EP2540519A1 - A data carrier and a method of personalizing a data carrier - Google Patents
A data carrier and a method of personalizing a data carrier Download PDFInfo
- Publication number
- EP2540519A1 EP2540519A1 EP11305815A EP11305815A EP2540519A1 EP 2540519 A1 EP2540519 A1 EP 2540519A1 EP 11305815 A EP11305815 A EP 11305815A EP 11305815 A EP11305815 A EP 11305815A EP 2540519 A1 EP2540519 A1 EP 2540519A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- carrier
- face
- data carrier
- window
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/24—Passports
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M3/00—Printing processes to produce particular kinds of printed work, e.g. patterns
- B41M3/14—Security printing
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- B42D2033/04—
Definitions
- the invention relates to a data carrier and in particular but not exclusively to a data carrier in the form of an identity card or passport.
- the invention relates to documents with encrypted security features.
- Data carriers such as security documents are usually carried by a bearer and used at control points such as airport check-ins.
- the security procedures used at the control points check the authenticity of the document and the fact that it has not been corrupted. These checks are usually made by a security agent.
- the potential corruption of certain critical features of the document are checked, including the picture of the bearer, his or her name and social security number, the document number or the name of the authority that granted the identity card or the passport.
- critical features are features introduced upon a personalization step when issuing the data carrier so the data carrier is linked just to the bearer.
- the critical features are typically the picture of the bearer but other features that are personal to the bearer can be used, for example finger prints or data on the data carrier that is linked to a separate carrier of data, such as a photograph that the bearer has with him or her.
- the data carriers that are intended to have a security feature are often manufactured and delivered to the granting authority in a semi-finished state, the granting authority being left with the personalization elements that are personal to the bearer on a case by case basis.
- Known methods of corruption of a data carrier include modification or replacement of an isolated critical feature, such as the portrait photo of the bearer.
- encrypted graphics are graphic features that are invisible for the eyes of a human person, but that can be revealed for the eyes of the human person with an adequate optical system, known as revealing device.
- Encrypted graphics can help a security agent to determine that the document was not corrupted, since those encrypted graphics are difficult to reproduce.
- the encrypted graphics is co-printed or co-engraved, or more generally collocated (or intimately grouped together) with a critical feature (for example the portrait picture), i.e. if it lies in the same zone of material, the authenticity of the critical feature itself is guaranteed, since modification or replacement of the critical feature would have necessary impacted the encrypted graphics.
- a critical feature for example the portrait picture
- the critical feature must first be observed without the revealing device, in order to perceive all subtle details of its visual information with no distortion caused by the encrypted graphics.
- Subtle details may include, for example, details of the physical person's face presented in a photo, like the eyes of said person.
- the document is observed with the revealing device to check the presence and integrity of the encrypted graphics.
- the security agent needs to have a revealing device with him or her enabling the decoding of the encrypted graphics, This is a major drawback, as various circumstances can require the data carrier to be checked unexpectedly, at a distance from the security office where the revealing device or system is likely kept. Furthermore, having to use a revealing device involves an extra step in the checking of documents as first the personalization features and then the encrypted features are checked which adds time to the checking process.
- Known revealing devices include the use of a revealing component such as a revealing lens, network or filter in a foldable sheet or sheet fraction of the document that is being checked.
- This revealing component can be superimposed with the surface bearing encrypted graphics to reveal the encrypted graphics to the person having the document in their possession.
- Co-printed critical features and encrypted graphics of the document are placed on an opaque or opacified sheet surface.
- the revealing component is attached or integrally formed with a regular page of the document.
- a problem with such known systems for the authentication of the data carrier is that they require the manual operation of folding the document or its sheets and superimposing the revealing components and the encrypted graphics. Such operation, when performed a large number of times, like at an airport control desk, is cumbersome. Furthermore, such a solution also leaves open the issue of providing authentication to a non-foldable data carrier, such as a polycarbonate card serving as an identity card or included in a passport.
- a window in a card extending in the thickness of the card in a manner allowing the light to go through the card, the window including a revealing lens or network.
- Such card also includes hidden information comprised in personal data specific to the in a way that it is not to reveal the hidden information with the window, because it would require folding the card to have the window and the hidden information coincide.
- a security agent needs to use another such card (revealing card), which can be his own personal security document or that of another individual, and, superimpose the two cards in such a way that the position of the window of the revealing card matches with the position of the hidden information of the card to authenticate. This requires having the two cards aligned one with each but with the second card shifted from the first one parallel to their plane.
- This solution first requires having a revealing card in one's possession to authenticate a card. It also requires a two-step authentication process, including first examining the critical feature without the revealing card, in order to perceive all subtle details of its visual information with no distortion, and then, in a second step, observing the card to authenticate with the revealing card positioned in a shifted position, to check the presence and integrity of the encrypted graphics.
- the step of positioning in a shifted manner is likely to be time-consuming, which is a drawback when performing a large number of controls is necessary, like at an airport control desk. It also requires the need to have two hands free and there is the risk that one step in the process may not be carried out as thoroughly as the other if the person checking the information is rushed.
- the present invention seeks to overcome the problems of the prior art by providing a data carrier having security features which allows for easier and faster authentication and a system less likely to lead to inaccurate checking and which is particularly suitable at security control points where large numbers of people must he in a rapid manner with high reliability,
- an aspect of the invention provides a data carrier having first and second faces, a first face of said carrier having an area for printed information on the first face, with there being a window extending between the first face and the second face of the carrier
- the data carrier according to this aspect of the invention is remarkable in that said area for printed information covers at least in part the window.
- the data carrier having said area for printed information covering at least in part the window allows its area for printed information to be examined through two different and separate angles, i.e. from front and from rear. This can be used in different ways, one of which is particularly disclosed herein.
- This data carrier when printed with the visual information collocated (intimately grouped together) with encrypted graphics constitutes a document that is easy to control and authenticate with an optical filter for revealing the encrypted graphics.
- the non-distorted visual information can be examined on the front face of the carrier, and a filter for revealing the encrypted graphics, if not already present as an incorporated element, can be placed on the rear face of the carrier, allowing the security agent to examine the revealed encrypted graphics on the rear face, through the window.
- a filter for revealing the encrypted graphics if not already present as an incorporated element, can be placed on the rear face of the carrier, allowing the security agent to examine the revealed encrypted graphics on the rear face, through the window.
- the data carrier can be hold to examine details of the visual information on the first side, and, after a simple gesture of turning the carrier back, the revealed encrypted graphics can be also examined. Complete cheking can thus be performed with a single hand.
- the data carrier comprises an optical filter for revealing encrypted graphics, said filter art least a part of a face of the window within the second face of the carrier, said filter being opposite the area for printed information and integral on the carrier. Handling of the carrier is thus facilitated, since the filter is incorporated, and the authentication can be performed with no separate revealing device.
- the data carrier includes an optical filter for revealing encrypted graphics wherein the filter and the carrier can be stuck together to form a one piece structure with the filter covering at least a part of a face of the window within the second face of the carrier, said filter being stuck opposite the area for printed information in the first face of the carrier.
- the area for printed information is a personalization area, for example a personalization area for a portrait photo covering at least in part the window.
- the term portrait photo is intended to designate a standard portrait photo. Outside the personalization area, labels or logos not personal to the bearer can be present.
- window is positioned in a region of the area for printed information that corresponds to the upper part of a portrait photograph of a face of a bearer of the carrier so the eyes of the bearer in said photograph are visible when viewing the carrier from the second face of the carrier. This is easy to recognize since on a standard portrait photo, the region of the eyes is always at the same place.
- This feature is useful since it allows the security agent to check that the region of the eyes of the picture has not been corrupted, which is critical since matching the region of the eyes of the bearer with the region of the eyes of the portrait photo is an excellent way of checking that the picture is indeed or the bearer,
- the carrier includes a polycarbonate body, and can include, or be constituted essentially of, a rectangular card such as an identity card, or, as an alternative, a booklet such as a passport.
- a second aspect of the invention is a data carrier as disclosed herein including visual information and encrypted graphics on the area for printed information.
- the visual information and encrypted graphics are collocated (intimately grouped together) on the window.
- the visual information is seen clear when viewed from the first face and the encrypted graphics is seen from the second face.
- the encryption mode used can be based on an encryption code, for example a scrambled indicia® encryption code or a GSSC code.
- a method of personalizing for a particular individual a data carrier comprising collocating (intimately grouping together) visual information and encrypted graphics. At least some part of the collocating step is performed over a window traversing the carrier.
- the data carrier obtained is easy to control and authenticate with an optical filter for revealing the encrypted graphics, since the visual information and encrypted graphics can be seen through two different and separate angles.
- the visual information and encrypted graphics may be deposited in simultaneous or distinct steps. Deposition can include printing, engraving or other methods, provided that the visual information and encrypted graphics are finally collocated.
- the method comprises collocating the region of the eyes of a portrait photo and encrypted graphics on said window.
- a fourth aspect of the invention is a method of control of the identity of an individual bearing a data carrier, comprising observing information personal to the own a first face of the and checking the presence of an encrypted graphics by observing the second face of the document.
- the document is a level one security identity card essentially made of a rectangular card 100 approximately of the size of a credit card.
- This card 100 constitutes a carrier for an identity card.
- Its front face 101 has a predefined area for printed information that is a personalization area 101'.
- it is rectangular and has been personalized to show a standard portrait photo 110 of the bearer and if required, further information 150 such as name, address, gender or age of the bearer or user.
- This information 150 and the photo 110 are personal to the bearer of the card 100.
- personal it is meant that the information is connected with the bearer in some way but it needs not be limited to a picture. It could be another piece of information such as a picture of an object that the bearer has. This way, the bearer presents the card 100 in conjunction with the object so a comparison can be made, by example by a security agent, between the two pieces of information that are connected with the bearer.
- the lateral dimensions of the card 100 are around 86 x 54 mm, for example.
- both dimensions of the personalization area 101' are shorter than the respective dimensions of the front face, but one of these dimensions or both of them could be equal to the respective dimension of the front face.
- the personalization area 101' could have a non-rectangular shape, or there could be several separate personalization areas.
- the portrait photo 110 is collocated with encrypted graphics 111, which is not visible to the eyes of an individual with no specific equipment.
- This encrypted graphics in a specific embodiment, might be encrypted with GSSC technology or with the Hidden Indicia TM technology, which allows invisible data to be integrated into a photo.
- the encrypted graphics 111 is approximated to the location that corresponds with the region of the eyes of the standard portrait photo 110, such region being always at the same place because of the standard of the photo.
- the encrypted graphics can include letters, symbols, a logo or another visual pattern or a combination of these graphics.
- the card is made of a material and has a thickness that allows it to be essentially rigid.
- the card 100 is thus easily inserted in a wallet or in a card case or card folder, since it is mostly unfoldable.
- the material is essentially a polycarbonate polymer, and the thickness is 0.8 mm.
- Other materials can be used, such as PVC (polyvinyl chloride) or PET (polyethylene terephthalate) or paper.
- the rear face 102 is parallel to the front face 101.
- the portrait photo 110 and the encrypted graphics 111 are positioned on the personalization surface 101'.
- Various methods can be used.
- the portrait photo 110 and the encrypted graphics 111 can be printed directly on the polycarbonate surface by an offset process, a laser engraving process, a punching or an embossing process.
- the portrait photo 110 and the encrypted graphics 111 can be printed on or in an additional transparent plastic sheet that is laminated on the personalization surface 101'.
- a material window 105 is present in the thickness of the card 100. It is covered by a portion of the portrait photo 110, which is the region of the eyes.
- the window 105 extends from the front face 101 to the rear face 102 of the card 100, having a generally cylindrical shape, with any kind of section geometry (rectangular, oval or oblong, for example). Its rear surface is labeled 102' on figure 2 .
- the card 100 is opaque, but the window 105 is transparent. In the context of the invention, transparent is meant to characterize a material body causing little or no distortion, and little or no absorption to regular visible light.
- the window 105 is made of a transparent material body that is inserted in a cavity of the card 100.
- the material of the card 100 is transparent, and its front and rear surfaces have been opacified outside the perimeter of the window.
- the window allows visibility through the window with excellent resolution, inducing no distortion nor absorption on regular visible light patterns, in a way that all subtle details of a portrait photo can be potentially examined through the window 105.
- An optical filter 120 is present on the rear surface 102 of the card 100.
- the filter 120 has been laminated on the rear surface 102, but it could also be printed on the rear surface 102 using an offset process, or a laser engraving process, a punching or an embossing process.
- the filter 120 covers the rear surface 102' of the window 105.
- the filter is integral with the card and cannot be displaced from the rear surface 102' of the window 105.
- the portrait photo 110 is visible for him, as it is apparent on the front surface 101.
- the user also sees objects behind the window 105 and the filter 120. But since no encrypted graphics is present in the space behind the filter 120, nothing is revealed for the user by the filter 120 in this configuration. Finally, the window 105 and the filter 120 being both transparent for the regular visible light, the user does not see anything particular except the portrait photo.
- FIG 4 the configuration of figure 3 with the card 100 being placed in of a light source, the user can see the portrait photo 110 with all details and no distortion nor loss of visual information, since no encrypted graphics appears on the photo.
- the two portrait photos show the effect with different skin tones.
- a brighter central area delimited by the perimeter of the window 105 is visible, since some light is allowed to go through the window 105, whereas the periphery of the portrait photo 110 is slightly darker.
- the window 105 has an oblong section, resulting in a brighter central area with an oblong perimeter. Should the card be placed against a non-illuminated surface, the brighter central area would hardly be visible.
- a user stares at the rear surface 102 of the card.
- a fraction of the portrait picture 110 is visible for him in a reversed manner.
- the fact that the picture is reversed is due to the fact that the portrait photo has been printed for a viewer positioned in front of the front surface 101.
- the fact that only a fraction of the picture is visible is due to the fact that, in the presented embodiment, the window 105 has a perimeter smaller than the portrait photo 110.
- the filter 120 being interposed between the portrait photo 110 and the human viewer, allows the user to see the portrait photo, but also the encrypted graphics 111 co-printed with it.
- FIG 6 illustrating the configuration of figure 5 , only a fraction of the portrait photo 110 inside the perimeter of the window 105 is visible. It has the same size and shape as the brighter area visible on the other side of the card ( figure 4 ), and includes the encrypted graphics 111 co-printed with the portrait picture 110, that is decoded and thus visible for the human user.
- the fraction of the photo inside the perimeter of the window 105 includes the region of the eyes of the portrait picture 110, together with the encrypted graphic 111. This the human user to check that no tampering has been performed on the region of the eyes, which is the most information-conveying region of portrait pictures.
- the optical filter is present in a second carrier, displaceable relative to the card that constitutes a first carrier, permanently linked to it or not.
- the filter can thus be placed on the rear face of the transparent window of the card on demand. In particular it can stick to the card at the point of identification to form a one piece structure.
- the card 200 has a portrait picture 210 with collocated encrypted graphics 211 on its front face 201 but does not have a filter on its rear face 202.
- the card 200 includes a transparent window 205 matching with the region of the eyes.
- the card 200 is provided with a card case (or card holder) 300, the open face of which is shown on figure 8 and consisting essentially in a rear surface 302 in which a filter 320 is incorporated in a transparent window 305 of the rear surface 302.
- the place of the window and filter is adapted to, when the card 200 is placed inside the card holder, reveal the encrypted graphics 211 of the card for a user staring at the rear surface 302 of the card case 300.
- the card 400 has a portrait picture 410 with collocated encrypted graphics 411 on its front face 401 but does not have a filter on its rear surface 402.
- the card 400 includes a transparent window 405 matching with the region of the eyes, traversing the carrier 400 and including an incorporated optical filter 420 adapted to reveal the encrypted graphics 411.
- the invention also relates to a method of personalizing a non-personalized carrier.
- the front surface 101 of a card 100 constituting a carrier for an identity card is, in a preliminary manufacturing step S1, designed or prepared to be ready to be personalized with a portrait photo of an individual.
- the design can include frames, lines and labels defining a personalization area 101' for the information personal to the bearer,
- the care 100 with its personalization area 101' is a semi-finished carrier that is illustrated on figure 11 , having a front surface 101 and a personalization surface 101'.
- Figure 11 shows the frame for the portrait photo, prepared on the personalization area 101', and covering the window 105. No portrait photo is present at that stage.
- the card is delivered to the granting authority, upon a step S2 of delivery.
- the prepared personalization surface 101' it is easy for an operator of the granting authority performing a step S3 of personalizing the document for a given bearer to know at least the orientation he has to give to the card 100 when printing the portrait photo 110, and the distance from the edges of the card at which such photo 110 must be printed. This enables the region of the eyes of the photo to match with the transparent window 105 or 405, or with the transparent windows 205 and 305.
- the encrypted graphics 111 and the portrait photo 110 are deposited simultaneously, but depending on the coding and printing methods used, the encrypted graphics could be present before the printing of the photo or be deposited later.
- the critical visual element that is protected against tampering by the present invention can be a fingerprint.
- the data carrier could be, in an alternative embodiment, a security document such as a paper passport with a carrier comprising transparent or translucent paper forming a window traversing the carrier or a passport having a polycarbonate page insert as a page of the passport,
- a security document such as a paper passport with a carrier comprising transparent or translucent paper forming a window traversing the carrier or a passport having a polycarbonate page insert as a page of the passport,
Landscapes
- Credit Cards Or The Like (AREA)
Abstract
The invention is a data carrier (100) having first and second faces, a first face (101) of said carrier having an area (101') for printed information on the first face (101), with there being a window (105) extending between the first face (101) and the second face (102) of the carrier, characterized in that the area (101') for printed information covers at least a part of said window (105). A personalized security document based on such carrier is also disclosed.
Description
- The invention relates to a data carrier and in particular but not exclusively to a data carrier in the form of an identity card or passport. In particular but not exclusively, the invention relates to documents with encrypted security features.
- Data carriers such as security documents are usually carried by a bearer and used at control points such as airport check-ins. The security procedures used at the control points check the authenticity of the document and the fact that it has not been corrupted. These checks are usually made by a security agent.
- The potential corruption of certain critical features of the document are checked, including the picture of the bearer, his or her name and social security number, the document number or the name of the authority that granted the identity card or the passport.
- Some of these critical features are features introduced upon a personalization step when issuing the data carrier so the data carrier is linked just to the bearer. The critical features are typically the picture of the bearer but other features that are personal to the bearer can be used, for example finger prints or data on the data carrier that is linked to a separate carrier of data, such as a photograph that the bearer has with him or her. The data carriers that are intended to have a security feature are often manufactured and delivered to the granting authority in a semi-finished state, the granting authority being left with the personalization elements that are personal to the bearer on a case by case basis.
- Known methods of corruption of a data carrier include modification or replacement of an isolated critical feature, such as the portrait photo of the bearer.
- There is a growing need for enhancing the security level related to those documents and their critical features. In that regard, data carriers with encrypted graphics are known. In the context of the invention, encrypted graphics are graphic features that are invisible for the eyes of a human person, but that can be revealed for the eyes of the human person with an adequate optical system, known as revealing device.
- Encrypted graphics can help a security agent to determine that the document was not corrupted, since those encrypted graphics are difficult to reproduce.
- Moreover, if the encrypted graphics is co-printed or co-engraved, or more generally collocated (or intimately grouped together) with a critical feature (for example the portrait picture), i.e. if it lies in the same zone of material, the authenticity of the critical feature itself is guaranteed, since modification or replacement of the critical feature would have necessary impacted the encrypted graphics.
- However, with encrypted graphics collocated with a critical feature of a data carrier, the critical feature must first be observed without the revealing device, in order to perceive all subtle details of its visual information with no distortion caused by the encrypted graphics. Subtle details may include, for example, details of the physical person's face presented in a photo, like the eyes of said person. In a second step, the document is observed with the revealing device to check the presence and integrity of the encrypted graphics.
- With known systems, the security agent needs to have a revealing device with him or her enabling the decoding of the encrypted graphics, This is a major drawback, as various circumstances can require the data carrier to be checked unexpectedly, at a distance from the security office where the revealing device or system is likely kept. Furthermore, having to use a revealing device involves an extra step in the checking of documents as first the personalization features and then the encrypted features are checked which adds time to the checking process.
- Known revealing devices include the use of a revealing component such as a revealing lens, network or filter in a foldable sheet or sheet fraction of the document that is being checked. This revealing component can be superimposed with the surface bearing encrypted graphics to reveal the encrypted graphics to the person having the document in their possession. Co-printed critical features and encrypted graphics of the document are placed on an opaque or opacified sheet surface. Such a solution is presented in the documents
FR2918311 EP1889727 related to passport booklets. In the latter document, it is in particular contemplated that the revealing component is attached or integrally formed with a regular page of the document. - A problem with such known systems for the authentication of the data carrier is that they require the manual operation of folding the document or its sheets and superimposing the revealing components and the encrypted graphics. Such operation, when performed a large number of times, like at an airport control desk, is cumbersome. Furthermore, such a solution also leaves open the issue of providing authentication to a non-foldable data carrier, such as a polycarbonate card serving as an identity card or included in a passport.
- In
FR2947211 - To proceed to the authentication of a first card (card to authenticate), a security agent needs to use another such card (revealing card), which can be his own personal security document or that of another individual, and, superimpose the two cards in such a way that the position of the window of the revealing card matches with the position of the hidden information of the card to authenticate. This requires having the two cards aligned one with each but with the second card shifted from the first one parallel to their plane.
- This solution first requires having a revealing card in one's possession to authenticate a card. It also requires a two-step authentication process, including first examining the critical feature without the revealing card, in order to perceive all subtle details of its visual information with no distortion, and then, in a second step, observing the card to authenticate with the revealing card positioned in a shifted position, to check the presence and integrity of the encrypted graphics. The step of positioning in a shifted manner is likely to be time-consuming, which is a drawback when performing a large number of controls is necessary, like at an airport control desk. It also requires the need to have two hands free and there is the risk that one step in the process may not be carried out as thoroughly as the other if the person checking the information is rushed.
- The present invention seeks to overcome the problems of the prior art by providing a data carrier having security features which allows for easier and faster authentication and a system less likely to lead to inaccurate checking and which is particularly suitable at security control points where large numbers of people must he in a rapid manner with high reliability,
- Accordingly, an aspect of the invention provides a data carrier having first and second faces, a first face of said carrier having an area for printed information on the first face, with there being a window extending between the first face and the second face of the carrier
- The data carrier according to this aspect of the invention is remarkable in that said area for printed information covers at least in part the window.
- The data carrier having said area for printed information covering at least in part the window allows its area for printed information to be examined through two different and separate angles, i.e. from front and from rear. This can be used in different ways, one of which is particularly disclosed herein.
- This data carrier, when printed with the visual information collocated (intimately grouped together) with encrypted graphics constitutes a document that is easy to control and authenticate with an optical filter for revealing the encrypted graphics.
- Indeed, the non-distorted visual information can be examined on the front face of the carrier, and a filter for revealing the encrypted graphics, if not already present as an incorporated element, can be placed on the rear face of the carrier, allowing the security agent to examine the revealed encrypted graphics on the rear face, through the window. Thus no folding is necessary, and handling of the document is very much facilitated compared to prior art solutions.
- In particular, the data carrier can be hold to examine details of the visual information on the first side, and, after a simple gesture of turning the carrier back, the revealed encrypted graphics can be also examined. Complete cheking can thus be performed with a single hand.
- In an the data carrier comprises an optical filter for revealing encrypted graphics, said filter art least a part of a face of the window within the second face of the carrier, said filter being opposite the area for printed information and integral on the carrier. Handling of the carrier is thus facilitated, since the filter is incorporated, and the authentication can be performed with no separate revealing device.
- In another embodiment, the data carrier includes an optical filter for revealing encrypted graphics wherein the filter and the carrier can be stuck together to form a one piece structure with the filter covering at least a part of a face of the window within the second face of the carrier, said filter being stuck opposite the area for printed information in the first face of the carrier.
- According to an embodiment, the area for printed information is a personalization area, for example a personalization area for a portrait photo covering at least in part the window. The term portrait photo is intended to designate a standard portrait photo. Outside the personalization area, labels or logos not personal to the bearer can be present.
- Other features of the invention include the fact that said window is positioned in a region of the area for printed information that corresponds to the upper part of a portrait photograph of a face of a bearer of the carrier so the eyes of the bearer in said photograph are visible when viewing the carrier from the second face of the carrier. This is easy to recognize since on a standard portrait photo, the region of the eyes is always at the same place.
- This feature is useful since it allows the security agent to check that the region of the eyes of the picture has not been corrupted, which is critical since matching the region of the eyes of the bearer with the region of the eyes of the portrait photo is an excellent way of checking that the picture is indeed or the bearer,
- In interesting embodiments, the carrier includes a polycarbonate body, and can include, or be constituted essentially of, a rectangular card such as an identity card, or, as an alternative, a booklet such as a passport.
- A second aspect of the invention is a data carrier as disclosed herein including visual information and encrypted graphics on the area for printed information. The visual information and encrypted graphics are collocated (intimately grouped together) on the window. The visual information is seen clear when viewed from the first face and the encrypted graphics is seen from the second face.
- Also, the encryption mode used can be based on an encryption code, for example a scrambled indicia® encryption code or a GSSC code.
- According to a third aspect of the invention, a method of personalizing for a particular individual a data carrier, for example for a security document, is disclosed, comprising collocating (intimately grouping together) visual information and encrypted graphics. At least some part of the collocating step is performed over a window traversing the carrier. The data carrier obtained is easy to control and authenticate with an optical filter for revealing the encrypted graphics, since the visual information and encrypted graphics can be seen through two different and separate angles.
- The visual information and encrypted graphics may be deposited in simultaneous or distinct steps. Deposition can include printing, engraving or other methods, provided that the visual information and encrypted graphics are finally collocated.
- In an embodiment, the method comprises collocating the region of the eyes of a portrait photo and encrypted graphics on said window.
- A fourth aspect of the invention is a method of control of the identity of an individual bearing a data carrier, comprising observing information personal to the own a first face of the and checking the presence of an encrypted graphics by observing the second face of the document.
- Advantages of the invention will become apparent from the following description taken in conjunction with the accompanying drawings wherein certain embodiments of the invention are set forth.
-
-
Figure 1 illustrates a data carrier according to an embodiment of the invention. -
Figure 2 is a side view of a data carrier conforming to the invention. -
Figure 3 is a schematic drawing showing a trajectory of visible light inside the data carrier. -
Figure 4 shows the resulting image seen by a user. -
Figure 5 is a schematic drawing showing another trajectory of light inside the data carrier. -
Figure 6 shows the resulting image seen by the user. -
Figure 7 shows a data carrier according to a second embodiment of the invention. -
Figure 8 shows an accessory for the use and authentication of the data carrier of the second embodiment. -
Figure 9 shows a rear view of the document of the second embodiment used with the accessory offigure 8 . -
Figure 10 shows a third embodiment of a data carrier according to the invention. -
Figure 11 shows a carrier for a data carrier before a step of personalization for a particular carrier. -
Figure 12 shows a method of preparing a data carrier according to an embodiment of the invention. - The invention will be described in terms of a specific embodiment, to which various modifications, rearrangements and substitutions can be made.
- Referring to
figure 1 , an example of a security document (as an example of a data carrier) to which the invention applies is illustrated. The document is a level one security identity card essentially made of arectangular card 100 approximately of the size of a credit card. Thiscard 100 constitutes a carrier for an identity card. - Its
front face 101 has a predefined area for printed information that is a personalization area 101'. In the disclosed embodiment it is rectangular and has been personalized to show astandard portrait photo 110 of the bearer and if required,further information 150 such as name, address, gender or age of the bearer or user. Thisinformation 150 and thephoto 110 are personal to the bearer of thecard 100. By personal, it is meant that the information is connected with the bearer in some way but it needs not be limited to a picture. It could be another piece of information such as a picture of an object that the bearer has. This way, the bearer presents thecard 100 in conjunction with the object so a comparison can be made, by example by a security agent, between the two pieces of information that are connected with the bearer. - The lateral dimensions of the card 100 (and its front face 101) are around 86 x 54 mm, for example. In the described embodiment, both dimensions of the personalization area 101' (length and height) are shorter than the respective dimensions of the front face, but one of these dimensions or both of them could be equal to the respective dimension of the front face. In alternative embodiments, the personalization area 101' could have a non-rectangular shape, or there could be several separate personalization areas.
- The
portrait photo 110 is collocated withencrypted graphics 111, which is not visible to the eyes of an individual with no specific equipment. This encrypted graphics, in a specific embodiment, might be encrypted with GSSC technology or with the Hidden Indicia TM technology, which allows invisible data to be integrated into a photo. Theencrypted graphics 111 is approximated to the location that corresponds with the region of the eyes of thestandard portrait photo 110, such region being always at the same place because of the standard of the photo. The encrypted graphics can include letters, symbols, a logo or another visual pattern or a combination of these graphics. - Referring to
figure 2 , which is a side view of the security document offigure 1 , the card is made of a material and has a thickness that allows it to be essentially rigid. Thecard 100 is thus easily inserted in a wallet or in a card case or card folder, since it is mostly unfoldable. In an embodiment, the material is essentially a polycarbonate polymer, and the thickness is 0.8 mm. Other materials can be used, such as PVC (polyvinyl chloride) or PET (polyethylene terephthalate) or paper. Therear face 102 is parallel to thefront face 101. - The
portrait photo 110 and theencrypted graphics 111 are positioned on the personalization surface 101'. Various methods can be used. Theportrait photo 110 and theencrypted graphics 111 can be printed directly on the polycarbonate surface by an offset process, a laser engraving process, a punching or an embossing process. Alternatively, theportrait photo 110 and theencrypted graphics 111 can be printed on or in an additional transparent plastic sheet that is laminated on the personalization surface 101'. - A
material window 105 is present in the thickness of thecard 100. It is covered by a portion of theportrait photo 110, which is the region of the eyes. Thewindow 105 extends from thefront face 101 to therear face 102 of thecard 100, having a generally cylindrical shape, with any kind of section geometry (rectangular, oval or oblong, for example). Its rear surface is labeled 102' onfigure 2 . Outside thewindow 105, thecard 100 is opaque, but thewindow 105 is transparent. In the context of the invention, transparent is meant to characterize a material body causing little or no distortion, and little or no absorption to regular visible light. - The
window 105 is made of a transparent material body that is inserted in a cavity of thecard 100. As an alternative, the material of thecard 100 is transparent, and its front and rear surfaces have been opacified outside the perimeter of the window. - The window allows visibility through the window with excellent resolution, inducing no distortion nor absorption on regular visible light patterns, in a way that all subtle details of a portrait photo can be potentially examined through the
window 105. - An
optical filter 120 is present on therear surface 102 of thecard 100. In a particular embodiment, thefilter 120 has been laminated on therear surface 102, but it could also be printed on therear surface 102 using an offset process, or a laser engraving process, a punching or an embossing process. Thefilter 120 covers the rear surface 102' of thewindow 105. The filter is integral with the card and cannot be displaced from the rear surface 102' of thewindow 105. - Referring to
figure 3 , when a user stares at thefront surface 101 of the card, theportrait photo 110 is visible for him, as it is apparent on thefront surface 101. The user also sees objects behind thewindow 105 and thefilter 120. But since no encrypted graphics is present in the space behind thefilter 120, nothing is revealed for the user by thefilter 120 in this configuration. Finally, thewindow 105 and thefilter 120 being both transparent for the regular visible light, the user does not see anything particular except the portrait photo. - Referring to
figure 4 , the configuration offigure 3 with thecard 100 being placed in of a light source, the user can see theportrait photo 110 with all details and no distortion nor loss of visual information, since no encrypted graphics appears on the photo. - The two portrait photos show the effect with different skin tones. A brighter central area delimited by the perimeter of the
window 105 is visible, since some light is allowed to go through thewindow 105, whereas the periphery of theportrait photo 110 is slightly darker. Thewindow 105 has an oblong section, resulting in a brighter central area with an oblong perimeter. Should the card be placed against a non-illuminated surface, the brighter central area would hardly be visible. - In the configuration of
figure 5 , a user stares at therear surface 102 of the card. A fraction of theportrait picture 110 is visible for him in a reversed manner. The fact that the picture is reversed is due to the fact that the portrait photo has been printed for a viewer positioned in front of thefront surface 101. The fact that only a fraction of the picture is visible is due to the fact that, in the presented embodiment, thewindow 105 has a perimeter smaller than theportrait photo 110. - Importantly, the
filter 120, being interposed between theportrait photo 110 and the human viewer, allows the user to see the portrait photo, but also theencrypted graphics 111 co-printed with it. Referring tofigure 6 , illustrating the configuration offigure 5 , only a fraction of theportrait photo 110 inside the perimeter of thewindow 105 is visible. It has the same size and shape as the brighter area visible on the other side of the card (figure 4 ), and includes theencrypted graphics 111 co-printed with theportrait picture 110, that is decoded and thus visible for the human user. - Importantly, the fraction of the photo inside the perimeter of the
window 105 includes the region of the eyes of theportrait picture 110, together with the encrypted graphic 111. This the human user to check that no tampering has been performed on the region of the eyes, which is the most information-conveying region of portrait pictures. - In a further embodiment, the optical filter is present in a second carrier, displaceable relative to the card that constitutes a first carrier, permanently linked to it or not. The filter can thus be placed on the rear face of the transparent window of the card on demand. In particular it can stick to the card at the point of identification to form a one piece structure.
- This is illustrated shown on
figures 7 to 9 , where thecard 200 has aportrait picture 210 with collocatedencrypted graphics 211 on itsfront face 201 but does not have a filter on itsrear face 202. Thecard 200 includes atransparent window 205 matching with the region of the eyes. - However, the
card 200 is provided with a card case (or card holder) 300, the open face of which is shown onfigure 8 and consisting essentially in arear surface 302 in which afilter 320 is incorporated in atransparent window 305 of therear surface 302. The place of the window and filter is adapted to, when thecard 200 is placed inside the card holder, reveal theencrypted graphics 211 of the card for a user staring at therear surface 302 of thecard case 300. - In another embodiment illustrated on
figure 10 , thecard 400 has aportrait picture 410 with collocatedencrypted graphics 411 on itsfront face 401 but does not have a filter on itsrear surface 402. Thecard 400 includes atransparent window 405 matching with the region of the eyes, traversing thecarrier 400 and including an incorporatedoptical filter 420 adapted to reveal theencrypted graphics 411. - The invention also relates to a method of personalizing a non-personalized carrier. Referring to
figure 12 , in a non-limiting embodiment, thefront surface 101 of acard 100 constituting a carrier for an identity card is, in a preliminary manufacturing step S1, designed or prepared to be ready to be personalized with a portrait photo of an individual. The design can include frames, lines and labels defining a personalization area 101' for the information personal to the bearer, Thecare 100 with its personalization area 101' is a semi-finished carrier that is illustrated onfigure 11 , having afront surface 101 and a personalization surface 101'.Figure 11 shows the frame for the portrait photo, prepared on the personalization area 101', and covering thewindow 105. No portrait photo is present at that stage. The card is delivered to the granting authority, upon a step S2 of delivery. - Thanks to the prepared personalization surface 101', it is easy for an operator of the granting authority performing a step S3 of personalizing the document for a given bearer to know at least the orientation he has to give to the
card 100 when printing theportrait photo 110, and the distance from the edges of the card at whichsuch photo 110 must be printed. This enables the region of the eyes of the photo to match with thetransparent window transparent windows - The
encrypted graphics 111 and theportrait photo 110 are deposited simultaneously, but depending on the coding and printing methods used, the encrypted graphics could be present before the printing of the photo or be deposited later. - The invention has been described with the Hidden Indicia encryption algorithm, but the person of the art can readily reproduce the invention with alternative encryption modes, such as any Scrambled Indicia® algorithm, or polarizing filters, color filters, interference filters, line/dots grids, holograms or diffraction gratings.
- Also, instead of a portrait picture, the critical visual element that is protected against tampering by the present invention can be a fingerprint.
- The data carrier could be, in an alternative embodiment, a security document such as a paper passport with a carrier comprising transparent or translucent paper forming a window traversing the carrier or a passport having a polycarbonate page insert as a page of the passport,
- It can be appreciated that various modifications and alterations may be made to the embodiments of the invention without departing from its spirit. Although individual embodiments are described it is to be understood that the invention can include combinations of the embodiments discussed.
Claims (15)
- A data carrier (100; 200; 400) having first and second faces, a first face (101) of said data carrier having an area (101') for printed information on the first face (101), with there being a window (105; 205; 405) extending between the first face (101) and the second face (102) of the carrier, characterized in that the area (101') for printed information covers at least a part of said window (105; 205; 405).
- A data carrier (100) according to claim 1, further including an optical filter (120) for revealing encrypted graphics, said filter (120) covering at least a part of a face (102') of the window (105) within the second face (102) of the data carrier, said filter being opposite the area (101') for printed information in the first face (101) of the data carrier and integral on the carrier (100).
- A data carrier according to any of claims 1 to 3, further including an optical filter (120) for revealing encrypted graphics wherein the filter (120) and the carrier can be stuck together to form a one piece structure with the filter covering at least a part of a face (102') of the window (105) within the second face (102) of the carrier, said filter being stuck opposite the area (101') for printed information in the first face (101) of the carrier.
- A data carrier (100; 200; 400) according to any of claims 1 to 3, wherein the area (101') for printed information is a personalization area.
- A data carrier (100; 200; 400) according to any of claims 1 to 3, the personalization area (101') is a personalization area (101') for a portrait photograph covering at least a part of the window (105; 205; 405).
- A data carrier (100; 200; 400) according to claim 5, wherein said window (105; 205; 405) is positioned in a region of the personalization area (101') that corresponds to the upper part of a portrait photograph of a face of a bearer of the carrier so the eyes of the bearer in said photograph are visible when viewing the carrier from the second face (102; 202; 402) of the carrier.
- A data carrier (100; 200; 400) according to any of claims 1 to 6, wherein the carrier is a carrier for an identity card.
- A data carrier according to any of claims 1 to 6, wherein the carrier includes a passport booklet.
- A data carrier (100; 200; 400) according to any of claims 1 to 8, including visual information (110; 210; 410) and encrypted graphics (111; 211; 411) collocated on said area (101') for printed information on the window (105; 205; 405).
- A data carrier according to claim 9, wherein the encrypted graphics (111; 211; 411) is encrypted with a scrambled indicia encryption code.
- A data carrier according claim 9 or 10, wherein the visual information is seen clear when viewed from the first face (101) and the encrypted graphics (111; 211; 411) is seen from the second face (102).
- A of personalizing (S3) for a particular individual a data carrier, comprising collocating visual information (110; 210; and encrypted graphics (111; 211; 411) on a carrier (100; 200; 400), characterized in that at least some part of the collocating is performed over a window (105; 205; 405) traversing the carrier.
- A method of personalizing according to claim 12, comprising collocating the region of the eyes of a portrait photo (110; 210; 410) and encrypted graphics (111; 211; 411) on said window (105; 205; 405).
- A data carrier including security features obtained by the method of claim 12 or claim 13.
- A method of control of the identity of an individual bearing a data carrier according to any of claims 9 to 11 or claim 14, comprising observing information personal to the bearer on a first face (101) of the document and checking the presence of an encrypted graphics (111) by observing the second face of the document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11305815A EP2540519A1 (en) | 2011-06-27 | 2011-06-27 | A data carrier and a method of personalizing a data carrier |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11305815A EP2540519A1 (en) | 2011-06-27 | 2011-06-27 | A data carrier and a method of personalizing a data carrier |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2540519A1 true EP2540519A1 (en) | 2013-01-02 |
Family
ID=44582750
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11305815A Withdrawn EP2540519A1 (en) | 2011-06-27 | 2011-06-27 | A data carrier and a method of personalizing a data carrier |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP2540519A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106997465A (en) * | 2017-04-10 | 2017-08-01 | 广东金杭科技股份有限公司 | Multi-functional dynamic and intelligent identity card identification verification method and verification machine |
WO2017192816A1 (en) * | 2016-05-06 | 2017-11-09 | Entrust Datacard Corporation | Label module for printing custom customer engagement labels |
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1698485A2 (en) * | 2005-03-04 | 2006-09-06 | Canadian Bank Note Company, Ltd. | Identification document with lenticular watermark |
US20060290136A1 (en) * | 1995-11-29 | 2006-12-28 | Alasia Alfred V | Self-authenticating documents with printed or embossed hidden images |
EP1935663A1 (en) * | 2006-12-18 | 2008-06-25 | Setec Oy | Data carrier with see-through window and method for producing it |
FR2918311A1 (en) | 2007-07-06 | 2009-01-09 | Francois Charles Oberthur Fidu | SECURITY DOCUMENT IN FORM OF BOOKLET, WITH AN ADDITIONAL PAGE REVELATION OF A HIDDEN INFORMATION |
EP2199099A1 (en) * | 2008-12-18 | 2010-06-23 | Gemalto Oy | Identification document with an improved anti-counterfeiting element |
FR2947211A1 (en) | 2009-06-29 | 2010-12-31 | Oberthur Technologies | SECURITY DOCUMENT AND VERIFICATION METHOD OF THIS DOCUMENT |
-
2011
- 2011-06-27 EP EP11305815A patent/EP2540519A1/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060290136A1 (en) * | 1995-11-29 | 2006-12-28 | Alasia Alfred V | Self-authenticating documents with printed or embossed hidden images |
EP1698485A2 (en) * | 2005-03-04 | 2006-09-06 | Canadian Bank Note Company, Ltd. | Identification document with lenticular watermark |
EP1889727A2 (en) | 2006-08-18 | 2008-02-20 | Graphic Security Systems Corporation | Self-authenticating articles and a method of manufacturing the same |
EP1935663A1 (en) * | 2006-12-18 | 2008-06-25 | Setec Oy | Data carrier with see-through window and method for producing it |
FR2918311A1 (en) | 2007-07-06 | 2009-01-09 | Francois Charles Oberthur Fidu | SECURITY DOCUMENT IN FORM OF BOOKLET, WITH AN ADDITIONAL PAGE REVELATION OF A HIDDEN INFORMATION |
EP2199099A1 (en) * | 2008-12-18 | 2010-06-23 | Gemalto Oy | Identification document with an improved anti-counterfeiting element |
FR2947211A1 (en) | 2009-06-29 | 2010-12-31 | Oberthur Technologies | SECURITY DOCUMENT AND VERIFICATION METHOD OF THIS DOCUMENT |
EP2275279A1 (en) * | 2009-06-29 | 2011-01-19 | Oberthur Technologies | Security document and method of verifying same |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017192816A1 (en) * | 2016-05-06 | 2017-11-09 | Entrust Datacard Corporation | Label module for printing custom customer engagement labels |
CN109219523A (en) * | 2016-05-06 | 2019-01-15 | 恩图鲁斯特咨询卡有限公司 | For printing the label model of customization customer interaction label |
US10369807B2 (en) | 2016-05-06 | 2019-08-06 | Entrust Datacard Corporation | Label module for printing custom customer engagement labels |
CN106997465A (en) * | 2017-04-10 | 2017-08-01 | 广东金杭科技股份有限公司 | Multi-functional dynamic and intelligent identity card identification verification method and verification machine |
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2373493B1 (en) | Identification document with an improved anti-counterfeiting element | |
ES2960203T3 (en) | Method to authenticate a document | |
US11840110B2 (en) | Security document and method for the authentication thereof | |
JP5221339B2 (en) | Identity document and its manufacturing method | |
EP1698485A2 (en) | Identification document with lenticular watermark | |
JP2008537244A (en) | Personal identification card containing a 2D image of the user | |
JPH023397A (en) | Security card | |
JP2006518898A (en) | ID and travel documents | |
US10245876B2 (en) | Security element and identification document | |
EP2123470A1 (en) | Optically variable security element and identification document with such element | |
ES2582234T3 (en) | Security document and verification procedure of this document | |
US20200218953A1 (en) | Data carrier and a method for producing such data carrier | |
RU2446956C2 (en) | Document with protection property and reading unit | |
EP2540519A1 (en) | A data carrier and a method of personalizing a data carrier | |
EP2239145A1 (en) | Anti-counterfeiting element with flip images for an identification document and a method for its manufacture | |
US10315454B2 (en) | Method for processing a security element | |
CA2955514A1 (en) | Security document having a protected window and method for making the same | |
CN114126891B (en) | Security document with dual authentication lenses | |
US11376882B2 (en) | Fused polyester identification documents | |
KR20090008013U (en) | Mini patch laminate | |
KR101555314B1 (en) | Security sheet | |
CA3110432A1 (en) | A security sheet and a security booklet | |
WO2003079092A1 (en) | Tamperproof and counterfeit-resistant structure | |
Mahmoud Mohamed Khalil | The latest Security Techniques Used in Passport Design | |
ES2365996T3 (en) | SECURITY FEATURES WITH MULTIPLE IMAGES FOR IDENTIFICATION DOCUMENTS AND PROCEDURE FOR MAKING THEMSELVES. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20110627 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20130703 |