STRUCTURE FOR SECURE CONTAINMENT OF INFORMATION
20230182497 ยท 2023-06-15
Inventors
- Adam Trexler (Portland, OR, US)
- Laurie Johansen (Grants Pass, OR, US)
- Paul Diffendaffer (Grants Pass, OR, US)
- Kelda Diffendaffer (Grants Pass, OR, US)
Cpc classification
B42D25/328
PERFORMING OPERATIONS; TRANSPORTING
B32B2255/10
PERFORMING OPERATIONS; TRANSPORTING
B32B5/26
PERFORMING OPERATIONS; TRANSPORTING
B42D25/45
PERFORMING OPERATIONS; TRANSPORTING
H04L2209/56
ELECTRICITY
B32B29/005
PERFORMING OPERATIONS; TRANSPORTING
H04L63/06
ELECTRICITY
B32B2307/4023
PERFORMING OPERATIONS; TRANSPORTING
B32B7/12
PERFORMING OPERATIONS; TRANSPORTING
B32B9/005
PERFORMING OPERATIONS; TRANSPORTING
H04L9/3226
ELECTRICITY
H04L9/3239
ELECTRICITY
B32B2425/00
PERFORMING OPERATIONS; TRANSPORTING
B42D25/369
PERFORMING OPERATIONS; TRANSPORTING
B32B5/02
PERFORMING OPERATIONS; TRANSPORTING
B32B29/02
PERFORMING OPERATIONS; TRANSPORTING
International classification
B42D25/45
PERFORMING OPERATIONS; TRANSPORTING
B42D25/369
PERFORMING OPERATIONS; TRANSPORTING
H04L9/32
ELECTRICITY
Abstract
A structure for secure containment of information (SSCI) that is in the form of a laminate which includes at least two layers. The laminate is constructed to contain information such as a code, serial number, informational feature, encryption key or personal identification number (PIN). The information is located between the layer of the laminate such that the code, serial number, informational feature, encryption key, or PIN is not detectable from outside the laminate. The SSCI is configured to provide access and expose the code, serial number, informational feature, encryption key, or PIN by delaminating at least one layer, thereby indicating that tampering has occurred to the laminate. The SSCI can also function as a public key or private key for a blockchain, to provide access to a physical lock or to provide account access to claim financial value.
Claims
1. (canceled)
2. A method of accessing secure data within a structure for secure containment of information, comprising: delaminating two layers of a plurality of layers of a laminate to expose secure data disposed between the two layers of the laminate while causing irreversible damage to one or more layers of the plurality of layers on one or both sides of the information, wherein the secure data is not visible or detectable from outside the laminate prior to delamination.
3. The method of accessing secure data within a structure for secure containment of information of claim 2, wherein: the plurality of layers comprise a first metallic layer and a second metallic layer; and the information is disposed between the first metallic layer and the second metallic layer.
4. The method of accessing secure data within a structure for secure containment of information of claim 2, wherein: the irreversible damage comprises at least one anti-counterfeiting feature being broken.
5. The method of accessing secure data within a structure for secure containment of information of claim 2, wherein: the irreversible damage comprises one or more items selected from the group consisting of: turning a metal layer into flakes, turning a metal layer into powder, folding or creasing the laminate, breaking of one or more print layers, breaking of one or more security threads, oxidation of one or more layers of the laminate, separation of one or more print layers into distinct surfaces, intentional tearing of one or more layers of the laminate, a color change of an adhesive, and a de-metallization of a hologram.
6. The method of accessing secure data within a structure for secure containment of information of claim 2, wherein: at least some of the plurality of layers of the laminate comprise one or more materials selected from the group consisting of: plastic, metal, glass, ceramic, paper, and sheets of fibrous material.
7. The method of accessing secure data within a structure for secure containment of information of claim 2, wherein: the secure data comprises at least one item selected from the group consisting of: a code, a serial number, an information feature, an encryption key, and a personal identification number (PIN).
8. The method of accessing secure data within a structure for secure containment of information of claim 2, wherein: the secure data comprises a pattern incorporated into at least one of the two layers.
9. A method of accessing secure data within a structure for secure containment of information, comprising: delaminating two layers of a plurality of layers of a laminate to expose secure data embedded between the two layers of the laminate while triggering one or more anti-tampering features of the laminate, wherein the secure data is not visible or detectable from outside the laminate prior to delamination.
10. The method of accessing secure data within a structure for secure containment of information of claim 9, wherein: the one or more anti-tampering features permanently indicate that the laminate has been delaminated.
11. The method of accessing secure data within a structure for secure containment of information of claim 9, wherein: at least one layer of the plurality of layers of the laminate comprises one or more materials selected from the group consisting of: a pattern of electrically charged material with the pattern exhibiting at least a portion of the secure data, a pattern of chemically altered material with the pattern exhibiting at least a portion of the secure data, the secure data displayed as at least two visible colors.
12. The method of accessing secure data within a structure for secure containment of information of claim 9, wherein: the plurality of layers of the laminate comprise a blocking layer that restricts radiation and other interrogation methods, a decoy layer that contains patterns that do not exhibit the information, or both a blocking layer and a decoy layer.
13. The method of accessing secure data within a structure for secure containment of information of claim 9, wherein: at least one layer of the plurality of layers of the laminate comprises at least a portion of the secure data instantiated by magnetic domains.
14. The method of accessing secure data within a structure for secure containment of information of claim 9, wherein: delaminating the two layers causes irreversible damage to at least one metallic layer of the laminate.
15. The method of accessing secure data within a structure for secure containment of information of claim 9, wherein: at least one of the one or more anti-tampering features comprises irreversible damage to at least one of the plurality of layers of the laminate.
16. A method of accessing secure data within a structure for secure containment of information, comprising: delaminating two layers of a plurality of layers of a laminate to expose secure data embedded between the two layers of the laminate while triggering one or more anti-tampering features of the laminate, wherein: the secure data is disposed between at least two metallic layers of the laminate; and the secure data is not visible or detectable from outside the laminate prior to delamination.
17. The method of accessing secure data within a structure for secure containment of information of claim 16, wherein: the two layers are the at least two metallic layers of the laminate.
18. The method of accessing secure data within a structure for secure containment of information of claim 16, wherein: the secure data is displayed as at least two visible colors.
19. The method of accessing secure data within a structure for secure containment of information of claim 18, wherein: the at least two visible colors comprise colored materials that have similar chemical structures.
20. The method of accessing secure data within a structure for secure containment of information of claim 18, wherein: a first colored material of a first visible color of the at least two visible colors laterally surrounds a second colored material of a second visible color of the at least two visible colors.
21. The method of accessing secure data within a structure for secure containment of information of claim 16, wherein: the laminate comprises a first plastic layer, a first of the at least two metallic layers, a patterned adhesive layer, a second of the at least two metallic layers, and a second plastic layer.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0037]
[0038]
[0039]
BEST MODE FOR CARRYING OUT THE INVENTION
[0040] The best mode for carrying out the invention is disclosed in terms that disclose a preferred embodiment with multiple structural configurations and methods for manufacture of a structure for secure containment of information (SSCI 10). In many types of currency, and in particular blockchains, security features are placed on bills or coins. Examples of security features are a holographic sticker and a scratch-off material. Other security features, such as security printing, serial numbers, color shift thread, etc. might be printed on the surface of the bill, but are not affected by tampering or legitimate removal of the hologram sticker or scratch-off material. These, and other, security features are utilized to cover or otherwise mask information located beneath a sticker or scratch-off material.
[0041] A problem exists in that these external security features are susceptible to tampering and counterfeiting. It is not difficult to use a hypodermic syringe to inject a solvent under a sticker, remove the sticker to expose the information, and then to replace the sticker. This is just one example. Some stickers can simply be peeled off and then replaced without any noticeable indication. Still other stickers may be heated, breaking the adhesive bond, and then reattached without damaging the sticker substrate. Scratch-off material is also at risk of tampering and counterfeiting. The SSCI 10 addresses these problems by providing an effective solution of embedding a private code or key within a currency bill, rather than on an exterior surface. The SSCI's 10 construction is designed for hiding codes, keys or other information instead of utilizing an add-on item to the exterior surface or packaging of an enclosed separate item.
[0042] As shown in
[0043] The information 22 is preferably a physical pattern 24, as shown in
[0044] At least one of the layers 14,16 can contain information 22 instantiated by magnetic domains 34, as shown in
[0045] The code, serial number, informational feature, encryption key or pin number provides access to open a physical or an informational lock. The access is provided by a device such as a computer, scanning device, wireless phone, wireless device, digital watch, digital glasses or digital camera. Additionally, the code, serial number, informational feature, encryption key or pin number provides account access to claim financial value, and/or provides access to a financial account 50 such as a physical commodity, a bank account or a brokerage account. It should be noted that exposing the code, serial number, informational feature, encryption key or pin number can constitute the execution of a contract.
[0046] To increase the functionality and security capabilities of the SSCI 10, the plastic layer(s) 14 can include at least one decoy layer 52, as shown in
[0047] The SSCI 10 can consist of various structure designs and the method can include steps for producing a structure having multiple layers. A five-layer design 58, as shown in
[0048] A six-layer design 60, as shown in
[0049] In the case of a metallic version of the SSCI 10, the center section could be made as a three-dimensionally structured metallic film with the deposition performed such that only metal rather than printing would be visible.
[0050] While the invention has been described in detail and pictorially shown in the accompanying drawings it is not to be limited to such details, since many changes and modification may be made to the invention without departing from the spirit and the scope thereof. Hence, it is described to cover any and all modifications and forms which may come within the language and scope of the claims.