US20050156318A1 - Security marking and security mark - Google Patents

Security marking and security mark Download PDF

Info

Publication number
US20050156318A1
US20050156318A1 US11/029,270 US2927005A US2005156318A1 US 20050156318 A1 US20050156318 A1 US 20050156318A1 US 2927005 A US2927005 A US 2927005A US 2005156318 A1 US2005156318 A1 US 2005156318A1
Authority
US
United States
Prior art keywords
conductive
nano tubes
identity marking
card
marking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/029,270
Inventor
Joel Douglas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/029,270 priority Critical patent/US20050156318A1/en
Publication of US20050156318A1 publication Critical patent/US20050156318A1/en
Priority to US12/006,940 priority patent/US7513437B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B82NANOTECHNOLOGY
    • B82YSPECIFIC USES OR APPLICATIONS OF NANOSTRUCTURES; MEASUREMENT OR ANALYSIS OF NANOSTRUCTURES; MANUFACTURE OR TREATMENT OF NANOSTRUCTURES
    • B82Y10/00Nanotechnology for information processing, storage or transmission, e.g. quantum computing or single electron logic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/18Constructional details

Definitions

  • the present invention relates to a security marking formed from a layer of conductive materials that is patterned so as to have identification information captured therein.
  • the conductive coating layer may be formed by printing, etching, or formulation.
  • the conductive layer can be made from carbon nano tube conductive ink, conductive films or conductive inks formed from metals and oxides, but is not so limited. As will be shown, the conductive coating layer may be applied to security cards, or directly to products to prevent counterfeiting.
  • the present invention relates to a security marking consisting of several layers of materials.
  • the present security marking may consist of a layer of conductive material sections with an overlying layer of protective material.
  • the positioning of conductive materials in the conductive layer of the security marking carries, at a suitable point, information which serves to identify the card holder or product, and may have additional security markings, such as biometric information or product identification information.
  • the conductive coating layer can be applied to a security card so that the conductive layer and can be formed to have either a single or series of resistors that make the identity tag virtually forgery resistant.
  • Security cards are used as information carriers or data carriers for security markings, identity cards, check cards, credit cards, personal passes, passports, product identifiers and other identification carriers. Security cards must be secure against forgery. Also, it must be easy to check the authenticity of the security cards. Security markings are increasingly manufactured in the form of a fused laminate in which a card core carrying the information is protected by other transparent films.
  • German Offenlegungsschrift No. 2,308,876 provides an identity card consisting of a relatively thick carrier film and a thin transparent film, between which there is a special paper having internal features, such as watermarks, banknote printings or the like, which serve for protection against forgeries and cause differences in the thickness of the paper.
  • the three layers are plastified together in such a way that the internal features are manually, mechanically and/or visually detectable through the transparent film.
  • Further markings which serve to identify the card holder are provided at a suitable point on this known security marking. For example, a photograph in the form of a film transparency is inserted during plastifying between the special paper and the carrier film and is firmly bonded to the special paper.
  • it is possible, at any desired point on the front or rear of the security marking to laminate a strip of special paper, printed according to security technology, onto the outside of the plastic material, as a field for later insertion of signatures or other handwritten entries.
  • Paper has the advantage that numerous latent security markings, such as watermarks, banknote printings, security filaments and the like, can be contained therein, while, by contrast, the material which is used for the manufacture of plastic cards and consists entirely of plastic does not contain any authenticity or security markings of this type.
  • latent security markings such as watermarks, banknote printings, security filaments and the like
  • the material which is used for the manufacture of plastic cards and consists entirely of plastic does not contain any authenticity or security markings of this type.
  • these laminations can be opened up relatively easily and are thus accessible to manipulations and forgeries of any kind.
  • German Auslegeschrift No. 2,163,943 discloses a personal security marking which comprises a combination of a support layer, an electrically conductive layer, a barrier layer, a photoconductive layer with an organic photoconductor, optionally a cover layer, a protective layer on the photoconductive layer or on the cover layer, a protective layer on the rear of the layer support and, optionally, a cover layer on the last-mentioned protective layer.
  • a personal security marking a number of different materials are assembled to give a laminate which, due to the lack of homogeneity of the individual layers, can be split up so that it is possible to carry out forgeries.
  • U.S. Pat. No. 5,592,408 issued to Keskin, et al. describes an identification card and access control device which includes a header piece with stored memory and terminals for interfacing with an electronic port of a reader device, with encoded data programmed into the memory.
  • An identification card, identifying the holder, is attached to the electronic header piece and bears printed information relating to and identifying the intended holder.
  • U.S. Pat. No. 6,744,367 issued to Forster describes an identification tag comprising a multilayer assembly incorporating, in sequence, a metal backing layer, a bulk structural layer, a piezo-electric layer and an electrode layer.
  • the electrode layer incorporates antennas structures for receiving interrogating radiation comprising a first radiation component at a relatively lower frequency and a second radiation component at a relatively higher frequency.
  • the electrode layer also incorporates a structure for modulating a second signal generated in response to receiving the second component by a first signal generated in response to receiving the first component to generate a modulated signal which is re-emitted as reflected radiation from the tag.
  • the presence of the tag is determinable from modulation components present in the reflected radiation, thereby distinguishing the tag from other objects capable of reflecting radiation, but not modulating it.
  • U.S. Pat. No. 6,572,015 issued to Norton describes a system, apparatus and method for enabling the operation of a vehicle or other equipment by using a smart card for transmitting an authorization code to the vehicle or the other equipment. Without the authorization code from the smart card the vehicle or other equipment is inoperable.
  • U.S. Pat. No. 6,753,830 issued to Gelbman describes a flexible electronic label.
  • the electronic label provides for displaying information in connection with a mammal, non-mammal, an item or location.
  • the label includes a display assembly having electronic ink disposed on a support, one or more antennas for sending or receiving signals corresponding to one of instructions, programs, data or selected indicia to be displayed by said display assembly, a storage element in circuit with the antenna for storing the instructions, programs, data and indicia, and one or more processors for intelligently determining the indicia to be displayed by the display assembly, for controlling and coordinating operation of the label, and for generating output signals for instructing the display assembly to display the indicia.
  • a lens has a preformed transparent hologram, metallized portions are provided and may be altered through selective application of heat to predetermined parts thereof to create information which may be fixed or variable. Printing may be provided on the hologram before metallizing.
  • a base portion underlies the metallized layer.
  • an opaque base portion has a hologram formed in the upper surface thereof with portions of the hologram being made readily visible by partial metallization covering only portions of the hologram with or without information provided as by printing overlying or underlying portions of the metallized sector or both.
  • a transparent overlying lens is secured in overlying relationship.
  • Metallizing may be such as to permit viewing underlying hologram portions or information or not.
  • U.S. Pat. No. 6,629,591 issued to Griswold, et al. describes a token for use in a cashless transaction involving an electronic device that includes a token body having a coin shape.
  • the token has a digital circuit embedded within the token body and a memory embedded within the token body that is coupled to the digital circuit.
  • the token also includes an input/output interface embedded within the token body that is coupled to the digital circuit and which enables the digital circuit to communicate with the electronic device.
  • U.S. Pat. No. 5,631,039 issued to Knight, et al. describes a method of manufacture of a security thread suitable for use in security articles including security paper such as that used for banknotes.
  • U.S. Pat. No. 6,547,151 issued to Baldi describes a currency note having an identification and/or authentication element including an integrated circuit.
  • the integrated circuit can store, securely in electronic form and accessible from outside, such information as: the value, serial number, issuer, and date of issuance.
  • U.S. Pat. No. 4,450,024 issued to Haghiri-Tehrani, et al. describes an identification card equipped with an integrated circuit, in which the circuit along with its connection leads is arranged on a carrier element which is embeddedly enclosed by the card on all sides by use of the hot lamination technique.
  • U.S. Pat. No. 5,651,615 issued to Hurier describes a security device for identifying products that includes a printing medium in which luminescent agents are dispersed, having at least one opaque part disposed on at least one luminescent part of the medium.
  • the opaque part is the same color as the luminescent part and has at least one contour of a different color. When illuminated by predetermined radiation in the non-visible spectrum, the device shows an image different than that observed in ordinary light.
  • U.S. Pat. No. 6,203,069 issued to Outwater, et al. describes a product authentication system and method employing a unique mark that is simple and cost-effective to apply and read, but provides several layers of protection, including anti-counterfeit and anti-diversion, against counterfeiters.
  • the unique mark includes a bar code that is printed in invisible ink comprising a UV or near-IR ink and an IR mark.
  • the first layer of protection is invisibility.
  • the second layer of protection is the bar code itself.
  • the third layer of protection is the presence of the IR mark in the unique mark.
  • the fourth layer of protection is the IR emitting characteristics of the IR mark.
  • U.S. Pat. No. 5,471,039 issued to Irwin, Jr., et al. describes a document having printed electronic circuits by using an electronic verification machine that determines the electrical characteristics or signatures of the circuits printed on the document.
  • the electronic verification machine electronically couples with the circuit and applies an excitation signal such as an AC signal having a predetermined frequency to the circuit.
  • a detection circuit in the electronic verification machine then generates a detection signal in response to the excitation signal which represents the characteristics of the circuit printed on the document.
  • the electronic verification machine can also be used to stigmatize the document by applying a signal to the electronic circuits having sufficient strength to alter the electronic circuit.
  • U.S. Patent application 2001/0035822 applied for by Seidel describes an anti theft tack device incorporating a detectable element which can be attached to the body component of an existing electronic article surveillance security tag to replace the tack-like connecting component of the security tag.
  • U.S. Pat. No. 5,508,684 issued to Becker describes a tag circuit system using resonant circuit technology in conjunction with an insulative substrate and conductive ink or metal conductor to permit the tag to be sewn into the clothing, protecting the circuit elements, yet providing a trace on a portion of the tag which can be clipped from the main portion of the tag to change the operation of the tag.
  • Biometric information such as a fingerprint can be reduced to a series of terminations or bifurcations (called “minutia”) corresponding to various locations on the fingerprint.
  • minutia a series of terminations or bifurcations
  • U.S. Pat. No. 4,947,442 issued to Tanaka, et al. describes a method and apparatus for matching fingerprints in which the collation rate is improved by using both characteristic and non-characteristic minutia for the collation process.
  • An image processing unit used in the apparatus cannot determine whether the collation minutia searched are characteristic or non-characteristic since an Integrated Circuit (IC) card holds a list of collation minutia records, thus offering improved security.
  • IC Integrated Circuit
  • random numbers may be utilized for accessing the collation minutia record list for further improved security.
  • the need to have the data stored on a processing unit increases the cost and complexity.
  • a standard accepted means of identifying an individual is through their fingerprint or retinal image.
  • Numerous fingerprint algorithms and methods have been proposed and used in existing art such as U.S. Pat. No. 6,314,196 issued to Yamaguchi, et al. which achieves the reliability and simplicity in registering a fingerprint by indicating the quality of a fingerprint image by the number of pseudo minutiae.
  • U.S. Pat. No. 4,783,823 issued to Tasaki, et al. describes a card and a card identifying apparatus.
  • the card is imparted with predetermined characteristic information in the form of an embossment pattern, a character pattern, a fingerprint pattern, a colored pattern or a combination of selected ones of these patterns, while information corresponding to the predetermined characteristic information is stored in a memory incorporated in the card.
  • the card identifying apparatus Upon insertion of the card into the card identifying apparatus, the latter senses the characteristic information while reading out the corresponding information from the card for collation. When coincidence is found between both sets of information, it is decided that the card is genuine.
  • the need to have the data stored on a processing unit increases the cost and complexity.
  • U.S. Pat. No. 6,560,741 issued to Gerety, et al. attempts to eliminate the microprocessor based card and utilizes a two-dimensional, high-density, damage-tolerant printed code suitable for encoding multiple biometrics and text for positive off-line identity verification.
  • the two-dimensional, high-density, damage-tolerant printed code is suitable for printing on a conventionally sized ISO card or other papers used in verifying identity.
  • An ISO-sized card or other identity paper bearing a two-dimensional, high-density, damage-tolerant printed code encoding multiple biometrics, e.g., encoded image likeness and multiple fingerprint templates, may be used with an off-line integrated positive identity verification apparatus that is capable of decoding the image and fingerprint samples taken from an individual whose identity is sought to be verified.
  • an off-line integrated positive identity verification apparatus that is capable of decoding the image and fingerprint samples taken from an individual whose identity is sought to be verified.
  • the two dimensional code can be read by conventional means the two dimensional code can be readily forged because it does not have a built in verifying mechanism to allow the reader to check for authenticity.
  • U.S. Pat. No. 5,522,623, Soules, et al. describes an apparently conventional document such as an identification (ID) card that is constructed as a laminate within which a code or other coding indicia such as a photograph, bar code or fingerprint is concealed from human view.
  • ID identification
  • the document is read by a conventional electro-optic reader means placed against a face of the card.
  • the reader uses a beam of light in the wavelength absorbed by the material with which the coded indicia is produced, but reflected by the background against which the coded indicia is “seen” by the beam.
  • the card is preferably a laminate of at least an upper lamina and a lower lamina, each made of a synthetic resin which has a substantially white imprintable surface conventionally printed with the identification of the owner of the card with a pigment-free, non-aqueous ink which is visible to the human eye but substantially transparent to wavelengths outside the visible range.
  • both the upper and lower laminae are opaque to visible light, but the face through which the coded indicia is to be read by the reader, is transparent to the reader's beam. The code is read because there is sufficient contrast between the transmitted and absorbed light in the wavelength used by the reader.
  • the present invention provides an identity marking formed from a layer of conductive materials that is deposited or formed in a pattern so as to represent encoded identification information.
  • the marking can be applied to a security card, or to a product label.
  • the pattern of conductive material sections in the identity marking represents the security information encoded therein.
  • the security code in the conductive layer of the marking is read by a reader that measures or verifies conductivity.
  • the present invention provides security marking comprising at least one layer of conductive material which withstands any attempt to forge the information encoded thereon and thus resists any attempted forgery of the information fixed in the conductive layer of the security marking.
  • an algorithm which registers a fingerprint by indicating the quality of a fingerprint image by pseudo minutia can be used with the present invention to capture the fingerprint information in the conductive material and using this image as an identification system.
  • the layer of conductive material can comprise numerous materials, including, but not limited to, conductive inks, plastics and coatings.
  • the present invention provides, a security marking having a single layer of conductive material containing at least one element of conductively readable identifying indicia.
  • This conductive layer can be made by applying a conductive film to the surface of a security card or to a product “tag”.
  • the conductive layer is formed from a film that has a surface resistance in the range of less than about 150,000 ohms/square, or more preferably about 25,000 ohms/square.
  • the layer of conductive material can be formed from a variety of conductive films, coatings or inks, including, but not limited to those described in U.S. patent application 2002/0143094 entitled Polymer Nanocomposites and Methods of Preparation, Conroy, Jeffrey L., et. al.; U.S. patent application 2002/0035170 entitled Electromagnetic Shielding Composite Comprising Nano Tubes, Glatkowski, Paul; et al; U.S. patent application 2002/0180077 entitled Carbon Nano Tube Fiber-Reinforced Composite Structures for EM and Lightning Strike Protection, Glatkowski, Paul; et al; U.S.
  • the dispersion that form the conductive material can be further comprising a plasticizer, softening agent, filler, reinforcing agent, processing aid, stabilizer, antioxidant, dispersing agent, binder, a cross-linking agent, a coloring agent, a UV absorbent agent, or a charge adjusting agent.
  • the present conductive coating layer can also be made from single wall or multi wall carbon nano tubes that may preferably be sized to be less than 3.5 nm and greater than 0.1 nm in outer dimension size.
  • additional conductive dispersions such as Acheson Electrodag 427 or Antimony Tin Oxide (ATO) ink can be alloyed with either single wall or multi wall carbon nano tubes preferably sized to be greater than 3.5 nm and less than 15 nm in outer dimension size.
  • the carbon nano tubes can be mixed uniformly into the Acheson Electrodag 427 such that their percent by weight is between 0.5 to 10%. Alternately, they may be applied as a first layer of a two part coating.
  • the carbon nano tubes are added such that they make up 3% by weight of the mixture.
  • the nano tubes are preferably present in the film from about 0.001 to about 10% based on weight.
  • the present nano tubes may be selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
  • SWNTs single-walled nano tubes
  • DWNTs double-walled nano tubes
  • MWNTs multi-walled nano tubes
  • platinum nano particles can be added and mixed uniformly to the conductive coating layer such that their percent by weight is between 0.5 to 10%.
  • the platinum nano size particles are added such that they make up 4% by weight of the mixture.
  • Additional traditional conductive films such as conductive carbon based inks, silver inks, metal oxides based inks where the metal oxides are selected from tin-indium mixed oxide (ITO), antimony-tin mixed oxide (ATO), fluorine-doped tin oxide (FTO) or aluminum-doped zinc oxide (FZO) and conductive plastics such as those produced by Bayer or Southwall Technologies Altair M10 can be used to form the conductive layer.
  • the dispersion further comprising conductive organic materials, inorganic materials, or combinations or mixtures thereof.
  • the conductive organic materials are selected from the group consisting of buckeyballs, carbon black, fullerenes, nano tubes with an outer diameter of greater than about 0.5 nm, and combinations and mixtures thereof.
  • conductive inorganic materials used to form useful conductive films can be selected from the group consisting of antimony tin oxide, iridium tin oxide, aluminum, antimony, beryllium, cadmium, chromium, cobalt, copper, doped metal oxides, iron, gold, lead, manganese, magnesium, mercury, metal oxides, nickel, platinum, silver, steel, titanium, zinc, and combinations and mixtures thereof.
  • the layer of conductive material sections is patterned so as to form resistors.
  • the resistors can be formed either by modifying the conductive makeup of the regions of conductive material in the conductive layer or the resistors can be formed by printing or etching of the conductive coating to form the resistance features on a security card or product tag. Additionally, these resistors can be formed by printing with conductive inks. Applicable printing methods include spray painting, dip coating, spin coating, knife coating, kiss coating, gravure coating, screen printing, ink jet printing, and pad printing or other printing means or by either chemical or mechanical means such as using a Versa Laser made by Universal Laser Systems of Phoenix, Ariz., to remove the conductive material to form non conductive areas.
  • the security information or identification can be marked into or onto the conductive layer.
  • the code that is marked on or into the conductive layer can represent biometric information for use with an identity card, gaming value or lottery ticket information for gaming applications or product/manufacture information when used as a product identifier.
  • Grey market material is a problem in the high value consumer goods market where manufacturers distribute the products at different price points to different markets due to various pressures such as price controls in a market.
  • Authentic licensed material such as sports logo materials are regularly copied and the licensing fees not paid. A better way of discretely identifying the product is needed to minimize these problems.
  • the conductive layer can be encoded with information such as lot, destination (country to be exported to), manufacturing date, or other useful information so that a manufacture or retailer can quickly determine if the product is “grey market” or authentic.
  • the security code or marking in the conductive layer is not readable to the consumer, however, such conductive layer is machine readable.
  • the conductive layer may be transparent, it does not block visual indicia (e.g.: a photograph) therebelow.
  • the transparent conductive layer may include an ink like Acheson Electrodag 427 or conductive films, coatings or inks such as described in U.S. patent application 2002/0143094 entitled Polymer Nanocomposites and Methods of Preparation, Conroy, Jeffrey L.; et al.; U.S. patent application 2002/0035170 entitled Electromagnetic Shielding Composite Comprising Nano Tubes, Glatkowski, Paul; et al; U.S. patent application 2002/0180077 entitled Carbon Nano Tube Fiber-Reinforced Composite Structures for EM and Lightning Strike Protection Glatkowski, Paul; et al; U.S.
  • the conductive inks or coatings can also be impregnated or printed onto a primary packaging material.
  • the ink or coating could be formulated to provide a specific resistance so that the product could be easily identified by resistive readings of the package. Specifically, a resistance reader can be used to identify the package.
  • the encoding on the security marking is customized for gaming applications.
  • a similar coding method as used in the biometric coding application described above is used, but instead using a typical gaming card deck as the information which is converted into a pixel code.
  • the system has redundant encryptions and this eliminates the possibility of forgery and requires the card reader to initiate start of game and end of game. Start of game is when the shoe or shuffler is loaded and end of game is at the end of the playable cards or can be signaled by the dealer.
  • the wrapper for each deck has the card deck code on it and that is entered into the card reader to allow it to validate the card deck. This provides a machine readable conductive system that is tamper resistant.
  • such system need not be readable by optical means.
  • the invention can also be extended to identifying and controlling high value products.
  • the conductive layer can be used to store product, manufacturer, lot and manufacturing facility identifiers such that a product can be verified as authentic and or licensed.
  • Such an intelligent tag with the anti forgery properties in the conductive layer would help the manufacturer identify both diverted and grey market products.
  • the layer of conductive material can be applied to a tag or integrated into a logo by coating an embossing thread with the conductive material which will act as a conductive tag.
  • the conductivity of the tag can be controlled by the amount of conductive media that is in the ink.
  • the reading of the encoded conductive material could be accomplished by a reader similar in design to U.S. Pat. No. 6,776,337, 6,435,408 or 5,471,039 all issued to Irwin, Jr., et al. which provides a means for the determination of the authenticity and integrity of various types of documents such as lottery tickets accomplished by using an electronic verification machine to compare data contained in electronic circuits printed on the document to document data printed on the document.
  • the electronic circuits are printed on the document in conductive or semiconductive ink using, for example, the gravure printing process, and the presence and status of the circuits can be used to verify or authenticate the document.
  • Data can be represented in the electronic circuits by the electrical signature of the circuit which is measured by the electronic verification machine.
  • a ticket can be validated by having the electronic verification machine determine which play spots have been removed from the ticket and comparing data on the ticket with the removed play spots to determine a play redemption value for the ticket.
  • Document verification or lottery ticket validation can also be accomplished by transmitting signature data from the electronic circuits via the electronic verification machine to a central computer for comparison with document data.
  • the conductive layer can be used with a traditional radio frequency identification device (RFID).
  • RFID radio frequency identification device
  • a microprocessor or ASIC application specific integrated circuit
  • ASIC application specific integrated circuit
  • the conductive material can be etched to form a reference resistor and a series of information resistors on the card.
  • the reference resistor provides the RFID, and the reference resistor and the information resistors can be arranged such that the information contained in the conductive material is readable by testing the resistance of the applicable encoded line of information resistors.
  • the conductive material can also be formed such that an antenna for the RFID device is formed from the same conductive material as the each information line.
  • FIG. 1 is a view of a security card according to the invention with diagrammatically indicated information and a security marking thereon.
  • FIG. 1A is an illustration of a fingerprint showing fingerprint minutia.
  • FIG. 3 is a flow chart illustrating a process of writing the security marking according to the invention.
  • FIG. 4 is a flow chart illustrating a process of reading and comparing the security marking according to the invention.
  • FIG. 5 is a schematic showing a pattern of conductive material sections representing a serial code on a security card.
  • FIG. 6 is a schematic showing an alternative serial code.
  • FIG. 7 is a schematic of pattern of conductive material sections representing an analog code on a security card.
  • FIG. 8 is a representative SEM image of single wall carbon nano tubes.
  • FIG. 9 is a schematic of a security card computer access device.
  • FIG. 10 is a schematic of a security card that holds data in a pattern of conductive material sections representing analog resistance values printed on a card.
  • FIG. 11 is a representation of a playing card having sections with conductive materials positioned thereon in a pattern to represent a value pixel code information which is converted to a 7 ⁇ 7 pixel code.
  • FIG. 12 is a representation of a card value pixel code information which is converted to a bar code.
  • FIG. 13 is a representation of a security tag with pixel code information.
  • FIG. 14 is a representation of a security card having a magnetic strip with security markings such as a security code or a picture integrated therein.
  • the present invention provides a security marking or identity “tag” that can be affixed to a security card, or to a product label, or to a product itself.
  • the identity tag is composed of at least two layers wherein one layer carries identification information such as the name, photograph and personal reference number, and the other layer carries additional latent security markings represented by a layer comprising a pattern of conductive materials either inscribed in or printed thereon.
  • the two individual layers of the security marking may have different transparencies.
  • the first of the two layers may comprise the core (i.e.: main body) of a security card, and have a matt, preferably white, coloring as a result of added pigment with moderate to low transparency.
  • the conductive layer of the security marking may have a very high transparency. Therefore, the conductive layer may be applied directly over the core layer of the security card, without blocking visual reading of the indicia (e.g.: photographs) on the core layer of the security card.
  • the conductive material sections in the conductive layer may be formed from various conductive films, inks or dispersions, and may have a wide variation in transparency going from opaque to highly transparent.
  • the formulation of the conductive layer is important to achieve the desired conductivity of the layer when it is cured to form part of the security tag.
  • the identification security information is inscribed into the conductive material layer in areas which are conductive and areas which are conductively isolated.
  • One preferred embodiment of the conductive layer includes the formation of a resistor or series of resistors that can be verified.
  • the present invention includes mechanical formation of the resistor by printing or mechanical removal of material and includes both providing a reference resistor and a series of resistors.
  • the reference resistor is a single resistive shape formed in the conductive coating layer.
  • This reference resistor can be used by a conductive reader to determine a base line resistance so that the base line resistance can be compared to the design and the series is interpreted based on the base line resistor.
  • the patterned sections of conductive material can be formed into a series of resistors, each having a pre-determined resistance.
  • each resistor can be formed to have a 5 ohm resistance.
  • the conductivity meter reads a 50 ohm resistance, it knows there are 10 resistors on the card.
  • the conductivity meter reads a 40 ohm resistance, it knows there are 8 resistors on the card. This provides a means of locking the data to prevent forgery.
  • security information can be stored in the series of resistors to provide a verification system when used with a traditional smart card microprocessor for verification of the security card.
  • the resistance of the reference resistor can be measured and at least one referenced series resistor is inscribed on the tag.
  • the resistance of the reference resistor can be measured and then the resistance of the series resistors can be measured with the resultant resistance of the series divided by the reference resistant values to yield the digital value of the series resistor.
  • a code such as a binary code that uses areas of conductivity versus areas of non conductivity to capture information can be either inscribed or printed as part of the layer of conductive material. This code can be used to provide an identity marking for the security marking tag.
  • This marking can be either biometric information for an identity card or lot and manufacture information for a product identity tag.
  • the code used needs to be devised such that forgery or modification to the tag is prevented.
  • One system of accomplishing this for personal identity cards is to encode the biometric information on the card and to use serial encryption of this biometric information to minimize the ability of a forged identity tag.
  • the conductivity of the conductive layer can itself be used as the identifier.
  • the conductivity can be changed by varying the conductive materials in the conductive layer.
  • a card, package or tag for a specific application could be pre-set so that its conductivity is 150 ohms squared whereas in another tag or application the conductivity is 300 ohms squared.
  • a valid ID for the first application would require a conductivity reading of approximately 150 ohms squared and a material with greater than or less than the 150 ohms square read would be invalid.
  • the conductive material can be used to store product, manufacture, lot and manufacturing facility identifiers such that a product can be verified as authentic and or licensed.
  • a security marking tag containing product identification information could be attached to the product or labeling or it could be incorporated into the product itself. This would make a forged product easier to identify and could be used to determine if a product is diverted such as a grey market product.
  • the security marking tag could contain the market or channel information on the tag and or the manufacturing lot information to help identify the product if it was to be inspected.
  • the conductive layer may also incorporate polymeric materials selected from the group consisting of thermoplastics, thermosetting polymers, elastomers, conducting polymers and combinations thereof or a material selected from the group consisting of polyethylene, polypropylene, polyvinyl chloride, styrenic, polyurethane, polyimide, polycarbonate, polyethylene terephthalate, cellulose, gelatin, chitin, polypeptides, polysaccharides, polynucleotides and mixtures thereof, or ceramic hybrid polymers, Ethylene Glycol Monobutl Ether Acetate, phosphine oxides and chalcogenides.
  • polymeric materials selected from the group consisting of thermoplastics, thermosetting polymers, elastomers, conducting polymers and combinations thereof or a material selected from the group consisting of polyethylene, polypropylene, polyvinyl chloride, styrenic, polyurethane, polyimide, polycarbonate, polyethylene terephthalate, cellulose, gelatin,
  • the conductive coatings can also be formed from carbon nano tubes, carbon nano tubes/antimony tin oxide, carbon nano tubes/platinum, or carbon nano tubes/silver or carbon nano tubes/silver-cloride dispersion or coating.
  • the small size permits the formation of surface texture less than 0.33 microns.
  • conductive dispersions such as Acheson Electrodag 427 Antimony Tin Oxide (ATO) ink can be alloyed with either single wall or multi wall carbon nano tubes preferably sized to be greater than 3.5 nm and less than 20 nm in outer dimension size.
  • the carbon nano tubes may be mixed uniformly into the Acheson Electrodag 427 such that the percent by weight is between 0.5 to 10%.
  • the carbon nano tubes are added such that they make up 3% by weight of the mixture.
  • the nano tubes used by the aforementioned conductive materials are selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
  • platinum nano particles can be added and mixed uniformly to the coating such that the percent by weight is between 0.5 to 10%.
  • the nano size platinum are added such that they make up 4% by weight of the mixture.
  • the conductive material can be mixed with fluorescence dye and binary numbers can be written in the fluorescence dye. This allows non contact optical reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • Additional traditional conductive films such as conductive carbon based inks, silver inks, metal oxides based inks (where the metal oxides are selected from tin-indium mixed oxide (ITO), antimony-tin mixed oxide (ATO), fluorine-doped tin oxide (FTO) or aluminum-doped zinc oxide (FZO)) and conductive plastics such as those produced by Bayer or Southwall Technologies such as Altair M10 can be used to form the conductive layer.
  • ITO tin-indium mixed oxide
  • ATO antimony-tin mixed oxide
  • FTO fluorine-doped tin oxide
  • FZO aluminum-doped zinc oxide
  • conductive plastics such as those produced by Bayer or Southwall Technologies such as Altair M10
  • the conductive material can be mixed with fluorescence dye and the codes can be written in fluorescence dye. This allows non contact optical reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • the conductive material layer can be used with a traditional radio frequency identification device (RFID).
  • RFID radio frequency identification device
  • a microprocessor or ASIC application specific integrated circuit
  • ASIC application specific integrated circuit
  • the conductive material can be etched so that there is a reference resistor and a series of information resistors etched on the card.
  • the reference resistor provides the RFID, the reference resistance and the information resistors are arranged such that the information contained in the conductive material is readable by testing the resistance of an applicable encoded line of information resistors.
  • the conductive material layer can also be formed such that the antenna for the RFID device is formed from the same conductive material as the each information line.
  • the present system of representing identity information by the positioning of regions of conductive material can be such that attempts at adding or deleting encoded data by adding or removing regions of conductive material voids the data stored in the identity marking.
  • data can be written by etching, engraving, printing or spraying the appropriate patterns on the tag.
  • the card is composed of at least two layers, of which one layer carries the information which directly serves for identification, such as the name, photograph, color code or personal reference number, and the other layer comprises regions of conductive material that are positioned on the card to represent additional conductive security markings.
  • the individual layers of the identity card can have different transparencies; thus, for example, one of the two layers of the card core has a matt, preferably white, coloring as a result of added pigment and accordingly has a moderate to low translucent.
  • the upper cover layer of patterned conductive material of the identity card has a very high translucent conductive coating which is etched or printed to create a coated indicia for the card.
  • the positioning of conductive materials in layer of translucent cover layer such as described above represents, information which serves to identify the card holder, and the colored lower layer has additional security markings, such as figures, as a protective measure against forgeries.
  • the packaging material of the product may have the conductive layer embedded therein.
  • carbon nano tubes or other conductive material could be mixed with the papers or fibers or box materials of the packaging and this would make the paper conductive for verification of the authenticity of the document or packaging. This technique would be useful for the marking of treasury bills, documents, high value packages etc.
  • the security marking of the present invention can consist of a single layer used to validate the authenticity of a security card by providing a machine readable marking that is transparent to the customers. This is useful in gaming establishments to validate card decks.
  • the conductive coating is encoded with security information determine if the document or gaming piece is valid by a reader testing the resistance level of a portion of the coating or over the whole area.
  • the conductive coating is replaced with a conductive film and the encoded information is punched into the film.
  • the conductive coating is replaced with a conductive film and the encoded information is punched into an over laying film and the film is adhered to the conductive layer.
  • the conductive coating is replaced with a conductive film and the encoded information is printed with non conductive ink over the film so that it adhered to the conductive layer forming the encoded area.
  • the conductive coating is coated on thread that is used to form the logo on apparel.
  • the conductivity of the thread can be used by the manufacturer to determine if the apparel was made for that market or if it was diverted.
  • a resistance (or conductivity) reader testing the resistance level of a portion of the coated logo or over the whole area is used to determine the authenticity and if it was diverted from another market.
  • the conductivity in the conductive layer of the security marking can be set at a specific level corresponding to a specific destination or territory. This can be used to determine the authenticity of the item.
  • the conductive coating is applied to a security card or identity tag in a two step process, wherein the first step is to form the conductive layer and the second step is to form an optional polymer cover layer.
  • the conductive coating is applied to a security card or identity tag in a one step process.
  • IE the conductive layer is formed without a cover layer.
  • the encoding of the security information is performed with binary numbers.
  • the encoding of the security information is performed with bar codes.
  • the binary numbers are written with fluorescence dye that is incorporated into the conductive layer.
  • the binary numbers are written with infrared dye that is incorporated into the conductive layer.
  • the bar codes are written with infrared dye or fluorescence dye.
  • the security information codes are written in back ground ink.
  • a security card may be covered with transparent conductive ink and then using a standard laser printer for quick identification at trade shows, office buildings, etc.
  • the conductive material can be mixed with fluorescence or infrared dye and the security information can be encoded in fluorescence dye bearing material. This allows non contact optical reading of the security card while the conductive contact reading of the conductive material layer is used to verify the card authenticity.
  • the binary numbers are written in infrared dye or fluorescence dye. If a fluorescence or infrared dye was used then the system does not require a contact reader. A digital encoding method using a non-contact infrared dye reader can be used.
  • Fingerprint identification can be accomplished simply by analyzing the fingerprint for the end of a ridge point (terminations) or the merger of two ridge points (bifurcations). Bifurcations and terminations are called minutia points.
  • the set of minutia points constitute the features characterizing a fingerprint.
  • the matching of two fingerprints is based on comparing the locations of the minutia points.
  • minutia points provide the present security marking with two alternate systems for capturing and verifying the fingerprint information.
  • the fingerprint is not replicated on the card but the information describing the unique characteristics of the fingerprint can be captured on the card.
  • the card uses graphical information regarding the relative location of the minutia and specific location and type information (location and whether a bifurcations and terminations) that is contained in a corresponding serial code.
  • the card uses graphical information regarding the relative location of the minutia and specific type information (whether a bifurcations and terminations) that is contained in a corresponding serial code.
  • the security card will have a region reserved for fingerprint identification information and that information will be specific to the individual for whom it is issued.
  • the security card is formed with a pattern of conductive material regions that are positioned on the card in a serial code format to represent fingerprint minutia type and location.
  • the pattern of conductive material locations also provides a reverse image plot that provides the relative location of the minutia points.
  • a fingerprint capture algorithm and associated equipment can be used to scan the fingerprint and calculate the minutia information with regards to location and bifurcations or termination type (see FIG. 1A ). For example, the software calculates the x and y location of the bifurcations and terminations and identifies the fingerprint.
  • the location and type data of the fingerprint minutia can then be converted to a serial code that will have the location information of the minutia and the type of minutia for each point, being either a bifurcation or a termination.
  • the location data may be converted into a reverse image to plot the relative location of the minutia points on the card.
  • the card is then formed with a bar code having both location and minutia type and a reverse image of the minutia points thereon.
  • the security information is encoded by the position of conductive material sections formed in a conductive layer of the card.
  • FIG. 1 A typical two layer security card 100 is shown in FIG. 1 .
  • Card 1000 is formed from a standard security card body such as a driver's license or credit card (that may optionally be made of a plastic laminate).
  • regions of conductive materials cover areas of the security card body.
  • This upper covering layer of conductive material is preferably transparent such that the information on the security card body can be read through the layer of conductive material.
  • security information is stored on both the security card body, (e.g. in the form of a photograph or magnetic strip) and also in the covering layer of conductive material (as determined by the positioning of individual sections of conductive material).
  • card 1000 may have reverse image alignment points 1005 formed by regions of of conductive or non-conductive material and fingerprint minutia points 1010 also formed by regions of conductive or non-conductive material on the security card. Minutia locations and type may also be written in a serial code 1015 on the conductive layer of the security card. Specifically, such a serial code may be formed by a pattern of regions of conductive material deposited in a line. The serial code is read by a conductivity meter detecting the presence (or absence) of individual regions of conductive material in the line.
  • a serial code is any code that is written serially so that the information is stacked and new information can not be inserted in between the code.
  • the Minutia type is written again in a different serial code 1020 on the conductive layer of the security card.
  • Security card 1000 can also contain a pattern of conductive or non-conductive material deposits forming security code 1030 , a picture 1025 on the underlying body of the security card and a security resistor 1035 formed by the conductive material.
  • Security resistor 1035 may be etched or printed on card 1000 to provide a resistive identifier for the card. In operation, the resistance of resistor 1035 is matched within a tolerance of acceptable resistances and configuration for a particular class of security cards.
  • the fingerprint verification process for the card has two components. As seen in FIG. 2 , the first part is capturing the scanned fingerprint 2010 using the same algorithm that is used to create the fingerprint data for the fingerprint shown in FIG. 1A . This algorithm produces data with respect to the minutia with regards to location and minutia type (bifurcations or termination).
  • the fingerprint data on the card 1000 is then read, with both the reverse image alignment points 1010 and the serial codes 1015 and 1020 providing a system of verification, and both the relative location information from the reverse image alignment points 1010 and the serial code information 1015 and 1020 containing location and minutia type data.
  • This verification system uses the location of minutia translated from the reverse image alignment points 1010 and compares it to location data that is part of the serial code 1015 . This provides an internal check of the card information based on location data. Then the serial code information of both the minutia location and type is compared to the data generated by the fingerprint capture algorithm and the identity is verified or not verified.
  • the data contained on card 1000 is validated and forgery prevented.
  • a conductivity meter can be used to scan over regions of the card to determine the position of the deposits of conductive materials. When these conductive regions are deposited in a line, the existence of a conductive region can be interpreted as a (1), and the absence of a conductive region can be interpreted as a (0), making binary coding possible.
  • the forger would have to insert information between the serial recorded data 1020 or remove the serial encoded information 1020 , thereby destroying the card.
  • the security resistor 1035 is also checked with the reading of the card 1000 to insure that it is a valid card.
  • the combination of serial recorded data 1015 of minutia type and location and the second minutia type serial information 1020 capture and security resistor 1035 eliminates the means to adulterate the card with forged biometric information.
  • the two means of writing the minutia type plus the security resistor make aldutrading the card impossible.
  • One would have to remove and add material and the resistor would have to be changed the formulation problems to match the card stock and all the resistances would be impossible.
  • To forge the fingerprint identity the individual would have to recreate the plot on the conductive material and new points would have to match the old points' relative locations 1010 and the data on the serial codes 1015 and 1020 would have to match the new plotted location data points.
  • FIG. 3 The flow chart of the biometric capture processes is shown in FIG. 3 and the biometric comparision and verification process is shown in FIG. 4 .
  • FIG. 5 A preferred system of how the card operates is shown in FIG. 5 .
  • a card reader e.g.: a conductivity meter
  • codes 1015 and 1020 represent physical removed or missing deposits of conductive materials on the surface of the card.
  • the conductivity card reader compares the minutia order to the code 1021 information and the next step is to compare a pixel map of the fingerprint minutia data to the minutia locations code 1010 on the card.
  • minutia location code 1010 stores in the pixel code order the minutia location and code 1022 stores the same location data written in a serial manner.
  • the fingerprint minutia site information is captured in two different and separate codes which prevents forgery because if they do not match then the card is not correct.
  • a forger could add pixel and information to the pixel code 1010 however the serial code 1022 will not match. Therefore, it is not possible for a forger to modify the card by changing the code 1010 because the minutia type code 1022 is written sequentially. As a result of the above, it is not possible to modify code areas 1010 , 1015 , and 1022 and get matches when the codes are read because of the three independent code verifications.
  • the encoding for the identification card can be accomplished as follows.
  • one method to create the serially encoded data 1015 and 1010 and 1022 is by capturing biometric information.
  • biometric information In the example below a fingerprint is used but a similar method can be used for any biometric information desired.
  • Fingerprint minutia site information is captured and converted to a pixel code 1010 .
  • the pixel code fingerprint minutia location information captured in pixel code 1010 allows the card to capture up to 25 minutia points.
  • the pixel code 1010 code has alignment points 1005 marked in the conductive material.
  • Second is the lower serial code 1021 as shown in FIG. 5 where the minutia type (bifurcation or termination) which are located in pixel code 1010 is listed in order from left to right and top to bottom as plotted in pixel code 1010 .
  • the minutia locations and type are also written to the serial code 1015 on the card.
  • the minutia type are written again in a different serial code 1020 on the card.
  • FIG. 6 shows an alternate embodiment of card 100 with code 1010 representing minutia location 1010 and code 1011 representing minutia type.
  • code 1010 may comprise up to 7 regions where conductive materials are deposited or removed or missing on the surface of the security card. One or more of these regions may not have conductive material deposited thereon, making coding possible. For example, a conductivity meter scanning along code 1010 will determine whether conductive material is deposited or removed at each of these 7 regions.
  • a minutia check bit resister 1036 provides a check bit sum plus one for the number of minutia points.
  • the check resistor 1035 provides the relative basis for the minutia check bit resister 1036 .
  • the security card can also contain security code 1030 , picture 1025 (not shown in FIG. 6 ) and security resistor 1035 .
  • the security resistor 1035 comprises conductive material that may be etched or printed on card 1000 having a pre-determined resistance to provide a resistive identifier for the card. Specifically, the resistance of resistor 1035 has to match within a tolerance of the acceptable resistance and configuration for a particular class of cards.
  • the conductive material encoding can be integrated into a traditional RFID device such as an identity card as seen in FIG. 7 .
  • a layer of conductive material 7001 is applied to the card 7000 .
  • Embedded in the card 7000 is a radio frequency identification device (RFID) 7005 which can be a microprocessor or ASIC (application specific integrated circuit).
  • RFID radio frequency identification device
  • the conductive layer 7001 can be etched so that there is a reference resistor 7010 and a series of information resistors 7015 etched on the card.
  • the reference resistor 7010 provides the ASIC 7005 the reference resistance and the information resistors 7015 are arranged such that the information contained in the conductive material is readable by testing the resistance of the applicable encoded line of information resistors 7015 .
  • the reference resistor 7005 would be etched in the reference 7010 trace.
  • the first information line 7016 would have a single information resistor 7015 etched in the conductive material
  • the second information line 7017 would have a two information resistors 7015 etched in the conductive material
  • the third information line 7018 would have a three information resistors 7015 etched in the conductive material
  • the fourth information line 7019 would have a four information resistor 7015 etched in the conductive material.
  • the resistance in each information line could be written in reverse logic where the reference resistor 7010 is high and the information resistance lines ( 7016 , 7017 , 7018 , 7019 ) are lower by an amount indicating an appropriate identification value.
  • the layer 7001 of conductive material can also be formed such that the antenna for the RFID device is formed directly into layer 7001 from the same conductive material as each information line.
  • FIG. 8 shows an SEM of single wall nano tubes which can be used to form the conductive layer of the invention.
  • FIG. 9 shows an identity card according to the present invention used with a computer system.
  • the conductive card 4810 can be preprinted with an identification sequence which is then used in a computer access device 4800 .
  • the access device 4800 can plug into the USB or serial post of the computer (not shown) that contains contacts for reading the card and the data encoded in a conductive layer thereon.
  • the data encoded in the conductive layer is used to store a biometric signature such as a fingerprint.
  • the fingerprint would be captured by the fingerprint reader 4812 attached to the computer or built into the computer access device.
  • the computer access device memory i.e.: the data encoded in the conductive layer
  • the conductive card can be printed with biometric information which is then used in a computer access device FIG. 9 .
  • the access device 4800 can plug into the USB or serial post of the computer and it contains contacts for reading the card 4810 .
  • the card is used to store a biometric signature such as a fingerprint. The fingerprint would be captured by the fingerprint reader attached to the computer or built into the computer access device.
  • the card in the computer access device would be written at the point of issuing with the individual biometric information and when used in a reader the information would be correlated between the card and that read at the point of access. Therefore the user is identified by the card which has a unique fingerprint written to the card and the unique fingerprint read at the access device. This would permit access to a LAN, VPN or system access depending on the application.
  • FIG. 10 shows an alternative embodiment for an identity card without an RFID device.
  • the card 8000 contains verification resistor 8005 and the minutia location is contained in resistor traces 8010 and 8011 .
  • the minutia type is written in resistor trace 8013 . This is replicated to accommodate as many minutia points as required to identify the individual.
  • a minutia check bit resistor 8036 is encoded on the card to provide check bit information for the number of minutia recorded on the card.
  • the reference resistor 8035 is encoded on the card to give the reference resistance.
  • the conductive material can also be formed such that the antenna for the RFID device is formed from the same conductive material as the each information line.
  • the encoding means is customized for gaming applications.
  • the card deck information is converted into a pixel code.
  • the system has redundant encryptions and this eliminates the possibility of forgery and requires the card reader to initiate start of game and end of game. Start of game is when the shoe or shuffler is loaded and end of game is at the end of the playable cards or can be signaled by the dealer.
  • the wrapper for each deck has the card deck code on it and that is entered into the card reader to allow it to validate the card deck. This provides a machine readable only identifier that is tamper resistant and not readable by optical means.
  • a standard playing card is provided.
  • a pattern of conductive material is applied directly to the face of the playing card, with the pattern encoding information therein.
  • Card value pixel code information can be converted to a 7 ⁇ 7 pixel code 6005 , which can represent 52 cards and a 36 binary deck identifier.
  • the deck identifier 4520 is stored in a 36-2d binary code. This allows a 36 bit number to be the deck identifier. This identifies the deck of cards a casino could have each deck identified a 36 bit number means they would change numbers over only ever 100 years.
  • the card identifier 4511 is a 4 bit binary code for card value made up of bits 4510 and a two bit binary code 4505 for card suit.
  • the card reader reads the card identifier 4511 and card deck information 4520 .
  • the check bits 4500 are compared and then the card deck information 4520 is compared with the valid card deck information stored in the card reader. If the card deck identifier 4520 is different than the card deck identifier that was entered from the card deck wrapper then the card reader alarm states “bad deck information”. Then the value of the card 4510 is checked against the cards dealt register in the card reader. If the same card and same deck have already been dealt during that game then the card reader alarms; if not, then the cards are playable.
  • the reader memory then records deck and card information and position information so that winning hands cards can be verified electronically. This can be done with a sensor system or manual input to where each player is in the table position.
  • the ability for a foreign card to be inserted into a game is virtually impossible and the data storage checks for card playing order and cards in play eliminate the switching of cards or movement of cards between players.
  • FIG. 12 illustrates a playing card encoded with resistance codes.
  • the card identifier 4511 works with a 4 bit binary code for card value 4510 and a two bit binary code 4505 for card suit.
  • the deck identifier 4520 is stored in a resistance code. This allows a 36 bit number to be the deck identifier.
  • the reference resistor 4535 is used to verify the conductive material (which is read by the conductive reader that verifies the resistance which is used in the interpretation of the code) the same as all the other analog codes that are converted to digital by interpretation of the reference resistor.
  • a check bit 4520 can be used to provide a timing marks as well as a check sum.
  • FIG. 13 is a representation of a security tag with pixel code information.
  • the tag can be as simple as a single conductive reference resistor 9000 where the identity is determined by the resistance of resistor 9000 or it can be more complex and contain manufacturers code 9020 and article ID 9010 .
  • FIG. 14 is a representation of an encoded security marking 500 including a picture or signature 510 integrated into the card as well as a magnetic strip 505 .
  • biometric information can be encoded such as retinal scans, palm prints, etc.
  • the fingerprint methods are examples and are detailed here for reference.
  • the layer of conductive material deposits ae replaced with a conductive film and the encoding ID punched into the film.
  • a conductive film like the Bayer conductive film or Ocean Plastics Co., Ltd. conductive plastic film—(OCC FILM) can be used and the code punched in the film prior to laminating.
  • the conductive layer is applied in a two step process.
  • the conductive nano tube coatings can have nano carbon or nano metals in the coating. Additionally the nano dips can be reformulated to allow a one dip coating or a two dip coating.
  • the conductive layer is applied in a one step process where the conductive nano tube coatings can have nano carbon or nano metals in the coating. Additionally the nano dips can be reformulated to allow a one dip coating or a two dip coating.
  • the conductive coating with either one or two part application is replaced with a conductive film.
  • the encoding ID is punched into an over laying film and the film is adhered to the conductive layer.
  • the conductive coating with either one or two part application is replaced with a conductive film.
  • the encoding ID is printed with non conductive ink over the film so that it adheres to the conductive layer forming the encoded area.
  • the conductive material can be mixed with fluorescence or infrared dye and the code is in fluorescence dye bearing material. This allows non contact (e.g. optical) reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • the conductive material can be mixed with fluorescence dye with the code being in the fluorescence dye bearing material. This allows non contact (e.g. optical) reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • the encoding is performed with binary numbers.
  • the encoding is performed with bar codes.
  • the binary numbers are written in fluorescence dye. If a fluorescence dye was used then the system would not require a contact reader. The digital encoding method could be read by the fluorescence dye reader and the system would be a non contact encoding method not requiring the conductive nano tube material.
  • the binary numbers are written in infrared dye. If an infrared dye was used then the system would not require a contact reader. The digital encoding method could be read by the infrared dye reader and the system would be a non contact encoding method not requiring the conductive nano tube material.
  • the bar codes are written in infrared dye. If an infrared dye was used then the system would not require a contact reader. The digital encoding method could be read by the infrared dye reader and the system would be a non contact encoding method not requiring the conductive nano tube material.
  • the binary numbers are encoded using the same printing ink as the back ground ink. This creates a virtually invisible conductive code.
  • a conductive code reader would read the digitally encoded signature and determine the values for use in the system.
  • the bar codes are written in the same printing ink as the back ground ink with conductive material alloyed into the ink. This creates a virtually invisible conductive code.
  • a conductive code reader would read the digitally encoded signature and determine the values for use in the system.
  • the encoding can also be expanded to the marking of critical documents by either printing or engraving an encoded signature to the document once it is printed with the conductive material.
  • the system can also be extended to use the conductive coating material and mix it in the formation of the document to create a conductive document.
  • the amount of conductive material added to the base extrusion will be representative to the conductance of the document and this can be used as a marker to verify the document such as currency, retail packaging, or securities documents.
  • the multiple stage identification algorithm eliminates the ability to insert identification within the code.
  • Grey market material is a problem in the high value consumer goods market were manufacturers distribute the products at different price points to different markets due to various pressures such as price controls in a market. Authentic licensed materials such as sports logo materials are regularly copied and the appropriate licensing fees not paid. A better way of discretely identifying the product is needed to minimize these problems.
  • a security marking can be used in packaging applications such as tamper proof seals or package identification to assist manufacturers in identifying their products.
  • the pattern of conductive marking 9000 can be formed so as to encode information such as manufactures code 9020 and article ID 9010 , lot, destination (country to be exported to), manufacturing date, or other useful information so that a manufacturer or retailer can quickly determine if the product is “grey market” or authentic.
  • This marking is not readable to the consumer and when a transparent coating such as an ink like the Acheson Electrodag 427 or conductive films, coatings or inks such as described in U.S.
  • patent application 2002/0143094 entitled Polymer nanocomposites and methods of preparation, Conroy, Jeffrey L.; et al.; U.S. patent application 2002/0035170 entitled Electromagnetic shielding composite comprising nano tubes Glatkowski, Paul; et al.; U.S. patent application 2002/0180077 entitled Carbon Nano Tube Fiber-Reinforced Composite Structures for EM and Lightning Strike Protection Glatkowski, Paul; et.; U.S. patent application 2003/0008123 entitled Nanocomposite dielectrics Glatkowski, Paul; et al.; U.S. patent application 20030164427 entitled ESD Coatings for Use With Spacecraft Glatkowski, Paul; et al.; and U.S.
  • the nano tubes used by the aforementioned conductive materials can be selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
  • SWNTs single-walled nano tubes
  • DWNTs double-walled nano tubes
  • MWNTs multi-walled nano tubes
  • the conductive material can be coated on thread of substrate that is used to form the logo on apparel or be incorporated in currency.
  • the conductivity of the logo is then used by the manufacturer to determine if the apparel was made for that market or if it was diverted.
  • the reader testing the resistance level of a portion of the coated logo or over the whole area is used to determine the authenticity and if it was diverted from another market.
  • the conductivity can be pre-set to different amounts corresponding to various destinations (territories) and for authenticity of the item.
  • the conductive inks or coatings can also be impregnated or printed onto the primary packaging material.
  • the ink or coating would be formulated to provide a specific resistance so that the product could be easily identified by resistive readings of the package.
  • the conductive inks or coatings can also be printed onto a tag and the tag sewn into a cuff or fold of the apparel or product.
  • the conductive inks or coatings would be formulated to provide a specific resistance so that the product could be easily identified by resistive readings of the tag.
  • the conductive material can be mixed with fluorescence or infrared dye and the code is in dye bearing material. This allows non contact reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.

Abstract

The application discloses a security mark consisting of a plurality of layers, of which the cover layers are highly conductive films and the layers of the card core are films of varying transparency. One layer carries information, which can be read directly, if desired, above a security print, while the transparent conductive layer has an additional security markings, such as biometric or product identifiers marking which can be read conductively only with the aid of a special reader. All the layers consist of polymers, papers or mixtures which can be fused together to form a laminate which is fused together. The conductive layers form conductive traces which may be formed with single-walled or multi walled nano tubes or they can be formed from multiple layers or dispersions containing, carbon nano tubes, carbon nano tubes/antimony tin oxide, carbon nano tubes/platinum, or carbon nano tubes/silver, carbon, silver or carbon nano tubes/silver-cloride. An alternative layer can be formed from a separate conductive layer or suitable dispersion and the encoding accomplished by overlaying a nonconductive trace.

Description

    REFERENCE TO RELATED APPLICATIONS
  • This invention claims priority to U.S. Provisional Application No. 60/536,775 entitled Identity Card, filed on Jan. 15, 2004.
  • FIELD OF THE INVENTION
  • The present invention relates to a security marking formed from a layer of conductive materials that is patterned so as to have identification information captured therein. The conductive coating layer may be formed by printing, etching, or formulation. The conductive layer can be made from carbon nano tube conductive ink, conductive films or conductive inks formed from metals and oxides, but is not so limited. As will be shown, the conductive coating layer may be applied to security cards, or directly to products to prevent counterfeiting.
  • In preferred embodiments, the present invention relates to a security marking consisting of several layers of materials. For example, the present security marking may consist of a layer of conductive material sections with an overlying layer of protective material. The positioning of conductive materials in the conductive layer of the security marking carries, at a suitable point, information which serves to identify the card holder or product, and may have additional security markings, such as biometric information or product identification information. The conductive coating layer can be applied to a security card so that the conductive layer and can be formed to have either a single or series of resistors that make the identity tag virtually forgery resistant.
  • BACKGROUND OF THE INVENTION
  • Security cards are used as information carriers or data carriers for security markings, identity cards, check cards, credit cards, personal passes, passports, product identifiers and other identification carriers. Security cards must be secure against forgery. Also, it must be easy to check the authenticity of the security cards. Security markings are increasingly manufactured in the form of a fused laminate in which a card core carrying the information is protected by other transparent films.
  • German Offenlegungsschrift No. 2,308,876 provides an identity card consisting of a relatively thick carrier film and a thin transparent film, between which there is a special paper having internal features, such as watermarks, banknote printings or the like, which serve for protection against forgeries and cause differences in the thickness of the paper. The three layers are plastified together in such a way that the internal features are manually, mechanically and/or visually detectable through the transparent film. Further markings which serve to identify the card holder are provided at a suitable point on this known security marking. For example, a photograph in the form of a film transparency is inserted during plastifying between the special paper and the carrier film and is firmly bonded to the special paper. Furthermore, it is possible, at any desired point on the front or rear of the security marking, to laminate a strip of special paper, printed according to security technology, onto the outside of the plastic material, as a field for later insertion of signatures or other handwritten entries.
  • Paper has the advantage that numerous latent security markings, such as watermarks, banknote printings, security filaments and the like, can be contained therein, while, by contrast, the material which is used for the manufacture of plastic cards and consists entirely of plastic does not contain any authenticity or security markings of this type. When it is laminated to paper cores, it is unfortunately a disadvantage that these laminations can be opened up relatively easily and are thus accessible to manipulations and forgeries of any kind.
  • German Auslegeschrift No. 2,163,943 discloses a personal security marking which comprises a combination of a support layer, an electrically conductive layer, a barrier layer, a photoconductive layer with an organic photoconductor, optionally a cover layer, a protective layer on the photoconductive layer or on the cover layer, a protective layer on the rear of the layer support and, optionally, a cover layer on the last-mentioned protective layer. In this personal security marking, a number of different materials are assembled to give a laminate which, due to the lack of homogeneity of the individual layers, can be split up so that it is possible to carry out forgeries.
  • U.S. Pat. No. 5,592,408 issued to Keskin, et al. describes an identification card and access control device which includes a header piece with stored memory and terminals for interfacing with an electronic port of a reader device, with encoded data programmed into the memory. An identification card, identifying the holder, is attached to the electronic header piece and bears printed information relating to and identifying the intended holder.
  • U.S. Pat. No. 6,744,367 issued to Forster, describes an identification tag comprising a multilayer assembly incorporating, in sequence, a metal backing layer, a bulk structural layer, a piezo-electric layer and an electrode layer. The electrode layer incorporates antennas structures for receiving interrogating radiation comprising a first radiation component at a relatively lower frequency and a second radiation component at a relatively higher frequency. The electrode layer also incorporates a structure for modulating a second signal generated in response to receiving the second component by a first signal generated in response to receiving the first component to generate a modulated signal which is re-emitted as reflected radiation from the tag. The presence of the tag is determinable from modulation components present in the reflected radiation, thereby distinguishing the tag from other objects capable of reflecting radiation, but not modulating it.
  • U.S. Pat. No. 6,572,015 issued to Norton, describes a system, apparatus and method for enabling the operation of a vehicle or other equipment by using a smart card for transmitting an authorization code to the vehicle or the other equipment. Without the authorization code from the smart card the vehicle or other equipment is inoperable.
  • U.S. Pat. No. 6,753,830 issued to Gelbman, describes a flexible electronic label. The electronic label provides for displaying information in connection with a mammal, non-mammal, an item or location. The label includes a display assembly having electronic ink disposed on a support, one or more antennas for sending or receiving signals corresponding to one of instructions, programs, data or selected indicia to be displayed by said display assembly, a storage element in circuit with the antenna for storing the instructions, programs, data and indicia, and one or more processors for intelligently determining the indicia to be displayed by the display assembly, for controlling and coordinating operation of the label, and for generating output signals for instructing the display assembly to display the indicia.
  • U.S. Pat. No. 6,655,719 issued to Curiel, describes methods of creating tamper resistant informational articles, also related products are disclosed. In one embodiment, a lens has a preformed transparent hologram, metallized portions are provided and may be altered through selective application of heat to predetermined parts thereof to create information which may be fixed or variable. Printing may be provided on the hologram before metallizing. A base portion underlies the metallized layer. In yet another embodiment of the invention, an opaque base portion has a hologram formed in the upper surface thereof with portions of the hologram being made readily visible by partial metallization covering only portions of the hologram with or without information provided as by printing overlying or underlying portions of the metallized sector or both. A transparent overlying lens is secured in overlying relationship. Metallizing may be such as to permit viewing underlying hologram portions or information or not.
  • U.S. Pat. No. 6,629,591 issued to Griswold, et al. describes a token for use in a cashless transaction involving an electronic device that includes a token body having a coin shape. The token has a digital circuit embedded within the token body and a memory embedded within the token body that is coupled to the digital circuit. The token also includes an input/output interface embedded within the token body that is coupled to the digital circuit and which enables the digital circuit to communicate with the electronic device.
  • U.S. Pat. No. 5,631,039 issued to Knight, et al. describes a method of manufacture of a security thread suitable for use in security articles including security paper such as that used for banknotes.
  • U.S. Pat. No. 6,547,151 issued to Baldi, describes a currency note having an identification and/or authentication element including an integrated circuit. The integrated circuit can store, securely in electronic form and accessible from outside, such information as: the value, serial number, issuer, and date of issuance.
  • U.S. Pat. No. 4,450,024 issued to Haghiri-Tehrani, et al. describes an identification card equipped with an integrated circuit, in which the circuit along with its connection leads is arranged on a carrier element which is embeddedly enclosed by the card on all sides by use of the hot lamination technique.
  • U.S. Pat. No. 4,298,217 issued to Moraw, et al. describes an identity card consisting of a plurality of layers, of which the cover layers are highly transparent films and the layers of the card core are films of moderate to low transparency, as a result of added pigment.
  • U.S. Pat. No. 5,169,155 issued to Soules, et al. describes a conventional playing card that is invisibly coded so that it can only be read face down, by an electro-optic reading means.
  • U.S. Pat. No. 5,651,615 issued to Hurier describes a security device for identifying products that includes a printing medium in which luminescent agents are dispersed, having at least one opaque part disposed on at least one luminescent part of the medium. The opaque part is the same color as the luminescent part and has at least one contour of a different color. When illuminated by predetermined radiation in the non-visible spectrum, the device shows an image different than that observed in ordinary light.
  • U.S. Pat. No. 6,203,069 issued to Outwater, et al. describes a product authentication system and method employing a unique mark that is simple and cost-effective to apply and read, but provides several layers of protection, including anti-counterfeit and anti-diversion, against counterfeiters. The unique mark includes a bar code that is printed in invisible ink comprising a UV or near-IR ink and an IR mark. The first layer of protection is invisibility. The second layer of protection is the bar code itself. The third layer of protection is the presence of the IR mark in the unique mark. The fourth layer of protection is the IR emitting characteristics of the IR mark.
  • U.S. Pat. No. 5,471,039 issued to Irwin, Jr., et al., describes a document having printed electronic circuits by using an electronic verification machine that determines the electrical characteristics or signatures of the circuits printed on the document. The electronic verification machine electronically couples with the circuit and applies an excitation signal such as an AC signal having a predetermined frequency to the circuit. A detection circuit in the electronic verification machine then generates a detection signal in response to the excitation signal which represents the characteristics of the circuit printed on the document. The electronic verification machine can also be used to stigmatize the document by applying a signal to the electronic circuits having sufficient strength to alter the electronic circuit.
  • U.S. Patent application 2001/0035822 applied for by Seidel describes an anti theft tack device incorporating a detectable element which can be attached to the body component of an existing electronic article surveillance security tag to replace the tack-like connecting component of the security tag.
  • U.S. Pat. No. 5,508,684 issued to Becker, describes a tag circuit system using resonant circuit technology in conjunction with an insulative substrate and conductive ink or metal conductor to permit the tag to be sewn into the clothing, protecting the circuit elements, yet providing a trace on a portion of the tag which can be clipped from the main portion of the tag to change the operation of the tag.
  • Various gaming applications using optically readable arrays and readers are known such as U.S. Pat. No. 6,460,848 issued to Soltys, et al. Method and apparatus for monitoring casinos and gaming, U.S. Pat. No. 6,517,435 issued to Soltys, et al. Method and apparatus for monitoring casinos and gaming, U.S. Pat. No. 6,652,379 issued to Soltys, et al. Method, apparatus and article for verifying card games, such as blackjack, U.S. Pat. No. 4,782,221 issued to Brass, et al., Printed data strip including bit-encoded information and scanner control.
  • Biometric information such as a fingerprint can be reduced to a series of terminations or bifurcations (called “minutia”) corresponding to various locations on the fingerprint. U.S. Pat. No. 4,947,442 issued to Tanaka, et al. describes a method and apparatus for matching fingerprints in which the collation rate is improved by using both characteristic and non-characteristic minutia for the collation process. An image processing unit used in the apparatus cannot determine whether the collation minutia searched are characteristic or non-characteristic since an Integrated Circuit (IC) card holds a list of collation minutia records, thus offering improved security. Further, random numbers may be utilized for accessing the collation minutia record list for further improved security. However the need to have the data stored on a processing unit increases the cost and complexity.
  • A standard accepted means of identifying an individual is through their fingerprint or retinal image. Numerous fingerprint algorithms and methods have been proposed and used in existing art such as U.S. Pat. No. 6,314,196 issued to Yamaguchi, et al. which achieves the reliability and simplicity in registering a fingerprint by indicating the quality of a fingerprint image by the number of pseudo minutiae.
  • U.S. Pat. No. 4,783,823 issued to Tasaki, et al. describes a card and a card identifying apparatus. The card is imparted with predetermined characteristic information in the form of an embossment pattern, a character pattern, a fingerprint pattern, a colored pattern or a combination of selected ones of these patterns, while information corresponding to the predetermined characteristic information is stored in a memory incorporated in the card. Upon insertion of the card into the card identifying apparatus, the latter senses the characteristic information while reading out the corresponding information from the card for collation. When coincidence is found between both sets of information, it is decided that the card is genuine. However the need to have the data stored on a processing unit increases the cost and complexity.
  • U.S. Pat. No. 6,560,741 issued to Gerety, et al. attempts to eliminate the microprocessor based card and utilizes a two-dimensional, high-density, damage-tolerant printed code suitable for encoding multiple biometrics and text for positive off-line identity verification. The two-dimensional, high-density, damage-tolerant printed code is suitable for printing on a conventionally sized ISO card or other papers used in verifying identity. An ISO-sized card or other identity paper bearing a two-dimensional, high-density, damage-tolerant printed code encoding multiple biometrics, e.g., encoded image likeness and multiple fingerprint templates, may be used with an off-line integrated positive identity verification apparatus that is capable of decoding the image and fingerprint samples taken from an individual whose identity is sought to be verified. However, since the two dimensional code can be read by conventional means the two dimensional code can be readily forged because it does not have a built in verifying mechanism to allow the reader to check for authenticity.
  • U.S. Pat. No. 5,522,623, Soules, et al., describes an apparently conventional document such as an identification (ID) card that is constructed as a laminate within which a code or other coding indicia such as a photograph, bar code or fingerprint is concealed from human view. The document is read by a conventional electro-optic reader means placed against a face of the card. The reader uses a beam of light in the wavelength absorbed by the material with which the coded indicia is produced, but reflected by the background against which the coded indicia is “seen” by the beam. The card is preferably a laminate of at least an upper lamina and a lower lamina, each made of a synthetic resin which has a substantially white imprintable surface conventionally printed with the identification of the owner of the card with a pigment-free, non-aqueous ink which is visible to the human eye but substantially transparent to wavelengths outside the visible range. Typically, both the upper and lower laminae, are opaque to visible light, but the face through which the coded indicia is to be read by the reader, is transparent to the reader's beam. The code is read because there is sufficient contrast between the transmitted and absorbed light in the wavelength used by the reader. Each of the forgoing patents are hereby incorporated herein by reference in their entirety.
  • Various gaming applications using optically readable arrays and readers are also seen in U.S. Pat. No. 6,460,848 issued to Soltys, et al. entitled Method and Apparatus for Monitoring Casinos and Gaming; U.S. Pat. No. 6,517,435 issued to Soltys, et al. entitled Method and Apparatus for Monitoring Casinos and Gaming; U.S. Pat. No. 6,652,379 issued to Soltys, et al. entitled Method, Apparatus and Article for Verifying Card Games, Such as Blackjack; and U.S. Pat. No. 4,782,221 issued to Brass, et al., entitled Printed Data Strip Including Bit-Encoded Information and Scanner Control.
  • The prior art is replete with identification and verification systems; however the need exists for a low cost and simple security marking system which can be used as an individual identification system, gaming mark or a security mark for product identification of forged or non licensed replicas.
  • SUMMARY OF THE INVENTION
  • The present invention provides an identity marking formed from a layer of conductive materials that is deposited or formed in a pattern so as to represent encoded identification information. The marking can be applied to a security card, or to a product label. The pattern of conductive material sections in the identity marking represents the security information encoded therein. The security code in the conductive layer of the marking is read by a reader that measures or verifies conductivity.
  • It is an advantage of the present invention to provide an improved security marking system which can be used as an individual identification system, gaming mark or a security mark for identification of forged or non licensed product replicas.
  • In preferred embodiments, the present invention provides security marking comprising at least one layer of conductive material which withstands any attempt to forge the information encoded thereon and thus resists any attempted forgery of the information fixed in the conductive layer of the security marking.
  • In accordance with the present invention, an algorithm which registers a fingerprint by indicating the quality of a fingerprint image by pseudo minutia can be used with the present invention to capture the fingerprint information in the conductive material and using this image as an identification system.
  • In accordance with the present invention, the layer of conductive material can comprise numerous materials, including, but not limited to, conductive inks, plastics and coatings.
  • The present invention provides, a security marking having a single layer of conductive material containing at least one element of conductively readable identifying indicia. This conductive layer can be made by applying a conductive film to the surface of a security card or to a product “tag”. The conductive layer is formed from a film that has a surface resistance in the range of less than about 150,000 ohms/square, or more preferably about 25,000 ohms/square.
  • In preferred aspects, the layer of conductive material can be formed from a variety of conductive films, coatings or inks, including, but not limited to those described in U.S. patent application 2002/0143094 entitled Polymer Nanocomposites and Methods of Preparation, Conroy, Jeffrey L., et. al.; U.S. patent application 2002/0035170 entitled Electromagnetic Shielding Composite Comprising Nano Tubes, Glatkowski, Paul; et al; U.S. patent application 2002/0180077 entitled Carbon Nano Tube Fiber-Reinforced Composite Structures for EM and Lightning Strike Protection, Glatkowski, Paul; et al; U.S. patent application 2003/0008123 entitled Nanocomposite Dielectrics, Glatkowski, Paul; et al; U.S. patent application 2003/0164427 entitled ESD Coatings For Use With Spacecraft, Glatkowski, Paul; et al; and U.S. patent application 2003/0122111 entitled Coatings Comprising Carbon Nano Tubes and Methods For Forming Same, Glatkowski, Paul; et al; all included herein by reference. The dispersion that form the conductive material can be further comprising a plasticizer, softening agent, filler, reinforcing agent, processing aid, stabilizer, antioxidant, dispersing agent, binder, a cross-linking agent, a coloring agent, a UV absorbent agent, or a charge adjusting agent.
  • In preferred embodiments, the present conductive coating layer can also be made from single wall or multi wall carbon nano tubes that may preferably be sized to be less than 3.5 nm and greater than 0.1 nm in outer dimension size. In optional embodiments, additional conductive dispersions such as Acheson Electrodag 427 or Antimony Tin Oxide (ATO) ink can be alloyed with either single wall or multi wall carbon nano tubes preferably sized to be greater than 3.5 nm and less than 15 nm in outer dimension size. In preferred embodiments, the carbon nano tubes can be mixed uniformly into the Acheson Electrodag 427 such that their percent by weight is between 0.5 to 10%. Alternately, they may be applied as a first layer of a two part coating. Preferably the carbon nano tubes are added such that they make up 3% by weight of the mixture. The nano tubes are preferably present in the film from about 0.001 to about 10% based on weight. The present nano tubes may be selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof. Optionally, platinum nano particles can be added and mixed uniformly to the conductive coating layer such that their percent by weight is between 0.5 to 10%. Preferably the platinum nano size particles are added such that they make up 4% by weight of the mixture.
  • Additional traditional conductive films such as conductive carbon based inks, silver inks, metal oxides based inks where the metal oxides are selected from tin-indium mixed oxide (ITO), antimony-tin mixed oxide (ATO), fluorine-doped tin oxide (FTO) or aluminum-doped zinc oxide (FZO) and conductive plastics such as those produced by Bayer or Southwall Technologies Altair M10 can be used to form the conductive layer. The dispersion further comprising conductive organic materials, inorganic materials, or combinations or mixtures thereof. The conductive organic materials are selected from the group consisting of buckeyballs, carbon black, fullerenes, nano tubes with an outer diameter of greater than about 0.5 nm, and combinations and mixtures thereof. Additionally conductive inorganic materials used to form useful conductive films can be selected from the group consisting of antimony tin oxide, iridium tin oxide, aluminum, antimony, beryllium, cadmium, chromium, cobalt, copper, doped metal oxides, iron, gold, lead, manganese, magnesium, mercury, metal oxides, nickel, platinum, silver, steel, titanium, zinc, and combinations and mixtures thereof.
  • In preferred embodiments, the layer of conductive material sections is patterned so as to form resistors. The resistors can be formed either by modifying the conductive makeup of the regions of conductive material in the conductive layer or the resistors can be formed by printing or etching of the conductive coating to form the resistance features on a security card or product tag. Additionally, these resistors can be formed by printing with conductive inks. Applicable printing methods include spray painting, dip coating, spin coating, knife coating, kiss coating, gravure coating, screen printing, ink jet printing, and pad printing or other printing means or by either chemical or mechanical means such as using a Versa Laser made by Universal Laser Systems of Phoenix, Ariz., to remove the conductive material to form non conductive areas. Once the resistors are formed by the pattern of conductive materials in the conductive layer, then the security information or identification can be marked into or onto the conductive layer. In preferred embodiments, the code that is marked on or into the conductive layer can represent biometric information for use with an identity card, gaming value or lottery ticket information for gaming applications or product/manufacture information when used as a product identifier.
  • Another security issue that has not been effectively handled by existing marking technology is the grey market diversion and authentic licensed material. Grey market material is a problem in the high value consumer goods market where manufacturers distribute the products at different price points to different markets due to various pressures such as price controls in a market. Authentic licensed material such as sports logo materials are regularly copied and the licensing fees not paid. A better way of discretely identifying the product is needed to minimize these problems.
  • An advantage of the present security marking is that it an be used in packaging applications such as tamper proof seals or package identification to assist manufacturers to identify their products. Specifically, the conductive layer can be encoded with information such as lot, destination (country to be exported to), manufacturing date, or other useful information so that a manufacture or retailer can quickly determine if the product is “grey market” or authentic. Advantageously, the security code or marking in the conductive layer is not readable to the consumer, however, such conductive layer is machine readable. Moreover, as the conductive layer may be transparent, it does not block visual indicia (e.g.: a photograph) therebelow. In preferred embodiments, the transparent conductive layer may include an ink like Acheson Electrodag 427 or conductive films, coatings or inks such as described in U.S. patent application 2002/0143094 entitled Polymer Nanocomposites and Methods of Preparation, Conroy, Jeffrey L.; et al.; U.S. patent application 2002/0035170 entitled Electromagnetic Shielding Composite Comprising Nano Tubes, Glatkowski, Paul; et al; U.S. patent application 2002/0180077 entitled Carbon Nano Tube Fiber-Reinforced Composite Structures for EM and Lightning Strike Protection Glatkowski, Paul; et al; U.S. patent application 2003/0008123 entitled Nanocomposite Dielectrics, Glatkowski, Paul; et al; U.S. patent application 2003/0164427 entitled ESD Coatings for Use with Spacecraft, Glatkowski, Paul; et al; and U.S. patent application 2003/0122111 entitled Coatings Comprising Carbon Nano Tubes and Methods for Forming Same, Glatkowski, Paul; et al. Therefore, determining the authenticity or whether the product has been diverted from another market is easily accomplished by the present invention since the security marking in the conductive layer (i.e.: the pattern of conductive sections making up the conductive layer) can be read by a conductivity meter, yet is not optically visible to an observer with the naked eye due to the transparent nature of the conductive material.
  • In optional embodiments of the present invention, the conductive inks or coatings can also be impregnated or printed onto a primary packaging material. The ink or coating could be formulated to provide a specific resistance so that the product could be easily identified by resistive readings of the package. Specifically, a resistance reader can be used to identify the package.
  • In an alternate embodiment, the encoding on the security marking is customized for gaming applications. For example, a similar coding method as used in the biometric coding application described above is used, but instead using a typical gaming card deck as the information which is converted into a pixel code. In preferred embodiments, the system has redundant encryptions and this eliminates the possibility of forgery and requires the card reader to initiate start of game and end of game. Start of game is when the shoe or shuffler is loaded and end of game is at the end of the playable cards or can be signaled by the dealer. The wrapper for each deck has the card deck code on it and that is entered into the card reader to allow it to validate the card deck. This provides a machine readable conductive system that is tamper resistant. Advantageously, such system need not be readable by optical means.
  • In various embodiments, the invention can also be extended to identifying and controlling high value products. For example, the conductive layer can be used to store product, manufacturer, lot and manufacturing facility identifiers such that a product can be verified as authentic and or licensed. Such an intelligent tag with the anti forgery properties in the conductive layer would help the manufacturer identify both diverted and grey market products. Optionally, the layer of conductive material can be applied to a tag or integrated into a logo by coating an embossing thread with the conductive material which will act as a conductive tag. Optionally as well, the conductivity of the tag can be controlled by the amount of conductive media that is in the ink.
  • The reading of the encoded conductive material could be accomplished by a reader similar in design to U.S. Pat. No. 6,776,337, 6,435,408 or 5,471,039 all issued to Irwin, Jr., et al. which provides a means for the determination of the authenticity and integrity of various types of documents such as lottery tickets accomplished by using an electronic verification machine to compare data contained in electronic circuits printed on the document to document data printed on the document. The electronic circuits are printed on the document in conductive or semiconductive ink using, for example, the gravure printing process, and the presence and status of the circuits can be used to verify or authenticate the document. Data can be represented in the electronic circuits by the electrical signature of the circuit which is measured by the electronic verification machine. In the case of lottery tickets, a ticket can be validated by having the electronic verification machine determine which play spots have been removed from the ticket and comparing data on the ticket with the removed play spots to determine a play redemption value for the ticket. Document verification or lottery ticket validation can also be accomplished by transmitting signature data from the electronic circuits via the electronic verification machine to a central computer for comparison with document data.
  • In various embodiments, the conductive layer can be used with a traditional radio frequency identification device (RFID). For example, a microprocessor or ASIC (application specific integrated circuit) can be embedded in the card and identification information can be captured in the conductive material in communication with the microprocessor or ASIC. The conductive material can be etched to form a reference resistor and a series of information resistors on the card. The reference resistor provides the RFID, and the reference resistor and the information resistors can be arranged such that the information contained in the conductive material is readable by testing the resistance of the applicable encoded line of information resistors. Optionally, the conductive material can also be formed such that an antenna for the RFID device is formed from the same conductive material as the each information line.
  • Other objects, features and advantages of the invention will become apparent from the following detailed description of preferred embodiments, when considered in light of the attached figures of drawing.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a view of a security card according to the invention with diagrammatically indicated information and a security marking thereon.
  • FIG. 1A is an illustration of a fingerprint showing fingerprint minutia.
  • FIG. 2 is an illustration comparing the security mark on the security card with biometric information of the individual.
  • FIG. 3 is a flow chart illustrating a process of writing the security marking according to the invention.
  • FIG. 4 is a flow chart illustrating a process of reading and comparing the security marking according to the invention.
  • FIG. 5 is a schematic showing a pattern of conductive material sections representing a serial code on a security card.
  • FIG. 6 is a schematic showing an alternative serial code.
  • FIG. 7 is a schematic of pattern of conductive material sections representing an analog code on a security card.
  • FIG. 8 is a representative SEM image of single wall carbon nano tubes.
  • FIG. 9 is a schematic of a security card computer access device.
  • FIG. 10 is a schematic of a security card that holds data in a pattern of conductive material sections representing analog resistance values printed on a card.
  • FIG. 11 is a representation of a playing card having sections with conductive materials positioned thereon in a pattern to represent a value pixel code information which is converted to a 7×7 pixel code.
  • FIG. 12 is a representation of a card value pixel code information which is converted to a bar code.
  • FIG. 13 is a representation of a security tag with pixel code information.
  • FIG. 14 is a representation of a security card having a magnetic strip with security markings such as a security code or a picture integrated therein.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • (a) General Description:
  • The present invention provides a security marking or identity “tag” that can be affixed to a security card, or to a product label, or to a product itself. In one embodiment of the invention, the identity tag is composed of at least two layers wherein one layer carries identification information such as the name, photograph and personal reference number, and the other layer carries additional latent security markings represented by a layer comprising a pattern of conductive materials either inscribed in or printed thereon. The two individual layers of the security marking may have different transparencies. For example, the first of the two layers may comprise the core (i.e.: main body) of a security card, and have a matt, preferably white, coloring as a result of added pigment with moderate to low transparency. By contrast, the conductive layer of the security marking may have a very high transparency. Therefore, the conductive layer may be applied directly over the core layer of the security card, without blocking visual reading of the indicia (e.g.: photographs) on the core layer of the security card.
  • The conductive material sections in the conductive layer may be formed from various conductive films, inks or dispersions, and may have a wide variation in transparency going from opaque to highly transparent. The formulation of the conductive layer is important to achieve the desired conductivity of the layer when it is cured to form part of the security tag. In preferred embodiments, the identification security information is inscribed into the conductive material layer in areas which are conductive and areas which are conductively isolated. One preferred embodiment of the conductive layer includes the formation of a resistor or series of resistors that can be verified. The present invention includes mechanical formation of the resistor by printing or mechanical removal of material and includes both providing a reference resistor and a series of resistors. In one embodiment, the reference resistor is a single resistive shape formed in the conductive coating layer. This reference resistor can be used by a conductive reader to determine a base line resistance so that the base line resistance can be compared to the design and the series is interpreted based on the base line resistor. For example, the patterned sections of conductive material can be formed into a series of resistors, each having a pre-determined resistance. For example, each resistor can be formed to have a 5 ohm resistance. When the conductivity meter reads a 50 ohm resistance, it knows there are 10 resistors on the card. Similarly, if the conductivity meter reads a 40 ohm resistance, it knows there are 8 resistors on the card. This provides a means of locking the data to prevent forgery. Alternatively security information can be stored in the series of resistors to provide a verification system when used with a traditional smart card microprocessor for verification of the security card. For example the resistance of the reference resistor can be measured and at least one referenced series resistor is inscribed on the tag. The resistance of the reference resistor can be measured and then the resistance of the series resistors can be measured with the resultant resistance of the series divided by the reference resistant values to yield the digital value of the series resistor. Additionally, a code such as a binary code that uses areas of conductivity versus areas of non conductivity to capture information can be either inscribed or printed as part of the layer of conductive material. This code can be used to provide an identity marking for the security marking tag. This marking can be either biometric information for an identity card or lot and manufacture information for a product identity tag. The code used needs to be devised such that forgery or modification to the tag is prevented. One system of accomplishing this for personal identity cards is to encode the biometric information on the card and to use serial encryption of this biometric information to minimize the ability of a forged identity tag.
  • Alternatively the conductivity of the conductive layer can itself be used as the identifier. For example the conductivity can be changed by varying the conductive materials in the conductive layer. For example a card, package or tag for a specific application could be pre-set so that its conductivity is 150 ohms squared whereas in another tag or application the conductivity is 300 ohms squared. A valid ID for the first application would require a conductivity reading of approximately 150 ohms squared and a material with greater than or less than the 150 ohms square read would be invalid.
  • In addition to storing biometric information the conductive material can be used to store product, manufacture, lot and manufacturing facility identifiers such that a product can be verified as authentic and or licensed. A security marking tag containing product identification information could be attached to the product or labeling or it could be incorporated into the product itself. This would make a forged product easier to identify and could be used to determine if a product is diverted such as a grey market product. The security marking tag could contain the market or channel information on the tag and or the manufacturing lot information to help identify the product if it was to be inspected.
  • In addition to conductive materials such as carbon nanotubes, carbon, silver, platinum, tin-indium mixed oxide (ITO), antimony-tin mixed oxide (ATO), fluorine-doped tin oxide (FTO) or aluminum-doped zinc oxide (FZO) and conductive plastics such as those produced by Bayer or Southwall Technologies Altair M10 the conductive layer may also incorporate polymeric materials selected from the group consisting of thermoplastics, thermosetting polymers, elastomers, conducting polymers and combinations thereof or a material selected from the group consisting of polyethylene, polypropylene, polyvinyl chloride, styrenic, polyurethane, polyimide, polycarbonate, polyethylene terephthalate, cellulose, gelatin, chitin, polypeptides, polysaccharides, polynucleotides and mixtures thereof, or ceramic hybrid polymers, Ethylene Glycol Monobutl Ether Acetate, phosphine oxides and chalcogenides. The conductive coatings can also be formed from carbon nano tubes, carbon nano tubes/antimony tin oxide, carbon nano tubes/platinum, or carbon nano tubes/silver or carbon nano tubes/silver-cloride dispersion or coating. The small size permits the formation of surface texture less than 0.33 microns. Additionally conductive dispersions such as Acheson Electrodag 427 Antimony Tin Oxide (ATO) ink can be alloyed with either single wall or multi wall carbon nano tubes preferably sized to be greater than 3.5 nm and less than 20 nm in outer dimension size. The carbon nano tubes may be mixed uniformly into the Acheson Electrodag 427 such that the percent by weight is between 0.5 to 10%. Preferably the carbon nano tubes are added such that they make up 3% by weight of the mixture. The nano tubes used by the aforementioned conductive materials are selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof. Additionally platinum nano particles can be added and mixed uniformly to the coating such that the percent by weight is between 0.5 to 10%. Preferably the nano size platinum are added such that they make up 4% by weight of the mixture. Alternatively to produce a system of reading the security card without contacting it, the conductive material can be mixed with fluorescence dye and binary numbers can be written in the fluorescence dye. This allows non contact optical reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • Additional traditional conductive films such as conductive carbon based inks, silver inks, metal oxides based inks (where the metal oxides are selected from tin-indium mixed oxide (ITO), antimony-tin mixed oxide (ATO), fluorine-doped tin oxide (FTO) or aluminum-doped zinc oxide (FZO)) and conductive plastics such as those produced by Bayer or Southwall Technologies such as Altair M10 can be used to form the conductive layer. The aforementioned patents and materials are hereby incorporated herein by reference in their entirety.
  • Alternatively to produce a system of reading the card without contacting it the conductive material can be mixed with fluorescence dye and the codes can be written in fluorescence dye. This allows non contact optical reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • Alternatively the conductive material layer can be used with a traditional radio frequency identification device (RFID). In this embodiment, a microprocessor or ASIC (application specific integrated circuit) is embedded in the card and identification information is captured in the conductive material in communication with the microprocessor or ASIC. The conductive material can be etched so that there is a reference resistor and a series of information resistors etched on the card. The reference resistor provides the RFID, the reference resistance and the information resistors are arranged such that the information contained in the conductive material is readable by testing the resistance of an applicable encoded line of information resistors. The conductive material layer can also be formed such that the antenna for the RFID device is formed from the same conductive material as the each information line.
  • In addition to having a consistent and repeatable coating the present system of representing identity information by the positioning of regions of conductive material can be such that attempts at adding or deleting encoded data by adding or removing regions of conductive material voids the data stored in the identity marking. To accomplish this, data can be written by etching, engraving, printing or spraying the appropriate patterns on the tag.
  • For example a preferred means of encoding a fingerprint onto a card of the present invention is discussed below. In one embodiment of the invention, the card is composed of at least two layers, of which one layer carries the information which directly serves for identification, such as the name, photograph, color code or personal reference number, and the other layer comprises regions of conductive material that are positioned on the card to represent additional conductive security markings. The individual layers of the identity card can have different transparencies; thus, for example, one of the two layers of the card core has a matt, preferably white, coloring as a result of added pigment and accordingly has a moderate to low translucent. By contrast, the upper cover layer of patterned conductive material of the identity card has a very high translucent conductive coating which is etched or printed to create a coated indicia for the card. The positioning of conductive materials in layer of translucent cover layer such as described above represents, information which serves to identify the card holder, and the colored lower layer has additional security markings, such as figures, as a protective measure against forgeries.
  • In another preferred embodiment, the packaging material of the product may have the conductive layer embedded therein. For example carbon nano tubes or other conductive material could be mixed with the papers or fibers or box materials of the packaging and this would make the paper conductive for verification of the authenticity of the document or packaging. This technique would be useful for the marking of treasury bills, documents, high value packages etc.
  • In a further embodiment of the invention, the security marking of the present invention can consist of a single layer used to validate the authenticity of a security card by providing a machine readable marking that is transparent to the customers. This is useful in gaming establishments to validate card decks.
  • In a further embodiment of the invention the conductive coating is encoded with security information determine if the document or gaming piece is valid by a reader testing the resistance level of a portion of the coating or over the whole area.
  • In a further embodiment of the invention the conductive coating is replaced with a conductive film and the encoded information is punched into the film.
  • In a further embodiment of the invention the conductive coating is replaced with a conductive film and the encoded information is punched into an over laying film and the film is adhered to the conductive layer.
  • In a further embodiment of the invention the conductive coating is replaced with a conductive film and the encoded information is printed with non conductive ink over the film so that it adhered to the conductive layer forming the encoded area.
  • In a further embodiment of the invention the conductive coating is coated on thread that is used to form the logo on apparel. In this embodiment of the invention, the conductivity of the thread can be used by the manufacturer to determine if the apparel was made for that market or if it was diverted. A resistance (or conductivity) reader testing the resistance level of a portion of the coated logo or over the whole area is used to determine the authenticity and if it was diverted from another market. The conductivity in the conductive layer of the security marking can be set at a specific level corresponding to a specific destination or territory. This can be used to determine the authenticity of the item.
  • In a further embodiment of the invention the conductive coating is applied to a security card or identity tag in a two step process, wherein the first step is to form the conductive layer and the second step is to form an optional polymer cover layer.
  • In a further embodiment of the invention the conductive coating is applied to a security card or identity tag in a one step process. (IE: the conductive layer is formed without a cover layer).
  • In a further embodiment of the invention the encoding of the security information is performed with binary numbers.
  • In a further embodiment of the invention the encoding of the security information is performed with bar codes.
  • In a further embodiment of the invention the binary numbers are written with fluorescence dye that is incorporated into the conductive layer.
  • In a further embodiment of the invention the binary numbers are written with infrared dye that is incorporated into the conductive layer.
  • In a further embodiment of the invention the bar codes are written with infrared dye or fluorescence dye.
  • In a further embodiment of the invention the security information codes are written in back ground ink. For example, a security card may be covered with transparent conductive ink and then using a standard laser printer for quick identification at trade shows, office buildings, etc.
  • In a further embodiment of the invention the conductive material can be mixed with fluorescence or infrared dye and the security information can be encoded in fluorescence dye bearing material. This allows non contact optical reading of the security card while the conductive contact reading of the conductive material layer is used to verify the card authenticity.
  • In a further embodiment of the invention the binary numbers are written in infrared dye or fluorescence dye. If a fluorescence or infrared dye was used then the system does not require a contact reader. A digital encoding method using a non-contact infrared dye reader can be used.
  • Fingerprint identification can be accomplished simply by analyzing the fingerprint for the end of a ridge point (terminations) or the merger of two ridge points (bifurcations). Bifurcations and terminations are called minutia points. The set of minutia points constitute the features characterizing a fingerprint. The matching of two fingerprints is based on comparing the locations of the minutia points.
  • Utilizing such minutia points provides the present security marking with two alternate systems for capturing and verifying the fingerprint information. In either system, the fingerprint is not replicated on the card but the information describing the unique characteristics of the fingerprint can be captured on the card.
  • In the first system, the card uses graphical information regarding the relative location of the minutia and specific location and type information (location and whether a bifurcations and terminations) that is contained in a corresponding serial code. In the second system, the card uses graphical information regarding the relative location of the minutia and specific type information (whether a bifurcations and terminations) that is contained in a corresponding serial code.
  • In preferred embodiments, the security card will have a region reserved for fingerprint identification information and that information will be specific to the individual for whom it is issued.
  • (b) Preferred Embodiments
  • Creating the card:
  • In one embodiment, the security card is formed with a pattern of conductive material regions that are positioned on the card in a serial code format to represent fingerprint minutia type and location. The pattern of conductive material locations also provides a reverse image plot that provides the relative location of the minutia points. A fingerprint capture algorithm and associated equipment can be used to scan the fingerprint and calculate the minutia information with regards to location and bifurcations or termination type (see FIG. 1A). For example, the software calculates the x and y location of the bifurcations and terminations and identifies the fingerprint. The location and type data of the fingerprint minutia can then be converted to a serial code that will have the location information of the minutia and the type of minutia for each point, being either a bifurcation or a termination. The location data may be converted into a reverse image to plot the relative location of the minutia points on the card.
  • The card is then formed with a bar code having both location and minutia type and a reverse image of the minutia points thereon. In a preferred embodiment, the security information is encoded by the position of conductive material sections formed in a conductive layer of the card.
  • A typical two layer security card 100 is shown in FIG. 1. Card 1000 is formed from a standard security card body such as a driver's license or credit card (that may optionally be made of a plastic laminate). In accordance with the present invention, regions of conductive materials cover areas of the security card body. This upper covering layer of conductive material is preferably transparent such that the information on the security card body can be read through the layer of conductive material. In accordance with the present invention, security information is stored on both the security card body, (e.g. in the form of a photograph or magnetic strip) and also in the covering layer of conductive material (as determined by the positioning of individual sections of conductive material).
  • As will be explained in detail, certain regions of card 1000 have a layer of conductive material deposited thereon or otherwise applied thereto. The particular pattern formed by these conductive material deposits may be used to encode security information. For example, card 1000 may have reverse image alignment points 1005 formed by regions of of conductive or non-conductive material and fingerprint minutia points 1010 also formed by regions of conductive or non-conductive material on the security card. Minutia locations and type may also be written in a serial code 1015 on the conductive layer of the security card. Specifically, such a serial code may be formed by a pattern of regions of conductive material deposited in a line. The serial code is read by a conductivity meter detecting the presence (or absence) of individual regions of conductive material in the line. A serial code is any code that is written serially so that the information is stacked and new information can not be inserted in between the code. The Minutia type is written again in a different serial code 1020 on the conductive layer of the security card. Security card 1000 can also contain a pattern of conductive or non-conductive material deposits forming security code 1030, a picture 1025 on the underlying body of the security card and a security resistor 1035 formed by the conductive material. Security resistor 1035 may be etched or printed on card 1000 to provide a resistive identifier for the card. In operation, the resistance of resistor 1035 is matched within a tolerance of acceptable resistances and configuration for a particular class of security cards.
  • Verifying Identity Using the Card
  • The fingerprint verification process for the card has two components. As seen in FIG. 2, the first part is capturing the scanned fingerprint 2010 using the same algorithm that is used to create the fingerprint data for the fingerprint shown in FIG. 1A. This algorithm produces data with respect to the minutia with regards to location and minutia type (bifurcations or termination).
  • The fingerprint data on the card 1000 is then read, with both the reverse image alignment points 1010 and the serial codes 1015 and 1020 providing a system of verification, and both the relative location information from the reverse image alignment points 1010 and the serial code information 1015 and 1020 containing location and minutia type data. This verification system uses the location of minutia translated from the reverse image alignment points 1010 and compares it to location data that is part of the serial code 1015. This provides an internal check of the card information based on location data. Then the serial code information of both the minutia location and type is compared to the data generated by the fingerprint capture algorithm and the identity is verified or not verified.
  • By using the multi-step process of minutia location verification on the card with respect to both the reverse image alignment points 1010 and serial coded information 1015 and 1020, the data contained on card 1000 is validated and forgery prevented. As stated above, a conductivity meter can be used to scan over regions of the card to determine the position of the deposits of conductive materials. When these conductive regions are deposited in a line, the existence of a conductive region can be interpreted as a (1), and the absence of a conductive region can be interpreted as a (0), making binary coding possible. For the card to be forged the forger would have to insert information between the serial recorded data 1020 or remove the serial encoded information 1020, thereby destroying the card. Since the information is recorded on the conductive layer the forger would have to remove and replace the conductive material with the same material or insert new information between the serial data 1020 in multiple locations and replicate the security resistor 1035. The security resistor 1035 is also checked with the reading of the card 1000 to insure that it is a valid card. The combination of serial recorded data 1015 of minutia type and location and the second minutia type serial information 1020 capture and security resistor 1035 eliminates the means to adulterate the card with forged biometric information. The two means of writing the minutia type plus the security resistor make aldutrading the card impossible. One would have to remove and add material and the resistor would have to be changed the formulation problems to match the card stock and all the resistances would be impossible. To forge the fingerprint identity the individual would have to recreate the plot on the conductive material and new points would have to match the old points' relative locations 1010 and the data on the serial codes 1015 and 1020 would have to match the new plotted location data points.
  • The flow chart of the biometric capture processes is shown in FIG. 3 and the biometric comparision and verification process is shown in FIG. 4.
  • A preferred system of how the card operates is shown in FIG. 5.
  • First a card reader (e.g.: a conductivity meter) reads codes 1015 and 1020 and records fingerprint location and minutia type. ( Codes 1015 and 1020 represent physical removed or missing deposits of conductive materials on the surface of the card). The conductivity card reader then compares the minutia order to the code 1021 information and the next step is to compare a pixel map of the fingerprint minutia data to the minutia locations code 1010 on the card.
  • This prevents forgery or adulteration of the card because minutia location code 1010 stores in the pixel code order the minutia location and code 1022 stores the same location data written in a serial manner. The fingerprint minutia site information is captured in two different and separate codes which prevents forgery because if they do not match then the card is not correct. A forger could add pixel and information to the pixel code 1010 however the serial code 1022 will not match. Therefore, it is not possible for a forger to modify the card by changing the code 1010 because the minutia type code 1022 is written sequentially. As a result of the above, it is not possible to modify code areas 1010, 1015, and 1022 and get matches when the codes are read because of the three independent code verifications.
  • The encoding for the identification card can be accomplished as follows.
  • As shown in FIG. 5 one method to create the serially encoded data 1015 and 1010 and 1022 is by capturing biometric information. In the example below a fingerprint is used but a similar method can be used for any biometric information desired.
  • Fingerprint minutia site information is captured and converted to a pixel code 1010. The pixel code fingerprint minutia location information captured in pixel code 1010 allows the card to capture up to 25 minutia points. The pixel code 1010 code has alignment points 1005 marked in the conductive material.
  • Second is the lower serial code 1021 as shown in FIG. 5 where the minutia type (bifurcation or termination) which are located in pixel code 1010 is listed in order from left to right and top to bottom as plotted in pixel code 1010. The minutia locations and type are also written to the serial code 1015 on the card. The minutia type are written again in a different serial code 1020 on the card.
  • FIG. 6. shows an alternate embodiment of card 100 with code 1010 representing minutia location 1010 and code 1011 representing minutia type. As illustrated, code 1010 may comprise up to 7 regions where conductive materials are deposited or removed or missing on the surface of the security card. One or more of these regions may not have conductive material deposited thereon, making coding possible. For example, a conductivity meter scanning along code 1010 will determine whether conductive material is deposited or removed at each of these 7 regions. A minutia check bit resister 1036 provides a check bit sum plus one for the number of minutia points. The check resistor 1035 provides the relative basis for the minutia check bit resister 1036.
  • The security card can also contain security code 1030, picture 1025 (not shown in FIG. 6) and security resistor 1035. The security resistor 1035 comprises conductive material that may be etched or printed on card 1000 having a pre-determined resistance to provide a resistive identifier for the card. Specifically, the resistance of resistor 1035 has to match within a tolerance of the acceptable resistance and configuration for a particular class of cards.
  • Alternatively the conductive material encoding can be integrated into a traditional RFID device such as an identity card as seen in FIG. 7. A layer of conductive material 7001 is applied to the card 7000. Embedded in the card 7000 is a radio frequency identification device (RFID) 7005 which can be a microprocessor or ASIC (application specific integrated circuit). The conductive layer 7001 can be etched so that there is a reference resistor 7010 and a series of information resistors 7015 etched on the card. The reference resistor 7010 provides the ASIC 7005 the reference resistance and the information resistors 7015 are arranged such that the information contained in the conductive material is readable by testing the resistance of the applicable encoded line of information resistors 7015. For example, if the information “1234” was to be encoded on the card the reference resistor 7005 would be etched in the reference 7010 trace. The first information line 7016 would have a single information resistor 7015 etched in the conductive material, the second information line 7017 would have a two information resistors 7015 etched in the conductive material, the third information line 7018 would have a three information resistors 7015 etched in the conductive material, the fourth information line 7019 would have a four information resistor 7015 etched in the conductive material. Alternatively the resistance in each information line could be written in reverse logic where the reference resistor 7010 is high and the information resistance lines (7016, 7017, 7018, 7019) are lower by an amount indicating an appropriate identification value. The layer 7001 of conductive material can also be formed such that the antenna for the RFID device is formed directly into layer 7001 from the same conductive material as each information line.
  • FIG. 8 shows an SEM of single wall nano tubes which can be used to form the conductive layer of the invention.
  • FIG. 9 shows an identity card according to the present invention used with a computer system. The conductive card 4810 can be preprinted with an identification sequence which is then used in a computer access device 4800. The access device 4800 can plug into the USB or serial post of the computer (not shown) that contains contacts for reading the card and the data encoded in a conductive layer thereon. The data encoded in the conductive layer is used to store a biometric signature such as a fingerprint. The fingerprint would be captured by the fingerprint reader 4812 attached to the computer or built into the computer access device. The computer access device memory (i.e.: the data encoded in the conductive layer) would be written at the point of issuing with the individual biometric information and that would be correlated to the card identifier. Therefore the user is identified by the card which has a unique ID and their unique fingerprint. This would permit access to a LAN, VPN or system access depending on the application.
  • Alternatively the conductive card can be printed with biometric information which is then used in a computer access device FIG. 9. The access device 4800 can plug into the USB or serial post of the computer and it contains contacts for reading the card 4810. The card is used to store a biometric signature such as a fingerprint. The fingerprint would be captured by the fingerprint reader attached to the computer or built into the computer access device. The card in the computer access device would be written at the point of issuing with the individual biometric information and when used in a reader the information would be correlated between the card and that read at the point of access. Therefore the user is identified by the card which has a unique fingerprint written to the card and the unique fingerprint read at the access device. This would permit access to a LAN, VPN or system access depending on the application.
  • FIG. 10 shows an alternative embodiment for an identity card without an RFID device. The card 8000 contains verification resistor 8005 and the minutia location is contained in resistor traces 8010 and 8011. The minutia type is written in resistor trace 8013. This is replicated to accommodate as many minutia points as required to identify the individual. A minutia check bit resistor 8036 is encoded on the card to provide check bit information for the number of minutia recorded on the card. The reference resistor 8035 is encoded on the card to give the reference resistance. The conductive material can also be formed such that the antenna for the RFID device is formed from the same conductive material as the each information line.
  • In an alternate embodiment the encoding means is customized for gaming applications. In a similar coding method as used in the biometric coding application and using a typical gaming card deck as an example the card deck information is converted into a pixel code. The system has redundant encryptions and this eliminates the possibility of forgery and requires the card reader to initiate start of game and end of game. Start of game is when the shoe or shuffler is loaded and end of game is at the end of the playable cards or can be signaled by the dealer. The wrapper for each deck has the card deck code on it and that is entered into the card reader to allow it to validate the card deck. This provides a machine readable only identifier that is tamper resistant and not readable by optical means.
  • As shown in FIG. 11 a standard playing card is provided. A pattern of conductive material is applied directly to the face of the playing card, with the pattern encoding information therein. Card value pixel code information can be converted to a 7×7 pixel code 6005, which can represent 52 cards and a 36 binary deck identifier. There is a check bit column 4500 that sums each line of the encoding rows so that the ability to forge the information is minimized. Having a check bit for each line makes the security marking hard to forge since each line would have to have two marks added to the line for the bit to be out of sequence.
  • In addition, there is a lower binary code where the deck identifier 4520 is stored in a 36-2d binary code. This allows a 36 bit number to be the deck identifier. This identifies the deck of cards a casino could have each deck identified a 36 bit number means they would change numbers over only ever 100 years.
  • The card identifier 4511 is a 4 bit binary code for card value made up of bits 4510 and a two bit binary code 4505 for card suit.
  • How the Playing Card Information Works.
  • First the card reader reads the card identifier 4511 and card deck information 4520. The check bits 4500 are compared and then the card deck information 4520 is compared with the valid card deck information stored in the card reader. If the card deck identifier 4520 is different than the card deck identifier that was entered from the card deck wrapper then the card reader alarm states “bad deck information”. Then the value of the card 4510 is checked against the cards dealt register in the card reader. If the same card and same deck have already been dealt during that game then the card reader alarms; if not, then the cards are playable. The reader memory then records deck and card information and position information so that winning hands cards can be verified electronically. This can be done with a sensor system or manual input to where each player is in the table position.
  • Because of the card deck information 4520 and the card value information 4511 combined with the check bit 4500, the ability for a foreign card to be inserted into a game is virtually impossible and the data storage checks for card playing order and cards in play eliminate the switching of cards or movement of cards between players.
  • FIG. 12 illustrates a playing card encoded with resistance codes. The card identifier 4511 works with a 4 bit binary code for card value 4510 and a two bit binary code 4505 for card suit. The deck identifier 4520 is stored in a resistance code. This allows a 36 bit number to be the deck identifier. The reference resistor 4535 is used to verify the conductive material (which is read by the conductive reader that verifies the resistance which is used in the interpretation of the code) the same as all the other analog codes that are converted to digital by interpretation of the reference resistor. A check bit 4520 can be used to provide a timing marks as well as a check sum.
  • FIG. 13 is a representation of a security tag with pixel code information. The tag can be as simple as a single conductive reference resistor 9000 where the identity is determined by the resistance of resistor 9000 or it can be more complex and contain manufacturers code 9020 and article ID 9010.
  • FIG. 14 is a representation of an encoded security marking 500 including a picture or signature 510 integrated into the card as well as a magnetic strip 505.
  • In further embodiments of the invention, other biometric information can be encoded such as retinal scans, palm prints, etc. The fingerprint methods are examples and are detailed here for reference.
  • In a further embodiment of the invention the pattern of conductive material deposits in, or removed from, the conductive coating is used to determine if the document or gaming piece is valid by the reader testing the resistance level of a portion of the coating or over the whole area. This can be done by forming a resistive trace in resistor 9000 in the card with a resistance reader testing the resistive trace. This takes into account the ohms per square relationship of the material. The same effect can be done by applying three voltages to a card, such as 1, 10 and 100 volts. Because of the phenomenon of electron jumping between the nano tubes the resulting ohm law result is different. Ohm's law is most commonly represented by the following equation E=IR.
  • In a further embodiment of the invention the layer of conductive material deposits ae replaced with a conductive film and the encoding ID punched into the film. A conductive film like the Bayer conductive film or Ocean Plastics Co., Ltd. conductive plastic film—(OCC FILM) can be used and the code punched in the film prior to laminating.
  • In a further embodiment of the invention the conductive layer is applied in a two step process. The conductive nano tube coatings can have nano carbon or nano metals in the coating. Additionally the nano dips can be reformulated to allow a one dip coating or a two dip coating.
  • In a further embodiment of the invention the conductive layer is applied in a one step process where the conductive nano tube coatings can have nano carbon or nano metals in the coating. Additionally the nano dips can be reformulated to allow a one dip coating or a two dip coating.
  • In a further embodiment of the invention the conductive coating with either one or two part application is replaced with a conductive film. The encoding ID is punched into an over laying film and the film is adhered to the conductive layer.
  • In a further embodiment of the invention the conductive coating with either one or two part application is replaced with a conductive film. The encoding ID is printed with non conductive ink over the film so that it adheres to the conductive layer forming the encoded area.
  • In a further embodiment of the invention the conductive material can be mixed with fluorescence or infrared dye and the code is in fluorescence dye bearing material. This allows non contact (e.g. optical) reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • In a further embodiment of the invention the conductive material can be mixed with fluorescence dye with the code being in the fluorescence dye bearing material. This allows non contact (e.g. optical) reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • In a further embodiment of the invention the encoding is performed with binary numbers.
  • In a further embodiment of the invention the encoding is performed with bar codes.
  • In a further embodiment of the invention the binary numbers are written in fluorescence dye. If a fluorescence dye was used then the system would not require a contact reader. The digital encoding method could be read by the fluorescence dye reader and the system would be a non contact encoding method not requiring the conductive nano tube material.
  • In a further embodiment of the invention the binary numbers are written in infrared dye. If an infrared dye was used then the system would not require a contact reader. The digital encoding method could be read by the infrared dye reader and the system would be a non contact encoding method not requiring the conductive nano tube material.
  • In a further embodiment of the invention the bar codes are written in infrared dye. If an infrared dye was used then the system would not require a contact reader. The digital encoding method could be read by the infrared dye reader and the system would be a non contact encoding method not requiring the conductive nano tube material.
  • In a further embodiment of the invention the binary numbers are encoded using the same printing ink as the back ground ink. This creates a virtually invisible conductive code. A conductive code reader would read the digitally encoded signature and determine the values for use in the system.
  • In a further embodiment of the invention the bar codes are written in the same printing ink as the back ground ink with conductive material alloyed into the ink. This creates a virtually invisible conductive code. A conductive code reader would read the digitally encoded signature and determine the values for use in the system.
  • The encoding can also be expanded to the marking of critical documents by either printing or engraving an encoded signature to the document once it is printed with the conductive material.
  • The system can also be extended to use the conductive coating material and mix it in the formation of the document to create a conductive document. The amount of conductive material added to the base extrusion will be representative to the conductance of the document and this can be used as a marker to verify the document such as currency, retail packaging, or securities documents.
  • It is impossible to forge the information present on the invention with the conductive materials because the forger must match the resistivity of the original coating. The multiple stage identification algorithm eliminates the ability to insert identification within the code.
  • Another security issue that has not been effectively handled by existing marking technology is the grey market diversion and authentic licensed material. Grey market material is a problem in the high value consumer goods market were manufacturers distribute the products at different price points to different markets due to various pressures such as price controls in a market. Authentic licensed materials such as sports logo materials are regularly copied and the appropriate licensing fees not paid. A better way of discretely identifying the product is needed to minimize these problems.
  • In accordance with the present invention, a security marking can be used in packaging applications such as tamper proof seals or package identification to assist manufacturers in identifying their products. For example, as seen in FIG. 13 the pattern of conductive marking 9000 can be formed so as to encode information such as manufactures code 9020 and article ID 9010, lot, destination (country to be exported to), manufacturing date, or other useful information so that a manufacturer or retailer can quickly determine if the product is “grey market” or authentic. This marking is not readable to the consumer and when a transparent coating such as an ink like the Acheson Electrodag 427 or conductive films, coatings or inks such as described in U.S. patent application 2002/0143094 entitled Polymer nanocomposites and methods of preparation, Conroy, Jeffrey L.; et al.; U.S. patent application 2002/0035170 entitled Electromagnetic shielding composite comprising nano tubes Glatkowski, Paul; et al.; U.S. patent application 2002/0180077 entitled Carbon Nano Tube Fiber-Reinforced Composite Structures for EM and Lightning Strike Protection Glatkowski, Paul; et.; U.S. patent application 2003/0008123 entitled Nanocomposite dielectrics Glatkowski, Paul; et al.; U.S. patent application 20030164427 entitled ESD Coatings for Use With Spacecraft Glatkowski, Paul; et al.; and U.S. patent application 2003/0122111 entitled Coatings Comprising Carbon Nano Tubes and Methods for Forming Same Glatkowski, Paul; et al.; all included herein by reference, are used, then determining the authenticity or whether the product has been diverted from another market is easily accomplished. The nano tubes used by the aforementioned conductive materials can be selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
  • Alternatively the conductive material can be coated on thread of substrate that is used to form the logo on apparel or be incorporated in currency. The conductivity of the logo is then used by the manufacturer to determine if the apparel was made for that market or if it was diverted. The reader testing the resistance level of a portion of the coated logo or over the whole area is used to determine the authenticity and if it was diverted from another market. The conductivity can be pre-set to different amounts corresponding to various destinations (territories) and for authenticity of the item.
  • Alternatively the conductive inks or coatings can also be impregnated or printed onto the primary packaging material. The ink or coating would be formulated to provide a specific resistance so that the product could be easily identified by resistive readings of the package.
  • Alternatively the conductive inks or coatings can also be printed onto a tag and the tag sewn into a cuff or fold of the apparel or product. The conductive inks or coatings would be formulated to provide a specific resistance so that the product could be easily identified by resistive readings of the tag.
  • Alternatively the conductive material can be mixed with fluorescence or infrared dye and the code is in dye bearing material. This allows non contact reading of the card while the conductive contact reading of the conductive material verifies the card authenticity.
  • Other embodiments and uses of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. All references cited herein, including all publications, U.S. patents and patent applications including the priority document, are specifically and entirely incorporated by reference.

Claims (78)

1. An identity marking, comprising:
a patterned layer of conductive material on an object, wherein the pattern of conductive material comprises identifying indicia that can be read by a conductivity meter.
2. The identity marking as of claim 1, wherein the identity marking is disposed in a layer of translucent material applied to a security card or product label.
3. The identity marking of claim 1, wherein the conductive material comprises carbon nano tubes.
4. The identity marking of claim 3, the carbon nano tubes are less than 15 nm in diameter.
5. The identity marking of claim 3, the carbon nano tubes are less than 70 um in length.
6. The identity marking of claim 3, further comprising a polymer coating over the identity marking.
7. The identity marking of claim 1, wherein the conductive layer has conductive indicia encoded therein.
8. The identity marking of claim 7, wherein said conductive indicia comprise biometric information.
9. The identity marking of claim 7, wherein said conductive indicia comprise gaming information.
10. The identity marking of claim 7, wherein said conductive indicia comprise product information.
11. The identity marking of claim 7, wherein said conductive indicia is formed to provide a binary representation.
12. The identity marking of claim 7, wherein said conductive indicia is formed to provide a barcode representation.
13. The identity marking of claim 1, wherein said conductive indicia is formed to provide a graphical representation.
14. The identity marking of claim 1, wherein said conductive indicia is formed to provide representations of information based on the resistance reading of the conductive material.
15. The identity marking as defined in claim 7, wherein said conductive indicia is unique to a particular product.
16. The identity marking as defined in claim 13, wherein said conductive indicia is applied to the product as a traceable marking.
17. The identity marking as defined in claim 7, wherein said conductive indicia is encoded to contain information that is read by a computer peripheral and used to confirm the identity of a computer user.
18. The identity marking as defined in claim 7, wherein said conductive indicia is applied to the identification device containing a microprocessor such that the conductive indicia form a representation of identification information.
19. The identity marking as defined in claim 7, wherein said conductive indicia is applied to the identification device containing a semiconductor electronic circuit such that the conductive indicia form a representation of identification information.
20. The identity marking as defined in claim 7, wherein said conductive indicia is applied to a identification device containing a microprocessor such that the conductive indicia forms a representation of identification information.
21. The identity marking as defined in claim 19, wherein said conductive indicia is a representation of gaming information.
22. The identity marking as defined in claim 20, wherein said conductive indicia is a representation of gaming information.
23. The identity marking as defined in claim 19, wherein said conductive indicia is a representation of security information.
24. The identity marking as defined in claim 20, wherein said conductive indicia is a representation of security information.
25. An identity marking contained in the first layer of a security card, comprising: a conductive material containing at least one element of identifying indicia that can be read by conductivity and the conductive material is mixed with fluorescence dye.
26. An identity marking contained in a layer of a security card, comprising: a conductive material containing at least one element of identifying indicia that can be read by conductivity and the conductive material is mixed with infrared dye.
27. The identity marking of claim 1, comprising conductive materials containing carbon.
28. The identity marking of claim 1, comprising conductive materials containing selected from metals such as silver, copper or gold.
29. The identity marking of claim 19, where the conductive materials form identification means as well as an antenna.
30. The identity marking of claim 20, where the conductive materials form identification means as well as the antenna.
31. The identity marking of claim 1, comprising conductive materials containing metal oxide types.
32. The identity marking of claim 31, wherein the metal oxides are selected from tin-indium mixed oxide (ITO), antimony-tin mixed oxide (ATO), fluorine-doped tin oxide (FTO) or aluminum-doped zinc oxide (FZO).
33. The identity marking of claim 1, wherein said indicia comprise conductively readable information for use with a computerized workstation to provide access information to the workstation or resources.
34. The identity marking of claim 3, wherein the conductive film is formed from single and multi walled carbon nano tubes and the average outer diameter size of the carbon nano tubes is greater than 0.5 nm.
35. The identity marking of claim 34, wherein said nano tubes are selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
36. The identity marking of claim 32, wherein said nano tubes are substantially single-walled nano tubes (SWNTs).
37. The identity marking of claim 34, wherein said nano tubes are present in said film at about 0.001 to about 10% based on weight.
38. The identity marking of claim 34, wherein said nano tubes are present in said film at least about 0.5% by weight.
39. The identity marking of claim 1, wherein the film has a surface resistance of less than about 25,000 ohms/square.
40. The identity marking of claim 1, further comprising a polymeric material.
41. The identity marking of claim 34, wherein said nano tubes are selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof to form a dispersion.
42. The identity marking of claim 41, wherein the dispersion comprises a plurality of nano tubes with an outer diameter of less than 15 nm.
43. The identity marking of claim 42, wherein said nano tubes have an outer diameter of about 0.5 to 15 nm.
44. The identity marking of claim 42, wherein said nano tubes are substantially single-walled nano tubes (SWNTs).
45. The identity marking of claim 41, wherein the dispersion further comprising a polymeric material, wherein the polymeric material comprises a material selected from the group consisting of thermoplastics, thermosetting polymers, elastomers, conducting polymers and combinations thereof.
46. The identity marking of claim 41, the dispersion further comprising a polymeric material, wherein the polymeric material comprises a material selected from the group consisting of ceramic hybrid polymers, and phosphine oxides chalcogenides.
47. The identity marking of claim 41, the dispersion further comprising a plasticizer, softening agent, filler, reinforcing agent, processing aid, stabilizer, antioxidant, dispersing agent, binder, a cross-linking agent, a coloring agent, a UV absorbent agent, or a charge adjusting agent.
48. The identity marking of claim 41, the dispersion further comprising conductive organic materials, inorganic materials, or combinations or mixtures thereof.
49. The identity marking of claim 48, wherein the conductive organic materials are selected from the group consisting of buckeyballs, carbon black, fullerenes, nano tubes with an outer diameter of greater than about 0.5 nm, and combinations and mixtures thereof.
50. The identity marking of claim 49, wherein the conductive inorganic materials are selected from the group consisting of antimony tin oxide, iridium tin oxide, aluminum, antimony, beryllium, cadmium, chromium, cobalt, copper, doped metal oxides, iron, gold, lead, manganese, magnesium, mercury, metal oxides, nickel, platinum, silver, steel, titanium, zinc, and combinations and mixtures thereof.
51. The identity marking of claim 50, further comprising a conductive material selected from the group consisting of tin-indium mixed oxide, antimony-tin mixed oxide, fluorine-doped tin oxide, aluminum-doped zinc oxide and combinations and mixtures thereof.
52. The identity marking of claim 1, wherein the conductive coating is formed from single and multi walled carbon nano tubes and the average outer diameter size of the carbon nano tubes is less than 15 nm.
53. The identity marking of claim 52, wherein said nano tubes are present in said coating at about 0.001 to about 10% based on weight.
54. The identity marking of claim 52, wherein said nano tubes are present in said coating at about 0.05%.
55. A method for making conductive film specified in claim 3, comprising: providing a plurality of nano tubes with an outer diameter of less than 15 nm; and forming a film of said nano tubes on a surface of a substrate.
56. The method of claim 55, wherein the step of forming the film comprises a method selected from the group consisting of spray painting, dip coating, spin coating, knife coating, kiss coating, gravure coating, screen printing, ink jet printing, and pad printing.
57. A multi-layered structure comprising: an electrically conductive film comprising a plurality of nano tubes with an outer diameter of less than 15 nm; and a polymeric layer disposed on at least a portion of said electrically conductive film.
58. The multi-layered structure of claim 57, wherein said nano tubes are selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
59. The multi-layered structure of claim 57, wherein said nano tubes are substantially single-walled nano tubes (SWNTs).
60. The multi-layered structure of claim 57, wherein said nano tubes are present in said film at about 0.001 to about 10% based on weight.
61. The multi-layered structure of claim 57, further comprising a polymeric material, wherein the polymeric material comprises a material selected from the group consisting of thermoplastics, thermosetting polymers, elastomers, conducting polymers and combinations thereof.
62. The multi-layered structure of claim 57, further comprising a polymeric material, wherein the polymeric material comprises a material selected from the group consisting of ceramic hybrid polymers, phosphine oxides and chalcogenides.
63. The multi-layered structure of claim 57, wherein said film has a thickness between about 0.005 microns to about 0.005 inches.
64. A dispersion of nano tubes comprising a plurality of nano tubes with an outer diameter of less than 15 nm.
65. The dispersion of claim 64, wherein said nano tubes have an outer diameter of about 0.5 to 15 nm.
66. The dispersion of claim 65, wherein said nano tubes are selected from the group consisting of single-walled nano tubes (SWNTs), double-walled nano tubes (DWNTs), multi-walled nano tubes (MWNTs), and mixtures thereof.
67. The dispersion of claim 65, wherein said nano tubes are substantially single-walled nano tubes (SWNTs).
68. The dispersion of claim 65, further comprising a polymeric material, wherein the polymeric material comprises a material selected from the group consisting of thermoplastics, thermosetting polymers, elastomers, conducting polymers and combinations thereof.
69. The dispersion of claim 65, further comprising a polymeric material, wherein the polymeric material comprises a material selected from the group consisting of ceramic hybrid polymers, and phosphine oxides chalcogenides.
70. The dispersion of claim 65, wherein the conductive inorganic materials are selected from the group consisting of aluminum, antimony, beryllium, cadmium, chromium, cobalt, copper, doped metal oxides, iron, gold, lead, manganese, magnesium, mercury, metal oxides, nickel, platinum, silver, steel, titanium, zinc, and combinations and mixtures thereof.
71. The dispersion of claim 65, further comprising a conductive material selected from the group consisting of tin-indium mixed oxide, antimony-tin mixed oxide, fluorine-doped tin oxide, aluminum-doped zinc oxide and combinations and mixtures thereof.
72. The dispersion of claim 65, further comprising conductors, fluids, gelatins, ionic compounds, semiconductors, solids, surfactants, or combinations or mixtures thereof.
73. The identity marking of claim 1, wherein the conductive coating is formed with conductive film or ink and a non conductive upper layer placed on top of the conductive layer which is selectively relived to allow access to the conductive layer below thereby providing a non conductive and conductive encoding means.
74. An identity marking contained in a layer of a security marking, comprising:
a conductive material containing at least one element of identifying indicia that can be read by conductivity.
75. An identity marking of claim 74, wherein said first layer is a non conductive layer.
76. The identity marking of claim 1, wherein the conductive coating formed with carbon nano tubes and other conductive materials.
77. The identity marking of claim 1 were the conductive layer is a plastics film.
78. The identity marking of claim 1 were the conductive layer is a coating wherein the conductive inorganic materials are selected from the group consisting of aluminum, antimony, beryllium, cadmium, chromium, cobalt, copper, doped metal oxides, iron, gold, lead, manganese, magnesium, mercury, metal oxides, nickel, platinum, silver, steel, titanium, zinc, tin-indium mixed oxide, antimony-tin mixed oxide, fluorine-doped tin oxide, aluminum-doped zinc oxide and further comprising conductors, fluids, gelatins, ionic compounds, semiconductors, solids, surfactants, or combinations or mixtures thereof.
US11/029,270 2004-01-15 2005-01-05 Security marking and security mark Abandoned US20050156318A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/029,270 US20050156318A1 (en) 2004-01-15 2005-01-05 Security marking and security mark
US12/006,940 US7513437B2 (en) 2004-01-15 2008-01-07 Security marking and security mark

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US53677504P 2004-01-15 2004-01-15
US11/029,270 US20050156318A1 (en) 2004-01-15 2005-01-05 Security marking and security mark

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/006,940 Continuation US7513437B2 (en) 2004-01-15 2008-01-07 Security marking and security mark

Publications (1)

Publication Number Publication Date
US20050156318A1 true US20050156318A1 (en) 2005-07-21

Family

ID=34752464

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/029,270 Abandoned US20050156318A1 (en) 2004-01-15 2005-01-05 Security marking and security mark
US12/006,940 Expired - Fee Related US7513437B2 (en) 2004-01-15 2008-01-07 Security marking and security mark

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/006,940 Expired - Fee Related US7513437B2 (en) 2004-01-15 2008-01-07 Security marking and security mark

Country Status (1)

Country Link
US (2) US20050156318A1 (en)

Cited By (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040005920A1 (en) * 2002-02-05 2004-01-08 Mindplay Llc Method, apparatus, and article for reading identifying information from, for example, stacks of chips
US20040217178A1 (en) * 2003-01-03 2004-11-04 Ellen Lasch Metal-containing transaction card and method of making the same
US20060102729A1 (en) * 2003-01-03 2006-05-18 Priscilla Gandel Metal-containing transaction card and method of making the same
US20060178637A1 (en) * 2000-08-10 2006-08-10 Michael Eilersen Support for a cartridge for transferring an electronically readable item of information from the cartridge to an electronic circuit
US20060205519A1 (en) * 2005-02-10 2006-09-14 Bally Gaming International, Inc. Systems and methods for processing playing cards collected from a gaming table
US20060243804A1 (en) * 2003-10-03 2006-11-02 Novo Nordisk A/S Container comprising code information elements
US20060244448A1 (en) * 2005-04-15 2006-11-02 Cornell Research Foundation, Inc. High-pass two-dimensional ladder network resonator
US20070005367A1 (en) * 2005-06-29 2007-01-04 Microsoft Corporation Radio frequency certificates of authenticity
DE102005047609A1 (en) * 2005-10-05 2007-04-12 Giesecke & Devrient Gmbh Assurance of authenticity of value documents by means of feature substances
US20070087795A1 (en) * 2005-09-30 2007-04-19 Impressive Impressions, Inc. Collectable fingerprinted apparatus and methods
US20070159400A1 (en) * 2006-01-11 2007-07-12 Microsoft Corporation Radio Frequency Certificates of Authenticity and Related Scanners
US20080076536A1 (en) * 2006-09-26 2008-03-27 Bally Gaming, Inc. Resonant gaming chip identification system and method
US20080081686A1 (en) * 2006-09-28 2008-04-03 Irwin Kenneth E Jr Electronic gaming devices
US20080084024A1 (en) * 2006-08-29 2008-04-10 Scientific Games Royalty Corporation Game apparatus
US20080137153A1 (en) * 2006-12-05 2008-06-12 Canon Kabushiki Kaisha Image processing apparatus and method
US20080189066A1 (en) * 2006-11-15 2008-08-07 Par Acquisitions, Llc Raman spectrometry authentication
US20080250483A1 (en) * 2005-10-26 2008-10-09 Hang Kyung Lee Method and System for Authenticating Products Using Serial Numbers and Passwords Over Communication Network
US20080292979A1 (en) * 2007-05-22 2008-11-27 Zhe Ding Transparent conductive materials and coatings, methods of production and uses thereof
US20090056589A1 (en) * 2007-08-29 2009-03-05 Honeywell International, Inc. Transparent conductors having stretched transparent conductive coatings and methods for fabricating the same
US20090088701A1 (en) * 2006-03-20 2009-04-02 Novo Nordisk A/S Contact Free Reading of Cartridge Identification Codes
US20090096467A1 (en) * 2006-04-26 2009-04-16 Novo Nordisk A/S Contact Free Absolute Position Determination of a Moving Element in a Medication Delivery Device
US20090166055A1 (en) * 2007-12-27 2009-07-02 Honeywell International, Inc. Transparent conductors and methods for fabricating transparent conductors
US20090188697A1 (en) * 2008-01-28 2009-07-30 Honeywell International, Inc. Transparent conductors and methods for fabricating transparent conductors
US20090189124A1 (en) * 2008-01-28 2009-07-30 Honeywell International, Inc. Transparent conductors and methods for fabricating transparent conductors
US20090242246A1 (en) * 2008-04-01 2009-10-01 Fukui Precision Component (Shenzhen) Co., Ltd. Printed circuit board and method for manufacturing same
US7614545B2 (en) * 2003-03-24 2009-11-10 Novo Nordisk A/S Electronic marking of a medication cartridge
WO2009142656A1 (en) * 2008-05-22 2009-11-26 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US20090294300A1 (en) * 2006-11-13 2009-12-03 Kc Energy, Llc Rf systems and methods for processing salt water
US20100012735A1 (en) * 2000-08-10 2010-01-21 Novo Nordisk A/S Support for a Cartridge for Transferring an Electronically Readable Item of Information from the Cartridge to an Electronic Circuit
US7686681B2 (en) 2001-06-08 2010-03-30 Igt Systems, methods and articles to facilitate playing card games with selectable odds
US20100106100A1 (en) * 2007-03-21 2010-04-29 Novo Nordisk A/S Medical delivery system having container recognition and container for use with the medical delivery system
US20100119789A1 (en) * 2005-04-06 2010-05-13 Grande William J Advanced conductive ink
US7736236B2 (en) 2003-11-07 2010-06-15 Bally Gaming International, Inc. Method, apparatus and article for evaluating card games, such as blackjack
US7753779B2 (en) 2006-06-16 2010-07-13 Bally Gaming, Inc. Gaming chip communication system and method
US20100194537A1 (en) * 2007-06-09 2010-08-05 Novo Nordisk A/S Contact free reading of reservoir identification codes
US20100216543A1 (en) * 2009-02-26 2010-08-26 Video Gaming Technologies, Inc. Gaming machine and method for validating a voucher
US20110019818A1 (en) * 2009-07-23 2011-01-27 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. System for locking electronic device and method thereof
AU2007290538B2 (en) * 2006-08-29 2011-09-22 Scientific Games Holdings Limited Game apparatus
US8033457B2 (en) 2003-01-03 2011-10-11 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US8038153B2 (en) 2006-05-23 2011-10-18 Bally Gaming, Inc. Systems, methods and articles to facilitate playing card games
US8052519B2 (en) 2006-06-08 2011-11-08 Bally Gaming, Inc. Systems, methods and articles to facilitate lockout of selectable odds/advantage in playing card games
US8100753B2 (en) 2006-05-23 2012-01-24 Bally Gaming, Inc. Systems, methods and articles to facilitate playing card games with selectable odds
US8192277B2 (en) 2006-08-17 2012-06-05 Bally Gaming, Inc. Systems, methods and articles to enhance play at gaming tables with bonuses
US8197449B2 (en) 2005-05-10 2012-06-12 Novo Nordisk A/S Injection device comprising an optical sensor
US8229821B2 (en) 1996-05-13 2012-07-24 Cummins-Allison Corp. Self-service currency exchange machine
US8251808B2 (en) 2008-04-30 2012-08-28 Bally Gaming, Inc. Game transaction module interface to single port printer
US8272945B2 (en) 2007-11-02 2012-09-25 Bally Gaming, Inc. Game related systems, methods, and articles that combine virtual and physical elements
US8366542B2 (en) 2008-05-24 2013-02-05 Bally Gaming, Inc. Networked gaming system with enterprise accounting methods and apparatus
US8393455B2 (en) 2003-03-12 2013-03-12 Cummins-Allison Corp. Coin processing device having a moveable coin receptacle station
US8485907B2 (en) 2003-09-05 2013-07-16 Bally Gaming, Inc. Systems, methods, and devices for monitoring card games, such as Baccarat
US8523641B2 (en) 2004-09-15 2013-09-03 Cummins-Allison Corp. System, method and apparatus for automatically filling a coin cassette
US8545295B2 (en) 2010-12-17 2013-10-01 Cummins-Allison Corp. Coin processing systems, methods and devices
US8550464B2 (en) 2005-09-12 2013-10-08 Bally Gaming, Inc. Systems, methods and articles to facilitate playing card games with selectable odds
US8559694B2 (en) 2005-10-05 2013-10-15 Cummins-Allison Corp. Currency processing system with fitness detection
WO2013166965A1 (en) * 2012-05-09 2013-11-14 Chun Au Decoder, coupling card reader and application system and method for the same
US8597107B2 (en) 2007-12-28 2013-12-03 Bally Gaming, Inc. Systems, methods, and devices for providing purchases of instances of game play at a hybrid ticket/currency game machine
US8602200B2 (en) 2005-02-10 2013-12-10 Cummins-Allison Corp. Method and apparatus for varying coin-processing machine receptacle limits
USRE44689E1 (en) 2002-03-11 2014-01-07 Cummins-Allison Corp. Optical coin discrimination sensor and coin processing system using the same
US8638108B2 (en) 2005-09-22 2014-01-28 Novo Nordisk A/S Device and method for contact free absolute position determination
US8684160B2 (en) 2000-04-28 2014-04-01 Cummins-Allison Corp. System and method for processing coins
US20140312248A1 (en) * 2013-04-23 2014-10-23 Lockheed Martin Corporation Articles containing non-visible identifying marks formed from nanomaterials and methods utilizing the same
US8959029B2 (en) 2006-03-23 2015-02-17 Cummins-Allison Corp System, apparatus, and methods for currency processing control and redemption
US8994382B2 (en) 2006-04-12 2015-03-31 Novo Nordisk A/S Absolute position determination of movably mounted member in medication delivery device
US9005034B2 (en) 2008-04-30 2015-04-14 Bally Gaming, Inc. Systems and methods for out-of-band gaming machine management
US20150120574A1 (en) * 2013-10-30 2015-04-30 Tencent Technology (Shenzhen) Company Limited Information transmission method, apparatus and system
US9092924B1 (en) 2012-08-31 2015-07-28 Cummins-Allison Corp. Disk-type coin processing unit with angled sorting head
US9186465B2 (en) 2008-11-06 2015-11-17 Novo Nordisk A/S Electronically assisted drug delivery device
EP2948316A1 (en) * 2013-01-23 2015-12-02 Fraunhofer Gesellschaft zur Förderung der angewandten Forschung e.V. Marking composition
WO2015191232A1 (en) * 2014-06-11 2015-12-17 Carestream Health, Inc. Method of producing a revealable invisible pattern in a transparent conductive film
US9360589B1 (en) 2013-04-23 2016-06-07 Lockheed Martin Corporation Articles containing non-visible identifying marks formed from carbon nanomaterials and methods utilizing the same
US9430893B1 (en) 2014-08-06 2016-08-30 Cummins-Allison Corp. Systems, methods and devices for managing rejected coins during coin processing
WO2016133601A3 (en) * 2015-01-09 2016-11-03 Sri International Unclonable rfid chip and method
US9501885B1 (en) 2014-07-09 2016-11-22 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing near-normal and high-angle of incidence lighting
US9508208B1 (en) 2014-07-25 2016-11-29 Cummins Allison Corp. Systems, methods and devices for processing coins with linear array of coin imaging sensors
US9563898B2 (en) 2008-04-30 2017-02-07 Bally Gaming, Inc. System and method for automated customer account creation and management
EP3151168A1 (en) * 2015-09-30 2017-04-05 Nawrocki, Piotr Security feature against forgery, in particular for high-value products, product authentication method and product authentication system
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
CN107358446A (en) * 2017-03-06 2017-11-17 郑州新华方数字信息有限公司 A kind of anti-fake certificate management method and device
US20180018846A1 (en) * 2015-01-27 2018-01-18 Quantum Base Limited Improvements relating to the authentication of physical entities
US9875593B1 (en) 2015-08-07 2018-01-23 Cummins-Allison Corp. Systems, methods and devices for coin processing and coin recycling
US9916713B1 (en) 2014-07-09 2018-03-13 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing normal or near-normal and/or high-angle of incidence lighting
US9934640B2 (en) 2004-09-15 2018-04-03 Cummins-Allison Corp. System, method and apparatus for repurposing currency
US9950117B2 (en) 2009-02-13 2018-04-24 Novo Nordisk A/S Medical device and cartridge
EP3191997A4 (en) * 2014-09-08 2018-08-01 Snowshoefood Inc. Systems and methods for hybrid hardware authentication
US10089812B1 (en) 2014-11-11 2018-10-02 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing a multi-material coin sorting disk
CN109081329A (en) * 2018-09-29 2018-12-25 中国科学院苏州纳米技术与纳米仿生研究所 A kind of separation method and system of carbon nanotube and polymer
US10181234B2 (en) 2016-10-18 2019-01-15 Cummins-Allison Corp. Coin sorting head and coin processing system using the same
US10217114B1 (en) * 2018-08-27 2019-02-26 Ennoventure, Inc. Methods and systems for providing labels to prevent counterfeiting of products
US10607125B2 (en) 2015-02-06 2020-03-31 American Express Travel Related Services Company, Inc. Method of making ceramic-containing transaction cards
US10679449B2 (en) 2016-10-18 2020-06-09 Cummins-Allison Corp. Coin sorting head and coin processing system using the same
US10685523B1 (en) 2014-07-09 2020-06-16 Cummins-Allison Corp. Systems, methods and devices for processing batches of coins utilizing coin imaging sensor assemblies
DE102019127948A1 (en) * 2019-10-16 2021-04-22 Bundesrepublik Deutschland, vertreten durch den Bundesminister für Wirtschaft und Energie, dieser vertreten durch den Präsidenten der Bundesanstalt für Materialforschung und –prüfung (BAM) Method for checking the identity of a product and a product with a verification section
US20210174378A1 (en) * 2019-12-09 2021-06-10 Nike, Inc. Digital fingerprinting
US11275109B2 (en) 2017-03-07 2022-03-15 Sri International Apparatus, system, and method for an integrated circuit
US11288683B2 (en) * 2014-11-06 2022-03-29 Altria Client Services Llc Methods and products for product tracing and authentication using conductive inks
US11362431B1 (en) * 2015-06-16 2022-06-14 Oceanit Laboratories, Inc. Optically transparent radar absorbing material (RAM)
US11443581B2 (en) 2019-01-04 2022-09-13 Cummins-Allison Corp. Coin pad for coin processing system
US11580344B2 (en) 2015-01-09 2023-02-14 Sri International Authentication apparatus, system and methods using unclonable identifiers
US11688638B2 (en) 2017-03-28 2023-06-27 Sri International Production of very small or thin dies

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6676127B2 (en) 1997-03-13 2004-01-13 Shuffle Master, Inc. Collating and sorting apparatus
US6254096B1 (en) 1998-04-15 2001-07-03 Shuffle Master, Inc. Device and method for continuously shuffling cards
US6655684B2 (en) 1998-04-15 2003-12-02 Shuffle Master, Inc. Device and method for forming and delivering hands from randomly arranged decks of playing cards
US8590896B2 (en) 2000-04-12 2013-11-26 Shuffle Master Gmbh & Co Kg Card-handling devices and systems
US7677565B2 (en) 2001-09-28 2010-03-16 Shuffle Master, Inc Card shuffler with card rank and value reading capability
US8616552B2 (en) 2001-09-28 2013-12-31 Shfl Entertainment, Inc. Methods and apparatuses for an automatic card handling device and communication networks including same
US7753373B2 (en) 2001-09-28 2010-07-13 Shuffle Master, Inc. Multiple mode card shuffler and card reading device
US8337296B2 (en) 2001-09-28 2012-12-25 SHFL entertaiment, Inc. Method and apparatus for using upstream communication in a card shuffler
US8011661B2 (en) 2001-09-28 2011-09-06 Shuffle Master, Inc. Shuffler with shuffling completion indicator
US6886829B2 (en) 2002-02-08 2005-05-03 Vendingdata Corporation Image capturing card shuffler
US20060066048A1 (en) 2004-09-14 2006-03-30 Shuffle Master, Inc. Magnetic jam detection in a card shuffler
US7764836B2 (en) 2005-06-13 2010-07-27 Shuffle Master, Inc. Card shuffler with card rank and value reading capability using CMOS sensor
US7556266B2 (en) 2006-03-24 2009-07-07 Shuffle Master Gmbh & Co Kg Card shuffler with gravity feed system for playing cards
US8579289B2 (en) 2006-05-31 2013-11-12 Shfl Entertainment, Inc. Automatic system and methods for accurate card handling
US8353513B2 (en) 2006-05-31 2013-01-15 Shfl Entertainment, Inc. Card weight for gravity feed input for playing card shuffler
US8342525B2 (en) 2006-07-05 2013-01-01 Shfl Entertainment, Inc. Card shuffler with adjacent card infeed and card output compartments
US8070574B2 (en) 2007-06-06 2011-12-06 Shuffle Master, Inc. Apparatus, system, method, and computer-readable medium for casino card handling with multiple hand recall feature
DE102006036286A1 (en) * 2006-08-03 2008-02-14 Giesecke & Devrient Gmbh Safety elements for antennas
WO2008048781A1 (en) * 2006-10-13 2008-04-24 Datacard Corporation In-line gift card personalization and packaging process
US8919775B2 (en) 2006-11-10 2014-12-30 Bally Gaming, Inc. System for billing usage of an automatic card handling device
DE102008012426A1 (en) * 2007-10-31 2009-05-07 Bundesdruckerei Gmbh Document-production method for producing a security inserts imaging information/data into layers of a document to form a total security image
US8326212B2 (en) * 2007-11-07 2012-12-04 The Nielsen Company (Us), Llc Methods and apparatus to collect media exposure information
US8061619B2 (en) * 2007-12-19 2011-11-22 Target Brands, Inc. Transaction card with edge-glow characteristic
MD3956C2 (en) * 2008-05-08 2010-04-30 Владимир ШКИЛЁВ Device for plasma manufacture of the identification nanotag
MD3963C2 (en) * 2008-05-08 2010-04-30 Владимир ШКИЛЁВ Method for applying the fixed identification nanotag
US8967621B2 (en) 2009-04-07 2015-03-03 Bally Gaming, Inc. Card shuffling apparatuses and related methods
US7988152B2 (en) 2009-04-07 2011-08-02 Shuffle Master, Inc. Playing card shuffler
WO2011046769A1 (en) 2009-10-14 2011-04-21 Lockheed Martin Corporation Protective circuit board cover
US8556173B1 (en) * 2010-03-17 2013-10-15 The United States Of America As Represented By The Secretary Of The Navy Apparatus and system for navigating in GPS denied environments
EP2432074A1 (en) * 2010-09-21 2012-03-21 Printechnologics GmbH Component with at least one UHF dipole aerial
US8947889B2 (en) 2010-10-14 2015-02-03 Lockheed Martin Corporation Conformal electromagnetic (EM) detector
US8800993B2 (en) 2010-10-14 2014-08-12 Shuffle Master Gmbh & Co Kg Card handling systems, devices for use in card handling systems and related methods
US9731190B2 (en) 2011-07-29 2017-08-15 Bally Gaming, Inc. Method and apparatus for shuffling and handling cards
US8485527B2 (en) 2011-07-29 2013-07-16 Savant Shuffler LLC Card shuffler
US8960674B2 (en) 2012-07-27 2015-02-24 Bally Gaming, Inc. Batch card shuffling apparatuses including multi-card storage compartments, and related methods
US8955746B2 (en) 2012-09-27 2015-02-17 Intel Corporation Providing a locking technique for electronic displays
US9511274B2 (en) 2012-09-28 2016-12-06 Bally Gaming Inc. Methods for automatically generating a card deck library and master images for a deck of cards, and a related card processing apparatus
US9378766B2 (en) 2012-09-28 2016-06-28 Bally Gaming, Inc. Card recognition system, card handling device, and method for tuning a card handling device
US20150356326A1 (en) * 2012-12-27 2015-12-10 Touchpac Holdings, Llc Method for capacitively identifying a container which comprises an electrically conductive material
US9104933B2 (en) * 2013-01-29 2015-08-11 Honeywell International Inc. Covert bar code pattern design and decoding
US20150069133A1 (en) * 2013-09-09 2015-03-12 Zhengfang Qian Nanotube patterns for chipless rfid tags and methods of making the same
CN106457036B (en) 2014-04-11 2019-11-22 巴利游戏公司 Method and apparatus for shuffling and handling board
US9474957B2 (en) 2014-05-15 2016-10-25 Bally Gaming, Inc. Playing card handling devices, systems, and methods for verifying sets of cards
USD764599S1 (en) 2014-08-01 2016-08-23 Bally Gaming, Inc. Card shuffler device
US9566501B2 (en) 2014-08-01 2017-02-14 Bally Gaming, Inc. Hand-forming card shuffling apparatuses including multi-card storage compartments, and related methods
US9504905B2 (en) 2014-09-19 2016-11-29 Bally Gaming, Inc. Card shuffling device and calibration method
JP6842823B2 (en) * 2015-06-22 2021-03-17 Koa株式会社 Current detection resistor
US9993719B2 (en) 2015-12-04 2018-06-12 Shuffle Master Gmbh & Co Kg Card handling devices and related assemblies and components
US10339765B2 (en) 2016-09-26 2019-07-02 Shuffle Master Gmbh & Co Kg Devices, systems, and related methods for real-time monitoring and display of related data for casino gaming devices
US10933300B2 (en) 2016-09-26 2021-03-02 Shuffle Master Gmbh & Co Kg Card handling devices and related assemblies and components
US11376489B2 (en) 2018-09-14 2022-07-05 Sg Gaming, Inc. Card-handling devices and related methods, assemblies, and components
US11896891B2 (en) 2018-09-14 2024-02-13 Sg Gaming, Inc. Card-handling devices and related methods, assemblies, and components
US11338194B2 (en) 2018-09-28 2022-05-24 Sg Gaming, Inc. Automatic card shufflers and related methods of automatic jam recovery
US11898837B2 (en) 2019-09-10 2024-02-13 Shuffle Master Gmbh & Co Kg Card-handling devices with defect detection and related methods
US11173383B2 (en) 2019-10-07 2021-11-16 Sg Gaming, Inc. Card-handling devices and related methods, assemblies, and components

Citations (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4298217A (en) * 1978-09-06 1981-11-03 Hoechst Aktiengesellschaft Identity card
US4313984A (en) * 1978-12-30 1982-02-02 Hoechst Aktiengesellschaft Laminated identity card having separation-resistant laminae and method of manufacturing same
US4324421A (en) * 1978-12-30 1982-04-13 Hoechst Aktiengesellschaft Identity card with incorporated fibrids
US4450024A (en) * 1980-08-07 1984-05-22 Gao Gesellschaft Fur Automation Und Organisation Mbh Identification card with an IC-module and method for producing it
US4560426A (en) * 1978-12-14 1985-12-24 Hoechst Aktiengesellschaft Process for the manufacture of identity cards
US4782221A (en) * 1985-04-01 1988-11-01 Cauzin Systems, Incorporated Printed data strip including bit-encoded information and scanner control
US4783823A (en) * 1985-09-16 1988-11-08 Omron Tateisi Electronics, Co. Card identifying method and apparatus
US4947442A (en) * 1988-05-24 1990-08-07 Nec Corporation Method and apparatus for matching fingerprints
US5159181A (en) * 1989-10-07 1992-10-27 KG Catts Gesellschaft fur Erkunnungs- & Sicherheits Tecnologie mbH & Co. Capacitive code reader with interelectrode shielding
US5169155A (en) * 1990-03-29 1992-12-08 Technical Systems Corp. Coded playing cards and other standardized documents
US5471039A (en) * 1994-06-22 1995-11-28 Panda Eng. Inc. Electronic validation machine for documents
US5508684A (en) * 1995-03-02 1996-04-16 Becker; Richard S. Article tag
US5522623A (en) * 1990-03-29 1996-06-04 Technical Systems Corp. Coded identification card and other standardized documents
US5592408A (en) * 1994-01-03 1997-01-07 Security People, Inc. Identification card and access control device
US5631039A (en) * 1994-08-04 1997-05-20 Portals Limited Security thread, a film and a method of manufacture of a security thread
US5651615A (en) * 1995-02-08 1997-07-29 Plasto, Sa Security label
US6010771A (en) * 1995-10-07 2000-01-04 Bemis Company Inc. Electrical circuit component formed of a conductive liquid printed directly onto a substrate
US6203069B1 (en) * 1998-11-18 2001-03-20 Dna Technologies Inc. Label having an invisible bar code applied thereon
US6241289B1 (en) * 1997-10-24 2001-06-05 Beiersdorf Ag Laser labels and their use
US6309724B1 (en) * 1997-10-24 2001-10-30 Beiersdorf Ag Laser labels and their use
US20010035822A1 (en) * 1999-06-08 2001-11-01 Seidel Stuart T. Anti-theft tack device
US20020035170A1 (en) * 1999-02-12 2002-03-21 Paul Glatkowski Electromagnetic shielding composite comprising nanotubes
US20020041372A1 (en) * 1999-12-10 2002-04-11 Gardner Norman A. Latent inkjet formulation and method
US20020063156A1 (en) * 2000-11-29 2002-05-30 Xerox Corporation Microwave barcode reader using dipole antenna
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US20020143094A1 (en) * 2001-04-02 2002-10-03 Conroy Jeffrey L. Polymer nanocomposites and methods of preparation
US6460848B1 (en) * 1999-04-21 2002-10-08 Mindplay Llc Method and apparatus for monitoring casinos and gaming
US20020170966A1 (en) * 1995-07-27 2002-11-21 Hannigan Brett T. Identification document including embedded data
US20020180077A1 (en) * 2001-03-26 2002-12-05 Glatkowski Paul J. Carbon nanotube fiber-reinforced composite structures for EM and lightning strike protection
US20030008123A1 (en) * 2001-06-08 2003-01-09 Glatkowski Paul J. Nanocomposite dielectrics
US20030031861A1 (en) * 2001-08-11 2003-02-13 Sven Reiter Label with enhanced anticounterfeiting security
US6547151B1 (en) * 1997-09-23 2003-04-15 Stmicroelectronics S.R.L. Currency note comprising an integrated circuit
US6560741B1 (en) * 1999-02-24 2003-05-06 Datastrip (Iom) Limited Two-dimensional printed code for storing biometric information and integrated off-line apparatus for reading same
US6572015B1 (en) * 2001-07-02 2003-06-03 Bellsouth Intellectual Property Corporation Smart card authorization system, apparatus and method
US20030122111A1 (en) * 2001-03-26 2003-07-03 Glatkowski Paul J. Coatings comprising carbon nanotubes and methods for forming same
US6610351B2 (en) * 2000-04-12 2003-08-26 Quantag Systems, Inc. Raman-active taggants and their recognition
US20030164427A1 (en) * 2001-09-18 2003-09-04 Glatkowski Paul J. ESD coatings for use with spacecraft
US6636620B1 (en) * 1997-11-28 2003-10-21 Nec Corporation Personal identification authenticating with fingerprint identification
US20030197458A1 (en) * 2002-04-19 2003-10-23 Mitsubishi Pencil Co., Ltd. Electrode for electron gun and electron gun using same
US6652379B2 (en) * 2001-01-04 2003-11-25 Mindplay Llc Method, apparatus and article for verifying card games, such as blackjack
US6655719B1 (en) * 1998-02-05 2003-12-02 Yoram Curiel Methods of creating a tamper resistant informational article
US20040026921A1 (en) * 2002-03-14 2004-02-12 Tesa Aktiengesellschaft Label for concealing information
US20040099438A1 (en) * 2002-05-21 2004-05-27 Arthur David J. Method for patterning carbon nanotube coating and carbon nanotube wiring
US20040101676A1 (en) * 2000-01-21 2004-05-27 Phillips Roger W. Optically variable security devices
US6744367B1 (en) * 1999-05-22 2004-06-01 Marconi Data Systems Limited Identification tag
US6753830B2 (en) * 1998-09-11 2004-06-22 Visible Tech-Knowledgy, Inc. Smart electronic label employing electronic ink
US6776337B2 (en) * 1994-06-22 2004-08-17 Panda Eng. Inc. Electronic verification machine for documents
US20040213963A1 (en) * 2003-04-28 2004-10-28 Eastman Kodak Company Terminated conductive patterned sheet utilizing conductive conduits
US20040245343A1 (en) * 2001-10-08 2004-12-09 Georg Depta Printed, machine-readable code, document provided with a code of this type and a method for producing said code and document
US20040247832A1 (en) * 2001-11-26 2004-12-09 Arne Koops Label with improved anti-forgery security

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2163943B2 (en) 1970-12-25 1975-09-25 Canon K.K., Tokio Personal identification card
AT311702B (en) 1972-03-16 1973-11-26 Internat Security Systems S A Identification card
US5259907A (en) * 1990-03-29 1993-11-09 Technical Systems Corp. Method of making coded playing cards having machine-readable coding
CA2199955A1 (en) * 1995-10-05 1997-04-06 Atsushi Ogawa Fingerprint registering method and fingerprint checking device
US5722893A (en) * 1995-10-17 1998-03-03 Smart Shoes, Inc. Card dispensing shoe with scanner
US6217447B1 (en) * 1997-01-31 2001-04-17 Dp Stud, Inc. Method and system for generating displays in relation to the play of baccarat
US6042150A (en) * 1998-08-13 2000-03-28 Daley; Christopher B. Playing cards security system
ES2388778T3 (en) * 2001-02-15 2012-10-18 Angel Playing Cards Co., Ltd. Device and method for inspecting cards and cards used therein

Patent Citations (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4298217A (en) * 1978-09-06 1981-11-03 Hoechst Aktiengesellschaft Identity card
US4560426A (en) * 1978-12-14 1985-12-24 Hoechst Aktiengesellschaft Process for the manufacture of identity cards
US4313984A (en) * 1978-12-30 1982-02-02 Hoechst Aktiengesellschaft Laminated identity card having separation-resistant laminae and method of manufacturing same
US4324421A (en) * 1978-12-30 1982-04-13 Hoechst Aktiengesellschaft Identity card with incorporated fibrids
US4450024A (en) * 1980-08-07 1984-05-22 Gao Gesellschaft Fur Automation Und Organisation Mbh Identification card with an IC-module and method for producing it
US4782221A (en) * 1985-04-01 1988-11-01 Cauzin Systems, Incorporated Printed data strip including bit-encoded information and scanner control
US4783823A (en) * 1985-09-16 1988-11-08 Omron Tateisi Electronics, Co. Card identifying method and apparatus
US4947442A (en) * 1988-05-24 1990-08-07 Nec Corporation Method and apparatus for matching fingerprints
US5159181A (en) * 1989-10-07 1992-10-27 KG Catts Gesellschaft fur Erkunnungs- & Sicherheits Tecnologie mbH & Co. Capacitive code reader with interelectrode shielding
US5169155A (en) * 1990-03-29 1992-12-08 Technical Systems Corp. Coded playing cards and other standardized documents
US5522623A (en) * 1990-03-29 1996-06-04 Technical Systems Corp. Coded identification card and other standardized documents
US5592408A (en) * 1994-01-03 1997-01-07 Security People, Inc. Identification card and access control device
US5471039A (en) * 1994-06-22 1995-11-28 Panda Eng. Inc. Electronic validation machine for documents
US6776337B2 (en) * 1994-06-22 2004-08-17 Panda Eng. Inc. Electronic verification machine for documents
US5631039A (en) * 1994-08-04 1997-05-20 Portals Limited Security thread, a film and a method of manufacture of a security thread
US5651615A (en) * 1995-02-08 1997-07-29 Plasto, Sa Security label
US5508684A (en) * 1995-03-02 1996-04-16 Becker; Richard S. Article tag
US20020170966A1 (en) * 1995-07-27 2002-11-21 Hannigan Brett T. Identification document including embedded data
US6010771A (en) * 1995-10-07 2000-01-04 Bemis Company Inc. Electrical circuit component formed of a conductive liquid printed directly onto a substrate
US6547151B1 (en) * 1997-09-23 2003-04-15 Stmicroelectronics S.R.L. Currency note comprising an integrated circuit
US6309724B1 (en) * 1997-10-24 2001-10-30 Beiersdorf Ag Laser labels and their use
US6241289B1 (en) * 1997-10-24 2001-06-05 Beiersdorf Ag Laser labels and their use
US6636620B1 (en) * 1997-11-28 2003-10-21 Nec Corporation Personal identification authenticating with fingerprint identification
US6655719B1 (en) * 1998-02-05 2003-12-02 Yoram Curiel Methods of creating a tamper resistant informational article
US6753830B2 (en) * 1998-09-11 2004-06-22 Visible Tech-Knowledgy, Inc. Smart electronic label employing electronic ink
US6203069B1 (en) * 1998-11-18 2001-03-20 Dna Technologies Inc. Label having an invisible bar code applied thereon
US20020035170A1 (en) * 1999-02-12 2002-03-21 Paul Glatkowski Electromagnetic shielding composite comprising nanotubes
US6560741B1 (en) * 1999-02-24 2003-05-06 Datastrip (Iom) Limited Two-dimensional printed code for storing biometric information and integrated off-line apparatus for reading same
US6517435B2 (en) * 1999-04-21 2003-02-11 Mindplay Llc Method and apparatus for monitoring casinos and gaming
US6460848B1 (en) * 1999-04-21 2002-10-08 Mindplay Llc Method and apparatus for monitoring casinos and gaming
US6744367B1 (en) * 1999-05-22 2004-06-01 Marconi Data Systems Limited Identification tag
US20010035822A1 (en) * 1999-06-08 2001-11-01 Seidel Stuart T. Anti-theft tack device
US20020041372A1 (en) * 1999-12-10 2002-04-11 Gardner Norman A. Latent inkjet formulation and method
US20040101676A1 (en) * 2000-01-21 2004-05-27 Phillips Roger W. Optically variable security devices
US6610351B2 (en) * 2000-04-12 2003-08-26 Quantag Systems, Inc. Raman-active taggants and their recognition
US20020063156A1 (en) * 2000-11-29 2002-05-30 Xerox Corporation Microwave barcode reader using dipole antenna
US6652379B2 (en) * 2001-01-04 2003-11-25 Mindplay Llc Method, apparatus and article for verifying card games, such as blackjack
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US20030122111A1 (en) * 2001-03-26 2003-07-03 Glatkowski Paul J. Coatings comprising carbon nanotubes and methods for forming same
US20020180077A1 (en) * 2001-03-26 2002-12-05 Glatkowski Paul J. Carbon nanotube fiber-reinforced composite structures for EM and lightning strike protection
US20020143094A1 (en) * 2001-04-02 2002-10-03 Conroy Jeffrey L. Polymer nanocomposites and methods of preparation
US20030008123A1 (en) * 2001-06-08 2003-01-09 Glatkowski Paul J. Nanocomposite dielectrics
US6572015B1 (en) * 2001-07-02 2003-06-03 Bellsouth Intellectual Property Corporation Smart card authorization system, apparatus and method
US20030031861A1 (en) * 2001-08-11 2003-02-13 Sven Reiter Label with enhanced anticounterfeiting security
US20030164427A1 (en) * 2001-09-18 2003-09-04 Glatkowski Paul J. ESD coatings for use with spacecraft
US20040245343A1 (en) * 2001-10-08 2004-12-09 Georg Depta Printed, machine-readable code, document provided with a code of this type and a method for producing said code and document
US20040247832A1 (en) * 2001-11-26 2004-12-09 Arne Koops Label with improved anti-forgery security
US20040026921A1 (en) * 2002-03-14 2004-02-12 Tesa Aktiengesellschaft Label for concealing information
US20030197458A1 (en) * 2002-04-19 2003-10-23 Mitsubishi Pencil Co., Ltd. Electrode for electron gun and electron gun using same
US20040099438A1 (en) * 2002-05-21 2004-05-27 Arthur David J. Method for patterning carbon nanotube coating and carbon nanotube wiring
US20040213963A1 (en) * 2003-04-28 2004-10-28 Eastman Kodak Company Terminated conductive patterned sheet utilizing conductive conduits

Cited By (170)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8229821B2 (en) 1996-05-13 2012-07-24 Cummins-Allison Corp. Self-service currency exchange machine
US8701857B2 (en) 2000-02-11 2014-04-22 Cummins-Allison Corp. System and method for processing currency bills and tickets
US9129271B2 (en) 2000-02-11 2015-09-08 Cummins-Allison Corp. System and method for processing casino tickets
US8684160B2 (en) 2000-04-28 2014-04-01 Cummins-Allison Corp. System and method for processing coins
US20100012735A1 (en) * 2000-08-10 2010-01-21 Novo Nordisk A/S Support for a Cartridge for Transferring an Electronically Readable Item of Information from the Cartridge to an Electronic Circuit
US20060178637A1 (en) * 2000-08-10 2006-08-10 Michael Eilersen Support for a cartridge for transferring an electronically readable item of information from the cartridge to an electronic circuit
US7922096B2 (en) 2000-08-10 2011-04-12 Novo Nordisk A/S Support for a cartridge for transferring an electronically readable item of information from the cartridge to an electronic circuit
US7686681B2 (en) 2001-06-08 2010-03-30 Igt Systems, methods and articles to facilitate playing card games with selectable odds
US8016663B2 (en) 2001-06-08 2011-09-13 The United States Playing Card Company Method, apparatus and article for random sequence generation and playing card distribution
US20040005920A1 (en) * 2002-02-05 2004-01-08 Mindplay Llc Method, apparatus, and article for reading identifying information from, for example, stacks of chips
USRE44689E1 (en) 2002-03-11 2014-01-07 Cummins-Allison Corp. Optical coin discrimination sensor and coin processing system using the same
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US8360312B2 (en) 2003-01-03 2013-01-29 American Express Travel Releated Services Company, Inc. Metal-containing transaction card and method of making the same
US8523062B2 (en) 2003-01-03 2013-09-03 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US8079514B2 (en) 2003-01-03 2011-12-20 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US20070170264A1 (en) * 2003-01-03 2007-07-26 Ellen Lasch Metal-containing transaction card and method of making the same
US8033457B2 (en) 2003-01-03 2011-10-11 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US7971786B2 (en) 2003-01-03 2011-07-05 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US20040217178A1 (en) * 2003-01-03 2004-11-04 Ellen Lasch Metal-containing transaction card and method of making the same
US7588184B2 (en) 2003-01-03 2009-09-15 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US20060102729A1 (en) * 2003-01-03 2006-05-18 Priscilla Gandel Metal-containing transaction card and method of making the same
US7819310B2 (en) 2003-01-03 2010-10-26 American Express Travel Related Services Company Inc. Metal-containing transaction card and method of making the same
US7530491B2 (en) 2003-01-03 2009-05-12 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US7823777B2 (en) 2003-01-03 2010-11-02 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making same
US8393455B2 (en) 2003-03-12 2013-03-12 Cummins-Allison Corp. Coin processing device having a moveable coin receptacle station
US7614545B2 (en) * 2003-03-24 2009-11-10 Novo Nordisk A/S Electronic marking of a medication cartridge
US8485907B2 (en) 2003-09-05 2013-07-16 Bally Gaming, Inc. Systems, methods, and devices for monitoring card games, such as Baccarat
US20060243804A1 (en) * 2003-10-03 2006-11-02 Novo Nordisk A/S Container comprising code information elements
US7736236B2 (en) 2003-11-07 2010-06-15 Bally Gaming International, Inc. Method, apparatus and article for evaluating card games, such as blackjack
US8523641B2 (en) 2004-09-15 2013-09-03 Cummins-Allison Corp. System, method and apparatus for automatically filling a coin cassette
US9934640B2 (en) 2004-09-15 2018-04-03 Cummins-Allison Corp. System, method and apparatus for repurposing currency
US20060205519A1 (en) * 2005-02-10 2006-09-14 Bally Gaming International, Inc. Systems and methods for processing playing cards collected from a gaming table
US8684159B2 (en) 2005-02-10 2014-04-01 Cummins-Allison Corp. Method and apparatus for varying coin-processing machine receptacle limits
US8074987B2 (en) 2005-02-10 2011-12-13 Bally Gaming, Inc. Systems and methods for processing playing cards collected from a gaming table
US8602200B2 (en) 2005-02-10 2013-12-10 Cummins-Allison Corp. Method and apparatus for varying coin-processing machine receptacle limits
US20100119789A1 (en) * 2005-04-06 2010-05-13 Grande William J Advanced conductive ink
US7642781B2 (en) 2005-04-15 2010-01-05 Cornell Research Foundation, Inc. High-pass two-dimensional ladder network resonator
US20060244448A1 (en) * 2005-04-15 2006-11-02 Cornell Research Foundation, Inc. High-pass two-dimensional ladder network resonator
US9522238B2 (en) 2005-05-10 2016-12-20 Novo Nordisk A/S Injection device comprising an optical sensor
US8197449B2 (en) 2005-05-10 2012-06-12 Novo Nordisk A/S Injection device comprising an optical sensor
US8771238B2 (en) 2005-05-10 2014-07-08 Novo Nordisk A/S Injection device comprising an optical sensor
US20070005367A1 (en) * 2005-06-29 2007-01-04 Microsoft Corporation Radio frequency certificates of authenticity
US7677438B2 (en) 2005-06-29 2010-03-16 Microsoft Corporation Radio frequency certificates of authenticity
US8550464B2 (en) 2005-09-12 2013-10-08 Bally Gaming, Inc. Systems, methods and articles to facilitate playing card games with selectable odds
US8638108B2 (en) 2005-09-22 2014-01-28 Novo Nordisk A/S Device and method for contact free absolute position determination
US20070087795A1 (en) * 2005-09-30 2007-04-19 Impressive Impressions, Inc. Collectable fingerprinted apparatus and methods
US8019130B2 (en) 2005-09-30 2011-09-13 Aletto Mark V Collectable fingerprinted apparatus and methods
DE102005047609A1 (en) * 2005-10-05 2007-04-12 Giesecke & Devrient Gmbh Assurance of authenticity of value documents by means of feature substances
US20090258200A1 (en) * 2005-10-05 2009-10-15 Ulrich Scholz Securing the Authenticity of Value Documents By Means of Characteristic Substances
US10836198B2 (en) 2005-10-05 2020-11-17 Giesecke+Devrient Currency Technology Gmbh Securing the authenticity of value documents by means of characteristic substances
US8559694B2 (en) 2005-10-05 2013-10-15 Cummins-Allison Corp. Currency processing system with fitness detection
US20080250483A1 (en) * 2005-10-26 2008-10-09 Hang Kyung Lee Method and System for Authenticating Products Using Serial Numbers and Passwords Over Communication Network
US20100127823A1 (en) * 2006-01-11 2010-05-27 Microsoft Corporation Radio Frequency Certificates of Authenticity and Related Scanners
US7659851B2 (en) * 2006-01-11 2010-02-09 Microsoft Corporation Radio frequency certificates of authenticity and related scanners
US20070159400A1 (en) * 2006-01-11 2007-07-12 Microsoft Corporation Radio Frequency Certificates of Authenticity and Related Scanners
US8708241B2 (en) 2006-01-11 2014-04-29 Microsoft Corporation Radio frequency certificates of authenticity and related scanners
US20090088701A1 (en) * 2006-03-20 2009-04-02 Novo Nordisk A/S Contact Free Reading of Cartridge Identification Codes
US8608079B2 (en) 2006-03-20 2013-12-17 Novo Nordisk A/S Contact free reading of cartridge identification codes
US8959029B2 (en) 2006-03-23 2015-02-17 Cummins-Allison Corp System, apparatus, and methods for currency processing control and redemption
US8994382B2 (en) 2006-04-12 2015-03-31 Novo Nordisk A/S Absolute position determination of movably mounted member in medication delivery device
US8049519B2 (en) 2006-04-26 2011-11-01 Novo Nordisk A/S Contact free absolute position determination of a moving element in a medication delivery device
US20090096467A1 (en) * 2006-04-26 2009-04-16 Novo Nordisk A/S Contact Free Absolute Position Determination of a Moving Element in a Medication Delivery Device
US8038153B2 (en) 2006-05-23 2011-10-18 Bally Gaming, Inc. Systems, methods and articles to facilitate playing card games
US8100753B2 (en) 2006-05-23 2012-01-24 Bally Gaming, Inc. Systems, methods and articles to facilitate playing card games with selectable odds
US8052519B2 (en) 2006-06-08 2011-11-08 Bally Gaming, Inc. Systems, methods and articles to facilitate lockout of selectable odds/advantage in playing card games
US7753779B2 (en) 2006-06-16 2010-07-13 Bally Gaming, Inc. Gaming chip communication system and method
US8192277B2 (en) 2006-08-17 2012-06-05 Bally Gaming, Inc. Systems, methods and articles to enhance play at gaming tables with bonuses
US7959503B2 (en) * 2006-08-29 2011-06-14 Scientific Games International, Inc. Game apparatus
US20080084024A1 (en) * 2006-08-29 2008-04-10 Scientific Games Royalty Corporation Game apparatus
AU2007290538B2 (en) * 2006-08-29 2011-09-22 Scientific Games Holdings Limited Game apparatus
US8647191B2 (en) 2006-09-26 2014-02-11 Bally Gaming, Inc. Resonant gaming chip identification system and method
US20080076536A1 (en) * 2006-09-26 2008-03-27 Bally Gaming, Inc. Resonant gaming chip identification system and method
US9514610B2 (en) 2006-09-26 2016-12-06 Bally Gaming, Inc. Resonant gaming chip identification system and method
US8562411B2 (en) * 2006-09-28 2013-10-22 Scientific Games International, Inc. Electronic gaming devices
US20080081686A1 (en) * 2006-09-28 2008-04-03 Irwin Kenneth E Jr Electronic gaming devices
US20090294300A1 (en) * 2006-11-13 2009-12-03 Kc Energy, Llc Rf systems and methods for processing salt water
US20080189066A1 (en) * 2006-11-15 2008-08-07 Par Acquisitions, Llc Raman spectrometry authentication
US8078420B2 (en) * 2006-11-15 2011-12-13 Miller Gary L Raman spectrometry authentication
US20080137153A1 (en) * 2006-12-05 2008-06-12 Canon Kabushiki Kaisha Image processing apparatus and method
US20100106100A1 (en) * 2007-03-21 2010-04-29 Novo Nordisk A/S Medical delivery system having container recognition and container for use with the medical delivery system
US8348904B2 (en) 2007-03-21 2013-01-08 Novo Nordisk A/S Medical delivery system having container recognition and container for use with the medical delivery system
US20080292979A1 (en) * 2007-05-22 2008-11-27 Zhe Ding Transparent conductive materials and coatings, methods of production and uses thereof
US20100194537A1 (en) * 2007-06-09 2010-08-05 Novo Nordisk A/S Contact free reading of reservoir identification codes
US20090056589A1 (en) * 2007-08-29 2009-03-05 Honeywell International, Inc. Transparent conductors having stretched transparent conductive coatings and methods for fabricating the same
US8272945B2 (en) 2007-11-02 2012-09-25 Bally Gaming, Inc. Game related systems, methods, and articles that combine virtual and physical elements
US8734245B2 (en) 2007-11-02 2014-05-27 Bally Gaming, Inc. Game related systems, methods, and articles that combine virtual and physical elements
US8920236B2 (en) 2007-11-02 2014-12-30 Bally Gaming, Inc. Game related systems, methods, and articles that combine virtual and physical elements
US9613487B2 (en) 2007-11-02 2017-04-04 Bally Gaming, Inc. Game related systems, methods, and articles that combine virtual and physical elements
US7727578B2 (en) 2007-12-27 2010-06-01 Honeywell International Inc. Transparent conductors and methods for fabricating transparent conductors
US20090166055A1 (en) * 2007-12-27 2009-07-02 Honeywell International, Inc. Transparent conductors and methods for fabricating transparent conductors
US8597107B2 (en) 2007-12-28 2013-12-03 Bally Gaming, Inc. Systems, methods, and devices for providing purchases of instances of game play at a hybrid ticket/currency game machine
US7642463B2 (en) 2008-01-28 2010-01-05 Honeywell International Inc. Transparent conductors and methods for fabricating transparent conductors
US20090189124A1 (en) * 2008-01-28 2009-07-30 Honeywell International, Inc. Transparent conductors and methods for fabricating transparent conductors
US20090188697A1 (en) * 2008-01-28 2009-07-30 Honeywell International, Inc. Transparent conductors and methods for fabricating transparent conductors
US7960027B2 (en) 2008-01-28 2011-06-14 Honeywell International Inc. Transparent conductors and methods for fabricating transparent conductors
US20090242246A1 (en) * 2008-04-01 2009-10-01 Fukui Precision Component (Shenzhen) Co., Ltd. Printed circuit board and method for manufacturing same
US8071887B2 (en) * 2008-04-01 2011-12-06 Fukui Precision Component (Shenzhen) Co., Ltd. Printed circuit board and method for manufacturing same
US9105152B2 (en) 2008-04-30 2015-08-11 Bally Gaming, Inc. Game transaction module interface to single port printer
US8821268B2 (en) 2008-04-30 2014-09-02 Bally Gaming, Inc. Game transaction module interface to single port printer
US8251808B2 (en) 2008-04-30 2012-08-28 Bally Gaming, Inc. Game transaction module interface to single port printer
US9563898B2 (en) 2008-04-30 2017-02-07 Bally Gaming, Inc. System and method for automated customer account creation and management
US9005034B2 (en) 2008-04-30 2015-04-14 Bally Gaming, Inc. Systems and methods for out-of-band gaming machine management
WO2009142656A1 (en) * 2008-05-22 2009-11-26 American Express Travel Related Services Company, Inc. Metal-containing transaction card and method of making the same
US8366542B2 (en) 2008-05-24 2013-02-05 Bally Gaming, Inc. Networked gaming system with enterprise accounting methods and apparatus
US8382584B2 (en) 2008-05-24 2013-02-26 Bally Gaming, Inc. Networked gaming system with enterprise accounting methods and apparatus
US9186465B2 (en) 2008-11-06 2015-11-17 Novo Nordisk A/S Electronically assisted drug delivery device
US9950117B2 (en) 2009-02-13 2018-04-24 Novo Nordisk A/S Medical device and cartridge
US9129468B2 (en) 2009-02-26 2015-09-08 Video Gaming Technologies, Inc. Gaming machine and method for validating a voucher
US20100216543A1 (en) * 2009-02-26 2010-08-26 Video Gaming Technologies, Inc. Gaming machine and method for validating a voucher
US20110019818A1 (en) * 2009-07-23 2011-01-27 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. System for locking electronic device and method thereof
US8656483B2 (en) * 2009-07-23 2014-02-18 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. System for locking electronic device and method thereof
US8545295B2 (en) 2010-12-17 2013-10-01 Cummins-Allison Corp. Coin processing systems, methods and devices
US9830762B1 (en) 2010-12-17 2017-11-28 Cummins-Allison Corp. Coin processing methods
US9437069B1 (en) 2010-12-17 2016-09-06 Cummins-Allison Corp. Coin processing systems, methods and devices
US8701860B1 (en) 2010-12-17 2014-04-22 Cummins-Allison Corp. Coin processing systems, methods and devices
WO2013166965A1 (en) * 2012-05-09 2013-11-14 Chun Au Decoder, coupling card reader and application system and method for the same
US9330515B1 (en) 2012-08-31 2016-05-03 Cummins-Allison Corp. Disk-type coin processing unit with angled sorting head
US9092924B1 (en) 2012-08-31 2015-07-28 Cummins-Allison Corp. Disk-type coin processing unit with angled sorting head
US10584259B2 (en) * 2013-01-23 2020-03-10 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Marking composition
EP2948316A1 (en) * 2013-01-23 2015-12-02 Fraunhofer Gesellschaft zur Förderung der angewandten Forschung e.V. Marking composition
AU2018201182B2 (en) * 2013-01-23 2019-07-11 Deutsche Institute Für Textil- Und Faserforschung Denkendorf Marking composition
US11421125B2 (en) * 2013-01-23 2022-08-23 Deutsche Institute Für Textil- Und Faserforschung Denkendorf Marking composition
US20160137863A1 (en) * 2013-01-23 2016-05-19 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Marking composition
US9179542B2 (en) * 2013-04-23 2015-11-03 Lockheed Martin Corporation Articles containing non-visible identifying marks formed from nanomaterials and methods utilizing the same
US20140312248A1 (en) * 2013-04-23 2014-10-23 Lockheed Martin Corporation Articles containing non-visible identifying marks formed from nanomaterials and methods utilizing the same
US9360589B1 (en) 2013-04-23 2016-06-07 Lockheed Martin Corporation Articles containing non-visible identifying marks formed from carbon nanomaterials and methods utilizing the same
US20150120574A1 (en) * 2013-10-30 2015-04-30 Tencent Technology (Shenzhen) Company Limited Information transmission method, apparatus and system
US10977650B2 (en) * 2013-10-30 2021-04-13 Tencent Technology (Shenzhen) Company Limited Information transmission method, apparatus and system
US20210201323A1 (en) * 2013-10-30 2021-07-01 Tencent Technology (Shenzhen) Company Limited Information transmission method, apparatus and system
WO2015191232A1 (en) * 2014-06-11 2015-12-17 Carestream Health, Inc. Method of producing a revealable invisible pattern in a transparent conductive film
US10685523B1 (en) 2014-07-09 2020-06-16 Cummins-Allison Corp. Systems, methods and devices for processing batches of coins utilizing coin imaging sensor assemblies
US9501885B1 (en) 2014-07-09 2016-11-22 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing near-normal and high-angle of incidence lighting
US9916713B1 (en) 2014-07-09 2018-03-13 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing normal or near-normal and/or high-angle of incidence lighting
US9870668B1 (en) 2014-07-25 2018-01-16 Cummins-Allison Corp. Systems, methods and devices for processing coins with linear array of coin imaging sensors
US10068406B1 (en) 2014-07-25 2018-09-04 Cummins-Allison Corp. Systems, methods and devices for processing coins with linear array of coin imaging sensors
US11625968B1 (en) 2014-07-25 2023-04-11 Cummins-Allison Corp. Systems, methods and devices for processing coins with linear array of coin imaging sensors
US9508208B1 (en) 2014-07-25 2016-11-29 Cummins Allison Corp. Systems, methods and devices for processing coins with linear array of coin imaging sensors
US9430893B1 (en) 2014-08-06 2016-08-30 Cummins-Allison Corp. Systems, methods and devices for managing rejected coins during coin processing
US10049521B1 (en) 2014-08-06 2018-08-14 Cummins-Allison Corp. Systems, methods and devices for managing rejected coins during coin processing
US9633500B1 (en) 2014-08-06 2017-04-25 Cummins-Allison Corp. Systems, methods and devices for managing rejected coins during coin processing
EP3191997A4 (en) * 2014-09-08 2018-08-01 Snowshoefood Inc. Systems and methods for hybrid hardware authentication
US11288683B2 (en) * 2014-11-06 2022-03-29 Altria Client Services Llc Methods and products for product tracing and authentication using conductive inks
US10089812B1 (en) 2014-11-11 2018-10-02 Cummins-Allison Corp. Systems, methods and devices for processing coins utilizing a multi-material coin sorting disk
US11409919B2 (en) 2015-01-09 2022-08-09 Sri International Unclonable RFID chip and method
WO2016133601A3 (en) * 2015-01-09 2016-11-03 Sri International Unclonable rfid chip and method
US11580344B2 (en) 2015-01-09 2023-02-14 Sri International Authentication apparatus, system and methods using unclonable identifiers
US10664625B2 (en) 2015-01-09 2020-05-26 Sri International Unclonable RFID chip and method
US10475271B2 (en) * 2015-01-27 2019-11-12 Quantum Base Limited Authentication of physical entities
US20180018846A1 (en) * 2015-01-27 2018-01-18 Quantum Base Limited Improvements relating to the authentication of physical entities
US11227201B1 (en) 2015-02-06 2022-01-18 American Express Travel Related Services Company, Inc Ceramic transaction cards
US10607125B2 (en) 2015-02-06 2020-03-31 American Express Travel Related Services Company, Inc. Method of making ceramic-containing transaction cards
US11915075B1 (en) 2015-02-06 2024-02-27 American Express Travel Related Services Company, Inc. Ceramic transaction cards
US11362431B1 (en) * 2015-06-16 2022-06-14 Oceanit Laboratories, Inc. Optically transparent radar absorbing material (RAM)
US11514743B2 (en) 2015-08-07 2022-11-29 Cummins-Allison Corp. Systems, methods and devices for coin processing and coin recycling
US10629020B1 (en) 2015-08-07 2020-04-21 Cummins-Allison Corp. Systems, methods and devices for coin processing and coin recycling
US10043333B1 (en) 2015-08-07 2018-08-07 Cummins-Allison Corp. Systems, methods and devices for coin processing and coin recycling
US9875593B1 (en) 2015-08-07 2018-01-23 Cummins-Allison Corp. Systems, methods and devices for coin processing and coin recycling
EP3151168A1 (en) * 2015-09-30 2017-04-05 Nawrocki, Piotr Security feature against forgery, in particular for high-value products, product authentication method and product authentication system
US10964148B2 (en) 2016-10-18 2021-03-30 Cummins-Allison Corp. Coin sorting system coin chute
US10181234B2 (en) 2016-10-18 2019-01-15 Cummins-Allison Corp. Coin sorting head and coin processing system using the same
US10679449B2 (en) 2016-10-18 2020-06-09 Cummins-Allison Corp. Coin sorting head and coin processing system using the same
CN107358446A (en) * 2017-03-06 2017-11-17 郑州新华方数字信息有限公司 A kind of anti-fake certificate management method and device
US11275109B2 (en) 2017-03-07 2022-03-15 Sri International Apparatus, system, and method for an integrated circuit
US11688638B2 (en) 2017-03-28 2023-06-27 Sri International Production of very small or thin dies
US10217114B1 (en) * 2018-08-27 2019-02-26 Ennoventure, Inc. Methods and systems for providing labels to prevent counterfeiting of products
CN109081329A (en) * 2018-09-29 2018-12-25 中国科学院苏州纳米技术与纳米仿生研究所 A kind of separation method and system of carbon nanotube and polymer
US11443581B2 (en) 2019-01-04 2022-09-13 Cummins-Allison Corp. Coin pad for coin processing system
DE102019127948A1 (en) * 2019-10-16 2021-04-22 Bundesrepublik Deutschland, vertreten durch den Bundesminister für Wirtschaft und Energie, dieser vertreten durch den Präsidenten der Bundesanstalt für Materialforschung und –prüfung (BAM) Method for checking the identity of a product and a product with a verification section
US20210174378A1 (en) * 2019-12-09 2021-06-10 Nike, Inc. Digital fingerprinting
US11790377B2 (en) 2019-12-09 2023-10-17 Nike, Inc. Digital fingerprinting

Also Published As

Publication number Publication date
US7513437B2 (en) 2009-04-07
US20080135629A1 (en) 2008-06-12

Similar Documents

Publication Publication Date Title
US7513437B2 (en) Security marking and security mark
EP1354304B8 (en) Security, identification and verification systems
US5997044A (en) Document structure with circuit elements
US6549131B1 (en) Security device with foil camouflaged magnetic regions and methods of making same
JP3629206B2 (en) Security device having a plurality of security functions and method of manufacturing the device
US6053405A (en) Electronic verification machine for documents
US5475205A (en) Document verification system
CA2192329C (en) Electronic validation machine for documents
US6379742B1 (en) Lottery ticket structure
US6491215B1 (en) Electronic verification machine for documents
JP4695327B2 (en) Security paper and valuable documents created from it
EP2153422B1 (en) Method of marking a document or item; method and device for identifying the marked document or item; use of circular polarizing particles
EP1646972B1 (en) Chip card including tamper-proof security features
RU2407650C2 (en) Counterfeit-proof document
WO2005069868A2 (en) Security marking and security mark
JP6572670B2 (en) Information printed matter, reading method and authentication method
BG66377B1 (en) Encoded marking and a method for protection and certification the authenticity of products
US20230281408A1 (en) Security marking, method and device for reading the security marking, security document marked with the security marking, and method and system for verifying said security document
KR101906480B1 (en) Security sheet for authenticity determination and method for determinating authenticity using the same
JP2005193584A (en) Forgery preventing information carrier and its authenticating method
EA044693B1 (en) SECURITY MARKING, METHOD AND DEVICE FOR READING SECURITY MARKINGS, SECURITY DOCUMENT MARKED WITH SECURITY MARKINGS, AND METHOD AND SYSTEM FOR VERIFICATION OF SAID SECURITY DOCUMENT
WO2010058809A1 (en) Embossed hologram chip and manufacturing method therefor
JPH07329466A (en) Information recording medium
CA2121830C (en) Holographic enhancement of card security
JPH07121672A (en) Card and its genuineness deciding method

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION