EP2001688A1 - Verfahren zur erstellung und überprüfung eines sicheren klartextdruckes, sowie vorrichtung und informationsträger hierfür - Google Patents
Verfahren zur erstellung und überprüfung eines sicheren klartextdruckes, sowie vorrichtung und informationsträger hierfürInfo
- Publication number
- EP2001688A1 EP2001688A1 EP07718368A EP07718368A EP2001688A1 EP 2001688 A1 EP2001688 A1 EP 2001688A1 EP 07718368 A EP07718368 A EP 07718368A EP 07718368 A EP07718368 A EP 07718368A EP 2001688 A1 EP2001688 A1 EP 2001688A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- medium
- information
- printing
- representation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M3/00—Printing processes to produce particular kinds of printed work, e.g. patterns
- B41M3/14—Security printing
-
- B42D2033/24—
-
- B42D2033/32—
-
- B42D2035/16—
Definitions
- the invention relates to a method for creating or checking a security print, which is represented by a print data-containing at least partially visible representation on or in a print medium, which comprises a base material and a unique medium information, wherein the medium information by in a Zu- if the production process involves the production of properties and / or structures of at least the base material, a device for processing a representation of a security print on an information carrier with a security print, wherein the information carrier comprises a print medium with a base material and a production-related, by a random process resulting medium information , and an information carrier for a security printing comprising a printing medium comprising a base material and at least one medium information.
- WO 2003/077197 A1 discloses a card with a thermally writable surface and a magnetic or electronic data memory. In order to achieve a certain degree of protection against counterfeiting, parts of the information contained on the thermally writable surface are also stored in the magnetic or electronic data memory. To make a counterfeit it would be necessary, in addition to the pressure to change the contents of the data storage, for example by a commercially available chip card reader.
- the object of the invention is to produce a security print on an information carrier which increases the forgery-proofness of the information carrier and the representation thereon or to check the security print on the information carrier.
- This object of the invention is achieved in each case independently in that the representation to be printed is generated by linking and encoding the print data and the production-related medium information and in that the representation of the security print is detected on the print medium and extracts media data from the security print and these are compared with the production-related medium information of the print medium for conformity.
- the representation to be printed by a link and encryption of the print data and the production-related medium information is generated or in that the representation of the security print on the print medium is detected and extracted from the security print media data and this with the production-related medium information of the print medium can be compared to match a security print manufactured or checked, the representation of information about the print medium - ie medium information - includes.
- a representation unique to a particular information carrier can be produced.
- a unique information carrier can be provided, wherein due to the representation on the information carrier, the originality of the information carrier is fixed or can be determined.
- the representation valid from a first information carrier to a second - another medium information having - information carrier is copied.
- the validity of the information carrier or the representation can be determined.
- An advantage of using a production-related medium information is that it can not be changed or only by a destruction of the information carrier.
- the object of the invention is also achieved independently in that a processing device for displaying a security printing is connected to a printing mechanism and the processing device is connected directly or indirectly to a detection device for determining the medium information.
- a processing device for displaying a security printing with a printing mechanism is connected and the processing device is directly or indirectly connected to a detection device for determining the medium information, it is possible to use the unique for an information carrier medium information of read the detection device and processed by the processing device.
- the processing device can make it possible to identify the information carrier during the processing of the medium information or to link the medium information with other data.
- the object of the invention is also achieved by the fact that the medium information is formed by a generated during the production of the print medium by a random process property and / or structure of the print medium and the print medium is designed for thermal input or application of visible representations.
- the information carrier for a security printing namely that the medium information is formed by a property and / or structure of the printing medium created during the production of the printing medium by a random process and the printing medium is designed for the thermal input or application of visible representations
- the medium information characterizes a single thermally writable information carrier and allows the representation of a thermally applied or introduced security printing.
- a manufacturability of security printing on the information carrier by commercially available inkjet or laser printers or copiers is severely limited.
- the advantage is that the information carrier on the one hand includes security features in the print medium, so that all information carriers are distinguishable from each other, and on the other hand only with a printing mechanism for thermal input or application of information can be printed.
- the combination of these features allows increased security against counterfeiting.
- a development in which the representation to be printed in the form of machine-readable information, in particular as a barcode, Worldcode, Pearlstrings and / or text characters, on and / or in the print medium is brought.
- the representation can be read by an automatic detection device, the information can be further processed by machine.
- the representation in the form of information recognizable by humans is brought onto and / or into the print medium.
- the information can be read and checked even in the event of a failure of mechanical aids.
- the print data is encrypted prior to linking to the media information.
- safety-relevant information in the print data can be protected against unauthorized persons.
- the - medium-readable by the print medium - medium information can not contribute to decrypt the print data, since the encryption of the print data is performed independently of the medium information. Thus, the security against unauthorized reading of the print data is increased.
- Another advantageous embodiment provides that the medium information is encrypted before linking to the print data.
- the medium information is encrypted before linking to the print data.
- Another advantage is achieved when encrypting in a processing device for displaying a security print. As a result, an external encryption device can be saved.
- An advantageous development is given by the fact that the production-related medium information from a dependent on the location of the representation on the print medium portion of the print medium, in particular only the portion of the surface on which the print representation or is introduced, used for linking with the print data becomes. This can prevent the representation or parts of the representation from being copied to other locations on the same print medium.
- the display is opened and / or inserted onto a paper-like or film-like printing medium. It is advantageous that the printing medium has a flexible design and the costs for a paper or film-type printing medium are normally lower.
- a card-shaped printing medium in particular on a magnetic and / or smart card, up and / or introduced.
- a card-shaped printing medium has the advantage that it is robust and can contain additional data carriers.
- a magnet or chipcard can be used to electronically store the information shown in the illustration.
- a refinement proves to be advantageous in which the representation is introduced into a printing medium which is provided on at least one side with a thermosensitive layer or at least partially consists of a thermosensitive material or in which the printing mechanism for introducing information onto and / or is formed in a thermosensitive material. It is advantageous that no additional material, such as ink or other dyes, must be applied to the printing medium or stored in the printing mechanism. The printing mechanism must therefore be serviced less often.
- the representation is introduced into a thermally repeatedly written and erasable pressure medium.
- the advantage can be achieved to change the appearance on a print medium more often or to use the print medium for different purposes several times.
- the representation is created by a device for the thermal introduction of information onto a print medium.
- This can on the one hand thermally writable materials are provided with a security printing and on the other hand, this can be a representation created on a print medium, which has security features that are thermally influenced has.
- the representation captured by a detection device it is also possible for the representation captured by a detection device to be decrypted or the medium information to be encrypted before comparing the medium data extracted from the security print and the medium information. As a result, preparation for comparing medium data and medium information can be easily achieved.
- Another advantage is achieved when a truth value is generated when comparing or decrypting. This makes it possible to decide whether the representation or the print medium on which the representation is located is valid and this information, for example a software program, is passed on. By generating a truth value during decryption, a truth value can be generated without the medium information having to be read out, and it can contribute to a more rapid determination of the validity of the information carrier.
- a refinement is advantageous in which a structure and / or property of the printing medium formed by luminescent, in particular fluorescent and / or phosphorescent, or radioactive materials is detected or is an advantageous development of one Information carrier given by the fact that the base material and / or another material is formed by an at least short-term self-radiating material, for example by a luminescent, in particular fluorescent or phosphorescent material, and / or a radioactive material.
- a very forgery-proof medium information can be used as a security feature.
- the afterglow duration of a luminescent material can also be used as a property for the medium information.
- a structure and / or property formed by magnetic, magnetically conductive and / or electrically conductive materials is detected by the printing medium or that the base material and / or another material by a magnetic, magnetically conductive and / or electrically conductive material formed is.
- a structure and / or property formed thereby can be detected by structurally simple and cost-effective measuring methods, in particular contactless. As a result, the service life of the measuring or detection devices and the information data carrier can also be increased.
- a structure and / or characteristic of the pressure medium is formed, which is formed by materials which have a different electromagnetic radiation behavior compared to the base material of the pressure medium, in particular a different kind of electromagnetic radiation behavior in a wavelength range of UV radiation, visible light, IR Radiation and / or microwave radiation or if the further material is distinguishable from the base material electromagnetic radiation behavior, in particular in a wavelength range of UV radiation, visible light, IR radiation and / or microwave radiation is formed. Due to the radiation behavior of the pressure medium, a structure and / or property of the pressure medium can thus be detected. It is advantageous that the detection can be done without contact and is therefore to be expected with a lower wear of the devices or the information carrier.
- the medium information may be determined from one or more holograms located on and / or in the print medium, or for at least one hologram-like representation to be applied to and / or in the print medium. It is advantageous that holograms offer a high security against counterfeiting and thus the medium information is less easily forged or copied. Furthermore, a hologram can also be used for checking the authenticity of the printing medium by the human eye.
- the medium information is read from a recording device from the print medium, which comprises a sensor which is selected from a group comprising area camera, line scan, UV sensor and / or IR sensor or a development of a device for Processing a representation of a security printing
- the detection device comprises at least one optical sensor for detecting the medium information selected from a group comprising area camera, line scan camera, UV sensor and / or IR sensor.
- the medium information is read from a printing device by a detection device comprising a sensor selected from a group consisting of magnetic sensor, eddy current sensor, capacitive sensor and / or inductive sensor.
- a detection device comprising a sensor selected from a group consisting of magnetic sensor, eddy current sensor, capacitive sensor and / or inductive sensor.
- the medium information is read by a detection device from the printing medium, which includes a SAW (surface wave) sensor and / or ultrasonic sensor.
- a detection device which includes a SAW (surface wave) sensor and / or ultrasonic sensor.
- SAW surface wave
- ultrasonic sensor As a result, special vibration properties can be read out, which serve as medium information.
- a surface wave sensor and chemical properties that affect the vibration behavior of the sensor or the pressure medium can be read out.
- the linking of the print data and the medium information takes place by an electronic device, preferably by an electronic device in a card-shaped information carrier, and / or if the processing device comprises an electronic data processing unit, in particular with a microprocessor , which is designed for comparing the detected medium information from the print medium and from a graphical representation of the print medium determined medium data.
- the processing device comprises an electronic data processing unit, in particular with a microprocessor , which is designed for comparing the detected medium information from the print medium and from a graphical representation of the print medium determined medium data.
- complex, quickly executable linkage algorithms can be implemented, so that the combination of the print data and the medium information contributes to increased security against counterfeiting.
- an encryption key or encrypted encryption key in particular with a length of 2 kilobytes, which is located on an electronically readable data carrier, for example a smart card, is used for the encryption or decryption .
- the cipher key on the electronic data carrier can be read by an electronic processing device without having to manually enter a key.
- the encryption key can be exchanged, in particular a smart card can be used against a second smart card containing another encryption key. This allows an encryption device to work with multiple encryption keys.
- At least one device necessary for the method in particular a processing device for linking and encrypting data, a printing mechanism and / or a computing unit connected to the printing mechanism, is authenticated. This will ensure that the proper, authorized devices for the procedure are used.
- the authentication takes place by means of an authentication token and an authentication device or that the processing device is connected to an authentication device and the processing device is designed to create a valid representation of a security print only when the authentication device is connected to a valid authentication token. Additional security can be achieved by the authentication token since only those persons have access to the devices necessary for the procedure, which have an authentication token. Only specially authorized persons can create a security print.
- a refinement proves to be advantageous in which a symmetrical encryption algorithm, in particular a triple DES algorithm, is used for the encryption or decryption.
- a symmetrical encryption algorithm in particular a triple DES algorithm
- an asymmetric encryption algorithm is used for encryption or decryption.
- the security against forgery or the possibility of obtaining the encryption key is restricted because it is not necessary to store the encryption key in each reader but only a key to read the information from the print representation or a decryption key must be stored in a reader only for reading.
- a representation of the security printing is processed, which is formed by a two-dimensional barcode, in particular a world code, by Pearlstrings and by a plain text or that the representation of security printing by a combination of a two-dimensional barcode , in particular a Worldcode, Pearlstrings and / or plain text is formed.
- a forgery-proof and easily readable machine representation can be created and these are also read due to the clear text in the representation by persons with the naked eye.
- a development of a device for processing a representation of a security printing also provides that the processing device is connected to a device for feeding and / or retrieving a ciphering key.
- the processing device is connected to a device for feeding and / or retrieving a ciphering key.
- different encryption keys for various processing devices can be stored or processed by means of the device. It can thus be prevented that a further processing device is used to create or decrypt a security print not intended for that additional processing device.
- a further advantage is achieved in that the device for storing and / or retrieving the ciphering key comprises a writing and / or reading unit for a smart card or the like. This allows the encryption key to be stored or retrieved on a smart card.
- a smart card has the advantage that it can be easily distributed - for example by post - and can be easily exchanged.
- a refinement proves to be advantageous in which the electronic data processing unit is designed to execute a software or firmware or in which the software or firmware for encrypting and / or decrypting medium information, a chirping key, print data and / or or the representation of a security printing is formed or if the software or firmware for linking medium information, a cipher key, of print data and / or the representation of a security printing is formed.
- complex algorithms can be implemented, which independently - li ⁇
- the processing device is designed to use a ciphering key stored on an authentication token and / or on a smart card for encrypting and / or decrypting data concerning a security print.
- the encryption key becomes "portable", for example, a person can be assigned an encryption key which does not have to be permanently stored on the device, so that differently authorized persons can create or check security prints on the same device.
- the printing mechanism for thermal introduction and / or deletion of representations is formed on and / or in several times thermally writable and erasable information carrier or that the print medium is provided on at least one side with a thermo-reversible printable layer or at least partially consists of a thermo-reversible printable material. It is advantageous that an information carrier can be used several times or the information can be changed on the information carrier.
- a further development proves to be advantageous, in which the processing device is connected to a device for reading, writing and / or deleting electronic storage media of a card-shaped data carrier or the information carrier.
- encryption keys can be read from a card-shaped data carrier or software or firmware updates can be carried out for the processing apparatus.
- the operability is improved.
- the processing device is connected to a decoding device for processing a representation for a security printing, in particular with a world code decoder.
- the processing apparatus can thereby be made simpler since the decoder need not be included in the processing apparatus.
- the worldcode decoder can decode a world code.
- the decoding device for processing a representation for a security printing comprises a detection device, which is designed to detect the representation on the print medium and / or the medium information of the print medium.
- the representation or the medium information can be detected directly by the decoding device and a more reliable processing of the data of the detection device by the decoding device can take place.
- a development of an information carrier for a security printing provides that the randomly formed structure is formed on the surface of the base material, for example by elevations and / or depressions.
- This type of structure provides enhanced copy protection since the structure can not be reproduced by an ink or laser copier. Furthermore, a cost-effective production of this superficial structure is possible.
- the printing medium comprises a further material for forming the production-related property and / or structure resulting from a random process.
- the other material consists of fibers.
- fibers By added or incorporated in the print medium fibers easily distinguishable, unique print media can be produced.
- each fiber has its own profile, by which it can be distinguished from other fibers. Fibers can also contribute to increasing the stability or strength of the pressure medium.
- the further material is formed by granular and / or bead-like particles. Grain-like or bead-like particles are particularly easy to handle during production and can produce a uniformly distributed structure in the printing medium with little effort.
- the further material or the base material contains molecule markers.
- the printing medium is a card-shaped data carrier with a magnetic memory and / or a nonvolatile electronic storage medium. As a result, particularly security-relevant, electronically processable data can be stored on the information carrier.
- Fig. Ia a card-shaped information carrier with security printing and medium information
- Fig. Ib a sheet-like information carrier with security printing and medium information
- 2a shows a variant for forming the medium information by elevations or depressions on a printing medium of an information carrier
- FIG. 2b shows a further variant for forming the medium information by fibers in a superficial layer of the printing medium
- FIG. 2c shows a further variant for forming the medium information by fibers on the surface of the printing medium
- FIG. 2 d shows a further variant for forming the medium information by fibers or platelets in the printing medium
- FIG. 2e shows a further variant for the formation of the medium information by particles in the pressure medium
- FIG. 2f another variant for the formation of the medium information by additives in the pressure medium
- Fig. 2g another variant for forming the medium information by additives on the surface of the pressure medium
- FIG. 3 shows a cross-section of an information carrier with a thermo-reversibly writable coating
- 5 shows a device for creating or checking a security print
- FIG. 6 shows a further variant of a device for creating or checking a security print
- FIG. 7 shows a further variant of a device for checking a security pressure
- FIG. 9 a Detection device with sensors for detecting magnetic field-influencing materials
- FIG. 9b shows a variant of a detection device with sensors for detecting magnetic field-influencing materials
- Fig. 10b Detection devices with capacitive sensors on both sides of the information carrier
- FIG. 11 shows a method for creating a security print
- FIG. 12 shows a method for creating a security print with multiple encryptions
- FIG. 13 shows a method for checking a security pressure.
- FIGS. 1 to 4 an information carrier 1 for an inventive method for creating or checking a security print 40 is explained.
- the information carrier 1 is formed by a printable printing medium 2, which comprises a base material 3 and a medium information 4 uniquely assigned to the printing medium 2.
- a printable printing medium 2 which comprises a base material 3 and a medium information 4 uniquely assigned to the printing medium 2.
- various information 7 in the form of a representation 29, in particular in the form of a security print 40 up and / or introduced. It is essential that the information carrier 1 is unique due to the production of the print medium 2 and that a security print 40 can be displayed thereon or in it.
- the representation 29 of the security print 40 located on the information carrier 1 contains information about the medium information 4.
- the security print 40 can contain graphic elements, symbols, plain text 70, pictograms, logos and various machine-readable representations 29, such as one- or two-dimensional barcodes 22, in particular one Worldcode 23, graphic character codes, pearl necklace codes 24 and / or dot codes, and the like.
- the security pressure 40 is designed so that it also information 7 on the Medium information 4 of the print medium 2 are included.
- a combination of a world code 23, a pearl string code or Pearlstrings 24 and a plain text 70 is used as a preferred representation 29 of the security printing 40.
- the worldcode 23 is a two-dimensional machine-readable code, the information 7 being represented by the arrangement of circular ring segments arranged around a center.
- the pearl string code or pearl strings 24 is a code in which the information 7 is represented by information-dependent differently extending or wavy lines and by information-dependent different sized dots or "beads.” It can also at least a part of an information represented by the pearl necklace 24 information are displayed as plain text 70 in order to be read by the human eye.
- the printing medium 2 is preferably card-shaped or sheet-like with a flat upper side 5 and underside 6.
- the information 7 in the form of readable by the human eye information 7 and / or machine-readable information 7 or be incorporated.
- Information readable by the human eye 7 is understood to be information that can be read and understood by persons without the aid of complex, technical devices.
- the base material 3 of the printing medium 2 or information carrier 1 gives it the necessary strength and can accommodate further materials 8 and / or be coated with different layers 9.
- the base material 3 can also be located between two layers 9.
- the base material 3 is formed by a paper-like and / or plastic-like material, for example PVC.
- the base material can also be formed by a, in particular at least partially transparent, film.
- the necessary for the information carrier 1 media information 4 is formed by a unique and preferably resulting in a manufacturing process by a random process property or structure and / or caused by a random process, unique feature of the print medium 2.
- the random process is preferably selected such that, due to the size of a result set of the random process, the probability of two identical outputs of the random process - ie the probability of producing two print media 2 having identical properties or features - is very small or nearly impossible.
- the unique feature or characteristic is thus for each print medium 2 different, so that two print media 2 are distinguishable due to a measurement or determination of their characteristics or their properties, at least with the aid of a device.
- the production-related medium information 4 can be formed by a structure 10 of the base material 3, by fibers 11, by platelets 12, by particles 13, by beads 14 and / or by additives 15. It is essential for the medium information 4 that this can not be changed without destroying the information carrier 1 or that it is very difficult and very costly to produce a copy of a printing medium 2 with the same medium information 4 as the original to manufacture.
- the structure 10 may be formed by elevations 16 and / or depressions 17 in the base material 3 and / or an overlying layer 9.
- the elevations 16 can also be formed by a further material 8, for example in the form of fibers 11, platelets 12, particles 13, beads 14 or the like.
- the elevations 16 may be formed by studs 18, strip-shaped and / or linearly arranged webs 19.
- the recesses 17 may be linear and / or be formed by channel-like recesses 20.
- the medium information 4 by fibers 11 or threads may be located in the base material 3 and / or in a further layer 9. It is also possible that the fibers 11 are located on the upper side 5 and / or the lower side 6 of the pressure medium 2.
- the materials 8 through which the medium information 4 is formed may preferably have different material properties than the base material 3, for example they may have a higher or lower electrical and / or magnetic conductivity, be stronger or weaker than the base material may be magnetized or another radiation and / or electromagnetic wave absorption characteristics.
- the materials 8 may be made of metal or an electrically conductive plastic so that they can be registered by a capacitive or inductive sensor 39 - FIG. It is also possible that the materials 8 are made of one, in particular only on special, spectral regions 21, transparent material.
- the spectral regions 21, at which the material 8 differs from the base material 3 in the absorption and / or reflection behavior are outside the spectral range which can be recognized by a human eye, for example in the UV range or in the infrared range.
- the material 8 a luminescent substance.
- substances which have an afterglow duration of different lengths. The afterglow period can form the medium information 4.
- molecular markers can also be used.
- a molecule marker is understood as meaning particles or substances which form a connection with certain molecules in the pressure medium 2 and which can be made visible by a chemical or physical process.
- molecule markers can have fluorescent properties that can be visualized using special microscopes. By arranging the molecule markers on or in the print medium 2, the medium information 4 can be formed.
- the information carrier 1 may also comprise at least one machine-readable data storage element 25.
- This data storage element 25 is intrinsically connected to the card-shaped information carrier 1, in particular integrated in this or at least partially embedded therein, glued or vapor-deposited on this.
- the data storage element 25 can be formed by a magnetic strip 26 and / or by an electronic chip 27.
- This electronic chip 27 on the card-shaped information carrier 1 can communicate with electronic peripheral units via contact surfaces or contact elements and / or via a coil arrangement integrated in the card body for receiving and / or emitting electromagnetic alternating fields.
- a magnetic strip 26 and / or a chip 27 for a contact or contactless communication to electronic peripheral units it is of course also possible on the print medium 2 other, known from the prior art data storage elements 25 for preferably variable, but non-volatile deposit of Provide information or data.
- Such a data storage element 25 on the information carrier 1 should therefore be repeatedly written and erasable by a function of the information to be backed up 7, without permanent supply of external energy, the respective information 7 long-term preserving memory element.
- the previously mentioned magnetic strip 26 and / or an EEPROM memory can be provided as the storage element, which is assigned to an electronic processing unit, in particular a microcomputer, for processing data.
- This EEPROM memory and the arithmetic unit form the so-called chip 27 of the information carrier 1 in card form.
- an information carrier 1 which can be written on and erased by a thermally reversible method is used.
- the information carrier 1 has at least on one of its flat sides 5, 6 a coating 28 or film made of a thermosensitive material, as is the case in the prior art, for example from EP 0 473 403 A2 (NCR Coiporation) is well known.
- These graphical representations 29 can be composed of a plurality of individual pixels or pixels or be formed from continuous, uninterrupted lines, arcs and the like.
- black / white or monochrome representations it is of course also possible to generate color representations, provided that the writing tools or treatment mechanisms are matched thereto and corresponding color contrast producing material is present on the card-shaped information carrier 1.
- the device 30 preferably comprises a processing device 32, a connection board 74 and a printing mechanism 75.
- the device 30 is connected via a connection 73, preferably with a USB connection or an RS232 connection, to a computing unit 37, in particular to a personal computer. connected.
- the processing device 32 is configured to generate or check a representation 29-FIG. 1 a, 1 b-of a security print 40.
- a representation 29 of a security print 40 in particular in the form of a world code 23 - Fig. Ia -, can the processing device 32 may be connected via a connection 76 to a decoder 77.
- Another form of training is to connect an authentication device 79 to the processing device 32 via a connection 78.
- the processing device 32 is connected via a connection 80 to the connection board 74, to which the printing mechanism 75 is also connected via a connection 82.
- the processing device 32 preferably comprises electronic means which allow at least data encryption or encryption.
- the processing device 32 to a microprocessor, which is designed to execute a software or firmware.
- the microprocessor is designed for communication with other devices or are connected to the microprocessor interface blocks that allow communication according to the RS-232 standard or the USB standard (Universal Serial Bus).
- the decoding device 77 connected to the processing device 32 is designed to generate from electronic data or information 7 a printed image 64 - FIG. 11 - in electronic form, which can be brought onto a printing medium 2, for example, by the printing mechanism 75.
- the decoding device 77 can preferably also extract information 7-FIG. 1 a from a representation 29 read in by an information carrier 1 and make this extracted information available to the processing device 32.
- the decoder 77 is formed by a world code decoder 81.
- the authentication device 79 connected to the processing device 32 via the connection 78 in one variant of the device 30 comprises an interface to an authentication token 83 which can be connected to the authentication device 79.
- the authentication token 83 is a physical element which has one or more a plurality of encryption keys 44 or encrypted encryption keys 44, in particular password-encrypted encryption keys 44, which are used for a correct function or for authentication of the processing apparatus 32.
- the authentication token 83 can ensure that only the holder of a valid authentication ziemngs token 83 access to the processing device 32 has. It is also possible that the processing device 32 is designed to be fully functional only on a specific authentication token 83 or a specific encryption key 44 on the authentication token 83.
- the encryption key 44 located on the authentication token 83 can also be used for encryption and decryption of information 7. It can thereby be achieved that the device 30 is protected from unauthorized access or a security print 40 - FIG. 1 a, FIG. 1 b - can only be created with the aid of matching authentication tokens 83 and processing device 32.
- the authentication token 83 is preferably formed by a smart card with a chip 27 or a magnetic strip 26 - Fig. Ia, Fig. Ib -.
- the chip 27 comprises at least one nonvolatile memory. It is also possible that the authentication token 83 is also equipped with a processor.
- the authentication device 79 may exchange data with the authentication token 83 through contacts or by radio.
- the authentication token 83 may also be a card, in particular a smart card, with a thermo-reversibly printable material so that it can be printed by the printing device 75.
- the connection board 74 of the device 30 is preferably designed as a backplane 84 and comprises a plurality of interfaces, preferably RS-232 and USB interfaces.
- the processing device 32 is connected to the printing mechanism 75 via the interfaces of the connection board 74, the processing device 32 being connected to the connection board 74 via the connection 80 and the printing mechanism 75 being connected to the connection board 74 via the connection 82.
- the connection 80 is preferably formed by a connection according to the RS-232 standard. It is further also possible to connect the connection board 74 via connection 73 to the arithmetic unit 37.
- the printing mechanism 75 preferably comprises a printing device 34 - FIG. 6 - for thermally reversible writing of an information carrier 1 and a detection device 33 - FIG. 6 - for recording the medium information 4 - FIGS. 2 a to 2g - of the information carrier 1 34 comprises a printhead for producing representations 29 - FIG. 1a, 1b - with a resolution of preferably 300 dpi.
- the arithmetic unit 37 connected to the device 30 is equipped with an authentication software, an encryption software 85 or a token system for authenticating the device 30.
- An authentication device 87 can also be connected to the arithmetic unit 37 via a connection 86.
- connections (73, 76, 78, 80, 82, 86) are preferably formed by compounds according to the RS232 standard. It is also possible to use one or more of these connections (73, 76, 78, 80, 82, 86) through USB connections or wireless connections.
- a wireless connection can take place by means of a radio transmission, for example by means of a connection according to the Bluetooth standard, or an optical transmission form, for example by means of an infrared connection.
- Fig. 6 shows a further embodiment of the device 30, with which the information carrier 1 is checked and preferably described and deleted.
- the device 30 comprises a control device 31 having a processing device 32, a detection device 33, a pressure device 34, preferably a reading and writing device, a storage unit 35 and a guide mechanism 36.
- the control device 31 serves to coordinate the individual devices and is connected to them.
- the control device 31 can also be connected to an external computing unit 37, in particular a personal computer, or a local or global network.
- the connection to the individual units or devices can be made via lines or at least partially via wireless connections, for example infrared connections or radio links.
- the control device 31 also includes the processing device 32. It is also possible that the processing device 32 is formed by a stand-alone device. Another possibility is to equip the control device 31 with software or firmware which can take over the tasks of the processing device 32.
- the control device 31 or the processing device 32 can also be connected to an external encryption device 38, in particular to an encryption accelerator card.
- the task of the processing device 32 can also be performed by software on a computing unit 37, for example a personal computer.
- the detection device 33 preferably comprises at least one sensor 39, with which an information 7-FIG. 1 a or representation 29-FIG. 1 a located on the information carrier 1 is detected or read in, in particular a security pressure 40-FIG can.
- the detection device 33 preferably also includes a sensor 41, which is designed to detect the medium information 4 - 1 a - of the pressure medium 2.
- the detection device 33 may also be designed to detect properties of luminescent or otherwise self-radiating materials 8 or additives 15.
- the radioactivity of the printing medium 2 or of the information carrier 1 can be measured by means of a Geiger-Müller counter connected to the control device 31, by means of a scintillation counter or by means of semiconductor detectors, and from this the medium information 4 can be obtained.
- the printing medium 2 is preferably irradiated with electromagnetic waves or otherwise energized before the measurement or during the measurement, in order to bring about a radiation of the material.
- the sensor can also be formed by a sensor sensitive in the ultraviolet (UV) region 21 of the light or a sensor sensitive in the infrared (IR) region, for example by a semiconductor element reacting to UV or IR radiation.
- the senor 39 may also include a controller 42 for the detection device 33, which is connected to the control device 31 in order to relieve the control device 31 or to provide an interface compatible with the control device 31.
- the printing device 34 of the device 30 is preferably designed for printing on the information carrier 1.
- a printhead 43 suitable for a thermally reversible printing process is used.
- information 7 can be brought to the information carrier 1 and, if necessary, changed or deleted.
- the storage unit 35 of the device 30 may be connected to the control device 31 for storing or retrieving data.
- program data for a control program or other data in particular one or more encryption keys 44 - FIG. 12, FIG. 13 - or encrypted encryption keys 44.
- the encryption key or keys 44 can be called up by the control device 31 or the processing device 32.
- the storage unit 35 may comprise a removable medium, in particular a smart card.
- the device 30 is preferably also equipped with a guide mechanism 36.
- the guide mechanism 36 preferably comprises a plurality of guide rollers 46, guide plates or guide rails 47 and preferably also a counterpressure roller 48.
- the guide mechanism 36 serves to guide or convey an information carrier I 5, preferably a card - shaped information carrier 1.
- the counter - pressure roller 48 is opposite the printing device 34 or . Located opposite the printhead 43 and serves to support the information carrier 1 in a printing operation or in an erase operation.
- control device 31 may also be connected to an input and output device.
- the input device may be in the form of a keyboard, or by a touch screen.
- the output device can be formed by indicator lights, for example LEDs, a liquid crystal display or by a screen, for example by a touch screen.
- the device 30 may also comprise a data interface 45, which may be used to describe a data storage element 25 - FIG. 1 a, 1 b -, for example a magnetic strip 26 - 1 a, 1 b - or a chip 27 - 1 a, FIG Ib, is educated.
- a data interface 45 may be used to describe a data storage element 25 - FIG. 1 a, 1 b -, for example a magnetic strip 26 - 1 a, 1 b - or a chip 27 - 1 a, FIG Ib, is educated.
- a further object of the device 30 according to the invention can be that in a corresponding machine-readable data storage element 25- Fig. Ia, Fig. Ib -, ie in a magnetic strip 26 - Fig. Ia, Fig. Ib - or a chip 27 - Fig. Ia Fig. Ib - stored information or data read, either to process itself or forward for data processing to higher-level units and at least part of the changed or current data in optically recognizable form or in the form of a representation 29 -. 1a, 1b), ie in plain text or by means of other graphic symbols, on at least one flat side 5, 6 of the information carrier 1 and, if appropriate, invalidated. have deleted information from the information carrier 1 or overwrite this.
- the representation of the data of the data storage element 25 can also take the form of a security printing 40 - Fig. Ia, Fig. Ib - take place.
- the device 30 according to the invention can therefore be used to permanently or at least extract the data stored in the data storage element 25, such as a remaining balance, changed authorizations, a history of the use of the information carrier 1, the current bonus points or the like to write or print on the information carrier 1 with visibility for weeks or years.
- These optical images which are recognizable by the human eye, can then be changed or updated by subsequent thermal treatments by means of the device 30.
- such card-shaped information carriers 1 can be provided with any machine-readable information 7, e.g. one-dimensional or two-dimensional bar codes, graphic character or point codes and the like, but also plain text information, such as Signs, letters, graphics, logos, pictograms and the like. Be provided. These information 7 to be deposited on at least one of the two flat sides (5, 6) of the information carrier 1 are applied by the device 30 such that their presence is visually detectable by the human eye.
- machine-readable information 7 e.g. one-dimensional or two-dimensional bar codes, graphic character or point codes and the like, but also plain text information, such as Signs, letters, graphics, logos, pictograms and the like.
- the device 30 is also used for processing, in particular for printing or writing, deleting as required or rewrite at least one side of card-shaped information carriers 1.
- Under information carrier 1 are mainly in your format standardized, largely made of plastic card body, especially so-called Smart Cards, understood, which contain visible and / or invisible information 7 for the human eye. These information carriers 1 are frequently used as identification or identity card, as authorization card for the use of services, as verification means for access or use authorizations, as authorization means for transactions, as means of payment and the like.
- the information carrier 1 to be processed with the device 30 has other formats, in particular small or large-area formats.
- the device 30 for overwriting or rewriting, ie for deleting and optionally rewriting sheet-shaped information carriers. like to use 1 in DIN A4 format or larger.
- the size of the information carrier 1 to be processed depends only on the dimensioning of the device 30 and the size of the device 30 and the individual functional elements are virtually unlimited. For the sake of simplicity, only card-shaped information carriers 1 are frequently referred to because of the preferred, but not limited, embodiment of the device 30 as card processing device.
- FIG. 7 shows a further embodiment of the device 30 for checking a security pressure 40.
- the device 30 is a mobile checking unit 49, which may comprise a detection device 33, an output device 50, an input device 51, a transmission device 52.
- the transmission device 52 can be formed by a radio module, for example by a Bluetooth module, by an infrared module or by an interface module for a cable transmission, for example a USB module.
- the mobile monitoring unit 49 is preferably provided with a handle, in the immediate vicinity of which at least part of an input device 51, in particular a push-button, is arranged.
- the checking unit 49 is connected via a radio module to a computing unit 37.
- the arithmetic unit 37 may be connected to an authentication device 87 in order to exclude unauthorized users from use.
- the checking unit 49 may also include an authentication device 77, in particular a world code decoder 81.
- FIGS. 8 to 10 b show various sensors (39, 41) for detecting a representation 29 - 1 a on the information carrier 1 or for detecting the medium information 4 - 1 a - of the information carrier 1.
- the 8 shows a sensor (39, 41) comprising a camera 53.
- the camera 53 may be an area camera or a line camera.
- the camera 53 in the desired area 21 can show an increased sensitivity.
- a filter 54 in front of the sensor (39, 41) in particular in front of the camera 53, in order to be able to examine a special spectral region 21.
- a structured, light beam deflecting filter 54 for example a grating, in particular a grating or a hologram-adapted grating, or a lens in order to be able to detect the desired medium information 4.
- the information carrier 1 is illuminated or illuminated by a lighting device 55.
- the illumination device 55 may be formed by a light-emitting diode, a laser diode or a gas discharge lamp.
- the illumination device 55 can also be pulsed, for example, synchronously to a sampling frequency of the sensor (39, 41), in particular the camera 53, operated.
- the lighting device 55 can also be designed in multiple colors, in particular such that different colors are switched on at different times.
- the connection of the colors can again take place at a frequency which is synchronous with the sampling frequency or readout frequency of the sensor (39, 41).
- an afterglow duration of one or more luminescent materials 8 or additives 15 - FIGS. 2d to 2g - can also be measured or detected.
- Embodiment variants of a sensor 41 for reading out medium information 4-FIG. 1a are shown schematically in FIGS. 9a and 9b.
- the sensor 41 preferably comprises a coil 56 and preferably also a coil core 57 and a controller 58.
- This sensor 41 can be used to read a medium information 4 of the information carrier 1 containing magnetic or magnetically conductive materials 8. It is also possible to use two coils 56, wherein one coil is used as a test coil and another coil 56 as a measuring coil.
- the coils can act or measure from one side of the information carrier 1 or from both sides of the information carrier 1 onto the printing medium 2 or the information carrier 1.
- FIGS. 10a and 10b show a further variant of a sensor 41 in which the medium information 4-FIG. 1 a, 1 b is determined by capacitors 59.
- the capacitors 59 may be applied to one side of the information carrier 1 or from both sides.
- the capacitors 59 necessary for determining the medium information 4 are preferably connected to a controller 60 or evaluation circuit.
- the controller 60 may be connected to the control device 31 or at least partially integrated therein.
- the information carrier 1 can be stationary relative to the sensor 41 or can be moved past with a relative movement.
- the relative speed of the information carrier 1 is measured or a time path diagram is determined.
- the sensor 41 for detecting the medium information 4 - Fig. Ia, Fig. Ib - the detecting device 33 - Fig. 6 and Fig. 7 - may also be formed by a SAW (surface acoustic wave) sensor or ultrasonic sensor.
- SAW surface acoustic wave
- SAW Surface Acousitc Wave
- chemical properties of the pressure medium 2 can be detected, which form a medium information 4.
- the surface of the sensor which preferably comprises a piezo element, reacts with the substances on the printing medium and thereby the oscillation capability of the sensor is measurably influenced.
- an ultrasonic sensor acoustic properties of the pressure medium 2 can be used to determine a medium information 4 of the pressure medium 2, for example, the vibration behavior.
- a method for creating the security printing 40 - Fig. Ia, Fig. Ib - is shown.
- print data 61 which contain information, and the medium information 4 are forwarded to a linking algorithm 62.
- the data or information linked by the linking algorithm 62 is then forwarded to an encryption algorithm 63.
- the encryption algorithm 63 together with an encryption key 44, generates a print image 64 from the input data of the encryption algorithm 63. It is also possible to form the linking algorithm 63 in such a way that a printed image 64 can thereby be generated.
- the pressure generated Image 64 is brought to the information carrier 1 by the printing device 34 - FIG. 6 - as representation 29 - FIG. 1 a, 1 b - or security print 40 - 1 a, 1 b.
- the print data 61 can in this case comprise various information 7-FIG. 1 a, 1 b, for example data for identifying a person, an admission ticket or a ticket.
- Different information 7 can be used to identify a person.
- the name, the date of birth, an identification number, a photo and / or other biometric data such as information 7 about a fingerprint, nature of the retina of the eye, different body dimensions or other properties that may be used to identify a person.
- information 7 of the voice of a person or of electrical characteristics for example from an ECG (electrocardiogram) or from an EEG (electro-encephalography), into the print data 61.
- the nature or properties that define the medium information 4 are preferably formed by the random process in the production of the print medium 2.
- parts of the quality of the printing medium 2 are recorded, which then form the medium information 4.
- the printing medium 2 can be scanned with a grid spacing of measuring points of 0.5 mm. During scanning, it can be determined which nature of the print medium 2 is at the measuring points.
- the condition can be established as a truth value, for example whether a fiber 11 - Fig. 2b to Fig. 2d - is present at the measuring point or not, or as a value with a higher resolution, in particular an 8-bit or 16-bit value of the color of the measuring point become. It is also possible to observe a measuring point over a period of time, and to record the time profile of the measured value by means of the detection device 33. As a result, for example, a persistence of a luminescent substance can be measured.
- the definition of which parts of the nature of the printing medium 2 are detected can either be chosen to be the same for each information carrier 1 or from the print data 61, ciphering keys 44 and / or from the location of the representation 29 - FIGS.
- the locations of the measuring points are selected depending on the name or other data of the person.
- the locations of the measurement points may depend on the encryption key 44 used.
- a further possible embodiment envisages using only those properties or properties of the printing medium 2 as medium information 4, which are located at the location of the representation 29 or the location of the measuring points may depend on the location of the representation 29.
- medium information 4 can be used from an upper surface section of the surface or vice versa.
- the linking algorithm 62 and the encryption algorithm 63 may be implemented in the control device 31 - FIG. 6 - or processing device 32 - FIG. 6, respectively.
- a software or firmware describing or executing the linking algorithm 62 or the encryption algorithm 63 is used, which is executed by a microprocessor in the control device 31 or in the processing device 32.
- the instruction sequence of the linking algorithm 62 or the encryption algorithm 63 is stored in an electronic or magnetic storage medium which is located in the microprocessor or in an external memory.
- an encryption algorithm 63 is used as the linking algorithm 62.
- the medium information 4 is used as a ciphering key 44 with which the print data 61 is encrypted.
- the cipher key 44 is preferably in the memory unit 35 -Fig. 6 - saved.
- the length of the ciphering key 44 may be of a length customary for encryption algorithms 63, for example 56 bits, 64 bits, 128 bits or 512 bits or a length of 2 kbytes. It is also possible that the cipher key 44 is stored in encrypted form in the storage unit 35, for example, the cipher key 44 may be encrypted by a password.
- FIG. 12 shows a further method variant for creating a security print 40.
- the medium information 4 and / or the drach data 61 can be supplied to an encryption algorithm 63 before being linked.
- the Linking algorithm 62 are then linked encrypted print data 61 and an encrypted medium information 4, respectively.
- the data of the linking algorithm 62 it is then possible for the data of the linking algorithm 62 to be transferred to an encryption algorithm 63.
- Various encryption algorithms 63 may also be used or applied several times in an encryption.
- FIG. 13 shows a method for checking a security pressure 40.
- the representation 29-FIG. 1 a, 1 b is read in by an information carrier 1 by a detection device 33 and forwarded to a decryption algorithm 65.
- the decryption algorithm 65 decrypts the read-in data of the representation 29 with the aid of an encryption key 44 and forwards the decrypted data to an extraction algorithm 66.
- the extraction algorithm 66 divides the data into information data 67 and medium data 68, which may be further decrypted by a decryption mechanism 65 and an encryption key 44.
- the medium information 4 of the information carrier 1 is read in by the detection device 33 and forwarded to a comparison algorithm 69, which also receives the extracted medium data 68.
- the comparison algorithm 69 compares the medium data 68 to be obtained from the display 29 and to represent the medium information 4 with the medium information 4 read directly from the detector 33, and generates a truth value 72 or information concerning the match of Medium data 68 and medium information 4. It is also possible not to decrypt the encrypted medium data 68, but to encrypt the directly read medium information 4 and then to compare the encrypted medium data 68 with the encrypted medium information 4.
- the extraction algorithm 66 may also be designed in such a way that a truth value 71 is generated which provides information about the validity of the representation 29 on the information carrier 1. This can be achieved by the representation 29 also comprising information 7 with which errors in the representation 29 can be recognized. Such information 7 can be redundant information 7 or for each representation 29 constant scholarmformationen. The errors can be detected, for example, by the use of a Hamming code in the representation 29, as is well known from the information or coding theory.
- encryption algorithms 63 different types of algorithms can be used. For example, symmetric encryption algorithms 63, such as an RC2, RC4, RC5, DES, Triple DES, or AES algorithm may be used.
- the DES algorithm Digital Encryption Standard
- the Triple DES algorithm uses the DES algorithm three times in succession.
- Asymmetric encryption algorithms 63 may also be used for encryption.
- hashing algorithms in particular MD5, SHA-I or RIPEMD-160, can also be used.
Landscapes
- Credit Cards Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/AT2007/000151 WO2008119087A1 (de) | 2007-04-03 | 2007-04-03 | Verfahren zur erstellung und überprüfung eines sicheren klartextdruckes, sowie vorrichtung und informationsträger hierfür |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2001688A1 true EP2001688A1 (de) | 2008-12-17 |
EP2001688B1 EP2001688B1 (de) | 2014-01-15 |
Family
ID=39048841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP07718368.9A Not-in-force EP2001688B1 (de) | 2007-04-03 | 2007-04-03 | Einrichtung zum verarbeiten einer darstellung eines sicherheitsdruckes auf einem informationsträger |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2001688B1 (de) |
WO (1) | WO2008119087A1 (de) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102012022037A1 (de) * | 2012-11-09 | 2014-05-15 | Heidelberger Druckmaschinen Ag | Sicherheitsvorrichtung zur Herstellung von Sicherheitsetiketten und Sicherheitsetikett |
DE102014214548B4 (de) * | 2014-07-24 | 2022-10-13 | Morpho Cards Gmbh | Verfahren zur Herstellung eines Dokuments |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT1023835B (it) * | 1973-05-11 | 1978-05-30 | Dasy Int Sa | Materiale per documenti |
US5601931A (en) * | 1993-12-02 | 1997-02-11 | Nhk Spring Company, Ltd. | Object to be checked for authenticity and a method for manufacturing the same |
US20020170966A1 (en) * | 1995-07-27 | 2002-11-21 | Hannigan Brett T. | Identification document including embedded data |
DE10162537A1 (de) * | 2001-12-19 | 2003-09-04 | Norbert Hampp | Verfahren zur Authentizitätssicherung von Dokumenten |
GB2385299A (en) | 2002-03-08 | 2003-08-20 | Ec Smart | Thermally writeable card, ticket or pass with holder's image |
WO2003091041A1 (fr) * | 2002-04-23 | 2003-11-06 | Ricoh Company, Ltd. | Carte d'enregistrement/affichage de donnees, procede de traitement d'image utilisant celle-ci et processeur d'image |
DE10394294D2 (de) * | 2003-06-25 | 2006-05-18 | Tbs Holding Ag Pfaeffikon | Fälschungssicheres Dokument und Verfahren zu seiner Herstellung |
AT502714B1 (de) * | 2005-10-25 | 2012-04-15 | Binder Consulting Gmbh | Verfahren zur erstellung und überprüfung eines sicheren klartextdruckes, sowie vorrichtung und informationsträger hierfür |
-
2007
- 2007-04-03 EP EP07718368.9A patent/EP2001688B1/de not_active Not-in-force
- 2007-04-03 WO PCT/AT2007/000151 patent/WO2008119087A1/de active Search and Examination
Non-Patent Citations (1)
Title |
---|
See references of WO2008119087A1 * |
Also Published As
Publication number | Publication date |
---|---|
EP2001688B1 (de) | 2014-01-15 |
WO2008119087A1 (de) | 2008-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE60318592T2 (de) | Sicherheitseinrichtung und system | |
AT502714B1 (de) | Verfahren zur erstellung und überprüfung eines sicheren klartextdruckes, sowie vorrichtung und informationsträger hierfür | |
HU224448B1 (hu) | Mágneses/fémes biztonsági eszköz többszörös biztonsági sajátosságokkal, valamint eljárás ilyen eszköz előállítására és hitelesítésére | |
DE10204870B4 (de) | Verfahren zur Fälschungssicherung eines Wertträgers, Wertträger und Verfahren zur Überprüfung seiner Echtheit | |
EP1597709A2 (de) | Verfahren zur herstellung von sicherheitskennzeichen | |
EP2486550B1 (de) | Dokument | |
WO2003054807A2 (de) | Wertdokument und vorrichtung zur bearbeitung von wertdokumenten | |
WO2001039108A2 (de) | Individualisierungssystem für einen gegenstand | |
EP3264337B1 (de) | Adapter für ein lesegerät | |
EP2210225B1 (de) | Dokument mit einer integrierten anzeigevorrichtung, verfahren zur herstellung eines dokuments und lesegerät | |
EP2219877B1 (de) | Dokument mit einer integrierten anzeigevorrichtung | |
EP2219878A1 (de) | Dokument mit einer integrierten anzeigevorrichtung, sicherheitssystem, lesegerät und verfahren zur prüfung der echtheit eines dokuments | |
EP2001688B1 (de) | Einrichtung zum verarbeiten einer darstellung eines sicherheitsdruckes auf einem informationsträger | |
EP2274731B1 (de) | Dokument mit einem speicher und empfänger-gerät | |
AT515654A2 (de) | Sicherheitsmerkmal mit einem Markierungs- und einem Codeabschnitt | |
DE2452202A1 (de) | Urkunden mit echtheitspruefmoeglichkeit sowie vorrichtung zur echtheitspruefung | |
CN1862600A (zh) | 门票管理系统及门票管理方法 | |
EP4051509A1 (de) | Prüfung eines sicherheitsdokuments auf basis von tröpfchenmorphologien | |
DE102004055761A1 (de) | Wertdokumente, Herstellung und Prüfung von Wertdokumenten | |
EP2220642A1 (de) | Dokument mit einer integrierten anzeigevorrichtung | |
DE102006022798A1 (de) | Manipulationsgeschütztes geldwertes Blattgut | |
EP1980977B1 (de) | Authentifizierbares Etikett sowie Vorrichtung zum Authentifizieren eines authentifizierbaren Etiketts | |
DE60124283T2 (de) | Optischer Datenträger mit einem auf optischer Beugung basierenden Code, und zugehöriges Lesegerät | |
EP3548300B1 (de) | Verfahren zum herstellen und zum prüfen eines sicherheitsdokuments und sicherheitsdokument | |
DE102016001449A1 (de) | Verifikation eines mit einem Sicherheitselement versehenen Gegenstands |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20080331 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
17Q | First examination report despatched |
Effective date: 20100817 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): BE BG CH CY CZ DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BINDER CONSULTING GMBH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20130806 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): BE BG CH CY CZ DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: ABP PATENT NETWORK AG, CH |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: VDEP Effective date: 20140115 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140515 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140515 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: LU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140403 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
26N | No opposition filed |
Effective date: 20141016 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140403 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 10 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140416 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20070403 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PCAR Free format text: NEW ADDRESS: OTHMARSTRASSE 8, 8008 ZUERICH (CH) |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 11 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20180321 Year of fee payment: 12 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20190403 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190403 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20200312 Year of fee payment: 14 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20200311 Year of fee payment: 14 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20200326 Year of fee payment: 14 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20210430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 |