CN103534735B - Method and apparatus for verifying security documents using white light interferometry - Google Patents

Method and apparatus for verifying security documents using white light interferometry Download PDF

Info

Publication number
CN103534735B
CN103534735B CN201280023559.5A CN201280023559A CN103534735B CN 103534735 B CN103534735 B CN 103534735B CN 201280023559 A CN201280023559 A CN 201280023559A CN 103534735 B CN103534735 B CN 103534735B
Authority
CN
China
Prior art keywords
light
file
secure file
depth
receiving portion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201280023559.5A
Other languages
Chinese (zh)
Other versions
CN103534735A (en
Inventor
A·沃尔夫
M·科伯努斯
U·拉贝尔拉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of CN103534735A publication Critical patent/CN103534735A/en
Application granted granted Critical
Publication of CN103534735B publication Critical patent/CN103534735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/16Testing the dimensions
    • G07D7/164Thickness
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/121Apparatus characterised by sensor details
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching

Landscapes

  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Length Measuring Devices By Optical Means (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention relates to a verification apparatus and a verification method. The verification method comprises the following steps: the security document (13) is oriented relative to a white light interferometer (2), an examination by means of white light interferometry is performed in at least one location (P1 -P3) on a surface to be examined (15), wherein a depth profile is produced in a direction of examination (19-1 to 19-3), a feature is derived from the depth profile, and the at least one derived feature is compared with one or more specifications in order to derive a verification decision.

Description

For by means of the method and apparatus of White Light Interferometer authenticating security documents
Technical field
The present invention relates to a kind of a kind of method and checking device for secure file for authenticating security documents, institute State checking device to perform and use White Light Interferometer, to verify the security feature present in secure file.
Background technology
Various features well known in the art, they are used to protect document as follows so that cannot be without permission Ground is manufactured, forges or distort these documents.Therefore, security feature can be the duplication for making file or article, unwarranted system Make, forge or other kinds of distorting becomes difficult, becomes that or at least undesirable process can not possibly be made in accurate inspection Verifiable all features.
To have make duplication, it is imitated, forge or other are distorted and become institute that is difficult, becoming impossible at least one feature There is file to be referred to as secure file.Secure file includes such as travelling passport, identity card, driving license, visa card, visa, and is used for The label of high-quality product --- such as software, access card and bank card, the credit card, phonecard etc. and embody value File --- for example stock, bond, banknote, stamp, tariff pay certificate etc., and several examples are lifted merely illustratively.
Different features can be used as security feature.The material component of such as file can serve as security feature. This refers to cheque paper, and it is used for example in certificate printing or banknote printing.Partly or in combination for adulterator or interpolater and Speech is difficult to different printing methods that are imitated or copying and is also used as security feature.It is different at it in the manufacture of secure file Casting used in nearly all common printing method --- such as intaglio plate method for printing, toppan printing and ink jet printing method Or adherography.This generally illustrates typical, distinctive printing image, the printing image can at least in micrography with it is logical The printing image for crossing other printing methods generations makes a distinction.
Structure, embossment structure, specific color of bending etc. are used as other security features.Especially, including By can be integrated by multiple different security features in the modern safety file of the file body of one or more plastic material manufacture To in a secure file.However, with secure file --- such as banknote or card that can realize especially manufacturing in high-volume It is integrated new-type and more complicated in part paper, be difficult to the scientific and technological progress of security feature forged, adulterator imitated and/or forge The ability of secure file is also improved.Accordingly, it would be desirable to the more and more perfect method and apparatus for verifying security feature is realized, It can realize the reliable differentiation between genuine secure file and imitated or forgery secure file.Such operation is referred to as testing Card.
The content of the invention
By different verification method known in the art and checking device, they are generally matched with specific security feature And provide for the checking of the specific security feature.It is desirable that, new verification method and checking device are realized, They can be used for various security features and/or secure file, to verify to it in terms of its verity and genuine.
The technical assignment is solved by a kind of verification method, and it uses White Light Interferometer, so that nothing is devastatingly checked The surface texture and internal structure of file.Checking can be performed by a kind of checking device, the checking device is dry including white light Interferometer, it is configured at least set up the depth profile of secure file at a position.The depth profile is not necessarily necessary Inspection direction along secure file on whole extension extends.It means that depth profile not necessarily penetrates whole file.This For example cannot be realized by means of White Light Interferometer in the file including opaque layer or metallic reflector.
According to the basic conception, a kind of method for authenticating security documents is proposed, be the method comprising the steps of: The secure file is oriented relative to white light interferometer;White light is performed at least one position on the inspection surface of secure file The inspection of interference, wherein setting up depth profile along transverse to the inspection direction for checking surface orientation;And by depth letter Shelves derive feature and by the derived feature of at least one institute with one or more it is predetermined be compared, determine to derive checking It is fixed.
Such method can be realized by checking device, the checking device includes file receiving portion and white light interferometer And also including APU, the white light interferometer is configured in the file receiving portion or described for being arranged on At least one position on one surface of the secure file in file receiving portion is along the inspection transverse to the surface orientation Depth profile is set up in direction, and the APU analyzes and processes at least one depth profile.
Definition
The broadband interference of light with spatial coherence will be made and analyze and process any optical interferometric devices of the interference It is considered as white light interferometer.Here, the spectrum is completely or partially arranged on visible wavelength region, infrared wavelength range or ultraviolet It is unessential in wave-length coverage.
Depth profile will be considered as corresponding to the measured value of the physical parameter along the different depth for checking direction, wherein checking It is individual that direction extends to one --- in the inside of such as file, i.e. volume.Generally depth profile is outside object or body surface Place starts, and the inspection direction or path are extended in the object.Depth profile corresponds to checked object, for example pacifies A position at the surface of whole file.The position is the optional position at surface, and inspection direction is represented at the position Straight line intersect with surface.
Depth value is along inspection direction(Depth profile is set up along the inspection direction)With regard to the spacing of a reference value. Can represent to check that the straight line in direction is propagated with the surface of file coating or the light in measurement arm as reference value The intersection point in any other faces in direction.
Following direction is referred to as checked direction:It is mapped on the surface of object to be checked along the direction light.Here is not Consider the local unevenness on surface.
Corresponding to depth value, the metrical information by derived from interference values be referred to as intensity level.
The derivation of feature is interpreted as a parameter or an arbitrary abstract or mathematical creation or structure --- for example The derivation of intensity level vector or one group of depth value/intensity level tuple.Whole or therein selections of depth value and intensity level are same Sample represents the derivation of feature as the value produced by statistical analysiss process.
Changes in intensity values is allocated to the depth value of depth profile and by relatively asking with one or more intensity levels The value for taking, one or more of intensity levels are corresponding to the area of space of the object for being checked, these area of space with pass through position Put and depth value(And for the depth profile of all common detections unified inspection direction)It is determined that region it is adjacent. In simplest embodiment, changes in intensity values with following intensity level by relatively asking for:The intensity level is for identical depth One or more adjacent depth values in degree profile are given.In other embodiments, it is also possible to consider adjacent table together Face position and identical or adjacent depth value intensity level.
Preferred embodiment
Advantages below is had according to the present invention of its basic conception:Can verify at the surface of secure file or in inside The structure of appearance, it can occur transverse to surface on the different depth of file.For example can ask for by transparent plastics Be stored with as blacking the appreciable information for human viewer in which aspect of file body made by material. This, distinguishes different methods in terms of the steric configuration of the ingredient of the carrying information of secure file, different by these Method can in file body storage information.If for example by information printing to being subsequently laminated into other substrate layers a file On the substrate layer of body, then information is located near at least unborn layer border.But if information is by laser labeling method Introduce, then the partially carbonized dyeing that generally larger volume range passes through plastic material.As can be seen that letter in depth profile Which depth breath is marked in, so as to printing method can make a distinction with laser labeling method.Laser labeling method is sometimes Referred to as laser notch board method.
In order to especially make in the secure file based on the transparent or partially transparent file body of plastic manufacturing The bending effect being likely to occur on paper surface is minimized as far as possible, is preferably oriented so as to the secure file so that by white What the white light being mapped on secure file of optical interferometer determined checks that direction is vertically oriented with the surface of secure file.The table Face here is to check surface, and it is typically the surface of secure file, and it has the plane development of maximum.In checking device, can To realize such orientation simply by the following manner:It is constructed so as to file receiving portion so that be disposed thereon or therein Secure file is automatically with its surface perpendicular to inspection direction orientation.For example file receiving portion can be configured to bearing-surface, institute State bearing-surface for example to constitute by hardly having the parallel plate of absorbefacient, transparent, plane in wave-length coverage, safety text Part plane earth is placed or is pressed on the plate with its surface to be checked.Compress be responsible for secure file along its whole surface or The larger subregion on its surface most preferably reclines on the bearing surface.This is particularly with the secure file for deforming in use Favourable.
White light interferometer in a preferred embodiment include light source, beam splitter, detector, in controllable straight line Fixed reflector and control and data detection device on adjustment mechanism, wherein light source produce broadband, with spatial coherence Property light and be arranged such with regard to beam splitter so that beam splitter by a part for light be directed to measurement arm in, file receiving portion In the measurement arm;And a part for light is directed in reference arm, reflector is arranged such in the reference arm, So that the reflector reflect light back on beam splitter and there with file receiving portion is arranged on or file receiving portion On secure file on be reflected back the optical superposition of beam splitter, wherein detector is arranged such so that detector can be detected in ginseng Examine the light for being reflected of arm and measurement arm reflected optical superposition when the interference signal that produces, wherein control and detection means with Straight line adjustment mechanism is coupled, and to change by the line shifting of reflector during detection interference signal arm lengths are referred to, Wherein corresponding to measurement arm lengths with reference to arm lengths, it is equal to along the spacing for checking direction and beam splitter, and the spacing is at least Reach the surface and until the inside of secure file of secure file in the file receiving portion or in the file receiving portion. Therefore, the reference arm lengths of interferometer are changed by the change of reflector locations.Measurement arm in light be mapped to object to be checked, I.e. on the surface of secure file and also at least partially in secure file.Not only at surface but also along the propagation of light Path will check one of light along the characteristic for checking the feature that direction includes according to secure file or wherein in secure file Divide and reflect back in interferometer in measurement arm.According to by reflector(For example, reference mirror)Position determine reference brachium Degree determines:Any part of light(It is reflected back in interferometer along the inspection direction in secure file)Cause mutually long at detector Interfere.Therefore, the reflector locations in reference arm determine to a certain extent the depth by produced interferential scanning.But Because not using monochromatic light but targetedly using broadband, the light with spatial coherence completely, what is produced is dry Relate to pattern much more complex.However, by following computational algorithm known in the art:The computational algorithm can be realized by the time On the interference signal that obtains successively derive along the depth profile for checking direction, the interference signal is in the reference arm length change phase Between be detected.Such algorithm is also used for optical coherence tomography(OTC).Optical coherence tomography(OTC)Especially It is by known to field of ophthalmology and there for example for dynamic retinoscopy.
Therefore, white light interferometer is preferably configured as optical coherence tomography device.
If for depth profile is asked in the multiple positions at the surface of secure file, much more accurate letter can be realized Breath or much more complex checking.In a preferred embodiment, for being arranged on secure file together along a path Surface on multiple positions or for being arranged in the face region including at least one position on the surface of secure file Multiple positions, depth profile is detected with the depth profile simultaneously at least one position.In suitable configuration Can realize by the broadband, light with spatial coherence the light beam along a Directional Extension be sent on beam splitter and Along a line on the surface of secure file, i.e. path irradiation secure file and therefore transverse to surface, be preferably perpendicular to Surface is at the position irradiated while detecting a depth profile respectively.For this it is required that detector is for be detected Each in position include a light activated detecting element, so as to detect corresponding to each position interference and by This corresponding depth profile for each position can derive.If light is along two spaces Directional Extension, it is right to realize Depth profile is detected simultaneously in position in a face.In the situation, detector must not only have the sensitive biography of image The linear array of sensor and with the horizontal layout of the sensitive detecting element of image, they can be with for the relevant position in face The interference signal during reflector locations change is detected respectively.
In order to checking can be implemented, it is advantageous to show at least one of secure file on the display apparatus by being detected The cross section asked for of depth profile, the cross section is by checking direction and path or the profile exhibition in the region of face Open.In principle it is possible that any setting of the position on the surface for passing through secure file forms an axis of cross section simultaneously And corresponding depth profile is abreast set each other, to form cross section.But generally meaningfully, in cross-section that The depth profile that this is abreast illustrated is also to be spatially disposed adjacent to each other point on the surface corresponding.Such cross section Represent(It for example represents the cross section of the area of space along path lateral in the surface of file in file internal)'s Advantage is the layer that for example exists hereof or layer transition part is visible.Modern secure file is often by multiple substrates Layer is stitched together by laminating method.It is not that lamination process can be so performed in all scenario so that there is entirety File body, original layer border in the file body also can no longer turn out to be in solids phase transition in e measurement technology Portion.
However, can be by depth profile in the secure file of the such overall configuration in it can not realize file body Varying strength value confirm these layer of border, although they are non in the Visual Observations Observations of human user.Therefore, this The cross section of sample illustrates different intensity level or changes in intensity values in layer boundary, so as to these layer of border is in cross section represents It is significantly visible.If now in order to distort one such file of division to change such as passport photograph information or such as The other information for knowing the people corresponding to the secure file is debated, then may usually view layer after the layer being split off is spliced again Dramatically different in structure, the Rotating fields are visible in cross section derived from white light interference ground.Therefore, it is such transversal The optical check that face represents can make checking personnel simply find the file distorted.Can be known by similar mode Not different printing methods.If for example using toppan printing, can see in the edge of the letter or symbol that are cast To the extruding occurred in printing plane in printing.Therefore, distinctive height is shown by means of the printing layer of letterpress manufacture Degree contour feature, it can be derived by cross section profile.This is equally applicable to the printed element by means of intaglio printing manufacture.
In the modern secure file based on plastic manufacturing, such as ink jet printing method is used, the ink jet printing method Ink is manufactured based on plastic material, and by the plastic material substrate layer is manufactured, and ink jet printing is applied on the substrate layer.It is described Printing layer has advantages below:The printing layer can also be in large area realized, without the thus realization on printed face Layering probability, because ink material is most preferably connected in lamination step with adjoined substrate layer.However, the face for being used Expect not necessarily to be retained on printed surface according to the concrete composition of the printing-ink for being used, but may be targetedly In being diffused into substrate layer, printing is applied on the substrate layer.Therefore, check depth profile when can significantly distinguish by The printing zone produced in such ink jet printing method and other printing zones.
Also can recognize that and the division during this period of file body or layering and/or if necessary by the verification method for being proposed Other safety elements --- such as metal forming or other kinds of that removal and/or new added material, addition change or forgery Patch or hologram combine other distort because generally unusable in original file system in splicing and/or addition Same procedure parameter used in making is so that different layers is connected to each other.Therefore, in horizontal stroke at the position distorted Occurs the change that can significantly perceive of the jump form in the layer transition part of for example otherwise parallel trend in the profile of section.
In order to realize that mechanical analysis is processed, can be used as the predetermined storage depth profile in data base or memorizer Or the cross section formed by the depth profile is used as predetermined.By striked depth profile, cross section profile with it is described Predetermined comparison can realize checking.
In one embodiment, statistically in terms of frequency analyze and process it is corresponding to each depth value or depth bounds Intensity level and/or changes in intensity values, to ask for the deviation of desired statistical distribution as the evidence distorted or forge. Region adjacent with layer transition part in such as file can be selected as depth bounds, in this region for not tampered Secure file occurs without the intensity level and/or changes in intensity values for characterizing transition part.Because not in tampered secure file Exactly corresponding to the depth value of the depth of layer transition part in the case of also there is layer transition part or adjoint with it distinctive strong Angle value and/or changes in intensity values, so for example finding to have than original in the secure file forged in such analyzing and processing Bigger frequency, display layer transition part intensity level in beginning file.It is also possible that the depth model of analyzing and processing layer transition part Enclose and here in the region of layer transition part for tampered secure file finds the frequency of intensity level or changes in intensity values, It is inconsistent with layer transition part.
In another embodiment, depth below value is analyzed and processed in terms of its frequency:One at the depth value Occur respectively by intensity level and secure file on individual threshold value or in the range of the value limited by upper threshold value and lower threshold value In adjacent space region intensity level comparison or by the adjacent space position in intensity level and secure file some are strong Intensity level or changes in intensity values that the comparison of angle value is asked for, to ask for the deviation with one or more desired statistical distribution And/or concordance and be derived there checking determine.If for example in this way analyzing and processing characterizes the layer transition for determining Portion or for the printing method for determining typical intensity level, then obtain following explanation:Which it can be found that in depth The information that such transition part or in this way method are introduced in printing technology.In tampered file, Such depth Distribution value for example for layer transition part is to spread, because layer transition part is due to distorting in different depth Occur.
Can also analyze and process in combination and/or using the different statistical analysiss processing methods.
In another embodiment, at least one local, such as depth value scope of at least one cross section In, the corresponding depth value of changes in intensity values of the corresponding depth value of intensity level of a value scope or a value scope is right with regard to its The position answered along at least one path or predetermined, the parameterized approximation to function of curve negotiating position, and according to It is described it is approximate in derived parameter make checking and determine.If as security feature for example in a system in a secure file Into file in breach was opened up before its splicing in the boundary region that internally arranges, the breach is changed in a cutting plane Surface profile and subsequently it is so filled so that not comprising cavity volume in the secure file made by, then in the suitable of cross section Close the line consistent with border seamed edge that profile that is distinctive, following opened up breach is produced in the case of selecting.Can be optimal The function of the approximate tangent line trend in ground can be matched with the line.In the prior art, following approximation method is known:Institute State the parameter that approximation method so changes function so that realize that the value asked for by experiment, the tangent line provided in this depth value are walked To the concordance as well as possible between parameterized function.The position of the breach that subsequently can be for example opened up according to sign, Shape and depth perform checking by simple mode.
For varying strength value human perception advantageously, for example this is shown on the display face by different color value A little intensity levels.The display device coupled with APU is preferably constructed so as to so that the display device provides such Colour is represented, can shown on said display means by least one depth profile and for other on the surface of secure file The cross section that other depth profiles of position are formed.It should be noted that the color is not pacified with being possibly used for being stored in secure file The color of full feature is related.The color is used only for the simpler ga s safety degree of striked varying strength value.
Description of the drawings
The present invention will be explained in further detail with reference to the accompanying drawings below according to preferred embodiment.Accompanying drawing is illustrated:
Fig. 1:The schematic diagram of checking device;
Fig. 2:The schematic diagram of the local of the Rotating fields of secure file, is drawn in the secure file by means of ink jet printing method Information is entered;
Fig. 3 a, 3b:It is that the security feature passes through to be opened up and be then filled with for illustrating the schematic diagram of security feature Breach constitute;
Fig. 4:For secure file, the cross section by derived from depth profile the signal with the structure according to Fig. 3 b Figure;
Fig. 5:The schematic diagram of cross section by derived from the depth profile of secure file, the secure file does not have according to figure The feature of 3b;
Fig. 6:For the schematic diagram processed with the statistical analysiss of unmodified parallel layers, illustrated therein is relative to it The frequency of the intensity level of the intensity value range of corresponding depth value;
Fig. 7:For with similar to the configuration according to Fig. 3 b secure file similar to the corresponding statistical according to Fig. 6 The figure that analysis is processed is represented;
Fig. 8:The diagram that another statistical analysiss of the secure file do not forged are processed;
Fig. 9:For forge secure file similar to the schematic diagram processed according to the statistical analysiss of Fig. 8;
Figure 10:The schematic graphical diagram of analyzing and processing, wherein drawing depth value relative to the corresponding position on surface The parameterized function of the depth value of scope and the position is matched with depth value.
Specific embodiment
Checking device 1 is schematically shown in FIG.The checking device includes white light interferometer 2.The white light is done Interferometer 2 includes light source 3, and the light source sends the broadband light 4 with spatial coherence.In the embodiment as shown, lead to first Crossing optical element 5 extends light 4.The light is subsequently mapped on beam splitter 6.The beam splitter enters can a part of 4r of light In reference arm 7, mirror 9 is located at the end 8 of the reference arm as reflector.The mirror is movably supported on adjustment mechanism 10 On.Adjustment mechanism 10 can point-blank such moving lens 9 so that can change length l of reference armr
At beam splitter 6, another part 4m of light is deflected in measurement arm 11.In measurement arm 11, for example, constructing To be provided with the secure file 13 as measurement object in the file receiving portion 12 of glass plate.Make at surface 15 and in safety Be reflected back in the volume 16 of the inside of file 13 measurement arm 11 in light 4mR at beam splitter 6 with reflected from reference arm 7 by mirror 9 The light 4rR for returning is superimposed and is directed on detector 14.In the embodiment as shown, detector 14 has multiple light activated Sensing element(It is not shown).
Exemplarily, the beam guiding of three positions P1, P2, P3 is shown on the surface 15 of secure file 13.In table At face position P1, P2, P3 or the inside of secure file 13 along measurement arm 11 the light 4m being mapped on surface 15 propagation The light 4mR that direction the is reflected back and light 4rR being correspondingly reflected back in reference arm 7 is at a sensor element of detector 14 It is superimposed and as interference signal detection.During measuring, change length l of reference arm 7r.Corresponding isometric measurement arm lengths lm In the volume 16 for extending to secure file 13 from surface 15.The interference signal of time resolution ground detection is supplied to control with number According to detection means 17, it asks for corresponding position P1, P2, P3 along inspection direction according to the measured value of each measuring cell The depth profile of 19-1 to 19-3.Check that direction 19-1 to 19-3 is true by directions of the light 4m at corresponding position P1 to P3 It is fixed.It is appreciated that can simultaneously detect and analyze and process for along road according to the illumination of file 13 and the resolution of detector 14 Multiple positions in footpath 20 or(If the plane of light 4 extends)For the depth profile of the position being distributed on one face.Control and number Adjustment mechanism 10 is controlled during measurement test according to detection means 17, by the adjustment mechanism point-blank moving lens 9, with Just change and refer to arm lengths lrAnd thus change corresponding measurement arm lengths lm
The measurement data --- it represents interference signal --- for being detected is analyzed and processed by control with data detection device 17, To set up affiliated depth profile for each position P1-P3.This is according to as known to for optical coherence tomography Algorithm is realized.For affiliated intensity level is included along the depth value for checking direction, it is represented uses the depth profile of one position In the tolerance of the reflection in the region of the secure file for being checked, the region is determined by position and corresponding depth value.Subsequently Depth profile is analyzed and processed in APU 21.Control can be with 21 groups of APU with data detection device 17 Close in one apparatus.Both can individually or jointly be embodied as programme controlled device.Alternatively, at least control and detection Device 17 purely can be implemented in hardware.In the embodiment as shown, verify that device 1 additionally includes display device 23, it includes the display surface 24 of freely programmable, and the cross section 25 by derived from depth profile is for example shown on the display surface. This schematically figure 1 illustrates.Different layer borders 44,45 can be seen, significant intensity level occur on the layer border. Additionally, verify that device can include storage device 26, the depth letter being stored with the storage device for example for determining The predetermined data of shelves, statistical characteristics or exemplary cross section, it can be used for and striked depth profile, cross section Or static analysis is processed and compared, to verify the secure file for checking respectively for.It is also possible that APU includes connecing Mouth 27, by the interface predetermined value can be called from data base.It is also possible that by the output measurement knot of interface 27 Fruit and/or checking determine that the interface is so structured that interface or radio interface of wired connection etc..
The local of secure file 12 is schematically shown in fig. 2, and it is by three different shapes of substrate layer 31,32,33 Into.Carry out coding information by means of ink jet printing in the file.Three printed pixels 34,35,36 are printed on the substrate of centre On layer 32.Here, a part for printing-ink is diffused in the substrate layer 32 of centre and in the substrate layer 33 that is disposed below. Generally speaking, substrate layer 31 to 33 is for example spliced into a file body 40 by laminating method.In depth profile is checked, not only It is on horizontal 37 and same visible significant in the vertical direction 38 of the orientation of substrate layer surface 39 perpendicular to substrate layer 32 Extend.Therefore, the information for storing in file body 40 can be different from the information applied by other printing processes, it is described its No pigment is diffused in substrate layer 32 or pigment is not so significantly to be diffused in substrate layer 32 in his printing process.
Other local of file body 40 are schematically shown in Fig. 3 a and 3b.Show in fig. 3 a:In file body Open up the breach 41 of taper in 40 first.Implement the preferred all transparent of each substrate layer 31 to 33 and here is only merely for letter Change the reason for representing and be provided with different hacures.However, each substrate layer can have different refractive indexs.Illustrate in fig 3b Made by file body, the breach 41 of described in file body taper filled with preferably same transparent packing material 42. The refractive index of packing material 42 is preferably slightly different to the refractive index of the material for manufacturing substrate layer 31 to 33.Setting up file body Change that can be in the boundary region 44 and 45 of otherwise flat during depth profile confirms filled breach 41.
The cross section 25 formed according to multiple depth profiles being arranged side by side is schematically shown in the diagram.Along x-axis Different positions are depicted, and different depth are depicted along y-axis.Corresponding intensity level is according to color or Gray Classification Draw on ground.The intensity level of one position of correspondence of different depth value represents a depth profile.In the illustrated example, for letter Change illustrate only for the distinctive intensity level of transition part from a material layer to another material layer.Boundary face is not seen Other depth values are in this respective intensities value 0.Border can be well seen in the shown cross section 25 by derived from depth profile Layer 44 and 45 and outer surface 15.Additionally, can see at each seamed edge corresponding to the strong of distinctive substrate transition part Angle value, the breach 41 that the seamed edge gauge is opened up and filled.
Can see well, such cross section represents that being markedly different from the cross section that figure 5 illustrates represents, in figure The expression of similar secure file is schematically illustrated in 5, the secure file is not including the breach of filled taper.Can To be clearly seen that surface 15 and unmodified two layer borders 44,45.
Alternatively process it is possible that performing statistical analysiss.If for example for a selected intensity level or one Intensity value range draws frequency according to corresponding depth value, then for the file without the breach filled for example is obtained in figure The view illustrated in 6.The local eminence 53-55 of three sharp gauges can be seen, they all have about the same frequency simultaneously And can correspond to surface 15 and layer transition part 44,45.
The identical statistical analysiss that figure 7 illustrates the secure file with the taper breach filled are processed.Again can be with See three protuberance 53-55 for corresponding to surface 15 and layer border 44,45, however it is same additionally by another depth value scope 56 Sample can see 57 intensity levels of limited quantity, and they are caused by tiltedly extending through the cone wall 43 of file(Reference picture 3b).
Show that statistical analysiss are processed in figs. 8 and 9, wherein depicting in predetermined depth bounds according to its frequency The intensity level of appearance.On not tampered layer border(Fig. 8)Checking in almost only observe characterize layer transition part intensity Value 61, and in the distribution --- it corresponds to the file with tampered layer border --- according to Fig. 9 around layer border Depth bounds in do not only exist characterize layer transition part intensity level 61 and also there are multiple other intensity levels, they correspond to body Between the reflection characteristic of product material 62 or the binding agent that in substrate and for example used or between binding agent and the second substrate layer Other transition parts 63 for occurring.Can see, can also be clearly seen that by the two comparisons composed and be distorted.
Other analyzing and processing can be provided with again, so as to draw such as depth value scope 71 relative to corresponding position(Referring to Fig. 4)Depth value --- its intensity level or changes in intensity values are corresponding on a threshold value or in the range of a value.In Fig. 10 Show the figure diagram for drawing.In order to analyze and process, parameterized function 72f (x, t1, t2, a, b, c) of position is matched with depth Angle value.Function 72 is expressed as solid line.If function 72 is most preferably matched, parameter t1, t2, a, b, c characterize breach 41 Tip.B illustrates centre position.The depth at Δ t=t2-t1 explanations tip, and boundary region of the difference a-c explanations tip in depth t1 The width at place.Checking is realized therefore, it is possible to pass through parameter value with predetermined comparison.
It is appreciated that here merely depict exemplary analyzing and processing.It is of course possible to implement in combination at each analysis Reason and the analyzing and processing of complexity is carried out, to debate the different security features known in checked file or to confirm its disappearance.Example Such as can also scanning of a surface rise and fall and it is compared with predetermined.Each described feature can land productivity in any combination With to realize the present invention.
Reference:
1 checking device
2 white light interferometers
3 light sources
4 light
4m is transmitted into the part of the light in measurement arm
The part of the light that 4mR is reflected back from measurement arm
4r is transmitted into the part of the light in reference arm
The part of the light that 4rR is reflected back from reference arm
5 optical elements
6 beam splitters
7 reference arms
8 ends
9 mirrors
10 adjustment mechanisms
lrWith reference to arm lengths
lmMeasurement arm lengths
11 measurement arms
12 file receiving portions
13 secure files
14 detectors
15 surfaces
P1, P2, P3 position
16 volumes
17 controls and data detection device
19-1-19-3 checks direction
20 paths
21 APUs
23 display devices
24 display surfaces
25 cross sections
26 storage devices
27 interfaces
31st, 32,33 substrate layer
34th, 35,36 printed pixels
37 is horizontal
38 vertical direction
39 substrate layer surfaces
40 file body
41 breach
42 packing materials
43 cone walls
44th, 45 boundary region
53-55 local eminences
56 depth value scopes
57 quantity
61 intensity levels for characterizing layer transition part
62 intensity levels for characterizing volume material
63 intensity levels for characterizing other layer of transition part
71 depth value scopes
72 functions
T1, t2 are used for the parameter value of depth
A, b, c are used for the parameter value of position

Claims (9)

1. a kind of method for authenticating security documents (13), the method comprising the steps of:
The secure file (13) is oriented relative to white light interferometer (2), wherein, the white light interferometer includes light source (3), divides Light device (6), detector (14), fixed reflector (9) on controllable straight line adjustment mechanism (10), wherein, the light source (3) produce broadband, the light (4) with spatial coherence and be arranged such with regard to the beam splitter (6) so that the light splitting Device (6) is directed to a part (4m) for the light in measurement arm (11), and file receiving portion (12) is measured in arm positioned at described, and And the beam splitter (6) is directed to a part (4r) for the light in reference arm (7), the reflector described in the reference arm (9) be arranged such so that the reflector by the light (4rR) be reflected back on the beam splitter (6) and there with setting Put and be reflected back the light splitting on the secure file (13) in the file receiving portion (12) or in the file receiving portion (12) Light (4mR) superposition of device (6), wherein, the detector (14) is arranged such so that the detector can be detected in the ginseng Examine doing of producing in the case that the light (4rR) for being reflected of arm (7) be superimposed with the light (4mR) for being reflected of measurement arm (11) Relate to signal;
White light interference inspection is performed at least one position (P1-P3) place on the surface (15) of secure file (13), wherein, along Check that direction (19-1 to 19-3) sets up depth profile, its mode is, by the reflection during the interference signal is detected The line shifting of device (9) is changing with reference to arm lengths (lr), wherein, the reference arm lengths (lr) and measurement arm lengths (lm) phase Should, it corresponds to the spacing along the inspection direction (19-1 to 19-3) with the beam splitter (6), and the spacing is at least to reaching The surface (15) of the secure file (13) on the file receiving portion (12) or in the file receiving portion (12) and straight To the inside of the secure file (13);
Feature is derived by the depth profile, and the derived feature of at least one institute predetermined is compared with one or more Compared with to derive checking decision.
2. method according to claim 1, it is characterised in that be oriented so as to the secure file (13) so that the inspection Look into direction (19-1 to 19-3) vertically oriented with the surface (15) of the secure file (13).
3. method according to claim 1 and 2, wherein, for the surface (15) together along the secure file (13) On multiple positions (P1 to P3) for arranging of a path (20), or for being arranged on the surface of the secure file (13) (15), including the multiple positions (P1 to P3) in the face region of at least one position (P1), and for described at least one The depth profile of individual position (P1) detects depth profile simultaneously.
4. method according to claim 3, it is characterised in that the secure file (13) is shown in display device (23) At least one cross section (25) asked for by the depth profile for being detected, the cross section is by the inspection direction (19-1 To 19-3) and the path (20) or the expansion of the profile in the face region.
5. method according to claim 1 and 2, it is characterised in that statistically analyze and process in terms of its frequency multiple The intensity level corresponding with each depth value or depth bounds of depth profile and/or changes in intensity values, so as to ask for it is desired Statistical distribution deviation as the evidence distorted or forge.
6. method according to claim 1 and 2, it is characterised in that depth below value is analyzed and processed in terms of its frequency: The depth value is on a threshold value or occurs passing through respectively in the range of the value limited by upper threshold value and lower threshold value The comparison of the intensity level of an adjacent space position in intensity level and the secure file (13) or with the secure file (13) intensity level or changes in intensity values that the comparison of the intensity level of some the adjacent space positions in is asked for, to ask for and one Or multiple desired statistical distribution deviation or concordance and be derived there it is described checking determine.
7. method according to claim 4, it is characterised in that at least one innings of at least one cross section (25) In portion or depth bounds, position is passed through along the position (P1 to P3) corresponding at least one path or curve with regard to it The intensity level of predetermined, the corresponding depth value of intensity level of one value scope of parameterized approximation to function or a value scope becomes Change corresponding depth value, and according to it is described it is approximate in derived parameter (t1, t2, a, b, c) make the checking and determine.
8. a kind of checking device (1), described to verify that device includes file receiving portion (12), white light interferometer (2) and analyzing and processing Device (21), the white light interferometer is configured to for being arranged on the file receiving portion (12) or the file receiving portion (12) at least one position (P1) on a surface (15) of the secure file (13) in is along transverse to the surface (15) Depth profile is set up in the inspection direction (19-1) of orientation, and the APU analyzes and processes at least one depth letter Shelves, wherein, the white light interferometer (1) including light source (3), beam splitter (6), detector (14), controllable straight line adjustment Fixed reflector (9) and control and data detection device (17) in mechanism (10), wherein, the light source (3) produces broadband , the light (4) with spatial coherence and be arranged such with regard to the beam splitter (6) so that the beam splitter (6) will be described A part (4m) for light is directed in measurement arm (11), and the file receiving portion (12) is in the measurement arm and described Beam splitter (6) is directed to a part (4r) for the light in reference arm (7), and the reflector (9) described in the reference arm is such as This setting so that the reflector by the light (4rR) be reflected back on the beam splitter (6) and there with being arranged on State and be reflected back the beam splitter (6) on the secure file (13) in file receiving portion (12) or in the file receiving portion (12) Light (4mR) is superimposed, wherein, the detector (14) is arranged such so that the detector can be detected in the reference arm (7) The light (4rR) for being reflected with it is described measurement arm (11) the light (4mR) for being reflected be superimposed in the case of generation interference signal, Wherein, the control is coupled with data detection device (17) with the straight line adjustment mechanism (10), to detect the interference Changed with reference to arm lengths (l by the line shifting of the reflector (9) during signalr), wherein, the reference arm lengths (lr) and measurement arm lengths (lm) corresponding, it is corresponded to along the inspection direction (19-1 to 19-3) and the beam splitter (6) Spacing, the spacing is at least to the secure file up on the file receiving portion (12) or in the file receiving portion (12) (13) surface (15) and until the inside of the secure file (13).
9. it is according to claim 8 to verify device (1), it is characterised in that the white light interferometer (2) is configured to optics phase Dry laminagraph device.
CN201280023559.5A 2011-05-16 2012-05-10 Method and apparatus for verifying security documents using white light interferometry Active CN103534735B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102011075943A DE102011075943A1 (en) 2011-05-16 2011-05-16 Method and device for verification of security documents by means of white light interferometry
DE102011075943.3 2011-05-16
PCT/EP2012/058646 WO2012156274A1 (en) 2011-05-16 2012-05-10 Method and apparatus for verifying security documents using white light interferometry

Publications (2)

Publication Number Publication Date
CN103534735A CN103534735A (en) 2014-01-22
CN103534735B true CN103534735B (en) 2017-05-03

Family

ID=46052762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280023559.5A Active CN103534735B (en) 2011-05-16 2012-05-10 Method and apparatus for verifying security documents using white light interferometry

Country Status (4)

Country Link
EP (1) EP2710564B1 (en)
CN (1) CN103534735B (en)
DE (1) DE102011075943A1 (en)
WO (1) WO2012156274A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2524989B (en) * 2014-04-08 2018-12-26 Innovia Films Ltd Apparatus and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0892371A2 (en) * 1997-07-18 1999-01-20 Ncr International Inc. An apparatus for validating sheets
WO2006123341A1 (en) * 2005-05-18 2006-11-23 Green Vision Systems Ltd. Hyper-spectral imaging and analysis system for authenticating an authentic article
CN101385037A (en) * 2005-12-23 2009-03-11 英根亚控股(英国)有限公司 Optical authentication
WO2010001165A1 (en) * 2008-07-01 2010-01-07 Scalar Technologies Limited Authentication apparatus and methods
CN101903183A (en) * 2007-12-11 2010-12-01 德国捷德有限公司 Optically variable security element
CN102016493A (en) * 2008-04-28 2011-04-13 英诺薄膜有限公司 Method for authenticating polymer films

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6584214B1 (en) * 1999-04-23 2003-06-24 Massachusetts Institute Of Technology Identification and verification using complex, three-dimensional structural features
DE102006016131A1 (en) * 2005-09-22 2007-03-29 Robert Bosch Gmbh Interferometric measuring device
WO2010142392A2 (en) * 2009-06-10 2010-12-16 Bayer Technology Services Gmbh Identification and/or authentication of articles by means of their surface properties
CN101718520B (en) * 2009-11-16 2011-01-05 浙江大学 System for quickly measuring surface quality

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0892371A2 (en) * 1997-07-18 1999-01-20 Ncr International Inc. An apparatus for validating sheets
WO2006123341A1 (en) * 2005-05-18 2006-11-23 Green Vision Systems Ltd. Hyper-spectral imaging and analysis system for authenticating an authentic article
CN101385037A (en) * 2005-12-23 2009-03-11 英根亚控股(英国)有限公司 Optical authentication
CN101903183A (en) * 2007-12-11 2010-12-01 德国捷德有限公司 Optically variable security element
CN102016493A (en) * 2008-04-28 2011-04-13 英诺薄膜有限公司 Method for authenticating polymer films
WO2010001165A1 (en) * 2008-07-01 2010-01-07 Scalar Technologies Limited Authentication apparatus and methods

Also Published As

Publication number Publication date
EP2710564A1 (en) 2014-03-26
WO2012156274A1 (en) 2012-11-22
EP2710564B1 (en) 2021-02-24
DE102011075943A1 (en) 2012-11-22
CN103534735A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
CN101379419B (en) Display and labeled article
US20180144183A1 (en) Method for identifying a security pattern using an artificial 3d reconstruction
JP2020509508A (en) Security document authentication method, security document, device, and security element
US20170191946A1 (en) Apparatus for and method of inspecting surface topography of a moving object
KR20170108148A (en) A computer-readable recording medium including an identification device, an identification method, and an identification program
CN107111906B (en) Identification device, identification method, and computer-readable medium containing identification program
US20180046881A1 (en) High security key scanning system
RU2619039C2 (en) Security document with micro-perforation
CN107529927A (en) Method and system for the paper products sum in certification distributor
CN103534735B (en) Method and apparatus for verifying security documents using white light interferometry
US20040156081A1 (en) Passive hidden imaging
CN102597892B (en) Authenticity determination hologram and fabrication method therefor
Raunio et al. Online quality evaluation of tissue paper structure on new generation tissue machines
CN102047296B (en) For determining the method and apparatus of authenticity
CN110337372B (en) Method for producing a security element
KR101020583B1 (en) Hologram optical inspection system
JPH08150800A (en) Image forming body and printed matter and authenticity judgement method for the body and matter
KR20170137193A (en) How to verify a security device that contains a signature
JP7069627B2 (en) Information recording medium reading method and authenticity judgment method
CN113173022A (en) Transparent anti-counterfeiting element, manufacturing method and detection method thereof, detection equipment thereof and security article
CN106875544B (en) A kind of paper money discrimination method and device
WO2015031922A1 (en) Method for inspecting the surface of objects and coin with authenticity feature
EP3415339B1 (en) Method for the unique identifying of a document
KR20200005063A (en) Anti-counterfeiting pattern, apparatus and method of processing anti-counterfeiting pattern
JP6175890B2 (en) Anti-counterfeit medium and method for reading anti-counterfeit medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant