EP2279083A2 - Verfahren zur herstellung eines sicherheitsmerkmals auf einem flachen substrat - Google Patents
Verfahren zur herstellung eines sicherheitsmerkmals auf einem flachen substratInfo
- Publication number
- EP2279083A2 EP2279083A2 EP09734654A EP09734654A EP2279083A2 EP 2279083 A2 EP2279083 A2 EP 2279083A2 EP 09734654 A EP09734654 A EP 09734654A EP 09734654 A EP09734654 A EP 09734654A EP 2279083 A2 EP2279083 A2 EP 2279083A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- substrate
- random pattern
- feature
- wire
- security feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 239000000758 substrate Substances 0.000 title claims abstract description 56
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 19
- 239000000835 fiber Substances 0.000 claims abstract description 67
- 238000000034 method Methods 0.000 claims abstract description 55
- 239000002245 particle Substances 0.000 claims abstract description 6
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical group [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 claims abstract description 5
- 239000011241 protective layer Substances 0.000 claims abstract description 5
- 238000007639 printing Methods 0.000 claims description 21
- 239000000853 adhesive Substances 0.000 claims description 7
- 230000001070 adhesive effect Effects 0.000 claims description 7
- 239000003973 paint Substances 0.000 claims description 7
- 239000004033 plastic Substances 0.000 claims description 7
- 229920003023 plastic Polymers 0.000 claims description 7
- 239000012530 fluid Substances 0.000 claims description 5
- 239000002184 metal Substances 0.000 claims description 5
- 229910052751 metal Inorganic materials 0.000 claims description 5
- 239000011111 cardboard Substances 0.000 abstract description 3
- 239000011087 paperboard Substances 0.000 abstract description 2
- 239000012634 fragment Substances 0.000 abstract 1
- 238000011161 development Methods 0.000 description 8
- 230000018109 developmental process Effects 0.000 description 8
- 238000012360 testing method Methods 0.000 description 7
- 238000001514 detection method Methods 0.000 description 6
- 238000011156 evaluation Methods 0.000 description 5
- 239000011888 foil Substances 0.000 description 5
- 238000004806 packaging method and process Methods 0.000 description 5
- 239000000463 material Substances 0.000 description 4
- 239000000123 paper Substances 0.000 description 4
- 239000002131 composite material Substances 0.000 description 3
- 239000011159 matrix material Substances 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000009512 pharmaceutical packaging Methods 0.000 description 3
- 238000007796 conventional method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000002657 fibrous material Substances 0.000 description 2
- 239000004922 lacquer Substances 0.000 description 2
- 239000011859 microparticle Substances 0.000 description 2
- 230000003278 mimic effect Effects 0.000 description 2
- 238000001454 recorded image Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 229920000426 Microplastic Polymers 0.000 description 1
- 239000004677 Nylon Substances 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 239000000919 ceramic Substances 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 239000002537 cosmetic Substances 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000011143 downstream manufacturing Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000013305 flexible fiber Substances 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 239000002557 mineral fiber Substances 0.000 description 1
- 229920005615 natural polymer Polymers 0.000 description 1
- 239000004745 nonwoven fabric Substances 0.000 description 1
- 229920001778 nylon Polymers 0.000 description 1
- 238000007645 offset printing Methods 0.000 description 1
- 239000000825 pharmaceutical preparation Substances 0.000 description 1
- 229940127557 pharmaceutical product Drugs 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 238000005096 rolling process Methods 0.000 description 1
- 238000005507 spraying Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000000153 supplemental effect Effects 0.000 description 1
- 229920002994 synthetic fiber Polymers 0.000 description 1
- 239000012209 synthetic fiber Substances 0.000 description 1
- 229920001059 synthetic polymer Polymers 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 239000002966 varnish Substances 0.000 description 1
- 235000013311 vegetables Nutrition 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000003466 welding Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/083—Constructional details
- G06K19/086—Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B32—LAYERED PRODUCTS
- B32B—LAYERED PRODUCTS, i.e. PRODUCTS BUILT-UP OF STRATA OF FLAT OR NON-FLAT, e.g. CELLULAR OR HONEYCOMB, FORM
- B32B37/00—Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding
- B32B37/14—Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the properties of the layers
- B32B37/24—Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the properties of the layers with at least one layer not being coherent before laminating, e.g. made up from granular material sprinkled onto a substrate
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B32—LAYERED PRODUCTS
- B32B—LAYERED PRODUCTS, i.e. PRODUCTS BUILT-UP OF STRATA OF FLAT OR NON-FLAT, e.g. CELLULAR OR HONEYCOMB, FORM
- B32B2305/00—Condition, form or state of the layers or laminate
- B32B2305/22—Fibres of short length
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B32—LAYERED PRODUCTS
- B32B—LAYERED PRODUCTS, i.e. PRODUCTS BUILT-UP OF STRATA OF FLAT OR NON-FLAT, e.g. CELLULAR OR HONEYCOMB, FORM
- B32B2425/00—Cards, e.g. identity cards, credit cards
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T156/00—Adhesive bonding and miscellaneous chemical manufacture
- Y10T156/10—Methods of surface bonding and/or assembly therefor
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T156/00—Adhesive bonding and miscellaneous chemical manufacture
- Y10T156/10—Methods of surface bonding and/or assembly therefor
- Y10T156/1089—Methods of surface bonding and/or assembly therefor of discrete laminae to single face of additional lamina
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T428/00—Stock material or miscellaneous articles
- Y10T428/24—Structurally defined web or sheet [e.g., overall dimension, etc.]
- Y10T428/24802—Discontinuous or differential coating, impregnation or bond [e.g., artwork, printing, retouched photograph, etc.]
Definitions
- the present invention relates to methods for producing a security feature on a flat substrate with the respective features of the preamble of claim 1 and 2. Furthermore, the present invention relates to a printed product with a
- security features When checking the authenticity of printed products, e.g. Documents or pharmaceutical packaging, various methods are used to produce so-called security features.
- the security features must - to become mass suitable - be inexpensive to produce and still offer a high degree of reliability in the detection of counterfeiting.
- Printed products in particular original documents and packaging of expensive or sensitive products such as cosmetics or pharmaceutical products, can be protected against counterfeiting in a variety of ways. Often, combinations of elaborate printing methods and print media are used to increase the security against counterfeiting, such. For example, banknote printing (iris printing, guilloche, security papers, threads, tipping colors, transparency and much more). For mass-produced articles such as disposable packaging, however, such combined, expensive and thus mostly expensive processes are not very suitable.
- DE 10 2008 014 322 which has not yet been disclosed at the time of application, describes a method for checking the authenticity of a printed product.
- a random feature can be generated for example by defects in cold foil transfer.
- random fine structures of a printed paper or other printing substrate are evaluated microscopically and used as a so-called fingerprint for the relevant document.
- This fingerprint can be stored in a database with the manufacturer of the security feature and controlled by database access by the user of the security feature. By comparing the fingerprint found on the product with the fingerprint stored in the database ⁇ , the authenticity of the present document can be confirmed.
- the fingerprint can be encrypted with a secret key and applied by the manufacturer of the security feature on the product, for example, be printed.
- the user of the security feature can verify the fingerprint by decrypting with the public key.
- a disadvantage of the method described, however, is that both the manufacturer and the user of the security feature must have a respective high-resolution device for receiving the fiber structure of the product.
- DE 103 04 805 A1 describes the application of a random pattern to a product, the reading of the random pattern, the extraction of a so-called "fingerprint" from the random pattern in the form of a data record and the storage of the fingerprint
- the fingerprint is extracted again from the random pattern and the agreement with the stored fingerprint is checked, for which the random pattern must be recorded with complex technical means with a high resolution range, eg with a microscope encryption, which used secret, ie non-public, keys, both of which are of little use in the authentication of mass-produced products.
- an object of the present invention to provide a comparison with the prior art improved method for producing a security feature, which is a simple and inexpensive to manufacture easily (by conventional means, such as camera mobile devices) to be detected and cryptographically simple and error-free evaluation of the security feature. It is further a further or alternative object of the present invention to provide a printed product having improved, i.e., improved, upon the prior art. easy to detect and cryptographically simple and error-free to evaluate
- Security feature It is a further or alternative object of the present invention to provide a process and printed product improved over the prior art which allows for good distinctness, visual and / or haptic, between a true security feature and a mimicked security feature. It is a further or alternative object of the present invention to provide a method for verifying the authenticity of a product which is improved over the prior art and a method for protecting a product To create products against counterfeiting, which make a simple and inexpensive to produce, easily (by conventional means, such as camera mobile devices) to be detected and used cryptographically simple and error-free to evaluate security feature.
- An inventive method for producing a security feature on a flat substrate wherein particles - forming a cryptographic random pattern - are applied to the substrate, characterized in that flexible wire or fiber pieces in a - with the security feature corresponding - feature area applied to the substrate become.
- An inventive method for producing a security feature in a flat substrate wherein particles - forming a cryptographic random pattern - are introduced into the substrate, characterized in that flexible wire or fiber pieces in a - corresponding to the security feature - introduced feature in the substrate become.
- the term "flexible” is to be understood as meaning “deformable”, in particular “flexible.”
- both elastic and plastic both reversible and irreversible deformability can be given in that they can be provided with a curvature along their longitudinal axis (or multiple curves) which is permanently maintained.
- wire or fiber pieces allows good distinctness between original and imitation (counterfeit), since the pieces have a characteristic light reflection Due to their 3D structure, they can be recognized as pieces by the naked eye from different angles and the 3D structure can also be felt. In addition, the pieces can overlap and thus create a more complex and even more perceptible 3D structure.
- a development of the method according to the invention which is advantageous and therefore preferred on account of the improved detection properties can be distinguished by the fact that plastic or metal wire pieces, in particular copper wire pieces, are applied to the substrate or introduced into the substrate.
- a development of the method according to the invention that is advantageous and therefore preferred in terms of simple production can be distinguished by the fact that the wire or fiber pieces are applied to a feature area of the substrate pretreated with adhesive, in particular scattered.
- An advantageous because of their robustness and therefore preferred embodiment of the method according to the invention may be characterized in that the wire or fiber pieces with a protective layer, in particular with a laminate, are covered.
- Development of the method according to the invention may be distinguished by the fact that the fiber pieces are transferred to the substrate with a fluid, in particular with printing ink or lacquer.
- a refinement of the method according to the invention which is advantageous and therefore preferred in terms of improved protection against counterfeiting can be distinguished by the fact that the wire or fiber pieces have at least one curvature.
- the method can be characterized in that colored or fluorescent wire or fiber pieces are applied to the substrate or introduced into the substrate.
- a because of their robustness and improved counterfeit protection advantageous and therefore preferred embodiment of the method according to the invention may be characterized in that the wire or fiber pieces are placed in a nonwoven or a film applied to the substrate.
- a printed product according to the invention with a security feature is characterized in that the security feature has a flexible piece of wire or fiber applied to a substrate - forming a random pattern.
- a printing material processing machine e.g. Printing machine, in particular sheet-fed rotary lithographic printing press, or printing finishing machine - to be seen, which are suitable for carrying out one of the above-mentioned methods according to the invention, e.g. by appropriate application devices configured.
- a method according to the invention for checking the authenticity of a product has the following method steps: a signature assigned to the product is recorded, the signature is transferred by decryption into an identifier, a comparison feature is generated from the identifier, and the comparison feature is computer-aided with an image of the Product associated random pattern.
- the method according to the invention makes it advantageously possible to check the authenticity of a product, making it possible to use a security feature that is simple to produce and easy to detect (using conventional means, such as camera mobile devices) that is cryptographically simple and error-free to evaluate.
- An advantageous because of their ease of use and therefore preferred embodiment of the method can be characterized in that the signature is detected by a camera of a mobile device and that the comparison feature is displayed in the display of the mobile device.
- An advantageous and therefore preferred development of the method according to the invention which is advantageous for the user due to the foreseeability of counterfeiting, can be characterized in that the comparison feature in the display of the mobile radio device is superimposed on the image of the random pattern.
- a method for protecting products against counterfeiting comprises the following method steps: a cryptographic random pattern of flexible wire or fiber pieces is generated, the random pattern is detected by a camera, an identifier is generated from the image of the random pattern, the identifier is encrypted with a secret key a signature is transferred, the random pattern and the signature are applied to the product to be protected, the signature is detected by a camera, the signature is transferred by decryption with a public key in the identifier, from the identifier is a comparison feature is generated, the comparison feature is computer-aided overlaid with a picture of the random pattern and compared.
- the method according to the invention makes it advantageously possible to protect products against counterfeiting, whereby a security feature which can be produced easily and inexpensively and can be easily and reliably evaluated by conventional means such as camera mobile telephones is also made available.
- Figure 1 is a schematic view of a first embodiment of a security feature produced according to the invention
- Figure 2 is a schematic view of a second embodiment of a security feature produced according to the invention.
- FIGS 3a-3e sequence of a preferred embodiment of a method according to the invention for protecting products from counterfeiting.
- the inventive security feature on a substrate is essentially based on a special random pattern, which is detected and evaluated after its production according to the invention. into a characteristic vector describing the random pattern and into a - optionally supplemented by further data and (asymmetrically-) encrypted - signature is überfart.
- the signature produced in this way is likewise applied to the substrate, preferably printed, and serves for the authenticity check in comparison with the random pattern.
- a comparison random pattern or from the random pattern a comparison signature are calculated. In both cases, therefore, the user must be provided with a key, preferably a public key.
- Such a cryptography method is described, for example, in DE 10 2008 014 322, which has not yet been disclosed, for a random pattern produced with cold foil or adhesively bonded particles.
- DE 10 2008 014 322 is referred to in this application with regard to the disclosed cryptography and evaluation method.
- the random pattern described in this application forms a cryptographic random pattern, ie a random pattern that can not or only uneconomically mimic and that allows by its special nature, a capture, encryption, decryption and comparison in a simple and error-free manner. It thus serves not only the general counterfeiting and / or manipulation protection, but also the individual product protection, ie individual products can be specifically recognized as counterfeits.
- a cryptographic random pattern is preferably a random local pattern, ie, a random pattern selectively positioned at a defined, localized location of the substrate and not a random pattern extending substantially over the entire substrate or large areas thereof.
- FIG. 1 shows a schematic view of a first embodiment of a security feature produced according to the invention.
- a substantially flat substrate preferably of paper, cardboard or plastic (e.g., a paper or cardboard sheet or a plastic label), preferably has a printed area 2, e.g. Text and / or image.
- the substrate thus preferably forms a printed product, e.g. a product made in lithographic offset printing like packaging.
- the substrate has a limited spatial extent, preferably limited to an area of about 50 to about 500 square millimeters, e.g. about 20 by 20 millimeters large - security feature 3 on.
- the security feature comprises a cryptographic random pattern 4 and a signature 5 corresponding thereto.
- the security feature may further comprise a frame 6 which is preferably printed, e.g. in dark or black color, or other marking, e.g. Crosshairs, include.
- the frame essentially serves as a reference feature in the detection and evaluation of the random pattern.
- Section A shows the security feature in an enlarged view.
- the cryptographic random pattern 4 of the security feature 3 is produced according to the first embodiment of the invention by applying flexible wire or fiber pieces 7, ie wire or fiber material of limited length, to the substrate in a feature area 8 corresponding to the security feature.
- Both the Wire and fiber pieces are thin and therefore flexible in relation to their respective lengths.
- Fiber pieces differ from wire pieces essentially by the smaller diameter.
- the fiber pieces are also referred to as staple fibers. Preferably, about 3 to about 20 pieces are applied.
- the flexible wire pieces 7 used are preferably metal wire, but plastic wire can also be used. Particularly preferred is copper wire, e.g. about 50 to 100 micrometers thick, more preferably about 80 micrometers thick, and about 3 to about 30 millimeters long.
- the cross section is preferably circular. Due to its dimensional stability (essentially invariable
- the flexible fiber pieces 7 used are preferably synthetic fibers (e.g., fibers of natural or synthetic polymers such as nylon, glass, carbon, metal or ceramic fibers), but natural fiber (e.g., vegetable fibers;
- Fibers hair or animal silk, whether or not of human origin; Mineral fibers
- threads i. E. a fiber composite produced from individual fibers (in this application, fibers are also understood to mean such fiber composites).
- the production of the security feature 3 shown in FIG. 1 can preferably take place as follows:
- the feature area 8 is pretreated with an adhesive 9 (for the sake of recognizability only partially and shown as lines), eg UV adhesive, ie by local, restricted to the feature area
- an adhesive 9 brought into a sticky state e.g UV adhesive, ie by local, restricted to the feature area
- an application device 10 can be used, for example a spraying or rolling device.
- the wire or fiber pieces 7 are sprinkled on the thus pretreated feature area.
- the scattering can be done, for example, with an air jet or with conveyor belts, generally with an applicator 11.
- the pieces 7 are dosed from a supply in an air jet and this fanned directed to the feature area 8; or the pieces are transferred from the supply to a conveyor belt whose
- Conveyor speed can be varied, and promoted to the feature area.
- the scattering provides for random spatial distribution and alignment of the pieces within the feature area.
- the number of pieces in the feature area is controllable via the pieces supplied per unit of time and per unit area.
- the pieces 7 may also be used exclusively or additionally by a subsequent paint or foil application (by a corresponding device 12), e.g. by a transparent or at least partially transparent laminate 13 (the recognizability because of only partially and shown as lines), fixed and protected against displacement or damage. If, instead, an opaque protective layer is provided, the elevations of the protection caused by the pieces-and preferably made more readily recognizable by coloring-can be detected.
- the wire or fiber material may be extruded or advanced and cut to a predetermined or random length.
- the pieces 7 also a predetermined or random curvature can be impressed.
- the wire or fiber pieces 7, or the corresponding materials may also be dyed, metallized, fluorescent or phosphorescent for ease of detection.
- the pieces Preferably, the pieces have a good optical contrast to the substrate 1, for example dark or black pieces on a light or white substrate.
- the cryptographic random pattern 4 produced in this way is detected in a corresponding manner by the manufacturer instead of the cold foil random pattern disclosed therein in detail and converted into a signature 5 which is applied to the substrate 1 .
- the cryptographic random pattern or the signature can be detected and an authentication comparison can be carried out using an available key.
- a mobile device with camera can be used, which detects the macroscopic properties of the random pattern.
- the wire or fiber pieces introduced into a nonwoven fabric can be applied to the substrate 1.
- a colored fleece with the therein, preferably different colored wire or fiber pieces 7, e.g. produced by thermal welding and a piece of this nonwoven feature area 8 is disposed on the substrate 1, e.g. bonded.
- the wire or fiber pieces 7 may be formed in a preferably transparent substrate, e.g. a film introduced or mixed with this and applied to the substrate 1.
- a preferably transparent substrate e.g. a film introduced or mixed with this and applied to the substrate 1.
- a further alternative may provide that the wire or fiber pieces 7 directly into the raw material for the production of a package, e.g. a plastic bottle is introduced, so that the random pattern 4 - preferably only locally - is found in the material of the packaging.
- a package e.g. a plastic bottle
- FIG. 2 shows a schematic view of a second embodiment of a security feature produced according to the invention.
- Section A shows the security feature 3 in an enlarged view.
- fiber pieces 7 are transferred to the substrate 1 with or in a fluid 13 (for the sake of recognizability only partially and as lines), in particular with printing ink or lacquer.
- a preferably light-colored printing ink or a transparent varnish is mixed with fiber pieces before being printed.
- the cryptographic random pattern 4 is generated by printing in a separate printing operation (by a corresponding device 1).
- the fiber pieces used in this case preferably have a recognizable and a good contrast to the fluid and the substrate forming inherent color.
- the fiber pieces can advantageously have fluorescence property, so that under UV light improved detection is made possible.
- the fiber pieces 7 used may be present as substantially smooth or crimped pieces.
- branched individual fiber pieces typically natural fibers
- fiber composites of essentially unbranched or branched single-fiber pieces can be used.
- the printing process can preferably be carried out by using a flexographic printing plate 14 in conjunction with a simplified inking unit, which is not impaired by the fiber pieces, for example, without a grid.
- a simplified inking unit which is not impaired by the fiber pieces, for example, without a grid.
- the recording and cryptographic evaluation of the random pattern 4 with conventional technology which is in principle available to every consumer, is made possible, for example with camera mobile devices.
- Both embodiments have in common, among other things, that the random pattern generated in each case can also be perceived by the naked eye, so that a first authenticity or plausibility check is also possible without any technical aids.
- both embodiments have in common that the respectively generated random patterns are simple and inexpensive to produce and the respective manufacturing process can be easily integrated into existing printing processes or printing presses.
- Figures 3a to 3e show a preferred embodiment of the method according to the invention for protecting products from forgery or manipulation.
- a pre-produced and preferably provided by a supply roll preferably about 1 cm 2 small, two-dimensional cryptographic random pattern 4 of flexible wire or fiber pieces 7 manufacturer, ie still during the production of the security feature 3, detected by a camera 15 and an image generated thereby or the associated image data of the random pattern 4 is fed to a computer 16.
- the computer 16 calculates from the image data a preferably binary characteristic vector or an identifier which contains the data about the by polygons with preferably to about 5 interpolation points approximated wire or fiber pieces.
- the characteristic vector can be supplemented by further data (so-called additional information, such as manufacturer, product, best-before date, regional code, etc.).
- additional information such as manufacturer, product, best-before date, regional code, etc.
- the encryption of the characteristic vector is carried out using a secret, ie not public or not provided to the public key.
- the encrypted characteristic vector is now available as a signature. Consequently, the signature is derived from the identifier and the identifier is derived from the random pattern.
- the signature can later, ie in the authenticity check, using a corresponding non-secret, ie public or public provided key back into the identifier (back) are transferred.
- encryption and decryption can be up Conventional methods are preferred, preferably according to the principle of so-called public key cryptography, again preferably according to the so-called RSA encryption (Rivest-Shamir-Adelman), which is also used for example in the widely used software "Pretty Good Privacy" (PGP) ,
- the signature is at least as long as the key used for encryption.
- Today's usual, considered safe key sizes are between about 640 and about 2048 bits. Due to the signature length, it is advantageous to apply the signature in a machine-readable form to the printed product, for example in the form of a one- or preferably two-dimensional coding (2D barcode, data matrix code).
- the signature 5 produced in this way is supplied by the computer 16 to a printer 17, preferably an inkjet printer, and applied, in particular printed, to the substrate 1, preferably adjacent to the feature area 8.
- the signature 5 is preferably applied in the form of a two-dimensional coding (2D barcode or data matrix code).
- the security feature 3 can additionally be provided with a protective layer, for example a laminate, in order to protect the wire or fiber pieces 7 or their positions and the signature from damage.
- the security feature 3 is then according to Figure 3c applied to a product to be protected 18, usually a package (examples: pharmaceutical packaging, electronics packaging, etc.) or a label (examples: for clothing, shoes, etc.), preferably glued and the product 18 in the Selling where it is user-side, ie can be checked for authenticity by the seller or the buyer.
- the authenticity check is carried out by, according to FIG. 3d, the security feature 3 on the user side is in turn detected by a camera 19.
- This is preferably a sufficiently resolving camera 19 of a commercially available mobile radio device ("mobile phone") 20 with a display, commercial users, that is to say the sellers, or persons who Instead, it should also be possible to provide professional test equipment with higher resolution and larger displays, by detecting counterfeits through random tests.
- mobile radio device mobile phone
- a computer / memory located in the mobile device 20 holds the public key ready for decrypting the signature.
- This public key can (preferably already before) be loaded onto the mobile device via a temporary, preferably encrypted (radio) data connection from a public server, preferably the security feature manufacturer. According to the invention and advantageously not the secret key, but only the public key must be transmitted.
- the signature 5 can be decrypted "on-site", ie with the mobile radio device or the test device at the place of storage or sale / purchase.
- Another advantage of the invention is the fact that the mobile radio device or test device at the moment Since the public key can be previously downloaded from this server, the method can not be connected to the server of the original manufacturer, and the method is therefore also applicable in places where connections are permanently or temporarily not possible
- the method according to the invention offers the advantage In particular, it is not necessary to locally provide a comprehensive data collection that contains all the previously captured images of random samples for testing purposes.
- the signature 5 is returned to the characteristic vector and this is returned to the image of the cryptographic random pattern 4, the calculated image subsequently serving as the comparison feature 21.
- the authenticity check ends with the computer-aided checking of the correspondence between the comparison feature 21 and the cryptographic random pattern 4.
- the comparison feature 21 is preferably displayed on the display 22 of the mobile device 20 and superimposed on the recorded image 23 of the random cryptographic pattern 4.
- the comparison feature 21 and the image 23 are shown slightly offset for better recognizability.
- Matching feature 21 and Figure 23 match, so
- the comparison feature 21 may be displayed in green, otherwise red, for example, to signal the user visually easily recognizable the authenticity or the forgery.
- "OK" or a comparably clear optical or acoustic signal can be output with the present authenticity
- the user eg the potential buyer of the marked product, makes his purchase decision.
- a counterfeiter could indeed create a random pattern 4 with wire or fiber pieces 7 and imprint a (random) signature 5.
- the signature 5 is not properly derived from the random pattern 4.
- a check i. generating a comparison feature 21 and comparing it with the random pattern 4 or its image 23 thus unambiguously reveals the counterfeiting and without significant time delay.
- the reverse way of transferring a signature 5 of an original to forgeries does not lead to success either, since the potential counterfeiter can not deliberately generate the associated random pattern 4.
- the fraud can be detected if there are indications from the decrypted additional information.
- the supplemental information may include a product code (that is, a product-related restriction on sales approval), a date of expiration / expiration date (a time restriction on sales approval), a region code / sales territory (ie, a territorial restriction on sales permissibility), or a seller code (that is, a personal restriction of sale), which can make it extremely difficult for the potential counterfeiter to monetize his counterfeits.
- the decrypted and the user presented additional information indicates that the product P may be offered only by day T in country L by the seller V. If the user finds a deviation between the displayed data P, T, L, V (see Figure 3e) and the data that results directly from the sales situation (which product is offered to him when, where and by whom?), so he can refrain from the purchase.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008020450 | 2008-04-23 | ||
PCT/EP2009/002914 WO2009130009A2 (de) | 2008-04-23 | 2009-04-22 | Verfahren zur herstellung eines sicherheitsmerkmals auf einem flachen substrat |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2279083A2 true EP2279083A2 (de) | 2011-02-02 |
Family
ID=41010294
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09734654A Withdrawn EP2279083A2 (de) | 2008-04-23 | 2009-04-22 | Verfahren zur herstellung eines sicherheitsmerkmals auf einem flachen substrat |
Country Status (8)
Country | Link |
---|---|
US (1) | US20090274298A1 (de) |
EP (1) | EP2279083A2 (de) |
JP (2) | JP2009262559A (de) |
KR (1) | KR20110008154A (de) |
CN (2) | CN101970244A (de) |
DE (1) | DE102009016194A1 (de) |
RU (1) | RU2507076C2 (de) |
WO (1) | WO2009130009A2 (de) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009021277A1 (de) | 2009-05-11 | 2010-11-18 | Khs Corpoplast Gmbh & Co. Kg | Verfahren und Vorrichtung zur Blasformung sowie zum Befüllen von Behältern |
DE102009040746A1 (de) * | 2009-09-08 | 2011-03-17 | Bundesdruckerei Gmbh | Kunststofffolie |
DE102010051809A1 (de) | 2009-12-17 | 2011-06-22 | Heidelberger Druckmaschinen AG, 69115 | Verfahren zum Erzeugen eines Sicherheitsmerkmals auf einem Druck- oder Verpackungsprodukt |
US8511557B2 (en) | 2009-12-19 | 2013-08-20 | Trutag Technologies, Inc. | Labeling and authenticating using a microtag |
DE102010033181A1 (de) * | 2010-08-03 | 2012-02-09 | Eppendorf Ag | Verfahren zum Wiedererkennen eines verwechselbaren Gegenstands |
DE102012010482B4 (de) | 2011-06-18 | 2022-03-17 | Heidelberger Druckmaschinen Ag | Herstellung eines Merkmales für die Fälschungssicherheit |
CN103165020B (zh) * | 2011-12-13 | 2015-04-22 | 中国人民银行印制科学技术研究所 | 一种防伪产品以及制造方法、防伪检验设备以及方法 |
AU2013225800B2 (en) | 2012-03-01 | 2015-04-09 | Sys-Tech Solutions, Inc. | Unique identification information from marked features |
US20150379321A1 (en) | 2012-03-01 | 2015-12-31 | Sys-Tech Solutions, Inc. | Methods and a system for verifying the authenticity of a mark |
US20150169928A1 (en) | 2012-03-01 | 2015-06-18 | Sys-Tech Solutions, Inc. | Methods and a system for verifying the identity of a printed item |
DE102012017398A1 (de) | 2012-09-03 | 2013-02-21 | Heidelberger Druckmaschinen Ag | Sicherheitsetikett mit einem Zufallsmuster und einer Repräsentation des Zufallsmusters |
DE102012022037A1 (de) | 2012-11-09 | 2014-05-15 | Heidelberger Druckmaschinen Ag | Sicherheitsvorrichtung zur Herstellung von Sicherheitsetiketten und Sicherheitsetikett |
CN103093691B (zh) * | 2013-01-15 | 2015-08-19 | 广东正迪科技股份有限公司 | 一体化防伪标签制造方法 |
MY179087A (en) * | 2014-02-28 | 2020-10-27 | Sys Tech Solutions Inc | Methods and a system for verifying the identity of a printed item |
AT17151U1 (de) * | 2014-03-18 | 2021-07-15 | Binder Consulting Gmbh | Sicherheitsmerkmal mit einem Markierungs- und einem Codeabschnitt |
CN104951780A (zh) * | 2014-03-28 | 2015-09-30 | 新疆维吾尔自治区畜牧科学院科技信息研究所(新疆维吾尔自治区畜牧业经济研究所) | 禽蛋防伪方法 |
GB2526261B (en) * | 2014-04-28 | 2017-08-02 | Gelliner Ltd | Encoded cells and cell arrays |
CH708200A8 (de) * | 2014-09-12 | 2015-03-13 | Boegli Gravures Sa | Verfahren und Vorrichtung zur Authentifizierung von Identifikations-Merkmalen auf einer Verpackungsfolie. |
US9940572B2 (en) | 2015-02-17 | 2018-04-10 | Sys-Tech Solutions, Inc. | Methods and a computing device for determining whether a mark is genuine |
CN104908404A (zh) * | 2015-06-01 | 2015-09-16 | 铜陵方正塑业科技有限公司 | 复合袋表面印刷方法 |
RU2661528C1 (ru) | 2015-06-16 | 2018-07-17 | Сис-Тек Солюшнз, Инк. | Способы и вычислительное устройство для определения, является ли знак подлинным |
US10150323B2 (en) | 2016-02-29 | 2018-12-11 | International Business Machines Corporation | Structure, system, method, and recording medium of implementing a directed self-assembled security pattern |
US10061958B2 (en) | 2016-03-14 | 2018-08-28 | Sys-Tech Solutions, Inc. | Methods and a computing device for determining whether a mark is genuine |
JP7023950B2 (ja) * | 2016-11-11 | 2022-02-22 | アムシルク・ゲーエムベーハー | センサとしての収縮性バイオポリマー繊維の使用 |
EP3564840A1 (de) * | 2018-05-04 | 2019-11-06 | Authentic Vision GmbH | Verfahren zur herstellung einer sicherheitsvorrichtung |
CN109191151A (zh) * | 2018-08-23 | 2019-01-11 | 东莞市将为防伪科技有限公司 | 一种防伪方法 |
CN109344935B (zh) * | 2018-10-16 | 2022-08-30 | 湖北广彩印刷有限公司 | 防伪印刷物及其印制方法 |
CN109472336B (zh) * | 2018-10-16 | 2023-05-02 | 易宝严选科技(深圳)有限公司 | 一种防伪方法 |
DE102020206060B4 (de) * | 2019-06-01 | 2021-10-21 | Heidelberger Druckmaschinen Aktiengesellschaft | Dynamische Maske für Authentifizierung |
JP7419712B2 (ja) * | 2019-09-12 | 2024-01-23 | 富士フイルムビジネスイノベーション株式会社 | 情報処理装置およびプログラム |
EP4046023A4 (de) * | 2019-10-16 | 2024-02-14 | Purdue Research Foundation | Bildverarbeitung und authentifizierung unklonbarer funktionen |
CN113077033B (zh) * | 2020-01-03 | 2024-04-30 | 北京恒维科技有限公司 | 一种防伪标签和防伪方法 |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT1023835B (it) * | 1973-05-11 | 1978-05-30 | Dasy Int Sa | Materiale per documenti |
US4218674A (en) * | 1975-09-09 | 1980-08-19 | Dasy Inter S.A. | Method and a system for verifying authenticity safe against forgery |
CA1160749A (en) | 1980-06-23 | 1984-01-17 | Robert N. Goldman | Non-counterfeitable document system |
NL8502567A (nl) * | 1985-09-19 | 1987-04-16 | Bekaert Sa Nv | Werkwijze en inrichting voor het op echtheid controleren van voorwerpen en voorwerp geschikt voor het toepassen van deze werkwijze. |
JPH0791754B2 (ja) * | 1988-06-21 | 1995-10-04 | ユニ・チャーム株式会社 | 複合不織布 |
NL8802472A (nl) * | 1988-10-10 | 1990-05-01 | Homer Hollandse Meet En Regels | Document met daarop aangebrachte randominformatie, drager van deze randominformatie alsmede werkwijze en inrichting voor het aflezen van deze randominformatie. |
NL9001368A (nl) * | 1990-06-15 | 1992-01-02 | Tel Developments B V | Beveiliging van voorwerpen of dokumenten. |
JP3325065B2 (ja) * | 1993-02-05 | 2002-09-17 | 日本発条株式会社 | 真偽を判別する手段を有する被検出物 |
JPH0836747A (ja) * | 1994-07-26 | 1996-02-06 | Kyodo Printing Co Ltd | 磁気記録媒体 |
JP3012962U (ja) * | 1994-12-26 | 1995-06-27 | 東京アルテック有限会社 | 正否判別磁気カード |
DE19614174A1 (de) * | 1996-04-10 | 1997-11-06 | Simons Druck & Vertrieb Gmbh | Verfahren zur Herstellung von mehrschichtigen Mikropartikeln |
AU7749998A (en) * | 1997-06-11 | 1998-12-30 | Nova-Technik Entwicklung Von Und Handel mit Medizinischen Ge raten GmbH | Document with an authentication feature |
FR2765014B1 (fr) * | 1997-06-24 | 2000-02-11 | Rene Boulnois | Procede d'authentification d'un document en papier, document de securite en papier, et dispositif de controle de l'authenticite de documents en papier |
US5974150A (en) * | 1997-09-30 | 1999-10-26 | Tracer Detection Technology Corp. | System and method for authentication of goods |
JP2893336B1 (ja) * | 1998-02-27 | 1999-05-17 | 新生化学工業株式会社 | 個体識別方法 |
US6054021A (en) * | 1999-01-20 | 2000-04-25 | Westvaco Corporation | Process of manufacturing authenticatable paper products |
JP2001052142A (ja) * | 1999-08-06 | 2001-02-23 | Toshiba Corp | Idカード、idカード発行装置ならびにidカード認証装置 |
US7162035B1 (en) * | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US6740142B2 (en) * | 2000-09-05 | 2004-05-25 | Donaldson Company, Inc. | Industrial bag house elements |
US6768654B2 (en) * | 2000-09-18 | 2004-07-27 | Wavezero, Inc. | Multi-layered structures and methods for manufacturing the multi-layered structures |
DE10131153A1 (de) * | 2001-06-28 | 2003-01-16 | Giesecke & Devrient Gmbh | Sicherheitselement |
DE10162537A1 (de) * | 2001-12-19 | 2003-09-04 | Norbert Hampp | Verfahren zur Authentizitätssicherung von Dokumenten |
DE10304805A1 (de) | 2003-02-05 | 2004-08-19 | Informium Ag | Verfahren zur Herstellung von Sicherheitskennzeichen |
DE102005013962B4 (de) | 2003-10-01 | 2009-04-30 | Wirnitzer, Bernhard, Prof. Dr. | Dokumentenpapier mit aufgedrucktem Sicherheitselement und Verfahren zum Erstellen fälschungsgeschützter Dokumente |
DE10346631A1 (de) * | 2003-10-08 | 2005-05-19 | Giesecke & Devrient Gmbh | Wertdokument |
RU2263354C1 (ru) * | 2004-02-18 | 2005-10-27 | Общество с ограниченной ответственностью фирма "Мера" | Способ идентификации продукции |
US7497379B2 (en) * | 2004-02-27 | 2009-03-03 | Microsoft Corporation | Counterfeit and tamper resistant labels with randomly occurring features |
JP4661107B2 (ja) * | 2004-06-30 | 2011-03-30 | 富士ゼロックス株式会社 | タグの作成方法、タグ作成装置、タグ及び物品管理システム |
EP1771813B1 (de) * | 2004-07-29 | 2011-03-02 | Bernhard Wirnitzer | Verfahren zum Codieren von Daten mittels Rasterdruckdatenspeicher |
FR2890665B1 (fr) * | 2005-09-15 | 2017-11-03 | Arjowiggins | Article securise, notamment un document de securite et/ou de valeur. |
US7787152B2 (en) * | 2005-09-30 | 2010-08-31 | Pitney Bowes Inc. | Copy detection system using correlations of copy detection patterns |
-
2009
- 2009-04-03 DE DE102009016194A patent/DE102009016194A1/de not_active Withdrawn
- 2009-04-15 JP JP2009098914A patent/JP2009262559A/ja active Pending
- 2009-04-22 WO PCT/EP2009/002914 patent/WO2009130009A2/de active Application Filing
- 2009-04-22 KR KR1020107014726A patent/KR20110008154A/ko not_active Application Discontinuation
- 2009-04-22 CN CN2009801026970A patent/CN101970244A/zh active Pending
- 2009-04-22 EP EP09734654A patent/EP2279083A2/de not_active Withdrawn
- 2009-04-22 RU RU2010147676/12A patent/RU2507076C2/ru not_active IP Right Cessation
- 2009-04-22 JP JP2011505423A patent/JP2011520644A/ja active Pending
- 2009-04-23 CN CNA2009101354197A patent/CN101564945A/zh active Pending
- 2009-07-15 US US12/503,294 patent/US20090274298A1/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2009130009A2 * |
Also Published As
Publication number | Publication date |
---|---|
JP2009262559A (ja) | 2009-11-12 |
US20090274298A1 (en) | 2009-11-05 |
CN101564945A (zh) | 2009-10-28 |
KR20110008154A (ko) | 2011-01-26 |
WO2009130009A3 (de) | 2010-04-22 |
RU2010147676A (ru) | 2012-05-27 |
DE102009016194A1 (de) | 2009-10-29 |
CN101970244A (zh) | 2011-02-09 |
WO2009130009A2 (de) | 2009-10-29 |
RU2507076C2 (ru) | 2014-02-20 |
JP2011520644A (ja) | 2011-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009130009A2 (de) | Verfahren zur herstellung eines sicherheitsmerkmals auf einem flachen substrat | |
DE69819243T2 (de) | Verfahren zum Verhindern von Fälschungen an hergestellten Gegenständen | |
EP1459266B1 (de) | Verfahren zur authentizitätssicherung von dokumenten | |
DE112007001726B4 (de) | Antifälschungsmarkierung und Verfahren zum Erfassen eines gefälschten Produkts | |
WO2008049550A2 (de) | Vorrichtungen, verfahren und prozess zur stochastischen markierung und rückverfolgung von druckprodukten | |
WO2003077196A1 (de) | Verfahren, gerätesysteme und computerprogramme zum erzeugen und verfolgen gedruckter dokumente mit einer eindeutigen kennung | |
EP2454103A2 (de) | Sicherheitselement zur kennzeichnung oder identifikation von gegenständen und lebewesen | |
WO2020001695A1 (de) | Verfahren zur herstellung für das menschliche auge nicht sichtbarer und nicht kopierbarer sicherheitselemente in einer abbildung sowie gedruckte abbildung | |
DE102015207032A1 (de) | System und Verfahren zur Kennzeichnung eines Produkts | |
DE102006019557B4 (de) | Verpackungseinheit | |
DE102009008779A1 (de) | Verfahren zum Überprüfen der Echtheit eines Druckproduktes | |
DE102014214548B4 (de) | Verfahren zur Herstellung eines Dokuments | |
EP2709800B1 (de) | Verfahren zur herstellung eines unablösbaren sicherheitssiegels | |
DE102007000881A1 (de) | Dokument mit einer integrierten Anzeigevorrichtung, Verfahren zur Herstellung eines Dokuments und Lesegerät | |
DE102007050691A1 (de) | Vorrichtungen, Verfahren und Prozess zur stochastischen Markierung und Rückverfolgung von Druckprodukten | |
WO2014124829A1 (de) | Gegenstand mit grafischen elementen, gesamtheit von gegenständen, verfahren zum herstellen und verfahren zum authentifizieren | |
WO2009121668A1 (de) | Haftetikett und verfahren zum kennzeichnen und zum authentifizieren eines gegenstandes mit haftetiketten | |
DE102007049540A1 (de) | Verfahren und Vorrichtung zum Sichern eines Objekts gegen Fälschungen | |
WO1997033252A1 (de) | Verfahren und vorrichtung zur echtheitskontrolle von dokumenten in form von chipkarten | |
DE102006027289A1 (de) | Verfahren zur Herstellung fälschungssicherer Druckerzeugnisse | |
DE102020127879A1 (de) | Verfahren zur echtheitsverifikation eines aus mehreren teilen gebildeten sicherheitsmerkmals eines wert- oder sicherheitsprodukts | |
DE102022130970A1 (de) | Verfahren zur Herstellung und Verifizierung eines individualisierten Sicherheitsdokuments | |
EP2860043B1 (de) | Verfahren zur Herstellung eines Wasserzeichens | |
DE102019123691A1 (de) | Verfahren zur prüfung der echtheit eines sicherheitsdokuments | |
DE102012010223A1 (de) | Verfahren zum Kennzeichnen von Produkten |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20101123 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: AKKAYA, SONER Inventor name: WALTHER, KARL-HEINZ Inventor name: VOSSELER, BERND Inventor name: SCHMITT-LEWEN, MARTIN |
|
DAX | Request for extension of the european patent (deleted) | ||
18D | Application deemed to be withdrawn |
Effective date: 20141103 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
R18D | Application deemed to be withdrawn (corrected) |
Effective date: 20141101 |