CN103534735B - Method and apparatus for verifying security documents using white light interferometry - Google Patents
Method and apparatus for verifying security documents using white light interferometry Download PDFInfo
- Publication number
- CN103534735B CN103534735B CN201280023559.5A CN201280023559A CN103534735B CN 103534735 B CN103534735 B CN 103534735B CN 201280023559 A CN201280023559 A CN 201280023559A CN 103534735 B CN103534735 B CN 103534735B
- Authority
- CN
- China
- Prior art keywords
- light
- file
- secure file
- depth
- receiving portion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000005305 interferometry Methods 0.000 title abstract 2
- 238000005259 measurement Methods 0.000 claims description 29
- 238000007689 inspection Methods 0.000 claims description 20
- 230000008859 change Effects 0.000 claims description 15
- 238000001514 detection method Methods 0.000 claims description 14
- 230000008569 process Effects 0.000 claims description 14
- 230000007246 mechanism Effects 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 8
- 238000009826 distribution Methods 0.000 claims description 6
- 241000208340 Araliaceae Species 0.000 claims description 2
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 2
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 2
- 235000008434 ginseng Nutrition 0.000 claims description 2
- 238000012795 verification Methods 0.000 abstract description 8
- 238000007639 printing Methods 0.000 description 27
- 239000000758 substrate Substances 0.000 description 25
- 230000007704 transition Effects 0.000 description 23
- 239000000463 material Substances 0.000 description 16
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 238000004519 manufacturing process Methods 0.000 description 8
- 238000007619 statistical method Methods 0.000 description 8
- 238000007641 inkjet printing Methods 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 7
- 229920003023 plastic Polymers 0.000 description 7
- 239000004033 plastic Substances 0.000 description 6
- 238000003860 storage Methods 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000012014 optical coherence tomography Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000009795 derivation Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000002372 labelling Methods 0.000 description 3
- 238000012856 packing Methods 0.000 description 3
- 238000005452 bending Methods 0.000 description 2
- 239000011230 binding agent Substances 0.000 description 2
- 238000010030 laminating Methods 0.000 description 2
- 238000003475 lamination Methods 0.000 description 2
- 239000000049 pigment Substances 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000005266 casting Methods 0.000 description 1
- 239000011248 coating agent Substances 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000008034 disappearance Effects 0.000 description 1
- 238000004043 dyeing Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 239000004615 ingredient Substances 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/16—Testing the dimensions
- G07D7/164—Thickness
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/121—Apparatus characterised by sensor details
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
Landscapes
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Length Measuring Devices By Optical Means (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The invention relates to a verification apparatus and a verification method. The verification method comprises the following steps: the security document (13) is oriented relative to a white light interferometer (2), an examination by means of white light interferometry is performed in at least one location (P1 -P3) on a surface to be examined (15), wherein a depth profile is produced in a direction of examination (19-1 to 19-3), a feature is derived from the depth profile, and the at least one derived feature is compared with one or more specifications in order to derive a verification decision.
Description
Technical field
The present invention relates to a kind of a kind of method and checking device for secure file for authenticating security documents, institute
State checking device to perform and use White Light Interferometer, to verify the security feature present in secure file.
Background technology
Various features well known in the art, they are used to protect document as follows so that cannot be without permission
Ground is manufactured, forges or distort these documents.Therefore, security feature can be the duplication for making file or article, unwarranted system
Make, forge or other kinds of distorting becomes difficult, becomes that or at least undesirable process can not possibly be made in accurate inspection
Verifiable all features.
To have make duplication, it is imitated, forge or other are distorted and become institute that is difficult, becoming impossible at least one feature
There is file to be referred to as secure file.Secure file includes such as travelling passport, identity card, driving license, visa card, visa, and is used for
The label of high-quality product --- such as software, access card and bank card, the credit card, phonecard etc. and embody value
File --- for example stock, bond, banknote, stamp, tariff pay certificate etc., and several examples are lifted merely illustratively.
Different features can be used as security feature.The material component of such as file can serve as security feature.
This refers to cheque paper, and it is used for example in certificate printing or banknote printing.Partly or in combination for adulterator or interpolater and
Speech is difficult to different printing methods that are imitated or copying and is also used as security feature.It is different at it in the manufacture of secure file
Casting used in nearly all common printing method --- such as intaglio plate method for printing, toppan printing and ink jet printing method
Or adherography.This generally illustrates typical, distinctive printing image, the printing image can at least in micrography with it is logical
The printing image for crossing other printing methods generations makes a distinction.
Structure, embossment structure, specific color of bending etc. are used as other security features.Especially, including
By can be integrated by multiple different security features in the modern safety file of the file body of one or more plastic material manufacture
To in a secure file.However, with secure file --- such as banknote or card that can realize especially manufacturing in high-volume
It is integrated new-type and more complicated in part paper, be difficult to the scientific and technological progress of security feature forged, adulterator imitated and/or forge
The ability of secure file is also improved.Accordingly, it would be desirable to the more and more perfect method and apparatus for verifying security feature is realized,
It can realize the reliable differentiation between genuine secure file and imitated or forgery secure file.Such operation is referred to as testing
Card.
The content of the invention
By different verification method known in the art and checking device, they are generally matched with specific security feature
And provide for the checking of the specific security feature.It is desirable that, new verification method and checking device are realized,
They can be used for various security features and/or secure file, to verify to it in terms of its verity and genuine.
The technical assignment is solved by a kind of verification method, and it uses White Light Interferometer, so that nothing is devastatingly checked
The surface texture and internal structure of file.Checking can be performed by a kind of checking device, the checking device is dry including white light
Interferometer, it is configured at least set up the depth profile of secure file at a position.The depth profile is not necessarily necessary
Inspection direction along secure file on whole extension extends.It means that depth profile not necessarily penetrates whole file.This
For example cannot be realized by means of White Light Interferometer in the file including opaque layer or metallic reflector.
According to the basic conception, a kind of method for authenticating security documents is proposed, be the method comprising the steps of:
The secure file is oriented relative to white light interferometer;White light is performed at least one position on the inspection surface of secure file
The inspection of interference, wherein setting up depth profile along transverse to the inspection direction for checking surface orientation;And by depth letter
Shelves derive feature and by the derived feature of at least one institute with one or more it is predetermined be compared, determine to derive checking
It is fixed.
Such method can be realized by checking device, the checking device includes file receiving portion and white light interferometer
And also including APU, the white light interferometer is configured in the file receiving portion or described for being arranged on
At least one position on one surface of the secure file in file receiving portion is along the inspection transverse to the surface orientation
Depth profile is set up in direction, and the APU analyzes and processes at least one depth profile.
Definition
The broadband interference of light with spatial coherence will be made and analyze and process any optical interferometric devices of the interference
It is considered as white light interferometer.Here, the spectrum is completely or partially arranged on visible wavelength region, infrared wavelength range or ultraviolet
It is unessential in wave-length coverage.
Depth profile will be considered as corresponding to the measured value of the physical parameter along the different depth for checking direction, wherein checking
It is individual that direction extends to one --- in the inside of such as file, i.e. volume.Generally depth profile is outside object or body surface
Place starts, and the inspection direction or path are extended in the object.Depth profile corresponds to checked object, for example pacifies
A position at the surface of whole file.The position is the optional position at surface, and inspection direction is represented at the position
Straight line intersect with surface.
Depth value is along inspection direction(Depth profile is set up along the inspection direction)With regard to the spacing of a reference value.
Can represent to check that the straight line in direction is propagated with the surface of file coating or the light in measurement arm as reference value
The intersection point in any other faces in direction.
Following direction is referred to as checked direction:It is mapped on the surface of object to be checked along the direction light.Here is not
Consider the local unevenness on surface.
Corresponding to depth value, the metrical information by derived from interference values be referred to as intensity level.
The derivation of feature is interpreted as a parameter or an arbitrary abstract or mathematical creation or structure --- for example
The derivation of intensity level vector or one group of depth value/intensity level tuple.Whole or therein selections of depth value and intensity level are same
Sample represents the derivation of feature as the value produced by statistical analysiss process.
Changes in intensity values is allocated to the depth value of depth profile and by relatively asking with one or more intensity levels
The value for taking, one or more of intensity levels are corresponding to the area of space of the object for being checked, these area of space with pass through position
Put and depth value(And for the depth profile of all common detections unified inspection direction)It is determined that region it is adjacent.
In simplest embodiment, changes in intensity values with following intensity level by relatively asking for:The intensity level is for identical depth
One or more adjacent depth values in degree profile are given.In other embodiments, it is also possible to consider adjacent table together
Face position and identical or adjacent depth value intensity level.
Preferred embodiment
Advantages below is had according to the present invention of its basic conception:Can verify at the surface of secure file or in inside
The structure of appearance, it can occur transverse to surface on the different depth of file.For example can ask for by transparent plastics
Be stored with as blacking the appreciable information for human viewer in which aspect of file body made by material.
This, distinguishes different methods in terms of the steric configuration of the ingredient of the carrying information of secure file, different by these
Method can in file body storage information.If for example by information printing to being subsequently laminated into other substrate layers a file
On the substrate layer of body, then information is located near at least unborn layer border.But if information is by laser labeling method
Introduce, then the partially carbonized dyeing that generally larger volume range passes through plastic material.As can be seen that letter in depth profile
Which depth breath is marked in, so as to printing method can make a distinction with laser labeling method.Laser labeling method is sometimes
Referred to as laser notch board method.
In order to especially make in the secure file based on the transparent or partially transparent file body of plastic manufacturing
The bending effect being likely to occur on paper surface is minimized as far as possible, is preferably oriented so as to the secure file so that by white
What the white light being mapped on secure file of optical interferometer determined checks that direction is vertically oriented with the surface of secure file.The table
Face here is to check surface, and it is typically the surface of secure file, and it has the plane development of maximum.In checking device, can
To realize such orientation simply by the following manner:It is constructed so as to file receiving portion so that be disposed thereon or therein
Secure file is automatically with its surface perpendicular to inspection direction orientation.For example file receiving portion can be configured to bearing-surface, institute
State bearing-surface for example to constitute by hardly having the parallel plate of absorbefacient, transparent, plane in wave-length coverage, safety text
Part plane earth is placed or is pressed on the plate with its surface to be checked.Compress be responsible for secure file along its whole surface or
The larger subregion on its surface most preferably reclines on the bearing surface.This is particularly with the secure file for deforming in use
Favourable.
White light interferometer in a preferred embodiment include light source, beam splitter, detector, in controllable straight line
Fixed reflector and control and data detection device on adjustment mechanism, wherein light source produce broadband, with spatial coherence
Property light and be arranged such with regard to beam splitter so that beam splitter by a part for light be directed to measurement arm in, file receiving portion
In the measurement arm;And a part for light is directed in reference arm, reflector is arranged such in the reference arm,
So that the reflector reflect light back on beam splitter and there with file receiving portion is arranged on or file receiving portion
On secure file on be reflected back the optical superposition of beam splitter, wherein detector is arranged such so that detector can be detected in ginseng
Examine the light for being reflected of arm and measurement arm reflected optical superposition when the interference signal that produces, wherein control and detection means with
Straight line adjustment mechanism is coupled, and to change by the line shifting of reflector during detection interference signal arm lengths are referred to,
Wherein corresponding to measurement arm lengths with reference to arm lengths, it is equal to along the spacing for checking direction and beam splitter, and the spacing is at least
Reach the surface and until the inside of secure file of secure file in the file receiving portion or in the file receiving portion.
Therefore, the reference arm lengths of interferometer are changed by the change of reflector locations.Measurement arm in light be mapped to object to be checked,
I.e. on the surface of secure file and also at least partially in secure file.Not only at surface but also along the propagation of light
Path will check one of light along the characteristic for checking the feature that direction includes according to secure file or wherein in secure file
Divide and reflect back in interferometer in measurement arm.According to by reflector(For example, reference mirror)Position determine reference brachium
Degree determines:Any part of light(It is reflected back in interferometer along the inspection direction in secure file)Cause mutually long at detector
Interfere.Therefore, the reflector locations in reference arm determine to a certain extent the depth by produced interferential scanning.But
Because not using monochromatic light but targetedly using broadband, the light with spatial coherence completely, what is produced is dry
Relate to pattern much more complex.However, by following computational algorithm known in the art:The computational algorithm can be realized by the time
On the interference signal that obtains successively derive along the depth profile for checking direction, the interference signal is in the reference arm length change phase
Between be detected.Such algorithm is also used for optical coherence tomography(OTC).Optical coherence tomography(OTC)Especially
It is by known to field of ophthalmology and there for example for dynamic retinoscopy.
Therefore, white light interferometer is preferably configured as optical coherence tomography device.
If for depth profile is asked in the multiple positions at the surface of secure file, much more accurate letter can be realized
Breath or much more complex checking.In a preferred embodiment, for being arranged on secure file together along a path
Surface on multiple positions or for being arranged in the face region including at least one position on the surface of secure file
Multiple positions, depth profile is detected with the depth profile simultaneously at least one position.In suitable configuration
Can realize by the broadband, light with spatial coherence the light beam along a Directional Extension be sent on beam splitter and
Along a line on the surface of secure file, i.e. path irradiation secure file and therefore transverse to surface, be preferably perpendicular to
Surface is at the position irradiated while detecting a depth profile respectively.For this it is required that detector is for be detected
Each in position include a light activated detecting element, so as to detect corresponding to each position interference and by
This corresponding depth profile for each position can derive.If light is along two spaces Directional Extension, it is right to realize
Depth profile is detected simultaneously in position in a face.In the situation, detector must not only have the sensitive biography of image
The linear array of sensor and with the horizontal layout of the sensitive detecting element of image, they can be with for the relevant position in face
The interference signal during reflector locations change is detected respectively.
In order to checking can be implemented, it is advantageous to show at least one of secure file on the display apparatus by being detected
The cross section asked for of depth profile, the cross section is by checking direction and path or the profile exhibition in the region of face
Open.In principle it is possible that any setting of the position on the surface for passing through secure file forms an axis of cross section simultaneously
And corresponding depth profile is abreast set each other, to form cross section.But generally meaningfully, in cross-section that
The depth profile that this is abreast illustrated is also to be spatially disposed adjacent to each other point on the surface corresponding.Such cross section
Represent(It for example represents the cross section of the area of space along path lateral in the surface of file in file internal)'s
Advantage is the layer that for example exists hereof or layer transition part is visible.Modern secure file is often by multiple substrates
Layer is stitched together by laminating method.It is not that lamination process can be so performed in all scenario so that there is entirety
File body, original layer border in the file body also can no longer turn out to be in solids phase transition in e measurement technology
Portion.
However, can be by depth profile in the secure file of the such overall configuration in it can not realize file body
Varying strength value confirm these layer of border, although they are non in the Visual Observations Observations of human user.Therefore, this
The cross section of sample illustrates different intensity level or changes in intensity values in layer boundary, so as to these layer of border is in cross section represents
It is significantly visible.If now in order to distort one such file of division to change such as passport photograph information or such as
The other information for knowing the people corresponding to the secure file is debated, then may usually view layer after the layer being split off is spliced again
Dramatically different in structure, the Rotating fields are visible in cross section derived from white light interference ground.Therefore, it is such transversal
The optical check that face represents can make checking personnel simply find the file distorted.Can be known by similar mode
Not different printing methods.If for example using toppan printing, can see in the edge of the letter or symbol that are cast
To the extruding occurred in printing plane in printing.Therefore, distinctive height is shown by means of the printing layer of letterpress manufacture
Degree contour feature, it can be derived by cross section profile.This is equally applicable to the printed element by means of intaglio printing manufacture.
In the modern secure file based on plastic manufacturing, such as ink jet printing method is used, the ink jet printing method
Ink is manufactured based on plastic material, and by the plastic material substrate layer is manufactured, and ink jet printing is applied on the substrate layer.It is described
Printing layer has advantages below:The printing layer can also be in large area realized, without the thus realization on printed face
Layering probability, because ink material is most preferably connected in lamination step with adjoined substrate layer.However, the face for being used
Expect not necessarily to be retained on printed surface according to the concrete composition of the printing-ink for being used, but may be targetedly
In being diffused into substrate layer, printing is applied on the substrate layer.Therefore, check depth profile when can significantly distinguish by
The printing zone produced in such ink jet printing method and other printing zones.
Also can recognize that and the division during this period of file body or layering and/or if necessary by the verification method for being proposed
Other safety elements --- such as metal forming or other kinds of that removal and/or new added material, addition change or forgery
Patch or hologram combine other distort because generally unusable in original file system in splicing and/or addition
Same procedure parameter used in making is so that different layers is connected to each other.Therefore, in horizontal stroke at the position distorted
Occurs the change that can significantly perceive of the jump form in the layer transition part of for example otherwise parallel trend in the profile of section.
In order to realize that mechanical analysis is processed, can be used as the predetermined storage depth profile in data base or memorizer
Or the cross section formed by the depth profile is used as predetermined.By striked depth profile, cross section profile with it is described
Predetermined comparison can realize checking.
In one embodiment, statistically in terms of frequency analyze and process it is corresponding to each depth value or depth bounds
Intensity level and/or changes in intensity values, to ask for the deviation of desired statistical distribution as the evidence distorted or forge.
Region adjacent with layer transition part in such as file can be selected as depth bounds, in this region for not tampered
Secure file occurs without the intensity level and/or changes in intensity values for characterizing transition part.Because not in tampered secure file
Exactly corresponding to the depth value of the depth of layer transition part in the case of also there is layer transition part or adjoint with it distinctive strong
Angle value and/or changes in intensity values, so for example finding to have than original in the secure file forged in such analyzing and processing
Bigger frequency, display layer transition part intensity level in beginning file.It is also possible that the depth model of analyzing and processing layer transition part
Enclose and here in the region of layer transition part for tampered secure file finds the frequency of intensity level or changes in intensity values,
It is inconsistent with layer transition part.
In another embodiment, depth below value is analyzed and processed in terms of its frequency:One at the depth value
Occur respectively by intensity level and secure file on individual threshold value or in the range of the value limited by upper threshold value and lower threshold value
In adjacent space region intensity level comparison or by the adjacent space position in intensity level and secure file some are strong
Intensity level or changes in intensity values that the comparison of angle value is asked for, to ask for the deviation with one or more desired statistical distribution
And/or concordance and be derived there checking determine.If for example in this way analyzing and processing characterizes the layer transition for determining
Portion or for the printing method for determining typical intensity level, then obtain following explanation:Which it can be found that in depth
The information that such transition part or in this way method are introduced in printing technology.In tampered file,
Such depth Distribution value for example for layer transition part is to spread, because layer transition part is due to distorting in different depth
Occur.
Can also analyze and process in combination and/or using the different statistical analysiss processing methods.
In another embodiment, at least one local, such as depth value scope of at least one cross section
In, the corresponding depth value of changes in intensity values of the corresponding depth value of intensity level of a value scope or a value scope is right with regard to its
The position answered along at least one path or predetermined, the parameterized approximation to function of curve negotiating position, and according to
It is described it is approximate in derived parameter make checking and determine.If as security feature for example in a system in a secure file
Into file in breach was opened up before its splicing in the boundary region that internally arranges, the breach is changed in a cutting plane
Surface profile and subsequently it is so filled so that not comprising cavity volume in the secure file made by, then in the suitable of cross section
Close the line consistent with border seamed edge that profile that is distinctive, following opened up breach is produced in the case of selecting.Can be optimal
The function of the approximate tangent line trend in ground can be matched with the line.In the prior art, following approximation method is known:Institute
State the parameter that approximation method so changes function so that realize that the value asked for by experiment, the tangent line provided in this depth value are walked
To the concordance as well as possible between parameterized function.The position of the breach that subsequently can be for example opened up according to sign,
Shape and depth perform checking by simple mode.
For varying strength value human perception advantageously, for example this is shown on the display face by different color value
A little intensity levels.The display device coupled with APU is preferably constructed so as to so that the display device provides such
Colour is represented, can shown on said display means by least one depth profile and for other on the surface of secure file
The cross section that other depth profiles of position are formed.It should be noted that the color is not pacified with being possibly used for being stored in secure file
The color of full feature is related.The color is used only for the simpler ga s safety degree of striked varying strength value.
Description of the drawings
The present invention will be explained in further detail with reference to the accompanying drawings below according to preferred embodiment.Accompanying drawing is illustrated:
Fig. 1:The schematic diagram of checking device;
Fig. 2:The schematic diagram of the local of the Rotating fields of secure file, is drawn in the secure file by means of ink jet printing method
Information is entered;
Fig. 3 a, 3b:It is that the security feature passes through to be opened up and be then filled with for illustrating the schematic diagram of security feature
Breach constitute;
Fig. 4:For secure file, the cross section by derived from depth profile the signal with the structure according to Fig. 3 b
Figure;
Fig. 5:The schematic diagram of cross section by derived from the depth profile of secure file, the secure file does not have according to figure
The feature of 3b;
Fig. 6:For the schematic diagram processed with the statistical analysiss of unmodified parallel layers, illustrated therein is relative to it
The frequency of the intensity level of the intensity value range of corresponding depth value;
Fig. 7:For with similar to the configuration according to Fig. 3 b secure file similar to the corresponding statistical according to Fig. 6
The figure that analysis is processed is represented;
Fig. 8:The diagram that another statistical analysiss of the secure file do not forged are processed;
Fig. 9:For forge secure file similar to the schematic diagram processed according to the statistical analysiss of Fig. 8;
Figure 10:The schematic graphical diagram of analyzing and processing, wherein drawing depth value relative to the corresponding position on surface
The parameterized function of the depth value of scope and the position is matched with depth value.
Specific embodiment
Checking device 1 is schematically shown in FIG.The checking device includes white light interferometer 2.The white light is done
Interferometer 2 includes light source 3, and the light source sends the broadband light 4 with spatial coherence.In the embodiment as shown, lead to first
Crossing optical element 5 extends light 4.The light is subsequently mapped on beam splitter 6.The beam splitter enters can a part of 4r of light
In reference arm 7, mirror 9 is located at the end 8 of the reference arm as reflector.The mirror is movably supported on adjustment mechanism 10
On.Adjustment mechanism 10 can point-blank such moving lens 9 so that can change length l of reference armr。
At beam splitter 6, another part 4m of light is deflected in measurement arm 11.In measurement arm 11, for example, constructing
To be provided with the secure file 13 as measurement object in the file receiving portion 12 of glass plate.Make at surface 15 and in safety
Be reflected back in the volume 16 of the inside of file 13 measurement arm 11 in light 4mR at beam splitter 6 with reflected from reference arm 7 by mirror 9
The light 4rR for returning is superimposed and is directed on detector 14.In the embodiment as shown, detector 14 has multiple light activated
Sensing element(It is not shown).
Exemplarily, the beam guiding of three positions P1, P2, P3 is shown on the surface 15 of secure file 13.In table
At face position P1, P2, P3 or the inside of secure file 13 along measurement arm 11 the light 4m being mapped on surface 15 propagation
The light 4mR that direction the is reflected back and light 4rR being correspondingly reflected back in reference arm 7 is at a sensor element of detector 14
It is superimposed and as interference signal detection.During measuring, change length l of reference arm 7r.Corresponding isometric measurement arm lengths lm
In the volume 16 for extending to secure file 13 from surface 15.The interference signal of time resolution ground detection is supplied to control with number
According to detection means 17, it asks for corresponding position P1, P2, P3 along inspection direction according to the measured value of each measuring cell
The depth profile of 19-1 to 19-3.Check that direction 19-1 to 19-3 is true by directions of the light 4m at corresponding position P1 to P3
It is fixed.It is appreciated that can simultaneously detect and analyze and process for along road according to the illumination of file 13 and the resolution of detector 14
Multiple positions in footpath 20 or(If the plane of light 4 extends)For the depth profile of the position being distributed on one face.Control and number
Adjustment mechanism 10 is controlled during measurement test according to detection means 17, by the adjustment mechanism point-blank moving lens 9, with
Just change and refer to arm lengths lrAnd thus change corresponding measurement arm lengths lm。
The measurement data --- it represents interference signal --- for being detected is analyzed and processed by control with data detection device 17,
To set up affiliated depth profile for each position P1-P3.This is according to as known to for optical coherence tomography
Algorithm is realized.For affiliated intensity level is included along the depth value for checking direction, it is represented uses the depth profile of one position
In the tolerance of the reflection in the region of the secure file for being checked, the region is determined by position and corresponding depth value.Subsequently
Depth profile is analyzed and processed in APU 21.Control can be with 21 groups of APU with data detection device 17
Close in one apparatus.Both can individually or jointly be embodied as programme controlled device.Alternatively, at least control and detection
Device 17 purely can be implemented in hardware.In the embodiment as shown, verify that device 1 additionally includes display device
23, it includes the display surface 24 of freely programmable, and the cross section 25 by derived from depth profile is for example shown on the display surface.
This schematically figure 1 illustrates.Different layer borders 44,45 can be seen, significant intensity level occur on the layer border.
Additionally, verify that device can include storage device 26, the depth letter being stored with the storage device for example for determining
The predetermined data of shelves, statistical characteristics or exemplary cross section, it can be used for and striked depth profile, cross section
Or static analysis is processed and compared, to verify the secure file for checking respectively for.It is also possible that APU includes connecing
Mouth 27, by the interface predetermined value can be called from data base.It is also possible that by the output measurement knot of interface 27
Fruit and/or checking determine that the interface is so structured that interface or radio interface of wired connection etc..
The local of secure file 12 is schematically shown in fig. 2, and it is by three different shapes of substrate layer 31,32,33
Into.Carry out coding information by means of ink jet printing in the file.Three printed pixels 34,35,36 are printed on the substrate of centre
On layer 32.Here, a part for printing-ink is diffused in the substrate layer 32 of centre and in the substrate layer 33 that is disposed below.
Generally speaking, substrate layer 31 to 33 is for example spliced into a file body 40 by laminating method.In depth profile is checked, not only
It is on horizontal 37 and same visible significant in the vertical direction 38 of the orientation of substrate layer surface 39 perpendicular to substrate layer 32
Extend.Therefore, the information for storing in file body 40 can be different from the information applied by other printing processes, it is described its
No pigment is diffused in substrate layer 32 or pigment is not so significantly to be diffused in substrate layer 32 in his printing process.
Other local of file body 40 are schematically shown in Fig. 3 a and 3b.Show in fig. 3 a:In file body
Open up the breach 41 of taper in 40 first.Implement the preferred all transparent of each substrate layer 31 to 33 and here is only merely for letter
Change the reason for representing and be provided with different hacures.However, each substrate layer can have different refractive indexs.Illustrate in fig 3b
Made by file body, the breach 41 of described in file body taper filled with preferably same transparent packing material 42.
The refractive index of packing material 42 is preferably slightly different to the refractive index of the material for manufacturing substrate layer 31 to 33.Setting up file body
Change that can be in the boundary region 44 and 45 of otherwise flat during depth profile confirms filled breach 41.
The cross section 25 formed according to multiple depth profiles being arranged side by side is schematically shown in the diagram.Along x-axis
Different positions are depicted, and different depth are depicted along y-axis.Corresponding intensity level is according to color or Gray Classification
Draw on ground.The intensity level of one position of correspondence of different depth value represents a depth profile.In the illustrated example, for letter
Change illustrate only for the distinctive intensity level of transition part from a material layer to another material layer.Boundary face is not seen
Other depth values are in this respective intensities value 0.Border can be well seen in the shown cross section 25 by derived from depth profile
Layer 44 and 45 and outer surface 15.Additionally, can see at each seamed edge corresponding to the strong of distinctive substrate transition part
Angle value, the breach 41 that the seamed edge gauge is opened up and filled.
Can see well, such cross section represents that being markedly different from the cross section that figure 5 illustrates represents, in figure
The expression of similar secure file is schematically illustrated in 5, the secure file is not including the breach of filled taper.Can
To be clearly seen that surface 15 and unmodified two layer borders 44,45.
Alternatively process it is possible that performing statistical analysiss.If for example for a selected intensity level or one
Intensity value range draws frequency according to corresponding depth value, then for the file without the breach filled for example is obtained in figure
The view illustrated in 6.The local eminence 53-55 of three sharp gauges can be seen, they all have about the same frequency simultaneously
And can correspond to surface 15 and layer transition part 44,45.
The identical statistical analysiss that figure 7 illustrates the secure file with the taper breach filled are processed.Again can be with
See three protuberance 53-55 for corresponding to surface 15 and layer border 44,45, however it is same additionally by another depth value scope 56
Sample can see 57 intensity levels of limited quantity, and they are caused by tiltedly extending through the cone wall 43 of file(Reference picture 3b).
Show that statistical analysiss are processed in figs. 8 and 9, wherein depicting in predetermined depth bounds according to its frequency
The intensity level of appearance.On not tampered layer border(Fig. 8)Checking in almost only observe characterize layer transition part intensity
Value 61, and in the distribution --- it corresponds to the file with tampered layer border --- according to Fig. 9 around layer border
Depth bounds in do not only exist characterize layer transition part intensity level 61 and also there are multiple other intensity levels, they correspond to body
Between the reflection characteristic of product material 62 or the binding agent that in substrate and for example used or between binding agent and the second substrate layer
Other transition parts 63 for occurring.Can see, can also be clearly seen that by the two comparisons composed and be distorted.
Other analyzing and processing can be provided with again, so as to draw such as depth value scope 71 relative to corresponding position(Referring to
Fig. 4)Depth value --- its intensity level or changes in intensity values are corresponding on a threshold value or in the range of a value.In Fig. 10
Show the figure diagram for drawing.In order to analyze and process, parameterized function 72f (x, t1, t2, a, b, c) of position is matched with depth
Angle value.Function 72 is expressed as solid line.If function 72 is most preferably matched, parameter t1, t2, a, b, c characterize breach 41
Tip.B illustrates centre position.The depth at Δ t=t2-t1 explanations tip, and boundary region of the difference a-c explanations tip in depth t1
The width at place.Checking is realized therefore, it is possible to pass through parameter value with predetermined comparison.
It is appreciated that here merely depict exemplary analyzing and processing.It is of course possible to implement in combination at each analysis
Reason and the analyzing and processing of complexity is carried out, to debate the different security features known in checked file or to confirm its disappearance.Example
Such as can also scanning of a surface rise and fall and it is compared with predetermined.Each described feature can land productivity in any combination
With to realize the present invention.
Reference:
1 checking device
2 white light interferometers
3 light sources
4 light
4m is transmitted into the part of the light in measurement arm
The part of the light that 4mR is reflected back from measurement arm
4r is transmitted into the part of the light in reference arm
The part of the light that 4rR is reflected back from reference arm
5 optical elements
6 beam splitters
7 reference arms
8 ends
9 mirrors
10 adjustment mechanisms
lrWith reference to arm lengths
lmMeasurement arm lengths
11 measurement arms
12 file receiving portions
13 secure files
14 detectors
15 surfaces
P1, P2, P3 position
16 volumes
17 controls and data detection device
19-1-19-3 checks direction
20 paths
21 APUs
23 display devices
24 display surfaces
25 cross sections
26 storage devices
27 interfaces
31st, 32,33 substrate layer
34th, 35,36 printed pixels
37 is horizontal
38 vertical direction
39 substrate layer surfaces
40 file body
41 breach
42 packing materials
43 cone walls
44th, 45 boundary region
53-55 local eminences
56 depth value scopes
57 quantity
61 intensity levels for characterizing layer transition part
62 intensity levels for characterizing volume material
63 intensity levels for characterizing other layer of transition part
71 depth value scopes
72 functions
T1, t2 are used for the parameter value of depth
A, b, c are used for the parameter value of position
Claims (9)
1. a kind of method for authenticating security documents (13), the method comprising the steps of:
The secure file (13) is oriented relative to white light interferometer (2), wherein, the white light interferometer includes light source (3), divides
Light device (6), detector (14), fixed reflector (9) on controllable straight line adjustment mechanism (10), wherein, the light source
(3) produce broadband, the light (4) with spatial coherence and be arranged such with regard to the beam splitter (6) so that the light splitting
Device (6) is directed to a part (4m) for the light in measurement arm (11), and file receiving portion (12) is measured in arm positioned at described, and
And the beam splitter (6) is directed to a part (4r) for the light in reference arm (7), the reflector described in the reference arm
(9) be arranged such so that the reflector by the light (4rR) be reflected back on the beam splitter (6) and there with setting
Put and be reflected back the light splitting on the secure file (13) in the file receiving portion (12) or in the file receiving portion (12)
Light (4mR) superposition of device (6), wherein, the detector (14) is arranged such so that the detector can be detected in the ginseng
Examine doing of producing in the case that the light (4rR) for being reflected of arm (7) be superimposed with the light (4mR) for being reflected of measurement arm (11)
Relate to signal;
White light interference inspection is performed at least one position (P1-P3) place on the surface (15) of secure file (13), wherein, along
Check that direction (19-1 to 19-3) sets up depth profile, its mode is, by the reflection during the interference signal is detected
The line shifting of device (9) is changing with reference to arm lengths (lr), wherein, the reference arm lengths (lr) and measurement arm lengths (lm) phase
Should, it corresponds to the spacing along the inspection direction (19-1 to 19-3) with the beam splitter (6), and the spacing is at least to reaching
The surface (15) of the secure file (13) on the file receiving portion (12) or in the file receiving portion (12) and straight
To the inside of the secure file (13);
Feature is derived by the depth profile, and the derived feature of at least one institute predetermined is compared with one or more
Compared with to derive checking decision.
2. method according to claim 1, it is characterised in that be oriented so as to the secure file (13) so that the inspection
Look into direction (19-1 to 19-3) vertically oriented with the surface (15) of the secure file (13).
3. method according to claim 1 and 2, wherein, for the surface (15) together along the secure file (13)
On multiple positions (P1 to P3) for arranging of a path (20), or for being arranged on the surface of the secure file (13)
(15), including the multiple positions (P1 to P3) in the face region of at least one position (P1), and for described at least one
The depth profile of individual position (P1) detects depth profile simultaneously.
4. method according to claim 3, it is characterised in that the secure file (13) is shown in display device (23)
At least one cross section (25) asked for by the depth profile for being detected, the cross section is by the inspection direction (19-1
To 19-3) and the path (20) or the expansion of the profile in the face region.
5. method according to claim 1 and 2, it is characterised in that statistically analyze and process in terms of its frequency multiple
The intensity level corresponding with each depth value or depth bounds of depth profile and/or changes in intensity values, so as to ask for it is desired
Statistical distribution deviation as the evidence distorted or forge.
6. method according to claim 1 and 2, it is characterised in that depth below value is analyzed and processed in terms of its frequency:
The depth value is on a threshold value or occurs passing through respectively in the range of the value limited by upper threshold value and lower threshold value
The comparison of the intensity level of an adjacent space position in intensity level and the secure file (13) or with the secure file
(13) intensity level or changes in intensity values that the comparison of the intensity level of some the adjacent space positions in is asked for, to ask for and one
Or multiple desired statistical distribution deviation or concordance and be derived there it is described checking determine.
7. method according to claim 4, it is characterised in that at least one innings of at least one cross section (25)
In portion or depth bounds, position is passed through along the position (P1 to P3) corresponding at least one path or curve with regard to it
The intensity level of predetermined, the corresponding depth value of intensity level of one value scope of parameterized approximation to function or a value scope becomes
Change corresponding depth value, and according to it is described it is approximate in derived parameter (t1, t2, a, b, c) make the checking and determine.
8. a kind of checking device (1), described to verify that device includes file receiving portion (12), white light interferometer (2) and analyzing and processing
Device (21), the white light interferometer is configured to for being arranged on the file receiving portion (12) or the file receiving portion
(12) at least one position (P1) on a surface (15) of the secure file (13) in is along transverse to the surface (15)
Depth profile is set up in the inspection direction (19-1) of orientation, and the APU analyzes and processes at least one depth letter
Shelves, wherein, the white light interferometer (1) including light source (3), beam splitter (6), detector (14), controllable straight line adjustment
Fixed reflector (9) and control and data detection device (17) in mechanism (10), wherein, the light source (3) produces broadband
, the light (4) with spatial coherence and be arranged such with regard to the beam splitter (6) so that the beam splitter (6) will be described
A part (4m) for light is directed in measurement arm (11), and the file receiving portion (12) is in the measurement arm and described
Beam splitter (6) is directed to a part (4r) for the light in reference arm (7), and the reflector (9) described in the reference arm is such as
This setting so that the reflector by the light (4rR) be reflected back on the beam splitter (6) and there with being arranged on
State and be reflected back the beam splitter (6) on the secure file (13) in file receiving portion (12) or in the file receiving portion (12)
Light (4mR) is superimposed, wherein, the detector (14) is arranged such so that the detector can be detected in the reference arm (7)
The light (4rR) for being reflected with it is described measurement arm (11) the light (4mR) for being reflected be superimposed in the case of generation interference signal,
Wherein, the control is coupled with data detection device (17) with the straight line adjustment mechanism (10), to detect the interference
Changed with reference to arm lengths (l by the line shifting of the reflector (9) during signalr), wherein, the reference arm lengths
(lr) and measurement arm lengths (lm) corresponding, it is corresponded to along the inspection direction (19-1 to 19-3) and the beam splitter (6)
Spacing, the spacing is at least to the secure file up on the file receiving portion (12) or in the file receiving portion (12)
(13) surface (15) and until the inside of the secure file (13).
9. it is according to claim 8 to verify device (1), it is characterised in that the white light interferometer (2) is configured to optics phase
Dry laminagraph device.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102011075943A DE102011075943A1 (en) | 2011-05-16 | 2011-05-16 | Method and device for verification of security documents by means of white light interferometry |
DE102011075943.3 | 2011-05-16 | ||
PCT/EP2012/058646 WO2012156274A1 (en) | 2011-05-16 | 2012-05-10 | Method and apparatus for verifying security documents using white light interferometry |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103534735A CN103534735A (en) | 2014-01-22 |
CN103534735B true CN103534735B (en) | 2017-05-03 |
Family
ID=46052762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201280023559.5A Active CN103534735B (en) | 2011-05-16 | 2012-05-10 | Method and apparatus for verifying security documents using white light interferometry |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP2710564B1 (en) |
CN (1) | CN103534735B (en) |
DE (1) | DE102011075943A1 (en) |
WO (1) | WO2012156274A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2524989B (en) * | 2014-04-08 | 2018-12-26 | Innovia Films Ltd | Apparatus and method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0892371A2 (en) * | 1997-07-18 | 1999-01-20 | Ncr International Inc. | An apparatus for validating sheets |
WO2006123341A1 (en) * | 2005-05-18 | 2006-11-23 | Green Vision Systems Ltd. | Hyper-spectral imaging and analysis system for authenticating an authentic article |
CN101385037A (en) * | 2005-12-23 | 2009-03-11 | 英根亚控股(英国)有限公司 | Optical authentication |
WO2010001165A1 (en) * | 2008-07-01 | 2010-01-07 | Scalar Technologies Limited | Authentication apparatus and methods |
CN101903183A (en) * | 2007-12-11 | 2010-12-01 | 德国捷德有限公司 | Optically variable security element |
CN102016493A (en) * | 2008-04-28 | 2011-04-13 | 英诺薄膜有限公司 | Method for authenticating polymer films |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6584214B1 (en) * | 1999-04-23 | 2003-06-24 | Massachusetts Institute Of Technology | Identification and verification using complex, three-dimensional structural features |
DE102006016131A1 (en) * | 2005-09-22 | 2007-03-29 | Robert Bosch Gmbh | Interferometric measuring device |
WO2010142392A2 (en) * | 2009-06-10 | 2010-12-16 | Bayer Technology Services Gmbh | Identification and/or authentication of articles by means of their surface properties |
CN101718520B (en) * | 2009-11-16 | 2011-01-05 | 浙江大学 | System for quickly measuring surface quality |
-
2011
- 2011-05-16 DE DE102011075943A patent/DE102011075943A1/en not_active Withdrawn
-
2012
- 2012-05-10 EP EP12720181.2A patent/EP2710564B1/en active Active
- 2012-05-10 WO PCT/EP2012/058646 patent/WO2012156274A1/en active Application Filing
- 2012-05-10 CN CN201280023559.5A patent/CN103534735B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0892371A2 (en) * | 1997-07-18 | 1999-01-20 | Ncr International Inc. | An apparatus for validating sheets |
WO2006123341A1 (en) * | 2005-05-18 | 2006-11-23 | Green Vision Systems Ltd. | Hyper-spectral imaging and analysis system for authenticating an authentic article |
CN101385037A (en) * | 2005-12-23 | 2009-03-11 | 英根亚控股(英国)有限公司 | Optical authentication |
CN101903183A (en) * | 2007-12-11 | 2010-12-01 | 德国捷德有限公司 | Optically variable security element |
CN102016493A (en) * | 2008-04-28 | 2011-04-13 | 英诺薄膜有限公司 | Method for authenticating polymer films |
WO2010001165A1 (en) * | 2008-07-01 | 2010-01-07 | Scalar Technologies Limited | Authentication apparatus and methods |
Also Published As
Publication number | Publication date |
---|---|
EP2710564A1 (en) | 2014-03-26 |
WO2012156274A1 (en) | 2012-11-22 |
EP2710564B1 (en) | 2021-02-24 |
DE102011075943A1 (en) | 2012-11-22 |
CN103534735A (en) | 2014-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101379419B (en) | Display and labeled article | |
US20180144183A1 (en) | Method for identifying a security pattern using an artificial 3d reconstruction | |
JP2020509508A (en) | Security document authentication method, security document, device, and security element | |
US20170191946A1 (en) | Apparatus for and method of inspecting surface topography of a moving object | |
KR20170108148A (en) | A computer-readable recording medium including an identification device, an identification method, and an identification program | |
CN107111906B (en) | Identification device, identification method, and computer-readable medium containing identification program | |
US20180046881A1 (en) | High security key scanning system | |
RU2619039C2 (en) | Security document with micro-perforation | |
CN107529927A (en) | Method and system for the paper products sum in certification distributor | |
CN103534735B (en) | Method and apparatus for verifying security documents using white light interferometry | |
US20040156081A1 (en) | Passive hidden imaging | |
CN102597892B (en) | Authenticity determination hologram and fabrication method therefor | |
Raunio et al. | Online quality evaluation of tissue paper structure on new generation tissue machines | |
CN102047296B (en) | For determining the method and apparatus of authenticity | |
CN110337372B (en) | Method for producing a security element | |
KR101020583B1 (en) | Hologram optical inspection system | |
JPH08150800A (en) | Image forming body and printed matter and authenticity judgement method for the body and matter | |
KR20170137193A (en) | How to verify a security device that contains a signature | |
JP7069627B2 (en) | Information recording medium reading method and authenticity judgment method | |
CN113173022A (en) | Transparent anti-counterfeiting element, manufacturing method and detection method thereof, detection equipment thereof and security article | |
CN106875544B (en) | A kind of paper money discrimination method and device | |
WO2015031922A1 (en) | Method for inspecting the surface of objects and coin with authenticity feature | |
EP3415339B1 (en) | Method for the unique identifying of a document | |
KR20200005063A (en) | Anti-counterfeiting pattern, apparatus and method of processing anti-counterfeiting pattern | |
JP6175890B2 (en) | Anti-counterfeit medium and method for reading anti-counterfeit medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |