Home | Consultancy | Training | Publications | Industry Info | About Us | Contact
Publications


Title Interactive Overt Features Type Report

Published April 2003 Edited/Updated 2010

Price (minus VAT) �95.00 (US$160.00)

We offer two payment options - 1. Payment with credit or debit card with PayPal, or 2. Download and post our order form. Please choose the option that best suits you.

Option One
Price with Postage

Option Two
Download our Order Form
and post it to us.



1. Overview
1.1 Introduction
1.2 The multi-functional authentication device
1.3 Definition of security levels
1.4 Interactive Overt Features
1.5 Applications for Interactive Overt Features
2. Security Features
2.1 Introduction
2.2 Visual Features
2.2.1 Paper / Substrate Features
2.2.2 Print / Ink Features
2.2.3 Foiling and Coating Features
2.3 Contact Features
2.3.1 Paper / Substrate Features
2.3.2 Print / Ink Features
2.3.3 Foiling and Coating Features
2.4 Audible Features
2.5 Taste Features
2.6 Olfactory Features
2.7 Combination Features
3. Summary
4. Future Developments
Glossary


Published in April 2003, this report provides an overview of security features and technologies that interact with the person undertaking the authentication of the product or packaging. It discusses verification techniques that employ human senses and explains how these can provide effective and innovative security systems that are sophisticated but do not require complex reading equipment.

There is a great diversity of technologies available for brand protection and document security, with an equally varied range of applications and authentication methods. This report focuses on interactive overt features. These are security features that are obvious and readily recognised and that can be actively authenticated by relatively unskilled or untrained users. Although brand and document protection is a serious issue, the introduction of a fun element can encourage or promote the authentication process. Therefore marketing elements may be able to serve a more serious role of security and protection.

The features and devices described in this report require no specialised viewing or reading equipment. Instead, they rely on the human body to act as a multi-functional authentication tool.