CN105321252B - Terminal unit and method for checking security documents, and terminal - Google Patents
Terminal unit and method for checking security documents, and terminal Download PDFInfo
- Publication number
- CN105321252B CN105321252B CN201510455415.2A CN201510455415A CN105321252B CN 105321252 B CN105321252 B CN 105321252B CN 201510455415 A CN201510455415 A CN 201510455415A CN 105321252 B CN105321252 B CN 105321252B
- Authority
- CN
- China
- Prior art keywords
- security
- security document
- document
- terminal unit
- wavelength range
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/01—Testing electronic circuits therein
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/17—Apparatus characterised by positioning means or by means responsive to positioning
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Facsimile Scanning Arrangements (AREA)
- Image Input (AREA)
Abstract
The invention relates to a terminal unit (116) and a method for machine validating a security document (108), and to a terminal, the terminal unit comprising: a receiving opening (206); a receiving mechanism (518,522) for automatically receiving the security document in the opened state into the receiving opening; an RFID reader (606) configured to: reading data from the RFID chip (608) of the received security document as long as the RFID reader and the RFID chip are both in the reading position (LP1, LP 2); a type identification module (604) for identifying a file type and determining a file type-specific location of the RFID chip within the opened security file in dependence on the identified file type; a drive means (518,522) for automatically moving the RFID reader and the retracted opened security document relative to each other in dependence on the determined position of the RFID chip, such that both the RFID reader and the RFID chip are in their respective reading positions; and the checking module (610) is used for reading data from the security document by using the card reader after reaching the corresponding reading position and checking the security document according to the read data.
Description
Technical Field
The invention relates to a terminal unit for the automatic verification of security documents and to a corresponding method.
Background
Many various security documents are currently used, such as identification cards, travel passports or driver licenses. They may have many different size specifications and be provided with security elements and/or RFID chips at different locations in and on the surface of the security document.
The ICAO (international civil aviation organization) document 9303 specifies, among other things, the size specifications for machine-readable travel documents. This document describes a travel passport with machine readable data in a textual identification format and specifications for an electronic travel passport with biometric identification capabilities using a built-in RFID chip. Currently, for example, a security document conforming to the specification ID-1(ISO/IEC7810, equivalent to 85.60X 53.98mm) is used. Application areas are, for example, bank cards, credit cards, debit cards, driver's licenses and electronic identity cards carried out in germany on 11/1/2010. The old version of the German identity card has the specification ID-2(105 x 74 mm). Visa tags typically have an ID-2 specification so that they can be glued into a travel passport. The German travel passport itself has the specification ID-3 (125X 88 mm). The ID-3 specification determines the size of travel passports worldwide. Travel passports with soft covers (e.g., temporary german travel passports) generally correspond exactly to the ID-3 specification, and in the case of travel passports with hard covers (e.g., german electronic passports), the inner sheets follow the ID-3 specification, while the covers are approximately 2 mm longer.
Many terminals are used at inspection stations such as national borders, airports or enterprise site entrances to automatically inspect security documents and thereby to check whether a person really is the person who claims to be by virtue of the security document and/or to check whether the security document is genuine or valid.
The published application DE102004056007 a1 (mobile checking device for checking the authenticity of travel documents) describes a mobile checking device for checking the authenticity of travel documents, which has a weight of less than 1000 g, in particular less than 700 g. The checking device comprises an identification means for identifying a legitimate user, a release means, an optical reading unit for reading graphical and/or alphanumeric information contained in the pages of the travel document, a data processing unit for processing the signals supplied by the optical reading unit, and a display unit for displaying the read data and the determined checking result.
Document DE102013206700 a1 (document retrieving apparatus and method) describes a document retrieving apparatus, wherein the apparatus has at least one placing surface for placing documents, wherein the apparatus has at least one cover for covering the placing surface, and a corresponding document retrieving method.
DE 202007000708U 1 (document reading device) describes a device for reading documents of identification, in particular electronic certificates, which comprises a reading unit that can be placed in a reading position in relation to the document of identification and allows an authenticity check and/or a functional check of the document of identification to be carried out.
DE10028241 a1 (document testing machine) describes a document testing machine for the automatic testing of documents of value and security documents, which has a cross carriage that can be moved in the X-Y direction and on which the components required for the authenticity feature analysis are mounted. In this case, the X carriage of the cross carriage, which is movable in the X direction, is movably arranged in the more outer Y carriage, which is movable in the Y direction, wherein a first set of authentication units for authenticating the tamper structure is provided on the X carriage together with the laser and the authentication optical elements, and a second set of authentication means, for example for authenticating text, infrared and/or picture fields, is arranged on the Y carriage.
DE 102012003241 a1 (apparatus and method for the automated inspection of documents of value and/or security documents) describes an apparatus for the automated inspection of documents of value and/or security documents, having a placement surface for the documents of value and/or security documents and a first checking means and at least one second checking means. The device, which is compact, inexpensive and equipped with a robust mechanical construction, is distinguished in that it has a holder on which a first arm and at least one further arm are each mounted at least temporarily immovably, wherein the first checking means are arranged on and/or in the first arm and the at least one second checking means are arranged on and/or in the respective further arm.
In this case, a location-limited security feature that reads different types of files very accurately is a technical problem.
Disclosure of Invention
In view of this, the object of the invention is to provide an improved terminal unit and method for secure document inspection.
The objects on which the invention is based are achieved by the features of the independent claims, respectively. The dependent claims present embodiments of the invention. The embodiments described below can be freely combined with each other as long as they are not mutually exclusive.
"security document" means a document that contains one or more security features that make the copying and/or counterfeiting of information difficult or impossible compared to a simple copy, and that are deposited or physically applied or embossed in the security document. For example, the following data may pertain to the information stored in the security document: name, date of birth, place of residence, nationality, height, eye color, skin color, gender, image representation of the person who issued the security document, in particular the passport photograph, biometric characteristic data of the person who issued the identity document, such as fingerprint data, iris information, face information, etc. In addition to such personal data, the security document may also include information that authenticates the security document itself, such as a certificate number and a characterizing security feature. Hereinafter, the security document is also simply referred to as a document.
The security document may be, for example, a banknote, a check, a car ticket or an identity document. The identity document may be, for example, a travel passport, an identity card, a driver's license, a work card, etc.
The terminal is a user terminal device for data input and display. The terminal comprises a contactless interface or a contact-equipped interface for data exchange with the security document. The terminal may be set up inside a security facility or in an access area, such as an airport, train station or enterprise site entrance.
An "excitation source" is a component or functional unit thereof that emits or can emit an excitation signal, such as an optical signal. The excitation sources can be classified into different types according to the nature of the signal generated by them (light of different wavelength ranges, ultrasound, etc.).
A "sensor" is a component or a functional unit of a component that is able to detect a signal emitted, scattered or reflected by the security element after excitation by an excitation source. The detected signal is not only related to the condition of the security element receiving it, but also to the condition (wavelength, intensity) of the excitation source.
Such spatial or structural elements are referred to below as security elements: which contains or represents at least one security feature. Such features are referred to as security features, which make the imitation, counterfeiting and/or copying of security documents difficult and/or impossible.
In the sense of the present invention, "visible light" means light having a wavelength in the range 381-780 nm. Red light refers to light having a wavelength in the range of 641-780 nm. Orange light refers to light having a wavelength in the range of 601-640 nm. Yellow light refers to light having a wavelength in the range of 571-600 nm. Green light refers to light having a wavelength in the range of 490-570 nm. Blue light refers to light having a wavelength in the range of 430-490 nm. Purple light refers to light having a wavelength in the range of 380-430 nm. Ultraviolet (UV) light refers to light having wavelengths in the range of 200-380 nm. UV is divided into UV-A having a wavelength of 316-380nm, UV-B having a wavelength of 281-315nm and UV-C having a wavelength of 200-280 nm. The wavelength of 375nm is preferred in the UV-A range, the wavelength of 312nm is preferred in the UV-B range, and the wavelength of 253nm is preferred in the UV-C range. Infrared (IR) refers in particular to Near Infrared (NIR) with a wavelength of 780nm to 3 μm. NIR having a wavelength of 781-1100nm is particularly preferred.
In one aspect, the present invention relates to a terminal unit for machine verification of security documents. A "terminal unit" is a component or module that can be incorporated into a terminal. The terminal unit comprises a receiving opening and a receiving mechanism for automatically receiving the safety document in the turning-open state into the receiving opening. The receiving device is designed to receive the opened security document in such a way that the wide edge of the front cover of the security document or the wide edge of the back cover thereof is pulled forward toward the receiving opening.
In addition, the terminal unit comprises an RFID reader which is designed to read data from the RFID chip of the received security document, provided that the RFID reader and the RFID chip are each located in a reading position within the terminal unit.
In addition, the terminal unit comprises a type identification module for automatically identifying the file type of the security file and automatically determining the file type specific location of the RFID chip within the opened security file according to the identified file type. The RFID chip may be located in or on the front cover, in or on the back cover, or in or on the inner sheet of the security document.
In addition, the terminal unit comprises a drive device which is designed to automatically move the RFID reader and the folded-in and folded-out security document relative to one another in dependence on the determined position of the RFID chip in such a way that the RFID reader and the RFID chip are in their respective reading positions.
In addition, the terminal unit comprises an inspection module which is designed to read data from the RFID chip of the security document by means of the RFID reader after the RFID reader and the security document have moved to the respective reading position and to inspect the security document as a function of the read data. The result of the examination can be displayed, for example, by means of a graphical display of the terminal or terminal unit.
In a first aspect, such a terminal unit may be advantageous, since a fully automatic, fast and user-friendly, error-prone document check can be achieved with the receiving mechanism: since the documents can be automatically received in, it is prevented that an untrained user only rarely interrupts the document check by pulling the document out of the terminal in advance, for example, when issuing a certificate at the terminal of an airport during a vacation trip.
The user or staff must also be aware of whether the document is being placed into the intake port upside down or upside down, for example to ensure that the RFID chip arrives at the correct position on the RFID reader. Instead, the size and type of the security document is automatically identified and the RFID reader and security document are correspondingly in place. Thus, the time required for document verification is also reduced, as the time consumed by misplacing the security document (involving automatic document ejection and one or more user retries to correctly place the document) is avoided.
In a further advantageous embodiment, it may be advantageous if the documents in the folded-out state are also received and automatically checked, since the height of the terminal unit can be reduced. A compact construction can thereby be achieved. This may be very advantageous when the terminal unit is intended to be mounted in a portable terminal.
In particular, the terminal unit may be advantageous because a double intake and scanning of a large-sized security document, such as for example a travel passport according to the ID-3 specification, may be superfluous: depending on the country and type of travel passport, the travel passport may have an RFID chip in its cover, in its back cover or in or at the data sheet. The advantage of the terminal unit described above, compared to a terminal which can only receive and authenticate half of the security document, is that the RFID chip, whether it is in the front or back cover of the security document, is received inside the terminal unit and there or is permitted to be checked. That is, secondary receipts, authentications, and withdrawals of security documents can be avoided, and the time consumption associated therewith can be avoided.
In the following, a security document in the folded-open state refers to a security document comprising at least one front cover and one back cover and optionally also one or more inner sheets, which are connected to each other at the spine of the document. The front and back covers have an opening angle of approximately 180 ° at the spine. The opening angle can be, for example, between 170 and 190 °.
For example, the document can be ejected after the RFID chip has been read, in that the document is fed back to the intake opening by the storage mechanism (which rotates in the opposite direction, for example, during ejection, compared to the document being inserted). The security document is stopped at a position where the receiving mechanism (e.g., a take-in roller) still contacts and holds the document so that it does not fall off and can be easily removed by the user.
The receiving mechanism is preferably sized and positioned so that it can also reliably receive and eject smaller sized security documents, such as check size, ID-2 and ID-1 size security documents, without tilting and being received obliquely.
According to some embodiments, the terminal unit further comprises a receiving face allowing the security document to be placed on the receiving face while being flipped open. The receiving device is designed for automatically receiving the opened security document placed on the receiving surface. The receiving surface is preferably large enough to hold ID-3 sized documents without falling. For example, the receiving surface can be inclined toward the receiving opening, so that the deposited security document automatically slides into the receiving opening to such a depth that it can be automatically gripped there and received by the receiving mechanism. The receiving surface may be, for example, equal to 100mm by 160mm, or larger.
In other embodiments, the intake has a guide, such as a funnel-shaped sleeve, which simplifies manual guiding of the security document into the intake up to the point where the security document is automatically retracted. However, in these embodiments, a storage surface may be additionally provided.
That is, the receiving surface and/or guide can simplify guiding the security document into the receiving opening and thereby speed up the document inspection process. The staff at the terminal can thus use both hands for other tasks, for example for the input of a personal identification number or the acquisition of at least one fingerprint.
According to examples not encompassed by the present invention, the RFID reader is stationary and the drive means is configured only for moving the security document. The movement of the security document can, for example, take place only in the receiving direction or, in addition, in a plane defined by the received security document at an angle of 90 ° relative to the receiving direction. According to the invention, the drive is designed to move the RFID reader and the security document.
According to some embodiments, all steps required by the terminal unit for document autofrettage and document inspection are automatically initiated in such a way that the user feeds the security document into the entry beyond a predetermined minimum depth.
According to various embodiments, the RFID reader has an antenna, the antenna area being at least 70% of the receiving surface. Such a large antenna may be advantageous because, in this way, the chance that the RFID chip of the document is already in a proper reading position to be detected by the antenna of the RFID reader after the security document has been fully retracted is quite high. This also increases the probability that the document or the RFID reader no longer has to be moved in order to read data from the RFID chip of the security document. This may speed up the process and reduce wear of the moving parts of the drive.
According to some embodiments, the terminal unit includes an electronic database in which a number of security document types are stored. In the database, each of said security file types corresponds to one or more security elements and security element specific data, respectively. The security element specific data may for example comprise a signal reference value of the security element illuminated with light of a certain wavelength. In addition, these data may contain the security element location within the security document, i.e. information about which page the security element is within and on which location of that page. In addition, the data may contain instructions on how the security element verification must be performed. In addition or as an alternative thereto, the terminal unit may be provided with a network interface for connection to a corresponding database via a network, such as the internet. The data transmission can take place, for example, using SOAP/XML messages.
The terminal unit can include an upper module having a first excitation source and a first sensor. Additionally, the terminal unit can include a lower module having a second excitation source and a second sensor. The upper module is positioned above the intake port, and the lower module is positioned below the intake port.
The first and second excitation sources correspond to a first excitation type and are configured for exciting at least one first security element of the received security document upon receipt of the security document.
The first and second sensors are configured to receive a first signal upon receipt of a security document if the signal is emitted by the at least one activated first security element towards the respective sensor. The first signal corresponds to a first type of signal that can be received by the first and second sensors.
In the case of the verification of the security document, the verification module not only analyzes the read data, but also analyzes and takes into account the first signal and further data corresponding to the at least one first security element. For example, it may be considered whether a first signal has been received and, if so, whether the signal was received by the first or second sensor. For example, if the stimulus is from a first stimulus and the first security element is on the upper page of the document, then a first signal is received by the first sensor, as both are within the upper module. For example, if the excitation originates from a second excitation source and the first security element is on the downward page of the document, the first signal is received by the second sensor, since both are within the lower module.
Within the database, other information for the file type of the incoming file may include, for example: whether the first security element is contained in the front cover, back cover or data sheet and in the position of the front cover, back cover or data sheet of the security document. The received first signal can be analyzed by checking where the first signal is expected to occur in view of the type of file actually present, and whether the first signal is also validated there and corresponds to an expected value, such as a reference value stored specifically for the first security element. Other data that may be examined in a ping may include, for example: the time at which the excitation source is active, the excitation type of the excitation source (e.g., ultraviolet, infrared, white light, etc.) and the excitation source location (e.g., either within the upper module or the lower module); the time when the sensor detects the corresponding signal, the sensor position (e.g., in the upper module or the lower module), the sensitivity range of the sensor, etc. The test then also comprises a determination from a graphical analysis of the scanning of the top and bottom sides of the opened document: whether the document cover is on top or under, and whether the first signal has been received in the expected place (where it must be received when the document is authentic) taking into account the determined pose of the security document.
For example, more than 1000 file types from different countries, each having a different respective function, may be stored in the database. For each file type stored, its size specification, its RFID chip location and the location, type and perhaps reference data of the security element contained in that file type may be stored in a database.
It may be advantageous to: the at least one first security feature is activated and verified simultaneously with the receipt of the security document, since this reduces the total time for the verification of the security document.
According to some embodiments, the terminal unit further comprises an exit mechanism for exiting the security document after performing the reading of data from the RFID chip of the security document. In addition, it includes a third excitation source and a third sensor both as part of the upper module and a fourth excitation source and a fourth sensor both as part of the lower module. The third and fourth excitation sources are of a second excitation type, and the third and fourth sensors are configured to detect a second type of signal. For example, wheels and rollers that are movable in two directions can be used as both the storage mechanism and the ejection mechanism.
The third and fourth excitation sources are configured for exciting at least one second security element of the security document upon exit of the security document. The third and fourth sensors are configured to receive a second signal upon exit of the security document if the second signal is emitted by at least one second security element (excited by the third or fourth excitation source) towards the third or fourth sensor. If, for example, the excitation originates from a third excitation source and the second security element is on the upper side of the document, the second signal is received by the third sensor, since both are located in the upper module. If, for example, the excitation originates from a fourth excitation source and the second security element is located at the lower side of the document, the second signal is received by the fourth sensor, since both are located in the lower module. At this time, the second signal is of the second signal type. In the verification of the security document, the second signal and further data corresponding to the at least one second security element are also analyzed and taken into account by the verification module in addition to the read data.
The activation and authentication of a plurality of security elements, in particular of security elements whose verification is based on different technical methods (for example ultraviolet, infrared and/or white light activation), may be advantageous, since the reliability of the verification result can thereby be increased.
According to some embodiments, the further data corresponding to the at least one first secure element comprises a description of the location of the at least one first secure element. The examination of the security document includes: it is checked whether the position of the at least one first secure element contained in the corresponding further data coincides with the position communicated with the first signal. The location communicating with the first signal also includes: whether the first signal has been received by the first sensor or the second sensor. By additionally automatically determining, for example by means of scanning: "whether the top or bottom face of the opened document faces the upper module, for example", it can be determined whether the security element is in a place that is necessary for the current document type.
Additionally or alternatively, the further data corresponding to the at least one second secure element may contain a description of the location of the at least one second secure element. The secure document inspection may include: it is checked whether the position of the at least one second security element contained in the corresponding further data coincides with the position communicated with the second signal, wherein the position communicated with the second signal also includes whether the second signal has been received by the third sensor or the fourth sensor. Accordingly, other security features, such as third, fourth and fifth, can also be used, and the terminal unit can accordingly be provided with other pairs of excitation sources and sensors adapted thereto, respectively above and below the document receiving opening.
This may be advantageous in that one or more secure elements may be fully automatically scrutinized at file in and/or during file out, respectively. Thus, a very fast and reliable method of document verification may be provided, where a number of security elements for a number of different document sizes may be checked by the same terminal or the same terminal unit.
According to some embodiments, the first and second excitation sources each comprise at least one source of electromagnetic radiation within a first wavelength range. The first and second sensors are each an electromagnetic radiation sensor dedicated to a first further wavelength range, wherein the first further wavelength range is a wavelength range in which: in this wavelength range, the at least one first security element emits a first signal upon excitation by the first or second excitation source. The first wavelength range and the first further wavelength range may be identical to each other, for example when the security element only deflects and/or partially absorbs incident light. But they need not be the same, for example when the security element contains a fluorescent substance so that it emits light (signal) in another spectral range (different from the range in which it is excited or illuminated).
The third and fourth excitation sources are each a source of electromagnetic radiation in a second wavelength range. The third and fourth sensors are each an electromagnetic radiation sensor dedicated to a second further wavelength range, wherein the second further wavelength range is a wavelength range in which: in this wavelength range the at least one second security element emits a second signal upon excitation by the third or fourth excitation source. Here, the second wavelength range and the second further wavelength range may also be, but need not be, the same.
According to some embodiments, the first and second excitation sources both emit electromagnetic radiation within a first wavelength range upon document retraction. The third and fourth excitation sources both emit electromagnetic radiation within a second wavelength range upon exit of the document.
According to various embodiments, the first wavelength range is the range of 781-.
According to an alternative embodiment, the first wavelength range is the range 381-780nm and the second wavelength range is the range 315-380 nm.
According to other alternative embodiments, the first wavelength range is the range of 315-.
According to some embodiments, the terminal unit further comprises a fifth excitation source and a fifth sensor, both of which are integral parts of the upper module. It also includes a sixth excitation source and a sixth sensor that are integral parts of the lower module. The fifth and sixth excitation sources are of a third excitation type, i.e. they are configured to emit an excitation signal of a certain type, such as electromagnetic radiation of a certain wavelength. The fifth and sixth sensors are configured to detect a third type of signal.
The fifth and sixth excitation sources are configured for exciting at least one third security element of the security document upon retraction of the security document. The fifth and sixth sensors are configured to receive a third signal upon receipt of the security document if the third signal is emitted from the activated at least one third security element towards the fifth or sixth sensor. The verification module is configured to: in addition to the data read from the RFID chip, the third signal and further data corresponding to the at least one third security element are also analyzed and taken into account when checking the security document.
The fifth and sixth excitation sources can for example each be a source of electromagnetic radiation in a third wavelength range. The fifth and sixth sensors can each be an electromagnetic radiation sensor dedicated to a third other wavelength range. The third other wavelength range is a wavelength range in which: in which wavelength range the at least one third security element emits the third signal after excitation by a fifth or sixth excitation source. Here, the third wavelength range and the third further wavelength range may also be, but need not be, the same.
According to one embodiment, the first wavelength range used when retracting the document to verify the security element is the range of 781-. The wavelength range corresponds to infrared rays. The second wavelength range used when exiting the document to verify other security elements is the range 380-780nm (white light). Alternatively, the first wavelength range may be white light and verified as the document is being fed in, while the second wavelength range is in the infrared range and verified as the document is being fed out.
According to an alternative embodiment, the first wavelength range is the 381-780nm range (white light) and the second wavelength range is the 200-380nm range, preferably the 315-380nm range (UV-A light), especially preferably 365 nm. The opposite is also possible (the first wavelength range is UV light and the second wavelength range is white light).
According to an alternative embodiment, the first wavelength range is the 200-380nm range, preferably 315-380nm, especially preferably 365nm (ultraviolet), and the second wavelength range is the 780-1100nm range, preferably 890nm (infrared). The opposite is also possible (the first wavelength range being ultraviolet and the second wavelength range being infrared).
According to a particularly preferred embodiment, the first (used at file in) wavelength range is 381-780nm range, the second (used at file out) wavelength range is 315-380nm range, and the third (also used at file in) wavelength range is 781-1100nm range. In short, it is possible to check whether the respective security element is present on both sides during the insertion of the document, both with the aid of white light and also with the aid of infrared light, and to check whether further security elements are present on both sides during the withdrawal of the document with the aid of ultraviolet light. The use of two excitation sources and corresponding sensors in parallel during the retraction process can be advantageous, since additional safety elements can thus be checked without time loss. According to various embodiments, the terminal unit and its first to sixth sensors or excitation sources may also be designed to: when the document is retracted, only ultraviolet rays with the wavelength of 315-380nm are used for inspection (namely, the excitation source emits light with corresponding wavelength), and when the document is retracted, not only infrared rays with the wavelength of 781-1100nm but also white light with the wavelength of 381-780nm are used for inspection.
If the terminal unit also comprises a fifth and a sixth excitation source and corresponding sensors, it is preferred that the infrared-based and white-light-based excitation sources and corresponding sensors are activated and the corresponding signals are detected both in the upper and lower modules upon file retraction. The excitation by infrared and white light can be carried out simultaneously or temporally offset from one another. Upon exit of the document, the ultraviolet-based excitation source and corresponding sensor are activated and the corresponding signal is detected in both the upper and lower modules. The combination of ultraviolet light with infrared or white light has proven to be advantageous for reducing the interaction of different types (extraneous light) of illumination sources and sensors.
If the security element is excited by an infrared excitation source, the sensitivity range of the corresponding "sensor pair" (one sensor of the same type in each of the upper and lower modules) should preferably be the same or similar to the infrared wavelength range.
If the security element is excited with a white light excitation source, the sensitivity range of the corresponding "sensor pair" (one sensor of the same type in each of the upper and lower modules) should preferably be the same or similar to the wavelength range in the white light region. White LEDs can be produced, for example, in such a way that a plurality of LED chips of different colors are grouped together in the same LED housing. Thus, the various LED chips superimpose white light. It is also possible for the blue-emitting LED to be covered with an internal luminescent film which converts part of the blue light into yellow light to thereby produce the entire main spectral component of the "white light".
It is also possible, however, to use, instead of a single white light source, red, blue and green partial light sources simultaneously, wherein the red partial light source (e.g. LED) emits light in the wavelength range of 640-780nm, the blue partial light source emits light in the wavelength range of 430-490nm and the green partial light source emits light in the wavelength range of 491-570 nm. Accordingly, for each partial light source a partial sensor is used which has a narrow sensitive wavelength range which substantially corresponds to the light emission spectrum of the red, blue and green partial light sources. This can be achieved, for example, by means of a colour filter. The signals received by the plurality of partial sensors can be superimposed by a processor, for example of a control unit of the terminal unit, to form a "global image", whose RGB values substantially correspond to the RGB values occurring under the individual white light sources.
Instead of using RGB-specific partial sensors, it is also possible to emit light from red, green and blue partial light sources in sequence and to use a single sensor (gray light sensor) which covers the entire spectral range of white light. The sensor records not only the signal emitted by the security element after excitation by one of the RGB partial light sources, but also the following information: "which allows to correspond the received signal to the part of the light sources that are active at that moment". This data allows the processor of the control unit to calculate the overall appearance of the document (or at least the activated security element) whose respective R, G and B components are combined from the signals caused by the respective partial light sources.
For example, one can use LED diodes with corresponding emission spectra according to the colors red (R), green (G) and blue (B) and repeatedly activate these LED diodes staggered in time from one another. For sensing, a single sensor is used, which essentially covers the visible spectrum (gray light receiver). Since it is known which diode is emitting light, the brightness value for each color can be calculated from the brightness value (gray value) received by the sensor. The luminance value of a color can be stored in the form of 8 bytes of information, for example. These three values are then combined into a color RGB image, which may have, for example, 24 bytes/pixel.
If a security element is excited by an ultraviolet excitation source, the sensitivity range of the corresponding "sensor pair" (one sensor of the same type in each of the upper and lower modules) should preferably be the same or similar to the ultraviolet wavelength range.
According to one embodiment, the first excitation source (for white light at 381-780 nm) and the third excitation source (for infrared light at 781-3000nm, preferably 781-1100nm and particularly preferably 890 nm) are concentrated in a single structural unit comprising a plurality of LEDs (for R (red), G (green), B (blue) and IR (infrared), respectively). The second excitation source (white light) and the sixth excitation source (for infrared) are also concentrated in a single structural unit comprising a plurality of LEDs (for R, G, B and IR, respectively). The third and fourth excitation sources (UV) are each concentrated in a single building block. According to some embodiments, for the R-G-B-IR structure unit and the UV unit, a separate sensor with a broad spectral range of about 380-. These images can then be subjected to image analysis by means of a terminal unit to determine whether a certain security element causes a certain reflection pattern or absorption pattern at the document surface, for example in the infrared range or in the visible range.
According to some embodiments, the first, second, third, fourth, fifth and/or sixth excitation source is constituted by an indirect illumination device comprising an electromagnetic illumination source (such as an LED strip light source) and a reflective element, respectively. The reflection element scatters the radiation source beam in such a way that at least a part of the scattered beam impinges on the surface of the security document facing the radiation source and thus also on a possible security element in the vicinity of the excitation source. According to these or other embodiments, the first, second, third and/or fourth sensor is formed by a scanner, in particular a line scanner. A line scanner (also called line sensor) is a radiation-sensitive, in particular photosensitive detector (mostly a semiconductor detector) which is composed of a one-dimensional array of photodetectors or other detection devices. For example, CCD line sensors and CMOS line sensors can be used, which operate in the ultraviolet, visible and near-and mid-infrared ranges.
The use of a scanner, and in particular a line scanner, may be advantageous, since scanner systems generally require less space than camera systems, thus enabling a more compact structure of the terminal unit.
The excitation source may for example be constituted by one or more LEDs, for example by a LED light source strip. The LED light source strip may extend, for example, over almost the entire length of the intake opening.
According to some embodiments, the first and second excitation sources and the first and second sensors are configured to operate simultaneously upon retraction of the security document and to produce a first scan of an upwardly facing surface of the security document and a second scan of a downwardly facing surface of the security document upon retraction. "scanning" herein refers to an image file. The scanning is received by a control unit of the terminal unit. Preferably in the visible range, e.g. white light range, or in the infrared range, i.e. the first and second excitation sources and the first and second sensors preferably emit or detect in the white light range or in the infrared range in these embodiments. Performing the scan simultaneously with document intake may be advantageous because no additional motion of the device components is required to generate the scan in addition to the document intake motion. This can reduce wear of the component parts.
According to some embodiments, the security document has a "Machine Readable Zone (MRZ)". The first scan or the second scan contains an image of the MRZ, depending on which page of the security document is on when the document is being taken in. The control unit is designed to automatically determine the MRZ from the first or second scan and to authenticate the terminal unit with respect to the security document using the determined MRZ. Reading data from the RFID chip is only possible after successful authentication of the terminal unit with respect to the security document. Such an MRZ determination may be advantageous because it protects the security document from reading the personal data from the RFID chip against the wishes of the user. Because the scanning of the document on the top page and the scanning of the document on the bottom page are determined simultaneously, the document does not need to be fed and opened twice, and the user does not need to pay attention to placing the document in a certain orientation.
For example, the control units can, in conjunction with the determined file type, authenticate whether the current file should contain, among other things, the MRZ and, if so, at which location. Both the first scan and the second scan are then subjected to image analysis to determine which of the two scans contains the MRZ and whether it is found at a location that is inevitable to be located according to the determined file type.
According to some embodiments, the type identification module is configured to perform an automatic identification of the file type of the security file only after the security file has been completely retracted into the stop position, wherein the file type identification is performed in accordance with the first and/or second scanning. Perhaps what may be needed is: the security document is moved back slightly from the stop position towards the entrance to bring its RFID chip into the reading position. Using the first and second scans to determine the file type may be advantageous because the file type and MRZ may be determined from the same database (both scans) obtained at once, i.e. multiple uses of data that is available in only a single work step may be achieved.
According to some embodiments, at least some of the receiving mechanisms are elastically deformable or movable upon document retraction, so as to hinder slipping and/or bulging of the security document (which has a thickness of 2-10mm overall or in the flipped-open state) and are only movable when acted upon by a minimal force, for example exerted by the receiving mechanisms (also upon document retraction or ejection). The elasticity can be achieved, for example, by elastically supporting the receiving means (e.g., wheels or rollers), e.g., by means of springs or elastic materials such as rubber. The receiving means may be constituted by a plurality of friction wheels and/or friction belts for feeding the document from the feeding position into the terminal unit, for example.
In addition or alternatively thereto, at least some of the first, second, third, fourth, fifth or sixth sensors are elastically deformable or movable upon the retraction of the document, so that a security document having a thickness of 2-10mm overall or in the flipped-open state is fixed by the sensors in such a way that a movement of the security document relative to the sensors can only be effected by forces exceeding a minimum amount. For example, it may be desirable to: this force must be at least so great as to be exerted by the receiving mechanism in order to retract the security document. This may be advantageous, since a uniform contact pressure can thereby also be achieved in the spine region of the document, which in turn can improve the scanning quality and/or the inspection quality as a whole.
According to some embodiments, the intake opening is formed in a slot shape. The terminal unit also has an active positioning mechanism for positioning the security document in front of or within the intake opening. The positioning means are designed to apply a displacement force parallel to the polygonal receiving opening to a security document placed on the receiving surface. The moving force causes the placed security document to be in the retracted position. The positioning and/or receiving means can adjust the orientation of the security document during the retraction process in such a way that its wide front or back edge is arranged parallel to the slot-shaped access opening. This may be advantageous because tilting of the document when the document is automatically retracted can be prevented and the scanning quality or the evaluation quality of the security element can be improved because no distortion effects reduce the scanning quality or distort the position information in the detected first and second signals.
According to some embodiments, the upper module includes an upper box. The upper box and the upper module are configured such that the upper box can be repeatedly removed from the upper module and re-inserted, wherein the first part of the receiving mechanism and at least the first excitation source and the first sensor are located within the upper box and configured as follows: they can be removed as an integral part of the upper case and be re-inserted.
In addition or as an alternative thereto, the lower module may comprise a lower box, wherein the lower box and the lower module are designed such that the lower box can be repeatedly removed from the lower module and inserted again. The second part of the receiving device and at least the second excitation source and the second sensor are located in the lower housing and are designed in such a way that they can be removed as a component of the lower housing and inserted again.
For example, the rollers may be driven from outside the upper and lower housings, such as by a motor and a plurality of transmission members that transmit the motor force to a roller portion located outside the housings and convert it into rotational movement of the rollers.
This may be advantageous because the durability of the terminal unit is thereby improved. The storage means, such as rollers or wheels, may not soon become dirty during long-term operation. It is also possible that several LEDs as excitation sources can no longer function after the end of the usual service life. In this case, only one cassette needs to be replaced with a new LED and/or a clean roller for document intake. Thereby avoiding the terminal to be out of service for many hours or even days until the arrival of a service technician.
In a further aspect, the invention relates to a terminal comprising a user interface and a terminal unit according to one of the aforementioned embodiments, wherein the terminal unit has an interface for exchanging data with the user interface. The user interface may be constituted, for example, by a keyboard for entering a personal identification code and/or a display device for displaying instructions for use, error notifications and/or results of security document checks. The interface for data exchange between the terminal unit and the user interface may, for example, allow a user assigned a security document to authenticate itself to the security document by means of an entered personal identification code and/or may indicate to the terminal operator whether the verification of the security document was successful. A successful verification means that at least the verification of the data read from the RFID chip and possibly also the verification of other data and security elements shows that the security document is not counterfeit, is still valid and, if the security document is an identity document, is assigned to the correct person.
The terminal may be formed in particular in the form of an active terminal.
The terminal can be used, for example, in the following fields of application: international border checks at airports, customs and border tunnels; automatic side inspection and national self-help; police, customs, embassy and banks and document manufacturers examine documents during quality inspection.
In another aspect, the invention relates to a method for machine-wise validating a security document by a terminal unit. The terminal unit comprises a receiving port, a receiving mechanism, an RFID card reader, a type identification module, a driving device and an inspection module. The method comprises the following steps:
-automatically retracting the security document in the opened state into the receiving opening by the receiving means, wherein said retracting is effected in such a way that the broad edge of the front cover or the broad edge of the back cover of the security document is retracted forward into the receiving opening;
-automatically identifying the file type of the security file by means of a type identification module;
-automatically determining, by means of the type identification module and depending on the identified file type, a file type-specific location of an RFID chip within the opened security file, wherein the RFID chip can be located in or on the front cover, in or on the back cover or in or on the inner page of the security file;
-automatically moving the RFID reader and the retracted opened security document relative to each other by the drive means in dependence of the determined position of the RFID chip until both the RFID reader and the RFID chip of the security document are in the respective reading position within the terminal unit;
-automatically reading data from the RFID chip of the security document by means of the RFID reader if both the RFID reader and the RFID chip are located in their respective reading positions;
-validating the security document by the validation module on the basis of the read data.
Drawings
Embodiments of the invention will be described in detail below with reference to the accompanying drawings, in which:
fig. 1 shows a security document in different states and positions with respect to a terminal entry,
figure 2 shows a terminal unit which is shown,
figures 3a-3e show a succession of images relating to the dragging of the security element across the terminal unit,
figure 4 shows the terminal unit with the cassette body turned over,
figure 5 shows a cross-section of a terminal unit of one embodiment in a front view,
figure 6 shows a cross-section of a terminal unit of one embodiment in a side view,
figure 7 shows a cross-section of another embodiment of a terminal unit in a side view,
FIG. 8 shows a sub-module of a terminal unit comprising a first excitation source and a first sensor, an
FIG. 9 shows a flow diagram of a method according to an embodiment.
List of reference numerals
102 user
104 photo of passport
108 secure document
110 covers
112 back cover
116 active terminal
P3-P6 inner page
Wide edge of k1 cover 110
k 1' Wide edge of back cover 112
k2 narrow edge
120 file retraction scenario
122 File Advance scenarios
124 file in scene
126 File Advance scenarios
200 terminal unit
202 upper module
204 lower module
206 inlet
208 placing surface
210 positioning mechanism
212 rotating shaft
214 frame member of upper module
216 cassette integrated into frame member
302-306 security element
402,404 edging
502 first excitation source
504 second excitation source
506 third excitation source
508 fourth excitation Source
510 first sensor
512 second sensor
516 third sensor
518 accommodation mechanism
520 fourth sensor
522 storage mechanism
602 control unit
604 File type identification Module
606 RFID card reader
608 RFID chip
610 file checking module
612 database
702 fifth excitation Source
704 fifth sensor
706 sixth sensor
708 sixth excitation source
d (open) thickness of document
LP1 first reading position for a card reader
LP2 second read position for RFID chips
820 scattering element
822 signal from the security element
824 scattering light
826 light-proof element
828 submodule
Detailed Description
The components corresponding to each other in the following embodiments are denoted by the same reference numerals.
Fig. 1 shows a security document 108, such as a flip-open electronic travel passport, that is dispensed to a user 102. The security document may have a front cover 110, a back cover 112 and a number of inner pages P3, P4, P5, P6. The front and back covers can be constructed of a thicker material than the inner sheets, such as thickened cardboard sheets. The file may be printed with the data relating to the person in text form. It is also possible to store, as reference data, person-related data such as name, address or biometric characteristic data (fingerprint data, iris scan, face portrait, etc.) in an RFID chip integrated in the front cover, back cover or one of the inner sheets or arranged on their surface.
In one advantageous aspect of the present invention, the embodiment of the terminal unit 200 shown in detail in fig. 2-7, for example, can be installed in a small mobile terminal 116 and allows for automated document verification that is very easy to operate and is not prone to error. The four scenarios 120, 122, 124 and 126 show different possibilities, namely how the user can place a security document into the entry of the terminal unit to check the document. Irrespective of whether the security document is now drawn in with the front cover or the back cover forwards, and irrespective of whether the surface of the opened document formed by the front cover and the back cover is on top or under, it is possible by automatically determining the document format and the format-dependent position of the RFID chip to ensure that the RFID reader and the RFID chip are positioned relative to one another in such a way that the data contained in the RFID chip can be read. Therefore, operation errors caused by the fact that the files are placed in wrong pages or placed reversely can be avoided, and the checking process is accelerated. In addition, the retraction of the document turned approximately 180 degrees allows the terminal unit 200 to have a low and compact structure and accordingly allows the use of a small and compact terminal housing. Thus, a termination having a height of 18cm, a width of 22cm and a depth of 29cm, for example, can be realized with this structure. Even a terminal of 10cm in height, 22cm in width and 29cm in depth can be realized, for example.
The wider edge of the front cover 110 of the security document 108 is hereinafter referred to as k1 and the wider edge of the back cover 112 is referred to as k 1'. The shorter edge of the front or back cover is referred to as k 2.
Fig. 2 shows a terminal unit 200 comprising an upper module 202 and a lower functional module 204. The bodies of the two modules 202 and 204 may constitute a single unitary member. Alternatively, each module may itself be a distinct integral or assembled component.
The upper module 202 is located above the slot-shaped intake 206, and the lower module 204 is below the intake and constitutes the bottom of the terminal unit. The slot-shaped inlet can be formed in the shape of a slot, i.e. with an approximately rectangular delimited opening (see for example the inlet shown in fig. 4). However, it is also possible for the lower unit and the upper unit to form a U-shaped receiving opening 206 which is open on one side (see fig. 2 and 3a-3 e). The terminal unit can optionally include a document placement surface 208 on which documents can be placed such that the documents are automatically grasped by the automated document receiving mechanism. This may simplify terminal operation, as the staff member frees both hands for other tasks, such as entering a personal identification number or detecting biometric characteristic data, such as fingerprint data.
The terminal unit can be provided with positioning means 210, for example elastic holders, which enclose the document from one or both sides and position the document on the document placement surface 208 in such a way that the document does not tilt during the intake process. The positioning device is preferably designed such that it can position documents of many different sizes and formats in such a way that the documents are not tilted during the insertion process and that the opened documents in the form of booklets and the security documents in the format of checks can be positioned in an automatic insertion manner. For example, the holder can move the document flush to one side edge of the receiving opening or to the center of the receiving opening. The positioning mechanisms themselves are preferably flexibly adjustable so that they can properly position documents having different specifications, such as ID-1, ID-2 and ID-3. Removable and possibly also openable cassette 216, which is described in detail in the description with respect to fig. 4, can be located in the upper and/or lower module.
Figures 3a-3e show a series of views relating to the receipt of a security document 108 through a terminal unit 200 for inspection of the security document. The verification may be performed according to the method according to fig. 9, and thus fig. 9 and fig. 3a-3e will be described together below.
The security document may have one or more security elements 302,304,306 on the inside or outside of the inner sheet of the document 108 and/or its front or back cover. For example, the security element 306 may be a holographic image that is visible under white light and that can be compared, for example, with reference images stored in a database during the verification of the security document. The security element 302 may be a printed matter that is only visible under UV radiation (e.g. because the printed matter consists of a UV light reflecting substrate or a substance that fluoresces under UV light). The security element 304 may be a printed matter that is visible only under infrared radiation, or visible under white light, for example, but not visible under infrared radiation. The described security elements are only described by way of example, and many other types of security elements, for example based on metal-coated foil films, fluorescence, phosphorescence, reflection or absorption of specific spectral ranges, are possible and known in the art.
Fig. 3a shows a security document 108 which can be placed on the placement surface 208 of the terminal unit 200, for example, with the inner page turned open upward, so that the broad side k 1' of the back cover 112 is essentially parallel to the slot-shaped entry opening. The positioning mechanism 210 can now help orient the seated document 108 so that it does not tilt as the document is retracted. Alternatively, the document may be inserted directly into the receiving opening by the user.
Figure 3b shows the security document oriented by the positioning mechanism 210. The housing direction of the retractable terminal unit is indicated by a large arrow. Once the security document has entered the intake sufficiently far, the receiving mechanism, such as a roller, draws the opened document into the intake in step 802. At this point, the wide edges k1, k 1' of the front or back cover are pulled forward toward the intake.
Fig. 3c shows the security document 108 in a semi-stowed state. The security document is moved further in the stowing direction (arrow direction) as shown in figure 3d until it reaches the final position indicated by the dotted line 314. In the final position, the document to be fed in can be located completely within the terminal unit or already partially exposed again on the rear side opposite the intake opening.
The first and second scans of the top or bottom surface of the opened document 108 are preferably completed as the document is retracted. That is, there are two scans when the file has reached the final position 314. These scans may be used by the terminal unit to automatically determine the current specifications of the security document 108 in step 804.
In addition, the terminal unit may check one or more first secure elements at the time of file entry. The security element verification may be performed entirely during the retraction process. Alternatively, the signal from the one or more first security elements may be received and recorded upon receipt of the security document. After the automatic identification of the current file type, the recorded signals originating from the security element can be compared with reference values, which can be stored in a file-type-specific manner in the database.
In a further step 806, it can also be determined, in conjunction with the determined file type, where the RFID chip is located within the opened file, in order to move the file and the RFID reader relative to each other in a subsequent step 808 in such a way that both are in one reading position within the terminal unit and the data of the RFID chip can be read in a step 810. If the RFID chip or the RFID card reader is not at the corresponding reading position, the RFID card reader cannot be used for reading data from the chip. What may occur is: the file already in the final position must in turn be moved a distance counter to the receiving direction in order for the RFID chip to be in its reading position LP 2. In step 812, security file 108 is validated against at least the data read from the RFID chip. The result of the inspection may be issued, for example, through the display device of the terminal in which the terminal unit is installed. The document is preferably in any case completely retracted in one go up to the rear stop position, even if the document is then moved slightly counter to the direction of insertion in order to bring the chip into its reading position.
Fig. 4 shows the terminal unit with the upper case opened. The cassette may be rotatably mounted at a shaft 212 and may be completely removed from the upper unit 202 (and replaced with another upper cassette). The contents of the upper housing 216 are specifically described in the description of fig. 8.
Additionally, FIG. 4 illustrates an alternative embodiment of the intake 206 or upper module 202 around the intake. In contrast to the embodiment shown in fig. 3a to 3e, in which the lower module and the upper module in this case enclose the receiving opening 206 in a U-shape, the upper module 202 forms two side strips 402 and 404 which, together with the upwardly facing surface of the lower module 204 and the downwardly facing surface of the upper module 202, form a continuously bordered rectangular receiving opening 206.
Fig. 5 shows a cross-section of a terminal unit of an embodiment in a front view. The cross-section shows a first excitation source 502 and a second excitation source 504 that extend above or below the intake 206. For example, the first and second excitation sources can each be comprised of a white LED bar that illuminates both sides of the opened document at least as the document 108 is retracted. The first sensor 510 is integrated into the cartridge 216 within the upper module. The first sensor can be formed, for example, by a contact scanner, in particular a contact line scanner, which exerts a pressing force on a document located thereunder or moving thereunder, and thus the document is protected against uncontrolled sliding and for a constant distance between the sensor and the document surface. The second sensor 512 is integrated within the lower module 204. The second sensor can be fixed in a non-elastic manner in the lower module or also be formed by a contact scanner, in particular a contact line scanner, which applies a contact pressure force on the document located thereon or moving over it. The length of the up and down scanners may be exactly as long as or similar to the length of the intake 206.
The receiving means is here formed by one or more wheels or rollers 518,522, some of which wheels or rollers 518 are arranged above the intake opening and others 522 are arranged below the intake opening.
Fig. 6 shows a cross-section of a terminal unit of an embodiment in a side view. The first and second sensors 510,512 and the first and second excitation sources 502, 504 are immediately behind the intake opening 206 through which the opened document 108 is automatically taken in the take-in direction (arrow direction) by the rollers 522, 518.
At a location specific to a file type, an RFID chip 608 is integrated into the file 108, such as within the cover 110. In order for the RFID reader 606 integrated into the terminal unit 200 to be able to read data from the chip 608, the RFID reader 606 must be located in a predetermined first reading position LP1 and the file 108 must be located in the terminal unit such that its RFID chip is in a predetermined second reading position LP 2. These read positions LP1 and LP2 are close enough in space to each other to allow radio signal based data transmission.
In the case of the invention not included, as shown in FIG. 6, the RFID reader 606 is stationary and always in its reading position LP 1. Or data cannot be read from the RFID chip because the chip is not yet in its reading position LP 2.
Fig. 7 shows a terminal unit in a side view according to a further embodiment. In this embodiment, the intake opening is provided with a funnel-shaped sleeve 709, which simplifies the introduction of the document into the intake opening 206. This is very advantageous because the terminal unit 200 supports many file types that may have different thicknesses d in their entirety or in the flipped-open state.
Behind the first excitation source 502 or the first sensor 510, a third excitation source 506 and a third sensor 516 are located within the upper module 202. The upper module may include an upper cartridge 216 that includes the first and third excitation sources and optionally also the first and third sensors. The lower module may also have a removable cartridge (not shown) that houses the second excitation source 504 and the fourth excitation source 508, and optionally also the second sensor 512 and the fourth sensor 520.
The first and second excitation sources and the sensor may, for example, emit or detect infrared light and check the corresponding security element based on infrared light. This can preferably take place, for example, when the document is being folded in, specifically simultaneously for the upward and downward facing pages of the opened document. The third and fourth excitation sources and sensors can emit or detect, for example, ultraviolet light and inspect the corresponding security element based on the ultraviolet light. This can preferably be done when the document is ejected, specifically simultaneously for the page facing up and the page facing down of the opened document.
Additionally, the upper module may have a fifth excitation source 702 and a fifth sensor 704 behind the third excitation source. A fifth excitation source and optionally also a fifth sensor can be disposed within the upper box 216 of the upper module 202. Additionally, a sixth excitation source 708 and a sixth sensor 706 may be provided within the lower module. The fifth and sixth excitation sources and sensors can, for example, emit or detect white light. That is, the upper case may contain three excitation sources and corresponding sensors, while the lower case may also contain three excitation sources of the same type and corresponding sensors, so that it is preferable that the terminal unit has a pair of one excitation source and one sensor compatible therewith for the wavelength ranges of white light, ultraviolet light, infrared light, and for the upper module 202 and the lower module 204, respectively.
The control unit 602 controls and coordinates the movement of the housing mechanisms 518,522 and the several sensors 510,512, 704, 706 and the excitation sources 502, 504, 506, 702, 708 and the RFID reader. For example, the control unit may cause the first and second scans to be generated by the first and second sensors as the document is advanced.
The module 604 for automatically identifying a file type may employ the first and/or second scan as input to determine the file type of the current file 108 via image analysis and comparison of the analysis results to a number of file types stored within a database.
The verification module 610 may employ a portion of the first or second scan or a portion of the analysis results, such as the MRZ determined in conjunction with pattern recognition (optical character recognition, OCR) to prove with respect to the security document that the terminal unit is authorized to read data from the RFID chip. This may be achieved, for example, using BAC or EAC protocols. The read data may include, for example, biometric reference data or a reference portrait image. The terminal unit may be, for example, a component of the following terminal: which contains one or more sensors (camera, fingerprint sensor, etc.) for capturing current biometric characteristic data of the user, such as a portrait image or an iris image or fingerprint data. The checking may include: the biometric characteristic data currently obtained from the user by means of the terminal are compared with the reference data stored in the RFID chip 608 and, if sufficiently similar, are verified: "the person whose biometric characteristic data is detected by the terminal is the person who has issued the security document". Since not only the RFID reader 606 is located in its reading position LP1, but also the RFID chip is located in its reading position LP2, the RFID reader is able to read data from the RFID chip. However, it may still be necessary for this to first authenticate the terminal unit with respect to the document, for example by means of an MRZ determined with OCR. Additionally, security document verification may include checking one or more security elements 302 and 306, where it is also checked, among other things: whether the secure element is in a location within the file that is specified according to the determined file type.
Fig. 8 shows a sub-module 828 of the terminal unit, which contains a first excitation source 502, such as a light source bar consisting of uv emitting LEDs, and a first sensor 510, such as a camera sensitive in the uv range. That is, the sub-modules constitute an optical unit containing an excitation source for one or more security elements and a sensor corresponding thereto. The second excitation source and the second sensor can also constitute such an optical unit. This also applies to pairs of third excitation source and third sensor, fourth excitation source and fourth sensor, etc.
The sub-module comprises a light scattering element 820 which causes the light emitted by the excitation source to impinge only indirectly on the security element 304. Submodule 828 can be formed, for example, as an elongated orb or as a series of several orbs. This may be advantageous because direct light incidence may cause light reflections which may hinder inspection of the security element or lead to false results. The opaque element 826 protects the security element from direct illumination.
Fig. 9 shows a method flowchart, the steps of which have been described in the context of fig. 3a-3 e.
Claims (18)
1. A terminal unit (116) for machine-validating a security document (108), wherein the terminal unit comprises:
-a nano-inlet (206);
-a receiving mechanism (518,522) for automatically receiving the security document into the receiving opening in the opened state, wherein the receiving mechanism is configured to receive the opened security document such that the wide edge (k1) of the front cover (110) or the wide edge (k 1') of the back cover (112) of the security document is pulled forward towards the receiving opening;
-an RFID reader (606) configured for: -reading data from the RFID chip (608) of the received security document as long as said RFID reader and RFID chip are located at a reading position (LP1, LP2), respectively, within the terminal unit;
-a type identification module (604) for automatically identifying the file type of the security file and for automatically determining a file type-specific location of an RFID chip within the opened security file depending on the identified file type, wherein the RFID chip can be located within or on the front cover (110), within or on the back cover (112) or within or on an inner page (P3, P4, P5, P6) of the security file;
-a drive device (518,522) configured for automatically moving the RFID reader and the folded-in and folded-out security document relative to each other in dependence on the determined position of the RFID chip in such a way that the RFID reader and the RFID chip are in their respective reading positions;
-a verification module (610) configured for: after the RFID reader and/or the security document has moved to the respective reading position (LP1, LP2), data are read from the RFID chip of the security document by means of the RFID reader and the security document is checked on the basis of the read data.
2. A terminal unit according to claim 1,
the RFID reader is designed to be stationary and the drive is designed only to move the security document; or
-the drive means are configured for moving the RFID reader and the security document.
3. A terminal unit according to claim 1, further comprising:
-a database (612) or a network interface for linking with a database, wherein a number of security file types are stored within the database, wherein each of said security file types corresponds to one or more secure elements (302,304,306) and secure element specific data;
-an upper module (202) having a first excitation source (502) and a first sensor (510), wherein the upper module is located above the intake (206);
-a lower module (204) having a second excitation source (504) and a second sensor (512), wherein the lower module is located below the intake;
-wherein the first and second excitation sources are of a first excitation type and the first and second sensors are configured to detect a first type of signal;
-wherein the first and second excitation sources are configured for exciting at least one first security element (302) of the received security document upon receipt of the security document;
-wherein the first and second sensors are configured for receiving a first signal (822) upon receipt of the security document if the first signal is emitted by the at least one first security element excited by the first or second excitation source towards the first or second sensor;
-wherein the verification module is configured to: in addition to the data read from the RFID chip, the first signal and further data corresponding to the at least one first security element are also analyzed and taken into account when checking the security document.
4. A terminal unit according to claim 3, further comprising:
-an exit mechanism (518,522) for exiting the security document after reading data from the RFID chip by the RFID reader;
-a third excitation source (506) being an integral part of the upper module;
-a third sensor (516) being an integral part of the upper module;
-a fourth excitation source (508) being an integral part of the lower module;
-a fourth sensor (520) being an integral part of the lower module;
-wherein the third and fourth excitation sources are of a second excitation type and the third and fourth sensors are configured to detect a second type of signal;
-wherein said third and fourth excitation sources are configured for exciting at least one second security element (304) of the security document upon exit of the security document;
-wherein the third and fourth sensors are configured to receive a second signal upon exit of the security document if the second signal is emitted by the activated at least one second security element towards the third or fourth sensor;
-wherein the verification module is configured to analyze and take into account the second signal and further data corresponding to the at least one second security element in addition to the data read from the RFID chip when verifying the security document.
5. A terminal unit according to claim 4, wherein,
-wherein the further data corresponding to the at least one first secure element comprises a description of the location of the at least one first secure element; and wherein the checking of the security document comprises checking whether the data of the position of the at least one first security element contained in the associated further data correspond to the position communicated with the first signal, wherein the position communicated with the first signal also comprises whether the first signal has been received by the first sensor or the second sensor; and/or
-wherein the further data corresponding to the at least one second secure element comprises a description of the location of the at least one second secure element; and wherein the checking of the security document comprises checking whether the data of the position of the at least one second security element contained in the associated further data correspond to the position communicated with the second signal, wherein the position communicated with the second signal also comprises whether the second signal has been received by the third sensor or the fourth sensor.
6. A terminal unit according to claim 4,
-the first and second excitation sources are respectively sources of electromagnetic radiation in a first wavelength range, the first and second sensors are respectively sensors of electromagnetic radiation dedicated to a first further wavelength range, wherein the first further wavelength range is a wavelength range in which the at least one first security element emits the first signal upon excitation by the first or second excitation source; and
-the third and fourth excitation sources are sources of electromagnetic radiation in a second wavelength range, and the third and fourth sensors are each dedicated electromagnetic radiation sensors for a second further wavelength range, wherein the second further wavelength range is a wavelength range in which the at least one second security element emits the second signal upon excitation by the third or fourth excitation source.
7. A terminal unit according to claim 6,
-the first excitation source and the second excitation source both emit electromagnetic radiation in a first wavelength range upon document intake;
-the third and fourth excitation sources both emit electromagnetic radiation in a second wavelength range upon exit of the document;
-said first wavelength range is the 781-; or
-said first wavelength range is the range 381-780nm, said second wavelength range is the range 315-380nm, or vice versa; or
The first wavelength range is in the range of 315-380nm and the second wavelength range is in the range of 781-1100nm, or vice versa.
8. The terminal unit of claim 7, further comprising:
-a fifth excitation source (702) being an integral part of the upper module;
-a fifth sensor (704) being an integral part of the upper module;
-a sixth excitation source (708) being an integral part of the lower module;
-a sixth sensor (706) being an integral part of the lower module;
-wherein the fifth and sixth excitation sources are of a third excitation type and the fifth and sixth sensors are configured for detecting a third type of signal;
-wherein said fifth and sixth excitation sources are configured for exciting at least one third security element of the security document upon receipt of the security document;
-wherein the fifth and sixth sensors are configured to receive a third signal upon receipt of the security document if the third signal is emitted by the activated at least one third security element towards the fifth or sixth sensor;
-wherein the verification module is configured to analyze and take into account, in addition to the data read from the RFID chip, also a third signal and further data corresponding to the at least one third security element when verifying the security document;
-wherein the fifth and sixth excitation sources are respectively electromagnetic radiation sources within a third wavelength range and the fifth and sixth sensors are electromagnetic radiation sensors dedicated to a third further wavelength range, wherein the third further wavelength range is a wavelength range within which the at least one third security element emits the third signal upon excitation by the fifth or sixth excitation source;
-wherein the first wavelength range is the range 381-780 nm;
-wherein the second wavelength range is the range of 315-380 nm; and
-wherein the third wavelength range is the range of 781-.
9. A terminal unit according to claim 4,
the first, second, third and/or fourth excitation source is formed in each case by an indirect irradiation device comprising an electromagnetic radiation source and a reflective element, wherein the reflective element is designed to scatter the radiation of the radiation source in such a way that at least a portion of the scattered radiation impinges on the surface of the security document facing the radiation source; and/or
-said first, second, third and/or fourth sensor is constituted by a scanner, respectively.
10. A terminal unit according to claim 9, wherein said first, second, third and/or fourth sensors are each constituted by a line scanner.
11. A terminal unit according to claim 3,
-said first (502) and second (504) excitation sources and said first (510) and second (504) sensors being configured so that they work simultaneously upon the retraction of the security document and during the retraction complete a first scan of the upwardly facing surface ({ P5+ P6 }; {110+112}) of the security document (108) and a second scan of the downwardly facing surface ({110+112 }; { P5+ P6}) of the security document (108), which are received by the control unit (602) of the terminal unit.
12. The terminal unit of claim 11, wherein,
-the security document has an MRZ and it is the first scan or the second scan that contains the images of the MRZ depending on which page of the security document is on at the time of file entry;
the control unit is designed to automatically determine the MRZ from the first or second scan and, with the MRZ determined, to permit the authentication of the terminal unit with respect to the security document;
reading data from the RFID chip can only be done after the authentication of the terminal unit with respect to the security document is completed.
13. The terminal unit of claim 12, wherein,
-the type identification module (604) is configured for: the automatic identification of the file type of the security file is only performed after the security file has been completely retracted (314) into the stop position, wherein the identification of the file type is performed in accordance with the first and/or second scanning.
14. A terminal unit according to any one of the preceding claims 3 to 13,
-at least some of said receiving means (518,522) are elastically deformable and/or elastically movable upon the retraction of the document, so that the security document, as a whole or in the flipped open state, having a thickness (d) of 2-10mm can be fixed and moved; and/or
-at least some of said sensors (510,512,516,520) are elastically deformable and/or elastically movable upon file retraction, so that the security file, having a thickness (d) of 2-10mm overall or in the flipped-open state, is fixed by the sensors in such a way that the movement of the security file relative to said sensors can only be effected with a force exceeding a minimum amount.
15. A termination unit according to any one of the preceding claims 3-13 wherein the inlet is slot-shaped, wherein the termination unit comprises:
-a movable positioning mechanism (210) for positioning the security document in front of or within the receiving opening (208);
-wherein the positioning mechanism is configured for applying a moving force parallel to the edge-like access opening (206) to a security document placed on the receiving face, which causes the placed security document to be in the retracted position;
-the positioning means and/or the receiving means orientates the security document during the retraction in such a way that its wide front or back edge (k1) is arranged parallel to the slot-shaped access opening.
16. A terminal unit according to any one of claims 3 to 13,
-the upper module (202) comprises an upper box (216), wherein said upper box and said upper module are configured such that the upper box can be repeatedly taken out of the upper module and re-loaded, wherein the first part of the receiving means and said first excitation source (502) and said first sensor (510) are located within the upper box and configured such that they can be taken out of and re-loaded as an integral part of the upper box; and/or
-the lower module (204) comprises a lower box, wherein the lower box and the lower module are configured such that the lower box can be repeatedly taken out of the lower module and re-loaded, wherein the second part of the receiving means and the second excitation source and the second sensor are located within the lower box and configured such that they can be taken out of and re-loaded as an integral part of the lower box.
17. A terminal comprising a user interface and a terminal unit according to any of the preceding claims 1 to 16, wherein the terminal unit has an interface for data exchange with the user interface to allow a user to authenticate and/or issue a verification result of the security document with respect to the security document.
18. A method for machine-authenticating a security document (108) by a terminal unit (200), wherein the terminal unit comprises a receiving opening (206), a receiving mechanism (518,522), an RFID reader (606), a type identification module (604), a drive means (518,522) and an authenticating module (610), wherein the method comprises:
-automatically retracting (802) the security document into the receiving opening by the receiving mechanism in the flipped open state, wherein said retracting is effected such that the broad edge (k1) of the front cover (110) or the broad edge (k 1') of the back cover (112) of the security document is retracted forward into the receiving opening;
-automatically identifying (804) a file type of the security file by means of a type identification module (604);
-automatically determining (806), by means of the type identification module (604) and depending on the identified file type, a file type-specific location of an RFID chip within the opened security file, wherein the RFID chip can be located within or on the front cover (110), within or on the back cover (112) or within or on an inner page (P3, P4, P5, P6) of the security file;
-automatically moving (808) the RFID reader and the retracted opened security document relative to each other by the drive means (518,522) depending on the determined RFID chip position until both the RFID reader and the RFID chip of the security document are in the respective reading position (LP1, LP2) within the terminal unit;
-automatically reading (810) data from the RFID chip (608) of the security document by the RFID reader (606) if both the RFID reader and the RFID chip (608) are located at their respective reading positions (LP1, LP 2);
-validating (812) the security document by the validating module (610) in dependence on the read data.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102014110946.5A DE102014110946B4 (en) | 2014-08-01 | 2014-08-01 | Terminal unit for verification of a security document |
DE102014110946.5 | 2014-08-01 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105321252A CN105321252A (en) | 2016-02-10 |
CN105321252B true CN105321252B (en) | 2020-01-21 |
Family
ID=53717954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510455415.2A Active CN105321252B (en) | 2014-08-01 | 2015-07-29 | Terminal unit and method for checking security documents, and terminal |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2980761B1 (en) |
CN (1) | CN105321252B (en) |
DE (1) | DE102014110946B4 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016103341A1 (en) * | 2016-02-25 | 2017-08-31 | CURO GmbH | RFID reading device for a spectacle frame, spectacle frame, method for equipping a spectacle frame with an RFID chip |
CN106056749A (en) * | 2016-07-15 | 2016-10-26 | 深圳怡化电脑股份有限公司 | Paper currency detection device |
DE102016014023B3 (en) * | 2016-11-24 | 2017-12-28 | Bundesdruckerei Gmbh | Template for a document tester |
DE102018103643A1 (en) * | 2018-02-19 | 2019-08-22 | Bundesdruckerei Gmbh | Device and method for electrical testing and closing a security document, in particular a passbook |
DE102018132045A1 (en) | 2018-12-13 | 2020-06-18 | Bundesdruckerei Gmbh | Device for automatically checking a security document and method for automatically reading out a security document for an automatic document check |
CN110148247B (en) * | 2019-04-18 | 2021-08-03 | 济南企财通软件有限公司 | Automatic bill filing method and device for implementing same |
DE102020004293A1 (en) | 2020-07-17 | 2022-01-20 | Mühlbauer Gmbh & Co. Kg | Security document, method for verifying a security document and reader for a security document |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004056007A1 (en) * | 2004-11-19 | 2006-05-24 | Bundesdruckerei Gmbh | Mobile verification device for checking the authenticity of travel documents |
CN101060997A (en) * | 2004-11-23 | 2007-10-24 | 捷德有限公司 | Security arrangement for security documents |
DE102006018876A1 (en) * | 2006-04-24 | 2007-10-25 | Giesecke & Devrient Gmbh | Card payment terminal has bank note verification device designed to verify machine-readable characteristic of one of paying customer presented bank note, in housing of terminal |
WO2008040608A1 (en) * | 2006-09-29 | 2008-04-10 | Bundesdruckerei Gmbh | Rfid reading device for a document |
CN103003827A (en) * | 2010-05-11 | 2013-03-27 | 联邦印刷有限公司 | Security or value document, method for the production thereof and for the verification thereof |
WO2014023514A1 (en) * | 2012-08-10 | 2014-02-13 | Bundesdruckerei Gmbh | Document scanning device having a document bed |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10028241A1 (en) * | 2000-06-07 | 2001-12-13 | Bundesdruckerei Gmbh | Automatic validation of security markings on a document uses laser and UV light with OCR and CCD cameras |
DE202007000708U1 (en) * | 2007-01-17 | 2007-04-26 | Eurodelta Gmbh | Electronic identification document e.g. identification card, reading device, has radio frequency identification chip reader as reading device for enabling execution of authenticity testing and/or function testing of identification document |
DE102012003241B4 (en) * | 2012-02-20 | 2015-12-24 | Bundesdruckerei Gmbh | Device and method for the automatic testing of security and / or security documents |
DE102013206700B4 (en) * | 2013-04-15 | 2018-07-26 | Bundesdruckerei Gmbh | Apparatus and method for document capture |
-
2014
- 2014-08-01 DE DE102014110946.5A patent/DE102014110946B4/en not_active Withdrawn - After Issue
-
2015
- 2015-07-23 EP EP15178038.4A patent/EP2980761B1/en active Active
- 2015-07-29 CN CN201510455415.2A patent/CN105321252B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004056007A1 (en) * | 2004-11-19 | 2006-05-24 | Bundesdruckerei Gmbh | Mobile verification device for checking the authenticity of travel documents |
CN101060997A (en) * | 2004-11-23 | 2007-10-24 | 捷德有限公司 | Security arrangement for security documents |
DE102006018876A1 (en) * | 2006-04-24 | 2007-10-25 | Giesecke & Devrient Gmbh | Card payment terminal has bank note verification device designed to verify machine-readable characteristic of one of paying customer presented bank note, in housing of terminal |
WO2008040608A1 (en) * | 2006-09-29 | 2008-04-10 | Bundesdruckerei Gmbh | Rfid reading device for a document |
CN103003827A (en) * | 2010-05-11 | 2013-03-27 | 联邦印刷有限公司 | Security or value document, method for the production thereof and for the verification thereof |
WO2014023514A1 (en) * | 2012-08-10 | 2014-02-13 | Bundesdruckerei Gmbh | Document scanning device having a document bed |
Also Published As
Publication number | Publication date |
---|---|
DE102014110946A1 (en) | 2016-02-04 |
EP2980761B1 (en) | 2019-07-10 |
CN105321252A (en) | 2016-02-10 |
EP2980761A1 (en) | 2016-02-03 |
DE102014110946B4 (en) | 2016-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105321252B (en) | Terminal unit and method for checking security documents, and terminal | |
US11854333B2 (en) | Devices, systems, and methods for optical validation | |
US8805025B2 (en) | Stain detection | |
US20170236034A1 (en) | Computerized integrated authentication/document bearer verification system and methods useful in conjunction therewith | |
US6839128B2 (en) | Optoelectronic document reader for reading UV / IR visible indicia | |
US20120075442A1 (en) | Handheld portable device for verification of travel and personal documents, reading of biometric data and identification of persons holding these documents | |
US8401268B1 (en) | Optical imaging sensor for a document processing device | |
US8317085B2 (en) | Fraudulent document detection system and method | |
US7215414B2 (en) | Module for validating deposited media items | |
US9978196B2 (en) | Banknote acceptor with visual checking | |
KR100894696B1 (en) | Identification card counterfeit discernment apparatus and system | |
AU2003200909B2 (en) | Optoelectronic Document Reader for Reading UV / IR Visible Indicia | |
WO2021193465A1 (en) | Optical sensor and paper sheet identifying device | |
US20090294244A1 (en) | Currency Validator with Rejected Bill Image Storage | |
RU2723409C1 (en) | Personal identity documents scanner | |
WO2012051933A1 (en) | Smart money-processing machine | |
KR20160113878A (en) | Recognition apparatus for face value of bill and detection apparatus for counterfiet bill | |
BG65191B1 (en) | System for banknotes recognition and validation | |
JP2006338325A (en) | Paper sheet identification device | |
WO2008151029A1 (en) | Currency validator with rejected bill image storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |