Abstract:
Each copy of software (9) is assigned a unique identifying code pattern (27) which is printed on all documents (19) produced with that software (9) by a high resolution printer (17). The unique identifying code pattern (27) is a plurality of spaced apart marks having a size no greater than about 300 dpi, and is therefore, at best, barely noticeable to the human observer. The "invisible signature" is also reproduced on documents (19) made by unauthorized copies of software (9) which can therefore be traced. Preferably, the unique identifying code (27) is replicated multiple times (27>1 5 1 5 1 5
Abstract:
Each copy (19) of software, such as software used by a digital computer (3) to create a document and the software used by printers (47), facsimile machines (77) or digital copiers (61) to produce or reproduce documents, is assigned a unique identifying code pattern (27) which is printed on all documents (19) produced with that software by a high resolution printer. The unique identifying code pattern (27) is a plurality of spaced apart marks (29) having a size no greater than about 150 dpi and preferably about 300 dpi, and is therefore, at best, barely noticeable to the human observer. The "invisible signature" permits detection of documents (19) made by unauthorized copies of software or by unauthorized or improper use of authorized copies. Preferably, the unique identifying code (27) is replicated multiple times (271-275) over the document (19) using an error correcting code to assure that at least one replication will be clear of matter selected for printing by the software. A high resolution scanner (21) extracts and identifies the code patterns (271-275) printed on the document (19). In systems (1) where the software generates a print file (11) for the high resolution printer, print commands for the pattern replications (271-275) are interspersed with the other print commands making identification and removal of the commands very difficult and not worth the effort since the "invisible signature" does not prevent copying of the software or noticeably detract from the appearance of the finished document (19).