Method, apparatus, and article to facilitate distributed evaluation of objects using electromagnetic energy

ABSTRACT

Objects such as manufactured goods or articles, works of art, media such as identity documents, legal documents, financial instruments, transaction cards, other documents, and/or biological tissue are sampled via sequential illumination in various bands of the electromagnetic spectrum, a test response to the illumination is analyzed with respect to reference responses of reference objects. The sequence may be varied. The sequence may define an activation order, a drive level and/or temperature for operating one or more sources. Illumination may be in visible, infrared, ultraviolet, or other portions of the electromagnetic spectrum. Elements of the evaluation system may be remote from one another, for example coupled by a network.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.13/162,415, filed on Jun. 16, 2011, now issued as U.S. Pat. No.8,285,510, which is a continuation of U.S. patent application Ser. No.11/831,662, filed on Jul. 31, 2007, now issued as U.S. Pat. No.7,996,173, which claims benefit under 35 U.S.C. 119(e) to U.S.Provisional Patent Application No. 60/834,662, filed Jul. 31, 2006,which is incorporated herein by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This disclosure generally relates to evaluation systems, and moreparticularly to systems that evaluate characteristics of an object usingelectromagnetic energy.

2. Description of the Related Art

There are a number of proposed systems that employ spectral analysis oflight received from a sample to recognize the sample.

US Patent Application Publication 2006-0161788 A1 describes full colorspectrum object authentication methods and systems. In particular, aspectrum measuring device measures a region of respective sampledobjects to produce spectral content information that identifies thesampled objects. The spectrum measuring device includes a plurality ofindividual sensors, which preferably includes specialized narrow bandnear-infrared and near-ultraviolet sensors, for example photodiodes orphotomultipliers. Computers employ spectral analysis software togenerate a unique measured pattern, which is then compared withreference patterns stored in a database. The spectral analysis softwaremay be remotely located on a server accessible by the computers. Thespectral analysis is preferably performed using XYZ color spacemodeling, although other color space models may be employed. The regionbeing sampled may be varied to prevent third parties from easilyanticipating the location. Samples may be take from multiple regions toinsure accuracy.

U.S. Pat. No. 5,844,680 is directed to a device and process formeasuring and analyzing spectral radiation, in particular for measuringand analyzing color characteristics. In particular, a number ofradiation sources are provided in combination with a sensor fordetecting radiation within a desired wavelength range. The radiationsources have spectral characteristics that are linearly independent fromone another, but overlap so that in combination, the radiation sourcesgenerate radiation over the entire desired wavelength range.Alternatively, a single radiation source is provided that generatesradiation over the entire desired wavelength range, in combination witha plurality of sensors that have spectral sensing characteristics thatare linearly independent from one another, but overlap the entiredesired wavelength range. A control unit stores a number of calibrationfunctions with linearly independent spectral characteristics.

The patents and other publications directed to the field of objectauthentication and/or object identification are too numerous todescribe. The above described publication and patent are onlyrepresentative.

BRIEF SUMMARY

It may be useful to determine whether an object being evaluated isidentical to a previously evaluated object; in other words determinewhether an object being sampled is the exact same object as a referenceobject. Alternatively, it may be useful to determine whether an objectbeing evaluated is similar to a reference object; in other wordsdetermine whether an object being sampled is a facsimile of thereference object. In order to uniquely identify a large number ofobjects, it may be useful to capture a large number of distinctreference responses from one or more reference objects. This may bedifficult to do with fixed illumination. This may also be difficult todo when sensing at a limited number of bands. It may also be useful toseparate hardware and/or software functions into separate systems thatmay be remote to one another. Such may reduce costs and/or permit theuse of hardware or software that could not otherwise be financiallyjustified. It may also be useful to apply the object evaluation tospecific applications, for example: manufacturing process control,quality assurance, media authentication, biological tissue recognition,identification, verification, authentication, classification, and/ordiagnostics.

In one aspect, a method of facilitating object testing includesoperating at least one source at a test device according to a firstsequence during a first period to emit electromagnetic energy in aplurality of bands, capturing electromagnetic energy returned to thetest device during the first period, operating the at least one sourceat the test device according to a second sequence during a second periodto emit electromagnetic energy in a plurality of bands, the secondsequence different from the first sequence, capturing electromagneticenergy returned to the test device during the second period, andtransmitting signals indicative of the captured electromagnetic energyremotely.

In another aspect, a method of facilitating responses to object testingrequests includes storing a set of reference data representing responsesof various reference objects to at least one sequence of illuminationwith a plurality of bands of electromagnetic energy, receiving a requestfrom a remote test device including test data representing at least oneresponse of an object being tested to at least a first sequence ofillumination with the plurality of bands of electromagnetic energy,comparing the test data to the reference data, determining a resultbased on the comparing of the test data to the reference data, andtracking usage by a billing entity financially associated with theremote test device.

In another aspect, a method of facilitating remote testing of objectsincludes receiving a set of reference data from a remote entity, the setof reference data representing reference responses of various referenceobjects to at least one sequence of illumination with electromagneticenergy by a plurality of illumination sources, locally storing thereceived set of reference data, and providing remote access to thelocally stored set of reference data on a fee basis.

In yet another aspect, a method of facilitating testing includes at atesting device, downloading a first subset of reference data at a firsttime from a remote set of reference data that is remote with respect tothe testing device, at the testing device, operating at least one sourceaccording to a first sequence during a first period to emitelectromagnetic energy in a plurality of bands, at the testing device,capturing electromagnetic energy returned during the first period, atthe testing device, comparing the captured electromagnetic energy to atleast a portion of the subset of reference data, and at the localtesting device, determining a result based on the comparing of the testdata to the first subset of reference data.

In still yet another aspect, a method of facilitating evaluation ofobjects using electromagnetic energy includes determining a plurality ofresponses by at least one reference object to respective ones of aplurality of bands of electromagnetic radiation, and storing thedetermined responses by the at least one reference object to therespective ones of the plurality of bands of electromagnetic radiationin a computer-readable medium.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

In the drawings, identical reference numbers identify similar elementsor acts. The sizes and relative positions of elements in the drawingsare not necessarily drawn to scale. For example, the shapes of variouselements and angles are not drawn to scale, and some of these elementsare arbitrarily enlarged and positioned to improve drawing legibility.Further, the particular shapes of the elements as drawn, are notintended to convey any information regarding the actual shape of theparticular elements, and have been solely selected for ease ofrecognition in the drawings.

FIG. 1 is a schematic diagram of an object evaluation system including ahost system and a plurality of remote test devices, according to oneillustrated embodiment.

FIG. 2 is a schematic diagram of an object evaluation system including ahost system with a plurality of databases associated with respectivefinancial entities, and a plurality of remote test systems, according toanother illustrated embodiment.

FIG. 3 is a schematic diagram of an object evaluation system including ahost system and a test system remotely located from the host system andassociated with a financial entity including a respective database,according to another illustrated embodiment.

FIG. 4 is a partially cutaway isometric view of a test deviceilluminating an object, according to one illustrated embodiment.

FIG. 5 is a functional block diagram of a computing system suitable foruse as the host system of FIGS. 1-3 or other computing system, accordingto one illustrated embodiment.

FIG. 6 is a schematic diagram of a data structure of reference datastored in a computer-readable memory, according to one illustratedembodiment.

FIG. 7 is a flow diagram showing a method of operating a host system anda test device remotely located with respect to the host system, themethod employing both inherent and conventional encryption techniques tooperate in a secure manner, according to one illustrated embodiment.

FIG. 8 is a flow diagram showing a method of operating a host system anda test device remotely located with respect to the host system, themethod employing both inherent and conventional encryption techniques tooperate in a secure manner, according to another illustrated embodiment.

FIG. 9 is a flow diagram showing a method of operating a host system andtest device remotely located with respect to the host system, the methodemploying both inherent and conventional encryption techniques tooperate in a secure manner, according to a further illustratedembodiment.

FIG. 10 is a flow diagram showing a method of operating the host systemor test device remotely located with respect to the host system, tofacilitate evaluation of an object, according to one illustratedembodiment.

FIG. 11 is a flow diagram showing a method of operating the host systemor test device remotely located with respect to the host system, tofacilitate evaluation of an object, according to another illustratedembodiment.

FIG. 12 is a flow diagram showing a method of operating the host or testdevice remotely located with respect to the host system, to facilitateevaluation, according to a further illustrated embodiment.

FIG. 13 is a flow diagram showing a method of forming an expectedresponse by an object to a sequence of illumination from stored datarepresenting distinct reference responses to different bands ofillumination, according to one illustrated embodiment.

FIG. 14 is a flow diagram showing a method of storing reference data ata host system, according to one illustrated embodiment.

FIG. 15 is a flow diagram showing a method of analyzing test data withrespect to the reference data, according to one illustrated embodiment.

FIG. 16 is a flow diagram showing a method of executing a financialtransaction, according to one illustrated embodiment.

FIG. 17 is a flow diagram showing a method of reporting financialcharges to a financial entity, according to one illustrated embodiment.

FIG. 18 is a flow diagram showing a method of executing a financialtransaction, according to one illustrated embodiment.

FIG. 19 is a flow diagram showing a method of executing a financialtransaction, according to another illustrated embodiment.

FIG. 20 is a flow diagram showing a method of executing a financialtransaction, according to yet another illustrated embodiment.

FIG. 21 is a flow diagram showing a method of executing a financialtransaction, according to still another illustrated embodiment.

FIG. 22 is a flow diagram showing a method of executing a financialtransaction, according to further illustrated embodiment.

FIG. 23 is a flow diagram showing a method of executing a financialtransaction, according to yet a further illustrated embodiment.

FIG. 24 is a flow diagram showing a method of transferring executablemodules and data between the host system and remote test device,according to an illustrated embodiment.

FIGS. 25A and 25B are a flow diagram showing a method of transferringexecutable modules and data between the host system and remote testdevice, according to another illustrated embodiment.

FIG. 26 is a flow diagram showing a method of storing reference data toa data structure, according to one illustrated embodiment.

FIG. 27 is a flow diagram showing a method of determining an expectedresponse based on a number of parameters, according to one illustratedembodiment.

FIG. 28 is a flow diagram showing a method of forming an expectedresponse from stored reference data, according to one illustratedembodiment.

DETAILED DESCRIPTION OF THE INVENTION

In the following description, certain specific details are set forth inorder to provide a thorough understanding of various disclosedembodiments. However, one skilled in the relevant art will recognizethat embodiments may be practiced without one or more of these specificdetails, or with other methods, components, materials, etc. In otherinstances, well-known structures associated with computing systems,networks, servers, microprocessors, memories, buses, and sources ofelectromagnetic energy have not been shown or described in detail toavoid unnecessarily obscuring descriptions of the embodiments.

Unless the context requires otherwise, throughout the specification andclaims which follow, the word “comprise” and variations thereof, suchas, “comprises” and “comprising” are to be construed in an open,inclusive sense, that is as “including, but not limited to.”

Reference throughout this specification to “one embodiment” or “anembodiment” means that a particular feature, structure or characteristicdescribed in connection with the embodiment is included in at least oneembodiment. Thus, the appearances of the phrases “in one embodiment” or“in an embodiment” in various places throughout this specification arenot necessarily all referring to the same embodiment. Further more, theparticular features, structures, or characteristics may be combined inany suitable manner in one or more embodiments.

As used in this specification and the appended claims, the singularforms “a,” “an,” and “the” include plural referents unless the contentclearly dictates otherwise. It should also be noted that the term “or”is generally employed in its sense including “and/or” unless the contentclearly dictates otherwise.

The headings and Abstract of the Disclosure provided herein are forconvenience only and do not interpret the scope or meaning of theembodiments.

The ability to recognize, identify, verify, authenticate and/or classifyobjects has numerous commercial applications.

It may be useful to determine whether an object being evaluated isidentical to a previously evaluated object; in other words determinewhether an object being sampled is the exact same object as a referenceobject. Alternatively, it may be useful to determine whether an objectbeing evaluated is similar to a reference object; in other wordsdetermine whether an object being sampled is a facsimile of thereference object.

For example, it may be useful to determine whether a manufactured objectis identical to a previously evaluated manufactured object. Such may beuseful in authenticating goods, and deterring counterfeiting or graymarketing of goods. For example, it may also be useful to determinewhether other objects, such as paintings or other works of art areidentical to a previously sampled work of art. For example, it may beuseful to determine whether an object being manufactured is similar to apreviously evaluated object. Such may be useful in manufacturing processcontrol and/or quality control.

For example, it may be useful to determine whether a medium is identicalto a previously evaluated medium. For example, it may be useful todetermine whether a medium is similar to a previously evaluated medium.

For example, it may be useful to determine whether a medium such as adocument is identical to a previously evaluated document. For example,it may be useful to determine whether a medium such as a document issimilar to a previously evaluated document. Such may be useful inrecognizing, identifying, verifying, authenticating and/or classifyingfinancial instruments such as currency, checks, bonds, money orders,and/or securities. Such may also be useful in recognizing, identifying,verifying, authenticating and/or classifying identification documents,such as passports, identity cards (e.g., national, state, provincial,military, employer, school, organization), driver's licenses, and/orbirth or naturalization certificates. Such may also be useful inrecognizing, identifying, verifying, authenticating and/or classifyinglegal documents such as licenses, permits, assignments, deeds, wills,declarations, oaths, agreements, pleadings, or motions. Such may beuseful in recognizing, identifying, verifying, authenticating and/orclassifying medical related documents, such as medical records, medicaldata, medical reports, and/or medical images (e.g., X-Ray, CAT scan,MRI, tomography, etc.).

For example, it may also be useful to determine whether a medium such asa financial transaction card is identical to a previously evaluatedfinancial transaction cards. For example, it may be useful to determinewhether medium such as a financial transaction card is similar to apreviously evaluated financial transaction card. Such may be useful indeterring fraud and/or misuse of documents and other media. Such may beuseful in recognizing, identifying, verifying, authenticating and/orclassifying financial instruments such as credit cards, debit cards,and/or gift cards.

Also for example, it may be useful to determine whether a piece ofbiological tissue from a subject is identical to a previously evaluatedpiece of tissue. Also for example, it may be useful to determine whethera piece of biological tissue from a subject is similar to a previouslyevaluated piece of tissue. Such may also be useful in recognizing,identifying, verifying, authenticating, classifying, and/or diagnosingbiological tissue, such as bodily tissue including retinal tissue, skin,blood, bone, hair, organs, etc. For example, such may be used toidentify a subject from which the biological tissue was obtained. Alsofor example, such may be used to assess a condition of the biologicaltissue or subject from which the biological tissue was obtained. Forexample, the biological tissue being evaluated may be compared to normaland/or abnormal reference biological tissue specimens, which may be usedfor diagnosing a condition.

It may be particularly useful where the above may occur based on thenatural conditions or attributes of the object, media, or biologicaltissue, without the need to apply dedicated indicia such as serialnumbers, machine-readable symbols (e.g., barcode symbols, area or matrixcode symbols, stack code symbols), and/or radio frequency identification(RFID tags). Such dedicated data carriers may, in some embodiments,provide additional information regarding the object.

All of the above may, or may not, employ additional information aboutthe object to facilitate the process. Additional information may includeone or more measurable or observable physical characteristics of theobject, media or biological tissue, for example, height, weight, age,hair or eye color, gender, location, type, size, denomination, serialnumbers, security features, name, type, serial numbers, date of issue,color, etc. Such additional information may be employed to confirm amatch, or to reduce the number of reference responses for comparisonwith a test response.

The ability to perform such in a network environment may provide avariety of distinct advantages. For example, such may make possible lowcost end user test devices, which share or gain remote access to highercost computing hardware and software. Such may allow the costs of thecomputing hardware and software to be shared over a variety of end usersor financial entities. Such may also allow for “centralization” ofrelatively higher cost computing hardware and software, perhapspermitting use of high speed super-computers that could not otherwise befinancially justified for individual end users or small groups of endusers. Such also may allow for “decentralization” of low cost samplingor test devices. Such may also allow for light weight and/or low powerconsuming test devices. Such may additionally or alternatively permitthe upgrade of previously distributed test devices. Such may also permitthe distribution of work load. Such may also facilitate the backing upof data, and provide for redundancy. Other advantages will be apparentfrom the teachings herein.

FIG. 1 shows an object evaluation system 10 a including one or more hostsystems 12 a and a number of test devices 14 a-14 j (collectively 14)communicatively coupled to the host system 12 a via one or more networks16 a. One or more of the test devices 14 may be remotely located withrespect to the host system 12 a.

The host system 12 may include one or more computing systems 18 a andone or more storage devices or databases 20 a. The computing system 18 amay take any of a variety of forms, for example, personal computers,mini-computers, work stations, or main frame computers. The computingsystem 18 a may, for example, take the form of a server computerexecuting server software. The storage or database 20 a can take avariety of forms, including one or more hard disks or RAID drives,CD/ROMs, or other mass storage devices.

As discussed in detail below, the test devices 14 are operable tosequentially illuminate an object with a number of bands ofelectromagnetic energy. The test devices 14 are also operable to detect,measure or otherwise capture electromagnetic energy reflected, emitted,fluoresced, refracted, diffracted or otherwise transmitted, or otherwisereturned from the object in response to the illumination. As used hereinand in the claims, the terms illuminate, illuminates, illumination, andvariations of such terms mean to expose to or reveal by the use ofelectromagnetic energy or electromagnetic radiation, whether in thevisible portion of the electromagnetic spectrum, the optical portion(e.g., visible, near-infrared, near-ultraviolet), or other portions(e.g., far-infrared, far-ultraviolet, microwave, X-ray, etc.).

The network 16 a can take a variety of forms, for example one or morelocal area networks (LANs), wide area networks (WANs), wireless LANs(WLANs), and/or wireless WANs (WWANs). The network 16 a may employpacket switching or any other type of transmission protocol. The network16 a may, for example, take the form of the Internet or Worldwide Webportion of the Internet. The network 16 a may take the form of publicswitched telephone network (PSTN) or any combination of the above, orother networks.

A number of the test devices 14 a-14 f may be logically or physicallycoupled as a test device system 22 a. The test device system 22 a may,for example, be associated with a single financial entity such as abusiness (e.g., corporation, partnership, sole proprietorship, limitedliability company), a division of a business, a non-profit, a government(e.g., federal, state or provincial, county or parish, city or town), ordivision of a government (e.g., agency, department).

The test device system 22 a may include one or more server computersystems 24 a, and/or one or more personal computing systems 26 a, allcoupled by a network 28 a. The network 28 a may take the form of one ormore local area networks (LAN) or wide area networks (WAN) and may ormay not include wired or wireless access. The network 28 a may take theform of an intranet, being restricted to a company or other financialentity. The test device system 22 may, for example, be affiliated with aparticular company or financial entity.

A number of the test devices 14 g-14 h may be wirelessly coupled to thenetwork 16 a. One or more of the remote test devices 14 i may be coupledto the network 16 a via a cradle or other receiver 30. One or more ofthe test devices 14 j may be coupled to the network 16 a via aconventional communications interface, for example a USB port of aconventional computing system 32. One or more of the remote test devices14 k may be coupled to the network 16 a via a wired connection. Forexample, the test device 14 k may include an integrated phone modemallowing the test device 14 k to call into the network 16 a.

FIG. 2 shows an object evaluation system 10 b according to anotherillustrated embodiment.

The object evaluation system 10 b includes a number of distinct testdevice systems 22 b-22 d (collectively 22). The test device systems 22b-22 d employ respective networking systems, for example, servercomputing systems 24 b-24 d and networks 28 b-28 d, respectively, toprovide communication with the test devices 14. The test device systems22 b-22 d may be similar to, or different from, the test device system22 a (FIG. 1) Each of the test device systems 22 b-22 d may, forexample, be associated with a single financial entity such as a business(e.g., corporation, partnership, sole proprietorship, limited liabilitycompany), a division of a business, a non-profit, a government (e.g.,federal, state or provincial, county or parish, city or town), ordivision of a government (e.g., agency, department). Some of the testdevice systems 22 c-22 d may include a wired connection to the network16 a, while other of the test device systems 22 b may include a wirelessconnection to the network 16 a.

The object evaluation system 10 b includes one or more host systems 12b. The host system 12 b includes one or more computing systems 18 b, anda number of distinct storage or databases 20 b-20 d each associated witha respective financial entity or a respective one of the test devicesystems 22 b-22 d, respectively. The computing systems 18 b arecommunicatively coupled to the test device systems 22 b-22 d via thenetwork 16 b.

FIG. 3 shows an object evaluation system 10 c according to anotherillustrated embodiment.

The object evaluation system 10 c includes one or more test devicesystems 22 e. The test device system 22 e includes one or more computingsystems such as server computing system 24 e and personal computingsystem 26 e. The test device system 22 e also includes a number of testdevices 14 communicatively coupled via a network 28 e. The network 28 emay take a variety of forms including LANs, WANs, WLANs, WWANs, PSTN, toname a few. The test device system 22 e further includes a proprietarystorage or database 34. The proprietary storage or database 34 maycontain executable modules and/or data. For example, the storage ordatabase 34 may contain proprietary reference data that is specific to afinancial entity which owns, operates, leases or controls the testdevice system 22 e.

The object evaluation system 10 c also includes host system 12 ccomprising one or more computing systems 18 c and storage or databases20 e. The host system 12 c is communicatively coupled to a test devicesystem 24 e via a network 16 c.

FIG. 4 shows a test device 14 according to one illustrated embodiment.

The test device 14 may include a housing 40 with an opening or window 42proximate one end thereof. The test device 14 may include one or moresources 44 (only three called out in FIG. 4) operable to emitelectromagnetic energy. While a plurality of sources 44 are illustrated,some embodiments may employ a single source 44. The test device 14 mayalso include one or more sensors 46 configured and positioned to receiveelectromagnetic energy returned 52 from the object 50.

The sources 44 may take a variety of forms which are operable to emitelectromagnetic energy. The sources 44 may, for example, take the formof one or more light emitting diodes (LEDs). Alternatively, oradditionally, the sources 44 may take the form of one or more lasers,for example one or more laser diodes. The lasers may, or may not, betunable lasers. Alternatively, or additionally, the sources 44 may takethe form of one or more incandescent sources such as conventional orhalogen light bulbs. Alternatively, or additionally, the sources 44 maytake the form of one or more organic LEDs (OLEDs, also referred to inthe relevant art as “electronic paper”), which may advantageously beformed on a flexible substrate.

One, more or all of the sources 44 may be operable to emit in part orall of an “optical” portion of the electromagnetic spectrum, includingthe (human) visible portion, near infrared portion and/or or nearultraviolet portions of the electromagnetic spectrum. Additionally, oralternatively, the sources 44 may be operable to emit electromagneticenergy other portions of the electromagnetic spectrum, for example theinfrared, ultraviolet and/or microwave portions.

In some embodiments, at least some of the sources 44 are operable toemit in or at a different band than other of the sources 44. Forexample, one or more sources 44 may emit in a band centered around 450nm, while one or more of the sources 44 may emit in a band centeredaround 500 nm, while a further source or sources emit in a band centeredaround 550 nm. In some embodiments, each source 44 emits in a bandcentered around a respective frequency or wavelength, different thaneach of the other sources 44. Using sources 44 with different bandcenters advantageously maximizes the number of distinct samples that maybe captured from a fixed number of sources 44. This may be particularlyadvantageous where the test device 14 is relatively small, and haslimited space or footprint for the sources 44.

The distribution of spectral content for each source 44 may vary as afunction of drive level (e.g., current, voltage, duty cycle),temperature, and other environmental factors, depending on the specificsource 44. Such variation may be advantageously actively employed tooperate one or more of the physical sources 44 as a plurality of“logical sources,” each of the logical sources operable to provide arespective emission spectra from a respective physical source 44. Thus,for example, the center of the band of emission for each source 44 mayvary according to a drive level and/or temperature. For example, thecenter of the band of emission for LEDs will vary with drive current ortemperature. One way the spectral content can vary is that the peakwavelength can shift. However, the width of the band, the skew of thedistribution, the kurtosis, etc., can also vary. Such variations may bealso be advantageously employed to operate the physical sources 44 as aplurality of logical sources. Thus, even if the peak wavelength were toremain constant, the changes in bandwidth, skew, kurtosis, and any otherchange in the spectrum can provide useful variations in the operation ofthe test device 14. Likewise, the center of the band of emission may bevaried for tunable lasers. Varying the center of emission bands for oneor more sources 44 advantageously maximizes the number of samples thatmay be captured from a fixed number of sources 44. Again, this may beparticularly advantageous where the test device 14 is relatively small,and has limited space or footprint for the sources 44.

A field of emission of one or more sources 44 may be movable withrespect to the housing 40. For example, one or more sources 44 may bemovable mounted with respect to the housing 40, such as mounted fortranslation along one or more axes, and/or mounted for rotation oroscillation about one or more axes. Alternatively, or additionally, thetest device 14 may include one or more elements operable to deflect orotherwise position the emitted electromagnetic energy. The elements may,for example, include one or more optical elements, for example lensassemblies, mirrors, prisms, diffraction gratings, etc. For example, theoptical elements may include an oscillating mirror, rotating polygonalmirror or prism, or MEMS micro-mirror that oscillates about one or moreaxes. The elements may, for example, include one or more other elements,for example permanent magnets or electromagnets such as those associatedwith cathode ray tubes and/or mass spectrometers.

The sensor 46 can take a variety of forms suitable for sensing orresponding to electromagnetic energy. For example, the sensor 46 maytake the form of one or more photodiodes (e.g., germanium photodiodes,silicon photodiodes). Alternatively, or additionally, the sensor 46 maytake the form of one or more photomultiplier tubes. Alternatively, oradditionally, the sensor 46 may take the form of one or more CMOS imagesensors. Alternatively, or additionally, the sensor 46 may take the formof one or more charge coupled devices (CCDs). Alternatively, oradditionally the sensor 46 may take the form of one or moremicro-channel plates. Other forms of electromagnetic sensors may beemployed, which are suitable to detect the wavelengths expected to bereturned in response to the particular illumination and properties ofthe object being illuminated.

The sensor 46 may be formed as individual elements, one-dimensionalarray of elements and/or two-dimensional array of elements. For example,the sensor 46 may be formed by one germanium photodiode and one siliconphotodiode, each having differing spectral sensitivities. The testdevice 14 may employ a number of photodiodes with identical spectralsensitivities, with different colored filters (e.g., gel filters,dichroic filters, thin-film filters, etc) over the photodiodes to changetheir spectral sensitivity. This may provide a simple, low-cost approachfor creating a set of sensors with different spectral sensitivities,particularly since germanium photodiodes are currently significantlymore expensive that silicon photodiodes. Also for example, the sensor 46may be formed from one CCD array (one-dimensional or two-dimensional)and one or more photodiodes (e.g., germanium photodiodes and/or siliconphotodiodes). For example, the sensor 46 may be formed as a one- ortwo-dimensional array of photodiodes. A two-dimensional array ofphotodiodes enables very fast capture rate (i.e., camera speed) and maybe particularly suited to use in assembly lines or high speed sortingoperations. For example, the sensor 46 may be formed as a one- ortwo-dimensional array of photomultipliers. Combinations of the aboveelements may also be employed.

In some embodiments, the sensor 46 may be a broadband sensor sensitiveor responsive over a broad band of wavelengths of electromagneticenergy. In some embodiments, the sensor 46 may be a narrowband sensorsensitive or responsive over a narrow band of wavelengths ofelectromagnetic energy. In some embodiments, the sensor 46 may take theform of several sensor elements, as least some of the sensor elementssensitive or responsive to one narrow band of wavelengths, while othersensor elements are sensitive or responsive to a different narrow bandof wavelengths. This approach may advantageously increase the number ofsamples that may be acquired using a fixed number of sources. In suchembodiments the narrow bands may, or may not, overlap.

A field of view of the sensor 46 or one or more elements of the sensor46 may be movable with respect to the housing 40. For example, one ormore elements of the sensor 46 may be movable mounted with respect tothe housing 40, such as mounted for translation along one or more axes,and/or mounted for rotation or oscillation about one or more axes.Alternatively, or additionally, the test device 14 may include one ormore elements operable to deflect or otherwise position the returnedelectromagnetic energy. The elements may, for example, include one ormore optical elements, for example lens assemblies, mirrors, prisms,diffraction gratings, etc. For example, the optical elements may includean oscillating mirror, rotating polygonal mirror or prism, or MEMSmicro-mirror that oscillates about one or more axes. The elements may,for example, include one or more other elements, example permanentmagnets or electromagnets such as those associated with cathode raytubes and/or mass spectrometers.

In some embodiments, the source 44 may also serve as the sensor 46. Forexample, an LED may be operated to emit electromagnetic energy at onetime, and detect returned electromagnetic energy at another time. Forexample, the LED may be switched from operating as a source to operatingas a detector by reverse biasing the LED. Also for example, an LED maybe operated to emit electromagnetic energy at one time, and detectreturned electromagnetic energy at the same time.

The test device 14 includes a control subsystem 54. The controlsubsystem 54 may include a microprocessor 56 and computer-readablemedia, for example one or more memories such as read only memory (ROM)58 and random access memory (RAM) 60. One or more buses may couple theROM 58 and RAM 60 to the microprocessor 56. The buses 62 may take avariety of forms including an instruction bus, data bus, othercommunications bus and/or power bus. The nonvolatile ROM 58 may storeinstructions and/or data for controlling the test device 14. Thevolatile RAM 60 may store instructions and/or data for use duringoperation of the test device 14.

The control subsystem 54 may optionally include a buffer 64 to bufferinformation received from the sensor 46. The control subsystem 54 mayfurther optionally include a digital signal processor (DSP) 66 processorcoupled to process information received from the sensor 46 via thebuffer 64. The control subsystem 54 may further optionally include ananalog to digital converter (ADC) 65 and/or digital to analog converter(DAC) 67. An ADC 65 may, for example, be used for converting analogphotodiode responses into digital data for further analysis and/ortransmission. A DAC 67 may, for example, be used for converting digitalcomputer commands into analog LED current levels. The control subsystem54 may additionally or alternatively optionally include an analog signalprocessor, which may be particularly useful where the sensor takes theform of one or more photodiodes.

The control subsystem 54 may include a user interface including one ormore user interface devices. For example, the control subsystem 54 mayinclude one or more speakers or microphones 68. Also for example, thecontrol subsystem 54 may include and/or one or more visual indicators70, such as one or more LEDs, liquid crystal displays (LCD), or othervisual indicator. The LCD may, for example, take the form of a touchsensitive LCD, which displays a graphical user interface, operable bythe user of the test device 14. Additionally, or alternatively, thecontrol subsystem 54 may include one or more user operable inputelements 74, such as switches or keys. The input elements 74 may includea switch for turning the test device ON and OFF. Additionally, oralternatively, the input elements 74 may include one or more switches orkeys for controlling the operation of the test device 14, for example,downloading or uploading data or instructions to, or from the testdevice.

The control subsystem 54 may further include one more communicationports 72, for example, a USB port, infrared transceiver, or RFtransceiver. Such may allow the transmission of data, instructionsand/or results, to or from the test device 14.

The test device 14 may also include a power source 76. The power sourcemay take the form of a portable power source, for example one or morebatteries, fuel cells, and/or super- or ultra-capacitors. Additionally,or alternatively, the power source 76 may take the form of a fixed powersource, such as a cable plugged into a port of a computer or aconventional electrical receptacle (e.g., wall outlet).

The microprocessor 56 employs instructions and or data from the ROM 58and RAM 60 in controlling operation of the test device 14. For example,the microprocessor 56 operates the sources 44 in one or more sequences.The sequences determine an order in which the sources 44 are turned Onand Off. The sequences may also indicate an ordered pattern of drivelevels (e.g., current levels, voltage levels, duty cycles) for thesources 44. Thus, for example, a microprocessor 56 may cause theapplication of different drive levels to respective ones of the sources44 to cause the sources 44 to emit in distinct bands of theelectromagnetic spectrum. The DSP 66 and/or microprocessor 56 mayprocess information generated by the sensor 46, which is indicative ofthe response by at least a portion of the object 50 to illumination bythe sources 44. The information at any given time may be indicative ofthe response by the object 50 to illumination by one or more of thesources 44. Thus, the information over a period of time may beindicative of the responses by the object 50 to sequential illuminationby each of a plurality of the sources 44, where each of the emissionspectra of each of the sources 44 has a different center, bandwidthand/or other more complex differences in spectral content, such as thosedescribed above (e.g., width of the band, the skew of the distribution,the kurtosis, etc.).

In at least some embodiments, the test device 14 can include a database.The database may store normalization or calibration factors. Thecalibration may be based on a variety of factors or parameters. Forexample, the calibration may be based on a batch number in themanufacture of the one or more sources 44, for example, and/or upon theambient operating temperature of the one or more sources 44 when beingdriven by one-dimensional or multi-dimensional functions. As is wellknown to one of skill in the art, the optical characteristics ofelectromagnetic energy emitted by LEDs may depend upon other factors aswell. All normalization or calibration factors that normalize theoptical characteristics of electromagnetic energy emitted by lightemitting diodes or other types of sources 44 or the sensor 46 may beemployed in various embodiments. For example, variations betweendifferent manufactures, different batches of sources 44 by the samemanufacturer, or even between individual sources 44 in the samemanufacturing batch may be accommodated.

Computing Systems

FIG. 5 shows a conventional personal computer referred to herein ascomputing system 146 that may be appropriately configured to function aseither the computing system 18 of the host system 12 (FIG. 1-3), thepersonal computing system 26 of the test device system 22, and/orconventional computing system 32.

The computing system 146 includes a processing unit 148, a system memory150 and a system bus 152 that couples various system componentsincluding the system memory 150 to the processing unit 148. Theprocessing unit 148 may be any logical processing unit, such as one ormore central processing units (CPUs), digital signal processors (DSPs),application-specific integrated circuits (ASICs), field programmablegate arrays (FPGAs), etc. Unless described otherwise, the constructionand operation of the various blocks shown in FIG. 5 are of conventionaldesign. As a result, such blocks need not be described in further detailherein, as they will be understood by those skilled in the relevant art.

The system bus 152 can employ any known bus structures or architectures,including a memory bus with memory controller, a peripheral bus, and/ora local bus. The system memory 150 includes ROM 154 and RAM 156. A basicinput/output system (“BIOS”) 158, which can form part of the ROM 154,contains basic routines that help transfer information between elementswithin the computing system 146, such as during startup.

The computing system 146 also includes one or more spinning mediamemories such as a hard disk drive 160 for reading from and writing to ahard disk 161, and an optical disk drive 162 and a magnetic disk drive164 for reading from and writing to removable optical disks 166 andmagnetic disks 168, respectively. The optical disk 166 can be a CD-ROM,while the magnetic disk 168 can be a magnetic floppy disk or diskette.The hard disk drive 160, optical disk drive 162 and magnetic disk drive164 communicate with the processing unit 148 via the bus 152. The harddisk drive 160, optical disk drive 162 and magnetic disk drive 164 mayinclude interfaces or controllers coupled between such drives and thebus 152, as is known by those skilled in the relevant art, for examplevia an IDE (i.e., Integrated Drive Electronics) interface. The drives160, 162 and 164, and their associated computer-readable media 161, 166and 168, provide nonvolatile storage of computer-readable instructions,data structures, program modules and other data for the computing system146. Although the depicted computing system 146 employs hard disk 161,optical disk 166 and magnetic disk 168, those skilled in the relevantart will appreciate that other types of spinning media memorycomputer-readable media may be employed, such as digital video disks(“DVDs”), Bernoulli cartridges, etc. Those skilled in the relevant artwill also appreciate that other types of computer-readable media thatcan store data accessible by a computer may be employed, for example,non-spinning media memories such as magnetic cassettes, flash memorycards, RAMs, ROMs, smart cards, etc.

Program modules can be stored in the system memory 150, such as anoperating system 170, one or more application programs 172, otherprograms or modules 174, and program data 176. The applications programs172 may include one or more programs for: locating test devices 14,downloading instructions such as executable modules to test devices 14,uploading responses to illumination from test devices 14, selectingappropriate test sequences, analyzing results of the test sequences, anddelivering the analysis to the test devices 14. The system memory 150also includes one or more communications programs 177 for permitting thecomputing system 146 to access and exchange data with sources such aswebsites of the Internet, corporate intranets, or other networks, aswell as other server applications on server computers. Thecommunications program 177 may take the form of one or more serverprograms. Alternatively, or additionally, the communications program maytake the form of one or more browser programs. The communicationsprogram 177 may be markup language based, such as hypertext markuplanguage (“HTML”), Extensible Markup Language (XML) or Wireless MarkupLanguage (WML), and operate with markup languages that use syntacticallydelimited characters added to the data of a document to represent thestructure of the document. A number of Web clients or browsers arecommercially available such as NETSCAPE NAVIGATOR® from America Online,and INTERNET EXPLORER® available from Microsoft Corporation of RedmondWash.

While shown in FIG. 5 as being stored in the system memory 150, theoperating system 170, application programs 172, other program modules174, program data 176 and communications program 177 can be stored onthe hard disk 161 of the hard disk drive 160, the optical disk 166 ofthe optical disk drive 162 and/or the magnetic disk 168 of the magneticdisk drive 164.

A user can enter commands and information to the computing system 146through input devices such as a keyboard 178 and a pointing device suchas a mouse 180. Other input devices can include a microphone, joystick,game pad, scanner, button, key, microphone with voice recognitionsoftware, etc. These and other input devices are connected to theprocessing unit 148 through an interface 182 such as a serial portinterface that couples to the bus 152, although other interfaces such asa parallel port, a game port or a universal serial bus (“USB”) can beused. A monitor 184 or other display devices may be coupled to the bus152 via video interface 186, such as a video adapter. The computingsystem 146 can include other output devices such as speakers, printers,etc.

The computing system 146 can operate in a networked environment 10(FIGS. 1-3) using logical connections to one or more remote computers.The computing system 146 may employ any known means of communication,such as through a local area network (“LAN”) 188 or a wide area network(“WAN”) or the Internet 190. Such networking environments are well knownin enterprise-wide computer networks, intranets, extranets, and theInternet.

When used in a LAN networking environment, the computing system 146 isconnected to the LAN 188 through an adapter or network interface 192(communicatively linked to the bus 152). When used in a WAN networkingenvironment, the computing system 146 often includes a modem 193 orother device for establishing communications over the WAN/Internet 190.The modem 193 is shown in FIG. 5 as communicatively linked between theinterface 182 and the WAN/Internet 190. In a networked environment,program modules, application programs, or data, or portions thereof, canbe stored in a server computer (not shown). Those skilled in therelevant art will readily recognize that the network connections shownin FIG. 5 are only some examples of establishing communications linksbetween computers, and other communications links may be used, includingwireless links.

The computing system 146 may include one or more interfaces such as slot194 to allow the addition of devices 196, 198 either internally orexternally to the computing system 146. For example, suitable interfacesmay include ISA (i.e., Industry Standard Architecture), IDE, PCI (i.e.,Personal Computer Interface) and/or AGP (i.e., Advance GraphicsProcessor) slot connectors for option cards, serial and/or parallelports, USB ports (i.e., Universal Serial Bus), audio input/output (i.e.,I/O) and MIDI/joystick connectors, and/or slots for memory.

The term “computer-readable medium” as used herein refers to any mediumthat participates in providing instructions to processing unit 148 forexecution. Such a medium may take many forms, including but not limitedto, nonvolatile media, volatile media, and transmission media.Non-volatile media includes, for example, hard, optical or magneticdisks 161, 166, 168, respectively. Volatile media includes dynamicmemory, such as system memory 150. Transmission media includes coaxialcables, copper wire and fiber optics, including the wires that comprisesystem bus 152. Transmission media can also take the form of acoustic orlight waves, such as those generated during radio wave and infrared datacommunications.

Common forms of computer-readable media include, for example, floppydisk, flexible disk, hard disk, magnetic tape, or any other magneticmedium, CD-ROM, any other optical medium, punch cards, paper tape, anyother physical medium with patterns of holes, RAM, PROM, EPROM, EEPROM,FLASH memory, any other memory chip or cartridge, a carrier wave asdescribed herein, or any other medium from which a computer can read.

Various forms of computer readable media may be involved in carrying oneor more sequences of one or more instructions to processing unit 148 forexecution. For example, the instructions may initially be carried on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem 193 local to computer system 146can receive the data on the telephone line and use an infraredtransmitter to convert the data to an infrared signal. An infrareddetector coupled to the system bus 152 can receive the data carried inthe infrared signal and place the data on system bus 152. The system bus152 carries the data to system memory 150, from which processing unit148 retrieves and executes the instructions. The instructions receivedby system memory 150 may optionally be stored on a storage device eitherbefore or after execution by processing unit 148.

FIG. 6 shows a data structure 200 which may be stored in one of thestorage media or databases 161, 166, 168 (FIG. 5), 20, 34 (FIGS. 1-3),58, 60 (FIG. 4), according to one illustrated embodiment.

The data structure 200 stores reference responses 202 (only one calledout, illustrated in column 204) for various objects 50 (FIG. 4)identified by object identifiers 206 (only one called out, illustratedin column 208).

The data structure 200 may store a reference response 202 for a varietyof objects 50, for example a specific handbag or type of handbag 210.The data structure 200 may store reference responses for media, forexample: identification documents such as passports, identity cards(e.g., national, state, provincial, military, employer, school,organization), driver's licenses, and/or birth or naturalizationcertificates; financial documents such as currency 212, checks, bonds,and/or securities; and/or legal documents such as licenses, permits,assignments, deeds, wills, declarations, oaths, agreements, pleadings,or motions. The data structure 200 may also store reference responses202 for tissue 214, for example, reference responses that identify(e.g., unique individual) or characterize (e.g., normal, abnormal)bodily tissue such as retinal tissue or blood. The data structure 200may additionally, or alternatively, store data corresponding to amanufacturing process, such as reference responses for variousprocessing steps for curing rubber 216. The data structure 200 mayadditionally, or alternatively, store data related to quality control,for example, reference responses for properly homogenized milk 218.

The data structure 200 may include an object type identifier 220 (onlyone called out in FIG. 6, illustrated in column 222). The object typeidentifier may provide a general and/or specific description of the typeof object (e.g., handbag, currency, U.S. Ten Dollar Note, retinaltissue, semiconductor circuit masking operation, etc.). Additionally, oralternatively, the object type identifier 220 may provide broad and/orspecific description of the physical characteristics of the object type(e.g., paper, MYLAR®, canvas, A4, serial number, leather, green, 36° C.,5 foot and 11 inches, 160 pounds, brown hair, etc.).

For each object 50, the data structure 200 may store reference responses202 corresponding to respective physical and or logical sources 44 (FIG.4) or the respective emission spectra for sources 44. For example, thedata structure 200 stores reference responses 202 for a number ofsources 44 or respective emission spectra 224 a-224 e (collectively 224)for the handbag 210. The emission spectra 224 may be represented in avariety of ways, for example as one-dimensional or multi-dimensionalfunctions or waveforms or as individual values indicative of one or morecharacteristics, for example peak wavelength or primary band.

The data structure 200 may store reference responses 202 at a variety ofdrive levels for each of the sources 44. For example, the data structure200 may store reference responses 202 at current levels 228 a-228 c(only three called out in FIG. 6, collectively 228, illustrated incolumn 230). While the reference responses 202 are illustrated asone-dimensional functions or waveforms, the reference responses may takeany of a variety of forms. For example, in some embodiments each of thereference responses 202 with take the form of a single value or numberfor a given object, source, drive-level and/or temperature combination.In other embodiments, each of the reference responses 202 may take theform of a multi-dimensional function or waveform (e.g., two, three orgreater dimensions). Such may be suitable where, for example, the sensor46 takes the form of a CCD array, rather than a photodiode.

Additionally, the data structure 200 may include reference responses 202where the source 44 and/or sensor 46 is at a variety of temperatures 232a, 232 b (only two called out in FIG. 6, illustrated in column 234).This allows for variance in emission spectra and/or reception to beaccounted for in the data structure 200. Thus, identification of asource 44, a driving level 228 and/or a temperature may allow selectionof an appropriate reference response 202 for use in analyzing test datameasured or determined by the test device 14, as further explainedbelow.

Additionally, or alternatively, the data structure 200 may includereference responses 202 for a variety of sensor sensitivities 236 a, 236b (only two called out in FIG. 6, illustrated in column 238). Thisallows for variance in sensitivity of various sensors 46 to be accountedfor in the data structure 200. Thus, identification of a sensor 46 mayallow selection of an appropriate reference response 202 for use inanalyzing test data measured or determined by the test device 14, asfurther explained below.

The data structure 200 may additionally include location or positioninformation that identifies a location or position on the referenceobject from which the reference response was taken and/or the positionsof the sources(s) 44 and/or sensor(s) 46 relative to the referenceobject. Reference responses from multiple locations on a referenceobject may be stored in the data structure 200. Varying the location oftesting or sampling may further contribute to the inherent encryptionassociated with varying the sequence.

FIGS. 7-28 show methods of operating the computing system 18 (FIGS. 1-3)of the host system 12 and/or test device 14, according to variousembodiments. The Figures generally illustrate operations of thecomputing system 18 or host system 12 in a column on the left side ofthe Figure, while operations of the test device 14 are generallyillustrated in a column on the right side of the Figure. The flow ofoperation is generally illustrated by vertically extending arrows. Theflow of data between the computing system 18 or host system 12 and thetest device 14 is generally illustrated by arrows extending between theright and left columns of FIGS. 7-9, 15, 16, 24, 25A and 25B. SomeFigures use a center column to illustrate operations that may beperformed by either the computing system 18 or test device 14.

FIG. 7 shows a method 300 of operating the computing system 18 (FIGS.1-3) of the host system 12 and test device 14 in a secure manner,according to one illustrated embodiment.

The method 300 may start at 302. For example, the method 300 may startin response to activation of the computing system 18, or in response toa user input, or a signal from a sensor.

At 304, the computing system 18 determines whether a new sequence isdue. As discussed above, the sequence defines an order of activation forthe sources 44, and may optionally define a sequence of drive levelsand/or temperature levels for one or more of the sources 44 within thesequence. In some embodiments, the sequence can be varied periodically.In other embodiments, the sequence may be varied randomly. In furtherembodiments, the sequence may be varied with each iteration. In stillother embodiments, the sequence may be varied based on a time and/ordate.

At 306, the computing system 18 generates or selects a new sequence. Thecomputing system 18 may generate the new sequence using a random numbergenerator (RNG). Alternatively, the computing system 18 may select a newsequence from a set of sequences stored in the memory or database 20.Alternatively, the computing system 18 may generate a new sequence basedon a current time and/or date. Additionally or alternatively, thecomputing system 18 may generate a new sequence based on a combinationof environmental conditions (e.g., date and time, temperature, GPSlocation, etc.) and stored data (e.g., constants, functions forgenerating sequences from simple inputs, etc.).

At 308, the computing system 18 optionally conventionally encrypts thesequence. At 310, the computing system 18 provides the sequence to thetest device 14.

At 312, the test device 14 receives the sequence from the computingsystem 18. Optionally, at 314, the test device 14 conventionallydecrypts the sequence. At 316, the test device 14 operates according tothe sequence. For example, the control subsystem 54 or microprocessor 56may activate or turn ON selected ones or groups of the sources 44, inthe order of the defined sequence. Also, for example, the controlsubsystem 54 or microprocessor 56 may apply a drive level such as acurrent, voltage or duty cycle to the sources 44 and/or changetemperature of the sources 44 (e.g., via a heater or thermoelectriccooler) according to the sequence.

At 318, the sensor 46 captures electromagnetic energy returned from theobject 50 being subject to the test. Returned electromagnetic energy maytake the form of electromagnetic energy reflected, fluoresced, orotherwise returned from the object 50. The returned electromagneticenergy is the response by the object 50 to the particular illuminationduring the relevant period. At 320, the test device 14 provides a signalindicative of the response or captured electromagnetic energy to thecomputing system 18.

At 322, the computing system 18 receives the signal indicative of theresponse or captured electromagnetic energy. At 324, the computingsystem 18 analyzes the received captured electromagnetic energy. At 326,the computing system 18 provides results to test device 14.

At 328, the test device 14 receives the results. At 330, the test device14 provides results to the end user, for example, via one or moreelements 68, 70 of the user interface. The method 300 may terminate at332. In some embodiments, the method 300 would return control back to304 in lieu of terminating at 332. In other embodiments, the method 300may operate as separate processes or threads, in parallel orconcurrently with one another.

Varying the sequence produces an inherent encryption of the signalsindicative of the test responses and/or the results. The variation makesit difficult for someone to determine or fake test responses for a givenobject since the test response varies based on the particularillumination sequence employed. Additionally, the differences in sources44 (e.g., LED composition), between test devices 14, creates a uniquesignature for responses taken from each test device 14. A knowledge ofthis unique signature may be used in calibration for decoding the testresponse provided by the specific test device 14, so it can also beconsidered an inherent form of encryption. Inherent encryption may beparticularly advantageous where security is a concern, for example whereidentity documents are being authenticated, where financial instrumentsare being authenticated or where goods are being authenticated to detectforgeries. Thus, the sequence may be varied randomly, periodically,based on time and/or date, or on demand. This inherent variation may bebolstered by more conventional encryption, for example public/privatekey encryption, for example RSA encryption. Thus, the test response maybe encrypted using conventional encryption techniques. Additionally, oralternatively, the sequence may be encrypted using conventionalencryption techniques. Additionally, or alternatively, if the sequenceis transmitted, it may be transmitted separately from the test results,reducing the likelihood of interception of both. It should be noted thateven if both the sequence and resulting test response were intercepted,such information would have limited value since the sequence would orcould soon be changed.

FIG. 8 shows a method 400 of operating the computing system 18 and testdevice 14 in a secure manner, according to another illustratedembodiment.

The method 400 starts at 402. For example, the method 400 may start inresponse to the activation or powering of the test device 14, or inresponse to a user input or signal from a sensor.

At 404, the test device 14 determines whether a new sequence is due. Ifa new sequence is due, the test device 14 generates or selects a newsequence at 406. The test device 14 may generate a sequence using arandom number generator (RNG). Alternatively, the test device 14 mayselect a new sequence from a set of sequences stored in a memory (e.g.,ROM 58, RAM 60) of the test device 14. Alternatively, the test device 14may generate a new sequence based on a current time and/or date.

At 408, the test device 14 operates according to the sequence with, orwithout, varying drive levels of the sources 44. As noted above, thedrive levels may take a variety of forms, for example, current orvoltage levels, or duty cycles.

At 410, the sensor 46 captures electromagnetic energy returned from theobject 50 being tested. As noted above, the returned electromagneticenergy is the response by the object 50 to the particular illuminationduring the period. Optionally, at 412, the test device 14 conventionallyencrypts the sequence. At 414, the test device provides the sequence tothe computing system 18.

At 418, the test device 14 provides a signal indicative of the responseor captured electromagnetic energy to the computing system 18.

At 416, the computing system 18 receives the sequence. At 420, thecomputing system 18 receives the signal indicative of the capturedelectromagnetic energy. Optionally, at 422, the computing system 18decrypts the sequence. At 424, the computing system 18 analyzes thereceived signal indicative of the response or captured electromagneticenergy, based at least in part on the received sequence. At 426, thecomputing system 18 provides results of the analysis to the test device14.

At 428, the test device 14 receives the results. At 430, the test device14 provides the results to an end user, for example, via one or moreelements 68, 70 of the user interface. The method 400 may terminate at432. In some embodiments, the method 400 may return control back to 404in lieu of terminating at 432. In other embodiments, the method 400 mayoperate as separate processes or threads, in parallel or concurrentlywith one another.

FIG. 9 shows a method 500 of operating the computing system 18 of thehost system 12 and test device 14 in a secure manner, according to yetanother illustrated embodiment.

The method 500 starts at 502. For example, the method 500 may start inresponse to activation or powering of the test device 14, or in responseto a user input, or a signal from a sensor.

At 504, the test device 14 determines a current time which may, or maynot also reflect the current date. The test device 14 may rely on aninternal clock that may or may not be global, and may be synchronizedwith a clock on the computing system 18. At 506, the test device 14determines an N^(th) parameter based, at least in part, on the currenttime. The modifier N^(th) is employed because the parameter varies asthe time varies. For example, a first parameter value is determinedbased on at first time, while a second, different parameter value isdetermined based on a second time.

At 508, the test device 14 determines an N^(th) sequence based, at leastin part, on the nth parameter. Thus, for example, the test device 14determines a first sequence based on a first parameter, and at a latertime determines a second sequence based on a second parameter.

At 510, the test device 14 operates according to the N^(th) sequence,with, or without, varying drive levels of the sources 44. As notedabove, the drive levels may take the form of current or voltage levelsand/or duty cycles. At 512, the sensor 46 captures electromagneticenergy returned from the object 50 being tested or response to theparticular illumination during a period. At 514, the test device 14provides a signal indicative of the response or captured electromagneticenergy to the computing system 18 of the host system 12. The test device14 may provide an indication of the time along with the signalindicative of the response. Alternatively, if the test device 14operates quickly enough, the computing system 18 may employ the time ofreceipt or the time of transmission of the signal indicative of theresponse which is provided by the test device 14.

At 516, the computing system 18 receives the signal indicative of theresponse or captured electromagnetic energy. As noted above, theinformation received may include an indication of the time. At 518, thecomputing system 18 determines the N^(th) sequence based, at least inpart, on the time. The time may be determined from the indicationreceived from the test device 14. At 520, the computing system 18analyzes the signal indicative of the response or received capturedelectromagnetic energy, based at least in part on the determined N^(th)sequence. At 522, the computing system 18 provides results to the testdevice 14.

At 524, the test device 14 increments the time. One of ordinary skill inthe art will recognize that the test device 14 may increment the time atother positions in the flow of the method 500. At 526, the test device14 receives the results. At 528, the test device 14 provides the resultsto an end user, for example, via one of the elements 68, 70 of the userinterface. The method 500 may terminate at 530. In some embodiments, themethod 500 would return control back to 504 in lieu of terminating at530. In other embodiments, the method 500 may operate as separateprocesses or threads, in parallel or concurrently with one another.

FIG. 10 shows a method 550 of analyzing test responses, according to oneillustrated embodiment. In some embodiments, the method 550 may beperformed or executed by the computing system 18. In other embodiments,the method 550 may be performed or executed by test device 14.

The method 550 starts at 552. For example, the method 550 may start inresponse to a call within or from a software routine, program, orprocess. Alternatively, the method 550 may start in response to a userinput or receipt of data or information.

At 554, an expected response is determined based on a sequence ofillumination. As noted above, the sequence of illumination of the object50 by the sources 44 may vary. Consequently, the response by the object50 to the sequence of illumination will vary. Thus, for example, theobject 50 may be sequentially illuminated with electromagnetic energyfrom a first band, then a second band, then a third band, etc.Alternatively, the object 50 may be sequentially illuminated withelectromagnetic energy from a third band, then a second band, then afirst band, etc. The response to the second sequence will likely bedifferent from the response to the first sequence.

At 556, the received signal indicative of the response or capturedelectromagnetic energy is compared to the expected response. At 558, itis determined whether the response or captured electromagnetic energy iswithin a defined threshold of the expected response. If the response iswithin the defined threshold of the expected response, an appropriateconfirming notification is produced at 560. The confirming notificationmay, or may not, include an indication of a level of confidence in thematch. The confidence level may be represented in a variety of ways, forexample as a percentage of discrepancies detected or how many standarddeviations the match is from being an identical match. Alternatively,the confidence level may indicate the number of times a match with athreshold was found. For example, if a match was found in response tomore than one sequence, at more than one location, and/or at more thanone viewpoint or angle. If not, an appropriate non-confirmingnotification is produced at 562. The method may terminate at 564. Insome embodiments, the method 550 may repeat. In other embodiments, themethod 550 may operate as separate processes or threads, in parallel orconcurrently with one another.

FIG. 11 shows a method 570 of analyzing test responses, according toanother illustrated embodiment. In some embodiments, the method 570 maybe performed or executed by the computing system 18. In otherembodiments, the method 570 may be performed or executed by test device14.

The method 570 starts at 572. For example, the method 570 may start inresponse to a call from a program, routine, or process. Alternatively,the method 570 may start in response to a user input or receipt of dataor information.

At 574, a set of expected responses are selected based on the sequence.For example, given a defined sequence, responses for one or more object(e.g., goods, documents, tissue) may be selected. The selection of theexpected response may, or may not, be based on one or more temperaturesat which the sources 44 or sensor 46 is operating or is expected to beoperating.

Optionally, at 576, either the test response and/or the expectedresponses may be calibrated. The calibration may be based on a varietyof factors or parameters. For example, the calibration may be based on atemperature at which the source 44 and/or sensor 46 is operating orexpected to be operating. For example, where the sources 44 are LEDs,variations in emission spectra based on temperature may be accommodated.Also for example, the calibration may be based on the properties ofspecific sources 44. For example, where the sources 44 are LEDsvariations in emission spectra based on manufacturing differencesbetween specific sources 44 may be accommodated. For example, variationsbetween different manufactures, different batches of sources 44 by thesame manufacturer, or even between individual sources 44 in the samemanufacturing batch may be accommodated.

At 578, the test response is compared to expected responses in theselected set. At 580, it is determined whether a match is within asuitable threshold. If the match is in a suitable threshold, anidentifying notification is produced at 582. If the match is not withinthe threshold, an appropriate none-identified notification is producedat 584.

The method 570 may terminate at 586. In some embodiments, the method 570would return control back to 574 in lieu of terminating at 586. Forexample, some embodiments may attempt to find matches for more than onesequence, at more than one location, and/or at more than one viewpointor angle. In other embodiments, the method 570 may operate as separateprocesses or threads, in parallel or concurrently with one another.

FIG. 12 shows a method 600 of analyzing test responses, according to afurther illustrated embodiment. In some embodiments, the method 600 maybe performed or executed by the computing system 18. In otherembodiments, the method 600 may be performed or executed by test device14.

The method 600 starts at 602. For example, the method 600 may start inresponse to a call from another program, routine, or process.Alternatively, the method 600 may start in response to a user input orreceipt of data or information.

At 604, a set of expected responses is selected based on the sequence.Such was discussed above with reference to 574 of FIG. 11.

Optionally, at 606, the test response and/or expected responses may becalibrated. As discussed above in reference to 576 of FIG. 11,calibration may be based on a variety of factors or parameters.

At 608, the test response is compared to the expected response in aselected set, as discussed above in reference to 578 of FIG. 11. At 610,it is determined whether there is a match within a defined threshold, asdiscussed in reference to 580 of FIG. 11. If the match is within thedefined threshold, the match is stored at 612 and control passes to 614.If the match is not within the defined threshold, control passesdirectly to 614.

At 614, it is determined whether there are further expected responses inthe selected set. If there are further expected responses, controlreturns to 608. Otherwise, control passes to 616.

At 616, it is determined whether there are no matches. If there are nomatches, a none identified notification is produced at 618, and themethod 600 terminates at 624.

If there are matches, the closest match is determined at 620. A varietyof algorithms and parameters may be employed in determining the closetsmatch. At 622, notification of the closest match is produced with orwithout identifying the object type. The method 600 may then terminateat 624.

In some embodiments, the method 600 would return control back to 604 inlieu of terminating at 624. For example, some embodiments may attempt tofind matches for more than one sequence, at more than one location,and/or at more than one viewpoint or angle. In other embodiments, themethod 600 may operate as separate processes or threads, in parallel orconcurrently with one another.

FIG. 13 shows a method 650 of forming an expected reference response fora sequence from a set of discrete reference responses to individualemission bands by an object 50, according to one illustrated embodiment.In some embodiments, the method 650 may be performed or executed by thecomputing system 18. In other embodiments, the method 650 may beperformed or executed by test device 14.

The method 650 starts at 652. For example, the method 650 may start inresponse to a call from another routine program or process.Alternatively, the method 650 may start in response to a user input orreceipt of data or information.

At 654, a source variable is initialized. The source variable mayidentify a particular source 44 having an emissions spectrum or spectraor may identify the particular emissions spectrum or spectra of thesource 44. At 656, a drive level is initialized. For example, the drivelevel may be initialized to a defined current, voltage, or duty cycle.At 658, an array is initialized. For example, the value of the array, aswell as an array pointer, may be initialized.

At 660, a reference response 202 (FIG. 6) by a reference object toillumination by a source identified by the source variable at thedefined drive level (e.g., current level) identified by the drive levelvariable is retrieved. The reference response 202 may be retrieved froma memory or database 20, 34 and, in particular, may be retrieved from adata structure 200 (FIG. 6). At 662, the retrieved reference response202 is added to the array at the current array position identified bythe array pointer.

At 664, it is determined whether the array pointer is pointing at theend of the array. If the array pointer is pointing at the end of thearray, the method 650 terminates at 676. If the array pointer is notpointing at the end of the array, control passes to 666 where the arraypointer is incremented or decremented.

At 668, it is determined whether there are additional drive levels forthe source 44. If there are additional drive levels, the drive levelvariable is incremented or decremented at 670, and control returns to660. If there are not additional drive levels, control passes to 672.

At 672, it is determined whether there are additional sources. If thereare additional sources, the source variable is incremented ordecremented at 674, and control returns to 660.

If there are not additional sources, the method 650 terminates at 676.In some embodiments, the method 650 would return control back to 654 inlieu of terminating at 676. In other embodiments, the method 650 mayoperate as separate processes or threads, in parallel or concurrentlywith one another.

FIG. 14 shows a method of storing reference data at the host evaluationsystem 18, according to one illustrated embodiment.

The method 700 starts at 702. For example, the method 700 may start inresponse to a call from another routine program or process.Alternatively, the method 700 may start in response to a user input orreceipt of data or information.

Optionally, at 704, reference data is provided to the computing system18 of the evaluation system 12. The reference data may be provided fromone or more of the test devices 14 or computers 26, 32 associated withequipment for capturing the reference data. The reference data mayinclude reference responses which may take the form of responses byreference objects to defined illumination. For example, referenceresponses may take the form of signals indicative of electromagneticenergy received from an object 50 in response to illumination with aknown bandwidth of electromagnetic energy, by a known source 44, at aknown drive level (e.g., current, voltage, duty cycle) and/or knowntemperature.

Optionally, at 706, the computing system 18 receives the reference data.At 708, the computing system 18 stores the reference data. The referencedata may be stored in a data structure such as the data structure 200(FIG. 6). The reference data may be stored in any of a variety ofstorage mediums, such as storage or database 20 (FIGS. 1-3). Whiledescribed in terms of storage at the computing system 18, reference datamay, alternatively, be stored at the proprietary storage or database 34(FIG. 3) or even at the remote test device, for example ROM 58 and/orRAM 60 (FIG. 4).

The method 700 terminates at 710. In some embodiments, the method 700would return control back to 702 in lieu of terminating at 710. In otherembodiments, the method 700 may operate as separate processes orthreads, in parallel or concurrently with one another.

FIG. 15 shows a method 720 of operating the evaluation system 18 andtest device 14, according to one illustrated embodiment.

The method starts at 722. For example, the method 720 may start inresponse to activation or turning on of the test device 14.Alternatively, the method 720 may start in response to a user input,receipt of data, or signal received from a sensor.

At 724, the test device 14 provides a test response to the computingsystem 18.

At 726, the computing system 18 receives the test response. At 728, thecomputing system 18 compares the test response to a reference response.At 730, the computing system 18 determines a result of the comparison.At 732, the computing system 18 provides the result to the test device14. At 734, the computing system 18 or associated separate accountingsystem (not shown) tracks usage by a financial entity, such as abusiness (e.g., corporation, partnership, sole proprietorship, limitedliability company), a division of a business, a non-profit, a government(e.g., federal, state or provincial, county or parish, city or town), ofdivision of a government (e.g., agency, department)). The financialentity is an entity financially obligated for the various transactionsoccurring on the evaluation system 10. The financial entity may, forexample, be the owner, operator, lessee, or otherwise in control of testdevices 14 and/or database 20, 34.

At 736, the test device 14 receives the results. At 738, the test device14 reports the results to the end user, for example, via one of theelements 68, 70 of the user interface.

The method 720 terminates at 740. In some embodiments, the method 720would return control back to 722 in lieu of terminating at 740. In otherembodiments, the method 720 may operate as separate processes orthreads, in parallel or concurrently with one another.

FIG. 16 shows a method 750 of tracking financial usage by a financialentity, according to one illustrated embodiment.

At 752, a test device 14 may provide authorization to charge an accountto the computing system 18 or associated separate accounting system (notshown). At 754, the computing system 18 or associated separateaccounting system receives the authorization to charge the account. At756, the computing system 18 or associated separate accounting systemcharges the account. It is noted that the accounting system may in someembodiments be implement on or as part of the computing system 18, whichas previously noted as including one or more computer or computingsystems.

FIG. 17 shows a method 760 of executing a financial transaction,according to one illustrated embodiment. At 762, the computing system 18reports charges to the financial entity.

FIG. 18 shows a method 766 of executing a financial transaction,according to another illustrated embodiment. At 768, the computingsystem 18 charges an account associated with a financial entity on aper-use basis. A use may correspond to the storage of reference data,the receipt of test data, the analysis of test data, and/or theprovision of results from analysis of test data.

FIG. 19 shows a method 772 of executing a financial transaction with afinancial entity, according to yet another illustrated embodiment. At774, the computing system 18 charges an account per request received.

FIG. 20 shows a method 778 of executing a financial transaction with afinancial entity, according to still another illustrated embodiment. At780, the computing system 18 charges an account per result provided.

FIG. 21 shows a method 784 of executing a financial transaction with afinancial entity, according to even still another illustratedembodiment. At 786, the computing system 18 charges an account of thefinancial entity on the basis of time. The time may, for example, beindicative of time spent analyzing test responses.

FIG. 22 shows a method 790 of executing a financial transaction with afinancial entity, according to a further illustrated embodiment. At 792,the computing system 18 charges an account of the financial entity on aflat-fee basis. The flat-fee charge may be with, or without, excessusage fees.

FIG. 23 shows a method 796 of executing a financial transaction with afinancial entity, according to even a further illustrated embodiment. At798, the computing system 18 charges an account for storage of referencedata. The charge may be a one-time fee and/or a periodic fee (hourly,daily, monthly, yearly, etc.). The charge may be based on the number oftransactions or elements. Additionally, or alternatively, the charge maybe based on the size of storage required.

FIG. 24 shows a method 800 of operating test devices 14 in testevaluation system 18, according to another illustrated embodiment.

The method starts at 802. For example, the method may start in responseto the starting or powering up of the test evaluation system 18 orremote device 14. Alternatively, the method 800 may start in response toa user input, receipt of data or instructions or receipt of a signalfrom a sensor.

Optionally at 804, the test device 14 may download a reference datacreating executable module from the computing system 18. The referencedata creating executable module provides instructions executable on thetest device 14 to cause the test device 14 to create reference data.

Optionally at 806, the test evaluation system 18 or associatedaccounting system charges the financial entity for the downloading ofthe reference data creating executable module.

Optionally, at 808, the remote device 14 provides reference data to thecomputing system 18.

Optionally at 810, the computing system 18 receives the reference datafrom the test device 14. Optionally at 812, the computing system 18stores the received reference data. For example, the computing system 18may store the reference data in one of the storage or databases 20 a-20d. Optionally at 814, the computing system 18 executes a financialtransaction related to the storage of the reference data.

The method 800 terminates at 816. In some embodiments, the method 800would return control back to 802 in lieu of terminating at 816. In otherembodiments, the method 800 may operate as separate processes orthreads, in parallel or concurrently with one another.

FIGS. 25A and 25B show a method 900 of operating computing system 18 ofthe host system 12 and the test devices 14, according to yet anotherillustrated embodiment.

The method 900 starts at 902. For example, the method may start inresponse to activation or powering of the test device 14 and/or hostevaluation system 18. Alternatively, the method 900 may start inresponse to a user input, receipt of data or instructions, or receipt ofa signal from a sensor.

Optionally at 904, the test device 14 downloads a test data creatingexecutable module from the computing system 18. The test data creatingexecutable module provides instructions executable on the test device 14to cause the test device 14 to create test data, including testresponses by objects 50 (FIG. 4) being tested or otherwise evaluated.This may allow the test device 14 to be upgraded as new software and/orhardware is developed. Optionally, at 906, the computing system 18 orassociated accounting system executes a financial transaction with afinancial entity for the download of the test data creating executablemodule. Various approaches to executing financial transactions werediscussed above in reference to FIGS. 15-24, and will not be repeated inthe interest of brevity and clarity. Optionally, at 908, the test device14 determines an N^(th) sequence based at least in part on an N^(th)parameter. Such was discussed above in reference to FIG. 9, and will notbe repeated in the interest of brevity and clarity. It is noted that theN^(th) sequence and/or N^(th) parameter indicate a respective one of aplurality of sequences and/or parameters, whether or not those sequencesand/or parameters are based on an indication of time. At 910, the testdevice 14 provides a request for reference data to the computing system18.

At 912, the computing system 18 receives the request for reference data.At 914, the computing system 18 authenticates the requesting test device14 and/or user of the requesting test device 14. For example, thecomputing system 18 may verify a user identifier and/or deviceidentifier. Additionally, or alternatively, the computing system 18 mayverify a password and/or personal identification number (PIN). Thecomputing system 18 may employ other approaches to authenticating thetest device 14 and/or user. At 916, the computing system 18 determineswhether the requesting test device is authenticated. At 918, thecomputing system 18 provides an appropriate notification. For example,the computing system 18 may provide a notification to the test device 14indicating whether or not the test device 14 has been authenticated.Additionally, or alternatively, the computing system 18 may provide awarning or other notification of an invalid attempt to access data toappropriate security personnel, and/or create a log of such attempts.

At 920, the computing system 18 determines whether the requestingtesting device 14 and/or user of the requesting test device 14 hassufficient permission to access the data. The computing system 18 maycheck one or more permission data structures to determine a level ofaccess granted to the testing device 14 and/or user of the requestingtest device 14. Access may, for example, be limited to data related tocertain objects. Alternatively, or additionally, data may be limited toauthorized personnel with, for example with respect to identification ofindividuals and/or bodily tissue. Other restrictions may of courseapply. At 922, the computing system 18 provides an appropriatenotification. For example, the computing system 18 may provide anotification to the requesting test device 14 indicating whether or notthe requesting test device 14 and/or user has sufficient authorization.Additionally, or alternatively, the computing system 18 may providenotification or an alert of an attempt to improperly access data toappropriate security personnel, and/or create a log of such attempts.

At 924, the computing system 18 executes a financial transaction.Examples of such have been discussed previously and will not be repeatedhere in the interest of brevity. At 926, the computing system 18provides requested reference data to the requesting test device 14.

At 928, the test device 14 receives the requested reference data. At930, the test device 14 operates the sources 44 according to the N^(th)sequence with, or without, drive levels. For example, the controlsubsystem 54 and/or microprocessor 56 may drive the sources 44 in anorder, timing and/or drive level defined by the N^(th) sequence.

At 932, the sensor 56 captures the response of the object 50 in the formof electromagnetic energy returned from the object 50 being tested.Optionally at 934, the test device 14 calibrates either the receivedcaptured electromagnetic energy and/or the expected responses. Asdiscussed above, the calibration may be based on temperature and/orspecific physical or performance attributes of the specific sources 44,details of which will not be repeated here in the interest of brevityand clarity.

At 936, the test device 14 analyzes received captured electromagneticenergy based at least in part on the N^(th) sequence. Such analysis hasbeen previously discussed with reference to operation of the computingsystem 18, and will not be repeated. The test device 14 can employ asimilar or identical approach. At 938, the test device 14 reports theresults to the end user, for example via elements 68, 70 of the userinterface.

The method 900 terminates at 940. In some embodiments, the method 900would return control back to 902 in lieu of terminating at 940. In otherembodiments, the method 900 may operate as separate processes orthreads, in parallel or concurrently with one another.

FIG. 26 shows a method 1000 of operating the computing system 18 and/ortest device 14 to create reference data including reference responses,according to one illustrated embodiment.

The method 1000 starts at 1002. For example, the method may start inresponse to the activation or powering of the computing system 18 and/ortest device 14. Alternatively, the method 1000 may start in response toa user input, receipt of data or instructions or receipt of a signalfrom a sensor.

At 1004, object, drive level, and/or temperature variables areinitialized. Initialization permits incrementing through the variousvariables.

At 1006, a response by a reference object to an I^(th) bandelectromagnetic energy at J^(th) drive level and/or a K^(th) temperatureis determined. The denominations I^(th), J^(th), and K^(th) are used toindicate successive values for the corresponding variables. The drivelevel may, for example, correspond to a current, voltage, or duty cycleat which the source 44 is operated. The temperature may correspond to atemperature at which the source 44 is operated or expected to beoperated. The creation of reference data may take place in atemperature-controlled environment such that the temperature can beincremented for collecting of reference data at various temperatureintervals. Various specimens of an object or different objects may beemployed to collect the reference responses.

At 1008, the determined reference response is stored along with relatedinformation as reference data to a computer-readable medium. Storage ofthe reference data was discussed previously, for example in reference toFIG. 14, and is not repeated in the interest of brevity and clarity. Asnoted above, the computer-readable medium may take the form of a storagemedium or database 20, 34, or ROM 58, RAM 60, or other medium.

At 1010, a determination is made whether reference responses andadditional reference data will be collected at additional temperatures.If so, the temperature variable is incremented at 1012 and controlreturns to 1006. If not, control passes to 1014.

At 1014, it is determined whether reference responses and additionalreference data will be collected at additional drive levels. If so, thedrive level variable is incremented at 1016, and control returns to1006. If not, control passes to 1018.

At 1018, it is determined whether reference responses and additionalreference data, including reference responses, will be collected fromfurther objects. If so, the next object is selected or positioned forillumination at 1020. Control then returns to 1006. If not, the method1000 terminates at 1022. In some embodiments, the method 1000 wouldreturn control back to 1002 in lieu of terminating at 1022. In otherembodiments, the method 1000 may operate as separate processes orthreads, in parallel or concurrently with one another.

FIG. 27 shows a method 1030 of operating the computing system 18 of thehost system 12 and/or test device 14, according to a further illustratedembodiment.

The method 1030 starts at 1032. For example, the method 1030 may startin response to activation or powering of the computing system 18 or testdevice 14. Alternatively, the method 1030 may start in response to auser input, receipt of data or instruction, or receipt of a signal froma sensor.

At 1034, a sequence for driving the sources 44 is determined which may,or may not, include a variety of drive levels. In some embodiments, thesequence may also define a variety of temperatures for the sources 44,where such temperatures can be controlled, for example by one or moreheaters such as resistors (not shown) and/or one or more thermoelectriccoolers (not shown). As discussed previously, the sequence may includean order for activating individual or groups of the sources 44 or forotherwise causing emission from the various sources 44. The sequence mayalso include various drive levels for one or more of the sources 44.

At 1036, an expected response for an object 50 (FIG. 4) is determined.The expected response may be determined, based in part, on thedetermined sequence with, or without specific drive levels, and with, orwithout temperature levels.

The method 1030 terminates at 1038. In some embodiments, the method 1030would return control back to 1032 in lieu of terminating at 1038. Inother embodiments, the method 1030 may operate as separate processes orthreads, in parallel or concurrently with one another.

FIG. 28 shows a method 1050 of determining or building an expectedresponse to a sequence from a set or plurality of discrete referenceresponses, according to one illustrated embodiment. The method 1050 mayadvantageously reduce storage requirements. For example, referenceresponses to individual emission spectra may be stored, and a referenceresponse for different sequences built from the individual emissionspectra.

The method 1050 starts at 1052. For example, the method 1050 may startin response to activation or powering of the evaluation subsystem 18and/or the test device 14. Alternatively, the method 1050 may start inresponse to a user input, receipt of data or instructions, or receipt ofa signal from a sensor.

At 1054, an expected response array and array pointer are initialized.At 1056, emission band, drive level, and/or temperatures variables areinitialized. At 1058, a response by a reference object to an I^(th) bandat a J^(th) drive level and/or a K^(th) temperature is retrieved. Asdiscussed previously, the denominations I^(th), J^(th), and K^(th)indicate successive values for the corresponding variables. At 1060, theexpected response array is populated with a retrieved response for thegiven variables.

At 1062, it is determined whether a response at additional temperatureswill be determined. If so, the temperature variable is incremented at1064, and control returns to 1058. If not, control passes to 1066.

At 1066, it is determined whether the expected response will reflectadditional drive levels. If so, the drive level variable is incrementedat 1068, and control returns to 1058. If not, control passes 1070.

At 1070, it is determined if expected response by further objects willdetermined. If so, the next object is employed at 1072 and controlreturns to 1054 where a new expected response array will be created. Ifnot, the method 1050 terminates at 1074. In some embodiments, the method1050 would return control back to 1052 in lieu of terminating at 1070.In other embodiments, the method 1050 may operate as separate processesor threads, in parallel or concurrently with one another.

In some embodiments, the set of reference data representing responses ofvarious reference objects to at least one sequence of illumination witha plurality of bands of electromagnetic energy may be produced based atleast in part on at least one of a standard database of spectralsignatures or a set of predicted spectral signatures based one achemical composition of the reference objects, and a set of spectralcharacteristics of at least one of a source or a sensor of the remotetest device.

EXAMPLES Example 1 ID/Passport Verification

A pattern database of passport photos of every U.S. citizen may besearchable within seconds to confirm their identity. For securitypurposes, the search patterns for the entire database may be changed,for example, in less than thirty minutes or even on demand. This mayreduce or eliminate identification document fraud, and also reduces oreliminates the cracking the security code.

The object evaluation system 10 can verify a passport or otheridentification documentation as follows:

When a passport application is submitted, a photo is included which willbe affixed to a validly issued passport. The photo identifies the personsubmitting the application. Once the issuing authority determines that apassport is to be issued, the issuing authority will generate and storeat least one known reference pattern associated with the photo (thereference object 50 in this example), as well as other identityinformation relating to the identity of the person to whom the passportis issued, such as the person's name, physical characteristics, address,social security number, etc. (other issuance information can also beincluded if necessary, such as for example the date of issuance). A datafile containing the reference pattern 202 (FIG. 6) and associatedidentity information is stored in the data structure 200 with aplurality of other reference patterns 202 generated by the issuingauthority for other validly issued passports. The issued passportcontaining the photo is then sent to the person who submitted theapplication.

At a security checkpoint, for example at an airport terminal, a passportis provided by a traveler for identification purposes. The passport(sampled object 50) is provided to the test device 14 of the system 10.A region is selected within the passport photo (the sampled object 50 inthis example) for which a spectrum measuring device of the test device14 measures the spectral contents, i.e., color information, and outputsinformation indicative of the same to the computing system 18 ormicroprocessor 56 operating spatial analysis software.

The spectral content information outputted by the spectrum measuringdevice is provided as input to the spatial analysis software program,which generates a measured pattern for the sampled passport photo. Insome embodiments, the measured pattern may be in the XYZ color space,and/or the measured pattern can be observed from virtually any angle.The measure pattern (or a view key generated therefrom) is compared tothe plurality of reference patterns stored in the passport issuingauthority's database (or view keys generated therefrom) until a matchingreference pattern is found. If a matching reference pattern is notfound, then the passport is deemed to be a fraud by the spatial analysissoftware. If a match is located, identity information associated withthe matching reference pattern is analyzed to determine if the identityinformation for the matching reference pattern substantially correspondsto the identity information associated with the sampled passport photo.

At least a portion of the identity information associated with thesampled passport photo is generally located within the passport, and canbe provided to the spatial analysis software for analysis (e.g., by theuser entering or scanning the identity information present in thepassport), and/or the identity information within the passport can beprovided to the human user to perform the comparison. If the identityinformation associated with the sampled passport photo matches theidentity information associated with the matching reference pattern, thepassport photo will be deemed an authentic and validly issued passport(i.e., not a forgery) by the spatial analysis software, and the travelerwill be permitted to proceed past the security checkpoint.

Further, it should be understood that the materials used to constructthe passport (or other identification documentation materials) can bevalidated against known spectral or color data. The paper and inks canbe checked to determine if the passport itself is a forgery, not justthe photo or information printed on the document.

Example 2 Document Authentication

The object evaluation system 10 can be used to detect forgeries of adocument of value, such as money or bank notes, or other sensitivedocuments operates as follows:

When a document is validly produced, the producing entity generates andstores at least one reference pattern 202 for the original document (thereference object 50 in this example), as well as other identityinformation relating to the identity or characteristics of the document,such as the date it was produced, a general title for the document, keyterms or monetary value, etc. A data structure 200 containing thereference pattern 202 and identity information associated with thereference pattern 202 is then delivered or made available to an eligiblerecipient of the original document.

When the recipient is later presented with a document (sampled object50), the recipient can use the object evaluation system 10 to check theauthenticity of the presented document, i.e., to determine whether thepresented document is the original document or of the same quality ororigin as the original document. It should be understood that if thedocument is one that is duplicated, such as a dollar bill for example,then only reference patterns for one representative document needs to beused for authentication.

The presented document is provided to a spectrum measuring device of thetest device 14. A region is selected within the presented document (thesampled object 50 in this example) for which the spectrum measuringdevice measures the spectral content and outputs information indicativeof the same to the computing system 18 or microprocessor 56 operatingspatial analysis software.

The spectral content information outputted by the spectrum measuringdevice is provided as input to the spatial analysis software, whichgenerates a measured pattern for the sampled document. The measuredpattern (or a view key generated therefrom) is compared to the specificreference pattern 202 previously generated for the original document (ora view key generated therefrom). If the measured pattern does not matchthe reference pattern 202, then the presented document is deemed aforgery by the spectral analysis software. If the measured patternmatches the reference pattern, then the presented document is deemedauthentic by the spectral analysis software and the recipient can acceptthe presented document.

For further authentication, the identity information associated with theoriginal document can also be compared to identity informationassociated with the presented document to determine if theysubstantially correspond. At least a portion of the identity informationassociated with the presented document is generally located within thedocument, and can be provided to the spatial analysis software foranalysis (e.g., by the user entering or scanning the identityinformation present in the document), and/or the identity informationwithin the presented document can be provided to the human user toperform the comparison.

Example 3 Product Monitoring

The object evaluation system 10 can be used for brand protection toverify the authenticity of a product based on the make of its material(e.g., fabric colors) operates as follows:

When a manufacturer mass produces a product, at least one referencepattern 202 for a representative of the product (the reference object 50in this example) is generated and stored in the reference pattern datastructure 200, as well as identity information associated with theoriginal product, such as the name or style of the product, a serialnumber, a color description, a size, the manufacturer's name andaddress, etc.

To determine if the product (sampled object 50) is of the same qualityor of the same origin as the original representative product, adistributor or individual consumer can provide the product to be sampledto the object evaluation system 10. A region is selected within thesampled product (the sampled object 50 in this example) for which aspectrum measuring device of the test device 14 measures the spectralcontent and outputs information indicative of the same to the computingsystem 18 or microprocessor 56 operating spatial analysis software.

The spectral content information outputted by the spectrum measuringdevice is provided as input to the computing system 18 or microprocessor56 executing the spatial analysis software, which generates a measuredpattern for the sampled product 50. The measured pattern (or a view keygenerated therefrom) is compared to the reference patterns 202 in thedata structure 200 (or view keys generated therefrom) until a matchingreference pattern 202 is found. If a matching reference pattern is notfound, then the sampled product 50 is deemed to be a fraud. If a matchis located, then the identity information associated with the matchingreference pattern is analyzed to determine if the identity informationfor the matching reference pattern substantially corresponds to theidentity information associated with the sampled product. At least aportion of the identity information associated with the sampled product50 is generally located on a label or tag on the product, or observableby a human user, and can be provided to the computing system 18 ormicroprocessor 56 executing the spatial analysis software for analysis(e.g., by the user entering or scanning the identity information presentin the label or tag or obtained from observation), and/or the identityinformation associated with the matching reference pattern can beprovided to the human user to perform the comparison. If the identityinformation associated with the sampled product 50 matches the identityinformation associated with the matching reference pattern, the sampledproduct 50 will be deemed authentic and the purchase and/or distributionof the sampled product 50 can proceed. If the measured pattern does notmatch the reference pattern 202, then the sampled product 50 is deemed aknock-off or tampered product.

Thus, the object evaluation system 10 can be utilized for brandprotection to verify the authenticity of products based on the make oftheir fabric colors with the pattern of the original product indatabase, the system 10 can compare a knock off versus the real productin a matter of minutes by scanning any area of the product for which adatabase pattern exists. In a preferred embodiment, once the fabric hasbeen scanned, a view key is selected to obtain a pattern file. Thispattern file will be compared against a pattern from an authentic fabricsample on our database from the same view key point.

Art forgery is another area of product verification that the objectevaluation system 10 can be used. That is, spectral data can be takenfrom one or more regions of a valuable piece of art and this spectraldata could be used to authenticate copies or unknown works.

Quality Control of Manufacturing Process

The object evaluation system 10 can be also be used for quality controlof manufacturing processes to maintain quality control on practicallyany manufactured good or the packaging for the good. In this regard, thesystem 10 would operate as follows:

When a manufacturer mass produces a product, a variety of referencepatterns 202 can be taken from the product (reference object 50) atdifferent locations or areas within the manufacturing process. Todetermine if the manufacturing process is operating properly, readingscan be taken from the products (sampled objects 50) during actualmanufacturing and compared to the reference patterns 202 to determinewhether the manufacturing process is operating to predetermined qualitycontrol standards. Depending upon the results of the comparison, themanufacturing process can be shut down or modified (if the comparisonshows unacceptable quality control) or subsequent parts of themanufacturing process can be actuated. For example, if the product(sampled object 50) was a loaf of bread being baked within an oven, thenreadings could be taken of the loaf of bread and compared with thereference patterns 202 until the comparisons indicate the loaf of breadis ready to be removed from the oven.

The above description of illustrated embodiments, including what isdescribed in the Abstract, is not intended to be exhaustive or to limitthe embodiments to the precise forms disclosed. Although specificembodiments of and examples are described herein for illustrativepurposes, various equivalent modifications can be made without departingfrom the spirit and scope of the disclosure, as will be recognized bythose skilled in the relevant art. The teachings provided herein of thevarious embodiments can be applied to other systems for recognizing,identifying, verifying, authenticating, classifying, and/or diagnosingor otherwise evaluating objects such as, but not limited to,manufactured goods and articles; media, for example identity documents,financial instruments, legal documents, other documents and other media;and biological tissue, not necessarily the exemplary networkedevaluation system generally described above.

For example, images of a test object may be useful for more than simplespectral analysis. For instance, the image information may be employedby other image/pattern recognition algorithms to, for example, identifyobjects independent of, or in conjunction with the test object'sspectral composition. Additionally, the image recognition algorithms canusefully interact with the spectral analysis algorithms. For instance,image analysis may be employed to locate a target area within an imageof the test object, and carry-out a detailed spectral analysis of thetarget art. For example, the test device 14 may capture an image of anidentification document, such as a passport, at any orientation, find atarget area on the identification document (e.g., 3 mm to the left ofthe lower right hand corner of a photo carried by the passport), andperform a spectral analysis of that target area, which is known tocontain particularly useful spectral information. The target area mayadvantageously be kept confidential to maintain security of the system.In addition to this interaction between spectral analysis and spatialanalysis, there can be more complex analyses performed, for examplewhere a signature form a test object comprises a multi-dimensionaldataset of spectral information at multiple points in space on the testobject.

The foregoing detailed description has set forth various embodiments ofthe devices and/or processes via the use of block diagrams, schematics,and examples. Insofar as such block diagrams, schematics, and examplescontain one or more functions and/or operations, it will be understoodby those skilled in the art that each function and/or operation withinsuch block diagrams, flowcharts, or examples can be implemented,individually and/or collectively, by a wide range of hardware, software,firmware, or virtually any combination thereof. In one embodiment, thepresent subject matter may be implemented via Application SpecificIntegrated Circuits (ASICs). However, those skilled in the art willrecognize that the embodiments disclosed herein, in whole or in part,can be equivalently implemented in standard integrated circuits, as oneor more computer programs running on one or more computers (e.g., as oneor more programs running on one or more computer systems), as one ormore programs running on one or more controllers (e.g.,microcontrollers) as one or more programs running on one or moreprocessors (e.g., microprocessors), as firmware, or as virtually anycombination thereof, and that designing the circuitry and/or writing thecode for the software and or firmware would be well within the skill ofone of ordinary skill in the art in light of this disclosure.

In addition, those skilled in the art will appreciate that themechanisms of taught herein are capable of being distributed as aprogram product in a variety of forms, and that an illustrativeembodiment applies equally regardless of the particular type of signalbearing media used to actually carry out the distribution. Examples ofsignal bearing media include, but are not limited to, the following:recordable type media such as floppy disks, hard disk drives, CD ROMs,digital tape, and computer memory; and transmission type media such asdigital and analog communication links using TDM or IP basedcommunication links (e.g., packet links).

The various embodiments described above can be combined to providefurther embodiments. All of the U.S. patents, U.S. patent applicationpublications, U.S. patent applications, foreign patents, foreign patentapplications and non-patent publications referred to in thisspecification and/or listed in the Application Data Sheet, including butnot limited to: U.S. Provisional Patent Application Ser. Nos.60/623,881, filed Nov. 1, 2004; 60/732,163, filed Oct. 31, 2005;60/820,938, filed Jul. 31, 2006; 60/834,662, filed Jul. 31, 2006;60/834,589, filed Jul. 31, 2006; 60/871,639, filed Dec. 22, 2006;60/883,312, filed Jan. 3, 2007; 60/890,446, filed Feb. 16, 2007; andU.S. Nonprovisional patent application Ser. No. 11/264,626, filed Nov.1, 2005, are incorporated herein by reference, in their entirety.Aspects of the embodiments can be modified, if necessary, to employsystems, circuits and concepts of the various patents, applications andpublications to provide yet further embodiments.

These and other changes can be made to the embodiments in light of theabove-detailed description. In general, in the following claims, theterms used should not be construed to limit the claims to the specificembodiments disclosed in the specification and the claims, but should beconstrued to include all possible embodiments along with the full scopeof equivalents to which such claims are entitled. Accordingly, theclaims are not limited by the disclosure.

The invention claimed is:
 1. A system to calibrate an objectauthentication system that uses at least a portion of an electromagneticenergy spectrum reflected by an object to authenticate the object, thesystem comprising: a test device including: a sensor to receive anelectromagnetic response from at least a portion of at least oneevaluation object being evaluated; a communications port to communicablylink the test device to a remote host authentication system; and amicroprocessor communicably coupled to the sensor and the communicationsport, the microprocessor to selectively generate at least one outputsignal including data representative of a number of test deviceparameters used to calibrate the test device, at least a portion of thetest device parametric data originated in the test device andcommunicated by the microprocessor via the at least one output signal tothe remote host authentication system in order to calibrate the objectauthentication system using at least a portion of the electromagneticenergy spectrum reflected by the object to authenticate the object. 2.The system of claim 1 wherein the test device further comprises: atleast one physical source to emit electromagnetic energy in thedirection of the object being evaluated; and driver electronicscommunicably coupled to the at least one physical source and to themicroprocessor to drive the physical source with an electromagneticforcing function.
 3. The system of claim 2 wherein the test devicefurther comprises at least one user operable input element to cause themicroprocessor to selectively generate the at least one output signalincluding the data representative of a number of test device parametersupon operation of the at least one user operable input element by auser.
 4. The system of claim 2 wherein at least a portion of the datarepresentative of a number of test device parameters includes dataoriginated in the test device and representative of the at least onephysical source.
 5. The system of claim 4 wherein the datarepresentative of the at least one physical source includesidentification data unique to a specific physical source.
 6. The systemof claim 4 wherein the data representative of the at least one physicalsource includes data originated in the test device and indicative of atleast one of: a physical source manufacturer, a physical source batchnumber, or a physical source lot number.
 7. The system of claim 2wherein the test device further comprises a temperature sensorcommunicably coupled to the microprocessor, the temperature sensor toprovide data indicative of a physical temperature of the at least onephysical source.
 8. The system of claim 7 wherein the datarepresentative of a number of test device parameters includes the datarepresentative of the physical temperature of the at least one physicalsource.
 9. The system of claim 2 wherein the at least one physicalsource includes a number of physical sources, each of the number ofphysical sources to emit electromagnetic energy having an spectralcontent that at least partially differs from the remaining number ofphysical sources.
 10. The system of claim 2 wherein the at least onephysical source includes a single physical source to emitelectromagnetic energy having a spectral content at least partiallywithin the visible spectrum of 380 nm to 780 nm.
 11. The system of claim1 wherein the at least one signal further includes data representativeof the electromagnetic response received by the sensor from the portionof the at least one evaluation object being evaluated.
 12. The system ofclaim 1, further comprising: a database communicably coupled to the testdevice via the remote host authentication system, the database to storea number of calibration factors that when used with the datarepresentative of a number of test device parameters originated by thetest device provides a test device calibration.
 13. The system of claim1 wherein the test device further comprises a nontransitory storagemedium to store at least a portion of the data representative of anumber of test device parameters.
 14. The system of claim 1 wherein atleast a portion of the at least one signal is encrypted at the testdevice using a public/private key encryption.
 15. A method ofcalibrating an object authentication system using a test device toreceive at least a portion of an electromagnetic energy spectrumreflected by an object to authenticate the object, the methodcomprising: generating by a sensor disposed at least partially within atest device a sensor signal including data representative of anelectromagnetic response received by the sensor from at least a portionof at least one evaluation object being evaluated; receiving the sensorsignal by a microprocessor disposed at least partially within the testdevice and communicably coupled to the sensor; receiving by themicroprocessor data representative of a number of test device parametersused to calibrate the test device, at least a portion of the test deviceparametric data originated in the test device; and communicating to aremote host authentication system via a communications port communicablycoupled to the microprocessor, an output signal including at least thedata representative of the electromagnetic response received by thesensor from at least a portion of the at least one evaluation objectbeing evaluated and the data representative of a number of test deviceparameters used to calibrate the test device in order to calibrate theobject authentication system using the test device to receive at least aportion of the electromagnetic energy spectrum reflected by the objectto authenticate the object.
 16. The method of claim 15 furthercomprising: encrypting at least a portion of the output signal prior tocommunicating the output signal to the remote host authenticationsystem.
 17. The method of claim 15 further comprising: emittingelectromagnetic energy towards at least a portion of at least oneevaluation object being evaluated using at least one physical source ofelectromagnetic energy disposed at least partially within the testdevice.
 18. The method of claim 17 wherein receiving by themicroprocessor, data representative of a number of test deviceparameters used to calibrate a test device includes: receiving by themicroprocessor data indicative of a physical temperature of the at leastone physical source of electromagnetic energy.
 19. The method of claim17 wherein emitting electromagnetic energy towards at least a portion ofat least one evaluation object being evaluated using at least onephysical source of electromagnetic energy includes: emitting, in adefined pattern, electromagnetic energy towards at least a portion of atleast one evaluation object being evaluated by each of a plurality ofphysical sources.