As growing more global economic activities, both sales figures and brand protection are great concerns for international enterprises. To protect the brand, various kinds of security devices have been used. It is, however, difficult to evaluate these security devices. One of the major reasons of this difficulty is based on the fact that properties of the security devices are quite hard to be quantified. Accessing costs of the devices is one of the barriers in the evaluations when a neutral person wants to evaluate the devices. Moreover, detailed specifications of the devices are often kept secret because of the devices' basic characteristic: “security.” Several projects to establish security evaluation methods, such as CC (Common Criteria) and its derivative standard ISO/IEC 15408, are energetically proceeded, and however mainly focused on security of information and entities who address the information as their scopes. In this paper, we assume a distribution model of branded products to discuss properties of security devices. Then, we propose a simple classification method of the devices on the assumed model. In the proposed method, we classify security devices without quantifying any properties. We also discuss how to utilize the proposed classification method effectively. Users of security devices can reduce research costs by examining only preselected devices in detail after the class-selection.
KEYWORDS: Stochastic processes, Sensors, Computer security, Data modeling, Cryptography, Computer programming, Magnetism, Signal detection, Signal processing, Digital recording
Clone resistance of most of all anti-counterfeiting techniques depends upon secret identifiers or difficulty of reproduction. However, these kinds of techniques are no use if a counterfeiter has enough financial a power to work the secret out or toe overcome the difficulty. We have focused on, among others, random patterns which can be inevitably difficult to reproduce. Consequently, we have developed a document protection system which utilizes random patterns of magnetic micro-fibers in substrates of documents. We have also applied cryptography to the system. The system verifies and authenticates a stochastic feature using pre-stored template data and a digital signature. The stochastic feature and the digital signature respectively prevent 'dead copying' and counterfeiting/alteration of the recorded data such as a value of the card. Therefore security of the system depends upon difficulty both in reproduction of the stochastic feature and in analysis of the digital signature. We have evalut3ed the security of the system for several kinds of criminal attacks. Some criminals may try to counterfeit a stochastic feature by modeling on a genuine document. In our paper we discuss security evaluation of our document protection system against such kinds of criminal methods and also discus a countermeasure and its difficulty.
Diffraction gratings and liquid crystals are use4d as security features for document protection. We have studied the combination of these two features and have developed an optically variable device which is called 'CPLgram'. CPLgram is made of thin film of high polymer cholesteric liquid crystals which exhibit diffraction of light. The combination of diffraction gratings and cholesteric liquid crystals provides light diffraction, wavelength selectivity, color- shifting of reflection and circular polarization selectivity, for the deice. These characteristics make it vary difficult to counterfeit the devices. In our understanding, it is a new approach to combine these security features. The most striking characteristic of the combination is significant aspect of the combination is that customers can choose a device verification method from three types of methods depending on security requirements and/or cost demands; to examine the device (a) with the naked eye, (b) with a simple inspection tool, and (c) by verification equipment.
KEYWORDS: Sensors, Magnetism, Signal processing, Computer programming, Magnetic sensors, Cryptography, Signal detection, Resistance, Data conversion, Head
We have used the term 'clone' to refer to those things which are produced by methods such as counterfeiting, alteration, duplication or simulation. To satisfy the requirements of secure and low-cost techniques for preventing card fraud, we have recently developed a clone preventive system called 'FibeCrypt (Fiber Cryptosystem)' which utilizes physical characteristics. Each card has a canonical domain (i.e. a distinctive part), similar to fingerprints as the biometric measurement, made up of magnetic micro-fibers scattered randomly inside. We have applied cryptosystems to the system. FibeCrypt examines and authenticates the unique pattern of the canonical domain using pre-stored reference data and a digital signature. In our paper, the schemes and the features of this system are described in detail. The results of our examinations show the accuracy of authentication of the system. We conclude that this authentication technique which utilizes physical characteristics can be very effective for clone prevention in various fields.
Conference Committee Involvement (2)
Optical Security and Counterfeit Deterrence Techniques VI
18 January 2006 | San Jose, California, United States
Optical Security and Counterfeit Deterrence Techniques V
20 January 2004 | San Jose, California, United States
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.