Structure for secure containment of information

ABSTRACT

A structure for secure containment of information (SSCI) that is in the form of a laminate which includes at least two layers. The laminate is constructed to contain information such as a code, serial number, informational feature, encryption key or personal identification number (PIN). The information is located between the layer of the laminate such that the code, serial number, informational feature, encryption key, or PIN is not detectable from outside the laminate. The SSCI is configured to provide access and expose the code, serial number, informational feature, encryption key, or PIN by delaminating at least one layer, thereby indicating that tampering has occurred to the laminate. The SSCI can also function as a public key or private key for a blockchain, to provide access to a physical lock or to provide account access to claim financial value.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.17/458,949, filed Aug. 27, 2021, entitled “STRUCTURE FOR SECURECONTAINMENT OF INFORMATION,” which is a continuation of U.S. patentapplication Ser. No. 16/869,091, filed May 7, 2020, now U.S. Pat. No.11,104,177, and entitled “STRUCTURE FOR SECURE CONTAINMENT OFINFORMATION,” which is a continuation of U.S. patent application Ser.No. 15/984,000, filed May 18, 2018, now issued as U.S. Pat. No.10,661,594, and entitled “STRUCTURE FOR SECURE CONTAINMENT OFINFORMATION,” the entire contents of which are herein incorporated byreference.

TECHNICAL FIELD

The invention generally pertains to secure storage of codes used incommerce, and more specifically to improved security features for acurrency laminate which is not susceptible to external detection,tampering and/or counterfeiting.

BACKGROUND ART

In the world of currency and financial instruments various symbols ofvalue are utilized to facilitate acquiring, owning and transferringfinancial value. Examples of physical representation of cryptocurrencyproducts that store value include denarium, bitnote, Suisse polymerbit,and cassascius coins, and cryptocurrency wallets. One feature that allof these have in common is the inclusion of a security feature, which isin the form of information that is usually beneath either a holographicsticker or a scratch-off material. These stickers or scratch-offmaterials are intended to be removed and therefore are located on aneasily-accessible exterior surface of the token.

There are problems associated with these conventional security features.One of the most serious of the problems is tampering. Holographicstickers can be quickly and easily removed by using a hypodermic syringeto inject solvent under the sticker. Once the sticker is removed, aperson can view the information that is beneath the sticker and thenre-attach the sticker, usually with little to no indication that anytampering has occurred. Scratch-off materials are also similarly proneto tampering and/or counterfeiting. Furthermore, the hidden informationbelow stickers or scratch off materials may be revealed by techniquessuch as x-ray, NMR, or electromagnetic or thermal analysis. Similarly,codes on separate pieces of paper inside of a protective envelope can berevealed by de-lamination of the envelope, and even replaced with falsecodes and then re-laminated without detection.

For bills, a sticker is deeply flawed for counting and sorting machinesbecause it could come off, rendering the bill compromised. Similarly,scratch-off material cannot be handled very much without beingcompromised.

Another important distinction is that a sticker or scratch-off materialmakes the financial note essentially disposable. Makers of theseproducts advise that a currency coin or bill could be compromised in anytransaction and advise people to return the code to the blockchain assoon as they receive it, and to buy a new coin or bill if they want itin that form. This is a clear acknowledgement that the secure storage ofthe information in the currency instrument is not consideredtrustworthy. This disposability is a serious disadvantage and a cost,effectively making the bill or coin a one-exchange item.

A search of the prior art did not disclose any literature or patentsthat read directly on the claims of the instant invention. However, thefollowing U.A. patents are considered related:

PATENT NO. INVENTOR ISSUED KR20160050876 Kyun Oct. 31, 2014 2016/0371679Goto Dec. 22, 2016 2016/358420 McCullah Dec. 8, 2016

The KR2016/0050876 publication discloses a bitcoin trading methodcapable of reinforcing security by storing a private key and a publickey of a dealer which are necessary for bitcoin trading in a smart cardheld by the dealer and which is not in a web. The invention relates tousing a public key and a private key stored in a smart card. The bitcointrading method comprises: storing a pair of authentication keysincluding a public key and a private key of a dealer issued from abitcoin trading management server in a smart card of the dealer;inputting bitcoin trading information including a public key of a tradepartner in a trading terminal; transmitting the private key of thedealer stored in the smart card to the trading terminal; encrypting thebitcoin trading information with the private key of the dealer receivedfrom the smart card by the trading terminal, and by the bitcoin tradingmanagement server. According to the present invention, the bitcointrading method may reinforce security by storing a private key and apublic key of a dealer which are necessary for bitcoin trading and manyuse the existing infrastructure without investing additional costs.

The 2016/0371679 publication discloses a method of conducting a virtualcurrency transaction through payment cards. The method comprises stepsof a payer providing a payment card with an encrypted address;associating the encrypted address to at least one virtual wallet havingcurrencies; a payee receiving a predetermined amount of currencies fromthe virtual wallet by scanning the encrypted address; and the payeedepositing the currencies into payee's virtual wallet.

The 2016/358420 publication discloses a method wherein an in-gamecurrency (including digital or currency) or in-game resource is backedby or designated to represent a real world currency or a real worldphysical object. The in-game currency or in-game resource is backed withreal currency, digital currency or a physical object using a percentageof the revenues from in-game purchases, game subscriptions or in-gameadvertising.

DISCLOSURE OF THE INVENTION

A structure for secure containment of information (SSCI) that provides asignificant improvement to the security and convenience of blockchainand other types of currency. In currency art, most currency coins andbills utilize either a holographic sticker or a scratch-off material onthe surface, both of which are designed to be removable and aretherefore not located within the structure of the coin or bill. For onetype of physical bitcoin, a private key is printed on a piece of plasticwith a scratch-off layer. The bitcoin is then placed inside an envelopemade of layers of metal foil and plastic-paper polymer. The SSCI insteadutilizes layers as an integral element of the instantiated informationin the laminate and does not use a scratch-off layer or envelope. TheSSCI also does not have a separate piece of plastic inside a laminate,unlike some other designs which are effectively just an envelope forcode written on a separate piece of material.

Scratch-off material can also be tampered with and/or counterfeited.Holograms, or other sticker type items can be easily removed, thusexposing the information beneath the sticker, and then re-attached. Analternative for tampering would be to reattach a similar sticker. Inboth cases, the security of the product hinges upon oneanti-counterfeiting feature. In contrast, the SSCI allows multipleanti-counterfeiting features to be broken in the process ofdelamination.

Another form of information concealment, which may be called a “window”,is used in sending pin codes and other information. The code is printedon a first sheet of paper or plastic, and then a second sheet of paper,plastic or foil is attached to cover the code, with the adhesive in arectangle or circle all around the code, but not on the code itself. Inanother related version, a window is made such that the sheet may betorn open to reveal the code on the first sheet. The tamper proofing inthis case is based on the tearing of the second sheet to expose the codeon the first sheet. In essence, the window is an envelope that is sealedon its edges and may be opened to reveal information.

There are several substantial differences between a window and the moresecure SSCI.

1) In a window, there is no adhesion over the code itself. In the SSCI,adhesion is effected across the surface of the underlying sheet(s), andadhesion in some versions instantiates the code. The code is integratedinto the structure which makes it harder to reveal covertly, and moredifficult to overcome the security features.

2) It is easier to delaminate an edge of a window, and it is harder todetect such tampering, than to delaminate the entire laminate as in thisinvention. In instances of this invention where the adhesive itselfcreates a readable surface after delamination, tampering is furtherdiscouraged because the code is essentially not readable untilirreversible delamination has occurred.

3) The need for a window to be readily tearable introduces structuralweakness into the form. In the SSCI, both outer layers may be chosen foroptimal strength and resistance to tearing.

4) The two sheets that form a window are not intrinsically resistant totampering. An attack on the adhesive connecting the two sheets ispossible. In the SSCI, the only way to open the product is to delaminatethe sheets, materially and visually changing the appearance of thelayers.

5) In the window, anti-tampering features can only be relevantly appliedto the window itself, or perhaps to the code beneath the window. In theSSCI, delamination would substantially break numerous anti-tamper andsecurity features over a wider area. This invention is far moredifficult to counterfeit or defeat than the existing window devices.

6) The window is essentially limited to one layer of materialinformation. In the SSCI, multiple layers of information, as well asdecoy layers, may be laminated together.

The instant SSCI addresses these issues by providing a structure thatimplements new and unique containment of information as well as a methodfor producing the containment of information.

The SSCI includes a laminate with at least two layers, which can be madeof a variety of material, with plastic and/or metal preferred dependingon the functional application. The SSCI is constructed to containinformation including a code, serial number, information feature,encryption key or personal identification number (PIN number). Theinformation is located between the layers such that the information isnot visible or detectable from outside the laminate. To access andreveal the information within the laminate, the laminate isde-laminated, thereby indicting that tampering has occurred to thelaminate. When the SSCI is de-laminated, irreversible damage is done tomultiple metal and plastic layers, such as turning the metal layer intoflakes or powder in a random or selected pattern, folds and creases tothe bill, breaking of the print layers, breaking of security threadssuch as color-shift threads, oxidation of layers, separation of printlayers onto distinct surfaces, intentional tearing of layers, changedcolor of adhesive, and demetalization of holograms, if they areincluded.

The information within the laminate is a pattern incorporated into atleast one of the layers. There are multiple ways of instantiating theinformation into or onto the layer(s). Examples of instantiation includeplacing material on the layer(s), placing material on the layer(s) andremoving some of the material, placing adhesive material on thelayer(s), placing release material on the layer(s), or utilizingmagnetic domains.

At least one of the layers can also retain a pattern of electricallycharged material or contain a pattern of chemically altered materialwith the pattern exhibiting the information. Additionally, at least oneof the layers can contain information that is displayed as at least twovisible colors, which are comprised of colored materials that havesimilar chemical structures.

The information within the laminate may provide access to open a lock,typically by means of an electronic device. The information may alsoprovide account access to claim financial value, or to function as aprivate key for a blockchain. The laminate can utilize at least oneblocking layer that restricts radiation and other interrogation methods.

One example of the SSCI structure is a five-layer design with the layerscomprising in order: a first plastic layer that is transparent andincludes indicia, a first layer of metal, a patterned adhesive materialwith areas of low adhesion, a second layer of metal, and a secondtransparent plastic layer. The method of assembling the SSCI comprisesthe first metal layer is vacuum deposited on the first plastic layer,the second metal layer is vacuum deposited on the second plastic layer,patterned release material is applied to the laminating adhesive and thethus patterned laminating adhesive applied between the two metal layers,with the metal surfaces of the first and second metal layers in contactwith the patterned adhesive, thereby leaving the plastic surfaces of thetwo plastic and metal laminated layers exposed.

In view of the above disclosure the primary object of the invention isto provide a structure for secure containment of information thatincludes improved security features for currency, financial devices orother information devices.

In addition to the primary object, it is also an object of the inventionto provide a structure for secure containment of information that:

-   -   can be used for many types of currency,    -   can be used for non-currency applications,    -   is easy to implement,    -   can be visually attractive and informative,    -   does not interfere with the use of currency,    -   can utilize a variety of security features,    -   is cost effective from both a manufacturer's and consumer's        point of view.

These and other objects and advantages of the present invention willbecome apparent from the subsequent detailed description of thepreferred embodiment and the appended claims taken in conjunction withthe accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an elevational side view of a five-layer design of a structurefor secure containment of information.

FIG. 2 is an elevational side view of a six-layer design of thestructure for secure containment of information.

FIG. 3 is an exploded view of the five-layer design of the structure forsecure containment of information.

BEST MODE FOR CARRYING OUT THE INVENTION

The best mode for carrying out the invention is disclosed in terms thatdisclose a preferred embodiment with multiple structural configurationsand methods for manufacture of a structure for secure containment ofinformation (SSCI 10). In many types of currency, and in particularblockchains, security features are placed on bills or coins. Examples ofsecurity features are a holographic sticker and a scratch-off material.Other security features, such as security printing, serial numbers,color shift thread, etc. might be printed on the surface of the bill,but are not affected by tampering or legitimate removal of the hologramsticker or scratch-off material. These, and other, security features areutilized to cover or otherwise mask information located beneath asticker or scratch-off material.

A problem exists in that these external security features aresusceptible to tampering and counterfeiting. It is not difficult to usea hypodermic syringe to inject a solvent under a sticker, remove thesticker to expose the information, and then to replace the sticker. Thisis just one example. Some stickers can simply be peeled off and thenreplaced without any noticeable indication. Still other stickers may beheated, breaking the adhesive bond, and then reattached without damagingthe sticker substrate. Scratch-off material is also at risk of tamperingand counterfeiting. The SSCI 10 addresses these problems by providing aneffective solution of embedding a private code or key within a currencybill, rather than on an exterior surface. The SSCI's 10 construction isdesigned for hiding codes, keys or other information instead ofutilizing an add-on item to the exterior surface or packaging of anenclosed separate item.

As shown in FIGS. 1-3 , the SSCI 10 is comprised of a laminate 12 havingat least one plastic layer 14 and at least one metal layer 16.Preferably, there are multiple plastic and metal layers comprising thelaminate 12. While plastic and metal are the two most effectivematerials for the layers, other material such as glass, ceramic, paperor sheets of fibrous material can also be utilized. The laminate 12 isconstructed to contain information 22 including a code, serial number,informational feature, encryption key or pin number. The information 22is located between the laminate layer such that the code, serial number,informational feature, encryption key or pin number is not visible fromoutside the laminate. To access and expose the information 22, thelaminate 12 is delaminated, thereby indicating that tampering hasoccurred to the laminate 12.

The information 22 is preferably a physical pattern 24, as shown inFIGS. 2 and 3 , that is instantiated into at least one of the layers14,16. There are multiple ways of instantiating the information into thelayer(s), including but not limited to: placing material 26 on the layerand then removing material 26 from the layer such that the remainingmaterial 26 exhibits the information 22, placing material 26 on thelayer such that the material 26 exhibits the information 22, placingadhesive 28 material on the layer such that the adhesive 28 materialexhibits the information 22, or placing release material 30 on the layersuch that the release material 30 exhibits the information 22.

At least one of the layers 14,16 can contain information 22 instantiatedby magnetic domains 34, as shown in FIG. 3 . Also, at least one of thelayers 14,16 can retain a pattern of electrically charged material 36,and/or contain a pattern of chemically altered material 38, as alsoshown in FIG. 3 . The information 22 can be displayed as at least twovisible colors which are comprised of colored material(s) 42, as shownin FIG. 2 , that have similar chemical structures. At least one of thecolored materials 42 laterally surrounds the other colored material 42.

The code, serial number, informational feature, encryption key or pinnumber provides access to open a physical or an informational lock. Theaccess is provided by a device such as a computer, scanning device,wireless phone, wireless device, digital watch, digital glasses ordigital camera. Additionally, the code, serial number, informationalfeature, encryption key or pin number provides account access to claimfinancial value, and/or provides access to a financial account 50 suchas a physical commodity, a bank account or a brokerage account. Itshould be noted that exposing the code, serial number, informationalfeature, encryption key or pin number can constitute the execution of acontract.

To increase the functionality and security capabilities of the SSCI 10,the plastic layer(s) 14 can include at least one decoy layer 52, asshown in FIG. 3 , which contains patterns that do not exhibit theinformation 22. The code, serial number, informational feature,encryption key, or pin number can be utilized as a public key 46, asshown in FIG. 3 , or a private key 48, as also shown in FIG. 3 , or tovalue stored in a blockchain. The SSCI 10 can also include at least oneblocking layer 54, as shown in FIG. 3 , that restricts radiation andother interrogation methods. The blocking layer 54 can be made of amaterial including a metal, an ink, a dye or a pigment. When a pigmentis used, the pigment may be comprised of carbon.

The SSCI 10 can consist of various structure designs and the method caninclude steps for producing a structure having multiple layers. Afive-layer design 58, as shown in FIGS. 1 and 3 , has layers comprisingin order: a first plastic layer 14 that is transparent and includesindicia, a first layer of metal 16, a layer of patterned adhesivematerial 40, as shown in FIG. 2 , with areas of low adhesion, a secondlayer of metal, and a second transparent plastic layer. The method ofassembling the SSCI 10 comprises: the first metal layer is vacuumdeposited on the first plastic layer, the second metal layer is vacuumdeposited on the second plastic layer, patterned release material isapplied to laminating adhesive and the thus patterned laminatingadhesive is applied between the two metal layers with the metal surfacesof the first and second metal layers in contact with the patternedadhesive, thereby leaving the plastic surfaces of the two plastic andmetal laminated layers exposed.

A six-layer design 60, as shown in FIG. 2 , has layers comprising inorder: a first plastic layer 14 that is transparent and includesindicia, a first layer of metal 16, a printed layer of plastic 14, anapplied release material layer 30, a second layer of metal 16, and asecond transparent plastic layer 14. The method of assembling the SSCI10 comprises: the first metal layer is vacuum deposited on the firstplastic layer, the second metal layer is vacuum deposited on the secondplastic layer, areas of release material are applied to the printedplastic layer, the printed plastic layer with the release material islaminated between the two metal layers with the metal surfaces of thefirst and second metal layers in contact with the printed plastic layer,thereby leaving the plastic surfaces of the two plastic and metallaminated layers exposed.

In the case of a metallic version of the SSCI 10, the center sectioncould be made as a three-dimensionally structured metallic film with thedeposition performed such that only metal rather than printing would bevisible.

While the invention has been described in detail and pictorially shownin the accompanying drawings it is not to be limited to such details,since many changes and modification may be made to the invention withoutdeparting from the spirit and the scope thereof. Hence, it is describedto cover any and all modifications and forms which may come within thelanguage and scope of the claims.

1. (canceled)
 2. A method of accessing secure data within a structurefor secure containment of information, comprising: delaminating twolayers of a plurality of layers of a laminate to expose secure datadisposed between the two layers of the laminate while causingirreversible damage to one or more layers of the plurality of layers onone or both sides of the information, wherein the secure data is notvisible or detectable from outside the laminate prior to delamination.3. The method of accessing secure data within a structure for securecontainment of information of claim 2, wherein: the plurality of layerscomprise a first metallic layer and a second metallic layer; and theinformation is disposed between the first metallic layer and the secondmetallic layer.
 4. The method of accessing secure data within astructure for secure containment of information of claim 2, wherein: theirreversible damage comprises at least one anti-counterfeiting featurebeing broken.
 5. The method of accessing secure data within a structurefor secure containment of information of claim 2, wherein: theirreversible damage comprises one or more items selected from the groupconsisting of: turning a metal layer into flakes, turning a metal layerinto powder, folding or creasing the laminate, breaking of one or moreprint layers, breaking of one or more security threads, oxidation of oneor more layers of the laminate, separation of one or more print layersinto distinct surfaces, intentional tearing of one or more layers of thelaminate, a color change of an adhesive, and a de-metallization of ahologram.
 6. The method of accessing secure data within a structure forsecure containment of information of claim 2, wherein: at least some ofthe plurality of layers of the laminate comprise one or more materialsselected from the group consisting of: plastic, metal, glass, ceramic,paper, and sheets of fibrous material.
 7. The method of accessing securedata within a structure for secure containment of information of claim2, wherein: the secure data comprises at least one item selected fromthe group consisting of: a code, a serial number, an informationfeature, an encryption key, and a personal identification number (PIN).8. The method of accessing secure data within a structure for securecontainment of information of claim 2, wherein: the secure datacomprises a pattern incorporated into at least one of the two layers. 9.A method of accessing secure data within a structure for securecontainment of information, comprising: delaminating two layers of aplurality of layers of a laminate to expose secure data embedded betweenthe two layers of the laminate while triggering one or moreanti-tampering features of the laminate, wherein the secure data is notvisible or detectable from outside the laminate prior to delamination.10. The method of accessing secure data within a structure for securecontainment of information of claim 9, wherein: the one or moreanti-tampering features permanently indicate that the laminate has beendelaminated.
 11. The method of accessing secure data within a structurefor secure containment of information of claim 9, wherein: at least onelayer of the plurality of layers of the laminate comprises one or morematerials selected from the group consisting of: a pattern ofelectrically charged material with the pattern exhibiting at least aportion of the secure data, a pattern of chemically altered materialwith the pattern exhibiting at least a portion of the secure data, thesecure data displayed as at least two visible colors.
 12. The method ofaccessing secure data within a structure for secure containment ofinformation of claim 9, wherein: the plurality of layers of the laminatecomprise a blocking layer that restricts radiation and otherinterrogation methods, a decoy layer that contains patterns that do notexhibit the information, or both a blocking layer and a decoy layer. 13.The method of accessing secure data within a structure for securecontainment of information of claim 9, wherein: at least one layer ofthe plurality of layers of the laminate comprises at least a portion ofthe secure data instantiated by magnetic domains.
 14. The method ofaccessing secure data within a structure for secure containment ofinformation of claim 9, wherein: delaminating the two layers causesirreversible damage to at least one metallic layer of the laminate. 15.The method of accessing secure data within a structure for securecontainment of information of claim 9, wherein: at least one of the oneor more anti-tampering features comprises irreversible damage to atleast one of the plurality of layers of the laminate.
 16. A method ofaccessing secure data within a structure for secure containment ofinformation, comprising: delaminating two layers of a plurality oflayers of a laminate to expose secure data embedded between the twolayers of the laminate while triggering one or more anti-tamperingfeatures of the laminate, wherein: the secure data is disposed betweenat least two metallic layers of the laminate; and the secure data is notvisible or detectable from outside the laminate prior to delamination.17. The method of accessing secure data within a structure for securecontainment of information of claim 16, wherein: the two layers are theat least two metallic layers of the laminate.
 18. The method ofaccessing secure data within a structure for secure containment ofinformation of claim 16, wherein: the secure data is displayed as atleast two visible colors.
 19. The method of accessing secure data withina structure for secure containment of information of claim 18, wherein:the at least two visible colors comprise colored materials that havesimilar chemical structures.
 20. The method of accessing secure datawithin a structure for secure containment of information of claim 18,wherein: a first colored material of a first visible color of the atleast two visible colors laterally surrounds a second colored materialof a second visible color of the at least two visible colors.
 21. Themethod of accessing secure data within a structure for securecontainment of information of claim 16, wherein: the laminate comprisesa first plastic layer, a first of the at least two metallic layers, apatterned adhesive layer, a second of the at least two metallic layers,and a second plastic layer.