WO2010012059A1 - Varying position print, method for document authentication and method for counterfeit monitoring - Google Patents
Varying position print, method for document authentication and method for counterfeit monitoring Download PDFInfo
- Publication number
- WO2010012059A1 WO2010012059A1 PCT/BR2009/000188 BR2009000188W WO2010012059A1 WO 2010012059 A1 WO2010012059 A1 WO 2010012059A1 BR 2009000188 W BR2009000188 W BR 2009000188W WO 2010012059 A1 WO2010012059 A1 WO 2010012059A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- varying position
- document
- varying
- produced
- Prior art date
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
Definitions
- the present invention refers to a security feature for use in security documents, a method for document authentication and a method to combat the falsification of security documents by the monitoring of the counterfeits.
- the present invention suggests the inclusion in the security document of a "Varying Position Print", which means: a graphic element with a different position in each produced document.
- the protection of the security document occurs like the following: during the scanning of the
- the present invention can be used in combination with another security feature, called "Monitoring Ruler" (see
- the present invention also refers to a "Method for Document Authentication", based on a consistence test to be performed between the "Varying Position Print” and the variable data set of the security document.
- the present invention also refers to a "Method for Counterfeit Monitoring", based on the storage and comparison of information obtained from each "Varying Position Print” reproduction, found in the counterfeits.
- Fig. 1 is a sketch of a security document (4), oriented in relation to horizontal (1) and vertical (2) axes, equiped with three "Varying Position Prints” (5), two “Monitoring Rulers” (6) (see WO/2008/074106) and a variable data set, in the form of text (7) and stored in a security chip (8).
- the first "Varying Position Print” has as motif the figure of a "hand”
- the second has as motif the figure of a "star”
- the proposed security feature (5) is characterized by a print (5) with varying position, in relation to horizontal (1) and vertical (2) axes, in each produced document (4).
- the position of the security feature (5) on the security "10 document (4) can be defined by following rules:
- variable data set (7 and 8) of the security document (4) are calculated by hash functions applied to the variable data set (7 and 8) of the security document (4).
- the proposed security feature (5) can be constituted by different motifs: dots, strokes, letters, numbers, graphic symbols, drawings, 20 images, geometric figures or even barcodes or other form of graphic representation of data.
- the motif to be used in the security feature (5) can be defined by following rules:
- - preset motif in this case, the motif to be used in the 25 "Varying Position Print” is fixed and defined by the document issuer;
- - motif selected by aleatory function in this case, the motif to be used in the "Varying Position Print” (5) is variable and selected by an aleatory number generator algorithm;
- the motif to be used in the "Varying Position Print” (5) is variable and selected by a hash function applied to the variable data set (7 and 8) of the security document (4).
- the proposed security feature (5) can be produced by any process of variable information printing, like: dot matrix printing, ink-jet printing, laser printing, digital offset, laser engraving, etc.
- the proposed security feature (5) can be printed directly on the final support (4) or on intermediate support (not represented), to be later attached to the final support of the security document (4).
- variable data set (7 and 8) for each questioned document (4), hash functions are applied to the variable data set (7 and 8);
- variable data set (7 and 8) is reliable
- variable data set (7 and 8) are stored in a database
- correlations among the seized counterfeits can be established, in order to identify same origin counterfeits, in higher or lower probability, calculated over the quantity of coincident characteristics and their frequency of occurrence in the universe of authentic documents.
- the proposed security feature (5) aims at spreading the document surface (4) with other identifying characteristics, also variable, but less attractive to countefeiter's attention.
- variable data set (7 and 8) is reliable.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Patent of invention of security feature aiming at combating the falsification of security documents, by the monitoring of the counterfeits. It consists of the insertion in the security document (4) of a print (5) with varying position, in relation to horizontal (1) and vertical (2) axes, in each produced document (4), called "Varying Position Print" (5). The present invention also refers to a "Method for Document Authentication", based on a consistence test to be performed between the "Varying Position Print" (5) and the variable data set (7 and 8) of the security document (4). The invention also refers to a "Method for Counterfeit Monitoring", based on the storage and comparison of information obtained from each "Varying Position Print" reproduction (5), found in the counterfeits.
Description
"VARYING POSITION PRINT, METHOD FOR DOCUMENT AUTHENTICATION AND METHOD FOR COUNTERFEIT MONITORING"
The present invention refers to a security feature for use in security documents, a method for document authentication and a method to combat the falsification of security documents by the monitoring of the counterfeits.
Many security features are already used in graphic arts, that try to prevent or make more difficult a counterfeiter's job in unauthorized document reproduction. The existing security features work, usually, like the following: they are elements of hard execution, fabricated by machines and techniques of high complexity and sophistication, unavailable to the general public, which make these elements, in theory, copy-proof. The existing security features work, thus, in a preventive way, discouraging forgery through the insertion of deterrents or difficulties to its achievement.
However, due to modern computing expedients, the drop in prices of graphic technologies and, as a result, their availability, resources like scanners, high definition printers, graphic editors etc, are becoming more and more affordable. In this present-day environment, though it's still impossible to accurately reproduce the expensive and sophisticated security features, excellent simulations of them can be found, absolutely capable of deceiving the common citizen. Thus, even if the conventional security features keep being used to discourage criminal action, it's necessary to admit that there is currently no fraud-proof security feature.
Considering this problem and with the aim at solving it, the present security features has been conceived, seeking to combat counterfeiting, not in a preventive way anymore, but in a reactive way, supporting inhibitory measures to be taken by the competent authorities
5 after the commission of the crime, as will be shown as follows.
Many countries which are concerned about the protection of their security documents have been developing different systems for counterfeit monitoring. In brief, they are databases where relevant information about seized counterfeits is stored. Through data comparison
JLO it's possible to come to helpful conclusions like, for example, the identification of counterfeit families. Amongst the information to be stored, are rather searched those peculiarities capable of unequivocally binding the counterfeits to each other, linking them to a common origin. For this purpose, it's necessary to identify and store the recurrent characteristics of
15 all members of a counterfeit family.
The present invention suggests the inclusion in the security document of a "Varying Position Print", which means: a graphic element with a different position in each produced document. The protection of the security document occurs like the following: during the scanning of the
20 original document, the position of the "Varying Position Print" is captured and will be repeated in all reproduced document. That's because in this process the image of the "Varying Position Print" and the image of the rest of the document are saved together, in the same digital file. So, every counterfeit produced from that same file will bring a reproduction of the
25 "Varying Position Print" occuring, invariably, in the same position, which will serve as a linking element to the identification of the counterfeit
family. An evidence of forgery will be, so, the always constant position of this element that should normally have a varying position. The same works if a photographic reproduction process is used.
For easiness, the present invention can be used in combination with another security feature, called "Monitoring Ruler" (see
WO/2008/074106), in order to register the position of the "Varying
Position Print" without the necessity of an external measurement tool and free from casual deformations that may occur during counterfeit printing or cutting steps. That's because these eventual deformations will occur with the same intensity upon both "Varying Position Print" and "Monitoring
Ruler" reproductions, preserving their relative position, what would not happen if one uses an external ruler.
The present invention also refers to a "Method for Document Authentication", based on a consistence test to be performed between the "Varying Position Print" and the variable data set of the security document.
The present invention also refers to a "Method for Counterfeit Monitoring", based on the storage and comparison of information obtained from each "Varying Position Print" reproduction, found in the counterfeits.
The description below and the associated figure, as non- limitative example, will make the invention clear.
Fig. 1 is a sketch of a security document (4), oriented in relation to horizontal (1) and vertical (2) axes, equiped with three "Varying Position Prints" (5), two "Monitoring Rulers" (6) (see WO/2008/074106)
and a variable data set, in the form of text (7) and stored in a security chip (8). The first "Varying Position Print" has as motif the figure of a "hand", the second has as motif the figure of a "star" and the third one the figure of a "cross".
5 According to what the figure illustrates, the proposed security feature (5) is characterized by a print (5) with varying position, in relation to horizontal (1) and vertical (2) axes, in each produced document (4).
The position of the security feature (5) on the security "10 document (4) can be defined by following rules:
- position calculated by aleatory function: in this case, the horizontal (1) and vertical (2) coordinates of the "Varying Position Print" (5) are calculated by an aleatory number generator algorithm;
- position calculated by hash function: in this case, the 15 horizontal (1) and vertical (2) coordinates of the "Varying Position Print"
(5) are calculated by hash functions applied to the variable data set (7 and 8) of the security document (4).
The proposed security feature (5) can be constituted by different motifs: dots, strokes, letters, numbers, graphic symbols, drawings, 20 images, geometric figures or even barcodes or other form of graphic representation of data.
The motif to be used in the security feature (5) can be defined by following rules:
- preset motif: in this case, the motif to be used in the 25 "Varying Position Print" is fixed and defined by the document issuer;
- motif selected by aleatory function: in this case, the motif to be used in the "Varying Position Print" (5) is variable and selected by an aleatory number generator algorithm;
- motif selected by hash function: in this case, the motif to be used in the "Varying Position Print" (5) is variable and selected by a hash function applied to the variable data set (7 and 8) of the security document (4).
The variational possibilities of the proposed security feature
(5) don't need to be restricted to position or motif characteristics, and can be extended to color and size characteristics, which can also be selected by aleatory or hash functions applied to the variable data set (7 and 8) of the security document (4).
To aggregate more safety to documents equiped with "Varying Position Print" (5), the issuer can opt for producing entirely individualized documents, in other words, with a particular combination of characteristics - positions, motifs, colors and sizes - unique and exclusive for each produced document (4). For this solution it is necessary the use of a database, which will store all combinations already in use, and each new generated combination must be inserted in this database, after the checking that there is no other document with the same characteristics.
The proposed security feature (5) can be produced by any process of variable information printing, like: dot matrix printing, ink-jet printing, laser printing, digital offset, laser engraving, etc.
The proposed security feature (5) can be printed directly on the final support (4) or on intermediate support (not represented), to be later attached to the final support of the security document (4).
For a dissembling use of the proposed security feature, it is recommended the adoption of small sized "Varying Position Prints" (5).
About the proposed "Method for Document Authentication", it is based on a consistence test to be performed between the "Varying Position Prints" (5) and the variable data set (7 and 8) of the security document (4). For the application of said "Method for Document Authentication" it is necessary that the "Varying Position Prints" (5) have been produced with such characteristics - positions, motifs, colors and sizes - selected by hash functions applied to the variable data set (7 and 8) of the security document (4). The method works like the following:
- for each questioned document (4), hash functions are applied to the variable data set (7 and 8);
- with the so obtained values one can discover which would be the caracteristics - position, motif, color and size - of the "Varying Position Print" (5) of an authentic document;
- the so obtained characteristics are then compared with the caracteristics - position, motif, color and size - of the "Varying Position
Print" (5) found in the questioned document (4);
- in case of perfect conformity, the variable data set (7 and 8) is reliable;
- in case of unconformity, the questioned document (4) has suffered some kind of adulteration.
About the proposed "Method for Counterfeit Monitoring", it is based on the storage and comparison of information obtained from each "Varying Position Print" reproduction (5), found in the counterfeits (4). The method works like the following: - for each seized counterfeit (4), its general information
(model, numbers, issuer identification, manufacturer identification, signatures identification, etc) and its variable data set (7 and 8) are stored in a database;
- for each "Varying Position Print" reproduction (5), its characteristics - position, motif, color and size - of occurrence in the counterfeit (4) are extracted and also inserted in the database;
- through the comparison of stored information, correlations among the seized counterfeits can be established, in order to identify same origin counterfeits, in higher or lower probability, calculated over the quantity of coincident characteristics and their frequency of occurrence in the universe of authentic documents.
It's notorious that a counterfeiter's attack has always the variable data set (7 as 8) as primary target. By this practical observation, the proposed security feature (5) aims at spreading the document surface (4) with other identifying characteristics, also variable, but less attractive to countefeiter's attention.
Depending on the extent of the counterfeiter's attack upon the "Varying Position Prints" (5), it will be possible to reliably monitor the counterfeits and, in some cases, even discover which was the authentic
document used as a model to the counterfeit (in case of individualized document producing).
By the analysis of the application example of Fig. 1, it's possible to observe that the first "Varying Position Print" (5), with the motif of a "hand", is positioned on coordinates {4,18}. The second
"Varying Position Print" (5), with the motif of a "star", is positioned on coordinates {8,5}. The third "Varying Position Print" (5), with the motif of a "cross", is positioned on coordinates {27,4}, in relation to the
"Monitoring Rulers" (6) (see WO/2008/074106) and to horizontal (1) and vertical (2) axes respectively.
According to the proposed "Method for Document
Authentication", the hash functions must be applied to the variable data set
(7 and 8) of the security document (4). If the so obtained result is "hand" in
{4,18}, "star" in {8,5} and "cross" in {27,4}, the variable data set (7 and 8) is reliable.
Supposing now that the questioned document (4) is a counterfeit. According to the proposed "Method for Counterfeit Monitoring", the characteristics - positions, motifs, colors and sizes - of each "Varying Position Print" reproduction (5), must be stored in a database - in this example: the motif of a "hand" associated to coordinates {4,18}, the motif of a "star" associated to coordinates {8,5} and the motif of a "cross" associated to coordinates {27,4}.
Claims
1. "Varying Position Print", a security feature aiming at combating the falsification of security documents, characterized by a print (5) with varying position in each produced document (4).
2. "Varying Position Print", according to claim 1, characterized by a print (5) with aleatory position in each produced document (4).
3. "Varying Position Print", according to claim 1, characterized by a print (5) which position is defined by hash functions, applied to the variable data set (7 and 8) of each produced document (4).
4. "Varying Position Print", according to claims 1 to 3, characterized by a print (5) with the motif of: dots, strokes, letters, numbers, graphic symbols, drawings, images, geometric figures, barcodes or other form of graphic representation of data.
5. "Varying Position Print", according to claims 1 to 4, characterized by a print (5) with varying motif in each produced document
(4).
6. "Varying Position Print", according to claims 1 to 5, characterized by a print (5) with aleatory motif in each produced document (4).
7. "Varying Position Print", according to claims 1 to 5, characterized by a print (5) which motif is defined by hash function, applied to the variable data set (7 and 8) of each produced document (4).
8. "Varying Position Print", according to claims 1 to 7, characterized by a print (5) with varying color in each produced document (4).
9. "Varying Position Print", according to claims 1 to 8, 5 characterized by a print (5) with aleatory color in each produced document
(4).
10. "Varying Position Print", according to claims 1 to 8, characterized by a print (5) which color is defined by hash function, applied to the variable data set (7 and 8) of each produced document (4).
*10
11. "Varying Position Print", according to claims 1 to 10, characterized by a print (5) with varying size in each produced document
(4).
12. "Varying Position Print", according to claims 1 to 11, characterized by a print (5) with aleatory size in each produced document
15 (4).
13. "Varying Position Print", according to claims 1 to 11, characterized by a print (5) which size is defined by hash function, applied to the variable data set (7 and 8) of each produced document (4).
14. "Varying Position Print", according to claims 1 to 13, 20 characterized by a print (5) produced by any process capable of variable information printing, like: dot matrix printing, ink-jet printing, laser printing, digital offset and laser engraving.
15. "Varying Position Print", according to claims 1 to 14, characterized by a print (5) produced directly on the final support (4).
16. "Varying Position Print", according to claims 1 to 14, characterized by a print (5) produced on intermediate support, which is later attached to the final support (4).
17. "Varying Position Print", according to claims 1 to 16, 5 characterized by a combination of characteristics - position, motif, color and size — unique and exclusive for each produced document (4).
18. Application of "Varying Position Print", according to claims 1 to 17, to document authentication, characterized by a consistence test to be performed between the "Varying Position Print" (5) and the
"10 variable data set (7 and 8) of the security document (4).
19. "Method for Document Authentication", as an application of "Varying Position Print", according to claims 1 to 17, to document authentication, according to claim 18, characterized by the following steps:
15 - for each questioned document (4), hash functions are applied to the variable data set (7 and 8);
- with the so obtained values one can discover which would be the caracteristics - position, motif, color and size - of the "Varying Position Print" (5) of an authentic document;
20 - the so obtained characteristics are then compared with the caracteristics - position, motif, color and size - of the "Varying Position Print" (5) found in the questioned document (4);
- in case of perfect conformity, the variable data set (7 and 8) is reliable; - in case of unconformity, the questioned document (4) has suffered some kind of adulteration.
20. Application of "Varying Position Print", according to claims 1 to 17, to the combat of falsification of security documents, by the
5 monitoring of the counterfeits, characterized by the storage and comparison of information obtained from each "Varying Position Print" reproduction (5) found in the counterfeits (4).
21. "Method for Counterfeit Monitoring", as an application of "Varying Position Print", according to claims 1 to 17, to the combat of υ10 falsification of security documents, by the monitoring of the counterfeits, according to claim 20, characterized by the following steps:
- for each seized counterfeit (4), its general information (model, numbers, issuer identification, manufacturer identification, signatures identification, etc) and its variable data set (7 and 8) are stored in
15 a database;
- for each "Varying Position Print" reproduction (5), its characteristics - position, motif, color and size - of occurrence in the counterfeit (4) are extracted and also inserted in the database;
- through the comparison of stored information, correlations 20 among the seized counterfeits can be established, in order to identify same origin counterfeits, in higher or lower probability, calculated over the quantity of coincident characteristics and their frequency of occurrence in the universe of authentic documents.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BRPI0802867-2 | 2008-07-28 | ||
BRPI0802867-2A BRPI0802867A2 (en) | 2008-07-28 | 2008-07-28 | variable position printing, document authentication method, and counterfeit monitoring method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010012059A1 true WO2010012059A1 (en) | 2010-02-04 |
Family
ID=41609864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/BR2009/000188 WO2010012059A1 (en) | 2008-07-28 | 2009-06-29 | Varying position print, method for document authentication and method for counterfeit monitoring |
Country Status (2)
Country | Link |
---|---|
BR (1) | BRPI0802867A2 (en) |
WO (1) | WO2010012059A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ITVI20100225A1 (en) * | 2010-08-05 | 2012-02-06 | Gianluca Frasson | FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE |
EP2498206A1 (en) * | 2011-03-10 | 2012-09-12 | Adalbert Gubo | Process and apparatus to control multi-step processes |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0712012A1 (en) * | 1994-11-09 | 1996-05-15 | International Business Machines Corporation | Authentication label and authenticating pattern incorporating diffracting structure and method of fabricating them |
WO2003057503A1 (en) * | 2001-12-28 | 2003-07-17 | Baggeroer F Charles | Security printing apparatus and method |
EP1569166A2 (en) * | 2004-02-27 | 2005-08-31 | Microsoft Corporation | Counterfeit and tamper resistant labels with randomly occurring features |
DE102006032234A1 (en) * | 2006-07-12 | 2008-01-17 | Tesa Scribos Gmbh | Method for applying a security feature to a security document and security document with a security feature |
WO2008074106A2 (en) * | 2006-12-18 | 2008-06-26 | Villela Carlos Andre Xavier | Monitoring ruler |
-
2008
- 2008-07-28 BR BRPI0802867-2A patent/BRPI0802867A2/en not_active IP Right Cessation
-
2009
- 2009-06-29 WO PCT/BR2009/000188 patent/WO2010012059A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0712012A1 (en) * | 1994-11-09 | 1996-05-15 | International Business Machines Corporation | Authentication label and authenticating pattern incorporating diffracting structure and method of fabricating them |
WO2003057503A1 (en) * | 2001-12-28 | 2003-07-17 | Baggeroer F Charles | Security printing apparatus and method |
EP1569166A2 (en) * | 2004-02-27 | 2005-08-31 | Microsoft Corporation | Counterfeit and tamper resistant labels with randomly occurring features |
DE102006032234A1 (en) * | 2006-07-12 | 2008-01-17 | Tesa Scribos Gmbh | Method for applying a security feature to a security document and security document with a security feature |
WO2008074106A2 (en) * | 2006-12-18 | 2008-06-26 | Villela Carlos Andre Xavier | Monitoring ruler |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ITVI20100225A1 (en) * | 2010-08-05 | 2012-02-06 | Gianluca Frasson | FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE |
WO2012017468A1 (en) * | 2010-08-05 | 2012-02-09 | Gianluca Frasson | Anti- forgery paper document form |
EP2498206A1 (en) * | 2011-03-10 | 2012-09-12 | Adalbert Gubo | Process and apparatus to control multi-step processes |
WO2012120153A1 (en) * | 2011-03-10 | 2012-09-13 | Adalbert Gubo | Device to document processes |
US9202179B2 (en) | 2011-03-10 | 2015-12-01 | Adalbert Gubo | Device to document processes |
CN103843019B (en) * | 2011-03-10 | 2017-04-26 | 阿达尔伯特·古波 | Device to document processes |
Also Published As
Publication number | Publication date |
---|---|
BRPI0802867A2 (en) | 2010-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2815567B1 (en) | Security element and method to inspect authenticity of a print | |
CN105706107B (en) | The method of the certification of two-dimensional bar and this bar code | |
US7878549B2 (en) | Printed substrate having embedded covert information | |
US9224087B2 (en) | Secure identification of a product | |
CN108602374B (en) | Authentication of an object provided with a security element | |
US8289579B2 (en) | Variable guilloche and method | |
US11715309B2 (en) | Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image | |
US20100027851A1 (en) | Apparatus, method and process for the stochastic marking and tracking of printed products | |
US20110038012A1 (en) | Method and device against forgery | |
US10279583B2 (en) | System and method for storing digitally printable security features used in the creation of secure documents | |
JP2007505762A (en) | Article authentication system and method | |
US6636614B1 (en) | Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph | |
CN116601685A (en) | Method for producing a series of security packages, authentication method and authentication system | |
WO2010012059A1 (en) | Varying position print, method for document authentication and method for counterfeit monitoring | |
WO2017137155A1 (en) | Verification of an object provided with a security element | |
US20220150378A1 (en) | Method of Printing Authentication Indicators with Amplitude Modulated Halftone Printing | |
WO2009066970A1 (en) | Method for verifying the authencity of document | |
Garg et al. | Analysis of Document Security Features | |
KR101858965B1 (en) | Method of inserting authentication distinction code and method of distincting authentication of product | |
WO2008151398A1 (en) | Rotary seal, monitoring protractor, printing form for rotary seal and method to counterfeit monitoring | |
Kumar | Study of Security Features for Enhancing the Security of Secured Documents of Universities | |
JP2019137042A (en) | Variable information printed matter and method for creating variable information printed matter data | |
WO2017138842A1 (en) | Method for manufacturing a value document and verifying the authenticity of same | |
IL96969A (en) | Process and device for authenticating documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09802294 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09802294 Country of ref document: EP Kind code of ref document: A1 |