EP4131190A1 - Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs - Google Patents

Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs Download PDF

Info

Publication number
EP4131190A1
EP4131190A1 EP21190157.4A EP21190157A EP4131190A1 EP 4131190 A1 EP4131190 A1 EP 4131190A1 EP 21190157 A EP21190157 A EP 21190157A EP 4131190 A1 EP4131190 A1 EP 4131190A1
Authority
EP
European Patent Office
Prior art keywords
security feature
electrically conductive
conductive
calibration element
dependent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21190157.4A
Other languages
German (de)
English (en)
Inventor
Kaur Khangura Manpreet
Höft Daniel
Köpcke Johannes
Weigelt Karin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Prismade Labs GmbH
Original Assignee
Prismade Labs GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Prismade Labs GmbH filed Critical Prismade Labs GmbH
Priority to EP21190157.4A priority Critical patent/EP4131190A1/fr
Publication of EP4131190A1 publication Critical patent/EP4131190A1/fr
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/02Testing electrical properties of the materials thereof
    • G07D7/026Testing electrical properties of the materials thereof using capacitive sensors
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/17Apparatus characterised by positioning means or by means responsive to positioning

Definitions

  • the invention relates to a method for verifying an object, preferably a document, banknote, security, (bank) card and/or product packaging, comprising an electrically conductive security feature, on a device comprising a surface sensor and an object with a security feature and a method for its production and a system for carrying out the method and for verifying a document with a conductive electrical security feature on a capacitive surface sensor.
  • the invention relates to a safe and simple method for checking or checking the authenticity of electrically conductive security features, such as holograms, security strips, security threads and patches, in particular those that are not applied to an object in a registered position, i.e. the exact position of a section (e.g. pattern) of the hologram, the security strip, the security threads and/or the patch on the object is not known in advance.
  • electrically conductive security features such as holograms, security strips, security threads and patches
  • the security features mentioned are applied, among other things, as authenticity features to documents, banknotes, securities, identification cards and documents as well as to high-quality products and packaging and serve to protect the documents from forgery.
  • Electrically conductive security features in general and holograms in particular are difficult to forge or imitate compared to other print patterns or print structures and are therefore used to protect valuable documents.
  • electrically conductive security features for example holograms, are difficult to check with regard to authenticity and/or originality.
  • the security features are usually checked visually by the end user. In particular, color change effects, movement effects, 3D effects and other effects that become visible under certain conditions are checked. Lighting, the viewing angle, the movement of the document, etc. all influence the detectability of such effects. In summary, a great deal of knowledge about the respective security feature is required in order to make a statement about its authenticity. The end user usually does not have this knowledge and it is also difficult for the publisher of the respective document to communicate it.
  • EP 1760670 A1 describes, for example, a device for checking holograms using optical methods.
  • a method for verifying an object preferably a document, a (bank) card and/or product packaging with an electrically conductive security feature on a device with a capacitive area sensor (preferably a smartphone) is known.
  • a dynamic input is made on the object and the electrically conductive security feature using an input means to generate a characteristic time-dependent and path-dependent signal on the area sensor.
  • the detected time-dependent and path-dependent signal is then evaluated.
  • security features that were applied in the register can be considered, i.e. the electrically conductive structure of a security feature (e.g. hologram strip) has a fixed, known position within the object (apart from minimal production tolerances).
  • a security feature e.g. hologram strip
  • electrically conductive structures in the form of endless structures are applied to a substrate material or object.
  • An endless structure is preferably to be understood as meaning an electrically conductive structure which is repeated several times (in a pattern) over the length.
  • An example is the application of hologram stripes to banknotes. The substrate material is only cut into individual banknotes after the hologram strips have been applied. Such hologram strips or threads are generally not applied in a registered position, ie the exact position of a section (eg the pattern) on the object is not known in advance.
  • any point of the electrically conductive structure can be the starting point of the swipe gesture in the reading process.
  • the disadvantage of this is that the pattern must not exceed a certain section length along a preferred direction and must not be designed to be larger than half the object extension or banknote extension along the preferred direction (cf. also 2 ).
  • the pattern can also include a smaller number of safety-relevant features. This has the disadvantage that security features, which are obtained by applying an endless structure to the object, correspond to a lower security standard than is desirable due to the limited security-relevant features.
  • the object of the invention was therefore to eliminate the disadvantages of the prior art.
  • An important advantage of the method according to the invention is the need for extremely few method steps and system components, while still allowing an extremely robust and error-resistant verification of an object with an electrically conductive security feature is generated, which in particular does not have to be in a registered position. In particular, the exact position of a section on the object does not have to be known in advance.
  • the starting point for the present method was the fact that a security feature on an object includes a specific, preferably encrypted, information value that cannot be easily reworked or imitated by third parties. Particularly in the case of security features that are produced using an electrically conductive structure with an endless structure, it must be ensured that this information value, which is preferably encrypted, is always present on the object. As already explained, this was only possible with the known methods from the prior art, in that the encrypted information value was included in a pattern of the electrically conductive structure and the pattern (along a preferred direction) was at most so large in length that the pattern in any case occurred at least once in its entirety in the security feature when applied to the object.
  • the length of the pattern was not allowed to exceed half, in particular 43%, of the extent of the object in a preferred direction.
  • the small or limited length of the pattern led to a limitation of the information value, so that a reduced security standard was achieved.
  • Electrically conductive endless structures with a pattern that has exceeded half the extent of the object could not previously be realized for use as a security feature using conventional methods known from the prior art.
  • any point of the electrically conductive structure in the readout process could be the starting point of a dynamic input, for example a swipe gesture, and therefore a reference of the received signal to the information value could only be established once the input or swipe gesture once the pattern completely covered.
  • a dynamic input for example a swipe gesture
  • the core of the method according to the invention is to detect a calibration element, which serves as a reference, in the security feature applied to an object.
  • a position-related association between the security feature or its information value and the characteristic time-dependent and path-dependent signal can advantageously be established.
  • the design of the security feature it is advantageously no longer necessary to ensure that the pattern is coherently included in the security feature in its entirety. Instead, the pattern can also be divided or in sub-areas lined up next to one another, in which case at least the calibration element should exclusively be included on the security feature.
  • the present invention describes a method for checking or verifying the authenticity of electrically conductive security features, for example holograms, using capacitive area sensors.
  • capacitive area sensors are capacitive touch screens, which are now used in all common smartphones as a combined input and output sensor output interface are included.
  • Capacitive area sensors can also be specially designed and designed for specific applications.
  • Electrically conductive security features in particular holograms, usually comprise a metalized layer, i.e. they are usually electrically conductive. If electrically conductive structures or elements are brought into active contact with a capacitive area sensor, local capacitive interactions take place between the electrically conductive elements and the area sensor, i.e. the security feature or the hologram locally changes the capacitance in the area sensor. This local change in capacitance can be detected by the evaluation electronics of the area sensor and further processed using hardware and software.
  • the present invention enables an electronic and significantly more secure verification of a security feature that could previously only be evaluated optically, using devices that are available to practically almost every citizen.
  • This means that the method for checking the authenticity of the security features is not exclusive, but rather is advantageously available to a very broad target group.
  • the authenticity check of banknotes or documents of value, for example, can thus be carried out directly by the end user without the need for special tools.
  • the method according to the invention for checking authenticity is preferably characterized by an interactive interaction between the user, security feature and smartphone or testing device.
  • the improved checking of the security feature, as described here, results in the application being able to use these security features or the documents that use them as access keys to digital applications.
  • a banknote can be electronically checked for authenticity by the user himself on his smartphone. Once the check has been completed, the banknote on the smartphone enables access or additional information, such as notes on other security features on the banknote or exchange rates.
  • This recognition function can also be used to communicate the type, denomination or other information about the banknote in an accessible manner acoustically, optically or using other methods.
  • Identity documents or payment cards can also be equipped with an individual security feature that can be read electronically according to the invention.
  • this also enables the user to be recognized and thus access to a digital user account, either via a reader in a bank branch, for example, or directly on the user's smartphone.
  • this invention enables the provision of a novel and secure access key to digital services.
  • the inventors have succeeded in developing rules for the structural design that restrict the optical design of the electrically conductive security features as little as possible or are even integrated into the optical design and at the same time enable a reproducible evaluation by capacitive area sensors.
  • any desired designs for structuring can advantageously be provided very freely by demetallization—even retrospectively—so that particularly reliable coding can take place.
  • the demetallization can preferably include removing, for example, strip-shaped areas from a metallic security feature.
  • linear interruptions of any other configuration can also be introduced into a flat, preferably homogeneous, electrically conductive area by means of demetallization.
  • This method of evaluating or checking an electrically conductive security feature can also be referred to as determining a so-called “capacitive fingerprint”.
  • Capacitive fingerprint No method is known from the prior art to specifically detect calibration elements within electrically conductive structures and thus establish a position-related association between the security feature and the characteristic time-dependent and path-dependent signal. This method enables a more extensive information value to be implemented in a security feature which was produced using an endless structure and which is therefore not in a registered position, i.e. the exact position of a section on the object is not known in advance.
  • capacitive touch screens or touch screens do not output capacitance values.
  • This data is recorded and pre-processed by the touch controller, an integrated circuit, from the electrode grid of the surface sensor and output in the form of so-called touch events.
  • the information about touch events available to the application developer usually includes the information ID (number of the respective touch), type (touch start, touch move, touch end, touch cancel), x-coordinate, y -Coordinate and timestamp.
  • the developer has access to additional information, such as the diameter of the touch or the input.
  • the security feature preferably comprises at least one electrically conductive structure. Since the electrically conductive security feature is characterized in particular by the structuring of the electrically conductive structure, the terms electrically conductive security feature and electrically conductive structure can sometimes be used synonymously.
  • the security feature comprises an electrically conductive structure which is composed of different conductive materials.
  • the electrically conductive structure is a combination of a metallization and additional printed electrically conductive elements.
  • a combination of metallized electrically conductive elements with printed electrically conductive elements is advantageous. Electrically conductive inks based on metal particles, various carbon configurations, electrically conductive polymers or other electrically conductive materials are used to print electrically conductive structures.
  • this security feature is applied to an item or object to be protected.
  • an object to be protected or an object to be protected is in particular a document or card-like object to be protected.
  • the terms are preferably used synonymously.
  • the object can also be referred to as a verification object.
  • the method is characterized in that the object is a document, preferably a bank note, a card-like object, preferably a bank or credit card, and/or product packaging.
  • the security feature according to the invention is preferably applied to an electrically non-conductive substrate material, e.g. paper, cardboard, synthetic paper, banknote paper based on cotton, polymers or hybrid materials, laminates, plastics, foils, wood or other electrically non-conductive conductive substrates or support materials.
  • the object thus preferably comprises a non-conductive substrate, e.g. the paper of a banknote, and an electrically conductive security feature which is applied to the substrate.
  • Non-conductive areas are preferably formed by the substrate, while the conductive areas are defined by the security feature
  • the method for checking the authenticity of the security feature preferably comprises two method stages or sections.
  • the calibration element is recognized or determined, for example by means of a regression model.
  • the security feature or the characteristic time- and path-dependent signal is recognized (or checked, compared or decoded).
  • the second method section of the actual classification or detection of the security feature uses the position of the calibration element determined in the first method section.
  • the electrically conductive security feature comprises a metal and/or other conductive material, which is preferably structured.
  • Minimum and maximum structure sizes result preferably from the geometry of the electrode grid (of a surface sensor) and from the geometry of a finger/input means.
  • the invention preferably also includes an object and a method for checking or verifying a device (preferably a document).
  • the aim of checking the object can be to determine the authenticity or originality of the security feature.
  • the device is checked using a capacitive area sensor, for example using the capacitive touch screen (touch screen) of a smartphone or another terminal device.
  • the main advantage of using such a device is its widespread use and constant availability. This means that documents can be checked at any time and anywhere.
  • the capacitive touch screens are primarily designed for operation using finger gestures. Various gestures, such as tapping, swiping with one or more fingers, zooming and other variants, allow a diverse operation of graphical user interfaces. Technologically, there are capacitive ones Touch screens usually consist of a grid of transmitting and receiving electrodes, which are arranged orthogonally to one another, for example.
  • the term “capacitive area sensor” preferably designates input interfaces of electronic devices.
  • a special form of the "capacitive area sensor” is the touchscreen, which, in addition to the input interface, also serves as an output device or display.
  • Devices with a capacitive surface sensor are able to perceive external influences or influences, such as touches or contacts on the surface, and evaluate them using the associated logic.
  • Such surface sensors are used, for example, to make machines easier to operate.
  • Area sensors are usually provided in an electronic device, which can be smartphones, mobile phones, displays, tablet PCs, tablet notebooks, touchpad devices, graphics tablets, televisions, PDAs, MP3 players, trackpads and/or capacitive input devices, without being limited to it.
  • Such surface sensors are preferably set up to detect multiple touches at the same time, which means, for example, that elements displayed on a touchscreen can be rotated or scaled.
  • the sequence of terms “device containing a surface sensor” or “device with a surface sensor” preferably refers to electronic devices, such as those mentioned above, which are able to further evaluate the information provided by the capacitive surface sensor. In preferred embodiments, these are mobile terminals.
  • end device and “device” are used as synonyms for each other and can be replaced by the other term in each case.
  • Touch screens are preferably also referred to as touch screens, touch screens, area sensors or touch screens.
  • a surface sensor does not necessarily have to be used in connection with a display or a touchscreen, i.e. it does not necessarily have to have a display.
  • the area sensor is visibly or not integrated into devices, objects and/or devices.
  • area sensors comprise at least one active circuit, which is preferably referred to as a touch controller, which can be connected to a structure of electrodes.
  • the electrode grid of a surface sensor comprises groups of electrodes, the groups of electrodes differing from one another in terms of their function, for example.
  • This can be, for example, transmission and reception electrodes, which can be arranged in columns and rows in a particularly preferred arrangement, i.e. in particular form nodes or intersections at which at least one transmission and one reception electrode cross each other or overlap.
  • the crossing transmitting and receiving electrodes are preferably aligned with one another in the area of the node points in such a way that they essentially enclose an angle of 90° with one another.
  • An electrostatic field that reacts sensitively to changes or capacitive interactions is preferably formed between the transmitting and receiving electrodes of the area sensor. These changes can be caused, for example, by touching the surface of the area sensor with a finger, a conductive object and/or an electrically conductive structure. Capacitive interaction, for example a discharge of charges to the finger or a conductive object, leads in particular to local potential changes within the electrostatic field, which is preferably caused by the fact that, for example, by touching a contact surface of an electrically conductive structure, the electric field between the transmitting and receiving electrodes is reduced locally. Such a change in the potential ratios is preferably detected and further processed by the electronics of the touch controller.
  • the touch controller controls the electrodes in such a way that a signal is transmitted between one or more transmitting electrodes and one or more receiving electrodes, which signal is preferably an electrical signal, for example a voltage, an amperage or a potential (difference) can act.
  • a signal is transmitted between one or more transmitting electrodes and one or more receiving electrodes, which signal is preferably an electrical signal, for example a voltage, an amperage or a potential (difference) can act.
  • These electrical signals in a capacitive surface sensor are preferably evaluated by the touch controller and processed for the device's operating system.
  • the information transmitted from the touch controller to the operating system of the device describes so-called individual “touches” or “touch events”, which can be imagined as individually recognized touches or can be described as individual inputs.
  • These touches are preferably characterized by the parameters "x coordinate of the touch", “y coordinate of the touch”, “time stamp of the touch” and “type of touch”.
  • the "x and y coordinate” parameters describe the position of the input on the touchscreen.
  • a time stamp is preferably assigned to each pair of coordinates, which describes when the input took place at the corresponding point.
  • the "Type of touch event” parameter describes the detected status of the input on the touchscreen.
  • a person skilled in the art is familiar with the types Touch Start, Touch Move, Touch End and Touch Cancel. With the help of the parameters Touch Start, at least one Touch Move and Touch End as well as the associated coordinates and time stamps, a touch input can be described on the capacitive area sensor.
  • PCT Projected capacitance touch technology
  • the electric field between the electrodes becomes local when touched with a finger or an electrically conductive object decreased, i.e. "charges are subtracted".
  • the electric field is changed and a characteristic signal is generated or detected by the touch controller.
  • the term “signal generated or detected by the dynamic input on the area sensor” is preferably understood to mean the signal which is detected by the area sensor due to the capacitive interaction between the electrically conductive structure, the input means and the area sensor while the input sequence is being carried out. It is therefore preferably a dynamic signal, for example in the form of sequential coordinate positions of touch events, which are processed by the area sensor.
  • the detected or generated signal is therefore preferably also referred to as a time-dependent signal.
  • the detected or generated signal is preferably also referred to as a path-dependent signal.
  • the “path” preferably relates to the input gesture or the path covered with the input means during the input sequence and the resulting sequential coordinate positions of touch events.
  • the input means are preferably fingers or special input pens, for example touch pens.
  • the input means are preferably able to change a capacitive coupling between row and column electrodes within the area sensor.
  • the input means are preferably designed in such a way that they can trigger a touch event on a capacitive touch screen. Since the touchscreens are optimized for input using human fingers, any input means that imitate the shape, size and/or capacitive interactions between a finger and a surface sensor can be preferred.
  • the diameter of the touch area of a finger on the capacitive touch screen is about 7-8 mm. Most commercially available touchscreens are optimized for the exact position determination of touch inputs of this magnitude. If the touch screen is now to be used to detect electrically conductive structures, certain boundary conditions regarding minimum and maximum size must be observed in the design (size, shape, geometry, outline, internal structuring, etc.) of the electrically conductive structure. As already described above, this results in narrow limits or strict design rules for electrically conductive structures if they are to be recognized reliably and reproducibly by capacitive touch screens. In other words, the freedom of design for structures of this type is severely restricted and largely defined by the readout technology.
  • the security feature is preferably applied over the entire length of the object along a preferred direction. It has been shown that the edge areas of the object do not make any technical contribution to the verification of the object, so that the effectively usable length of the object is smaller than the total extent of the object.
  • the underlying technology is preferably based on wiping the electrically conductive structure or the security feature with the aid of an input means, for example a finger, while the object is lying on the capacitive touch screen. Since it is usually not possible for a user to swipe exactly from beginning to end along the operating track and the input device itself has a certain diameter (e.g. the fingertip), the usable length of the object is correspondingly smaller than the total length of the object in the operating direction .
  • the edge area of an object is preferably unusable, with the "unusable edge area" preferably having an extension along the preferred direction of preferably 3-10 mm, in particular 5 mm.
  • the pattern within a security feature must be present in its entirety in this area in the course of methods from the prior art.
  • the usable length of the object L eff in the operating direction is 60 mm.
  • the maximum length of the pattern L A of 30 mm corresponds to only about 43% of the total length of the object (cf. 2 ).
  • the method according to the invention ignores this limitation and, above all, also enables a length of patterns that can cover far more than half of the entire extent along a preferred direction of the object.
  • at least one calibration element within the electrically conductive security feature is preferably identified in a first step and, based on this, in a second step, the electrically conductive security feature is evaluated, which uses the position data of the calibration element.
  • electrically conductive structures are significantly smaller than the average diameter of the contact point of a finger on the touch screen (7-8 mm), such electrically conductive individual elements are usually not recognized or ignored by the touch controller of the capacitive touch screen. Depending on the device, elements with a diameter of ⁇ 3-5 mm are primarily affected.
  • the recognized positions are not reproducible or selective.
  • such inputs are ignored, for example, by the touch controller as part of the so-called “palm rejection” (recognition of undesired inputs by the heel of the hand) or the so-called “touch cancel event” occurs when overly large electrically conductive elements come into contact with capacitive touch screens. ie the corresponding information is not evaluated or ignored / filtered out by the touch controller.
  • the distance between the elements is also important for reliable and reproducible detection. If two individual elements are too close together, the touch controller does not interpret the input as two individual elements, but as one larger element. This effect can be described as a merging of touch points and, depending on the end device or touch controller, occurs preferably at distances ⁇ 6-10 mm (center to center).
  • a calibration element is preferably an electrically conductive or electrically non-conductive area within a security feature and/or an electrically conductive structure.
  • the calibration element preferably differs from all other electrically conductive or non-conductive areas included in the security feature.
  • a characteristic time-dependent and path-dependent signal is generated, this signal including a signal sequence that can be unambiguously assigned to the calibration element.
  • the signal sequence is preferably obtained when the input means sweeps over the position of the calibration element within the security feature. Accordingly, the signal sequence can be reproduced each time the calibration element is swept over.
  • the calibration element serves as a reference. Starting from the calibration element as a reference, a position-related association between the security feature and the characteristic time-dependent and path-dependent signal can advantageously be established. Accordingly, the calibration element can also be regarded as a reference element or reference element.
  • the method is characterized in that the characteristic time-dependent and displacement-dependent signal includes a calibration-element-specific signal sequence that is assigned to the calibration element.
  • a signal sequence is preferably a section and/or excerpt and/or partial area and/or partial sequence of a signal.
  • the characteristic time-dependent and path-dependent signal obtained within the meaning of the invention comprises a section or a signal sequence which can be unambiguously assigned to the calibration element according to the invention. This signal is reproducible and each time an input means sweeps over the calibration element while the security feature is placed on a surface sensor, the signal sequence dependent on the calibration element is generated.
  • the signal sequence specific to the calibration element can therefore be detected in the overall signal.
  • the signal assigned to the calibration element is correspondingly specific to the calibration element, i.e. this signal sequence differs from the rest of the signal and can be unambiguously attributed to the calibration element using suitable means.
  • the calibration element preferably generates a unique signal.
  • the method is characterized in that the calibration element-specific signal sequence represents a reference in the characteristic time-dependent and path-dependent signal and the calibration element represents a reference in the electrically conductive security feature, so that a position-related association between the Security feature and the characteristic time-dependent and path-dependent signal can be produced.
  • the calibration element-specific signal sequence represents a reference in the characteristic time-dependent and path-dependent signal
  • the calibration element represents a reference in the electrically conductive security feature
  • an algorithm can now determine how a pattern is positioned in the characteristic signal and verify the security feature and/or read out encoded information in the security feature or in the pattern.
  • the method is characterized in that the electrically conductive security feature comprises a section of a structure with conductive and non-conductive areas with a pattern that is repeated in sections along at least one preferred direction.
  • Such a structuring with conductive and non-conductive areas with a pattern that is repeated in sections is preferably understood to mean a so-called endless structure, with a partial area or a section or section of this structuring being present on the object and serving as a security feature. It is not apparent which detail or section of the structuring or in particular how the pattern (eg divided or connected) is applied to the object.
  • the section essentially takes on the same length as the entire extent of the object in a preferred direction.
  • the use of an endless structure is particularly advantageous when producing an object with a security feature, since the endless structure is preferably applied to a substrate material and only then is the substrate material divided, preferably cut, into different objects.
  • the endless structure is preferably rolled up on a roll and is applied to the substrate material starting from the roll.
  • the security feature there is no complex, precise positioning of the security feature, so that it is a security feature or an electrically conductive structure in an unregistered position on the respective object. It has been shown that the use of the calibration element according to the invention when producing a security feature using endless structures allows comprehensive information values to be embedded in such security features, since the positioning of different sections can be detected by the calibration element.
  • the pattern no longer has to be present continuously in its entirety on the object (along the effectively usable length). Rather, it can also be divided and lined up along the effectively usable length on the object, so that significantly larger patterns can also be used in the course of the conventional production of non-registered security features. Even if these do not result in a coherent pattern over the effective usable length of the object, but instead only include part of an end followed by the beginning of a new pattern, the resulting security features on the object have a more comprehensive information density. This means that security features with increased security can be applied to the object, although it is still manufactured with an electrically conductive endless structure.
  • the section length of the pattern preferably has a length which preferably corresponds to 50%-90% of the extension of the object in a preferred direction, more preferably 65%-80% of the extension of the object in a preferred direction and in particular 74% of the extension of the object in a preferred direction. It has been shown that the selected section lengths of the preferred pattern with a calibration element are particularly well suited to integrating a lot of information and still using the simplified process of producing a security feature via an endless structure.
  • the preferred direction can preferably be aligned along the longitudinal extension or a longitudinal axis of the object. More preferably, the preferred direction may be oriented along the transverse axis or transverse extent of an object.
  • a section with a pattern is preferably followed by a new section with the same pattern, in other words the patterns are lined up next to one another.
  • the particular advantage in the preferred embodiment is that the pattern no longer has to be completely included along a section length in the area of the effectively usable length, but it is sufficient if a first partial area (e.g. the end) of the pattern is in a first section followed by a further section with a second partial area (e.g. the beginning) of the pattern arranged in the effectively usable length of the object (cf. 1 ).
  • the partial areas of the pattern can preferably be complementary to one another, so that they would result in an entire pattern in a mental assembly and “resorting”.
  • the method is a two-stage evaluation method, characterized in that the evaluation of the characteristic time-dependent and path-dependent signal includes a detection of at least one calibration element within the electrically conductive security feature in a first method step and, in a second method step, a (further ) Evaluation of the characteristic time-dependent and path-dependent signal, which is based on the detection of the calibration element within the electrically conductive security feature.
  • the detection of the calibration element preferably includes a detection of a signal sequence specific to the calibration element as a reference in the characteristic time-dependent and path-dependent signal, which allows a position-related association between the security feature and the characteristic time-dependent and path-dependent signal.
  • the (further) evaluation of the characteristic time-dependent and path-dependent signal preferably includes an evaluation of the signal taking into account this position-related association of the security feature and the path- and time-dependent signal made possible by the calibration element.
  • a start and end value for the evaluation of an expected pattern within the time-dependent and distance-dependent signal can first be established. It is also possible for sections of the time- and path-dependent signal to be reassembled or sorted so that a pattern can be evaluated as a coherent signal sequence.
  • sections of the time- and path-dependent signal to be reassembled or sorted so that a pattern can be evaluated as a coherent signal sequence.
  • an end area of the pattern can be present on an upper section of the security feature and, separately from this, an initial area of the pattern can be present on a lower section of the security feature.
  • a position-related assignment is possible in a first step, which allows corresponding sections of the time-dependent and path-dependent signal to be combined or re-sorted.
  • the calibration element can be used to obtain a signal sequence which corresponds to a time- and path-dependent signal of a coherent pattern, i.e. a pattern which is coherently present with the start and end area completely within a security feature on the object.
  • the evaluation of the pattern as a coherent signal sequence with a well-defined final and initial value is preferably carried out in a second method section, for example by means of a classification model.
  • the pattern contained in the security feature preferably corresponds to a capacitive fingerprint, which is used to verify the object.
  • a position-dependent assignment of the capacitive fingerprint is carried out using the calibration element, or partial areas are combined or rearranged to form a coherent capacitive fingerprint, which is then decoded or classified.
  • the two-stage process of evaluating the characteristic time- and displacement-dependent signal that is, firstly the detection of a calibration element and, based on this, the recognition of a pattern—can be carried out with differently designed methods, preferably computer-implemented algorithms.
  • This can preferably improve both the efficiency and the accuracy of the verification of the Security feature can be increased as such.
  • the recognition of the calibration element plays an important role above all when the pattern is not contained in the security feature in a coherent manner but rather divided up.
  • the calibration element serves as a reference element that reassembles the separated parts of the pattern (mentally or virtually) and can thus read out the information contained in the pattern. It can preferably also be provided that the pattern is intentionally never contained coherently in a security feature on the object in order to store encrypted information more securely and to make it more difficult for third parties who have no knowledge of the calibration element to recognize and evaluate the pattern .
  • the evaluation of the pattern can in particular include a detection of edges as transitions between conductive and non-conductive areas or a detection of the arrangement and/or shape of electrically conductive individual elements.
  • edge is preferably understood to mean a transition between a conductive area and a non-conductive area within the security feature.
  • conductive and non-conductive areas can alternate in strips.
  • non-conductive interruptions with any linear shape, for example straight, circular, elliptical, rectangular, triangular, star-shaped, etc., can be present in a flat, largely homogeneous, electrically conductive area.
  • the transitions between the flat, electrically conductive area and the non-conductive interruptions represent edges within the meaning of the invention.
  • edges in the sense of the invention are therefore preferred by a sudden increase (or decrease) of conductive material at a transition from a non-conductive area to a conductive area (or vice versa).
  • Erratic preferably means an increase or decrease over a distance that is extremely small compared to the dimensions of the conductive and non-conductive areas.
  • an edge is preferably characterized by a substantially vertical rise or fall in conductive material. According to the invention, it was recognized that any inhomogeneities that occur can be detected particularly reliably as edges by a preferably linear sweeping movement.
  • the method is characterized in that the geometry of the electrically conductive security feature, preferably its shape, outline, contour and internal structuring, in particular with regard to the presence of edges, determines the course of the time-dependent signal in the capacitive area sensor.
  • the term “internal structuring” or also “internal structure” preferably characterizes the distribution of conductive and non-conductive areas within the (overall) outline of a security feature or a pattern contained therein.
  • the internal structure of the security feature can preferably be defined by the individual elements arranged within the security feature.
  • the arrangement of the individual elements, their geometric configuration and the edges generated thereby give the security feature—or a pattern contained therein—an individual internal structure.
  • a security feature that is designed with a smaller number of wider, strip-shaped individual elements has, for example, a different internal structure than a security feature that is designed with a higher number of thinner, strip-shaped individual elements, with the entire external geometry of the two security features can be identical.
  • An individual inner structuring of the security features can particularly preferably be carried out by demetallization, i.e. a preferably subsequent removal of conductive areas from a flat layer.
  • demetallization i.e. a preferably subsequent removal of conductive areas from a flat layer.
  • different numbers and differently dimensioned strips can be removed from security features with an identical external shape in order to obtain different internal structures.
  • any other internal structuring can be provided and reliably differentiated using the method.
  • a large number of different line-shaped interruptions can be introduced into a homogeneous area.
  • Security features with highly individualized "internal structures" can be obtained both through the positioning of the interruptions, e.g. a positioning of stars, circles, spirals, etc., and through their designs.
  • the method is characterized in that the electrically conductive security feature comprises at least two individual elements are galvanically isolated from one another, with the starting and/or end areas of the individual elements or interruptions in the conductive security feature being detectable as edges when a dynamic input is made on the electrically conductive security feature, with the calibration element being configured from one or more individual elements of a defined size and/or length , wherein the calibration element differs from the other individual elements in terms of size and/or length.
  • the method according to the invention preferably comprises two method sections or stages.
  • the calibration element is identified, for example using a signal sequence specific to the calibration element, which preferably allows a position-related assignment.
  • the information can preferably be used to localize (start and end value) and/or sort or rearrange a signal sequence which corresponds to the coherent pattern.
  • the calibration element consists of one or more individual elements of a defined size and/or length, which allow a position-related assignment, with the remaining individual elements being assigned to a pattern which can be evaluated in the second method section ( decoded, compared with reference signals, etc.).
  • start and end areas of individual elements are edge areas of these individual elements, with a first edge area of an individual element being detected during dynamic input along a preferred direction or direction of movement at a first (start) point in time and a second edge area at a second (end -) Time is detected.
  • the method is characterized in that the dynamic input comprises a substantially rectilinear stroking movement of the input means over the entire security feature, the stroking movement being parallel or orthogonal to the largest dimension of the security feature.
  • the stroking movement can preferably take place repeatedly along one stroking direction and/or along oppositely changing stroking directions.
  • An essentially rectilinear stroking movement over the security feature is preferably a movement that has a continuous contact with the security feature along a preferred direction or stroking direction without a change in direction or change in gradient.
  • This movement can be designed to be repetitive, so that after a movement has been completed, the input means touching the security feature—by e.g. lifting the input means—is canceled.
  • the swipe can then be repeated along the same swipe direction, starting from the starting point of the previous swipe.
  • the starting point or end point does not have to be determined exactly. Rather, it is sufficient to choose this preferably outside the outer contour of the security feature, so that the same is completely painted over.
  • the straight-line swipe motion may be backward repetitive.
  • a subsequent swipe from the endpoint of a previous swipe is mirrored backwards compared to the previous swipe, with the input means preferably not resolving the contact between the previous and subsequent swipe.
  • sequences of stroking movements with oppositely changing stroking directions can also be carried out repeatedly. In everyday language, this can be understood, for example, as “stroking back and forth” or "rubbing".
  • the dimensioning of a security feature preferably corresponds to the distance between two essentially diametrical edge points which are associated with the security feature, with the greatest possible dimensioning preferably being the greatest possible distance between two such edge points on the security feature.
  • a person skilled in the art is also able to adapt the described embodiments of the method in relation to the terms “parallel” and “orthogonal” to further orientations or configurations.
  • the person skilled in the art understands how to adapt the method accordingly if the stroking movement does not take place parallel or orthogonally to the largest dimension of the security feature, so that all the advantages according to the invention are nevertheless effective.
  • the person skilled in the art therefore knows to what extent he can deviate from the features “parallel”, “orthogonal” and still be able to implement the advantages according to the invention.
  • the method is characterized in that a large number of conductive and non-conductive areas alternate along at least one preferred direction of the security feature, so that when a dynamic input is made along the preferred direction, the transition between conductive and non-conductive areas is edges can be detected.
  • the conductive areas can also be understood as individual elements which are galvanically isolated from one another by non-conductive areas.
  • the method according to the invention based on edge detection also allows a recognition or distinction of complex-shaped individual elements, the method preferably reliably recognizing the arrangement and/or shape of the individual elements through the successive appearance of edges along a preferred direction.
  • the time-dependent or path-dependent signal which is generated on a surface sensor by a relative movement between an input means and the security feature, is changed by the structuring of the security feature, in particular its inhomogeneity or edges, and in particular differs from an input of an input means on a surface sensor, which takes place directly, ie preferably without the use of the document or card-like object or without the presence of the electrically conductive security feature.
  • a distinction is made between two situations in particular: direct dynamic input on an area sensor with an input device and dynamic input in which a document or card-like object with an electrically conductive security feature is interposed between the input device and area sensor.
  • the structure of the security feature changes the direct dynamic input, as a result of which a time-dependent signal is generated on the surface sensor.
  • conductive and non-conductive areas of the electrically conductive security feature are designed in terms of size, distance and shape such that the time-dependent signal resulting from the relative movement on the capacitive surface sensor is compared to the reference input with the input means , which takes place without using the security feature, is changed. This results in a modulation, definition, change, distortion or shift of the signal.
  • the resulting time-dependent or path-dependent signal on the capacitive surface sensor is at least partially changed in terms of position, speed, direction, shape, interruption of the signal, frequency and/or signal strength compared to a reference signal, which is generated by a reference input with the Input means, which takes place without using an electrically conductive security feature, is defined. It is preferred within the meaning of the invention that the resultant time-dependent signal is involved, which can preferably be generated by the proposed method.
  • this preferably means in the context of the invention that the time-dependent signal generated due to the modulation by the electrically conductive security feature, compared to the straight, line-shaped input of the input means can have a different position, direction, shape, speed and/or signal strength, i.e. the area sensor recognizes it as spatially displaced, distorted and/or shifted, a different form than the straight, line-shaped movement (essentially linear swipe motion), is pointing in a different direction, or has unexpected signal strength.
  • the area sensor detects this movement essentially at the positions on the screen of the area sensor that are actually touched by the finger, i.e. the input device .
  • a straight, line-shaped movement of the finger is preferably detected by the area sensor essentially as a straight, line-shaped, uniform movement.
  • Such an input without the presence of a card-like object is preferably referred to as a reference input within the meaning of the invention.
  • an electrically conductive security feature is arranged between the input means and the surface sensor.
  • This security feature preferably comprises electrically conductive individual elements and a calibration element.
  • a user moves a finger over an object with a security feature, specifically over the security feature.
  • the object preferably rests on the area sensor, so that through the movement of the user's finger, the individual elements of the electrically conductive structure that the user touches become "visible" for the area sensor by activating them.
  • the inventors have recognized that by using an object that includes an electrically conductive security feature, an input on an area sensor can be changed compared to a reference input. In the context of the invention, this change is preferably referred to as modulation.
  • the individual elements of the electrically conductive structure are activated by touching the input means, as a result of which the area sensor can detect them, the resulting time-dependent signal being spatially distorted by the arrangement of the individual elements on the object, for example compared to a reference input . If, for example, an input means occurs along an imaginary straight line on the object without an electrically conductive security feature, then the area sensor would detect a straight line movement of the input means as a reference input. However, if there is an object arranged between the input means and the surface sensor, on which there are individual elements of the security feature, there are characteristic deviations in the detected speed of the movement.
  • the input means When moving over the security feature, the input means gradually comes into effective contact with the electrically conductive elements, i.e. the input means gradually covers the electrically conductive elements. If the input means reaches an electrically conductive individual element, the position of the resulting signal on the area sensor is preferably shifted at this point in time in the direction of the center point of the individual element which is in operative contact with the input means at this point in time.
  • the center is preferably defined as the geometric center of gravity (centre of area) of the individual element.
  • the input means is moved along an imaginary straight line in the y-direction at a uniform speed on the object while the object is located on the area sensor and there is essentially no relative movement between the object and the area sensor.
  • the resulting time-dependent or path-dependent signal is characterized by touches, which essentially differ in terms of the time stamp and the respective y-coordinate, with the speed of the signal essentially corresponding to the movement speed of the input device (and is almost constant).
  • the position of the resulting signal is preferably suddenly shifted in the direction of the individual element, or more precisely in the direction of the center of the individual element, at this point in time, i.e. the individual touch is significantly stronger compared to the previous touches in terms of shifted along the y-coordinate.
  • a speed profile can be calculated using the parameters of the individual touches of the resulting time-dependent signal.
  • the velocity profile shows a sudden sharp increase, ie the velocity of the resulting signal is high in this area.
  • the speed of the resulting signal gradually decreases again until the input means has reached the center point or the geometric centroid of the individual element. With further movement, the speed slowly increases again and then suddenly decreases or decreases with a clear negative increase as soon as the input means leaves the electrically conductive element or is no longer in contact with the electrically conductive element. It is preferred within the meaning of the invention that fluctuations in the speed profile can be recognized in particular when the input means comes into contact with electrically conductive individual elements or the contact between the input means and electrically conductive individual elements is ended.
  • the signal changes suddenly at such points.
  • the edges of electrically conductive elements can be clearly detected.
  • the speed profile is asymmetrical, i.e. a jump with a large increase in speed is followed by a slower decrease in speed.
  • This increase in the velocity profile can be analyzed mathematically by determining and evaluating the slope of the curve.
  • This asymmetry leads to a particularly reliable edge detection.
  • the speed profile of the time-dependent signal also changes suddenly when leaving an electrically conductive individual element. Due to the asymmetry of the signal, it is possible during the decoding process to recognize whether the front edge or rear edge of an electrically conductive individual element has been reached, i.e.
  • the method is characterized in that edges are detected taking into account a time-dependent or path-dependent asymmetrical progression of the speed profile at the edges.
  • edges are detected taking into account a time-dependent or path-dependent asymmetrical progression of the speed profile at the edges.
  • the detection of edges by evaluating an asymmetrical progression of the speed profile leads to a particularly reliable and precise detection of a security feature.
  • the security feature can be configured with significantly greater freedom in terms of configuration and design compared to the prior art.
  • a design can be selected which does not differ from the rest of the signal in a rough analysis.
  • the signal sequence specific to the calibration element is reliably detected even if there are only small deviations in comparison to the overall signal.
  • the edge detection can also be used to evaluate the security feature with regard to a pattern (based on (i.e. after) the detection of the calibration element and the freedom described in the design of the security feature can be transferred to the pattern as such.
  • the method is characterized in that when the edges are detected by the speed profile, a temporally asymmetrical course of the speed profile at the edges is taken into account, with a slow reduction in speed preferably at a leading edge following a jump with a steep increase in speed follows a shallow descent. On a back edge, a steep drop follows a gentle climb.
  • the method is characterized in that when the edges are detected by the speed profile, a temporally asymmetrical course of the speed profile at the edges is taken into account, with a jump with a steep drop preferably on a rear edge following a slow increase in speed follows.
  • steep rise and shallow fall are preferably relative to one another and refer to the amount of change in velocity over a distance.
  • a jump in speed is preferably followed by a high point, which is followed by a drop in speed.
  • the increase in speed or increase in the speed profile in the area before the high point is significantly greater in terms of amount than the drop or the negative increase in speed after the high point.
  • the slope before the high point can be greater by a factor of 2, 3, 4 or more.
  • the asymmetry can be defined pictorially with respect to a vertical axis passing through the high point, which divides the progression of the velocity profile into an area occurring before the high point and an area occurring after the high point.
  • the area before the high point is not symmetrical with the area that follows.
  • a slow increase in speed is preferably followed by a high point, which is followed by a steep drop in speed.
  • the increase in speed or increase in the speed profile in the area before the high point is significantly lower in terms of amount than the drop or the negative increase in the speed after the high point.
  • the slope before the high point can be lower by a factor of 2, 3, 4 or more.
  • the asymmetry can be defined pictorially with respect to a vertical axis passing through the high point, which divides the progression of the velocity profile into an area occurring before the high point and an area occurring after the high point.
  • the area before the high point is not symmetrical with the area that follows.
  • edges are highly characteristic of the occurrence of edges and can be reliably distinguished from other jumps or fluctuations in the velocity profile.
  • the occurrence of the asymmetries can also be correlated with the distribution of the conductive and non-conductive areas before and after the edges.
  • a front edge preferably at the beginning of a conductive area, or a rear edge, preferably at one end of a conductive area, with the input means was painted over.
  • beginning and end of a conductive area and front or rear edge are preferably to be understood here in relation to the direction of movement of the input means.
  • the edges are each identified by high points. The evaluation of the increase in the speed profile before and after the high point allows distinguishing between leading edges and back edges.
  • a repetitive back and forth movement (stroking movement with oppositely changing stroking direction) of the input means over the electrically conductive security feature is preferred.
  • the combined evaluation of all "jumps" when reaching and/or leaving the electrically conductive security feature or its individual elements allow an even more precise edge determination of the electrically conductive security feature.
  • the inner structure or the “capacitive fingerprint” of the security feature can thus be determined even more precisely.
  • a graphical representation of the point-to-point speed or touch-to-touch speed depending on the coordinate along which the input device is moved e.g. depending on the y-coordinate of the touch screen.
  • Such a representation can be referred to as the speed profile of the signal and can be processed and evaluated by a software algorithm as part of the decoding process.
  • the speed profile of the signal can be evaluated either as a function of time or as a function of distance.
  • the characteristic signal that is generated on the area sensor can be referred to as a time-dependent signal or as a path-dependent signal.
  • deviations occur in the speed, that is to say, for example, a rapid movement of the input means is modulated into a slow, time-dependent signal. It can also be preferred that the time-dependent signal has a specific velocity profile. If, for example, an input means takes place along an imaginary straight line on the map-like object without electrically conductive structures, then the area sensor would detect a time-dependent signal as a reference input, which signal represents a straight line and has an almost constant speed.
  • the area sensor becomes a resultant when an input means is moved on the card-like object Detect signal which has a specific velocity profile.
  • the input means gradually comes into capacitive or galvanic active contact with the electrically conductive elements on the card-like object when moving over the card-like object, ie the input means gradually covers the electrically conductive elements.
  • the position of the resulting signal is preferably shifted in the direction of the center point of the individual element at this point in time.
  • the speed data it can be useful, for example, to determine the mean value of the point-to-point or touch-to-touch speed and to evaluate the overall signal with regard to the local deviation from the mean speed. It can also be preferred not to use all the determined speed values as absolute numbers for the further signal processing, but rather to convert them into relative data or to standardize the data. This step enables the signal to be evaluated which is largely independent of the movement speed of the input means.
  • the security feature or hologram is either located on the surface of the object or, particularly in the case of a multi-layer card, is located on an inner layer of a multi-layer body (object).
  • the electrically conductive security feature is preferably a so-called security thread, this is present, for example, partially on the surface and partially embedded in the paper. Such threads are incorporated into the paper during the production of security paper, for example for the production of banknotes.
  • the invention described here makes it possible to electronically verify a conductive security feature, even if it is partially or completely incorporated within a multi-layer object.
  • the generation of a signal in the capacitive area sensor is based on capacitive interactions between the area sensor, the electrically conductive security feature and possibly the input means. A direct galvanic contact is not required either to the input device or to the area sensor.
  • a developer of software for a mobile device with a touchscreen
  • additional information such as the diameter of the touches.
  • the signal is modulated or changed by the combined influence of the input device (finger) and the electrically conductive structure.
  • a quantity of touch data or touch events is thus output by the touch controller, which are characteristic of the electrically conductive security feature used and the input gesture by the user.
  • This data is processed by software on the end device or sent to a server via a network connection and evaluated there.
  • All events are marked by a time stamp and can therefore also be evaluated in a time-dependent manner.
  • the term is introduced here for explanation.
  • the generation of the reference signal is preferably not part of the invention.
  • the characteristic signal which is generated through the combination of the input with an input means and the influence of an electrically conductive security feature, differs from the (virtual) reference signal.
  • the time-dependent signal undergoes a change, e.g. in the form of a displacement, deflection, Acceleration, deceleration, interruption, deletion, division or similar effects.
  • the signal also has characteristic features when the finger or the input means leaves the electrically conductive structure. If the electrically conductive structure is interrupted at one point, for example by a specific Demetallization, the characteristic signal at this point is usually characterized by a sudden change in the direction of movement and/or the speed of movement.
  • the recorded data is assigned to classes by the machine learning model. With a sufficient amount of training data, any input or amount of touch data can be classified with the help of the model, i.e. checked for originality/authenticity.
  • the method is characterized in that the characteristic signal is evaluated with regard to a speed profile and edges are detected using the speed profile. Due to the asymmetry of the speed profile, it is therefore advantageously possible, among other things, to recognize whether the front edge or rear edge of an electrically conductive individual element has been reached, ie whether the input means has reached or left an electrically conductive individual element at that moment. If two galvanically isolated electrically conductive elements are close together and are in contact with the input means one after the other, the effects or effects of the rear edge of the first element and the effects caused by the front edge of the second element are superimposed. Complex structures of the electrically conductive security feature can thus be recognized. In the further course of the document, such an evaluation is illustrated using exemplary embodiments.
  • the object or security feature according to the invention which is suitable for capacitive reading according to the method described above, comprising an electrically conductive structure, is characterized by the features described below.
  • the electrically conductive structure consists of several individual elements. These individual elements can be divided into two different types according to their function: active and inactive elements. Active elements are elements that are designed in such a way that they can be detected using the method described, i.e. are suitable for generating a characteristic signal on a capacitive surface sensor. Such elements have a certain minimum size. Inactive elements (non-active elements, passive elements) cannot be detected, i.e. they are so small that they do not generate a characteristic signal on a capacitive surface sensor or the signal that can be generated does not differ sufficiently from a signal that can only be generated by the input using input means can be generated without a combination with an electrically conductive element.
  • the (individual) elements are essentially limited in that, above a certain size, they lead to non-reproducible signals, interference signals or so-called touch-cancel effects.
  • the appropriate sizes and geometries of the individual elements are determined by detectability by a capacitive touch screen.
  • the aim of the design process is, on the one hand, to provide individual elements that can generate reproducible signals and, on the other hand, not to cause any unwanted signals or interference signals on the capacitive touch screen.
  • the dimensions of the electrically conductive structure or the electrically conductive security feature are preferably defined as follows: the width of the electrically conductive structure extends transversely or essentially orthogonally to the intended direction of movement of the input means; the length extends in the direction of movement or parallel to the intended direction of movement of the input means.
  • the active conductive elements can preferably be detected in the form of a signal change on the surface sensor, with the signal change preferably corresponding to a change in the generated time-dependent signal compared to making the dynamic input on the object without the presence of the active conductive element.
  • the inactive conductive elements cannot be distinguished by the area sensor from a dynamic input that occurs on the object without the presence of the inactive conductive element.
  • the method is characterized in that interruptions are non-conductive areas of the electrical security feature which separate the conductive elements—actively or inactively—from one another.
  • the method is characterized in that the electrically conductive security feature comprises at least two individual elements or active areas, the distance between which is at least 10 ⁇ m, preferably at least 50 ⁇ m.
  • the preferred minimum distances between two individual elements ensure in a particularly reliable manner that the characteristic signal to be detected advantageously reflects a jump in the speed profile at the transitions (edges) between the two areas, so that security features can be distinguished on the basis of the signal.
  • the distance between two individual elements can preferably be formed by a linear interruption, for example by means of demetallization.
  • the linear interruption should therefore also preferably have a line width of at least 10 ⁇ m, preferably at least 50 ⁇ m.
  • the linear interruption and therefore the distance between the individual elements is less than 3 mm, preferably less than 2 mm, less than 1 mm.
  • the interruptions of between 10 ⁇ m and 3 mm, preferably 50 ⁇ m to 2 ⁇ m or else 50 ⁇ m and 1 mm, a variety of different structures can be carried out on a small area.
  • methods of demetallization e.g., by means of a laser or chemical etching, are used for this purpose.
  • the person skilled in the art is aware that the production of demetallizations is subject to certain tolerances.
  • the linear interruption and therefore the distance between the individual elements can also preferably be less than 500 ⁇ m, less than 200 ⁇ m or less than 100 ⁇ m. Even such thin interruptions are advantageously reliably detected by means of the edge detection according to the invention.
  • the method is characterized in that the electrically conductive security feature comprises at least two individual elements or active areas whose width is between 1 mm and 15 mm and/or whose length is between 6 mm and 30 mm. Areas of the individual element can be designed in the described sizes for length or width.
  • the length is the largest dimension of the individual element, with the width being configured essentially orthogonally to the length.
  • the electrically conductive security feature comprises at least two individual elements or active areas, the area of each active individual element being between 10 mm 2 and 450 mm 2 .
  • the table below summarizes other preferred sizes of the individual elements and the design rules for the design of the electrically conductive security features.
  • the relevant parameters of the electrically conductive structure are specified for inactive elements, ie non-detectable elements, and for active elements, ie detectable elements.
  • the specified values were determined through tests on currently available, common smartphones with capacitive touch screens.
  • the person skilled in the art recognizes that different types of area sensors may require adapted design rules for the design of the electrically conductive structure. For example, a desired compatibility with a large number of different area sensors leads to a restriction of the design rules.
  • the invention is not limited to the parameter values listed in the table below.
  • Active Items minimum maximum minimum maximum Width of an electrically conductive single element -> 0 ⁇ 1mm 1 mm 15mm Length of an electrically conductive single element -> 0 ⁇ 3mm 6mm 30mm Distance between electrically conductive individual elements 10 microns unlimited 10 microns unlimited Number of electrically conductive individual elements 0 theoretically unlimited 2 theoretically unlimited Area of an electrically conductive individual element -> 0 ⁇ 8mm 2 10mm 2 450mm 2
  • the total area of the electrically conductive structure is preferably at least 15 mm 2 and is limited by the size of the touchscreen or touchscreen.
  • the dimensions of the individual elements given in the table above and the design rules for the design of the electrically conductive security features refer to the conditions of the area sensors common at the time this description was drawn up.
  • features such as the resolution of the area sensors and the geometry of the electrode grid, eg the distance between rows and columns of the electrode grid, influence the appropriate dimensions of the individual elements.
  • these size specifications are shown in generalized form as a multiple of the spatial period length L of the electrode grid of an area sensor.
  • the method is characterized in that the electrically conductive security feature comprises at least two individual elements or active areas whose width is between 0.2 L and 4 L and/or whose length is between 1.2 L and 8 L, where L preferably denotes the spatial period length of an electrode grid of an area sensor.
  • inactive items active items minimum maximum minimum maximum Width of an electrically conductive single element -> 0 ⁇ 0.2*L 0.2*L 4*L Length of an electrically conductive single element -> 0 ⁇ 0.8*L 1.2*L 8*L Distance between electrically conductive individual elements 10 microns unlimited 10 microns unlimited Number of electrically conductive individual elements 0 theoretically unlimited 2 unlimited Area of an electrically conductive individual element -> 0 ⁇ 0.4*L 2 0.5*L 2 30*L 2
  • the total area of the electrically conductive structure is preferably at least 1*L 2 and is limited at the top by the size of the touchscreen or touch screen.
  • a capacitive touchscreen can be used in a terminal for capacitively checking an electrically conductive security feature, for example a capacitive touchscreen of a smartphone, tablet or in an information or self-service terminal.
  • an electrically conductive security feature for example a capacitive touchscreen of a smartphone, tablet or in an information or self-service terminal.
  • Banknotes for example, often contain security strips or threads.
  • the security feature and/or an electrically conductive structure comprises electrically conductive double elements.
  • a combination of two individual elements is preferably referred to as a double element.
  • the two individual elements within the double element are at a small, preferably minimal, distance from one another.
  • the distance between the individual elements in the course of a double element is smaller than the distances between the other individual elements.
  • the individual elements are always grouped in pairs, with each pair of individual elements forming a double element and the respective double elements being arranged at a greater distance from one another than the individual elements within the double element from one another.
  • the individual elements in the respective double elements can each be 1 mm, while the individual double elements are at a distance of preferably 20 mm from one another (without being limited to this).
  • Double elements preferably generate a characteristic signal or speed profile when the input element on a capacitive touchscreen is scanned over the electrically conductive structure.
  • immediately adjacent electrically conductive single elements with minimal spacing (“double elements") produce a characteristic signal.
  • double elements immediately adjacent electrically conductive single elements with minimal spacing
  • the coding results from the presence/absence of the electrically conductive individual elements.
  • the double elements can be in four states: 00, 01, 10, 11.
  • the calibration element (in particular the calibration element-specific signal) in the patterns can preferably differ from the double elements (in particular from the signals generated by the double elements).
  • the electrically conductive individual elements are preferably in the form of letters or lettering which, inter alia, can result in a word.
  • the design rules described above for active and inactive electrically conductive elements also apply to letters, words and lettering.
  • the free space between the words can preferably be regarded as a calibration element.
  • the method is characterized in that the individual elements adjacent to the calibration element along a preferred direction are at a first distance from the calibration element, with the calibration element being designed as a double element which has two elements at a second distance from one another spaced individual elements, wherein the first distance is greater in value than the second distance.
  • the method is characterized in that the evaluation of the characteristic time-dependent and path-dependent signal detected on the area sensor during input includes a detection of the first distance. It has been shown that there are a number of possibilities with regard to the design of the calibration element. For example, it is possible to use free spaces as calibration elements or double elements as calibration elements (see Figure 5a ). A double element can be distinguished particularly well from the rest of the signal, so that the calibration element can be recognized particularly easily.
  • the method is characterized in that in the course of the evaluation of the characteristic time-dependent and path-dependent signal, binary numbers are assigned to the electrically conductive areas and the electrically non-conductive areas, so that coded information from the security feature is detected (cf. also Figure 3b ). In addition to verifying an object, the binary numbers can also be used to read encrypted information. This enables an advantageously high security against forgery.
  • a binary system can be used to represent and process information efficiently, so that reading out and interpreting the binary coding does not require large resources for a data processing unit and an algorithm.
  • the security feature preferably comprises a section of an electrically conductive structure with a pattern that has a section length.
  • the pattern preferably consists of a defined number of conductive blocks or electrically conductive individual elements with a defined length (can differ from block to block).
  • the pattern may include two conductive blocks. After one of the blocks, there can be a defined distance, which can preferably serve as a calibration element.
  • each of the conductive blocks is preferably interrupted several times at different positions, as a result of which several electrically conductive individual elements are obtained from one block (cf. Figures 3c and 3d ).
  • the blocks included in the pattern are preferably spaced 5mm apart in length.
  • This distance is preferably different from the length of a free space that serves as a calibration element (smaller or larger).
  • the blocks can be interrupted at a predefined position, so that several electrically conductive individual elements form a block. It is also possible that the blocks have two interruptions with different positions, whereby the distance between the two interruptions should be at least 10 mm.
  • the method is characterized in that the evaluation of the characteristic time-dependent and path-dependent signal includes a determination of a contact surface of the input means and the security feature, by relating the signal sequence specific to the calibration element to the defined shape, size and/or length of the calibration element, with the contact surface preferably being assumed to be a circular surface.
  • the signal preferably shows a first jump in speed. As the sweeping progresses, the speed preferably decreases and reaches its minimum when the input means is preferably located centrally above the calibration element.
  • the diameter of the contact surface 2r of the input device can preferably be determined from the distance between the two speed jumps ⁇ m ⁇ x and the known length of the calibration element L K (cf. Figure 6a ).
  • the evaluation preferably takes place using the speed profile of the time-dependent signal.
  • a time stamp is available for each touch point in standard end devices with capacitive touch screens and can be used in the software to evaluate the signal curve.
  • a speed can be calculated for each touch event from the xy coordinates and the time stamps of the currently viewed touch event and the previous touch event.
  • edges and/or interruptions in the electrically conductive structure or the electrically conductive security feature cause jumps in the time-dependent signal when a swipe gesture is performed using an input device, and changes in the speed profile can therefore also be detected.
  • This speed profile can be used to draw conclusions about the shape, outline, internal structure and/or contour of the electrically conductive structure, and thus electrically conductive security features can be recognized, authenticated, verified, checked or differentiated.
  • the jumps in the time-dependent signal correlate with edges in an electrically conductive structure or security feature, ie preferably at transitions between conductive and non-conductive areas.
  • Such a detection is both particularly fast and reliable.
  • such a detection is particularly tamper-proof. It is practically impossible to generate such a signal without the presence of the electrically conductive security feature. It can thus be unequivocally proven that the security feature or the document (or object) including the security feature was present on the touch screen at the time of input. This proof of the presence of an object (“proof of presence”) has many different areas of application.
  • the method is characterized in that the verification of the object includes a distinction, control, capacitive detection and/or authentication.
  • the terms “distinction”, “control”, “capacitive detection” and “authentication” are partly synonymous with one another and encompass the same and/or similar conceptual content.
  • the verification preferably enables, among other things, a “distinction” between different security features, which in turn enables a “distinction” between the objects to which the security features are applied.
  • the authentication of a security feature is preferably the verification of the authenticity of such a feature. Such an application example is of great relevance, for example, when checking banknotes for counterfeits.
  • the method is characterized in that after the object has been placed on the surface sensor, the input means is placed on the electrically conductive security feature and the object is preferably kept pressed on the surface sensor, with a dynamic input taking place in that the Object is pulled through between input means and capacitive area sensor.
  • the alternative described generates the time-dependent signal (just like the previously described embodiments) by a relative movement between an input means and the security feature.
  • the relative movement is brought about by the "pulling through" of the security feature, while the input means is essentially fixed in place.
  • the time-dependent signal which is generated on the capacitive touch screen in this case, is essentially characterized by touch events that move in an oscillating manner around the position of the input device on the capacitive surface sensor, and this movement has a specific speed profile.
  • the method is characterized in that the characteristic time-dependent and path-dependent signal is evaluated using machine learning algorithms.
  • machine learning algorithms or machine learning algorithms are a sub-area of artificial intelligence .
  • artificial intelligence in short: AI
  • AI artificial intelligence
  • the use of artificial intelligence (in short: AI) to analyze data leads to significant advantages over analysis by conventional (computer-implemented) methods and/or also compared to manual analysis by a human observer.
  • an AI can advantageously automatically analyze extremely large amounts of data in a very short time.
  • the artificial intelligence algorithms can recognize patterns and/or features in a data set that are not recognized by a human or conventional algorithms. This leads in particular to the fact that the KI can recognize events that are occurring at an early stage and in particular even the smallest deviations in the characteristic time-dependent and path-dependent signal, which indicate a signal sequence specific to the calibration element.
  • Machine learning uses mathematical and statistical models to "learn" from databases.
  • machine learning algorithms have the advantage that information that is too complex for a human observer is automatically eliminated can be extracted from a large data set.
  • machine learning algorithms can essentially be divided into three different learning methods: supervised learning, unsupervised learning and reinforcement learning.
  • methods of supervised learning are particularly preferably used for the analysis of the characteristic time-dependent and path-dependent signal.
  • a so-called training process is carried out first.
  • Training data is provided in the form of input data together with the corresponding target data.
  • the purpose of training is generally in machine learning methods to adapt parameters of a function in such a way that the function is then able to determine the target value with high accuracy from the corresponding input value and/or input value.
  • the fitted function is then used after the training process to predict target data for previously invisible input data.
  • the function is described by a mathematical and/or statistical model.
  • the function is configured using a support vector machine, Bayes networks and/or decision trees.
  • the function is particularly preferably described by an artificial neural network (ANN).
  • the artificial neural networks can have different architectures and e.g. as Deep Feed Forward (DFF) Network, Recurrent Neural Network (RNN), Deep Convolutional Network (DCN), Deconvolutional Network (DN), Convolutional Neural Network (CNN), Deep Residual Network (DRN), Boltzmann Machine, Time Delay Neural Networks (TDNNs).
  • DFF Deep Feed Forward
  • RNN Recurrent Neural Network
  • DCN Deep Convolutional Network
  • DN Deconvolutional Network
  • CNN Convolutional Neural Network
  • DNN Deep Residual Network
  • TDNNs Time Delay Neural Networks
  • the method is characterized in that the ascertained contact surface of the input means serves as an input value for the further evaluation of the characteristic time-dependent and path-dependent signal using machine learning algorithms. In particular, this leads to a more precise signal evaluation of the characteristic time-dependent and path-dependent signal.
  • the method is characterized in that the machine learning algorithm has a regression algorithm for detecting a calibration element, comprising a regression model, the regression model being based on simulated touch data and/or calculated speed and/or acceleration values as input data and a Target position of the calibration element is trained on the security feature.
  • the machine learning models for detecting the calibration element and/or for detecting or classifying the electrically conductive security feature are trained using real training data, i.e. the training data are generated by placing the object on the touchscreen and swiping over the security feature using an input device generated on the device and used as training data for the machine learning model.
  • the machine learning models are trained to identify the calibration element and/or to identify or classify the electrically conductive security feature using simulated training data.
  • the input device or the contact surface of the input device is mentally guided step by step over the electrically conductive structure.
  • the contact surface of the input means which is generally assumed to be a circular surface, gradually comes into contact with the electrically conductive individual elements of the electrically conductive structure.
  • the resulting surface and its centroid are determined in the form of xy coordinates. This is repeated for the entire input path or the entire operating track in a defined increment, for example 1 mm.
  • the total amount of all centroids represents the simulated touch data and thus the course of the simulated signal.
  • the simulation is usually carried out several times and parameters such as the start and end position of the movement of the input device, speed of the movement of the input device and other parameters are varied in order to obtain the most realistic possible course of the simulated signals as the result of the simulation.
  • Speed or acceleration values are calculated from the simulated touch data and used to train the machine learning models.
  • an endless code is preferably initially provided as a file, arranged in three times the section length of the pattern.
  • data are preferably generated/simulated by the input means being guided over the electrically conductive structure, preferably in a simulation, starting from different starting points at a distance of one step length over the effectively usable length of an object.
  • the simulation is repeated for additional start and end positions, with the input device always being guided over the defined, effectively usable length of the object.
  • Each record contains the simulated touch data and a target value of the calibration element position. This target value is transferred to the model as an input value in this process step.
  • the target value can be, for example, the distance between the center of the calibration element and the start position of the simulated data set.
  • speed and acceleration values are preferably calculated on the basis of the simulated touch data.
  • the regression model is trained on the basis of the coordinates of the simulated touch data and/or the calculated speed and/or acceleration values and the target position of the calibration element. This regression model is then able to determine the position of the calibration element in real touch data.
  • the method for verifying the security feature is characterized in that the machine learning algorithm has a classification algorithm comprising a classification model, the classification model being based on simulated touch data and/or calculated speed and/or acceleration values as input data and a predetermined position of the calibration element is trained on the security feature.
  • the data already simulated in connection with the regression model for determining/recognizing the calibration element are preferably used.
  • the simulated signal of the security feature is analyzed by all electrically conductive elements are found, which are not configured as a calibration element, by looking up and down from the now known position of the calibration element for further electrically conductive elements.
  • the simulation is usually carried out several times and parameters such as the start and end position of the movement of the input device, speed of the movement of the input device and other parameters are varied in order to obtain the most realistic possible course of the simulated signals as the result of the simulation.
  • the extracted signals are determined with the final signal length and in a last step the self-learning classification model for code recognition is trained with all generated extracted signals.
  • the evaluation of the characteristic time- and path-dependent signal can preferably be considered as a two-stage process.
  • the regression model preferably recognizes the calibration element and then the classification model recognizes or verifies the security feature, the classification model being based on the results of the regression model and the determined position of the calibration element being passed to the classification model as an input value.
  • real touch signals are first pre-processed prior to decoding in order to decode or identify electrically conductive security features.
  • a preferred pre-processing of the signal it can make sense, for example, not to take into account the first and last touch points of the signal, since these do not contribute to the meaningful signal.
  • the speed is always zero. This data is preferably filtered out.
  • deflections, speed values, acceleration values, distances between speed peaks and other parameters of real touch data are calculated to detect electrically conductive security features. These calculated features are preferably used when calling up the model to identify the calibration element.
  • the search for non-calibration elements in the signal takes place.
  • the signal is then extracted, preferably based on the predicted position of the calibration element. This is done in a similar way to training the classification model. Starting from the calibration element the search for non-calibration elements takes place up and down, then the signal is rotated by the increment s and this process is repeated until the entire signal has been processed.
  • the signals extracted in this way are transmitted to the decoding module, including the classification model, and recognized or decoded accordingly.
  • the object is characterized in that the electrically conductive security feature is applied to an electrically non-conductive substrate material.
  • the object is characterized in that the calibration element is a conductive and/or non-conductive area with a predefined shape, size and/or length within the electrically conductive security feature, so that performing a dynamic input along the preferred direction, a front edge is detected at the start of a conductive area and a rear edge is detected at the end of a conductive area, so that a length of a conductive and/or non-conductive area, in particular of the calibration element, is detected, with an edge there is a transition between a conductive area and a non-conductive area or vice versa and edges can be detected using a speed profile of the time-dependent and path-dependent signal, taking into account a time-dependent or path-dependent asymmetrical course of the speed profile at the edges.
  • the calibration element is a conductive and/or non-conductive area with a predefined shape, size and/or length within the electrically conductive security feature, so that performing a dynamic input along the preferred direction, a front edge is detected at the start of a conductive area and a
  • the object is characterized in that the electrically conductive security feature comprises at least two individual elements which are electrically isolated from one another, with starting and/or end areas of the individual elements or interruptions in the conductive element when a dynamic input is made on the electrically conductive security feature Security features are detectable as edges, the calibration element being configured from one or more individual elements of a defined size and/or length, the calibration element differing from the other individual elements in terms of size and/or length.
  • the object is characterized in that the individual elements adjacent to the calibration element along a preferred direction are at a first distance from the calibration element, with the calibration element being configured as a double element which comprises two individual elements spaced apart at a second distance, with the first distance is greater in value than the second distance.
  • the object is characterized in that the electrically conductive security feature comprises at least two individual elements which are electrically isolated from one another, with the start and/or end sides of the individual elements preferably being detectable as edges when a dynamic input is made on the electrically conductive security feature are.
  • the object is characterized in that the security feature is structured by demetallization.
  • the object is characterized in that the demetallization comprises removing electrically conductive areas, preferably strip-shaped areas, by means of a chemical etching process or by means of a laser.
  • system is characterized in that the system has a data processing device which is set up to evaluate the generated characteristic time-dependent and path-dependent signal, with software ('app') preferably being installed on the data processing device comprising commands for processing and evaluation of the detected signal, the evaluation being carried out using a machine learning algorithm.
  • a data processing device preferably includes means for generating, processing, storing, sending and receiving data.
  • the data processing device is preferably synonymous with the end device, which includes the area sensor.
  • part of the data processing does not take place locally on the device, but with a cloud service.
  • data or data that has already been pre-processed is transmitted to a cloud service via an interface and after processing has taken place, e.g. pre-processing and decoding, a result is sent back to the application on the local device. This result can then trigger and/or display a specific action on the end device.
  • the system is characterized in that the machine learning algorithm has a regression algorithm for detecting a calibration element, comprising a regression model, the regression model being based on simulated touch data and/or calculated speed and/or acceleration values as input data and a Target position of the calibration element is trained on the security feature.
  • the system is characterized in that the machine learning algorithm has a classification algorithm comprising a classification model, the classification model being based on simulated touch data and/or calculated speed and/or acceleration values as input data and a predetermined position of the calibration element is trained on the security feature as target data.
  • the system is characterized in that the device containing the area sensor processes and provides the generated signal as a set of touch events and the software carries out an evaluation based on the set of touch events.
  • the system is characterized in that the software for processing and evaluating the set of touch events runs on a remote server and the touch data is transmitted from the device to the server via an interface.
  • the process is characterized by both high economic efficiency and the provision of security features that meet the highest requirements.
  • the security features can be provided in the form of an endless structure, for example as a tape on a roll, which is then applied to the substrate material.
  • Such a role-based application is particularly suitable for production or duplication on an industrial scale.
  • the substrate material Only after the electrically conductive structure has been applied—preferably from a roll—is the substrate material separated into a large number—preferably of the same size—objects.
  • registration of the security features with the objects can advantageously be dispensed with. Nonetheless, it is not necessary for the characteristic patterns - which serve for verification - to be applied to the objects completely and coherently. Rather, the provision of the calibration element according to the invention also allows an evaluation of a time- and path-dependent signal which originates from a pattern that is fragmented or in two parts on the object with separate start and end areas.
  • Such a method can thus be used to obtain a security feature in an economical manner with a particularly flexible design, which at the same time satisfies the highest security requirements and can therefore also be used to verify particularly valuable objects (documents of value), etc.
  • the manufacturing process is particularly simple and efficient to use, since it does not require detailed positioning of the conductive structure or the security feature.
  • the method can be implemented particularly easily in an existing manufacturing process, since it only requires a few modified design rules for a security feature or an electrically conductive structure. There are no extensive modifications to existing plants or changes in the operation/process flow necessary. Instead, it can be integrated into proven industrial processes - for example in printing and production processes for banknotes.
  • Fig.1a shows a preferred object 10, preferably a document of value, with an electrically conductive security feature 13 in the form of a security strip.
  • the preferred object 10 comprises a substrate material 12.
  • the electrically conductive security feature 13 preferably has a section of an electrically conductive structure 14 of conductive and non-conductive regions with a pattern 15 that is repeated in sections along at least one preferred direction.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15, in which in particular a calibration element 18 is included.
  • the security feature 13 is applied over the entire length 40 of the object 10 along the preferred direction. It has been shown that the edge areas of the object 10 make no technical contribution to the verification of the object 10 or the security feature 13 , so that the effectively usable length 42 of the object 10 is smaller than the entire extent 40 of the object 10 .
  • the preferred security feature 13 has a fully developed pattern 15 in particular along the preferred direction and a further sub-area of the pattern 15 lined up next to it, the lined-up sub-area of the pattern 15 likewise comprising the calibration element 18 .
  • the fully developed pattern 15 and the lined-up partial pattern are partially arranged in the edge region of the object 10 that cannot be used effectively.
  • a conductive area of the structure 14 or of the security feature 13 is preferably designed as an active or an inactive electrically conductive individual element (16, 17) .
  • active elements 16 are elements which are designed in such a way that they are suitable for generating a characteristic signal on a capacitive area sensor 20 when the security feature 13 is swept over with an input means 30 .
  • Such elements 16 have a certain minimum size.
  • Inactive elements 17 cannot be detected, ie they are so small that they do not generate a characteristic signal on a capacitive surface sensor 20 or the signal that can be generated is not sufficiently different from a signal which is only generated by input using input means 30 without a combination of electrically conductive Element can be generated differs.
  • the calibration element 18 is preferably a conductive area with a predefined size and length 19 within the electrically conductive security feature 13. The calibration element 18 preferably differs from the other individual elements 16 included in the security feature 13 in terms of size and/or length 19 .
  • Fig. 1b shows the in Fig.1a illustrated embodiment of the preferred object 10, this being present on a capacitive touch screen 20 of a terminal 22 placed.
  • an input means 30 is shown, with which a gesture 32 along the security feature 13 is executed.
  • Performing the gesture 32 on the object 20 and the electrically conductive security feature 13 using the input means 30 preferably generates a characteristic time-dependent and path-dependent signal on the surface sensor 20. This is detected and evaluated during the input on the surface sensor 20 , with the evaluation being a recognition of at least one calibration element 18 within the electrically conductive security feature 13 comprises.
  • the evaluation is preferably carried out using a speed profile of the time-dependent and path-dependent signal.
  • the electrically conductive security feature 13 preferably has a section of an electrically conductive structure 14 of conductive and non-conductive areas with a pattern 15 that is repeated in sections along at least one preferred direction.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15, in which in particular a calibration element 18 is included.
  • the electrically conductive areas of a complete section are shown with black fill.
  • the electrically conductive areas of further sections are hatched. This type of representation serves only to clarify the pattern 15 and the section length. In reality, the electrically conductive areas of the further sections do not differ from pattern 15.
  • the security features 13 of banknotes 10 of a banknote series preferably differ in terms of the applied (repeating) pattern 15. It is preferably provided that a first banknote 10 with a first value has a first security feature 13 with a first (repeating) Pattern 15 applied. While a second banknote 10 with a second value has a second security feature 13 with a second (repeating) pattern 15 applied thereto.
  • the respective patterns 15 preferably differ in geometric shape, design, width, length, number of individual conductive elements 16, design of connections between elements 16, presence of windows, position and design of non-conductive elements or the having of inactive conductive individual elements 17 and other features. The totality/sum of these features generates a characteristic signal on a capacitive area sensor 20 when the object 10 or the banknote 10 is brought into contact with the capacitive area sensor 20 and a gesture 32 is performed along the security feature 13 using an input means 30 .
  • the underlying technology is preferably based on using an input means 30, for example a finger, to wipe over the electrically conductive structure 14 or the security feature 13 while the object 10 is lying on the capacitive touchscreen 20 . Since it is not possible for a user to swipe exactly from beginning to end along the operating track and the input means 30 itself has a certain diameter (e.g. the fingertip), the usable length 42 of the object 10 is smaller than the total length 40 of the object 10 in operating direction.
  • an input means 30, for example a finger to wipe over the electrically conductive structure 14 or the security feature 13 while the object 10 is lying on the capacitive touchscreen 20 . Since it is not possible for a user to swipe exactly from beginning to end along the operating track and the input means 30 itself has a certain diameter (e.g. the fingertip), the usable length 42 of the object 10 is smaller than the total length 40 of the object 10 in operating direction.
  • FIG. 2 shows an object 10 with a security feature 13 which does not include a preferred calibration element 18 .
  • Become electrically conductive for certain applications Structures 14 in the form of endless structures are applied to a substrate material 12 or an object 10 and form a security feature 13.
  • An endless structure is preferably to be understood as an electrically conductive structure 14 that has patterns 15 that repeat several times in sections along its length.
  • hologram strips to banknotes 10.
  • the substrate material 12 is cut into individual banknotes 10 only after the hologram strips have been applied.
  • Such hologram strips or threads are generally not applied in a registered position, ie the exact position of a section on the object 10 or the banknote 10 is not known in advance. If such a strip is now to be read out capacitively by stroking the electrically conductive structure 14 or the security feature 13 with an input means 30 while the object 10 or the banknote 10 is lying on the touchscreen 20 of a device 22 , the signal evaluation is It is not clear where exactly a specific/detectable section is located within the signal. Any point of the electrically conductive structure 14 can be the starting point of the swipe gesture 32 in the readout process.
  • the length 40 of an object 10 in the operating direction is preferably the length of the final product in the swipe direction. This means that this length 40 relates to the final format of the object 10, for example the card, the label, the security document or the banknote.
  • the input means 30 itself has a certain diameter, so that the usable length 42 of the object 10 is less than the length 40 of the end format of the object is 10 .
  • the repeat length of the pattern 15 preferably designates the length that the complete pattern 15 encompasses once. This can also be referred to as the section length. In the case of the methods known from the prior art, it must be ensured that the pattern 15 can be completely recorded at least once and is encompassed in the area of the effective length 42 . For this reason, the pattern 15 in the present example may only have a maximum length of 30 mm. Based on the total height 40 of the bank note 10 , only 43% of the length 40 can be used in this example.
  • the information content increases as the area available for a pattern 15 increases can be deposited (saved).
  • the limitation to only half of the effective usable length 42 thus represents a significant limitation of the variants of different codings that can be implemented.
  • L K is the length 19 of the calibration element 18 .
  • calibration elements 18 can be introduced for different requirements, which have different predefined lengths 19 in the operating direction.
  • the pattern 15 is preferably 52 mm long for coding. In relation to the total height 40 of the bank note 10 , 74% of the length 40 can thus be used in this example. It has been shown that the entire length of a pattern 15 does not have to be present on the object 10 in the preferred variant according to the invention. It is sufficient if a partial area of the pattern 15 is present on the effectively usable length 42 of the object 10 and has a calibration element 18 .
  • FIG. 1 shows a preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • a continuous, strip-shaped conductive element for example a security thread, is preferably interrupted at certain points by narrow cuts, as a result of which a conductive structure 14 with conductive and non-conductive areas is obtained.
  • a large number of electrically conductive individual elements 16 of the same size as well as a calibration element 18 with a size that can be distinguished from them are obtained.
  • the maximum size of two consecutive, separate, conductive individual elements 16 is preferably 20 mm.
  • the individual elements 16 are preferably at least 10 mm in size, or two cuts are preferably 10 mm apart, so that an undesired, simultaneous overlapping of the input means 30 with three conductive individual elements 16 is prevented.
  • the calibration element 18 preferably differs from the other individual elements 16 in size. In the manufacturing process, it is preferable to select the smallest possible remaining block (10 mm long in the example) or the largest possible remaining block (20 mm long in the example).
  • Figure 3b shows five different preferred embodiments of an electrically conductive structure 14, each having a different repeating pattern 15 with a section length.
  • Each pattern 15 has a large number of electrically conductive ones Individual elements 16 and a calibration element 18 , which differs from the other individual elements 16 in particular in its size.
  • An existing conductive element 16 generates a detectable signal on the touchscreen 20 when swiped over, for example in the form of a deflection or a change in speed or combinations thereof. If the element is missing, there will also be no signal change at this point, i.e. the signal follows the input by the input means 30 without being influenced by electrically conductive elements 16.
  • the size and/or spacing of the individual elements 16 must be selected so that in the area of the contact surface a maximum of two elements 16 are touched between the input means 30 and the touchscreen 20 or overlap with the input means 30 .
  • the first two (numbers 1 and 2) shown preferred electrically conductive structures 14 and the fifth shown (number 5) electrically conductive structure 14 each have a preferred pattern 15 with eight individual elements 16 and one calibration element 18 .
  • This provides a code which reads "1111111K1" (in a preferred sweep with an input means 30 from bottom to top).
  • the individually exhibiting individual elements 16 stand for a “1”, while the calibration element 18 stands for a “K”.
  • the calibration element 18 generates a calibration element-specific signal due to the different configuration.
  • the third (number 3) illustrated preferred electrically conductive structure 14 has a pattern 15 which encodes the binary code "1101101K0" (in the case of a preferred swiping with an input means 30 from bottom to top).
  • the fourth (number 4) illustrated preferred electrically conductive structure 14 has a pattern 15 which encodes the binary code “1001110K1” (in the case of a preferred sweeping over with an input means 30 from bottom to top). It is obvious to the average person skilled in the art that a swipe from top to bottom is also possible.
  • FIG. 1 shows a preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • the security feature 13 comprises an electrically conductive structure 14 with a pattern 15 which has a section length.
  • the pattern 15 preferably consists of a defined number of conductive blocks or electrically conductive individual elements 16 with a defined length (can differ from block to block).
  • the pattern 15 comprises two conductive blocks. After one of the blocks there is a defined distance, which preferably serves as a calibration element 18 .
  • each of the conductive blocks is preferably interrupted several times (here: twice) at different positions, as a result of which a plurality of individual elements 16 are obtained from one block.
  • 3d illustrates a further preferred embodiment of an electrically conductive structure 14 or a security feature 13.
  • the pattern 15 which is repeated in sections, preferably has two conductive blocks along a section length, which are preferably present at a distance of 5 mm from one another. This distance is preferably different from the length of a free space that serves as a calibration element 18 (smaller or larger).
  • the blocks can be interrupted at one of the positions 1 - 5 shown are, so that several electrically conductive individual elements 16 form a block. It is also possible that the blocks have two interruptions with different positions, whereby the distance between the two interruptions should be at least 10 mm. For example, the block shown above is broken at positions 1 and 4.
  • Figure 4a shows another preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • the security feature 13 includes a section of an electrically conductive structure 14 with a pattern 15 that is repeated in sections.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15, in which in particular a calibration element 18 is included.
  • the calibration element 18 differs from the other individual elements 16 in its size and/or the distance from the conductive area that is adjacent to the calibration element 18 .
  • Fig.4b 12 shows different embodiments of a security feature 13, wherein the electrically conductive structure 14 of the security feature 13 can have different widths. It has been shown that the width of the individual elements 16 has essentially no influence on the signal generated.
  • the characteristic time-dependent and path-dependent signal is essentially dependent on the length of the individual elements 16 or the free spaces (interruptions) along a preferred direction, preferably the operating direction. In the present case, the operating direction is preferably along the security feature 13, ie from top to bottom or from bottom to top.
  • Figure 5a shows another preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • the security feature 13 includes a section of an electrically conductive structure 14 with a pattern 15 that is repeated in sections.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15, in which in particular a calibration element 18 is included.
  • electrically conductive double elements are preferably used for coding.
  • a combination of two individual elements 16 is preferably referred to as a double element. Double elements preferably generate a characteristic signal or speed profile when sweeping over the electrically conductive structure 14 using the input element 30 on a capacitive touch screen 20.
  • the signal detection can be presented in such a way that the signal is generated at the centroid of the contact surface of the input means 30 with the touch screen 20 . If there is now an electrically conductive structure 14 in between, the superimposition of the geometry of the individual electrically conductive element 16 and the contact surface of the input means 30 preferably results in what is known as a resulting surface, the centroid of which now determines the signal curve.
  • the generated signal When touching the first half of a double element with the input means 30 , the generated signal preferably has a jump in in the form of a sudden increase in speed. This is due to the sudden resulting centroid shift. As the input means 30 continues to sweep over the first half of the double element, the speed of the signal preferably decreases.
  • both halves of the double element are preferably "connected" - depending on the distance between the two halves and the contact area of input means 30 - to form one large element, i.e. the resulting area is made up of the area of input means 30 and the Faces of the two halves of the double element formed.
  • the speed is now preferably lower than one half of the double element, since the resulting area is larger. Leaving the first half of the double element when swiping further leads to a renewed shift in the center of gravity of the area to the combination of the second half of the double element and the contact surface of the input means 30.
  • Figure 5b shows various embodiments of a security feature 13 comprising an electrically conductive structure 14, wherein the preferred patterns 15 comprised in the electrically conductive structures 14 correspond to those in Figure 5a include double elements explained.
  • directly adjacent electrically conductive individual elements 16 with a minimal spacing (“double elements") generate a characteristic signal.
  • double elements directly adjacent electrically conductive individual elements 16 with a minimal spacing
  • the coding results from the presence/absence of the electrically conductive individual elements 16.
  • the double elements can be present in four states: 00, 01, 10, 11.
  • the calibration element 18 in the patterns 15 preferably differs from the double elements in each case.
  • Figure 6a shows another preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • the security feature 13 includes a section of an electrically conductive structure 14 with a pattern 15 that is repeated in sections.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15, in which in particular a calibration element 18 is included.
  • a calibration element 18 is used, which preferably serves both as a reference for the endless pattern and can also preferably be used to determine the contact surface of the input means 30 with the capacitive touch screen 20 .
  • the contact surface or the diameter of the input means 30 can preferably be determined on the basis of the signal, if preferred a circular contact surface of the input means 30 is assumed. If the input means 30 comes into contact with the calibration element 18 when sweeping over the security feature 13 , the signal has a first jump in speed. In the further course of the sweeping, the speed preferably decreases and has its minimum when the input means 30 is centered over the calibration element 18 . When leaving the calibration element 18 completely, there is preferably another jump in speed.
  • two smaller, information-giving elements 16 are preferably arranged, which can vary in size and position in relation to the calibration element 18 .
  • Figure 6b shows the preferred security feature in a detailed view with different variants of the pattern 15, in particular to be able to determine the contact surface of the input means 30 .
  • Figure 7a shows another preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • the security feature 13 includes a section of an electrically conductive structure 14 with a pattern 15 that is repeated in sections.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15, in which in particular a calibration element 18 is included.
  • an electrically conductive double element is preferably used as calibration element 18 .
  • a combination of two individual elements 16 is preferably referred to as a double element, but these are always used together in the present exemplary embodiment.
  • Figure 7b illustrates a detailed view of several variants of the in Figure 7a illustrated embodiment.
  • the double element is designed as described above (cf. Figures 5a and 5b ) , but occurs exactly once in each section 15 .
  • the information-giving electrically conductive individual elements 16 are arranged in front of/behind the double element and can vary in position and size in the defined area. There is preferably a free space 10 mm in front of and behind the calibration element 18 .
  • Figure 8a shows another preferred object 10 with an electrically conductive security feature 13 in the form of a security strip.
  • the security feature 13 comprises a section of an electrically conductive structure 14 with a pattern 15 that is repeated in sections.
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15 in which in particular a calibration element 18 is included.
  • the electrically conductive individual elements 16 are in the form of letters or lettering which, inter alia, can result in a word.
  • the design rules for active and inactive electrically conductive elements specified in the description also apply to letters, words and lettering.
  • the free space between the words is preferably to be regarded as a calibration element 18 .
  • Figure 8b shows a detailed view of a security feature 13 in Figure 8a already illustrated embodiment, with other possible preferred variants are shown.
  • inactive electrically conductive individual elements 17 can also be included in a pattern 15 .
  • the individual digits "1 2 3" are not electrically connected to the adjacent digits and thus represent inactive electrically conductive individual elements 17 ( Figure 8b No. 2).
  • the individual letters of the words and letter sequences "sample”, “writing”, “words” and “abc” are connected to the respective neighboring letters and represent active electrically conductive areas 16.
  • the space between the letters serves as a calibration element 18 in the present example .
  • FIG. 9 illustrates a preferred manufacturing method for banknotes 10 with a security feature 13.
  • electrically conductive structures 14 in the form of endless structures are applied to a substrate material 12 and form a security feature 13.
  • An electrically conductive structure 14 is preferred under an endless structure to understand, which has sections over its length repeatedly repeating pattern 15 .
  • a plurality of conductive and non-conductive areas along a section with a section length form the pattern 15 in which in particular a calibration element 18 is included.
  • the conductive areas of the structure 14 or of the security feature 13 are preferably designed as active or inactive electrically conductive individual elements ( 16, 17 ).
  • the substrate material 12 is preferably cut into individual banknotes 10 .
  • Such security features 13 are preferably not applied in a registered position, ie the exact position of a section on the bank note 10 is not known in advance.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of Length, Angles, Or The Like Using Electric Or Magnetic Means (AREA)
EP21190157.4A 2021-08-06 2021-08-06 Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs Pending EP4131190A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP21190157.4A EP4131190A1 (fr) 2021-08-06 2021-08-06 Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP21190157.4A EP4131190A1 (fr) 2021-08-06 2021-08-06 Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs

Publications (1)

Publication Number Publication Date
EP4131190A1 true EP4131190A1 (fr) 2023-02-08

Family

ID=77249767

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21190157.4A Pending EP4131190A1 (fr) 2021-08-06 2021-08-06 Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs

Country Status (1)

Country Link
EP (1) EP4131190A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69519191T2 (de) * 1994-04-28 2001-05-31 Authentication Technologies, Inc. Sicherheitsfadenprüfungsvorrichtung
EP1760670A1 (fr) 2005-06-13 2007-03-07 I.C.I. Design Institute Inc. Dispositif d'inspection
US20190355199A1 (en) * 2016-12-29 2019-11-21 Orell Füssli Sicherheitsdruck Ag Method for retrieving information from a security document by means of a capacitive touchscreen
WO2020229517A1 (fr) 2019-05-13 2020-11-19 Prismade Labs Gmbh Dispositif et procédé de contrôle de caractéristiques de sécurité électroconductrices et dispositif de contrôle pour des caractéristiques de sécurité électroconductrices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69519191T2 (de) * 1994-04-28 2001-05-31 Authentication Technologies, Inc. Sicherheitsfadenprüfungsvorrichtung
EP1760670A1 (fr) 2005-06-13 2007-03-07 I.C.I. Design Institute Inc. Dispositif d'inspection
US20190355199A1 (en) * 2016-12-29 2019-11-21 Orell Füssli Sicherheitsdruck Ag Method for retrieving information from a security document by means of a capacitive touchscreen
WO2020229517A1 (fr) 2019-05-13 2020-11-19 Prismade Labs Gmbh Dispositif et procédé de contrôle de caractéristiques de sécurité électroconductrices et dispositif de contrôle pour des caractéristiques de sécurité électroconductrices

Similar Documents

Publication Publication Date Title
EP3577601B1 (fr) Procédé de production d'un signal dépendant du temps sur un capteur de zone capacitif et procédé d'identification d'un objet de carte, et objet de carte et utilisation de celui-ci
EP2580714B1 (fr) Système doté d'un support d'informations capacitif servant à détecter des informations
Pruszynski et al. Edge-orientation processing in first-order tactile neurons
DE2446585C2 (de) System zum Prüfen von Unterschriften
EP2791768A1 (fr) Support de données tactile et procédé
EP2508966A1 (fr) Procédé de détection d'une ou plusieurs zone conductrices
WO2020229517A1 (fr) Dispositif et procédé de contrôle de caractéristiques de sécurité électroconductrices et dispositif de contrôle pour des caractéristiques de sécurité électroconductrices
EP3881169A1 (fr) Procédé et dispositif pour une authentification multifacteur sur un capteur surfacique capacitif
EP4116106A1 (fr) Document de sécurité et procédé de production d'un document de sécurité
EP3355235A1 (fr) Dispositif et utilisation du dispositif de génération d'un signal variable dépendant du temps dans un capteur capacitif de superficie ainsi que structure électriquement conductrice
EP3577595B1 (fr) Dispositif et son utilisation destiné à produire un signal en fonction du temps sur un capteur de surface capacitif et structure électroconductrice pour un tel dispositif
DE102012219129B4 (de) Verfahren zum Betreiben einer Vorrichtung, die eine Benutzerschnittstelle mit einem Berührungssensor aufweist, sowie entsprechende Vorrichtung
WO2012038490A1 (fr) Support d'informations multiple
WO2013057279A1 (fr) Procédé de vérification d'un document de sécurité pourvu d'un modèle à l'aide d'un dispositif d'affichage
EP2418607A1 (fr) Support de données capacitif et système de saisie d'information
EP4131190A1 (fr) Détection de motifs électroconducteurs continus et répétitifs à l'aide des écrans tactiles capacitifs
DE102010052992A1 (de) Portabler Datenträger
EP3853700B1 (fr) Procédé, dispositif et système pour générer un signal variable en fonction du temps sur un capteur surfacique capacitif
EP3853701B1 (fr) Dispositif, son utilisation et système de génération d'un signal périodique sur un capteur superficiel capacitif
DE202010011032U1 (de) Informationsträger und System zur Erfassung von Informationen
EP3355246B1 (fr) Procédé de production d'un signal dépendant du temps sur un capteur de zone capacitif et procédé d'identification d'un objet de carte, et objet de carte et utilisation de celui-ci
WO2014124829A1 (fr) Objet doté d'éléments graphiques, ensemble d'objets, procédé de fabrication et procédé d'authentification
EP3481642B1 (fr) Procédé de production d'un ensemble de couches pour un document de sécurité et document de sécurité correspondant
EP2128797B1 (fr) Procédé et dispositif de traitement d'échantillon
DE2525332C2 (de) Verfahren zur Gewinnung von Identifikationsmerkmalen beim Schreiben einer Unterschrift und Einrichtung zur Durchführung des Verfahrens

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20230807

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20240502