EP2279083A2 - Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat - Google Patents

Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat

Info

Publication number
EP2279083A2
EP2279083A2 EP09734654A EP09734654A EP2279083A2 EP 2279083 A2 EP2279083 A2 EP 2279083A2 EP 09734654 A EP09734654 A EP 09734654A EP 09734654 A EP09734654 A EP 09734654A EP 2279083 A2 EP2279083 A2 EP 2279083A2
Authority
EP
European Patent Office
Prior art keywords
substrate
random pattern
feature
wire
security feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP09734654A
Other languages
German (de)
English (en)
Inventor
Martin Schmitt-Lewen
Bernd Vosseler
Karl-Heinz Walther
Soner Akkaya
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heidelberger Druckmaschinen AG
Original Assignee
Heidelberger Druckmaschinen AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heidelberger Druckmaschinen AG filed Critical Heidelberger Druckmaschinen AG
Publication of EP2279083A2 publication Critical patent/EP2279083A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B32LAYERED PRODUCTS
    • B32BLAYERED PRODUCTS, i.e. PRODUCTS BUILT-UP OF STRATA OF FLAT OR NON-FLAT, e.g. CELLULAR OR HONEYCOMB, FORM
    • B32B37/00Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding
    • B32B37/14Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the properties of the layers
    • B32B37/24Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the properties of the layers with at least one layer not being coherent before laminating, e.g. made up from granular material sprinkled onto a substrate
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B32LAYERED PRODUCTS
    • B32BLAYERED PRODUCTS, i.e. PRODUCTS BUILT-UP OF STRATA OF FLAT OR NON-FLAT, e.g. CELLULAR OR HONEYCOMB, FORM
    • B32B2305/00Condition, form or state of the layers or laminate
    • B32B2305/22Fibres of short length
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B32LAYERED PRODUCTS
    • B32BLAYERED PRODUCTS, i.e. PRODUCTS BUILT-UP OF STRATA OF FLAT OR NON-FLAT, e.g. CELLULAR OR HONEYCOMB, FORM
    • B32B2425/00Cards, e.g. identity cards, credit cards
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T156/00Adhesive bonding and miscellaneous chemical manufacture
    • Y10T156/10Methods of surface bonding and/or assembly therefor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T156/00Adhesive bonding and miscellaneous chemical manufacture
    • Y10T156/10Methods of surface bonding and/or assembly therefor
    • Y10T156/1089Methods of surface bonding and/or assembly therefor of discrete laminae to single face of additional lamina
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T428/00Stock material or miscellaneous articles
    • Y10T428/24Structurally defined web or sheet [e.g., overall dimension, etc.]
    • Y10T428/24802Discontinuous or differential coating, impregnation or bond [e.g., artwork, printing, retouched photograph, etc.]

Definitions

  • the present invention relates to methods for producing a security feature on a flat substrate with the respective features of the preamble of claim 1 and 2. Furthermore, the present invention relates to a printed product with a
  • security features When checking the authenticity of printed products, e.g. Documents or pharmaceutical packaging, various methods are used to produce so-called security features.
  • the security features must - to become mass suitable - be inexpensive to produce and still offer a high degree of reliability in the detection of counterfeiting.
  • Printed products in particular original documents and packaging of expensive or sensitive products such as cosmetics or pharmaceutical products, can be protected against counterfeiting in a variety of ways. Often, combinations of elaborate printing methods and print media are used to increase the security against counterfeiting, such. For example, banknote printing (iris printing, guilloche, security papers, threads, tipping colors, transparency and much more). For mass-produced articles such as disposable packaging, however, such combined, expensive and thus mostly expensive processes are not very suitable.
  • DE 10 2008 014 322 which has not yet been disclosed at the time of application, describes a method for checking the authenticity of a printed product.
  • a random feature can be generated for example by defects in cold foil transfer.
  • random fine structures of a printed paper or other printing substrate are evaluated microscopically and used as a so-called fingerprint for the relevant document.
  • This fingerprint can be stored in a database with the manufacturer of the security feature and controlled by database access by the user of the security feature. By comparing the fingerprint found on the product with the fingerprint stored in the database ⁇ , the authenticity of the present document can be confirmed.
  • the fingerprint can be encrypted with a secret key and applied by the manufacturer of the security feature on the product, for example, be printed.
  • the user of the security feature can verify the fingerprint by decrypting with the public key.
  • a disadvantage of the method described, however, is that both the manufacturer and the user of the security feature must have a respective high-resolution device for receiving the fiber structure of the product.
  • DE 103 04 805 A1 describes the application of a random pattern to a product, the reading of the random pattern, the extraction of a so-called "fingerprint" from the random pattern in the form of a data record and the storage of the fingerprint
  • the fingerprint is extracted again from the random pattern and the agreement with the stored fingerprint is checked, for which the random pattern must be recorded with complex technical means with a high resolution range, eg with a microscope encryption, which used secret, ie non-public, keys, both of which are of little use in the authentication of mass-produced products.
  • an object of the present invention to provide a comparison with the prior art improved method for producing a security feature, which is a simple and inexpensive to manufacture easily (by conventional means, such as camera mobile devices) to be detected and cryptographically simple and error-free evaluation of the security feature. It is further a further or alternative object of the present invention to provide a printed product having improved, i.e., improved, upon the prior art. easy to detect and cryptographically simple and error-free to evaluate
  • Security feature It is a further or alternative object of the present invention to provide a process and printed product improved over the prior art which allows for good distinctness, visual and / or haptic, between a true security feature and a mimicked security feature. It is a further or alternative object of the present invention to provide a method for verifying the authenticity of a product which is improved over the prior art and a method for protecting a product To create products against counterfeiting, which make a simple and inexpensive to produce, easily (by conventional means, such as camera mobile devices) to be detected and used cryptographically simple and error-free to evaluate security feature.
  • An inventive method for producing a security feature on a flat substrate wherein particles - forming a cryptographic random pattern - are applied to the substrate, characterized in that flexible wire or fiber pieces in a - with the security feature corresponding - feature area applied to the substrate become.
  • An inventive method for producing a security feature in a flat substrate wherein particles - forming a cryptographic random pattern - are introduced into the substrate, characterized in that flexible wire or fiber pieces in a - corresponding to the security feature - introduced feature in the substrate become.
  • the term "flexible” is to be understood as meaning “deformable”, in particular “flexible.”
  • both elastic and plastic both reversible and irreversible deformability can be given in that they can be provided with a curvature along their longitudinal axis (or multiple curves) which is permanently maintained.
  • wire or fiber pieces allows good distinctness between original and imitation (counterfeit), since the pieces have a characteristic light reflection Due to their 3D structure, they can be recognized as pieces by the naked eye from different angles and the 3D structure can also be felt. In addition, the pieces can overlap and thus create a more complex and even more perceptible 3D structure.
  • a development of the method according to the invention which is advantageous and therefore preferred on account of the improved detection properties can be distinguished by the fact that plastic or metal wire pieces, in particular copper wire pieces, are applied to the substrate or introduced into the substrate.
  • a development of the method according to the invention that is advantageous and therefore preferred in terms of simple production can be distinguished by the fact that the wire or fiber pieces are applied to a feature area of the substrate pretreated with adhesive, in particular scattered.
  • An advantageous because of their robustness and therefore preferred embodiment of the method according to the invention may be characterized in that the wire or fiber pieces with a protective layer, in particular with a laminate, are covered.
  • Development of the method according to the invention may be distinguished by the fact that the fiber pieces are transferred to the substrate with a fluid, in particular with printing ink or lacquer.
  • a refinement of the method according to the invention which is advantageous and therefore preferred in terms of improved protection against counterfeiting can be distinguished by the fact that the wire or fiber pieces have at least one curvature.
  • the method can be characterized in that colored or fluorescent wire or fiber pieces are applied to the substrate or introduced into the substrate.
  • a because of their robustness and improved counterfeit protection advantageous and therefore preferred embodiment of the method according to the invention may be characterized in that the wire or fiber pieces are placed in a nonwoven or a film applied to the substrate.
  • a printed product according to the invention with a security feature is characterized in that the security feature has a flexible piece of wire or fiber applied to a substrate - forming a random pattern.
  • a printing material processing machine e.g. Printing machine, in particular sheet-fed rotary lithographic printing press, or printing finishing machine - to be seen, which are suitable for carrying out one of the above-mentioned methods according to the invention, e.g. by appropriate application devices configured.
  • a method according to the invention for checking the authenticity of a product has the following method steps: a signature assigned to the product is recorded, the signature is transferred by decryption into an identifier, a comparison feature is generated from the identifier, and the comparison feature is computer-aided with an image of the Product associated random pattern.
  • the method according to the invention makes it advantageously possible to check the authenticity of a product, making it possible to use a security feature that is simple to produce and easy to detect (using conventional means, such as camera mobile devices) that is cryptographically simple and error-free to evaluate.
  • An advantageous because of their ease of use and therefore preferred embodiment of the method can be characterized in that the signature is detected by a camera of a mobile device and that the comparison feature is displayed in the display of the mobile device.
  • An advantageous and therefore preferred development of the method according to the invention which is advantageous for the user due to the foreseeability of counterfeiting, can be characterized in that the comparison feature in the display of the mobile radio device is superimposed on the image of the random pattern.
  • a method for protecting products against counterfeiting comprises the following method steps: a cryptographic random pattern of flexible wire or fiber pieces is generated, the random pattern is detected by a camera, an identifier is generated from the image of the random pattern, the identifier is encrypted with a secret key a signature is transferred, the random pattern and the signature are applied to the product to be protected, the signature is detected by a camera, the signature is transferred by decryption with a public key in the identifier, from the identifier is a comparison feature is generated, the comparison feature is computer-aided overlaid with a picture of the random pattern and compared.
  • the method according to the invention makes it advantageously possible to protect products against counterfeiting, whereby a security feature which can be produced easily and inexpensively and can be easily and reliably evaluated by conventional means such as camera mobile telephones is also made available.
  • Figure 1 is a schematic view of a first embodiment of a security feature produced according to the invention
  • Figure 2 is a schematic view of a second embodiment of a security feature produced according to the invention.
  • FIGS 3a-3e sequence of a preferred embodiment of a method according to the invention for protecting products from counterfeiting.
  • the inventive security feature on a substrate is essentially based on a special random pattern, which is detected and evaluated after its production according to the invention. into a characteristic vector describing the random pattern and into a - optionally supplemented by further data and (asymmetrically-) encrypted - signature is überfart.
  • the signature produced in this way is likewise applied to the substrate, preferably printed, and serves for the authenticity check in comparison with the random pattern.
  • a comparison random pattern or from the random pattern a comparison signature are calculated. In both cases, therefore, the user must be provided with a key, preferably a public key.
  • Such a cryptography method is described, for example, in DE 10 2008 014 322, which has not yet been disclosed, for a random pattern produced with cold foil or adhesively bonded particles.
  • DE 10 2008 014 322 is referred to in this application with regard to the disclosed cryptography and evaluation method.
  • the random pattern described in this application forms a cryptographic random pattern, ie a random pattern that can not or only uneconomically mimic and that allows by its special nature, a capture, encryption, decryption and comparison in a simple and error-free manner. It thus serves not only the general counterfeiting and / or manipulation protection, but also the individual product protection, ie individual products can be specifically recognized as counterfeits.
  • a cryptographic random pattern is preferably a random local pattern, ie, a random pattern selectively positioned at a defined, localized location of the substrate and not a random pattern extending substantially over the entire substrate or large areas thereof.
  • FIG. 1 shows a schematic view of a first embodiment of a security feature produced according to the invention.
  • a substantially flat substrate preferably of paper, cardboard or plastic (e.g., a paper or cardboard sheet or a plastic label), preferably has a printed area 2, e.g. Text and / or image.
  • the substrate thus preferably forms a printed product, e.g. a product made in lithographic offset printing like packaging.
  • the substrate has a limited spatial extent, preferably limited to an area of about 50 to about 500 square millimeters, e.g. about 20 by 20 millimeters large - security feature 3 on.
  • the security feature comprises a cryptographic random pattern 4 and a signature 5 corresponding thereto.
  • the security feature may further comprise a frame 6 which is preferably printed, e.g. in dark or black color, or other marking, e.g. Crosshairs, include.
  • the frame essentially serves as a reference feature in the detection and evaluation of the random pattern.
  • Section A shows the security feature in an enlarged view.
  • the cryptographic random pattern 4 of the security feature 3 is produced according to the first embodiment of the invention by applying flexible wire or fiber pieces 7, ie wire or fiber material of limited length, to the substrate in a feature area 8 corresponding to the security feature.
  • Both the Wire and fiber pieces are thin and therefore flexible in relation to their respective lengths.
  • Fiber pieces differ from wire pieces essentially by the smaller diameter.
  • the fiber pieces are also referred to as staple fibers. Preferably, about 3 to about 20 pieces are applied.
  • the flexible wire pieces 7 used are preferably metal wire, but plastic wire can also be used. Particularly preferred is copper wire, e.g. about 50 to 100 micrometers thick, more preferably about 80 micrometers thick, and about 3 to about 30 millimeters long.
  • the cross section is preferably circular. Due to its dimensional stability (essentially invariable
  • the flexible fiber pieces 7 used are preferably synthetic fibers (e.g., fibers of natural or synthetic polymers such as nylon, glass, carbon, metal or ceramic fibers), but natural fiber (e.g., vegetable fibers;
  • Fibers hair or animal silk, whether or not of human origin; Mineral fibers
  • threads i. E. a fiber composite produced from individual fibers (in this application, fibers are also understood to mean such fiber composites).
  • the production of the security feature 3 shown in FIG. 1 can preferably take place as follows:
  • the feature area 8 is pretreated with an adhesive 9 (for the sake of recognizability only partially and shown as lines), eg UV adhesive, ie by local, restricted to the feature area
  • an adhesive 9 brought into a sticky state e.g UV adhesive, ie by local, restricted to the feature area
  • an application device 10 can be used, for example a spraying or rolling device.
  • the wire or fiber pieces 7 are sprinkled on the thus pretreated feature area.
  • the scattering can be done, for example, with an air jet or with conveyor belts, generally with an applicator 11.
  • the pieces 7 are dosed from a supply in an air jet and this fanned directed to the feature area 8; or the pieces are transferred from the supply to a conveyor belt whose
  • Conveyor speed can be varied, and promoted to the feature area.
  • the scattering provides for random spatial distribution and alignment of the pieces within the feature area.
  • the number of pieces in the feature area is controllable via the pieces supplied per unit of time and per unit area.
  • the pieces 7 may also be used exclusively or additionally by a subsequent paint or foil application (by a corresponding device 12), e.g. by a transparent or at least partially transparent laminate 13 (the recognizability because of only partially and shown as lines), fixed and protected against displacement or damage. If, instead, an opaque protective layer is provided, the elevations of the protection caused by the pieces-and preferably made more readily recognizable by coloring-can be detected.
  • the wire or fiber material may be extruded or advanced and cut to a predetermined or random length.
  • the pieces 7 also a predetermined or random curvature can be impressed.
  • the wire or fiber pieces 7, or the corresponding materials may also be dyed, metallized, fluorescent or phosphorescent for ease of detection.
  • the pieces Preferably, the pieces have a good optical contrast to the substrate 1, for example dark or black pieces on a light or white substrate.
  • the cryptographic random pattern 4 produced in this way is detected in a corresponding manner by the manufacturer instead of the cold foil random pattern disclosed therein in detail and converted into a signature 5 which is applied to the substrate 1 .
  • the cryptographic random pattern or the signature can be detected and an authentication comparison can be carried out using an available key.
  • a mobile device with camera can be used, which detects the macroscopic properties of the random pattern.
  • the wire or fiber pieces introduced into a nonwoven fabric can be applied to the substrate 1.
  • a colored fleece with the therein, preferably different colored wire or fiber pieces 7, e.g. produced by thermal welding and a piece of this nonwoven feature area 8 is disposed on the substrate 1, e.g. bonded.
  • the wire or fiber pieces 7 may be formed in a preferably transparent substrate, e.g. a film introduced or mixed with this and applied to the substrate 1.
  • a preferably transparent substrate e.g. a film introduced or mixed with this and applied to the substrate 1.
  • a further alternative may provide that the wire or fiber pieces 7 directly into the raw material for the production of a package, e.g. a plastic bottle is introduced, so that the random pattern 4 - preferably only locally - is found in the material of the packaging.
  • a package e.g. a plastic bottle
  • FIG. 2 shows a schematic view of a second embodiment of a security feature produced according to the invention.
  • Section A shows the security feature 3 in an enlarged view.
  • fiber pieces 7 are transferred to the substrate 1 with or in a fluid 13 (for the sake of recognizability only partially and as lines), in particular with printing ink or lacquer.
  • a preferably light-colored printing ink or a transparent varnish is mixed with fiber pieces before being printed.
  • the cryptographic random pattern 4 is generated by printing in a separate printing operation (by a corresponding device 1).
  • the fiber pieces used in this case preferably have a recognizable and a good contrast to the fluid and the substrate forming inherent color.
  • the fiber pieces can advantageously have fluorescence property, so that under UV light improved detection is made possible.
  • the fiber pieces 7 used may be present as substantially smooth or crimped pieces.
  • branched individual fiber pieces typically natural fibers
  • fiber composites of essentially unbranched or branched single-fiber pieces can be used.
  • the printing process can preferably be carried out by using a flexographic printing plate 14 in conjunction with a simplified inking unit, which is not impaired by the fiber pieces, for example, without a grid.
  • a simplified inking unit which is not impaired by the fiber pieces, for example, without a grid.
  • the recording and cryptographic evaluation of the random pattern 4 with conventional technology which is in principle available to every consumer, is made possible, for example with camera mobile devices.
  • Both embodiments have in common, among other things, that the random pattern generated in each case can also be perceived by the naked eye, so that a first authenticity or plausibility check is also possible without any technical aids.
  • both embodiments have in common that the respectively generated random patterns are simple and inexpensive to produce and the respective manufacturing process can be easily integrated into existing printing processes or printing presses.
  • Figures 3a to 3e show a preferred embodiment of the method according to the invention for protecting products from forgery or manipulation.
  • a pre-produced and preferably provided by a supply roll preferably about 1 cm 2 small, two-dimensional cryptographic random pattern 4 of flexible wire or fiber pieces 7 manufacturer, ie still during the production of the security feature 3, detected by a camera 15 and an image generated thereby or the associated image data of the random pattern 4 is fed to a computer 16.
  • the computer 16 calculates from the image data a preferably binary characteristic vector or an identifier which contains the data about the by polygons with preferably to about 5 interpolation points approximated wire or fiber pieces.
  • the characteristic vector can be supplemented by further data (so-called additional information, such as manufacturer, product, best-before date, regional code, etc.).
  • additional information such as manufacturer, product, best-before date, regional code, etc.
  • the encryption of the characteristic vector is carried out using a secret, ie not public or not provided to the public key.
  • the encrypted characteristic vector is now available as a signature. Consequently, the signature is derived from the identifier and the identifier is derived from the random pattern.
  • the signature can later, ie in the authenticity check, using a corresponding non-secret, ie public or public provided key back into the identifier (back) are transferred.
  • encryption and decryption can be up Conventional methods are preferred, preferably according to the principle of so-called public key cryptography, again preferably according to the so-called RSA encryption (Rivest-Shamir-Adelman), which is also used for example in the widely used software "Pretty Good Privacy" (PGP) ,
  • the signature is at least as long as the key used for encryption.
  • Today's usual, considered safe key sizes are between about 640 and about 2048 bits. Due to the signature length, it is advantageous to apply the signature in a machine-readable form to the printed product, for example in the form of a one- or preferably two-dimensional coding (2D barcode, data matrix code).
  • the signature 5 produced in this way is supplied by the computer 16 to a printer 17, preferably an inkjet printer, and applied, in particular printed, to the substrate 1, preferably adjacent to the feature area 8.
  • the signature 5 is preferably applied in the form of a two-dimensional coding (2D barcode or data matrix code).
  • the security feature 3 can additionally be provided with a protective layer, for example a laminate, in order to protect the wire or fiber pieces 7 or their positions and the signature from damage.
  • the security feature 3 is then according to Figure 3c applied to a product to be protected 18, usually a package (examples: pharmaceutical packaging, electronics packaging, etc.) or a label (examples: for clothing, shoes, etc.), preferably glued and the product 18 in the Selling where it is user-side, ie can be checked for authenticity by the seller or the buyer.
  • the authenticity check is carried out by, according to FIG. 3d, the security feature 3 on the user side is in turn detected by a camera 19.
  • This is preferably a sufficiently resolving camera 19 of a commercially available mobile radio device ("mobile phone") 20 with a display, commercial users, that is to say the sellers, or persons who Instead, it should also be possible to provide professional test equipment with higher resolution and larger displays, by detecting counterfeits through random tests.
  • mobile radio device mobile phone
  • a computer / memory located in the mobile device 20 holds the public key ready for decrypting the signature.
  • This public key can (preferably already before) be loaded onto the mobile device via a temporary, preferably encrypted (radio) data connection from a public server, preferably the security feature manufacturer. According to the invention and advantageously not the secret key, but only the public key must be transmitted.
  • the signature 5 can be decrypted "on-site", ie with the mobile radio device or the test device at the place of storage or sale / purchase.
  • Another advantage of the invention is the fact that the mobile radio device or test device at the moment Since the public key can be previously downloaded from this server, the method can not be connected to the server of the original manufacturer, and the method is therefore also applicable in places where connections are permanently or temporarily not possible
  • the method according to the invention offers the advantage In particular, it is not necessary to locally provide a comprehensive data collection that contains all the previously captured images of random samples for testing purposes.
  • the signature 5 is returned to the characteristic vector and this is returned to the image of the cryptographic random pattern 4, the calculated image subsequently serving as the comparison feature 21.
  • the authenticity check ends with the computer-aided checking of the correspondence between the comparison feature 21 and the cryptographic random pattern 4.
  • the comparison feature 21 is preferably displayed on the display 22 of the mobile device 20 and superimposed on the recorded image 23 of the random cryptographic pattern 4.
  • the comparison feature 21 and the image 23 are shown slightly offset for better recognizability.
  • Matching feature 21 and Figure 23 match, so
  • the comparison feature 21 may be displayed in green, otherwise red, for example, to signal the user visually easily recognizable the authenticity or the forgery.
  • "OK" or a comparably clear optical or acoustic signal can be output with the present authenticity
  • the user eg the potential buyer of the marked product, makes his purchase decision.
  • a counterfeiter could indeed create a random pattern 4 with wire or fiber pieces 7 and imprint a (random) signature 5.
  • the signature 5 is not properly derived from the random pattern 4.
  • a check i. generating a comparison feature 21 and comparing it with the random pattern 4 or its image 23 thus unambiguously reveals the counterfeiting and without significant time delay.
  • the reverse way of transferring a signature 5 of an original to forgeries does not lead to success either, since the potential counterfeiter can not deliberately generate the associated random pattern 4.
  • the fraud can be detected if there are indications from the decrypted additional information.
  • the supplemental information may include a product code (that is, a product-related restriction on sales approval), a date of expiration / expiration date (a time restriction on sales approval), a region code / sales territory (ie, a territorial restriction on sales permissibility), or a seller code (that is, a personal restriction of sale), which can make it extremely difficult for the potential counterfeiter to monetize his counterfeits.
  • the decrypted and the user presented additional information indicates that the product P may be offered only by day T in country L by the seller V. If the user finds a deviation between the displayed data P, T, L, V (see Figure 3e) and the data that results directly from the sales situation (which product is offered to him when, where and by whom?), so he can refrain from the purchase.

Abstract

L'invention concerne un procédé de fabrication d'une caractéristique de sécurité (3) sur un substrat plat (1), par ex. sur du papier ou du carton, des particules (7) formant un motif cryptographique aléatoire (4) étant appliquées, de préférence saupoudrées, sur le substrat (1). Le procédé est caractérisé en ce que des bouts de fil métallique ou de fibre flexibles (7), notamment de fins bouts de fil de cuivre (7), sont appliqués sur le substrat (1) dans une zone de caractéristique (8) correspondant à la zone de caractéristique de sécurité (3). La caractéristique de sécurité (3) peut être pourvue d'une couche de protection (13), par ex. d'un laminé. Une caractéristique de sécurité (3) fabriquée selon l'invention peut être détectée simplement, de façon fiable, et évaluée de façon cryptographique. Ladite caractéristique de sécurité ne peut pas être reproduite au moyen de procédés d'impression connus, ou alors à des coûts élevés.
EP09734654A 2008-04-23 2009-04-22 Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat Withdrawn EP2279083A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102008020450 2008-04-23
PCT/EP2009/002914 WO2009130009A2 (fr) 2008-04-23 2009-04-22 Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat

Publications (1)

Publication Number Publication Date
EP2279083A2 true EP2279083A2 (fr) 2011-02-02

Family

ID=41010294

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09734654A Withdrawn EP2279083A2 (fr) 2008-04-23 2009-04-22 Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat

Country Status (8)

Country Link
US (1) US20090274298A1 (fr)
EP (1) EP2279083A2 (fr)
JP (2) JP2009262559A (fr)
KR (1) KR20110008154A (fr)
CN (2) CN101970244A (fr)
DE (1) DE102009016194A1 (fr)
RU (1) RU2507076C2 (fr)
WO (1) WO2009130009A2 (fr)

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009021277A1 (de) 2009-05-11 2010-11-18 Khs Corpoplast Gmbh & Co. Kg Verfahren und Vorrichtung zur Blasformung sowie zum Befüllen von Behältern
DE102009040746A1 (de) * 2009-09-08 2011-03-17 Bundesdruckerei Gmbh Kunststofffolie
DE102010051809A1 (de) 2009-12-17 2011-06-22 Heidelberger Druckmaschinen AG, 69115 Verfahren zum Erzeugen eines Sicherheitsmerkmals auf einem Druck- oder Verpackungsprodukt
US8453929B2 (en) * 2009-12-19 2013-06-04 Trutag Technologies, Inc. Producing a microtag identifier
DE102010033181A1 (de) * 2010-08-03 2012-02-09 Eppendorf Ag Verfahren zum Wiedererkennen eines verwechselbaren Gegenstands
DE102012010482B4 (de) 2011-06-18 2022-03-17 Heidelberger Druckmaschinen Ag Herstellung eines Merkmales für die Fälschungssicherheit
CN103165020B (zh) * 2011-12-13 2015-04-22 中国人民银行印制科学技术研究所 一种防伪产品以及制造方法、防伪检验设备以及方法
SG11201405180SA (en) 2012-03-01 2014-09-26 Sys Tech Solutions Inc Unique identification information from marked features
US20150169928A1 (en) 2012-03-01 2015-06-18 Sys-Tech Solutions, Inc. Methods and a system for verifying the identity of a printed item
US20150379321A1 (en) 2012-03-01 2015-12-31 Sys-Tech Solutions, Inc. Methods and a system for verifying the authenticity of a mark
DE102012017398A1 (de) 2012-09-03 2013-02-21 Heidelberger Druckmaschinen Ag Sicherheitsetikett mit einem Zufallsmuster und einer Repräsentation des Zufallsmusters
DE102012022037A1 (de) 2012-11-09 2014-05-15 Heidelberger Druckmaschinen Ag Sicherheitsvorrichtung zur Herstellung von Sicherheitsetiketten und Sicherheitsetikett
CN103093691B (zh) * 2013-01-15 2015-08-19 广东正迪科技股份有限公司 一体化防伪标签制造方法
ES2920383T3 (es) * 2014-02-28 2022-08-03 Sys Tech Solutions Inc Métodos y un sistema para verificar la identidad de un artículo impreso
AT515654A2 (de) * 2014-03-18 2015-10-15 Binder Consulting Gmbh Sicherheitsmerkmal mit einem Markierungs- und einem Codeabschnitt
CN104951780A (zh) * 2014-03-28 2015-09-30 新疆维吾尔自治区畜牧科学院科技信息研究所(新疆维吾尔自治区畜牧业经济研究所) 禽蛋防伪方法
GB2526261B (en) * 2014-04-28 2017-08-02 Gelliner Ltd Encoded cells and cell arrays
CH708200A8 (de) * 2014-09-12 2015-03-13 Boegli Gravures Sa Verfahren und Vorrichtung zur Authentifizierung von Identifikations-Merkmalen auf einer Verpackungsfolie.
US9940572B2 (en) 2015-02-17 2018-04-10 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
CN104908404A (zh) * 2015-06-01 2015-09-16 铜陵方正塑业科技有限公司 复合袋表面印刷方法
AU2016278954B2 (en) 2015-06-16 2018-05-24 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
US10150323B2 (en) 2016-02-29 2018-12-11 International Business Machines Corporation Structure, system, method, and recording medium of implementing a directed self-assembled security pattern
EP3414684A4 (fr) 2016-03-14 2019-04-03 SYS-Tech Solutions, Inc. Procédés et dispositif informatique de détermination d'authenticité d'une marque
US20190275193A1 (en) * 2016-11-11 2019-09-12 Amsilk Gmbh Use of a shrinkable biopolymer fiber as a sensor
EP3564840A1 (fr) * 2018-05-04 2019-11-06 Authentic Vision GmbH Procédé de production d'un dispositif de sécurité
CN109191151A (zh) * 2018-08-23 2019-01-11 东莞市将为防伪科技有限公司 一种防伪方法
CN109344935B (zh) * 2018-10-16 2022-08-30 湖北广彩印刷有限公司 防伪印刷物及其印制方法
CN109472336B (zh) * 2018-10-16 2023-05-02 易宝严选科技(深圳)有限公司 一种防伪方法
DE102020206060B4 (de) * 2019-06-01 2021-10-21 Heidelberger Druckmaschinen Aktiengesellschaft Dynamische Maske für Authentifizierung
JP7419712B2 (ja) * 2019-09-12 2024-01-23 富士フイルムビジネスイノベーション株式会社 情報処理装置およびプログラム
EP4046023A4 (fr) * 2019-10-16 2024-02-14 Purdue Research Foundation Traitement d'image et authentification de fonctions non clonables
CN113077033B (zh) * 2020-01-03 2024-04-30 北京恒维科技有限公司 一种防伪标签和防伪方法

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1476681A (en) * 1973-05-11 1977-06-16 Dasy Int Sa Checking the authenticity of documents
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
CA1160749A (fr) 1980-06-23 1984-01-17 Robert N. Goldman Systeme d'identification non falsifiable
NL8502567A (nl) * 1985-09-19 1987-04-16 Bekaert Sa Nv Werkwijze en inrichting voor het op echtheid controleren van voorwerpen en voorwerp geschikt voor het toepassen van deze werkwijze.
JPH0791754B2 (ja) * 1988-06-21 1995-10-04 ユニ・チャーム株式会社 複合不織布
NL8802472A (nl) * 1988-10-10 1990-05-01 Homer Hollandse Meet En Regels Document met daarop aangebrachte randominformatie, drager van deze randominformatie alsmede werkwijze en inrichting voor het aflezen van deze randominformatie.
NL9001368A (nl) * 1990-06-15 1992-01-02 Tel Developments B V Beveiliging van voorwerpen of dokumenten.
JP3325065B2 (ja) * 1993-02-05 2002-09-17 日本発条株式会社 真偽を判別する手段を有する被検出物
JPH0836747A (ja) * 1994-07-26 1996-02-06 Kyodo Printing Co Ltd 磁気記録媒体
JP3012962U (ja) * 1994-12-26 1995-06-27 東京アルテック有限会社 正否判別磁気カード
DE19614174A1 (de) 1996-04-10 1997-11-06 Simons Druck & Vertrieb Gmbh Verfahren zur Herstellung von mehrschichtigen Mikropartikeln
AU7749998A (en) * 1997-06-11 1998-12-30 Nova-Technik Entwicklung Von Und Handel mit Medizinischen Ge raten GmbH Document with an authentication feature
FR2765014B1 (fr) * 1997-06-24 2000-02-11 Rene Boulnois Procede d'authentification d'un document en papier, document de securite en papier, et dispositif de controle de l'authenticite de documents en papier
US5974150A (en) * 1997-09-30 1999-10-26 Tracer Detection Technology Corp. System and method for authentication of goods
JP2893336B1 (ja) * 1998-02-27 1999-05-17 新生化学工業株式会社 個体識別方法
US6054021A (en) * 1999-01-20 2000-04-25 Westvaco Corporation Process of manufacturing authenticatable paper products
JP2001052142A (ja) * 1999-08-06 2001-02-23 Toshiba Corp Idカード、idカード発行装置ならびにidカード認証装置
US7162035B1 (en) * 2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system
US6740142B2 (en) * 2000-09-05 2004-05-25 Donaldson Company, Inc. Industrial bag house elements
US6768654B2 (en) * 2000-09-18 2004-07-27 Wavezero, Inc. Multi-layered structures and methods for manufacturing the multi-layered structures
DE10131153A1 (de) * 2001-06-28 2003-01-16 Giesecke & Devrient Gmbh Sicherheitselement
DE10162537A1 (de) * 2001-12-19 2003-09-04 Norbert Hampp Verfahren zur Authentizitätssicherung von Dokumenten
DE10304805A1 (de) 2003-02-05 2004-08-19 Informium Ag Verfahren zur Herstellung von Sicherheitskennzeichen
DE102005013962B4 (de) 2003-10-01 2009-04-30 Wirnitzer, Bernhard, Prof. Dr. Dokumentenpapier mit aufgedrucktem Sicherheitselement und Verfahren zum Erstellen fälschungsgeschützter Dokumente
DE10346631A1 (de) * 2003-10-08 2005-05-19 Giesecke & Devrient Gmbh Wertdokument
RU2263354C1 (ru) * 2004-02-18 2005-10-27 Общество с ограниченной ответственностью фирма "Мера" Способ идентификации продукции
US7497379B2 (en) * 2004-02-27 2009-03-03 Microsoft Corporation Counterfeit and tamper resistant labels with randomly occurring features
JP4661107B2 (ja) * 2004-06-30 2011-03-30 富士ゼロックス株式会社 タグの作成方法、タグ作成装置、タグ及び物品管理システム
ATE500565T1 (de) * 2004-07-29 2011-03-15 Bernhard Wirnitzer Verfahren zum codieren von daten mittels rasterdruckdatenspeicher
FR2890665B1 (fr) * 2005-09-15 2017-11-03 Arjowiggins Article securise, notamment un document de securite et/ou de valeur.
US7787152B2 (en) * 2005-09-30 2010-08-31 Pitney Bowes Inc. Copy detection system using correlations of copy detection patterns

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2009130009A2 *

Also Published As

Publication number Publication date
RU2010147676A (ru) 2012-05-27
KR20110008154A (ko) 2011-01-26
CN101970244A (zh) 2011-02-09
WO2009130009A3 (fr) 2010-04-22
DE102009016194A1 (de) 2009-10-29
JP2011520644A (ja) 2011-07-21
CN101564945A (zh) 2009-10-28
WO2009130009A2 (fr) 2009-10-29
RU2507076C2 (ru) 2014-02-20
JP2009262559A (ja) 2009-11-12
US20090274298A1 (en) 2009-11-05

Similar Documents

Publication Publication Date Title
WO2009130009A2 (fr) Procédé de fabrication d'une caractéristique de sécurité sur un substrat plat
DE69819243T2 (de) Verfahren zum Verhindern von Fälschungen an hergestellten Gegenständen
EP1459266B1 (fr) Procédé pour protéger l'authenticité de documents
DE112007001726B4 (de) Antifälschungsmarkierung und Verfahren zum Erfassen eines gefälschten Produkts
WO2008049550A2 (fr) Dispositifs, procédé et opération de marquage stochastique et de suivi de produits imprimés
WO2003077196A1 (fr) Procede, systeme d'appareils et programme informatique permettant la production et le suivi de documents imprimes comportant une identification univoque
EP2454103A2 (fr) Élément de sécurité pour la caractérisation ou l'identification d'objets et d'êtres vivants
WO2020001695A1 (fr) Procédé permettant de produire des éléments de sécurité qui sont non visibles à l'œil humain et ne peuvent pas être copiés, dans une représentation, et représentation imprimée
DE102015207032A1 (de) System und Verfahren zur Kennzeichnung eines Produkts
DE102009008779A1 (de) Verfahren zum Überprüfen der Echtheit eines Druckproduktes
DE102014214548B4 (de) Verfahren zur Herstellung eines Dokuments
EP2210225B1 (fr) Document avec un dispositif d'affichage intégré, procédé de fabrication d'un document, et appareil de lecture
DE102007050691A1 (de) Vorrichtungen, Verfahren und Prozess zur stochastischen Markierung und Rückverfolgung von Druckprodukten
WO2014124829A1 (fr) Objet doté d'éléments graphiques, ensemble d'objets, procédé de fabrication et procédé d'authentification
EP2709800B1 (fr) Procédé de fabrication d'un sceau de sécurité non détachable
WO2009121668A1 (fr) Étiquette autocollante et procédé de marquage et d'authentification d'un objet avec des étiquettes autocollantes
DE102007049540A1 (de) Verfahren und Vorrichtung zum Sichern eines Objekts gegen Fälschungen
EP0829826B1 (fr) Dispositif pour fabriquer des documents de valeur
WO1997033252A1 (fr) Procede et dispositif pour verifier l'authenticite de documents sous la forme de cartes a puce
DE102006027289A1 (de) Verfahren zur Herstellung fälschungssicherer Druckerzeugnisse
DE102020127879A1 (de) Verfahren zur echtheitsverifikation eines aus mehreren teilen gebildeten sicherheitsmerkmals eines wert- oder sicherheitsprodukts
EP2860043B1 (fr) Procédé de fabrication d'un filigrane
DE102019123691A1 (de) Verfahren zur prüfung der echtheit eines sicherheitsdokuments
DE102012010223A1 (de) Verfahren zum Kennzeichnen von Produkten
DE102012010482A1 (de) Herstellung eines Merkmals für die Fälschungssi-cherheit

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20101123

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

RIN1 Information on inventor provided before grant (corrected)

Inventor name: AKKAYA, SONER

Inventor name: WALTHER, KARL-HEINZ

Inventor name: VOSSELER, BERND

Inventor name: SCHMITT-LEWEN, MARTIN

DAX Request for extension of the european patent (deleted)
18D Application deemed to be withdrawn

Effective date: 20141103

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

R18D Application deemed to be withdrawn (corrected)

Effective date: 20141101