Smart cards or chip cards with an embedded integrated circuit (IC) have been widely used to enhance security. Natural randomness, i.e., some uncontrollable variations in features have been extensively researched aside from digital technology, such as ICs. These features are difficult to tamper with or copy because of their random nature. Although many security devices have been proposed based on such random features, some devices that are relevant to optical technology will be discussed here. Two parallax images of a three-dimensional random arrangement of polymer fibers in nonwoven fabric embedded in a product have been proposed as a fingerprint (unique identification information).1 Other devices researched for the same purpose include a transparent inhomogeneous medium2,3 and a polymer light-emitting device,4 where the speckle patterns of the former and the inhomogeneous emission patterns of the latter are random. Information that can be optically detected from the rough surface of the product itself has also been studied.5,6
Various optical textures that reflect the nonuniformity of the molecular orientation can be observed using a polarizing microscope for a combination of liquid crystal phases and glass surface conditions.7 A random stripe pattern in the chiral nematic () or cholesteric phases in liquid crystal materials can be obtained in a cell following homeotropic surface treatment. This is because the phase has a helical molecular orientation structure, and the helix axis is parallel to the substrates in the homeotropic cell. When the helix axis is not controlled, i.e., it is random in the plane of the substrates, the stripe texture is complex and looks like human fingerprints; these stripe textures are thus called fingerprint textures.
With consideration of the above, we have proposed the application of a random fingerprint texture pattern in a UV-curable liquid crystal for an index to distinguish individual products.8 In this paper, we report the high randomness of the fingerprint texture in the phase by using normalized cross-correlation. It was also demonstrated that the texture of this polymerized fingerprint was stable to over 105°C.
In this letter, we propose an optical security device that has the function of storing a designed pattern as well as the function of providing a fingerprint for authentication by using a fingerprint texture in the phase of a UV-curable liquid crystal. The fabrication process of this device is not complicated because the photopolymerization technique is used.
The liquid crystal mixture used in this study was a UV-curable liquid crystal (UCL-001-K1, DIC Corp., Tokyo, Japan), doped with a chiral dopant (S-811, Merck Ltd., Tokyo, Japan) at 1.8 wt% concentration. This mixture exhibited an isotropic (Iso.)- phase sequence, and the phase transition temperature from the Iso. phase to the phase was 40°C. We determined the 1.8 wt% concentration that caused the appropriate fingerprint texture at the phase experimentally.8 The gap between the two substrates of the sandwich cell used (E.H.C. Co. Ltd., Tokyo, Japan) was 10 µm, and the substrate surfaces were treated to produce homeotropic alignment. To avoid the effects of flow alignment, the liquid crystal mixture was filled into the cells by capillary action at a temperature greater than . The photopolymerization reaction was carried out at UV intensity of for 30 s using a UV light source (ELC-410, Electro-Lite Corp., Danbury, Connecticut, USA).
To fabricate a device that was written with a designed pattern, the photopolymerization was performed through a patterned mask. The fabrication process consisted of the following steps. The temperature of the cell filled with the mixture was kept below , allowing the mixture to exhibit the complex fingerprint texture. Then, part of the cell was irradiated with UV light through the mask; only the mixture in the irradiated areas was photopolymerized, and the fingerprint texture was fixed. Next, the cell temperature was increased to above . The mixture in the nonirradiated areas then changed phase from to Iso.; the fixed molecular orientation in the irradiated areas remained unchanged. Under these conditions, the whole area of the cell was irradiated, and the Iso. phase areas were polymerized. After these steps, the whole of the cell was polymerized to give the molecular orientation permanence. The polymerized orientation (fingerprint texture) causes light scattering and optical anisotropy. On the other hand, ideally, the polymerized Iso. orientation (no texture) would cause no light scattering and no optical anisotropy.
We fabricated a device storing the pattern of a “6.” This polymerized device actually was stable at 150°C for 30 min. This result indicates that the device has a sufficient heat resistance, since typical products, which need a security device, will be used at less than 150°C. Figure 1(a) shows a micrograph of the device taken by transmitted polarization observation (ECLIPSE E600 POL, Nikon Corp., Tokyo, Japan). This photograph shows the bright region of the polymerized orientation and the dark region of the polymerized Iso. orientation. It is also noted that this device stores two kinds of information, as shown in Fig. 1(b) and 1(c).
First, this device stores the artificial information of the number six shown in Fig. 1(b). Using other masks with different desired patterns, devices with different patterns are simple to make. Also, the information can be made visible to the naked eye without the use of polarizers because strong light scattering comes only from the polymerized fingerprint texture in a specific arrangement of a light source, the device, and the viewer’s eye line. Figure 2 shows a photograph of the device taken with a digital camera without polarizers against a black background. The pattern of a “6” was clearly visible because of strong scattering from the polymerized fingerprint texture alone, although the area of the polymerized Iso. orientation had some hazy parts. This result shows that this device can be used for the purpose of identification or as a simple information indicator for the user.
Second, the device can provide the fingerprint to identify itself. The bright region in Fig. 1(a) was made of the random fingerprint texture shown in Fig. 1(c). Even if many devices are made using the same mask and through an identical process, the fingerprint texture patterns for each device cannot coincide because of the high randomness. These patterns can therefore be used as a fingerprint for each device. Consequently, these polymerized liquid crystal devices can act as security devices, providing the identification information for any individual product embedded with this security device. The multiplexing of the polarization information can also improve the level of security. Figure 3(a) and 3(b) are polarizing microphotographs taken in the same region of the same device; nevertheless, there are differences in optical intensity between the two photographs. This is because the angles of the crossed polarizers used in each photograph were different, and the optical intensity under polarizing observation depends on the configuration of the molecular orientations and the polarizers. Devices counterfeited on the basis of microphotography and microprinting technologies, which control the color and density of films, but not the anisotropy, cannot pass an authentication procedure using images taken using the different crossed polarizer configurations.
Finally, we outline a basic security system using the proposed security devices, assuming that the products with important authenticity are ID cards, as shown in Fig. 4. The proposed device is embedded in every ID card. Prior to the distribution of these ID cards, unique keys, which are simply polarization images detected optically from the embedded proposed device or some information generated from these images, are enrolled with an identification number in a database in an authentication server. When the ID card is to be used, the polarization images detected directly from the ID card at a verification terminal must then be matched to the keys stored in the database before the use of the ID card is accepted. Because the proposed security device has a lot of information, such as a random pattern, polarization information, and a designed pattern, we can develop multiple matching algorithms to meet the demands on performance and security level.
In conclusion, we have proposed an optical security device having both the function of a fingerprint for authenticity and the function of storage for a designed pattern using the fingerprint texture in the phase. An identical fabrication process enables each device to have unique fingerprint texture patterns that can be used as a fingerprint for products because of the randomness of the fingerprint texture. Multiplexing of the polarizing information can make counterfeiting difficult. This device can also store an artificially designed pattern as a partial fingerprint texture, and this pattern is visible to the naked eye without using polarizers. Accordingly, this proposed device has the potential to be used as an optical security device and as an authenticity or information indicator for the end user.
R. L. van Renesse, “3DAS: a 3-dimensional-structure authentication system,” Proceedings of European Convention on Security and Detection, Institution of Electrical Engineers, London, pp. 45–49 (1995).Google Scholar
O. MatobaT. SawasakiK. Nitta, “Optical authentication method using a three-dimensional phase object with various wavelength readouts,” Appl. Opt. 47(24), 4400–4404 (2008).APOPAI0003-6935http://dx.doi.org/10.1364/AO.47.004400Google Scholar
K. TadaM. Onoda, “Polymer light-emitting devices for artificial fingerprints,” Jpn. J. Appl. Phys. Part 2 42(9A/B), L1093–L1095 (2003).JJAPB60021-4922http://dx.doi.org/10.1143/JJAP.42.L1093Google Scholar
T. HaistH. J. Tiziani, “Optical detection of random features for high security applications,” Opt. Comm. 147(1–3), 173–179 (1998).OPCOB80030-4018http://dx.doi.org/10.1016/S0030-4018(97)00546-4Google Scholar
Ingo Dierking, Textures of Liquid Crystals, Wiley-VCH, Weinheim (2003).Google Scholar