Sign In to Follow Application
View All Documents & Correspondence

Method And System Of Creating Documents Comprising Security Features, Enabled Through Software Applications

Abstract: ABSTRACT: A system consisting of 3 major subsystems namely secured document template creation, secured printable objects generation and document verification tool. The system’s objective is to enable physical document authorizers, across various domains, to print high valued documents that are most difficult to create fake copies of and easier to verify their originality, both online and offline and also difficult to create fake / duplicate copies of the same. The system consists of online cloud-based software or applications to generate secured printable documents, a special printer and verification tool kit, including a mobile application for verification.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
14 December 2018
Publication Number
39/2020
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2022-05-27
Renewal Date

Applicants

Security Software & Solutions LLP
3A, Samrat Mill Compound, LBS Road, Vikhroli West, Mumbai - 400079

Inventors

1. MR. RAKESH SHAH
Ghatkopar, Mumbai - 400077

Specification

DESC:FIELD OF INVENTION

This invention relates to multiple security elements. It also relates to different types of valuable and security documents comprising all or some of such elements and the same is enabled through software.

In particular, but not exclusively, this invention relates to securing educational degree certificates and mark sheets / transcripts / statement of marks, detectable by applicable devices and similar other valuable documents.

More precisely the invention is directed towards, an improved security document and, more particularly, to a security document having a plurality of areas in which hidden warning messages are printed in differing combinations of lines, dots, and elements of various sizes and shapes.

PROBLEM / BACKGROUND / REASON BEHIND THIS INVENTION:

As used herein, the term valuable and security documents includes all types of documents or record, value and identification documents including but not limited to the following: items of currency, cheques, bank deposit receipts, insurance policies, visas, passports, identity cards, credit cards, securities, share certificates, driving licenses, deeds of title, property documents, land records, other legal documents, travel documents, entrance cards, admit cards for examinations, birth, death and marriage certificates, academic transcripts and certificates.

There is a huge problem of document forgery, duplication, tampering, counterfeiting and misuse of all above documents. The impact of counterfeiting on the image of the issuing country and even on the entire economy if counterfeiting becomes massive, may become a major problem.

Counterfeiting of any documents, as above, especially of banknotes, education transcripts, certificates, remains a major concern for the industry and the economy around the world. Most counterfeited documents are produced using common imaging and printing equipment that is readily available to any user on the consumer market. The advent of scanners and colour copiers, as well as high-resolution colour printers making use of widespread printing processes, such as ink-jet printing, thermal printing and laser printing, makes it easier and easier to produce substantial volumes of duplicate and counterfeited security papers and documents. Most document counterfeits are produced by means of the above-mentioned imaging and printing equipment and can be designated as "colour copies".

Color photocopiers have been used for years to make accurate copies of commonly available documents. In many cases, there are legitimate reasons for making such copies. Unfortunately, color copies may also be made and used for illegal purposes. Specifically, there has been concern that color copiers could be used to reproduce security documents, such as checks, stock certificates, automobile title instruments, birth certificates, college transcripts, prescriptions, and other documents of value, for illegal purposes. This concern has been heightened with the advent of desk top publishing software and hardware, including personal computers and scanners. Such desk top publishing systems allow sophisticated image processing and printing not previously generally available.

Offset-printed forgeries or "offset counterfeits" printed using commercial offset printing presses do also exist. These counterfeits are often printed in screen offset (i.e. with multi-colour screen or raster combinations that are characteristic of commercial offset printing) and/or line offset (i.e. without any screen or raster combinations).

Many techniques have been developed to prevent improper reproduction of security documents. One of the most successful is the use of a hidden warning message which is readily apparent on reproduced copies of a document, but which is invisible, or nearly so, on the original document.

Many techniques have been used to produce this effect. One technique is shown in U.S. Patent No. 4,227,720. A single tone warning phrase and a single tone background pattern are used. Tone refers to the visual effect produced by solid ink coverage or by halftone dots, bars, or marks which cover a portion of a printed area and which usually have a frequency that is measured in dots, W O 97/3273 PCT - US97/02229 lines, or marks per centimeter. Halftone dots, bars, or marks printed with a dark ink may be more or less uniformly distributed over an area to produce the visual effect of a lighter overall color. Printing an image with less than full area coverage is said to be printing less than a full tone image. The warning phrase and background pattern area tones are of different frequency and are made up of dots, bars, or marks of differing size, but they are selected to provide similar appearance to the eye of a casual observer. A less than full tone effect may also be produced by full area coverage of a paler color of ink than the darker color of ink used for the half tone dots, bars, or marks.
Because the tone of the warning phrase and the tone of the background pattern are selected to be generally the same, these two areas have much the same visual impact on an observer of the original document, and the warning phrase is not readily perceived. The optics of color copiers have typically been unable to reproduce relatively small halftone dots, lines or other elements.

As a consequence, reproduced copies of the original document will have a noticeable warning phrase.

A camouflage pattern is sometimes utilized to obscure the warning phrase further. The camouflage pattern may be defined by areas in which the dots, bars, or marks have been deleted from both the warning phrase and the background pattern. The camouflage pattern may also be defined by a pattern of dots, bars, or marks which are smaller than or larger than those used in the background pattern and the warning phrase, or by areas of complete coverage of a paler ink. The camouflage pattern may permit the tone of the warning phrase and the tone of the background pattern to differ somewhat, while confusing the eye o~ the casual observer so that the warning phrase is not readily apparent.

The 4,227,720 patent uses small dots as background elements while larger dots are used to form a W O 97/32735 PCTrUS97/02229 warning word. Other patents have used different elements to achieve a similar effect. U.S. Patent No. 4,891,666 uses small dots as background elements and line segments to form a warning word. U.S. Patent No. 5,375,886, on the other hand, uses curved lines as background elements and small dots to form the warning word. Another technique is shown in UK Patent Application GB 2,018,197 A. In this published application, line segments are used both as background elements and as warning word elements. The lines are perpendicular to each other in the areas defining the background pattern and the warning phrase.

In recent years, color copiers have been improved substantially. These new color copiers have made the above techniques less effective in protecting documents. By manipulating the control settings on such copiers, copies can be made of such documents in which the warning phrase does not appear on reproductions when some of the most commonly used frequency and size combinations are used. For example, by adjusting the settings for sharpness and lightness/darkness it has still been possible on some copiers for a skilled individual to produce a copy in which the warning phrase is not visible.

Furthermore, desk top publishing systems now available in conjunction with laser printers, offer additional possibilities for unauthorized copying. Therefore, there remains a need in the art for a security document which provides improved protection against copying over a wide range of copier settings, or against manipulation using desk top publishing systems.

To avoid the above, this invention in particular attempts to provide against counterfeiting and actively combat the problem, in particular by increasing the security level of the above mentioned documents, though not limited to the above and keeping technology ahead of fraudsters.

For this purpose, the most efficient means is to provide the documents with protective features the functioning of which is intuitive, easily authenticated, so that by mere observation or even touch, it is possible to determine whether or not it is a genuine document. In addition, these features, on which a user will focus to authenticate the document, must be sufficiently complex so that they cannot be easily reproduced by possible counterfeiters. The reliability of the security features must be therefore be guaranteed ab initio, but also over time.

Even though there exists numerous security features known to public at large and considered to be robust, these are not sufficient to prevent counterfeiting. For example, mention can be made of a security thread. Since it is integrated at the time of manufacture of the paper, it is closely bound to the mass of fibres. Integration thereof may be of “embedded” type, in which case it is only visible in transparency.

Thus hitherto known types of security features are not sufficient and are not able to cover up and overcome the above known disadvantages. Thus this invention modifies the said available features and incorporates additional multi - layers of security features to prevent document forgery, duplication, tampering, counterfeiting and misuse of all above documents.

The invention is particularly, but not exclusively, applicable to security and other documents as above, formed in a seven-layered process, with a provision to add and include more such layers to enhance the security aspect and feature.

OBJECT OF THE INVENTION:
This invention uses a defined security tool which protects the document in the printed as well as in soft form. It has been designed and developed in order to combat the document theft, counterfeit and fraud. This invention uses a layered approach which comes with seven layers of security with provision to add and include more layers, in order to fight all kinds of document fraud.

This invention follows a specific standard process which is advantageous in offering secured document solution for industries, schools, universities, students, government bodies etc.

In order to obviate the aforesaid drawbacks of secured documents and related disadvantages of other available features, the object of the invention is to provide instant solution with the simplified method and process necessary to provide secured documents and also to combat counterfeiting of the same.

First object of the invention relates to a method of creating secured documents, wherein authentic secured documents comprise security features printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the process used for producing the secured documents.

Another object of the invention is to improve the known methods in creating security documents.

Yet another object of the invention is to provide a method that exploits the intrinsic features of security features that are already typically printed, applied, or otherwise provided on security documents.

Still another object of the invention is to provide a solution that enables a robust and efficient differentiation between authentic (genuine) security documents and copies or counterfeits thereof.

Yet another object of the invention is to provide a full proof solution which has the caliber to make our life free from forgery, falsification, and alteration of high security documents being it beneficial to ourselves as well as many more associated or affected by it.
Still another object of the invention is to provide and incorporate such features which when augmented with digital authentication, smart serialization, and covert & overt features, printed information becomes tamper-resistant and difficult to replicate even by the most sophisticated fraudsters.

Still another object of the invention is to provide a solution wherein it’s unique features make it easy to add smart, overt, covert, and personalized fraud protection to each printed document increasing trust in brands by vendors, customers, and enforcement officials.

Still another object of the invention is to provide banks, government bodies, educational institutions, and legal authorities’ uniqueness amongst their documents to combat document theft.

Still another object of the invention is to demonstrate legal compliance, making it sure that suppliers are committed to anti-bribery best practices by improving the effectiveness and efficiency of the document printed through this invention process.

Further object of the invention is to create a transparency amongst the document provider and the document owner, by making the document holder’s identity, trust, and value secured from scratch as it safeguards the originality and authenticity of their personal documents.

BRIEF DESCRIPTION OF THE DRAWINGS
The embodiments herein will be better understood from the following detailed description with reference to the drawings, in which:

Fig 1 BLOCK DIAGRAM of the hardware components showing features of a system and consists of admin terminal (101), an application server (102), a file server(103), an input terminal (104), a security printer (105), and offline (106) and online verification devices (107).

Fig 2 is the Diagram of Pantograph illustrating its presentation made from special dots shape and size, Smaller dots are used for background (Fig 2.1) bigger dots (Fig 2.2) are used in text should be appear after photocopied. “VOID, COPY, PHOTOCOPY, UNAUTHORISED” Words are mostly used. Design Pattern can be used on void pantograph, example given in Fig 2.3. Figures 2.1, 2.2 and 2.3 can be in any colour, size and angle.

Extended view of the Pantograph is shown in Fig 2.4

Dynamic Void Pantograph is shown in Fig 2.5

Fig 3 is the Diagram of Ghost / Hidden Images. It depicts the feature that the hidden text can be read only under a filter paper with an angle of 45 degrees and 135 degrees. When embedded this feature to variable data it adds an extra layer of security to the document. A forger will fail to understand the significance of this feature allowing one to discriminate the original copy of the document with the forged copy. Fig 301 shows the ghost image / dual hidden image under normal view. Fig 302 depicts the hidden image at an angle of 135 degrees through decoder. Similarly the images can be in vector format as single hidden image Fig 304 and dual hidden image Fig 305.

This feature can be made of dots or line and what has been used or can be used is 75LPI, 100 LPI, and 161 LPI to make this and that can be decoded using 75, 100 and 161 LPI lenticular film by rotating an image, that is possible because of angle or position of hidden text and background are slightly different and not visible to the naked eye.

Fig 4 shows the effect of Invisible Ink on secured documents. Here the data printed using invisible ink is not at all visible to naked eyes under any circumstances. It is visible only under a UV light. One can use this feature if one wishes to cloak some data of the document. Only the organization will have the knowledge of the data that is being printed with Invisible ink. It is impossible for a forger to read this invisible data and that data will be left out in his forged document allowing you to swiftly verify the authenticity of the document.

That can be printed by only some 5 colour digital printer or on customized printer. because of that is special spot colour as printer required. Due to invisible colour others colours should not a?ect so made invisible by Logo, text, photo or any data and requires invisible ink is always overprint in document. For the better appearance of photo it is always printed in invert style.

Fig 5 is the Diagram of Dynamic Water Mark image. Here it is observed that a faint design text or data is printed during printing, One can have the Logo or Trademark or just the name of one’s organization printed in this background. One can also have even the variable data printed with this feature.

Fig 6 is the Diagram of Dynamic Static Micro-Text image, wherein the Micro text is a feature which prints the characters of the data in tiny size of font. The characters printed are so small that they appear as a line to the naked eyes. One can encapsulate the variable data of the organization into this security feature. A falsi?er will be unsuccessful in recognizing this feature and if willing to counterfeit the document, will think of it as mere a line.

Fig 7 is the Diagram of RED FILTER, wherein the static or dynamic text as printed on pink design can be decoded by only with red transparent film. Fig 7.1 shows the normal view, Fig 7.2 shows the view under Magnifying glass, and Fig 7.3 shows the view under RED FILTER wherein the hidden message appears.

DETAILED DESCRIPTION OF THE INVENTION

The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following descriptions. The examples, if any, used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly the examples should not be construed as limiting the scope of the embodiments herein.

The words “comprising”, “having”, “containing” and “including” and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items.

It must also be noted that as used herein and in appended claims, the singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Although any system or methods similar or equivalent to those described herein can be used in practise or testing of embodiments of the present disclosure, the preferred, systems and methods are now described.

Some embodiments of this disclosure, illustrating all its features, will now be discussed in detail. The disclosed embodiments are merely exemplary of the disclosure which may be embodied in various forms.

Before setting forth the detailed explanation, it is noted that all of the discussions below, regardless of the particular implementation being described, is exemplary in nature, rather than limiting.

Referring now to the drawings and more particularly to Fig 1, is a block diagram showing features of a system for creating and verifying the authenticity of secure documents, according to an embodiment of the present invention. The system includes an admin terminal (101), an application server (102), a file server (103), an input terminal (104), a security printer (105) and offline (106) & online verification devices (107).

Document issuing organization would create application setup, template setup and template creation using the Administration Terminal. The type and count of security elements to be present on the document, the variable data fields representing text & image at desired location on the document and more is defined here. Each security element is then mapped with data-fields from the data source that carries the actual data to print. This makes it ready to accept and process the actual data from input terminal.

Input terminal would pass the entire or a sub-set of the real data source to application server. Application server would detect and inform for, if, any bad data within the data source. The acceptable data is then passed by the application server to embed security elements based on the defined template and generate printable object. Exactly when the printable objects are returned back to the input terminal, a digital version of the individual document is stored on secured file server.

The print objects, received back by the input terminal, could either be in a format that is directly usable by the native software of terminal or can be embodied in formats that can be read by only certain proprietary software in the terminal.

The application server assigns a unique identifier, such as an identifier (2D) barcode to the print objects, before returning to the input terminal. And additional unique identifier can be added by the input terminal as well, when using a proprietary software in the terminal.

The character string for the barcode may be generated using a proprietary algorithm, so that scanning the barcode with a commercially available scanner will not provide the correct character string. A proprietary scanner would be required to obtain the correct character string for the security barcode.

In response to receiving the new print object from the input terminal, the security printer prints a secure document containing the content and the unique identifier. The secure document is then ready for distribution to the intended recipients.

According to this invention the stages of process for creating such security feature enabled documents are herein described briefly below:

This invention provides seven layered security approach, which is meant to stop all types of document frauds.

This invention is a document security tool which comes with seven layers of security, at present, with a provision to add more similar features. These seven features or seven layers of security includes -

1. Secured Paper
2. Secured Design
3. Secured Print
4. Secured Data
5. Secured Depository
6. QR code with Private Key
7. DNA of the document

The aforesaid seven layers of security for the high-valued document are described in brief as below:

In the process, firstly security paper are selected having dispersed fibre with UV Glow, non-tearable substrate, substrate with customized water mark, planchettes and security fibres. The paper on which the document is printed is secured with several features that are incorporated at the paper manufacturing level. Some common categories include - 150 GSM: Currency Thread Embedded Paper and 95 GSM: CBS 1 paper with Customized Watermark.

Secondly, in the process secured designing features are incorporated by creating guilloche pattern on top and lower design of the page, to make it unique and difficult to create a copy without the professional software.

Further, to prevent photocopying static micro text is incorporated along with void pantograph feature (Anti Copy Mark) to identify a document if photocopied or scanned. Micro Printing requires magnification to read and becomes illegible after photocopying. Void Pantograph (Anti Copy Mark) discourages replication with copy-evident Pantograph. Used to prevent unauthorized copying, a Pantograph is a copy-evident feature which prevents a security message, such as Void or Copy, after being photocopied or scanned.

Also an increased layer of security is also incorporated by including static ghost image wherein any company logo or university logo or any similar static text in coded structure to ensure its visibility only under a filter. Static Ghost Image helps to increase the layered security with a Ghost Image. A Ghost Image creates an additional security layer by placing a company logo, or any static text in coded structure so that it can be visible under a filter only.

Thirdly, in the process, secured printing technique is adopted by including wide and varied additional printing related features such as securedUV inks which are visible only under UV verification light, invisible UV ink for copy prevention, thermo chromic ink which changes colour of the text when temperature in surrounding areas increases, watermark background along with other features such as embossing, hologram, hot fail stamping, fluorescent print related features. These inks are invisible to the naked eye, only fluorescing under a UV verification light. Thermochromic Ink is also used wherein it is temperature changing inks to identify originality. A geometric symbol can be printed with a special type of ink which changes color when temperature of surrounding increases. Watermark Image or Watermark Background is also used. This is static watermark printed across the document. This is anti xerox background and enables duplication proof environment. More features like Embossing, Hologram, Hot foil stamping, Fluorescent print are also available in secure print process and steps.

Fourthly, in the process, secured data incorporates the features like, variable ghost image, variable micro text, variable watermark, and variable UV text providing additional layers of security for copy prevention. Thus the data printed on the document can be regular or given a special treatment. The special treatment makes both static and variable data difficult to create a copy of and easy for creators to offline verify. Variable Ghost Image increases layered security with a Variable Ghost Image. A Ghost Image (301) creates an additional security layer by placing unique information about the person/organization holding the certificate/ document. Variable Micro Text (Fig 6), adds variable data to secure Micro Printing. Variable Micro Printing provides a secondary means to verify a document’s authenticity by injecting variable data into traditional Micro Print lines. Variable Watermark creates tamper-proof documents with variable SECUREMark. SECUREMark is a unique watermark of static or variable data, printed diagonally across the document overtly with Black Fluorescing UV Ink or covertly with SecureUV Ink. With personalized, variable data, this anti-tampering watermark helps to easily verify a document’s authenticity. Variable UV Text further strengthens copy prevention with UV Text. Using SecureUV inks with existing security elements, such as SECUREMark, adds additional layers of security for copy prevention.

Fifthly, in the process secured depository feature is enabled by providing a scalable, secure, easy to deploy print platform through software on doc visual designer, as created as part of the security feature. The robust WYSIWYG interface enables users to easily create and manage multiple security templates across multiple administration terminals, on cloud computing system or on-premise development options. This scalable solution allows easy development to 1000’s of print locations, having secure platform with 256bit SSL and hashed encryption algorithms.

Sixthly, in the process authentication of documents on the go can be carried out with QR code which enables digital verification with a smart phone to quickly confirm the authenticity of a document. Here the Proprietary QR code is encrypted, via a hashed algorithm, which prevents unauthorized users from scanning the code and in turn makes counterfeiting impossible. Each individual instance of the system may bear a different algorithm encryption key, making it even further difficult to crack. The use of this 2D barcode along with verification device is discussed in brief, later in the document.

Finally in the process the document is secured by DNA barcode, wherein the barcode design can be read only by the private mobile / server application, and it contains the data regarding the printing history of the document. Further in the process each document and page is assigned a unique, non-sequential serial code which contains important information about each print job, including information on who, when and where a document was printed. This DNA OF THE DOCUMENT or the DNA Barcode is a 1-dimensional barcode or can be a 2-dimensional matrix code. It is added to the secured document with a special purpose of tracing. It can be read by any barcode scanner but it gives meaning only when scanned by the verification device. This contains the data regarding the printing history of the document. Each document is assigned a unique, inter-template-sequential serial code which contains important information about each print job, including who, when, and where a document was printed.

Document Creation & Print Process

Fig.1 shows system elements as administration terminal, application server, file server, input terminal and printer.

The administrator of the issuing organization for the application will firstly use the administration terminal (101) to populate the various master data. That includes the fonts to use for each template, background image for the document and more.

The template of the document is then made using WYSWYG drag-and-drop based canvas. Each security element, described in section above, provides different attributes that can be set and adjusted for better quality control.

Templates are easy to create copies of, reducing time effort. Templates are exportable in common XML formats, making them inter-instance compatible.
Then, a data source is mapped with the individual fields or elements of the document. The categories of template elements are: static text (remains same across all the documents of same template), variable text (different value for different documents of the same template), static images (logo and signatures) and dynamic images (photo of the document owner).

Each element is then mapped with its appropriate data source field. A sample resulting document is then generated, and thereafter is printed for approvals.

The Application server (102), holds the application instance and the SQL database for storing operational, accounting and meta-data for the application. We skip the need to store user’s document related critical data in our system, adding a special layer of security.

The input terminal (104) may include any device capable of receiving user input such as one or more of a mouse, a keyboard, a microphone, a camera, a scanner, a biometric authentication device or the like. The biometric authentication device can detect a biometric of a potential user such as a fingerprint, an image of an eye, a voice or the like. The biometric authentication device may only allow use of the print terminal if the detected biometric of the potential user matches an authorized biometric. In that regard, only authorized users can use the input terminal. This prevents unauthorized creation and registration of secure documents, thereby minimizing or rather obviating creation of forged documents.

Input terminal user provides data source with actual live data to print on documents, to the application server. Application server generates a combination of secured template with unique identifiers and produces printable objects. These objects can be encrypted to put control on printing process, for only the proprietary application on input terminal to print the application. It can also be a generic object that can be read and print directly by the input terminal’s operating system.

Online Verification Method:
The online verification device (107) may be a proprietary device or may be an existing mobile device with a mobile application (app).

The process of online verification by a network enabled Graphical User Interface (GUI) based device is described in details now.

The verification device performs functions to verify the authenticity of the secure document. The verification device includes an interface, such as a graphical user interface (GUI), through which a user can control its functions. The functions and GUI of the verification device are implemented using software, firmware and/or dedicated hardware. The software, firmware and/or dedicated hardware may be provided as part of the verification device or may be installed on the verification device as a mobile application (app).

When the verification functions of the verification device are operational a base screen is shown on the GUI. A user then directs the camera towards the security feature. In some embodiments the verification device continuously or periodically monitors for security features and automatically captures the security feature when it is detected. In some embodiments the user requests the verification device it to capture the security feature via an input.

The GUI detects a field showing the character string, represented by the identifier barcode. The character string is transferred to the application server database. An indication of whether the character string is registered is provided to the verification device. The GUI includes a status field showing whether the character string is registered based on the data received from the application server database.

The GUI also includes a contact button. The verification device may provide contact information of a help center or may automatically connect the user to the help center in response to the contact button being selected.

The GUI displays the copy of the content of the original print object. The user can then compare the content of the original print object to the content of the secure document. If the content matches, the user may feel confident that the secure document is authentic. If the content does not match, the user may assume that the secure document is altered or forged.

Offline Verification Method:
Offline verification process includes tools (106) such as a portable UV light source, magnifying glass, special transparent filter paper and more. These are pressed/applied on the physical document at the specific locations to seek the security elements on paper, as they are not visible and obvious by a naked eye. The administrator & creator of the documents know their exact positions, as it was part of the secured template creation.

Although the present invention is set forth herein in the context of the appended drawing figures, it should be appreciated that the invention is not limited to the specific form or forms shown. Modifications, variations, and enhancements in the design and arrangement of the method and device set forth herein may be made without departing from the spirit and scope of the present invention as set forth in the appended claims.

SUMMARY OF THE INVENTION

A general aim of the invention is therefore to improve the known methods and also to incorporate additional new features to ensure the security of documents, as above.

More precisely, a further aim of the invention is to provide a method that exploits the intrinsic features of the security features that are already typically printed, applied or otherwise provided on the security documents.

A further aim of the present invention is to provide a solution that enables a robust and efficient differentiation between authentic (genuine) security documents and copies or counterfeits thereof.

Still another aim of the present invention is to provide a solution that can be implemented in automatic document processing systems (such as through software applications) in a more simple manner than the currently known solutions.
,CLAIMS: WE CLAIM:
1. A system and method for creating documents comprising different layers of security features, enabled through software applications and includes a secured template, including a data source mapping; associating an identifier with the content; generating a security feature based on the identifier; transmitting the identifier and the content to a database; and sending the content and the generated security feature to a printer for printing a secure document containing the content and the security feature, in different layers, with a provision to add up more layers of security features.

2. The method of claim 1, wherein generating the security feature includes: generating a decoy encrypted two-dimensional (2-D) barcode commonly called as QR code.

3. The method of claim 1, wherein scanning the encrypted 2-D barcode or the identifier 2-D barcode using a standard 2-D barcode reader results in redirection to a webpage; and a indirect notification is sent to an operator that the 2-D barcode has been scanned using the standard 2-D barcode reader.

4. The method of claim 1, further comprising printing the content and the associated security feature using the special printer, using ultraviolet-responsive ink or toner, that is easy to verify physically and digitally.

5. The method of claim further comprising of providing 7 layers of security starting from the paper quality, design, security print and layers of digital securities, with provisions to add and include more layers with additional and enhanced security features.

6. The method of claim 1, further comprising storing the identifier and the content in the database and associating the identifier with the content in the database.

7. The method of claim 1, further includes the system for verifying authenticity of a secure document in an online mode i.e. digitally by a network enabled GUI based device and also in an offline mode with tools such as a portable UV light source, magnifying glass, special transparent filter paper and more.

8. The method of claim 1, for creating security featured enabled secured document is resident on the application download server or on cloud computing system.

9. The method of claim 1, complying the security enabled features, augmented with digital authentication, smart serialization, covert and overt features, printed information or output becomes tamper –resistant and non-replicable.

10. A system for performing the method as claimed in any of the claims 1 to 9.

Documents

Application Documents

# Name Date
1 201821047508-PROVISIONAL SPECIFICATION [14-12-2018(online)].pdf 2018-12-14
2 201821047508-OTHERS [14-12-2018(online)].pdf 2018-12-14
3 201821047508-FORM FOR SMALL ENTITY(FORM-28) [14-12-2018(online)].pdf 2018-12-14
4 201821047508-FORM FOR SMALL ENTITY [14-12-2018(online)].pdf 2018-12-14
5 201821047508-FORM 1 [14-12-2018(online)].pdf 2018-12-14
6 201821047508-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [14-12-2018(online)].pdf 2018-12-14
7 201821047508-FORM 3 [14-12-2019(online)].pdf 2019-12-14
8 201821047508-ENDORSEMENT BY INVENTORS [14-12-2019(online)].pdf 2019-12-14
9 201821047508-DRAWING [14-12-2019(online)].pdf 2019-12-14
10 201821047508-CORRESPONDENCE-OTHERS [14-12-2019(online)].pdf 2019-12-14
11 201821047508-COMPLETE SPECIFICATION [14-12-2019(online)].pdf 2019-12-14
12 201821047508-FORM-26 [17-06-2020(online)].pdf 2020-06-17
13 201821047508-FORM-9 [16-09-2020(online)].pdf 2020-09-16
14 201821047508-FORM 18 [20-10-2020(online)].pdf 2020-10-20
15 201821047508-STARTUP [16-12-2020(online)].pdf 2020-12-16
16 201821047508-OTHERS [16-12-2020(online)].pdf 2020-12-16
17 201821047508-FORM FOR STARTUP [16-12-2020(online)].pdf 2020-12-16
18 201821047508-FORM 18A [16-12-2020(online)].pdf 2020-12-16
19 201821047508-OTHERS [16-07-2021(online)].pdf 2021-07-16
20 201821047508-FER_SER_REPLY [16-07-2021(online)].pdf 2021-07-16
21 201821047508-COMPLETE SPECIFICATION [16-07-2021(online)].pdf 2021-07-16
22 201821047508-CLAIMS [16-07-2021(online)].pdf 2021-07-16
23 201821047508-ABSTRACT [16-07-2021(online)].pdf 2021-07-16
24 201821047508-Correspondence to notify the Controller [19-09-2021(online)].pdf 2021-09-19
25 201821047508-Written submissions and relevant documents [03-10-2021(online)].pdf 2021-10-03
26 201821047508-Annexure [03-10-2021(online)].pdf 2021-10-03
27 Abstract1.jpg 2021-10-18
28 201821047508-US(14)-HearingNotice-(HearingDate-21-09-2021).pdf 2021-10-18
29 201821047508-FER.pdf 2021-10-18
30 201821047508-US(14)-ExtendedHearingNotice-(HearingDate-25-02-2022).pdf 2022-02-12
31 201821047508-Correspondence to notify the Controller [22-02-2022(online)].pdf 2022-02-22
32 201821047508-Written submissions and relevant documents [11-03-2022(online)].pdf 2022-03-11
33 201821047508-RELEVANT DOCUMENTS [11-03-2022(online)].pdf 2022-03-11
34 201821047508-PETITION UNDER RULE 137 [11-03-2022(online)].pdf 2022-03-11
35 201821047508-Annexure [11-03-2022(online)].pdf 2022-03-11
36 201821047508-Retyped Pages under Rule 14(1) [26-05-2022(online)].pdf 2022-05-26
37 201821047508-2. Marked Copy under Rule 14(2) [26-05-2022(online)].pdf 2022-05-26
38 201821047508-PatentCertificate27-05-2022.pdf 2022-05-27
39 201821047508-IntimationOfGrant27-05-2022.pdf 2022-05-27
40 201821047508-POWER OF AUTHORITY [06-06-2024(online)].pdf 2024-06-06
41 201821047508-FORM-15 [06-06-2024(online)].pdf 2024-06-06
42 201821047508-RELEVANT DOCUMENTS [27-02-2025(online)].pdf 2025-02-27

Search Strategy

1 2021-01-1218-02-46E_12-01-2021.pdf

ERegister / Renewals

3rd: 03 Jun 2022

From 14/12/2020 - To 14/12/2021

4th: 03 Jun 2022

From 14/12/2021 - To 14/12/2022

5th: 27 Feb 2025

From 14/12/2022 - To 14/12/2023

6th: 27 Feb 2025

From 14/12/2023 - To 14/12/2024

7th: 27 Feb 2025

From 14/12/2024 - To 14/12/2025

8th: 27 Feb 2025

From 14/12/2025 - To 14/12/2026