WO2007010224A1 - Visual authentification of optical storage medium - Google Patents
Visual authentification of optical storage medium Download PDFInfo
- Publication number
- WO2007010224A1 WO2007010224A1 PCT/GB2006/002640 GB2006002640W WO2007010224A1 WO 2007010224 A1 WO2007010224 A1 WO 2007010224A1 GB 2006002640 W GB2006002640 W GB 2006002640W WO 2007010224 A1 WO2007010224 A1 WO 2007010224A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- members
- storage medium
- data storage
- optical data
- verification image
- Prior art date
Links
- 230000003287 optical effect Effects 0.000 title claims abstract description 36
- 230000000007 visual effect Effects 0.000 title claims abstract description 16
- 238000003860 storage Methods 0.000 title description 6
- 238000013500 data storage Methods 0.000 claims abstract description 33
- 238000012795 verification Methods 0.000 claims abstract description 23
- 238000004806 packaging method and process Methods 0.000 claims description 15
- 239000000976 ink Substances 0.000 claims description 13
- 239000002131 composite material Substances 0.000 claims description 3
- 239000004973 liquid crystal related substance Substances 0.000 claims description 3
- 230000001419 dependent effect Effects 0.000 claims 1
- 238000000034 method Methods 0.000 description 19
- 238000013459 approach Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 239000000758 substrate Substances 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005266 casting Methods 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004049 embossing Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 239000002985 plastic film Substances 0.000 description 1
- 229920006255 plastic film Polymers 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- WFKWXMTUELFFGS-UHFFFAOYSA-N tungsten Chemical compound [W] WFKWXMTUELFFGS-UHFFFAOYSA-N 0.000 description 1
- 229910052721 tungsten Inorganic materials 0.000 description 1
- 239000010937 tungsten Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/128—Viewing devices
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B23/00—Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
- G11B23/38—Visual features other than those contained in record tracks or represented by sprocket holes the visual signals being auxiliary signals
- G11B23/40—Identifying or analogous means applied to or incorporated in the record carrier and not intended for visual display simultaneously with the playing-back of the record carrier, e.g. label, leader, photograph
Definitions
- the invention relates to self-verification apparatus, particularly for use with an optical data storage medium such as a CD or DVD. It is becoming increasingly easier to produce copies of proprietary software provided on optical data storage media such as a CD or DVD as a result of CD and DVD writing devices becoming widely available. As a result of this, software suppliers are providing increasingly sophisticated methods to prevent illegal copying by incorporating anti-copy features into the software. Another approach is to enable counterfeit storage media to be identified by incorporating highly complex security features into the optical data storage media themselves.
- US-A-2004/0255317 describes various methods for incorporating security features in a radially inner, normally unused portion, of a compact disc.
- security features include encrypted, printed serial numbers; digital fingerprints or watermarks; holograms; polarized filters; photo-luminescent coatings (detectable by specially tuned lasers); microscopic taggants, i.e., microscopic markers not found in the base material but added to the base material to indicate the object's origin or authenticity; and radio-frequency identification (RFID) devices.
- RFID radio-frequency identification
- a self-verification apparatus comprising an optical data storage medium provided with a first member of a visual authentication device; and a second member of the visual authentication device fixed to or generated by an article separate from the optical data storage medium whereby when the first and second members are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
- the invention provides a quick way for the average user to establish that there is a link between the first and second members, one of which is provided on or in the optical data storage medium, leading to a reasonable degree of certainty that he is handling a genuine product.
- WO 01/87632 discloses a print feature consisting of an array of dots in which a security pattern or code is produced by displacing some of the dots with respect to the rest. This cannot be seen with the naked eye.
- the pattern can be made visible by viewing through a planar device carrying transparent and opaque areas of the same periodicity as the printed dots.
- WO 97/20298 discloses a method and apparatus for producing Scrambled Indicia®. This process encodes a message or image into an area of print using digital techniques. The message cannot be seen by unaided eye. When the print is viewed using a lenticular screen of the correct characteristics the hidden image/message is revealed. In some cases different images can be seen at different angles of view. Such scrambled indicia can be incorporated into print or into holographic originations. Enschede's microSAM® feature uses screen angle modulation to encode a message or image by modifying the print structure in a manner undetectable by the unaided eye. When the feature is viewed through the correct revealer the hidden message or pattern is seen.
- the revealer in this case is a piece of plastic film ruled with parallel black lines of the correct pitch and thickness.
- WO 01/39138 discloses methods and apparatus for authenticating security documents such as banknotes, passports etc. According to this method, a screen pattern is printed onto a surface. A revealing device is designed so that when it is placed over the printing, it produces a clearly visible message or image caused by the moire effect.
- the revealing screen may be a line structure or a microlens array.
- GB 1407065 describes a security document carrying a pair of metameric inks which match under one illuminant, say North Sky light, but mismatch under another type of illuminant, such as tungsten.
- EP 930979 discloses a self-verifying document and describes a number of methods by which a transparent region on the document can be used to authenticate a document. Microlenses, diffraction gratings, colour filters and moire effects are all referred to.
- the security benefits rely on the fact that when the document is copied the structure of the hidden images are not precisely replicated by the copying process. For example this will occur if the resolution of the original image is significantly greater than the resolution of the device used to replicate the image.
- the article can be supplied separately from the optical data storage medium such that one is equivalent to the known security feature and the other equivalent to the known revealer.
- the article is related to the optical data storage medium.
- the article may comprise packaging for the optical data storage medium.
- the second member may be printed directly or indirectly on the packaging and when the optical data storage medium is removed from the packaging, the two members can be viewed together to check whether the verification image is revealed.
- the first member is provided in or on a transparent portion of the optical storage data medium so that the second member can be viewed through the transparent portion.
- the packaging comprises a transparent window containing the second member so that when the optical data storage medium is packaged, the two members cooperate together to generate the verification image.
- the data stored on the optical data storage medium is to be used on a processor and may for example comprise a software program.
- the second member may be provided as a label attached to a processor with which the optical data storage medium is to be associated.
- a personal computer will typically have an operating system preinstalled and will have a certificate of authenticity applied to its outer case for authentication by the user.
- the computer will also be supplied with a set of DVD's or CD's on which the software associated with the certificate of authenticity is stored, these being supplied as a backup in case the user should need to reinstall the software.
- the label adhered to the computer has a hidden image printed on it which can be verified by the viewer integrated into the optically data storage media.
- the second member could be displayed on a display such as a monitor.
- the display on a monitor could be used simply to verify the optical data storage medium even if it has no connection with any associated processor.
- the second member is computed by the processor in accordance with a preprogramed algorithm. This algorithm may generate the same second member each time it is activated or may vary the second member, for example by taking account of the time of varying parameter.
- the processor can obtain the second member from a remote source, for example via the Internet.
- a purchaser or user of the optical data storage medium could enter an identifier of that storage medium which is communicated to the remote source, the identifier being used as an index to locate the appropriate second member which is then transmitted to the processor for display.
- the identifier being used as an index to locate the appropriate second member which is then transmitted to the processor for display.
- the region of the optical data storage medium with the first member is usually transparent but does not need to be 100% transparent. It will typically allow a level of transmission as the user views the coded image to be decoded through this region. For example one might use a semi-transparent metal layer or a transparent coloured layer.
- the verification image can take a variety of forms but, for ease of recognition, typically comprises one or more of indicia, for example alphanumerics, a graphical device, logos, serial numbers, authentication keys, patterns and the like.
- Figure 1 illustrates schematically a personal computer and associated optical data storage media
- Figure 2 is a plan view of a security label affixed to the housing of the personal computer shown in Figure 1 ;
- Figure 3 illustrates one of the optical data storage media in more detail.
- Figures 4A-4C illustrate first and second members of another example of a visual authentication device and the combined members respectively; and, Figures 5A-5C and 6A-6C are views similar to Figures 4A-4C respectively but of third and fourth examples of visual authentication devices.
- FIG 1 shows a security label 1 applied to the housing 2 of a personal computer.
- the security label 1 shown in detail in Figure 2, is a certificate of authenticity for the operating systems pre-installed on the computer by the computer manufacturer.
- the security label 1 comprises a security substrate 3 having a security thread 4 and optionally other embedded security features (not shown).
- the secure substrate 3 is printed with a range of security features including a hidden image feature such as Scrambled Indicia® 5 forming a "second member" of a visual authentication device.
- Scrambled Indicia® is a technology developed and marketed by Graphic Security Systems Corp and has been widely used on a range of security applications previously. See also WO97/20298.
- the security label 1 has also been provided with an identifier, for example a barcode 6 and a serial number 7.
- the identifier can be used by an inspector to authenticate the validity of the label 1.
- the identifier can also be used by the software owner to validate, or unlock the software application. Alternatively the identifier might be required to access on line help, updates and upgrades to the software.
- the computer is supplied with one or more back up CD's or DVD's 10, one of which is shown in detail in Figure 3. These can be used in the event the operating system should need to be reinstalled.
- the revealer 12 has been integrated directly into the CD/DVD during the manufacture of the CD/DVD.
- the revealer comprises a lens structure which can be formed by embossing.
- An example is described in WO-A-97/20298. It is therefore relatively straightforward to modify the stamping device used to emboss CD/DVD's to incorporate a revealer device in the inner ring region 14 that is not normally embossed.
- the CD/DVD 10 can then be used to authenticate the label 1 attached to the CD/DVD 10
- the revealer during the stamping process of the CD/DVD 10 is may be applied subsequently in a separate process.
- it may be applied as a transparent label, by a casting process or by a relief printing process.
- Other methods are described in US-A-2004/0255317.
- the revealer in the inner ring 14 could be a combination of a scrambled indicia lens structure and a metameric (e.g. red) filter. Such a device would be capable of decoding or revealing both a metameric hidden image and a scrambled indicia hidden image. Alternatively the hidden image could be a complex combination of the metameric and scrambled indicia features.
- the revealer could be a combination of two lens structures interlocked and thus capable of unlocking two different codes.
- interlocked we mean the two lens structures are interleaved or superposed upon each other in some way. If the two structures are carefully selected and superposed correctly then it is possible to use a single revealer to reveal two differently encoded images.
- the revealer could be used to reveal a hidden image that is concealed within a holographic or diffractive element in a similar manner to the previously described hidden images.
- the hidden image could be concealed within a demetallisation pattern.
- the demetallisation essentially being equivalent to the printed structures referred to earlier.
- the revealer could comprise both left and right light polarising segments that can then be used to view a liquid crystal ink feature.
- liquid crystal ink features can be printed with SICPA Oasis inks.
- the ink is available in both right and left handed forms so can be used to produce hidden features.
- the revealer 12 in the inner ring 14 could comprise a microlens array which when placed overthe hidden image magnifies or reconstructs information.
- Othertypes of lens could be used e.g. simple magnifiers, or fresnel lenses.
- Composite verification images could be used, generated in accordance with the techniques described in PCT/GB05/01640.
- the current invention is not limited to the use of Scrambled Indicia® but could make use of many different hidden feature and revealer technologies.
- the revealer can be printed (instead of embossed) on to the CD. This printing step can be done later in the replication process. Additionally this presents the opportunity for each label to carry a unique pattern that requires a unique decoder. This would further enhance the security of the invention.
- Figure 4A illustrates a document or item of packaging 30 carrying an area of print 31 within which is hidden an image, for example using the Scrambled Indicia process.
- Figure 4B illustrates a CD or DVD 32 with a revealer 33 provided in an inner, transparent ring portion.
- Figure 4C illustrates the result of overlaying the CD/DVD 32 on the document or packaging 30 with the revealer 33 located so that the hidden image 34 is revealed and the message can be read.
- packaging it will be understood that if the area of print 31 is provided in a transparent window of the packaging 30 then it can be arranged such that the message or hidden image 34 can be viewed while the CD/DVD is in its packaged condition. This provides an indication of authenticity. In that case, it is usually necessary for a window to be provided on the opposite surface of the packaging to that carrying the print 31 so that a light path exists through both leaves of the packaging and the inner ring 33 of the CD/DVD.
- Figures 5A and 5B illustrate a first member and a second member respectively of a visual authentication device, utilising a metameric effect.
- the first member 40 ( Figure 5A) is printed using a pair of metameric inks which appear indistinguishable to the naked eye.
- this metameric print is viewed through a revealer 42, the two inks can be distinguished and a serial number 44 provided using one of the inks ( Figure 5C) can be revealed.
- the revealer or filter 42 could be provided in the inner ring of the CD as a printed or dyed region.
- a hidden image 50 (Figure 6A) is created by first printing a background line pattern 52 of a given frequency. Onto this is superposed a message comprising letters made up of a line screen having the same frequency as that of the background but shifted to the left slightly.
- the revealer 54 is also a line screen of the same frequency and by lining up the revealer 54 correctly with the hidden image 50, the term VALID appears ( Figure 6C).
- Figure 6C a hidden image 50
Abstract
Self-verification apparatus comprises an optical data storage medium (10) provided with a first member (12) of a visual authentication device. A second member (5) of the visual authentication device is fixed to or generated by an article (2) separate from the optical data storage medium. When the first and second members (12, 5) are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
Description
VISUAL AUTHENTIPICATION OF OPTICAL STORAGE MEDIUM
The invention relates to self-verification apparatus, particularly for use with an optical data storage medium such as a CD or DVD. It is becoming increasingly easier to produce copies of proprietary software provided on optical data storage media such as a CD or DVD as a result of CD and DVD writing devices becoming widely available. As a result of this, software suppliers are providing increasingly sophisticated methods to prevent illegal copying by incorporating anti-copy features into the software. Another approach is to enable counterfeit storage media to be identified by incorporating highly complex security features into the optical data storage media themselves.
For example, US-A-2004/0255317 describes various methods for incorporating security features in a radially inner, normally unused portion, of a compact disc. Examples of these security features include encrypted, printed serial numbers; digital fingerprints or watermarks; holograms; polarized filters; photo-luminescent coatings (detectable by specially tuned lasers); microscopic taggants, i.e., microscopic markers not found in the base material but added to the base material to indicate the object's origin or authenticity; and radio-frequency identification (RFID) devices.
The problem with these approaches is that it is not easy for the average user to determine whether or not he has been given a counterfeit product. Special devices are usually required to analyse the security feature or they need to be viewed by highly skilled personnel.
There is a need therefore for a relatively straightforward method to enable average users to be able to readily detect counterfeit optical data storage media. In accordance with the present invention, we provide a self-verification apparatus comprising an optical data storage medium provided with a first member of a visual authentication device; and a second member of the visual authentication device fixed to or generated by an article separate from the optical data storage medium whereby when the first and second members are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
We have realised that a fair degree of reassurance can be provided to a user that he is in possession of a genuine optical data storage medium by utilising a relatively simple authentication device rather than the highly complex devices of the prior art. It is recognised that a sophisticated counterfeiter might be able to produce
apparently genuine counterfeit copies but the present invention is not intended to prevent this but rather deal with slightly less sophisticated copying by providing a system which is not straightforward for the average person to duplicate.
Essentially, the invention provides a quick way for the average user to establish that there is a link between the first and second members, one of which is provided on or in the optical data storage medium, leading to a reasonable degree of certainty that he is handling a genuine product.
The concept of a two-part visual authentication device is known and there are many conventional methods of achieving this. All of these are suitable for use in the present invention. Typically, these are utilised in the context of revealing a hidden image in a security printed document or the like using a handheld viewer or revealer. The hidden images and the type of revealer can take several forms. The following approaches are described in the prior art.
WO 01/87632 discloses a print feature consisting of an array of dots in which a security pattern or code is produced by displacing some of the dots with respect to the rest. This cannot be seen with the naked eye. The pattern can be made visible by viewing through a planar device carrying transparent and opaque areas of the same periodicity as the printed dots.
WO 97/20298 discloses a method and apparatus for producing Scrambled Indicia®. This process encodes a message or image into an area of print using digital techniques. The message cannot be seen by unaided eye. When the print is viewed using a lenticular screen of the correct characteristics the hidden image/message is revealed. In some cases different images can be seen at different angles of view. Such scrambled indicia can be incorporated into print or into holographic originations. Enschede's microSAM® feature uses screen angle modulation to encode a message or image by modifying the print structure in a manner undetectable by the unaided eye. When the feature is viewed through the correct revealer the hidden message or pattern is seen. The revealer in this case is a piece of plastic film ruled with parallel black lines of the correct pitch and thickness. WO 01/39138 discloses methods and apparatus for authenticating security documents such as banknotes, passports etc. According to this method, a screen pattern is printed onto a surface. A revealing device is designed so that when it is placed over the printing, it produces a clearly visible message or image caused by the moire effect. The revealing screen may be a line structure or a microlens array.
GB 1407065 describes a security document carrying a pair of metameric inks which match under one illuminant, say North Sky light, but mismatch under another type of illuminant, such as tungsten. For such a set of inks it is also possible to see a difference in the appearance of the two pairs of such inks by viewing under coloured filters. Commonly, a red filter is used for viewing features. Any mismatch in the absence of a viewer is hidden by overprinting the ink pair by a discontinuous red print design which drops out under the filter.
EP 930979 discloses a self-verifying document and describes a number of methods by which a transparent region on the document can be used to authenticate a document. Microlenses, diffraction gratings, colour filters and moire effects are all referred to.
In all the above effects the security benefits rely on the fact that when the document is copied the structure of the hidden images are not precisely replicated by the copying process. For example this will occur if the resolution of the original image is significantly greater than the resolution of the device used to replicate the image.
In some applications of the invention, the article can be supplied separately from the optical data storage medium such that one is equivalent to the known security feature and the other equivalent to the known revealer. However, in particular preferred aspects of the current invention, the article is related to the optical data storage medium. For example, the article may comprise packaging for the optical data storage medium. In this case, the second member may be printed directly or indirectly on the packaging and when the optical data storage medium is removed from the packaging, the two members can be viewed together to check whether the verification image is revealed. In the preferred approach, the first member is provided in or on a transparent portion of the optical storage data medium so that the second member can be viewed through the transparent portion.
Thus a revealer on the optical data storage medium can be used to authenticate the certificate of authenticity or fiscal stamp applied to the packaging supplied with the optical storage medium. In another approach, the packaging comprises a transparent window containing the second member so that when the optical data storage medium is packaged, the two members cooperate together to generate the verification image. Thus, the purchaser will see the verification image at the time of purchase and it will disappear when the optical data storage medium is removed from the packaging.
In other examples, the data stored on the optical data storage medium is to be used on a processor and may for example comprise a software program. In that event, the second member may be provided as a label attached to a processor with which the optical data storage medium is to be associated. For example a personal computer will typically have an operating system preinstalled and will have a certificate of authenticity applied to its outer case for authentication by the user. The computer will also be supplied with a set of DVD's or CD's on which the software associated with the certificate of authenticity is stored, these being supplied as a backup in case the user should need to reinstall the software. In this instance the label adhered to the computer has a hidden image printed on it which can be verified by the viewer integrated into the optically data storage media.
Alternatively the second member could be displayed on a display such as a monitor. Of course, the display on a monitor could be used simply to verify the optical data storage medium even if it has no connection with any associated processor. In one approach, the second member is computed by the processor in accordance with a preprogramed algorithm. This algorithm may generate the same second member each time it is activated or may vary the second member, for example by taking account of the time of varying parameter. Thus, in the case of game playing software, the time varying parameter may vary according to the state of the game. In an alternative approach, the processor can obtain the second member from a remote source, for example via the Internet. Thus, a purchaser or user of the optical data storage medium could enter an identifier of that storage medium which is communicated to the remote source, the identifier being used as an index to locate the appropriate second member which is then transmitted to the processor for display. In all these preferred aspects, it will be understood that it is not necessary to supply a separate "revealer" since the optical data storage medium and the article are associated with each other.
The region of the optical data storage medium with the first member is usually transparent but does not need to be 100% transparent. It will typically allow a level of transmission as the user views the coded image to be decoded through this region. For example one might use a semi-transparent metal layer or a transparent coloured layer.
The verification image can take a variety of forms but, for ease of recognition, typically comprises one or more of indicia, for example alphanumerics, a graphical device, logos, serial numbers, authentication keys, patterns and the like.
Some examples of self-verification apparatus according to the invention will now be described with reference to the accompanying drawings, in which:
Figure 1 illustrates schematically a personal computer and associated optical data storage media; Figure 2 is a plan view of a security label affixed to the housing of the personal computer shown in Figure 1 ;
Figure 3 illustrates one of the optical data storage media in more detail. Figures 4A-4C illustrate first and second members of another example of a visual authentication device and the combined members respectively; and, Figures 5A-5C and 6A-6C are views similar to Figures 4A-4C respectively but of third and fourth examples of visual authentication devices.
Figure 1 shows a security label 1 applied to the housing 2 of a personal computer. The security label 1 , shown in detail in Figure 2, is a certificate of authenticity for the operating systems pre-installed on the computer by the computer manufacturer. The security label 1 comprises a security substrate 3 having a security thread 4 and optionally other embedded security features (not shown). The secure substrate 3 is printed with a range of security features including a hidden image feature such as Scrambled Indicia® 5 forming a "second member" of a visual authentication device. Scrambled Indicia® is a technology developed and marketed by Graphic Security Systems Corp and has been widely used on a range of security applications previously. See also WO97/20298. The security label 1 has also been provided with an identifier, for example a barcode 6 and a serial number 7. The identifier can be used by an inspector to authenticate the validity of the label 1. The identifier can also be used by the software owner to validate, or unlock the software application. Alternatively the identifier might be required to access on line help, updates and upgrades to the software.
The computer is supplied with one or more back up CD's or DVD's 10, one of which is shown in detail in Figure 3. These can be used in the event the operating system should need to be reinstalled. A revealer 12 for the Scrambled Indicia® 5, forming a "first member" of the visual authentication device, is integrated into one or more of the CD's or DVD's in a transparent inner ring region 14. In this example the revealer 12 has been integrated directly into the CD/DVD during the manufacture of the CD/DVD. Forthe Scrambled Indicia® feature 5 the revealer comprises a lens structure which can be formed by embossing. An example is described in WO-A-97/20298. It is therefore relatively straightforward to modify the stamping device used to emboss
CD/DVD's to incorporate a revealer device in the inner ring region 14 that is not normally embossed.
The CD/DVD 10 can then be used to authenticate the label 1 attached to the
PC housing 2. The user simply takes the CD/DVD 10 and places it such that the transparent inner ring region 14 containing the revealer 12 is over the Scrambled
Indicia 5 on the label 1. When the Scrambled Indicia® is viewed through the revealer an image, message or code is revealed constituting a verification image.
As an alternative to forming the revealer during the stamping process of the CD/DVD 10 is may be applied subsequently in a separate process. For example it may be applied as a transparent label, by a casting process or by a relief printing process. Other methods are described in US-A-2004/0255317.
A variety of other visual authentication devices could be used.
1. The revealer in the inner ring 14 could be a combination of a scrambled indicia lens structure and a metameric (e.g. red) filter. Such a device would be capable of decoding or revealing both a metameric hidden image and a scrambled indicia hidden image. Alternatively the hidden image could be a complex combination of the metameric and scrambled indicia features.
2. As a further development of 1 above the revealer could be a combination of two lens structures interlocked and thus capable of unlocking two different codes. By interlocked we mean the two lens structures are interleaved or superposed upon each other in some way. If the two structures are carefully selected and superposed correctly then it is possible to use a single revealer to reveal two differently encoded images.
3. The revealer could be used to reveal a hidden image that is concealed within a holographic or diffractive element in a similar manner to the previously described hidden images. Alternatively, the hidden image could be concealed within a demetallisation pattern. The demetallisation essentially being equivalent to the printed structures referred to earlier.
4. The revealer could comprise both left and right light polarising segments that can then be used to view a liquid crystal ink feature. Such liquid crystal ink features can be printed with SICPA Oasis inks. The ink is available in both right and left handed forms so can be used to produce hidden features.
5. The revealer 12 in the inner ring 14 could comprise a microlens array which when placed overthe hidden image magnifies or reconstructs information. Othertypes of lens could be used e.g. simple magnifiers, or fresnel lenses.
6. Composite verification images could be used, generated in accordance with the techniques described in PCT/GB05/01640.
As can be seen therefore, the current invention is not limited to the use of Scrambled Indicia® but could make use of many different hidden feature and revealer technologies. Where a metameric, dot screen or line screen approach is used the revealer can be printed (instead of embossed) on to the CD. This printing step can be done later in the replication process. Additionally this presents the opportunity for each label to carry a unique pattern that requires a unique decoder. This would further enhance the security of the invention. Some further examples of apparatus according to the invention will now be described.
Figure 4A illustrates a document or item of packaging 30 carrying an area of print 31 within which is hidden an image, for example using the Scrambled Indicia process. Figure 4B illustrates a CD or DVD 32 with a revealer 33 provided in an inner, transparent ring portion.
Figure 4C illustrates the result of overlaying the CD/DVD 32 on the document or packaging 30 with the revealer 33 located so that the hidden image 34 is revealed and the message can be read. In the case of packaging, it will be understood that if the area of print 31 is provided in a transparent window of the packaging 30 then it can be arranged such that the message or hidden image 34 can be viewed while the CD/DVD is in its packaged condition. This provides an indication of authenticity. In that case, it is usually necessary for a window to be provided on the opposite surface of the packaging to that carrying the print 31 so that a light path exists through both leaves of the packaging and the inner ring 33 of the CD/DVD.
Figures 5A and 5B illustrate a first member and a second member respectively of a visual authentication device, utilising a metameric effect. Thus, the first member 40 (Figure 5A) is printed using a pair of metameric inks which appear indistinguishable to the naked eye. However, when this metameric print is viewed through a revealer 42, the two inks can be distinguished and a serial number 44 provided using one of the inks (Figure 5C) can be revealed. In the case of the CD/DVD application, the revealer or filter 42 could be provided in the inner ring of the CD as a printed or dyed region.
In the Figure 6 example, a hidden image 50 (Figure 6A) is created by first printing a background line pattern 52 of a given frequency. Onto this is superposed a message comprising letters made up of a line screen having the same frequency as
that of the background but shifted to the left slightly. The revealer 54 is also a line screen of the same frequency and by lining up the revealer 54 correctly with the hidden image 50, the term VALID appears (Figure 6C). Of course other methods are possible including the use of multiple line frequencies, dots instead of lines, or more complex screen techniques.
Claims
1. Self-verification apparatus comprising an optical data storage medium provided with a first member of a visual authentication device; and a second member of the visual authentication device fixed to or generated by an article separate from the optical data storage medium whereby when the first and second members are viewed together, they cooperate to present a verification image to a viewer, the verification image not being visible when the first and second members are viewed separately.
2. Apparatus according to claim 1 , wherein one of the members of the visual authentication device comprises one or more lens structures, for example microlens array(s), and the other member comprises one or more corresponding verification images encoded into a background.
3. Apparatus according to claim 1 or claim 2, wherein one of the members includes one or more colour filters and the other of the members comprises multiple coloured indicia chosen such that when viewed through the one member only certain portions of the indicia are visible so as to define the verification image.
4. Apparatus according to any of the preceding claims, wherein one of the members provides a first part of a composite verification image and the other of the members provides a second part of the composite verification image.
5. Apparatus according to any of the preceding claims, wherein one of the members comprises respectively left and right polarising segments, and the other of the members comprises a corresponding arrangement of left and right polarised liquid crystal inks.
6. Apparatus according to any of the preceding claims, wherein one of the members includes a colour filter and the other of the members comprises one or more metameric inks.
7. Apparatus according to any of claims 2 to 6, wherein the one of the members is provided by the first member and the other of the members is provided by the second member.
8. Apparatus according to any of the preceding claims, wherein the first member is provided on or in a transparent part of the optical data storage medium so that the second member can be viewed through the transparent portion.
9. Apparatus according to any of claims 1 to 4, or claim 7 or claim 8 when dependent on any of claims 1 to 4, wherein the article comprises an electronic display on which the second member can be displayed.
10. Apparatus according to claim 9, wherein the display is coupled to a processor that computes the second member in accordance with a preprogramed algorithm.
11. Apparatus according to claim 101 wherein the preprogramed algorithm takes account of a time varying parameter.
12. Apparatus according to claim 10 or claim 11 , wherein the time varying parameter varies according to a game played using the processor.
13. Apparatus according to claim 9, wherein the display is coupled to a processor that obtains data defining the second member from a remote source, for example via the Internet.
14. Apparatus according to any of claims 1 to 8, wherein the second member is printed directly or indirectly on the article.
15. Apparatus according to claim 14, wherein the second member is printed on a label affixed to the article.
16. Apparatus according to any of claims 1 to 8, 14 or 15, wherein the article comprises packaging for the optical data storage medium.
17. Apparatus according to claim 16, wherein the packaging includes a transparent window within which the second member is provided.
18. Apparatus according to claim 17, wherein the optical data storage medium is located in the packaging with the first and second members aligned so that the verification image is visible from outside the package.
19. Apparatus according to any of claims 1 to 15, wherein the article comprises a processor storing software, the optical data storage medium storing a back-up version of the software.
20. Apparatus according to any of the preceding claims, wherein the verification image comprises one or more of indicia, for example alphanumerics, a graphical device, logos, serial numbers, authentication keys and patterns.
21. Apparatus according to any of the preceding claims, wherein the optical data storage medium comprises one of a CD and DVD.
22. Apparatus according to claim 21 , wherein the first member is provided in or on a radially inner, annular portion of the CD or DVD.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0514701.2 | 2005-07-18 | ||
GBGB0514701.2A GB0514701D0 (en) | 2005-07-18 | 2005-07-18 | Decoding device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007010224A1 true WO2007010224A1 (en) | 2007-01-25 |
Family
ID=34897386
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2006/002640 WO2007010224A1 (en) | 2005-07-18 | 2006-07-17 | Visual authentification of optical storage medium |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB0514701D0 (en) |
WO (1) | WO2007010224A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009019038A1 (en) * | 2007-08-09 | 2009-02-12 | Giesecke & Devrient Gmbh | Verification of security elements with windows |
FR2947211A1 (en) * | 2009-06-29 | 2010-12-31 | Oberthur Technologies | SECURITY DOCUMENT AND VERIFICATION METHOD OF THIS DOCUMENT |
WO2013057280A1 (en) * | 2011-10-19 | 2013-04-25 | Bundesdruckerei Gmbh | Method for verifying a security document having a visual barrier, using a display device |
WO2013057278A1 (en) * | 2011-10-19 | 2013-04-25 | Bundesdruckerei Gmbh | Method for verifying a security document using a display device |
WO2013178349A1 (en) * | 2012-06-01 | 2013-12-05 | Giesecke & Devrient Gmbh | Verification of documents of value having a window displaying diffractive structures |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996000446A1 (en) * | 1994-06-24 | 1996-01-04 | Minnesota Mining And Manufacturing Company | Marking of optical disc for customized identification |
US5708717A (en) * | 1995-11-29 | 1998-01-13 | Alasia; Alfred | Digital anti-counterfeiting software method and apparatus |
US6062604A (en) * | 1996-10-10 | 2000-05-16 | Securency Pty Ltd. | Self-verifying security documents |
WO2000029878A1 (en) * | 1998-11-13 | 2000-05-25 | Rolic Ag | Optical component |
US20020106102A1 (en) * | 2000-12-08 | 2002-08-08 | Au Oscar Chi-Lim | Methods and apparatus for hiding data in halftone images |
US20030039195A1 (en) * | 2001-08-07 | 2003-02-27 | Long Michael D. | System and method for encoding and decoding an image or document and document encoded thereby |
US20030223100A1 (en) * | 2002-05-30 | 2003-12-04 | Anderson Michael Jay | Disk with holographic security label applied thereto and method of applying label |
US20040001604A1 (en) * | 2002-06-28 | 2004-01-01 | Isaac Amidror | Authentication with built-in encryption by using moire intensity profiles between random layers |
EP1434210A2 (en) * | 2002-12-18 | 2004-06-30 | Ricoh Company | Optical recording medium with visible pattern formed in rom area |
US20050069170A1 (en) * | 2003-09-30 | 2005-03-31 | Alasia Alfred V. | Method and system for encoding images using encoding parameters from multiple sources |
-
2005
- 2005-07-18 GB GBGB0514701.2A patent/GB0514701D0/en not_active Ceased
-
2006
- 2006-07-17 WO PCT/GB2006/002640 patent/WO2007010224A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996000446A1 (en) * | 1994-06-24 | 1996-01-04 | Minnesota Mining And Manufacturing Company | Marking of optical disc for customized identification |
US5708717A (en) * | 1995-11-29 | 1998-01-13 | Alasia; Alfred | Digital anti-counterfeiting software method and apparatus |
US6062604A (en) * | 1996-10-10 | 2000-05-16 | Securency Pty Ltd. | Self-verifying security documents |
WO2000029878A1 (en) * | 1998-11-13 | 2000-05-25 | Rolic Ag | Optical component |
US20020106102A1 (en) * | 2000-12-08 | 2002-08-08 | Au Oscar Chi-Lim | Methods and apparatus for hiding data in halftone images |
US20030039195A1 (en) * | 2001-08-07 | 2003-02-27 | Long Michael D. | System and method for encoding and decoding an image or document and document encoded thereby |
US20030223100A1 (en) * | 2002-05-30 | 2003-12-04 | Anderson Michael Jay | Disk with holographic security label applied thereto and method of applying label |
US20040001604A1 (en) * | 2002-06-28 | 2004-01-01 | Isaac Amidror | Authentication with built-in encryption by using moire intensity profiles between random layers |
EP1434210A2 (en) * | 2002-12-18 | 2004-06-30 | Ricoh Company | Optical recording medium with visible pattern formed in rom area |
US20050069170A1 (en) * | 2003-09-30 | 2005-03-31 | Alasia Alfred V. | Method and system for encoding images using encoding parameters from multiple sources |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009019038A1 (en) * | 2007-08-09 | 2009-02-12 | Giesecke & Devrient Gmbh | Verification of security elements with windows |
FR2947211A1 (en) * | 2009-06-29 | 2010-12-31 | Oberthur Technologies | SECURITY DOCUMENT AND VERIFICATION METHOD OF THIS DOCUMENT |
EP2275279A1 (en) * | 2009-06-29 | 2011-01-19 | Oberthur Technologies | Security document and method of verifying same |
EP2275279B1 (en) | 2009-06-29 | 2016-04-13 | Oberthur Technologies | Security document and method of verifying same |
WO2013057280A1 (en) * | 2011-10-19 | 2013-04-25 | Bundesdruckerei Gmbh | Method for verifying a security document having a visual barrier, using a display device |
WO2013057278A1 (en) * | 2011-10-19 | 2013-04-25 | Bundesdruckerei Gmbh | Method for verifying a security document using a display device |
WO2013178349A1 (en) * | 2012-06-01 | 2013-12-05 | Giesecke & Devrient Gmbh | Verification of documents of value having a window displaying diffractive structures |
CN104364828A (en) * | 2012-06-01 | 2015-02-18 | 德国捷德有限公司 | Verification of documents of value having a window displaying diffractive structures |
Also Published As
Publication number | Publication date |
---|---|
GB0514701D0 (en) | 2005-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6983048B2 (en) | Multi-section decoding lens | |
JP4695327B2 (en) | Security paper and valuable documents created from it | |
US8351087B2 (en) | Authentication with built-in encryption by using moire parallax effects between fixed correlated s-random layers | |
US6819775B2 (en) | Authentication of documents and valuable articles by using moire intensity profiles | |
TWI455067B (en) | Authenticity authentication object, authenticity authentication wafer reading device, authenticity identification method, and pattern reading method | |
US5284364A (en) | Increased-security identification card system | |
EP1477940B1 (en) | Authentication method and system | |
EP2290620A1 (en) | Optically variable security device, and article employing same and method for verifying the authenticity of an article | |
KR20030019398A (en) | System and method for productiion and authentication of original documents | |
JPH023397A (en) | Security card | |
US20080018097A1 (en) | Secure laminated cards | |
EP1412915A2 (en) | Marking articles using a covert digitally watermarked image | |
EP1825419A2 (en) | Authenticating identification and security documents | |
JP2007505762A (en) | Article authentication system and method | |
US20150244727A1 (en) | Method for authenticating a security element by superimposing n shared colour images, and security element implementing said method | |
EP2183118A1 (en) | Single-color screen patterns for copy protection | |
WO2007010224A1 (en) | Visual authentification of optical storage medium | |
KR20060098329A (en) | A financial instrument having indicia related to a security feature thereon | |
JP7189324B2 (en) | anti-counterfeiting document | |
US20070106476A1 (en) | Method and system for forming decoding device | |
EP1141902B1 (en) | Method for marking and authenticating an object | |
JP2002279480A (en) | Image forming body and device for determining authenticity thereof | |
JP5674127B2 (en) | Embossed hologram chip and manufacturing method thereof | |
JP2011173267A (en) | Id card and card case | |
AU2012100299A4 (en) | A polarising device and method for producting a polarising device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06764982 Country of ref document: EP Kind code of ref document: A1 |