EP4260301A1 - Procédé permettant de produire une série de paquets infalsifiables, série de paquets infalsifiables, procédé d'authentification et système d'authentification - Google Patents
Procédé permettant de produire une série de paquets infalsifiables, série de paquets infalsifiables, procédé d'authentification et système d'authentificationInfo
- Publication number
- EP4260301A1 EP4260301A1 EP21823200.7A EP21823200A EP4260301A1 EP 4260301 A1 EP4260301 A1 EP 4260301A1 EP 21823200 A EP21823200 A EP 21823200A EP 4260301 A1 EP4260301 A1 EP 4260301A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- batch
- packaging
- specific
- fourier
- printing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 109
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 19
- 238000007639 printing Methods 0.000 claims abstract description 94
- 238000004806 packaging method and process Methods 0.000 claims description 137
- 230000009466 transformation Effects 0.000 claims description 42
- 239000011159 matrix material Substances 0.000 claims description 40
- 238000007646 gravure printing Methods 0.000 claims description 3
- 238000007641 inkjet printing Methods 0.000 claims description 3
- 238000010147 laser engraving Methods 0.000 claims description 3
- 238000007648 laser printing Methods 0.000 claims description 3
- 238000007645 offset printing Methods 0.000 claims description 3
- 238000007650 screen-printing Methods 0.000 claims description 3
- 238000010023 transfer printing Methods 0.000 claims description 3
- 238000004891 communication Methods 0.000 claims description 2
- 238000010276 construction Methods 0.000 description 6
- 230000000717 retained effect Effects 0.000 description 4
- 230000006378 damage Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 229940034610 toothpaste Drugs 0.000 description 1
- 239000000606 toothpaste Substances 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0043—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/305—Associated digital information
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/206—Matching template patterns
Definitions
- the invention relates to a method for producing a series of counterfeit-proof packaging.
- the invention also relates to a series of anti-counterfeiting packaging made according to the manufacturing method.
- the invention also relates to a method for authenticating a package, a series of packages divided into batches, and an authentication system.
- DE 10 2017 206467 A1 describes a method for producing a security feature in which a first graphic code is provided and a second graphic code is provided in the form of a Fourier pattern, and the first and second graphic codes are combined concatenated by inserting the Fourier pattern into the outer border of the first graphic code.
- DE 10 2017 206466 A1 also describes a method for producing a security feature in which a machine-readable graphic code is made available, the graphic code is embedded in a two-dimensional discrete complex function, the two-dimensional discrete complex function is Fourier transformed and becomes a two-dimensional image is binarized.
- the binarized Fourier image is printed with a pixel resolution that is large enough to print enough structures to to enable inverse Fourier transformation, which enables a reconstruction of the machine-readable graphic code.
- the object of the invention is to provide an authentication system with which the authentication method mentioned can be carried out.
- the manufacturing process involves a series of anti-counterfeiting packaging.
- Sales packaging of a product for example a toothpaste tube also the outer packaging, for example the folding box of the product.
- the packaging can also be a part of a packaging, for example a label that is stuck onto an outer packaging.
- the series of packaging is divided into preferably disjunctive batches.
- Each package in a batch is given a batch-specific batch number. This is assigned to each packaging.
- each packaging is assigned a packaging-specific serial number.
- a batch can easily include several hundred, thousand, ten thousand or hundreds of thousands of packages, while the individual serial number of each package is assigned precisely and individually.
- the packaging-specific serial number of each packaging is unique and is not repeated in the series.
- the batch number as well as the serial number can be a sequence of numbers, sequences of letters, character sequences or a combination of the characters mentioned above.
- the batch and serial numbers are pieces of information that can be used to identify the batch or the individual packaging. It can also be a two-dimensional character or image arrangement.
- the lot-specific lot numbers are encoded in machine-readable lot-specific first graphic codes.
- the packaging-specific serial numbers are encoded in packaging-specific, machine-readable second graphic codes.
- the first graphic codes and/or the second graphic codes are preferably conventional machine-readable codes such as 2D barcodes, in particular data matrix codes or QR codes. It can also be one-dimensional barcodes, but also trill codes, quickmark codes, shot codes, etc.
- General the machine-readable graphic codes include optoelectronically readable symbols that consist of bars or dots of different widths and gaps in between with the highest possible contrast.
- the batch-specific first graphic code is Fourier-transformed into a batch-specific two-dimensional Fourier pattern.
- Identical batch-specific first graphic codes are Fourier-transformed into identical batch-specific two-dimensional Fourier patterns, while different batch-specific first graphic codes are Fourier-transformed into different batch-specific two-dimensional Fourier patterns.
- a Fourier pattern is a two-dimensional image, e.g. B. is shown in Fig. 4a.
- Fourier patterns are hardly perceptible to the viewer as such, as they appear as a kind of satin gray background. Identity or difference of Fourier patterns can only be determined for the human observer when they are placed next to each other, i.e. with a direct comparison.
- the batch-specific Fourier patterns are printed in a first printing process step on the packaging assigned to the batch number, and the packaging-specific, machine-readable second graphic codes are printed on the packaging assigned to them in a second printing process step.
- the batch-specific two-dimensional Fourier pattern and the packaging-specific second graphic codes can be printed one on top of the other, side by side, partially overlapping on the packaging.
- the machine-readable first graphic code is embedded in a real amplitude function of a two-dimensional, discrete complex function G(fx,fy) with an fx frequency coordinate and an fy frequency coordinate.
- the code is positioned in a two-dimensional, preferably square, image template, with the x and y values of the image template being interpreted as fx and fy frequencies.
- complex numbers or complex functions can be represented as the sum of the real and imaginary parts or sum of a real function and an imaginary function or in polar coordinate notation as the product of an amplitude function and phase function.
- the method according to the invention is based on making the machine-readable first graphic code available as an amplitude function of a two-dimensional discrete complex function G(fx,fy).
- the amplitude function preferably has either the function value 0 or the function value 1 via the two frequency coordinates fx and fy.
- the black coordinate points of the code positioned in the image template receive the value 1 and the white coordinate points the value 0.
- a suitable phase function e i(p (fx, fy) is preferably added to the real amplitude function by multiplication.
- the task of the phase function is to smooth the frequency spectrum of the amplitude function.
- the phase function e i(p (fx, fy) can be a random phase.
- the first graphic code for generating the phase function is preferably initially designed as a random gray value image.
- the outlines of the gray value image correspond to the first graphic code, except that the values do not lie at zero (white) and one (black) as in the construction of the amplitude function, but are random gray values between white and black.
- the gray values are assigned to numbers between 0 and 2TT. If the gray value is black, the Phase 2TT, and if the gray value is white, the phase is zero.
- the other gray values are assigned an angle between 0 and 2TT (radians), depending on the gray level.
- the blacker i.e.
- the random gray value image can be unambiguously converted into a phase function e i(p (fx, fy), and by multiplying the amplitude function by the phase function n the complex-valued function G(fx,fy) is formed.
- phase functions can also be added to the real amplitude function.
- the two-dimensional discrete complex function G(fx,fy) is then Fourier transformed and the resulting Fourier transformed g(x,y) is binarized into a two-dimensional image.
- the real part of the Fourier transform g(x,y) can be determined and binarized using a threshold value.
- the real part of the Fourier transform again contains gray levels.
- binarization of an image means that each pixel of the image whose gray level is above the threshold value is assigned the value 1 and each pixel whose gray level is below the threshold value is assigned the value 0.
- 10% binarization means that 10% of the pixels are black and 90% of the pixels are white.
- 50% binarization then means that 50% of the pixels are black and 50% of the pixels are white, etc.
- the real part or the phase of the Fourier transform g(x,y) can also be determined and binarized using a threshold value.
- Other binarization options are known from the prior art (Goodman, JW, Introduction to Fourier Optics, McGraw-Hill (New York) (1996)).
- the real part of the Fourier transform is preferably binarized and the batch-specific Fourier pattern is formed by it.
- the Fourier pattern is preferably printed with a binarization of less than 50 percent, preferably less than 20 percent, particularly preferably less than 10 percent.
- the batch-specific Fourier pattern which is printed on the packaging in the first printing process step, is understood here as the binarized real part of the Fourier transformation of the function G(fy,fy).
- the first printing method step has a higher printing resolution than the second printing method step, and the batch-specific Fourier patterns are printed with a higher printing resolution than the packaging-specific second graphic code.
- the first printing process step can be selected from gravure printing, offset printing, screen printing or flexographic printing, while the second printing process preferably takes place by means of a digital printing process from the group inkjet printing, thermal transfer printing, laser printing, laser engraving.
- the first step of the printing process is carried out using a classic printing process, and the Fourier pattern is printed on the packaging with a high effective resolution.
- the Fourier pattern contains the hidden, machine-readable first graphic code, which contains at least the batch number as information.
- classic printing processes a printing plate or a printing cylinder is first produced, which is then used to print a series of similar packaging. First of all, the prints are the same on all packaging in the series.
- the invention proposes in one aspect to already diversify the first printing method step and thus the Fourier pattern.
- the series is divided into batches. These are disjoint sets of the series. If, for example, several printing presses are provided for the production of the series, each printing press could be assigned its own individual printing plate with a batch-specific two-dimensional Fourier pattern that contains the batch number as information. It would also be conceivable for the printing plates, which contain the batch-specific Fourier pattern, to be changed regularly within a printing press and each receive a different batch number as information. If several packages are printed simultaneously with one printing plate, several batch-specific Fourier patterns could be arranged on one printing plate.
- high print resolutions are available, e.g. B. 2,000 dpi or 4,000 dpi.
- a low resolution open machine-readable second graphic code is printed onto the package using a digital printing process.
- the machine-readable graphic code contains at least one packaging-specific serial number as information. Individual packaging means that the number is only used once in the series of packaging and is therefore unique.
- the serial number is preferably selected from a large range of numbers or generated cryptographically so that potential forgers are unable to guess a valid serial number.
- the second graphic code preferably contains a URL with which a user can connect to an authentication server.
- a URL could be, for example, https://www.authserver.com/, preferably the serial number is part of the URL, for example https://www.authserver.com/serialnumber/12345, where 12345 is the serial number.
- the second printing process step takes place after the first printing process step.
- a reverse order is also conceivable.
- the second printing process step can be carried out in the same printing machine as the first printing process step if the printing machine provides printing units using classic printing methods and printing units using digital printing methods.
- the second printing process step can also take place on a different printing press than the first printing process step. With that they can Printing machines can also be made available in different rooms or even different cities.
- the first printing process step takes place at a producer for packaging and the second printing process step is carried out at a later point in time at the manufacturer of the product, for example on the packaging line.
- the batch-specific Fourier pattern is preferably printed with an effective resolution of at least 600 dpi.
- a printer must be used that has a higher print resolution, preferably a significantly higher print resolution of 1,000 dpi, 2,000 dpi or even 4,000 dpi. All intermediate values are also disclosed here. It has been shown that commercially available printers have a print resolution of less than 600 dpi, so that when the batch-specific Fourier pattern is photographed and the photographed Fourier pattern is printed out again, so much information is lost that a reconstruction of the batch-specific first graphic code is no longer possible. If the Fourier pattern is to be copied and the information contained therein is to be retained, then at least the effective resolution of the Fourier pattern must be retained during the copying process.
- the effective resolution of the printed batch-specific Fourier pattern is determined by the resolution of the printer and by the positioning of the batch-specific first graphic code within the Image template determined.
- the image template has half the width fx imit and half the height fy imit. Both values indicate the pixel numbers of half the width and half the height of the image template.
- the special positioning of the batch-specific first graphic code within the image template in the fx and fy direction defines the greatest horizontal distance fx_max of the batch-specific first graphic code from the center of the image and the greatest vertical distance fy_max of the batch-specific first graphic code from the center of the image.
- the effective resolution in the x direction is the product of the quotient fx_max/fx_limit multiplied by the resolution of the press ( as a formula: (fx_max/fx_limit) * resolution ), and the effective resolution in the y direction is the product of the quotient fy_max / fyjimit multiplied by the resolution of the press ( as a formula: (fy_max/fy_limit) * resolution ).
- Effective resolution is the greater of effective x-direction resolution and effective y-direction resolution.
- the batch-specific first graphic code is preferably positioned so far outside on the original image that the values fx_max and fy_max are so large that the effective print resolution is above 600 dpi.
- the object is achieved by a series of counterfeit-proof packaging with the features of claim 15, which is manufactured using one of the manufacturing methods mentioned above. What was said about the method also applies to the series of forgery-proof packaging and should also be disclosed in connection with the series.
- Packaging assigned a batch-specific batch number, and each
- the packaging will have a packaging-specific serial number assigned.
- the lot-specific lot numbers are encoded in machine-readable lot-specific first graphic codes, and the lot-specific first graphic codes are Fourier-transformed into lot-specific two-dimensional Fourier patterns.
- the batch-specific Fourier patterns are each printed on the packaging assigned to the batch number, with the batch-specific Fourier patterns preferably being printed with an effective resolution of at least 600 dpi.
- the packaging-specific serial numbers are encoded in packaging-specific, machine-readable second graphic codes that are printed on the associated packaging in a second printing process step.
- the resolution of the second printer with which the second printing process step is carried out can be lower, possibly significantly lower, than the resolution of the first printer with which the first printing process step is carried out.
- the packaging-specific, machine-readable second graphic code is preferably openly readable.
- openly readable is understood to mean that it is printed on the packaging in such a way that it is detected with a conventional reading algorithm downloaded onto a commercially available smartphone that has a camera and the information it contains, for example the Serial number, can be read.
- the reading algorithm can be a commercially available QR code scanner, data matrix code scanner or other corresponding scanner.
- the batch-specific Fourier pattern and the second graphic code together represent a forgery-proof two-dimensional security feature according to the invention for each package.
- the batch-specific Fourier pattern and the second graphic code may be placed one on top of the other, side by side, partially overlapping on the packaging.
- the Fourier pattern is conveniently binarized. Binarized Fourier patterns have the advantage that they only have the values white and black and can therefore easily be printed with printing machines. A 20% binarization has proven advantageous. The 20% binarization still contains enough information and can be printed with little ink.
- the object is achieved in its third aspect by a method for authenticating a packaging of a series of packaging divided into batches with the features of claim 20.
- the authentication method is advantageously carried out using an authentication system which is described further below.
- the authentication method is suitable for implementation with one of the series of counterfeit-proof packaging mentioned above, which are manufactured using one of the manufacturing methods mentioned above.
- the authentication method is carried out using a mobile terminal device which has a camera.
- the mobile end device can be a commercially available smartphone and the camera can be a commercially available camera integrated into smartphones.
- An image of the two-dimensional security feature of the packaging is captured with the camera of the mobile device. The image is then evaluated. The captured image is supplied to a second reading algorithm for the second graphic code, and the second reading algorithm reads a packaging-specific serial number from the second graphic code.
- the captured image is subsequently, simultaneously or beforehand, inverse Fourier transformed and the inverse Fourier transformed image is fed to a first reading algorithm for the batch-specific first graphic code.
- the reading algorithm reads the batch number from the batch-specific first graphic code.
- the read batch number and the read serial number are authenticated. It is determined whether the batch number and serial number and their assignment to one another are valid.
- serial numbers are not formed consecutively, but are cryptographically encrypted, so that a counterfeiter cannot simply think up or guess a valid serial number.
- the packaging-specific serial number is compared with the serial numbers stored in the database, and the batch-specific batch number is also compared with the batch-specific batch numbers stored in the database. If both numbers match individually and as a pair, the security token is authenticated.
- the packaging with the security feature is then the original packaging. If the batch number cannot be read, for example because it is a blurred photocopy of the Fourier pattern of the security feature, the security feature will not be authenticated.
- the serial number has already been queried one or more times, the serial number is preferably no longer authenticated in the next query. A serial number may preferably only be queried once or a certain number of times and is then blocked or invalidated.
- the inverse Fourier transform program required for the authentication process, the first reading algorithm and the second reading algorithm may all or some of them be arranged on the mobile terminal. However, it is also conceivable that one or more of these programs are stored on an authentication server.
- the database which has stored valid batch number and serial number pairs is preferably also stored on the authentication server.
- serial numbers read out for the individual packaging are advantageously fed to the authentication server and the serial numbers read out are compared with the valid serial numbers stored in the database on the authentication server, and the serial numbers read out are authenticated if they match one of the valid serial numbers stored.
- the batch numbers read out are preferably also sent to the authentication server and compared with valid batch numbers stored on the authentication server.
- the connection between the mobile terminal device and the database server can be established via a conventional, preferably wireless connection such as a W-LAN connection to the Internet, a 3G/4G/5G connection to the Internet or a similar connection.
- the object is achieved by an authentication system having the features of claim 25.
- the method mentioned above is carried out with one of the authentication systems described here; the authentication systems described below are preferably also suitable for carrying out one of the authentication methods mentioned above.
- the authentication system includes a series of forgery-proof packaging, as described above, a mobile terminal device with a camera and with a transceiver unit, with which the security features of the packaging detected by the camera can be transmitted to an authentication server.
- the authentication system also includes a Fourier inverse transformation program with which the batch-specific Fourier pattern can be Fourier inverse-transformed, a first reading algorithm for the batch-specific first graphic code, which can read the batch number from the Fourier inverse-transformed image, a second reading algorithm for the packaging-specific second graphic code, which reads the individual serial number can.
- the authentication system also includes the authentication server, which is in data communication with the mobile end device and on which the serial number and batch number assigned to each package are stored in association with one another and on which the batch numbers and serial numbers transmitted by the mobile terminal can be authenticated and with which an authentication signal is sent to the mobile terminal is deliverable.
- the Fourier inverse transformation program can be downloaded to the mobile terminal device, but it can also be the case that the Fourier pattern captured by the camera is transmitted to the authentication server by means of the transceiver unit.
- the first as well as the second reading algorithm can be stored either on the mobile terminal device or on the database authentication server.
- both reading programs and the Fourier inverse transformation program are advantageously stored on the mobile terminal, so that only the batch-specific batch numbers already read and the individual packaging serial numbers that have been read need to be transmitted to the authentication server via the transceiver unit of the mobile terminal.
- the numbers can be transmitted with a significantly lower data volume than the Fourier pattern scanned by the camera.
- Fig. 1 coding of a batch number in a data matrix code
- FIG. 18 Packaging series in Fig. 18 with a batch-specific Fourier pattern and with a packaging-specific QR code printed on three packaging.
- FIG. 1 and 2 show a basic representation of the construction of a security feature 1 according to the invention.
- 3 to 9 show the construction of a first embodiment of the security feature 1 with a low resolution.
- 10 to 16 show the construction of a second embodiment of a security feature 1' with a high effective resolution.
- the security feature 1, 1' according to the invention basically has two components, namely a binarized batch-specific one two-dimensional Fourier pattern 22, 22', which can be seen in Fig. 6 and Fig. 13 as a kind of background noise, but is actually the real part of the Fourier transform of a batch-specific first graphic code 3 brought into mathematical form, which is embodied here as a data matrix code , as well as a packaging-specific, machine-readable second graphic code 4 printed on the batch-specific two-dimensional Fourier pattern 22, 22′, which is embodied here in the form of a QR code.
- both the first graphic code 3 and the second graphic code 4 can be designed in particular as 1D or 2D barcodes, in particular as a data matrix code or QR code. It should be machine-readable, i.e. it should be able to be read using a commercially available reading algorithm, which can be downloaded to mobile devices in the form of an app, for example.
- the binarized Fourier pattern 22 and the QR code 4 are preferably printed one on top of the other. Due to their clearly different graphic design, however, they do not "interfere" with each other.
- the batch number 6 can have almost any shape, it can be a sequence of letters, characters, numbers, bits or a combination thereof.
- the batch number 6 is coded in a data matrix code 3 according to FIG.
- the data matrix code 3 is the machine-readable first graphic code 3. Both are therefore given the same reference number.
- the data matrix code 3 is the same for each pack 7 of a batch.
- a series of packages 7 is divided into a number of batches.
- the packages 7 are divided into four batches. per batch is one of the packages 7 shown in fig. Of course, more or fewer batches can also be formed.
- the batch number 6 can also be encoded into any other machine-readable code.
- the batch number in FIG. 1 can also be encoded in a QR code or a bar code.
- Part of the idea according to the invention consists in converting the batch-specific first graphic code 3, here the data matrix code 3, into an associated Fourier pattern 2.
- the data matrix code 3 is positioned in an empty image template 8 according to FIG.
- the level is understood as a frequency level.
- the function is defined in the frequency plane, which is spanned by an fx frequency and an fy frequency. Depending on where the data matrix code is positioned in the fx, fy level, it is formed by higher or lower frequencies.
- the image template 8 has a size of m ⁇ n pixels.
- a function G(fx,fy) is now formed from the arrangement of the data matrix code in the empty image template 8 .
- the image template of m x n pixels forms the domain of definition of the function G(fx,fy).
- the function G(fx,fy) consists of the product of an amplitude function and a phase function.
- the amplitude function is shown graphically for the data matrix code 3 in FIG. 1 in FIG. 3a.
- the amplitude function is zero at the white points and one or some other constant value at the black points. This means that the amplitude function is in the form of a real-valued function with the function values zero and one.
- the amplitude function is multiplied by an appropriate phase function e i(p (fx,fy).
- the phase function e i(p (fx,fy) can be a random phase act, but other phase distributions are also known in the prior art (Akahori, H., Comparison of deterministic phase coding with random face coding in terms of dynamic range, Appl. Opt. 12, pp. 2336-43 (1973)).
- the phase ⁇ (fx,fy) selected here is designed and shown as a random gray value of the data matrix code 3a.
- the outlines of the phase correspond to data matrix code 3, except that the values are not at zero (white) and one (black), but are random gray values between white and black.
- each pixel is assigned a random gray value between white and black.
- the gray values are now assigned to numbers between 0 and 2TT. If this gray value is black then the phase is 2 ⁇ and if the gray value is white then the phase is zero.
- the other gray values are assigned an angle between 0 and 2TT depending on the gray level. The blacker the color, the higher the angle.
- the random gray-scale image can be unambiguously converted into a phase function, and by multiplying the amplitude function graphed in Fig. 3a by the phase function in Fig. 3b e i(p (fx,fy), the complex-valued function G(fx,fy ) educated.
- the complex function G(fx,fy) is Fourier transformed in the usual way, resulting in a new two-dimensional complex function on mxn pixels, the two-dimensional Fourier transformed g(x,y).
- an inverse Fourier transformation or an inverse Fourier transformation can also be used in this method, since due to the Symmetry conditions between Fourier transformation and inverse
- the real part of the Fourier transformation g(x,y) is referred to here as a two-dimensional Fourier pattern 2 and is shown in FIG. 4a.
- the two-dimensional Fourier pattern 2 is also batch-specific and has gray values between white and black.
- Binarization means that either a pixel value 1 or a pixel value 0 is assigned to each pixel of the Fourier pattern 2 in FIG. 4a. Black is used as pixel value 1 and white as pixel value 0.
- Various methods from the literature for computer-generated holograms are known for binarization, e.g. the Detour phase method (Goodman, J.W., Introduction to Fourier Optics, McGraw-Hill (New York) (1996)).
- a preferred method is the discrete binarization of the real part of the Fourier transform g(x,y).
- a threshold value is selected here, and all values of the real part of the Fourier transform g(x,y) that are below the threshold value are assigned to the pixel value 0 and all other values to the pixel value 1.
- the threshold value can be selected, as in FIG. 4b, such that 50% receive the pixel value 1, ie are black, and 50% receive the pixel value 0, ie are white.
- Fig. 4b shows a 50% binarized Fourier pattern 21.
- the threshold value can also be selected in such a way that any other desired percentage has the pixel value 1 and the remaining pixels have the pixel value 0.
- a 20% binarized Fourier pattern 22 is shown in Fig. 4c shown.
- the percentage of binarization is preferably between 5% and 25% for the current invention.
- 5a, 5b, 5c show the real part of an inverse Fourier transformation 3, 31, 32 of the Fourier pattern 1, 21, 22 in FIGS. 4a, 4b, 4c. It can be seen that using the real part as a Fourier pattern results in a symmetrical, so-called negative order. It can also be seen that the binarization increases the noise (grey shadow in the background), with low binarization leading to more noise. Nevertheless, the inverse transformed Fourier pattern 3, 31, 32 in FIGS. 5a, 5b, 5c remains in machine-readable form.
- FIG. 6 shows the first embodiment of the security feature 1 according to the invention, in which a QR code 4 is printed on the 20% binarized Fourier pattern 22 according to FIG. 4c.
- the QR code 4 is an embodiment of the packaging-specific, machine-readable second graphic code 4, a packaging-specific serial number 9 being encoded in the QR code 4 in accordance with the explanation relating to FIG.
- any other machine-readable code in particular a 2D barcode, such as a data matrix code according to FIG. 1 , or any other code can also be selected as the packaging-specific, machine-readable second graphic code 4 .
- QR code 4 and packaging-specific, machine-readable second graphic code 4 are also given the same reference number, since they coincide in this exemplary embodiment.
- Fig. 7 again shows the inverse Fourier transformation of the security feature 1 in
- the security feature 1 is printed onto the packaging 7 in two separate printing process steps.
- the 20% binarized Fourier pattern 22 in FIG. 6 is printed onto the packaging 7 in a first printing process step.
- the first step in the printing process has a print resolution of at least 600 dpi.
- a gravure printing method, offset printing method, screen printing method or flexographic printing method is selected in the first printing method step.
- These are so-called classic printing processes in which a printing die is formed and the individual packaging rolls over the printing die.
- the production of a printing matrix is complex, so that for cost reasons a separate printing matrix cannot be provided for each packaging 7, but a printing matrix is made separately for each batch, so that usually several hundred or thousands of packaging 7 with a same batch-specific two-dimensional Fourier pattern according to FIG. 6 are printed.
- the packaging-specific, machine-readable second graphic code 4, here the QR code 4 is printed in a second printing process step, which can have a significantly lower print resolution than the first printing process step.
- the second printing method step is preferably a digital printing method from the group of ink jet printing, thermal transfer printing, laser printing, laser engraving.
- Digital printing methods make it possible to assign one of the packaging-specific serial numbers 9 to each packaging, which is encoded in one of the packaging-specific second codes 4 .
- the packaging-specific second code 4 can be printed inexpensively and individually in the second method step due to the selection of the digital printing method.
- FIG. 8 shows a photocopy 11 of the security feature 1 in FIG. 6, where the photocopy 11 was only printed out with a printer that has half the resolution of the printer in FIG.
- Fig. 9 shows that the inverse Fourier transformation of the photocopy 11 in Fig. 8 is weaker than the inverse Fourier transformation of the original security feature 1 in Fig. 6.
- ghost images i.e. higher-order Fourier inverse transformations, can be seen.
- the information in the data matrix code 3 is retained and the data matrix code 3 can still be read by machines.
- FIGS. 10 to 16 show a second embodiment of a security feature 1' with the associated construction of the security feature T.
- the security feature T of the second embodiment has a higher effective resolution than the security feature 1 of the first embodiment.
- FIGS. 10 to 16 an analogous construction, which was carried out in FIGS. 3 to 9, is shown for the same data matrix code 3.
- the data matrix code 3' in FIG. 10a and the random phase in FIG. 10b are positioned at a different point in the image plane 8 than in FIGS. 3a and 3b.
- the data matrix code 3' is positioned somewhat further away from the center of the image plane 8.
- the fx values of the data matrix codes 3' in FIG. 3a and FIG. 10a remain the same, while the fy values in FIG. 10a are larger because the data matrix code 3' is shifted in the fy direction.
- the complex function G'(fx,fy) is constructed in a manner analogous to the complex function from the amplitude function and the phase function of FIGS. 3a, 3b.
- the complex function G'(fx,fy) and the real part of the Fourier transformation g'(x,y) as well as the other reference symbols are marked with a prime.
- An analog Fourier pattern 2' is produced by Fourier transformation of the amplitude function G'(fx,fy), the real part of which is shown in FIG. 11a.
- a comparison of the real parts of the Fourier transformation g(x,y) in FIG. 4a and the real part of the Fourier transformation g'(x,y) in FIG. 11a clearly shows that the structures in FIG.
- the 50% and the 20% binarized Fourier patterns 21' and 22' which are shown in FIGS. 11b and 11c, are carried out technically in exactly the same way as the binarization in FIGS. 4b, 4c.
- FIG. 11c it can be seen in particular in FIG. 11c that the structures of the 20% binarized Fourier pattern 22' are significantly finer than the structures of the 20% binarized Fourier pattern 22 in FIG. 4c.
- the data matrix code 3', 31', 32' is easy to read , so that the information of the data matrix code 3 is retained.
- FIG. 13 shows a security feature 1'. It is formed from the 20% binarized Fourier pattern 22', which is printed onto the packaging 7 in every first printing process step. In the second printing method step, the QR code 4 is again printed on the already printed 20% binarized Fourier pattern 22'. A Fourier inverse transformation of the originally printed security feature 1 in FIG. 13 leads to an easily readable data matrix code 3' in FIG.
- FIG. 15 again shows a photocopy 11' of the security feature 1' in FIG. 13, the photocopy 11' being printed with a printer at half the resolution of the print in FIG.
- FIG. 16 shows the inverse Fourier transformation of the photocopied security feature 11' in FIG. 15. It can be seen that the reconstructed data matrix code 3' can no longer be read. The information is destroyed. This means that the effective resolution of the security feature 1' in Fig. 13 was sufficient to destroy the information hidden in the 20% binarized Fourier pattern 22' by a photocopy using a conventional printer, while the effective resolution of the Security feature in Fig. 6 was not large enough so that the same photocopy resolution did not lead to the destruction of the information.
- the positioning of the batch-specific first graphic code 3, 3' in the original image 8 can be determined using the effective resolution of the Fourier pattern 2, 2'. determine. If the effective resolution is greater than the resolution of the counterfeit printer used, information is lost during photocopying and the batch-specific first graphic code 3, 3' cannot be reconstructed by an inverse Fourier transformation, ie it cannot be read out.
- the width fx imit and the height fy imit of the original image 8 are determined, as well as the horizontal distance fx_max of the batch-specific first graphic code 3 from the center of the image and the greatest vertical distance fy_max of the batch-specific first graphic code 3 from the center of the image.
- the corresponding distances are indicated in FIG. 2 by double arrows.
- the overall width of the original image is 512 pixels and the height is also 512 pixels.
- the fx_max distance here is 75 pixels
- fy_max is 168 pixels
- fx_limit is 256 pixels
- fy_limit is also 256 pixels.
- the effective resolution of the forier pattern 2 can be determined.
- the Fourier pattern in FIG. 4a is relatively coarse, and the information encoded in the coarse Fourier pattern can still be completely printed or photocopied using a low-resolution printer will.
- Figure 17 shows four packages 7 of a series of packages 7.
- the series of packages 7 is divided into four batches. Each lot is assigned a lot specific lot number 6 here ABCDEF, JK7MQ8, 90LTXS and PK6HG4.
- the batch number 6 is encoded in a 20% binarized Fourier pattern 22' in the manner described above, and the 20% binarized Fourier pattern 22' is printed onto the packaging 7 in a first printing process step.
- the packaging-specific, machine-readable second graphic code 4 is printed on the batch-specific 20% binarized Fourier pattern 22'.
- Each packaging 7 thus receives a packaging-specific graphic code 4, which encodes a packaging-specific serial number 9, here GB4Q3, KLP789, 14FVL, and a batch-specific batch number 6, which is identical for all packaging 7 of the same batch.
- the batch-specific two-dimensional Fourier pattern 22' has such a high effective resolution that if it were photocopied with conventional photocopiers, it can no longer be transformed back into the first graphic code 3', but the information would be destroyed as shown in FIG.
- the security feature 1' printed on the packaging 7 is scanned with a conventional camera of a mobile terminal device, in particular a smartphone.
- the QR code 4 is read out by means of a second reading algorithm and the serial number 9 specific to the packaging is determined.
- the packaging-specific serial number 9 is transmitted to an authentication server by means of a transceiver unit of the mobile terminal.
- the URL of a database server is also encoded in the second graphic code, so that the serial number 9 specific to the packaging can be transmitted to the database server.
- a Fourier transformation program is also stored on the mobile terminal.
- This Fourier transformation program Fourier-transforms the security feature 1' back, and the batch-specific first graphic code 3' that is formed is read out with a first reading algorithm, with the first and second reading algorithms being able to be identical if the code type is the same, and the determined batch number 6 is also transmitted to the authentication server.
- An authentication database is stored on the authentication server, in which all valid combinations of batch numbers 6 and serial numbers 9 are stored. If the transmitted combination of serial number 9 and batch number 6 is found, a positive authentication signal is sent back to the mobile device. The packaging-specific serial number 9 can then be blocked. If a serial number 9 and no batch number 6 is transmitted to the database server after the security feature 1' has been scanned, it will presumably be a bad photocopy of an original security feature 1' on the packaging 7.
- a negative authentication signal can be sent to the mobile end device are returned.
- a negative authentication signal is also sent back to the mobile terminal device by the authentication server if the serial number 9 has already been queried one or more times and is blocked.
- a negative authentication signal is also sent back to the mobile terminal device by the authentication server if the assignment of the individual packaging serial number to the batch number is not correct.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Editing Of Facsimile Originals (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
L'invention se rapporte à un procédé permettant de produire une série de paquets infalsifiables (7) où la série de paquets (7) est divisée en lots, chaque paquet (7) reçoit un numéro de lot (6) spécifique à un lot, et chaque paquet (7) reçoit un numéro de série (9) individuel pour le paquet. Les numéros de lot (6) spécifiques à un lot sont codés pour former un premier code graphique (3) lisible par une machine et spécifique à un lot, le premier code graphique (3) spécifique à un lot est transformé par une transformée de Fourier en motifs de Fourier bidimensionnels (2, 2', 21, 21', 22, 22') spécifiques à un lot, les motifs de Fourier (2, 2', 21, 21', 22, 22') spécifiques à un lot sont imprimés sur les paquets respectifs (7) auxquels sont attribués les numéros de lot (6) dans une première étape de procédé d'impression, les numéros de série (9) individuels pour le paquet sont codés afin de former des seconds codes graphiques (4) individuels pour le paquet lisibles par une machine qui sont imprimés sur les paquets associés (7) dans une seconde étape de procédé d'impression, et le motif de Fourier (2, 2', 21, 21', 22, 22') spécifique à un lot et le second code graphique (4) forment ensemble une caractéristique de sécurité bidimensionnelle infalsifiable (1, 1') pour chaque paquet.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102020215752.9A DE102020215752A1 (de) | 2020-12-11 | 2020-12-11 | Verfahren zur Herstellung einer Serie fälschungssicherer Verpackungen und eine Serie fälschungssicherer Verpackungen, ein Authentifizierungsverfahren und ein Authentifizierungssystem |
PCT/EP2021/082916 WO2022122392A1 (fr) | 2020-12-11 | 2021-11-25 | Procédé permettant de produire une série de paquets infalsifiables, série de paquets infalsifiables, procédé d'authentification et système d'authentification |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4260301A1 true EP4260301A1 (fr) | 2023-10-18 |
Family
ID=78828055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21823200.7A Pending EP4260301A1 (fr) | 2020-12-11 | 2021-11-25 | Procédé permettant de produire une série de paquets infalsifiables, série de paquets infalsifiables, procédé d'authentification et système d'authentification |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4260301A1 (fr) |
CN (1) | CN116601685A (fr) |
DE (1) | DE102020215752A1 (fr) |
WO (1) | WO2022122392A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102022105489B3 (de) | 2022-03-09 | 2023-03-09 | Heidelberger Druckmaschinen Aktiengesellschaft | Verfahren zum Bereitstellen eines Druckprodukts und zugehörigen Authentifikations-Informationen und Verfahren zum Authentifizieren eines Druckprodukts |
CN115230359A (zh) * | 2022-09-22 | 2022-10-25 | 江苏铨通印数字印刷有限公司 | 一种智能数字印刷防伪标识生成使用方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7303123B2 (en) * | 2005-02-07 | 2007-12-04 | Cryovac, Inc. | Method of labeling an item for item-level identification |
WO2012136138A1 (fr) * | 2011-04-04 | 2012-10-11 | Coentre Ventures Llc | Anti-contrefaçon utilisant des codes doubles asymétriques sur un produit |
CN106030615B (zh) * | 2013-12-17 | 2019-06-28 | 因富通国际有限公司 | 复合信息承载装置 |
NZ736162A (en) | 2015-03-18 | 2021-12-24 | Technopak Ltd | Improvements in packaging |
CN105718981B (zh) * | 2016-01-26 | 2019-04-30 | 南京风力舰信息技术有限公司 | 一种制备新型二维码图像全息防伪标签的处理方法 |
DE102017206467A1 (de) | 2017-04-13 | 2018-10-18 | Tesa Scribos Gmbh | Verfahren zur Herstellung eines Sicherheitsmerkmals und zur Authentifizierung eines Sicherheitsmerkmals sowie ein Sicherheitsmerkmal |
DE102017206466A1 (de) * | 2017-04-13 | 2018-10-18 | Tesa Scribos Gmbh | Sicherheitsmerkmal mit Kopierschutz |
DE102019207856A1 (de) | 2019-05-28 | 2020-12-03 | Tesa Scribos Gmbh | Verfahren zur Authentifizierung eines Produktes mittels Fourier-Mustern |
-
2020
- 2020-12-11 DE DE102020215752.9A patent/DE102020215752A1/de active Pending
-
2021
- 2021-11-25 WO PCT/EP2021/082916 patent/WO2022122392A1/fr active Application Filing
- 2021-11-25 CN CN202180083255.7A patent/CN116601685A/zh active Pending
- 2021-11-25 EP EP21823200.7A patent/EP4260301A1/fr active Pending
Also Published As
Publication number | Publication date |
---|---|
CN116601685A (zh) | 2023-08-15 |
DE102020215752A1 (de) | 2022-06-15 |
WO2022122392A1 (fr) | 2022-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69033362T2 (de) | Verfahren zur herstellung eines fälschungssicheren dokuments | |
DE602005004263T2 (de) | Banknoten mit einem aufgedruckten sicherheitsbild, das mit eindimensionaler signalverarbeitung erkannt werden kann | |
EP3610409B1 (fr) | Procédé servant à fabriquer une caractéristique de sécurité et servant à authentifier une caractéristique de sécurité, et caractéristique de sécurité | |
EP0085066B1 (fr) | Procede de tramage d'images en demi-teinte | |
EP4260301A1 (fr) | Procédé permettant de produire une série de paquets infalsifiables, série de paquets infalsifiables, procédé d'authentification et système d'authentification | |
DE19724066B4 (de) | Verfahren zur Korrektur von Geometriefehlern bei der Übertragung von Informationen auf einen Bedruckstoff | |
DE102017206466A1 (de) | Sicherheitsmerkmal mit Kopierschutz | |
DE3416565A1 (de) | Umrasterung eines gespeicherten, digitalen halbtonbildes | |
EP2984814B1 (fr) | Production et reconnaissance de données d'informations d'images imprimables infalsifiables | |
EP3791367A1 (fr) | Procédé permettant de produire des éléments de sécurité qui sont non visibles à l'?il humain et ne peuvent pas être copiés, dans une représentation, et représentation imprimée | |
DE69525579T2 (de) | Vorrichtung und Verfahren zum Sichern eines Dokumentes sowie graphischer Beglaubigungscode | |
WO2005059814A1 (fr) | Procede et systeme pour traiter des donnees d'impression concernant au moins une page a imprimer | |
DE102006019616A1 (de) | Sicherheits- und/oder Wertdokument | |
DE102018220236A1 (de) | Schnelle Bildentzerrung für Bildinspektion | |
EP2635445B1 (fr) | Document de valeur et/ou de sécurité comportant une information codée | |
WO2020152099A1 (fr) | Procédé d'impression de caractéristiques d'authentification au moyen d'une impression matricielle à modulation d'amplitude | |
DE102019132518A1 (de) | Verfahren zur Prüfung einer rasterförmig bedruckten und/oder gestalteten Oberfläche eines Gegenstands und Gegenstand | |
DE102022105489B3 (de) | Verfahren zum Bereitstellen eines Druckprodukts und zugehörigen Authentifikations-Informationen und Verfahren zum Authentifizieren eines Druckprodukts | |
EP0970440A1 (fr) | Procede de traitement d'image et circuit pour modifier la resolution d'image | |
WO2022101355A1 (fr) | Procédé d'impression et d'identification de marques d'authentification au moyen d'une impression tramée modulée en amplitude | |
EP3308348B1 (fr) | Procédé de génération d'un élément de sécurité ayant une information codée de manière cachée dans une représentation graphique, élément de sécurité et procédé de vérification | |
DE102008025785A1 (de) | Verfahren zur Erzeugung eines Sicherungscodes für einen Rasterdruckdatenspeicher und Gegenstand mit Farbrasterdruckdatenspeicher | |
DE102022122498A1 (de) | Verfahren zum Herstellen und Serialisieren einer Mehrzahl von Druckprodukten | |
WO2019076822A1 (fr) | Modèle d'authentification avec des éléments de contraste et des surfaces complémentaires, objet et procédé | |
DE102018125780A1 (de) | Ähnlichkeitsbestimmung eines von einem Druckexemplar erstellten Digitalbildes mit einer Digitalvorlage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230707 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) |