Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
INNOVATIVE DETECTOR FOR "SECURE AUTHENTICATION" OF VALUABLES
Document Type and Number:
WIPO Patent Application WO/2019/244188
Kind Code:
A1
Abstract:
The invention relates to a found system characterized by an innovative multispectral UV and IR rugged micro-system detector [Fig.1], for an automatic contact-less and real-time "secure authentication"of banknotes, value documents/goods without interpretations by Users, including blind and impaired people, to be embodied in pocket, fixed and OEM (Original Equipment Manufacturer) applications, i.e. in cashing machines (Automatic Teller Machines, etc.), value goods distributors (videos, etc.), colour photo printers, etc. Unlike all the other devices in its class, this system is characterized by two cooperating innovative methodologies, ensuring a unique "secure authentication" of any banknote, value document/good, with a very high level of reliability that can be measured and repeated in security within the operational tolerance limits set for this found system. In addition, this found system is easily usable and updatable either locally or remotely by all the Users, with minimal costs. In this way, the found system should constitutes a stronger deterrent, at hand of any User and legal organizations, against the market of counterfeiting of fake banknote/value documents/goods.

Inventors:
TARELLI RICCARDO (IT)
Application Number:
PCT/IT2019/050146
Publication Date:
December 26, 2019
Filing Date:
June 19, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
PRIMA3 SRL (IT)
International Classes:
G07D7/12; G07D7/206
Foreign References:
EP3188138A12017-07-05
US6354507B12002-03-12
US20080030798A12008-02-07
US20140379125A12014-12-25
US8600145B22013-12-03
US7715613B22010-05-11
US20080069427A12008-03-20
US20050139681A12005-06-30
US5444263A1995-08-22
Other References:
JI WOO LEEHYUNG GIL HONGKI WAN KIMKANG RYOUNG PARK: "A Survey on Banknote Recognition Methods by Various Sensors", SENSORS, vol. 17, 2017, pages 313, XP055463418, DOI: 10.3390/s17020313
AUTOMATED TELLER MACHINE, 1 October 2016 (2016-10-01), Retrieved from the Internet
MONEY COUNTERS, 1 October 2016 (2016-10-01), Retrieved from the Internet
VENDING PRODUCTS, 1 October 2016 (2016-10-01), Retrieved from the Internet
SERIAL NUMBERS-SERIES YEAR AND SERIAL NUMBER RELATIONSHIP TABLE, 1 October 2016 (2016-10-01), Retrieved from the Internet
SUPERDOLLAR, 1 October 2016 (2016-10-01), Retrieved from the Internet
PHAM, T.D.PARK, Y.H.KWON, S.Y.PARK, K.R.JEONG, D.S.YOON, S.: "Efficient banknote recognition based on selection of discriminative regions with one-dimensional visible-light line sensor", SENSORS, vol. 16, 2016, pages 328
DOUSH, I.A.AL-BTOUSH, S.: "Currency recognition using a smartphone: Comparison between color SIFT and gray scale SIFT algorithms", J. KING SAUD UNIV. COMPUT. INFORM. SCI., 2016
YOUN, S.CHOI, E.BAEK, Y.LEE, C.: "Efficient multi-currency classification of CIS banknotes", NEUROCOMPUTING SCIENCES, vol. 156, 2015, pages 22 - 32
PARK, Y.H.KWON, S.Y.PHAM, T.D.PARK, K.R.JEONG, D.S.YOON, S.: "A high performance banknote recognition system based on a one-dimensional visible light line sensor", SENSORS, vol. 15, 2015, pages 14093 - 14115
DARYL MARTIN, BASIC LIGHTING TECHNIQUES FOR MACHINE VISION, December 2014 (2014-12-01)
KIM, E.TURTON, T.: "The next generation banknote project", BULL. RESERVE BANK AUST., 2014, pages 1 - 12
LIU, Y.ZENG, L.HUANG, Y.: "Haar-SVM for real-time banknotes recognition", J. INF. COMPUT. SCI., vol. 11, 2014, pages 4031 - 4039
JOUNI TAKALOJUSSI TIMONENJOUNI SAMPOMAARIA RANTALASAMULI SILTANENMATTI LASSAS: "Using the fibre structure of paper to determine authenticity of the documents: Analysis of transmitted light images of stamps and banknote/value documents", FORENSIC SCIENCE INTERNATIONAL, vol. 244, 2014, pages 252 - 258
LIU, X.LIU, C.: "Paper currency CIS image fuzzy enhancement and boundary detection", APPL. MECH. MATER., vol. 651-653, 2014, pages 2356 - 2361
E. W. CORBETT: "Not So Funny Funny-Money: The Threat of North Korean Counterfeiting of U.S. Currency", STEVENSON UNIVERSITY FORENSICS JOURNAL, vol. 4, 2013, pages 14 - 22
ARCANGELO BRUNAGIOVANNI MARIA FARINELLAGIUSEPPE CLAUDIO GUARNERASEBASTIANO BATTIATO: "Forgery Detection and Value Identification of Euro Banknote/value documents", SENSORS, vol. 13, 2013, pages 2515 - 2529
GAI, S.YANG, G.WAN, M.: "Employing quaternion wavelet transform for banknote classification", NEUROCOMPUTING, vol. 118, 2013, pages 171 - 178, XP028675242, DOI: 10.1016/j.neucom.2013.02.029
MARIANA R. DE ALMEIDA ADELEON N. CORREA A,BWERICKSON F.C. ROCHA CFRANCISCO J.O. SCAFI BRONEI J. POPPI: "Discrimination between authentic and counterfeit banknote/value documents using Raman spectroscopy and PLS-DA with uncertainty estimation", MICROCHEMICAL JOURNAL, vol. 109, 2013, pages 170 - 177
GUEDES A.M. ALGARRAA. CARMELO PRIETOB. VALENTINV. HORTELANOS. NETOR. ALGARRAF. NORONHA: "Raman microspectroscopy of genuine and fake Euro banknote/value documents", SPECTROSCOPY LETT., AN INTERNATIONAL JOURNAL FOR RAPID COMMUNICATION, vol. 46, no. 8, 2013, pages 569 - 576
HASANUZZAMAN, F.M.YANG, X.TIAN, Y.: "Robust and effective component-based banknote recognition for the blind", IEEE TRANS. SYST. MAN. CYBERN. COM. APPL. REV., vol. 42, 2012, pages 1021 - 1030, XP011469393, DOI: 10.1109/TSMCC.2011.2178120
HASANUZZAMAN, F.M.YANG, X.TIAN, Y.: "Robust and effective component-based banknote recognition by SURF features", IN PROCEEDINGS OF THE 20TH IEEE ANNUAL WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE, NEWARK, NJ, USA, 15 April 2011 (2011-04-15), pages 1 - 6
WOO JUNE CHOIGIHYEON MINJBEYONG HA LEEJONGHYUN EOMJU WAN KIM: "Counterfeit detection using characterization of safety feature on banknote/value document with full-field optical coherence tomography", J. OPT. SOC. KOREA, vol. 14, no. 4, 2010, pages 316 - 320
DE HEIJ H.A.M.: "Innovative approaches to the selection of banknote/value document security features, De Nederlandsche Bank N.V.", THE CONFERENCE ON OPTICAL SECURITY AND COUNTERFEIT DETERRENCE, SAN FRANCISCO, 20 January 2010 (2010-01-20)
GAI, S.LIU, P.LIU, J.TANG, X.: "The design of HMM-based banknote recognition system", PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, SHANGHAI, CHINA, 20 November 2009 (2009-11-20), pages 106 - 110, XP031583106
C.E.H. BERGER: "Objective paper structure comparison through processing of transmitted light images", FORENSIC SCIENCE INTERNATIONAL, vol. 192, 2009, pages 1 - 6, XP026669658, doi:10.1016/j.forsciint.2009.07.004
T. H. CHIAM. J. LEVENE: "Detection of counterfeit U.S. paper money using intrinsic fluorescence lifetime", OPTICS EXPRESS, vol. 17, no. 24, 2009, pages 22054 - 22061
SCHERRER N.C.ZUMBUEHL S.DELAVY F.FRITSCH A.KUEHNEN R.: "Synthetic organic pigments of the 20th and 21st century relevant to artist's paints: Raman spectra reference collection", SPECTROCHIMICA ACTA PART A: MOLECULAR AND BIOMOLECULAR SPECTROSCOPY, vol. 73, 2009, pages 505 - 524, XP026157790, DOI: 10.1016/j.saa.2008.11.029
A. VILAN. FERRERJ. MANTOCOND. BRETONJ.F. GARCIA: "Development of a fast and non-destructive procedure for characterizing and distinguishing original and fake euro banknote/value documents", ANALYTICA CHIMICA ACTA, vol. 559, no. 2, 2006, pages 257 - 263
KAGEHIRO, T.NAGAYOSHI, H.SAKO, H.: "In Proceedings of the IAPR Conference on Machine Vision Applications", 16 May 2005, TSUKUBA SCIENCE CITY, article "A hierarchical classification method for US bank notes", pages: 206 - 209
AHMADI, A.OMATU, S.KOSAKA, T.FUJINAKA, T.: "A reliable method for classification of bank notes using artificial neural networks", ARTIF. LIFE ROBOT., vol. 8, 2004, pages 133 - 139, XP019805931
AHMADI, A.OMATU, S.KOSAKA, T.: "A PCA based method for improving the reliability of bank note classifier machines", IN PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS, ROME, ITALY, 18 September 2003 (2003-09-18), pages 494 - 499, XP010703821, DOI: 10.1109/ISPA.2003.1296947
V. RUSANOVKCHAKAROVAT.MADOLEV: "Mossbauer spectroscopy investigation of the properties and stability of dollar bank note pigments", APPL. SPECTROSCOPY, vol. 56, no. 9, 2002, pages 1228 - 1236, XP001125080, DOI: 10.1366/000370202760295494
K. NISKANEN: "Paper physics, papermaking science and technology", vol. 16, 1998, FAPET
E. GREENW. WEBER: "Will the new $100 bill decrease counterfeiting?", FEDERAL RESERVE BANK OF MINNEAPOLIS, QUARTERLY REVIEW, vol. 20, no. 3, 1996, pages 3 - 10
Download PDF:
Claims:
Claims

We claims hereby:

[Claim 1] . IAn innovative multispectral UV and IR rugged micro system detector [Fig.l], characterized by the following hardware [Fig.2] and application software [Fig.3], wherein are comprised at least two innovative cooperating methodologies for implementing the automatic contact-less "secure authentication" of any value documents and banknotes of any currency without any interpretation by any user, included blind and impaired people, to be embodied into a plurality of pocket and fixed applications, as well as OEM (Orginal Equipment Manufacturer) products into primary systems as cash machines (Automatic Teller Machines, etc.), value goods automatic distributors (video, etc.) and any colour hard-printers, comprising at least the following hardware [Fig.2] :

a. [2.1] One processing device type Controller with a plurality of functions, wherein are comprised at least: two CSI interfaces for driving of a pair of UV and IR multispectral 8Mpixels micro-cameras [2.2], EEPROM non-volatile memory for resource management, memory slot for hosting of one removable Secure Digital (SD) micro-memory [2.6], ON/OFF and Reset buttons, operational LEDs [2.7] and USB/OTG communication port;

b. [2.2] Two image acquisition devices of at least 8Mpixel type micro-cameras, for multi-spectral UV and IR image acquisition through suitable filters on command by the

Controller [2.1];

c. [2.3] Two beam illuminating devices type LEDs, for the illumination of at least multispectral UV and IR sensitive areas of the banknote, value documents/goods, under authentication, connected to the IR Proximity Sensor (IRPS) [2.4] ;

d. [2.4] One IR-type Proximity Sensor (IRPS) operating at least as thermal source detector from objects under authentication such as banknotes, documents, etc. or from human presence, connected to the above 2xLed [2.3] for the provision at least of some interrupt controls to the above Controller [2.1], which are used to activate at least the above UV and IR micro-cameras [2.2] ;

e. [2.5] One power storage device type Extended Slim Battery (ESB) , with driver circuit for continuous low voltage power supply of the found system;

f. [2.6] One memory storage device type SD (Secure Digital) micro-memory, at least for secure storage of data as the

SUBSTITUTE SHEETS (RULE 26) 4KCC Algorithm and the Template Images for authentication of banknotes, value documents/goods ;

g. [2.7] Three illuminating devices type LED with colours:

Green, Yellow and Red, at least for the optical signaling of the operating states of the found system and authentication response thereof to the User;

h. [2.8] At least two micro acustic warning devices type micro-buzzers, for the acoustic signaling of at least the operating states and authentication responses to the User, associated with the operational states of the above said 3xLEDs [2.7] ;

i. [2.9] One plastic case, with clamping screws, cover and a filling gasket for hygrometric insulation, all of these combined at least for the use of the found system in all the operating environments (but not underwater), with suited mating points for embodiment of found system in fixed installations.

In practice, the details of the above basic hardware components may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent .

[Claim 2] . System according to claim 1, characterized by an application software developed in an "open source" environment, with not hackerable closed-loop encrypted routines in any operational mode of the found system, wherein are embodied at least the following menus (Fig.3) :

a. IDLE menu [Block 3.1] : This menu automatically executes at least the initial and cyclical real-time checks of the found system and feeds its diagnostic results respectively to the LEDs [2.7] for the optical warning and to the micro buzzers [2.8] for the acoustic warning of the corresponding states of the found system to the user;

b. OPERATION menu [Block 3.2] : This menu automatically authenticates at least the banknote, the value document, or the images of a plurality of other value goods (video, etc.) under assessment, without any interpretation by any User, included blind and impaired people too. This authentication is done at least by means of the Innovative Authentication Methodology as set forth in claim 4, in conjunction with the Innovative Safety Methodology, as set forth in clause 5. The authentication methodology is characterized at least by:

b.l. Detection of some fundamental key features, such as serial numbers and/or identification codes, from the source image of any banknote, value document or from a plurality of other value goods (video, etc.), regardless

SUBSTITUTE SHEETS (RULE 26) of its authentication status, by using the UV and IR micro-cameras [2.2] of the found system.

b.2. Fast addressing and retrieval of the respective UV and IR template images of the scanned object, depending on the key features recognized in the preceding step, regardless of its authentication status.

b.3. Attribution to each template image of a dimensionless decimal weight, proportional to the area of the key peculiarity defined by the issuing

Bank/Authority .

b.4. Evaluation for each key feature of the percentage of overlapping of the source image with the respective template image and attribution to this percentage of said additional dimensionless weight.

b.5. Calculation of the weighted average of these results by means of a 4KCC (4-Key-Cross-Checking) algorithm.

Both the template images and the 4KCC algorithm are encapsulated in a unique encrypted file, stored in the SD (Secure Digital) micro-memory [2.6] of the found system. The response of the quantitative assessment done by the algorithm can be signaled with a plurality of devices and modes to the User, depending on the type of embodiment of the found system. In case of pocket applications, this response information is given to the status LEDs [2.7] and to acustic micro-buzzers [2.8] of the found system. In case of applications in fixed installations, as in example of commercial retailers, this response is fed to a pop-up window, that can be open and set to ever still on the

PC/Laptop/PLC of the User. In case of OEM applications, as in example of cash machines, automatic value good distributors, etc., the authentication response is given to the external primary system, for being integrated in the machined process thereof. In order to ensure the "secure authentication" operations, the above said Innovative Authentication Methodology, detailed in claim 4, operates in conjunction with an Innovative Safety Methodology, detailed in claim 5 herein. The Innovative Safety

Methodology provides in this case a comprehensive protection against infringements of the hardware [Fig.2] and the application software [Fig.3] of the found system by malicious people/software, while the system is any operational, updating or in maintenance mode;

c. CONFIGURATION Menu [Block 3.3] : This menu allows the Manufacturer's personnel to reconfigure at least the SD memory [2.6] both to update the template images of the new banknotes, value documents and other images of value goods in general, as well as to adjust the 4KCC algorithm, if

SUBSTITUTE SHEETS (RULE 26) required. The Manufacturer's personnel can perform both of these reconfigurations only after at least a 12-digit password is input in the entry mask of this CONFIGURATION menu. Then these data are updated and encrypted automatically by the personnel of the Manufacturer into a unique file, to be sent to the final User by e-mail. Finally the User can download this unique file from its laptop and replace the unique older file in the SD memory, by connecting its laptop to the found system as per Fig.4 and setting the latter to ON;

d. MAINTENANCE menu [Block 3.4] : This menu allows the

Manufacturer's personnel to perform at least the hardware and software maintenance of the found system, by recalling two specific entry-masks, where some passwords are to be input. Specifically the "Maintenance" main menu is recalled from the laptop of the personnel of the Manufacturer, where a general entry mask is to be accessed with at least a 12- digit password. After this password is input, the personnel can directly access to the hardware diagnostic of the found system, to try to repair the faulty resource. Any modification of the application software is only permitted to the personnel of the Manufacturer after at least a further 4-digit password is input in the "Software Maintenance" sub-mask of the Maintenance main menu. This permits the further accessing of the software to only the strict authorized personnel of the Manufacturer.

In practice, the details of the above claim may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent.

[Claim 3] . System according to claims 1 and 2, characterized at least by the following performances:

a. Detection of key-features: by specific illumination of the banknote, or value document, or value good from the LEDs [2.3], to get at least the acquisition of UV and IR reflective images of banknote, value document or good, by the UV and IR dedicated 8Mp Micro-Cameras [2.2] ;

b. Type of banknotes: any type stored in the SD micro-memory of the found system;

c. Type of value documents or goods: any value document or good sensible to UV and IR multispectral images stored in the SD micro-memory of the found system;

d. Type of warnings: characterized by a pluarality of modes and devices of warning, depending on at least by any type of following embodiments of the found system:

d.l. For pocket applications [Fig.l], at least the following optical and acoustic warnings: LED Red flashing

SUBSTITUTE SHEETS (RULE 26) and micro-buzzers fixed sound for 2 sec. = banknote/value document/good not recognized or "Fake"; Red LED with steady light and micro-buzzers fixed sound for almost 4 sec. = found system failure; Green LED flashing (and micro-buzzers intermittent beep in case of blind and impaired people) for 3 sec. = banknote/value document/good recognized or "True", Yellow LED on (fixed = found system rest status, flashing = found system under testing) ;

d.2. For fixed applications, when the found system is connected to the PC/Laptop of the User: feeding at least of the same states as cited in preceding step d.l to the PC/Laptop, to be viewed on a dedicated window open on the local and/or remote display thereof;

d.3. For the OEM applications, the found system operates at least as a "Secure Authentication Device" (SAD), wherein at least the following performances are provided to the primary system:

d.3.1. operational status and possible major failures of the found system;

d.3.2. secure authentication response of each banknote/value document/good, or refusal thereof for its no presence in the secure database of the found system;

d.3.3. secure update transaction for replacement of the unique authentication file embedded within the SD micro-memory of the found system, executed from either local by a secure access maintenance application running on a plurality of any portable smart device as phone, PDA, etc., or from remote by the secure communication links of the primary system;

d.3.4. secure access for local or remote generic maintenance actions of the found system.

e. Type of acoustic warnings: characterized by fixed and/or intermittent sounds emitted from the micro-buzzers [2.8], depending on the type of status and application of the found system as mentioned afore. A plurality of combined sounds can be provided for any application referred herein. This is particularly useful for blind and visual impaired people too.

f. Storage capacity: possibility to archive massive amounts of encrypted data in an encapsulated unique file, which is stored in the micro-memory SD [2.6] when in Configuration mode, comprising template images of all the banknotes of the world, images of value document/goods, and the 4-KCC

SUBSTITUTE SHEETS (RULE 26) algorithm, up to the maximum memory size allowed by the market (128 GB today);

g. System activation: by means of an IR Proximity Sensor (IRPS) device [2.4], mounted on the Controller [2.1], which also activates the two LEDs [2.3] ;

h. Operational readiness: real-time secure authentication of banknotes/value documents/goods within 0.5 seconds max;

i. Start-up time: maximum 5 seconds, after setting either the ON/OFF or Reset switches of the found system on the Controller [2.1];

j. Application Software: "open source" coding of the software implemented on the Controller [2.1], completely updatable from the "Software Maintenance" sub-menu of the Maintenance menu [block 3.4] by the personnel of the Manufacturer of the found system;

k. Secure Authentication: by means of two jointed methodologies, said respectively: Innovative Authentication Methodology [as per Claim 4] and Innovative Safety Methodology [as per Claim 5];

l. Reliability of Authentication: > 99.9996%, measurable for all applications operating in the following authentication tolerance fields;

m. Authentication tolerance field, with at least the banknote/value document/good laid down on a stable flat surface under the light beam of the LED [2.3], stimulating the UV and IR spectra of reflection:

m.l. +/- 30 degrees max rotation with respect to the axis of crossing the optics of the two micro-cameras [2.2] ; m.2. +/—10% max shift of the banknote/value document from the central axis of the light beam from the two LEDs [2.3] ;

m.3. 200mm to 300mm of vertical distance of the light beam of the two LEDs [2.3] from the center of the banknote/value document (a plurality of distances can be arranged for any specific application of the found system, up to the maximum capacity of viewing of the selected micro-cameras [2.2] ) .

n. Power supply and external interface: by means of one USB/OTG port, which allows continuous power supply from external sources to recharge the battery, in applications where it is provided, and data exchange with either PC/Laptop for fixed applications or for OEM applications.

SUBSTITUTE SHEETS (RULE 26) o. An Extended Slim Battery (ESB) provided with a driver circuit, to ensure a 12 hours max operation of the found system, for pocket and other portable embodiments thereof. p. System anomaly detection: signaled by the lighting up of the red LED [2.7] and the acoustic signal of the 2xMicro- buzzers [2.8] . A plurality of other types of anomaly signaling can be made according to the type of applications cited herein.

q. Overall dimensions of the case, for pocket and fixed embodiments: 100x50x30mm max. Suitable mating holes are provided in the case for securing of the found system to fixed mountings of the User.

In practice, the details of the above claim may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent.

[Claim 4] . System according to claims 1, 2 and 3, characterized by an Innovative Methodology of Authentication [Fig.5] of banknotes and value documents, operating in conjunction with the Innovative Safety Methodology as per claim 5, to give the "secure authentication" required for any User. This authentication methodology is applied for pocket, fixed and OEM applications embodiments as detailed here below, but it is extensible to a plurality of any other system requiring automatic evaluation of heterogenic images of key features (i.e. images of particulars with different nature), for acceptance thereof as in the whole. The innovative authentication methodology comprises at least the following typical steps [ref. to Fig.5], wherein some basic warnings are detailed for pocket and fixed applications, whereas the process it is the same but with an enchanced plurality of warnings for OEM applications:

a. [5.1] Acquisition of the serial number of the banknote/value document/good and recognition of its graphic format in the database of the found system, regardless of the state of authenticity of the banknote/value document/good .

b. [5.2] If the banknote/value document/good serial number is not recognized, then the found system generates an internal interrupt signal, which activates the Red LED [2.7] and the two micro-buzzers [2.8] for 2 seconds.

c. [5.3] Acquisition of any possible Identification Code (Bar code, QR-code, etc.), value number and currency of the banknote/value document/good, with recognition thereof regardless of its authenticity status, to address the next selection of the related UV and IR template images in the database .

SUBSTITUTE SHEETS (RULE 26) d. [5.4] If the Identification Codes of the banknote/value document/good are not recognized, then the found system generates an internal interrupt signal, which activates the Red LED [2.7] and the two micro-buzzers [2.8] for 2 sec. e. [5.5] If both the first two previous recognitions are correct and the micro-cameras [2.2] are correctly detected by the Controller [2.1], and the security routine is called back for checking of contour conditions of detection, then the logical AND of all of these conditions sets the next process of Veridicity authentication of the banknote/value document/good in the found system, else the latter generates an internal interrupt signal, which activates the Red LED [2.7] and the two micro-buzzer [2.8] for 2 sec.

f. [5.6] Acquisition of the source image of the banknote/value document/good under checking from the micro-camera [2.2] sensible to the Ultra-Violet (UV) spectrum and comparison with the respective template image recorded in the database of the found system, for the verification of their relative overlap .

g. [5.7] If the result of overlapping of these two UV images (Result Of Matching = R0M_UV) is greater than 80% (eighty percent), then this outcome (ROM_UV) is sent to the Veridicity algorithm (V_%) and the system proceeds to the next step. Else, the found system generates an internal interrupt signal for activation of the RED Led [2.7] and the two micro-buzzer [2.8] for 2 sec.

h. [5.8] Acquisition of the source image of the banknote/value document/good under checking from the micro-camera [2.2] sensible to the Infra-Red (IR) and comparison with the respective template image recorded in the database of the found system, for the verification of their relative overlap .

i. [5.9] If the result of overlap of these two IR images (Result Of Matching = ROM_IR) is greater than 80% (eighty percent), then this outcome (ROM_IR) is sent to the Veridicity algorithm (V_%) and the system proceeds to the next step. Else, the found system generates an internal interrupt signal for activation of the Red Led and the two micro-buzzer for 2 sec.

j. [5.10] Then a specific decimal adimensional weight (w_i) is attributed by the found system to each of these said two responses (ROM_UV and ROM_IR) , such that: åw_i = 100, each one depending on the area (width x column) of each specific UV and IR template image within the database of banknotes/value documents/goods of the found system, according to the priority fixed by the importance of template image designed by the Bank/Authority of emission,

SUBSTITUTE SHEETS (RULE 26) so that for any template image retrieved from the database they are computed the related weights:

j.l. [5.10.1] w_OT = [Area of Template Image UV/ (Area of

Template Image UV + Area of Template Image IR) ] x 100; j.2. [5.10.2] w_lR = [Area of Template Image IR/ (Area of

Template Image UV + Area of Template Image IR) ] x 100. k. [5.11] These weights (w_i) allow the found system to normalize the overlapping results (ROM) of the UV and IR images with respect to the percentage of Veridicity result (Veridicity: V_%), giving more importance to either the UV or IR images prevailing in the database for each specific banknote/value document/good, as designed by each respective Bank/Autorithy of emission.

l. [5.12] Then both of these respective weights (w_DV; w_IR) and the two results (ROM_DV and ROM_ir) of the banknote/value document/good under authentication are entered by the found system in the Veridicity algorithm (V%), for computation of the following percentage:

(V %) = 100 { [ (w UV) (ROM_UV) ] + [ (w IR) (ROM IR) ] } / [ (w UV) + (w IR) ] . m. [5.13] If the percentage of Veridicity (V%) is less than 70%, then the found system automatically repeats at least 5 times the authentication cycle from blocks [5.6] to [5.12] . If this percentage is still below 70% the found system activates the flashing of the Red LED [2.7] and micro buzzers [2.8] for 2 sec.

n. [5.14] If, after further alignment by the User of the banknote/value document under the found system, the percentage of Veridicity (V%) becomes higher than 70%, or if it is already detected as higher than 70 %, then the found system activates the Green LED [2.7] for 2 seconds, and eventually the micro-buzzers [2.8] too, depending on the application (as example for blind and visual impaired people), by automatically confirming the authenticity of the banknote/value document/good .

o. [5.15] Thence the found system switches-off the Green LED

[2.7], and eventually the sound from micro-buzzers [2.8], and switches to IDLE menu, by activating the yellow LED

[2.7] with fixed light and the cyclic diagnostic checks, while awaiting a new authentication scan by the User.

In practice, the details of the above claim may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent.

[Claim 5] . System according to claims 1, 2, 3 and 4, characterized by an Innovative Safety Methodology, wherein the

SUBSTITUTE SHEETS (RULE 26) protection of the secure authentications of banknotes/value documents/goods is carried out by operating at least as follows :

a. Secure data exchange between the external PC/Laptop and the found system, ensured by a High Level Secure Shell Crypto- Protocol ( HL_SSH_CYPHER) .

b. All the internal operations of the found system are embodied in closed loop routines, which are encrypted by the said HL_SSH_CYPHER protocol. Therefore, the application software is not hackerable by people or other malicious software .

c. Encrypted data storage in an unique encapsulated file, wherein are comprised at least the 4KCC Algorithm and the UV and IR template images of all the banknotes/value documents/goods available in the world, which is stored in the SD (Secure Digital) micro-memory [2.6], up to its maximum size allowed by the market (today 128GB) .

d. Supply by e-mail from the Manufacturer to the final User of the said unique encapsulated and encrypted file, for updating of the SD micro-memory [2.6] from remote, in case of emission of new circulating banknotes/value documents/goods by the issuing Banks/Authorities or for updating of the 4KCC Algorithm. The file can easily be downloaded directly into the said SD memory of the found system by the User, when his PC/Laptop is connected to the found system via the USB/OTG port thereof and it is set to ON.

e. SD (Secure Digital) micro-memory [2.6] recognizable only by the "associated" Controller [2.1] with it. This "association" is made by the Manufacturer, by embedding a secret security code of the said Controller [2.1] in the native security code of the SD micro-memory [2.6], through an automatic SSH (Secure Shell) routine of the found system, commanded on the "Configuration" menu [3.4] open from the PC/Laptop of the personnel's Manufacturer.

f. External access is permitted to this personnel, only after at least a 12-digit password is input in the Entry Mask of the found system, in case of access to the "Configuration" and "Maintenance" menus, when the found system is connected to the PC/Laptop via its own USB/OTG port and set to ON. g. Logging of the credentials of the accessing personnel to the Configuration [3.3 ] or in Maintenance [3.4] menus, in terms of user name, date and time, for any possible further check by the Manufacturer.

h. In addition, any up-grading of the application software is permitted only to the strict authorized personnel of the

SUBSTITUTE SHEETS (RULE 26) Manufacturer, after accessed the afore said Maintenance menu [3.4] and then input at least a 4-digit code in the entry mask of the "Software Maintenance" sub-menu, for further prevention against any infringement of the software from the inner of the Manufacturer.

i. Any secret password is exclusive property of the Manufacturer and can only be changed by him over time in manual or automatic mode (eg with AES.256 code) through a routine of the found system.

In practice, the details of the above claim may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent.

SUBSTITUTE SHEETS (RULE 26)

Description:
Description

Title of Invention: INNOVATIVE DETECTOR FOR THE "SECURE AUTHENTICATION" OF ALL BANKNOTES, VALUE DOCUMENTS AND GOODS

lintroduction

[0001] The description below discloses a comprehensive information upon the invention of the found system, in order to be checked by people skilled in the related arts as detailed herein. The contents of this document are broken down into the following headings, in accordance with the International and UE prescriptions upon patenting.

[0002] A list of these headings is given below as follows:

[0003] - Technical Field;

[0004] - Background Art;

[0005] - Technical Probblem;

[0006] - Solution to Problem;

[0007] - Advantageous Effects of Invention

[0008] - Disclosure o Invention, with the following subheaders: a. Hardware Description; b. Software Description;

[0009] - Description of the Innovative Methodology of

Authentication;

[0010] - Description of Innovative Safety Methodology

[0011] - Brief Description of Drawings;

[0012] - Description of Embodiments;

[0013] - Examples;

[0014] - Industrial Applicability;

[0015] Sequence Listing Free Text;

SUBSTITUTE SHEETS (RULE 26) [0016] Citation List;

[0017] - Patent Literature;

[0018] A detail of these above said headings is given hereafter.

Technical Field

[0019] The invention, herein after called "E-Mony System" where necessary, it is to be found into the very strict field of the detectors that ensure a "secure authentication" of any banknote, value document /good, without any interpretation by any User, comprising blind and impaired people. The fields of applications of this found system can be met at least in: pocket, fixed and OEM (Original Equipment Manufacturing) embodiments, as detailed herein .

Background Art

[0020] In 2013 the World Bank found that valuable goods such as medicines, parts of airplanes, designer items, etc., globally trade in counterfeit products which amounts to over 500 billion dollars a year - around 5 % to 7% of world trade - and their number grows each year considerably. The results are fake valuables, premature failures, more expensive legitimate products and loss of consumer confidence with commercial destabilization, among other associated phenomena.

[0021] In particular, the production of fake banknotes, documents and valuables used in everyday business transactions has become the world's biggest fraud phenomenon, as reported by the World Bank in its reports.

[0022] The wars, conflicts, poverty and above all the consumerism of a global society where financial transactions do not take place only with computerized transactions but above all by means of banknotes/ documents and real-value goods, has become the instrument for generating and enhancing of this phenomenon of frauds in the world.

SUBSTITUTE SHEETS (RULE 26) [0023] In addition, large companies to save money are usually exporting their productions in countries where the rules of copying trademarks, goods and documents are not very consolidated, either by law, culture and social condition as well .

[0024] On the other hand, the counterfeiting industry now has new means at hand, such as: 3D printers for scanning and copying of banknotes / valuable documents and secure threads, inks and advanced papers, as well as other low-cost counterfeit materials, easily available on the market.

[0025] It was then found from the Cited Literature in the present document and from the current chronicles that the counterfeit banknotes have ever more sensitivity to partial detection of some of the various key fundamental peculiarities, such as: inks with magnetic pigmentation and / or greater contrast also on UV and IR fields, paper materials with zonal relief textures and Braille, secure threads sculpted in 3D on the basis the original thereof, holograms with double-color reflective films, etc.

[0026] In addition, the counterfeiting industry has developed bleaching techniques for banknotes and documents of small value to be overprinted with those of a greater value.

[0027] As for the value goods (video, griffe items, etc.), the counterfeiting industry is now able to challenge every possible detection system, since the companies producing original goods have set said their production abroad, exposing themselves to fraudulent replications of these goods, with materials and processes often similar, if not even equal to the original, but obviously at a lower cost.

[0028] Solutions such as current authentication detectors developed by manufacturers have methodologies and sensors of the most varied typology, which, like all devices, are sensitive to climatic variations and to the different types of

SUBSTITUTE SHEETS (RULE 26) counterfeiting, thus leading to levels of reliability of diversified authentication and not maintained for all conditions of their use.

[0029] From the standpoint of standardization, the ISO 12931:2012 specifies performance criteria and assessment methodology for authentication solutions used to establish the authenticity of valuable physical goods throughout their entire life cycle, but not specifies how technical solutions meet these performance criteria.

[0030] In fact, this standard is intended for all types and sizes of organizations that require the ability to validate the authenticity of valuable goods. It is intended to guide such organizations in determining the categories of authentication elements they need to combat such risks of counterfeiting and the criteria for selecting the authentication elements that these categories provide, having already undertaken an analysis of the risks of counterfeiting.

[0031] Such authentication elements may be part of the valuable good itself and / or of its envelope. The criteria therefore apply to the material good and / or its outer packaging / surface .

[0032] There is therefore a regulatory gap that does not define standard methodologies of detection and least a minimum typology of key features that must be recognized to have an acceptable authentication reliability percentage, and this does not protect users in choosing the detection device more adequate for them.

[0033] Furthermore, the high level of sophistication of the valuable banknotes / documents / goods on the one hand and the regulatory and performance shortfalls referred to above, are further highlighted by the exogenous conditioning that may be generated by malicious people / software on stand-alone detectors of authentication, or to the higher level systems that contain them, as in the case of fixed applications (commercial

SUBSTITUTE SHEETS (RULE 26) cashes) and OEM (Equipment Engineering Manufacturer), such as automatic cashes, automatic goods distributors, etc.

[0034] These facts, together with the various conflicts in the world today, have increased this phenomenon of commercial frauds to an extremely significant level, as reported in various reports by any issuing bank / authority.

[0035] Accordingly, the counterfeiting of valuable notes / documents / goods is causing considerable losses to banks, traders and any person involved in financial and commercial transactions worldwide, as reported by the World Bank in its periodic reports.

Technical Problem

[0036] The criminal scenario of currency counterfeiting, as well as that of valuable documents and goods, is the most worrying one for its increasing amount of frauds currently in the world, as reported by the World Bank on its website (ref. Cited Literature herein) .

[0037] This is due to simpler counterfeiting techniques, caused by the great advances in 3D technologies for scanning and printing images, as well as by the availability of new inks and fake materials very similar and cheaper than the original ones, with the result of making false notes / documents / valuables ever closer to the real ones.

[0038] In addition, an even more refinment of software corruption tools by criminal organizations broadly contributes to alter the possible fake detections by routing them as true, and this is preminent in external cashing machines, as ATM, etc.

[0039] In this way, the level of counterfeiting of valuable notes / documents / goods has become so sophisticated and widespread, that even the current authentication devices have difficulty in detecting them, as was found by all the issuing Banks / Authorities, without major public evidence to avoid creating alarm in financial transactions.

SUBSTITUTE SHEETS (RULE 26) [0040] In addition, blind and visually impaired people are disadvantaged by the authentication of valuable banknotes / documents / goods, when they make commercial transitions of common life, mainly contributing to the spread of this phenomenon .

[0041] Against this background, a careful analysis of the Cited

Literature, of the Patented Inventions and of the standards in force, it has highlighted the main technical causes that facilitate this phenomenon as a whole.

[0042] These technical causes can be roughly divided into: endogenous and exogenous causes, with respect to authentication detectors .

[0043] For exogenous causes it is necessary to mention: the low level of standardization for the verification of suitability for use of the detectors; the lack of selective controls in the field and the formal notice by authorities of the inadequate detectors in cases of suspects of their authentication of fakes as true, after their approval; the specification of how to respect the reliability of authentication in defined environments of use.

[0044] According to standardization, authentication detectors, when subjected to verification of suitability for use by banks / supervisory authorities as per ISO 12931: 2012, are designed to meet nominal reliability reliability performance, with lower limits fixed for example by central banks of issue for the currency sector.

[0045] These checks are carried out by these authorities with software simulating counterfeits and recognizations of sample lots of true / false notes taken at random, and are carried on an annual basis at the sites of these banks / authorities.

[0046] There are therefore no control bodies defining checks in the field of such detectors between said periods of publication of their outcomes, to promptly alert users where such detectors

SUBSTITUTE SHEETS (RULE 26) are no longer performing during the interverification period, for example due to new fake banknotes.

[0047] As regards the specification of how the reliability of authentication is respected, it should be noted that authentication is performed by detectors in which sensors operating in their operating fields are emboded with variable operating modes and conditions, so that the said reliability performance varies accordingly in a natural way, determining as outcome of authentication results lower than those nominally indicated by the producers, for a set of reasons as better detailed below.

[0048] [0047] Furthermore, the application of current techniques and methodologies in the fight against counterfeiting are all concentrated in detecting: materials, inks, paper textures, shapes and other key characteristics of value banknotes / documents, but none of them also integrating closed loop safe routines of checking during detection of these features.

[0049] This often leads to more or less effective performances of only "reliability" performances, but never related to secure authentications, and these reliability performances are based on the type of devices and methodologies used and the number of peculiarities assessed, as indicated both in the Literature Cited and in the Patented Inventions, reported in this document.

[0050] Therefore the concept of "reliable authentication", i.e. the percentage of how many times authentication has been successful compared to a mixed set of randomly scanned false / true banknotes / documents / goods, it is treated only as verification of reliability performances by institutions such as banks and authorities for issuing banknotes and valuable documents, through the respective verification processes stated for the assessment of the suitability of use of these reliable authentication detectors, with publication for those successful of the related reliability performance and approval serial number, with their annual recheck.

SUBSTITUTE SHEETS (RULE 26) [0051] Despite these verification processes are fairly consolidated as mentioned for the banking sector, no authority has set a minimum set of features to be tested for each detector, and not even standard detection conditions, leading to more or less reliable detectors depending on the type and methods of recognizing the basic features of value banknotes / documents, but this is not let always aware to the great deal of the majority of user.

[0052] The lack of a specification of the variation of the boundary conditions and those inside the detector, it determines variations in the reliability of authentication of the detectors in the field, also after having passed the suitability checks of the banks / control authorities of first eligibility and annual periodicity .

[0053] For the above, therefore, the minimum repeatability and reproducibility requirements required for standardization are not determined, which are not taken into account by the control bodies, but always make the users pay for these undesired costs.

[0054] Additionally, criminal organizations got software tools and probes which can alter the condition contours of the automatic cashing mashines, so as to route fake authentication results into true for broad quantities of banknotes, causing large wastes to economy in the World.

[0055] For the causes endogenous to the detector, on the other hand we can mention mainly: the subjective selectivity of the key peculiarities that must prove the goodness of the authentication, the lack of a univocal methodology for the authentication in which such peculiarities are evaluated, the use of market sensors subject to performance declines in the various operating modes and conditions, the robustness of the detector in the face of the intrusion of malicious people/software .

SUBSTITUTE SHEETS (RULE 26) [0056] As regards the images of the key peculiarities of the value object, it is well known their importance and their specific methods of evaluation in the context of the Literature Cited and in the Patented Inventions mentioned therein.

[0057] However, if the producers are left free to choose the type and methodology of evaluation for their detectors, then it is natural that they always put themselves at the minimum of the required performances.

[0058] Even if each bank / authority has perhaps a set of objects of sample value that are a bulwark to be overcome in order to verify the suitability for use of such detectors, the possibility that manufacturers do not take into consideration key features that to them can give correct results for that sample but not in the field can be extremely truthful, since the counterfeiting industry increases its performance and therefore the few peculiarities verified as above can be easily circumvented .

[0059] If, instead, these peculiarities to be verified are of a higher quantity, then the deception by counterfeiters becomes extremely more difficult.

[0060] Since each detector also has its own authentication methodologies different from the others, without performance and implementation standards set by industry authorities, but only by producers, then the authentication result of inadequate peculiarities and methodologies is to give an authentication result of perhaps 100%, which may not be representative of the reliability of effective authentication of the detector.

[0061] With regard to the sensors of the detectors, it is noted that the detection technologies such as UV (Ultraviolet) and IR (Infrared) have all been welcomed and pleaded by the main Central Banks and Authorities of the World, as mentioned in the websites of the ECB and the FED-Reserve in the Literature Cited

SUBSTITUTE SHEETS (RULE 26) herein, since they provide the highest levels of reliability of authentications .

[0062] Unfortunately, however, the concentration of both of these technologies in single robust, effective and small solutions, with lower costs for users, has been a very difficult issue to reach up today, and this was even more evidenced for secure authentication detectors as well.

[0063] This is mainly due to the fact that these technologies are operated at opposite ends of the color spectrum, so that any adjustment for one is not fair to the other, thus leading to compromises in the detection not so effective as required, to example to detect counterfeit inks more and more faithful to the originals .

[0064] This is what led to the main obstacles to the widespread use of these technologies for users, to effectively counteract the market for counterfeit notes / documents / goods.

[0065] Great breakthroughs have been made for detectors that integrate both these UV and IR imaging technologies, as reported in the 2017 report mentioned in the Patent Literature cited herein .

[0066] But pocket-sized and robust secure systems against infringements of their authentications, with low purchase and update costs, have not yet been widely disseminated, nor are blind and impaired people actually protected by these counterfeits until now.

[0067] For all of the above, none of these inventions has therefore established a common measure and above all objective methodologies for the evaluation of the performance of

"authentication reliability" for banknotes, documents and valuable goods, although many inventions, methodologies and resources of research have been destined for this purpose as per the Cited Literature herein.

SUBSTITUTE SHEETS (RULE 26) [0068] On the reliability of authentication side, all inventions in the patented literature in this sector are mainly based on the fulfillment of the requirements of "reliable authentication" of valuable banknotes / documents / goods.

[0069] It is recalled that the authentication reliability is the percentage of success detected with respect to a certain pre-set authentication sample (for example 100,000 objects of value), which is detected on known true / false objects, according to the counterfeit and recognition tests arranged by the banks / authorities responsible for checking of suitability of use of authentication detectors.

[0070] In order to achieve this, most of the detectors are in fact concentrated on techniques and methodologies more or less effective for the treatment of the images detected as aforesaid, while others are able to detect only some specific key features embodied in such objects of value, thus partializing this "reliable authentication", since not all of these elements are kept present for the achievement of the effective reliability of authentication performance.

[0071] These approaches have therefore created an authentication for "inference", without an effective percentage of reliability verification as above, but at most only proven by checks carried out by banks / authorities in charge, for that sample verified by them.

[0072] Having authentication by inference involves for statistical science the application of levels of reliability that must be set by banks / issuing authorities, for the acceptance of the reliable authentication performance of the marketed detectors.

[0073] To date, for example, the ECB has established the overcoming of at least 90% percentage of reliability in the counterfeit and recognization tests of a set of known fake/true banknotes (see:

SUBSTITUTE SHEETS (RULE 26) www . ecb . europa . eu/euro/cashprof/cashhand/devices/html/testing . en .html), while not all other sectors of documents and valuable goods have references to this effect, or have non-standardized references even at the national level.

[0074] It is therefore not only a lack of standardization of an adequate selection of peculiarity and authentication methodology for banknotes, documents and valuable goods, but also the lack of definition of reliability limits for authentication and therefore the placing on the market of such objects worldwide.

[0075] When the level of sophistication of the counterfeiting of such valuables rises, as in cases of lack of the aforementioned peculiarities and methodologies, such detectors begin to lower the performance of "reliability of authentication" .

[0076] In order to meet the minimum reliability requirements for the authentications, the issuing central banks rigorously and thoroughly test these detectors, using their latest software packages to verify counterfeiting and recognition for a defined set of authentic and false banknotes, in order to guarantee a quantifiable reliability of authentication.

[0077] The detectors passing these checks are recognized as suitable for use and formally advertised by these banks / authorities on their bulletins, with the related outcome of reliability percentage of authentication, where the same detectors have previously been considered eligible to be submitted to verification by the bank / national competent authority .

[0078] For example at EU level, the types of detectors considered eligible for authentication reliability checks can be classified as: Category la - separate authentication devices for single banknote with only one input banknote (no batch processing) ; Category lb - bank acceptance forms with only one incoming banknote (no batch processing), for integration into machines such as vending machines; Category 2 - batch processing

SUBSTITUTE SHEETS (RULE 26) devices for counting and authentication of banknotes, which are not suitable for the tests referred to in Decision ECB / 2010/14 (i.e. counting machines without automatic separation of suspected banknotes from genuine banknotes)

[0079] From the foregoing it can be inferred that several of the detectors in circulation are not suitable for verification of authentication by the national banks in the countries where they are marketed, such as direct reading detectors such as those equipped with monitors type UV, IR, etc., with a returned image that is set to subjective interpretation by the user, which does not facilitate him in the face of sophisticated counterfeited banknotes / documents / goods as above.

[0080] In relation always to the reliability of authentication performance, it should also be noted that the scams that are emerging in recent times in automatic cash machines such as ATMs (Automatic Teller Machines), etc., are double-acting, i.e. not only are they directed to fraudulent withdrawals, but also to let these large cash machines to accept large amounts of banknotes for money laundering and / or counterfeit money, as revealed by US, EU, Russian and Asian news, using external disturbing/deception instruments, inserted in the automatic cash point or "aimed" at the detector of authenticity of it.

[0081] On the whole, these sophistications therefore can deceive the detectors made in general up to now, regardless of their cost and reliability level, which can thus authenticate such counterfeit valuables as true, even as massively as just mentioned .

[0082] This therefore denotes the strong need for a standard authentication methodology, which simultaneously operates on multiple heterogeneous key features in each operating environment, so as to ensure systematic authentication reliability without endogenous and exogenous influences, as required by any transaction users, financial, which also allows an international standardization of verifications with

SUBSTITUTE SHEETS (RULE 26) comparable results for the various authentication detectors in the world.

[0083] Users who are blind or visually impaired are more vulnerable to this effect and need additional systematic perceptual detection capacities associated with the aforementioned .

[0084] In order to fight against the increasingly refined criminal industry of counterfeiting, a new authentication method should be envisaged as above, immersed in a totally and wholly secure environment, not subject to external and internal malevolent influences, which allows a standardized objective evaluation of reliability of authentication results, with a predefined and systematic level of reliability at international level .

[0085] This denotes the need to have detectors no longer oriented towards authentication reliability only as everyone so far, but rather on the reliability of authentication in a fully secure environment, which guarantees a fixed level of systematic statistical reliability in each mode operation of the detector, thus implementing the so-called "secure authentication".

[0086] The main difference between reliable and secure authentications is therefore of the utmost importance in the world of value-added banknotes, value documents and goods, as better clarified below.

[0087] Reliable authentication is in practice an expression of the percentage of how many times the device can detect false valuables compared to a set of examined objects of a known nature, while secure authentication establishes the dependence of this percentage of reliable authentication from the safety of the detection environment.

[0088] In summary this means that the reliability of authentication of a detector of value banknote / document / goods can be influenced not only by the above mentioned types of

SUBSTITUTE SHEETS (RULE 26) counterfeiting of valuables, but also by the detection environment due to software malevolent of violation of authentication systems, which may result in the acceptance of dirty valuables and / or authenticate the fakes as true, due to the said exogenous causes.

[0089] The device to be found must therefore be such as to guarantee an objective authentication methodology, based on a more sophisticated cross-evaluation of the key features of the original images of the valuable banknotes / documents / goods.

[0090] This authentication must take place within a detection environment completely safely controlled by this found device, in order to establish the actual real / false result of the same in a standardizable way and therefore comparable in the world.

[0091] To this end, the additional complication is determined by the fact that many of these key features embodied into the value banknotes / documents / goods are by their nature heterogeneous, namely: with different constitution in matter, size and visibility, by forcing the criminal industry to a heavy effort in counterfeiting and manufacturers in revising their detection devices accordingly in the case of new issues of valuable notes /documents/goods .

[0092] Moreover, when authentication detectors are becoming obsolete for the aforementioned reasons, manufacturers are forced to update or replace them, burdening the users with additional costs often high, without any continuity solution over the time.

[0093] In this way, the poorest users are often unable to buy new authentication devices or their updates, so they unconsciously become a vehicle for the expansion of the counterfeiting industry of banknotes, documents and valuables.

[0094] This result is even more acute for blind and impaired people, who are prevented from directly recognizing the authenticity of valuable notes / documents / goods in the world.

SUBSTITUTE SHEETS (RULE 26) [0095] In addition, large organizations such as banks, post offices, chains of markets (hyper, super, etc.) and those who generally host automatic cash machines such as ATMs (Automatic Teller Machines), distributors of valuable goods (video, etc. .), color printers, etc., have to face with the same problems as above, but with much higher risks due to the huge masses of valuables (currency, etc.) involved.

[0096] In this case, in fact, "secure authentication" is a requirement at least obligatory for all these large users, to avoid that such endogenous and exogenous influences allow to collect large amounts of fake banknotes / documents / goods in financial transactions of every day for the aforementioned reasons .

[0097] The end result of all these issues is the huge proliferation of fake value banknotes / documents / goods, which causes significant losses to banks, traders and any person involved in financial transactions around the world, as noted by the World Bank.

[0098] This increasingly forces all banks / authorities of emission to try to curb this counterfeiting market as an apparent remedy by issuing new banknotes / documents / goods of value, but with different and more complex key features to be controlled than the previous ones.

[0099] This often leads users to confusion in directly controlling the new and old key features, visible or with the help of stimulated vision tools of the relevant images of valuable banknotes / documents / goods, with the same values but different emissions, and often forcing manufacturers to replace their obsolete detectors accordingly, with additional costs for users .

[0100] If a user is not able to securely authenticate these valuable notes / documents, or by a direct examination of them (touch, glance, tilt, etc.), or via an updated indirect

SUBSTITUTE SHEETS (RULE 26) verification device (the interpretation is provided by the device), the user unconsciously facilitates the diffusion of fake banknotes / documents / goods, especially for blind and impaired people too.

[0101] This process continues to close again with negative effects on any user as above, without any solution of continuity over the time.

[0102] On the horizon, it is not seen any kind of economic and effective mass-effective countering device, which could be sponsored by large organizations for monetary transactions, such as banks, authorities, etc.

Solution to Problem

[0103] As a solution to the aforementioned problems, the invention herein defines a completely innovative detection device, which performs an effective and complete "secure authentication" of valuable banknotes / documents / goods.

[0104] This secure authentication depends on an Innovative Authentication Methodology [Fig.5], which allows the objective assessment of the veradicity of the visible and invisible key features, which are embodied into the original image of the value banknote / document / good by the issuing Banks / Authorities .

[0105] The innovative authentication methodology is implemented in a completely closed application software [Fig.3] and executed in a protected environment with an encrypted protocol, therefore not hackerable from the point of view of software infractions. The software is integrated into a suitable hardware [Fig.2], to ensure overall the systematic compliance with the level of reliability of the security authentication results in each operating mode for each application as described herein.

[0106] These safety measures have been all included in an Innovative Safety Methodology, cooperating with the aforementioned authentication methodology, in which additional

SUBSTITUTE SHEETS (RULE 26) security techniques have been incorporated, in order to create a safe and invulnerable environment against possible internal and external influences by malicious people/programs in every mode of operation of the found system.

[0107] As part of this innovative authentication methodology, the problem of luminance variation of the UV and IR source images reflected by the value banknote / document / good in day / night conditions was overcome, by using LEDs [2.3] embodied in the found system.

[0108] These LEDs [2.3] ensure a level of luminance suitable for the UV and IR source images reflected by the value banknote / document / good in each operating mode and day / night detection condition, within a tolerance range appropriate for users of any type, including blind and impaired people.

[0109] To determine the correct detection luminance, an infrared proximity sensor (IRPS) [2.4] was introduced, which operates the luminance adjustment of the LEDs [2.3] for optimal conversion from UV and IR to scale of grays of the source images, as also indicated in the Cited Literature herein this document.

[0110] In order to provide an objective evaluation approach in this authentication methodology, each source image detected as aforesaid by value banknote / document / good and converted to grayscale, it is recognized by comparison with the corresponding template image, which is resident in the database stored in the micro-memory SD [2.6] of the found system.

[0111] This comparison can be performed with various techniques (SIRF, SURF, Haar, PCA, HMM, KNN, etc.) present on the market today, as per surveillance report of the 2017 "Sensor" publication, identified at the beginning in the Cited Literature herein, which can lead to results of overlapping percentages that are more or less elevated, but not preclusive to the follow-up of the evaluation process traced by the innovative authentication methodology mentioned here.

SUBSTITUTE SHEETS (RULE 26) [0112] Also, since this overlap evaluation technique is not the fastest to verify authenticity, but is absolutely and univocally reliable when images of valuable objects are to be compared by grayscale overlay, the application software provides a fast addressing and retrieval of the correct template image from database, through initial identification of value, currency, and serial numbers of the valuables, regardless of their authentication .

[0113] After each comparison, the result of the overlap percentage of these images is sent to an extremely simple and innovative 4-Keys Cross-Check Verification algorithm, called 4KCC (Four-Keys-Cross-Checking) .

[0114] This 4KCC algorithm performs a weighted average of all these percentages of overlap, with an innovative approach in the calculation of the weights associated with them, based on the relationship between the physical area (width x columns) effective of each key peculiarity detected on template image and the total UV + IR of the value banknote / document / good, stored in the database within the micro-memory SD (Secure

Digital) [2.6] of the found system.

[0115] This allows the algorithm to respect in a completely innovative way the criteria of importance of all the key features assigned by the issuing banks/authorities of the value banknote / document / good.

[0116] If, therefore, one area of key feature is larger than another, this will have a different effect on the outcome of the authentication of the value banknote / document / good.

[0117] Moreover, the larger the image areas of the respective key peculiarities, embodied by the issuing Bank / Authority in the value banknote / document / good, the greater will be the weight of its contribution on the total percentage of authenticity for authentication.

SUBSTITUTE SHEETS (RULE 26) [0118] In addition, the said mathematical process of the algorithm lends itself to be easily standardized in the field of use of the present invention, owing to its simplicity of application and effectiveness which can be completely determined by the standardizing subject.

[0119] To provide an example of this standardization capability of the algorithm, if we set for the overlapping percentages a threshold of 0.8 (ie 80%) as the minimum acceptance limit, and for the scanning of serial numbers and value codes even closer detection, dictated for example by the minimum level of scanning OCR (Optical Character Recognition) today, for example 98%, we will have the reliability of authentication for any failures of incorrect authentication not simultaneous will be: Pt = [1- (0.2

* 0.2 * 0.02 * 0.02)] * 100 = 99.9984%.

[0120] By means of this algorithm, therefore, the authentication reliability can therefore be easily calculated and set as acceptance threshold by any bank / authority that must evaluate authentication detectors to be placed on the market, thus effectively verifying the relative performance of such coverage declared by the producers, not only with respect to the number of false and true valuables such as banknotes, documents and scanned goods of a known lot of false / true, but also on variation of the operating conditions according to the use limits (e.g. temperatures and humidity) that can be fixed by the banks / authorities.

[0121] Given its particular innovative versatility that is clearly visible as above, the algorithm can be easily extended to any type of application having characteristics of assevering images with heterogeneous key features and therefore standardizable in the various sectors of interest.

[0122] A threshold is also set in the context of the innovative authentication methodology of the found system, which allows automatic activation of the repetition of said authentication

SUBSTITUTE SHEETS (RULE 26) process in case of low luminance, detected for various reasons by the found system during its operation.

[0123] All these operations are performed by the application software [Fig.3] which is embodied into the hardware [Fig.2] of the found system, which operates in a closed-loop and encrypted protected process by means of a Innovative Safety Methodology cited thereafter, to ensure the systematic security of the reliability of authentication, i.e.: the secure authentication, within the tolerance limits for the found system specified therein .

[0124] In addition to ensure safety even under reconfiguration conditions, the template images, as well as the innovative 4KCC algorithm, have the innovative feature of being integrated into a single encrypted file, which can be easily downloaded and replaced without its internal access, to that resident in the SD memory [2.6] of the found system.

[0125] The further innovation lies in the extension of the safety methodology also to the interface phase of the system found inside the manufacturer, through special input masks with two-level passwords, one for access to the configuration of new files to be encrypted and forwarded to users by email, the other for maintenance of the hardware resources of the system found. Furthermore, for access to the application software, an additional input mask has been defined with a password that can only be inserted by personnel strictly authorized by the manufacturer, after having first passed the input mask of the maintenance menu.

[0126] This further innovation protects manufacturers against undue access of the system found in any of its operating conditions, while also allowing the system to automatically register each access for further verification by the manufacturer .

SUBSTITUTE SHEETS (RULE 26) [0127] In addition, the device has small dimensions [Fig.l] and is robust to impact and operating conditions even in extreme environments, so as to have a strong diffusive fall-out in all pocket, fixed and OEM applications (Original Equipment

Manufacturer) of users.

[0128] To further innovation, this device is easy to use and update from local or remote even from blind and visually impaired people, so as to be able to quickly follow the emissions of new valuable banknotes / documents / goods from central banks / authorities, with minimal update costs.

[0129] Finally, as a further element of goodness of innovation, it should be noted that the industrialization of this system is based on a commercial hardware [Fig.2] and on an application software [Fig.3] developed with "open source" programs, as both described hereafter, to be rapidly spread all over the world by manufacturers specialized in the production of common components of IoT (Internet of Things) .

[0130] Nonetheless they will be able, through this invention, to create new types of application to other sectors, without jeopardizing the significance and applicability of this invention for them, but rather extending its diffusion in a generalized way in the world.

Advantageous Effects of Invention

[0131] The primary beneficial effect of this invention is to aim at obtaining a strong and rapid reduction in the circulation of fake value banknotes / documents / goods all over the world, due to the possible rapid widespread industrialization of it in pocket , fixed and OEM applications, given its said innovative hardware, software and methodological features, implemented as mentioned in the said Solution to the Problem heading.

[0132] The other collateral benefit effects are in setting a standard for "secure authentication" of valuable banknotes /

SUBSTITUTE SHEETS (RULE 26) documents / goods, which is easy to maintain by all related organizations in the future.

[0133] This would have great benefits in including more refined and competitive custom hardware and software packages in this target, thus further reducing costs for users.

[0134] Furthermore, the use of this found system in OEM applications will not only prevent the acceptance of false banknotes in the automatic cash machines, but also prevent the deceptive storage in them of dirty or recycled banknotes, if the relevant codes are verified safely as not acceptable by the found system. Where machines such as ATMs can be corrupted by malicious people / software, the system found remains incorruptible due to its innovative security methodology, which contemplates its memory resources and application software encrypted and protected during their operations.

[0135] If therefore in such protected resources the security requirements can be accommodated (for example images of banknotes, documents and original goods, codes to refuse because goods coming from recycling items, etc.) imprinted in the system found by the owner organization of the ATM or by the authenticator machinery, the system found can block by itself any initiative of its bypass and provide a special alarm and block signal to the primary system, thus acting the system found as a full SAD device (Safety Authentication Device) .

[0136] Another benefit that derives from this invention is towards the immediate secure authentication of valuable documents and goods (eg video, etc.) having codes and appropriate key features, visible or not, integrated in them and safely recognized by the found system.

[0137] This will quickly improve the entire market for combating counterfeiting of valuable notes / documents / goods, in which the key heterogeneous features must be assessed in a safe environment, with a cross-assessment methodology and a pre-

SUBSTITUTE SHEETS (RULE 26) established reliability, to acquire the actual result of "secure authentication" required by any end user.

Disclosure of Invention

[0138] A detailed description of the hardware and software of the found system is given herein after.

[0139] Hardware Description of the Found System [Fig.2]

[0140] The found system is characterized by at least the following basic hardware [Fig.2] :

[0141] [2.1] One processing device type Controller with a plurality of functions, wherein are comprised at least: two CSI interfaces for driving of a pair of UV and IR multispectral 8Mpixels micro-cameras [2.2], EEPROM non-volatile memory for resource management, memory slot for hosting of one removable Secure Digital (SD) micro-memory [2.6], ON/OFF and Reset buttons, operational LEDs [2.7] and USB/OTG communication port;

[0142] [2.2] Two image acquisition devices of at least 8Mpixel type micro-cameras, for multi-spectral UV and IR image acquisition through suitable filters on command by the Controller [2.1];

[0143] [2.3] Two beam illuminating devices type LEDs, for the illumination of at least multispectral UV and IR sensitive areas of the banknote under authentication, connected to the IR Proximity Sensor (IRPS) [2.4] ;

[0144] [2.4] One IR-type Proximity Sensor (IRPS) operating at least as thermal source detector from objects under authentication such as banknotes, documents, etc. or from human presence, connected to the above 2xLed [2.3] for the provision at least of some interrupt controls to the above Controller

[2.1], which are used to activate at least the above UV and IR micro-cameras [2.2];

SUBSTITUTE SHEETS (RULE 26) [0145] [2.5] One power storage device type Extended Slim Battery

(ESB) , with driver circuit for continuous low voltage power supply of the found system;

[0146] [2.6] One memory storage device type SD (Secure Digital) micro-memory, at least for secure storage of data as the 4KCC Algorithm and the Template Images for authentication of banknotes, value documents/goods ;

[0147] [2.7] Three illuminating devices type LED [2.7] with colours: Green, Yellow and Red, at least for the optical signaling of the operating states of the found system and authentication response thereof to the User;

[0148] [2.8] At least two micro acustic warning devices type micro-buzzers, for the acoustic signaling of at least the operating states and authentication responses to the User, associated with the operational states of the above said 3xLEDs [2.7] ;

[0149] [2.9] One plastic case, with clamping screws, cover and a filling gasket for hygrometric insulation, all of these combined at least for the use of the found system in all the operating environments (but not underwater), with suited mating points for embodiment of found system in fixed installations.

[0150] In practice, all the details of the above basic hardware components may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent .

[0151] Software Description of the Found System [Fig.3]

[0152] General Description of Application Software

[0153] The software of the found system is characterized by at least the following software modules [Fig.3] :

[0154] a. IDLE menu [3.1] ;

[0155] b. OPERATION menu [3.2] ;

[0156] c. CONFIGURATION Menu [3.3];

SUBSTITUTE SHEETS (RULE 26) [0157] d. MAINTENANCE menu [3.4].

[0158] a. IDLE menu [Block 3.1] : This menu automatically executes at least the initial and cyclical real-time checks of the found system and feeds its diagnostic results respectively to the LEDs [2.7] for the optical warning and to the micro buzzers [2.8] for the acoustic warning of the corresponding states of the found system to the user.

[0159] b. OPERATION menu [Block 3.2] : This menu automatically authenticates at least the banknote, the value document, or the images of a plurality of other value goods (video, etc.) under assessment, without any interpretation by any User, included blind and impaired people too. This authentication is done at least by means of the Innovative Authentication Methodology as detailed below, in conjunction with the Innovative Safety Methodology, as given hereinafter as well. The authentication methodology is characterized at least by:

[0160] b.l. Detection of some fundamental visible and invisible multispectral key features of source images from any banknotes, value document or images of a plurality of other value goods (video, etc.), by using the UV and IR micro-cameras [2.2] of the found system,

[0161] b.2. Evaluation for each key feature of the percentage of overlapping of the source image with the respective template image and attribution to this percentage of a specific adimensional weight, proportional to the area of the key feature defined by the issuing Bank/Authority,

[0162] b.3. Calculation of the weighted average of these results by means of a 4KCC (4-Key-Cross-Checking) algorithm.

[0163] Both the template images and the 4KCC algorithm are

encapsulated in a unique encrypted file, stored in the SD

(Secure Digital) micro-memory [2.6] of the found system.

[0164] The response of the quantitative assessment done by the algorithm can be signaled with a plurality of devices and modes

SUBSTITUTE SHEETS (RULE 26) to the User, depending on the type of embodiment of the found system .

[0165] In case of pocket application, this secure response information is given to the status LEDs [2.7] and to acustic micro-buzzers [2.8] of the found system.

[0166] In case of application in fixed installations, this secure response is fed to a pop-up window, that can be open and set to ever still on the PC/Laptop/PLC of the User.

[0167] In case of OEM application the authentication secure response is given to the external primary system, for being integrated in the machined process thereof.

[0168] In order to ensure the "secure authentication" operations, the above said Innovative Authentication Methodology operates in conjunction with an Innovative Safety Methodology, as summarized hereafter.

[0169] The Innovative Safety Methodology provides in this case a comprehensive protection against infringements of the hardware [Fig.2] and the application software [Fig.3] of the found system by malicious people/software, while the system is either in operating, updating or in maintenance modes.

[0170] c. CONFIGURATION Menu [Block 3.3] : This menu allows the Manufacturer's personnel to reconfigure at least the SD memory [2.6] both to update the template images of the new banknotes, value documents and other images of value goods in general, as well as to adjust the 4KCC algorithm, if required. The

Manufacturer's personnel can perform both of these reconfigurations only after at least a 12-digit password is input in the entry mask of this CONFIGURATION menu. Then these data are updated and encrypted automatically by the personnel of the Manufacturer into a unique file, to be sent to the final User by e-mail. Finally the User can download this unique file from its laptop and replace the unique older file in the SD

SUBSTITUTE SHEETS (RULE 26) memory, by connecting its laptop to the found system as per Fig.4 and setting the latter to ON.

[0171] d. MAINTENANCE menu [Block 3.4] : This menu allows the Manufacturer's personnel to perform at least the hardware and software maintenance of the found system, by recalling two specific entry-masks, where some passwords are to be input. Specifically the "Maintenance" main menu is recalled from the laptop of the personnel of the Manufacturer, where a general entry mask is to be accessed with at least a 12-digit password. After this password is input, the personnel can directly access to the hardware diagnostic of the found system, to try to repair the faulty resource. Any modification of the application software is only permitted to the personnel of the Manufacturer, after at least a further 4-digit password is input in the "Software Maintenance" sub-mask of the Maintenance main menu. This permits the further accessing of the software to only the strict authorized personnel by the Manufacturer.

[0172] Below there is a simplified and not exhaustive description of the basic functionality of each menu.

[0173] In practice, all the details of these software blocks may in any case vary, without changing the scope of the found system and therefore the domain of the requested patent.

[0174] Detailed Description of Application Software [Fig.3]

[0175] a. IDLE Menu [3.1]

[0176] [0119] In this condition the Controller [2.1] manages the bootstrap, that is the test of the resources at its start-up, and the first recognition of the micro-memory SD [2.6] up to its normal functioning state, called "on- line ". During on-line the Controller [2.1] periodically activates in real time the diagnostic check routines of all the resources and the cyclic recognizations of the micro SD memory [2.6] of the found system.

[0177] Upon setting of either the ON or RESET buttons, the Controller [2.1] commands the bootstrap, which performs the

SUBSTITUTE SHEETS (RULE 26) control of the operation of all the resources of the found system, from the start-up up to the full on-line status thereof.

[0178] The bootstrap checks the status of: LEDs [2.3] and [2.7], IR-PS [2.4], ESD battery [2.5], SD micro-memory [2.6] and the two micro-cameras [2.2] of the found system. During the test the Yellow LED [2.7] of the Controller [2.1] flashes. If the test is negative, the Controller [2.1] switches on the Red LED [2.7] with steady light and the micro-buzzers [2.8] beeping for 4 sec, then the Controller [2.1] switches off the found system. If the test is positive, the Controller [2.1] sets the next step for recognizing of the SD micro-memory [2.6] .

[0179] If the SD memory [2.6] is recognized by the Controller

[2.1], then this one activates the yellow LED [2.7] with fixed light, awaiting for the authentication of the banknote, value document/good by the User. If the SD memory [2.6] is not recognized, then the Controller [2.1] activates the flashing of the Red LED [2.7] with a fixed light and the beeping by the micro-buzzers [2.8] for 4 sec, then the Controller [2.1] switches-off the found system.

[0180] If the Extra Slim Battery (ESB) [2.5] is discharged, the Controller [2.1] self-protects its memories and then switches to off .

[0181] An external 5Vdc/lA continuous power supply is provided to the found system through the USB/OTG port thereof, with standard commercial power supplies available on the market.

[0182] If this external DC power supply is removed after the charge, the Controller [2.1] switches automatically to battery supply [2.5], by starting the bootstrap sequence when the found system is activated as said above.

[0183] If instead the found system is already operating in connection with the external power source, then the disconnection from it causes only the transition to the battery

SUBSTITUTE SHEETS (RULE 26) power supply [2.5] without any energy interruption, as for all smart devices.

[0184] The above said optical and acoustic indications of the responses, as well as all said signals, they are detailed as above for pocket and fixed applications herein, but a plurality of additional indications and signals can be picked-up from the found system, for any application derived from all of these afore said, without changing the scope of the patent herein.

[0185] b. OPERATION menu [3.2]

[0186] b.l Before commencing with authentication, the banknote, value document/good shall be laid down on a reading plane, under the light beam sensible to UV and IR spectra, to prevent fake indications, by checking for the respect of the following tolerances of positioning:

[0187] b.1.1 Distance of reading at 200 to 300mm far from the reading plane;

[0188] b.l.2 +/- 30 deg. of max horizontal rotation of banknote, value document/good from the axis crossing the optics of the two micro-cameras [2.2] ;

[0189] b.l.3 +/- 10% max displacement of the banknote, value document/good from the center of the light beam of 2xLEDs [2.3] .

[0190] b.2. Then let the IR Proximity Sensor (IRPS) circuit

[2.4] activates the LEDs [2.3] and the "sensing" command of user presence for the Controller [2.1], which generates an interrupt that starts the authentication cycle of the banknote, value document/good as follows:

[0191] b.3. Illumination of the banknote, value document/good to be authenticated with the light beam of LEDs [2.3], for correction of luminance of banknote, value document/good in any day/night condition of detection.

[0192] b.4. If lighting is insufficient, the found system provides a self-improvement of the brightness of the image until

SUBSTITUTE SHEETS (RULE 26) it is brought into the minimal conditions of image acquisition by each specific UV and IR micro-camera.

[0193] b.5. If these light conditions are not reached, then the found system generates an internal interrupt signal, which activates the Red Led [2.7] and the two micro-buzzers [2.8] for 2 seconds .

[0194] b.6. Else the authentication cycle of the key-features of the banknote, value document/good under scan is then executed by the found system, according to the Innovative Authentication Methodology based on the 4KCC (Four-Key Cross-Checking) Algorithm, as detailed below herein.

[0195] b.7. Return of the found system in its IDLE menu [3.1], in waiting for a new scan by the user, after successful or negative authentication of the banknote, value document/good referred to in the previous step.

[0196] The above said optical and acoustic indications of the responses, as well as all said signals, they are detailed for pocket and fixed applications as cited herein, but a plurality of additional indications and signals can be picked-up from the found system, for any application derived from all of these afore said, without changing the scope of the patent herein.

[0197] c. CONFIGURATION Menu [3.3]

[0198] This menu of the found system is accessible only when this is connected to the PC/Laptop of the Manufacturer and set to ON, so that an entry-mask of "Configuration" menu is shown to the personnel of the Manufacturer.

[0199] c.l After entered the 12-digit password in the entry- mask, the personnel of the Manufacturer can update the Template Images and/or the 4KCC Algorithm of the found system, which are then encapsulated and encrypted into one file, to be downloaded either locally or remotely in the SD micro-memory [2.6] .

SUBSTITUTE SHEETS (RULE 26) [0200] c.2 After accessed, the personnel can select either the updating of the template images of the new banknote, value document/goods or the updating of the 4KCC algorithm.

[0201] c.3 After completed the acquisition of any images from the true banknote, value document/good, as in the case of Operation menu, the personnel can save all of these data into the SD memory [2.6], together with the related 4KCC algorithm, for alignment of both.

[0202] c.4 All the data exchanges commanded between the found system and the external PC/Laptop of the personnel of Manufacturer are encrypted by the SSH security protocol.

[0203] c.5 Before any encryption, this updated file is also added with a secret code by the personnel of the Manufacturer, derived from the ID and Serial Numbers of the found system, which are read on the external envelope [2.9] thereof.

[0204] c.6 In this way, the file to be downloaded by the User can only be read from the found system purchased by him, when this is downloaded and copied in the SD memory [2.6], in place of the older.

[0205] c.7 In case of updating of the 4KCC Algorithm, the procedure of updating permits the personnel to change any parameter of the algorithm, when the Configuration menu [3.2] is accessed as afore said, by the 12-digit password.

[0206] c.8 Then the saving procedure for the updated algorithm is the same as that in the preceding step for template images cited herein.

[0207] c.9 In case of non-recognition of the SD micro-memory

[2.6] by the found system, the latter must behave according to the IDLE menu [3.1], by activating the Red LED [2.7] and the 2xmicro-buz zers [2.8] accordingly.

[0208] C .10 The exit from this "Configuration" menu [3.2] will automatically switches the found system to the IDLE menu [3.1], for reboot and diagnosis thereof.

SUBSTITUTE SHEETS (RULE 26) [0209] The found system maintains in any case the log of any access to this menu, by identifying: name, date and location of access .

[0210] The above said optical and acoustic indications of the responses, as well as all said signals, they are detailed for pocket and fixed applications as cited herein, but a plurality of additional indications and signals can be picked-up from the found system, for any application derived from all of these afore said, without changing the scope of the patent herein.

[0211] d. MAINTENANCE menu [3.4]

[0212] This menu is accessible on the found system from the

PC/Laptop of the personnel of the Manufacturer and allows the latter to diagnose the hardware resources of the found system, or upgrade the application software thereof.

[0213] The found system must be delivered to the maintenance point together with its respective supplied SD memory [2.6] .

[0214] Once the set-up it is made as per [Fig.4], it must be possible to access the "Maintenance" menu [3.4] resident in the found system from PC/Laptop of the Manufacturer, after input the 12-Digit password in the entry-mask of the Maintenance menu [3.4] .

[0215] After accessed the found system as indicated in the preceding step, two sub-menus are displayed to the

Administrator: "Hardware Maintenance" and "Software

Maintenance" .

[0216] In the case of access to the "Hardware Maintenance" sub menu from the PC/Laptop, the Manufacturer can directly entry in the sub-mask and recall the view of the log file of the found system, until the time of failure.

[0217] In addition, the personnel can also read the diagnostic content of the "IDLE" menu [3.1] up to the failure, if any, in order to check the faulty main hardware resources of the found system, to repair these by replacement.

SUBSTITUTE SHEETS (RULE 26) [0218] Replaced the damaged parts, the Manufacturer can switch off and restart the found system as per the above IDLE menu

[3.1], for its reboot and diagnosis with the respective SD memory [2.6] always inserted in the slot of the Controller

[2.1] .

[0219] In the case of access to the "Software Maintenance" sub menu, this is provided only after entering of a further 4-digit security password in the "Maintenance Software" sub-mask of the "Maintenance" menu [3.4] .

[0220] This is done to protect any improper access and misuses to the application software, which can cause systematic errors to thereof.

[0221] Through this type of access only the restrict authorized personnel of the Manufacturer can update any application software routines of the found system and save these changes in the Controller [2.1] accordingly.

[0222] The exit from these two Maintenance sub-menus will automatically restore the found system to the IDLE menu [3.1] as mentioned above, for rebooting and diagnosis thereof.

[0223] The found system maintains in any case the log of any access to this menu, by identifying: name, date and location of access .

[0224] The above said optical and acoustic indications of the responses, as well as all said signals, they are detailed for pocket and fixed applications as cited herein, but a plurality of additional indications and signals can be picked-up from the found system, for any application derived from all of these afore said, without changing the scope of the patent herein.

[0225] DESCRIPTION OF THE INNOVATIVE METHODOLOGY OF

AUTHENTICATION [Fig .5]

[0226] This methodology complies with the Operation Menu [3.2] and operates in conjunction with the Innovative Safety

Methodology given hereafter, for ensuring of the "secure

SUBSTITUTE SHEETS (RULE 26) authentication" performance of any banknote, value document/good to the User.

[0227] The methodology is characterized by the evaluation of the heterogenic images (i.e. images of different nature) coming from the key-features of any banknote, value document/good, by a 4KCC (Four Key Cross-Checking) innovative algorithm.

[0228] This 4KCC algorithm can be applied to a multeplicity of systems requiring automatic evaluation of heterogenic images of their key features of any sample image with respect to its template one, for the automated secure acceptance of checked samples, as in the case of OEM applications as cash machines and affine others like photo-copying machines, etc.

[0229] In this case the algorithm has been characterized for authentication of banknote, value document/goods of any denomination and currency, which are sensible at least either in part or at all to UV and IR spectra.

[0230] The authentication methodology comprises at least [Fig .5 ] :

[0231] [5.1] Acquisition of the serial number of the banknote, value document/good and recognition of its graphic format in the database of the found system, regardless of the state of authenticity of the banknote, value document/good .

[0232] [5.2] If the banknote, value document/good serial number is not recognized, then the found system generates an internal interrupt signal, which activates the Red LED [2.7] and the two micro-buzzers [2.8] for 2 seconds.

[0233] [5.3] Acquisition of any possible Identification Code

(Bar-code, QR-code, etc.), value number and currency of the banknote, value document/good, with recognition thereof regardless of its authenticity status, to address the next selection of the related UV and IR template images in the database of the found system.

SUBSTITUTE SHEETS (RULE 26) [0234] [5.4] If the Identification Codes of the banknote, value document/good are not recognized, then the found system generates an internal interrupt signal, which activates the Red LED [2.7] and the two micro-buzzers [2.8] for 2 sec.

[0235] [5.5] If both the first two previous recognitions are correct and the micro-cameras [2.2] are correctly detected by the Controller [2.1], then the logical AND of all of these conditions sets the next process of Veridicity authentication of the banknote, value document/good in the found system, else the latter generates an internal interrupt signal, which activates the Red LED [2.7] and the two micro-buzzer [2.8] for 2 sec.

[0236] [5.6] Acquisition of the source image of the banknote, value document/good under checking from the micro camera [2.2] sensible to the Ultra-Violet (UV) spectrum and comparison with the respective template image recorded in the database of the found system, for the verification of their relative overlap.

[0237] [5.7] If the result of overlapping of these two UV images (Result Of Matching = ROM_UV) is greater than 80% (eighty percent), then this outcome (ROM_UV) is sent to the Veridicity algorithm (V_%) and the system proceeds to the next step. Else, the found system generates an internal interrupt signal for activation of the RED Led [2.7] and the two micro-buzzer [2.8] for 2 sec.

[0238] [5.8] Acquisition of the source image of the banknote, value document/good under checking from the micro camera [2.2] sensible to the Infra-Red (IR) and comparison with the respective template image recorded in the database of the found system, for the verification of their relative overlap.

[0239] [5.9] If the result of overlap of these two IR images

(Result Of Matching = ROM_IR) is greater than 80% (eighty percent), then this outcome (ROM_IR) is sent to the Veridicity algorithm (V_%) and the system proceeds to the next step. Else,

SUBSTITUTE SHEETS (RULE 26) the found system generates an internal interrupt signal for activation of the Red Led and the two micro-buzzer for 2 sec.

[0240] [5.10] Then a specific decimal adimensional weight

(w_i) is assigned by the found system to each of these said two responses (ROM_UV and ROM_IR) , such that: åw_i = 100, each one depending on the area (width x column) of each specific UV and IR template image within the database of banknotes, value documents/goods of the found system, according to the importance of template image designed by the Bank/Authority of emission, so that for any template image retrieved from the database they are computed the related weights:

[0241] [5.10.1] w_UV = [Area of Template Image UV/ (Area of

Template Image UV + Area of Template Image IR) ] x 100;

[0242] [5.10.2] w_IR = [Area of Template Image IR/ (Area of

Template Image UV + Area of Template Image IR) ] x 100.

[0243] [5.11] These weights (w_i) allow the found system to normalize the overlapping results (ROM) of the UV and IR images, with respect to the percentage of Veridicity result (Veridicity: V_%) , by giving more importance to either the UV or IR images prevailing in the database for each specific banknote, value document/good, as designed by each respective Bank/Autorithy of emission .

[0244] [5.12] Then both of these respective weights (w_UV; w_IR) and the two results (ROM_UV and ROM_IR) of the banknote, value document/good under authentication are entered by the found system in the Veridicity algorithm (V_%), for computation of the following percentage:

[ 0 2 45 ] (V_% ) = 100 { [ (W j v) (ROM uv) ] + [ (w IR ) (ROM IR ) ] } / [ (w w ) + (w IR ) ] .

[0246] [5.13] If the percentage of Veridicity (V_%) is less than

70%, then the found system automatically repeats at least 5 times the authentication cycle from blocks [5.6] to [5.12] . If this percentage is still below 70% the found system activates

SUBSTITUTE SHEETS (RULE 26) the flashing of the Red LED [2.7] and micro-buzzers [2.8] for 2 sec .

[0247] [5.14] If, after further alignment by the User of the banknote, value document/good under the found system, the percentage of Veridicity (V_%) becomes higher than 70%, or if it is already detected as higher than 70 %, then the found system activates the Green LED [2.7] for 2 seconds, and eventually the micro-buzzers [2.8] depending on the application (as example for blind and visual impaired people), by automatically confirming the authenticity of the banknote, value document/good .

[0248] [5.15] Thence the found system switches-off the Green

LED [2.7], and eventually the sound from micro-buzzers [2.8], and switches to IDLE menu, by activating the yellow LED [2.7] with fixed light and the cyclic diagnostic checks, while awaiting of a new authentication scan by the User.

[0249] Activation of the micro-buzzers [2.8] can be adjusted by the personnel of the Manufacturer, to meet all the criteria of authentication of the different Users, as in the case of blind and impaired people too.

[0250] The above said optical and acoustic indications of the responses, as well as all said signals, they are detailed for pocket and fixed applications as cited herein, but a plurality of additional indications and signals can be picked-up from the found system, for any application derived from all of these afore said, without changing the scope of the patent herein.

[0251] DESCRIPTION OF INNOVATIVE SAFETY METHODOLOGY

[0252] The found system is characterized by an Innovative Safety Methodology, to protect authentications by thereof, wherein are comprised at least the following operations of its resources:

[0253] a. Secure data exchange between the external PC/Laptop and the found system, ensured by a High Level Secure Shell Crypto-Protocol ( HL_SSH_CYPHER) .

SUBSTITUTE SHEETS (RULE 26) [0254] b. All the internal operations of the found system are embodied in closed loop routines, which are encrypted by the said HL_SSH_CYPHER protocol. Therefore, the application software is not hackerable by people or other malicious software.

[0255] c. Encrypted data storage in an unique encapsulated file, whwrein are comprised at least the 4KCC Algorithm and the UV and IR template images of all the banknotes, value documents/goods available in the world, which is stored in the SD (Secure Digital) micro-memory [2.6], up to its maximum size allowed by the market (today 128GB) .

[0256] d. Supply by e-mail from the Manufacturer to the final User of the said unique encapsulated and encrypted file, for updating of the SD micro-memory [2.6] from remote, in case of emission of new circulating banknotes, value documents/goods by the issuing Banks/Authorities or for updating of the 4KCC Algorithm. The file can easily be downloaded directly into the said SD memory of the found system by the User, when his PC/Laptop is connected to the found system via the USB/OTG port thereof and it is set to ON.

[0257] e. SD (Secure Digital) micro-memory [2.6] recognizable only by the "associated" Controller [2.1] with it. This "association" is made by the Manufacturer, by embedding a secret security code of the said Controller [2.1] in the native security code of the SD micro-memory [2.6], through an automatic SSH (Secure Shell) routine of the found system, commanded on the "Configuration" menu [3.4] open from the PC/Laptop of the personnel's Manufacturer.

[0258] f. External access is permitted to this personnel, only after at least a 12-digit password is input in the Entry Mask of the found system, in case of access to the "Configuration" and "Maintenance" menus, when the found system is connected to the PC/Laptop via its own USB/OTG port and set to ON.

SUBSTITUTE SHEETS (RULE 26) [0259] g. Logging of the credentials of the accessing personnel to the Configuration [3.3 ] or in Maintenance [3.4] menus, in terms of user name, date and time, for any possible further check by the Manufacturer.

[0260] h. In addition, any up-grading of the application software is permitted only to the strict authorized personnel of the Manufacturer, after accessed the afore said Maintenance menu [3.4] and then input at least a 4-digit code in the entry mask of the "Software Maintenance" sub-menu, for further prevention against any infringement of the software from the inner of the Manufacturer .

[0261] i. Any secret password is exclusive property of the

Manufacturer and can only be changed by him over time in manual or automatic mode (eg with AES.256 code) through a routine of the found system.

[0262] The above said optical and acoustic indications of the responses, as well as all said signals, they are detailed for pocket and fixed applications as cited herein, but a plurality of additional indications and signals can be picked-up from the found system, for any application derived from all of these afore said, without changing the scope of the patent herein.

Brief Description of Drawings

[0263] The drawings of the figures and examples of the invention are explained in major details hereafter, with the related number of the figures attached to herein.

[0264] The illustrations of the embodiments described herein are intended only to provide a minimal understanding of the various embodiments and details thereof.

[0265] The illustrations are not intended to serve as a complete description of all of the elements and features of resources and methods utilized for embodying the architectures and/or methods described herein.

SUBSTITUTE SHEETS (RULE 26) [0266] Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be minimized. Accordingly, the text and the figures are to be regarded as illustrative rather than restrictive, only for ease of understanding of the various embodiments of the found system detailed herein.

Fig.1

[0267] [Fig.l] shows the layout of the found system according to the invention herein, by means of a representation in perspective .

[0268] In the same figure, they are shown the overall dimensions of the embodiment of the found system for pocket and fixed applications thereof. Dimensions for OEM applications shall refer to [Fig.2] only.

Fig.2

[0269] [Fig.2] illustrates the Hardware of the found system, according to [Fig. 1] .

[0270] In the same figure, they are shown the fundamental commercial components of the found system, for the extent of applications given in the Hardware Description as afore mentioned herein. None additional components are required in case of OEM applications, since synchronization of the input/output data of the found system can be set from the primary system hosting it.

Fig.3

[0271] [Fig.3] illustrates the Application Software of the found system, according to Fig. 1.

[0272] In the same figure they are detailed all the main menu and the related logical steps embedded in the application software of the found system, with all the relations among these main menus thereof.

SUBSTITUTE SHEETS (RULE 26) Fig.4

[0273] [Fig.4] illustrates a further embodiment of the found system for fixed applications, also useful for access to the Configuration [3.3] and Maintenance [3.4] menus, according to the [Fig.l] and the extents of the invention, as given in the said Detailed Description of software application herein.

Fig.5

[0274] [Fig.5] illustrates the Innovative Authentication

Methodology of the invention, as given in the Description of the Innovative Methodology of Authentication herein.

[0275] The major steps of the innovative authentication are in compliance with: the flow of the application software shown on [Fig.3], the Operation Menu [3.2] and the description of this methodology, given afore herein.

Fig.6

[0276] [Fig.6] illustrates an OEM application of the found system for a continuous cashing machine, operating in this example as an ATM (Automatic Teller Machine), according to the [Fig.2] and the Description of Embodiments given hereafter.

[0277] A plurality of OEM applications can be provided for this invention, due to its ease of interfacing via its USB/OTG port in the Controller [2.1] and the ease of matching with the input/output signals of whatever primary system and PC/laptop of the User.

Description of Embodiments

[0278] Pocket, Fixed, OEM Applications and Limits of the found system

[0279] The found system is characterized by its large versatility of embodiment in a plurality of pocket, fixed and OEM applications, for satisfying any requirements of secure authentication of the different Users, as they given herein.

SUBSTITUTE SHEETS (RULE 26) [0280] A short and not limiting summary of these applications is given below.

[0281] a. Pocket Applications

[0282] The pocket applications of the found system are as that on [Fig.l], wherein the found system permits the viewing of its status LEDs [2.7] and the related acustic warnings by the two micro-buzzers [2.8] to the User, for checking of secure authentication of the banknote, value document/goods and for a prompt monitoring of its temporary or fixed fault conditions.

[0283] The above said optical and acoustic indications of the results, as well as the said signals, are detailed for pocket applications herein, but a plurality of additional indications and signals can be picked-up from the found system for any other affine application, without changing the scope and application of the patent herein.

[0284] b. Fixed Applications

[0285] Fixed applications of the found system they are characterized as that on [Fig.4], wherein the found system is interfaced with a PC/Laptop via its USB/OTG port.

[0286] This permits the remote viewing and listening of the operational status and responses for secure authentication of the banknotes, value documents/goods from the remote desktop of the PC/Laptop, regardless the local LEDs [2.7] and micro-buzzers [2.8] on the found system.

[0287] The found system can meet a plurality of USB communication requirements when connected to its USB/OTG port.

[0288] Through this communication port the found system can be connected to a modem/router for driving thereof from any remote location of the user.

[0289] The above said optical and acoustic indications of the results, as well as the said signals, are detailed for fixed applications herein, but a plurality of additional indications

SUBSTITUTE SHEETS (RULE 26) and signals can be picked-up from the found system for any other affine application, without changing the scope and application of the patent herein.

[0290] c. OEM (Original Equipment Manufacturer) Applications

[0291] OEM applications of the found system are characterized to operate as "Secure Authentication Device" (SAD), wherein the found system provides in a secure mode the primary system with:

[0292] c.l. its operational status and possible major failures thereof ;

[0293] c.2. secure authentication responses for each banknote, value document/good, or refusal for absence thereof in the secure database, stored in the SD micro-memory [2.6] of the found system;

[0294] c.3. secure updating transaction from remote for replacement of the unique file of both template images and 4KCC algorithm, stored in the SD micro-memory [2.6];

[0295] c.4. secure access to only the authorized personnel for local or remote generic maintenance actions thereof;

[0296] c.5. logging of any access to the found system by the authorized personnel to the local or remote sites of the primary system .

[0297] The above said optical and acoustic indications of the results, as well as the said signals, are detailed for pocket, fixed and OEM applications herein, but a plurality of additional indications and signals can be picked-up from the found system for any other affine application, without changing the scope and application of this patent.

[0298] d. General Limits and Features of Embodiments

[0299] The found system has not limits of use due its specific evaluation of the heterogeneity of images, the sole limit of embodiment it could only be given by the size of the SD micro memory [2.6] of the found system.

SUBSTITUTE SHEETS (RULE 26) [0300] Therefore, the found system has none limitations of use by its functionality, apart from the operating tolerances given in the description herein, but only for the physic size of the SD memory [2.6], which is set to 128GB today.

[0301] The size of the SD memory [2.6] of the found system can be provided up to cover all the currencies of countries recognized worldwide today, excluding the value documents and goods for which the system may be easily characterized by the manufacturer, to guarantee the maximum performance of secure authentication of all of them in the World.

[0302] The updates of the found system are easy and safely managed, since all the updated files exchanged among the Manufacturer, its dealers and the Users are encapsulated into a unique encrypted file by the Manufacturer, so as to be copied without any access inside its secure package.

[0303] The User, after providing the Manufacturer with the

Serial Number and ID Number of the purchased found system, read on the case [2.9] thereof, he can download any updated file via e-mail and safely replace the older, at extremely cheaper costs.

[0304] In view of the wide variety of embodiments to which the principles and features discussed above can be applied, it should be apparent that the above said embodiments are illustrative only and should not be taken as limiting the scope of this invention.

[0305] Rather, we claim as our invention all such modifications as may come within the scope and spirit of the claims and equivalents thereof.

[0306] Many other embodiments may be apparent to those people skilled in the art, when reviewing the field of use of the found system .

[0307] For example, other embodiments may be utilized and derived from the secure authentication, such that structural and

SUBSTITUTE SHEETS (RULE 26) logical substitutions and changes may be made without departing from the scope of the found system herein.

Examples

[0308] A sample of a pocket application of the found system is given in [Fig.l] .

[0309] A sample of fixed application of the found system is given in [Fig.4] .

[0310] A sample of an OEM application of the found system is given in [Fig.6] .

Industrial Applicability

[0311] Any Manufacturer qualified for IoT (Internet of Things) smart components can produce the found system. The production tools, as well as all the deliverable parts and documentation package for industrialization and certification of the found system can all be easily developed in conformity with the applicable International Law and Rules, as well as EN and ISO norms .

[0312] Manufacturers will understand that the found system and methodologies described above can be implemented using a variety of hardware and software application systems, but with the architecture and methodologies of secure authentication as given herein .

[0313] Alternatively, dedicated hardware, or programmable logic circuits, can be employed for such operations, as chosen by the Manufacturers, without any prejudice on the present invention or in limiting the extension thereof to other applications requiring these architectures and methodologies of the found system .

[0314] It is outlined at this purpose that the cited applications are just exemplary implementations of the present invention .

SUBSTITUTE SHEETS (RULE 26) [0315] It will be recognized by personnel skilled in the present art, that a great number of variations on these basic applications exists, because of the methodology of cross- assessing of heterogenic key-features of value images by the 4KCC algorithm, executed within the security environment ensured by the related methodology herein.

[0316] The afore mentioned embodiments have illustrated only a few applications of the technology detailed herein.

[0317] Therefore there are many others applications to be included in the extent of this invention, falling as per example in the various industrial applications of image authentication for security purposes.

[0318] For example, the secure authentication illustrated in [Fig.5] can include more or less key-features to be assessed by the 4KCC algorithm, so as to dilate the extent of this algorithm to cover any detection of key feature images sensible to visible and invisible fields, other than UV and IR spectra, as in the case of Soft-X Ray Technology and Raman Luminescence.

[0319] Of course, the strength of the response of the algorithm and therefore of its quantitative outcome will increase as the quantity of assessed key-features increases accordingly.

[0320] We also outline that while the present invention has been described by disclosing a 4KCC algorithm to set a secure authentication of banknote, value document/goods based upon only some fundamentals key-features, it can be mathematically manipulated to achieve a more effective assessment of the source images of the banknote, value document/goods, by including some other images of key-features embedded therein, with the same requirements of secure authentication.

[0321] Moreover, while we have outlined specific relationships between the weights (w_i) and the respective areas (width x columns) of the UV and IR images within the template data base of the found system, the present invention is intended to

SUBSTITUTE SHEETS (RULE 26) encompass other relationships between relative weight and key- features in the characteristics domain of banknote, value document/goods , to enhance the level of reliability of the authentication thereof.

[0322] These relationships can be used as enhancer of the level of reliability of the responses, for a major refinement of any application hosting our 4KCC algorithm.

[0323] It is immediately evidenced that our inventive methodologies can be expanded to some other value things, as value documents (titles, shares, etc.) and value goods (videos, etc.) and other imaged-based secure authentication means too, as color photo-copying printers and some others.

[0324] In case the found system is hosted in any color photocopyng printer, it can recognize when a value document/good has legal codes, to prevent illegal replication thereof, as in the case of state titles or other valued stocks in general, by inhibit the copies thereof in the machine by generating suitable signals to the primary system.

[0325] In addition, a video frame may include a secure invisible authentication feature (e.g. in background of video images), which can be checked by the found system at video start-up, to inhibit the shooting thereof, or marking it with a ever-still symbol/written warning of illegal copy thereof.

[0326] These security features may also be applied as a marking tool and to prevent unauthorized distribution of videos marked as here above.

[0327] In general, all of the responses of these said secure authentications can be set visible in such document/goods and videos by the found system, as a deterrent against illegal copies thereof.

[0328] As consequence, new processes suitable for secure automatic authentication can be designed with this innovative identification methodology [Fig.5], to be consistent with the

SUBSTITUTE SHEETS (RULE 26) plurality of industrial sectors that use these data as a reference to any level of reliability and security thereof.

Reference Signs List

[0329] Not Applicable to this invention.

Reference to Deposited Biological Material

[0330] Not applicable to this invention.

Sequence Listing Free Text

[0331] A CE Certification can be released by the Manufacturer in compliance with UE Laws and Rules on the matter of this invention. Therefore compliance with national and UE security prescriptions for use and maintenance of this found system can be fulfilled without any constraints. Additional international standards can also be included in the CE Certification of the invention or in stand alone certifications, as required by Law to cover all the possible embodiments of the found system.

Citation List

[0332] [...] www . new—euro—banknote/value documents. eu

[0333] [...] www.federalreserve.gov

[0334] [...] www.worldbank.org

[ 0335 ] [...] https : / /www . tutorialspoint . com/ computer_security/ index

. htm

[0336] [...] Ji Woo Lee, Hyung Gil Hong, Ki Wan Kim and Kang

Ryoung Park, A Survey on Banknote Recognition Methods by Various Sensors, Sensors Vol. 17, 313; doi : 10.3390/sl7020313, Review

2017.

[0337] [...] Automated Teller Machine. Available online: http : / /www . moxa . com/vert ical_market s / atm/ATMSolut ion . htm

(accessed on 1 October 2016) .

SUBSTITUTE SHEETS (RULE 26) [0338] Money Counters . Available online : http : / /www . accubanker . com/ collections/money-counters ( accessed on 1 October 2016) .

[0339] [...] Vending Products. Available online: http : / /www . meigroup . com/ asia/vending/vending_product s / ( accessed on 1 October 2016) .

[0340] [...] Serial Numbers—Series Year and Serial Number

Relationship Table. Available online : https : / /www . moneyfactory . gov/ seriessntable . html (accessed on 1 October 2016 ) .

[0341] [...] Superdollar. Available online: https://en.wikipedia.org/wiki/Superdollar (accessed on 1 October 2016) .

[0342] [...] . Pham, T.D.; Park, Y.H.; Kwon, S.Y.; Park, K.R.;

Jeong, D.S.; Yoon, S. Efficient banknote recognition based on selection of discriminative regions with one-dimensional visible-light line sensor. Sensors Vol. 16, 328, 2016.

[0343] [...] . Doush, I.A.; Al-Btoush, S. Currency recognition using a smartphone: Comparison between color SIFT and gray scale SIFT algorithms. J. King Saud Univ. Comput . Inform. Sci., 2016.

[0344] [...] . Youn, S.; Choi, E.; Baek, Y.; Lee, C. Efficient multi-currency classification of CIS banknotes. Neurocomputing Sciences Vol. 156, pp 22-32, 2015.

[0345] [...] Park, Y.H.; Kwon, S.Y.; Pham, T.D.; Park, K.R.;

Jeong, D.S.; Yoon, S. A high performance banknote recognition system based on a one-dimensional visible light line sensor.

Sensors Vol. 15, pp 14093-14115, 2015.

[0346] [...] Daryl Martin, Basic Lighting Techniques for Machine

Vision, December 2014.

[0347] [...] Kim, E.; Turton, T. The next generation banknote project. Bull. Reserve Bank Aust . pp 1-12, 2014.

SUBSTITUTE SHEETS (RULE 26) [0348] [...] . Liu, Y.; Zeng, L.; Huang, Y. Haar-SVM for real-time banknotes recognition. J. Inf. Comput . Sci., Vol . 11, pp 4031-

4039, 2014.

[0349] [...] . Jouni Takalo, Jussi Timonen, Jouni Sampo, Maaria

Rantala, Samuli Siltanen and Matti Lassas, Using the fibre structure of paper to determine authenticity of the documents: Analysis of transmitted light images of stamps and banknote/value documents, Forensic Science International, Vo1.244, pp . 252-258, 2014.

[0350] [...] . Liu, X.; Liu, C. Paper currency CIS image fuzzy enhancement and boundary detection. Appl . Mech. Mater., Vol. 651-653, pp 2356-2361, 2014.

[0351] [...] . E. W. Corbett, Not So Funny Funny-Money: The Threat of North Korean Counterfeiting of U.S. Currency, Stevenson University Forensics Journal, vol. 4, pp . 14-22, 2013.

[0352] [...] . Arcangelo Bruna, Giovanni Maria Farinella, Giuseppe

Claudio Guarnera, Sebastiano Battiato: Forgery Detection and Value Identification of Euro Banknote/value documents; Sensors, 13, pp 2515-2529, 2013.

[0353] [...] . Gai, S.; Yang, G.; Wan, M. Employing quaternion wavelet transform for banknote classification. Neurocomputing, Vol. 118, pp 171-178, 2013.

[0354] [...] . Mariana R. de Almeida a, Deleon N. Correa a,b,

Werickson F.C. Rocha c, Francisco J.O. Scafi b, Ronei J. Poppi, Discrimination between authentic and counterfeit banknote/value documents using Raman spectroscopy and PLS-DA with uncertainty estimation, Microchemical Journal, Vol. 109, pp . 170-177, 2013.

[0355] [...] . Guedes A., M. Algarra, A. Carmelo Prieto, B.

Valentin, V. Hortelano, S. Neto, R. Algarra, and F. Noronha, Raman microspectroscopy of genuine and fake Euro banknote/value documents, Spectroscopy Lett., An international Journal for Rapid Communication, 46:8, pp 569-576, 2013.

SUBSTITUTE SHEETS (RULE 26) [0356] [...] . Hasanuz zaman, F.M.; Yang, X.; Tian, Y. Robust and effective component-based banknote recognition for the blind. IEEE Trans. Syst. Man. Cybern. Com. Appl . Rev. 42, pp 1021-1030, 2012.

[0357] [...] . Hasanuz zaman, F.M.; Yang, X.; Tian, Y. Robust and effective component-based banknote recognition by SURF features. In Proceedings of the 20th IEEE Annual Wireless and Optical Communications Conference, Newark, NJ, USA, pp . 1-6, 15-16 April

2011.

[0358] [...] . Woo June Choi, Gihyeon Minj, Beyong Ha Lee, Jonghyun

Eom, and Ju Wan Kim, Counterfeit detection using characterization of safety feature on banknote/value document with full-field optical coherence tomography, J. Opt. Soc. Korea, vol. 14. no 4, pp . 316-320, 2010.

[0359] [...] . De Heij H.A.M., Innovative approaches to the selection of banknote/value document security features, De Nederlandsche Bank N.V., presented at The Conference on Optical Security and Counterfeit Deterrence, San Francisco, 20-22 January, 2010.

[0360] [...] . Gai, S.; Liu, P.; Liu, J.; Tang, X. The design of

HMM-based banknote recognition system. In Proceedings of the IEEE International Conference on Intelligent Computing and Intelligent Systems, Shanghai, China, pp . 106-110, 20-22

November 2009.

[0361] [...] . Allen L., The Encyclopedia of Money, 2nd edition,

ABC-CLIO, LLC, Santa Barbara, California, US, 2009.

[0362] [...] . C.E.H. Berger, Objective paper structure comparison through processing of transmitted light images, Forensic Science International, 192, pp . 1-6, 2009.

[0363] [...] . T. H. Chia, and M. J. Levene, Detection of counterfeit U.S. paper money using intrinsic fluorescence lifetime, Optics Express, vol 17, no. 24, pp . 22054-22061, 2009.

SUBSTITUTE SHEETS (RULE 26) [0364] [...] . Scherrer N.C., Zumbuehl S., Delavy F., Fritsch A. Kuehnen R., Synthetic organic pigments of the 20th and 21st century relevant to artist's paints: Raman spectra reference collection, Spectrochimica Acta Part A: Molecular and

Biomolecular Spectroscopy, 73, pp 505-524, 2009.

[0365] [...] . A. Vila, N. Ferrer, J. Mantocon, D. Breton, and J.F.

Garcia, Development of a fast and non-destructive procedure for characterizing and distinguishing original and fake euro banknote/value documents, Analytica Chimica Acta, vol. 559, no. 2, pp . 257-263, 2006.

[0366] [...] Kagehiro, T.; Nagayoshi, H.; Sako, H. A hierarchical classification method for US bank notes. In Proceedings of the IAPR Conference on Machine Vision Applications, Tsukuba Science City, Japan, pp . 206-209, 16-18 May 2005.

[0367] [...] . Ahmadi, A.; Omatu, S.; Kosaka, T.; Fujinaka, T. A reliable method for classification of bank notes using artificial neural networks. Artif. Life Robot., Vol. 8, pp 133- 139, 2004.

[0368] [...] . Ahmadi, A.; Omatu, S.; Kosaka, T. A PCA based method for improving the reliability of bank note classifier machines. In Proceedings of the 3rd International Symposium on Image and Signal Processing and Analysis, Rome, Italy, pp . 494-499, 18-20

September 2003.

[0369] [...] . V. Rusanov, KChakarova, and T.Madolev, Mossbauer spectroscopy investigation of the properties and stability of dollar bank note pigments, Appl . Spectroscopy, vol. 56, no. 9, pp. 1228-1236, 2002.

[0370] [...] . K. Niskanen, Paper physics, papermaking science and technology, vol. 16, Fapet, 1998.

[0371] [...] . E. Green, W. Weber, Will the new $100 bill decrease counterfeiting?, Federal Reserve Bank of Minneapolis, Quarterly Review , vol 20, no. 3, pp . 3-10, 1996.

SUBSTITUTE SHEETS (RULE 26) Patent Literature

[0372] Disclosures of some most significant patents and applications hereafter do not change the scope of our innovative invention, for the particularity of the whole innovative solution discovered for the found system.

[0373] The particular combinations of elements and features in the above-detailed embodiments are exemplary only. The interchanging and substitution of these embodiments with others in these applications and the incorporated-by-reference patents/applications are also contemplated, if any.

[0374] A brief list of the referenced PTL is given below, for a greater understanding of the importance of our invention than the existings ones.

[0375] PTL1: United States Patent 2013-8600145, Method for processing banknote/value documents;

[0376] PTL2 : United States Patent 2010-7715613, UV counterfeit currency detector;

[0377] PTL3 : United States Patent Application 2008-20080069427, Verification method for determining areas within an image corresponding to monetary banknotes;

[0378] PTL4: United States Patent Application 2005-20050139681, Optoelectronic document reader for reading UV/IR visible indicia;

[0379] PTL5: United States Patent 1996-5444263, Instrument for the visual recognition of authenticity features in banknote and security documents;

Non Patent Literature

Not Applicable to this invention.

SUBSTITUTE SHEETS (RULE 26)