Embedded information carrier for optical data

ABSTRACT

In a system for authenticating information, a holographic element, including a first layer of optical information in a first coded pattern and a second layer of optical information in a second coded pattern is inserted into a reader. The reader includes an opening into which the holographic element may be positioned, a light source, a first detector positioned at a first predetermined distance from the location of the holographic element when the holographic element is positioned in the opening, and a second detector positioned at a second predetermined distance from the location of the holographic element when the holographic element is positioned in the opening.

CLAIM TO PRIORITY

[0001] This application claims priority from U.S. Patent ApplicationSerial No. 60/462,566, filed on Apr. 10, 2003.

FIELD OF THE INVENTION

[0002] The present invention relates to holographic, diffractive andoptically variable security features, methods for creating such securityfeatures, and apparatus, systems, and methods for verification of suchsecurity features. More specifically, the present invention relates tooptically variable security features having embedded therein opticalsecurity information, including multi-layer and multi-wavelengthsecurity information, methods for manufacturing such security featureshaving embedded optical security information, and devices, systems, andmethods for reading or verification of the embedded optical securityinformation in such security features. The present invention alsorelates to security features that are non-removable or self-destructingupon removal.

BACKGROUND OF THE INVENTION

[0003] Currently, there are a variety of optical devices for adding alevel of security to articles of value or identification, includingdocuments, currency, identification cards, passports, computer software,drivers licenses, authentic products, and credit cards, to name just afew. For example, almost all credit cards currently include aholographic seal. The same is true for the new U.S. Passports, somedenominations of U.S., including the twenty dollar bill, and foreigncurrency, computer software packaging, and official major leaguebaseball merchandise, which each include some form of holographic sealor optical security feature. Because of the relative difficulty in thepast of producing these types of holographic seals and optical securityfeatures, this added feature provided an increased level of security andadded significant cost and effort for those trying to create forgeriesor counterfeit items.

[0004] For the last eighteen years holographic seals have been used withgood results and little worry. During this time, however, thefabrication technology for holograms has become more sophisticated andmore automated, giving those who would seek to counterfeit or forgethese instruments new and advanced tools to duplicate even the mostcomplex holographic seals and optical security features used oncurrency, passports, credit cards, and other items.

[0005] The present use of holographic seals as a security feature hasbeen compromised by these new fabrication technologies, and some of theforgery holograms are even of a superior quality as compared to thelegitimate item that is being manufactured and used for securitypurposes. For example, the popular bird hologram that is in use on Visasbrand credit cards as a security feature, can now be easily reproducedby forgers for minimal cost. This is in part a result of theavailability and low cost of the equipment and technology necessary forpreparing the forgeries.

[0006] As a result, holographic seals and existing optical securityfeatures have little deterrent effect on the sophisticated forgers andcounterfeiters. Credit card companies and other certifying entities havebeen forced to take alternative steps and use other methods to attemptto provide the needed security and guarantee authenticity.

[0007] Similarly, as a result of the availability of these fabricationtechnologies, the embedded hologram feature on the new U.S. currency hasbeen compromised leading to the successful forgery of such currency.

[0008] There is a significant need for security features that willprovide a deterrent effect to forgery and counterfeiting. There is alsoa need for security features that are relatively inexpensive compared tothe cost for creating a forgery or counterfeit item. There is also aneed for security features that require a significantly largerinvestment for unauthorized duplication or copying than the benefitobtained or profits derived from the forgery or counterfeit item that iscreated.

SUMMARY OF THE INVENTION

[0009] The present invention solves the problems associated with theprior art security features by adding additional levels of securityand/or new security features that are extremely difficult, expensive andare not cost effective to reproduce by a forger or counterfeiter.

[0010] The present invention teaches a device, namely a securityhologram or holographic seal that provides additional security featuresfor purposes of authenticity verification. More specifically, thepresent invention provides a security hologram or holographic seal thatincludes additional information that is not readily perceived oridentified by a forger or a counterfeiter. The additional informationprovided in the security hologram or holographic seal may includeadditional multi-depth information, multi-image information, out-of-bandinformation, binary information, or other coded information, or anycombination of these various types of information.

[0011] The present invention also teaches methods of making andfabricating the security holograms and holographic seals of the presentinvention, and an apparatus and method for reading the securityholograms and holographic seals of the present invention. For example,adhesive that is used to apply the security seal may intermingle withthe material to which it is applied creating a fingerprint that isdetectable using, among other things, an infrared wavelength.

[0012] The present invention also teaches a device, namely a securityhologram or holographic seal that provides additional security featuresfor purposes of authenticity verification by adding identifyinginformation, for example, information relating to the bearer, includingamong other things, biometric and personal information.

[0013] The security holograms according to the present invention mayinclude additional optical information, for example, information whichcan function as a check digit or a series of check digits for a serialseries of the object being secured, such as, for example, a credit cardor document, as a repository of serialized information or individualizedinformation that is subject to confirmation via an external database, asan indication of time or location data with respect to the creation ofthe seal or the object being secured, or as additional information forsecurity purposes. The additional optical information may be in digitalform and may be readable by the presentation of light of a predeterminedwavelength and/or light at a predetermined angle with respect to thesurface of the seal. The light may be of either or both visible andnon-visible wavelengths. The additional optical information may providea single value or multiple values to the optical sensor system, or arange of values to the optical sensor system, one of which is thecorrect value for the individual location in a matrix as determined byindependent data values made available to the machine reader from otherinformation provided by one or more of a remote database, the documentor object, an embedded program, and biometric or other information of orfrom the bearer.

[0014] The security holograms according to the present invention mayinclude multi-depth information. This includes different groups ofinformation that are projected in different three-dimensional planesand/or different groups of information that are read from differentlocations. A coded password could be designed into the security hologramwith different pieces of the code included in different planes asprojected by the security hologram and/or readable from differentlocations with respect to the position of the security hologram. Thedivision of the coded password into different planes allows the passwordto be incorporated into a matrix, which adds significantly more levelsof complexity and makes it much more difficult to forge or counterfeit.The coded password may be comprised of a single type of information orvarious types of information. For example, the information may be codedusing, for example, binary data, reflective wavelength, reflectancestrength, reflection angle, or any combination thereof.

[0015] The optical information embedding technique can use, for example,current embossing techniques enhanced by the addition of a number ofspots to the hologram image field that can contain security data or thatcan block data, thereby varying the data being read. Each of the spotsis a “digit” location and/or causes the absence of a data point, and thesecurity hologram may have in excess of 1000 of such “digits.” Theparticular digits to be used for identifying a particular seal orserialized object may be determined by the information contained in theremote database, by the object, by an embedded program, the biometricsof the bearer, and/or independent information provided by the bearer.

[0016] Additionally or alternatively, each of the “digit” locations,portions of the security hologram or the entire security hologram may bemanufactured with a structural condition, for example, with a fragilefoil backing, which would defeat removal for copying. Such a fragilefoil process could reduce copying by providing upon final lamination apost-production step that could fracture the foil or damage thehologram, using a laser pulse, such that a selected digit or series ofdigits would not be readable in the finished object or document. Theselection of digits may be made in any way, and it would make eachobject or document unique within the holographic seal. These advanceswill make the design process much more complex and render the cost ofcounterfeiting very high. For example, because several hundred separatecards in the same series would have to be acquired and subjected tosophisticated analysis before a counterfeit holographic seal could beginto be fabricated for use on more than a single account. The digitlocations, portions of the security hologram or the entire securityhologram may be manufactured using a chemical process such that uponremoval or the attempted removal of the security hologram a chemicalreaction will destroy or render all or parts of the security hologram ordigit locations unreadable. This chemical process may be something, suchas, for example, an oxidation process or oxidizing agent

[0017] Alternatively, the entire laminated hologram may be manufacturedusing a “fragile foil” base. A pattern of spots, for example, holes, isthen written into the hologram, for example, using laser pulses, whichwill serialize the individual seal. This can be accomplished as the laststep of the process or at any other point of the hologram productionprocess. The seal may be read using a reader that incorporates a matrixof detectors where the pattern of spots in the optical pattern of thehologram corresponds to the check digits needed to validate theindividual card or document. The locations sampled by the matrix ofdetectors may also be controlled by a predetermined code entered intothe detector using a pin number or password known only to the cardholder or document source. Without such code the reader will not be ableto read the information on the hologram, and with the wrong code, thereader will read the wrong information. Because of the significantdifficulty of duplication, a breach of security or theft of a card willallow a counterfeiter, and only one that is highly sophisticated andknowledgeable in holographic techniques, at best, a limited time periodof access to the account associated with the stolen card.

[0018] Another option is to impose surface defects in a structuredpattern within the security hologram or holographic seal such thatcertain data may be obscured, which would represent the information thatis modified for purposes of effecting a code change. This informationcould be read by detectors positioned at any one or more of a variety oflocations and the decoding would depend on the location. The patternthat would be created would be uniquely random such that wear and otherdamage to the security hologram or holographic seal would not berealistically capable of replicating such pattern.

[0019] The security hologram or holographic seal may also incorporateinformation about the bearer of the item. For example, the sealincorporated into an identification card, such as, for example, adriver's license or passport, could include digital informationsufficient to generate a photograph or video of the bearer on a display,or in hard copy. Because of the difficulty in reproducing the seal byincorporating the digital information about the bearer into the seal,replacement of such information will require reproduction of the entireseal including all of the coded information. Thus, subversion byreplacing the bearer identifying information will be much more difficultwith respect to the present invention than the simple replacement of thebearer's photograph as is currently possible with conventionalidentification cards and passports. Additionally or alternatively, thesecurity hologram or holographic seal may include a pin or pass code,biometric information, and/or other identifying information relating tothe bearer. Such information could be compared to real time dataobtained from the bearer upon presentation of the identification card.

[0020] In a very high security application, the system could provide fora greater level of security by adding a modification element. The systemupon each validation of a holographic seal or security hologram wouldimmediately after, or concurrently, modify the holographic seal orsecurity hologram to provide a different security code. The system wouldthen modify the database of verification data accordingly. For example,the pattern of spots on a fragile foil hologram would be modified uponeach use of the identification card to change the security code, using apulsed laser, with the database of security information beingcorrespondingly updated. For example, the pulsed laser could burn one ormore spots or take one or more nibbles out of the pattern, or a devicecould be used to change the angle of reflection thereby modifying thepattern and information contained therein. The database would becorrespondingly modified to include the new pattern or information sothat upon the next decoding a correct match could be achieved. Thisprocess would continue for each use until there remain no additionalmodifiable elements in the pattern. With this type of arrangement, thesecurity card would need replacement after a finite number of uses, forexample, one thousand uses. This system would not provide for theexistence of a duplicate security card for an individual since accesswould be denied unless the modified card is used. In the event that aforgery is successfully made of the security card, the forger would haveto use the forged security card before the real security card is againused. If after the point that the forgery is made, the real securitycard is utilized first, the forged card would be recognized as being outof sequence and the bearer of the forged card would not be allowedaccess. If the forger utilizes the card first then the bearer of theoriginal card will be denied access to the system, and can advise thesecurity department accordingly. Upon a detection of an inaccuratesecurity card, the system can automatically activate an alarm ornotification function, indicating that an unauthorized use of thesecurity card has been attempted, and that a security lockdown should beinitiated. The system may require use of the security card for bothentry and exit, thereby adding an even greater level of security. Thesystem may include the requirement of a pin or pass code, biometricinformation, and/or bearer identifying information verification inaddition to a security card.

[0021] Because light of IR and UV wavelengths have very different needsin a laminated hologram “mirror,” the holographic seals or securityholograms need not bear an image visible to the human eye, but insteadmay include an image that is non-visible, but that is able to be readusing IR and/or UV detectors. The image in the seal or security hologramis generated using IR and/or UV light. The reading of the embeddedinformation is accomplished using an IR and/or a UV light source and thereflected light is read using an IR and/or UV detector or detectors. Theholographic seal may be embedded in any location on the face of thesecurity card. Such location may be the first series serialization ofthe security card. The check digits on the holographic seal may be thesecond series serialization on the security card. The custom, unique,serialization for the individual card may be, for example, thewavelength, response, location, or the binary digit spots.

[0022] The security cards may be implemented as a seal that has machinereadable embedded information. These seals may be used in conjunctionwith existing credit cards or serialized to produce the effect of anextended serial number. The seal information may operate in conjunctionwith the existing serialization. For example, the 15 or 16 digit accountnumber on a credit card is now augmented by the “Series” number that isincorporated on the credit card (but not in the MagStripe Information)to produce an account number of 18 to 20 digits. The seal would addadditional digits to the existing serialization for each account, eventhough there would be a fixed number of digits on all of the sealsprovided.

[0023] The security cards may be implemented by incorporating a datasubtraction function. Under this method, a large number of active datapoints are included in the manufactured seal. Upon activation or use ofthe card or document, a unique set or sets of data points is removed(“after removed” data points) to provide the unique serial data withinthe seal to add an additional security layer or for individualization ofeach seal. This data point information along with other serial data inthe same or other modalities on the card, document, or other object maybe entered into a master database for real-time, near real-time, ordelayed confirmation.

[0024] Alternatively, the information included in the seal may alreadyhave a series of data points removed (“embedded removed” data points),for example, with the angle of reflection or refraction varied from theafter removed data points so as to differentiate the coded data added ata later point in time from the static data that is pre-existing on theseal. The difference between the embedded removed data points and theafter removed data points may provide the identifying securityinformation or individualization.

[0025] The security hologram may incorporate varying reflection anglesinto the digit locations. Each digit location could incorporates apredetermined reflection angle such that each bit of the unique codewould be reflected at a particular angle to be read by a particulardetector. Each digit location of the unique code would be able torepresent more than binary ones and zeros, but can represent any numberof digits depending on the number of detectors used. For example, iffive detectors are used, either none or any one of the five detectorscan detect a digit upon illumination of the digit locations. The fivedetectors, for example, may each be located at a particular positionwith respect to the security hologram. Upon illumination, eachindividual digit location would be reflected to a particular location tobe detected by a detector in the corresponding position, therebyproviding for a greater number of unique codes utilizing fewer digitlocations. An eight digit code incorporated into the security hologramwould contain six times as much information as a binary eight digit codeutilizing a single detector with no angular differentiation. Such asecurity hologram is much more difficult to reproduce due to thespecific and defined reflection angles required for the digits in thesecurity hologram to allow for an accurate reading of the code.

[0026] Alternatively or in addition, there may be incorporated in thesecurity hologram or holographic seal decoy data angles that wouldproject information to a particular location but that would not includethe coded information, but instead would included decoy information.This can be in addition to or in place of the decoy data points.

[0027] The security hologram may also or alternatively utilize out ofband information. For example, the reflected signal may include aprimary peak wavelength and a secondary peak wavelength. The systemaccording to the present invention may utilize the secondary peak as thedetected signal for purpose of coding the identification information orthe system may use any combination of the primary, secondary and anyother peaks for purposes of coding the identification information.

[0028] The security hologram may include multi layer data points thatreinforce the data signal only at predetermined angles, therebyproducing amplitude differences in the information presented to thereader without the need for highly precise fabrication of the securityhologram.

[0029] The reader may incorporate software containing one or morealgorithms that may be time based and volatile and, depending on thetime (day, week, month, hour), may decrypt the security information inthe seal or security hologram to a different code. Such code would thenbe decipherable based on one or more of the algorithms in the software.

[0030] The security information in the seal or security hologram may bestructured as a three dimensional matrix, for example, 20×20×20 bit orbyte. The information contained in the three dimensional matrix may beread using a matrix of detectors arranged in a correspondingthree-dimensional configuration, or in a two-dimensional configuration,or it may be read using one or more groups of two- or three-dimensionalconfigurations of detectors. The order in which the detectors are readmay be controlled by a first algorithm and the information read by thedetectors may be decoded using a second algorithm. The specificalgorithms that are used are not critical and, in fact, any algorithmfrom the most simple to the most complex may be used for purposes ofreading, coding and/or decoding the security information embedded in theseal or security hologram. The detectors may be toggled, controlled orarranged to provide a variety of configurations for detection and/ordecoding of the information stored in the seal or security hologram, andmay be adaptable to variations or changes in the algorithms or controlinformation for verification purposes. For example, if there has been averified or assumed breach of the database, theft of a security cardand/or decryption of the algorithm and/or codes, the system may beplaced into breach mode whereby a new matrix for decoding is utilized.This may be based on an algorithm stored in a different secure locationand may utilize alternative information stored in the seal or securityhologram, different angles, or different wavelengths of light, such as,for example, out of band information, multi-depth information, and/ormulti-image information, for purposes of decoding and verification.

[0031] In the configuration where the detectors are located in a singleplane, the seal or security hologram may be read linearly (by swiping)or in parallel fashion (by inserting). The detectors may be located atdifferent positions in a single plane. Each detector represents adecimal, such that a single detector would be used where the codedinformation is represented in binary format, seven detectors would beused where the coded information is represented in octal format, etc.The greater the number of detectors, the greater the difficulty togenerate and to copy the seal or security hologram, because of thecriticality of obtaining the correct angles of reflection of the lightrequired for proper reading of the information stored in the seal orsecurity hologram.

[0032] The security information or some other access code or codes maybe programmed onto the magnetic strip on a security card or other formof identification using holography, as taught by U.S. Pat. Nos.4,547,002, 4,597,814, 4,684,871, 5,336,871, 5,634,669 and 6,086,708,incorporated herein by reference. The security information may be readby swiping the card through the card reader. The reader may includedetectors for reading the security information or other access code thatmay be positioned at a predetermined angle, at a different angle foreach detector, or any combination of angles. For each angle at which adetector is arranged, a different code may be detected. Using detectorsarranged at different angles an algorithm may be used to control thereading or processing of the security information, provide for aparticular order of detection and/or read the detected information invarious sequences. This may produce a different code depending on thetime, day or some other temporal factor.

[0033] The security information may be processed at or near the locationof verification of the seal or security hologram, for example, at thestore checkout counter. The security information may also be processesby sending the raw data to a remote location where the matrix may bedecoded. The decoding may include, for example, utilization of analgorithm, or a comparison to personal information or biometricinformation. An additional security layer or feature includes theaddition of a second layer of security information, for example, addinga pin number which when entered by the bearer sets the algorithm forpurposes of decoding. A new pin number may be released to the bearerupon acceptance or completion of the transaction.

[0034] A remote or local database containing bearer information may beutilized for purposes of verification of the security information in theseal or security hologram, and may include various information,including, for example, an image of the bearer, physical information orhistorical information, such as, for example, birth date, birthlocation, mother's maiden name, etc.

[0035] Different levels of security may also be provided on the readside. For example, the reader may be controlled by software, a code, aremote device, or some other automated or manual input which determinesthe algorithm to apply for purposes of decoding the information storedin the seal or security hologram, or which controls the detectors orlayers of detectors that will be activated or deactivated for purposesof reading the information contained in the seal or security hologram.Various combinations of these security features may be used for purposesof controlling access to the information in the seal or securityhologram and for ensuring the proper reading of the stored information.

[0036] Added levels of security may be implemented. For example, asecurity feature based upon the use of a transponder or otherinformation carrier embedded within the proper bearer of the seal orsecurity hologram may be included in the system according to the presentinvention. This information carrier may be activated upon entry into thesecure location and may be required for the bearer to exit suchlocation. The information carrier may be activated by a specific code oralgorithm and, therefore, may not be detectable until such activationoccurs. Upon proper exit from the secure location, the informationcarrier may be deactivated by the same or different specific code oralgorithm. Alternatively, the information carrier may be continuouslyactive or active for predetermined periods of time. For example, theinformation carrier may be active prior to entry into the securelocation and may be required for purposes of verification of the bearerinformation in the seal or security hologram. If the bearer informationcontained in the information carrier matches the bearer information inthe seal or security hologram, then access to the secured location maybe allowed.

[0037] The transponder may be used independently of an identificationcard. The transponder may contain an identification code representingthe bearer which may be used to obtain identification information aboutthe bearer from a local or remote database. The identificationinformation may be used in conjunction with a biometric evaluationsystem and/or displayed on a display device for visual verification. Thebiometric evaluation system may compare the identification informationretrieved from the database to information obtained from the bearer. Thedisplay device allows a visual comparison to be made between theidentification information obtained from the database and the bearer.The transponder may be in a deactivated mode until it receives anactivation signal from the transceiver and may be again deactivated uponverification or at any other time.

BRIEF DESCRIPTION OF THE DRAWINGS

[0038]FIG. 1 shows a security hologram according to a first exemplaryembodiment of the present invention.

[0039]FIG. 2 shows a sequence and location for positioning data pointsin a matrix according to an exemplary embodiment of the presentinvention.

[0040]FIG. 3 shows the security hologram of FIG. 1 including additionalinformation about the bearer according to an exemplary embodiment of thepresent invention.

[0041]FIG. 4 shows the security hologram of FIG. 1 including additionalinformation that is readable only using ultraviolet light according toan exemplary embodiment of the present invention.

[0042]FIG. 5 shows a security hologram having a modifiable structure forvarying the security code after each reading of the security hologramaccording to an exemplary embodiment of the present invention.

[0043]FIG. 6 shows a security hologram that includes an image that isonly readable using an UV wavelength according to an exemplaryembodiment of the present invention.

[0044]FIG. 7 shows the security hologram of FIG. 5 implemented utilizinga data subtraction function according to an exemplary embodiment of thepresent invention.

[0045]FIG. 8 shows a security hologram utilizing a plurality ofreflection angles according to an exemplary embodiment of the presentinvention.

[0046]FIG. 9 shows a reflection diagram of the security hologram of FIG.8.

[0047]FIG. 10 shows a security hologram having a structural conditionthat would defeat removal or tampering according to an exemplaryembodiment of the present invention.

[0048]FIG. 11 shows a reader that is used for reading the codedinformation stored in a security hologram according to a first exemplaryembodiment of the present invention.

[0049]FIG. 12 shows a reader that is used for reading the codedinformation stored in a security hologram according to a secondexemplary embodiment of the present invention.

[0050]FIG. 13 shows a reader that is used for reading the codedinformation stored in a security hologram according to a third exemplaryembodiment of the present invention.

[0051]FIG. 14 shows a transponder system according to a first exemplaryembodiment of the present invention.

[0052]FIG. 15 shows a transponder system according to a second exemplaryembodiment of the present invention.

DETAILED DESCRIPTION

[0053] As shown in FIG. 1, the security hologram 1 includes informationthat when viewed or read for verification purposes, is presented as athree-dimensional image 3. The image 3 includes coded information 5 in apredetermined pattern. This coded information 5 is arranged in apredetermined pattern that will allow for varying levels of security.The predetermined pattern of the coded information 5 is arranged as athree-dimensional matrix 9. The three-dimensional matrix 9 includesinformation encompassing three discrete planes each located at apredetermined distance from the plane of the security hologram 1. Thefirst plane 11 of the three-dimensional matrix 9 is located atapproximately three millimeters from the surface of the securityhologram 1. This first plane 11 includes only a first portion 13 of thecoded information 5 stored in the security hologram 1 and alone isinsufficient to establish a successful confirmation of securityclearance identity verification. The second plane 15 is located atapproximately six millimeters from the surface of the security hologram1, and includes only a second portion 17 of the coded information 5stored in the security hologram and even together with the first portion15 is insufficient to establish a successful confirmation of securityclearance identity verification. The third plane 19 is located atapproximately nine millimeters from the surface of the security hologram1, and includes a third portion 21 of the coded information 5, theremainder of the coded information 5 necessary to establish a successfulconfirmation of security clearance identity verification. Not only isthe coded information 5 stored in three separate planes of athree-dimensional matrix 9, each at a different distance from thesecurity hologram 1, but the information stored in the three planes iscoded according to a unique algorithm that determines the sequenceaccording to which the information is read in the various planes toreproduce the coded information 5. The algorithm may be the same foreach plane or it may be different for one or more of the planes.

[0054] As shown in FIG. 2, processing the coded information may beaccomplished using a predetermined algorithm or algorithms thatdetermine the sequence and location of the information to be positionedin the matrix and the order in which such information should be readwhen security information confirmation is attempted. The matrix used inthis example is a 12×12×3 matrix 22, and the security code is a twelvebit word 23. In this instance the algorithm provides for the positioningof the bits in the matrix as shown. The first bit 24 is located inposition [3, 1, 1] of the matrix. The second bit 25 is located inposition [6, 6, 1] of the matrix. The third bit 26 is located inposition [9, 11, 2] of the matrix. The fourth bit 27 is located inposition [12, 4, 2]. The fifth bit 28 is located in position [2, 9, 3]of the matrix. The sixth bit 29 is located in position [5, 2, 3] of thematrix. The seventh bit 30 is located in position [8, 7, 3] of thematrix. The eighth bit 31 is located in position [11, 12, 3] of thematrix. The ninth bit 32 is located in position [1, 5, 1] of the matrix.The tenth bit 33 is located in position [4, 10, 2] of the matrix. Theeleventh bit 34 is located in position [7, 3, 1] of the matrix and thetwelfth bit 35 is located in position [10, 8, 2] of the matrix.

[0055] This example, uses a simple algorithm where the first elementfollows a pattern of progression by three digit increments beginningwith position three and cycling through twelve positions, and afterevery four progressions decreasing the next progression to two digitsand then continuing the next four progressions by three digitincrements. The second element follows a continuous progression of fivedigit increments cycling through twelve positions. The third elementdepends on the first and second element. Where the sum of the firstelement and second element is a positive number under twelve, the thirdelement is a one. Where the sum of the first element and the secondelement is a positive number over twelve, the third element is a two.Where the sum of the first element and the second element is a negativenumber, the third element is a three.

[0056] As shown in FIG. 3, the security hologram 1 of FIG. 1 includesadditional information about the issuee, such as, for example, an imageof the issuee 40 and/or other personal identifying information. Theimage of the issuee 40 may be included as a holographic image readilyviewable by an observer under natural lighting conditions or readableonly by a special reader utilizing specialized lighting conditions. Theimage of the issuee 40 may be compared to image information stored in aremote database, at or in the reader or available to an operator. Theimage of the issuee 40 may be compared manually, electronically,visually or by any other method to the stored or available imageinformation about the issuee and/or to an image of or the actual bearerof the security hologram 1. Alternatively the image of the issuee 40 maybe generated as a photograph or video image from digital informationstored in the security hologram 1.

[0057]FIG. 4 shows the security hologram 1 of FIG. 1 includingadditional digitized information 44 that is readable only usingultraviolet light 43 presented at a 45 degree angle to the securityhologram 1. The additional digitized information 44 may be representedby spots 46 arranged in a pattern, with each spot 46 representing adigit or bit of information. The additional digitized information 44indicates to a reader the time and date of creation of the securityhologram 1. The additional digitized information 44 may be coded orembedded in a visible light portion of the security hologram 1. Theadditional digitized information 44 may be used as an extra securityfeature to confirm the authenticity of the security hologram 1. Theadditional digitized information 44 may be verified by comparison todata stored in a remote database, at or in the reader, or available toan operator.

[0058]FIG. 5 shows a security hologram having a modifiable structure forvarying the security code after each reading of the security hologram.The security hologram 50 is manufactured using an alterable material 52,such as, for example, fragile foil, that may be modified using a pulsedlaser 54. The security hologram 50 is manufactured with a particularsecurity code represented by a pattern of spots 56. Upon a firstverified use of the security hologram 50 the verification system 58modifies the security code by utilizing the pulsed laser 54 to burn oneor more additional spots 60 in the pattern of spots 56. For everymodification of the security code, the verification system updates adatabase with the new security code for purposes of the nextverification. This process may continue for a finite number of uses,i.e., 200, such that the security hologram 50 would need to be replacedevery few months, assuming a number of uses per day. Should theidentification card incorporating the security hologram 50 be forged, ifthe forged card is utilized first, then upon use by the actual bearer,access will be denied and an automatic notification of a security breachwill be provided, or such denial of access the actual bearer will beprompted to report a security breach. If the forged card is utilizedsecond, then upon such use the forgery will be immediately detected andthe system could be designed to initiate an alarm, notification orsecurity condition. The verification system 58 may be designed such thatthe identification card need be presented both upon entry and upon exit.Additionally, the bearer may be provided with the additional securityfeature of a code that must be entered upon use, biometric informationabout the correct bearer or other information which would be stored in adatabase and verify the identity of the bearer.

[0059]FIG. 6 shows a security hologram that does not bear a visibleimage but instead bears an image that is readable using an UVwavelength. The security hologram 70 is created using UV light and thesecurity hologram 70 may be located in any part of the identificationcard 72, in the example shown it is located in the upper left quadrant73. The security hologram may be read using a UV light source 74 inconjunction with an UV detector 76. The UV light source 74 is positionedto project UV light onto the security hologram 70 with the lightreflected from the security hologram 70 being read by the UV detector76. Alternatively, the identification card 72 may include the securityhologram 70 and one or more decoy security holograms 78 located atdifferent positions on the identification card 72, with the location ofthe security hologram 70 being determined by the code assigned to thebearer, biometric information about the correct bearer or otherinformation. The security hologram 70 may be generated such that theinformation stored therein may only be read using light reflected at apredetermined angle or by the UV detector 76 positioned at a particularangle or distance from the security hologram 70.

[0060] As shown in FIG. 7, a security hologram as described with respectto FIG. 5 may be implemented using a data subtraction function. In thisembodiment a large number of data points 80 are incorporated into thesecurity hologram blank 82 used in identification card 84. Uponactivation of the identification card 84 a unique set of data points 86are removed using a pulsed laser 88 to provide a unique code within thesecurity hologram blank 82. This unique code may be entered into adatabase 90 for real-time, near real-time or delayed verification ofauthenticity or identity.

[0061]FIG. 8 shows a security hologram utilizing a plurality ofreflection angles according to another embodiment of the presentinvention. The security hologram 100 is generated by incorporatingvarying reflection angles 104 into the digit locations. Each digitlocation 102 incorporates a predetermined reflection angle such thateach bit of the unique code will be reflected at a particular angle tobe read by a particular detector 106. Each digit location 102 of theunique code is able to represent more than binary ones and zeros, butcan represent any number of digits depending on the number of detectors106. In this example, there are 5 detectors 106, each at a particularlocation with respect to the security hologram 100. Each individualdigit location 102 will be reflected to a particular detector 106thereby providing for a greater number of unique codes utilizing fewerdigit locations. As shown in FIG. 9, upon illumination of the securityhologram 50 by the light beam 109, the first digit location 110 isreflected to the first detector 112. The second digit location 114 isreflected to the fifth detector 116, the third digit location 118 isreflected to the second detector 120, the fourth digit location 122 isreflected to the first detector 112, the fifth digit location 124 isreflected to the fourth detector 126, the sixth digit location 128 isreflected to the second detector 120, the seventh digit location 130 isreflected to the third detector 132, and the eighth digit location 134is reflected to the first detector 112. The eight digit codeincorporated into this security hologram will contain six times as muchinformation as a binary eight digit code utilizing a single detectorwith no angular differentiation, and the security hologram will be muchmore difficult to reproduce due to the specific and defined reflectionangles required for the digits in the security hologram to allow for anaccurate reading of the code.

[0062] In FIG. 10 there is shown a security hologram having a structuralcondition that would defeat removal or tampering. The digit locations140 or locations where information is stored on the security hologram142 are manufactured using a fragile foil backing 144. The fragile foilbacking 144 is designed such that any attempt to remove the securityhologram 142 from the identification card 146 for purposes ofreproducing the hologram would destroy portions of, if not the entiresecurity hologram 142. The fragile foil backing 144 would becomeeffective for preventing tampering with the security hologram 142 as aresult of a lamination process or other post-production process wherebythe fragile foil backing may be partially embedded in or adhere to anadhesive or other material. Upon removal of the security hologram 142from the identification card 146 the fragile foil backing 144 would beaffected, with parts remaining on the security hologram 142 and partsremaining on the identification card 146.

[0063] In FIG. 11 there is shown a reader that is used for reading thecoded information stored in a security hologram. The reader 200 includesa housing 201 having a slot 202 for insertion of an identification card204. The slot 202 allows for the insertion of approximately ¾ of thelength of the identification card 204 into the reader 200. The securityhologram 206 should therefore be positioned within the boundaries 208formed by an edge 210 of the card running along its width and moving ina direction toward the center line 212 of the card, lengthwise. In thisembodiment, the security hologram 206 is positioned on the right side ofthe identification card 204. The reader 200 includes a light source 213.The reader 200 also includes a matrix of detectors 214 positioned withinthe housing 201 and configured in three x-y planes lying parallel to theplane of the security hologram 206 when inserted into the slot 202. Afirst set of detectors 216 are positioned on a first plane 218 nearestthe security hologram 206. A second set of detectors 220 are positionedon a second plane 222 on the far side of the first set of detectors 216with respect to the security hologram 206 (in the z-direction) and arelocated in positions on the plane corresponding to the positions ofdetectors from the first set of detectors 216, but slightly offset inone direction (x) from the first set of detectors 216. A third set ofdetectors 224 are positioned an a third plane 226 on the far side of thesecond set of detectors 220 with respect to the security hologram 206(in the z-direction) and are located in positions on the planecorresponding to the positions of detectors from the first set ofdetectors 216 and second set of detectors 220, but slightly offset inone direction (x) from the second set of detectors 220. Alternatively,the first set of detectors 216, the second set of detectors 220 and thethird set of detectors 224 may each be comprised of a detector array.The first set of detectors 216, the second set of detectors 220 and thethird set of detectors are each coupled to a microprocessor 228 and to adecoder 230. The microprocessor 228 may be programmed to activatecertain of the detectors depending on the date and/or time. Themicroprocessor 228 may process the decoded information from the decoder230 and verify the authenticity of the security hologram 206.

[0064] As shown in FIG. 12, the reader 200 may include a keypad 232 forentry by the card bearer of a pin code or other verificationinformation. Such information may be used to select the detectors to beactivated for reading the security hologram 206, or the algorithm to beused for decoding the information stored in the security hologram 206.The reader 200 may also include a display 234 for viewing the picture ofthe bearer stored in the security hologram 206 or for viewing a pictureof the bearer stored in a local or remote database 236. The display 234may also be used for viewing and/or comparing the bearer's biometricinformation to that stored in the security hologram 206 and/or a localor remote database 236.

[0065] Alternatively, as shown in FIG. 13, the reader 200 may include aslit 240 in place of slot 202. The slit 240 allows the bearer to slidethe identification card 243 along the slit 240 which in turn allows thedetectors to read the information from the security hologram 241. Thedetectors may be positioned as described with respect to FIG. 11, withthe security hologram being read serially instead of in parallel. Aserial reading of the security hologram 241 using the reader 200 of FIG.13 may include a flash point 242 at a random position on the securityhologram 241 which is read during a swipe of the identification card 243through the slit 240. At the flash point 242 all of the digitscorresponding to the detectors to be activated by the coded informationare read resulting in a collective activation of all of the relevantdetectors. This flash point 242 can be decoded by the microprocessor 228and used as a further verification of the authenticity of the securityhologram 241.

[0066] As shown in FIG. 14, an added level of security may beincorporated into the system according to the present invention throughthe use of a transponder embedded in the bearer. A transponder 250 isembedded under the skin of the bearer 252 in the abdominal region 254.The transponder 250 does not transmit any signals until it receives acoded activation signal from a transceiver 256 at the entry point of thesecure area upon scanning of the identification card 262 by a reader264. Upon receiving the activation signal the transponder 250 beginsemitting a signal that matches the code in the security hologram 266 onthe identification card 262. Upon verification of the identificationinformation in the security hologram 266 or upon exit of the bearer 252from the secure location the security code on the security hologram 266may be modified by the reader 264 or an independent code modificationdevice and the security code in the transponder 250 may be modified bythe transceiver 256 or by the independent code modification device. Uponverification of the identification information in the security hologram266 and/or upon exit of the bearer 252 from the secure location thetransponder may be deactivated by the transceiver 256 or the independentcode modification device.

[0067] The transponder 250 may be used independently of anidentification card as shown in FIG. 15. The transponder 250 may containan identification code representing the bearer 252. The transceiver 256relays the identification code to a database 270 containingidentification information about the bearer 252. The identificationinformation may be loaded into a biometric evaluation system 272 and/ordisplayed on a display device 274 for visual evaluation. The biometricevaluation system 272 compares the identification information retrievedfrom the database 270 to information obtained in real time from thebearer 252. The display device 274 allows a visual comparison to be madebetween the identification information obtained from the database 270and the bearer 252. The transponder 250 may be in a deactivated modeuntil it receives an activation signal from the transceiver 256 and maybe again deactivated upon clearance of the bearer 252.

What is claimed is:
 1. A device for limiting the reproducibility ofinformation, comprising: a semi-rigid carrier; and a holographic elementcoupled to the semi-rigid carrier, including a first layer of opticalinformation in a first coded pattern and a second layer of opticalinformation in a second coded pattern.
 2. The device according to claim1, where the first coded pattern and the second coded pattern aredetermined using a single algorithm.
 3. The device according to claim 1,where the first coded pattern and the second coded pattern aredetermined using independent algorithms.
 4. A system for authenticationof information, comprising: a holographic element, including a firstlayer of optical information in a first coded pattern and a second layerof optical information in a second coded pattern; and a reader,including an opening for positioning of the holographic element, a lightsource, a first detector positioned at a first predetermined distancefrom the location of the holographic element when the holographicelement is positioned in the opening, and a second detector positionedat a second predetermined distance from the location of the holographicelement when the holographic element is positioned in the opening. 5.The system according to claim 4, wherein the reader further includes amicroprocessor coupled to the light source, the first detector and thesecond detector.
 6. The system according to claim 4, wherein the firstdetector is comprised of a first array of detectors and the seconddetector is comprised of a second array of detectors.