EP1380017B1 - Method for producing a data carrier and data carrier - Google Patents

Method for producing a data carrier and data carrier Download PDF

Info

Publication number
EP1380017B1
EP1380017B1 EP01997787.5A EP01997787A EP1380017B1 EP 1380017 B1 EP1380017 B1 EP 1380017B1 EP 01997787 A EP01997787 A EP 01997787A EP 1380017 B1 EP1380017 B1 EP 1380017B1
Authority
EP
European Patent Office
Prior art keywords
information
data carrier
characters
encryption
operators
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP01997787.5A
Other languages
German (de)
French (fr)
Other versions
EP1380017A2 (en
Inventor
Frank Kappe
Dirk Fischer
Hermann Rübbelke
Michael Hennemeyer-Schwenker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unica Technology AG
Original Assignee
Unica Technology AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unica Technology AG filed Critical Unica Technology AG
Publication of EP1380017A2 publication Critical patent/EP1380017A2/en
Application granted granted Critical
Publication of EP1380017B1 publication Critical patent/EP1380017B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components
    • B42D2033/46

Definitions

  • the invention relates to a method for producing a data carrier according to claim 1 or 4 as well as a data carrier produced according to the method according to claim 7 or 8.
  • the above data carriers are value or security documents, in particular identity cards or credit cards, which, in addition to general information, have individual information such as user name, user portrait, serial number or the like personal, card or document-specific information. This individual or specific information is preferably the subject of counterfeiting and manipulation and must be secured accordingly.
  • a method according to the preamble of claim 1 is known from US 4,641,347 known. This document discloses a system for generating postage indicia having encrypted postage, dispatch station and receiving station information with a device for printing such markings and with a device for reading such markers.
  • the data is encrypted for printed text by moving individual pressure points of the matrix that builds up the letters and numbers, and is recorded by a visually working reader during the test.
  • document DE 19706008 discloses a value or security document having alphanumeric characters which are provided with microscopic colored structures, the color being linked to a code with data to be protected from falsification of the document.
  • Another genus-like process is from the EP 0 730 243 known.
  • This document shows a data carrier on which information, namely an image, is visually visible. This image is also suitable as an image of a person to customize the disk. This information of the image is encrypted by removing individual reference points.
  • a data carrier with at least one individual information is known, wherein the individual information comprises a serial number, which consists of a first part and a second part.
  • the first part and the second part of the serial number may have a different color and are applied to the data carrier so that the complete serial number is reproduced.
  • By dividing the serial number and by register-accurate printing of the two parts of forgery and tamper protection should be increased.
  • the division of the serial number and the colored marking of the two parts are arbitrarily determined and applied to a variety of data carriers, such as banknotes, in a consistent form and in a consistent color design, so that counterfeiting and manipulation can not be excluded.
  • the invention is therefore based on the object to provide a method for producing a data carrier and a data carrier, which has an improved counterfeit or tamper protection.
  • a central idea of the method according to the invention is that a first piece of information representing individual information, such as the name of the authorized user of the data carrier, is encrypted by means of an algorithm and the result of the encryption is stored on the data carrier.
  • the result of the encryption represents additional information that can not be decrypted by the general public. Only authorized persons who have the algorithm will be able to decrypt the additional information and determine from the additional information whether forgeries or tampering has taken place.
  • At least one character of the first information is marked as a function of the result of the encryption. Markings according to the invention are colored or other visually visible markings of the signs of the first information in order to facilitate the checkability.
  • the marking of the first information can be effected by other suitable markings, whereby suitable markings are those markings which, if they are not visually recognizable, can be detected with appropriate aids, such as detectors or similar devices.
  • suitable markings are those markings which, if they are not visually recognizable, can be detected with appropriate aids, such as detectors or similar devices.
  • fluorescent or magnetic markings of the characters of the first information may be provided.
  • the algorithm underlying the encryption can not be designed in accordance with the invention such that only a single piece of information, for example the first piece of information, is included in the algorithm and, as a result, a marked first piece of information results.
  • one or more second information such as serial numbers or the like information is provided in addition to the first information, which are included in the algorithm in addition to the first information.
  • the second information need not be visually visible or readable on the disk. They can be hidden and / or encrypted in the area or outside the area of the data carrier, which increases protection against tampering or tampering.
  • the second stored such Information converted into machine-readable or computer-readable characters.
  • the algorithm is essentially carried out on the basis of operators, with a large number of operators being available for this purpose.
  • operators for bit manipulations such as exclusive OR operators, or binary arithmetic operators, such as addition operators or modulo operators, are used.
  • These operators typically require two operands or information to perform a join. However, they can also be applied to a single operand or information, for example, if a constant (number) value is assigned to the other operand.
  • the operators is expediently converted into numerical or integer numerical values, for example based on the ASCII character set.
  • Encryption is easy to carry out on the basis of these operators, without starting from the result, i. starting from the marked first information, conclusions about the execution of the marking or on the specific implementation of the algorithm or the information included in the algorithm are possible.
  • One step of the algorithm is to obtain a sequence of digits by applying one or more suitable operators to the first and / or second information (s).
  • the sequence of digits has a limited number of different digit values. This can preferably be done with the help of binary modulo operator, which can be used in addition to or as an alternative to the operators mentioned above.
  • the sequence of digits expediently has at least two different digit values, such as "0" or "1", wherein the digits or the digit values are each assigned a specific identifier, such as a color.
  • the numbers marked in this way are assigned to the characters of the first information, so that the characters of the first information receive a label corresponding to the assigned digit.
  • the marking of the first information generated in this way is easy to carry out and represents an effective measure for protection against counterfeiting or manipulation.
  • a fake or manipulated disk can be easily detected by a check.
  • the information (s) relevant for the implementation of the encryption is or will first be recorded. Then the algorithm is applied to the information (s).
  • the algorithm is applied to the information (s).
  • the invention further relates to a data carrier, such as a badge, credit card or the like value or security document.
  • the data carrier according to the invention is produced by the method described above.
  • Data carrier is that the first information is encrypted so that it is at least partially marked deposited on the disk.
  • the mark of the first Information is an authenticity feature. It is therefore not possible to change the marked first piece of information or parts thereof without being detected by a check.
  • the visually recognizable markings such as an alternating colored or a different visual design of the characters of the first information, according to the invention.
  • These visually recognizable markings can be very advantageous in the labeling process integrate, for example, when the disk is labeled with a laser (color).
  • the second information (s) is / are contained in a storage or additional element provided on the data carrier, such as an integrated circuit, magnetic strip or the like. Additionally or alternatively, the second information (s) may be provided outside the area of the data carrier, the second information (s) preferably being stored in an external memory, for example in a central database or similar memory device is or are.
  • This constructive measure makes the verification by authorized persons easier, as the second information (s) on can be detected in a simple manner by being read from the memories mentioned above.
  • a second information which is uniform for all data carriers can be provided.
  • a further simplified possibility of checking the data carrier according to the invention results according to a further preferred embodiment in that the encryption information provided for the information and the algorithm itself are stored in the integrated circuit of the data carrier.
  • the integrated circuit preferably comprises a microprocessor chip. Microprocessor chips are extremely difficult to manipulate and therefore allow inaccessible storage of the above data for unauthorized persons. Particularly advantageous in this embodiment is the ability to retrieve the result of the encryption for the purpose of verification directly from the disk or from the integrated circuit.
  • the second information (s) is / are contained in a pictorial representation provided on the data carrier, wherein the second information is or are stored encrypted and / or hidden in the pictorial representation ,
  • This structural measure is particularly suitable for identity cards or documents on which a pictorial representation in the form of a user portrait is applied.
  • the user portrait represents a person-specific information that is often subjected to forgery or manipulation, for example by the original user portrait through a new user portrait is replaced. By depositing encrypted and / or hidden information in the pictorial representation of these are also removed in such manipulations or at least changed so that such an intervention can be determined.
  • a data carrier 1 which represents an identification card.
  • individual information in particular personal or card-specific information, such as user name 3, serial number 5, user portrait 10, birth data of the user and the like information readable or visually visibly applied.
  • This individual information can be supplemented by a plurality of machine-readable characters or lines, which are provided in the specific embodiment in the lower region of the data carrier 1.
  • the data carrier 1 may comprise an integrated circuit 2, which expediently includes a microprocessor chip. Alternatively or additionally, a magnetic strip (not shown) may be provided.
  • the user name 3 represents a first information and comprises a defined number of characters 4, which are applied marked on the disk 1, that each character 4 has a certain color.
  • characters 4 may differ in their typeface by the characters 4 are alternately applied in normal, italic or bold on the disk 1.
  • markings can be advantageously integrated into the labeling process, wherein the marked user name 3 or any other marked first information is preferably applied to the data carrier 1 by means of laser printing, laser radiation, dye sublimation printing, thermal transfer printing or inkjet printing.
  • Another way of labeling includes, for example, the use of fluorescent materials or magnetic materials that can be on or in the disk 1 by suitable methods or introduced.
  • the user name 3 to be marked is encrypted on the basis of an algorithm.
  • the encryption of the user name 3 is described below on the basis of Fig. 2 and 3 described in detail.
  • Fig. 2 is shown a table to illustrate the encryption.
  • the user name 3 consisting of last name and first name, is arranged character by character in line 11 of the table.
  • the user name 3 is encrypted with the serial number 5, which represents a second information intended for encryption.
  • the serial number 5 has a defined number of characters 6 and is arranged character by character in line 13 of the table.
  • the characters 4 of the user name and the characters 6 of the serial number 5 are converted into numerical or integer numerical values 7 and 8 using the ASCII character set, as shown in lines 12 and 14 of the table.
  • the numerical values 7 of the user name 3 and the numerical values 8 of the serial number 5 are linked together in numbers or bit by bit using an exclusive OR operator XOR. The result of this link is shown in line 15 of the table.
  • an exclusive OR operator XOR other suitable operators for bit manipulations or binary arithmetic operators, such as addition operators +, may be applied to the numerals 7 and 8.
  • a modulo operator% which counts among the binary arithmetic operators, is applied to the result of the above link.
  • a sequence of digits 9 is listed, which is listed in line 16 of the table.
  • the digits 9 comprise a defined number of different digit values, the number of different digit values being determined by the selection of a divisor T of the modulo operator%. If the divisor T of the modulo operator% is assigned the value "2", then two different digit values "0" and "1" are obtained, as in line 16 of FIG Table is shown.
  • the digits 9 or the different numerical values in line 16 of the table are each assigned a specific color or other marking in a further step, so that each digit 9 represents a particular color. For example, the numbers 9 with the numerical value "0" are assigned the color blue, whereby the color blue is illustrated by the symbol o.
  • the numbers 9 with the digit value "1" are assigned the color red, whereby the color red is indicated by the symbol *.
  • the color-coded digits 9 are assigned to the character 4 of the user name 3 in a further step, as shown in line 17 of the table, so that the characters 4 receive a color corresponding to the assigned digit 9.
  • the choice of the divisor T of the modulo operator% depends essentially on how many colors or other markings are to be used. If you want to mark the user name 3, for example, with 3 different colors, the divider T is set to the value "3", as shown in line 18 of the table. Hereby, a total of three different digit values "0", "1” and “2" are obtained, to which a certain color is assigned. The newly added digit value "2" is assigned a further color, for example the color green, wherein the color green is marked by the symbol ⁇ . The color-coded digits 9 are assigned to the character 4 of the user name 3 in a further step, so that a three-color marked user name 3 results from this, as is illustrated in line 19 of the table.
  • Fig. 3 Another embodiment for encrypting the user name 3 is in Fig. 3 based on a second table clarified.
  • the user name 3 is provided in a modified form.
  • the modified user name 3a comprises characters 4a and is arranged in row 13a of the table.
  • the modified user name 3a is obtained by shifting the user name 3 arranged in line 11a, for example, by one character position to the right, and placing the character "k" at the right-hand end of the line at the beginning of the line.
  • the username 3 may be shifted by several character positions or otherwise changed so that a modified form of the user name 3 is obtained. Analogous to the previous example according to Fig.
  • the characters 4 of the user name 3 and the characters 4a of the modified user name 3a are converted into numerical and integer numerical values 7 and 7a, respectively, as shown in lines 12a and 14a, using the ASCII character set.
  • the exclusive OR operator XOR is applied to the numerical values 7 and 7a and the result of the link shown in line 15a is obtained.
  • the modulo operator% is applied to the divisor T equal to "2" (see line 16a) or alternatively the modulo operator% to the divider T equal to "3" (see line 18a) to the result listed in line 15a to get a sequence of numbers 9.
  • the numbers 9 have, as already mentioned above, depending on the choice or value of the divider T a defined number of different numerical values.
  • the addition operator + or similar operators can be applied to the numerical values 7 of the user name 3 and to the numerical values 8 or 7a of the serial number 5 or the modified user name 3a.
  • the addition operator + or similar operators can be applied to the above numerals 7, 8 and 7a.
  • each visually visible, individual or first information provided on the data carrier 1 can be marked on the basis of the algorithm described above. It is not necessary that always the user name 3 or any other first information to be marked with the serial number 5, the modified user name 3a or any other second information is linked.
  • the serial number 5 may be linked to the modified user name 3a to obtain a sequence of numbers 9.
  • the characters 4 of the user name 3 are assigned a defined color or other marking suitable for distinguishing the characters 4, as in lines 17 and 19 of the table of FIG Fig. 2 and in lines 17a and 19a of the table according to Fig. 3 is shown.
  • this information can be stored on a magnetic strip (not shown) of the data carrier 1.
  • Another way to increase protection against Counterfeiting and manipulation is that, for example, the serial number 5 and / or the modified user name 3a are provided according to a further embodiment outside the range of the data carrier 1 and preferably in an external memory 23 (see. Fig. 4 ) are stored.
  • external memory 23 is a secured against unauthorized access central database.
  • a second information unit that is identical for all data carriers 1 can be provided for encrypting the respective user name 3 or the like first information.
  • the serial number 5 and / or the modified user name 3a is stored in the user portrait 10 (not shown).
  • the serial number 5 and / or the modified user name 3a can be encrypted, for example present as a barcode, such a deposit or storage of information preferably being carried out with a steganographic method.
  • the serial number 5 and / or the modified user name 3a can be hidden in the user portrait 10.
  • the hidden arrangement of the serial number 5 and / or the modified user name 3a takes place in the form of a secondary image, for example in the form of the barcode mentioned above, the secondary image in the user portrait 10, which represents a primary image, in such a way is hidden, that it is recognizable only by means of a decoder or the like aids.
  • Fig. 4 an arrangement for checking the data carrier 1 is shown schematically.
  • the marked user name 3 or another marked first information as well as the serial number 5 intended for encryption or another second information intended for encryption are detected and digitized by a camera 20 or an optical scanner.
  • the recorded image data of the user name 3 and the serial number 5 are evaluated and converted by means of optical character recognition (OCR) to computer-editable characters 4 and 6.
  • OCR optical character recognition
  • the computer-operable characters 4 and 6 of the user name 3 and the serial number 5 are supplied to a verification unit 22.
  • the algorithm described above is applied to the characters 4 of the user name 3 and the characters 6 of the serial number 5, and the mark of the user name 3 is determined again. If the ascertained marking of the user name 3 is identical to the marking of the user name 3 deposited on the data carrier, the data carrier 1 is considered genuine.
  • the serial number 5 or other first and / or second information intended for encryption are stored in the integrated circuit 2 or magnetic strip, this information is read out via a card reader 24 and forwarded to the verification unit 22. Is this information stored outside the area of the data carrier 1 in an external memory 23, they can be retrieved from the external memory 23 and the verification unit 22 are supplied.
  • the user name 3, the serial number 5 or other information intended for encryption as well as the algorithm are stored in the integrated circuit 2, wherein the integrated circuit 2 expediently comprises a microprocessor chip.
  • the verification of the data carrier 1 can be done directly by means of the microprocessor chip in this embodiment.
  • the inventive method and the data carrier according to the invention is characterized by an efficient protection against counterfeiting and manipulation and by a cost-effective production.
  • the encryption described above can be made arbitrarily complex due to the large number of available operators.
  • a defined marking of one or more information on the data carrier can be effected, the coding of which is only accessible to authorized persons.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)

Description

Die Erfindung betrifft ein Verfahren zur Herstellung eines Datenträgers gemäß Anspruch 1 bzw.4 sowie einen verfahrensgemäß hergestellten Datenträger nach Anspruch 7 bzw. 8.The invention relates to a method for producing a data carrier according to claim 1 or 4 as well as a data carrier produced according to the method according to claim 7 or 8.

Bei den obigen Datenträgern handelt es sich um Wert- oder Sicherheitsdokumente, insbesondere um Ausweis- oder Kreditkarten, die neben allgemeinen Informationen individuelle Informationen, wie Benutzername, Benutzerporträt, Seriennummer oder dergleichen personen-, karten- oder dokumentspezifische Informationen aufweisen. Diese individuellen bzw. spezifischen Informationen sind bevorzugt Gegenstand von Fälschungen und Manipulationen und müssen entsprechend gesichert werden.
Ein Verfahren gemäss dem Oberbegriff des Anspruchs 1 ist aus der US 4,641,347 bekannt. Diese Druckschrift zeigt ein System zur Erzeugung von Postaufklebem mit verschlüsselten Porto-, Absendestation- und Empfangsstation-Informationen mit einer Vorrichtung zum Drucken solcher Markierungen und mit einer Vorrichtung zum Maschinenlesen solcher Markierungen. Die Daten werden unter anderem bei gedrucktem Text durch Verschieben von einzelnen Druckpunkten der Buchstaben und Zahlen aufbauenden Matrix verschlüsselt und bei der Prüfung durch einen optisch arbeitenden Leser erfasst. Dabei wird ein Teil einer Serie von diesen Buchstaben und Zeichen als verschlüsseltes Material zur Verifikation der Nachricht verwendet, während die verbleibenden Abschnitte und ein Abschnitt eines Strichcodes rein zum Kommunizieren der Nachricht verwendet werden. Dokument DE 19706008 offenbart ein Wert-oder Sicherheitsdokument mit alphanumerischen Zeichen, die mit mikroskopischen farbigen Strukturen versehen werden, wobei die Farbe nach einem Code mit vor Verfälschungen zu Schützenden Daten des Dokuments verknüpft ist.
Ein weiteres gattungsähnliches Verfahren ist aus der EP 0 730 243 bekannt. Diese Druckschrift zeigt einen Datenträger, auf dem eine Information, nämlich ein Bild, visuell sichtbar ist. Dieses Bild ist als Bild einer Person auch geeignet, den Datenträger zu individualisieren. Diese Information des Bildes ist durch Herausnahme von einzelnen Referenzpunkten verschlüsselt. Bei dem Stand der Technik werden einzelne Elemente des Bildes als Referenzpunkte verschlüsselt und diese Informationen werden an einer anderen Stelle des Datenträgers gespeichert und hinterlegt.
Aus der US 4,995,081 ist ein System für die Feststellung der Identität einer Person unter Einsatz eines Datenträgers bekannt, bei dem eine nicht geheime Information des Benutzers verschlüsselt auf der Karte abgelegt wird, wobei das System dann Merkmale zur Erhöhung der Sicherheit im Zusammenhang mit einem Bezahlterminal bereitstellt.
Aus der US 5,337,361 ist ein Datenträger bekannt, bei dem graphische Information wie das Bild eines Ausweisinhabers mit schriftlicher Information verwoben wird, um die Sicherheit zu erhöhen. Dabei wird darauf abgehoben, dass die graphische Information zu einer Verschlechterung der Maschinenlesbarkeit der Textinformation führen kann, der durch eine entsprechende Kodierung entgegengewirkt werden kann.
Aus der EP 0 466 146 ist ein System mit einer Verschlüsselungstabelle für die Auswahl von Zeichen zum Druck in verschlüsselter Form bekannt.
The above data carriers are value or security documents, in particular identity cards or credit cards, which, in addition to general information, have individual information such as user name, user portrait, serial number or the like personal, card or document-specific information. This individual or specific information is preferably the subject of counterfeiting and manipulation and must be secured accordingly.
A method according to the preamble of claim 1 is known from US 4,641,347 known. This document discloses a system for generating postage indicia having encrypted postage, dispatch station and receiving station information with a device for printing such markings and with a device for reading such markers. Among other things, the data is encrypted for printed text by moving individual pressure points of the matrix that builds up the letters and numbers, and is recorded by a visually working reader during the test. In this case, a part of a series of these letters and characters is used as encrypted material for verification of the message, while the remaining portions and a portion of a bar code are used purely for communicating the message. document DE 19706008 discloses a value or security document having alphanumeric characters which are provided with microscopic colored structures, the color being linked to a code with data to be protected from falsification of the document.
Another genus-like process is from the EP 0 730 243 known. This document shows a data carrier on which information, namely an image, is visually visible. This image is also suitable as an image of a person to customize the disk. This information of the image is encrypted by removing individual reference points. In the prior art, individual elements of the image are encrypted as reference points and this information is stored and deposited elsewhere on the volume.
From the US 4,995,081 For example, there is known a system for determining the identity of a person using a data carrier in which non-secret information of the user is stored in encrypted form on the card, the system then providing features for increasing security in connection with a payment terminal.
From the US 5,337,361 For example, a data carrier is known in which graphical information, such as the identity of a cardholder, is interwoven with written information in order to increase security. It is emphasized that the graphical information can lead to a deterioration of the machine readability of the text information, which can be counteracted by an appropriate coding.
From the EP 0 466 146 For example, a system having an encryption table for selecting characters for printing in encrypted form is known.

Aus der EP 0 906 834 A2 ist ein Datenträger mit wenigstens einer individuellen Information bekannt, wobei die individuelle Information eine Seriennummer umfaßt, die aus einem ersten Teil und einem zweiten Teil besteht. Der erste Teil und der zweite Teil der Seriennummer können eine unterschiedliche Farbe aufweisen und werden so auf dem Datenträger aufgebracht, daß die vollständige Seriennummer wiedergegeben wird. Durch die Teilung der Seriennummer und durch das passergenaue Drucken der beiden Teile soll der Fälschungs- und Manipulationsschutz erhöht werden.
Die Teilung der Seriennummer sowie die farbige Kennzeichnung der beiden Teile werden jedoch willkürlich festgelegt und bei einer Vielzahl von Datenträgern, wie Banknoten, in gleichbleibender Form und in gleichbleibender farbiger Gestaltung aufgebracht, so daß Fälschungen und Manipulationen nicht ausgeschlossen werden können.
From the EP 0 906 834 A2 a data carrier with at least one individual information is known, wherein the individual information comprises a serial number, which consists of a first part and a second part. The first part and the second part of the serial number may have a different color and are applied to the data carrier so that the complete serial number is reproduced. By dividing the serial number and by register-accurate printing of the two parts of forgery and tamper protection should be increased.
However, the division of the serial number and the colored marking of the two parts are arbitrarily determined and applied to a variety of data carriers, such as banknotes, in a consistent form and in a consistent color design, so that counterfeiting and manipulation can not be excluded.

Der Erfindung liegt daher die Aufgabe zugrunde, ein Verfahren zur Herstellung eines Datenträgers sowie einen Datenträger bereitzustellen, der einen verbesserten Fälschungs- oder Manipulationsschutz aufweist.The invention is therefore based on the object to provide a method for producing a data carrier and a data carrier, which has an improved counterfeit or tamper protection.

Diese Aufgabe wird durch die Merkmale der unabhängigen Ansprüche gelöst. Vorteilhafte Weiterbildungen sind in den Unteransprüchen beschrieben.This object is solved by the features of the independent claims. Advantageous developments are described in the subclaims.

Ein Kerngedanke des erfindungsgemäßen Verfahrens besteht darin, daß eine erste Information, die eine individuelle Information darstellt, wie der Name des autorisierten Benutzers des Datenträgers, mittels eines Algorithmus verschlüsselt und das Ergebnis der Verschlüsselung auf dem Datenträger hinterlegt wird. Das Ergebnis der Verschlüsselung stellt eine zusätzliche Information dar, die von der Allgemeinheit nicht entschlüsselt werden kann. Nur autorisierte Personen, die über den Algorithmus verfügen, sind in der Lage, die zusätzliche Information zu entschlüsseln und anhand der zusätzlichen Information festzustellen, ob Fälschungen oder Manipulationen stattgefunden haben. Dabei wird mindestens ein Zeichen der ersten Information in Abhängigkeit des Ergebnisses der Verschlüsselung markiert. Erfindungsgemäße Markierungen sind farbige oder sonstige visuell sichtbare Kennzeichnungen der Zeichen der ersten Information, um die Überprüfbarkeit zu erleichtern. Zusätzlich oder alternativ kann die Markierung der ersten Information durch andere geeignete Kennzeichnungen bewirkt werden, wobei unter geeigneten Kennzeichnungen diejenigen Kennzeichnungen verstanden werden, die, sofern sie nicht visuell erkennbar sind, mit entsprechenden Hilfsmitteln, wie Detektoren oder dergleichen Geräte, erfaßbar sind. Beispielsweise können fluoreszierende oder magnetische Kennzeichnungen der Zeichen der ersten Information vorgesehen sein.A central idea of the method according to the invention is that a first piece of information representing individual information, such as the name of the authorized user of the data carrier, is encrypted by means of an algorithm and the result of the encryption is stored on the data carrier. The result of the encryption represents additional information that can not be decrypted by the general public. Only authorized persons who have the algorithm will be able to decrypt the additional information and determine from the additional information whether forgeries or tampering has taken place. At least one character of the first information is marked as a function of the result of the encryption. Markings according to the invention are colored or other visually visible markings of the signs of the first information in order to facilitate the checkability. Additionally or alternatively, the marking of the first information can be effected by other suitable markings, whereby suitable markings are those markings which, if they are not visually recognizable, can be detected with appropriate aids, such as detectors or similar devices. For example, fluorescent or magnetic markings of the characters of the first information may be provided.

Der der Verschlüsselung zugrunde liegende Algorithmus kann nicht gemäss der Erfindung so ausgelegt sein, daß lediglich eine einzige Information, beispielsweise die erste Information in den Algorithmus einbezogen wird und als Ergebnis eine markierte erste Information resultiert. Um eine komplexere Verschlüsselung zu erzielen, sind erfindungsgemäss neben der ersten Information eine oder mehrere zweite Informationen, wie Seriennummern oder dergleichen Informationen vorgesehen, die zusätzlich zur ersten Information in den Algorithmus einbezogen werden. Die zweiten Informationen brauchen nicht visuell sichtbar oder lesbar auf dem Datenträger vorgesehen sein. Sie können versteckt und/oder verschlüsselt im Bereich oder außerhalb des Bereichs des Datenträgers hinterlegt sein, was den Fälschungs- oder Manipulationsschutz erhöht. Zur Durchführung der Verschlüsselung, insbesondere bei der Überprüfung des Datenträgers, werden die derartig hinterlegten zweiten Informationen in maschinenlesbare bzw. rechnerverarbeitbare Zeichen umgewandelt.The algorithm underlying the encryption can not be designed in accordance with the invention such that only a single piece of information, for example the first piece of information, is included in the algorithm and, as a result, a marked first piece of information results. In order to achieve a more complex encryption, according to the invention one or more second information, such as serial numbers or the like information is provided in addition to the first information, which are included in the algorithm in addition to the first information. The second information need not be visually visible or readable on the disk. They can be hidden and / or encrypted in the area or outside the area of the data carrier, which increases protection against tampering or tampering. To carry out the encryption, in particular when checking the data carrier, the second stored such Information converted into machine-readable or computer-readable characters.

Der Algorithmus wird im wesentlichen anhand von Operatoren durchgeführt, wobei hierfür eine Vielzahl von Operatoren zur Verfügung steht. Bevorzugt werden Operatoren für Bit-Manipulationen, wie exklusive Oder-Operatoren, oder binäre arithmetische Operatoren, wie Additions-Operatoren oder Modulo-Operatoren, angewendet. Diese Operatoren benötigen in der Regel zwei Operanden bzw. Informationen, um eine Verknüpfung durchzuführen. Sie können jedoch auch auf einen einzelnen Operanden bzw. auf eine einzelne Information angewendet werden, wenn beispielsweise dem anderen Operanden ein konstanter (Zahlen-) Wert zugewiesen wird. Vor Anwendung der Operatoren auf die zur Verschlüsselung vorgesehene(n) Information(en) werden bzw. wird diese zweckmäßigerweise in numerische bzw. ganzzahlige Zahlenwerte umgewandelt, beispielsweise anhand des ASCII-Zeichensatzes.The algorithm is essentially carried out on the basis of operators, with a large number of operators being available for this purpose. Preferably, operators for bit manipulations, such as exclusive OR operators, or binary arithmetic operators, such as addition operators or modulo operators, are used. These operators typically require two operands or information to perform a join. However, they can also be applied to a single operand or information, for example, if a constant (number) value is assigned to the other operand. Before the operators are applied to the information (s) intended for encryption, it is expediently converted into numerical or integer numerical values, for example based on the ASCII character set.

Anhand dieser Operatoren ist die Verschlüsselung auf einfache Weise durchführbar, ohne daß ausgehend vom Ergebnis, d.h. ausgehend von der markierten ersten Information, Rückschlüsse auf die Durchführung der Markierung bzw. auf die konkrete Durchführung des Algorithmus oder auf die in den Algorithmus einbezogenen Informationen möglich sind.Encryption is easy to carry out on the basis of these operators, without starting from the result, i. starting from the marked first information, conclusions about the execution of the marking or on the specific implementation of the algorithm or the information included in the algorithm are possible.

Ein Schritt des Algorithmus besteht darin, daß durch die Anwendung eines oder mehrerer geeigneter Operatoren auf die erste und/oder zweite(n) Information(en) eine Folge von Ziffern erhalten wird. Vorzugsweise weist die Folge von Ziffern eine begrenzte Anzahl von unterschiedlichen Ziffernwerten auf. Dies läßt sich bevorzugt mit Hilfe des binären Modulo-Operators erreichen, der zusätzlich oder alternativ zu den oben erwähnten Operatoren eingesetzt werden kann. Die Folge von Ziffern weist zweckmäßigerweise wenigstens zwei unterschiedliche Ziffernwerte, wie "0" oder "1" auf, wobei den Ziffern bzw. den Ziffernwerten jeweils eine bestimmte Kennzeichnung, wie eine Farbe, zugeordnet wird. Die so markierten Ziffern werden den Zeichen der ersten Information zugeordnet, so daß die Zeichen der ersten Information eine der zugeordneten Ziffer entsprechende Kennzeichnung erhalten. Die auf diese Weise erzeugte Markierung der ersten Information ist einfach durchführbar und stellt eine effektive Maßnahme zum Schutz gegen Fälschungen oder Manipulationen dar.One step of the algorithm is to obtain a sequence of digits by applying one or more suitable operators to the first and / or second information (s). Preferably, the sequence of digits has a limited number of different digit values. This can preferably be done with the help of binary modulo operator, which can be used in addition to or as an alternative to the operators mentioned above. The sequence of digits expediently has at least two different digit values, such as "0" or "1", wherein the digits or the digit values are each assigned a specific identifier, such as a color. The numbers marked in this way are assigned to the characters of the first information, so that the characters of the first information receive a label corresponding to the assigned digit. The marking of the first information generated in this way is easy to carry out and represents an effective measure for protection against counterfeiting or manipulation.

Ein gefälschter oder manipulierter Datenträger kann durch eine Überprüfung auf einfache Weise erkannt werden. Im Rahmen der Überprüfung wird bzw. werden zunächst die für die Durchführung der Verschlüsselung maßgebliche(n) Information(en) erfaßt. Anschließend wird der Algorithmus auf die Information(en) angewendet. Durch einen Vergleich der anhand des Algorithmus erhaltenen Markierung der ersten Information mit der auf dem Datenträger hinterlegten Markierung der ersten Information können unerlaubte Eingriffe problemlos festgestellt werden.A fake or manipulated disk can be easily detected by a check. As part of the review, the information (s) relevant for the implementation of the encryption is or will first be recorded. Then the algorithm is applied to the information (s). By means of a comparison of the marking of the first information obtained by means of the algorithm with the marking of the first information deposited on the data carrier, unauthorized interventions can easily be ascertained.

Die Erfindung befaßt sich ferner mit einem Datenträger, wie eine Ausweis-, Kreditkarte oder dergleichen Wert- oder Sicherheitsdokument. Der erfindungsgemäße Datenträger ist nach dem oben beschriebenen Verfahren hergestellt. Ein Kerngedanke des erfindungsgemäßen. Datenträgers besteht darin, daß die erste Information derart verschlüsselt ist, daß sie zumindest teilweise markiert auf dem Datenträger hinterlegt ist. Die Markierung der ersten Information stellt ein Echtheitsmerkmal dar. Es ist daher nicht möglich, die markierte erste Information oder Teile davon zu verändern, ohne daß dies bei einer Überprüfung erkannt wird.The invention further relates to a data carrier, such as a badge, credit card or the like value or security document. The data carrier according to the invention is produced by the method described above. A core idea of the invention. Data carrier is that the first information is encrypted so that it is at least partially marked deposited on the disk. The mark of the first Information is an authenticity feature. It is therefore not possible to change the marked first piece of information or parts thereof without being detected by a check.

Von den eingangs beschriebenen Markierungen der ersten Information sind die visuell erkennbaren Kennzeichnungen, wie eine wechselnde farbige oder eine unterschiedliche schriftbildliche Gestaltung der Zeichen der ersten Information, gemäß der Erfindung. Diese visuell erkennbaren Kennzeichnungen lasssen sich sehr vorteilhaft in den Beschriftungsprozeß integrieren, beispielsweise wenn der Datenträger mit einem Laser (farblich) beschriftet wird.Of the markings of the first information described above are the visually recognizable markings, such as an alternating colored or a different visual design of the characters of the first information, according to the invention. These visually recognizable markings can be very advantageous in the labeling process integrate, for example, when the disk is labeled with a laser (color).

Weitere bevorzugte und nachstehend aufgeführte Ausführungsformen der Erfindung sehen vor, daß eine oder mehrere zweite Information(en), die zur Verschlüsselung der ersten Information dienen, für nicht autorisierte Personen unzugänglich hinterlegt sind.Further preferred and below-listed embodiments of the invention provide that one or more second information (s), which serve to encrypt the first information, are stored inaccessible to unauthorized persons.

Gemäß einer vorteilhaften Ausführungsform ist bzw. sind die zweite(n) Information(en) in einem auf dem Datenträger vorgesehenen Speicher- oder Zusatzelement, wie einem integrierten Schaltkreis, Magnetstreifen oder dergleichen enthalten. Zusätzlich oder alternativ kann bzw. können die zweite(n) Information(en) außerhalb des Bereichs des Datenträgers vorgesehen sein, wobei die zweite(n) Information(en) vorzugsweise in einem externen Speicher, beispielsweise in einer zentralen Datenbank oder dergleichen Speichereinrichtung, gespeichert ist bzw. sind. Durch diese konstruktive Maßnahme wird die Überprüfung durch autorisierte Personen erleichtert, da die zweite(n) Information(en) auf einfache Weise erfaßbar ist bzw. sind, indem sie aus den oben erwähnten Speichern ausgelesen wird bzw. werden. Darüberhinaus kann bei einer derart gesicherten Hinterlegung der zweiten Information(en) eine für alle Datenträger einheitliche zweite Information vorgesehen sein.According to an advantageous embodiment, the second information (s) is / are contained in a storage or additional element provided on the data carrier, such as an integrated circuit, magnetic strip or the like. Additionally or alternatively, the second information (s) may be provided outside the area of the data carrier, the second information (s) preferably being stored in an external memory, for example in a central database or similar memory device is or are. This constructive measure makes the verification by authorized persons easier, as the second information (s) on can be detected in a simple manner by being read from the memories mentioned above. Moreover, in the case of such a secure deposit of the second information (s), a second information which is uniform for all data carriers can be provided.

Eine weitere vereinfachte Überprüfungsmöglichkeit des erfindungsgemäßen Datenträgers ergibt sich gemäß einer weiteren bevorzugten Ausführungsform dadurch, daß die zur Verschlüsselung vorgesehene(n) Information(en) sowie der Algorithmus selbst in dem integrierten Schaltkreis des Datenträgers gespeichert sind. Zu diesem Zweck umfaßt der integrierte Schaltkreis vorzugsweise einen Mikroprozessorchip. Mikroprozessorchips sind äußerst schwierig zu manipulieren und ermöglichen daher eine für unautorisierte Personen unzugängliche Speicherung der obigen Daten. Besonders vorteilhaft ist bei dieser Ausführungsform die Möglichkeit, das Ergebnis der Verschlüsselung zwecks Überprüfung direkt vom Datenträger bzw. vom integrierten Schaltkreis abzurufen.A further simplified possibility of checking the data carrier according to the invention results according to a further preferred embodiment in that the encryption information provided for the information and the algorithm itself are stored in the integrated circuit of the data carrier. For this purpose, the integrated circuit preferably comprises a microprocessor chip. Microprocessor chips are extremely difficult to manipulate and therefore allow inaccessible storage of the above data for unauthorized persons. Particularly advantageous in this embodiment is the ability to retrieve the result of the encryption for the purpose of verification directly from the disk or from the integrated circuit.

Gemäß einer weiteren vorteilhaften Ausführungsform ist bzw. sind die zweite(n) Information(en) in einer auf dem Datenträger vorgesehenen bildhaften Darstellung enthalten, wobei die zweite(n) Informationen vorzugsweise verschlüsselt und/oder versteckt in der bildhaften Darstellung hinterlegt ist bzw. sind. Diese konstruktive Maßnahme eignet sich insbesondere für Ausweiskarten oder -dokumente, auf denen eine bildhafte Darstellung in Form eines Benutzerporträts aufgebracht ist. Das Benutzerporträt stellt eine personenindividuelle Information dar, die häufig Fälschungen oder Manipulationen unterzogen wird, indem beispielsweise das ursprüngliche Benutzerporträt durch ein neues Benutzerporträt ersetzt wird. Durch die Hinterlegung von verschlüsselten und/oder versteckten Informationen in der bildhaften Darstellung werden diese bei derartigen Manipulationen ebenfalls entfernt oder zumindest derart verändert, so daß ein solcher Eingriff festgestellt werden kann.According to a further advantageous embodiment, the second information (s) is / are contained in a pictorial representation provided on the data carrier, wherein the second information is or are stored encrypted and / or hidden in the pictorial representation , This structural measure is particularly suitable for identity cards or documents on which a pictorial representation in the form of a user portrait is applied. The user portrait represents a person-specific information that is often subjected to forgery or manipulation, for example by the original user portrait through a new user portrait is replaced. By depositing encrypted and / or hidden information in the pictorial representation of these are also removed in such manipulations or at least changed so that such an intervention can be determined.

Die Erfindung wird nachstehend, auch hinsichtlich weiterer Merkmale und Vorteile, anhand der Beschreibung von Ausführungsbeispielen und unter Bezugnahme auf die beiliegenden Zeichnungen näher erläutert. Es zeigt:

Fig. 1
einen erfindungsgemäßen Datenträger in Draufsicht,
Fig. 2 und 3
Tabellen zur Verdeutlichung der Durchführung einer Verschlüsselung, und
Fig. 4
eine schematisch dargestellte Anordnung zur Überprüfung des erfindungsgemäßen Datenträgers.
The invention is explained below, also with regard to further features and advantages, based on the description of exemplary embodiments and with reference to the accompanying drawings. It shows:
Fig. 1
a data carrier according to the invention in plan view,
FIGS. 2 and 3
Tables to illustrate the implementation of encryption, and
Fig. 4
a schematically illustrated arrangement for checking the data carrier according to the invention.

In Fig. 1 ist eine Ausführungsform eines Datenträger 1 gezeigt, der eine Ausweiskarte darstellt. Auf dem Datenträger 1 sind individuelle Informationen, insbesondere personen- oder kartenspezifische Informationen, wie Benutzername 3, Seriennummer 5, Benutzerporträt 10, Geburtsdaten des Benutzers und dergleichen Informationen lesbar bzw. visuell sichtbar aufgebracht. Diese individuellen Informationen können durch mehrere maschinenlesbare Zeichen bzw. Zeilen, die im konkreten Ausführungsbeispiel im unteren Bereich des Datenträgers 1 vorgesehen sind, ergänzt werden. Der Datenträger 1 kann einen integrierten Schaltkreis 2 aufweisen, der zweckmäßigerweise einen Mikroprozessorchip umfaßt. Alternativ oder zusätzlich kann ein Magnetstreifen (nicht gezeigt) vorgesehen sein.In Fig. 1 an embodiment of a data carrier 1 is shown, which represents an identification card. On the data carrier 1 are individual information, in particular personal or card-specific information, such as user name 3, serial number 5, user portrait 10, birth data of the user and the like information readable or visually visibly applied. This individual information can be supplemented by a plurality of machine-readable characters or lines, which are provided in the specific embodiment in the lower region of the data carrier 1. The data carrier 1 may comprise an integrated circuit 2, which expediently includes a microprocessor chip. Alternatively or additionally, a magnetic strip (not shown) may be provided.

Der Benutzername 3 stellt eine erste Information dar und umfaßt eine definierte Anzahl von Zeichen 4, die derart markiert auf dem Datenträger 1 aufgebracht sind, daß jedes Zeichen 4 eine bestimmte Farbe aufweist. Anstelle der verschieden farbigen bzw. wechselnden farbigen Gestaltung der Zeichen 4 können andere geeignete visuell sichtbare Kennzeichnungen vorgesehen sein. Beispielsweise können sich die Zeichen 4 hinsichtlich ihres Schriftbildes unterscheiden, indem die Zeichen 4 wechselweise in Normal-, Kursiv- oder Fettschrift auf dem Datenträger 1 aufgebracht werden. Derartige Kennzeichnungen lassen sich vorteilhaft in den Beschriftungsprozeß integrieren, wobei der markierte Benutzername 3 oder eine sonstige markierte erste Information vorzugsweise mittels Laserdruck, Laserstrahlung, Farbsublimationsdruck, Thermotransferdruck oder Tintenstrahldruck auf dem Datenträger 1 aufgebracht wird. Eine andere Möglichkeit der Kennzeichnung umfaßt beispielsweise die Verwendung von fluoreszierenden Stoffen oder magnetischen Materialien, die mittels geeigneter Verfahren auf bzw. in den Datenträger 1 auf- bzw. eingebracht werden können.The user name 3 represents a first information and comprises a defined number of characters 4, which are applied marked on the disk 1, that each character 4 has a certain color. Instead of the differently colored or changing colored design of the characters 4, other suitable visually visible markings may be provided. For example, the characters 4 may differ in their typeface by the characters 4 are alternately applied in normal, italic or bold on the disk 1. Such markings can be advantageously integrated into the labeling process, wherein the marked user name 3 or any other marked first information is preferably applied to the data carrier 1 by means of laser printing, laser radiation, dye sublimation printing, thermal transfer printing or inkjet printing. Another way of labeling includes, for example, the use of fluorescent materials or magnetic materials that can be on or in the disk 1 by suitable methods or introduced.

Um eine durchschaubare Beziehung zwischen den Zeichen 4 des Benutzernamens 3 und ihren jeweiligen Farben zu vermeiden, wird der zu markierende Benutzername 3 auf der Basis eines Algorithmus verschlüsselt. Die Verschlüsselung des Benutzernamens 3 wird nachfolgend anhand der Fig. 2 und 3 im Detail beschrieben.In order to avoid a transparent relationship between the characters 4 of the user name 3 and their respective colors, the user name 3 to be marked is encrypted on the basis of an algorithm. The encryption of the user name 3 is described below on the basis of Fig. 2 and 3 described in detail.

In Fig. 2 ist eine Tabelle zur Verdeutlichung der Verschlüsselung gezeigt. Der Benutzername 3, bestehend aus Nachname und Vorname ist in Zeile 11 der Tabelle zeichenweise angeordnet. Der Benutzername 3 wird mit der Seriennummer 5, die eine zweite, zur Verschlüsselung bestimmte Information darstellt, verschlüsselt. Die Seriennummer 5 weist eine definierte Anzahl Zeichen 6 auf und ist in Zeile 13 der Tabelle zeichenweise angeordnet.In Fig. 2 is shown a table to illustrate the encryption. The user name 3, consisting of last name and first name, is arranged character by character in line 11 of the table. The user name 3 is encrypted with the serial number 5, which represents a second information intended for encryption. The serial number 5 has a defined number of characters 6 and is arranged character by character in line 13 of the table.

In einem ersten Schritt der Verschlüsselung werden die Zeichen 4 des Benutzernamens sowie die Zeichen 6 der Seriennummer 5 anhand des ASCII- Zeichensatzes in numerische bzw. ganzzahlige Zahlenwerte 7 und 8 umgewandelt, wie in den Zeilen 12 und 14 der Tabelle dargestellt ist. In einem weiteren Schritt werden die Zahlenwerte 7 des Benutzernamens 3 und die Zahlenwerte 8 der Seriennummer 5 anhand eines exklusiven Oder-Operators XOR zahlenweise bzw. bitweise miteinander verknüpft. Das Ergebnis dieser Verknüpfung ist in Zeile 15 der Tabelle aufgeführt. Anstelle des exklusiven Oder-Operators XOR können andere geeignete Operatoren für Bit-Manipulationen oder binäre arithmetische Operatoren, wie Additions-Operatoren + , auf die Zahlenwerte 7 und 8 angewendet werden. In einem weiteren Schritt wird ein Modulo-Operator %, der zu den binären arithmetischen Operatoren zählt, auf das Ergebnis der obigen Verknüpfung angewendet. Anhand des Modulo-Operators % wird eine Folge von Ziffern 9 erhalten, die in Zeile 16 der Tabelle aufgelistet ist. Die Ziffern 9 umfassen eine definierte Anzahl von unterschiedlichen Ziffernwerten, wobei die Anzahl der unterschiedlichen Ziffernwerte durch die Wahl eines Teilers T des Modulo-Operators % bestimmt wird. Wird dem Teiler T des Modulo-Operators % der Wert "2" zugeordnet, so erhält man zwei unterschiedliche Ziffernwerte "0" und "1", wie in Zeile 16 der Tabelle dargestellt ist. Den Ziffern 9 bzw. den unterschiedlichen Ziffernwerten in Zeile 16 der Tabelle werden in einem weiteren Schritt jeweils eine bestimmte Farbe oder sonstige Kennzeichnung zugeordnet, so daß jede Ziffer 9 eine bestimmte Farbe repräsentiert. Beispielsweise wird den Ziffern 9 mit dem Ziffernwert "0" die Farbe blau zugeordnet, wobei die Farbe blau durch das Symbol o verdeutlicht wird. Den Ziffern 9 mit dem Ziffernwert "1" wird die Farbe rot zugeordnet, wobei die Farbe rot durch das Symbol * gekennzeichnet ist. Die derart farbig markierten Ziffern 9 werden in einem weiteren Schritt den Zeichen 4 des Benutzernamens 3 zugeordnet, wie in Zeile 17 der Tabelle gezeigt ist, so daß die Zeichen 4 eine der zugeordneten Ziffer 9 entsprechende Farbe erhalten.In a first step of the encryption, the characters 4 of the user name and the characters 6 of the serial number 5 are converted into numerical or integer numerical values 7 and 8 using the ASCII character set, as shown in lines 12 and 14 of the table. In a further step, the numerical values 7 of the user name 3 and the numerical values 8 of the serial number 5 are linked together in numbers or bit by bit using an exclusive OR operator XOR. The result of this link is shown in line 15 of the table. Instead of the exclusive OR operator XOR, other suitable operators for bit manipulations or binary arithmetic operators, such as addition operators +, may be applied to the numerals 7 and 8. In a further step, a modulo operator%, which counts among the binary arithmetic operators, is applied to the result of the above link. Based on the% modulo operator, a sequence of digits 9 is listed, which is listed in line 16 of the table. The digits 9 comprise a defined number of different digit values, the number of different digit values being determined by the selection of a divisor T of the modulo operator%. If the divisor T of the modulo operator% is assigned the value "2", then two different digit values "0" and "1" are obtained, as in line 16 of FIG Table is shown. The digits 9 or the different numerical values in line 16 of the table are each assigned a specific color or other marking in a further step, so that each digit 9 represents a particular color. For example, the numbers 9 with the numerical value "0" are assigned the color blue, whereby the color blue is illustrated by the symbol o. The numbers 9 with the digit value "1" are assigned the color red, whereby the color red is indicated by the symbol *. The color-coded digits 9 are assigned to the character 4 of the user name 3 in a further step, as shown in line 17 of the table, so that the characters 4 receive a color corresponding to the assigned digit 9.

Die Wahl des Teilers T des Modulo-Operators % hängt im wesentlichen davon ab, wieviele Farben oder sonstige Kennzeichnungen verwendet werden sollen. Möchte man den Benutzernamen 3 beispielsweise mit 3 unterschiedlichen Farben markieren, so wird der Teiler T auf den Wert "3" gesetzt, wie in Zeile 18 der Tabelle gezeigt ist. Hierduch werden insgesamt drei unterschiedliche Ziffernwerte "0", "1" und "2" erhalten, denen eine bestimmte Farbe zugeordnet wird. Dem neu hinzugekommenen Ziffernwert "2" wird eine weitere Farbe, beispielsweise die Farbe grün zugeordnet, wobei die Farbe grün durch das Symbol Δ gekennzeichnet ist. Die farbig markierten Ziffern 9 werden in einem weiteren Schritt den Zeichen 4 des Benutzernamens 3 zugeordnet, so daß hieraus ein dreifarbig markierter Benutzername 3 resultiert, wie in Zeile 19 der Tabelle verdeutlicht ist.The choice of the divisor T of the modulo operator% depends essentially on how many colors or other markings are to be used. If you want to mark the user name 3, for example, with 3 different colors, the divider T is set to the value "3", as shown in line 18 of the table. Hereby, a total of three different digit values "0", "1" and "2" are obtained, to which a certain color is assigned. The newly added digit value "2" is assigned a further color, for example the color green, wherein the color green is marked by the symbol Δ. The color-coded digits 9 are assigned to the character 4 of the user name 3 in a further step, so that a three-color marked user name 3 results from this, as is illustrated in line 19 of the table.

Ein weiteres Ausführungsbeispiel zur Verschlüsselung des Benutzernamens 3 ist in Fig. 3 anhand einer zweiten Tabelle verdeutlicht. Als zweite, zur Verschlüsselung bestimmte Information ist der Benutzername 3 in abgewandelter Form vorgesehen. Der abgewandelte Benutzername 3a umfaßt Zeichen 4a und ist in Zeile 13a der Tabelle angeordnet. Der abgewandelte Benutzername 3a wird dadurch erhalten, indem der in Zeile 11a angeordnete Benutzername 3 beispielsweise um eine Zeichenposition nach rechts verschoben wird und das am rechten Zeilenende befindliche Zeichen "k" an den Zeilenanfang gesetzt wird. Alternativ kann der Benutzername 3 um mehrere Zeichenpositionen verschoben oder auf sonstige Weise verändert werden, so daß eine abgewandelte Form des Benutzernamens 3 erhalten wird. Analog zu dem vorhergehenden Beispiel gemäß Fig. 2 werden die Zeichen 4 des Benutzernamens 3 und die Zeichen 4a des abgewandelten Benutzernamens 3a anhand des ASCII-Zeichensatzes in numerische bzw. ganzzahlige Zahlenwerte 7 und 7a umgewandelt, die in den Zeilen 12a und 14a dargestellt sind. Auf die Zahlenwerte 7 und 7a wird der exklusive Oder-Operator XOR angewendet und das in Zeile 15a gezeigte Ergebnis der Verknüpfung erhalten. Anschließend wird der Modulo-Operator % mit dem Teiler T gleich "2" (siehe Zeile 16a) oder alternativ der Modulo-Operator % mit dem Teiler T gleich "3" (siehe Zeile 18a) auf das in Zeile 15a aufgeführte Ergebnis angewendet, um eine Folge von Ziffern 9 zu erhalten. Die Ziffern 9 weisen, wie oben bereits erwähnt, je nach Wahl bzw. Wert des Teilers T eine definierte Anzahl von unterschiedlichen Ziffernwerten auf. Die Zuordnung von definierten bzw. unterschiedlichen Farben erfolgt analog zu dem oben beschriebenen Beispiel gemäß Fig. 2. Man kann deutlich erkennen, daß durch die Verwendung lediglich einer unterschiedlichen zweiten Information, nämlich durch die Verwendung des abgewandelten Benutzernamens 3a anstelle der Seriennummer 5, eine völlig unterschiedliche Markierung des Benutzernamens 3 resultiert, wie in Zeile 17a bzw. 19a der Tabelle dargestellt.Another embodiment for encrypting the user name 3 is in Fig. 3 based on a second table clarified. As a second information intended for encryption, the user name 3 is provided in a modified form. The modified user name 3a comprises characters 4a and is arranged in row 13a of the table. The modified user name 3a is obtained by shifting the user name 3 arranged in line 11a, for example, by one character position to the right, and placing the character "k" at the right-hand end of the line at the beginning of the line. Alternatively, the username 3 may be shifted by several character positions or otherwise changed so that a modified form of the user name 3 is obtained. Analogous to the previous example according to Fig. 2 For example, the characters 4 of the user name 3 and the characters 4a of the modified user name 3a are converted into numerical and integer numerical values 7 and 7a, respectively, as shown in lines 12a and 14a, using the ASCII character set. The exclusive OR operator XOR is applied to the numerical values 7 and 7a and the result of the link shown in line 15a is obtained. Subsequently, the modulo operator% is applied to the divisor T equal to "2" (see line 16a) or alternatively the modulo operator% to the divider T equal to "3" (see line 18a) to the result listed in line 15a to get a sequence of numbers 9. The numbers 9 have, as already mentioned above, depending on the choice or value of the divider T a defined number of different numerical values. The assignment of defined or different colors is carried out analogously to the example described above Fig. 2 , It can be clearly seen that by using only a different second information, namely by using the modified user name 3a instead of the serial number 5, a completely different mark of the Username 3 results as shown in line 17a or 19a of the table.

Anstelle des exklusiven Oder-Operators XOR kann beispielsweise der Additions-Operator + oder dergleichen Operatoren auf die Zahlenwerte 7 des Benutzernamens 3 und auf die Zahlenwerte 8 bzw. 7a der Seriennummer 5 bzw. des abgewandelten Benutzernamens 3a angewendet werden. Um eine komplexere Verschlüsselung zu erzielen, können auch mehrere Operatoren auf die obigen Zahlenwerte 7, 8 und 7a angewendet werden.Instead of the exclusive OR operator XOR, for example, the addition operator + or similar operators can be applied to the numerical values 7 of the user name 3 and to the numerical values 8 or 7a of the serial number 5 or the modified user name 3a. To achieve a more complex encryption, several operators can be applied to the above numerals 7, 8 and 7a.

Erfindungsgemäß kann jede auf dem Datenträger 1 vorgesehene visuell sichtbare, individuelle bzw. erste Information auf der Basis des oben beschriebenen Algorithmus markiert werden. Es ist nicht erforderlich, daß stets der Benutzername 3 oder eine sonstige zu markierende erste Information mit der Seriennummer 5, dem abgewandelten Benutzernamen 3a oder einer sonstigen zweiten Information verknüpft wird. Beispielsweise kann die Seriennummer 5 mit dem abgewandelten Benutzernamen 3a verknüpft werden, um eine Folge von Ziffern 9 zu erhalten. Wesentlich ist, daß als Ergebnis der Verschlüsselung den Zeichen 4 des Benutzernamens 3 eine definierte Farbe oder eine andere zur Unterscheidung der Zeichen 4 geeignete Kennzeichnung zugeordnet wird, wie in den Zeilen 17 und 19 der Tabelle von Fig. 2 und in den Zeilen 17a und 19a der Tabelle gemäß Fig. 3 gezeigt ist.
Gemäß einer weiteren Ausführungsform ist die Seriennummer 5, der abgewandelte Benutzername 3a oder dergleichen zweite Information in dem integrierten Schaltkreis 2 des Datenträgers 1 enthalten. Alternativ können diese Informationen auf einem Magnetstreifen (nicht gezeigt) des Datenträgers 1 hinterlegt sein. Eine weitere Möglichkeit zur Erhöhung des Schutzes gegen Fälschungen und Manipulationen besteht darin, daß beispielsweise die Seriennummer 5 und/oder der abgewandelte Benutzername 3a gemäß einer weiteren Ausführungsform außerhalb des Bereichs des Datenträgers 1 vorgesehen sind und vorzugweise in einem externen Speicher 23 (vgl. Fig. 4) gespeichert sind. Als externer Speicher 23 dient eine gegen unautorisierte Zugriffe gesicherte zentrale Datenbank. Bei einer derart gesicherten Speicherung kann beispielsweise eine für alle Datenträger 1 einheitliche zweite Information zur Verschlüsselung des jeweiligen Benutzernamens 3 oder dergleichen ersten Information vorgesehen sein.
According to the invention, each visually visible, individual or first information provided on the data carrier 1 can be marked on the basis of the algorithm described above. It is not necessary that always the user name 3 or any other first information to be marked with the serial number 5, the modified user name 3a or any other second information is linked. For example, the serial number 5 may be linked to the modified user name 3a to obtain a sequence of numbers 9. It is essential that, as a result of the encryption, the characters 4 of the user name 3 are assigned a defined color or other marking suitable for distinguishing the characters 4, as in lines 17 and 19 of the table of FIG Fig. 2 and in lines 17a and 19a of the table according to Fig. 3 is shown.
According to another embodiment, the serial number 5, the modified user name 3a or the like second information in the integrated circuit 2 of the data carrier 1 included. Alternatively, this information can be stored on a magnetic strip (not shown) of the data carrier 1. Another way to increase protection against Counterfeiting and manipulation is that, for example, the serial number 5 and / or the modified user name 3a are provided according to a further embodiment outside the range of the data carrier 1 and preferably in an external memory 23 (see. Fig. 4 ) are stored. As external memory 23 is a secured against unauthorized access central database. With such a secure storage, for example, a second information unit that is identical for all data carriers 1 can be provided for encrypting the respective user name 3 or the like first information.

Der Datenträger 1 weist neben den personen- und kartenindividuellen Bezeichnungen und Beschriftungen ein Benutzerportät 10 oder eine sonstige bildhafte Darstellung auf. Gemäß einer weiteren vorteilhaften Ausführungsform ist beispielsweise die Seriennummer 5 und/oder der abgewandelte Benutzername 3a in dem Benutzerporträt 10 hinterlegt (nicht gezeigt). Die Seriennummer 5 und/oder der abgewandelte Benutzername 3a können verschlüsselt, beispielsweise als Barcode vorliegen, wobei eine derartige Hinterlegung bzw. Speicherung von Informationen vorzugsweise mit einem steganographischen Verfahren durchgeführt wird.The data carrier 1, in addition to the person and card-specific names and labels on a user port 10 or other pictorial representation. According to a further advantageous embodiment, for example, the serial number 5 and / or the modified user name 3a is stored in the user portrait 10 (not shown). The serial number 5 and / or the modified user name 3a can be encrypted, for example present as a barcode, such a deposit or storage of information preferably being carried out with a steganographic method.

Zusätzlich oder alternativ kann die Seriennummer 5 und/oder der abgewandelte Benutzername 3a versteckt im Benutzerporträt 10 hinterlegt sein. Die versteckte Anordnung der Seriennummer 5 und/oder des abgewandelten Benutzernamens 3a erfolgt in Form eines sekundären Bildes, beispielsweise in Form des oben erwähnten Barcodes, wobei das sekundäre Bild in dem Benutzerporträt 10, das ein Primärbild darstellt, derart verborgen ist, daß es lediglich mittels eines Dekoders oder dergleichen Hilfsmittel erkennbar wird.Additionally or alternatively, the serial number 5 and / or the modified user name 3a can be hidden in the user portrait 10. The hidden arrangement of the serial number 5 and / or the modified user name 3a takes place in the form of a secondary image, for example in the form of the barcode mentioned above, the secondary image in the user portrait 10, which represents a primary image, in such a way is hidden, that it is recognizable only by means of a decoder or the like aids.

In Fig. 4 ist eine Anordung zur Überprüfung des Datenträgers 1 schematisch dargestellt.In Fig. 4 an arrangement for checking the data carrier 1 is shown schematically.

Zur Überprüfung des Datenträgers 1 wird der markiert vorliegende Benutzername 3 oder eine andere markierte erste Information sowie die zur Verschlüsselung bestimmte Seriennummer 5 oder eine sonstige zur Verschlüsselung bestimmte zweite Information von einer Kamera 20 oder einem optischen Scanner erfaßt und digitalisiert. In einem nachgeschalteten Mikroprozessor 21 werden die aufgenommenen Bilddaten des Benutzernamens 3 und der Seriennummer 5 ausgewertet und mittels optischer Zeichenerkennung (OCR) zu rechnerverarbeitbaren Zeichen 4 und 6 umgewandelt. Die rechnerverarbeitbaren Zeichen 4 und 6 des Benutzernamens 3 und der Seriennummer 5 werden einer Verifikationseinheit 22 zugeführt. In dieser Verifikationseinheit 22 wird der oben beschriebene Algorithmus auf die Zeichen 4 des Benutzernamens 3 und auf die Zeichen 6 der Seriennummer 5 angewendet und die Markierung des Benutzernamens 3 erneut ermittelt. Ist die ermittelte Markierung des Benutzernamens 3 identisch mit der auf dem Datenträger hinterlegten Markierung des Benutzernamens 3, gilt der Datenträger 1 als echt.For checking the data carrier 1, the marked user name 3 or another marked first information as well as the serial number 5 intended for encryption or another second information intended for encryption are detected and digitized by a camera 20 or an optical scanner. In a downstream microprocessor 21, the recorded image data of the user name 3 and the serial number 5 are evaluated and converted by means of optical character recognition (OCR) to computer-editable characters 4 and 6. The computer-operable characters 4 and 6 of the user name 3 and the serial number 5 are supplied to a verification unit 22. In this verification unit 22, the algorithm described above is applied to the characters 4 of the user name 3 and the characters 6 of the serial number 5, and the mark of the user name 3 is determined again. If the ascertained marking of the user name 3 is identical to the marking of the user name 3 deposited on the data carrier, the data carrier 1 is considered genuine.

Sofern der Benutzername 3, die Seriennummer 5 oder sonstige zur Verschlüsselung bestimmten ersten und/oder zweiten Informationen in dem integrierten Schaltkreis 2 oder Magnetstreifen gespeichert sind, werden diese Informationen über einen Kartenleser 24 ausgelesen und der Verifikationseinheit 22 zugeleitet. Sind diese Informationen außerhalb des Bereichs des Datenträgers 1 in einem externen Speicher 23 gespeichert, können sie aus dem externen Speicher 23 abgerufen und der Verifikationseinheit 22 zugeführt werden.If the user name 3, the serial number 5 or other first and / or second information intended for encryption are stored in the integrated circuit 2 or magnetic strip, this information is read out via a card reader 24 and forwarded to the verification unit 22. Is this information stored outside the area of the data carrier 1 in an external memory 23, they can be retrieved from the external memory 23 and the verification unit 22 are supplied.

Gemäß einer weiteren Ausführungsform sind der Benutzername 3, die Seriennummer 5 oder sonstige zur Verschlüsselung vorgesehene Informationen sowie der Algorithmus in dem integrierten Schaltkreis 2 gespeichert, wobei der integrierte Schaltkreis 2 zweckmäßigerweise einen Mikroprozessorchip umfaßt. Die Überprüfung des Datenträgers 1 kann bei dieser Ausführungsform unmittelbar mittels des Mikroprozessorchips erfolgen.According to a further embodiment, the user name 3, the serial number 5 or other information intended for encryption as well as the algorithm are stored in the integrated circuit 2, wherein the integrated circuit 2 expediently comprises a microprocessor chip. The verification of the data carrier 1 can be done directly by means of the microprocessor chip in this embodiment.

Insgesamt zeichnet sich das erfindungsgemäße Verfahren sowie der erfindungsgemäße Datenträger durch einen effizienten Schutz gegen Fälschungen und Manipulationen sowie durch eine kostengünstige Herstellung aus. Die oben beschriebene Verschlüsselung kann aufgrund der Vielzahl der zur Verfügung stehenden Operatoren beliebig komplex gestaltet werden. Darüberhinaus kann anhand der Verschlüsselung eine definierte Markierung von einer oder mehreren Informationen auf dem Datenträger bewirkt werden, deren Kodierung nur autorisierten Personen zugänglich ist.Overall, the inventive method and the data carrier according to the invention is characterized by an efficient protection against counterfeiting and manipulation and by a cost-effective production. The encryption described above can be made arbitrarily complex due to the large number of available operators. Moreover, based on the encryption, a defined marking of one or more information on the data carrier can be effected, the coding of which is only accessible to authorized persons.

Bezugszeichenliste:LIST OF REFERENCE NUMBERS

11
Datenträgerdisk
22
integrierter Schaltkreisintegrated circuit
33
BenutzernameUser name
3a3a
abgewandelter Benutzernamemodified username
44
Zeichen (Benutzername)Character (username)
4a4a
Zeichen (abgewandelter Benutzername)Characters (modified username)
55
Seriennummerserial number
66
Zeichen (Seriennummer)Characters (serial number)
77
Zahlenwert (Benutzername)Numerical value (user name)
7a7a
Zahlenwert (abgewandelter Benutzername)Numerical value (modified username)
88th
Zahlenwert (Seriennummer)Numerical value (serial number)
99
Zifferndigits
1010
Benutzerporträtuser Portrait
11 - 1911 - 19
Tabellenzeilentable rows
11a-19a11a-19a
Tabellenzeilentable rows
2020
Kameracamera
2121
Mikroprozessormicroprocessor
2222
Verifikationseinheitverification unit
2323
SpeicherStorage
2424
Kartenlesercard reader
XORXOR
exklusive Oder-Operatorexclusive or operator
%%
Modulo-OperatorModulo operator
++
Additions-OperatorAddition operator
TT
Teilerdivider
**
rote FarbeRed color
blaue Farbeblue colour
ΔΔ
grüne Farbegreen colour

Claims (12)

  1. Method for producing a data carrier, like an ID card, a credit card or the like worth- or security document, comprising at least one first information (3) that is visually visible readable provided on the data carrier and is suitable to individualize the data carrier from a series of data carriers, wherein the first information (3) is encrypted with an algorithm and the result of the encryption is deposited on the data carrier, wherein the first information (3) comprises a defined number of characters (4a, 6), and wherein the result of the encryption is deposited on the data carrier as such that at least one character (4) of the first information (3) is marked, wherein at least a second information (3a, 5) is provided that is designated for the encryption of the first information (3), and wherein the at least one second information (3a, 5) for the encryption comprises machine readable resp. computer-processable characters (4a, 6) or is converted into machine readable resp. computer-processable characters, and wherein the underlying algorithm of the encryption comprises the following steps:
    a) converting the characters (4) of the first information (3) and/or the characters (4a, 6) of the second information (3a, 5) in numerical values resp. integers (7; 7a, 8), for example on the basis of the ASCII character set, and
    b) applying at least one operator on the numerical values (7) of the first information (3) as such that a series of numerals (9) is resulting from it, and
    c) marking of the numerals (9) as such that the numerals (9) of each specific colour are assigned as identification, and
    d) assigning of the identification comprising numerals (9) to the characters of the first information (3), such that the characters (4) of the first information (3) receive a respective colour of the associated numeral (9), such that a visually visible identification of the characters (4) in the form of a differently coloured design of the characters (4) is resulting.
  2. Method according to claim 1, characterised in that the at least one operator is selected from a group of operators, wherein the group of operators preferably comprises operators for bit manipulations, such as exclusive or-operators (XOR), and binary arithmetic operators, such as addition operators (+), modulo operators (%) or the like operators.
  3. Method according to claim 1 or 2, characterised in that the received series of numerals (9) comprises a defined number of different numerical values, wherein the number of different numerical values is given by the choice of a divider of the binary modulo operator (5).
  4. Method for producing a data carrier, like an ID card, a credit card or the like worth- or security document, comprising at least one first information (3) that is visually visible readable provided on the data carrier and is suitable to individualize the data carrier from a series of data carriers, wherein the first information (3) is encrypted with an algorithm and the result of the encryption is deposited on the data carrier, wherein the first information (3) comprises a defined number of characters (4a, 6), and wherein the result of the encryption is deposited on the data carrier as such that at least one character (4) of the first information (3) is marked, wherein at least a second information (3a, 5) is provided that is designated for the encryption of the first information (3), and wherein the at least one second information (3a, 5) for the encryption comprises machine readable resp. computer-processable characters (4a, 6) or is converted into machine readable resp. computer-processable characters, and wherein the underlying algorithm of the encryption comprises the following steps:
    a) converting the characters (4) of the first information (3) and/or the characters (4a, 6) of the second information (3a, 5) in numerical values resp. integers (7; 7a, 8), for example on the basis of the ASCII character set, and
    b) applying at least one operator on the numerical values (7) of the first information (3) as such that a series of numerals (9) is resulting from it, and
    c) marking of the numerals (9) as such that the numerals (9) are assigned to a specific typographical identification, and
    d) assigning of the identification comprising numerals (9) to the characters of the first information (3), such that the characters (4) of the first information (3) in accordance to the assigned numeral (9) are applied on the data carrier as identification in normal, italic or bold writing, such that a visually visible identification of the characters (4) is realised in the form of a different typographic design of the characters (4).
  5. Method according to claim 4, characterised in that the at least one operator is selected from a group of operators, wherein the group of operators preferably comprises operators for bit manipulations, such as exclusive or-operators (XOR), and binary arithmetic operators, such as addition operators (+), modulo operators (%) or the like operators.
  6. Method according to claim 4 or 5, characterised in that the received series of numerals (9) comprises a defined number of different numerical values, wherein the number of different numerical values is given by the choice of a divider of the binary modulo operator (5).
  7. Data carrier, like ID card, credit card or the like worth- or security document, produced according to a method according to one of claims 4 to 6, with at least one first information (3) that is visually visible, readable provided on the data carrier and is suitable to individualize the data carrier from a series of data carriers, wherein the first information (3) is encrypted with an algorithm and the result of the encryption is deposited on the data carrier, wherein the first information (3) comprises a defined number of characters (4), characterized in that the result of the encryption is deposited on the data carrier as such that the characters (4) of the first information (3) are marked as such that each character (4) alternately is applied on the data carrier in normal, italic or bold writing, wherein a second information (3a, 5) that serves for the encryption of the first information (3) is provided on the data carrier.
  8. Data carrier, like ID card, credit card or the like worth- or security document, produced according to a method according to one of claims 1 to 3, with at least one first information (3) that is visually visible, readable provided on the data carrier and is suitable to individualize the data carrier from a series of data carriers, wherein the first information (3) is encrypted with an algorithm and the result of the encryption is deposited on the data carrier, wherein the first information (3) comprises a defined number of characters (4), characterized in that the result of the encryption is deposited on the data carrier as such that the characters (4) of the first information (3) are marked as such that each character comprises a specific colour, wherein a second information (3a, 5) is provided on the data carrier that serves for the encryption of the first information (3).
  9. Data carrier according to one of claims 7 or 8, characterized in that the first information (3) comprises personal, card or document specific designations resp. inscriptions, such as a user name (3), a serial number (5) or the like individual information that are provided on the data carrier.
  10. Data carrier according to one of claims 7 to 9, characterized in that the second information (3a, 5) comprises personal, card or document specific designations resp. inscriptions, such as a user name (3), a serial number (5) or the like individual information that are especially provided on the data carrier.
  11. Data carrier according to one of claims 7 to 10, characterized in that the second information (3a, 5) is enclosed in a storage or additional element, such as an integrated circuitry (2), a magnet strip or the like that is provided on the data carrier, and/or is provided outside of the area of the data carrier, wherein the second information (3a, 5) is stored preferably in an external storage (23), for example in a central data base or the like memory device.
  12. Data carrier according to one of claims 7 to 10, characterized in that the second information (3a, 5) are enclosed in a pictorial representation (10) that is provided on the data carrier, wherein the second information (3a, 5) is preferably deposited encrypted and/or hidden in the pictorial representation (10).
EP01997787.5A 2000-11-25 2001-11-07 Method for producing a data carrier and data carrier Expired - Lifetime EP1380017B1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10058638 2000-11-25
DE10058638A DE10058638A1 (en) 2000-11-25 2000-11-25 Method for producing a data carrier and a data carrier
PCT/DE2001/004146 WO2002043012A2 (en) 2000-11-25 2001-11-07 Method for producing a data carrier and data carrier

Publications (2)

Publication Number Publication Date
EP1380017A2 EP1380017A2 (en) 2004-01-14
EP1380017B1 true EP1380017B1 (en) 2014-01-01

Family

ID=7664694

Family Applications (1)

Application Number Title Priority Date Filing Date
EP01997787.5A Expired - Lifetime EP1380017B1 (en) 2000-11-25 2001-11-07 Method for producing a data carrier and data carrier

Country Status (5)

Country Link
EP (1) EP1380017B1 (en)
AU (1) AU2002221547A1 (en)
DE (1) DE10058638A1 (en)
ES (1) ES2447990T3 (en)
WO (1) WO2002043012A2 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1695121B1 (en) * 2003-11-21 2014-06-04 Visual Physics, LLC Micro-optic security and image presentation system
US8867134B2 (en) 2003-11-21 2014-10-21 Visual Physics, Llc Optical system demonstrating improved resistance to optically degrading external effects
MX2008009109A (en) * 2006-01-16 2008-12-16 Securency Int Pty Ltd Security documents with personalised images and methods of manufacture.
FR2906289B1 (en) * 2006-09-21 2008-12-12 Cogelec Soc Par Actions Simpli KEY AND KEY SET, CONFIGURATION CENTER AND MANUFACTURING UNIT FOR THESE KEYS
JP6042347B2 (en) 2011-01-28 2016-12-14 クレーン アンド カンパニー インコーポレイテッド Laser marked device
KR101948363B1 (en) 2011-08-19 2019-04-22 비쥬얼 피직스 엘엘씨 Optionally transferable optical system with a reduced thickness
KR102014576B1 (en) 2012-08-17 2019-08-26 비쥬얼 피직스 엘엘씨 A process for transferring microstructures to a final substrate
ES2728508T3 (en) 2013-03-15 2019-10-25 Visual Physics Llc Optical safety device
US9873281B2 (en) 2013-06-13 2018-01-23 Visual Physics, Llc Single layer image projection film
DE102013218754B4 (en) * 2013-09-18 2019-05-09 Bundesdruckerei Gmbh Tamper-proofed value or security product and method for verifying the authenticity of the tamper-resistant security or value-added product
CN106414102B (en) 2014-03-27 2019-11-19 光学物理有限责任公司 Generate the optical device of the optical effect of similar flashing
US10766292B2 (en) 2014-03-27 2020-09-08 Crane & Co., Inc. Optical device that provides flicker-like optical effects
CN108583058B (en) 2014-07-17 2020-11-10 光学物理有限责任公司 Improved polymer sheet for making polymeric security documents
AU2015317844B2 (en) 2014-09-16 2019-07-18 Crane Security Technologies, Inc. Secure lens layer
JP6947358B2 (en) 2015-02-11 2021-10-13 クレイン アンド カンパニー、 インコーポレイテッド How to attach the surface of the security device to the board
MX2019009459A (en) 2017-02-10 2019-12-16 Crane & Co Inc Machine-readable optical security device.

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4641347A (en) * 1983-07-18 1987-02-03 Pitney Bowes Inc. System for printing encrypted messages with a character generator and bar-code representation
DE19706008A1 (en) * 1997-02-10 1998-08-13 Bundesdruckerei Gmbh Anti-forgery security enhancing process

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4995081A (en) * 1988-03-21 1991-02-19 Leighton Frank T Method and system for personal identification using proofs of legitimacy
US5337361C1 (en) * 1990-01-05 2001-05-15 Symbol Technologies Inc Record with encoded data
US5313564A (en) * 1990-07-11 1994-05-17 Fontech Ltd. Graphic matter and process and apparatus for producing, transmitting and reading the same
GB2289965B (en) * 1993-02-19 1997-01-22 Ca Minister Communications Secure personal identification instrument and method for creating same
US5668874A (en) * 1995-02-28 1997-09-16 Lucent Technologies Inc. Identification card verification system and method
JPH08315305A (en) * 1995-04-07 1996-11-29 Eastman Kodak Co Improvement of image recording itself or related to image recording
JPH09198474A (en) * 1996-01-18 1997-07-31 Kichinosuke Nagashio Graphic code card
US6110044A (en) * 1997-07-15 2000-08-29 Stern; Richard H. Method and apparatus for issuing and automatically validating gaming machine payout tickets

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4641347A (en) * 1983-07-18 1987-02-03 Pitney Bowes Inc. System for printing encrypted messages with a character generator and bar-code representation
DE19706008A1 (en) * 1997-02-10 1998-08-13 Bundesdruckerei Gmbh Anti-forgery security enhancing process

Also Published As

Publication number Publication date
EP1380017A2 (en) 2004-01-14
WO2002043012A2 (en) 2002-05-30
AU2002221547A1 (en) 2002-06-03
WO2002043012A3 (en) 2003-11-13
ES2447990T3 (en) 2014-03-13
DE10058638A1 (en) 2002-06-13

Similar Documents

Publication Publication Date Title
EP1380017B1 (en) Method for producing a data carrier and data carrier
DE3048735C2 (en) Identity card with information applied by a laser writer and method for producing the same
DE2943436A1 (en) Security coding system for documents - has cover coding printed on document and optically scanned for comparison with normal text
WO1981000776A1 (en) Process for data protection
DE2826469C2 (en) Procedure and device for securing documents
CH648678A5 (en) METHOD FOR SECURELY LABELING AND EVALUATION OF MACHINE-READABLE DATA CARRIERS AND DEVICES FOR IMPLEMENTING THIS METHOD.
WO2017137153A1 (en) Verification of an article provided with a security element
DE10204870A1 (en) Method for preventing counterfeiting of a valuable medium, e.g. banknote, passport, or chip card, whereby a random pattern is applied to the surface of the medium and parameters of the pattern then displayed in an attached code
EP0854451B1 (en) Security document
EP1771813B1 (en) Method for encoding data via matrix print data storage
EP0906834B1 (en) Numbered information carrier and it's method of production
DE602005000658T2 (en) authentication marks
WO2002095661A1 (en) Method for characterising products in order to determine the authenticity thereof
DE102017110892A1 (en) Method for authenticating an item, in particular a security item, and security item
EP1067482B1 (en) Printed image
DE69913136T2 (en) IDENTIFICATION DOCUMENT WITH PRINTING ON A REDUCED SCALE
DE102016001464A1 (en) Verification of an item provided with a security element
DE2452202A1 (en) Traveller's cheque verification system - uses reference signature visible in ultra-violet light
WO2022184940A1 (en) Plastic carrier for information that is physically present
DE69217018T2 (en) Methods for encrypting and decrypting information
EP0829826B1 (en) Device for making valuable documents
EP0432617B1 (en) Identity card with two records
DE2933764C2 (en) Method and device for encrypting or decrypting and securing data
EP2681056B1 (en) Security element having a perforation raster, coded information and its method of manufacture
EP1140521B2 (en) Activable document and system for aktivable documents

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20021031

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Extension state: AL LT LV MK RO SI

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ORGA SYSTEMS GMBH

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: U-NICA TECHNOLOGY AG

17Q First examination report despatched

Effective date: 20100727

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 50116373

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G07D0007000000

Ipc: B42D0015100000

RIC1 Information provided on ipc code assigned before grant

Ipc: B42D 15/10 20060101AFI20130514BHEP

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20130628

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 50116373

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: B42D0015100000

Ipc: B42D0025300000

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: ISLER AND PEDRAZZINI AG, CH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 647432

Country of ref document: AT

Kind code of ref document: T

Effective date: 20140215

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 50116373

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: B42D0015100000

Ipc: B42D0025300000

Effective date: 20140113

Ref country code: DE

Ref legal event code: R079

Ref document number: 50116373

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G07D0007000000

Ipc: B42D0015100000

Effective date: 20130514

Ref country code: DE

Ref legal event code: R096

Ref document number: 50116373

Country of ref document: DE

Effective date: 20140220

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2447990

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20140313

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: NL

Ref legal event code: T3

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140101

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140502

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 50116373

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140101

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20141002

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 50116373

Country of ref document: DE

Effective date: 20141002

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140101

Ref country code: LU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141107

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 50116373

Country of ref document: DE

Representative=s name: HOEGER, STELLRECHT & PARTNER PATENTANWAELTE MB, DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 15

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140402

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20140101

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 16

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 17

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20171120

Year of fee payment: 17

Ref country code: FI

Payment date: 20171121

Year of fee payment: 17

Ref country code: FR

Payment date: 20171121

Year of fee payment: 17

Ref country code: DE

Payment date: 20171121

Year of fee payment: 17

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20171113

Year of fee payment: 17

Ref country code: AT

Payment date: 20171121

Year of fee payment: 17

Ref country code: GB

Payment date: 20171123

Year of fee payment: 17

Ref country code: IE

Payment date: 20171121

Year of fee payment: 17

Ref country code: SE

Payment date: 20171120

Year of fee payment: 17

Ref country code: IT

Payment date: 20171122

Year of fee payment: 17

Ref country code: BE

Payment date: 20171120

Year of fee payment: 17

Ref country code: ES

Payment date: 20171220

Year of fee payment: 17

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 50116373

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: SE

Ref legal event code: EUG

REG Reference to a national code

Ref country code: NL

Ref legal event code: MM

Effective date: 20181201

REG Reference to a national code

Ref country code: AT

Ref legal event code: MM01

Ref document number: 647432

Country of ref document: AT

Kind code of ref document: T

Effective date: 20181107

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20181107

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181107

Ref country code: SE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181108

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20181130

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181130

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181130

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181201

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181107

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181130

Ref country code: AT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181107

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181107

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190601

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181107

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20200102

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181108