EP3528216A1 - Document having a security element and related method - Google Patents

Document having a security element and related method Download PDF

Info

Publication number
EP3528216A1
EP3528216A1 EP19157723.8A EP19157723A EP3528216A1 EP 3528216 A1 EP3528216 A1 EP 3528216A1 EP 19157723 A EP19157723 A EP 19157723A EP 3528216 A1 EP3528216 A1 EP 3528216A1
Authority
EP
European Patent Office
Prior art keywords
document
layers
authentication data
layer
security element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP19157723.8A
Other languages
German (de)
French (fr)
Other versions
EP3528216B1 (en
Inventor
Giuseppe Ghisa
Laura Luciani
Francesco Antonio INFORTUNA
Andrea GUMIERO
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Istituto Poligrafico E Zecca Dello Stato SpA
Original Assignee
Istituto Poligrafico E Zecca Dello Stato SpA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Istituto Poligrafico E Zecca Dello Stato SpA filed Critical Istituto Poligrafico E Zecca Dello Stato SpA
Publication of EP3528216A1 publication Critical patent/EP3528216A1/en
Application granted granted Critical
Publication of EP3528216B1 publication Critical patent/EP3528216B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/45Associating two or more layers
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/328Diffraction gratings; Holograms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/207Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09FDISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
    • G09F3/00Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
    • G09F3/02Forms or constructions
    • G09F2003/0276Safety features, e.g. colour, prominent part, logo

Definitions

  • the present invention refers to a document apt to identify with certainty the holder and/or to allow a verification of the authenticity of the document itself.
  • the document may be made, for example, in the form of book, card or banknote.
  • the latter is preferably of the type in accordance with the standard ICAO 9303 (ISO 7810:2003).
  • the document is of the type having a customized security element that bears data selectively detectable by visual observation or by means of measurement or visual instruments.
  • US2008/0106091 discloses a security document provided with two optical elements, each of which is placed at a respective transparent window. At the moment of verification, the two transparent windows are superimposed one on the other, folding the document, and the two optical elements so superimposed produce an identification combination.
  • WO2017/092865 discloses a security element designed such as to show a first colour visually perceptible if observed in reflected light and a second colour visually perceptible if observed in transmitted light.
  • WO2016015130 declares an authentication document provided with a transparent window and of a security element at the latter.
  • the security element comprises an authentication data comprising two components reported respectively on the front and on the rear of the document and a register between them, in such a way that a visual inspection of the document allows to verify the integrity of the information.
  • WO 2011/020537 declares an identification document and the corresponding manufacture method, provided with an authentication element comprising two superimposed pictures.
  • EP 2 559 563 A1 declares how to realize a security document with a semitransparent intermediate layer bearing portions of an authentication data that is reassembled if observed in transmitted light.
  • the structure of the security element from the known solutions doesn't achieve a satisfying compromise between an adequate sophistication of security criteria and a simplicity in manufacturing techniques and/or document verification.
  • the reachable level of security is exclusively limited to protection/verification of the document authenticity, without the possibility to protect/verify even the authenticity of customized sensitive data associated and/or present thereon.
  • the performance of the security element of the known documents can be improved in terms of versatility and durability of materials used both for the element itself and for the whole document, also relating to the mainly portable use of the latter.
  • the technical problem posed and solved by the present invention is therefore that of providing a document provided with a security element, which allows to overcome one or more drawbacks above mentioned referring to the prior art.
  • the invention also refers to a method of making and verifying the authenticity of above said document according to claim 22 and 27, respectively.
  • the term "document” is to be intended in its broadest sense to include both recognition documents that bear data, for example, to prove the identity of the holder or to allow an authentication of the latter, either banknotes or, more generally, payment devices, without limitation either to the type of material used or to the format of the document itself.
  • authentication means for proving the origin of the document and/or of identifying the author/holder to which the document is assigned.
  • the document according to the invention provides a support element, or support, which incorporates a security element.
  • the latter comprises a plurality of superimposed layers that define two opposite faces of the security element.
  • two or more of such layers bear a corresponding component of an authentication data associated or associable with the support.
  • Such components are arranged according to a position of mutual register between each other.
  • the above said plurality of layers comprises at least one layer, which will be recalled as inferring layer, which indeed interfere with an electromagnetic wave that passes therethrough.
  • the interfering layer is configured in such a way that the components are all simultaneously detectable to form, or to compose, the authentication data exclusively when observed, or irradiated, from a same observation direction relating to only one of the opposite faces of the security element. In such observation, or irradiation, condition the security element allows to verify the congruity of the authentication data with a reference data.
  • the interfering layer is interposed between two of the components of the authentication data and/or between two layers each bearing a respective component of the authentication data.
  • the detection - in its entirely - of the authentication data is exclusively feasible from a single observation direction of the document which - as it will clearly appear from the description below - relates to transmitted radiation.
  • the authentication data is reconstructed thanks to the position of mutual register of the above-mentioned components.
  • the document is therefore hardly adjustable or unduly alterable, for example for the purpose of sabotage or tampering, providing a high level of inviolability of the structural integrity of the security element.
  • the document according to the invention is customizable in such a way that the authentication data contained in the security element coincides with one (or more) reference data, for example arranged on the support element.
  • This solution is particularly advantageous as it is possible to associate a reference data uniquely assigned to the document - such as for example a serial number, the reproduction of a face, personal data of the sensitive holder or information of the equivalent type - to the authentication data present in the security element. In this way, it is possible to provide an instrument that certifies both the authenticity of the document itself and the authenticity of sensitive information associated therewith.
  • the document of the invention is easy to be manufactured and easy to be operated during verification.
  • the components wherein the authentication data is decomposed are recorded on a corresponding layer of the security element according to a calibration function that allows to observe, or detect, the authentication data formed by two or more components having substantially the same intensity, in this way reducing possible uncertainties associated with the document verification operations.
  • the security element has high durability.
  • a document according to a preferred embodiment of the invention is overall denoted by the numerical reference 1.
  • the document 1 is a document made, for example, in form of book or card, and yet more preferably is of the type pursuant to the standard ICAO 9303 (ISO 7810:2003).
  • inventive concept of the present invention may be, for example, related to a document provided with pages, suitable for constituting different types of passports with a booklet of existing formats, but at the same time also applicable to a banknote.
  • the document is structurally defined by, or comprising of, a support 100 and is equipped with a security element 101 integrated in, or jointed to, the support itself.
  • the security element 101 comprises a plurality of layers respectively denoted by the references 10, 11 and 20, and defining a first external layer, an intermediate layer and a second external layer, respectively.
  • the security element 101 is integrated within the support 100 so that the overall configuration of the document 1 is as such as to define two planar dimensions predominant compared to a third one, with reference to three axes x, y and z mutually orthogonal to each other.
  • the support 100 and the security element 101 jointed thereto define a document in a card format.
  • the layers 10, 11 and 20 have same form and extension on card plane (x-y plane) and are superimposed along the direction parallel to the axis z which defines the thickness of the card and of the security element 101.
  • the two external layers 10 and 20 define two opposite faces, respectively A and B, of the security element 101 same.
  • each of the two opposite faces A and B of the security element 101 corresponds to a respective opposite face of the support 100.
  • the thickness of the security element 101 defined by the layers 10, 11 and 20 is substantially equal to the overall thickness of the support 100.
  • the opposite faces A and B of the security element 101 and the respective opposite faces of the support 100 jointly determine two opposite sides of the document 1 substantially without discontinuity.
  • the security element 101 is illustrated as having a perimetral profile defined by a closed curve, in particular oval, which borders a region with at least one symmetry axis inside thereof.
  • the plurality of layers 10, 11, 20 overall bears an authentication data denoted by the way of example by the abbreviation "OK", which comprises, i.e. is partitioned into, two or more components.
  • OK an authentication data denoted by the way of example by the abbreviation "OK"
  • two components denoted by or and K are provided.
  • the OK authentication data is intended to further be associated (or associable) to a reference data, i.e. a variable information, encodable or encoded, as for example a serial number, OCR codes, one-dimensional codes, two-dimensional codes, face reproduction, personal information of the holder of the document 1, or sensitive information of equivalent type.
  • a reference data i.e. a variable information, encodable or encoded, as for example a serial number, OCR codes, one-dimensional codes, two-dimensional codes, face reproduction, personal information of the holder of the document 1, or sensitive information of equivalent type.
  • Such OK authentication data is encoded within the document 1 by the security element 101.
  • the support 100 bears the reference data.
  • the reference data may otherwise be contained in remote devices functionally connected to or associable with (for example by wireless connections) the document 1.
  • Each of said two or more components indicates instead a respective portion wherein the OK authentication data has been decomposed.
  • the OK authentication data results to be complete, and thence consistent to the information expressed by the reference data, only when detectable as composed by all components that has been partitioned into.
  • the authentication data is overall contained within the plurality of layers of the security element 101, and, as mentioned, each of said layers bears a corresponding component.
  • an authentication data capable of being partitioned into a greater or minor number of components with respect to the number of layers that composes the security element 101 and/or provides more than one component for a same layer.
  • the OK authentication data has been partitioned into two components O, K and the security element 101 comprises the three superimposed layers 10, 11, 20.
  • the three layers 10, 11 and 20 are preferably contiguous and bound together.
  • coupling means are provided, configured to stably bind together the several layers that compose the plurality of layers of the security element 101.
  • the intermediate layer 11 is interposed between the first external layer 10 and the second external layer 20, in particular an interfering layer that acts on the electromagnetic wave R which passes through the security element 101, as illustrated hereinafter.
  • the components O, K are respectively contained by the first layer 10 and by the second layer 20 according to one their relating position of mutual register.
  • the two layers which bear the components of the authentication data can be later referred as "principal layers" for the sole purpose of identifying them.
  • the relative position of mutual register for the components indicates a relative alignment (as a non-limiting example, of spatial or frequency type) between the components such that a superimposition (again as a non-limiting example, of spatial type) of the latter according to a selective direction, or verse, of observation allows to rebuild correctly and completely the authentication data.
  • the coupling means previously mentioned gives the structure of the security element 101 more effectiveness and makes a - rigid - constraint among the layers that allows to keep the components in register, even when the document 1 is subjected to stress that makes it, for example, bend.
  • the relative position of the intermediate layer 11 with respect to the first layer 10 and the second layer 20 allows to define which are the layers associated to said "A Side” or "B Side” of the document 1, depending on the direction according to which the electromagnetic wave R incise and crosses the security element 101.
  • Each of said "A Side” and “B Side” of the document 1 can be associated, thence, even to observation direction, incidence or irradiation thereof, to which reference will be made by the term “in reflected radiation” or “in transmitted radiation” depending on the interaction between the interfering layer 11 and the electromagnetic wave R.
  • layers or surfaces of certain materials - often denoted by thin-film when their thickness is typically comparable to the wavelength of the incident radiation - have the properties of reflecting, transmitting and/or selectively absorbing an electromagnetic radiation that invests it, depending on its frequency and/or of the structural and chemical properties of the material.
  • reflected components of the radiation can be, for example, eliminated or totally reflected; it's possible to divide or combine radiations of different wavelengths or with different directions and more.
  • observation direction in transmitted radiation is associated with the radiation coming from the B Side of the document 1, in the current example.
  • an observation direction, or verse, "in reflected radiation” is established when the latter is observed from the same face whereon the security element 101 is hit by the electromagnetic wave R.
  • Such observation direction in reflected radiation is then associated with the radiation coming from the A Side of the document 1, still in the current example.
  • the interfering layer 11 is therefore configured in such a way that the two components O and K are both detectable to form the OK authentication data exclusively from an observation direction, in particular the observation direction in transmitted radiation, relating to one only - the B Side, in this example - of the two opposite faces of the document 1, and more in general of the security element 101 incorporated therein.
  • the interfering layer 11 partitions the electromagnetic wave R affecting the security element 101 into at least one transmitted component Rt associated with first wavelengths and into at least one reflected component R r associated with second wavelengths, as illustrated in Fig. 1B .
  • the reflected component R r of the wave R conveys the first component O of the OK authentication data contained by the first layer 10.
  • the reflected component Rr of the wave R involves an attenuated intensity of the signal associated with the first component O, contained by the first layer 10, with respect to the intensity of the signal associated with the second component K, coming from the second layer 20.
  • the calibration process of this example provides the image of figure 5A to be decomposed into two components, respectively shown in Figures 5B and 5C . It is to be noted that this example refers to a decomposition into components which makes use of a pattern 72 shown in figure 7 , associated with a specific example of one of the preferred decomposition mode of the authentication data, that will be after illustrated more in detail.
  • the two components of the greyscale image are thus transferred (o recorded) on a first layer 10 and on a second layer 20 of a security element devoid of the interfering layer 11 (step 740), and that will be used as a reference element for the calibration process.
  • the same components are also transferred (or recorded) on a first layer 10 and on a second layer 20 of a second security element 101 instead provided with an interfering layer 11 (step 750).
  • Said calibration curve is a function that takes into account the properties of the plurality of layers that compose the security element (for example, radiometric - or photometric - properties, such as thickness or material of the involved layers) and the information recording process, which, preferably making advantage of algorithms of the type disclosed by [1], [2], [3] and here incorporated by these references, allows to define the specific transfer modes of each component in the corresponding layers, in order for them to have intensity substantially equal when observed, or detected, from the observation direction in transmitted radiation.
  • the properties of the plurality of layers that compose the security element for example, radiometric - or photometric - properties, such as thickness or material of the involved layers
  • the information recording process which, preferably making advantage of algorithms of the type disclosed by [1], [2], [3] and here incorporated by these references, allows to define the specific transfer modes of each component in the corresponding layers, in order for them to have intensity substantially equal when observed, or detected, from the observation direction in transmitted radiation.
  • the OK authentication data matches one or more reference data prepared on the support 100.
  • the security element 101 although is preferably configured to allow a selective transparency to an electromagnetic wave within the visible spectrum, in alternative embodiments is configured to operate even with electromagnetic waves whose characteristics lay outside said wavelengths (or frequency) range.
  • the layers bearing the components wherein the authentication data has been decomposed may be made of materials suitable to be customized (or encoded).
  • the layers opposite to the interfering layer are preferably made of a plastic material transparent to visible radiation.
  • the phase of the layers bearing the components of the authentication data provides a recording of the latter in a corresponding layer by means of "additive” techniques, such as for example printing techniques, in particular inkjet, laser engraving or the like, and/or “subtractive” techniques, such as for example laser ablation techniques or analogous techniques, even combined together.
  • additive such as for example printing techniques, in particular inkjet, laser engraving or the like
  • subtractive such as for example laser ablation techniques or analogous techniques
  • the above-mentioned components of the authentication data are in the form of polarizable coating, in such a way that the authentication data detectable is a variable content data as a function of the polarization type obtained on said polarizable coating.
  • the components are in the form of photo-activatable pigments and may be contained in a corresponding layer, for example at a their thickness d and/or at a their interface surface S, as shown in figure 1B .
  • interface surface intends to denote a discontinuity zone, for example between two layers of the security element 101 that are identical but distinguished or between layers contiguous but qualitatively different.
  • the security element 101 even the interfering layer itself may bear a component of the authentication data. For this reason, in embodiments is enough for the security element 101 to be provided with at least two layers superimposed, each bearing a respective component of the authentication data.
  • the interfering layer 11 is preferably realized as a coating of the interface surface S of the layer 10 and/or layer 20.
  • such coating is of the thin-film type, preferably comprising metallic elements, metal oxides or other materials having similar properties.
  • the thin-fil type indicates that the coating thickness is substantially comparable to the wavelength of the incident radiation thereon, in particular - in case of document providing a detection within the visible radiation, such thickness may be comprised between 20 and 500 nm.
  • Multiple interfering layers may also be provided in a same security element.
  • the interfering layer is obtained by one or more deposition techniques, such as electrodeposition, sputtering, evaporation of metals or of metal oxides.
  • a preferred configuration of the document 1 is illustrated, in two separate phases of the production process, and provides a security element 101 comprising three superimposed layers, preferably made of plastic transparent material, and denoted by the references 30, 40 and 50.
  • the intermediate layer 40 among said three layers is coated on each of its interface surfaces S by a corresponding interfering layer 41, 42, preferably in the form of thin-film.
  • the optical density of the interfering layers 41 and 42 is comprised in the range 0.1 - 0.5.
  • each of said two interfering layers 41, 42 will be provided with a respective component of the two components O, K wherein an OK authentication data has been decomposed.
  • phase means of the layers which, preferably through one of the previously mentioned techniques and according to the register positioning mode already described, performs the recording of a first component on (or in) the interfering layer 41 and the recording of a second component K on (or in) the interfering layer 42, as indicated in Fig. 3 .
  • the intermediate layer 40 provided with the interfering layers 41, 42 containing the components O, K, and the remaining two layers 30, 50 are subsequently coupled together, preferably in such a way as to be contiguous and then rigidly bound - as visible in figure 3A - so as to ensure, at least during a verify phase of the document, the detection in perfect register of said two components O, K with each other.
  • FIG 4A is illustrated a further embodiment wherein the security element 101 comprises, similarly to the preceding example, three superimposed layers 30, 40 50.
  • the intermediate layer 40 among said three layers is coated on only one of the interface surfaces S by an interfering layer 41, preferably in the form of thin-film.
  • An authentication data F is decomposed into three components F1, F2, F3, and two of said three components - F1 and F2 - are respectively recorded on the interface surface Si of the interfering layer 41 and on the interface surface Sm of the intermediate layer 40, preferably though the above-mentioned additive techniques.
  • the remaining component F3 is instead recorded on the thickness of the intermediate layer 40, preferably through the laser engraving technique.
  • FIG 4B provides a security element 101 similar to that illustrated in figure 4A , which differs only due to a different distribution on the three components F1, F2, F3 wherein the authentication data F has been partitioned.
  • the second component F2 is recorded on the interface surface of the interfering layer 41 while the first F1 and the third F3 component are recorded (for example, through laser engraving) in the thickness of a respective 30, 50 external layers of the three layers 30, 40, 50 of the security element 101.
  • this configuration provides the interfering layer 41 to be provided with the respective component F2 prior to the coupling with the remaining layers 30, 40. Subsequently to said coupling, the remaining layers 30, 40 are provided with the respective components F1, F3.
  • such components are obtained by digitally processing the authentication data and, in this way, each of the algorithms disclosed, due to its specificity, better fit to a certain type of information (for example, alphanumeric characters, photographs, portraits, alphanumeric strings or other).
  • the procedure (shown below) of decomposing the authentication data into components is preferably used when the latter relates to images which depict a face 71 or alpha-numerical codes 81.
  • the authentication data is partitioned preferably into two components, following a predetermined pattern 70 using the aid of algorithms, for example filtering algorithms, preferably of the type disclosed in [4], here incorporated by this reference.
  • Said pattern is generated as a theme or recurring scheme 72, 82, preferably as a monochromatic bitmap file, in a regular and balanced way, multiplying and adding them to each other, according to a regular and ordered grid, identical basic modules (for example, composed of elementary geometric figures), pursuant to the translational symmetry rules (for example, operating vertical and horizontal translation).
  • a theme or recurring scheme 72, 82 preferably as a monochromatic bitmap file, in a regular and balanced way, multiplying and adding them to each other, according to a regular and ordered grid, identical basic modules (for example, composed of elementary geometric figures), pursuant to the translational symmetry rules (for example, operating vertical and horizontal translation).
  • each component (the components illustrated by the references 73, 74 when referring to the portrait 71, the components illustrated by the references 83, 84 when referring to the alpha-numerical code 81) is respectively generated using the portion of the authentication data corresponding to the white and the black ones of the pattern 72, 82.
  • the authentication data 91 is decomposed into two components 92, 93 according to a random pattern 90, even in this case making use of algorithms within reach of those skilled in the art, preferably of the type disclosed in [4].
  • the two components 92, 93 are generated respectively using the portion of the authentication data 91 corresponding to the white and the black of the pattern 90.
  • the pattern 90 is generated as a non-regular theme or scheme, preferably as a monochromatic bitmap file, juxtaposing, according to a disorderly and irregular grid, basic modules different one from each other, preferably following the randomness of a pseudo-random number generator [5], here incorporated by this reference.
  • Such decomposition method is preferably recommended for treatment of photos/images, as illustrated in figure 9 .
  • the authentication data 101, 111 is a string, preferably alpha-numerical string, whose elements are sorted following a specific criterion.
  • the elements of the string comprise alphabetic characters, and the authentication data is partitioned into two components. In a first case, the components are denoted by the references 102, 103 and in a second case the components are denoted by the references 112, 113.
  • the elements of the string of each component are regularly distributed among the two components 102, 103, whilst in the second case ( Figure 11 ) said elements are randomly distributed among the two components 112, 113, being compliant with the relative position of said sorting criterion among the elements.
  • the authentication data for example an image
  • the authentication data is partitioned into more than two components, preferably in three components, and wherein an interfering layer 11, 41, 42 bears at least one of said components.
  • the partition into three components is compliant with, for example, the following criterion:
  • the three components can be obtained considering their decomposition in compliance with, for example, models based on principles of additive synthesis (RGB) or subtractive synthesis (YMC).
  • RGB additive synthesis
  • YMC subtractive synthesis
  • the method can be partitioned into two main phases.
  • a preliminary phase overall denoted in the chart by the reference 127, of making the security element 101 and a phase subsequent to the latter with the authentication data.
  • the security element 101 is firstly necessary to provide a first layer 20 of material, preferably a plastic transparent material and comprising photo-activatable pigments.
  • the first layer 20 of the security element 101 is preferably a material having properties such as to be customized through laser engraving techniques.
  • an interfering layer 11 On an interface surface S of said first layer 20 is thus laid an interfering layer 11, preferably a thin-film, for example through one of the previously disclosed techniques (electrodeposition, sputtering or evaporation of metals or metal oxides).
  • the first layer 20 provided with the interfering layer 11 is coupled to a second layer 10, preferably in plastic transparent material.
  • the overall configuration of the three layers 10, 11, 20 is such that the interfering layer 11 is interposed between the first 20 and the second layer 10 and that, preferably, said three layers are contiguous and bound together, by coupling means suitable for the purpose.
  • the interfering layer has the property to be selectively transparent to an electromagnetic wave R which passes through the security element 101, in the described example preferably a wave within the visible spectrum.
  • the security element 101 should be now customized con the authentication data.
  • the authentication data relates to an image depicting the holder of the document 1. It is, however, clear that is possible to associate other types of information to the authentication data.
  • the customization phase provides the step 120 of an initial digitally providing of said image, in such a way that the latter can be processed.
  • the authentication data is a graphic format image 91, i.e. a digital data in a format that expresses an information intelligible for the human eye.
  • a graphic format image 91 i.e. a digital data in a format that expresses an information intelligible for the human eye.
  • an image may be downloaded from an image database 128, or even be digitally generated according to any modes available for those skilled in art and which, already known, will be no longer discussed.
  • a coding algorithm is selected for the authentication data, preferably pursuant to one of the methods (a, b, c, d) above disclosed.
  • the algorithm allows to partition the authentication data into more components and, in the current example, the algorithm which predicts the use of random grids will be taken into account.
  • a random pattern 90 is thus generated, at step 122, and preferably starting from a same theme/scheme for each document, choosing as a random generation seed a characteristic element of the document to be produced, as for example the number of the card itself.
  • a first component 92 containing the sole portions of the image corresponding to the white of the pattern is generated, referring to step 124a.
  • a second component 93 containing the sole portions of the image corresponding to the black of the pattern will be generated (step 124b).
  • a calibration of the intensity of the components is performed (as indicated at step 129), calculating a calibration curve to define the specific transfer modes of each component in the respective layers of the security element, in order for them to have intensity almost equal when detected from the observation direction in transmitted radiation of the security element.
  • the two components 92, 93 thus obtained are associated 125 to two separate layers of the security element 101.
  • the first layer 20 bears the first component 92 and the second layer 10 bears the second component 93, according to a position of mutual register.
  • the two components 92, 93 are recorded in the thickness of a respective layer 20, 10 through laser engraving techniques.
  • the document 1, and advantageously the support 100 is further customized by reference data of the card holder, such as, for example, the same image 91 used as authentication data.
  • the document 1 is thus ready to be used.
  • an electromagnetic wave R investing the document 1 is provided.
  • the security element 101 is thence observed 130 in reflected radiation, to detect the authentication data from one or both its opposite faces A, B.
  • the security element 101 is thence observed 131 in transmitted radiation to detect the authentication data in a complete form.
  • the completely detected authentication data is then compared 132 to a reference data. Their congruity is therefore verified and, in positive case 133, the document 1 results to be true. On the contrary, the document is counterfeit.
  • the reference data is prepared on the document 1 itself, preferably on the support 100, in such a way that the congruity of the latter to the authentication data allows to verify both the authenticity of document 1 itself and the authenticity of the sensitive information associated therewith.
  • the document 1 may even provide additional security elements that allow (any) congruity verifications 134 in addition to those associated with the authentication data according to the method previously disclosed.

Abstract

Identification document (1) provided with a security element (101), the latter comprising an authentication data (OK) decomposed into two or more components (O, K) applicated on two or more respective layers (10, 20) superimposed in a position of mutual register. Such layers comprise at least one interfering layer (11, 41, 42) to an electromagnetic wave (R) which incises on the security element (101), said interfering layer being configured in such a way that the authentication data (OK) is detectable as format by all its components exclusively from an only observation direction relating to one of the two opposite faces (A, B) of the security element (101).

Description

    Technical field of the invention
  • The present invention refers to a document apt to identify with certainty the holder and/or to allow a verification of the authenticity of the document itself. The document may be made, for example, in the form of book, card or banknote.
  • In case of identity document, the latter is preferably of the type in accordance with the standard ICAO 9303 (ISO 7810:2003).
  • In particular, the document is of the type having a customized security element that bears data selectively detectable by visual observation or by means of measurement or visual instruments.
  • Background
  • On the market, several types of documents are available, such as for example banknotes, recognition documents, passports or the like, that bear one or more portions made in such a way as to be transparent to light (whether widespread or directly incident) and containing security elements capable of confirming or not the authenticity of the document itself.
  • For example, US2008/0106091 discloses a security document provided with two optical elements, each of which is placed at a respective transparent window. At the moment of verification, the two transparent windows are superimposed one on the other, folding the document, and the two optical elements so superimposed produce an identification combination.
  • WO2017/092865 discloses a security element designed such as to show a first colour visually perceptible if observed in reflected light and a second colour visually perceptible if observed in transmitted light.
  • WO2016015130 declares an authentication document provided with a transparent window and of a security element at the latter. The security element comprises an authentication data comprising two components reported respectively on the front and on the rear of the document and a register between them, in such a way that a visual inspection of the document allows to verify the integrity of the information.
  • WO 2011/020537 declares an identification document and the corresponding manufacture method, provided with an authentication element comprising two superimposed pictures.
  • EP 2 559 563 A1 declares how to realize a security document with a semitransparent intermediate layer bearing portions of an authentication data that is reassembled if observed in transmitted light.
  • The documents of prior art above mentioned, even though making use of security elements, represent solutions perfectible regarding aspect such as reliability, ease of implementation and operation, and prevention of counterfeiting attempts.
  • In particular, the structure of the security element from the known solutions doesn't achieve a satisfying compromise between an adequate sophistication of security criteria and a simplicity in manufacturing techniques and/or document verification.
  • Furthermore, for most of known solutions, the reachable level of security is exclusively limited to protection/verification of the document authenticity, without the possibility to protect/verify even the authenticity of customized sensitive data associated and/or present thereon.
  • In addition, the performance of the security element of the known documents can be improved in terms of versatility and durability of materials used both for the element itself and for the whole document, also relating to the mainly portable use of the latter.
  • Summary of the invention
  • The technical problem posed and solved by the present invention is therefore that of providing a document provided with a security element, which allows to overcome one or more drawbacks above mentioned referring to the prior art.
  • This problem is solved by a document according to claim 1. The invention also refers to a method of making and verifying the authenticity of above said document according to claim 22 and 27, respectively.
  • Preferred features of the present invention represent the subject matter of the dependent claims.
  • In this context, the term "document" is to be intended in its broadest sense to include both recognition documents that bear data, for example, to prove the identity of the holder or to allow an authentication of the latter, either banknotes or, more generally, payment devices, without limitation either to the type of material used or to the format of the document itself.
  • Similarly, the terms "authentication", "identification", "recognition" or similar words are to be intended to indicate activities associated with proving the origin of the document and/or of identifying the author/holder to which the document is assigned.
  • In general terms, the document according to the invention provides a support element, or support, which incorporates a security element. The latter comprises a plurality of superimposed layers that define two opposite faces of the security element. In particular, two or more of such layers bear a corresponding component of an authentication data associated or associable with the support. Such components are arranged according to a position of mutual register between each other.
  • Furthermore, the above said plurality of layers comprises at least one layer, which will be recalled as inferring layer, which indeed interfere with an electromagnetic wave that passes therethrough. More in detail, the interfering layer is configured in such a way that the components are all simultaneously detectable to form, or to compose, the authentication data exclusively when observed, or irradiated, from a same observation direction relating to only one of the opposite faces of the security element. In such observation, or irradiation, condition the security element allows to verify the congruity of the authentication data with a reference data. Preferably, the interfering layer is interposed between two of the components of the authentication data and/or between two layers each bearing a respective component of the authentication data.
  • Decomposing authentication data in more components to be associated to the different layers of the security element, jointly with the presence of one specific of said layers configured to be transparent selectively to an electromagnetic wave, confers high safety features to the document. In this way, thus, the detection - in its entirely - of the authentication data is exclusively feasible from a single observation direction of the document which - as it will clearly appear from the description below - relates to transmitted radiation. In this condition, the authentication data is reconstructed thanks to the position of mutual register of the above-mentioned components.
  • In virtue of such a configuration, the document is therefore hardly adjustable or unduly alterable, for example for the purpose of sabotage or tampering, providing a high level of inviolability of the structural integrity of the security element.
  • In a preferred embodiment, the document according to the invention is customizable in such a way that the authentication data contained in the security element coincides with one (or more) reference data, for example arranged on the support element.
  • This solution is particularly advantageous as it is possible to associate a reference data uniquely assigned to the document - such as for example a serial number, the reproduction of a face, personal data of the sensitive holder or information of the equivalent type - to the authentication data present in the security element. In this way, it is possible to provide an instrument that certifies both the authenticity of the document itself and the authenticity of sensitive information associated therewith.
  • Furthermore, in its embodiments, the document of the invention is easy to be manufactured and easy to be operated during verification.
  • Advantageously, the components wherein the authentication data is decomposed are recorded on a corresponding layer of the security element according to a calibration function that allows to observe, or detect, the authentication data formed by two or more components having substantially the same intensity, in this way reducing possible uncertainties associated with the document verification operations.
  • Moreover, in virtue of the proposed structure, the security element has high durability.
  • Other advantages, characteristics and application methods of the present invention will become apparent from the following detailed description of several embodiments, presented by way of non-limiting examples.
  • Brief description of the figures
  • Reference will be made to the figures of the accompanying drawings, in which:
    • Figures 1 and 1A show a front view and an enlargement of a transversal cross-section, respectively, of a security element of a document according to the present invention according to a first embodiment;
    • Figure 1B schematically illustrates, in a transversal cross-section view, the behaviour of the security element of the document of the Figures 1 and 1A in an observation or irradiation condition from a selected direction;
    • Figure 2 shows a transversal cross-section view of the document of Figure 1;
    • Figures 2A and 2B each show, in a schematic prospective view, different observation methods of the document of Figure 1;
    • Figures 3 and 3A each show a lateral view of the document according to the present invention according to a second embodiment, respectively in an assembling configuration and in an assembled configuration;
    • Figure 4A shows a partial side exploded view of a document according to a third embodiment of the present invention;
    • Figure 4B shows a partial side exploded view of a document according to a fourth embodiment of the present invention;
    • Figures 5A, 5B, 5C and 5D illustrate a preferred generation method for decomposing into components an authentication data associable with the document according to the invention;
    • Figures 6A and 6B each schematically illustrates a corresponding exemplary type of data verifiable by a document according to the present invention;
    • Figure 7 schematically illustrates a first elaboration method of a first type of authentication data associable with the document according to the invention;
    • Figure 7A and 7B each shows a corresponding flow chart of the operations relating to the elaboration method of Figures 7;
    • Figure 7C shows a flow chart of the operations relating to the generation method of Figures 5A, 5B, 5C and 5D;
    • Figure 8 schematically illustrates the elaboration method illustrated by figure 7 of a second type of authentication data associable with the document according to the invention;
    • Figure 9 schematically illustrates a second elaboration of the first type of authentication data associable with the document according to the invention;
    • Figure 9A shows of flow charts of the operations relating to the elaboration method of Figure 9;
    • Figures 10 and 11 each schematically illustrates a respective variant of a third elaboration method of a third type of authentication data associable with the document according to the invention;
    • Figure 12 shows a flow chart of a preferred variant of a manufacture method of an embodiment of a document according to the present invention; and
    • Figure 13 shows a flow chart of a verification method of the document according to a preferred variant of execution of the the present invention.
    Detailed description of preferred embodiments
  • With initial reference to Figures 1 and 2, a document according to a preferred embodiment of the invention is overall denoted by the numerical reference 1. Preferably, the document 1 is a document made, for example, in form of book or card, and yet more preferably is of the type pursuant to the standard ICAO 9303 (ISO 7810:2003).
  • In the reported examples in the present description, reference will be made to figures that illustrate a document in a format amenable to a card, and preferably with purpose of identification of the holder thereof. However, as already mentioned, the present invention is intended to refer to documents in general, in particular to recognition devices or payment instruments, regardless of the relating format and/or material used to make them.
  • It will therefore be understood that the inventive concept of the present invention may be, for example, related to a document provided with pages, suitable for constituting different types of passports with a booklet of existing formats, but at the same time also applicable to a banknote.
  • In general terms, the document is structurally defined by, or comprising of, a support 100 and is equipped with a security element 101 integrated in, or jointed to, the support itself. The security element 101 comprises a plurality of layers respectively denoted by the references 10, 11 and 20, and defining a first external layer, an intermediate layer and a second external layer, respectively.
  • Preferably, the security element 101 is integrated within the support 100 so that the overall configuration of the document 1 is as such as to define two planar dimensions predominant compared to a third one, with reference to three axes x, y and z mutually orthogonal to each other. In other words, the support 100 and the security element 101 jointed thereto define a document in a card format. The layers 10, 11 and 20 have same form and extension on card plane (x-y plane) and are superimposed along the direction parallel to the axis z which defines the thickness of the card and of the security element 101. The two external layers 10 and 20 define two opposite faces, respectively A and B, of the security element 101 same.
  • In the example preferred embodiment hither considered, each of the two opposite faces A and B of the security element 101 corresponds to a respective opposite face of the support 100. In particular, the thickness of the security element 101 defined by the layers 10, 11 and 20 is substantially equal to the overall thickness of the support 100.
  • In this case, the opposite faces A and B of the security element 101 and the respective opposite faces of the support 100 jointly determine two opposite sides of the document 1 substantially without discontinuity.
  • In the example of Figure 1, the security element 101 is illustrated as having a perimetral profile defined by a closed curve, in particular oval, which borders a region with at least one symmetry axis inside thereof.
  • Obviously, different perimetral profiles (and associated dimensions) of the security element 101 - in relation to, for example, the extension of the support 100 - are possible, even depending on the type of document 1 that the person skilled in the art intends to consider.
  • It is also possible to provide more than one single security element 101 for a same document 1.
  • In general terms, the plurality of layers 10, 11, 20 overall bears an authentication data denoted by the way of example by the abbreviation "OK", which comprises, i.e. is partitioned into, two or more components. In the present example, two components denoted by or and K are provided.
  • The OK authentication data is intended to further be associated (or associable) to a reference data, i.e. a variable information, encodable or encoded, as for example a serial number, OCR codes, one-dimensional codes, two-dimensional codes, face reproduction, personal information of the holder of the document 1, or sensitive information of equivalent type.
  • Such OK authentication data is encoded within the document 1 by the security element 101.
  • In a particularly advantageous embodiment of document 1, the support 100 bears the reference data.
  • In different embodiments, the reference data may otherwise be contained in remote devices functionally connected to or associable with (for example by wireless connections) the document 1.
  • Each of said two or more components indicates instead a respective portion wherein the OK authentication data has been decomposed.
  • Therefore, the OK authentication data results to be complete, and thence consistent to the information expressed by the reference data, only when detectable as composed by all components that has been partitioned into.
  • Several possible ways, in which this authentication data is decomposed and is physically contained in the plurality of layers of the security element 101, will be illustrated in the following description.
  • In any case, the authentication data is overall contained within the plurality of layers of the security element 101, and, as mentioned, each of said layers bears a corresponding component.
  • It is possible to provide an authentication data capable of being partitioned into a greater or minor number of components with respect to the number of layers that composes the security element 101 and/or provides more than one component for a same layer.
  • With reference to the example illustrated by Figures from 1 to 2B, as previously described, the OK authentication data has been partitioned into two components O, K and the security element 101 comprises the three superimposed layers 10, 11, 20.
  • As can be seen from the view along the a-a section of figure 1A, the three layers 10, 11 and 20 are preferably contiguous and bound together.
  • Preferably and independently from the type of described embodiment, coupling means (not shown) are provided, configured to stably bind together the several layers that compose the plurality of layers of the security element 101.
  • Referring again to the example of the above-mentioned figures, and with particular reference to figure 1B, in this configuration the intermediate layer 11 is interposed between the first external layer 10 and the second external layer 20, in particular an interfering layer that acts on the electromagnetic wave R which passes through the security element 101, as illustrated hereinafter.
  • The components O, K are respectively contained by the first layer 10 and by the second layer 20 according to one their relating position of mutual register. For simplicity of disclosure, the two layers which bear the components of the authentication data can be later referred as "principal layers" for the sole purpose of identifying them.
  • In general, within the context of this description, the relative position of mutual register for the components indicates a relative alignment (as a non-limiting example, of spatial or frequency type) between the components such that a superimposition (again as a non-limiting example, of spatial type) of the latter according to a selective direction, or verse, of observation allows to rebuild correctly and completely the authentication data.
  • The coupling means previously mentioned gives the structure of the security element 101 more effectiveness and makes a - rigid - constraint among the layers that allows to keep the components in register, even when the document 1 is subjected to stress that makes it, for example, bend.
  • Furthermore, the relative position of the intermediate layer 11 with respect to the first layer 10 and the second layer 20 allows to define which are the layers associated to said "A Side" or "B Side" of the document 1, depending on the direction according to which the electromagnetic wave R incise and crosses the security element 101.
  • Each of said "A Side" and "B Side" of the document 1 can be associated, thence, even to observation direction, incidence or irradiation thereof, to which reference will be made by the term "in reflected radiation" or "in transmitted radiation" depending on the interaction between the interfering layer 11 and the electromagnetic wave R.
  • In the context of the present invention, it is worth to recall, for better clarity, a few known principles regarding an electromagnetic wave interacting with the surface of a material or with one or more surfaces of a layers' series of material, even if one different from each other.
  • In the optical field, layers or surfaces of certain materials - often denoted by thin-film when their thickness is typically comparable to the wavelength of the incident radiation - have the properties of reflecting, transmitting and/or selectively absorbing an electromagnetic radiation that invests it, depending on its frequency and/or of the structural and chemical properties of the material.
  • In virtue of such properties, reflected components of the radiation can be, for example, eliminated or totally reflected; it's possible to divide or combine radiations of different wavelengths or with different directions and more.
  • The phenomena that form the basis for this reaction to the incident radiation are essentially amenable to diffraction and interference phenomena and to achieve the desired result, at least in general terms, the number of layers (and the involved thicknesses) and the materials which they are made of, must be properly taken into account.
  • Without further deepening into the discussion, when an electromagnetic wave crosses one (or more) surface/layer, principally due to multiple reflection phenomena both at the interface with the surface(s) and between the interfaces of different layers whether present, an interference is generally realized either constructive or destructive in function (also) of the optical path travelled by the wave and of the spectral characteristics of the wave itself.
  • Therefore, substantially depending on the type of interference obtained, the transmission of specific wavelengths and the reflection of others are selectively determined.
  • Exemplary applications of the general principle above illustrated are dichroic filters, prisms, frames and analogous devices based on the same principle, in the knowledge of those skilled in the art and that will be not further depth.
  • Referring again to the example of Figures 1 to 2B, for the document 1 is then established an observation direction, or verse, "in transmitted radiation" when the latter is observed from the opposite face towards that whereon the security element 101 is hit by the electromagnetic wave R.
  • Such observation direction in transmitted radiation is associated with the radiation coming from the B Side of the document 1, in the current example. In the same way, for the document 1 an observation direction, or verse, "in reflected radiation" is established when the latter is observed from the same face whereon the security element 101 is hit by the electromagnetic wave R. Such observation direction in reflected radiation is then associated with the radiation coming from the A Side of the document 1, still in the current example.
  • The interfering layer 11 is therefore configured in such a way that the two components O and K are both detectable to form the OK authentication data exclusively from an observation direction, in particular the observation direction in transmitted radiation, relating to one only - the B Side, in this example - of the two opposite faces of the document 1, and more in general of the security element 101 incorporated therein.
  • Specifically, the interfering layer 11 partitions the electromagnetic wave R affecting the security element 101 into at least one transmitted component Rt associated with first wavelengths and into at least one reflected component Rr associated with second wavelengths, as illustrated in Fig. 1B.
  • Observing the security element 101 from the A Side of the document 1, it is noted that the reflected component Rr of the wave R conveys the first component O of the OK authentication data contained by the first layer 10.
  • Due to the filtering effect realized by interfering layer 11, from the same observation direction (i.e. in reflected radiation), however, it is not possible to detect the transmitted component Rt of the wave which conveys the second component K of the OK authentication data contained by the second layer 20. Otherwise observing the security element 101 from the B Side of the document 1, it is noted that the transmitted component Rt of the wave R, crossing both the first layer 10 and the second layer 20, conveys along both the first component O and the second component K of the OK authentication data, contained by the first layer 10 and by the second layer 20, respectively. Therefore, the solution above described allows to verify congruity of the OK authentication data by a reference data associated therewith.
  • Observing in transmitted radiation, it is possible that the reflected component Rr of the wave R involves an attenuated intensity of the signal associated with the first component O, contained by the first layer 10, with respect to the intensity of the signal associated with the second component K, coming from the second layer 20.
  • In this case, appropriate configurations of the document 1, in particular of the first 10 and the second layer and 20, of the interfering layer 11 and of the recording modes of the authentication data, allow to balance the intensity of the signals detected from the observation direction in transmitted radiation and associated with the two components O, K of the OK authentication data, in such a way that they have almost identical intensities.
  • For this purpose, exemplifying, it is hereinafter described a possible calibration process that uses a greyscale image, as shown in figure 5A, consisting of fields with 100 levels of grey. The flow chart of the operations associated with this preferred example is shown in figure 7C.
  • The calibration process of this example provides the image of figure 5A to be decomposed into two components, respectively shown in Figures 5B and 5C. It is to be noted that this example refers to a decomposition into components which makes use of a pattern 72 shown in figure 7, associated with a specific example of one of the preferred decomposition mode of the authentication data, that will be after illustrated more in detail.
  • The two components of the greyscale image are thus transferred (o recorded) on a first layer 10 and on a second layer 20 of a security element devoid of the interfering layer 11 (step 740), and that will be used as a reference element for the calibration process. The same components are also transferred (or recorded) on a first layer 10 and on a second layer 20 of a second security element 101 instead provided with an interfering layer 11 (step 750).
  • Lightening the two safety elements during transmission, and comparing them with each other, it is possible to measure the variation of the image grey levels - as illustrated in Figure 5D - and to use the data obtained by these measurements in order to determine a "calibration curve" (step 760).
  • Said calibration curve is a function that takes into account the properties of the plurality of layers that compose the security element (for example, radiometric - or photometric - properties, such as thickness or material of the involved layers) and the information recording process, which, preferably making advantage of algorithms of the type disclosed by [1], [2], [3] and here incorporated by these references, allows to define the specific transfer modes of each component in the corresponding layers, in order for them to have intensity substantially equal when observed, or detected, from the observation direction in transmitted radiation.
  • As previously mentioned, advantageously, in a preferred embodiment of the document 1, the OK authentication data matches one or more reference data prepared on the support 100.
  • By the way of example, types of authentication data, used to verify the document 1 authenticity by comparing to a reference data reported on the support 100 of the latter, are provided by the examples of Figures 6A and 6B. It will also be appreciated that, based on the characteristics of the incident electromagnetic wave R, the detection of the authentication data is possible either by visual observation or even by suitable detection means, for example automatic detection means.
  • For this reason, the security element 101, although is preferably configured to allow a selective transparency to an electromagnetic wave within the visible spectrum, in alternative embodiments is configured to operate even with electromagnetic waves whose characteristics lay outside said wavelengths (or frequency) range.
  • Advantageously, the layers bearing the components wherein the authentication data has been decomposed may be made of materials suitable to be customized (or encoded).
  • Furthermore, according to preferred embodiments, the layers opposite to the interfering layer are preferably made of a plastic material transparent to visible radiation.
  • Preferably, the phase of the layers bearing the components of the authentication data provides a recording of the latter in a corresponding layer by means of "additive" techniques, such as for example printing techniques, in particular inkjet, laser engraving or the like, and/or "subtractive" techniques, such as for example laser ablation techniques or analogous techniques, even combined together.
  • In many embodiments of the present invention, the above-mentioned components of the authentication data are in the form of polarizable coating, in such a way that the authentication data detectable is a variable content data as a function of the polarization type obtained on said polarizable coating.
  • In several exemplary embodiments, the components are in the form of photo-activatable pigments and may be contained in a corresponding layer, for example at a their thickness d and/or at a their interface surface S, as shown in figure 1B.
  • In the context of the present description, the expression "interface surface" intends to denote a discontinuity zone, for example between two layers of the security element 101 that are identical but distinguished or between layers contiguous but qualitatively different.
  • It is specified that, for embodiments of the security element 101, even the interfering layer itself may bear a component of the authentication data. For this reason, in embodiments is enough for the security element 101 to be provided with at least two layers superimposed, each bearing a respective component of the authentication data.
  • Referring again to Figures 1A, 1B and 2, the interfering layer 11 is preferably realized as a coating of the interface surface S of the layer 10 and/or layer 20. Advantageously, such coating is of the thin-film type, preferably comprising metallic elements, metal oxides or other materials having similar properties. The thin-fil type, as previously mentioned, indicates that the coating thickness is substantially comparable to the wavelength of the incident radiation thereon, in particular - in case of document providing a detection within the visible radiation, such thickness may be comprised between 20 and 500 nm. Multiple interfering layers may also be provided in a same security element. Preferably, the interfering layer is obtained by one or more deposition techniques, such as electrodeposition, sputtering, evaporation of metals or of metal oxides.
  • With respect to the exemplary embodiment of the document 1 previously disclosed, as stated, different configurations relating to positioning and number of interfering layers 11 of the security element 101 are also feasible. A few examples of such variants are illustrated below.
  • In the example of figure 3 and 3A, a preferred configuration of the document 1 is illustrated, in two separate phases of the production process, and provides a security element 101 comprising three superimposed layers, preferably made of plastic transparent material, and denoted by the references 30, 40 and 50.
  • In a preliminary phase, as shown in figure 3, the intermediate layer 40 among said three layers is coated on each of its interface surfaces S by a corresponding interfering layer 41, 42, preferably in the form of thin-film. In this example, the optical density of the interfering layers 41 and 42 is comprised in the range 0.1 - 0.5.
  • Subsequently, each of said two interfering layers 41, 42 will be provided with a respective component of the two components O, K wherein an OK authentication data has been decomposed.
  • The above-mentioned components are thus sent to phase means of the layers which, preferably through one of the previously mentioned techniques and according to the register positioning mode already described, performs the recording of a first component on (or in) the interfering layer 41 and the recording of a second component K on (or in) the interfering layer 42, as indicated in Fig. 3.
  • The intermediate layer 40, provided with the interfering layers 41, 42 containing the components O, K, and the remaining two layers 30, 50 are subsequently coupled together, preferably in such a way as to be contiguous and then rigidly bound - as visible in figure 3A - so as to ensure, at least during a verify phase of the document, the detection in perfect register of said two components O, K with each other.
  • In figure 4A is illustrated a further embodiment wherein the security element 101 comprises, similarly to the preceding example, three superimposed layers 30, 40 50.
  • In this case, the intermediate layer 40 among said three layers is coated on only one of the interface surfaces S by an interfering layer 41, preferably in the form of thin-film.
  • An authentication data F is decomposed into three components F1, F2, F3, and two of said three components - F1 and F2 - are respectively recorded on the interface surface Si of the interfering layer 41 and on the interface surface Sm of the intermediate layer 40, preferably though the above-mentioned additive techniques.
  • The remaining component F3 is instead recorded on the thickness of the intermediate layer 40, preferably through the laser engraving technique.
  • Finally, the embodiment illustrated in figure 4B, provides a security element 101 similar to that illustrated in figure 4A, which differs only due to a different distribution on the three components F1, F2, F3 wherein the authentication data F has been partitioned.
  • As visible, in this case the second component F2 is recorded on the interface surface of the interfering layer 41 while the first F1 and the third F3 component are recorded (for example, through laser engraving) in the thickness of a respective 30, 50 external layers of the three layers 30, 40, 50 of the security element 101.
  • Preferably, from a standpoint of the realization process, this configuration provides the interfering layer 41 to be provided with the respective component F2 prior to the coupling with the remaining layers 30, 40. Subsequently to said coupling, the remaining layers 30, 40 are provided with the respective components F1, F3.
  • As previously mentioned, configurations that provide the decomposition of the authentication data into a greater number of components are also feasible.
  • Several types of algorithms are below reported, by the way of non-limiting examples, that are available for decomposing the authentication data into said two or more components, specifically referring to the features of the information that the authentication data contains.
  • Preferably, such components are obtained by digitally processing the authentication data and, in this way, each of the algorithms disclosed, due to its specificity, better fit to a certain type of information (for example, alphanumeric characters, photographs, portraits, alphanumeric strings or other).
  • a) Decomposition of the authentication data by means of regular grids
  • Referring to Figures 7, 7A, 7B and 8, the procedure (shown below) of decomposing the authentication data into components is preferably used when the latter relates to images which depict a face 71 or alpha-numerical codes 81.
  • The authentication data is partitioned preferably into two components, following a predetermined pattern 70 using the aid of algorithms, for example filtering algorithms, preferably of the type disclosed in [4], here incorporated by this reference.
  • Said pattern is generated as a theme or recurring scheme 72, 82, preferably as a monochromatic bitmap file, in a regular and balanced way, multiplying and adding them to each other, according to a regular and ordered grid, identical basic modules (for example, composed of elementary geometric figures), pursuant to the translational symmetry rules (for example, operating vertical and horizontal translation).
  • In the illustrated case, each component (the components illustrated by the references 73, 74 when referring to the portrait 71, the components illustrated by the references 83, 84 when referring to the alpha-numerical code 81) is respectively generated using the portion of the authentication data corresponding to the white and the black ones of the pattern 72, 82.
  • Hereinafter it is indicated, as a way of non-limiting example, the flow of operations to be executed.
  • Pattern generation (Figure 7A):
    • choose, during a step or phase 701, the monochromatic recurring theme 70 (in black and white);
    • build, during a step or phase 702, the pattern 72, 82 as a monochromatic bitmap file, repeating the recurring scheme, in vertical and horizontal translation, along the entire dimension of the pattern.
  • Generation of the two components (respectively denoted by the references 73, 74 and 83, 84):
    • generate, during a step or phase 710, two selections corresponding with the black and white portions of the pattern by means of selection functions, preferably the selection functions of Adobe Photoshop®;
    • superimpose, during a step or phase 720, the selection of the white portion on the authentication data 71, 81 and generate a first component 74, 84 comprising the white portion of the pattern 72, 82 and of the authentication data, at the black portion of the pattern;
    • superimpose, during a step or phase 730, the selection of the black portion on the authentication data 71, 81 and generate a second component 73, 83 comprising the black portion of the pattern 72, 82 and of the authentication data, at the white portion of the pattern.
    b) Decomposition of the authentication data by means of random g rids
  • Now referring to Figures 9 and 9A, in the illustrated example the authentication data 91 is decomposed into two components 92, 93 according to a random pattern 90, even in this case making use of algorithms within reach of those skilled in the art, preferably of the type disclosed in [4].
  • Similarly to that illustrated in the previous paragraph a), the two components 92, 93 are generated respectively using the portion of the authentication data 91 corresponding to the white and the black of the pattern 90.
  • In this case, the pattern 90 is generated as a non-regular theme or scheme, preferably as a monochromatic bitmap file, juxtaposing, according to a disorderly and irregular grid, basic modules different one from each other, preferably following the randomness of a pseudo-random number generator [5], here incorporated by this reference.
  • In this case, in other words, it is possible to generate a random grid as a pattern, using for example a reference data associated with, or reported on, the document 1 (for example the card number, personal data or other similar information) as a seed of random generation.
  • Such decomposition method is preferably recommended for treatment of photos/images, as illustrated in figure 9.
  • Below, and further referring to figure 9A, the flow of operations to be executed to generate the random pattern is indicated, by the way of a non-limiting example.
  • Generation of the random pattern:
    • provide, during a phase or step 910, a pseudo-random number generator, for example a generator that uses the Mersenne Twister algorithm [6], here incorporated by this reference;
    • select, during a phase or step 920, a generation seed, for example a reference data associated with, or reported on, the document 1;
    • provide, during a phase or step 930, one (or more) recurring monochromatic (black or white) theme/scheme to build the pattern 90;
    • replicate, during a phase or step 940, the theme/scheme along the entire dimension of the pattern 90 according to the random coordinates given by the pseudo-random number generator.
    c) Decomposition of the authentication data when referring to alpha-numerical strings
  • In this case, the authentication data 101, 111 is a string, preferably alpha-numerical string, whose elements are sorted following a specific criterion. Referring to Figures 10 and 11, the elements of the string comprise alphabetic characters, and the authentication data is partitioned into two components. In a first case, the components are denoted by the references 102, 103 and in a second case the components are denoted by the references 112, 113.
  • In the first case (Figure 10), the elements of the string of each component are regularly distributed among the two components 102, 103, whilst in the second case (Figure 11) said elements are randomly distributed among the two components 112, 113, being compliant with the relative position of said sorting criterion among the elements.
  • d) Decomposition of the authentication data in three components
  • Now referring to the case wherein the authentication data, for example an image, is partitioned into more than two components, preferably in three components, and wherein an interfering layer 11, 41, 42 bears at least one of said components.
  • The partition into three components is compliant with, for example, the following criterion:
    • a first component contains the close-up of a face illustrated in an image (foreground);
    • a second component contains un intermediate level of the image (middleground);
    • a third component contains the background of the image (background). Each component can be obtained even by the use of a regular or random pattern, as previously disclosed in paragraph a), preferably with three distinct shades.
  • Whether the image was a colour image, the three components can be obtained considering their decomposition in compliance with, for example, models based on principles of additive synthesis (RGB) or subtractive synthesis (YMC).
  • It is now described, by way of non-limiting example, a preferred method to manufacture the document 1, in the specific case of the latter being in card ID-1 format and provided with a customized security element 101, i.e. containing an authentication data related to an image depicting the holder (for example, the face) of the card.
  • For the sake of simplicity, reference will be made to the structure of the document 1 shown in figures from 1 to 2B, wherein the security element 101 comprises three layers superimposed and the authentication data is partitioned into two components.
  • Further referring to the flow chart illustrated by figure 12, is thence described the succession of operations necessary to manufacture said document 1.
  • In general terms, the method can be partitioned into two main phases.
  • A preliminary phase, overall denoted in the chart by the reference 127, of making the security element 101 and a phase subsequent to the latter with the authentication data.
  • To manufacture the security element 101 is firstly necessary to provide a first layer 20 of material, preferably a plastic transparent material and comprising photo-activatable pigments.
  • The first layer 20 of the security element 101 is preferably a material having properties such as to be customized through laser engraving techniques.
  • On an interface surface S of said first layer 20 is thus laid an interfering layer 11, preferably a thin-film, for example through one of the previously disclosed techniques (electrodeposition, sputtering or evaporation of metals or metal oxides).
  • Subsequently, the first layer 20 provided with the interfering layer 11 is coupled to a second layer 10, preferably in plastic transparent material.
  • The overall configuration of the three layers 10, 11, 20 is such that the interfering layer 11 is interposed between the first 20 and the second layer 10 and that, preferably, said three layers are contiguous and bound together, by coupling means suitable for the purpose.
  • The interfering layer, as above disclosed, has the property to be selectively transparent to an electromagnetic wave R which passes through the security element 101, in the described example preferably a wave within the visible spectrum.
  • The security element 101 should be now customized con the authentication data.
  • As stated, in the example here considered, the authentication data relates to an image depicting the holder of the document 1. It is, however, clear that is possible to associate other types of information to the authentication data.
  • For this purpose, the customization phase provides the step 120 of an initial digitally providing of said image, in such a way that the latter can be processed.
  • Preferably, the authentication data is a graphic format image 91, i.e. a digital data in a format that expresses an information intelligible for the human eye. Obviously, such an image may be downloaded from an image database 128, or even be digitally generated according to any modes available for those skilled in art and which, already known, will be no longer discussed.
  • Subsequently, in a step 121, a coding algorithm is selected for the authentication data, preferably pursuant to one of the methods (a, b, c, d) above disclosed.
  • The algorithm allows to partition the authentication data into more components and, in the current example, the algorithm which predicts the use of random grids will be taken into account.
  • Further referring to Figure 9, a random pattern 90 is thus generated, at step 122, and preferably starting from a same theme/scheme for each document, choosing as a random generation seed a characteristic element of the document to be produced, as for example the number of the card itself.
  • Once the pattern is obtained, a first component 92 containing the sole portions of the image corresponding to the white of the pattern is generated, referring to step 124a. Similarly, a second component 93 containing the sole portions of the image corresponding to the black of the pattern will be generated (step 124b).
  • Preferably, as previously disclosed, a calibration of the intensity of the components is performed (as indicated at step 129), calculating a calibration curve to define the specific transfer modes of each component in the respective layers of the security element, in order for them to have intensity almost equal when detected from the observation direction in transmitted radiation of the security element.
  • The two components 92, 93 thus obtained are associated 125 to two separate layers of the security element 101. In particular, the first layer 20 bears the first component 92 and the second layer 10 bears the second component 93, according to a position of mutual register.
  • Preferably, the two components 92, 93 are recorded in the thickness of a respective layer 20, 10 through laser engraving techniques.
  • Preferably, the document 1, and advantageously the support 100, is further customized by reference data of the card holder, such as, for example, the same image 91 used as authentication data.
  • The document 1 is thus ready to be used.
  • In the flow chart illustrated in figure 13, the steps of a method to verify the document authenticity 1 are represented according to the present invention, according to a preferred embodiment of the latter.
  • Preliminarily, an electromagnetic wave R investing the document 1 is provided. The security element 101 is thence observed 130 in reflected radiation, to detect the authentication data from one or both its opposite faces A, B.
  • In this way, it is verified whether only one component of the authentication data contained thereof is detectable.
  • The security element 101 is thence observed 131 in transmitted radiation to detect the authentication data in a complete form.
  • The completely detected authentication data is then compared 132 to a reference data. Their congruity is therefore verified and, in positive case 133, the document 1 results to be true. On the contrary, the document is counterfeit. Advantageously, the reference data is prepared on the document 1 itself, preferably on the support 100, in such a way that the congruity of the latter to the authentication data allows to verify both the authenticity of document 1 itself and the authenticity of the sensitive information associated therewith. The document 1 may even provide additional security elements that allow (any) congruity verifications 134 in addition to those associated with the authentication data according to the method previously disclosed.
  • The present invention has been herein described referring to preferred embodiments. It is to be intended that other embodiments may be implemented which belong to the same inventive core, as defined within the scope of claims set forth below.
    1. [1] Acharya and Ray, Image Processing: Principles and Applications, Wiley-Interscience 2005.
    2. [2] Russ, The Image Processing Handbook: Fourth Edition, CRC 2002.
    3. [3] Specification ICC.1:2010 (Profile version 4.3.0.0).
    4. [4] Functions of filtering and masking Adobe®.
    5. [5] A. Menezes, P, van Oorschot, S. A. Vanstone - Handbook of Applied Cryptography - CRC Press 1996.
    6. [6] Mersenne Twister: A 623 - Dimensionally Equidistributed Uniform Pseudo -Random Number Generator MAKOTO MATSUMOTO Keio University and the Max-Planck-Institut fur Mathematik and TAKUJI NISHIMURA Keio University. ACM Transactions on Modeling and Computer Simulation, Vol. 8, No. 1, January 1998.

Claims (25)

  1. A document (1), comprising:
    ▪ a support (100); and
    ▪ a security element (101) bearing an authentication data (OK; F), which security element (101) comprises a plurality of layers (10, 11, 20; 30, 40, 41, 42, 50) superimposed and fixed one to each other to define two opposite sides (A, B) of the security element (101),
    wherein at least two main layers (10, 20; 41, 42) of said plurality each bears a respective component (O, K; F1, F2, F3) of said authentication data (OK; F) arranged in mutual register,
    and wherein said plurality of layers comprises at least one interfering layer (11; 41, 42) interposed among at least two main layers, said interfering layer being configured to selectively transmit first wavelengths and to reflect second wavelengths of an incident electromagnetic radiation (R) thereon, such that said components (O, K; F1, F2, F3) of said authentication data (OK; F) are all observable or detectable to form said authentication data (OK; F) exclusively from one observation direction in transmitted radiation related to only one of said two opposite faces (A, B) of the security element (101),
    in such a way that the document (1) allows to verify the congruity of said authentication data (OK; F) with reference data.
  2. The document (1) according to claim 1, wherein said two main layers (10, 20) are directly adjacent and in contact with said interfering layer (11).
  3. The document (1) according to any one of the preceding claims, wherein an additional layer (40) of said plurality of layers is interposed between said two main layers (30, 50).
  4. The document (1) according to any one of the preceding claims, wherein said interfering layer (11; 41, 42) is in the form of a coating of an interface surface (S) of a layer of said plurality of layers.
  5. The document (1) according to claim 4, wherein said coating (11; 41, 42) is of the thin-film type, preferably comprising metallic elements or metal oxides.
  6. The document (1) according to claim 4 or 5, wherein said interfering layer (11; 41, 42) is obtained by one or more processes comprised in the list comprising electrodeposition, sputtering, evaporation of metals or of metal oxides.
  7. The document (1) according to any one of the preceding claims, wherein interfering layer (11; 41, 42) is configured to allow a selective transparency of the security element (101) to an electromagnetic wave within the visible spectrum.
  8. The document (1) according to any one of the preceding claims, wherein at least one layer of said plurality of layers is made of plastic and/or transparent material to said incident electromagnetic radiation (R).
  9. The document (1) according to any one of the preceding claims, wherein said two main layers (10, 20) each bears the respective component (O, K) of the authentication data at their own thickness and/or at their own interface surface (S).
  10. The document (1) according to any of the preceding claims, wherein said components (O, K) of the authentication data are realized by means of photo-activatable pigments.
  11. The document (1) according to any one of the preceding claims, wherein said components (O, K) of the authentication data are in the form of polarizable coating and said authentication data (OK) is a variable content data according to the type of polarization obtained on said polarizable coating.
  12. The document (1) according to any one of the preceding claims, wherein said two components (O, K) of the authentication data are recorded on the respective layer of said plurality of layers by one or more techniques comprised in the list comprising laser engraving, laser ablation, inkjet.
  13. The document (1) according to any one of the preceding claims, wherein the optical density of said interfering layer (11; 41, 42) is comprised between 0.1 and -0.5 approximately.
  14. The document (1) according to any one of the preceding claims, wherein said authentication data (OK; F) coincides with one more reference data provided on the support (100).
  15. The document (1) according to any one of the preceding claims, wherein said support (100) is in the form of a page, card or banknote.
  16. The document (1) according to any one of the preceding claims, wherein said plurality of layers is a laminate.
  17. The document (1) according to any one of the preceding claims, wherein the thickness of the security element (101) defined by said plurality of layers is substantially equal to the thickness of the support (100).
  18. The document (1) according to any one of the preceding claims, wherein said two or more components (O, K; F1, F2, F3) are transferred on a respective layer of said plurality (10, 11, 20; 30, 40, 41, 42, 50) according to a calibration function obtained from the properties of the latter and in such a way that said two or more components have the same intensity when observed, or detected, to form said authentication data (OK; F).
  19. A method of making a document (1) according to any one of the preceding claims, comprising the steps of:
    ▪ digitally providing an authentication data (OK) to be associated with the document (1);
    ▪ providing two or more layers of material configured to bear said authentication data (OK), wherein said two or more layers comprise an interfering layer with an electromagnetic wave passing therethrough;
    ▪ coupling at least one layer (20) of said two or more layers with said interfering layer (10);
    ▪ decomposing said authentication data (OK) into two or more components;
    ▪ transferring, in a position of mutual register, each of said two or more components on a respective of said two or more layers to obtain a security element (101);
    ▪ providing a support element (100) of the security element (101) to obtain the document (1),
    wherein said two or more layers are coupled in a superimposed manner and wherein said interfering layer is configured in such a way that said two or more components are all detectable to form said authentication data exclusively from an observation direction relating to only one of two opposite sides (A, B) of the security element (101).
  20. The method of making a document (1) according to claim 19, comprising the steps of:
    ▪ providing three layers of said two or more layers of material, wherein the intermediate layer of said three layers is said interfering layer;
    ▪ coupling a first layer of said three layers with the interfering layer and subsequently coupling the latter with the remaining of said three layers;
    ▪ transferring a first component of said two or more components on said first layer and a second component of said two or more components on said remaining layer.
  21. The method of making a document according to claim 19, comprising the steps of:
    ▪ providing four layers of said two or more layers of material wherein one of which is said interfering layer;
    ▪ coupling a first layer of said three layers with the interfering layer;
    ▪ transferring a first component on said interfering layer and subsequently
    ▪ coupling the two remaining layers with said first layer and with said interfering layer, respectively; and subsequently
    ▪ transferring on said two remaining layers a second and a third component respectively.
  22. The method of making a document according to any one of the claims from 19 to 21, wherein a phase of calibrating the intensity of said two or more components is performed prior to transferring the latter on a respective one of said two or more layers.
  23. The method of making a document according to any one of the claims from 19 to 22, comprising the step of preparing one or more reference data on said support element (100), wherein said authentication data (OK) corresponds to said one or more reference data.
  24. Method of making a document accord to any one of claims from 19 to 23, wherein said two or more components (O, K; F1, F2, F3) are digitally obtained by processing said authentication data (OK; F) based on regular grid or on patterns obtained by algorithms implemented by random or pseudo-random number generators.
  25. A method of verifying the authenticity of a document comprising the steps of:
    ▪ providing a document (1) according to any one of the claims from 1 to 18;
    ▪ exposing the security element of said document (1) to an electromagnetic wave (R) with a direction of incidence which invests said document (1) from one of two opposite sides (A, B) of a security element (101) of the latter;
    ▪ detecting an authentication data (OK) contained by the security element (101) from an observation direction facing the face opposite to the face related to said incidence direction;
    ▪ comparing the authentication data (OK) detected with a reference data associated with the document (1) to verify their congruity and therefore the authenticity of the document (1).
EP19157723.8A 2018-02-19 2019-02-18 Document having a security element and related method Active EP3528216B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IT102018000002811A IT201800002811A1 (en) 2018-02-19 2018-02-19 DOCUMENT WITH AN ELEMENT OF SECURITY AND RELATED METHOD

Publications (2)

Publication Number Publication Date
EP3528216A1 true EP3528216A1 (en) 2019-08-21
EP3528216B1 EP3528216B1 (en) 2020-08-05

Family

ID=62386670

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19157723.8A Active EP3528216B1 (en) 2018-02-19 2019-02-18 Document having a security element and related method

Country Status (3)

Country Link
EP (1) EP3528216B1 (en)
ES (1) ES2832074T3 (en)
IT (1) IT201800002811A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2596075A (en) * 2020-06-15 2021-12-22 Iq Structures Sro Composite security element

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0628408A1 (en) * 1993-06-08 1994-12-14 Dragisa Andric Security paper with color mark
WO1997047478A1 (en) * 1996-06-14 1997-12-18 De La Rue International Limited Security device
EP1415828A1 (en) * 2002-10-30 2004-05-06 Xerox Corporation Anti-counterfeiting feature using line patterns
US20080106091A1 (en) 2004-09-15 2008-05-08 Wayne Robert Tompkin Security Document With Transparent Windows
WO2011020537A1 (en) 2009-08-18 2011-02-24 Mühlbauer Ag Identification document having two superimposed images
EP2559563A1 (en) 2011-08-18 2013-02-20 Polska Wytwornia Papierow Wartosciowych S.A. A security document with a see-through feature, and methods for manufacturing and authentication thereof
WO2016015130A1 (en) 2014-07-30 2016-02-04 Canadian Bank Note Company, Limited Security document having a protected window and method for making the same
WO2017092865A1 (en) 2015-12-01 2017-06-08 Giesecke & Devrient Gmbh Security element and data carrier equipped therewith

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0628408A1 (en) * 1993-06-08 1994-12-14 Dragisa Andric Security paper with color mark
WO1997047478A1 (en) * 1996-06-14 1997-12-18 De La Rue International Limited Security device
EP1415828A1 (en) * 2002-10-30 2004-05-06 Xerox Corporation Anti-counterfeiting feature using line patterns
US20080106091A1 (en) 2004-09-15 2008-05-08 Wayne Robert Tompkin Security Document With Transparent Windows
WO2011020537A1 (en) 2009-08-18 2011-02-24 Mühlbauer Ag Identification document having two superimposed images
EP2559563A1 (en) 2011-08-18 2013-02-20 Polska Wytwornia Papierow Wartosciowych S.A. A security document with a see-through feature, and methods for manufacturing and authentication thereof
WO2016015130A1 (en) 2014-07-30 2016-02-04 Canadian Bank Note Company, Limited Security document having a protected window and method for making the same
WO2017092865A1 (en) 2015-12-01 2017-06-08 Giesecke & Devrient Gmbh Security element and data carrier equipped therewith

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
A. MENEZES; P, VAN OORSCHOT; S. A. VANSTONE: "Handbook of Applied Cryptography", 1996, CRC PRESS
ACHARYA; RAY: "Image Processing: Principles and Applications", WILEY-INTERSCIENCE, 2005
MERSENNE TWISTER: "A 623 - Dimensionally Equidistributed Uniform Pseudo -Random Number Generator MAKOTO MATSUMOTO Keio University and the Max-Planck-Institut fur Mathematik and TAKUJI NISHIMURA Keio University", ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION, vol. 8, no. 1, pages January 1998
RUSS: "The Image Processing Handbook", 2002, CRC

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2596075A (en) * 2020-06-15 2021-12-22 Iq Structures Sro Composite security element

Also Published As

Publication number Publication date
IT201800002811A1 (en) 2019-08-19
ES2832074T3 (en) 2021-06-09
EP3528216B1 (en) 2020-08-05

Similar Documents

Publication Publication Date Title
EP2533982B1 (en) Security element for document of value
JP4914896B2 (en) Especially safe and / or safe items such as valuable documents
EP2345008B1 (en) Method of manufacturing security document and method for authenticating the document
WO2006050367A2 (en) Full color spectrum object authentication methods and systems
RU2435218C2 (en) Card with possibility of authentication
JPH0780370B2 (en) Identification card having a visible authentication mark and its manufacturing method
KR20130034664A (en) Security improvements for flexible substrates
WO2017159608A1 (en) Identification device, identification method, identification program, and computer readable medium containing identification program
JPWO2007072793A1 (en) Authentic card
US9871660B2 (en) Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture
US20070091396A1 (en) Embedded information carrier for optical data
KR20150082211A (en) Method for authenticating a security element by superimposing n shared colour images, and security element implementing said method
EP3528216B1 (en) Document having a security element and related method
JPWO2020004633A1 (en) Certificate, how to manufacture the certificate, how to read the certificate, and how to verify the certificate
RU2088971C1 (en) Measures for protecting securities against forgery
JPWO2007072795A1 (en) A card that can be identified with a phosphor particle chip
JP6532534B2 (en) A method for authentication and verification of security documents based on the measurement of relative position variations in different processes involved in the creation of security documents
JP6347336B2 (en) Diffraction grating recording medium
JP2016091121A (en) Forgery prevention medium authenticity determination method and forgery prevention medium authenticity determination device
WO2021112143A1 (en) Method for manufacturing display body, display body, and method for verifying authenticity of display body
CA2739508A1 (en) Method of manufacturing security document and method for authenticating the document
JP2020194069A (en) Authentication medium and manufacturing method thereof
JPWO2010058809A1 (en) Embossed hologram chip and manufacturing method thereof
POTOLINCA et al. The study of documents counterfeit procedures by analyzing the security elements
Grant Recent advances in retroreflective security materials

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20200213

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RIC1 Information provided on ipc code assigned before grant

Ipc: B42D 25/29 20140101ALI20200227BHEP

Ipc: G07D 7/00 20160101AFI20200227BHEP

Ipc: B42D 25/30 20140101ALI20200227BHEP

Ipc: B42D 25/45 20140101ALI20200227BHEP

Ipc: B42D 25/00 20140101ALI20200227BHEP

Ipc: B42D 25/328 20140101ALI20200227BHEP

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20200428

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1299780

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200815

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602019000377

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20200805

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1299780

Country of ref document: AT

Kind code of ref document: T

Effective date: 20200805

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201207

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201105

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201106

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20201205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602019000377

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2832074

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20210609

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

26N No opposition filed

Effective date: 20210507

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20210228

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210218

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210218

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210228

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220228

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220228

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230222

Year of fee payment: 5

Ref country code: ES

Payment date: 20230301

Year of fee payment: 5

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20230228

Year of fee payment: 5

Ref country code: GB

Payment date: 20230220

Year of fee payment: 5

Ref country code: DE

Payment date: 20230223

Year of fee payment: 5

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200805

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20190218

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20240301

Year of fee payment: 6