05.12.2012 Views

research activities in 2007 - CSEM

research activities in 2007 - CSEM

research activities in 2007 - CSEM

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Counterfeit – Mach<strong>in</strong>e Readable Covert Security Feature<br />

J. Pierer, U. Gubler, N. Blondiaux, R. Pug<strong>in</strong>, C. Keck, H. Walter<br />

By comb<strong>in</strong><strong>in</strong>g Micro and Nano technologies <strong>CSEM</strong> has developed a security system to directly mark products and verify their authenticity.<br />

Due to forged products various <strong>in</strong>dustry sectors experience<br />

huge damages account<strong>in</strong>g to several hundred billion US<br />

Dollars a year [1] . Consequently, extensive efforts are made to<br />

<strong>in</strong>crease protection of products at risk. The development and<br />

implementation of new security systems opens a huge market<br />

to be exploited.<br />

However, to understand this market, one has to understand<br />

the characteristics of security features. Most safety features<br />

and safety equipment are safe only for a short period of time,<br />

depend<strong>in</strong>g on how long it takes for forgers to counterfeit the<br />

technique. Extend<strong>in</strong>g the secure period of a safety device is<br />

therefore one of the most important requirements when<br />

develop<strong>in</strong>g new security systems.<br />

In order to meet these requirements, <strong>CSEM</strong> designed a new<br />

system show<strong>in</strong>g two ma<strong>in</strong> characteristics:<br />

• A random pattern [2] which is difficult to be copied was<br />

developed as a ma<strong>in</strong> security feature<br />

• In order to read those random patterns an <strong>in</strong>strument was<br />

developed which is able to read those features’, but is no<br />

use to somebody who does not know what to look for.<br />

By process control these patterns can be designed to meet<br />

certa<strong>in</strong> specifications with regard to the features of average<br />

size and consequently average period. Their organization,<br />

however, rema<strong>in</strong>s completely random.<br />

The coherent light of a laser is used to illum<strong>in</strong>ate the pattern.<br />

The light is scattered on each element of the structure. Every<br />

s<strong>in</strong>gle element can then be seen as a new source of light.<br />

Investigat<strong>in</strong>g the <strong>in</strong>tensity of the scattered light at any po<strong>in</strong>t <strong>in</strong><br />

space will result <strong>in</strong> a value given by the superposition of the<br />

light of all these sources. Depend<strong>in</strong>g on <strong>in</strong>cidence angle,<br />

structure period and wavelength of the light one gets a<br />

particular <strong>in</strong>tensity distribution. However, s<strong>in</strong>ce the features<br />

are randomly aligned the image shows a so called speckle<br />

pattern (Figure 1).<br />

Figure 1: Image of a speckle pattern on a paper target, left: small<br />

spot illum<strong>in</strong>ated, right: large spot illum<strong>in</strong>ated<br />

When illum<strong>in</strong>at<strong>in</strong>g a small spot of the security feature (about<br />

30 µm) a well dist<strong>in</strong>guishable speckle pattern becomes<br />

visible. By enlarg<strong>in</strong>g this area up to a few millimetres, the<br />

speckles are averaged and a smooth distribution is visible.<br />

10<br />

Analyz<strong>in</strong>g characteristic parameters of the speckle pattern or<br />

the smooth distribution identifies uniquely either a particular<br />

security item (e.g. credit card) or the technology with which<br />

the pattern was created. We have built a small electronic<br />

prototype to demonstrate the feasibility and ruggedness of this<br />

new technique.<br />

A small laser diode with an <strong>in</strong>tegrated focus<strong>in</strong>g lens was used<br />

as source, a silicon photodiode array as detector to build the<br />

prototype. All components, <strong>in</strong>clud<strong>in</strong>g a micro controller, were<br />

assembled on a pr<strong>in</strong>ted circuit board. The micro controller<br />

compares the sample under <strong>in</strong>vestigation with an <strong>in</strong>built<br />

reference and communicates the result via a green/red LED to<br />

the human observer. For obvious reasons credit cards were<br />

chosen to demonstrate the new security feature. The credit<br />

card is <strong>in</strong>serted <strong>in</strong>to the device through a standard smartcard<br />

holder. The cardholder holds the credit card <strong>in</strong> place with a<br />

repeatable accuracy exceed<strong>in</strong>g 40 µm, which is sufficient for<br />

these purposes. As can be seen <strong>in</strong> Figure 2 the entire setup<br />

fits <strong>in</strong>to a small box leav<strong>in</strong>g plenty of space.<br />

Figure 2: Demonstrator<br />

The results of this project have proven that the implementation<br />

of these newly developed security features is possible with<br />

very simple low cost components. <strong>CSEM</strong> security system is<br />

difficult to counterfeit and is mass producible. The developed<br />

authentication device is easy to use, compact and can be built<br />

<strong>in</strong> <strong>in</strong>to other devices, such as automatic teller mach<strong>in</strong>es.<br />

<strong>CSEM</strong> new security features offer a promis<strong>in</strong>g way to prevent<br />

counterfeit<strong>in</strong>g for an extended period of time.<br />

[1] G. W. Abbot, L. S. Sporn, Trademark Counterfeit<strong>in</strong>g § 1.03[A]<br />

[2] Patents pend<strong>in</strong>g

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!