Secure printing method to thwart counterfeiting
First Claim
1. A method implementing a secure printing campaign to thwart counterfeiting, comprising steps of:
- selecting a first secure print technology and a second secure print technology distinct from the first secure print technology;
selecting a first secure print variable for the first secure print technology and a second secure print variable for the second secure print technology; and
establishing a first plurality of discrete values for the first secure print variable and a second plurality of discrete values for the second secure print variable.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for implementing a secure printing campaign to thwart counterfeiting is provided. The method includes the steps of selecting a first secure print technology and a second secure print technology that is distinct from the first secure print technology, selecting a first secure print variable for the first secure print technology and a second secure print variable for the second secure print technology, and establishing a first plurality of discrete values for the first secure print variable and a second plurality of discrete values for the second secure print variable.
-
Citations
22 Claims
-
1. A method implementing a secure printing campaign to thwart counterfeiting, comprising steps of:
-
selecting a first secure print technology and a second secure print technology distinct from the first secure print technology;
selecting a first secure print variable for the first secure print technology and a second secure print variable for the second secure print technology; and
establishing a first plurality of discrete values for the first secure print variable and a second plurality of discrete values for the second secure print variable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method implementing a secure printing campaign to thwart counterfeiting, comprising steps of:
-
selecting three or more secure print technologies;
selecting at least one secure print variable for each of the secure print technologies; and
establishing a plurality of discrete values for each at least one secure print variable. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification