Optically variable security device, and article employing same and method for verifying the authenticity of an article
09666008 ยท 2017-05-30
Assignee
Inventors
Cpc classification
G07D7/0047
PHYSICS
International classification
B42D15/00
PERFORMING OPERATIONS; TRANSPORTING
G07D7/00
PHYSICS
G09C3/00
PHYSICS
Abstract
A security device and method are provided for verifying the authenticity of articles, tracking articles, detecting the diversion of articles, and detecting the production of unauthorized articles. The security device includes a substrate and an optically variable security code. The security device may further include a machine-readable representation of the security code. The security device may still further include a unique serial number, which may be machine-readable. The substrate may be an article or, alternatively, the security device may be affixed to an article. An article including at least one of the security devices is also disclosed.
Claims
1. A method for verifying the authenticity of an article, comprising the steps of: providing a production master plate being structured to produce from one impression a plurality of security devices, each having a different optically variable security code; producing a plurality of security devices from the impression of the production master plate, each of said plurality of security devices comprising: an optically variable security code different from optically variable security codes of others of the plurality of security devices produced from the impression of the production master plate, the optically variable security code comprising a plurality of individual elements, including a first element and a second element, wherein at a first predetermined observation point the first element is visible and the second element is not visible, and at a second predetermined observation point the second element is visible and the first element is not visible; and a unique serial number, the unique serial number being disposed on a first portion of a corresponding one of the plurality of security devices and the optically variable security code being disposed on a second portion of the corresponding security device, providing a first security device from the plurality of security devices for affixing to an article; recording the associated security code and serial number of the first security device in a database; receiving an authentication request from a user of the article; sending an authentication report to the user; wherein the authentication report informs the user whether authentication is confirmed; and wherein authentication is confirmed if the security code and the unique serial number on the device-affixed article is the same as an associated security code and serial number recorded in the database.
2. The method of claim 1 wherein each of the first element and the second element is an alphanumeric character.
3. The method of claim 1 wherein the security device further comprises a machine-readable representation of the optically variable security code.
4. The method of claim 1 wherein the unique serial number is machine-readable.
5. The method of claim 1 wherein the database is electronic.
6. The method of claim 1 wherein the authentication request is received by one of the means in the group consisting of: written message, voice telephone, telefacsimile, text messaging, Internet, and Mobile Web.
7. The method of claim 1 wherein the authentication report is sent by one of the means in the group consisting of written message, voice telephone, telefacsimile, text messaging, Internet, and Mobile Web.
8. A system for verifying the authenticity of an article comprising a security device affixed to the article, wherein the security device is produced from a production master plate being structured to produce from one impression a plurality of security devices each having a different optically variable security code, wherein the security device comprises: a substrate; an optically variable security code different from optically variable security codes of other security devices produced from the impression of the production master plate, the optically variable security code comprising a plurality of individual elements, including a first element and a second element, wherein at a first predetermined observation point the first element is visible and the second element is not visible, and at a second predetermined observation point the second element is visible and the first element is not visible; and a serial number; wherein the security code and the serial number are recorded together in a database of valid combinations of security codes and serial numbers, and wherein the authenticity of the article is verified when the security code and the serial number of the security device affixed to the article are found together in the database of valid security code and serial number combinations.
9. The system of claim 8 wherein each of the first element and the second element is an alphanumeric character.
10. The system of claim 8 wherein the security device further comprises a machine-readable representation of the optically variable security code.
11. The system of claim 8 wherein the serial number is machine-readable.
12. The system of claim 8 wherein the database is electronic.
13. The method of claim 1 wherein the plurality of individual elements includes a third element; wherein at a third predetermined observation point the third element is visible and the first and second elements are not visible; and wherein at each of the first predetermined observation point and the second predetermined observation point the third element is not visible.
14. The method of claim 1 further comprising employing as said production master plate a plurality of production master plates, wherein each of the production master plates is structured to produce a plurality of security devices each having a different optically variable security code than other security devices produced by the same production master plate and other security devices produced by other production master plates of the plurality of production master plates.
15. The system of claim 8 wherein the security device is produced from one production master plate of a plurality of production master plates, wherein each of the production master plates is structured to produce a plurality of security devices each having a different optically variable security code than other security devices produced by the same production master plate and other security devices produced by other production master plates of the plurality of production master plates.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
DESCRIPTION OF THE PREFERRED EMBODIMENTS
(11) It will be appreciated by those skilled in the art that changes could be made to the embodiments described herein without departing from the scope of the broad inventive concept thereof. For example, it is understood that all aspects and embodiments of the present disclosed concept can be related to any item one wished to authenticate, validate, or track, such as but not limited to products and documents. It is understood, therefore, that this disclosed concept is not limited to the particular embodiments disclosed, but it is intended to cover modifications that are within the spirit and scope of the disclosed concept, as defined by the appended claims.
(12) As employed herein, the term optically variable device (OVD) refers to a visual device that creates a change or shift in appearance, such as, for example and without limitation, a change in color or shape, when observed from different relative observation points. The term is used herein in its conventional broad sense and includes the use of a single optical element alone or multiple optical elements which may or may not be arranged so that they are touching each other, overlapping, or physically in close proximity to each other. Such elements may include, for example and without limitation, holograms, diffractive gratings, liquid crystal constructs, color-shifting inks or pigments, or micro-lens integral or autostereoscopic imaging devices.
(13) As employed herein, the term article refers to an item, product or document on which the exemplary security device is employed, and expressly includes, for example and without limitation, articles used in brand protection, high-security, identification, and banking markets, such as, for example and without limitation, branded products, packaging labels, optical discs, identification cards, credit cards, debit cards, smart cards, organization membership cards, security system cards, security entry permits, banknotes, checks, fiscal tax stamps, passport laminates, legal documents, and other information-providing items wherein it may be desirable to validate the authenticity of the item and/or the reproduction thereof.
(14) As employed herein, the term users refers to any persons or entities that wish to determine the authenticity of an article, such as purchasers, consumers, holders for value, holders in due course, owners, manufacturers, issuers, brand owners, government agencies, and security enforcement personnel such as treasury officials, customs inspectors, and immigration officials.
(15) The device and method of the disclosed concept provide for the verification of the authenticity of articles by the use of a two-tiered approach to security. One tier is the use of an OVD affixed to the article to deter counterfeiters. The OVD includes an optically variable security code, a random sequence of visual elements encoded into the optically variable device so that only one such element is visible from any given observation point. The elements may be, for example and without limitation, alphanumeric characters, shapes, icons, or images. The OVD may also include an optically variable image.
(16) OVDs can only be reproduced by sophisticated and expensive origination equipment which most counterfeiters lack. Thus, the use of an OVD defeats the widespread use of readily available imaging and printing technologies by those counterfeiters who lack origination skills and equipment. In addition, OVDs are widely recognized by the public as security devices and therefore provide a focal point for distinguishing authentic products from those supplied by professional counterfeiters.
(17) The second tier is the use of a serial number. The serial number provides a unique identifier for authentication queries and for tracking and control purposes. Each serial number is associated with a random security code that is not predictable by counterfeiters. Thus, those counterfeiters that have the skill and resources necessary to duplicate an OVD with an optically variable security code will be unable to guess the serial numbers/security code combinations that appear on valid articles.
(18)
(19)
(20) The optically variable security code 107, as well as the optically variable security image 105, is formed from diffractive structures by methods well known in the art. A collection of diffractive structures is designed that will create the three-frame animated effect of the characters K, T, and V. This may be accomplished, for example and without limitation, by forming the security code 107 from a plurality of pixels that, when coupled with a reflective backing, reflect light in one, two, or three different directions or by combining pixels that reflect light in only one direction. The pixels are organized so that light reflected from the security code 107 to the left forms the character K, light reflected substantially perpendicular to the security code 107 forms the character T, and light reflected from the security code 107 to the right forms the character V. A suitable computer-based design application may be used to assist in the design of the diffractive structures. The elements of the security code 107 need not be alphabetic characters, but may alternatively and/or additionally include numerals, shapes, and images, or sets of characters, numerals, shapes, and images. The length of the security code 107 in elements is of course not limited to three as in the figured embodiment, but may be of any alternative length (not shown), without departing from the scope of the disclosed concept. It will also be appreciated that while the non-limiting example shown and described herein illustrate a security code 107 that is visible to the naked eye, security codes, images, and/or serial numbers that are not visible by the naked eye (e.g., without limitation, machine readable security devices) are also within the scope of the disclosed concept.
(21) Once designed, the pattern of diffractive structures is exposed in a photosensitive substrate using a laser or e-beam apparatus. The substrate is processed and a nickel shim is made using techniques well-known in the art. The shim is then used to emboss, cast, or mold the diffractive structures into the substrate 103. The optically variable security image 105 and the optically variable security code 107 may be designed, exposed, and processed together as a single piece, in which case their impressions will be made by the same shim. Alternatively, the security image 105 and the security code 107 may be made separately and reside on two different shims. In the case of separate shims, the shims can be mounted together so that both the security image 105 and the security code 107 are embossed, cast, or molded on the same pass, the shims can be mounted at different stations in the same embossing or casting line, or the shims can be mounted on different lines, resulting in a two-pass operation.
(22) Although
(23) The substrate 103 comprises a generally planar clear plastic film made from any suitable material, such as, for example, polyester, polystyrene, polypropylene, or cellulose acetate. The metalized layer 115 is formed on the embossed, cast, or molded surface relief containing the optically variable information and can be of any known or suitable reflective metal, such as, for example, aluminum, copper, silver, or gold. The metalized layer 115 can be applied by any suitable application method, such as vacuum evaporation or sputtering, and is thick enough so that as much light as possible is reflected, maximizing the brightness of the viewed optically variable images. A protective layer 117 is disposed over the metalized layer to protect the optically variable security image 105 and security code 107 from damage. The protective layer 117 can be any suitable clear plastic film such as, for example, polyester.
(24) The substrate 103 can be attached to a release layer with a pressure-sensitive adhesive layer to form a pressure sensitive label, or it can be attached to a flexible carrier sheet with a heat-sensitive release coating to form a hot stamping foil. The security device 101 may be supplied as a simple transfer film with an adhesive added at the point of affixing to an article. The security device 101 can be supplied in the form of a laminate or overlay; in this case the metalized layer 115 is either formed thin enough to allow an observer to view information through the applied security device 101, or it is discontinuous, exhibiting one or more windows through which information beneath the applied device can be observed. The security device 101 can also be in the form of a security thread, stripe or patch, and simply embedded into an article without any adhesive. In some cases, the substrate 103 may be an integral part of the article, such as, for example, when the article is an optical disc.
(25) In one non-limiting embodiment, the optically variable security image 105 and the optically variable security code 107 are based on diffractive structures, but they may be based on other OVD technologies, such as, for example, holographic methods, micro-lens integral and autostereoscopic imaging methods, and/or methods using cholesteric liquid crystals or color-shifting inks. In all of these technologies, methods of formation of multi-channel effects such as those required for the optically variable security code are well known in the art.
EXAMPLE
(26) The following EXAMPLE is provided for illustrative purposes only, to further illustrate the disclosed concept. It is not meant to limit the scope of the disclosed concept in any way. Specifically, in one non-limiting EXAMPLE, a preferred security device production run may occur as follows. A brand owner requests 200,000 pressure sensitive labels. The security device provider creates a nickel shim featuring an optically variable security image that will appear on all labels. The provider also creates 20 separate nickel shims, each comprising a different optically variable security code made up of three upper-case letters and a machine-readable bar code representing the three-letter code. Using recombination methods well known in the art, the security image shim is stepped out to form a production master with 20 copies of the security image in a 4 by 5 array. Each security code is then dropped in using heat and pressure to form a composite plate having 20 different combinations. Alternatively, the recombination may be done optically before the shims are made. In either case, the resulting production master plate creates 20 different labels per impression. Ten thousand impressions are made on a master roll of substrate using a repeating cylinder, resulting in 200,000 labels. The master roll of embossed substrate is converted into labels by metalizing and the addition of a protective layer, adhesive and a paper release backing. For ease of handling, the master roll is then slit and cut into 200 small rolls of 1,000 labels each.
(27) Each small roll is fed into an ink-jet printer where each label is printed with a serial number. The numbers may be sequential or non-sequential, but each number is unique. By shuffling the order in which the rolls are fed into the printer, a pseudo-random association may be created between sequential serial numbers and the optically variable security codes. The printed rolls are fed into an optical reader that reads the serial numbers and security code bar codes on each label. This information is transmitted electronically to a computerized database for storage. Finally, the rolls of labels are shipped to the manufacturing facility where the labels are applied to articles. Each article is transferred into a market supply chain and eventually ends up with a user, who is then able to verify the authenticity of the article by reading the serial number and security code on the label and sending this information to the database. If that number/code combination is found in the database, then the user is informed of that fact and the authenticity of the article is verified.
(28) For greater security, more security codes may be used. In the EXAMPLE above, four production masters could be made, each with 20 different security codes, for a total of 80 different security codes. Each master would be used to produce 2,500 impressions, for a total of 200,000 labels. Further, security codes are not limited to only three characters or elements. The use of security codes with more than three characters increases the total number of possible security codes; the use of as many different security codes as possible is preferred, as it decreases the chance a counterfeiter will correctly guess a serial number/security code combination that actually appears on a valid label.
(29)
(30)
(31)
(32)
(33)
(34) Some or all of the information on the security device may be hidden from view until the article is used, prepared for use, or disassembled, or the article's packaging is opened. For example, on the security device 101 illustrated in
(35)
(36)
(37) The disclosed concept also provides methods of verifying the authenticity of an article.
(38) Accordingly, among other benefits the disclosed concept provides a combination of an optically variable image and random security code with a unique serial number to establish a robust anti-counterfeiting device that is very difficult for counterfeiters to defeat. Optically variable images cannot be copied using even the best computer-based imaging systems available; they can only be reproduced by sophisticated and expensive specialized origination equipment which most counterfeiters lack. Thus the optically variable image on the security device will deter most counterfeiters. On the other hand, sophisticated counterfeiters that have the ability to duplicate optically variable imagery will be unable to generate valid security code/serial number combinations except by tedious physical field examination of valid security devices.
(39) In addition, because the security code and serial numbers are obvious and easy to read, the instant security device also provides an easy way for consumers, retailers and security enforcement personnel (such as treasury officials, customs inspectors, and immigration officers) to validate the authenticity of articles by simply querying a central database wherein the security code/serial number combinations of all valid devices have been stored.
(40) As an additional benefit, the serial numbers can be used for the tracking of products and documents. The database can store the location of each authenticity query and field control scan in the supply chain, providing valuable location and movement information to the brand owner or government agency.
(41) While a specific embodiment of the disclosed concept is described in detail, it will be appreciated by those skilled in the art that various modifications and alternatives to those details could be developed in light of the overall teachings of the disclosure. Accordingly, the particular arrangements disclosed are meant to be illustrative only and not limiting as to the scope of the disclosed concept which is to be given the full breadth of the appended claims and any and all equivalents thereof.