Sign In to Follow Application
View All Documents & Correspondence

Artwork Security Mark And Authentication Method Thereof

Abstract: ABSTRACT “ARTWORK SECURITY MARK AND AUTHENTICATION METHOD THEREOF” The present invention provides a data authentication method and system for securing and determining authentication of a document. Herein, the secure document is selected from group of but not limited to paper documents, cartons and labels or any kind of packaging substrate. An end user can authenticate the secure document by just capturing the security mark through proprietary smart phone, desktop application. Figure 1 on sheet no. 1 of the drawings may accompany the abstract when published.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
23 March 2017
Publication Number
39/2018
Publication Type
INA
Invention Field
PHYSICS
Status
Email
desk@patentwire.co.in
Parent Application
Patent Number
Legal Status
Grant Date
2023-07-28
Renewal Date

Applicants

MANIPAL TECHNOLOGIES LTD.
PRESS CORNER, MANIPAL-576104, KARNATAKA, INDIA

Inventors

1. GURU PRASANNA
MANIPAL TECHNOLOGIES LTD. Press corner, Manipal-576104, Karnataka, India
2. SUSHIR RAO
MANIPAL TECHNOLOGIES LTD. Press corner, Manipal-576104, Karnataka, India
3. HARSHA SHETTIGAR
MANIPAL TECHNOLOGIES LTD. Press corner, Manipal-576104, Karnataka, India
4. ANCITA CAREN D'SOUZA
MANIPAL TECHNOLOGIES LTD. Press corner, Manipal-576104, Karnataka, India
5. SUDHEESH RAO
MANIPAL TECHNOLOGIES LTD. Press corner, Manipal-576104, Karnataka, India
6. ABHAY GUPTE
MANIPAL TECHNOLOGIES LTD. Press corner, Manipal-576104, Karnataka, India

Specification

DESC:FORM 2

THE PATENTS ACT, 1970

(39 of 1970)

&

THE PATENT RULES, 2003

COMPLETE SPECIFICATION

[See Section 10 and Rule 13]

TITLE:

“ARTWORK SECURITY MARK AND AUTHENTICATION METHOD THEREOF”

APPLICANT:

MANIPAL TECHNOLOGIES LTD.
A company incorporated under Indian Companies Act, 1956 having address at
PRESS CORNER, MANIPAL-576104, KARNATAKA, INDIA

PREAMBLE TO THE DESCRIPTION:
The following specification particularly describes the invention and the manner in which it is to be performed:
FIELD OF THE INVENTION
The invention relates to a method of providing variable data and photocopy proof artwork and an authentication system thereof. More specifically, the invention discloses a new digital authentication process that starts from end user and doesn’t require any manual intervention for authentication for tracking and tracing systems, to check both authenticity and the product details using covert artwork and the proprietary barcode or any standard barcode, respectively.

BACKGROUND OF THE INVENTION
Data authentication is the process of ensuring the origin and integrity of data. There are various data authentication systems developed and used. In current scenario the documents which needs to be authenticated is either sent to the authentication provider physically, then manual verification will take place, the originality is declared and then the results are given back to the end user, which is time consuming and includes lots of constraints. In the methods developed till now we see that manual intervention for document verification is very much necessary. The end user must have some prior knowledge in order to verify the physical document which might be a code or artwork sent prior to verification.
One of the techniques very much in use for data authentication is Bar Code which is an optical, machine-readable, representation of data and usually describes something about the object that carries the barcode. We see that a lot of Track and Trace systems are composed with standard barcodes, but these barcodes can be easily generated using openly available barcode technology, by any counterfeiter and fraud is more likely to happen.

Further, there are some data authentication systems which have a photocopy proof feature for secure physical document. The current photocopy proof feature available in the market is having either a visible security mark, which is a fixed artwork, which requires extra space in the product’s artwork; or, the security feature is invisible to naked eye and uses special ink which requires a special device to detect. This makes the current feature in use costly and limits its use.

US 7,152,047 discloses a system and method for authenticating documents and content thereof. A counterfeit resistant document recording medium is provided, having thereon a predefined unique document identifier and at least one security feature. A method of producing a self-authenticating document, comprising: providing a document stock having at least one anticounterfeit feature and having preprinted thereon an essentially unique identifier; providing information content for the document comprising at least one of text and graphic images; generating a digital signature of said information content; producing a self-authenticating message comprising a cryptographic combination of the digital signature and the essentially unique identifier; and printing the information content and the self-authenticating message on the document stock by means of a computer printer. The main disadvantage of this invention is online mode of operation and use of a special device or for detection of the non deterministic pattern of fibers within the authentication region which increases the cost substantially.

SUMMARY OF THE INVENTION
The present invention encompasses a data authentication method and system for securing and determining authentication of a document. Herein, the secure document is selected from group of but not limited to paper documents, cartons and labels or any kind of packaging substrate. An end user can authenticate the secure document by just capturing the security mark through proprietary smart phone, desktop application.
Further, the invention discloses three step data authentication method, generating variable data and covert artwork created for each product, authentication using proprietary smart phone, desktop application and monitoring the generated data.

In an embodiment of the present invention, method of generation of at least one variable data i.e. I-Maxode is disclosed. I-Maxode is generated using the provided information such as product id and product details by encoding machine readable codes through proprietary encoding technique. I-Maxode comprises of said provided information encoded and may include a copy proof layer. Product id and product details are either stored in I-Maxode or in the remote database server referenced by the product id encoded in the I-Maxode.

In another embodiment of the present invention, method of generation of at least one photocopy proof layer is disclosed. The photocopy proof layer is generated by adding covert text in the provided artwork for each product. To enhance the authenticity of the product, each covert text of each product is made variable so that monitoring system can detect the fake products effectively. This covert text information regarding the product is stored in the database for online system authentication.

In a preferred embodiment of the present invention, the authentication is made using at least one variable data and at least one copy proof artwork. Preferred authentication is done using Online or Offline modes. In both modes variable machine-readable code and photocopy proof layer is processed. The authenticity of the document is displayed in the preferred electronic device via application such as smart phones and desktop.

In offline mode, the end user gets the output only regarding the authenticity of the product by manually matching the covert message on the product. In online mode, not only the information regarding the authenticity, the application also fetches the product details from the database and provides the required information about the product. Hence the authentication process of this security feature is completely digital thus giving scope for various applications to adopt this new digital authentication process.

In another preferred embodiment, monitoring the data authentication is disclosed wherein all the generated data will be processed and is segregated with respect to the various products.

In another preferred embodiment, the data authentication system involves using any coated or non-coated paper as secure document substrate for printing the security mark. The variable data is printed using an inkjet or laser printer to facilitate the variability to individual document. And, the Photocopy Proof layer is printed using any of the offset printing technology. For authentication the smart-phone with imaging sensors is used. When mobile camera is focused to Security mark region, the proprietary I-ToneTM built in application automatically captures the image and processes it for authentication.

In the present invention, there is variable data and copy proof artwork is visible; the covert variable data is merged along with the artwork, which gives a strong authentication factor to the product. Also, neither authenticating the security mark require any special device to detect nor the security mark uses any special ink, hence making the system more cost efficient, more user-friendly and more space saving.

BRIEF DESCRIPTION OF THE DRAWINGS
A complete understanding of the system and method of the present invention may be obtained by reference to the following drawings:
Figure 1 shows the template of the security mark comprising a variable data and a photocopy proof layer as shown in the below figure;
Figure 2 shows the generation of variable data i.e. I-Maxode by encoding machine readable code through proprietary encoding technique as shown in the below figure;
Figure 3 shows the generation of photocopy proof artwork by adding covert text in the provided artwork as shown in the below figure;
Figure 4 shows the printing of I-Maxode and photocopy proof artwork as shown in the below figure;
Figure 5a shows the authentication process of template of security element as shown in the below figure;
Figure 5b shows the detailed authentication process of I-Maxode using the proprietary smart phone and desktop application as shown in the below figure; and
Figure 6 shows the process of monitoring involved in the I-Tone data authentication system as shown in the below figure.

DETAILED DESCRIPTION OF THE INVENTION
The present invention will now be described more fully hereinafter with reference to the accompanying drawings.
The present invention discloses a digital verification of copy protection feature using variable data and authentication result will be displayed within seconds of inputting the data.
In a preferred embodiment, Referring to Figure 1 shows the template of security mark (10) for authentication comprising of a variable data (1) i.e. I-Maxode and a photocopy proof artwork (2). Here, the variable data (1) includes a barcode, QR code, a proprietary barcode and comprises a uniquely encoded information. The photocopy proof artwork (2) is a combination of a unique covert text embedded into a unique artwork which is also variable. Therefore, a security mark (10) for authentication of a source, comprising of:
at least one variable data (1); and
at least one photocopy proof artwork (2);
wherein,
said variable data (1) comprises a unique encoded information using a proprietary encoding technique; and
said photocopy proof artwork (2) comprises a combination of unique covert text and a unique artwork.
Here, the source includes any document or product with security mark (10). The variable data (1) optionally comprises a copy proof layer. The variable data (1) includes but not limited to a barcode, QR code, a proprietary barcode printed preferably using an inkjet or laser printer. The security mark (10) is printed on any paper substrate (3) with or without coating.
Figure 2 shows the generation of variable data (1) I-MaxodeTM, wherein the system is fetched with the provided information and the information is encoded using a proprietary encoding scheme. Now, it is decided whether to store the encoded information in I-Maxode or remote server and encoded information is stored in database. Further, it is decided whether to include a copy proof layer in I-Maxode. Accordingly, the I-Maxode is generated and the copy proof layer for I-Maxode is generated. And, finally the I-Maxode with or without the copy proof layer is printed.

Figure 3 shows the generation of photocopy proof artwork (2) wherein a background design is fetched into the system and then the printing resolution of the design is defined. Now, the background design is transferred to a dot matrix image. Further, a covert text is fetched and an angle of decode is defined. Finally, the covert text is merged with the background design and a photocopy proof artwork is generated.

Figure 4 shows the printing of variable data (1) and photocopy proof artwork (2) wherein any paper substrate with or without coating is used for printing and the variable data (1) such as simple barcode, QR code or a proprietary barcode is printed using inkjet or laser printer to facilitate the variability to individual document and an artwork and photocopy proof layer using any of the offset printing technology to make a secure document.

Figure 5a shows the method of authentication which starts with the end user opening the I-ToneTM application in the smart-phone and capture the I-ToneTM security mark (10). When the mobile camera is focused to I-ToneTM Security feature region, I-Tone application will automatically capture the image, and extract the self authenticating data and processes it in two segments. Further, the system will check for online authentication. If the process is online; the application will communicate to remote server to retrieve the authenticating data. In either case when the system is offline or after the retrieval of authentication data in online mode, the authentication data is analyzed. First it will look for the variable data (1) in the captured image and validate it. If the variable data (1) is validated application will check for photocopy proof artwork (2). Now, the application will verify the originality of the document if photocopied or not and will display the authentication result. A method of authentication utilizing a security mark (10) through an authenticating system comprising the steps of:
(a) generating an authentication data;
(b) saving the authentication data in a secure database and generating a security mark;
(c) capturing the security mark (10) using an image capturing means in the authenticating system;
(d) extracting the authentication data from the captured image in step (c) using the authenticating system;
(e) retrieving authentication data from the secure database;
(f) analyzing the authentication data generated at step (a) with the authentication data retrieved from the database at step (e);
(g) validating the authentication data based on analysis in step (f); and
(h) displaying the authentication result on a means of display;
wherein,
authentication takes place in either online or offline mode;
said security mark (10) comprises at least one variable data (1) and at least one photocopy proof artwork (2);
said variable data (1) comprises a unique encoded information through proprietary encoding technique;
said photocopy proof artwork (2) comprises a unique covert text and a unique artwork combined;
extracting the authentication data comprises decoding the unique encoded information;
the authentication data is retrieved from the secure database through a remote server in online mode;
the authentication data is retrieved from the secure database stored in the authenticating system in offline mode; and
validating the authentication data comprises validating variable data (1) and photocopy proof artwork (2).
Here, in the online mode said secure database is stored either on a remote server and in the offline mode said secure database is stored in the authenticating system. the authenticating system is any electronic device configured to capture the security mark and authenticate it such as preferably a smart phone.

Figure 5b shows the detailed authentication process of variable data (1) I-Maxode using an authenticating system such as a proprietary smart phone and desktop application. After capturing the I-ToneTM security mark (10), the I-Maxode is authenticated. The I-Maxode is captured using smart phone or desktop application. Further, the I-Maxode is detected and decoded accordingly based on the respective encoding scheme. Now, it is checked if the I-Maxode is carrying the copy proof layer. If present, the copy proof layer is read for authentication. Now, the I-Maxode is checked for authenticity. Further, authentication data is fetched from remote server database and the product information is fetched based on decoded data. Now, the authentication result for variable data I-Maxode is displayed.

Figure 6 shows the process of monitoring in the I-ToneTM data authentication system. Here, in the monitoring system all the generated data is processed and segregated with respect to the various products and authentication database is accessed. The analytic report generator gives the authenticity report to the monitoring system. According to the need, the processed data will be sent to the applications.

The present invention will change the way authentication process of physical documents used to take place. The present invention has a variable covert text which is not physically distinguishable, hence making it almost impossible for one to imitate the original document. The indistinguishable artwork helps in preventing from fraud to a very large extent.

The present invention provides a significant advantage of providing digital verification; there is no question of having any manual errors that are possible with manual verification for authenticity. This security feature will ease the authentication process to the end user because he need not have any knowledge about the security mark as he need not manually check.

Therefore, the foregoing is considered as illustrative only of the principles of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation shown and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.

Many modifications and other embodiments of the invention set forth herein will readily occur to one skilled in the art to which the invention pertain having the benefit of the teachings presented in the forgoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
,CLAIMS:CLAIMS
We claim:
1. A security mark (10) for authentication of a source, comprising of:
at least one variable data (1); and
at least one photocopy proof artwork (2);
wherein,
said variable data (1) comprises a unique encoded information using a proprietary encoding technique; and
said photocopy proof artwork (2) comprises a combination of unique covert text and a unique artwork.

2. The security mark (10) as claimed in claim 1, wherein source includes any document or product with security mark.

3. The security mark (10) as claimed in claim 1, wherein the variable data (1) optionally comprises a copy proof layer.

4. The security mark (10) as claimed in claim 1, wherein the variable data (1) includes but not limited to a barcode, QR code, a proprietary barcode printed preferably using an inkjet or laser printer.

5. The security mark (10) as claimed in claim 1, wherein the security mark (10) is printed on any paper substrate (3) with or without coating.

6. A method of authentication utilizing a security mark (10) through an authenticating system comprising the steps of:

(a) generating an authentication data;
(b) saving the authentication data in a secure database and generating a security mark;
(c) capturing the security mark (10) using an image capturing means in the authenticating system;
(d) extracting the authentication data from the captured image in step (c) using the authenticating system;
(e) retrieving authentication data from the secure database;
(f) analyzing the authentication data generated at step (a) with the authentication data retrieved from the database at step (e);
(g) validating the authentication data based on analysis in step (f); and
(h) displaying the authentication result on a means of display;
wherein,
authentication takes place in either online or offline mode;
said security mark (10) comprises at least one variable data (1) and at least one photocopy proof artwork (2);
said variable data (1) comprises a unique encoded information through proprietary encoding technique;
said photocopy proof artwork (2) comprises a unique covert text and a unique artwork combined;
extracting the authentication data comprises decoding the unique encoded information;
the authentication data is retrieved from the secure database through a remote server in online mode;
the authentication data is retrieved from the secure database stored in the authenticating system in offline mode; and
validating the authentication data comprises validating variable data (1) and photocopy proof artwork (2).

7. The method as claimed in claim 6, wherein in the online mode said secure database is stored either on a remote server.

8. The method as claimed in claim 6, wherein in the offline mode said secure database is stored in the authenticating system.

9. The method as claimed in claim 6, wherein the authenticating system is any electronic device configured to capture the security mark and authenticate it such as preferably a smart phone.

Documents

Application Documents

# Name Date
1 Power of Attorney [23-03-2017(online)].pdf 2017-03-23
2 Form 5 [23-03-2017(online)].pdf 2017-03-23
3 Form 3 [23-03-2017(online)].pdf 2017-03-23
4 Form 20 [23-03-2017(online)].pdf 2017-03-23
5 Drawing [23-03-2017(online)].pdf 2017-03-23
6 Description(Provisional) [23-03-2017(online)].pdf 2017-03-23
7 201741010280-Proof of Right (MANDATORY) [22-09-2017(online)].pdf 2017-09-22
8 Correspondence By Agent_Assignment_25-09-2017.pdf 2017-09-25
9 201741010280-DRAWING [23-03-2018(online)].pdf 2018-03-23
10 201741010280-COMPLETE SPECIFICATION [23-03-2018(online)].pdf 2018-03-23
11 201741010280-FORM 18 [07-01-2019(online)].pdf 2019-01-07
12 201741010280-FER.pdf 2021-10-17
13 201741010280-PETITION u-r 6(6) [31-12-2021(online)].pdf 2021-12-31
14 201741010280-OTHERS [31-12-2021(online)].pdf 2021-12-31
15 201741010280-FER_SER_REPLY [31-12-2021(online)].pdf 2021-12-31
16 201741010280-Covering Letter [31-12-2021(online)].pdf 2021-12-31
17 201741010280-CLAIMS [31-12-2021(online)].pdf 2021-12-31
18 201741010280-US(14)-HearingNotice-(HearingDate-01-06-2023).pdf 2023-04-24
19 201741010280-FORM-26 [26-05-2023(online)].pdf 2023-05-26
20 201741010280-Correspondence to notify the Controller [26-05-2023(online)].pdf 2023-05-26
21 201741010280-Annexure [26-05-2023(online)].pdf 2023-05-26
22 201741010280-Written submissions and relevant documents [07-06-2023(online)].pdf 2023-06-07
23 201741010280-PatentCertificate28-07-2023.pdf 2023-07-28
24 201741010280-IntimationOfGrant28-07-2023.pdf 2023-07-28

Search Strategy

1 2020-11-2413-51-03E_24-11-2020.pdf

ERegister / Renewals

3rd: 23 Oct 2023

From 23/03/2019 - To 23/03/2020

4th: 23 Oct 2023

From 23/03/2020 - To 23/03/2021

5th: 23 Oct 2023

From 23/03/2021 - To 23/03/2022

6th: 23 Oct 2023

From 23/03/2022 - To 23/03/2023

7th: 23 Oct 2023

From 23/03/2023 - To 23/03/2024

8th: 07 Mar 2024

From 23/03/2024 - To 23/03/2025

9th: 17 Mar 2025

From 23/03/2025 - To 23/03/2026