Technique for Tracking Confidential Documents More Reliably
Original Publication Date: 1989-Sep-01
Included in the Prior Art Database: 2005-Jan-28
High-security documents used in business and government are currently protected by assigning to each copy a number, and charging each recipient with responsibility for the copy entrusted to him. A central recording system operated by the originator keeps track of who has possession of each copy. This technique is ineffective as a means of determining the source of a security leak, since the number on the document can be obscured during the photocopying process. Security is made more effective by making it difficult or impossible to remove the telltale identification. An implementation of this solution is a copy- making process which satisfies the following criteria. 1.Each copy produced must be unique. 2.