Security document and authentication scheme
First Claim
1. A security document wherein said covert trigger elements and said security image elements are constructed of shapes having substantially identical geometry.
15 Assignments
0 Petitions
Accused Products
Abstract
A security document is provided including a unique combination of covert triggers, overt triggers, and overt secure document indicators arranged to enhance the security of the document at issue. In accordance with one embodiment of the present invention, a security document is provided including a security image and a covert trigger printed on a face of the document. The security image is defined by a collection of security image elements. The security image defines at least one document authentication scheme. The document authentication scheme is arranged to provide an indication of document authenticity. The covert trigger is defined by a collection of trigger elements. The trigger elements are arranged to resemble the security image elements so the covert trigger is not readily apparent on the face of the document. In accordance with another embodiment of the present invention, a method of authenticating a security document is provided. The method includes the steps of:(i) defining an authentication constellation within the security image, wherein the authentication constellation defines a set of constellation pixels, and wherein the constellation pixels are arranged at predetermined coordinates within the security image; (ii) identifying respective occupation characteristics of each of the constellation pixels, wherein each of the respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and (iii) determining whether the respective identified occupation characteristics correspond to an authentic document by comparing the respective identified occupation characteristics to a set of authentic occupation characteristics.
56 Citations
26 Claims
-
1. A security document wherein said covert trigger elements and said security image elements are constructed of shapes having substantially identical geometry.
-
2. A security document comprising:
-
a security image printed on a face of said document, wherein said security image includes a collection of security image elements defining a document authentication scheme arranged to provide an indication of document authenticity; and
a covert trigger printed on said face of said document, wherein said covert trigger is defined by a collection of trigger elements, and wherein said trigger elements are arranged to resemble selected ones of said security image elements such that said covert trigger is not readily apparent on said face of said document, and wherein said covert trigger is arranged to provide an indication of document authenticity in addition to and independent of the indication of document authenticity provided by said document authentication scheme of said security image. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 13)
-
-
12. A security document comprising:
-
a security image printed on a face of said document, wherein said security image includes a collection of security image elements defining a document authentication scheme arranged to provide an indication of document authenticity;
a covert trigger printed on said face of said document, wherein said covert trigger is defined by a collection of trigger elements, and wherein said trigger elements are arranged to resemble selected ones of said security image elements such that said covert trigger is not readily apparent on said face of said document; and
a pseudo-covert trigger printed on said face of said document, wherein said pseudo-covert trigger is more apparent on said face of said document than said covert trigger, and wherein pseudo-covert trigger elements are arranged to resemble said security image elements to a significantly lesser extent than said collection of trigger elements.
-
-
14. A method of authenticating a security document including a security image printed on a face of said document, wherein said security image is defined by a collection of security image elements, wherein said security image defines at least one document authentication scheme, and wherein said document authentication scheme is arranged to provide a primary indication of document authenticity, said method comprising the steps of:
-
defining an authentication constellation within said security image, wherein said authentication constellation defines a set of constellation pixels, and wherein said constellation pixels are arranged at predetermined coordinates within said security image;
identifying respective occupation characteristics of each of said constellation pixels, wherein each of said respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and
determining whether said respective identified occupation characteristics correspond to an authentic document by comparing said respective identified occupation characteristics to a set of authentic occupation characteristics. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method of authenticating a document including an image printed on a face of said document, wherein said image is defined by a collection of image elements, said method comprising the steps of:
-
defining an authentication constellation within said image, wherein said authentication constellation defines a set of constellation pixels, and wherein said constellation pixels are arranged at predetermined coordinates within said image;
identifying respective occupation characteristics of each of said constellation pixels, wherein each of said respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and
determining whether said respective identified occupation characteristics correspond to an authentic document by comparing said respective identified occupation characteristics to a set of authentic occupation characteristics. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A method of producing a security document comprising the steps of:
-
defining a security image including a collection of security image elements, wherein said security image embodies a predetermined document authentication scheme arranged to provide an indication of document authenticity;
defining a covert trigger including a collection of trigger elements, wherein said trigger elements are arranged to resemble said security image elements;
defining a trigger mask, wherein said trigger mask is arranged to define respective non-printed portions aligned with each of said trigger elements, and wherein each of said non-printed portions defines a non-printed buffer zone surrounding a corresponding trigger element;
constructing a printed image from each of said security image, said covert trigger, and said trigger mask; and
printing said constructed printed image on a substrate. - View Dependent Claims (26)
-
Specification