Abstract: A tamper proofing and iftampered a detail tamper recording document. The tamper proof document of either paper or printable film surface. Water marked detail coded and graphed paper, with double side printed or typed against a centre or side graph grid as a master reference point and guide. With visible and invisible ink, láser micro etching, punch ing, cutting and láser micro punched holes to carry ink o both sides. The through the paper or film láser focused lighting and micro-photography or spot microscope recording from the reverse side, for creating master permanent recording for the main Data Base.
01.1 claim a tamper proof document coding with a million possibilities and locations to hide it anywhere on or into the length and breadth of the document face. The exact location size and nature of coding can be created with ease as you créate the document. Coded ¡n visible or invisible tamper proof or evident creating ink or colour changing ink is marked anywhere in the body of the document, with regular printing or impression on the surface of the paper or film having a face for providing information like a sheet of paper. The marking can be on the surface of the paper or into the subsurface or vía the body of the paper on to the other side or opposite side of the paper or printable film-details given below. Any surface that can be printed or etched or marked can be coded with this system.
2. The printer sets the coding points all over the page of the paper or film via conventional printing, screen printing or hand writing or embossing, as he carries out his normal printing work. Any normal typing, printing or computer generated transfer of ink on to the surface of the paper, can also use specialized printing into the layer below surface layer of the paper or film or extend on to the other side of the document paper via the micro holes on the paper. The marking can also be colour coded into the page by a very sharp instrument or láser and the special security ink that extent to the other side if necessary can be made to soak deeper into the layer depending on the quantity of fluid used. This will prevent any tampering with chemical or attempt to erase and change, depending on the chemical compounding of the ink any attempt will leave a tampering mark or smudge mark if a fluid has been used to erase the mark. Complex coding can be worked out to su i te the requirements of the end user, to enhance the security of the document, an alpha- numérica! XY graph as shown in the drawing. In addition pixel blocks are embedded into the paper document at specific points in reference with the edge XY graph or the graph in the centre of the page. This will enable to créate tampering proof and record the tampering or alteration for forensic inspectors to investígate and gather enough evidence to prosecute.
3. A pre-printed "x" "y" axis on two edges on the same side or face of paper or a Cartesian coordínate graph of "x" "y" axis on the centre of the page is pre-imposed or printed on the paper face. This will enable us to créate design in reference to the Cartesian coordinated graph with reference with on the "x" "y" axis. In addition on the xyz Cartesian coordínate system 3D design to lócate the point of the security marking, using a right hand system or java system. We can also use a "maths frame" or "computer graphic frame". An accurate scale marking is incorporated on to the full length of the horizontal arm and the vertical arm.
04.A visually inconspicuous image pattern or water mark is superimposed or hidden in a image or Logo design on the surface of the paper or film or in the body of the document, visible only under specialised microscopic inspection. These water marks or codes divided into plurality ofsmall pixel blocks can be incorporated into the document images, logos or text via visible or invisible ink. The above axis graph or Cartesian coordínate graph is printed in grey or any dull colour that will not clash with the printed, typed or computer generated standard document of black or dark blue type face. Visible or invisible ink can also be selected for this specific graph printing. As you type or print on the document page every alphabet on the sheet is locked automatically into a spot in reference to the Cartesian coordínate graph on the centre of the page.
05. Any document that represent valué, particular/y land Regístration documents, wills, settlement documents, partition documents, loan documents, guarantee document, mortgage document, company contracts, Buyer Seller agreements, security documents of all variety from passport to cheques. In fact all document that is of vital and valuable in nature and record valué and terms of agreement and terms are open to tampering and alteration. These important documents are of vital interest and attention to the forger. These documents ha ve been subject matter of the forensic inspectors, detail inspection study, investigaron and criminal action leading to pólice action and court cases.
06.This inventor has taken into consideration various assaults the documents are subjected to, including physical assault using specialized knifes, scrappers, needle points and a variety of specialised instruments, some even power driven and computer controlled for precisión working to remove layers without much damage. In addition to the micro cutting and scraping there exists a range of specialised chemical process that the forgers use to remove the existing text, valué, signature, date, place, seáis, stampings, government seáis, numbers and references. Alkaline based label remover known as "Label Remover" nonpolar solvents, ethyl acétate or trichloroethylene are some of the chemicals used. In addition to few diluted acids on cotton swab.
07.Creating tamper evident document may be ofalmost importance. Any document where there is a possibility or likelihood of alteration or forgery of the document because of its valué must be tamper proofed with security featured and if it is tampered in spite of the security features it must be able to capture, Record and preserve the tampering or alteration carried out on that document and in that specific área that was tampered. In particular documents which if alte red would severely undermine the valué ofthe document to the company or person and change the original valué totally. This must be protected with strong securíty features to prevent tempering or changing any valúes unofficially.
08. When the customer types his document subject on to our securíty paper over the Cartesian coordinated graph he creates a very secure document, where every alphabet, at every point is locked into the graph body in reference to "X" and "Y" axis. When he types the reverse page, or adds it via hand writing or computer prínting or any type of prínting he creates a record where every alphabet at every point is locked in reference to the existing prínting on the opposite or reverse side and the Cartesian coordinated graph, creating a double sided secured document, where every alphabet on both sides are locked into exact point to each other on both sides as well as in reference to the graph prínted in the centre of the page. In addition if and in reference to 2D and 3D modelling we can pin point the additional exact points and note the existing alphabets on either side of the paper and at that point on the opposite side of the document. The entire document every alphabet on both side ofevery page is locked in place in reference to the Cartesian Coordinated graph in the centre of the page.
09.1fyou set this document page against a strong back lit glass panel, like a doctor's x-ray examination "lite Box" every alphabet on both sides can be seen for verífication. Additionally severa/ other patented securíty producís or coders available in the market, including our own patented coding system can be added to protect these valuable documents like Land Registraron document, Purchase or léase agreement from builders, company contracts and such other valuable documents. One or more securíty features can be and must be built into these documents to make them more secure. Our documents can be secured by several Patented and patent pending securíty featured that can be incorporated at the time of creation of the document. We can use our own patented or other coders or securíty feature for additional protection that will add to the securíty level of the document.
10.A major securíty risk that very valuable documents are subject to, and yet not given its due attention and protection are documents that are pledged with various institutions or courts for long period of time. The very nature of the of system that is prevalent in our lower courts, government departments, public institutions must be seen to be believed. A securíty minded person will get a nightmare.
The way the document is handled carelessly by untrained people and the hours it is left on the staff table in open office, open to anyone entering that office. The oíd wooden cupboards with cheap mass produced locking system and at times with broken and without a proper latch or lock. Cupboards with worn-out key or without hinges or broken side wooden planks are a reality.
11. The biggest risk is unscrupulous handiers taking colour photocopy of the document making altered copies, tampering the valué, date, and signature and exchanging them with the original documents. Will the owner recognize his own document after handling by a multiplicity off handiers? Would he be sure it is his own document or is it a good colour copy crated by a master craftsman in his specialized field. Imagine the destruction it can cause when this document is returned to the original owner or ownes, twenty or thirty years after the loan is closed, or a decade or two after a judgement.
12.Risk is a combination of factors that threaten the document safety at every stage. The creation, handling, safekeeping, transporting, by the departments, pólice and Courts al I ha ve to take special precaution to preserve the security of the original document. The document is vulnerable at every stage of its long Ufe. Merely creating a secure document without the active support of the other public institutions will not work.
13. When a land is usurped or stolen by a false document a family is destroyed. When that case goes to court and takes decades for a final judgement, the next generation, the chiidren's generation is destroyed. Imagine if that judgement is based on false forensic report based on forged document" DESTRUCTION FOR DECADES". All this due to one single forged document. If that document of that citizen was fully secured and had the guaranteed protection of the Pólice, institutions, government and the courts, so much of destruction, pain time and money could ha ve been saved for severa I of those families a I I-a round.
14.In reference to the Cartesian coordínate graph or the regular X Y graph printed at the edges of the security paper we can Láser etch, cut micro designs, logo, number, ñame or other specific marking into the paper micro-punch holes, other láser markings in the body of the document at specific points on the document, or anywhere within a text, ímage or logo in the área of the graph. These can be hidden or camouflaged into the Images, text or Logos on the document or layers of the paper or film.
With printing on both side of the specific graphed paper and each specific alphabet on either side locked into specific point of the doeument graph paper the security is enhanced múltiple times. Láser etched and coded micro-designs will enhance the security of these original markings and its exact location on the body of the doeument is only known to the original doeument creator.
15. These micro punched holes can be colour coded if need be or other micro-faceted múltiple particles be embedded in specific watermarks with chemical fingerprint readable with the latest "Tricoder" or specialised powerful hyperspectral sensors, capable of identifying the chemical compounds. There could also be other specific specialised hard to find matters impregnated at select points, onl known to the original security paper creater. With Láser light projected through the security paper and when Micro-photograph or Microscopy photographed is taken from the opposite side, the recording will be clinically specific and very clear undisputable recoded evidence.
16.Specific bio-markers, dry blood or DNA markers and several other producís of plant or animal origin can also be used for specialised markers on the doeument. These markers open the selection and range to millions of producís and many more in combination. Extremely difficult to copy, identify, lócate and replace in the original. The biggest advantage will be that as the original master coder creator of the security paper, we will have the advantage of knowing the exact product, item, component or mixture that was used by us in the original coding. In later forensic investigaron we will be a ble to check with our master datábase.
17.A very strong verifiable inspection photos taken via Láser lights projected from rear the back of the paper, through the paper and recorder via original digital microscope, digital micro-photography equipment from the front or opposite side of the paper recording the interna! structure of the paper and its fibre skeleton and matrix is a very strong record of the specific área. The detall xray photograph of the stickers or the photos taken with special equipment's of the fu II pages with the XY and XYZ sea le in place with visible and invisible coding in place makes a permanent recording, that is verifiable non-alterable at any time. This master recoding stored in our main datábase can be the main reference point.
These micro-perforations or pinholes, Láser designs numbers in the paper with colouring and coding and chemically dosed water marked áreas are also captured in relationship with the text on both the sides visible, through the paper photographs with special equipments, digital format, UV marking recording, and other specialised sean ni ng methods. When this document is placed on a powerful back lit glass panel and photographed with specialised high resolution equipment, with various lens, induding micro-photography lens créate a very strong non tamper proof non forgeable recording.
18. We will add specialised in depth robust watermarks, and múltiple layered security coding, so that if they tamper with one layer it will destroy or damage the other layers, keeping the vulnerability of these documents before us at every stage, our endower will be to code it in múltiple layers.
Risk is a combination of factors that threaten the document safety and environment at every stage, Public, Pólice and every department of the Governments and the Courts must give special security protection when that document is in their procession, protection and care.
The goal of this invention is to créate and protect a secure document, to maintain the confidentiality of its original purpose and valué for which it was created for its owner or owners.
Claims
01. A tamper evident or recording document comprising of a paper substrate
or príntable film substrate or face for providing information, printing with the
Cartesian coordinates graph printed in visible ink, invisible ink or UV and
speciality inks, at the centre of the document page, either two dimensión only
or in three dimensión.
02. Water marked in reference to the printed graph, with chemical micro-
coding data, logo, design and micro printing.
3. The document paper is printed at the edges(edge printing) with XY axis graph, with measuring scale or alphabetic list from "A" to "Z" or alphanumeric mixed listing.
4. The base Cartesian coordinates graph printer over a watermark or specialised coding or the standard x y graph is printed on water marked paper, with side coding. Single quadrant Cartesian Grid.
05.The paper or film is also Láser engraved, micro or Nano marked, design, numbers added, punched, cut, and textured before or after adding the graphs. Speciality stickers added if necessary to enhance security
06.Chemically coded with UV ink, visible ink, invisible ink, colour changing coding inks so any chemical tampering, scrapping, rubbing, or any physical use of pressure will disfigure or leave tampering evidence at site.
07.Coding with Múltiple matter with multi-faceted reflective refractive , transparent particles and surfaces of micro and Nano particles, as per previous patents.
08.The document printer or creator further creates millions of múltiple coding recoded registered points of reference as the document creator types in each and every alphabet, every alphabet added on to the Cartesian coordínate graph or the ordinary Single quadrant Cartesian Grid, XY graph is locked in specific reference point, in reference to the graph. Every Y or "a" or "m" or" "s" of every word. In fact every alphabet is locked into exact point on the graph on either side.
Added security when he types in or add the reveré side of the same page, each of these alphabets are locked into specific points. An "e" or "G" or a "P" used in a word is locked into that reference point on the graph or the reverse side of that paper meaning that document.
09.When this document paper is set against a Láser light Box or LED light Box like Doctors xray reading light box. These through the paper projections of light must be Micro-photographed with a high resolution camera, to capture and record these images. The reflected refracted "Raman effect" light dispersión must be captured and recorded as a security feature and reference. This will be the strongest un-alterable un-tamperable evidence.
10. A document with very strong tamper proof, tamper resistant and recording possibilities at every stage. If tampered or attempt to alter or tamper it will capture and record in detail all attempts, in this impossible to forge document. The necessary environment around it and the protective systems and practices must be developed by the government, pólice and the Judiciary.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 2409-CHE-2015 FORM-2 12-05-2015..pdf | 2015-05-12 |
| 1 | 2409-CHE-2015-US(14)-HearingNotice-(HearingDate-06-12-2021).pdf | 2021-11-09 |
| 2 | Amended Pages Of Specification_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 2 | 2409-CHE-2015 FORM-18 12-05-2015.pdf | 2015-05-12 |
| 3 | Claims_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 3 | 2409-CHE-2015 FORM-1 12-05-2015.pdf | 2015-05-12 |
| 4 | Correspondence by Applicant_Reply to Examination Report_16-08-2019.pdf | 2019-08-16 |
| 4 | 2409-CHE-2015 DESCRIPTION (COMPLETE) 12-05-2015..pdf | 2015-05-12 |
| 5 | Drawing_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 5 | 2409-CHE-2015 CORRESPONDENCE OTHERS 12-05-2015.pdf | 2015-05-12 |
| 6 | Form2 Title Page_Complete FER Reply_16-08-2019.pdf | 2019-08-16 |
| 6 | 2409-CHE-2015 CLAIMS 12-05-2015.pdf | 2015-05-12 |
| 7 | Marked Copy_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 7 | 2409-CHE-2015 ABSTRACT 12-05-2015.pdf | 2015-05-12 |
| 8 | 2409-CHE-2015-FER.pdf | 2019-02-28 |
| 9 | Marked Copy_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 9 | 2409-CHE-2015 ABSTRACT 12-05-2015.pdf | 2015-05-12 |
| 10 | 2409-CHE-2015 CLAIMS 12-05-2015.pdf | 2015-05-12 |
| 10 | Form2 Title Page_Complete FER Reply_16-08-2019.pdf | 2019-08-16 |
| 11 | Drawing_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 11 | 2409-CHE-2015 CORRESPONDENCE OTHERS 12-05-2015.pdf | 2015-05-12 |
| 12 | Correspondence by Applicant_Reply to Examination Report_16-08-2019.pdf | 2019-08-16 |
| 12 | 2409-CHE-2015 DESCRIPTION (COMPLETE) 12-05-2015..pdf | 2015-05-12 |
| 13 | Claims_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 13 | 2409-CHE-2015 FORM-1 12-05-2015.pdf | 2015-05-12 |
| 14 | Amended Pages Of Specification_FER Reply_16-08-2019.pdf | 2019-08-16 |
| 14 | 2409-CHE-2015 FORM-18 12-05-2015.pdf | 2015-05-12 |
| 15 | 2409-CHE-2015-US(14)-HearingNotice-(HearingDate-06-12-2021).pdf | 2021-11-09 |
| 15 | 2409-CHE-2015 FORM-2 12-05-2015..pdf | 2015-05-12 |
| 1 | 2409CHE2015searchstrategy_15-06-2018.pdf |