.
According to another aspect of the present invention, the method can further involve displaying the captured image with a display on the camera and comparing the displayed image to a stored or reference or standard image and authenticating the image (and therefore item) if there is a match.
According to another aspect of the present invention, the method can further involve transmitting the captured image from the camera to a remote computer for comparison to a stored, reference or standard image and authenticating the image (and therefore item) if there is a match. The result of the authentication audit can then be transmitted back to the camera.
In one embodiment of the present invention the camera, flash, sensor, microprocessor and memory are components of a cell phone or smart phone.
According to one aspect of the present invention a method of authenticating an object includes mounting a visible-to-UV light conversion device over a flash on a camera or cell phone; activating the camera to initiate a visible-light flash exposure; converting visible light from the flash to UV light with the conversion device; capturing an image of indicia on the object with the sensor on the camera or cell phone; analyzing the captured image; comparing the analyzed image to stored information to determine a match; and authenticating the object if the captured image matches the stored information.
According to an aspect of the present invention the UV-light-fluorescent indicia comprise a plurality of UV-responsive materials that can differ in their characteristic response to UV illumination. The response characteristic can be color of emitted light, brightness (or luminance) of emitted light, or rate of decay of emitted light. The indicia can be an image, text, a graphic element, a bar code, or a logo.
In a method of the present invention an object is authenticated by applying indicia to the object, for example a product or document. The indicia comprises at least two different types of particles that fluoresce upon exposure to light and have different decay rates. The method further includes exposing the indicia to light from a lamp causing the plurality of particles to fluoresce; capturing at least a first image of the indicia with a sensor at a first time and a second image of the indicia at a second time different from the first time; analyzing the images to determine decay rates of the at least two types of particles; and authenticating the object if the decay matches stored or reference information.
The invention and its objects and advantages will become more apparent in the detailed description of the preferred embodiment presented below.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
The present invention will be directed in particular to elements forming part of, or in cooperation more directly with the apparatus in accordance with the present invention. It is to be understood that elements not specifically shown or described may take various forms well known to those skilled in the art.
The microprocessor 26 can, for example, be used to compare the captured image to a stored reference image of an authentic object and the authentication process is based on the similarity of the captured image and the stored reference image. The invisible indicia could also be printed in the form of a machine readable code, for example a one or two-dimensional barcode. Examples of these barcodes are Data Matrix barcodes, QR-codes, linear barcode formats like 2 of 5 or code—128. The microprocessor analyzes the image of the invisible indicia and decodes the barcode using a decoding algorithm. Barcode decoding algorithms are well known and widely available. The decoded data are used to authenticate the object, by, for example, comparing the code value to stored values of valid codes. Thus, indicia (and objects) can be authenticated by comparing a captured image of the indicia to a stored reference image. Alternatively, the captured image can be analyzed, for example by processor 26, to extract information from the captured image and the extracted information compared to reference information to authenticate the indicia if a match is found.
The emission of light by a material or substance that has absorbed light, usually of a different wavelength, is referred to as luminescence. Two categories of luminescence are fluorescence and phosphorescence. Fluorescence is characterized by nearly immediate reradiation that ceases instantly when the incident light stops. Reradiation that continues for a noticeable time after the incident light has stopped is referred to as phosphorescence. Certain materials can also change color upon exposure to light. This effect is called photochromism. Copper-activated zinc sulfide or rate earth-doped strontium aluminates are examples of materials that exhibit phosphorescence with long phosphorescence lifetimes.
In an embodiment, a typical single silicon photocell used as a photovoltaic device 30 has an output voltage of just 0.6 V (open circuit). At peak power, output voltages are typically 15-20% lower. Therefore, in such an embodiment the output voltage of a single silicon photocell is insufficient to operate the UV LED. Mechanisms exist to increase voltages at the expense of current by employing voltage multipliers. These circuits first convert the supply DC voltage to a pulsed or AC voltage and then use charge pumps made of diodes and rectifiers, or transformers to generate the higher voltage. The use of a voltage multiplier, however, adds complexity and size to the visible-to-UV conversion device 24.
Another way to increase the voltage of a photovoltaic cell is to connect several photovoltaic cells in series. While most of the serially connected photovoltaic devices are large area solar cells and therefore unsuitable to collect the light in close proximity from the small flash of a camera 18, a few devices exist that consist of serially connected photovoltaic devices with a small active area. One example of such a device is a 4V output photo cell, part number CPC1842N, by Clare Inc, Beverly, Mass. This device is rated to produce 4V/0.1 mA under direct sunlight. It has an active area of 3.5 mm by 2.7 mm, which is comparable in size to the active area of a white LED flash used in most smart phone cameras. Tests were conducted using this device mounted in front of and facing the flash LED of a Samsung Galaxy S3 smart phone (Samsung Electronics, South Korea) in order to determine the electrical voltage and current that can be obtained during the image capture using the smart phone flash.
Thus, in various embodiments, the UV-responsive materials in the indicia can form an image, a color image, a pattern, graphic element, random arrangement, or text.
In further embodiments, more than two flashes are used in sequence and more than two or more than three image captures are employed to authenticate an object 12. For example material 130 could require three flashes to emit light with an intensity greater than the threshold level 136.
Thus, in various embodiments of the present invention, authentication can depend upon the presence of the different UV-responsive material, their rate of decay in response to UV-light exposure, to a pre-determined sequence of UV-light exposures, and to a pre-determined sequence of image captures. The UV-light exposures and image captures can be at regular intervals or irregular intervals. Image captures can be made immediately after a flash or independently of a flash. The sequence and timing of flashes and image captures can be used to control temporal material emission and thus to determine authenticity.
The different materials can be located at spatially distinct locations, as in
In another embodiment, the first captured image can be used to determine the number and timing of subsequent flash exposures and image captures. The first image can be analyzed to determine information that is then used to find flash and image capture timing information for subsequent flashes and image captures and to find authentication information, for example in a lookup table in memory 28. Thus, the time until a second flash or image capture can depend upon information extracted from an image capture with a flash at a first time.
An evaluation of images of a plurality of flash and non-flash exposures is not only useful for UV responsive materials, it can be applied to visible and IR responsive materials as well. Certain phosphors such as rare earth-doped strontium aluminates or copper-activated zinc sulfide exhibit phosphorescence upon exposure with visible light. In this situation, the image sequences described in
The invention has been described in detail with particular reference to certain preferred embodiments thereof, but it will be understood that variations and modifications can be effected within the scope of the invention.
12 object
14 UV light fluorescent indicia
15 visible light
16 incident UV light
17 reflected visible light
18 camera
20 flash
22 sensor
24 visible-to-UV light conversion device
26 microprocessor
28 memory
30 photovoltaic device
32 UV lamp
34 electrical connection
36 light shield
38 control electronics
40 energy storage (capacitor or rechargeable battery)
100 mobile device with digital camera (smart phone)—front side
101 mobile device with digital camera (smart phone)—back side
110 display
120 data transmission (external communication, local area network communication, or cellular telephony communication)
122 remote computer
130 UV responsive particle with first response
132 UV responsive particle with second response
136 threshold emission intensity level
140 first flash exposure
141 first image acquisition
142 second flash exposure
143 second image acquisition
145 third image acquisition
150 first image when the flash is not operated
152 second image when flash is operated
154 third image when flash is not operated
160 first image when the flash is not operated
162 second image when flash is operated
164 third image when flash is operated
This application is a continuation of U.S. patent application Ser. No. 14/488,384, filed Sep. 17, 2014, titled “Method of Authenticating an Object” and is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 14488384 | Sep 2014 | US |
Child | 15622418 | US |