WO2007010224A1 - Visual authentification of optical storage medium - Google Patents

Visual authentification of optical storage medium Download PDF

Info

Publication number
WO2007010224A1
WO2007010224A1 PCT/GB2006/002640 GB2006002640W WO2007010224A1 WO 2007010224 A1 WO2007010224 A1 WO 2007010224A1 GB 2006002640 W GB2006002640 W GB 2006002640W WO 2007010224 A1 WO2007010224 A1 WO 2007010224A1
Authority
WO
WIPO (PCT)
Prior art keywords
members
storage medium
data storage
optical data
verification image
Prior art date
Application number
PCT/GB2006/002640
Other languages
French (fr)
Inventor
James Leslie Board
Original Assignee
De La Rue International Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by De La Rue International Limited filed Critical De La Rue International Limited
Publication of WO2007010224A1 publication Critical patent/WO2007010224A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/128Viewing devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B23/00Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
    • G11B23/38Visual features other than those contained in record tracks or represented by sprocket holes the visual signals being auxiliary signals
    • G11B23/40Identifying or analogous means applied to or incorporated in the record carrier and not intended for visual display simultaneously with the playing-back of the record carrier, e.g. label, leader, photograph

Definitions

  • the invention relates to self-verification apparatus, particularly for use with an optical data storage medium such as a CD or DVD. It is becoming increasingly easier to produce copies of proprietary software provided on optical data storage media such as a CD or DVD as a result of CD and DVD writing devices becoming widely available. As a result of this, software suppliers are providing increasingly sophisticated methods to prevent illegal copying by incorporating anti-copy features into the software. Another approach is to enable counterfeit storage media to be identified by incorporating highly complex security features into the optical data storage media themselves.
  • US-A-2004/0255317 describes various methods for incorporating security features in a radially inner, normally unused portion, of a compact disc.
  • security features include encrypted, printed serial numbers; digital fingerprints or watermarks; holograms; polarized filters; photo-luminescent coatings (detectable by specially tuned lasers); microscopic taggants, i.e., microscopic markers not found in the base material but added to the base material to indicate the object's origin or authenticity; and radio-frequency identification (RFID) devices.
  • RFID radio-frequency identification
  • a self-verification apparatus comprising an optical data storage medium provided with a first member of a visual authentication device; and a second member of the visual authentication device fixed to or generated by an article separate from the optical data storage medium whereby when the first and second members are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
  • the invention provides a quick way for the average user to establish that there is a link between the first and second members, one of which is provided on or in the optical data storage medium, leading to a reasonable degree of certainty that he is handling a genuine product.
  • WO 01/87632 discloses a print feature consisting of an array of dots in which a security pattern or code is produced by displacing some of the dots with respect to the rest. This cannot be seen with the naked eye.
  • the pattern can be made visible by viewing through a planar device carrying transparent and opaque areas of the same periodicity as the printed dots.
  • WO 97/20298 discloses a method and apparatus for producing Scrambled Indicia®. This process encodes a message or image into an area of print using digital techniques. The message cannot be seen by unaided eye. When the print is viewed using a lenticular screen of the correct characteristics the hidden image/message is revealed. In some cases different images can be seen at different angles of view. Such scrambled indicia can be incorporated into print or into holographic originations. Enschede's microSAM® feature uses screen angle modulation to encode a message or image by modifying the print structure in a manner undetectable by the unaided eye. When the feature is viewed through the correct revealer the hidden message or pattern is seen.
  • the revealer in this case is a piece of plastic film ruled with parallel black lines of the correct pitch and thickness.
  • WO 01/39138 discloses methods and apparatus for authenticating security documents such as banknotes, passports etc. According to this method, a screen pattern is printed onto a surface. A revealing device is designed so that when it is placed over the printing, it produces a clearly visible message or image caused by the moire effect.
  • the revealing screen may be a line structure or a microlens array.
  • GB 1407065 describes a security document carrying a pair of metameric inks which match under one illuminant, say North Sky light, but mismatch under another type of illuminant, such as tungsten.
  • EP 930979 discloses a self-verifying document and describes a number of methods by which a transparent region on the document can be used to authenticate a document. Microlenses, diffraction gratings, colour filters and moire effects are all referred to.
  • the security benefits rely on the fact that when the document is copied the structure of the hidden images are not precisely replicated by the copying process. For example this will occur if the resolution of the original image is significantly greater than the resolution of the device used to replicate the image.
  • the article can be supplied separately from the optical data storage medium such that one is equivalent to the known security feature and the other equivalent to the known revealer.
  • the article is related to the optical data storage medium.
  • the article may comprise packaging for the optical data storage medium.
  • the second member may be printed directly or indirectly on the packaging and when the optical data storage medium is removed from the packaging, the two members can be viewed together to check whether the verification image is revealed.
  • the first member is provided in or on a transparent portion of the optical storage data medium so that the second member can be viewed through the transparent portion.
  • the packaging comprises a transparent window containing the second member so that when the optical data storage medium is packaged, the two members cooperate together to generate the verification image.
  • the data stored on the optical data storage medium is to be used on a processor and may for example comprise a software program.
  • the second member may be provided as a label attached to a processor with which the optical data storage medium is to be associated.
  • a personal computer will typically have an operating system preinstalled and will have a certificate of authenticity applied to its outer case for authentication by the user.
  • the computer will also be supplied with a set of DVD's or CD's on which the software associated with the certificate of authenticity is stored, these being supplied as a backup in case the user should need to reinstall the software.
  • the label adhered to the computer has a hidden image printed on it which can be verified by the viewer integrated into the optically data storage media.
  • the second member could be displayed on a display such as a monitor.
  • the display on a monitor could be used simply to verify the optical data storage medium even if it has no connection with any associated processor.
  • the second member is computed by the processor in accordance with a preprogramed algorithm. This algorithm may generate the same second member each time it is activated or may vary the second member, for example by taking account of the time of varying parameter.
  • the processor can obtain the second member from a remote source, for example via the Internet.
  • a purchaser or user of the optical data storage medium could enter an identifier of that storage medium which is communicated to the remote source, the identifier being used as an index to locate the appropriate second member which is then transmitted to the processor for display.
  • the identifier being used as an index to locate the appropriate second member which is then transmitted to the processor for display.
  • the region of the optical data storage medium with the first member is usually transparent but does not need to be 100% transparent. It will typically allow a level of transmission as the user views the coded image to be decoded through this region. For example one might use a semi-transparent metal layer or a transparent coloured layer.
  • the verification image can take a variety of forms but, for ease of recognition, typically comprises one or more of indicia, for example alphanumerics, a graphical device, logos, serial numbers, authentication keys, patterns and the like.
  • Figure 1 illustrates schematically a personal computer and associated optical data storage media
  • Figure 2 is a plan view of a security label affixed to the housing of the personal computer shown in Figure 1 ;
  • Figure 3 illustrates one of the optical data storage media in more detail.
  • Figures 4A-4C illustrate first and second members of another example of a visual authentication device and the combined members respectively; and, Figures 5A-5C and 6A-6C are views similar to Figures 4A-4C respectively but of third and fourth examples of visual authentication devices.
  • FIG 1 shows a security label 1 applied to the housing 2 of a personal computer.
  • the security label 1 shown in detail in Figure 2, is a certificate of authenticity for the operating systems pre-installed on the computer by the computer manufacturer.
  • the security label 1 comprises a security substrate 3 having a security thread 4 and optionally other embedded security features (not shown).
  • the secure substrate 3 is printed with a range of security features including a hidden image feature such as Scrambled Indicia® 5 forming a "second member" of a visual authentication device.
  • Scrambled Indicia® is a technology developed and marketed by Graphic Security Systems Corp and has been widely used on a range of security applications previously. See also WO97/20298.
  • the security label 1 has also been provided with an identifier, for example a barcode 6 and a serial number 7.
  • the identifier can be used by an inspector to authenticate the validity of the label 1.
  • the identifier can also be used by the software owner to validate, or unlock the software application. Alternatively the identifier might be required to access on line help, updates and upgrades to the software.
  • the computer is supplied with one or more back up CD's or DVD's 10, one of which is shown in detail in Figure 3. These can be used in the event the operating system should need to be reinstalled.
  • the revealer 12 has been integrated directly into the CD/DVD during the manufacture of the CD/DVD.
  • the revealer comprises a lens structure which can be formed by embossing.
  • An example is described in WO-A-97/20298. It is therefore relatively straightforward to modify the stamping device used to emboss CD/DVD's to incorporate a revealer device in the inner ring region 14 that is not normally embossed.
  • the CD/DVD 10 can then be used to authenticate the label 1 attached to the CD/DVD 10
  • the revealer during the stamping process of the CD/DVD 10 is may be applied subsequently in a separate process.
  • it may be applied as a transparent label, by a casting process or by a relief printing process.
  • Other methods are described in US-A-2004/0255317.
  • the revealer in the inner ring 14 could be a combination of a scrambled indicia lens structure and a metameric (e.g. red) filter. Such a device would be capable of decoding or revealing both a metameric hidden image and a scrambled indicia hidden image. Alternatively the hidden image could be a complex combination of the metameric and scrambled indicia features.
  • the revealer could be a combination of two lens structures interlocked and thus capable of unlocking two different codes.
  • interlocked we mean the two lens structures are interleaved or superposed upon each other in some way. If the two structures are carefully selected and superposed correctly then it is possible to use a single revealer to reveal two differently encoded images.
  • the revealer could be used to reveal a hidden image that is concealed within a holographic or diffractive element in a similar manner to the previously described hidden images.
  • the hidden image could be concealed within a demetallisation pattern.
  • the demetallisation essentially being equivalent to the printed structures referred to earlier.
  • the revealer could comprise both left and right light polarising segments that can then be used to view a liquid crystal ink feature.
  • liquid crystal ink features can be printed with SICPA Oasis inks.
  • the ink is available in both right and left handed forms so can be used to produce hidden features.
  • the revealer 12 in the inner ring 14 could comprise a microlens array which when placed overthe hidden image magnifies or reconstructs information.
  • Othertypes of lens could be used e.g. simple magnifiers, or fresnel lenses.
  • Composite verification images could be used, generated in accordance with the techniques described in PCT/GB05/01640.
  • the current invention is not limited to the use of Scrambled Indicia® but could make use of many different hidden feature and revealer technologies.
  • the revealer can be printed (instead of embossed) on to the CD. This printing step can be done later in the replication process. Additionally this presents the opportunity for each label to carry a unique pattern that requires a unique decoder. This would further enhance the security of the invention.
  • Figure 4A illustrates a document or item of packaging 30 carrying an area of print 31 within which is hidden an image, for example using the Scrambled Indicia process.
  • Figure 4B illustrates a CD or DVD 32 with a revealer 33 provided in an inner, transparent ring portion.
  • Figure 4C illustrates the result of overlaying the CD/DVD 32 on the document or packaging 30 with the revealer 33 located so that the hidden image 34 is revealed and the message can be read.
  • packaging it will be understood that if the area of print 31 is provided in a transparent window of the packaging 30 then it can be arranged such that the message or hidden image 34 can be viewed while the CD/DVD is in its packaged condition. This provides an indication of authenticity. In that case, it is usually necessary for a window to be provided on the opposite surface of the packaging to that carrying the print 31 so that a light path exists through both leaves of the packaging and the inner ring 33 of the CD/DVD.
  • Figures 5A and 5B illustrate a first member and a second member respectively of a visual authentication device, utilising a metameric effect.
  • the first member 40 ( Figure 5A) is printed using a pair of metameric inks which appear indistinguishable to the naked eye.
  • this metameric print is viewed through a revealer 42, the two inks can be distinguished and a serial number 44 provided using one of the inks ( Figure 5C) can be revealed.
  • the revealer or filter 42 could be provided in the inner ring of the CD as a printed or dyed region.
  • a hidden image 50 (Figure 6A) is created by first printing a background line pattern 52 of a given frequency. Onto this is superposed a message comprising letters made up of a line screen having the same frequency as that of the background but shifted to the left slightly.
  • the revealer 54 is also a line screen of the same frequency and by lining up the revealer 54 correctly with the hidden image 50, the term VALID appears ( Figure 6C).
  • Figure 6C a hidden image 50

Abstract

Self-verification apparatus comprises an optical data storage medium (10) provided with a first member (12) of a visual authentication device. A second member (5) of the visual authentication device is fixed to or generated by an article (2) separate from the optical data storage medium. When the first and second members (12, 5) are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.

Description

VISUAL AUTHENTIPICATION OF OPTICAL STORAGE MEDIUM
The invention relates to self-verification apparatus, particularly for use with an optical data storage medium such as a CD or DVD. It is becoming increasingly easier to produce copies of proprietary software provided on optical data storage media such as a CD or DVD as a result of CD and DVD writing devices becoming widely available. As a result of this, software suppliers are providing increasingly sophisticated methods to prevent illegal copying by incorporating anti-copy features into the software. Another approach is to enable counterfeit storage media to be identified by incorporating highly complex security features into the optical data storage media themselves.
For example, US-A-2004/0255317 describes various methods for incorporating security features in a radially inner, normally unused portion, of a compact disc. Examples of these security features include encrypted, printed serial numbers; digital fingerprints or watermarks; holograms; polarized filters; photo-luminescent coatings (detectable by specially tuned lasers); microscopic taggants, i.e., microscopic markers not found in the base material but added to the base material to indicate the object's origin or authenticity; and radio-frequency identification (RFID) devices.
The problem with these approaches is that it is not easy for the average user to determine whether or not he has been given a counterfeit product. Special devices are usually required to analyse the security feature or they need to be viewed by highly skilled personnel.
There is a need therefore for a relatively straightforward method to enable average users to be able to readily detect counterfeit optical data storage media. In accordance with the present invention, we provide a self-verification apparatus comprising an optical data storage medium provided with a first member of a visual authentication device; and a second member of the visual authentication device fixed to or generated by an article separate from the optical data storage medium whereby when the first and second members are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
We have realised that a fair degree of reassurance can be provided to a user that he is in possession of a genuine optical data storage medium by utilising a relatively simple authentication device rather than the highly complex devices of the prior art. It is recognised that a sophisticated counterfeiter might be able to produce apparently genuine counterfeit copies but the present invention is not intended to prevent this but rather deal with slightly less sophisticated copying by providing a system which is not straightforward for the average person to duplicate.
Essentially, the invention provides a quick way for the average user to establish that there is a link between the first and second members, one of which is provided on or in the optical data storage medium, leading to a reasonable degree of certainty that he is handling a genuine product.
The concept of a two-part visual authentication device is known and there are many conventional methods of achieving this. All of these are suitable for use in the present invention. Typically, these are utilised in the context of revealing a hidden image in a security printed document or the like using a handheld viewer or revealer. The hidden images and the type of revealer can take several forms. The following approaches are described in the prior art.
WO 01/87632 discloses a print feature consisting of an array of dots in which a security pattern or code is produced by displacing some of the dots with respect to the rest. This cannot be seen with the naked eye. The pattern can be made visible by viewing through a planar device carrying transparent and opaque areas of the same periodicity as the printed dots.
WO 97/20298 discloses a method and apparatus for producing Scrambled Indicia®. This process encodes a message or image into an area of print using digital techniques. The message cannot be seen by unaided eye. When the print is viewed using a lenticular screen of the correct characteristics the hidden image/message is revealed. In some cases different images can be seen at different angles of view. Such scrambled indicia can be incorporated into print or into holographic originations. Enschede's microSAM® feature uses screen angle modulation to encode a message or image by modifying the print structure in a manner undetectable by the unaided eye. When the feature is viewed through the correct revealer the hidden message or pattern is seen. The revealer in this case is a piece of plastic film ruled with parallel black lines of the correct pitch and thickness. WO 01/39138 discloses methods and apparatus for authenticating security documents such as banknotes, passports etc. According to this method, a screen pattern is printed onto a surface. A revealing device is designed so that when it is placed over the printing, it produces a clearly visible message or image caused by the moire effect. The revealing screen may be a line structure or a microlens array. GB 1407065 describes a security document carrying a pair of metameric inks which match under one illuminant, say North Sky light, but mismatch under another type of illuminant, such as tungsten. For such a set of inks it is also possible to see a difference in the appearance of the two pairs of such inks by viewing under coloured filters. Commonly, a red filter is used for viewing features. Any mismatch in the absence of a viewer is hidden by overprinting the ink pair by a discontinuous red print design which drops out under the filter.
EP 930979 discloses a self-verifying document and describes a number of methods by which a transparent region on the document can be used to authenticate a document. Microlenses, diffraction gratings, colour filters and moire effects are all referred to.
In all the above effects the security benefits rely on the fact that when the document is copied the structure of the hidden images are not precisely replicated by the copying process. For example this will occur if the resolution of the original image is significantly greater than the resolution of the device used to replicate the image.
In some applications of the invention, the article can be supplied separately from the optical data storage medium such that one is equivalent to the known security feature and the other equivalent to the known revealer. However, in particular preferred aspects of the current invention, the article is related to the optical data storage medium. For example, the article may comprise packaging for the optical data storage medium. In this case, the second member may be printed directly or indirectly on the packaging and when the optical data storage medium is removed from the packaging, the two members can be viewed together to check whether the verification image is revealed. In the preferred approach, the first member is provided in or on a transparent portion of the optical storage data medium so that the second member can be viewed through the transparent portion.
Thus a revealer on the optical data storage medium can be used to authenticate the certificate of authenticity or fiscal stamp applied to the packaging supplied with the optical storage medium. In another approach, the packaging comprises a transparent window containing the second member so that when the optical data storage medium is packaged, the two members cooperate together to generate the verification image. Thus, the purchaser will see the verification image at the time of purchase and it will disappear when the optical data storage medium is removed from the packaging. In other examples, the data stored on the optical data storage medium is to be used on a processor and may for example comprise a software program. In that event, the second member may be provided as a label attached to a processor with which the optical data storage medium is to be associated. For example a personal computer will typically have an operating system preinstalled and will have a certificate of authenticity applied to its outer case for authentication by the user. The computer will also be supplied with a set of DVD's or CD's on which the software associated with the certificate of authenticity is stored, these being supplied as a backup in case the user should need to reinstall the software. In this instance the label adhered to the computer has a hidden image printed on it which can be verified by the viewer integrated into the optically data storage media.
Alternatively the second member could be displayed on a display such as a monitor. Of course, the display on a monitor could be used simply to verify the optical data storage medium even if it has no connection with any associated processor. In one approach, the second member is computed by the processor in accordance with a preprogramed algorithm. This algorithm may generate the same second member each time it is activated or may vary the second member, for example by taking account of the time of varying parameter. Thus, in the case of game playing software, the time varying parameter may vary according to the state of the game. In an alternative approach, the processor can obtain the second member from a remote source, for example via the Internet. Thus, a purchaser or user of the optical data storage medium could enter an identifier of that storage medium which is communicated to the remote source, the identifier being used as an index to locate the appropriate second member which is then transmitted to the processor for display. In all these preferred aspects, it will be understood that it is not necessary to supply a separate "revealer" since the optical data storage medium and the article are associated with each other.
The region of the optical data storage medium with the first member is usually transparent but does not need to be 100% transparent. It will typically allow a level of transmission as the user views the coded image to be decoded through this region. For example one might use a semi-transparent metal layer or a transparent coloured layer.
The verification image can take a variety of forms but, for ease of recognition, typically comprises one or more of indicia, for example alphanumerics, a graphical device, logos, serial numbers, authentication keys, patterns and the like. Some examples of self-verification apparatus according to the invention will now be described with reference to the accompanying drawings, in which:
Figure 1 illustrates schematically a personal computer and associated optical data storage media; Figure 2 is a plan view of a security label affixed to the housing of the personal computer shown in Figure 1 ;
Figure 3 illustrates one of the optical data storage media in more detail. Figures 4A-4C illustrate first and second members of another example of a visual authentication device and the combined members respectively; and, Figures 5A-5C and 6A-6C are views similar to Figures 4A-4C respectively but of third and fourth examples of visual authentication devices.
Figure 1 shows a security label 1 applied to the housing 2 of a personal computer. The security label 1 , shown in detail in Figure 2, is a certificate of authenticity for the operating systems pre-installed on the computer by the computer manufacturer. The security label 1 comprises a security substrate 3 having a security thread 4 and optionally other embedded security features (not shown). The secure substrate 3 is printed with a range of security features including a hidden image feature such as Scrambled Indicia® 5 forming a "second member" of a visual authentication device. Scrambled Indicia® is a technology developed and marketed by Graphic Security Systems Corp and has been widely used on a range of security applications previously. See also WO97/20298. The security label 1 has also been provided with an identifier, for example a barcode 6 and a serial number 7. The identifier can be used by an inspector to authenticate the validity of the label 1. The identifier can also be used by the software owner to validate, or unlock the software application. Alternatively the identifier might be required to access on line help, updates and upgrades to the software.
The computer is supplied with one or more back up CD's or DVD's 10, one of which is shown in detail in Figure 3. These can be used in the event the operating system should need to be reinstalled. A revealer 12 for the Scrambled Indicia® 5, forming a "first member" of the visual authentication device, is integrated into one or more of the CD's or DVD's in a transparent inner ring region 14. In this example the revealer 12 has been integrated directly into the CD/DVD during the manufacture of the CD/DVD. Forthe Scrambled Indicia® feature 5 the revealer comprises a lens structure which can be formed by embossing. An example is described in WO-A-97/20298. It is therefore relatively straightforward to modify the stamping device used to emboss CD/DVD's to incorporate a revealer device in the inner ring region 14 that is not normally embossed.
The CD/DVD 10 can then be used to authenticate the label 1 attached to the
PC housing 2. The user simply takes the CD/DVD 10 and places it such that the transparent inner ring region 14 containing the revealer 12 is over the Scrambled
Indicia 5 on the label 1. When the Scrambled Indicia® is viewed through the revealer an image, message or code is revealed constituting a verification image.
As an alternative to forming the revealer during the stamping process of the CD/DVD 10 is may be applied subsequently in a separate process. For example it may be applied as a transparent label, by a casting process or by a relief printing process. Other methods are described in US-A-2004/0255317.
A variety of other visual authentication devices could be used.
1. The revealer in the inner ring 14 could be a combination of a scrambled indicia lens structure and a metameric (e.g. red) filter. Such a device would be capable of decoding or revealing both a metameric hidden image and a scrambled indicia hidden image. Alternatively the hidden image could be a complex combination of the metameric and scrambled indicia features.
2. As a further development of 1 above the revealer could be a combination of two lens structures interlocked and thus capable of unlocking two different codes. By interlocked we mean the two lens structures are interleaved or superposed upon each other in some way. If the two structures are carefully selected and superposed correctly then it is possible to use a single revealer to reveal two differently encoded images.
3. The revealer could be used to reveal a hidden image that is concealed within a holographic or diffractive element in a similar manner to the previously described hidden images. Alternatively, the hidden image could be concealed within a demetallisation pattern. The demetallisation essentially being equivalent to the printed structures referred to earlier.
4. The revealer could comprise both left and right light polarising segments that can then be used to view a liquid crystal ink feature. Such liquid crystal ink features can be printed with SICPA Oasis inks. The ink is available in both right and left handed forms so can be used to produce hidden features.
5. The revealer 12 in the inner ring 14 could comprise a microlens array which when placed overthe hidden image magnifies or reconstructs information. Othertypes of lens could be used e.g. simple magnifiers, or fresnel lenses. 6. Composite verification images could be used, generated in accordance with the techniques described in PCT/GB05/01640.
As can be seen therefore, the current invention is not limited to the use of Scrambled Indicia® but could make use of many different hidden feature and revealer technologies. Where a metameric, dot screen or line screen approach is used the revealer can be printed (instead of embossed) on to the CD. This printing step can be done later in the replication process. Additionally this presents the opportunity for each label to carry a unique pattern that requires a unique decoder. This would further enhance the security of the invention. Some further examples of apparatus according to the invention will now be described.
Figure 4A illustrates a document or item of packaging 30 carrying an area of print 31 within which is hidden an image, for example using the Scrambled Indicia process. Figure 4B illustrates a CD or DVD 32 with a revealer 33 provided in an inner, transparent ring portion.
Figure 4C illustrates the result of overlaying the CD/DVD 32 on the document or packaging 30 with the revealer 33 located so that the hidden image 34 is revealed and the message can be read. In the case of packaging, it will be understood that if the area of print 31 is provided in a transparent window of the packaging 30 then it can be arranged such that the message or hidden image 34 can be viewed while the CD/DVD is in its packaged condition. This provides an indication of authenticity. In that case, it is usually necessary for a window to be provided on the opposite surface of the packaging to that carrying the print 31 so that a light path exists through both leaves of the packaging and the inner ring 33 of the CD/DVD.
Figures 5A and 5B illustrate a first member and a second member respectively of a visual authentication device, utilising a metameric effect. Thus, the first member 40 (Figure 5A) is printed using a pair of metameric inks which appear indistinguishable to the naked eye. However, when this metameric print is viewed through a revealer 42, the two inks can be distinguished and a serial number 44 provided using one of the inks (Figure 5C) can be revealed. In the case of the CD/DVD application, the revealer or filter 42 could be provided in the inner ring of the CD as a printed or dyed region.
In the Figure 6 example, a hidden image 50 (Figure 6A) is created by first printing a background line pattern 52 of a given frequency. Onto this is superposed a message comprising letters made up of a line screen having the same frequency as that of the background but shifted to the left slightly. The revealer 54 is also a line screen of the same frequency and by lining up the revealer 54 correctly with the hidden image 50, the term VALID appears (Figure 6C). Of course other methods are possible including the use of multiple line frequencies, dots instead of lines, or more complex screen techniques.

Claims

1. Self-verification apparatus comprising an optical data storage medium provided with a first member of a visual authentication device; and a second member of the visual authentication device fixed to or generated by an article separate from the optical data storage medium whereby when the first and second members are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
2. Apparatus according to claim 1 , wherein one of the members of the visual authentication device comprises one or more lens structures, for example microlens array(s), and the other member comprises one or more corresponding verification images encoded into a background.
3. Apparatus according to claim 1 or claim 2, wherein one of the members includes one or more colour filters and the other of the members comprises multiple coloured indicia chosen such that when viewed through the one member only certain portions of the indicia are visible so as to define the verification image.
4. Apparatus according to any of the preceding claims, wherein one of the members provides a first part of a composite verification image and the other of the members provides a second part of the composite verification image.
5. Apparatus according to any of the preceding claims, wherein one of the members comprises respectively left and right polarising segments, and the other of the members comprises a corresponding arrangement of left and right polarised liquid crystal inks.
6. Apparatus according to any of the preceding claims, wherein one of the members includes a colour filter and the other of the members comprises one or more metameric inks.
7. Apparatus according to any of claims 2 to 6, wherein the one of the members is provided by the first member and the other of the members is provided by the second member.
8. Apparatus according to any of the preceding claims, wherein the first member is provided on or in a transparent part of the optical data storage medium so that the second member can be viewed through the transparent portion.
9. Apparatus according to any of claims 1 to 4, or claim 7 or claim 8 when dependent on any of claims 1 to 4, wherein the article comprises an electronic display on which the second member can be displayed.
10. Apparatus according to claim 9, wherein the display is coupled to a processor that computes the second member in accordance with a preprogramed algorithm.
11. Apparatus according to claim 101 wherein the preprogramed algorithm takes account of a time varying parameter.
12. Apparatus according to claim 10 or claim 11 , wherein the time varying parameter varies according to a game played using the processor.
13. Apparatus according to claim 9, wherein the display is coupled to a processor that obtains data defining the second member from a remote source, for example via the Internet.
14. Apparatus according to any of claims 1 to 8, wherein the second member is printed directly or indirectly on the article.
15. Apparatus according to claim 14, wherein the second member is printed on a label affixed to the article.
16. Apparatus according to any of claims 1 to 8, 14 or 15, wherein the article comprises packaging for the optical data storage medium.
17. Apparatus according to claim 16, wherein the packaging includes a transparent window within which the second member is provided.
18. Apparatus according to claim 17, wherein the optical data storage medium is located in the packaging with the first and second members aligned so that the verification image is visible from outside the package.
19. Apparatus according to any of claims 1 to 15, wherein the article comprises a processor storing software, the optical data storage medium storing a back-up version of the software.
20. Apparatus according to any of the preceding claims, wherein the verification image comprises one or more of indicia, for example alphanumerics, a graphical device, logos, serial numbers, authentication keys and patterns.
21. Apparatus according to any of the preceding claims, wherein the optical data storage medium comprises one of a CD and DVD.
22. Apparatus according to claim 21 , wherein the first member is provided in or on a radially inner, annular portion of the CD or DVD.
PCT/GB2006/002640 2005-07-18 2006-07-17 Visual authentification of optical storage medium WO2007010224A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0514701.2 2005-07-18
GBGB0514701.2A GB0514701D0 (en) 2005-07-18 2005-07-18 Decoding device

Publications (1)

Publication Number Publication Date
WO2007010224A1 true WO2007010224A1 (en) 2007-01-25

Family

ID=34897386

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2006/002640 WO2007010224A1 (en) 2005-07-18 2006-07-17 Visual authentification of optical storage medium

Country Status (2)

Country Link
GB (1) GB0514701D0 (en)
WO (1) WO2007010224A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009019038A1 (en) * 2007-08-09 2009-02-12 Giesecke & Devrient Gmbh Verification of security elements with windows
FR2947211A1 (en) * 2009-06-29 2010-12-31 Oberthur Technologies SECURITY DOCUMENT AND VERIFICATION METHOD OF THIS DOCUMENT
WO2013057280A1 (en) * 2011-10-19 2013-04-25 Bundesdruckerei Gmbh Method for verifying a security document having a visual barrier, using a display device
WO2013057278A1 (en) * 2011-10-19 2013-04-25 Bundesdruckerei Gmbh Method for verifying a security document using a display device
WO2013178349A1 (en) * 2012-06-01 2013-12-05 Giesecke & Devrient Gmbh Verification of documents of value having a window displaying diffractive structures

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996000446A1 (en) * 1994-06-24 1996-01-04 Minnesota Mining And Manufacturing Company Marking of optical disc for customized identification
US5708717A (en) * 1995-11-29 1998-01-13 Alasia; Alfred Digital anti-counterfeiting software method and apparatus
US6062604A (en) * 1996-10-10 2000-05-16 Securency Pty Ltd. Self-verifying security documents
WO2000029878A1 (en) * 1998-11-13 2000-05-25 Rolic Ag Optical component
US20020106102A1 (en) * 2000-12-08 2002-08-08 Au Oscar Chi-Lim Methods and apparatus for hiding data in halftone images
US20030039195A1 (en) * 2001-08-07 2003-02-27 Long Michael D. System and method for encoding and decoding an image or document and document encoded thereby
US20030223100A1 (en) * 2002-05-30 2003-12-04 Anderson Michael Jay Disk with holographic security label applied thereto and method of applying label
US20040001604A1 (en) * 2002-06-28 2004-01-01 Isaac Amidror Authentication with built-in encryption by using moire intensity profiles between random layers
EP1434210A2 (en) * 2002-12-18 2004-06-30 Ricoh Company Optical recording medium with visible pattern formed in rom area
US20050069170A1 (en) * 2003-09-30 2005-03-31 Alasia Alfred V. Method and system for encoding images using encoding parameters from multiple sources

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996000446A1 (en) * 1994-06-24 1996-01-04 Minnesota Mining And Manufacturing Company Marking of optical disc for customized identification
US5708717A (en) * 1995-11-29 1998-01-13 Alasia; Alfred Digital anti-counterfeiting software method and apparatus
US6062604A (en) * 1996-10-10 2000-05-16 Securency Pty Ltd. Self-verifying security documents
WO2000029878A1 (en) * 1998-11-13 2000-05-25 Rolic Ag Optical component
US20020106102A1 (en) * 2000-12-08 2002-08-08 Au Oscar Chi-Lim Methods and apparatus for hiding data in halftone images
US20030039195A1 (en) * 2001-08-07 2003-02-27 Long Michael D. System and method for encoding and decoding an image or document and document encoded thereby
US20030223100A1 (en) * 2002-05-30 2003-12-04 Anderson Michael Jay Disk with holographic security label applied thereto and method of applying label
US20040001604A1 (en) * 2002-06-28 2004-01-01 Isaac Amidror Authentication with built-in encryption by using moire intensity profiles between random layers
EP1434210A2 (en) * 2002-12-18 2004-06-30 Ricoh Company Optical recording medium with visible pattern formed in rom area
US20050069170A1 (en) * 2003-09-30 2005-03-31 Alasia Alfred V. Method and system for encoding images using encoding parameters from multiple sources

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009019038A1 (en) * 2007-08-09 2009-02-12 Giesecke & Devrient Gmbh Verification of security elements with windows
FR2947211A1 (en) * 2009-06-29 2010-12-31 Oberthur Technologies SECURITY DOCUMENT AND VERIFICATION METHOD OF THIS DOCUMENT
EP2275279A1 (en) * 2009-06-29 2011-01-19 Oberthur Technologies Security document and method of verifying same
EP2275279B1 (en) 2009-06-29 2016-04-13 Oberthur Technologies Security document and method of verifying same
WO2013057280A1 (en) * 2011-10-19 2013-04-25 Bundesdruckerei Gmbh Method for verifying a security document having a visual barrier, using a display device
WO2013057278A1 (en) * 2011-10-19 2013-04-25 Bundesdruckerei Gmbh Method for verifying a security document using a display device
WO2013178349A1 (en) * 2012-06-01 2013-12-05 Giesecke & Devrient Gmbh Verification of documents of value having a window displaying diffractive structures
CN104364828A (en) * 2012-06-01 2015-02-18 德国捷德有限公司 Verification of documents of value having a window displaying diffractive structures

Also Published As

Publication number Publication date
GB0514701D0 (en) 2005-08-24

Similar Documents

Publication Publication Date Title
US6983048B2 (en) Multi-section decoding lens
JP4695327B2 (en) Security paper and valuable documents created from it
US8351087B2 (en) Authentication with built-in encryption by using moire parallax effects between fixed correlated s-random layers
US6819775B2 (en) Authentication of documents and valuable articles by using moire intensity profiles
TWI455067B (en) Authenticity authentication object, authenticity authentication wafer reading device, authenticity identification method, and pattern reading method
US5284364A (en) Increased-security identification card system
EP1477940B1 (en) Authentication method and system
EP2290620A1 (en) Optically variable security device, and article employing same and method for verifying the authenticity of an article
KR20030019398A (en) System and method for productiion and authentication of original documents
JPH023397A (en) Security card
US20080018097A1 (en) Secure laminated cards
EP1412915A2 (en) Marking articles using a covert digitally watermarked image
EP1825419A2 (en) Authenticating identification and security documents
JP2007505762A (en) Article authentication system and method
US20150244727A1 (en) Method for authenticating a security element by superimposing n shared colour images, and security element implementing said method
EP2183118A1 (en) Single-color screen patterns for copy protection
WO2007010224A1 (en) Visual authentification of optical storage medium
KR20060098329A (en) A financial instrument having indicia related to a security feature thereon
JP7189324B2 (en) anti-counterfeiting document
US20070106476A1 (en) Method and system for forming decoding device
EP1141902B1 (en) Method for marking and authenticating an object
JP2002279480A (en) Image forming body and device for determining authenticity thereof
JP5674127B2 (en) Embossed hologram chip and manufacturing method thereof
JP2011173267A (en) Id card and card case
AU2012100299A4 (en) A polarising device and method for producting a polarising device

Legal Events

Date Code Title Description
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06764982

Country of ref document: EP

Kind code of ref document: A1