EP3414102A1 - Vérification d'un objet présentant un élément de sécurité - Google Patents

Vérification d'un objet présentant un élément de sécurité

Info

Publication number
EP3414102A1
EP3414102A1 EP17703024.4A EP17703024A EP3414102A1 EP 3414102 A1 EP3414102 A1 EP 3414102A1 EP 17703024 A EP17703024 A EP 17703024A EP 3414102 A1 EP3414102 A1 EP 3414102A1
Authority
EP
European Patent Office
Prior art keywords
security element
test
value
verification
test field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP17703024.4A
Other languages
German (de)
English (en)
Inventor
Georg Depta
Tilo FRITZHANNS
Christian Fuhse
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient Currency Technology GmbH
Original Assignee
Giesecke and Devrient Currency Technology GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient Currency Technology GmbH filed Critical Giesecke and Devrient Currency Technology GmbH
Publication of EP3414102A1 publication Critical patent/EP3414102A1/fr
Ceased legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/305Associated digital information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/333Watermarks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/205Matching spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/207Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/23Identity cards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D2207/00Paper-money testing devices

Definitions

  • the invention relates to the verification of an object provided with a security element, and relates in particular to a verification method together with associated computer program product, a verification system for carrying out the method, a security element or a checking device for such a verification system and an object provided with such a security element.
  • Data carriers such as valuables or identity documents, but also other valuables, such as branded goods, are often provided with security elements for the purpose of security, which permit verification of the authenticity of the data carrier and at the same time serve as protection against unauthorized reproduction.
  • the object of the invention is to provide methods and associated devices with which a element provided with safety element can be verified easily and yet with high reliability.
  • verification using a smartphone as a test device should also be possible in the field.
  • the invention contains a method for verifying an object provided with a security element, in which the security element is produced in a multi-step process with register fluctuations and contains in a test field an individual characteristic feature of the security element in the form of an overlay of at least two areas the production of the security element are produced in different production steps with register fluctuations, wherein the method
  • test field of the security element is optically detected with a camera
  • test value formed is compared with a reference test value
  • the reference check value is advantageously formed during or after the production of the security element or during or after the article has been provided with the security element by determining the surface portions of the superimposed and / or non-superimposed surface regions and from this the reference check value is formed.
  • the reference check value can be stored together with an individual identification of the security element and / or the object in a database and queried for comparison with the test value formed from the database.
  • the reference check value in particular in encrypted or coded form, can be present on the security element or on the object provided with the security element and read in for comparison with the formed check value.
  • a reference test value applied to the security element or article is advantageously applied using pressure-free methods, for example in the form of a laser marking, by means of ink-jet or toner-based methods. In this case, it is also possible to dispense with storing the reference check value in a database, so that an expensive database with short access times and a very large dataset can be dispensed with.
  • the code containing the reference check value may be proprietary to this method or may be based on standard methods such as Data Matrix or other 2D codes, with the data contained in the code advantageously encrypted and / or signed. Standard methods can be used for encryption and decryption, asymmetric methods with public and private keys are advantageous, and proprietary derivations of these methods can be used as long as the required security standards are met.
  • test value Prior to the comparison of the test value and the reference test value, further tests may be performed to confirm the use of printing methods from the security print, thus excluding copies based on always pixelated scans. It will be advantageous exploited the typically quite high resolution of smartphone cameras.
  • a simple plausibility check can check whether the same test field has already been read in unusual time or space. Made field checks can not only be recorded for this purpose and so foci with many counterfeits can be determined.
  • banknotes a central bank is also able to monitor the circulation behavior of its notes and derive planning data from it, which helps to avoid unnecessarily high or too small volumes in printing and thus in stockpiling.
  • test field of the security element with a smartphone camera is optically detected and the determination of the area ratio and the formation of the test value by running on the smartphone software program, hereinafter also called App.
  • the verification method is advantageously performed on a test field containing a superimposition of three, four or more surface areas generated during production of the security element in different manufacturing steps with register variations.
  • the verification method is advantageously carried out on a test field whose surface areas are generated at least partially by printing processes, in particular offset printing, indirect high-pressure, gravure gravure, screen printing, letterpress printing, stamp printing or flexographic printing.
  • the verification method is likewise advantageously carried out on a test field whose surface areas are at least partially applied to the application by means of applications, in particular applied film elements, or by elements or windows. plications are formed.
  • the verification method is carried out on a test field whose surface areas are at least partially formed by surface laser cuts, watermarks, laser markings or inkjet labels or toner-based methods.
  • glazing colors are an advantage, but opaque colors can also be used.
  • the printing inks can have the same hue or different hues, so that in the superimposed surface areas mixed colors.
  • background pressure indirect
  • the finest line on banknote substrates typically positive 30 ⁇ , negative 50 ⁇ , usually 40 ⁇ or 80 ⁇ wide; is in offset printing the finest line on banknote substrates typically positive 25 ⁇ , negative 35 ⁇ , usually 30 ⁇ or 50 ⁇ wide;
  • engraving gravure intaglio
  • the finest line on banknote substrates is positive 15 ⁇ , negative 10 ⁇ , usually 50 ⁇ or 30 ⁇ . wide; is in screen printing the finest line positive 250 ⁇ , negative 500 ⁇ , usually 400 ⁇ or 900 ⁇ wide; and is in the stamp printing (imprinting at Zif f réelle) the finest line usual 700 ⁇ wide.
  • a variation of the distances of printing elements in the test field can already be generated in a single pass and thereby additional information is introduced into the test field.
  • the spacing of printing or marking elements generated in a manufacturing step may be varied and the local distribution of the elements stored together with an individual identifier, such as a serial number, in a database.
  • the verification method is preferably carried out on a test field whose surface areas each consist of a plurality of small pressure elements. ments, in particular in the form of characters or graphic elements.
  • the small pressure elements have a maximum extension of 3 mm or less, preferably 2 mm or less.
  • the test field can have a plurality of partial regions in which the relative positions of the respective pressure elements are shifted from one another.
  • a partial test value can first be formed for each partial area and then the partial test values can be combined to form a total test value, for example by summing, multiplying, dividing or correlating, or by a combination with other evaluation methods such as pattern recognition.
  • the subdivision into subregions can be carried out, for example, in the form of fields, rows or columns.
  • the verification process is performed on a security element that is integrated into the article.
  • the security element may be part of a banknote or another value document.
  • the test field is advantageously smaller than the object and, for example, expediently occupies at most half the area of the value document in the case of a document of value.
  • the test field is further advantageously arranged close to a serial number, identification number or other code of the security element or object to be detected in order to easily detect both with the camera.
  • the invention also includes a verification system for carrying out the method of the type described above, with
  • a security element provided article wherein the security element is manufactured in a multi-step process with register fluctuations and in a test field an individual Characteristic feature of the security element in the form of a superposition of at least two surface areas, which are generated in the production of the security element in different manufacturing steps with register fluctuations, and
  • an evaluation unit for determining the surface portions of the superimposed and / or non-superposed surface areas and for forming a check value for the individual characteristic of the security element thereof, and means for comparing the formed check value with a reference check value and for generating a Vertechnischesresultats based on the comparison result.
  • the test apparatus advantageously contains means for detecting a coded reference test value, for decoding the detected reference test value and for comparing the test value formed with the decoded reference test value.
  • the superimposed surface areas in particular the size of the printing elements of the surface areas can be adapted to the requirements, for example, the resolution of the test apparatus.
  • the verification system comprises a database in which a reference check value is stored together with an individual identification of the security element and / or the item for the security elements, and in that the test apparatus includes means for querying the reference test value or the comparison result of test value and reference test value from the database based on the individual identification of the security element and / or the object.
  • the test apparatus can be in particular a bank note processing machine or a smartphone.
  • the invention also includes a security element for a verification system of the type described above, which is manufactured in a multi-step process with register fluctuations and contains in a test field an individual characteristic feature of the security element in the form of an overlay of at least two surface areas, which in the production of the security element are produced in different production steps with register fluctuations, as well as the use of such a security element for verification of an article provided with the security element.
  • the invention further includes an article, in particular value document, security paper, identity card or branded article with such a security element.
  • the invention further includes a verification device for a verification system of the type described above
  • An evaluation unit for determining the surface areas of the superimposed and non-superimposed surface areas and for forming a test value for the individual characteristic of the security element thereof, and Means for comparing the formed check value with a reference check value and for generating a verification result based on the comparison result.
  • the invention also includes a computer program product comprising machine-readable program instructions for a control unit of a data-processing device, in particular a smartphone, which cause it to carry out a method of the type described above.
  • individual codes or markings of the security element can be used, which are integrated into the design of the test field. On the one hand, these can serve to recognize the individual security element or the object and to identify it for a database query, and can also ensure that each individual security element remains distinguishable even with a coarser scan.
  • the individualization can consist in particular of characters, graphic elements, bar codes or 2D codes or the like and can either be recognizable as such or integrated into the design. Codes preferably have a redundancy of the useful contents or error correction elements. Preferably, the individualization is part of the data that gives the above test value.
  • a digit can overlay the test field and thus contribute to the test value. Since, for example, banknotes or other documents of value do not resemble each other's serial numbers, this contribution is always individual. If only a part of the number is superimposed, it offers itself on the basis of the usual numerical schemes, the back, from note to note to use changing characters of a digit to achieve a good distinction between the sheets; the front characters, on the other hand, to achieve a good distinction between the individual benefits within an arc.
  • the test value can either be calculated purely according to the above-mentioned methods or supplemented by an OCR reading of the numbering. For example, it is possible to use the letterpress printing standard in banknote printing, but also printing-free methods such as laser marking or inkjet methods.
  • color, color components or metallization of film elements can be removed or a color impression can be produced with a laser marking. Accordingly, prints in the test field can be individually modified by changing color fields by removing the color, by removing the absorbing color components, or by removing metalizations from film elements; but it can also be added by blackening of the substrate or color change another color impression. If a laser-absorbing ink is used for at least some of the prints, mixed forms of removal and addition may also occur.
  • the laser is only used to individually remove or lighten color for each security element. While this may be visible in the test field recognizable to the user, it may also extend over a larger area of the object provided with the security element.
  • These markings are expediently in areas produced with different steps and have for each banknote an individual position whose coordinates or relative position to each other also represent a test value.
  • a film Application included, so demetallized by the laser about areas.
  • this check value can be assigned to the banknote identified by the serial number, and an encrypted code can be applied to the banknote from the serial number, check value and, if applicable, signature of the issuing agency, in particular once again using a printing-formless method, for example the same laser marking unit.
  • the code with its relative position may also belong to the test value. All data may be advantageous, but need not be stored in a database for later tracking of the note.
  • the test value can be determined in the field and simultaneously read from the code with a public key and compared. For this method, the register fluctuations during printing and in the field need not be measured, since the position of the markings alone is of importance. Even a database query is not essential, but still beneficial.
  • ink-jet printers can be used primarily to print individual graphic elements or codes. In most cases, you can only add color, if necessary bleached by solvents or other substance combinations, but also color.
  • the security element or check box may also contain links to consumer information, such as provided by QR (Quick Response) codes, or data matrix codes. Such codes may or may not be integrated into the design of the test field but may or may not contribute to the test value.
  • the image captured by the smartphone camera can first be preprocessed in a manner known per se, for example by transformations in spatial or frequency space, for example by Fourier transformation or wavelet analysis, by projections, interpolations, for example between different rasters, resolutions or coordinate systems, scaling, rotations, filtering, both isotropic and anisotropic, morphological methods, segmentation and methods of feature extraction, pattern recognition, entropy measurement, or averaging.
  • transformations in spatial or frequency space for example by Fourier transformation or wavelet analysis
  • projections, interpolations for example between different rasters, resolutions or coordinate systems, scaling, rotations, filtering, both isotropic and anisotropic, morphological methods, segmentation and methods of feature extraction, pattern recognition, entropy measurement, or averaging.
  • a one-time calibration of the used camera of the tester in field may be required, for example by a white balance or the recording of a test pattern.
  • the evaluation can be facilitated by registration marks, which can also result from distinctive points of the design, and thus improve the alignment and / or scaling of the image in the preprocessing. Even codes can advantageously serve as registration marks.
  • the evaluation can be facilitated and improved in the field and possibly also in the production by the recording of several images, possibly from different angles and distances (hereinafter referred to as video mode). In this case, security features in the test field can also be verified, which offer different impressions depending on the viewing angle.
  • Codes used within the scope of the invention may be visually recognizable as such and thus encourage use or may be integrated in the design of the test field and possibly even hidden. While If codes are advantageously two-dimensional, the identifiable codes are advantageously Id codes, such as bar codes EAN, 2 / 5i, UPC, Codel28, and 2d codes stacked ld codes, such as PDF417. such as QR codes or data matrix or mixed forms.
  • 2d codes in particular offer themselves, since the readout is advantageously carried out with cameras, ie 2d sensors. But there are also applications with bar code readers into consideration.
  • the presentation must follow not known standards, but can also be proprietary. For example, it can be achieved that the content can only be read by a specific app on a smartphone.
  • the content of the code or codes on a security element may include a unique signature of the issuing office.
  • the content may contain real or pseudo-random data.
  • the content may also contain hashed test data for later comparison.
  • asymmetric encryption methods is advantageous. Since, as in biometrics, the actual measured quantities are analogue in nature, similar procedures are recommended for the storage in the production and the verification in the field: For example, a "fuzzy vault" can be used.
  • additional error correction data can be stored on the security element or object or stored in a database, which ensures sufficient redundancy.
  • the error correction and the elements to be read are advantageously closely matched. But it can also be standard biometric methods with a once read template and the definition of maximum permissible deviations in the measurement in the field.
  • biometric template protection can be used, in which instead of the test data protected reference data are stored, which allow a comparison, but no retroactive accounting on the original data.
  • a fuzzy vault can be used.
  • the fault tolerance can also be achieved by quantizing the analog input values.
  • the method of "context triggered piecemeal hashes (CTPH)”, also known as “fuzzy hashing”, can be exploited.
  • CCTPH Context triggered piecemeal hashes
  • PCA Principal Component Analysis
  • the code can contain not only the optionally encrypted and signed check value, but also the possible range of variation.
  • the fluctuation can also be included in an extra code.
  • the fluctuation can also be encrypted and / or signed.
  • the fluctuation range can then be measured, even with a different resolution, and compared with the specified value. Thus, it can be determined whether the test result is within a precision determined both in the first test and in the field. Depending on the resolution of the camera of the tester so increases the security of the verification. Simultaneous verification of a signature further increases security.
  • the security element or test field can be combined with other security features, in particular with identifiable only with aids. safety features, as long as they do not affect the evaluation of the useful information lying in the visible range of light or even contribute to this information.
  • the test field can help to use the limited area, for example, on banknotes for other security elements, and / or it may indicate the actual function of the test field in the test with the help of additional devices.
  • a fluorescent pressure over the test field in the form of a smartphone or in the form of a QR code may indicate that information is available for smartphones when the note is held at about a cash register under a UV lamp.
  • An IR cut can also be provided in the test field, for example, without impairing its function. Effect colors can change their register variation to the others
  • printing methods contribute to the information in the test field, on the other hand, for example, by color-shift effects allow the testing without tools. If a code is checked from several directions, the color-tilting effect can also be checked with the smartphone. This can be done, for example, by using the above-described video mode when recording the test field.
  • paints, threads or foils with hard or soft magnetic pigments or vapor depositions can contribute to machine readability without disturbing the principle of the test field.
  • the test described the test field can be combined in the field with other methods that allow verification of the authenticity of the bill. These include, for example, an examination of the printing methods used, an examination of security features such as holograms or effect colors on angle-dependent correct image or color data, an examination of the interaction of printing ink and substrate in high-resolution images; a plausibility check with respect to the query times and locations of the same serial number, or a check for the presence of the serial number in a database of banknotes in circulation. Such supplementary procedures can easily preclude forgery of impressions in advance.
  • stationary devices at bank note processing plants stationary devices at points of sale and machines that collect banknotes, especially at commercial banks, as well as mobile devices, especially for checking the test areas for law enforcement, are used as testing devices.
  • authorities, outlets, or offices and other authorities Further exemplary embodiments and advantages of the invention are explained below with reference to the figures, in the representation of which a representation in terms of scale and proportions has been dispensed with in order to increase the clarity. Show it:
  • FIG. 1 shows a schematic representation of a banknote with a security element in the form of a test field printed on the banknote
  • 2 is a detail view of the test field of Fig. 1
  • Fig. 3 is a schematic representation of the verification of
  • FIG. 4 shows a test field consisting of a plurality of partial regions with pressure elements displaced relative to one another
  • FIG. 5 shows a test field integrated in the graphic design of a banknote
  • Fig. 6 shows a design in which a test field is present in a separate security element which is applied to a cash deposit to be hedged.
  • FIG. 1 shows a schematic representation of a banknote 10 with a security element in the form of a test field 12 printed on the banknote 10.
  • the test field 12 shown in detail in FIG. 2 is part of the banknote 10 and was used in the production of the banknote 10 together with the other printing elements on the
  • test field can also be present on a separate security element, for example a transfer element, which is applied to a banknote or another article to be protected.
  • the banknote 10 with the test field 12 in the manner described below can simply be optically with a smartphone camera be verified and verified using a test app installed on the smartphone.
  • the banknote 10 and the test field 12 are generated in a multi-step method with register fluctuations.
  • the value 14 A in the engraving gravure printing a portrait 16-A and in the book printing a serial number 18 was applied.
  • a first checkerboard pattern 14-B (narrow hatched in FIG. 2) was screen-printed in the test field 12, as shown in more detail in the detailed illustration of the test field 12 in FIG.
  • a second checkerboard pattern 16-B (hatched in FIG. 2) in stitch gravure printing was produced simultaneously with the portrait 16-A in the test field 12.
  • the production steps involved in the generation of the test field 12 each have register fluctuations of ⁇ 1 mm in mutually orthogonal directions (hereinafter referred to as x and y direction).
  • the maximum permitted variation is, for example, ⁇ 1.5 mm.
  • a typical smartphone camera with a nominal 6 megapixels has a resolution of 2848 x 2136 pixels. If a surface is recorded with such a camera, which contains at least the test field 12 and the serial number 18, for example, with a recording surface of 120 mm x 90 mm, the result is a dot density of about 600 dpi or a resolution of 42 ⁇ .
  • the register variations of the manufacturing steps of screen printing (elements 14A, 14B) and engraving gravure (elements 16A, 16B) result in an offset of the two checkerboard patterns 14B, 16B, which can be quantified, for example, via the surface portions of the superimposed and non-superimposed surface regions 20, 22, 24, 26.
  • FIG. 2 the register variations of the manufacturing steps of screen printing (elements 14A, 14B) and engraving gravure (elements 16A, 16B) result in an offset of the two checkerboard patterns 14B, 16B, which can be quantified, for example, via the surface portions of the superimposed and non-superimposed surface regions 20, 22, 24, 26.
  • the number of possible register fluctuation combinations in the current resolution of smartphone cameras in two production steps is generally still too low to be able to clearly identify a banknote. Nevertheless, the number of possibilities is already so great that despite the simple check with a smartphone with a positive verification with high probability on a real banknote can be closed. If a larger number of production steps are included, the number of register fluctuation combinations can also be sufficient for a clear identification of a banknote.
  • the test value derived from the relative surface portions can be detected for the first time during or immediately after the production of the banknote 10, for example in the quality control of the banknotes, and stored together with the serial number 18 of the banknote 10 as reference check value in a database 34 (FIG. 3).
  • the serial number 18 is then linked to a specific relative area proportion of the surface areas 20-26 in the check field 12 of the banknote 10. As explained above, the assignment does not necessarily have to be unique for meaningful verification.
  • the banknote 10 is then photographed (as shown in FIG. 3) by a user with the camera of his smartphone 30 (reference numeral 32) and thus optically detects the test field 12 and the serial number 18.
  • One on the smartphone 30 running test app can on the one hand over an OCR module read the memorir ummer 18 of the banknote 10 and on the other hand via an image processing module determine the surface portions 20-26 in the test field 12 and form the check value for banknote 10.
  • the test app then builds a connection 36 from the smartphone 30 to the database 34 and transmits the serial number 18 and the test value formed. In the database 34, the transmitted test value is compared with the reference test value stored there for the serial number 18 and the comparison result is transmitted back to the test app via the connection 36.
  • the database can also transmit the stored reference test value to the test app and the comparison of the test value formed with the reference test value can be made in the test app itself.
  • the reference check value can also be provided encrypted on the banknote 10 itself after its first detection, for example in the form of a barcode 28 arranged next to the checkbox 12.
  • the banknote 10 can then be photographed by a user with the camera of his smartphone 30 and thus the test field 12 are optically detected together with the barcode 28.
  • the test app executed on the smartphone 30 determines the surface portions 20-26 in the test field 12 via the image processing module, forms the check value for banknote 10 therefrom, reads the bar code 28 and decrypts the reference check value encoded with it.
  • the determined test value is compared with the decrypted Referenzprüfwert and displayed the result of the authenticity check in the display 38 and possibly also issued acoustically.
  • the image acquired by the camera of the smartphone is first preprocessed advantageously in the manner described above. Then, for example, a histogram formation can take place in which the pixel frequencies of different colors or gray levels are determined. Furthermore, threshold values can be formed in different gradations or different color channels and the resulting pixel numbers can again be determined, similar to a histogram. Other statistical methods of image processing can also be used which, for example, correlate different fields via correlations. As shown in FIG.
  • a test field 40 can also consist of a plurality of partial regions 42, 44, 46, wherein the relative positions of the pressure elements 48-R, 48-G, 48-B of the individual printing passages in the different partial regions are shifted from one another
  • the pressure elements 48-R, 48-G, 48-B are arranged offset in one or more subregions so that they do not completely cover each other with perfect register. This is illustrated in Fig.
  • the three primary color pixels 48-R, 48-G, 48-B are arranged in a different relative position to each other so that the register variations of the three color channels in each sub-region 42, 44, 46 are different affect the superimposed and non-superimposed area proportions of the printing elements, thus making the determination of the individual characteristic test value for the test field 40 more reliable.
  • a partial test value can be formed for each subarea 42, 44, 46 and the subtest values can be combined by adding or multiplying them together to form a total test value.
  • a test field need not be present as a separate field on the document, it may also be integrated into the graphical design of the document, as illustrated by the test field 50 of FIG. 5.
  • a banknote 10 contains in a partial area a graphic 52 in the form of a gravure-applied tree with differently colored apples, namely with green apples 56 produced in simultaneous printing and with red apples 58 produced in stamp printing.
  • the test field 50 contains a green apple 56, a red apple 58 and a part 54 of the leaf structure of the tree. Since all three printing elements were produced in different printing steps with different production methods, they have individual characteristic register fluctuations which can be detected in the test field 50 in the manner described above with the aid of a smartphone camera 30 and compared with a reference test value.
  • FIG. 6 shows a further embodiment in which a test field of the type described above is present in a separate security element 60 which is applied to an object to be protected, such as a cash box 62.
  • the cash box 62 shown in FIG. 6 is filled, closed and the cover gap 64 is sealed with the security element 60.
  • test field of the security element 60 is photographed with the camera of a smartphone 30 (reference numeral 32), for example, and a test value for the security element 60 is determined by an app in the manner described above. Furthermore, an identification number 66 of the cashbox 62 is either entered or also recorded with the camera. The app then establishes a connection 36 to a database 34 and transmits the identification number 66 and the formed test value for the security element 60 used for the security. The transmitted verification value is then stored in the database 34 as the reference verification value for the identification number 66 and thus the security element 60 linked to the cash box 62 to be secured.
  • the recipient may first check whether the security element 60 is intact and then verify that the security element 60 is actually added to the identification number 66 of the cash box.
  • sette 62 belongs. For this purpose, he only has to photograph the test field of the security element 60 with the camera of his smartphone and enter the identification number 66 of the cash box 62 or also photograph it.
  • the app then forms the check value for the security element 60, optionally determines the identification number 66 via an OCR module, then establishes a connection to the database 34 and transmits the identification number 66 and the test value formed.
  • the transmitted check value is compared with the reference check value stored there to the cookie number 66 and the comparison result is transmitted back to the smartphone app, which notifies the recipient of the success or failure of the verification.

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Credit Cards Or The Like (AREA)
  • Image Analysis (AREA)

Abstract

L'invention concerne un procédé de vérification d'un objet (10) présentant un élément de sécurité, selon lequel l'élément de sécurité est réalisé dans un procédé multi-étapes avec des variations d'alignement et contient, dans un champ de vérification (12), une marque caractéristique individuelle de l'élément de sécurité sous la forme d'une superposition d'au moins deux zones planes (14-B, 16-B), qui sont générées lors de la fabrication de l'élément de sécurité dans différentes étapes de fabrication avec des variations d'alignement. Selon ledit procédé, le champ de vérification (12) de l'élément de sécurité est détecté optiquement à l'aide d'une caméra (30), les parties des zones planes (14-B, 16-B) superposées et non superposées sont déterminées, et une valeur de vérification pour la marque caractéristique individuelle de l'élément de sécurité est formée sur la base de cette détermination, la valeur de vérification formée est comparée à une valeur de vérification de référence, et un résultat de vérification est établi pour l'objet pourvu de l'élément de sécurité sur la base du résultat de comparaison. L'invention concerne également un produit-programme informatique correspondant, un système de vérification pour la mise en oeuvre du procédé, un élément de sécurité et un dispositif de vérification pour un tel système de vérification, et un objet présentant un tel élément de sécurité.
EP17703024.4A 2016-02-09 2017-02-01 Vérification d'un objet présentant un élément de sécurité Ceased EP3414102A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102016001465.2A DE102016001465A1 (de) 2016-02-09 2016-02-09 Verifikation eines mit einem Sicherheitselement versehenen Gegenstands
PCT/EP2017/000125 WO2017137153A1 (fr) 2016-02-09 2017-02-01 Vérification d'un objet présentant un élément de sécurité

Publications (1)

Publication Number Publication Date
EP3414102A1 true EP3414102A1 (fr) 2018-12-19

Family

ID=57963156

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17703024.4A Ceased EP3414102A1 (fr) 2016-02-09 2017-02-01 Vérification d'un objet présentant un élément de sécurité

Country Status (6)

Country Link
US (1) US20210074109A1 (fr)
EP (1) EP3414102A1 (fr)
CN (1) CN108602374B (fr)
DE (1) DE102016001465A1 (fr)
MX (1) MX2018009669A (fr)
WO (1) WO2017137153A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4345683A1 (fr) * 2022-09-30 2024-04-03 Roger D. Hersch Codes bidimensionnels cachés comme segments de ligne diffusée

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11480528B2 (en) * 2018-09-28 2022-10-25 Hamilton Sundstrand Corporation And inspection method of aircraft drive shafts
IT201900002873A1 (it) * 2019-02-27 2020-08-27 Dg Group S P A Dispositivo, metodo e sistema di sicurezza per autorizzare un’operazione
US11551519B2 (en) * 2020-02-05 2023-01-10 Igt Mobile device facilitated redemption of gaming establishment ticket vouchers
US20220292856A1 (en) * 2021-03-15 2022-09-15 The Procter & Gamble Company Artificial intelligence based steganographic systems and methods for analyzing pixel data of a product to detect product counterfeiting
US20220406117A1 (en) * 2021-06-17 2022-12-22 Elisha Tweneboah Kodua Counter-terrorism currency system
CN114444259B (zh) * 2021-12-20 2022-09-23 浙江仁欣环科院有限责任公司 一种雨污管网溯源追踪系统及方法
US11900766B2 (en) 2022-03-01 2024-02-13 Igt Selective redemption of gaming establishment ticket vouchers

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1403333A1 (fr) * 2002-09-24 2004-03-31 Sicpa Holding S.A. Procédé et système d' encres pour marquer et authentifier les articles
DE102004038542A1 (de) * 2004-08-06 2006-02-23 Giesecke & Devrient Gmbh Datenträger mit Sicherheitselement und Verfahren zu seiner Herstellung
DE102006006501A1 (de) * 2006-02-13 2007-08-16 Giesecke & Devrient Gmbh Sicherheitselement mit einer optisch variablen Struktur
WO2010023420A1 (fr) * 2008-08-28 2010-03-04 De La Rue International Limited Document de valeur et procédé de détection du niveau de souillure

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4345683A1 (fr) * 2022-09-30 2024-04-03 Roger D. Hersch Codes bidimensionnels cachés comme segments de ligne diffusée

Also Published As

Publication number Publication date
WO2017137153A1 (fr) 2017-08-17
MX2018009669A (es) 2018-12-17
DE102016001465A1 (de) 2017-08-10
CN108602374A (zh) 2018-09-28
US20210074109A1 (en) 2021-03-11
CN108602374B (zh) 2020-10-27

Similar Documents

Publication Publication Date Title
WO2017137153A1 (fr) Vérification d'un objet présentant un élément de sécurité
DE69634583T2 (de) System und Verfahren zum Prüfen von Identifizierungskarten
EP1459266B1 (fr) Procédé pour protéger l'authenticité de documents
WO2008049550A2 (fr) Dispositifs, procédé et opération de marquage stochastique et de suivi de produits imprimés
WO2006053685A2 (fr) Documents de valeur, production et verification de documents de valeur
EP3791367A1 (fr) Procédé permettant de produire des éléments de sécurité qui sont non visibles à l'?il humain et ne peuvent pas être copiés, dans une représentation, et représentation imprimée
DE10058638A1 (de) Verfahren zur Herstellung eines Datenträgers sowie ein Datenträger
DE102005013962B4 (de) Dokumentenpapier mit aufgedrucktem Sicherheitselement und Verfahren zum Erstellen fälschungsgeschützter Dokumente
WO2017137155A1 (fr) Vérification d'un objet présentant un élément de sécurité
DE102008041990A1 (de) Dokument, Verfahren zur Herstellung und zur Überprüfung eines Dokuments, Computerprogrammprodukt, Datenverarbeitungssystem und Prüfsystem
EP1673231B1 (fr) Document de valeur comprenant differentes substances caracteristiques
EP2930699A1 (fr) Caractéristique de sécurité comprenant une section de code et de marquage
DE102017110892A1 (de) Verfahren zur Authentifizierung eines Gegenstands, insbesondere eines Sicherheitselements, sowie Sicherheitselement
WO2017137152A1 (fr) Vérification d'un objet présentant un élément de sécurité
EP2724323B1 (fr) Procédé et dispositif de création d'un ensemble de données de référence d'un document à partir d'un document
DE102007050691A1 (de) Vorrichtungen, Verfahren und Prozess zur stochastischen Markierung und Rückverfolgung von Druckprodukten
EP2313872B1 (fr) Procédé pour vérifier l'authenticité d'un document, produit programme informatique, appareil de contrôle et système de traitement de données
EP2394250B1 (fr) Procédé et dispositif pour vérifier des documents par utilisation d'une transformation en ondelettes
EP4215377A2 (fr) Vérification d'un document de sécurité sur la base de morphologies de gouttelettes
DE202012000806U1 (de) Wert- und/oder Sicherheitsdokument mit kodierter Information
DE102005032704A1 (de) Wertdokumente, Herrstellung und Prüfung von Wertdokumenten
DE102008057320A1 (de) Sicherheitselement mit einer maschinenlesbaren Codierung
EP4242993A1 (fr) Procédé de fourniture d'un produit d'impression et d'informations d'authentification associées et procédé d'authentification d'un produit d'impression
DE102020131420A1 (de) Farbseparation zur Absicherung der Dokumenten-Personalisierung
EP3275684A1 (fr) Empreinte d'un document de securite

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20180910

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20191028

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20220114