PRODUCT AUTHENTICATION METHOD
20170186262 ยท 2017-06-29
Inventors
- Francesco CELANTE (Treviso, IT)
- Davide TORRESIN (Colfosco, IT)
- Renzo TAFFARELLO (Treviso, IT)
- Takeo MIYAZAWA (Mitaka City, Tokyo, JP)
- Akiteru KIMURA (Hachioji, Tokyo, JP)
- Chetan Arora (New Delhi, IN)
- Tetsuya OKADA (Nagoya City, Aichi, JP)
Cpc classification
G06V10/75
PHYSICS
G07D7/2033
PHYSICS
G06V20/80
PHYSICS
G07D7/2041
PHYSICS
International classification
Abstract
Authentication method that provides: to make an authentication device, randomly attaching a plurality of reflecting particles, such as glitter, on a support; a first step of acquiring, with an optical acquisition device, at least two first images of the authentication device, the two first images each being acquired according to different lighting conditions; a first step of encoding each of the two first images in order to determine at least a first identifying indicator to be attributed to the authentication device.
Claims
1. Authentication method that provides: to make an authentication device, randomly attaching a plurality of particles reflecting in three dimensions, such as glitter, on a support; a first step of acquiring, with an optical acquisition device, at least two first images of said authentication device, said two first images each being acquired according to different lighting conditions and each of said first images reproducing, in a different way, the disposition of reflection points of some of said particles that have reflected the light after the specific lighting condition; a first step of encoding each of said two first images in order to determine, as a function of the disposition of said reflection points of said first images, at least a first identifying indicator to be attributed to said authentication device, a subsequent second step of acquiring at least two second images of said authentication device, each of said second images being detected with different lighting conditions, and each of said second images reproducing, in a different way, the disposition of reflection points of some of said particles that have reflected the light after the specific lighting condition; a second step of encoding each of said two second images in order to determine, as a function of the disposition of said reflection points of said second images, a second identifying indicator; a comparison between said second identifying indicator with at least some data relating to said first identifying indicator in order to verify the authenticity of said authentication device.
2. Method as in claim 1, wherein determining said first identifying indicator provides to evaluate a plurality of components each of which is correlated at least to one of said two first images.
3. Method as in claim 1, wherein said first identifying indicator is memorized in a data base.
4. Method as in claim 1, wherein it comprises making on said support at least one identifying element that is optically detectable and contains data relating to said first identifying indicator.
5. Method as in claim 4, wherein said identifying element is chosen from a group comprising barcodes, two-dimensional barcodes, OCR, original designs, or a possible combination thereof.
6. Method as in claim 1, wherein said support comprises a security label on which said plurality of reflecting particles is attached.
7. Method as in claim 1, wherein during said first encoding step and said second encoding step the determination is provided of Cartesian coordinates (x, y) of said reflection points of the reflecting particles.
8. Method as in claim 1, wherein during said comparison between the data relating to said first identifying indicator and said second identifying indicator, an acceptance sequence and a non-acceptance sequence of said authentication device are also provided, said acceptance sequence calculating an acceptance score to be integrated in an integrated acceptance score, said non-acceptance sequence calculating a non-acceptance score to be integrated in an integrated non-acceptance score.
9. Method as in claim 1, wherein it comprises a step of making a marker element on said support, and in that during the acquisition of said at least two second images an optical acquisition device detects said marker element in order to identify at least the area in which said reflecting particles are attached, and the reciprocal position between said authentication device and said optical acquisition device.
10. Method as in claim 9, wherein said acceptance sequence performs a verification of whether said integrated acceptance score exceeds an acceptance limit or whether said non-acceptance score exceeds a non-acceptance limit, in that if said integrated acceptance score exceeds said acceptance limit, the result of the authentication process gives a positive authentication result of said authentication device, and in that if said integrated non-acceptance score exceeds said non-acceptance limit, it gives a negative authentication result of said authentication device.
11. Method as in claim 8, wherein during said second encoding step it provides to calculate the distance of a respective optical acquisition device from said authentication device.
12. Method as in claim 1, wherein it comprises a step of making a marker element on said support, and in that during the acquisition of said at least two second images, an optical acquisition device detects said marker element in order to identify at least the area in which said reflecting particles are attached, and the reciprocal position between said authentication device and said optical acquisition device.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0055] These and other characteristics of the present invention will become apparent from the following description of some forms of embodiment, given as a non-restrictive example with reference to the attached drawings wherein:
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067] To facilitate comprehension, the same reference numbers have been used, where possible, to identify identical common elements in the drawings. It is understood that elements and characteristics of one form of embodiment can conveniently be incorporated into other forms of embodiment without further clarifications.
DETAILED DESCRIPTION OF SOME FORMS OF EMBODIMENT
[0068] The present invention concerns a low-cost and high-reliability authentication method using printing and encoding of glitter of an authentication device 10.
[0069] It is assumed that the printed mean is a glitter or something that has similar characteristics.
[0070] The properties of glitter are defined as follows: [0071] reflecting particles with a random distribution in at least two dimensions; [0072] random reflection in three dimensions.
[0073] Thanks to these properties it is technically impossible to create a copy of the glitter pattern.
[0074] The properties of glitter can be described from the 2D distribution of the reflecting particles, that can be observed by means of an optical acquisition device 12 or camera, and a lighting system 16.
[0075] Identification can be obtained by collating the photographed pattern with the reference pattern. The verification can occur either on-line via web, or off-line, locally.
[0076] The anti-counterfeiting can be guaranteed by the difficulty of completely reproducing the pattern.
[0077] With the present invention it is possible to supply an authentication method that provides to use a pattern defined by glitter which consists in the result of a series of printing, depositing or mixing methods that use reflecting metal particles or similar and a fixative.
[0078] The particles used are provided with reflecting surfaces, whose orientation on three dimensions and whose disposition essentially on two dimensions is random, and for this reason the pattern of reflection is likewise random and depends on the lighting conditions.
[0079] The glitter printing, depositing or mixing techniques are not properly special technologies, since there are many which have been developed to satisfy various specific requirements, and nowadays the production systems which use these techniques are stable and low cost.
[0080] From the security point of view, the characteristics of the patterns of glitter combine well with anti-counterfeiting requirements, thanks to their randomness and variation depending on the lighting, as described hereafter, together with the low cost of production. This advantageous combination should therefore allow to expand the field of applications of glitter as a security system.
[0081] In the current state of the art, reference is exclusively made to the randomness of a glitter pattern, but not to the relative dependence and relative change as a function of the lighting conditions at the instant the image is captured, which, on the contrary, is a decisive factor for protecting against counterfeiting and copying. Moreover, no methods or processes to acquire images of glitter are known. However, the acquisition of a glitter pattern and its variation in relation to the lighting conditions require high precision and a well-defined method to establish these variations.
[0082] In other words, a simple digital acquisition of a random glitter pattern, as described in the state of the art, does not constitute a real authentication system, not even from a practical point of view, and it is susceptible to copying. Purpose of the present invention is to supply an authentication method by capturing the randomness of the glitter pattern and the corresponding variation from a practical point of view, without which the use of glitter as protection from tampering would have no meaning.
[0083] Signature Value and their Type, Reference and Collation Values
[0084] The group of identifying signs of glitter on a support 17, also known as glitter indicia, involve a multiplicity of patterns, the variations of which are innumerable, since they involve reflections in three dimensions from particles distributed on a surface on which they are applied, or on a volume referable to a surface.
[0085] This means that the use of an authentication method by image-image collation needs an enormous amount of data, entailing very complicated verification calculations, very accurate acquisition of the images and costs of the overall system which are too high.
[0086] Consequently, one of the intentions of the present invention is to supply an authentication method which is simple and reliable.
[0087] This and other purposes and advantages are obtained by implementing an authentication method that provides to: [0088] introduce an encoding technology of the glitter pattern obtained from an acquired image to determine a first identifying indicator, or Signature value, so that the authentication is carried out by collation between value and value; the signature value can be evaluated following the production of the device and will supply a possible comparison limit for the operations to authenticate the glitter; [0089] possibly introduce a Reference Value, which in some solutions corresponds with the first identifying indicator; this indicator can also be implemented after the production of the glitter and this too can be used for the authentication collations of the authentication device; [0090] introduce a second identifying indicator, or Collation value, used to compare it directly or indirectly with the first identifying indicator, or if appropriate, with the Reference Value to confirm or not the authenticity of the authentication device.
[0091] Multiple Acquisition to Encode the Glitter Pattern
[0092] The method according to the present invention provides to acquire at least two images of the authentication device 10, to obtain the Reference Value that, in possible formulations of the present invention, can comprise a plurality of Reference Value components.
[0093] Introducing the Reference Value components, as representation of the same indicia of the glitter, that is, the same identifying signs as the glitter, it becomes impossible to copy or imitate the pattern in two dimensions, thanks to the randomness of the dispersion and reflectance of the glitter particles that determine the at least two components of the Reference Value.
[0094] Collation of the Scores
[0095] The encoding values of the glitter are strongly influenced by the acquisition conditions. To avoid this, for the purpose of authentication, an integrated score system is introduced as follows: [0096] as Reference Value, the Signature Value is attributed, detected at the moment of production of the authentication device; [0097] at the moment of collation control, when a process of continuous acquisition of images is carried out, for each image acquired by the same authentication device, a comparison between each component of the Collation Value with the Signature Value is carried out; [0098] the elements of the Collation Value obtained with the components of the Reference Value are collated; [0099] to verify the authenticity a score is assigned to the collation and it is established by integration (or summation) whether this score is acceptable or not.
[0100] It is obvious that the acquisition conditions are a critical factor, therefore even having recourse to an encoded value it is difficult to obtain a 100% correspondence between the Reference Value and the Collation Value. On the other hand, even using optical detection devices, such as cameras with equal lighting conditions, the acquisition conditions for the verification may be different, and it is necessary to carry out the verification in inclusive conditions of Reference Value and Collation Value. It is possible to show mathematically that each collation value obtained from a glitter is contained in the Reference Value, which in a mathematical formula can be expressed as:
Reference ValueCollation Value
[0101] From considerations of a practical type, the use of optical acquisition devices, such as manual cameras, for example those installed in smart phones, that have compact lighting systems, or the use of such portable devices themselves, makes it possible and more practical to use integrated encoded values, or encoded values consisting of the summation of several elements, obtained by continuous acquisition.
[0102] Moreover, even for a plurality of Reference Value as references for the protection for the copy it can be mathematically shown that:
Reference Value(n)Collation Value(i)
[0103] Where n is the n-th component of the Reference Values and i is the i-th element of the Collation Values.
[0104] Collation Pattern and Local Authentication
[0105] Moreover, a group of identifying elements or printed signs corresponding to the Reference Value can be introduced, also called Printed Reference Value Indicia, or PRVI, using a printing process. The use of these PRVI makes a local authentication possible, in accordance with what has been described heretofore, without making the comparison inside a remote database containing all the Reference Values. The authentication in this case is carried out by collating the identifying signs, or the indicia of the glitter to be authenticated with the PRVI, thus avoiding some critical factors linked to the acquisition of the image and the comparison on a database, and allowing to use a more compact Signature Value.
[0106] The advantages of the concepts described above can be expressed as follows: [0107] the authentication system is simple, since it uses and processes values obtained from images; [0108] the system is inexpensive, both as far as the apparatuses are concerned and also for the supports on which the glitter (Tag) is, or of the authentication device; [0109] the tags are easy to use, and the authentication operations are simple, thanks to the use of robust and compact systems; [0110] it is easy to introduce modifications to adapt the system to specific needs or improvements in technology; [0111] it is compatible with the introduction of mathematical techniques such as cryptography and error correction; [0112] use of compact values for the verification, which allow to execute the authentication locally; [0113] authentication system can be combined with the AutoID systems currently in use; [0114] use of optical acquisition devices, such as non-specific cameras, but the consumer type; [0115] the authentication system is flexible, in a variety of conditions of use.
Programming the Signature Value
[0116] With reference to the attached drawings, an authentication method according to the present invention provides to use a glitter type pattern deposited on a support to define in its entirety an authentication device 10 to be associated to, or made integrated in, a product, an object, a container or a support in general.
[0117] The authentication method of said authentication device 10 can be implemented in an authentication system 11 that comprises, as shown in
[0118]
[0119]
[0120] From
[0121] From the theory of reflection and due to what is described above, using both the lights at the same time, the particles that reflect the light in the direction of the observation point will be the sum of those that reflect the light from the right and those that reflect the light from the left. This means that the particles reflecting in the direction of the observation point can be managed as the integration, that is, the summation, of the particles detected illuminated on each occasion with the light sources disposed according to different angles.
[0122] An example of this condition is shown in
[0123]
[0124] It is obvious at this point how it is possible, according to this principle, to have a control on the system for capturing the Reference Values, dividing the source of lighting into a multiplicity of light sources (with a defined position, angle, shape and size), and putting them in relation with the position of the camera, the parameters of the glitter and with other characteristics of the system (such as for example the light intensity, color, polarization, operating time, focusing, size of image etc.).
[0125] Moreover, with the system described, it is possible to cancel the effects of the signal noise using several lights at the same time.
[0126] Moreover, the system described constitutes a useful example for the production of the detection apparatus of the identifying signs of the glitter, from which the Reference Values are taken.
Protection from Copying
[0127] It is now obvious that the system made according to the above description makes it impossible to copy the pattern of a glitter: it is sufficient to encode at least two images of the same glitter obtained with two different lighting conditions, since the patterns obtained from the at least two lighting conditions are different.
Encoding the Image in a Signature Value
[0128] As shown in
[0129] An example of this group of coordinates is shown in Table 1, which shows, by way of example, the Cartesian coordinates (x, y) of the reflection points 15, detected with a light A, and a light B emitted, for example, by the first light source 13 and by the second light source 14.
TABLE-US-00001 TABLE 1 Light Reflection A B Position a (xa, ya) b (xb, yb) c (xc, yc) d (xd, yd) e (xe, ye) f (xf, yf) g (xg, yg) h (xh, yh) i (xi, yi) j (xj, yj) k (xk, yk) l (xl, yl) m (xm, ym) n (xn, yn) o (xo, yo) p (xp, yp) q (xq, yq)
[0130] In accordance with one aspect of the present invention, the authentication method provides to introduce an encoding procedure to support the authentication method, according to specific rules (algorithms) that allow to abstract and simplify the data relating to the image acquired.
[0131] By way of example, we shall now give a sequence of a possible encoding algorithm, with reference for greater clarity to
[0132] In particular the algorithm provides: [0133] 1) to segment the area of the image into a certain number of lines and columns, for example five lines and columns (
For example, with reference to
[0139] It is clear that in other algorithms which can be implemented a different assignment of said scores can be provided.
[0140] As can be understood from the example of encoded algorithm described above, the use of these rules allows on the one hand to simplify and reduce the number of data to be handled in the authentication process, so as to enable local verification, and on the other hand to allow a certain tolerance in the precision of positioning (given that the points comprised in the border zone between contiguous segments is not considered). The possibility of controlling the extension of these areas of the segment clearly allows to adapt the system to specific practical needs.
Encoded Control
[0141] The authenticity control step can also be carried out by means of a compact lighting device, or in conditions where the position of the light source is known only roughly. In the following example and in the drawings in
[0142] Reference is made to a glitter whose Reference Value has been generated as in
[0143] The drawings from
[0144] In this case, the operations of collation control are simplified if the position of the source of lighting is approximately known. This position need not necessarily been known with accuracy: it is sufficient to know if it is contained in the group of positions that refer alternatively to component A or component B of the Reference Value.
[0145] In other words, it is sufficient to know if the reflecting particles detected in the collation control step belong to one component or the other.
[0146] Once the component of the Reference Value has been identified, we proceed to collate the values, to attribute the score of the comparison and to integrate these scores for the group of acquired images, according to the principles expressed above.
[0147] It is obvious that the technique described in the previous example for the acquisition of the image by the authentication device of the glitter pattern can also be actuated according to other embodiments, such as for example: [0148] a fixed source of light and a mobile camera: [0149] a source of light fixed to the camera, which move together; [0150] source of light and camera both fixed, and glitter moving.
[0151] All these embodiments allow to determine different lighting conditions of the authentication device 10.
Detection of the Acquisition Position
[0152] Although a high precision in the acquisition of the image is not required, according to the concepts expressed in the present invention, another system to detect the acquisition position is however supplied, in order to simplify and accelerate the verification and detection operations of the pattern. Especially in the collation step, this technique is useful to classify the area to be analyzed and the reciprocal position of the camera 12, lighting and glitter, and to determine the components of the Signature Value (Reference or Collation).
[0153] The detection calculation is carried out to determine some factors such as for example the position of the target to be analyzed inside the field of vision (FOV), possible distortions in the shape, possible signs of reference (also the 3D type, obtained for example with embossing techniques), variations in color (such as for example structural colors, polarization etc.), or other characteristics linked to the support of the glitter (such as for example ink printed in proximity, characteristics of printed material etc.) or of the object to which the glitter is applied (for example linked to the use of labels).
[0154] To explain this concept better,
Acquisition During Production
[0155] In accordance with possible implementations of the present invention the authentication method provides that the determination of the characteristics of the glitter, the encoding and the generation of the corresponding Reference Value can be carried out at the moment when the glitter is produced, possibly in a different way than that which occurs at the moment of control, on the user side.
[0156] In accordance with what has been described, the acquisition for the generation of the Reference Value can be controlled and made flexible in order to adapt to specific requests from the user (that is, specific requests linked to the practicality of the verification) or to more or less stringent quality requirements. It is also obvious that doing so it is possible to guarantee greater guarantees of protection relating to the difficulties of imitation or copying of the software used for the encoding.
[0157] Table 2 summarizes the basic concepts of generation of the Signature Value, the Reference Value and the Collation Value, with the main characteristics.
TABLE-US-00002 TABLE 2 Basic concept Generation of Reference Value Generation of Collation Value
Results of the Collation Control
[0158] We have already mentioned the fact that to render the process of authentication possible by using cameras and small, portable lighting systems, such as for example the systems normally mounted on smart phones which are now widely used, the system according to the present invention provides to manage a continuous (or sequential) acquisition of images and to adopt a system of integrated scores (understood as summation) for verification.
[0159] The verification criterion provides that there are two areas of control, one positive and one negative, and that the collation scores deriving from the individual controls are added during the sequential acquisition and encoding of the images in the respective Signature Values. The result of the collation process provides a reply in terms of acceptance or lack of acceptance on reaching a positive threshold limit (acceptance or positive outcome) or negative threshold limit (non-acceptance or negative outcome).
[0160] In this way, it is clear that the system is able to compensate even possible errors linked to the low quality of image acquisition, such as for example fuzziness or damage to the glitter pattern.
[0161] An example of verification sequence can be as follows, according to that which is shown in
[0166] It is obvious that the threshold levels of acceptability and non-acceptability can be controlled and adapted to specific conditions of use, such as for example density of particles, more or less stringent authentication conditions, etc.
[0167]
[0168] Control of the Printed Indicia
[0169] In the case where the authentication process is carried out locally, as already said, it could be useful to have recourse to an indicia generated and printed on the basis of the corresponding signature of the Reference Value of the glitter (indicated for short by PRVIPrinted Reference Value Indicia), where the reference printed indicia is detected with the same acquisition means with which the indicia of the glitter is identified.
[0170] With the purpose of reducing the quantity of data needed to represent the Reference Value, in accordance with the principles expressed in the present invention, it is possible to use one or more identifying elements, such as symbols and codes. In accordance with a possible form of embodiment, the identifying elements can be chosen from a group comprising barcodes, two-dimensional barcodes, OCR, original designs, or a possible combination thereof.
[0171] The identifying elements, if read, can supply the data relating to the Signature Value of the indicia of the specific glitter and in practice if the Collation Values supply the same information contained in the identifying elements the authenticity of the glitter is confirmed and therefore that of the service/product associated therewith.
[0172] An example of this can be shown by the production of labels where the glitter and the PRVI are printed one near to the other. This label can be applied to other objects as a certificate of authenticity.
Combination with Already Used Identification Markings (Such as for Example Barcodes)
[0173] In the example just cited of a system that uses labels to guarantee authenticity combining the glitter indicia with the PRVI, it is also possible to insert in the combination an identifying barcode of the object to which the label is applied, in different ways.
[0174] A first possible embodiment consists in the use of a barcode generated as a Reference Value code, with the aim of using it both as identification of the object to which the label is applied, and also as a protection against the counterfeiting of the object. In other words, the PRVI expressed as a barcode can be used both as identification and also as a support for local authentication.
[0175] Another possible embodiment (shown in
[0176] Another form of embodiment, which is applied for example where the printing of a barcode on-demand is required, consists in the printing of a glitter, of the PRVI and of a barcode representing the PRVI (for short RVBReference Value barcode). In this way, the generation of the barcode on-demand (or as a alternative to a GIMI) with the purpose of identification can occur without the need for direct recognition of the indicia of the glitter (therefore without the detection of a Signature Value), but only by recognition of the RVB.
[0177] It is clear that modifications and/or additions of parts may be made to the authentication method as described heretofore, without departing from the field and scope of the present invention.
[0178] It is also clear that, although the present invention has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of authentication method, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.