4.6 Article

Physically unclonable security patterns created by electrospinning, and authenticated by two-step validation method

Journal

NANOTECHNOLOGY
Volume 33, Issue 9, Pages -

Publisher

IOP Publishing Ltd
DOI: 10.1088/1361-6528/ac3b0d

Keywords

InZnP; ZnS; DDT colloidal nanoparticle; quantum dots; fluorescent ink; electrospinning; security patterns; anticounterfeiting

Funding

  1. Quantag Nanotechnologies

Ask authors/readers for more resources

Counterfeiting is a growing problem, and this study proposes an anticounterfeiting technology that utilizes random and inimitable patterns as security tags. The patterns are detectable under UV light and invisible in daylight. By collecting images of the patterns using a smartphone microscope, a database of original patterns is created for authenticity verification. Additionally, a handheld spectrometer is used to obtain the spectral signature of the patterns, enabling a second-step verification. This technology combines ink formula, unclonable security pattern creation, and two-level verification for effective anticounterfeiting.
Counterfeiting is a growing economic and social problem. For anticounterfeiting, random and inimitable droplet/fiber patterns were created by the electrospinning method as security tags that are detectable under UV light but invisible in daylight. To check the authenticity of the original security patterns created; images were collected with a simple smartphone microscope and a database of the recorded original patterns was created. The originality of the random patterns was checked by comparing them with the patterns recorded in the database. In addition, the spectral signature of the patterns in the droplet/fiber network was obtained with a simple and hand-held spectrometer. Thus, by reading the spectral signature from the pattern, the spectral information of the photoluminescent nanoparticles was verified and thus a second-step verification was established. In this way, anticounterfeiting technology that combines ink formula, unclonable security pattern creation and two-level verification is developed.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available