Your SlideShare is downloading. ×
Scrambled Indicia
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Scrambled Indicia

1,430
views

Published on

Graphic Security Systems Corp.

Graphic Security Systems Corp.


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,430
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. GSSC has provided its patented security technology to government-authorized security printing firms and major corporations for more than thirty years. www.graphicsecurity.com
  • 2. Our technology protects billions of printed packages and documents every year. You can count on consistent quality and seamless, unobtrusive integration into your product or package design and production process. This can generally be done regardless of the technology you use: digital, etching, flexography, gravure, holography, intaglio, letterpress, lithography, silkscreen… www.graphicsecurity.com
  • 3. www.graphicsecurity.com
  • 4. www.graphicsecurity.com
  • 5. …and much more! www.graphicsecurity.com
  • 6. Digital Document Security. Doc-U-Lok® is a Scrambled Indicia® based technology designed specifically to protect “one of a kind” documents. Doc-U-Lok® software generates a personalized image file, which contains encrypted variable information (client name, account number, document ID, etc.) that uniquely identifies the document. The file is inserted into the document and printed with it. www.graphicsecurity.com
  • 7. Safe & Secure Trouble-Free Encoding. Authentication. Invisible to the naked eye. Easily reveal differences. Cannot be copied or cannibalized. Can be decoded optically or digitally. www.graphicsecurity.com
  • 8. Tampering with variable data in document Fraudulent alteration of electronic documents Unauthorized printing of electronic documents Tracking the document/label origination Contracts, checks, mortgage coupons, payment receipts, identity documents, birth certificates, tax receipts, hazmat trip permits, labels… Doc-U-Lok ® Strip www.graphicsecurity.com
  • 9. On February 8th, 2009 this article was released in the Delta Democratic Times: Police, IRS search for alleged forger By TERRI FERGUSON SMITH terriferguson@ddtonline.comSunday, February 8, 2009 12:59 AM CST GREENVILLE - Police are looking for a woman accused of making fake W-2 forms to file false tax claims. “We are investigating a case involving counterfeit W-2s,” said Captain Andrew Kaho of the Greenville Police Department. “The investigation has been going on about two weeks now. We were contacted by the IRS in reference to a local tax preparer who had a counterfeit W-2 in their possession. They immediately contacted the IRS and the IRS contacted us.” Kaho identified the woman suspected of counterfeiting the tax forms as Patricia Thomas, 34, of 507 Cornell St. Police executed a search warrant at her home and found more than 75 counterfeit W-2s and a typewriter that the forms were being typed on, Kaho said. However, Thomas was not at home and police have a warrant for her arrest on a charge of conspiracy to utter forgery, Kaho said. The Police Department is working with the IRS in the ongoing investigation. “Some of them are real names because they do have legitimate businesses on these W-2s,” Kaho said. “We're in the process of contacting the businesses and the people whose names are on these W-2s. We're trying to get as much cooperation from them as possible. www.graphicsecurity.com
  • 10. Variable data from document is Anti-tamper static data is encrypted at a different angle Doc-U-Lok®Doc-U-Lok® strip. encrypted in a in the same strip. www.graphicsecurity.com
  • 11. Other information on the document, such as Document contains a barcode or serial Doc-U-Lok strip number can also be encrypted with data protected. that matches the document. www.graphicsecurity.com
  • 12. Our proprietary software embeds hidden images and information in photo identification documents. The hidden information in the document is directly linked to the visual data printed on the document. The only security feature that protects against all forms of document fraud: • Counterfeiting • Alteration • Photo Substitution • Cannibalization *Does not affect facial recognition software. www.graphicsecurity.com
  • 13. Static “VALID” message is Variable data is revealedlogo and name are revealed Static in photo throughout the card. revealed in hologram. and compared to data on card. www.graphicsecurity.com
  • 14. Authentication: Requirements:is embedded into the The following data background and photo of the Drivers License: 1. Driver’s License is scanned. 1. Flatbed or Pass-Through scanner with minimum 300DPI resolution 2. Acquired Driver’s License image is decoded. 2. Driver’s License encoded with VIP®Photo 3. Digital Decodertm software. •Cardholder’s Name •Date of Birth •Issuing State www.graphicsecurity.com
  • 15. Seamlessly integrated product and packaging security. • Can be layered with overt identifiers such as color-shifting ink and holograms. • Won’t affect existing graphics. • Can be etched, stamped or embossed in metal , plastic and paper. • Easily decoded optically or digitally. • Special inks such as UV, IR, varnish, etc. • Tamper-proof and copy-resistant. www.graphicsecurity.com
  • 16. Multi-layered SI allows for additional decoder over nameplate Place optical data to be encrypted at other angles. to reveal encrypted SI data. www.graphicsecurity.com
  • 17. Multi-layered SI allows for additional data to be encrypted at other angles. www.graphicsecurity.com
  • 18. Durable, easily-integrated security label with SI. Printed, engraved, embossed or laser etched SI nameplate. www.graphicsecurity.com
  • 19. USPS Stamps Holograms www.graphicsecurity.com
  • 20. Angle#1 Decoded Angle#2 Decoded www.graphicsecurity.com
  • 21. www.graphicsecurity.com
  • 22. Below is a list of some of our clients USPS – 28 stamps for your reference: More than a billion printed! • United States Postal Service • U.S. Passport • New York City Welfare Stamps • General Motors, Chrysler & Toyota automobiles • Gift Certificates for Macy’s & Boots, etc. • Belgium Passport • Lotteries in Costa Rica, Honduras, Guatemala • Hong Kong Passport • Zaire Passport • Currencies of Uruguay, Oman and others • Transportation Passes for multiple countries • Tariff Stamps for multiple countries • Hang Tags for numerous designer clothing companies • Pharmaceutical packaging • SI ® added into the holograms Land certificates • Birth certificates and hot-stamp foils • Shipping documents *Due to the nature of our business and the non-disclosure agreements we abide by, we can only provide document protection type clients. In the brand protection area, it is important to keep a tight lip when current client discussions arise. Brand owners invest a lot of time, energy and money into protecting their intellectual property and we need to help them keep the technology used in their products under the radar. In the case of most document protection projects, we are typically in an open-bid environment and it is public knowledge who is offering what. www.graphicsecurity.com
  • 23. •World’s first compact portable forensic lab, available anytime & anywhere •3 in 1 device. Standard Digital Camera & and a High Power Microscope and UV LED •Built in Adjustable LED Lighting •High Resolution 6 mega-pixel Canon Camera •10x, 20x and 30x objective lenses available giving a magnification range of 10x to 150x •Cost Effective Offering with Powerful Functions •Instant on-site authentication •Excellent decoding •Independent Light Source •No need for a PPC removal •On-site quality control of printed encoded images •Enables usage of a non existing optical frequencies and Minimum Density Structure Infra-Red option www.graphicsecurity.com
  • 24. Digital Mobile www.graphicsecurity.com
  • 25. www.graphicsecurity.com
  • 26. Printing Security Covert Variable Ease of Authentication Process Availability Cost Level Level Information Integration Process Change GSSC Optical      $$ Scrambled Web-Based Proprietary Indicia Digital/ Mobile Special Inks      $ - $$ (UV, OVI, Available Optical Thermal) Widely -     $$$ Holograms Optical Available Security -     $$$ Fibers and Available Optical Threads Digital Digital      $$$ Proprietary Watermarks Web-Based Widely      $ Microtext Optical Available -     $$$ Taggants Available Digital Micro- -     $$$$ Available Forensic L-III Taggants www.graphicsecurity.com
  • 27. Or contact us at: 4450 Jog Road Lake Worth, FL 33467 (866) 355-2772