EP3997677A1 - Procédé de vérification de l'authenticité d'un document de sécurité - Google Patents
Procédé de vérification de l'authenticité d'un document de sécuritéInfo
- Publication number
- EP3997677A1 EP3997677A1 EP20765253.8A EP20765253A EP3997677A1 EP 3997677 A1 EP3997677 A1 EP 3997677A1 EP 20765253 A EP20765253 A EP 20765253A EP 3997677 A1 EP3997677 A1 EP 3997677A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- pattern
- security document
- security
- document
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 239000000758 substrate Substances 0.000 claims description 12
- 238000013461 design Methods 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004615 ingredient Substances 0.000 description 1
- 238000003475 lamination Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2033—Matching unique patterns, i.e. patterns that are unique to each individual paper
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/207—Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
Definitions
- the present invention relates to a method for checking the authenticity of a security document and a security element for use for a security document.
- the invention also relates to a security document.
- Security features can be differentiated into general or non-personalized security features and personalized or individualized security features.
- the general security features can be guilloches, fluorescent ingredients, sovereign, holographic elements or the like.
- the personalized features can be represented, for example, by biometric data, a portrait and / or fingerprints of the document owner and / or a personalized hologram and / or the like.
- the properties are clearly recognizable and therefore offer the possibility of alienating, replacing or copying these features.
- special read-out devices for example for reading out the electronic chip, or other devices are necessary in order to verify the property of the feature.
- Document DE 102011 084819 A1 discloses a method for verifying a security document with a stored second pattern using a display device, a first pattern being displayed on the display surface for verification.
- the document DE 102011 084818 A1 describes a method for verifying a security document, the security document comprising one visual barrier and at least two for verification Images of the security document in front of the display device, on the display surface of which a graphic representation is displayed, are recorded for at least two different viewing geometry directions.
- a security element is understood to be a structural unit which comprises at least one security feature.
- Security elements serve to secure security documents, which also include documents of value, against forgery or copying.
- a security feature can also be an independent structural unit that can be connected, for example glued, to a security document, which can also be a value document. However, it can also be an integral part of a security document.
- a security feature is a structure that can only be produced or reproduced in an unauthorized manner with increased effort compared to simple copying or not at all.
- Security documents typically have a substrate, a printing layer and optionally a transparent cover layer.
- a substrate is a support structure on which the printing layer with information, images, patterns and the like is applied. All conventional materials based on paper and / or plastic can be used as materials for a substrate, among other things. Examples of security documents are identity cards, passports, driver's licenses, ID cards, access control cards, visas, tax codes, tickets,
- the object of the present invention is to further improve the security against forgery of security elements and security documents and in particular to implement a link between personal or individual data with a security feature that is not directly recognizable but can be verified with generally accessible means, preferably with a smartphone or tablet.
- This object is achieved by a method for checking the authenticity of a security document according to claim 1, a security element for use for a security document according to claim 7 and a security document according to claim 8.
- the dependent claims contain further advantageous embodiments of the invention.
- the method according to the invention for checking the authenticity of a security document relates to a security document which comprises at least one layer.
- the layer comprises a, preferably visually perceptible, pattern in the form of an image that is calculated using a fixed algorithm from a number of data specifying the security document.
- a preferably visually perceptible pattern is calculated in the form of an image from the number of data specifying the security document, the calculated pattern is at least partially displayed on a display and compared with the pattern depicted on the security document.
- the calculated pattern can be applied to the layer and / or introduced into the layer.
- the data specifying the security document is preferably personal and / or document-related data.
- the data specifying the security document can be a name and / or a date of birth and / or a place of birth and / or a place of residence and / or an address and / or biometric data and / or an issue date and / or an issue location and / or act on a validity date.
- the present invention provides for using personal and / or document-specific data to generate patterns which can be verified with the aid of a display, preferably a smartphone. Without knowledge of the algorithm used and the parameters used as input variables, the respective pattern cannot be copied or can only be copied with great effort and used for a forged document.
- a display preferably a smartphone.
- One is preferred Algorithm that is not generally available is used to further improve protection against forgery.
- the pattern can be applied to the layer and / or introduced into the layer, or applied and / or introduced, by means of a printing technique, in particular micro-printing, and / or by means of laser processing and / or other imaging methods. In this way, falsification or copying is made more difficult, since the material of the layer is changed irreversibly, particularly in the case of laser processing.
- the pattern can be calculated using a suitable device, for example a computer, smartphone, tablet or the like.
- the algorithm for calculating the pattern is preferably stored in a secure environment, for example a cloud, and is called up there.
- the pattern depicted on the security document is displayed on the display. Additionally or alternatively, a continuation and / or addition of the pattern depicted on the security document can be displayed on the display.
- the use of a continuation and / or addition of the pattern in the context of checking the authenticity has the advantage that the pattern as a whole can be visually recognized more easily than when comparing two patterns displayed next to one another. The comparison is thus made more precise.
- the security document can, for example, be placed on the display as part of the comparison and an expanded or adapted pattern can be displayed on the display, so that when the document is placed on the display, the pattern of the document is preferably continued and / or supplemented on the display with an accurate fit if the security document is a genuine and therefore unadulterated document. A lack of the precisely fitting continuation and / or addition indicates a forgery.
- the continuation and / or addition of the pattern on the display is a color-true or true-to-color continuation and / or addition of the pattern on the security document, provided that the security document is a real document.
- the number of data specifying the security document required for calculating the pattern can be read out from the security document and / or entered into a device for calculating the pattern.
- the reading out and / or input can take place electronically and / or manually.
- the specified algorithm is advantageously stored in a secure environment and can be called up there.
- the algorithm can be a mathematical algorithm for calculating fractals, such as Mandelbrot sets, Julia sets and / or combinations thereof, the parameters using the data specifying the security element, i.e. in particular using personal or document-related data, are formed.
- the algorithm is advantageously stored in a secure environment (cloud) in such a way that the individual pattern of a document is calculated when the corresponding data is entered, such as date of birth, date of issue, etc., and is displayed on a display, for example the display of a smartphone , can be displayed and compared with the sample applied to the document.
- a secure environment cloud
- the security element according to the invention for use for a security document comprises a layer.
- the layer comprises a, preferably visually perceptible, pattern in the form of an image that is calculated by means of a fixed algorithm from a number of data specifying the security document.
- the inventive Security document comprises a security element according to the invention.
- the security element can be designed for a specific security document or for a specific type of security document with specific security information, for example for identity cards or passports.
- the security element according to the invention and the security document according to the invention have the advantages already mentioned.
- the security document can comprise at least one edge and the pattern of the security element calculated according to the specified algorithm can be mapped up to the edge of the security document.
- a pattern is generated and shown on the associated display, which represents a perfectly fitting continuation or continuation of the pattern formed up to the edge of the security document, provided that Document is unadulterated.
- the security document By placing the security document on the display, the precisely fitting transition of the pattern on the document to the pattern on the display can be checked and the document can thus be verified.
- This variant can also be used to map a large-area pattern, thus increasing the security against forgery.
- the security document according to the invention can comprise a substrate, a printing layer arranged on the substrate and a cover layer arranged on the printing layer, the substrate and / or the printing layer and / or the cover layer comprising the pattern.
- the security document can in particular comprise layers connected to one another by lamination.
- the layers can be, for example, the substrate, at least one printing layer which contains security-relevant information, and a cover layer, the at least one printing layer being arranged between the substrate and the cover layer.
- At least one of the layers preferably comprises a security element according to the invention.
- the invention enables a security feature which can be verified by a separately stored algorithm.
- a copy or Changes in the pattern can be recognized with the aid of the data in the document and the securely stored algorithm by comparing it with a representation on a display.
- a change in the data of the document can also be recognized, since the stored algorithm generates a pattern based on the changed data and shows it on the display which does not match the pattern on the document.
- FIG. 1 shows schematically a security document according to the invention and a display arranged next to it in a perspective view.
- FIG. 2 schematically shows a security document according to the invention and a display arranged thereunder in a perspective view.
- Figures 1 and 2 show a computer-controlled device 1 with a display 2 and a security document 3 with personal data, such as a portrait 6 and a name 7 and / or a date of birth and / or an address and / or a document number, etc.
- personal data such as a portrait 6 and a name 7 and / or a date of birth and / or an address and / or a document number, etc.
- document-specific data for example date of issue, place of issue, etc.
- personal data such as biometric data, date of birth, place of birth, etc.
- a person-specific and / or document-specific pattern 4 is generated, which is used as a security element 4 is shown on the security document 3, in particular on a surface 8 of the security document 3.
- the security document 3 comprises a pattern 4 which forms the security element.
- the pattern 4 is preferably reproduced continuously up to at least one edge 9 of the security document 3 on the surface 8 of the security document 3.
- the pattern 4 can be introduced on or in a substrate and / or a printing layer and / or a cover layer of the security document by laser processing.
- this pattern can be shown on the display 2 of the computer-controlled device 1 by making the data provided for this accessible to the application.
- the personal and / or document-related data required to calculate the pattern can be read out electronically and / or manually.
- the security document 3 and the display are shown in FIG.
- the application is expanded to the effect that the pattern 4 depicted on the security document 3 represents a section of the pattern generated by the algorithm.
- this pattern is expanded to the effect that when the security document is placed
- the pattern 5 displayed there has a precisely fitting continuation 15 of the pattern 4 or consists of such, provided the document is unadulterated.
- the applications shown in FIGS. 1 and 2 can be combined with one another.
- the security document 3 can be an identification document, in particular a passport, an identity card, a driver's license, etc., for example.
- the security document 3 according to the invention has a significantly improved protection against forgery, since knowledge of the algorithm used to calculate the depicted pattern 4 and the parameters used are required for imitation.
- the authenticity of the Security document 3 can be checked very easily and without further aids with the help of any display 2, in particular by means of a smartphone or tablet, by calling up the algorithm from a secure environment.
- Document or personal data e.g. name, date of birth
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102019123691.6A DE102019123691A1 (de) | 2019-09-04 | 2019-09-04 | Verfahren zur prüfung der echtheit eines sicherheitsdokuments |
PCT/EP2020/074286 WO2021043738A1 (fr) | 2019-09-04 | 2020-09-01 | Procédé de vérification de l'authenticité d'un document de sécurité |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3997677A1 true EP3997677A1 (fr) | 2022-05-18 |
Family
ID=72340348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20765253.8A Pending EP3997677A1 (fr) | 2019-09-04 | 2020-09-01 | Procédé de vérification de l'authenticité d'un document de sécurité |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3997677A1 (fr) |
DE (1) | DE102019123691A1 (fr) |
WO (1) | WO2021043738A1 (fr) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10024179A1 (de) * | 2000-05-17 | 2001-11-22 | Gero Decker | Verfahren zur Zugangsberechtigungskontrolle |
DE102006038270A1 (de) * | 2006-08-10 | 2008-02-14 | Bundesdruckerei Gmbh | Sicherheits- und/oder Wertdokument mit einem Muster aus strahlungsmodifizierten Komponenten |
DE102007052951B4 (de) | 2007-10-31 | 2021-11-18 | Bundesdruckerei Gmbh | Verifizierungsvorrichtung für ein Hologramm |
DE102011084820A1 (de) * | 2011-10-19 | 2013-04-25 | Bundesdruckerei Gmbh | Verfahren zur Verifikation eines Sicherheitsdokuments unter Verwendung einer Anzeigevorrichtung |
DE102011084819B4 (de) | 2011-10-19 | 2018-08-02 | Bundesdruckerei Gmbh | Verfahren zur Verifikation eines Sicherheitsdokuments mit einem Muster unter Verwendung einer Anzeigevorrichtung |
DE102011084818A1 (de) | 2011-10-19 | 2013-04-25 | Bundesdruckerei Gmbh | Verfahren zur Verifikation eines Sicherheitsdokuments mit einer Sichtbarriere unter Verwendung einer Anzeigevorrichtung |
WO2016190107A1 (fr) * | 2015-05-26 | 2016-12-01 | 凸版印刷株式会社 | Dispositif, procédé et programme d'aide à la détermination d'authenticité, et support lisible par ordinateur contenant un programme d'aide à la détermination d'authenticité |
-
2019
- 2019-09-04 DE DE102019123691.6A patent/DE102019123691A1/de active Pending
-
2020
- 2020-09-01 WO PCT/EP2020/074286 patent/WO2021043738A1/fr unknown
- 2020-09-01 EP EP20765253.8A patent/EP3997677A1/fr active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2021043738A1 (fr) | 2021-03-11 |
DE102019123691A1 (de) | 2021-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69923781T2 (de) | Druck und überprüfung von selbstprüfenden sicherheitsdokumenten | |
DE102004007379B3 (de) | Wertgegenstand mit Moiré-Muster | |
EP1592564B1 (fr) | Document de securite pourvu d'au moins un element de securite | |
EP3152063B1 (fr) | Élément de sécurité et document d'identification | |
DE102005048033B4 (de) | Sicherheitsdokument | |
CH677905A5 (fr) | ||
EP2086770B1 (fr) | Support de données portable | |
DE102019000739A1 (de) | Identifikationsdokument mit biometrischer Bildinformation | |
WO2014135372A1 (fr) | Document ayant une structure de type livre et procédé de vérification d'un tel document et d'authentification d'une personne | |
DE2308876B2 (de) | Identifikationskarte | |
EP0365018B1 (fr) | Carte d'identité et sa méthode d'assemblage | |
DE102009008779A1 (de) | Verfahren zum Überprüfen der Echtheit eines Druckproduktes | |
WO2009112240A2 (fr) | Procédé d'application d'une image comportant des informations supplémentaires intégrées sur un support de données | |
EP3997677A1 (fr) | Procédé de vérification de l'authenticité d'un document de sécurité | |
DE2452202A1 (de) | Urkunden mit echtheitspruefmoeglichkeit sowie vorrichtung zur echtheitspruefung | |
EP1651449B1 (fr) | Papier de surete servant a produire des documents de valeur | |
EP3041687B1 (fr) | Document de securite infalsifiable | |
DE10314631B4 (de) | Flächiges Bogenmaterial mit Individualinformation, Bogen und Verfahren zur Individualisierung eines blattförmigen Bogens. | |
EP0829826B1 (fr) | Dispositif pour fabriquer des documents de valeur | |
EP3481642B2 (fr) | Procédé de production d'un ensemble de couches pour un document de sécurité et document de sécurité correspondant | |
EP3174727B1 (fr) | Production de documents de sécurité ayant des vues de portrait | |
WO1999041708A1 (fr) | Moyen d'autorisation d'acces ou d'identification et procede permettant de le realiser | |
WO2000038932A1 (fr) | Document pouvant etre active et systeme pour documents pouvant etre actives | |
DE102022130970A1 (de) | Verfahren zur Herstellung und Verifizierung eines individualisierten Sicherheitsdokuments | |
EP4210961A1 (fr) | Document de plusieurs feuilles doté de caractéristiques de sécurité, ainsi que procédé et dispositif pour produire celui-ci |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20220210 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230526 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20240311 |