Authentication apparatus and methods
First Claim
1. An authentication method for verifying authenticity of a target authentication device, wherein the target authentication device comprises a reference pattern and a security pattern, and each one of the reference pattern and the security pattern comprises pattern defining elements which are distributed according to a characteristic frequency, and the security pattern comprises an embedded security device that is coded with predetermined relative phase modulation information of the characteristic frequency with respect to phase of the reference pattern;
- and wherein the method comprises;
obtaining frequency domain data from spatial domain pixel data of an image of the target authentication device;
digitally filtering the characteristic frequency; and
extracting said predetermined relative phase modulation information comprising information on relative phase shift between the security pattern and the reference pattern to construct characteristic features of the security device for verification of authenticity of the target authentication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of and an apparatus for verifying authenticity of a target authentication device comprising a reference pattern having a characteristic frequency and a security pattern, the security pattern comprises an embedded security device that is coded with phase modulation information. The method comprises extracting frequency domain data from an image of the target authentication device to facilitate verification of authenticity of the target authentication device. The method provides a very effective end expedient mechanism for verifying authenticity of a moiré or moiré like authentication device to combat counterfeiting.
13 Citations
18 Claims
-
1. An authentication method for verifying authenticity of a target authentication device, wherein the target authentication device comprises a reference pattern and a security pattern, and each one of the reference pattern and the security pattern comprises pattern defining elements which are distributed according to a characteristic frequency, and the security pattern comprises an embedded security device that is coded with predetermined relative phase modulation information of the characteristic frequency with respect to phase of the reference pattern;
- and wherein the method comprises;
obtaining frequency domain data from spatial domain pixel data of an image of the target authentication device;
digitally filtering the characteristic frequency; and
extracting said predetermined relative phase modulation information comprising information on relative phase shift between the security pattern and the reference pattern to construct characteristic features of the security device for verification of authenticity of the target authentication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
- and wherein the method comprises;
-
10. An authentication apparatus comprising a processor, a memory and a display, wherein the processor is a microprocessor which is to process an image of a target authentication device to verify authenticity, wherein the target authentication device comprises a reference pattern and a security pattern separated from the security pattern, and each of the reference pattern and the security pattern comprises pattern defining elements which are distributed according to a characteristic frequency, and the security pattern comprises an embedded security device coded with predetermined relative phase modulation information of the characteristic frequency with respect to phase of the reference pattern;
- and wherein the processor is configured to;
obtain frequency domain data from an image of the target authentication device;
digitally filter the characteristic frequency; and
extract said predetermined relative phase modulation information comprising information on relative phase shift between the security pattern and the reference pattern to construct characteristic features of the security device to facilitate verification of authenticity of the target authentication device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
- and wherein the processor is configured to;
Specification