As growing more global economic activities, both sales figures and brand protection are great concerns for international enterprises. To protect the brand, various kinds of security devices have been used. It is, however, difficult to evaluate these security devices. One of the major reasons of this difficulty is based on the fact that properties of the security devices are quite hard to be quantified. Accessing costs of the devices is one of the barriers in the evaluations when a neutral person wants to evaluate the devices. Moreover, detailed specifications of the devices are often kept secret because of the devices' basic characteristic: “security.” Several projects to establish security evaluation methods, such as CC (Common Criteria) and its derivative standard ISO/IEC 15408, are energetically proceeded, and however mainly focused on security of information and entities who address the information as their scopes. In this paper, we assume a distribution model of branded products to discuss properties of security devices. Then, we propose a simple classification method of the devices on the assumed model. In the proposed method, we classify security devices without quantifying any properties. We also discuss how to utilize the proposed classification method effectively. Users of security devices can reduce research costs by examining only preselected devices in detail after the class-selection.
Diffraction gratings and liquid crystals are use4d as security features for document protection. We have studied the combination of these two features and have developed an optically variable device which is called 'CPLgram'. CPLgram is made of thin film of high polymer cholesteric liquid crystals which exhibit diffraction of light. The combination of diffraction gratings and cholesteric liquid crystals provides light diffraction, wavelength selectivity, color- shifting of reflection and circular polarization selectivity, for the deice. These characteristics make it vary difficult to counterfeit the devices. In our understanding, it is a new approach to combine these security features. The most striking characteristic of the combination is significant aspect of the combination is that customers can choose a device verification method from three types of methods depending on security requirements and/or cost demands; to examine the device (a) with the naked eye, (b) with a simple inspection tool, and (c) by verification equipment.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.