A Tamper-evident Ink

被引:0
|
作者
Hayashi, Toshiki [1 ]
机构
[1] Natl Printing Bur Japan, Tokyo, Japan
关键词
chemistry; color difference; functional inks; polymerization; security printing;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ink on checks used for payment contains a reactive substance that thwarts chemical tampering. This is known as isochromatic pair ink, and contains two or more ink types that appear isochromatic despite their different dye/pigment compositions thanks to careful selection of colorants in precise amounts. They appear identical until tampered, at which point they change color due to dye dissolving. In the work reported here, an isochromatic polymerizable dye and a non-polymerizable dye were used to address issues associated with isochromatic pair ink, such as the high level of expertise required for its manufacture and deterioration of isochromatic property due to dye decomposition. The two dyes were synthesized. The print matter produced with a pair ink made using them showed good isochromatic and tamper-evident properties. The polymerizable dye dissolved less than non-polymerizble dye did thanks to stability stemming from copolymerization with the UV varnish using its polymerizable unit, while non-polymerizble dye did not have such stability.
引用
收藏
页码:144 / 149
页数:6
相关论文
共 50 条
  • [1] THE GREENING OF TAMPER-EVIDENT CLOSURES
    MULLER, CH
    [J]. DRUG & COSMETIC INDUSTRY, 1985, 136 (06): : 35 - &
  • [2] Brief announcement: Tamper-evident stabilization
    Michigan State University, Houghton
    MI
    49931, United States
    不详
    MI
    48824, United States
    [J]. Lect. Notes Comput. Sci., (355-358):
  • [3] Brief Announcement: Tamper-Evident Stabilization
    Hajisheykhi, Reza
    Ebnenasir, Ali
    Kulkarni, Sandeep S.
    [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2014, 2014, 8756 : 355 - 358
  • [4] Trusted Tamper-Evident Data Provenance
    Taha, Mohammad M. Bany
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 646 - 653
  • [5] EXPANSION CONTINUES IN TAMPER-EVIDENT PACKAGING
    不详
    [J]. PACKAGE ENGINEERING, 1983, 28 (06): : 52 - 54
  • [6] Finding the evidence in tamper-evident logs
    Sandler, Daniel
    Derr, Kyle
    Crosby, Scott
    Wallach, Dan S.
    [J]. SADFE 2008: THIRD INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2008, : 69 - 75
  • [7] Implementing a tamper-evident database system
    Miklau, G
    Suciu, D
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 28 - 48
  • [8] Basing cryptographic protocols on tamper-evident seals
    Moran, Tal
    Naor, Moni
    [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (10) : 1283 - 1310
  • [9] The unintended effects of tamper-evident food closures
    Orlowski, Marissa
    Lefebvre, Sarah
    Boman, Laura
    [J]. INTERNATIONAL JOURNAL OF HOSPITALITY MANAGEMENT, 2022, 107
  • [10] TAMPER-EVIDENT - DIMENSIONS IN DECISION-MAKING
    不详
    [J]. PACKAGE ENGINEERING, 1983, 28 (07): : 80 - &