EP2339547A1 - Method and device for securing a document - Google Patents

Method and device for securing a document Download PDF

Info

Publication number
EP2339547A1
EP2339547A1 EP10193517A EP10193517A EP2339547A1 EP 2339547 A1 EP2339547 A1 EP 2339547A1 EP 10193517 A EP10193517 A EP 10193517A EP 10193517 A EP10193517 A EP 10193517A EP 2339547 A1 EP2339547 A1 EP 2339547A1
Authority
EP
European Patent Office
Prior art keywords
document
image
message
symbol
authentication symbol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP10193517A
Other languages
German (de)
French (fr)
Other versions
EP2339547B1 (en
Inventor
Jean Pierre Massicot
Alain Foucou
Justin Picard
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Track and Trace SA
Original Assignee
Advanced Track and Trace SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced Track and Trace SA filed Critical Advanced Track and Trace SA
Publication of EP2339547A1 publication Critical patent/EP2339547A1/en
Application granted granted Critical
Publication of EP2339547B1 publication Critical patent/EP2339547B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes

Definitions

  • the present invention relates to a method and a device for securing documents. It applies, in particular, to allow to recognize, with the naked eye, that a document is a copy and not an original.
  • the present invention aims to remedy these disadvantages.
  • the method which is the subject of the present invention, as briefly described above, comprises a step of forming a message representative of at least one said position and a step of marking the document to represent said message. .
  • the method which is the subject of the present invention, as succinctly set forth above, comprises a step of forming a message representative of at least one authentication symbol and a step of marking the document to represent it. said message.
  • the method which is the subject of the present invention, as briefly described above, comprises a step of reading a message present on said document and, during the step of determining at least one position. at least one position depends on said message.
  • the method which is the subject of the present invention, as briefly described above, comprises a step of reading a message present on said document and, during the step of determining at least one symbol. of authentication, at least one authentication symbol depends on said message.
  • At least one said message takes the form of an encrypted matrix bar code. Thanks to these provisions, a matrix barcode reader makes it possible to know at least one position and / or at least one authentication symbol to be found on the document to authenticate it.
  • an image is formed comprising, on at least one curved line, decoration symbols that surround at least one authentication symbol.
  • an image is formed comprising decor symbols that surround at least one authentication symbol on at least two curved lines whose distance measured in a constant direction generally perpendicular to at least one of said curves, varies in having an average slope whose absolute value is between one and five percent, on at least half of said curved lines.
  • an image is formed comprising decor symbols that surround at least one authentication symbol on Bézier function curves.
  • the present invention aims a document comprising a readable content and an image having, in at least one predetermined position, a predetermined authentication symbol whose presence or absence does not change the readability of said content.
  • the present invention is directed to a computer program that can be integrated in a computer system, said program containing instructions for implementing the method that is the subject of the present invention, as briefly described above.
  • the present invention aims at a support for information readable by a computer or a microprocessor, removable or not, retaining instructions of a computer program, characterized in that it allows the implementation of the method object of the present invention as succinctly set forth above.
  • the figures 1a and 1b are identical except for the brightness, higher in the figure 1a that in the figure 1b .
  • a document 105 comprising an image 110, a character string 115, a first matrix bar code 120, a digital authentication code 125 and a second matrix bar code 130.
  • At least one predetermined position 150 there is an authentication symbol.
  • this symbol is found in different positions of the image 110 to prevent its uniqueness from identifying it as an authentication symbol. It is also observed that different symbols 155 form a decoration by being placed around each authentication symbol, on curved lines 160.
  • each authentication symbol and each position of each authentication symbol is independent of the readable content of the document, here the character string 115 and the elements 120, 125 and 130.
  • a purely visual verification, without any tools, is thus carried out thanks to the document object of the present invention.
  • At least one authentication symbol and / or at least one authentication symbol position depends on the readable content, with the naked eye, of the document.
  • the first digit of the number 135 is a "1" and the fourth digit is a "0".
  • At least one authentication symbol and / or at least one authentication symbol position depends on the readable content, by an electronic reader, of the document.
  • the matrix bar code 120, the digital authentication code 125 and / or the matrix bar code 130 represent, on the one hand, the position opposite the letter “F” and the number "7" and the symbol authentication 150 which must be there.
  • the document 105 comprises a readable content, with the naked eye, and an image comprising, in at least one predetermined position, a predetermined authentication symbol, recognizable by the naked eye, whose presence or absence does not do not modify the readability of the said content.
  • a step 205 for reading the readable content with the naked eye of the document a step 210 for reading the readable content by electronic reader of the document. Note that the reading in question can be performed in memory, if the document has not yet printed or on a printed document not yet comprising the image that will include the authentication symbol.
  • the number N of authentication symbols to be set in the image is determined. This number depends on an identifier of the payer, a document identifier or an identifier of a security level.
  • an image background is selected, the point values of which will be modulated by the symbols determined thereafter. This selection is also done, for example, according to an identifier of the payer, a document identifier or an identifier of a security level.
  • the background is, for the image 110, a black and white image which represents, partially, a zebra.
  • variable "i" is initialized to "1". The value of this variable represents the number of the authentication symbol being processed.
  • a position and a shape are determined according to the selection mode that concerns this symbol.
  • the symbol i is inserted in the background.
  • the gray level of the background at each point of the image of the symbol is lighter or darker than the average gray, and the value of this point by the darkest color, respectively the lightest.
  • the gray levels are represented on one byte, and thus takes a value between "0" and "255”
  • the gray level of a point of the background that will belong to the symbol is greater than 127, it is set to 0 and if not, it is set to 255.
  • each black symbol is surrounded by a white outline.
  • i N
  • decor symbols are added to the authentication symbols , preferably on curved, substantially sinusoidal or Bezier lines.
  • the differences between each authentication symbol and each different symbol of this authentication symbol are visible to the naked eye, for example by being caught in two distinct sets of printing characters. For example, decorating symbols that surround at least one authentication symbol on at least two curved lines whose distance measured in a constant direction generally perpendicular to at least one of said curves vary by having an average slope whose value absolute is between one and five percent, on at least half of said curved lines.
  • the mode of selection of the position or of the form is "random"
  • a mark, readable with the naked eye or by electronic reader is determined , which represents, preferentially in a numerical way, the random element of the symbol.
  • one of the elements 120 to 130 represents the position F7 and the symbol in that position.
  • the image and the mark representing at least one position or a symbol shape are printed.
  • the central unit 310 is adapted, by executing the instructions of a computer program stored in its memories 311, in combination with the server 325, to implement the steps illustrated in FIG. figure 2 and controlling the printer 315.
  • the server 325 maintains a database 330 in which an identifier of each document is kept with the associated information, such as encoding and / or encryption elements, positions and / or symbols.
  • the computer network 320 is, for example, the internet network.
  • the printer 315 is adapted to simultaneously print marks on both sides of the document 335. Alternatively, the printing of the marks on both sides is performed successively.
  • the central unit 410 is adapted, by executing the instructions of a computer program stored in its memories 411, in combination with the server 425, to implement steps of reading, of decrypting a mark encoding at least one position of an authentication symbol and / or an authentication symbol form and steps of displaying the result of this processing on a screen, and to control the image capture by the image capture means 415.
  • the server 425 maintains a database 430 in which an identifier of each document is kept with associated information, such as decoding and / or decryption elements, positions and / or symbols.
  • the computer network 420 is, for example, the internet network.
  • the image capture means 415 are, for example, constituted by a visible or invisible light source and an image sensor adapted to provide an image representative of a mark, visible or invisible, carried by a document 435.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The method involves determining a position in an image, and determining an authentication symbol. The image is formed on a document, where the image comprises the authentication symbol and decorative symbols implementing the authentication symbol on a curve line whose distance is measured along a constant direction. A message representing a position is formed on the document. The message present on the document is read, where the message is in the form of an encrypted bar code. An independent claim is also included for a device for securing a document.

Description

La présente invention concerne un procédé et un dispositif de sécurisation de document. Elle s'applique, en particulier, à permettre de reconnaître, à l'oeil nu, qu'un document est une copie et non un original.The present invention relates to a method and a device for securing documents. It applies, in particular, to allow to recognize, with the naked eye, that a document is a copy and not an original.

On connaît de nombreuses méthodes de sécurisation de document, qui permettent de déterminer qu'un document est une copie, après capture d'une image d'une partie, généralement très petite, du document et traitement de cette image pour y repérer, éventuellement, des dégradations ou des différences qui caractérisent une copie.Many document security methods are known, which make it possible to determine that a document is a copy, after capturing an image of a part, generally very small, of the document and processing this image in order to identify, possibly, degradations or differences that characterize a copy.

Cependant, ces méthodes ne sont pas applicables dans le cas où l'authentification doit être effectuée à moindre coût par une personne peu qualifiée.However, these methods are not applicable in the case where the authentication must be carried out at lower cost by a low-skilled person.

La présente invention vise à remédier à ces inconvénients.The present invention aims to remedy these disadvantages.

A cet effet, selon un premier aspect, la présente invention vise un procédé de sécurisation d'un document, caractérisé en ce qu'il comporte :

  • une étape de détermination d'au moins une position dans une image,
  • une étape de détermination d'au moins un symbole d'authentification et
  • une étape de formation d'une image sur ledit document, ladite image comportant, à chaque dite position, un dit symbole d'authentification et un décor comportant des symboles différents à d'autres positions, les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification étant visibles à l'oeil nu.
For this purpose, according to a first aspect, the present invention aims at a method of securing a document, characterized in that it comprises:
  • a step of determining at least one position in an image,
  • a step of determining at least one authentication symbol and
  • a step of forming an image on said document, said image comprising, at each said position, an authentication symbol and a decoration comprising different symbols at other positions, the differences between each authentication symbol and each different symbol of this authentication symbol being visible to the naked eye.

Grâce à ces dispositions, toute personne connaissant le moyen de déterminer chaque position où doit se trouver un symbole peut vérifier que le symbole attendu s'y trouve.With these provisions, anyone who knows how to determine each position where a symbol must be can verify that the expected symbol is there.

Selon des caractéristiques particulières, le procédé objet de la présente invention, tel que succinctement exposé ci-dessus, comporte une étape de formation d'un message représentatif d'au moins une dite position et une étape de marquage du document pour y représenter ledit message.According to particular features, the method which is the subject of the present invention, as briefly described above, comprises a step of forming a message representative of at least one said position and a step of marking the document to represent said message. .

Grâce à ces dispositions, pour l'authentification visuelle, il n'est pas nécessaire de connaître par coeur chaque position où chercher un symbole d'authentification ou de disposer d'un support indépendant identifiant cette position. Au contraire, en prenant connaissance du message marqué sur le document, on y trouve cette position. De plus, ce message peut varier d'un document à un autre pour rendre plus difficile, pour un contrefacteur, le repérage du symbole d'authentification à mettre en oeuvre pour fabriquer un document falsifié.Thanks to these provisions, for the visual authentication, it is not necessary to know by heart each position where to look for an authentication symbol or to have an independent support identifying this position. On the contrary, by reading the message marked on the document, we find this position. In addition, this message can vary from one document to another to make it more difficult for a counterfeiter, the identification of the authentication symbol to implement to manufacture a falsified document.

Selon des caractéristiques particulières, le procédé objet de la présente invention, tel que succinctement exposé ci-dessus, comporte une étape de formation d'un message représentatif d'au moins un symbole d'authentification et une étape de marquage du document pour y représenter ledit message.According to particular features, the method which is the subject of the present invention, as succinctly set forth above, comprises a step of forming a message representative of at least one authentication symbol and a step of marking the document to represent it. said message.

Grâce à ces dispositions, pour l'authentification visuelle, il n'est pas nécessaire de connaître par coeur le symbole d'authentification à recherche dans chaque position ou de disposer d'un support indépendant identifiant ce symbole. Au contraire, en prenant connaissance du message marqué sur le document, on y trouve ce symbole. De plus, ce message peut varier d'un document à un autre pour rendre plus difficile, pour un contrefacteur, le repérage du symbole d'authentification à mettre en oeuvre pour fabriquer un document falsifié.Thanks to these provisions, for the visual authentication, it is not necessary to know by heart the search authentication symbol in each position or to have an independent support identifying this symbol. On the contrary, by reading the message marked on the document, we find this symbol. In addition, this message can vary from one document to another to make it more difficult for a counterfeiter, the identification of the authentication symbol to implement to manufacture a falsified document.

Selon des caractéristiques particulières, le procédé objet de la présente invention, tel que succinctement exposé ci-dessus, comporte une étape de lecture d'un message présent sur ledit document et, au cours de l'étape de détermination d'au moins une position, au moins une position dépend dudit message.According to particular features, the method which is the subject of the present invention, as briefly described above, comprises a step of reading a message present on said document and, during the step of determining at least one position. at least one position depends on said message.

Grâce à ces dispositions, pour l'authentification visuelle, on prend connaissance du message marqué sur le document et on en déduit au moins une position où cherche un symbole d'authentification. De plus, en choisissant un message qui peut varier d'un document à un autre, on rend plus difficile, pour un contrefacteur, le repérage du symbole d'authentification à mettre en oeuvre pour fabriquer un document falsifié.Thanks to these provisions, for the visual authentication, one takes knowledge of the message marked on the document and one deduces at least a position where seeks an authentication symbol. In addition, by choosing a message that can vary from one document to another, it makes it more difficult for a counterfeiter, the identification of the authentication symbol to implement to manufacture a falsified document.

Selon des caractéristiques particulières, le procédé objet de la présente invention, tel que succinctement exposé ci-dessus, comporte une étape de lecture d'un message présent sur ledit document et, au cours de l'étape de détermination d'au moins un symbole d'authentification, au moins un symbole d'authentification dépend dudit message.According to particular features, the method which is the subject of the present invention, as briefly described above, comprises a step of reading a message present on said document and, during the step of determining at least one symbol. of authentication, at least one authentication symbol depends on said message.

Grâce à ces dispositions, pour l'authentification visuelle, on prend connaissance du message marqué sur le document et on en déduit au moins un symbole d'authentification. De plus, en choisissant un message qui peut varier d'un document à un autre, on rend plus difficile, pour un contrefacteur, le repérage du symbole d'authentification à mettre en oeuvre pour fabriquer un document falsifié.Thanks to these provisions, for the visual authentication, we take note of the message marked on the document and deduce at least one authentication symbol. In addition, by choosing a message that can vary from one document to another, it makes it more difficult for a counterfeiter, the identification of the authentication symbol to implement to manufacture a falsified document.

Selon des caractéristiques particulières, au moins un dit message prend la forme d'un code à barres matriciel chiffré. Grâce à ces dispositions, un lecteur de codes à barres matriciel permet de prendre connaissance d'au moins une position et/ou au moins un symbole d'authentification à trouver sur le document pour l'authentifier.According to particular characteristics, at least one said message takes the form of an encrypted matrix bar code. Thanks to these provisions, a matrix barcode reader makes it possible to know at least one position and / or at least one authentication symbol to be found on the document to authenticate it.

Selon des caractéristiques particulières, au cours de l'étape de formation de l'image, on forme une image comportant, sur au moins une ligne courbe, des symboles de décor qui entourent au moins un symbole d'authentification.According to particular features, during the image forming step, an image is formed comprising, on at least one curved line, decoration symbols that surround at least one authentication symbol.

Grâce à ces caractéristiques, le repérage visuel d'un symbole d'authentification est plus complexe pour le contrefacteur.Thanks to these characteristics, the visual identification of an authentication symbol is more complex for the counterfeiter.

Selon des caractéristiques particulières, au cours de l'étape de formation de l'image, on forme une image comportant des symboles de décor qui entourent au moins un symbole d'authentification sur au moins deux lignes courbes dont la distance mesurée selon une direction constante globalement perpendiculaire à au moins une desdites courbes, varie en présentant une pente moyenne dont la valeur absolue se trouve entre un et cinq pour cent, sur au moins la moitié desdites lignes courbes.According to particular features, during the image forming step, an image is formed comprising decor symbols that surround at least one authentication symbol on at least two curved lines whose distance measured in a constant direction generally perpendicular to at least one of said curves, varies in having an average slope whose absolute value is between one and five percent, on at least half of said curved lines.

Selon des caractéristiques particulières, au cours de l'étape de formation de l'image, on forme une image comportant des symboles de décor qui entourent au moins un symbole d'authentification sur des courbes de fonction de type Bézier.According to particular features, during the image forming step, an image is formed comprising decor symbols that surround at least one authentication symbol on Bézier function curves.

Selon un deuxième aspect, la présente invention vise un dispositif de sécurisation d'un document, caractérisé en ce qu'il comporte :

  • un moyen de détermination d'au moins une position dans une image,
  • un moyen de détermination d'au moins un symbole d'authentification et
  • un moyen de formation d'une image sur ledit document, ladite image comportant, à chaque dite position, un dit symbole d'authentification et un décor comportant des symboles différents à d'autres positions, les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification étant visibles à l'oeil nu.
According to a second aspect, the present invention aims at a device for securing a document, characterized in that it comprises:
  • means for determining at least one position in an image,
  • means for determining at least one authentication symbol and
  • means for forming an image on said document, said image comprising, at each said position, an authentication symbol and a decoration comprising different symbols at other positions, the differences between each authentication symbol and each different symbol of this authentication symbol being visible to the naked eye.

Selon un troisième aspect, la présente invention vise un document comportant un contenu lisible et une image comportant, en au moins une position prédéterminée, un symbole d'authentification prédéterminé dont la présence ou l'absence ne modifient pas la lisibilité dudit contenu.According to a third aspect, the present invention aims a document comprising a readable content and an image having, in at least one predetermined position, a predetermined authentication symbol whose presence or absence does not change the readability of said content.

Selon un quatrième aspect, la présente invention vise un programme d'ordinateur intégrable dans un système informatique, ledit programme contenant des instructions permettant la mise en oeuvre du procédé objet de la présente invention, tel que succinctement exposé ci-dessus.According to a fourth aspect, the present invention is directed to a computer program that can be integrated in a computer system, said program containing instructions for implementing the method that is the subject of the present invention, as briefly described above.

Selon un cinquième aspect, la présente invention vise un support d'informations lisibles par un ordinateur ou un microprocesseur, amovible ou non, conservant des instructions d'un programme informatique, caractérisé en ce qu'il permet la mise en oeuvre du procédé objet de la présente invention, tel que succinctement exposé ci-dessus.According to a fifth aspect, the present invention aims at a support for information readable by a computer or a microprocessor, removable or not, retaining instructions of a computer program, characterized in that it allows the implementation of the method object of the present invention as succinctly set forth above.

Les avantages, buts et caractéristiques de ce dispositif, de ce document, de ce programme d'ordinateur et de ce support d'information étant similaires à ceux du procédé objet de la présente invention, tel que succinctement exposé ci-dessus, ils ne sont pas rappelés ici.The advantages, aims and characteristics of this device, of this document, of this computer program and of this information carrier being similar to those of the method which is the subject of the present invention, as succinctly set forth above, they are not not remembered here.

D'autres avantages, buts et caractéristiques de la présente invention ressortiront de la description qui va suivre, faite, dans un but explicatif et nullement limitatif en regard des dessins annexés, dans lesquels :

  • les figures 1a et 1b représentent, schématiquement, un document objet de la présente invention et
  • la figure 2 représente, sous forme d'un logigramme, des étapes mises en oeuvre dans un mode de réalisation particulier du procédé objet de la présente invention,
  • la figure 3 représente, schématiquement, un mode de réalisation particulier du dispositif de fabrication objet de la présente invention et
  • la figure 4 représente, schématiquement, un mode de réalisation particulier du dispositif d'identification objet de la présente invention.
Other advantages, aims and features of the present invention will emerge from the description which follows, made for an explanatory and non-limiting purpose with reference to the appended drawings, in which:
  • the figures 1a and 1b schematically represent a document object of the present invention and
  • the figure 2 represents, in the form of a logic diagram, steps implemented in a particular embodiment of the method that is the subject of the present invention,
  • the figure 3 represents, schematically, a particular embodiment of the manufacturing device which is the subject of the present invention and
  • the figure 4 represents, schematically, a particular embodiment of the identification device object of the present invention.

On note que les figures 3 et 4 ne sont pas à l'échelle.We note that Figures 3 and 4 are not to scale.

Les figures 1a et 1b sont identiques à l'exception de la luminosité, plus élevée dans la figure 1a que dans la figure 1b.The figures 1a and 1b are identical except for the brightness, higher in the figure 1a that in the figure 1b .

On observe, en figures 1a et 1b, un document 105 comportant une image 110, une chaîne de caractères 115, un premier code à barres matriciel 120, un code numérique authentifiant 125 et un deuxième code à barres matriciel 130.We observe figures 1a and 1b , a document 105 comprising an image 110, a character string 115, a first matrix bar code 120, a digital authentication code 125 and a second matrix bar code 130.

On suppose ici que le document 105 donne des droits à son porteur identifié dans la chaîne de caractères 115. La chaîne de caractères 115 comporte un nombre 135 qui identifie le titulaire de manière unique. L'image 110 est associée à des données de repérage de position, ici des lettres de « A » à « M » 140, en abscisses, et des nombres de « 1 » à « 8 » 145, en ordonnées.It is assumed here that document 105 gives rights to its identified bearer in string 115. String 115 has a number 135 that uniquely identifies the holder. The image 110 is associated with position-identification data, here letters from "A" to "M" 140, as abscissae, and numbers from "1" to "8" 145, as ordinates.

En au moins une position prédéterminée 150, se trouve un symbole d'authentification. On observe, en figures 1a et 1b, que ce symbole se retrouve en différentes positions de l'image 110 afin d'éviter que son unicité ne permette de le repérer comme symbole d'authentification. On observe aussi que des symboles différents 155 forment un décor en étant disposés autour de chaque symbole d'authentification, sur des lignes courbes 160.In at least one predetermined position 150, there is an authentication symbol. We observe figures 1a and 1b , that this symbol is found in different positions of the image 110 to prevent its uniqueness from identifying it as an authentication symbol. It is also observed that different symbols 155 form a decoration by being placed around each authentication symbol, on curved lines 160.

Dans des modes de réalisation, chaque symbole d'authentification et chaque position de chaque symbole d'authentification est indépendant du contenu lisible du document, ici la chaîne de caractères 115 et les éléments 120, 125 et 130. Dans ce cas, il suffit, pour vérifier, à un premier niveau, l'authenticité du document 105, de savoir quel(s) symbole(s) d'authentification rechercher en quelle(s) positions(s). Une vérification purement visuelle, sans aucun outil, est ainsi effectuée grâce au document objet de la présente invention.In embodiments, each authentication symbol and each position of each authentication symbol is independent of the readable content of the document, here the character string 115 and the elements 120, 125 and 130. In this case, it suffices, to verify, at a first level, the authenticity of the document 105, which authentication symbol (s) to look for in which position (s). A purely visual verification, without any tools, is thus carried out thanks to the document object of the present invention.

Dans des modes de réalisation, au moins un symbole d'authentification et/ou au moins une position de symbole d'authentification dépend du contenu lisible, à l'oeil nu, du document. Par exemple, le première chiffre du nombre 135 est un « 1 » et le quatrième un « 0 ». Dans ce cas, il suffit, pour vérifier, à un premier niveau, l'authenticité du document 105, de chercher, dans la colonne « L », en regard du chiffre correspondant au premier chiffre du nombre 135, la valeur du quatrième chiffre du nombre 135. Dans l'exemple, on vérifie que, en regard de L et de « 1 », se trouve « 0 », le symbole d'authentification 165.In embodiments, at least one authentication symbol and / or at least one authentication symbol position depends on the readable content, with the naked eye, of the document. For example, the first digit of the number 135 is a "1" and the fourth digit is a "0". In this case, it is sufficient, to verify, at a first level, the authenticity of the document 105, to look, in the column "L", next to the figure corresponding to the first digit of the number 135, the value of the fourth digit of the number 135. In the example, it is verified that, opposite L and "1", is "0", the authentication symbol 165.

Dans des modes de réalisation, au moins un symbole d'authentification et/ou au moins une position de symbole d'authentification dépend du contenu lisible, par un lecteur électronique, du document. Par exemple, le code à barres matriciel 120, le code numérique authentifiant 125 et/ou le code à barres matriciel 130 représentent, d'une part, la position en regard de la lettre « F » et du chiffre « 7 » et le symbole d'authentification 150 qui doit s'y trouver.In embodiments, at least one authentication symbol and / or at least one authentication symbol position depends on the readable content, by an electronic reader, of the document. For example, the matrix bar code 120, the digital authentication code 125 and / or the matrix bar code 130 represent, on the one hand, the position opposite the letter "F" and the number "7" and the symbol authentication 150 which must be there.

Dans ce cas, il suffit, pour vérifier, à un premier niveau, l'authenticité du document 105, de lire, avec le lecteur électronique, le contenu de l'élément qui code la position et/ou le symbole d'authentification puis de chercher, en cette position, le symbole considéré.In this case, it is sufficient, to verify, at a first level, the authenticity of the document 105, to read, with the electronic reader, the content of the element which codes the position and / or the authentication symbol and then look for the symbol in this position.

Ainsi, le document 105 comporte un contenu lisible, à l'oeil nu, et une image comportant, en au moins une position prédéterminée, un symbole d'authentification prédéterminé, reconnaissable à l'oeil nu, dont la présence ou l'absence ne modifient pas la lisibilité dudit contenu.Thus, the document 105 comprises a readable content, with the naked eye, and an image comprising, in at least one predetermined position, a predetermined authentication symbol, recognizable by the naked eye, whose presence or absence does not do not modify the readability of the said content.

On observe, en figure 2, une étape 205 de lecture du contenu lisible à l'oeil nu du document, une étape 210 de lecture du contenu lisible par lecteur électronique du document. On note que la lecture en question peut être effectuée en mémoire, si le document n'a pas encore été imprimé ou sur un document imprimé ne comportant pas encore l'image qui comportera le symbole d'authentification.We observe figure 2 , a step 205 for reading the readable content with the naked eye of the document, a step 210 for reading the readable content by electronic reader of the document. Note that the reading in question can be performed in memory, if the document has not yet printed or on a printed document not yet comprising the image that will include the authentication symbol.

Au cours d'une étape 215, on détermine le nombre N de symboles d'authentification à positionner dans l'image. Ce nombre fonction d'un identifiant du donneur d'ordre, d'un identifiant du document ou d'un identifiant d'un niveau de sécurité.During a step 215, the number N of authentication symbols to be set in the image is determined. This number depends on an identifier of the payer, a document identifier or an identifier of a security level.

Au cours d'une étape 220, on détermine, pour chaque symbole d'authentification, le mode de sélection de position et le mode de sélection de la forme du symbole, par exemple en fonction d'un identifiant du donneur d'ordre, d'un identifiant du document ou d'un identifiant d'un niveau de sécurité. Parmi les modes de sélection, on peut choisir:

  • mode de sélection fixe,
  • mode de sélection en fonction de contenu lisible à l'oeil nu,
  • mode de sélection en fonction de contenu lisible par lecteur électronique et
  • mode de sélection aléatoire (qui sera représenté par un contenu lisible, à l'oeil nu ou par lecteur électronique).
During a step 220, for each authentication symbol, the mode of selection of position and the mode of selection of the shape of the symbol are determined, for example as a function of a identifier of the payer, d. an identifier of the document or an identifier of a security level. Among the selection modes, we can choose:
  • fixed selection mode,
  • selection mode according to content readable with the naked eye,
  • selection mode based on content readable by electronic reader and
  • Random selection mode (which will be represented by readable content, to the naked eye or by electronic reader).

On observe aussi que la combinaison des modes de sélection donne neuf cas pour chaque symbole d'authentification et qu'un panachage des différents modes de sélection peut être effectué pour les différents symboles.It is also observed that the combination of the selection modes gives nine cases for each authentication symbol and that a mix of the different selection modes can be performed for the different symbols.

Au cours d'une étape 225, on sélectionne un arrière-plan d'image dont les valeurs ponctuelles seront modulées par les symboles déterminés ensuite. Cette sélection aussi se fait, par exemple, en fonction d'un identifiant du donneur d'ordre, d'un identifiant du document ou d'un identifiant d'un niveau de sécurité. Par exemple, en figures 1a et 1b, l'arrière plan est, pour l'image 110, une image en noir et blanc qui représente, partiellement, un zèbre.During a step 225, an image background is selected, the point values of which will be modulated by the symbols determined thereafter. This selection is also done, for example, according to an identifier of the payer, a document identifier or an identifier of a security level. For example, in figures 1a and 1b , the background is, for the image 110, a black and white image which represents, partially, a zebra.

Au cours d'une étape 230, on initialise la variable « i » à « 1 ». La valeur de cette variable représente le numéro du symbole d'authentification en cours de traitement.During a step 230, the variable "i" is initialized to "1". The value of this variable represents the number of the authentication symbol being processed.

Au cours d'une étape 235, on détermine, pour le symbole d'authentification i, une position et une forme, selon le mode de sélection qui concerne ce symbole.During a step 235, for the authentication symbol i, a position and a shape are determined according to the selection mode that concerns this symbol.

Au cours d'une étape 240, on insère le symbole i dans l'arrière plan. A cet effet, pour éviter que le symbole soit illisible, on détermine si le niveau de gris de l'arrière plan, en chaque point de l'image du symbole est plus clair ou plus sombre que le gris moyen et on remplace la valeur de ce point par la couleur la plus sombre, respectivement la plus claire. Par exemple, si les niveaux de gris sont représentés sur un octet, et prend donc une valeur entre « 0 » et « 255 », si le niveau gris d'un point de l'arrière plan qui appartiendra au symbole est supérieur à 127, on le met à 0 et sinon, on le met à 255. Alternativement, on entoure chaque symbole en noir, d'un contour blanc.During a step 240, the symbol i is inserted in the background. For this purpose, to prevent the symbol from being unreadable, it is determined whether the gray level of the background, at each point of the image of the symbol is lighter or darker than the average gray, and the value of this point by the darkest color, respectively the lightest. For example, if the gray levels are represented on one byte, and thus takes a value between "0" and "255", if the gray level of a point of the background that will belong to the symbol is greater than 127, it is set to 0 and if not, it is set to 255. Alternatively, each black symbol is surrounded by a white outline.

Au cours d'une étape 245, on détermine si la variable i prend la valeur N.During a step 245, it is determined whether the variable i takes the value N.

Si non, au cours d'une étape 250, on incrémente la valeur de i et on retourne à l'étape 235. Si i = N, au cours d'une étape 255, on ajoute des symboles de décor aux symboles d'authentification, préférentiellement sur des lignes courbes, sensiblement sinusoïdale ou de Bézier. Les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification sont visibles à l'oeil nu, par exemple en étant pris dans deux ensembles distincts de caractères d'imprimerie. Par exemple, on positionne des symboles de décor qui entourent au moins un symbole d'authentification sur au moins deux lignes courbes dont la distance mesurée selon une direction constante globalement perpendiculaire à au moins une desdites courbes, varie en présentant une pente moyenne dont la valeur absolue se trouve entre un et cinq pour cent, sur au moins la moitié desdites lignes courbes.If not, during a step 250, the value of i is incremented and we return to step 235. If i = N, during a step 255, decor symbols are added to the authentication symbols , preferably on curved, substantially sinusoidal or Bezier lines. The differences between each authentication symbol and each different symbol of this authentication symbol are visible to the naked eye, for example by being caught in two distinct sets of printing characters. For example, decorating symbols that surround at least one authentication symbol on at least two curved lines whose distance measured in a constant direction generally perpendicular to at least one of said curves vary by having an average slope whose value absolute is between one and five percent, on at least half of said curved lines.

Si, pour au moins un symbole d'authentification, le mode de sélection de la position ou de la forme est « aléatoire », au cours d'une étape 260, on détermine une marque, lisible à l'oeil nu ou par lecteur électronique, qui représente, préférentiellement de manière chiffrée, l'élément aléatoire du symbole. Par exemple, en figures 1a et 1b, l'un des éléments 120 à 130 représente la position F7 et le symbole qui se trouve en cette position.If, for at least one authentication symbol, the mode of selection of the position or of the form is "random", during a step 260, a mark, readable with the naked eye or by electronic reader, is determined , which represents, preferentially in a numerical way, the random element of the symbol. For example, in figures 1a and 1b one of the elements 120 to 130 represents the position F7 and the symbol in that position.

Au cours d'une étape 265, on imprime l'image et la marque représentant au moins une position ou une forme de symbole.During a step 265, the image and the mark representing at least one position or a symbol shape are printed.

Ainsi, le mode de réalisation particulier du procédé de sécurisation objet de la présente invention illustré en figure 2 comporte :

  • une étape, 220 et 235, de détermination d'au moins une position dans une image,
  • une étape, 220 et 235, de détermination d'au moins un symbole d'authentification et
  • une étape, 240 à 265, de formation d'une image sur ledit document, ladite image comportant, à chaque dite position, un dit symbole d'authentification et un décor comportant des symboles différents à d'autres positions, les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification étant visibles à l'oeil nu.
Thus, the particular embodiment of the method of securing object of the present invention illustrated in figure 2 has:
  • a step, 220 and 235, of determining at least one position in an image,
  • a step, 220 and 235, of determining at least one authentication symbol and
  • a step 240 to 265 for forming an image on said document, said image comprising, at each said position, an authentication symbol and a decoration comprising different symbols at other positions, the differences between each symbol authentication symbol and each different symbol of this authentication symbol being visible to the naked eye.

On observe, en figure 3, un dispositif de fabrication 305 comportant:

  • une unité centrale 310 munie de mémoires 311,
  • une imprimante 315 et
  • une connexion à un réseau informatique 320, pour communiquer avec un serveur distant 325.
We observe figure 3 a manufacturing device 305 comprising:
  • a central unit 310 provided with memories 311,
  • a printer 315 and
  • a connection to a computer network 320, to communicate with a remote server 325.

L'unité centrale 310 est adaptée, en exécutant les instructions d'un programme d'ordinateur conservé dans ses mémoires 311, en combinaison avec le serveur 325, à implémenter les étapes illustrées en figure 2 et à commander l'imprimante 315. Le serveur 325 conserve une base de données 330 dans laquelle un identifiant de chaque document est conservé avec les informations associées, comme des éléments de codage et/ou de chiffrement, des positions et/ou des symboles.The central unit 310 is adapted, by executing the instructions of a computer program stored in its memories 311, in combination with the server 325, to implement the steps illustrated in FIG. figure 2 and controlling the printer 315. The server 325 maintains a database 330 in which an identifier of each document is kept with the associated information, such as encoding and / or encryption elements, positions and / or symbols.

Le réseau informatique 320 est, par exemple, le réseau internet.The computer network 320 is, for example, the internet network.

L'imprimante 315 est adaptée à imprimer simultanément des marques sur les deux faces du document 335. En variante, l'impression des marques sur les deux faces est effectuée successivement.The printer 315 is adapted to simultaneously print marks on both sides of the document 335. Alternatively, the printing of the marks on both sides is performed successively.

Ainsi, le mode de réalisation particulier du dispositif de sécurisation d'un document, illustré en figures 3 comporte :

  • un moyen de détermination d'au moins une position dans une image,
  • un moyen de détermination d'au moins un symbole d'authentification et
  • un moyen de formation d'une image sur ledit document, ladite image comportant, à chaque dite position, un dit symbole d'authentification et un décor comportant des symboles différents à d'autres positions, les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification étant visibles à l'oeil nu.
Thus, the particular embodiment of the device for securing a document, illustrated in figures 3 has:
  • means for determining at least one position in an image,
  • means for determining at least one authentication symbol and
  • means for forming an image on said document, said image comprising, at each said position, an authentication symbol and a decoration comprising different symbols at other positions, the differences between each authentication symbol and each different symbol of this authentication symbol being visible to the naked eye.

On observe, en figure 4, un dispositif d'identification 405 comportant:

  • une unité centrale 410 munie de mémoires 411,
  • un moyen de capture d'image 415 et
  • une connexion à un réseau informatique 420, pour communiquer avec un serveur distant 425.
We observe figure 4 an identification device 405 comprising:
  • a central unit 410 provided with memories 411,
  • image capture means 415 and
  • a connection to a computer network 420, to communicate with a remote server 425.

L'unité centrale 410 est adaptée, en exécutant les instructions d'un programme d'ordinateur conservé dans ses mémoires 411, en combinaison avec le serveur 425, à implémenter des étapes de lecture, de déchiffrement d'une marque codant au moins une position de symbole d'authentification et/ou une forme de symbole d'authentification et des étapes d'affichage du résultat de ce traitement sur un écran, et à commander la capture d'image par les moyens de capture d'image 415. Le serveur 425 conserve une base de données 430 dans laquelle un identifiant de chaque document est conservé avec les informations associées, comme des éléments de décodage et/ou de déchiffrement, des positions et/ou des symboles.The central unit 410 is adapted, by executing the instructions of a computer program stored in its memories 411, in combination with the server 425, to implement steps of reading, of decrypting a mark encoding at least one position of an authentication symbol and / or an authentication symbol form and steps of displaying the result of this processing on a screen, and to control the image capture by the image capture means 415. The server 425 maintains a database 430 in which an identifier of each document is kept with associated information, such as decoding and / or decryption elements, positions and / or symbols.

Le réseau informatique 420 est, par exemple, le réseau internet. Les moyens de capture d'image 415 sont, par exemple constitué d'une source de lumière visible ou invisible et d'un capteur d'image adapté à fournir une image représentative d'une marque, visible ou invisible portée par un document 435.The computer network 420 is, for example, the internet network. The image capture means 415 are, for example, constituted by a visible or invisible light source and an image sensor adapted to provide an image representative of a mark, visible or invisible, carried by a document 435.

Claims (15)

Procédé de sécurisation d'un document, caractérisé en ce qu'il comporte : - une étape (220, 235) de détermination d'au moins une position dans une image, - une étape (220, 235) de détermination d'au moins un symbole d'authentification
et
- une étape (240 à 265) de formation d'une image sur ledit document, ladite image comportant, à chaque dite position, un dit symbole d'authentification et un décor comportant des symboles différents à d'autres positions, les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification étant visibles à l'oeil nu.
Method for securing a document, characterized in that it comprises: a step (220, 235) of determining at least one position in an image, a step (220, 235) for determining at least one authentication symbol
and
a step (240 to 265) for forming an image on said document, said image comprising, at each said position, an authentication symbol and a decoration comprising different symbols at other positions, the differences between each authentication symbol and each different symbol of this authentication symbol being visible to the naked eye.
Procédé selon la revendication 1, qui comporte une étape de formation d'un message représentatif d'au moins une dite position et une étape de marquage du document pour y représenter ledit message.The method of claim 1, which comprises a step of forming a message representative of at least one said position and a step of marking the document to represent said message. Procédé selon l'une quelconque des revendications 1 ou 2, qui comporte une étape de formation d'un message représentatif d'au moins un symbole d'authentification et une étape de marquage du document pour y représenter ledit message.A method according to any one of claims 1 or 2, which comprises a step of forming a message representative of at least one authentication symbol and a step of marking the document to represent said message. Procédé selon l'une quelconque des revendications 1 à 3, qui comporte une étape de lecture d'un message présent sur ledit document et, au cours de l'étape de détermination d'au moins une position, au moins une position dépend dudit message.Method according to any one of claims 1 to 3, which comprises a step of reading a message present on said document and, during the step of determining at least one position, at least one position depends on said message . Procédé selon l'une quelconque des revendications 1 à 4, qui comporte une étape de lecture d'un message présent sur ledit document et, au cours de l'étape de détermination d'au moins un symbole d'authentification, au moins un symbole d'authentification dépend dudit message.Method according to any one of claims 1 to 4, which comprises a step of reading a message present on said document and, during the step of determining at least one authentication symbol, at least one symbol authentication depends on the message. Procédé selon l'une quelconque des revendications 2 à 5, dans lequel au moins un dit message prend la forme d'un code à barres matriciel chiffré.A method as claimed in any one of claims 2 to 5, wherein at least one said message is in the form of an encrypted matrix bar code. Procédé selon l'une quelconque des revendications 1 à 6, dans lequel, au cours de l'étape de formation de l'image, on forme une image comportant, sur au moins une ligne courbe, des symboles de décor qui entourent au moins un symbole d'authentification.A method according to any one of claims 1 to 6, wherein during the image-forming step, an image is formed comprising, on at least one curved line, decorative symbols which surround at least one authentication symbol. Procédé selon l'une quelconque des revendications 1 à 7, dans lequel, au cours de l'étape de formation de l'image, on forme une image comportant des symboles de décor qui entourent au moins un symbole d'authentification sur au moins deux lignes courbes dont la distance mesurée selon une direction constante globalement perpendiculaire à au moins une desdites courbes, varie en présentant une pente moyenne dont la valeur absolue se trouve entre un et cinq pour cent, sur au moins la moitié desdites lignes courbes.A method according to any one of claims 1 to 7, wherein during the image forming step, an image is formed comprising decor symbols which surround at least one authentication symbol on at least two Curved lines whose distance measured in a constant direction generally perpendicular to at least one of said curves, varies by having an average slope whose absolute value is between one and five percent, on at least half of said curved lines. Procédé selon l'une quelconque des revendications 1 à 8, dans lequel, au cours de l'étape de formation de l'image, on forme une image comportant des symboles de décor qui entourent au moins un symbole d'authentification sur des courbes de fonction de type Bézier.A method according to any one of claims 1 to 8, wherein, during the image forming step, an image is formed comprising decor symbols that surround at least one authentication symbol on color curves. Bezier type function. Dispositif de sécurisation d'un document, caractérisé en ce qu'il comporte : - un moyen de détermination d'au moins une position dans une image, - un moyen de détermination d'au moins un symbole d'authentification et - un moyen de formation d'une image sur ledit document, ladite image comportant, à chaque dite position, un dit symbole d'authentification et un décor comportant des symboles différents à d'autres positions, les différences entre chaque symbole d'authentification et chaque symbole différent de ce symbole d'authentification étant visibles à l'oeil nu. Device for securing a document, characterized in that it comprises: a means for determining at least one position in an image, a means for determining at least one authentication symbol and a means of forming an image on said document, said image comprising, at each said position, an authentication symbol and a decoration comprising different symbols at other positions, the differences between each authentication symbol and each symbol different from this authentication symbol being visible to the naked eye. Dispositif selon la revendication 10, qui comporte un moyen de formation d'un message représentatif d'au moins une dite position et un moyen de marquage du document pour y représenter ledit message.Device according to claim 10, which comprises means for forming a message representative of at least one said position and means for marking the document to represent said message. Dispositif selon l'une quelconque des revendications 10 ou 11, qui comporte un moyen de formation d'un message représentatif d'au moins un symbole d'authentification et un moyen de marquage du document pour y représenter ledit message.Apparatus according to any one of claims 10 or 11, which comprises means for forming a message representative of at least one authentication symbol and means for marking the document to represent said message. Dispositif selon l'une quelconque des revendications 10 à 12, qui comporte un moyen de lecture d'un message présent sur ledit document, le moyen de détermination d'au moins une position étant adapté à ce qu'au moins une position dépend dudit message.Device according to any one of claims 10 to 12, which comprises means for reading a message present on said document, the means for determining at least one position being adapted so that at least one position depends on said message . Dispositif selon l'une quelconque des revendications 10 à 13, qui comporte un moyen de lecture d'un message présent sur ledit document, le moyen de détermination d'au moins un symbole d'authentification étant adapté à ce qu'au moins un symbole d'authentification dépend dudit message.Device according to any one of claims 10 to 13, which comprises means for reading a message present on said document, the means for determining at least one authentication symbol being adapted so that at least one symbol authentication depends on the message. Dispositif selon l'une quelconque des revendications 10 à 15, dans lequel le moyen de formation de l'image est adapté à former une image comportant, sur au moins une ligne courbe, des symboles de décor qui entourent au moins un symbole d'authentification.Apparatus according to any of claims 10 to 15, wherein the image forming means is adapted to form an image having, on at least one curved line, decor symbols which surround at least one authentication symbol .
EP10193517.9A 2009-12-04 2010-12-02 Method and device for securing a document Active EP2339547B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0905890A FR2953622B1 (en) 2009-12-04 2009-12-04 METHOD AND DEVICE FOR SECURING DOCUMENT

Publications (2)

Publication Number Publication Date
EP2339547A1 true EP2339547A1 (en) 2011-06-29
EP2339547B1 EP2339547B1 (en) 2014-11-19

Family

ID=42126368

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10193517.9A Active EP2339547B1 (en) 2009-12-04 2010-12-02 Method and device for securing a document

Country Status (2)

Country Link
EP (1) EP2339547B1 (en)
FR (1) FR2953622B1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3311336B2 (en) 2015-06-18 2023-02-01 Thymaris Ltd. Authentication feature in a barcode
FR3116360B1 (en) * 2020-11-17 2023-11-24 Advanced Track & Trace METHOD AND DEVICE FOR SECURING A DOCUMENT AND A METHOD AND DEVICE FOR AUTHENTICATING A DOCUMENT, DOCUMENT SECURED BY SUCH A METHOD.

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2890666A1 (en) * 2005-09-15 2007-03-16 Arjowiggins Security Soc Par A Structure for making safety and/or value document, comprises a fibrous material substrate, a surface layer deposited on face of the substrate, substrate heterogeneities, authentication and/or identification information, and a data carrier

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2890666A1 (en) * 2005-09-15 2007-03-16 Arjowiggins Security Soc Par A Structure for making safety and/or value document, comprises a fibrous material substrate, a surface layer deposited on face of the substrate, substrate heterogeneities, authentication and/or identification information, and a data carrier

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
EUROPEAN CENTRAL BANK: "Guide pour les formateurs - Les billets et les pièces en euros", June 2007, EUROPEAN CENTRAL BANK, Frankfurt, ISBN: 9789289901314, pages: 1 - 24, XP002581762 *

Also Published As

Publication number Publication date
FR2953622A1 (en) 2011-06-10
FR2953622B1 (en) 2012-08-17
EP2339547B1 (en) 2014-11-19

Similar Documents

Publication Publication Date Title
US11315378B2 (en) Method of verifying an authenticity of a printed item and data processing terminal
FR2936336A1 (en) METHOD AND DEVICE FOR AUTHENTICATING GEOMETRIC CODES
WO2018103756A1 (en) Combined two-dimensional code anti-counterfeiting system and method, combined two-dimensional code and reading apparatus
CN108351956B (en) Method and system for printing forensic-encoded 2D barcodes
US20170103293A1 (en) Method of securing a two-dimensional barcode
EP1788516B1 (en) Method and device for authentication and identification
WO2017072470A1 (en) Method and device for securing a document, method and device for control corresponding thereto and secure document
EP2339547B1 (en) Method and device for securing a document
EP2499000A2 (en) Identification documents containing an identification photograph secured by means of patterns
EP3686761B1 (en) Secure marking element and methods for encoding and authenticating said marking element
CN106934756A (en) The method and system of embedding information in a kind of monochromatic or spot color figure
Mayer et al. Fundamentals and applications of hardcopy communication
EA037623B1 (en) Method, imaging device and system for generating a measure of authenticity of an object
FR3103931A1 (en) METHOD AND DEVICE FOR SECURING AN OBJECT AND PROCESS FOR AUTHENTICATION OF AN OBJECT
WO2015001205A1 (en) Method for printing interdependent security graphics
FR3103929A1 (en) METHOD AND DEVICE FOR SINGULARIZING AN OBJECT AND PROCEDURE AND DEVICE FOR AUTHENTICATION OF AN OBJECT
Erlangga et al. Increasing Secret Data Hiding Capacity in QR Code Using Subcells
WO2008040374A1 (en) System and method for authenticating products and/or packages
EP4387847A1 (en) Method for personalising a security device, personalised security device, identity document comprising such a device, and method for authenticating such a device
CN104778593A (en) Anti-counterfeiting image encrypting and detecting method
FR3076251A1 (en) METHOD FOR PROTECTING A PORTRAIT IN AN IDENTITY DOCUMENT
Mayer et al. Informed coding for color hardcopy watermarking
US20210326590A1 (en) Graphic protective element authenticity check system
Mayer et al. Informed Coded Modulation and Host Rejection cTechniques for Color Inkjet Hardcopy Watermarking in the Spatial Domain
FR3028644A1 (en) FORMS, DEVICES IMPLEMENTING THIS FORM AND METHODS IMPLEMENTING THE FORM

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20101202

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIN1 Information on inventor provided before grant (corrected)

Inventor name: FOUCOU, ALAIN

Inventor name: MASSICOT, JEAN PIERRE

Inventor name: PICARD, JUSTIN

INTG Intention to grant announced

Effective date: 20140630

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAJ Information related to disapproval of communication of intention to grant by the applicant or resumption of examination proceedings by the epo deleted

Free format text: ORIGINAL CODE: EPIDOSDIGR1

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 697405

Country of ref document: AT

Kind code of ref document: T

Effective date: 20141215

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

INTG Intention to grant announced

Effective date: 20140630

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602010020330

Country of ref document: DE

Effective date: 20141231

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 5

REG Reference to a national code

Ref country code: NL

Ref legal event code: VDEP

Effective date: 20141119

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 697405

Country of ref document: AT

Kind code of ref document: T

Effective date: 20141119

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150319

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150219

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150319

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150220

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20141231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602010020330

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20150820

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20141202

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20101202

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20141202

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 7

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151202

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20151202

PGRI Patent reinstated in contracting state [announced from national office to epo]

Ref country code: IT

Effective date: 20170710

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141119

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: TR

Payment date: 20221201

Year of fee payment: 13

Ref country code: GB

Payment date: 20221226

Year of fee payment: 13

Ref country code: FR

Payment date: 20221226

Year of fee payment: 13

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20221228

Year of fee payment: 13

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20221227

Year of fee payment: 13

Ref country code: DE

Payment date: 20230118

Year of fee payment: 13