WO2010012059A1 - Varying position print, method for document authentication and method for counterfeit monitoring - Google Patents

Varying position print, method for document authentication and method for counterfeit monitoring Download PDF

Info

Publication number
WO2010012059A1
WO2010012059A1 PCT/BR2009/000188 BR2009000188W WO2010012059A1 WO 2010012059 A1 WO2010012059 A1 WO 2010012059A1 BR 2009000188 W BR2009000188 W BR 2009000188W WO 2010012059 A1 WO2010012059 A1 WO 2010012059A1
Authority
WO
WIPO (PCT)
Prior art keywords
print
varying position
document
varying
produced
Prior art date
Application number
PCT/BR2009/000188
Other languages
French (fr)
Inventor
Carlos André Xavier VILLELA
Original Assignee
Villela Carlos Andre Xavier
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Villela Carlos Andre Xavier filed Critical Villela Carlos Andre Xavier
Publication of WO2010012059A1 publication Critical patent/WO2010012059A1/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching

Definitions

  • the present invention refers to a security feature for use in security documents, a method for document authentication and a method to combat the falsification of security documents by the monitoring of the counterfeits.
  • the present invention suggests the inclusion in the security document of a "Varying Position Print", which means: a graphic element with a different position in each produced document.
  • the protection of the security document occurs like the following: during the scanning of the
  • the present invention can be used in combination with another security feature, called "Monitoring Ruler" (see
  • the present invention also refers to a "Method for Document Authentication", based on a consistence test to be performed between the "Varying Position Print” and the variable data set of the security document.
  • the present invention also refers to a "Method for Counterfeit Monitoring", based on the storage and comparison of information obtained from each "Varying Position Print” reproduction, found in the counterfeits.
  • Fig. 1 is a sketch of a security document (4), oriented in relation to horizontal (1) and vertical (2) axes, equiped with three "Varying Position Prints” (5), two “Monitoring Rulers” (6) (see WO/2008/074106) and a variable data set, in the form of text (7) and stored in a security chip (8).
  • the first "Varying Position Print” has as motif the figure of a "hand”
  • the second has as motif the figure of a "star”
  • the proposed security feature (5) is characterized by a print (5) with varying position, in relation to horizontal (1) and vertical (2) axes, in each produced document (4).
  • the position of the security feature (5) on the security "10 document (4) can be defined by following rules:
  • variable data set (7 and 8) of the security document (4) are calculated by hash functions applied to the variable data set (7 and 8) of the security document (4).
  • the proposed security feature (5) can be constituted by different motifs: dots, strokes, letters, numbers, graphic symbols, drawings, 20 images, geometric figures or even barcodes or other form of graphic representation of data.
  • the motif to be used in the security feature (5) can be defined by following rules:
  • - preset motif in this case, the motif to be used in the 25 "Varying Position Print” is fixed and defined by the document issuer;
  • - motif selected by aleatory function in this case, the motif to be used in the "Varying Position Print” (5) is variable and selected by an aleatory number generator algorithm;
  • the motif to be used in the "Varying Position Print” (5) is variable and selected by a hash function applied to the variable data set (7 and 8) of the security document (4).
  • the proposed security feature (5) can be produced by any process of variable information printing, like: dot matrix printing, ink-jet printing, laser printing, digital offset, laser engraving, etc.
  • the proposed security feature (5) can be printed directly on the final support (4) or on intermediate support (not represented), to be later attached to the final support of the security document (4).
  • variable data set (7 and 8) for each questioned document (4), hash functions are applied to the variable data set (7 and 8);
  • variable data set (7 and 8) is reliable
  • variable data set (7 and 8) are stored in a database
  • correlations among the seized counterfeits can be established, in order to identify same origin counterfeits, in higher or lower probability, calculated over the quantity of coincident characteristics and their frequency of occurrence in the universe of authentic documents.
  • the proposed security feature (5) aims at spreading the document surface (4) with other identifying characteristics, also variable, but less attractive to countefeiter's attention.
  • variable data set (7 and 8) is reliable.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Patent of invention of security feature aiming at combating the falsification of security documents, by the monitoring of the counterfeits. It consists of the insertion in the security document (4) of a print (5) with varying position, in relation to horizontal (1) and vertical (2) axes, in each produced document (4), called "Varying Position Print" (5). The present invention also refers to a "Method for Document Authentication", based on a consistence test to be performed between the "Varying Position Print" (5) and the variable data set (7 and 8) of the security document (4). The invention also refers to a "Method for Counterfeit Monitoring", based on the storage and comparison of information obtained from each "Varying Position Print" reproduction (5), found in the counterfeits.

Description

"VARYING POSITION PRINT, METHOD FOR DOCUMENT AUTHENTICATION AND METHOD FOR COUNTERFEIT MONITORING"
The present invention refers to a security feature for use in security documents, a method for document authentication and a method to combat the falsification of security documents by the monitoring of the counterfeits.
Many security features are already used in graphic arts, that try to prevent or make more difficult a counterfeiter's job in unauthorized document reproduction. The existing security features work, usually, like the following: they are elements of hard execution, fabricated by machines and techniques of high complexity and sophistication, unavailable to the general public, which make these elements, in theory, copy-proof. The existing security features work, thus, in a preventive way, discouraging forgery through the insertion of deterrents or difficulties to its achievement.
However, due to modern computing expedients, the drop in prices of graphic technologies and, as a result, their availability, resources like scanners, high definition printers, graphic editors etc, are becoming more and more affordable. In this present-day environment, though it's still impossible to accurately reproduce the expensive and sophisticated security features, excellent simulations of them can be found, absolutely capable of deceiving the common citizen. Thus, even if the conventional security features keep being used to discourage criminal action, it's necessary to admit that there is currently no fraud-proof security feature. Considering this problem and with the aim at solving it, the present security features has been conceived, seeking to combat counterfeiting, not in a preventive way anymore, but in a reactive way, supporting inhibitory measures to be taken by the competent authorities
5 after the commission of the crime, as will be shown as follows.
Many countries which are concerned about the protection of their security documents have been developing different systems for counterfeit monitoring. In brief, they are databases where relevant information about seized counterfeits is stored. Through data comparison
JLO it's possible to come to helpful conclusions like, for example, the identification of counterfeit families. Amongst the information to be stored, are rather searched those peculiarities capable of unequivocally binding the counterfeits to each other, linking them to a common origin. For this purpose, it's necessary to identify and store the recurrent characteristics of
15 all members of a counterfeit family.
The present invention suggests the inclusion in the security document of a "Varying Position Print", which means: a graphic element with a different position in each produced document. The protection of the security document occurs like the following: during the scanning of the
20 original document, the position of the "Varying Position Print" is captured and will be repeated in all reproduced document. That's because in this process the image of the "Varying Position Print" and the image of the rest of the document are saved together, in the same digital file. So, every counterfeit produced from that same file will bring a reproduction of the
25 "Varying Position Print" occuring, invariably, in the same position, which will serve as a linking element to the identification of the counterfeit family. An evidence of forgery will be, so, the always constant position of this element that should normally have a varying position. The same works if a photographic reproduction process is used.
For easiness, the present invention can be used in combination with another security feature, called "Monitoring Ruler" (see
WO/2008/074106), in order to register the position of the "Varying
Position Print" without the necessity of an external measurement tool and free from casual deformations that may occur during counterfeit printing or cutting steps. That's because these eventual deformations will occur with the same intensity upon both "Varying Position Print" and "Monitoring
Ruler" reproductions, preserving their relative position, what would not happen if one uses an external ruler.
The present invention also refers to a "Method for Document Authentication", based on a consistence test to be performed between the "Varying Position Print" and the variable data set of the security document.
The present invention also refers to a "Method for Counterfeit Monitoring", based on the storage and comparison of information obtained from each "Varying Position Print" reproduction, found in the counterfeits.
The description below and the associated figure, as non- limitative example, will make the invention clear.
Fig. 1 is a sketch of a security document (4), oriented in relation to horizontal (1) and vertical (2) axes, equiped with three "Varying Position Prints" (5), two "Monitoring Rulers" (6) (see WO/2008/074106) and a variable data set, in the form of text (7) and stored in a security chip (8). The first "Varying Position Print" has as motif the figure of a "hand", the second has as motif the figure of a "star" and the third one the figure of a "cross".
5 According to what the figure illustrates, the proposed security feature (5) is characterized by a print (5) with varying position, in relation to horizontal (1) and vertical (2) axes, in each produced document (4).
The position of the security feature (5) on the security "10 document (4) can be defined by following rules:
- position calculated by aleatory function: in this case, the horizontal (1) and vertical (2) coordinates of the "Varying Position Print" (5) are calculated by an aleatory number generator algorithm;
- position calculated by hash function: in this case, the 15 horizontal (1) and vertical (2) coordinates of the "Varying Position Print"
(5) are calculated by hash functions applied to the variable data set (7 and 8) of the security document (4).
The proposed security feature (5) can be constituted by different motifs: dots, strokes, letters, numbers, graphic symbols, drawings, 20 images, geometric figures or even barcodes or other form of graphic representation of data.
The motif to be used in the security feature (5) can be defined by following rules:
- preset motif: in this case, the motif to be used in the 25 "Varying Position Print" is fixed and defined by the document issuer; - motif selected by aleatory function: in this case, the motif to be used in the "Varying Position Print" (5) is variable and selected by an aleatory number generator algorithm;
- motif selected by hash function: in this case, the motif to be used in the "Varying Position Print" (5) is variable and selected by a hash function applied to the variable data set (7 and 8) of the security document (4).
The variational possibilities of the proposed security feature
(5) don't need to be restricted to position or motif characteristics, and can be extended to color and size characteristics, which can also be selected by aleatory or hash functions applied to the variable data set (7 and 8) of the security document (4).
To aggregate more safety to documents equiped with "Varying Position Print" (5), the issuer can opt for producing entirely individualized documents, in other words, with a particular combination of characteristics - positions, motifs, colors and sizes - unique and exclusive for each produced document (4). For this solution it is necessary the use of a database, which will store all combinations already in use, and each new generated combination must be inserted in this database, after the checking that there is no other document with the same characteristics.
The proposed security feature (5) can be produced by any process of variable information printing, like: dot matrix printing, ink-jet printing, laser printing, digital offset, laser engraving, etc. The proposed security feature (5) can be printed directly on the final support (4) or on intermediate support (not represented), to be later attached to the final support of the security document (4).
For a dissembling use of the proposed security feature, it is recommended the adoption of small sized "Varying Position Prints" (5).
About the proposed "Method for Document Authentication", it is based on a consistence test to be performed between the "Varying Position Prints" (5) and the variable data set (7 and 8) of the security document (4). For the application of said "Method for Document Authentication" it is necessary that the "Varying Position Prints" (5) have been produced with such characteristics - positions, motifs, colors and sizes - selected by hash functions applied to the variable data set (7 and 8) of the security document (4). The method works like the following:
- for each questioned document (4), hash functions are applied to the variable data set (7 and 8);
- with the so obtained values one can discover which would be the caracteristics - position, motif, color and size - of the "Varying Position Print" (5) of an authentic document;
- the so obtained characteristics are then compared with the caracteristics - position, motif, color and size - of the "Varying Position
Print" (5) found in the questioned document (4);
- in case of perfect conformity, the variable data set (7 and 8) is reliable;
- in case of unconformity, the questioned document (4) has suffered some kind of adulteration. About the proposed "Method for Counterfeit Monitoring", it is based on the storage and comparison of information obtained from each "Varying Position Print" reproduction (5), found in the counterfeits (4). The method works like the following: - for each seized counterfeit (4), its general information
(model, numbers, issuer identification, manufacturer identification, signatures identification, etc) and its variable data set (7 and 8) are stored in a database;
- for each "Varying Position Print" reproduction (5), its characteristics - position, motif, color and size - of occurrence in the counterfeit (4) are extracted and also inserted in the database;
- through the comparison of stored information, correlations among the seized counterfeits can be established, in order to identify same origin counterfeits, in higher or lower probability, calculated over the quantity of coincident characteristics and their frequency of occurrence in the universe of authentic documents.
It's notorious that a counterfeiter's attack has always the variable data set (7 as 8) as primary target. By this practical observation, the proposed security feature (5) aims at spreading the document surface (4) with other identifying characteristics, also variable, but less attractive to countefeiter's attention.
Depending on the extent of the counterfeiter's attack upon the "Varying Position Prints" (5), it will be possible to reliably monitor the counterfeits and, in some cases, even discover which was the authentic document used as a model to the counterfeit (in case of individualized document producing).
By the analysis of the application example of Fig. 1, it's possible to observe that the first "Varying Position Print" (5), with the motif of a "hand", is positioned on coordinates {4,18}. The second
"Varying Position Print" (5), with the motif of a "star", is positioned on coordinates {8,5}. The third "Varying Position Print" (5), with the motif of a "cross", is positioned on coordinates {27,4}, in relation to the
"Monitoring Rulers" (6) (see WO/2008/074106) and to horizontal (1) and vertical (2) axes respectively.
According to the proposed "Method for Document
Authentication", the hash functions must be applied to the variable data set
(7 and 8) of the security document (4). If the so obtained result is "hand" in
{4,18}, "star" in {8,5} and "cross" in {27,4}, the variable data set (7 and 8) is reliable.
Supposing now that the questioned document (4) is a counterfeit. According to the proposed "Method for Counterfeit Monitoring", the characteristics - positions, motifs, colors and sizes - of each "Varying Position Print" reproduction (5), must be stored in a database - in this example: the motif of a "hand" associated to coordinates {4,18}, the motif of a "star" associated to coordinates {8,5} and the motif of a "cross" associated to coordinates {27,4}.

Claims

1. "Varying Position Print", a security feature aiming at combating the falsification of security documents, characterized by a print (5) with varying position in each produced document (4).
2. "Varying Position Print", according to claim 1, characterized by a print (5) with aleatory position in each produced document (4).
3. "Varying Position Print", according to claim 1, characterized by a print (5) which position is defined by hash functions, applied to the variable data set (7 and 8) of each produced document (4).
4. "Varying Position Print", according to claims 1 to 3, characterized by a print (5) with the motif of: dots, strokes, letters, numbers, graphic symbols, drawings, images, geometric figures, barcodes or other form of graphic representation of data.
5. "Varying Position Print", according to claims 1 to 4, characterized by a print (5) with varying motif in each produced document
(4).
6. "Varying Position Print", according to claims 1 to 5, characterized by a print (5) with aleatory motif in each produced document (4).
7. "Varying Position Print", according to claims 1 to 5, characterized by a print (5) which motif is defined by hash function, applied to the variable data set (7 and 8) of each produced document (4).
8. "Varying Position Print", according to claims 1 to 7, characterized by a print (5) with varying color in each produced document (4).
9. "Varying Position Print", according to claims 1 to 8, 5 characterized by a print (5) with aleatory color in each produced document
(4).
10. "Varying Position Print", according to claims 1 to 8, characterized by a print (5) which color is defined by hash function, applied to the variable data set (7 and 8) of each produced document (4).
*10
11. "Varying Position Print", according to claims 1 to 10, characterized by a print (5) with varying size in each produced document
(4).
12. "Varying Position Print", according to claims 1 to 11, characterized by a print (5) with aleatory size in each produced document
15 (4).
13. "Varying Position Print", according to claims 1 to 11, characterized by a print (5) which size is defined by hash function, applied to the variable data set (7 and 8) of each produced document (4).
14. "Varying Position Print", according to claims 1 to 13, 20 characterized by a print (5) produced by any process capable of variable information printing, like: dot matrix printing, ink-jet printing, laser printing, digital offset and laser engraving.
15. "Varying Position Print", according to claims 1 to 14, characterized by a print (5) produced directly on the final support (4).
16. "Varying Position Print", according to claims 1 to 14, characterized by a print (5) produced on intermediate support, which is later attached to the final support (4).
17. "Varying Position Print", according to claims 1 to 16, 5 characterized by a combination of characteristics - position, motif, color and size — unique and exclusive for each produced document (4).
18. Application of "Varying Position Print", according to claims 1 to 17, to document authentication, characterized by a consistence test to be performed between the "Varying Position Print" (5) and the
"10 variable data set (7 and 8) of the security document (4).
19. "Method for Document Authentication", as an application of "Varying Position Print", according to claims 1 to 17, to document authentication, according to claim 18, characterized by the following steps:
15 - for each questioned document (4), hash functions are applied to the variable data set (7 and 8);
- with the so obtained values one can discover which would be the caracteristics - position, motif, color and size - of the "Varying Position Print" (5) of an authentic document;
20 - the so obtained characteristics are then compared with the caracteristics - position, motif, color and size - of the "Varying Position Print" (5) found in the questioned document (4);
- in case of perfect conformity, the variable data set (7 and 8) is reliable; - in case of unconformity, the questioned document (4) has suffered some kind of adulteration.
20. Application of "Varying Position Print", according to claims 1 to 17, to the combat of falsification of security documents, by the
5 monitoring of the counterfeits, characterized by the storage and comparison of information obtained from each "Varying Position Print" reproduction (5) found in the counterfeits (4).
21. "Method for Counterfeit Monitoring", as an application of "Varying Position Print", according to claims 1 to 17, to the combat of υ10 falsification of security documents, by the monitoring of the counterfeits, according to claim 20, characterized by the following steps:
- for each seized counterfeit (4), its general information (model, numbers, issuer identification, manufacturer identification, signatures identification, etc) and its variable data set (7 and 8) are stored in
15 a database;
- for each "Varying Position Print" reproduction (5), its characteristics - position, motif, color and size - of occurrence in the counterfeit (4) are extracted and also inserted in the database;
- through the comparison of stored information, correlations 20 among the seized counterfeits can be established, in order to identify same origin counterfeits, in higher or lower probability, calculated over the quantity of coincident characteristics and their frequency of occurrence in the universe of authentic documents.
PCT/BR2009/000188 2008-07-28 2009-06-29 Varying position print, method for document authentication and method for counterfeit monitoring WO2010012059A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
BRPI0802867-2 2008-07-28
BRPI0802867-2A BRPI0802867A2 (en) 2008-07-28 2008-07-28 variable position printing, document authentication method, and counterfeit monitoring method

Publications (1)

Publication Number Publication Date
WO2010012059A1 true WO2010012059A1 (en) 2010-02-04

Family

ID=41609864

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/BR2009/000188 WO2010012059A1 (en) 2008-07-28 2009-06-29 Varying position print, method for document authentication and method for counterfeit monitoring

Country Status (2)

Country Link
BR (1) BRPI0802867A2 (en)
WO (1) WO2010012059A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITVI20100225A1 (en) * 2010-08-05 2012-02-06 Gianluca Frasson FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE
EP2498206A1 (en) * 2011-03-10 2012-09-12 Adalbert Gubo Process and apparatus to control multi-step processes

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0712012A1 (en) * 1994-11-09 1996-05-15 International Business Machines Corporation Authentication label and authenticating pattern incorporating diffracting structure and method of fabricating them
WO2003057503A1 (en) * 2001-12-28 2003-07-17 Baggeroer F Charles Security printing apparatus and method
EP1569166A2 (en) * 2004-02-27 2005-08-31 Microsoft Corporation Counterfeit and tamper resistant labels with randomly occurring features
DE102006032234A1 (en) * 2006-07-12 2008-01-17 Tesa Scribos Gmbh Method for applying a security feature to a security document and security document with a security feature
WO2008074106A2 (en) * 2006-12-18 2008-06-26 Villela Carlos Andre Xavier Monitoring ruler

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0712012A1 (en) * 1994-11-09 1996-05-15 International Business Machines Corporation Authentication label and authenticating pattern incorporating diffracting structure and method of fabricating them
WO2003057503A1 (en) * 2001-12-28 2003-07-17 Baggeroer F Charles Security printing apparatus and method
EP1569166A2 (en) * 2004-02-27 2005-08-31 Microsoft Corporation Counterfeit and tamper resistant labels with randomly occurring features
DE102006032234A1 (en) * 2006-07-12 2008-01-17 Tesa Scribos Gmbh Method for applying a security feature to a security document and security document with a security feature
WO2008074106A2 (en) * 2006-12-18 2008-06-26 Villela Carlos Andre Xavier Monitoring ruler

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITVI20100225A1 (en) * 2010-08-05 2012-02-06 Gianluca Frasson FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE
WO2012017468A1 (en) * 2010-08-05 2012-02-09 Gianluca Frasson Anti- forgery paper document form
EP2498206A1 (en) * 2011-03-10 2012-09-12 Adalbert Gubo Process and apparatus to control multi-step processes
WO2012120153A1 (en) * 2011-03-10 2012-09-13 Adalbert Gubo Device to document processes
US9202179B2 (en) 2011-03-10 2015-12-01 Adalbert Gubo Device to document processes
CN103843019B (en) * 2011-03-10 2017-04-26 阿达尔伯特·古波 Device to document processes

Also Published As

Publication number Publication date
BRPI0802867A2 (en) 2010-03-30

Similar Documents

Publication Publication Date Title
EP2815567B1 (en) Security element and method to inspect authenticity of a print
CN105706107B (en) The method of the certification of two-dimensional bar and this bar code
US7878549B2 (en) Printed substrate having embedded covert information
US9224087B2 (en) Secure identification of a product
CN108602374B (en) Authentication of an object provided with a security element
US8289579B2 (en) Variable guilloche and method
US11715309B2 (en) Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image
US20100027851A1 (en) Apparatus, method and process for the stochastic marking and tracking of printed products
US20110038012A1 (en) Method and device against forgery
US10279583B2 (en) System and method for storing digitally printable security features used in the creation of secure documents
JP2007505762A (en) Article authentication system and method
US6636614B1 (en) Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph
CN116601685A (en) Method for producing a series of security packages, authentication method and authentication system
WO2010012059A1 (en) Varying position print, method for document authentication and method for counterfeit monitoring
WO2017137155A1 (en) Verification of an object provided with a security element
US20220150378A1 (en) Method of Printing Authentication Indicators with Amplitude Modulated Halftone Printing
WO2009066970A1 (en) Method for verifying the authencity of document
Garg et al. Analysis of Document Security Features
KR101858965B1 (en) Method of inserting authentication distinction code and method of distincting authentication of product
WO2008151398A1 (en) Rotary seal, monitoring protractor, printing form for rotary seal and method to counterfeit monitoring
Kumar Study of Security Features for Enhancing the Security of Secured Documents of Universities
JP2019137042A (en) Variable information printed matter and method for creating variable information printed matter data
WO2017138842A1 (en) Method for manufacturing a value document and verifying the authenticity of same
IL96969A (en) Process and device for authenticating documents

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09802294

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09802294

Country of ref document: EP

Kind code of ref document: A1