`(12) Patent Application Publication (10) Pub. No.: US 2004/0153649 A1
`(43) Pub. Date:
`Aug. 5, 2004
`Rhoads et al.
`
`US 2004O153649A1
`
`(54) DIGITAL AUTHENTICATION WITH
`DIGITAL AND ANALOG DOCUMENTS
`(76) Inventors: Geoffrey B. Rhoads, West Linn, OR
`(US); J. Scott Carr, Tualatin, OR (US);
`Burt W. Perry, Lake Oswego, OR
`(US)
`Correspondence Address:
`DIGIMARC CORPORATION
`19801 SW 72ND AVENUE
`SUTE 250
`TUALATIN, OR 97062 (US)
`(21) Appl. No.:
`10/656,930
`(22) Filed:
`Sep. 4, 2003
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 10/164,899,
`filed on Jun. 4, 2002, which is a continuation of
`application No. 09/198,022, filed on Nov. 23, 1998,
`now Pat. No. 6,546,112, which is a continuation of
`application No. 08/763,847, filed on Dec. 4, 1996,
`now Pat. No. 5,841,886, which is a continuation of
`application No. 08/512,993, filed on Aug. 9, 1995,
`now abandoned.
`Continuation-in-part of application No. 09/775,934,
`filed on Feb. 2, 2001, which is a continuation-in-part
`of application No. 09/625,577, filed on Jul. 25, 2000.
`
`
`
`Continuation-in-part of application No. 09/837,564,
`filed on Apr. 17, 2001, and which is a continuation
`in-part of application No. 09/503,881, filed on Feb.
`14, 2000, now Pat. No. 6,614,914, which is a con
`tinuation-in-part of application No. 09/186,962, filed
`on Nov. 5, 1998, which is a continuation of applica
`tion No. 08/649,419, filed on May 16, 1996, now Pat.
`No. 5,862,260, which is a continuation-in-part of
`application No. 08/637,531, filed on Apr. 25, 1996,
`now Pat. No. 5,822,436, which is a continuation-in
`part of application No. 08/512,993, filed on Aug. 9,
`1995, now abandoned.
`(List continued on next page.)
`Foreign Application Priority Data
`
`(30)
`
`May 7, 1996 (WO)........................... PCT/US96/06618
`
`Publication Classification
`
`(51) Int. Cl." ....................................................... H04L 9/00
`(52) U.S. Cl. .............................................................. 713/176
`(57)
`ABSTRACT
`The disclosure describes Systems for creating and authenti
`cating printed objects using authentication information.
`Techniques for incorporating authentication information
`into digital representations of objects and using the authen
`tication information to authenticate the objects are also
`provided.
`
`ORIGINAL DIGITAL MAGE
`WTH BARCODE AND
`FOUCIALSADDED
`
`COMPUTER GENERATES
`MASTER SNOWY MAGE
`WHICH IS GENERALLY
`ORTHOGONAL TO
`ORIGINAL MAGE AT LEF
`
`950
`
`
`
`i. ill,
`
`E.
`
`COMBINED TO FORMPERSONAL CASH CARD
`
`Petitioner's Exhibit 1009, Page 1
`
`
`
`US 2004/0153649 A1
`Page 2
`
`Related U.S. Application Data
`Continuation-in-part of application No. 09/571,422,
`filed on May 15, 2000, which is a continuation-in-part
`of application No. 09/343,104, filed on Jun. 29, 1999,
`now abandoned, and which is a continuation-in-part
`of application No. 09/342,688, filed on Jun. 29, 1999,
`now Pat. No. 6,650,761, and which is a continuation
`in-part of application No. 09/343,101, filed on Jun.
`29, 1999, and which is a continuation-in-part of
`application No. 09/314,648, filed on May 19, 1999,
`now Pat. No. 6,681,028.
`Continuation-in-part of application No. 10/011,129,
`filed on Nov. 9, 2001, which is a continuation of
`application No. 09/442,780, filed on Nov. 18, 1999,
`now Pat. No. 6,389,151, and which is a continuation
`in-part of application No. 09/074,034, filed on May 6,
`1998, now Pat. No. 6,449,377.
`Said application No. 10/011,129 is a continuation-in
`part of application No. 09/763,847, filed on Feb. 27,
`2001, now abandoned, which is a continuation of
`application No. 08/512,993, filed on Aug. 9, 1995,
`now abandoned.
`Continuation-in-part of application No. 09/465,418,
`
`filed on Dec. 16, 1999.
`Continuation-in-part of application No. 10/147.228,
`filed on May 15, 2002, which is a continuation-in-part
`of application No. 09/670,115, filed on Sep. 26, 2000,
`now abandoned, and which is a continuation-in-part
`of application No. 09/563,664, filed on May 2, 2000,
`now Pat. No. 6,505,160, and which is a continuation
`in-part of application No. 09/476,686, filed on Dec.
`30, 1999, and which is a continuation-in-part of
`application No. 08/746,613, filed on Nov. 12, 1996,
`now Pat. No. 6,122,403, which is a continuation-in
`part of application No. 08/649,419, filed on May 16,
`1996, now Pat. No. 5,862,260, and which is a con
`tinuation-in-part of application No. 08/508,083, filed
`on Jul 27, 1995, now Pat. No. 5,841,978.
`Provisional application No. 60/198,138, filed on Apr.
`17, 2000. Provisional application No. 60/198.849,
`filed on Apr. 21, 2000. Provisional application No.
`60/109,259, filed on Nov. 19, 1998. Provisional appli
`cation No. 60/112,955, filed on Dec. 18, 1998. Pro
`visional application No. 60/178,028, filed on Jan. 26,
`2000. Provisional application No. 60/134,782, filed
`on May 19, 1999.
`
`(60)
`
`Petitioner's Exhibit 1009, Page 2
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 1 of 15
`US 2004/0153649 A1
`FIG. 1
`FIG. 2
`
`
`
`identifier
`
`Prompt User for
`Product identifier
`
`Prompt User to
`Present Product
`for Scan
`
`Embed Hash
`
`Decode
`Embedded Data
`
`Validate
`Embedded Data
`Against Product
`ldentifier
`
`Petitioner's Exhibit 1009, Page 3
`
`
`
`Patent Application Publication Aug. 5, 2004
`FIG. 3
`
`72
`
`Sheet 2 of 15
`
`US 2004/0153649 A1
`
`Communication
`Application
`
`60
`
`66
`
`62
`
`D
`Database
`
`Database O
`Management
`System
`ID-Object
`Association
`Database
`
`
`
`64
`
`68
`
`
`
`Customer
`Database
`
`70
`
`
`
`
`
`Communication
`Application
`
`Embedder
`Application
`
`
`
`
`
`Printed Object
`
`Printed Object
`5 J.
`J.
`
`
`
`
`
`Machine Reader
`(Bar Code, mag.
`stripe, RF, etc.
`
`
`
`Image Capture
`(Digital Camera,
`Scanner, etc.)
`
`52
`
`User input/
`Output
`
`
`
`Watermark
`Decoder App.
`
`Communication
`Application
`
`54
`
`50
`
`Petitioner's Exhibit 1009, Page 4
`
`
`
`US 2004/0153649 A1
`
`DIGITAL IMAGE TAKEN
`OF CUSTOMER
`
`COMPUTER PROCESSESS
`NEW ENCODED IMAGE
`BarCOde D and/
`Or text 952
`
`
`
`PRINTS
`PROCESSED
`IMAGE ONTO
`PLASTIC CARD
`
`954
`
`950
`
`Petitioner's Exhibit 1009, Page 5
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 4 of 15
`
`US 2004/0153649 A1
`
`
`
`CABLE, 964
`TODATA LINE,
`966
`
`96.O
`
`958
`
`CONTAINS RUDIMENTARY OPTICAL SCANNER,
`MEMORY BUFFERS, COMMUNICATIONS DEVICES,
`AND MICROPROCESSOR
`
`CONSUMER MERELY PLACES CARD INTO WINDOW
`AND CAN, AT THEIR PREARRANGED OPTION, ETHER
`TYPE IN A PERSONAL IDENTIFICATION NUMBER (PIN,
`FOR ADDED SECURITY) OR NOT. THE TRANSACTION
`SAPPROVED OR DISAPPROVED WITHN SECONOS.
`
`F.G. 5
`
`Petitioner's Exhibit 1009, Page 6
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 5 of 15
`
`US 2004/0153649 A1
`
`972
`
`ORIGINAL DIGITAL IMAGE
`WITH BARCODE AND
`FIDUCALSADDED
`
`
`
`COMPUTER GENERATES
`MASTER SNOWY MAGE
`WHICH IS GENERALLY
`ORTHOGONAL TO
`ORIGINAL MAGE AT LEFT
`
`COMBINED TO FORMPERSONAL CASH CARD
`
`F.G. 6
`
`Petitioner's Exhibit 1009, Page 7
`
`
`
`US 2004/0153649 Al
`
`Patent Application Publication Aug. 5, 2004 Sheet 6 of 15
`
`
`
`
`
`
`
`
`
`
`
`LNVHOWAW‘Nid‘GISAlsIWaAMHOMLANLONILSIONSSLXISJOSLASHNOS-ALNAMLSALVYHANADWHOMLANIWHLNAD“XOol9JONVVdLNNOOOVGNV‘OJN!I
`WHLN3ODSMHOMLANWHLNADOLLNNOWYNOILLOVSNVHL
`
`
`
`
`
`dOLASVOLSSXAQNISUVSYSSWNANWOONVHYSHISHSHM‘SHASWNNWOCNVY
`SAYOLS'NVOSGHVOANYNYALLVdLNVLINSAYAOLONGOdLOGSWHOsYAdMYOMLANWHLNSDOLSLINSAYLONGOYdLOdYNOsA-ALNAMLSHLSLINSNVYLYa0Vad6LINSSAYHAQVSH=‘8B
`
`
`
`
`
`
`
`
`
`INNODOVGHVOS.LIGSYD‘LNNOOOVLNVHOYAWSLIGSGMHOMLANTWHLNSO“Sk
`
`
`
`
`
`
`
`
`
`
`
`SHSEWNNWOONVYSOSLASSHLONY“HOLSHIdSLINSNVYLHHOMLANIWHLN3OLZ
`GALSANDAYGNV‘NOILVWHOANILNVHOHSW(Nid)‘GiSGN3SHaqva"YSSYVHSGNYVH
`
`
`
`
`
`
`
`
`
`
`H3ALSVWLSNIVOYSLINSSYSMOSHOWHLNSO=‘OhMHOMLAN
`
`
`
`
`
`“MHOMLANVLVGLNNOOOYIWHLNADSTIVOYaqvaY
`
`
`
`
`GISNOSYAdSLOVHLX3‘AHOW3WNISSYOLS‘CHVNOSDVSNVOSHACVaY
`
`
`
`
`TWINAGHOWAOUddVIWNiaSONASMHOMLANWHLNSDCL
`SNHALLVdSOGVHaQVSY=V8TWNODOHLHO40LASHSHLSDOL
`
`
`
`
`SNYALLVdWILVdSIWNODOHLHOHI
`
`
`
`
`Sd3lSNOILOVSNVYLTVWOIdAL
`
`
`
`SLASHNOA-ALNAMLAHLHONOWHLSd3aLSYAQVAY
`YAEWONNidNISASMYSN“IWNOILdO
`
`ZSIs
`
`Petitioner's Exhibit 1009, Page 8
`
`Petitioner's Exhibit 1009, Page 8
`
`€
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 7 of 15
`
`US 2004/0153649 A1
`
`THE NEGLIGIBLE-FRAUD CASHCARD SYSTEM
`
`O
`
`O
`
`
`
`O
`
`984
`O
`
`O
`
`O
`
`CENTRAL
`NETWORK
`
`O
`
`O O
`
`O
`
`No O
`
`O
`
`O
`
`O
`
`C
`
`O
`
`A BASIC FOUNDATION OF THE CASH CARD SYSTEM ISA
`24-HOUR INFORMATION NETWORK, WHERE BOTH THE
`STATIONS WHICH CREATE THE PPHYSICAL CASHCARDS,
`950, AND THE POINT-OF-SALES, 984, ARE ALL HOOKED UP
`TO THE SAME NETWORK CONTINUOUSLY
`
`FIG. 8
`
`Petitioner's Exhibit 1009, Page 9
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 8 of 15
`
`US 2004/0153649 A1
`
`O 1 ON
`
`1 OOO
`
`1012
`
`
`
`NAME
`ADDRESS
`
`CITIZENSHIP ---
`
`Petitioner's Exhibit 1009, Page 10
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 9 of 15
`
`US 2004/0153649 Al
`
`
`
`
`ptepietET ligteie|||‘eeeP|oririretyErrottPtteeeeTpttitteeTTE
`
`
`pttteteypi
` ‘lieaitealie||leee—Heeeee|te!a@/«P|orPtrETa|Te
`
`
`
`FIG. 10
`
`Petitioner's Exhibit 1009, Page 11
`
`Petitioner's Exhibit 1009, Page 11
`
`
`
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 10 of 15
`
`US 2004/0153649 A1
`
`AUDIO OR
`VISUAL
`CONTENT
`
`USER CAPTURE
`DEVICE
`
`REMOTE
`PROCESSOR
`14
`
`
`
`
`
`
`
`
`
`
`
`FIG 11
`
`REPOSITORY
`
`
`
`DATABASE
`RECORD
`
`ir - DESTINATION
`:
`DEVICE
`
`--- S22
`
`Petitioner's Exhibit 1009, Page 12
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 11 of 15
`
`US 2004/0153649 A1
`
`
`
`s
`
`Petitioner's Exhibit 1009, Page 13
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 12 of 15
`
`US 2004/0153649 A1
`
`CONTROL
`COMPUTER N20
`
`:------ - - - - - - - -i--------------------------------......
`
`21
`
`TEMPLATE
`
`DOCUMENT
`LAYOUT Li
`
`a re - a
`
`-
`
`- -a-
`
`PICTURES
`
`ir-DIGITAL DATA
`.......
`GRAPHICS
`
`25
`
`ir - MERGING AND
`-> WATERMARKING
`UNIT
`
`27
`
`PRINTING
`ENGINE
`
`\-
`
`FINAL
`DOCUMENT | \l
`
`FIG. 13
`
`Petitioner's Exhibit 1009, Page 14
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 13 of 15
`
`US 2004/0153649 A1
`
`301
`
`MAG STRIPE
`
`READER
`
`m
`
`-
`OUTPUT
`DISPLAY
`
`320
`
`305
`
`SCANNER
`
`BARCODE
`READER
`
`302
`
`
`
`OCR
`PROGRAM
`
`WATERMARK
`DETECTOR
`
`312
`
`COMPARISON
`AUTHENTICATION
`
`303
`
`FNGER
`
`314
`
`Petitioner's Exhibit 1009, Page 15
`
`
`
`Patent Application Publication
`
`Aug. 5, 2004 Sheet 14 of 15
`
`US 2004/0153649 A1
`
`
`
`Petitioner's Exhibit 1009, Page 16
`
`
`
`Patent Application Publication Aug. 5, 2004 Sheet 15 of 15
`
`US 2004/0153649 A1
`
`
`
`(PDBK D h TIME OploKU
`OR
`BLOCK TIME CiploKU
`
`F.G. 16
`
`Petitioner's Exhibit 1009, Page 17
`
`
`
`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`DIGITALAUTHENTICATION WITH DIGITAL AND
`ANALOG DOCUMENTS
`
`RELATED APPLICATION DATA
`0001. The present application is a continuation in part of
`U.S. patent application Ser. No. 10/164,899, filed Jun. 4,
`2002 (published as U.S. 2003-0002710 A1). The 10/164,899
`application is a continuation of U.S. patent application Ser.
`No. 09/198,022, filed Nov. 23, 1998 (now U.S. Pat. No.
`6,546,112), which is a continuation of U.S. patent applica
`tion Ser. No. 08/763,847 (now U.S. Pat. No. 5,841,886),
`filed Dec. 4, 1996, which is a continuation of U.S. patent
`application Ser. No. 08/512,993, filed Aug. 9, 1995 (now
`abandoned). Each of these patent documents is herein incor
`porated by reference.
`0002 This patent application is also a continuation in part
`of U.S. patent application Ser. No. 09/775,934, filed Feb. 2,
`2001 (published as US 2002-0012445 A1). The 09/775,934
`patent application is a continuation in part of U.S. patent
`application Ser. No. 09/625,577, filed on Jul. 25, 2000. Each
`of these patent documents is herein incorporated by refer
`CCC.
`0003. This patent application is also a continuation in part
`of U.S. patent application Ser. No. 09/837,564, filed Apr. 17,
`2001 (published as US 2002-0009208 A1). The 09/837,564
`application claims the benefit of U.S. Provisional Patent
`Application Nos. 60/198,138, filed Apr. 17, 2000, and
`60/198.849, filed Apr. 21, 2000. The 09/837,564 application
`is also a continuation in part of U.S. patent application Ser.
`No. 09/503,881, filed Feb. 14, 2000 (now U.S. Pat. No.
`6,614.914), which is a continuation in part of U.S. patent
`application Ser. No. 09/186,962, filed Nov. 5, 1998, which
`is a continuation of U.S. patent application Ser. No. 08/649,
`419, filed May 16, 1996 (now U.S. Pat. No. 5,862.260),
`which is a continuation in part of U.S. patent application Ser.
`No. 08/637,531, filed Apr. 25, 1996 (now U.S. Pat. No.
`5,822,436), which is a continuation in part of U.S. patent
`application Ser. No. 08/512,993 filed Aug. 9, 1995 (aban
`doned in favor of FWC Ser. No. 08/763,847, now issued as
`U.S. Pat. No. 5,841,886). Each of these patent documents is
`herein incorporated by reference.
`0004. This patent application is also a continuation in part
`of U.S. patent application Ser. No. 09/571,422, filed May 15,
`2000. The 09/571,422 application is a continuation in part of
`each of U.S. patent application Nos. 09/343,104, 09/342,688
`and 09/343,101, each filed Jun. 29, 1999, and 09/314,648,
`filed May 19, 1999. Each of these patent documents is herein
`incorporated by reference.
`0005. This patent application is also a continuation in part
`of U.S. patent application Ser. No. 10/011,129, filed Nov. 9,
`2001 (published as US 2002-0061120 A1). The 10/011,129
`application is a continuation of U.S. patent application Ser.
`No. 09/442,780, filed Nov. 18, 1999 (now U.S. Pat. No.
`6,389,151). The 09/442,780 application claims the benefit of
`U.S. Provisional Patent Application No. 60/109,259 filed
`Nov. 19, 1998. The 09/442,780 application is also a con
`tinuation in part of U.S. patent application Ser. No. 09/074,
`034 filed May 6, 1998 (now U.S. Pat. No. 6,449,377) and a
`continuation in part of U.S. patent application Ser. No.
`09/763,847 filed Dec. 4, 1996 (now U.S. Pat. No. 5,841,
`886), which is a continuation of U.S. patent application Ser.
`
`No. 08/512,993, filed Aug. 9, 1995. Each of these patent
`documents is herein incorporated by reference.
`0006 The present application is also a continuation in
`part of U.S. patent application Ser. No. 09/465,418, filed
`Dec. 16, 1999. The 09/465,418 claims the benefit of U.S.
`Provisional Patent Application No. 60/112,955, filed Dec.
`18, 1998.
`0007. The present invention is also a continuation in part
`of U.S. patent application Ser. No. 10/147.228, filed May 15,
`2002 (published as US 2003-0012403 A1). The 10/147.228
`application is a continuation in part of U.S. patent applica
`tion Ser. No. 09/670,115, filed Sep. 26, 2000 (now aban
`doned). The 10/417.288 application is also a continuation in
`part of U.S. patent application Ser. No. 09/563,664, filed
`May 2, 2000 (issued as U.S. Pat. No. 6,505,160), and which
`claims the benefit of U.S. Provisional Application No.
`60/178,028, filed Jan. 26, 2000. The 09/563,664 application
`is a continuation in part of U.S. patent application Ser. No.
`09/476,686, filed Dec. 30, 1999, which claims priority to
`U.S. Provisional Application No. 60/134,782, filed May 19,
`1999. Application Ser. No. 09/563,664 is also a continuation
`in part of U.S. patent application Ser. No. 08/746,613 filed
`Nov. 12, 1996 (now U.S. Pat. No. 6,122,403), which is a
`continuation in part of U.S. patent application Ser. No.
`08/649,419, filed May 16, 1996 (now U.S. Pat. No. 5,862,
`260), PCT Application PCT/US96/06618, filed May 7, 1996
`(published as WO 96/36163), and U.S. patent application
`Ser. No. 08/508,083, filed Jul 27, 1995 (now U.S. Pat. No.
`5.841,978). Each of these patent documents is herein incor
`porated by reference.
`0008. The present application is also related to assignee's
`U.S. patent application Ser. No. 09/790,322, filed Feb. 21,
`2001 (published as US 2001-0037313 A1). The 09/790,322
`application claims the benefit of U.S. Provisional Patent
`Application No. 60/257,822, filed Dec. 21, 2000, and is a
`continuation in part of U.S. patent application Ser. No.
`09/562,049, filed May 1, 2000. Each of these patent docu
`ments is herein incorporated by reference.
`0009. The subject matter of the present application is
`related to that disclosed in U.S. Pat. Nos. 5,862,260 and
`6,614,914. Each of these patent documents is herein incor
`porated by reference.
`
`TECHNICAL FIELD
`0010. The invention relates to methods for authenticating
`objects, and in particular, relates to methods for embedding
`Security data into products, and methods for authenticating
`these products using the embedded Security data.
`
`BACKGROUND AND SUMMARY
`0011 Counterfeiting and piracy have a huge economic
`impact. While numerous product Security features have been
`developed, there remains a demand for cost effective Secu
`rity measures that inhibit counterfeiting and piracy.
`0012 Research in the field of steganography (also called
`“data hiding”) offers promising technology for combating
`counterfeiting and piracy. One form of Steganography is
`referred to in popular literature as digital watermarking.
`Digital watermarking is a process for modifying a host
`Signal or object to embed a machine-readable code into the
`host. The host may be modified such that the embedded code
`
`Petitioner's Exhibit 1009, Page 18
`
`
`
`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`is imperceptible or nearly imperceptible to the ordinary
`observer upon viewing or playback, yet may be detected
`through an automated detection process.
`0013 Most commonly, digital watermarking is applied to
`media Such as images, audio Signals, and Video signals.
`However, it may also be applied to other types of media,
`including documents (e.g., through Subtle line, word or
`character shifting), Software, multi-dimensional graphics
`models, and Surface textures of objects.
`0.014. The invention relates to methods for authenticating
`printed objects using digital watermarks embedded in the
`images on the objects. One aspect of the invention is a
`System for authenticating a printed object. The System
`includes a watermark decoder and a verification module.
`The watermark decoder detects a copy detection watermark
`in a printed object to determine whether the printed object
`has been reproduced. The verification module processes a
`message decoded from an authentication watermark on the
`printed object to authenticate the printed object or bearer of
`the printed object. The authentication and copy detection
`watermarks may be implemented as the same or different
`watermarkS. For example, the copy detection watermark
`may be a fragile watermark that carries the message and that
`degrades in response to a reproduction operation, Such as
`photocopying or Scanning and then re-printing the object.
`Alternatively, the authentication and copy detection water
`marks may be separate watermarks embedded in an image
`that is printed on the object. The authentication watermark,
`in Some applications, includes an identifier that links the
`object to a database entry with related information about the
`object. This related information can be used to check the
`bearer of the object by comparing it with attributes of the
`bearer (such as a user ID or photo) or the validity of the
`object by comparing it with attributes that are visible or
`machine readable on the object.
`0.015. Another aspect of the invention is a system for
`creating a printed object. The System includes a watermark
`encoder and communication application. The watermark
`encoder encodes a watermark in an image to be printed on
`a printed object. This watermark is used to authenticate the
`printed object. The communication application obtains an
`identifier from a database for embedding into a message
`payload of the watermark. It also provides to the database
`information to be associated with the identifier.
`0016. These and further features and aspects of the
`present invention will become even more apparent with
`reference to the following detailed description and accom
`panying drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`0017 FIG. 1 is a flow diagram illustrating a method for
`embedding an object identifier into an object.
`0.018
`FIG. 2 is a flow diagram illustrating a method for
`authenticating an object using the embedded object identi
`fier.
`FIG. 3 is a diagram of a system architecture for
`0.019
`creating and Verifying the authenticity of printed objects
`using digital watermarks for copy detection and authentica
`tion.
`0020 FIGS. 4-8 detail aspects of a security card accord
`ing to one embodiment of the present invention.
`
`FIG. 9 is a diagram of a photographic identifica
`0021
`tion document or Security card with which a Security System
`aspect of the present invention may be applied.
`0022 FIG. 10 is a diagram illustrating aspects of a
`watermark embedding proceSS where Sets of frequency
`coefficients are adjusted So that the Sets have a predeter
`mined relationship.
`0023 FIG. 11 is a general block diagram that illustrates
`various embodiments.
`0024 FIG. 12 illustrates a security document in accor
`dance with one aspect of the present invention.
`0025 FIG. 13 is an overall diagram of a system to
`produce Security documents in accordance with another
`aspect of the present invention.
`0026 FIG. 14 is a diagram of a document validation
`System that operates in accordance with various aspects of
`the present invention.
`0027 FIG. 15 illustrates a system according to an imple
`mentation of the present invention.
`0028 FIG. 16 illustrates various functionality of the
`FIG. 15 system.
`
`DETAILED DESCRIPTION
`0029 Introduction
`0030 The following sections describe a system and
`related methods for authenticating products. While the
`description illustrates the System with an example of pack
`aged Software product, it applies to a variety of types of
`objects. In this document, the term “product” broadly
`encompasses physical objects (e.g., goods), and other
`objects associated with them like packaging, tags, labels,
`documentation, and media Supplied on, by, or with the
`object. Within this broad product context, the embedding
`process may encode Security data on any of these types of
`products. To determine whether a product is authentic, the
`methods and Systems described in this document can be used
`to evaluate Security data embedded on the product itself, its
`packaging, labels, tags, media, etc. One implementation of
`these methods and Secure products employs a form of
`Steganography referred to as digital watermarking. How
`ever, other forms of Steganography may be used as well.
`There are two principal parts of the product authentication
`architecture: 1) a System for embedding authentication data
`into the product; and 2) a System for authenticating the
`product.
`0031 Typically, product makers assign unique identifi
`ers, Such as product Serial numbers, to each product. In the
`product Security Systems describe below, an embedder
`encodes the Serial number as a form of machine readable
`Security data into the product or its packaging. This embed
`ded Security data is then used to authenticate the product
`and/or control unauthorized use. In the case of Software
`products, for example, the embedded Security data may be
`used to ensure that the user is authorized during installation
`of the Software on the user's machine. In the case of financial
`or access cards (e.g., debit/credit cards, key cards, corporate
`badges), the embedded Security data may be used to activate
`the card. In the more general case, the embedded Security
`data may be used to check whether a product is authentic by
`
`Petitioner's Exhibit 1009, Page 19
`
`
`
`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`validating a conspicuous product identifier, Such as a visible
`serial number, with one imperceptibly embedded in the
`product or its packaging. These Systems are detailed further
`below.
`0032 Embedding Security Data Into a Product
`0033 (The reference numbers in this section correspond
`to FIGS. 1-3).
`0034 FIG. 1 is a flow diagram illustrating a method for
`embedding Security data into a product. The maker or
`distributor of the product assigns a unique identifier, Such as
`a Serial number, to the product. The embedding proceSS
`takes this identifier 20 and transforms it into a form of data
`for embedding in the product or its packaging. While the
`identifier need not be modified before embedding it, there
`are a number of reasons for doing So. One reason is to
`convert it into a more compact form for embedding. Another
`reason is to make the embedded data more Secure, i.e. more
`difficult for counterfeiters or pirates to replicate.
`0.035
`FIG. 1 depicts an example of a data conversion
`method called a hash 22. The hash is a function that converts
`the identifier into another number. One form of hash is a
`checksum, but there are many others. One example of a
`checksum is one that converts a number or Set of numbers
`(e.g., Serial number, product code, etc.) into another number
`using a Sequence of prime numbers. A cryptographic hash
`may be used to generate a new number from which the
`original identifier is difficult to derive. Whether hashed or
`not, the data to be embedded is referred to as “security data.”
`0.036 The embedding process embeds the security data
`into a machine readable code on the product or its packaging
`(24). In particular, the process Steganographically embeds
`the Security data into the machine-readable code on the
`product or on packaging or labels for the product. A Stega
`nographic process embeds information on the products
`Surface Such that is imperceptible or Substantially impercep
`tible upon ordinary inspection, yet readable by machine.
`0037. One form of steganography is called digital water
`marking. A variety of digital watermarking Schemes may be
`used to embed the watermark onto the print media. Some
`example watermark encoding and decoding Schemes are
`provided in U.S. Pat. Nos. 5,862,260 and 6,614,914.
`0.038. In digital watermarking of images printed on physi
`cal objects, there is a tradeoff between Visual perceptibility
`and Survivability of the watermark. In this application, the
`watermark is embedded so as to be sufficiently robust to
`Survive analog to digital conversion, digital to analog con
`version, and possible other forms of corruption, including
`geometric distortion, additive noise, and compression. The
`watermark may be encoded by altering the luminance or one
`or more other color channels of an image printed on the
`Surface of the product. Alternatively, the watermark may be
`encoded using clear inks that modulate the microtopology of
`the products Surface or that are readable when exposed to
`light in non-visible wavelengths, like UV or infrared. Also,
`the microtopology of the product Surface may be altered in
`the process of creating the product Surface So as to embed a
`watermark. Alternative machine readable codes may be used
`as well, Such as data glyphs, invisible bar codes, etc.
`0039. A digital watermark embedding process typically
`involves Several operations. For example, additional data
`
`may be appended to the Security data, Such as Synchroniza
`tion Symbols, error detection codes, etc. After adding this
`data, the Security data includes a Sequence of Symbols for
`embedding into the product. Additional operations include
`error correction and other forms of Symbol encoding (e.g.,
`convolution codes, turbo codes, BCH codes, Reed Solomon
`encoding, M Sequences, gold Sequences, etc.). These opera
`tions transform the original message Sequence into a mes
`Sage Signal. The message Signal may then be further repli
`cated and modulated using spread spectrum modulation
`techniques. For example, the message Signal may be spread
`over a pseudorandom number or Set of pseudorandom
`numbers and repetitively Scattered throughout a host signal.
`0040. The host signal (sometimes referred to as the cover
`Signal) is the signal in which the embedded data is hidden.
`This might be an image printed on an object, label or
`package, a layer of Visible or invisible inks, line art, text,
`Surface topology of an object, etc. The watermark Signal
`may be replicated in Several different contiguous or over
`lapping regions of the host Signal. Each instance of the
`watermark at these regions can be associated with a corre
`sponding imperceptible watermark template, Synchroniza
`tion or orientation Signal that enables the decoder to detect
`the presence of the watermark and determine its orientation
`parameters such as translation (x, y coordinates of an
`origin), rotation, Scale, shear, differential Scale, etc.
`0041) To embed the message signal, an embedding func
`tion Subtly changes the host Signal. Digital watermarks
`usually operate on a digital form of the host signal to create
`a digital watermarked Signal, which is then converted to
`analog form. However, the digital watermark may also be
`applied in the analog domain. A variety of embedding
`functions have been detailed in the literature about digital
`watermarking. These functions may be additive, multiplica
`tive (adding or multiplying a message signal with the host
`Signal), or Some other function, Such as a non-linear quan
`tization function. The quantization function embeds a mes
`Sage symbol (e.g., binary or M-ary) by quantizing a sample
`value or a characteristic of a set of Sample values of the host
`Signal to a quantization level associated with the Symbol
`being encoded. To decode the Symbol, the watermarked
`Signal is captured and evaluated (e.g., re-quantized) to
`determine which quantization level a Sample or character
`istic of a set of Samples most closely corresponds to. This
`quantization level is then mapped to the corresponding
`symbol.
`0042. The embedding functions may be applied to image
`Samples or characteristics in the Spatial domain or Some
`transform domain, like Discrete Cosine Transform, Discrete
`Wavelet Transform, Discrete Fourier Transform, etc.
`0043. For enhanced security, various elements of the
`embedded data may be encrypted. Some or all of the
`watermark message, including the Security data in the mes
`Sage may be encrypted. Various keys used to encode the
`watermark may be encrypted as well. For example, a key
`that defines the location of the watermark Signal in the host
`Signal may be encrypted. A key used to decode the spread
`message Signal (e.g., a pseudorandom number) may also be
`encrypted.
`0044) In implementations where instances of the water
`mark Signal are repeated in the host Signal, a key in the
`message payload of one instance of a watermark Signal may
`
`Petitioner's Exhibit 1009, Page 20
`
`
`
`US 2004/0153649 A1
`
`Aug. 5, 2004
`
`be used to decrypt a message, Such as the Security data, in
`other instance of the watermark Signal. The key may be
`included in a message payload by appending the key to the
`message or combining it with the message using Some
`function Such as an XOR, or multiplication operation that
`combines the key with the message to create a composite
`meSSage.
`0.045 Keys used to decode the watermark or its message
`payload may also be derived from the host signal itself or
`from another watermark in the host signal.
`0.046
`Digital watermarks provide a low cost, yet secure
`method of embedding Security data into a product or its
`packaging. The embedding process can be integrated into
`the process of printing the object or its packaging. For
`example, for each product, the printing process may be
`adapted to print an image embedded with the products
`identifier or hashed form of it. This process may be inte
`grated in the mass production of a variety of printable
`objects, like packaging, containers, labels, product docu
`mentation, credit cards, etc.
`0047 Authenticating A Product Using Embedded Secu
`rity Data
`0.048
`FIG. 2 is a flow diagram illustrating a process for
`authenticating a product using embedded Security data. The
`authentication System includes a user interface, Scanner and
`embedded data decoder. In the case where the embedded
`data is encoded in a digital watermark, the System may be
`implemented in a personal computer equipped with an
`imaging device, Such as a CCD camera or Scanner.
`0049 Authentication begins by prompting the user for
`the product identifier (30). Typically, this identifier is a
`product Serial number in plain View on the product, its
`packaging or documentation. The user may enter the product
`number by Simply typing it on a keyboard, or using Some
`other user input device (voice recognition, bar code Scanner,
`etc.) In response to receiving the product identifier, the
`System prompts the user to present the product for Scanning
`(32). The user then Scans the product with a sensor device,
`Such as a CCD camera, to capture a product Scan.
`0050. Next, the system decodes