EP3555811A2 - Vérification d'un document de sécurité - Google Patents

Vérification d'un document de sécurité

Info

Publication number
EP3555811A2
EP3555811A2 EP17825440.5A EP17825440A EP3555811A2 EP 3555811 A2 EP3555811 A2 EP 3555811A2 EP 17825440 A EP17825440 A EP 17825440A EP 3555811 A2 EP3555811 A2 EP 3555811A2
Authority
EP
European Patent Office
Prior art keywords
security
security feature
document
picture elements
range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP17825440.5A
Other languages
German (de)
English (en)
Inventor
Uwe Frieser
Michael Grau
René Staub
Michael Hoffmann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OVD Kinegram AG
Kurz Digital Solutions & Co KG GmbH
Original Assignee
OVD Kinegram AG
Kurz Digital Solutions & Co KG GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE102017102556.1A external-priority patent/DE102017102556A1/de
Application filed by OVD Kinegram AG, Kurz Digital Solutions & Co KG GmbH filed Critical OVD Kinegram AG
Publication of EP3555811A2 publication Critical patent/EP3555811A2/fr
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/1429Identifying or ignoring parts by sensing at different wavelengths
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/12Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using a selected wavelength, e.g. to sense red marks and ignore blue marks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/70Determining position or orientation of objects or cameras
    • G06T7/73Determining position or orientation of objects or cameras using feature-based methods
    • G06T7/74Determining position or orientation of objects or cameras using feature-based methods involving reference images or patches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/143Sensing or illuminating at different wavelengths
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/145Illumination specially adapted for pattern recognition, e.g. using gratings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/28Quantising the image, e.g. histogram thresholding for discrimination between background and foreground patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/60Extraction of image or video features relating to illumination properties, e.g. using a reflectance or lighting model
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/1434Special illumination such as grating, reflections or deflections, e.g. for characters with relief
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/1444Selective acquisition, locating or processing of specific regions, e.g. highlighted text, fiducial marks or predetermined fields
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/16Image preprocessing
    • G06V30/162Quantising the image signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/18Extraction of features or characteristics of the image
    • G06V30/18124Extraction of features or characteristics of the image related to illumination properties, e.g. according to a reflectance or lighting model
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • G07D7/0032Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using holograms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/1205Testing spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/205Matching spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/206Matching template patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/207Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30176Document

Definitions

  • a method for verifying a security document and a security document a device and a security element
  • the invention relates to a method for verifying a security document and to a security document, a device and a security element.
  • biometric data of the chip, and machine-readable data on the document are used to authenticate and authenticate the owner.
  • Such a device is in
  • Optical security elements in particular diffractive security elements such as holograms, which represent a recognizable safeguard against manipulation for the human observer, can not usually be detected or detected by means of this automatic detection. To make matters worse, that in the presence of diffractive security elements, the light of the illumination is diffracted into the camera and the recognizability of the underlying machine-readable personalization or others
  • Machine-detectable features reduces or completely prevented.
  • the object is achieved by a method according to claim 1 and a
  • Such a method for verifying a security document by means of a reading device is characterized in that first transmission and / or
  • Reflective properties of a first region of the security document in a first spectral range are detected by the reading device and from which a properties specifying first data set is created, wherein the first region at least partially overlaps an optical security element arranged on the security document or embedded in the security document, that second transmission and / or reflective properties of the first region of the security document in a second spectral range are detected by the reader and from these a second specifying these properties
  • the first spectral range is different from the second spectral range and based on at least on the first and the second record, the authenticity of the security document and / or the security element is checked.
  • the device in particular reader, for verifying a
  • Security document embedded optical security element overlaps at least partially, that the sensor device is further configured so that it detects second transmission and / or reflection properties of the first portion of the security document in a second spectral range and from this creates a properties specifying these second record, the first spectral range is different from the second spectral region, and that the device has an analysis device which is designed such that it checks the authenticity of the security document and / or the security element based at least on the first and the second data record.
  • security documents and / or security elements in particular areas of security documents and / or security elements containing security features, especially identity documents of all kinds, especially travel documents, securities, banknotes, means of payment, certificates, etc., can be checked for authenticity by means of automatic document control and the security against forgery of the security documents is thereby further improved.
  • An optical security element here preferably consists of the transfer layer of a transfer film, a laminating film or a film element, in particular in the form of a security thread.
  • Security element is in this case preferably on the surface of the
  • the security document is not just an optical one
  • Security element but a plurality of optical security elements, which are preferably designed differently and / or introduced differently in the security document and / or on the security document
  • optical security elements can be applied over the whole area to an upper side of the security document, embedded over the whole area between layers of the security document, but also applied only partially, in particular in strip or thread form or in patch form on an upper side of the security document and / or in a layer of the security document Embedded security document.
  • the carrier substrate of the security document has an aperture or in the region of the optical security element
  • Transmitted light can be viewed.
  • Security document in different spectral ranges makes it possible to improve the mechanical detection of the authenticity features of the security feature due to the different appearances and to eliminate any disturbing properties of optically active and in particular optically variable elements of the security element. This can be further improved by having not only two, but also three, four or more of each other discriminating spectral ranges are set, in which the transmission and / or reflection properties of the first portion of the security document are detected by the reader. Furthermore, the reading device can provide information about the authenticity, in particular an assessment of the authenticity, of the security element or of the security device
  • Security elements can be output by the reader as probability and / or confidence, which preferably quantifies the assessment of the authenticity, in particular the authenticity.
  • third and / or fourth transmission and / or reflection properties of the first area of the security document in a third spectral range or in a fourth spectral range can be detected by the reading device and from this a third data set or fourth data record specifying these properties can be created, the third or the fourth spectral range is different from the first and second spectral ranges.
  • the transmission and / or reflection properties of the first area are preferably read by the reading device from the front of the
  • Security document in reflected light from the back of the security document and / or detected in transmitted light.
  • the security document is preferably in each case irradiated by a reading device from the front or rear side and the image showing in the reflection is detected by means of one or more sensors of the reading device, which are likewise located on the front side. or rear side of the security element are arranged.
  • a first acquisition can be made from one side, the document can be reversed again and then the acquisition can be made from the other side.
  • certain features such as an outer shape of the document or a
  • the light sources and the one or more sensors of the reader are preferably on
  • the first, second, third and / or fourth transmission and / or reflection properties of the first area of the security document in the first, second, third and / or fourth spectral range are read by the reader from the front side of the security document in incident light, from the side of FIGS
  • the first, second, third and / or fourth data record specifying these properties is created by the reader.
  • the first, second, third and / or fourth data set comprises not only the transmission and / or reflection properties of the first area in a single lighting / viewing situation, but in two or more lighting and / or viewing situations.
  • the first, second, third and / or fourth data record may thus specify the reflection property of the first region in reflected light from the front side and the rear side in the respective spectral region, the reflection characteristic of the first region in reflected light from the front or rear side and the transmission characteristic in FIG Transmitted light in the respective
  • Security document further improved and further the detection of counterfeiting or tampering can be further improved.
  • spectral regions which lie in the wavelength range not visible to the human observer, it is possible for disturbances of the automatic detection by optically active elements of the security element, in particular optically variable elements of the security element, to take place
  • the data sets concerning the front side are compared with the data sets of the rear side. So that the transmission and / or
  • the security element of the security document preferably comprises one or more security features.
  • the first area is here preferably set such that it at least partially overlaps one or more of the security features of the security element, preferably overlaps at least two security features of the security document.
  • Security document still one or more security features, which are arranged in overlap or partial overlap with the first area.
  • security features of the security document may consist, for example, of mottled fibers, a background printing or a metallic thread.
  • the background pressure may have further security features and, for example, at least in some areas under UV radiation be designed fluorescent or contain an IR upconverter or be partially transparent or opaque in the IR range.
  • An IR upconverter uses, as a physical process, the sequential absorption of at least two photons, in particular IR photons or electromagnetic waves in the infrared
  • Wavelength range to emit again wherein the wavelength of the emitted photon or the wave is smaller than the respective wavelength of the at least two absorbed photons or electromagnetic waves.
  • the negative pressure can be in particular in the form of a machine-readable
  • Coding for example, a barcode or a machine-readable font be formed.
  • the security features preferably overlap one another at least in regions.
  • the security features it is also possible for the security features to be arranged at a distance from one another in the first region or to adjoin one another, in particular to be in direct contact with one another in the case of incident light and / or transmitted light observation.
  • the relative value for example, the relative position, in particular the relative position
  • Security features of the security element and / or security document are determined. Further, as a relative value, the relative shape of two or more
  • Registration accuracy is a positional accuracy of two or more elements and / or layers to understand relative to each other. It should be the
  • the positionally accurate positioning can in particular by means of sensory, preferably optically detectable
  • Registration marks or register marks are registered. These registration marks or
  • Register marks can either special separate elements and / or Represent areas and / or layers or even be part of the elements to be positioned and / or areas and / or layers.
  • Security elements and / or security document to each other by comparing the records are determined.
  • security features are preferably compared with assigned reference values, and the authenticity is denied if the deviation lies outside of an assigned tolerance range.
  • Deviations from "ideal" measuring conditions It is thus possible, for example, to eliminate measuring deviations which are caused, for example, by the
  • Contamination and / or wear of the security document and / or the reader and / or a faulty calibration of the reader can be effected. Furthermore, the detection of counterfeiting can be significantly improved as a result: on the one hand, it is difficult for the counterfeiter to match one
  • the positional arrangement and / or shaping of a first security feature of the security element is determined by means of the first data record.
  • Positional arrangement and / or shaping of a second security feature of the security element is determined by means of the second data set.
  • the determined positional arrangements and / or shapes are then preferably compared with each other to the relative positional arrangement, in particular spacing, the relative size, the relative shape, in particular the Passerhaltmaschine the orientation and shaping of pixels, the coverage and / or the orientation of the two security features of the security element to each other.
  • Security elements determined by the third or fourth record can then be compared with each other in a further step.
  • the security features preferably each have one or more image elements or image regions and, furthermore, ideally a background region surrounding the image elements.
  • a background region surrounding the image elements.
  • the picture elements of different security elements can be detected under illumination in the different spectral ranges or can not be detected and / or generate a predetermined contrast, in particular to the background area.
  • the security features are further preferably designed such that in at least one of the spectral ranges detected by the reading device, in particular in the first, second, third and / or fourth spectral range, a contrast is generated between the picture elements and the background area in reflection and / or transmission.
  • a contrast in reflection and / or transmission is in particular a
  • Brightness difference and / or a color difference understood.
  • the contrast is preferably defined as follows:
  • L max and L m correspond to the brightness of the background, respectively, of the security feature, or vice versa, depending on whether the brightness of the security element or the background is brighter ,
  • the values of the contrast are preferably between 0 and 1.
  • the value range is now preferably between -1 and +1.
  • Refractive index of the respective color lead to more or less scattering and / or on the type of reflection layer, which is behind or in front of the color.
  • the type and / or direction of illumination can also have a significant influence on the reflection and / or transmission behavior of a color print.
  • colors which illuminate preferably at different angles make the same impression and which, in particular depending on the lighting and
  • Lighting angle change the color impression, such as
  • Interference pigments and / or liquid crystals are Interference pigments and / or liquid crystals.
  • a color layer may be substantially transparent due to dyes or fine pigments in the VIS range. That absorbs the color layer
  • the ink layer preferably certain regions of the spectrum to varying degrees, scatters but only to a small extent.
  • the ink layer When illuminated and viewed in incident light, the ink layer itself thus does not reflect, or only to a very limited extent.
  • the color impression results from the radiation backscattered by the document substrate, which is filtered by the color layer.
  • a color coat may in particular also contain pigments which scatter strongly. It is referred to in particular as a covering color.
  • the backscattered radiation is substantially independent of
  • Color layers which are a mixed form, are also possible and are commonly referred to as translucent.
  • colors are described by hue, their brightness and saturation, which are expressed in a three-dimensional color space, e.g. RGB or Lab can be represented with coordinates.
  • RGB or Lab can be represented with coordinates.
  • the colors green and red are located on the a axis, yellow and blue on the b axis, and L describes a brightness value between 0 and 100. The distance between them
  • Coordinates must be sufficiently large so that a color sensor can detect a color difference or color difference, in particular color contrast.
  • This color difference is denoted by ⁇ and is calculated according to ISO 12647 and ISO 13655 as the Euclidean distance:
  • L p, a p, b p is the color value of a color value, L v, a v, b v for the color value of another color value to which is the color distance ⁇ .
  • a color difference ⁇ should be greater than or equal to 3, preferably greater than or equal to 5, more preferably greater than or equal to 6.
  • Other color spaces are, for example, Luv or HSV.
  • the HSV color space is preferably used, which is derived from the RGB color space.
  • H for
  • Hue / color, S for saturation / saturation and V for value / intensity which are arranged in a cylindrical coordinate system.
  • the hue is arranged here in a circle and the position of a hue is given in degrees. to
  • the hue H in a 360 ° color circle at least 10 °, preferably at least 20 °, more preferably at least 30 ° deviate from the defined target color, with a tolerance range of 20 °, preferably 40 ° , more preferably 60 °.
  • the saturation S has a value of at least 100, in particular of at least 75, preferably of at least 50, with a preferred value range of 0 to 255. Particularly preferably, the saturation S is at least 39%, in particular at least 29%, particularly preferably 19.5%, of a range of values.
  • the intensity V has a value of at least 70, in particular between 70 and 120, preferably between 80 and 130, with a preferred value range between 0 and 256.
  • the intensity V is particularly preferably at least 27%, in particular between 27% and 47%, more preferably between 31% and 51%, of one
  • the picture elements and the background areas of the security element preferably have one in the first, second, third and / or fourth spectral range Difference in the reflection and / or transmission of more than 5%, in particular more than 10%, and in particular between 15% and 100%, preferably 25% and 100%.
  • the maximum captured amount of brightness values comprises in particular 256 brightness levels. In another, especially a higher resolution, the number of available brightness levels may change.
  • the contrast in particular the brightness and / or the color contrast, between picture elements and background area in at least one of the first, second, third and / or fourth spectral regions in reflected light and / or transmitted light is greater than or equal to 5%, preferably 8% preferably 10%.
  • the contrast, in particular the brightness and / or the color contrast, between picture elements and background area in at least one of the first, second, third and / or fourth spectral regions in reflected light and / or transmitted light is greater than or equal to 5%, preferably 8% preferably 10%.
  • picture elements and background areas in at least one of the first, second, third and / or fourth spectral regions in incident light and / or transmitted light can also be less than or equal to 95%, preferably 92%, more preferably 90%.
  • a security feature of the optical security element is preferred
  • a partially formed metal layer preferably formed by a metallic reflection layer.
  • the partially formed metal layer is preferably made of Al, Cu, Cr, Ag, Au or alloys thereof.
  • the metal layer can be applied by means of printing, for example a printing material comprising one or more metallic pigments, and / or sputtering and / or thermal vapor deposition.
  • the partial metallization is produced by partial printing and / or etching and / or by a lift-off process, in particular using a soluble resist as a resist, and / or a photolithographic process.
  • metal layer can also be produced by local removal by means of a laser.
  • RFID Radio-Frequency IDentification
  • a partially formed metallization can be clearly recognized, especially under IR illumination, and can thus be related to the other areas.
  • HRI high refractive index, high refractive index
  • Certain structures can also be arranged in particular in the area of the metallization, so that they are preferably also recognizable under IR or VIS illumination and can thus be used as a reference.
  • At least one security feature of the optical sensor is provided.
  • the color layer preferably has a transmittance of at least 50%, in particular more than 80%, ideally more than 90%, in the respective spectral range.
  • the color layer may have a transmittance of not more than 50%, in particular not more than 25%. It should be noted that these values can only refer to a subrange of the second spectral range.
  • the VIS area broadband and is preferably detected by a color camera as an RGB image.
  • the color layer is formed luminescent or appears.
  • the color layer consists of several colors.
  • the color layer can be excited by radiation of the second and / or third spectral range, in particular under UV illumination and / or VIS illumination. It is advantageous if the color layer is formed such that a color impression can be recognized under different illuminations, for example under VIS and / or UV.
  • the color layer may be a partially formed color layer. It is also conceivable that the color layer consists of a basecoat with admixed dyes and / or pigments. Furthermore, the color layer may comprise optically variable pigments and / or magnetically detectable pigments. The color layer can be both solvent-based and / or thermally drying as well as curing by UV radiation and / or chemically curing.
  • the color layer can be used as an etch resist.
  • they are based in particular on the basis of PVC and / or PVAC (polyvinyl acetate) copolymer, wherein they preferably have dyes and / or pigments, in particular colored or achromatic pigments and / or effect pigments.
  • the color layer can be applied by means of a common printing process.
  • offset, screen, gravure, tampon, intaglio and / or letterpress printing can be used.
  • it can also be applied by means of a digital printing method, in particular by means of an ink-jet printing or by means of a toner and / or a liquid toner.
  • At least one security feature may also have features
  • the security feature of the security element can be formed by a relief structure and a reflection layer, wherein the relief structure, in particular in at least one of the spectral regions, deflects the incident radiation in a predefined manner. It is advantageous if the reflection layer in at least one of the spectral regions is transparent or substantially transparent or appears, ie has a transmittance of more than 50%, preferably more than 70%, and / or a reflectance of less than 50%, preferably of less than 30%.
  • the reflection layer is preferably formed by an HRI layer, in particular a layer of ZnS (zinc sulfite) and / or ⁇ 2 (titanium dioxide).
  • the relief structure is formed by a relief structure with optically variable properties and / or comprises one or more of the following
  • Relief structures diffraction grating, asymmetric diffraction structure, isotropic
  • Matt structure anisotropic matte structure, Blaze grating, Zero diffraction structure
  • Microprisms, microlenses In this way, a particularly reliable verification of the security feature and thus of the document can be ensured.
  • the relief structure is diffracted by a diffraction structure which predetermines the incident electromagnetic radiation in one of the first, second, third and / or fourth spectral range such that a portion of the radiation falls into the at least one detector and in another of the first, second
  • electromagnetic radiation is not, or substantially does not fall into at least one detector, third and / or fourth spectral range.
  • the diffraction structure is formed by a zero-order diffraction structure for the at least one spectral range. The period of
  • Diffraction structure is preferably below the wavelength of the visible
  • the diffractive structures have a typical color effect in the visible light range.
  • the structure preferably diffuses or diffracts under the VIS illumination as well as under IR illumination into the at least one detector.
  • the shaping of picture elements of the first and second security feature is checked to see whether the picture elements are arranged in register with one another, in particular if image elements formed in the form of lines merge into one another with exact position and / or with respect to their Slope match.
  • the picture elements may include inter alia graphically designed outlines, figurative representations, images, visually recognizable design elements, symbols, logos, portraits, patterns, alphanumeric characters, text, color designs, etc.
  • the data sets are preferably the raw images of the first area and / or the security elements and / or security features or of their picture elements, which the reader receives in the respective spectral range.
  • These may be, in particular, grayscale images or color images.
  • a gray scale image may comprise one or more, preferably all, color channels and / or the hue of an image.
  • image processing is preferably used for analyzing the data records and in particular for checking the authenticity of the security document and / or the security element based on the first and second data record.
  • the different steps can be combined with each other depending on the application and can in part presuppose each other.
  • the basis of the image analysis is, in particular, an image preparation step in which the image is used for feature recognition, in particular feature recognition, and
  • a feature is preferably a distinctive or interesting point of an object or picture element to understand, in particular a corner or an edge.
  • the point can be described in particular on the basis of its environment and can thus clearly recognize or find again.
  • a preferred step is preferably the conversion of the raw images into a gray value image.
  • each pixel preferably exists in the case of a gray scale image.
  • Image brightness can be transformed by, for example, the brightness value of each pixel is multiplied by a factor or by making a histogram equalization.
  • the brightness value of each pixel is multiplied by a factor or by making a histogram equalization.
  • Color channels of each pixel first converted into a gray value or a brightness value.
  • the available gray value image is preferably analyzed by means of template matching (template matching step).
  • template matching applications are understood in particular algorithms which identify parts of an image or motifs, in particular image elements of a security feature, which correspond to a predefined image or motif, the template.
  • the template is preferably stored in a database.
  • the picture elements or picture objects are preferred pixel by pixel with a reference image or
  • Reference points are reduced, in particular by reducing the resolution of the images or images.
  • the goal of the algorithm is to be the highest
  • the gray-level images are binarized in an image-editing step with a threshold value formation.
  • one or more thresholds are determined via an algorithm, in particular the K-means algorithm.
  • the task of the K-means algorithm is a cluster analysis wherein pixels with a brightness value below one or more threshold values are preferably set to black and all others to white.
  • the determination of a black image is carried out in particular by means of the following steps: Comparison of
  • Brightness values of the pixel data of the associated data set with a first threshold value wherein all pixels that are below the first threshold, the binary value 0 is assigned, in particular they are set to black.
  • the threshold value is determined in particular on the basis of information relating to the recognized feature or document type, which is stored in a first area of the security document and / or security element.
  • the first threshold value is less than 20% of the value range. In particular, the first one
  • Threshold smaller than 40 for a value range of 0 to 255.
  • the first threshold value is preferably less than 25% of the value range, in particular the first threshold value is less than 60 with a value range of 0 to 255.
  • a white image is preferably determined from the associated data set by calculating a constant binary image.
  • the following steps can be carried out to determine the white image: Comparison of the brightness values of the pixel data of the assigned data set with a second threshold, wherein all pixels lying above the second threshold are assigned the binary value 1, in particular they are set to white.
  • the second threshold value is greater than 5% of the value range, in particular the second
  • the second threshold value is preferably greater than 30% of the value range, in particular the second threshold value is greater than 80 for a value range of 0 to 255.
  • the first and second thresholds differ from each other.
  • the difference between light and dark in the IR range, in particular in an IR image, is greater than 80 and in the UV range, especially in the case of a UV image, greater than 20.
  • the threshold image may be calculated using a threshold algorithm, in particular an adaptive Threshold algorithm with a high block size on the assigned record can be applied.
  • Threshold algorithm here refers in particular to one or more areas of the image and / or one or more pixels of the image. This includes local changes in the background brightness in the calculation. This can ensure that the existing edges are detected correctly.
  • Threshold image by combining the edge image, the black image and the white image.
  • An edge image is preferably first multiplied by the black image at the pixel or pixel level. As a result, all black areas of the black image are now also black in the edge image. This gives a black edge image.
  • the black edge image is added to the white image. As a result, all the pixels or pixels which are white in the white image now also become white in the black edge image.
  • the result is a finished threshold image.
  • the first and / or the second threshold value can be set depending on the detected document type, the detected illumination and / or the spectral range. This makes it possible to adjust the threshold exactly to the situation and to be able to perform the best possible test.
  • the reverse procedure is also conceivable.
  • the color channels can come from different color spaces, such as the RGB color space or the HSV color space.
  • the existing threshold value images can be further processed and / or segmented to recognize image details by means of different filters in further image processing steps.
  • the pixels are manipulated in dependence of the neighboring pixels.
  • the filter preferably acts like a mask, in which, in particular, the calculation of a pixel as a function of its
  • a low-pass filter is used.
  • the low-pass filter ensures in particular that high-frequency or highly contrasting value changes, such as image noise or hard edges, are suppressed.
  • the image of the security feature in the respective data set is particularly washed out or blurred and looks less sharp. For example, so locally high contrast differences are changed in each case locally low contrast differences, z. For example, one white and one black adjacent pixel become two differently gray or even gray pixels.
  • bilateral filters can also be used. This is a selective blur or low pass filter. As a result, in particular flat areas of the security element with medium contrasts soft
  • brightness values of pixels from the neighborhood of a pixel preferably flow
  • Output pixel not only depending on their distance, but preferably also of their contrast in the calculation.
  • Another possibility for noise suppression is the median filter. This filter also receives contrast differences between adjacent areas as it is
  • Filters and filter operations are also preferably used for edge analysis and edge detection and / or elimination of image noise and / or smoothing and / or reduction of signal noise.
  • Basis of a segmentation can preferably be an edge detection by means of algorithms which recognize edges and object transitions. High-contrast edges can be located within an image using different algorithms.
  • the algorithm uses a convolution by means of a convolution matrix (filter kernel), which consists of the original image
  • the areas of greatest intensity are where the brightness of the original image changes the most and thus represents the largest edges. Also the
  • the direction of the edge can be determined with this method. Similarly, the Prewitt operator works, which, in contrast to the Sobel operator, does not additionally weight the image line or image column in question. If the direction of the edge is not relevant, the Laplacian filter approximating the Laplacian operator can be used. This forms the sum of the two pure or partial second derivatives of a signal.
  • A-KAZE accelerated KAZE
  • kaze Japanese for wind
  • Preference is given in a first step by means of the A-KAZE Detector on the basis of several different image filters distinctive points in the objects
  • a feature described with the A-KAZE descriptor advantageously consists of a coded but unambiguous data set, in particular with a defined size or length and / or the coordinates.
  • a feature matcher preferably a brooding force matcher, then compares
  • enveloping bodies for approximating or approximating the shape and position of an object, enveloping bodies, in a further image processing step, are preferably used.
  • this can be a bounding box, an axis-parallel rectangle, in particular a square, which encloses the object. It is also possible to use a bounding rectangle which, in contrast to the bounding box, does not have to be axis-parallel but can be rotated. Furthermore, a bounding ellipse can be used. A bounding ellipse can better approximate round objects, in particular objects with a curvature, than a rectangle and defines the center point, radius and rotation angle. More complex bodies can be approximated by means of a convex hull or an envelope polygon. However, the processing of these objects requires significantly more computation time than with simple approximations. For the sake of
  • one or more of the following steps are performed in order to check the authenticity of the security document and / or security element based on the created data records, in particular the first, second, third and / or fourth data record:
  • Threshold images with gray values and / or color values stored in a database. Comparison of two or more of the images, in particular two or more of the raw, gray value, color value and / or threshold value images, to each of which one or more, in particular all, of steps 1 to 5 have been applied. Comparison of the displacements of one or more of the objects in individual images, in particular in raw, gray scale, color and / or threshold images, in each case by means of one or more bounding boxes or similar further methods. Comparison of the brightness values of one or more of the superimposed images, in particular superimposed raw, gray scale, color and / or
  • a security band in particular a first security band, comprises a first object consisting of one or more picture elements.
  • the first security feature preferably has a metal layer, the metal of the metal layer being provided in the region of the picture elements, and no metal layer being provided in a background region surrounding the picture elements.
  • a transparent reflection layer made of a material having a high refractive index may preferably be provided.
  • a security feature in particular a second or a further security feature, comprises a further, in particular a second object, consisting of one or more image elements.
  • the second security feature preferably has a color layer, the dyes and or pigments of the color layer being provided in the area of the picture elements, and the dyes and or pigments of the color layer are not provided or provided in a lower concentration in a background area surrounding the picture elements.
  • the color layer preferably has UV-fluorescent pigments.
  • the first security feature consisting of a first object and the second object consisting of a second object preferably overlap
  • the first object is detected by means of the first data record, in particular by detection of the metallic surface in the first
  • the first object appears under illumination in the IR primarily dark in front of the brighter substrate of the
  • Any diffractive design elements of the first object can affect the contrast, but only to a small extent, when using the IR range as the first spectral range.
  • the first object is preferably softened with a bilateral filter, which in particular is a selective low-pass filter which leaves hard edges intact.
  • a bilateral filter which in particular is a selective low-pass filter which leaves hard edges intact.
  • the metallic region is sought by using a previously stored template image.
  • the test preferably takes place on the basis of prior knowledge from a database in which the various possible images and necessary tests are described by the developer of the features.
  • the second object can be detected from the second data set, in particular by detecting the color layer, in a second spectral range, in particular in the UV range or VIS range.
  • the first object of the first security feature is detected from the first data record and a reference point, in particular the midpoint, of the first object is calculated and the second object of the second security feature is detected from the second data set and a reference point, in particular the midpoint, of the second object is calculated.
  • reference points come one or more centers, intersections, points on edges, vertices, points on surfaces, points in volumes, local and / or global minima and / or local and / or global maxima, in particular of one or more objects but also quantities of protruding points, such as lines, edges,
  • Variance ranges, confidence intervals and / or arbitrary surfaces in particular of one or more objects into consideration.
  • Such reference point quantities may also consist of different proportions of the aforementioned reference points
  • Orientations of the objects are determined to each other, the comparison with reference values also allow a check for authenticity.
  • a rectangular frame is preferably calculated which preferably adjoins the first or second object, in particular as closely as possible to the geometric shapes of the first and / or second object, wherein the reference point, in particular the center, of the rectangular frame is evaluated in particular as a reference point, in particular as the center, of the first or second object.
  • the rectangular frame is calculated around the largest detected object.
  • the first and second threshold image are first calculated and then a rectangular frame is calculated or generated in each case.
  • the frame preferably includes all the pixels of the first or second threshold value image with the binary value 1.
  • the frame can also be around all pixels of the first or second threshold image with the binary value 0.
  • the reference point, in particular the center point of the frame is evaluated in particular as a reference point, in particular center, of the first or second object. If the outer contours of the objects can not be completely recognized, then it is necessary
  • a suitable template is preferably a virtual reference point, in particular center, of the first or second object determined. Deviations may occur due to manufacturing tolerances.
  • the maximum permissible deviation may preferably be less than ⁇ 0.8 mm, in particular less than ⁇ 0.5 mm, preferably less than ⁇ 0.2 mm, longitudinally and transversely, these being the permitted deviation of the bounding boxes from each other or to to represent a reference.
  • a first security feature and a second security feature at least partially overlap.
  • the security element is preferably located above the second security feature when viewed from the front of the security document.
  • Security feature has one or more picture elements and one each
  • the first data record and the second data record are preferably compared as to whether the picture elements or one or more picture elements of the second security feature in the second data record are only in the area of the
  • first and the second security element each have one or more picture elements and a background area, wherein the picture elements of the second security element are transparent or substantially transparent in the first spectral range, but in the second spectral range have a contrast, in particular the brightness level. and / or the color contrast between picture element and background area of greater than 5%, preferably 8%, and more preferably 10%.
  • the position and shape of one or more picture elements of the second security feature is determined from the second data record,
  • the first data set becomes the location and shape of one or more
  • Image elements of the first security feature determined, in particular by calculating a first threshold image.
  • key points such as end points of the picture elements of the first and second
  • the first security feature comprises a partial metal layer and a diffractive structure.
  • the second security feature comprises a partial color layer, wherein the material of the metal layer or the color layer is provided in one or more picture elements of the first and second security feature and in one surrounding the picture elements
  • the picture elements of the metal layer and the color layer are formed congruent to each other.
  • the diffractive structures are further preferably designed such that they diffract radiation of the second spectral range, in particular of the VIS range, into a sensor of the reader, but not radiation of the first spectral range.
  • the above-specified identical formation of the metal layer and the color layer of the first and second security feature is preferably achieved in that the color layer as an etching resist for partial demetallization of
  • Metal layer is used in the production of the security element.
  • a further preferred variant consists of a color print that is opaque in particular for the respective exposure wavelength, preferably an absorbing and / or Translucent color, as a mask for a photolithographic structuring of the metal simply to use.
  • the register-accurate structure of these two layers thus generated can be detected accordingly by the method described above and used to test the authenticity of the security document.
  • One or more of the following measures may be carried out in any combination, in particular to verify the authenticity of the security document, in particular information on the authenticity of the security document:
  • the first security feature comprises a partial metal layer and the second security feature comprises a partial color layer, wherein in one or more pixels of the first security feature and the second
  • the material of the metal layer or ink layer is provided and is not provided in a background area.
  • Several picture elements of the color layer are shaped in the form of a machine-readable code, in particular a QR code.
  • the metal layer is demetallized using a first mask layer formed in the form of a first information and using a second mask layer formed by the color layer. This ensures that the picture elements of the metal layer no longer contain the complete first information.
  • the picture elements of the first and second security feature are respectively determined from the first and second data record and then compared to whether the checking of the combination of the respective picture elements from the first and the second security feature yields the complete first information.
  • Security feature of the security element further security features of the security document are detected, which in the first area, in particular in an overlap one or more security features of the security element are arranged.
  • Personalization or personalization can additionally by
  • the security element has a security feature comprising a color layer, the following steps are preferably carried out to check the authenticity of the security document:
  • Determining one or more parameters of the color layer selected from location, color, color coverage, reflection, orientation, size, shape, personalization, color change and electromagnetic properties, in particular based on one or more of the first, second, third and fourth data sets, preferably a Comparison of the determined one or more parameters with
  • predefined assigned reference values takes place and a denial of the authenticity occurs when the deviation exceeds a predefined tolerance range. If the security element has a security feature comprising a metal layer, then it is preferred to check the authenticity of the security document continue following steps:
  • Determining one or more parameters of the metal layer selected from the position, reflection, color, orientation, size, shape, personalization, area coverage, transmission, in particular based on one or more of the first, second, third and fourth data sets, preferably a comparison of the determined one or more parameters are performed with predefined assigned reference values and denial of authenticity occurs if the deviation exceeds a predefined tolerance range. If the security element has a security feature comprising an antenna, the following steps are preferably carried out to check the authenticity of the security document:
  • Determining one or more parameters of the metal layer or antenna structure selected from position, electromagnetic properties, design, color, in particular based on one or more of the first, second, third and fourth data sets, wherein preferably a comparison of the determined one or more parameters with predefined assigned Reference values and a denial of authenticity occurs when the deviation exceeds a predefined tolerance range.
  • Color layer selected from layer, color, color coverage, reflection, orientation, size, shape, electromagnetic properties, personalization, and
  • Area coverage in particular based on one or more of the first, second, third and fourth data sets, wherein in particular a comparison of the determined one or more parameters associated with predefined Reference values and a denial of authenticity occurs when the
  • Deviation exceeds a predefined tolerance range.
  • the security element has a security feature comprising an RFID chip, the following steps are preferably carried out to check the authenticity of the security document:
  • Reading one or more of information stored on the RFID chip which in particular is a specification of one or more
  • the security element has a security feature comprising at least one diffractive and / or refractive structure
  • the authenticity of the security document preferably further comprises the following steps: determination of one or more parameters of the diffractive and / or refractive structure, selected from the position, reflection, scattering, gloss, arrangement of the
  • Design elements of the diffractive and / or refractive structure in particular based on one or more of the first, second, third and fourth
  • self-luminous structure such as an OLED or a
  • Security document further prefers the following steps: Determination of one or more parameters of the self-luminous structure,
  • the security document has a document body with a plurality of layers and / or a window and / or an opening region, the following steps are preferably carried out to check the authenticity of the security document:
  • Determination of one or more parameters of the document body selected from window position, window shape, position of the layers relative to one another, in particular based on one or more of the first, second, third and fourth data sets,
  • the individual verifiable characteristics can basically be combined with each other.
  • the individual features can be relatively related to each other. It is conceivable, for example, that the position of a first pixel is related to the position of a second pixel, or that their orientations or sizes are related to one another.
  • the color of a first picture element or object can also be displayed under VIS- Lighting to the color, respectively brightness of the first picture element under IR illumination in relation to be brought.
  • the document may be an identification document, a travel document, an identity card, a passport, a visa, a security, a banknote
  • the document or at least the page to be checked preferably comprises a single-layered or multi-layered substrate.
  • the substrate is preferably in the form of a card or a data page made of paper and / or plastic.
  • the substrate is made of a plastic, preferably of PVC, ABS, PET, PC, Teslin or combinations thereof (layer composite) thereof. It is also conceivable that the substrate is made of paper or a textile material.
  • the substrate may have a transparent area and / or an opening.
  • the sensor device of the device preferably has one or more sensors and / or one or more radiation sources. Preferably, different radiation sources and / or sensors are assigned to the first and the second spectral range. Ideally, the sensor device comprises one or more
  • Radiation sources that emit or detect visible light, UV light and / or IR radiation.
  • the sensor device can be configured such that, in addition to the spectral range, the illumination directions and / or the illumination directions
  • Viewing directions can be varied. For example, a lighting in the VIS range from different directions or
  • Directional areas occur which result in several data sets to the same spectral range. For example, disturbing reflections can be avoided.
  • the device has at least one laser diode and / or an LED.
  • software evaluates the signals obtained from the device.
  • the software can be directly in the device or even on a connected PC or other external device, such as a smartphone or a server.
  • FIG. 1 a, 1 b shows schematic representations of a
  • Fig. 1 c shows a schematic representation of a reading device
  • FIG. 2a, 2b schematic representation of a UV pressure
  • 3a, 3b, 3c, 3d schematic representation of a security feature in one embodiment 4a, 4b, 4c is a further schematic representation of a
  • FIG. 7a, 7b, 7c Schematic representation of a security document with partially configured security element
  • Fig. 8a, 8b, 8c, 8d, 8e Schematic representation of a QR code
  • FIG. 9 Schematic representation of a security feature with it formed individual markings
  • FIGS. 1 a and 1 b illustrate, by way of example, the construction of a security document 1.
  • Fig. 1a shows the security document 1 in plan view and Fig. 1 b in cross section.
  • the security document 1 preferably consists of an ID document, for example a passport, a passport card, an access card. However, this may also be a further security document 1, for example a banknote, security, a certificate or a credit card or bank card.
  • Thethoughdokunnent 1 has a document body 1 1 and one or more security elements, of which in Fig. 1 a and 1 b two security elements 1 a, 1 b are shown. The security elements can in this case on the document body 1 1 of the
  • Security document 1 be applied, or be embedded in the document body 1 1 of the security document 1, in particular be fully or partially embedded.
  • the document body 1 1 of the security document is preferably multi-layered and in particular comprises a carrier substrate, which is formed by a paper substrate and / or plastic substrate.
  • Document body 1 1 still one or more protective layers, one or more decorative layers and / or one or more security features.
  • a security feature 15 of the security document 1 is shown by way of example which at least partially overlaps the region 3 or at least partially overlaps the region 3 of the security document 1 to which the security element 1 a is applied.
  • the security element 1 a is applied.
  • Document body 1 1 in this case also an electronic circuit, in particular an RFID chip, in which information is stored.
  • the one or more security elements in particular the security elements 1 a, 1 b preferably each consist of an element which is manufactured independently of the production of the document body 1 1 and applied only during the production of the security document on the document body 1 1 or in the document body. 1 1 is embedded.
  • the security elements 1 a, 1 b are formed in particular by transfer layers of a transfer film, a laminating film and / or a film element, in particular in the form of a security thread.
  • the security elements here can be a surface of the
  • the security elements in particular the security elements 1 a, 1 b in this case preferably have a protective layer 14, a decorative layer 12 and an adhesive or adhesion-promoting layer 13.
  • the security element 1 a is formed in the form of the transfer layer of a transfer film, which has a
  • Protective layer 14 a decorative layer 12 and an adhesive layer 13 and applied to the front of the document body 1 1 as shown in Fig. 1 a is applied.
  • the security element 1 b is formed in the form of a film element comprising two adhesion-promoting layers 13 and a decorative layer 12, has a patch shape and is during the production of the document body 1 1, as shown in Fig. 1 b, in the interior of the document body 1 first embedded.
  • the decorative layers 12 of the security elements 1 a, 1 b each form one or more security features, which preferably also optically for the
  • FIG. 1 a are exemplary four
  • each of the security features 10 is preferably formed by an associated layer or a plurality of associated layers of the decorative layer 12
  • the decorative layers 12 have one or more of the following layers:
  • the decorative layer 12 preferably has one or more metallic layers, which are preferably not in the entire area, but only partially in the
  • the metallic layers may here be opaque, translucent or partially transparent.
  • the metallic layers formed here by different metals which have significantly different reflection and / or transmission spectra.
  • the metal layers are formed of aluminum, copper, gold, silver, chromium, tin or an alloy of these metals.
  • the metallic regions can be screened and / or configured with locally different layer thicknesses.
  • the one or more metal layers are preferably patterned in the form that they include one or more picture elements in which the metal of the metal layer is provided and include a background area in which the metal of the metal layer is not provided.
  • Image elements may in this case preferably be in the form of alphanumeric characters, but also of graphics and complex representations of objects. Further, it is also possible that the dimensions of the picture elements in at least one lateral direction below 300 ⁇ , preferably of less than 200 ⁇ , more preferably of less than 50 ⁇ lie. This makes it possible to
  • the decorative layer 12 may further comprise one or more color layers, in particular colors. These color layers are preferably
  • Color layers which are applied by means of a printing process and which comprise one or more dyes and / or pigments which are incorporated in a binder matrix.
  • the dyes and / or pigments have here an absorption / reflection spectrum and / or an absorption / reflection behavior, which differs preferably in different spectral ranges detected by the reading device, in particular distinctly different. However, they can also differ within a spectral range, such as in the VIS range.
  • the color layers, in particular colors can be transparent, clear, partially scattering, translucent or non-transparent or opaque. Dyes and / or pigments used are preferably dyes and / or pigments which are detectable in the IR range, for example in the near range
  • dyes and / or pigments can also be used as dyes and / or pigments.
  • photochromic substances are used, which are activated in the UV range and then visible in the VIS range.
  • the one or more color layers here preferably each comprise one or more picture elements in which the dyes and / or pigments of the color layer are provided and a background area in which the pigments
  • the decorative layer 12 preferably has two or more color layers in which the picture elements are differently shaped and / or the pigments and / or dyes of the color layer have different reflection and / or absorption properties, in particular in the first, second, third and / or fourth spectral range.
  • the decorative layer 12 preferably has one or more optically active
  • Relief structures which preferably each in the surface of a
  • Replizierlacktik are introduced. These relief structures are preferably diffractive relief structures, such as holograms, for example.
  • Profile shapes, zero-order diffraction structures may also be isotropic and / or anisotropic scattering matt structures, blazed gratings and / or substantially reflective and / or transmissive
  • the decorative layer 12 further preferably has one or more interference layers which reflect or transmit the incident light in a wavelength-selective manner.
  • These layers can be formed, for example, by thin-film elements, in particular Fabry-Perot thin-film elements, which generate a viewing-angle-dependent color shift effect, based on an arrangement of layers having an optical thickness in the range of half or K / 2 ( ⁇ is the wavelength of the light or the
  • Wavelength of an electromagnetic wave or quarter or ⁇ / 4 wavelength of the incident light.
  • Constructive interference in an interference layer with a refractive index n and a thickness d is calculated as follows:
  • These layers comprise a spacer layer, in particular arranged between an absorption layer and a reflection layer or may preferably be formed by a layer comprising thin-film layer pigments.
  • the decorative layer can furthermore preferably have one or more liquid-crystal layers which, on the one hand, generate a reflection and / or transmission of the incident light depending on the direction of the liquid crystals, depending on the polarization of the incident light and, on the other hand, also a wavelength-selective reflection and / or transmission of the incident light.
  • Security document detected which overlaps the security element 1 a at least partially.
  • the first area 3 comprises the security element 1 a preferably one or more security features, which are formed in Fig. 1 a of the security features 10.
  • the first area 3 overlaps with one or more security features of the security document 15, as is illustrated in FIG. 1a by way of example for the security feature of the security document 15.
  • the security feature of the security document 15 is in this case preferably corresponding to, as above with respect to the security features 10 of
  • one or more second and third regions of the security document 1 can be encompassed by the reading device, which overlap, for example, the security element 1b, in addition to the first region.
  • the entire area of the document can also be recorded.
  • FIG. 1 c shows schematically the structure of a reading device 2, which can be used for checking the security document 1.
  • the reading device 2 has a sensor device 21, an analysis device 22 and an output device 23.
  • the sensor device 21 preferably has one or more radiation sources 24 and one or more sensors 25.
  • the sensor device 21 preferably has three or more
  • Radiation sources 24 which each emit radiation having a different spectral composition, in particular emit light from a UV range, a VIS range or an IR range.
  • Sensor device 21 preferably has one or more sensors 25, which for the detection of radiation from different spectral ranges
  • wavelength ranges are set up, for example, by pre-circuit of corresponding bandpass filter and appropriate selection of
  • Image sensors wherein one or more of the sensors 25 may preferably detect one or more spectral ranges.
  • These sensors are preferably image sensors, more preferably cameras, particularly preferred detectors, which in particular an image with a minimum resolution of 350 ppi, in particular 400 ppi, preferably 500 ppi, along the horizontal and / or vertical axis can record.
  • the sensor device 21 shown here for example, in Fig. 1 c, sensors 25, which are arranged on different sides of a supply device for a document of value to the transmission and / or
  • the analysis device 22 evaluates the data sets generated by the sensor device 21 and preferably includes hardware and / or
  • the analysis device 22 performs the described evaluation steps.
  • the analysis device 22 it is also possible for the analysis device 22 to access an external database 26.
  • the reading device 2 preferably comprises an output device 23 which outputs the result of the authenticity check to the operator visually, acoustically, haptically, electronically and / or in any other way.
  • the reading device 2 may also comprise further sensors 25 for the automatic recording of data of the security document, for example an RFID reader and sensors 25 for detecting electrical and / or magnetic security features of the security document
  • FIG. 1 d shows a flow chart of a method for verifying the
  • a security document 1 is preferably provided.
  • a step 102 first transmission and / or reflection properties of a first region 3 in a first spectral range are detected.
  • Steps 102 and 103 may be performed in parallel or sequentially.
  • a first data record specifying the first transmission and / or reflection properties is generated.
  • a second data record specifying the second transmission and / or reflection properties is generated.
  • Steps 104 and 105 may be performed in parallel or sequentially.
  • the authenticity of the security document 1 or of the security element 1 a is checked based on the first data record and the second data record.
  • Transmission and / or reflection properties in a third spectral range or in a fourth spectral range are detected by the reader 2.
  • the first, second, third and / or fourth spectral range is in particular selected from the group: IR range of the electromagnetic radiation, in particular in the wavelength range of 850 nm to 950 nm, VIS range of
  • electromagnetic radiation in particular in the wavelength range from 400 nm to 700 nm, and UV range of the electromagnetic radiation,
  • the relative position arrangement, in particular spacing, the relative size, the relative shaping, in particular the passercy of the orientation and shaping of picture elements, the coverage and / or or the orientation of two or more security features 10 of the security element 1 a to each other determined by comparing at least the first data set and the second data set.
  • the determined relative values of the two or multiple security features 10 compared to predefined reference values, wherein a denial of the authenticity occurs when the deviation is outside a predefined tolerance range.
  • the following steps can also be carried out:
  • FIG. 2 a shows a schematic representation of virtual bounding boxes 201 a, 202 a, preferably in the form of a rectangular frame, around one or more objects 9 a, 9 b on a security element 1 a, in particular around a security feature 10 a comprising a print 201 that fluoresces under UV irradiation and a
  • Security feature 10b comprising a partial metallization 202.
  • the bounding boxes 201a, 202a are preferably adjacent as closely as possible to the respective objects 9a, 9b.
  • bounding boxes 201 a, 202 a are generated.
  • the bounding boxes 201 a, 202 a are used to determine the centers 201 b, 202 b of the security features 201, 202
  • FIG. 2b shows a distance 200, represented by a double arrow 200, which shows the distance between the calculated centers 203b, 204b of the bounding boxes 203a, 204a.
  • calculated centers 203b, 204b with a reference value is then preferably the test of authenticity.
  • the security element 1 a of the security document 1 preferably has one or more security features 10.
  • FIG. 3a now shows a schematic representation of a first security feature 10a in an embodiment as a UV-fluorescent print 205.
  • Security feature 10a preferably has one or more picture elements 7a and a background area 7b surrounding the picture elements 7a.
  • the first security feature 10a shown in FIG. 3a is a colored layer 8b, in particular a UV print 205, which is visible only in the UV range.
  • FIG. 3b shows a further schematic representation of a second one
  • the second security feature 10b provides a partially formed metal layer 8a as a partial metallization 206, in particular with
  • the image of the second security feature 10b shown in FIG. 3b is preferably softened with a bilateral filter. In particular, it is a selective low-pass filter that leaves hard edges intact.
  • Threshold images are calculated in particular from the images of the first security feature 10a and of the second security feature 10b respectively shown in FIGS. 3a and 3b.
  • the following three calculations are performed, in particular successively.
  • an adaptive binary thresholding is performed.
  • the grayscale image is 256
  • Brightness values wherein the brightness value 0 of the color black and the brightness value 255 of the color white is assigned.
  • a large filter core is preferably selected in relation to the image resolution, so that existing edges are recognized correctly.
  • this first filtering step it comes in particular to the misrecognition of image features, dirt or other, which is actually no real motif edge. The result is an "edge picture".
  • Brightness threshold example IR image: Brightness value less than 60
  • UV image Brightness value less than 40.
  • a constant binary thresholding is carried out again on the scanned gray scale image and all brightness values which are above a defined value, to the binary value 1, which is preferably associated with the color white.
  • the determination of the threshold is made on the basis of
  • Brightness value greater than 140 UV image: Brightness value greater than 60.
  • the difference between light and dark, in particular brightness values that are perceived as bright and brightness values that are perceived as dark is given by an interval of more than 80 adjacent brightness values for an IR image and by a value interval of a UV image Value interval of more than 20 adjacent brightness values given.
  • the three sub-images are combined so that first the edge image is multiplied by the black image on the pixel level, so that preferably all black areas of the black image thus also appear black in the edge image.
  • the result is a black edge image.
  • the threshold image preferably all white pixels white pixels, so even in the black edge image appear white.
  • FIG. 3c shows a schematic representation of the superimposition of the security features 10a and 10b of one shown in FIGS. 3a and 3b
  • Security elements 1 a with simultaneous irradiation in the IR range and in the UV range.
  • FIG. 3d shows a security element 1 a under illumination in a second spectral range, in particular the UV range, which is composed of a superposition of a first security feature 10 a and a second security feature 10 b.
  • the UV-fluorescent print 205 in particular consisting of UV-fluorescent ink, is visible only in the areas in which the UV-print 205 is not covered by the metal layer 8a of the partial metallization 206, since the metal layer 8a is responsible for both the exciting radiation in the UV-range as well as for the fluorescence of the pressure 205 is almost opaque, preferably completely opaque, the optical densities of the metal layer 8a of the partial metallization 206 having a value greater than 1.0, preferably greater than 1.3.
  • the background region 7b hardly, or at least significantly weaker, or in a different color than the UV-fluorescent print 205 fluoresces.
  • a further advantageous variant of a security element 1 makes use of the diffraction properties of diffractive and / or stochastic structures, in particular scattering matt structures, for electromagnetic radiation, in particular from the IR and / or VIS range, in a reading device 2, in particular in one or more Detectors of a reading device 2, more preferably in one or more sensors of a reading device 2, to steer, ie to bend or scatter. This causes that with these diffractive or scattering structures
  • a security element 1 a in an IR image recorded in the IR region and / or in a VIS image recorded in the VIS image by the exploitation of the diffraction properties bright, i. more intense, preferably lighter, i. illuminate more intensely than a typical metal surface, with possible variations in production in terms of the impression of the diffractive structures as manufacturing tolerances during the authenticity of the
  • Security elements 1 are taken into account.
  • FIG. 4a shows three subareas 70a, 70b and 70c of a security element 10 under illumination with a spectral range, in particular a VIS range, partial sublattices 208 formed in subregions 70a and 70b, in particular in the form of geometric structures, more preferably in the form of alphanumeric characters from curved lines or guilloches, are shown and in the subregion 70c, a picture element 7a containing circular lines, which are formed on the one hand as a color print 207 and the other as a partial metallization 208.
  • the arbitrarily colored color print 207 in the subregion 70c passes without tolerances into the partial metallization 208.
  • the authenticity check of the security element 10 shown in FIG. 4a is carried out in one or more spectral ranges, preferably a first spectral range and a second spectral range, more preferably in a VIS range and an IR range due to the inclusion of the security element 10 in the corresponding spectral regions a corresponding to the first spectral range, preferably the VIS range, associated first data set, ie the VIS image, and a corresponding to the second spectral range, preferably the IR range, associated second record, ie that the IR image, by the
  • FIG. 4b shows the subareas 70a, 70b, and 70c of the security element 10 under illumination in a second spectral range, preferably the IR range, so that only the submetallizations 202 in the three subareas of the security element 10 and not the color print 207 for the reader 2 are detectable, since the color printing in this example does not absorb or only slightly in the IR range.
  • a second spectral range preferably the IR range
  • the IR image may be provided by software, preferably software containing algorithms, with a template, in particular a template data set and / or template image, more preferably a template provided by a database, template image and / or or template data set to be matched in the context of a plausibility check or authentication, wherein various algorithms, preferably template matching, bounding box and A-KAZE, are executed in parallel or in sequence.
  • the subregion 70a can be designed as a diffractive and / or reflexive structure, in particular a Kinegram®, which is under observation, for example, by a test device or
  • the partial areas 70a and 70c may differ in that the partial metallization 208 in the partial area 70a is replaced by an optional second
  • Partial metallization remains unchanged.
  • the first and / or the second partial metallization always lie in a perfect register with respect to the diffractive and / or reflexive structures, preferably one or more Kinegram®, formed in the partial metallizations 208 over the entire area or over part of the area.
  • the partial area 70c can be overprinted with an etching resist, in particular a colored etching resist, more preferably a blue etching resist, wherein the
  • An etch resist especially a colored etch resist, more preferably a blue etch resist, is characterized on the one hand by the effect of the ink and on the other hand by the property that the etch resist can serve as an etching mask for a further partial metallization.
  • the VIS image is checked during an authenticity check as to whether the colored, in particular blue, lines of the etch resist are precisely aligned and / or positionally exact and / or register-accurate in the metallic lines of a first partial metallization 208. or second partial metallization, the metallic lines of the first and / or second partial metallizations being visible in the IR image,
  • the colored, especially blue, lines of the etch resist are invisible in the IR image, i. can not be detected by a reading device 2, since the blue dye used in particular in an IR range, in particular in a near IR range, preferably in a near IR range in a wavelength interval of 800 nm to 1000 nm, which for the IR Examination, in particular the authenticity test, is provided, only weak absorbing, preferably non-absorbent acts.
  • an authenticity check is carried out in a third spectral range, in particular the UV range, wherein the color and / or
  • FIG. 4c shows the partial regions 70a, 70b, and 70c of the security element 10 under illumination with radiation from a third one
  • Spectral range in particular radiation from the UV range, so that only the not covered by the Generalmetallmaschineen 208 UV-fluorescent print 207b in the picture element 7a by a corresponding reader 2 detectable and in a third data set, in particular a UV image, is convertible.
  • the UV-fluorescent print 207b below the color print is visible or not, respectively, is attenuated by the color print 207.
  • it can also be checked within the scope of a plausibility check whether the color of the light emitted by the UV-fluorescent print 207b has a specific color, in particular a yellow color, wherein the UV-fluorescent print 207b
  • Radiation in particular electromagnetic radiation, in particular UV radiation, can be excited.
  • the typical values of the tolerances of features of different objects are selected from position, color, color coverage, reflection, orientation, size, shape, electromagnetic properties, reflection, personalization and
  • Security elements 10 each selected from the UV-fluorescent print 207b, the colored, especially blue ⁇ tzresists and / or the
  • Partial metallizations 208 each ⁇ 0.8 mm, in particular ⁇ 0.5 mm, preferably less than 0.2 mm and greater than -0.2 mm.
  • the tolerances of the colored, preferably blue etching resist and the UV-fluorescent print 207b in the partial area 70c to the partial metallizations 208 of the partial area 70a are in the range of ⁇ 0.8 mm, in particular ⁇ 0.5 mm, preferably smaller than 0.2 mm and greater than -0.2 mm.
  • the authenticity test refers to the non-tolerance transition, i. the registration or registration accuracy between a colored print 207, in particular an etch resist and / or UV-fluorescent print 207b, in particular a UV-fluorescent etch resist and / or an IR-active print, and the areas with partial metallizations 208.
  • the security feature 10 to be tested is located in the subarea 70c by a reader 2 and thereby segmented by the observation in at least two different spectral regions into at least two subregions which contain the UV-fluorescent print 207b and / or the colored, in particular blue etch resist and the partial metallizations 208.
  • An algorithm preferably the Accelerated-KAZE (A-KAZE) Feature-Detector-ADescriptor, is executed to detect or determine key points, such as endpoints of printed lines 207, 207b, particularly circular lines, and the metallic lines of sub-metallizations 208. Subsequently, the algorithm or other algorithm compares the coordinates of the key points between the data sets, in particular the VIS image and the IR image, to the registration accuracy in the transition areas of the printed structures 207, 207b and metallic
  • Structures 208, and lines, respectively, wherein the shapes and / or the slopes of the printed structures 207, 207b and metallic structures 208, in particular in the transition areas, can be checked.
  • This approach is advantageous using intrinsic or intrinsic properties of a security element, since the security feature is highly likely to be checked for its existence can be.
  • the test method is independent of possible application tolerances, ie tolerances when applying security features to a substrate, and distortions, ie distortion of the security feature, since these do not affect the described local properties. Likewise, the test method is not significantly affected by damage, such as smaller missing points and / or kinks with respect to the security feature 10 to be tested.
  • Intagliobais are in any case to be considered during the examination process, as characterized by the properties to be tested
  • Partial metallization in particular a diffractive and / or reflective structure, more preferably a Kinegram®, can be significantly affected.
  • a security element such as a safety punching or blind embossing.
  • they are appropriate
  • Algorithms in particular shape recognition algorithms, more preferably feature matching, capable of possible distortions in one or more
  • a compensation factor can advantageously be transferred to the algorithms in order to take into account expected image errors which lie within the tolerance ranges, for example fluctuating widths of security elements due to application or age-related security document changes, during the evaluation of the data sets or images by the algorithms.
  • a compensation of less than 10%, in particular less than 5% can be expected around dilatations in production or in use
  • a security element 1 a, 1 b is inserted in advance Acceptance level, which subdivides the results of the authentication of the security document 1 into accepted and unacceptable authenticity results.
  • Security document 1 comprising a security element 1 a, as shown in Figures 5a to 5c, wherein the pixel 7a of the security element 1 a with a colored print 209, more preferably an additional UV-fluorescent printing, configured in a perfect register from the viewer direction , in particular the detection direction of a reading device 2, viewed with a
  • Partial metallization 210 is arranged.
  • a diffractive and / or refractive and / or scattering structure may be formed over the entire area or part of the area, which in a first spectral range, in particular a VIS range, incident light at least partially into a camera or a
  • Sensor 25 of a reading device 2 diffracts, as shown by way of example in FIG. 5 a, and in a second spectral range, in particular an IR range, does not or only to a minor extent diffracts IR radiation into a camera of a reading device 2
  • Security element 1 which the entire area or part of the area of the partial area 7a containing the partial metallization 210 corresponds.
  • the subarea 7a appears dark in front of a lighter background area 7b of a substrate of a multilayer
  • the color, preferably a red color, of the colored print 209 contains at least one under UV irradiation
  • fluorescent pigment preferably in yellow color fluorescent pigment, so that the portion 7a containing the colored print 209 under a third spectral range, preferably a UV range, under fluorescence colored, in particular emits yellow light, or emitted, as shown by way of example in Figure 5c.
  • the UV record associated third data set and other one or more spectral ranges associated data sets but at least three spectral ranges associated data sets with respect to the location, the shape and the expected one or more colors, the registration accuracy, the register accuracy and / or the
  • a software in particular a software containing algorithms, wherein during a plausibility check a comparison between the first, second and third records with a template, in particular a template record, more preferably a template record contained in a database, takes place and during one
  • Security elements 1 a to be checked Preferably, it is not the exact one
  • a colored picture element 7a of a security document 1a in the form of an alphanumeric character, in particular of the letter "K" may be embodied in FIG. 5a, the picture element 7a being colored
  • Pressure 209 more preferably a UV-fluorescent printing, is provided, which register exactly with a partial metallization 210, in particular with a metallic reflection layer, viewed from observer direction, or from the direction of a sensor of a reading device 2, is deposited.
  • Image element 7a partial or full surface diffractive and / or macroscopic and / or scattering structures 210 to be molded, which on the Security element 1 a diffract and / or scatter incident light, these diffractive and / or macroscopic structures 210 in a preferred
  • two-dimensional grid structures with sinusoidal, rectangular and / or asymmetric reliefs and / or matt structures can be designed.
  • the security element 1 a contains one or more
  • shaped surface reliefs as optically variable elements in particular at least one selection from a hologram, Kinegram® and / or Trustseal®, a preferably sinusoidal diffraction grating, an asymmetrical relief structure, a blazed grating, a preferably isotropic or anisotropic matt structure or a light-diffractive and / or refractive and / or light-focusing microstructure or nanostructure, a binary or continuous Fresnel lens, a
  • Microprism structure a microlens structure or a combination structure.
  • a matt structure viewed from the direction of a detector of a reading device 2, is formed behind a color print 209, in particular a partially transparent print, more preferably a UV-fluorescent print, of a security element 1 a Matt structure scattered light such that a large part of the scattered light during a test of the security element 1 a falls into a sensor of a reader 2.
  • the color, in particular red color, of the color print 209 acts as a filter, in particular a spectral filter, of the incident light, so that the scattered light appears to a viewer and / or a reading device 2 in red coloration and due to the shape of the picture element 7a in the form of a correspondingly colored alphanumeric character, in particular the shape of the letter "K".
  • different diffractive optical structures in line form, surface form or in the form of alphanumeric characters can be lines and / or texts in relation to those in FIG.
  • 2000 lines per mm may have, so that no more light can be diffracted into a camera of a reader 2 and the corresponding areas, or partial areas appear dark.
  • the substrate is not shown with any further pressure 209.
  • FIG. 5b shows the partial region 7a under illumination by radiation in the IR range, wherein the partial metallization 210, i. the metallic region appears dark against the portions of a brighter substrate in a background region 7b.
  • the matt area can also light up.
  • the pixel 7a may light up brightly in a predetermined color, particularly a yellow color, upon irradiation in a UV region.
  • the at least three recordings i. Images or data records from preferably the VIS area, the IR area and the UV area by means of a software, in particular a software containing algorithms, related to each other, wherein an authenticity check for each individual image, i. for each individual record.
  • a software in particular a software containing algorithms, related to each other, wherein an authenticity check for each individual image, i. for each individual record.
  • Particularly advantageous is a test that uses the characteristic inherent in the relationship between these different records for authentication.
  • the transmission properties and / or the reflection properties of a first region 3 preferably a window element, more preferably a window feature, a
  • Security document 1 in one or more spectral regions detected by the reader 2 from both the front 6a and 6b of the back, and to one or more, the corresponding spectral ranges associated Generates data records, which each have a first information regarding the
  • Front 6a one or more detectable on the front 6a
  • Security elements 10 and a second information with respect to the back 6 b one or more on the back 6 b detectable security elements 10 included, wherein an authenticity check of the security document 1 based on the analysis of the records by software, in particular a software containing
  • Algorithms takes place and / or a comparison of the analysis results, in particular threshold value images, with a template, in particular with a Schwellwertsent- template, more preferably located in a database
  • the colors and / or diffractive optical structures configured on the entire surface or partial area on the rear side 6b of the security document 1 to be examined may advantageously differ in terms of authenticity checking from the full-surface or partial area on the front side 6a of the security document 1, and only on one side ie be present on the front 6a or the back 6b, and be used as a further inspection feature, wherein the arrangement of the colors and / or structures of the front 6a register accurately, in particular within a pass tolerance of ⁇ 0.5 mm, in particular ⁇ 0.2 mm, preferably less than 0.2 mm and more than -0.2 mm, to the arrangement of the colors and / or structures of the back 6b can behave.
  • Provision of a record can be recognized by software and associated with a reference record, i. a template to be checked for authenticity.
  • a reference record i. a template to be checked for authenticity.
  • Particularly advantageous are features which have a precise registration.
  • a partially metallized security feature may be metallic from the front while adding the same metallic areas
  • a reading device 2 in one or more spectral regions, in particular selected from a VIS range, an IR range and a UV Area, read and associated with the spectral regions corresponding to one or more data sets 5, wherein a software, in particular a software comprising one or more algorithms, in particular template
  • the partial metallizations can be designed in particular as part of a Kinegram®.
  • assignment criteria can be checked during the authentication of the
  • Security document 1 advantageously made of the type, the model and / or the manufacturer of the reader 2, or tester, dependent on design-related variances of the lighting and / or the
  • Security Dokunte 1 due to the information contained in the security document 1 itself, such as in a machine-readable zone, a bar code or an electronic component, such as a chip. Based on this information, further analysis and comparison with the database are made.
  • a security document 1 is tested whose regions having relief structures are provided with an HRI layer, which from the perspective of an observer is arranged behind or in front of the structured areas, the HRI layer additionally being provided with a color layer can.
  • a color design included in the ink layer may have a registration accuracy of ⁇ 0.5 mm, more preferably ⁇ 0.2 mm, preferably less than 0.2 mm and more than -0.2 mm, to a region having a matte structure , which is molded in the structured areas, be printed, with the HRI layer in the interstices, ie in the areas where neither the color design nor the matte structure is present, is not present. If the reflection layer is not formed in particular, the matt structure, which is shaped in particular as a relief structure, for example in a replication layer, may still be present, but due to the lack of
  • Reflection layer imperceptible or optically detectable.
  • the color of the color design may be observable only in a VIS range and / or be detectable only in an IR range, as well as the color of the color design partially or completely with UV-fluorescent pigments
  • FIG. 6a shows a radial design element, respectively
  • Security element 1 a under illumination in a VIS region, which has a matt structure in a central region 70 e, wherein the matt structure scatters incident light both under illumination in a VIS region and under illumination in an IR region into a camera of a reader 2 ,
  • the scattering effects of the matt structure can be observed only in the areas 70e of the design element designed with the HRI layer, so that a clearly recognizable or camera-evaluable contrast change at the transitions to the matt structure can be detected in comparison to an observation in a VIS area.
  • FIG. 6b shows the radiating design element under illumination in an IR range, wherein the color of the color design is chosen to be below
  • Design element UV-fluorescent pigments are admixed, so that illuminated under illumination from a UV range, the entire area 70f of the design element, as shown in Figure 6c.
  • Design element to the central region of the design element containing the matte structure are not relevant to the examination of the intrinsic or intrinsic or self-referencing described above
  • FIG. 6 d shows a security document 1, in particular the data page of a passport, comprising a security element 1 a, in particular a radial design element 600, which is located in a partial area of the front side 6 a of FIG
  • Security document 1 is formed, wherein the at least the surrounding area 7b with respect to the security element 1 a is not provided with an HRI layer.
  • FIG. 7a Another advantageous example is shown in FIG. 7a.
  • TKO Transparent KINEGRAM overlay
  • Security document 1 is used, wherein the front side 6a contains data readable by a reader 2, which for authentication and / or
  • the reflective layer used is an HRI layer.
  • Structure background region 700a of the front side 6a is formed over the entire surface or part of a grid structure with a number of lines of preferably more than 2000 lines per mm, whereby when illuminated in a first spectral range, in particular a VIS range and a second spectral range, in particular an IR range, no light from diffraction orders into a sensor, ie Camera, a reader 2 is reflected.
  • a first spectral range in particular a VIS range and a second spectral range, in particular an IR range
  • the lattice structure is further underlaid by an HRI layer viewed from the front side 6a, so that the lattice structure together with the HRI layer has a filtering effect, since the lattice structure influences how much light can transmit wavelength-dependent through the HRI layer, which is subsequently transmitted by the HRI layer Front 6a of the security document 1 can be reflected or backscattered.
  • background area 700a is a partial area, preferably in the form of one or more alphanumeric characters shaped partial metallization, here as object 9b in the form of three letters "UTO", which is aligned with one or more edges of
  • Structure background area 700a lies.
  • the TKO can due to Application variations in the position of the substrate in the position by up to ⁇ 2 mm, in particular by up to ⁇ 0.8 mm, preferably by up to ⁇ 0.2 mm, fluctuate.
  • the security document 1 can be examined in regions by the reading device 2, wherein in particular a predetermined and / or a preselection determined by the reading device 2 of the areas to be examined takes place.
  • the areas to be tested can also be selected from a data set, in particular from an algorithm.
  • the security document 1 is a contrast difference between the
  • a color contrast and / or brightness contrast between the diffractive region of the grating structure in the structure background region 700a of the TKO and the remaining background region 700b of the TKO, which by a in Figure 7a shown contrast edge 700 are separated, wherein the contrast difference results due to the filter effects of the respective diffractive structures, as these specific wavelength ranges, or frequency ranges, the one or more spectral regions of the incident light different
  • the security document may comprise a print, in particular UV-fluorescent print, in the texture background region 700a and / or the remaining background region 700b, which is printed on a film layer and / or substrate in a security document 1.
  • FIG. 7a shows the security document 1 under illumination from a VIS region
  • FIG. 7b shows the security document 1 under illumination from a UV region
  • FIG. 7c shows the security document 1 under illumination from an IR region.
  • the UV pressure detected in a UV region in the region of the object 9b, which in the figure 7b takes the form of a sequence of three letters "UTO" is with a tolerance of ⁇ 0.5 mm, in particular ⁇ 0.2 mm, preferably of less than 0.2 mm and more than -0.2 mm, register exactly to the detected in an IR region partial metallization in the region of the object 9b, which in the figure 7c also takes the form of a sequence of three letters "UTO "and the outer contours of a RICS structure surface.
  • a rotation induced color shift (RICS) structure comprises a zeroth-order diffractive structure deposited by an HRI layer, in particular a zeroth-order diffraction grating having a period below the wavelength of visible light, in particular half the wavelength of visible light.
  • the RICS structure reflects specific wavelength ranges, in particular in the mirror reflex, which depend on the orientation of the RICS structure. Under illumination in the IR range, a contrast to a structure without RICS effect can in particular be recognized in a RICS structure, preferably as a function of the viewing angle.
  • the under Illumination from an IR region of at least two detectable image elements with the under illumination from a VIS region at least two detectable objects 9a, 9b with the position and / or shape of the
  • Structural background area 700a and / or the remaining background area 700b are compared and as a further examination step in the context of a
  • the security element 1a is configured and checked by the following steps in the form of a QR code:
  • a diffractive and / or reflective relief structure preferably a Kinegram®, and / or a zero order diffraction structure and / or a Kinegram® zero.zero is realized as a first security feature 10 with a partial metal layer 8a.
  • the partial metallization 214 or the Kinegram® is shown by way of example as a closed rosette pattern, wherein the material of the metal layer 8a is provided in particular in the areas of the picture elements 7a of the first security feature 10a and is not provided in a background area 7b surrounding the picture elements 7a.
  • a print 213 consisting of a UV-fluorescent color, which is not visible in the visible range or VIS range, is printed on the first security element shown in FIG. 8a, wherein the print 213 acts as a second security feature 10b in the form of a second security feature QR codes in the areas of the picture elements 7a is formed as complete first information and the hatched areas of the picture elements 7a preferably represent the UV-fluorescent print 213, wherein the material of the color layer 8b is provided in particular in the areas of the picture elements 7a of the first security feature 10a and in one surrounding the picture elements 7a
  • the pressure 213 serves in particular as an etching resist mask for a further partial metallization 214b on the basis of the partial metallization 214 already carried out in the first step, so that areas of the partial metallization 214 which were not overprinted by the pressure 213 are demetallised.
  • FIG. 8c shows the IR image of the partial metallization 214b remaining after demetallization by illumination with IR radiation, in particular from the first one
  • Spectral range more preferably from the IR range, wherein a first data set contains at least the IR image as a partial image of the QR code, which no longer comprises the complete first information but a first part of two parts of the complete first information of the second security feature 10b ,
  • FIG. 8d shows the UV image of the regions of the UV-fluorescent print 213 by irradiation by UV radiation, in particular from a second spectral region, more preferably from the UV region, which covers the regions of the pressure 213 not covered by the partial metallization 214b is generated, wherein a second data set contains at least the UV image as a partial image of the QR code, which no longer the complete second information but a second part of two parts of the complete first information of the second
  • Security feature 10b includes.
  • the total image generated by software containing algorithms in the form of the complete QR code is shown in FIG. 8e and is a data set consisting of the combination of the first part and the second part of two parts of the complete first information of the first data set and the second one
  • a first security feature 10a and a second security feature 10b are deliberately not arranged register-accurate, preferably even arranged in spaced sections of the security document 1, and the corresponding records are by software, in particular, a software containing algorithms, assembled into an overall image.
  • the combination of the first data set generated in a first spectral range, in particular the IR range, and the second data set generated in a second spectral range, in particular the UV range makes it possible to use software
  • Algorithms a reconstruction of the complete first information, which is included in the second security feature 10b as the QR code.
  • the UV image is filtered, whereby only the matching yellow pixels or pixels, in particular pixel data, are taken into account and in a UV binary image generated from the UV image by a software containing algorithms, preferably image recognition algorithms and pattern recognition algorithms being represented.
  • the IR image taken under IR illumination is filtered during image processing, whereby the dark appearing metallic regions of the partial metallization 214b are taken into account and displayed in black in an IR binary image generated by the software from the IR image.
  • the register-accurate superposition of the UV binary image and the IR binary image reveals the complete QR code as another binary image, so that the complete first information can be read from the QR code.
  • the registration of the UV binary image and the IR binary image can be checked, as in the range of the QR code, which is composed of the UV binary image and the IR binary image, a nearly tolerance less Transition, preferably a zero-tolerance transition exists.
  • FIG. 9 An advantageous embodiment of the security element 1 a is shown in FIG. 9 and consists of one or more arbitrarily shaped flat surfaces
  • Subareas 70 of the partial metallization 216 preferably by a laser, in particular a laser diode, an individual marking, preferably consisting of alphanumeric characters, as further personalization and / or individual labeling bring.
  • a color print 215 served as a colored etching resist to produce the partially metallized regions 216. If the metal layer is now removed by the laser, the underlying color layer comes to light again.
  • the color print 215 is present in the partial regions 70 in a first spectral range, preferably the IR range, and / or a second spectral range, more preferably the UV range , and / or a third spectral range, more preferably the VIS range, detectable.
  • a further advantageous embodiment of the method consists of the security element 10 detected by the reader 2 in a first spectral range, preferably the IR range, and / or in a second spectral range, more preferably the UV range, and the respectively detected IR Image in the form of a data set, in particular of the first data set and / or from the UV image in the form of a data set, in particular of the second data set, by software containing algorithms, in particular containing a template matching algorithm, generated threshold image with a template, preferably a template contained in a database, compare and verify the authenticity.
  • the first record and the second record which preferably the shape of the partial metallization 216 respectively in a first
  • Imaging spectral range and a second spectral range directly with a corresponding template, preferably a template contained in a
  • Security element 10 by laser as a readable code, preferably
  • machine-readable code be formed and used by comparing with a stored code, in particular with a stored in a database code, more preferably with a guide for such a code, for checking the authenticity of the security element 10.
  • the color print 215 exposed in the partial regions 70 of the partial metallization 216 of a security element 10, in particular UV printing, more preferably UV-fluorescent UV printing can be provided with a color pattern, the color pattern being in a perfect Register, in particular a register, must lie with the edges of the subregions 70 and wherein the color pattern for the authenticity of the
  • Security elements 10 with a stored color pattern in particular with a color pattern imaging data set, more preferably with a color pattern mapping record contained in a database, is compared.
  • the individual markings formed in the partial regions 70 of the partial metallization 216 of a security element 10, preferably by a laser, in particular a laser diode, preferably consisting of alphanumeric characters, are detected by the reader 2 in one or more spectral ranges and the so generated the
  • Spectral ranges associated data sets by self-learning algorithms in particular supervised or unattended self-learning algorithms, more preferably supervised or unattended self-learning Image recognition algorithms and / or pattern recognition algorithms, analyzed and authenticated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Credit Cards Or The Like (AREA)
  • Printing Methods (AREA)

Abstract

L'invention concerne un procédé de vérification d'un document de sécurité (1) au moyen d'un dispositif de lecture (2). L'invention est caractérisée en ce que des premières propriétés de transmission et/ou de réflexion d'une première zone (3) du document de sécurité (1) sont détectés dans un premier domaine spectral par le dispositif de lecture et, à partir de là, un premier ensemble de données, spécifiant ces propriétés, est créé, la première zone (3) recouvrant au moins partiellement un élément de sécurité optique (1a, 1b) disposé sur le document de sécurité (1) ou incorporé dans le document de sécurité (1), en ce que des deuxièmes propriétés de transmission et/ou de réflexion de la première zone (3) du document de sécurité (1) sont détectées dans un seconde domaine spectral par le dispositif de lecture (2) et, à partir de là, un second ensemble de données, spécifiant ces propriétés, est créé, le premier domaine spectral étant différent du second domaine spectral, en ce que l'authenticité du document de sécurité (1) et/ou de l'élément de sécurité (1a, 1b) est vérifié sur la base d'au moins le premier ensemble de données et le second ensemble de données.
EP17825440.5A 2016-12-16 2017-12-13 Vérification d'un document de sécurité Pending EP3555811A2 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102016124717 2016-12-16
DE102017102556.1A DE102017102556A1 (de) 2017-02-09 2017-02-09 Verfahren zur Verifizierung eines Sicherheitsdokuments sowie ein Sicherheitsdokument, eine Vorrichtung und ein Sicherheitselement
PCT/EP2017/082681 WO2018109035A2 (fr) 2016-12-16 2017-12-13 Procédé de vérification d'un document de sécurité et document de sécurité, dispositif et élément de sécurité

Publications (1)

Publication Number Publication Date
EP3555811A2 true EP3555811A2 (fr) 2019-10-23

Family

ID=60935801

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17825440.5A Pending EP3555811A2 (fr) 2016-12-16 2017-12-13 Vérification d'un document de sécurité

Country Status (10)

Country Link
US (1) US11068681B2 (fr)
EP (1) EP3555811A2 (fr)
JP (1) JP7269177B2 (fr)
KR (1) KR102549881B1 (fr)
AU (1) AU2017375027B2 (fr)
BR (1) BR112019012094A8 (fr)
CA (1) CA3047482A1 (fr)
MA (1) MA47021A (fr)
MX (1) MX2019006851A (fr)
WO (1) WO2018109035A2 (fr)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102016000011A1 (de) * 2016-01-05 2017-07-06 Giesecke & Devrient Gmbh Vollständigkeitsprüfung eines Wertdokuments
US11167581B2 (en) * 2018-04-06 2021-11-09 Proof Authentication Corporation Authentication hologram
FR3081244B1 (fr) * 2018-05-17 2020-05-29 Idemia Identity & Security France Procede de reconnaissance de caracteres
US11262298B2 (en) * 2018-08-30 2022-03-01 Caterpillar Inc. System and method for determining fluid origin
US10950079B2 (en) * 2018-12-17 2021-03-16 Morgan State University Method and apparatus for determining the authenticity of flat objects: banknotes, documents, security labels, and related items
CN109784919A (zh) * 2018-12-25 2019-05-21 瞬联软件科技(北京)有限公司 一种用颜色显示网上支付安全风险值的方法及系统
US10496862B1 (en) 2019-03-18 2019-12-03 Capital One Services, Llc Detection of images in relation to targets based on colorspace transformation techniques and utilizing ultraviolet light
US10534948B1 (en) 2019-03-18 2020-01-14 Capital One Services, Llc Optimizing detection of images in relation to targets based on colorspace transformation techniques
US10509991B1 (en) 2019-03-18 2019-12-17 Capital One Services, Llc Detection of images in relation to targets based on colorspace transformation techniques and utilizing infrared light
US10496911B1 (en) 2019-03-18 2019-12-03 Capital One Services, Llc Detection of images in relation to targets based on colorspace transformation techniques and utilizing ultraviolet and infrared light
US10523420B1 (en) 2019-04-18 2019-12-31 Capital One Services, Llc Transmitting encoded data along transmission mediums based on colorspace schemes
US10504013B1 (en) 2019-04-24 2019-12-10 Capital One Services, Llc Colorspace encoding multimedia data on a physical page
US10529300B1 (en) 2019-06-20 2020-01-07 Capital One Services, Llc Adaptive image display based on colorspace conversions
US10614635B1 (en) 2019-07-25 2020-04-07 Capital One Services, Llc Augmented reality system with color-based fiducial marker
US10833852B1 (en) 2019-10-03 2020-11-10 Capital One Services, Llc Encoded data along tape based on colorspace schemes
GB2588181B (en) * 2019-10-11 2023-02-15 De La Rue Int Ltd A method and apparatus for inspecting a light control layer for a security device
US10715183B1 (en) * 2019-10-25 2020-07-14 Capital One Services, Llc Data encoding with error-correcting code pursuant to colorspace schemes
US10867226B1 (en) 2019-11-04 2020-12-15 Capital One Services, Llc Programmable logic array and colorspace conversions
US10762371B1 (en) 2019-11-14 2020-09-01 Capital One Services, Llc Object detection techniques using colorspace conversions
US10878600B1 (en) 2019-12-10 2020-12-29 Capital One Services, Llc Augmented reality system with color-based fiducial marker utilizing local adaptive technology
DE102020101559A1 (de) * 2020-01-23 2021-07-29 Kurz Digital Solutions Gmbh & Co. Kg Verfahren zum Authentifizieren eines Sicherheitsdokuments
US20210248338A1 (en) * 2020-02-08 2021-08-12 Blocktag, Inc. Systems, methods and apparatuses of a security device
DE102020109171A1 (de) 2020-04-02 2021-10-07 Bundesdruckerei Gmbh Integritätsprüfung eines Dokuments mit personenbezogenen Daten
JP7510781B2 (ja) * 2020-04-20 2024-07-04 東芝テック株式会社 硬貨処理装置
DE102020120842A1 (de) * 2020-08-07 2022-02-10 Bundesdruckerei Gmbh Erzeugung von Dokumentenvorlagen mit Sicherheitsmerkmalen
US11302036B2 (en) 2020-08-19 2022-04-12 Capital One Services, Llc Color conversion between color spaces using reduced dimension embeddings
EP4224405A4 (fr) * 2020-10-02 2023-11-29 NEC Corporation Dispositif de traitement d'informations, procédé de traitement d'informations et support d'enregistrement
US12026967B2 (en) * 2020-12-31 2024-07-02 Securiport Llc Travel document validation using artificial intelligence and unsupervised learning
WO2022197578A1 (fr) * 2021-03-16 2022-09-22 Blocktag Inc. Systèmes, procédés et dispositifs pour administrer un dispositif de sécurité à motifs chaosmétriques
EP4063142A1 (fr) * 2021-03-26 2022-09-28 Thales Dis France SAS Éléments de sécurité multicolores personnalisables
TWI798700B (zh) * 2021-05-19 2023-04-11 陽程科技股份有限公司 雷射轉印設備及其轉印至基材方法
DE102021002672A1 (de) * 2021-05-21 2022-11-24 Giesecke+Devrient Currency Technology Gmbh Verfahren und Vorrichtung zum Prüfen von Wertdokumenten und Verfahren und Vorrichtung zum Erzeugen von Prüfparameter für das Prüfverfahren
EP4099218A1 (fr) * 2021-06-04 2022-12-07 Klöckner Pentaplast Europe GmbH & Co. KG Authentification optique de produit à l'aide de marques de sécurité et de moyens optiques
US11593578B1 (en) * 2021-08-11 2023-02-28 Nec Corporation Of America Data encoding in printed material using varying IR reflective materials
AU2022342770A1 (en) * 2021-09-10 2024-02-15 De La Rue International Limited Security devices and methods of manufacture thereof
EP4227913A1 (fr) * 2022-02-09 2023-08-16 IAI Industrial systems B.V. Procédé de détermination d'une position de référence
DE102022105489B3 (de) * 2022-03-09 2023-03-09 Heidelberger Druckmaschinen Aktiengesellschaft Verfahren zum Bereitstellen eines Druckprodukts und zugehörigen Authentifikations-Informationen und Verfahren zum Authentifizieren eines Druckprodukts
US20240144713A1 (en) * 2022-10-31 2024-05-02 Daon Technology Methods and systems for determining the authenticity of an identity document

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0052624B1 (fr) 1980-05-30 1985-01-30 GAO Gesellschaft für Automation und Organisation mbH Papier-valeur avec marque d'authenticite en matiere luminescente
US6373965B1 (en) * 1994-06-24 2002-04-16 Angstrom Technologies, Inc. Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters
US6827769B2 (en) 2001-05-10 2004-12-07 Pitney Bowes Inc. Photosensitive optically variable ink heterogeneous compositions for ink jet printing
DE10260124A1 (de) 2002-12-19 2004-07-01 Giesecke & Devrient Gmbh Sicherheitselement für Wertdokumente
GB2403798B (en) 2003-07-03 2006-11-29 Ver Tec Security Systems Ltd Apparatus and methods for device quality evaluation
US7706565B2 (en) 2003-09-30 2010-04-27 Digimarc Corporation Multi-channel digital watermarking
DE102004007379B3 (de) * 2004-02-16 2005-09-01 Ovd Kinegram Ag Wertgegenstand mit Moiré-Muster
KR101333278B1 (ko) * 2004-03-09 2013-12-02 카운슬 오브 사이언티픽 앤드 인더스트리얼 리서치 시각적인 반사 스펙트럼 반응을 이용한 향상된 위조 화폐 검출기
DE102004059798A1 (de) 2004-12-10 2006-06-29 Ovd Kinegram Ag Optisch variables Element mit elektrisch aktiver Schicht
JP2006293729A (ja) * 2005-04-12 2006-10-26 Dainippon Printing Co Ltd 認証用媒体
GB0810807D0 (en) * 2008-06-12 2008-07-23 Rue De Int Ltd Securing document security systems and method of controlling access
DE102009057360A1 (de) 2009-12-08 2011-06-09 Bundesdruckerei Gmbh Verifikation von Lichtbildern/Unterschriften/Dokumenten mit Sicherheitsmerkmalen
DE102010019194A1 (de) * 2010-05-04 2011-11-10 Giesecke & Devrient Gmbh Wertdokument mit Ausnehmung
US20110298204A1 (en) 2010-06-07 2011-12-08 Xerox Corporation Document security by aligning visible and hidden marks
DE102010062032A1 (de) 2010-11-26 2012-05-31 Bundesdruckerei Gmbh Wert- und/oder Sicherheitsdokument und Verfahren zu dessen Herstellung
DE102011005518A1 (de) 2011-03-14 2012-09-20 Bundesdruckerei Gmbh Sicherheitselement mit einem 3D-Farbeffekt sowie Verifikationsverfahren und Verifikationsvorrichtung für ein solches Sicherheitselement
JP6042757B2 (ja) * 2013-03-21 2016-12-14 日本発條株式会社 識別媒体、コード情報の読み取り方法、コード情報の読み取り装置、識別媒体の製造方法、および識別媒体の製造装置
DE102013009474A1 (de) 2013-06-06 2014-12-11 Modi Modular Digits Gmbh Vorrichtung zur automatischen Verifizierung eines Identitätsdokuments einer Person und Verfahren zum Erzeugen von Erkennungsdaten einer Person zur Verwendung in einer automatisierten Identitätskontrollstation
DE102014207323B4 (de) 2014-04-16 2018-08-16 Koenig & Bauer Ag Verfahren zur Identifikation eines Gegenstandes
DE102015100520A1 (de) * 2015-01-14 2016-07-28 Leonhard Kurz Stiftung & Co. Kg Mehrschichtkörper und Verfahren zu dessen Herstellung
DE102015106800B4 (de) 2015-04-30 2021-12-30 Leonhard Kurz Stiftung & Co. Kg Verfahren zum Herstellen eines Mehrschichtkörpers

Also Published As

Publication number Publication date
US11068681B2 (en) 2021-07-20
WO2018109035A2 (fr) 2018-06-21
JP7269177B2 (ja) 2023-05-08
US20190384955A1 (en) 2019-12-19
KR20190107024A (ko) 2019-09-18
AU2017375027A1 (en) 2019-07-11
MA47021A (fr) 2019-10-23
BR112019012094A8 (pt) 2023-04-11
AU2017375027B2 (en) 2022-04-07
KR102549881B1 (ko) 2023-06-30
MX2019006851A (es) 2019-11-21
BR112019012094A2 (pt) 2019-10-29
CA3047482A1 (fr) 2018-06-21
WO2018109035A3 (fr) 2018-08-23
JP2020509508A (ja) 2020-03-26

Similar Documents

Publication Publication Date Title
EP3555811A2 (fr) Vérification d'un document de sécurité
EP3078004B1 (fr) Procede de authentifaction d'un élément de sécurité
EP2121348B1 (fr) Élément de sécurité pour document de valeur
EP2459389B2 (fr) Document d'identification à identification visuelle personnalisée et son procédé de production
DE102007025866B4 (de) Datenträger mit Sicherheitskennzeichnung
EP1983473B1 (fr) Support de données doté de caractérisations
DE102013113340A1 (de) Verfahren zum Authentifizieren eines Sicherheitselements und optisch variables Sicherheitselement
DE102017102556A1 (de) Verfahren zur Verifizierung eines Sicherheitsdokuments sowie ein Sicherheitsdokument, eine Vorrichtung und ein Sicherheitselement
DE112018003095T5 (de) Sicherheitsdokument beinhaltend ein optisches Sicherheitsmerkmal
DE102017110892A1 (de) Verfahren zur Authentifizierung eines Gegenstands, insbesondere eines Sicherheitselements, sowie Sicherheitselement
DE102004037825A1 (de) Sicherheitselement mit Linsenraster und Verfahren zu seiner Herstellung
EP4215377A2 (fr) Vérification d'un document de sécurité sur la base de morphologies de gouttelettes
EP2356615B1 (fr) Élément de sécurité avec codage lisible par machine
DE102020007602B4 (de) Identifikations-, Wert- oder Sicherheitsprodukt mit einem Sicherheitsmerkmal und Herstellungsverfahren dafür
WO2024002680A1 (fr) Document de sécurité, système de fabrication d'un document de sécurité et procédé de fabrication d'un document de sécurité
WO2022228730A9 (fr) Signe de sécurité pour un document de valeur, document de valeur et procédé de réalisation d'un signe de sécurité
EP2860043B1 (fr) Procédé de fabrication d'un filigrane
DE102020101559A1 (de) Verfahren zum Authentifizieren eines Sicherheitsdokuments
DE102021002214A1 (de) Sicherheitsmerkmal für ein Wertdokument, Wertdokument und Verfahren zur Herstellung eines Sicherheitsmerkmals
DE102021003199A1 (de) Sicherheitselement mit einer Markierungsschicht mit mehreren Aussparungen und Verfahren zum Erzeugen eines Sicherheitselements
DE102022003473A1 (de) Sicherheitselement mit einem maschinenlesbaren Code sowie Verfahren zur Herstellung desselbigen
DE102012025089A1 (de) Sicherheitselement mit Kippeffekt

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20190711

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
RAV Requested validation state of the european patent: fee paid

Extension state: TN

Effective date: 20190711

Extension state: MA

Effective date: 20190711

PUAG Search results despatched under rule 164(2) epc together with communication from examining division

Free format text: ORIGINAL CODE: 0009017

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20210709

B565 Issuance of search results under rule 164(2) epc

Effective date: 20210709

RIC1 Information provided on ipc code assigned before grant

Ipc: G06K 9/20 20060101AFI20210706BHEP

Ipc: G06K 9/38 20060101ALI20210706BHEP

Ipc: G06K 9/46 20060101ALI20210706BHEP

Ipc: G07D 7/12 20160101ALI20210706BHEP

Ipc: B42D 25/29 20140101ALI20210706BHEP

Ipc: G07D 7/1205 20160101ALI20210706BHEP

Ipc: G06K 7/12 20060101ALI20210706BHEP

Ipc: G07D 7/00 20160101ALI20210706BHEP

Ipc: G07D 7/202 20160101ALI20210706BHEP

Ipc: G07D 7/206 20160101ALI20210706BHEP

Ipc: G07D 7/207 20160101ALI20210706BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS