research activities in 2007 - CSEM
research activities in 2007 - CSEM
research activities in 2007 - CSEM
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Counterfeit – Mach<strong>in</strong>e Readable Covert Security Feature<br />
J. Pierer, U. Gubler, N. Blondiaux, R. Pug<strong>in</strong>, C. Keck, H. Walter<br />
By comb<strong>in</strong><strong>in</strong>g Micro and Nano technologies <strong>CSEM</strong> has developed a security system to directly mark products and verify their authenticity.<br />
Due to forged products various <strong>in</strong>dustry sectors experience<br />
huge damages account<strong>in</strong>g to several hundred billion US<br />
Dollars a year [1] . Consequently, extensive efforts are made to<br />
<strong>in</strong>crease protection of products at risk. The development and<br />
implementation of new security systems opens a huge market<br />
to be exploited.<br />
However, to understand this market, one has to understand<br />
the characteristics of security features. Most safety features<br />
and safety equipment are safe only for a short period of time,<br />
depend<strong>in</strong>g on how long it takes for forgers to counterfeit the<br />
technique. Extend<strong>in</strong>g the secure period of a safety device is<br />
therefore one of the most important requirements when<br />
develop<strong>in</strong>g new security systems.<br />
In order to meet these requirements, <strong>CSEM</strong> designed a new<br />
system show<strong>in</strong>g two ma<strong>in</strong> characteristics:<br />
• A random pattern [2] which is difficult to be copied was<br />
developed as a ma<strong>in</strong> security feature<br />
• In order to read those random patterns an <strong>in</strong>strument was<br />
developed which is able to read those features’, but is no<br />
use to somebody who does not know what to look for.<br />
By process control these patterns can be designed to meet<br />
certa<strong>in</strong> specifications with regard to the features of average<br />
size and consequently average period. Their organization,<br />
however, rema<strong>in</strong>s completely random.<br />
The coherent light of a laser is used to illum<strong>in</strong>ate the pattern.<br />
The light is scattered on each element of the structure. Every<br />
s<strong>in</strong>gle element can then be seen as a new source of light.<br />
Investigat<strong>in</strong>g the <strong>in</strong>tensity of the scattered light at any po<strong>in</strong>t <strong>in</strong><br />
space will result <strong>in</strong> a value given by the superposition of the<br />
light of all these sources. Depend<strong>in</strong>g on <strong>in</strong>cidence angle,<br />
structure period and wavelength of the light one gets a<br />
particular <strong>in</strong>tensity distribution. However, s<strong>in</strong>ce the features<br />
are randomly aligned the image shows a so called speckle<br />
pattern (Figure 1).<br />
Figure 1: Image of a speckle pattern on a paper target, left: small<br />
spot illum<strong>in</strong>ated, right: large spot illum<strong>in</strong>ated<br />
When illum<strong>in</strong>at<strong>in</strong>g a small spot of the security feature (about<br />
30 µm) a well dist<strong>in</strong>guishable speckle pattern becomes<br />
visible. By enlarg<strong>in</strong>g this area up to a few millimetres, the<br />
speckles are averaged and a smooth distribution is visible.<br />
10<br />
Analyz<strong>in</strong>g characteristic parameters of the speckle pattern or<br />
the smooth distribution identifies uniquely either a particular<br />
security item (e.g. credit card) or the technology with which<br />
the pattern was created. We have built a small electronic<br />
prototype to demonstrate the feasibility and ruggedness of this<br />
new technique.<br />
A small laser diode with an <strong>in</strong>tegrated focus<strong>in</strong>g lens was used<br />
as source, a silicon photodiode array as detector to build the<br />
prototype. All components, <strong>in</strong>clud<strong>in</strong>g a micro controller, were<br />
assembled on a pr<strong>in</strong>ted circuit board. The micro controller<br />
compares the sample under <strong>in</strong>vestigation with an <strong>in</strong>built<br />
reference and communicates the result via a green/red LED to<br />
the human observer. For obvious reasons credit cards were<br />
chosen to demonstrate the new security feature. The credit<br />
card is <strong>in</strong>serted <strong>in</strong>to the device through a standard smartcard<br />
holder. The cardholder holds the credit card <strong>in</strong> place with a<br />
repeatable accuracy exceed<strong>in</strong>g 40 µm, which is sufficient for<br />
these purposes. As can be seen <strong>in</strong> Figure 2 the entire setup<br />
fits <strong>in</strong>to a small box leav<strong>in</strong>g plenty of space.<br />
Figure 2: Demonstrator<br />
The results of this project have proven that the implementation<br />
of these newly developed security features is possible with<br />
very simple low cost components. <strong>CSEM</strong> security system is<br />
difficult to counterfeit and is mass producible. The developed<br />
authentication device is easy to use, compact and can be built<br />
<strong>in</strong> <strong>in</strong>to other devices, such as automatic teller mach<strong>in</strong>es.<br />
<strong>CSEM</strong> new security features offer a promis<strong>in</strong>g way to prevent<br />
counterfeit<strong>in</strong>g for an extended period of time.<br />
[1] G. W. Abbot, L. S. Sporn, Trademark Counterfeit<strong>in</strong>g § 1.03[A]<br />
[2] Patents pend<strong>in</strong>g