WO2014167103A1 - Security feature and object with security feature - Google Patents

Security feature and object with security feature Download PDF

Info

Publication number
WO2014167103A1
WO2014167103A1 PCT/EP2014/057399 EP2014057399W WO2014167103A1 WO 2014167103 A1 WO2014167103 A1 WO 2014167103A1 EP 2014057399 W EP2014057399 W EP 2014057399W WO 2014167103 A1 WO2014167103 A1 WO 2014167103A1
Authority
WO
WIPO (PCT)
Prior art keywords
security feature
marks
feature according
data
additional
Prior art date
Application number
PCT/EP2014/057399
Other languages
French (fr)
Inventor
Steffen Noehte
Stefan BORGSMÜLLER
Kay Schulte-Wieking
Original Assignee
European Central Bank
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by European Central Bank filed Critical European Central Bank
Priority to EP14716594.8A priority Critical patent/EP2984607A1/en
Publication of WO2014167103A1 publication Critical patent/WO2014167103A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/305Associated digital information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/373Metallic materials
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • B42D25/382Special inks absorbing or reflecting infrared light
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • B42D25/387Special inks absorbing or reflecting ultraviolet light
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/41Marking using electromagnetic radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M5/00Duplicating or marking methods; Sheet materials for use therein
    • B41M5/24Ablative recording, e.g. by burning marks; Spark recording

Definitions

  • the invention relates to a security feature and an object comprising the security feature.
  • WO 2009/150622 A2 discloses visible markings formed by small elements having defined different geometric shapes and forming encrypted information by a specific arrangement and varying shapes of small elements seems anticipated.
  • US 7 353 994 B2 describes randomly distributed particles, i.e. the images derived from the particles are random.
  • WO 2011/098803 A1 describes apertures which are not hidden in the document.
  • a security feature that represents (stores, contains) predetermined machine readable data and is adapted to an inherent characteristic of an object (or an element of an object) to which the security feature is applied.
  • the characteristic of the object (or element of the object) can advantageously be due to a manufacturing process of the object.
  • the inherent characteristic can be a side-effect or unavoidable consequence of the manufacturing process.
  • the inherent characteristic can also be a desired effect or desired physical appearance of the object.
  • the inherent characteristic is advantageously not intentionally created for hiding the security feature.
  • This aspect of the invention generally provides that the security feature is not immediately visible when the object is inspected by the naked eye (or even by use of detection or inspection instruments).
  • the security feature can thereby blend into its environment.
  • marks may be added to object.
  • the feature can then be hidden to the naked eye (covert) due to various different reasons.
  • the security feature can advantageously be adapted to the inherent characteristic of the object in terms of one or more of the following: size, shape, distribution, number and/or color etc. More specifically, the color, size, shape, distribution and/or number of added (additional) marks (dots, holes, particles) may be adapted to the characteristic of the object (visual appearance).
  • the added marks may be very small (for example having a diameter less than 20 ⁇ ⁇ ⁇ ).
  • the additional marks may have the same or similar color as the object (at least in the location of the surface of the object where the marks are added).
  • the additional marks may be randomly distributed.
  • the additional marks may have only a small number per predefined area of the surface of the object.
  • the added or additional marks may also be luminescent under UV (ultraviolet) light or IR (infrared) light. Under normal ambient conditions (normal daylight) the additional marks may be substantially invisible to the naked eye.
  • the added marks are advantageously not perceivable or distinguishable by the naked eye under ambient light. These aspects further support the covertness of the security feature.
  • the invention also provides a security feature comprising additional marks which are arranged according to the channel coding in accordance with the aspects of the invention described here below.
  • the object may comprise original marks as a characteristic of the object.
  • the original marks can be a consequence of the manufacturing process of the object.
  • the original marks can be randomly distributed.
  • the security feature can then be configured to have a similar appearance as provided by the original marks on the object. This means that the pre-existing characteristic of the object can be imitated without substantially changing the original physical appearance of the object.
  • the original marks may be defects, impurities, particles, holes, fibers, pigments, etc.
  • the security feature may then comprise additional marks having a similar appearance as the originally existing marks.
  • the additional marks can be similar to the original marks in terms of one or more of the following characteristics: size, shape, number, distribution, color etc.
  • the pre-existing characteristic or original marks of the object can also be substantially invisible to the naked eye. This means that also the original marks may not be obvious when inspected by the naked eye without using a magnifying glass, a microscope or other means of inspection or special light as UV or IR light. The additional marks may then have the same appearance and also be substantially invisible to the naked eye.
  • one or more of the following characteristics may be used to represent the pre-determined machine readable information: the absolute or relative location of the additional marks, the size the shape, and/or the color of the individual additional marks.
  • the additional marks can be arranged in groups.
  • the information or data may then be represented by a specific arrangement within a group of additional marks.
  • a group of additional marks is also referred to as a symbol.
  • a symbol may also only comprise one additional mark.
  • This aspect has various advantages.
  • the group or symbol may be easily identified.
  • a group or symbol can be based on redundant information. The more redundant the information of a symbol or group of additional marks is, the better the error rate during read out of the information.
  • the relative and/or absolute location of the marks within a specific area, region or portion of the object may represent the information (data). This also simplifies the detection of the marks and can be used to increase redundancy of the information. All detectable parameters and properties of the marks, be it individual, be it with respect to each other or with respect to the object can advantageously be used to represent information (data).
  • Each of the groups may then comprise a predetermined number of marks.
  • the number of marks per group may for example be n.
  • n may be equal to 1 , 2, 3, 4, 5, 6 or more.
  • each group of marks may represent a multi-bit word of data (predetermined data) that is then represented by (stored in) the security feature. This simplifies the channel coding process in which the marks, group of marks or symbols are assigned to the data (predetermined information).
  • the number of bits of the multi-bit word can be j.
  • j may be equal to 2, 3, 4, 5, 6, 7, 8, 9, 10 or more.
  • the number of marks per group may be different from the number of bits of the multi-bit word that is represented by the group of marks. In other words, a mark does not necessarily represent a single bit. According to an aspect of the invention, two or more different symbols may be used for the same data (multi-bit word). This is advantageous as the redundancy within the security feature can be further increased while the appearance may still be random, if one of the multiple possible symbols is randomly selected.
  • the predetermined information or data that is represented by the security feature can be encrypted raw data. Any predetermined information/data (typically digital data) may then be encrypted before it is channel coded. This increases the security of the feature.
  • the pre-determined data/information can be encrypted using the Advanced Encryption Standard (AES).
  • AES Advanced Encryption Standard
  • This is a symmetric key-algorithm in which only the owner of the key can decode the stored information.
  • the AES algorithm generates a hash value which is stored in the data field. Reading out the hash value is not sufficient for the reconstruction of the stored information.
  • the key is needed to decrypt the hash value and to obtain the original information.
  • the pre-determined information/data that is represented by security feature may be processed according to an error correction algorithm in order to make it possible to detect and/or correct detection/read-out errors.
  • An advantageous algorithm is the Reed-Salomon algorithm.
  • the encrypted raw data can be an encrypted serial number of the object (for example the serial number of a banknote).
  • a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more complex detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
  • the object to which the security feature is applied may be a valuable object, a security object, a consumer product, a security document, a valuable document, a certificate (for example of birth, residence, marital status, name etc.), a certified copy of a document, a card, as for example a smart card, an access card, a credit card, a bonus card, an identity card, a passport, etc.
  • the object may be a valuable document, as for example a banknote.
  • the security feature may then be incorporated, for example into a metalized layer or foil (for example a foil with a thin metal layer) of an element of an object, as for example a valuable document or a banknote.
  • the metal may be aluminum or copper.
  • the element of the object can be a metalized stripe.
  • the element of the object carrying the security feature can be a patch.
  • the element carrying the security feature may have a thin layer of metal or lacquer or color to which the security feature is applied.
  • the security feature may comprise dots.
  • One dot may then be one additional mark.
  • the additional marks i.e. the dots may be printed.
  • the dots may be adapted in number and/or size and or distribution and/or color to the surface of an object.
  • the object may be a sheet of paper or plastic etc.
  • the additional marks may also be substantially white or light yellow.
  • the maximum diameter of the dots may be smaller than 20 ⁇ .
  • the additional marks may be printed with luminescent (fluorescent etc.) color, as for example UV or IR luminescent color.
  • the security feature may be a laser written structure.
  • the marks of the security feature may be local, micrometer sized demetalizations. This is advantageous as the kind of metalized stripes or patches used on banknotes (and other documents) usually shows some defects in the form of little holes which seem randomly distributed over the stripe. These holes are due to the manufacturing process.
  • the security feature may be located in a part of the foil stripe or it may be spread over the whole foil stripe by adding additional marks in form of holes. These holes can be generated by a laser and then look like all other demetalized dots which are due to the manufacturing process.
  • the security feature may be read-out with a dedicated sensor or detection apparatus.
  • the detection may be based on a pattern recognition.
  • a picture may be taken of the area where the security feature is located. The picture may then be processed.
  • the possible locations of additional marks are known, so that the pattern recognition algorithm can search for the specific additional marks. If the marks are detected, the authenticity of the object can be confirmed. Due to redundancy, the authenticity may also be confirmed if only a few and not all additional marks are detected.
  • the security feature may be detected and read out in transmission using a microscopic setup.
  • a light source can be located behind the valuable document (backside) and the microscope can be located on the opposite side of the valuable document (front side).
  • the demetalized dots may appear brighter than the background.
  • the security feature itself comprises of a number of statistically appearing laser written dots.
  • the number of dots per area of the stripe can then be very low. In an embodiment, the number of dots may be between 100 and 200. This improves the covertness of the feature.
  • the robustness of the coding allows very stable read-out of the data/information stored in the security feature even at high transport speeds of the valuable document, in particular of banknotes.
  • An image processing algorithm can be used to decode the data after an image is taken.
  • the same basic structure of the security element may be used on different valuable documents.
  • the number of bit to be stored in the feature depends on the used error correction algorithm and the number of errors which are to be detected and/or corrected.
  • individual user data may be incorporated into the banknote.
  • y is equal to or lower than x.
  • the data may be a serial number of the valuable document.
  • the individual user data to be stored in the security feature can be a serial number, a batch number, a denomination, a production country, a production year or other information.
  • this additional information/data can be statistical data or other features of the valuable document. This may then lead to the possibility of correlating security features or data of the valuable document. Using correlation can improve the level of security against copying and counterfeiting.
  • An advantage of the security feature according to aspects of the invention is that the feature is not necessarily affected by a specific design of the object. Furthermore, the security feature according to aspects of the invention does not affect the design of the object due to its covert character.
  • the security feature according to aspects of the invention may be written using a laser lithographic system allowing direct demetalization of thin metal layers.
  • the demetalization may have very small dot sizes (only a few micrometers, as for example 1 , 2, 3, 4 up to 10, 16 or 20 ⁇ ) and a very high relative positional accuracy of the additional marks of for example 0,1 , 0,2 up to 0,5 ⁇ .
  • the security feature according to aspects of the invention may then comprise only a few micrometer sized dots which appear randomly distributed. If these dots are sufficiently small, they cannot be observed with the naked eye, neither in reflection nor in transmission.
  • the dots may not be detected in reflection mode by the naked eye. Only in transmission mode and by use of a microscope, the dots may be identified.
  • the positions of the marks within each symbol are randomly distributed (pseudo-randomly).
  • the marks (or dots) do then appear like a random pattern similar to defects in metalized foil stripes of valuable documents such as banknotes.
  • metalized foil stripes of valuable documents or banknotes usually have this kind of defects.
  • individual statistical information of the object may be stored in a secure data carrier which is included in the object.
  • the pre-determined data/information to be stored in the security feature may be correlated with other information.
  • This information may, for example relate to production variations of the object. These production variations may comprise properties like optical density, alignment, geometrical distortions, edge sharpness, holes etc.
  • the data/information in the security feature may be correlated with the printed serial number of the object.
  • the data/information in the security feature may be correlated with another security feature of the object.
  • This other security feature may be a UV (ultraviolet), magnetic or infrared (IR) print.
  • the data/information in the security feature may be correlated with production variations of the whole object or only of the component of the object carrying the security feature.
  • production variations may relate to UV fibers, paper roughness, alignment, batch properties etc.
  • each symbol can be located within (or delimited by) a specific area, region or portion of the object. Using this kind of defined area, region or portion can be advantageous in order to identify the different symbols.
  • the predefined area of a symbol is referred to as a block.
  • the several blocks may be composed in order to represent data fields.
  • multiple data fields containing the same information may be provided on the object.
  • This aspect of the invention improves the robustness of the security features, if one or more of the data fields is partially or entirely destroyed.
  • two symbols of one set of symbols never share any marks. This means that the marks of two symbols are never at the same location.
  • the marks of different symbols may also vary in shape and size.
  • the number of marks per symbol can be increased. This reduces the error rate as a symbol may still be correctly detected and read even if not all marks are readable.
  • the positions of the marks within the symbols are randomly chosen.
  • each security feature can be individually calculated. This provides a unique individual structure for each security feature and different objects can have a different security feature.
  • an additional marking or structure may be provided on the object carrying the security feature. The additional marking may serve to align the object with a detector in order to read-out the security feature.
  • the object may comprise a first additional marking for rough alignment and a second additional marking for fine alignment.
  • At least the second marking for fine alignment can be produced by the same manufacturing steps and/or devices which are used for the additional marks of the security feature.
  • the security feature comprises additional marks made by a laser
  • the laser may also be used for the second marking.
  • the security feature comprises additional marks made by printing
  • the same printing device may also be used for the second marking. This provides that the same precision that is used for the additional marks of the feature is automatically applied to the second marking that serves to properly align the object for the detecting the additional marks of the security feature.
  • the first marking can be a different type of marking than the second marking. It can, for example be visible to the naked eye while the second marking is not visible.
  • the structure and visibility of the first marking can be much greater than the visibility and structure of the second marking.
  • the security feature can be organized hierarchically. This means that a security feature may have different levels so that a first level is detectable by a first type of detectors and the second level is detected by a second type of detectors.
  • the first type of detectors may be rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more complex detectors (second type). Accordingly, it is possible to incorporate different levels of security within a single security feature.
  • the different hierarchical levels within the security feature can be provided by using different shapes and/or sizes and/or colors and/or numbers and/or distributions and/or patterns for the marks of different levels of the security feature. For example, a smaller size (maximum diameter or area) of the additional marks may render it impossible to detect those marks with a rather simple detector.
  • the invention also provides a valuable object or security object comprising a security feature in accordance with the invention.
  • a banknote is provided comprising the security feature in accordance with aspects of the invention.
  • the invention also provides a method of manufacturing a security feature in accordance with the aspect of the invention.
  • An object or a component and/or element and/or area and/or region and/or portion of the object may then be analyzed for a specific characteristic, as for example a physical appearance of the object and/or the component and/or element and/or region and/or area, and/or portion of the object.
  • the object and/or the component and/or element and/or region and/or area and/or portion of the object is manufactured.
  • a security element can then be applied to the object and/or the component and/or element and/or region and/or area and/or portion of the object, either after manufacturing the object, or while manufacturing.
  • the security feature can be adapted by shape and/or size and/or color and/or distribution and/or appearance to the characteristic of the object and/or the component and/or element and/or region and/or area and/or portion of the object.
  • the characteristic is a certain pattern or assembly of marks
  • the additional marks are advantageously less in number then the already existing marks (original marks).
  • a channel coding may be used in order to provide a representation of predefined information or data that is machine readable and the physical appearance of which is similar to a characteristic of an object (or an element of an object) to which the security feature is applied.
  • the characteristic of the object (or element of the object) can advantageously be due to a manufacturing process of the object.
  • the characteristic can be a side- effect or unavoidable consequence of the manufacturing process.
  • the characteristic can also be a desired effect or desired physical appearance of the object.
  • This aspect of the invention generally provides that the security feature is not immediately visible when the object is inspected by the naked eye under normal ambient light (for example daylight).
  • FIG.1 shows a simplified schematic representation of an object having specific production characteristics
  • FIG. 2 shows the object of FIG. 1 carrying the security feature according to an embodiment of the invention
  • FIG. 3 shows a simplified block diagram of an embodiment according to aspects of the invention
  • FIG. 4 shows a simplified block diagram of an embodiment according to aspects of the invention
  • FIG. 5 shows a simplified block diagram of an embodiment according to aspects of the invention
  • FIG. 6 shows a diagram illustrating aspects of the invention
  • FIG. 7 shows a flow chart illustrating the procedure of creating a security feature in accordance with aspects of the invention
  • FIG. 8 is a simplified schematic of an embodiment of the invention.
  • FIG. 9 is a simplified schematic of a detection apparatus
  • FIG. 10 is a simplified schematic of an embodiment of the invention.
  • FIG. 1 shows a simplified schematic representation of an object 1 having an inherent characteristic.
  • this characteristic is a plurality of marks 2 which are created during manufacturing of the object 1.
  • these marks may be any kind of intended or non-intended characteristic.
  • the original marks 2 may, for example be anyone or several of the following: defects and/or impurities and/or particles and/or holes and/or fibers and/or pigments. These marks or defects can be randomly distributed.
  • FIG. 2 shows the object 1 of FIG. 1 again.
  • the object 1 now includes additional marks 3 which are similar to the already existing (original) marks 2 and also seem randomly distributed.
  • the security feature is hidden by using an appearance for the marks 3 which is similar to the appearance of the original marks 2.
  • the marks 3 themselves can have approximately the same shape, size, color or other characteristic to make the marks look like the marks 2.
  • only a few marks are added, so that the general appearance of the original marks remains substantially unchanged.
  • an advantageous ratio is w ⁇ v (w is lower than v).
  • the ratio v/w may advantageously be greater than 1 , and in some embodiments greater than 10 or greater than 20.
  • the additional marks of the security feature are adapted to the existing marks of the object in terms of size, shape, distribution, number and/or color etc. This improves the covertness of the security feature.
  • the security feature i.e. in this embodiment, the additional marks of the security feature
  • the location and/or shape and/or color and/or distribution of the additional marks represent(s) predetermined machine readable information (data). They are adapted to the characteristic (pre-existing marks due to manufacturing) of the object (or an element of an object) to which the security feature is applied.
  • the characteristic of the object (or element of the object) can advantageously be due to a manufacturing process of the object.
  • FIG. 3 shows a simplified diagram of an embodiment according to aspects of the invention.
  • the raw data 4 is processed according to a channel coding algorithm in order to generate the channel encoded data 6.
  • the channel encoded data 6 has the physical appearance necessary for hiding the channel encoded data in the object 1.
  • Advantageous embodiments of the channel coding are described below.
  • FIG. 4 shows a simplified diagram of an embodiment of the invention according to aspects of the invention.
  • the raw data 4 is first processed according to an error correction algorithm (for example Reed-Solomon error correction) in order to generate the error correction coded data 8.
  • This error correction coded data 8 is then processed according to the channel coding algorithm 5 in order to generate the channel encoded data 6.
  • the additional error correction process can advantageously be used to incorporate redundant data into the raw data.
  • This redundant or additional data can then serve to detect and/or to correct errors during a read-out process of the channel encoded data 6.
  • the Reed- Solomon algorithm is well-known in the art and the amount of redundant data can be adapted to the specific requirements of the application.
  • FIG. 5 shows a simplified diagram of an embodiment according to aspects of the invention.
  • the raw data 4 is first processed according to an encryption algorithm (as for example AES - advanced encryption standard) in which for example a key is used.
  • the encrypted data 10 is then processed according to the error correction algorithm 7 (as previously described).
  • the error correction coded data 8 is then processed with a channel coding algorithm 5 in order to obtain the channel encoded data 6 (as previously described).
  • the predetermined information or data that is represented by the security feature can be encrypted raw data. Any pre-determined information/data (typically digital data) may then be encrypted before it is channel coded. This increases the security of the feature.
  • an error correction algorithm as the Reed-Solomon algorithm can be applied to the data in order to make it possible to detect and/or correct detection/read-out errors.
  • FIG. 6 shows a simplified diagram illustrating the channel coding process 5. Just as a simplified example, there are binary numbers 1011 (11) representing is either the raw data 4, the error correction coded data 8 or the encrypted data 10. This multi-bit word 1011 can only be a part of a long data stream including a plurality of multi-bit words.
  • a specific symbol is generated and assigned to this multi-bit word.
  • the bit word 1011 as the specific symbol 11.
  • the marks 31 , 32 have a specific size, shape and location within a certain area, field, region and/or portion of the object 1.
  • the multi-bit word 1100 (12) may then be another multi-bit word of the data stream to be processed. As previously described, this data stream, can be the raw data 4, the error correction coded data 8 or the encrypted data 10.
  • the multi-bit word 1100 also has a specific predetermined symbol 11 with marks 33 and 34. All marks 31 , 32, 33 and 34 are substantially adapted to have the physical appearance of marks already present on an object 1.
  • the distribution of the marks 31 , 32 and 33, 34 within a specific area as well as the number of the marks 31 , 32, 33 and 34 within the specific area can also be adapted to the given characteristics of the object 1.
  • the blocks (area of symbols) can be adapted to hide the additional marks.
  • the number of the marks within each symbol 11 can be increased as long as the covertness of the security feature is not impaired.
  • the process of assigning additional marks/groups of additional marks/symbols to the predetermined data/information such that the physical appearance of the security feature is similar to a specific physical characteristic of the object is the process of channel coding.
  • the marks/groups of marks/symbols are then properly arranged on the object while taking care that the physical appearance of the preexisting marks (the existing characteristic) is not affected.
  • the original marks can be due to the manufacturing process of the object.
  • the original marks are randomly distributed.
  • the original characteristic of the object is imitated by adding marks/groups of marks/symbols without substantially changing the original physical appearance of the object.
  • the original marks may be defects and/or impurities and/or particles and/or holes and/or fibers and/or pigments, etc.
  • the security feature may then comprise additional marks having a similar appearance as the originally existing marks.
  • the additional marks can be similar to the original marks in terms of size, shape, number, distribution, color etc.
  • All the pre-existing characteristics or pre-existing marks can be substantially invisible to the naked eye.
  • the marks are not obvious when inspected by the naked eye without using a magnifying glass, a microscope or other means of inspection.
  • the additional marks may then have the same appearance and also be substantially invisible to the naked eye.
  • the location (relative and/or absolute), size and/or shape and/or color of the individual additional marks etc. is used to store the pre-determined machine readable information in the object.
  • a group of marks or a symbol can be more easily identified than a single mark.
  • a group or symbol can advantageously be based on redundant information. The more redundant the information of a symbol or group of marks, the lower the error rate during read out of the information. All detectable parameters and properties of the marks, be it individual, be it with respect to each other (relative location/position) or with respect to the object can advantageously be used to represent information (data).
  • Each of the groups of marks/symbols has a predetermined number of marks.
  • the number of marks per group may for example be n (n being a positive integer).
  • n 1 , 2, 3, 4, 5, 6 or more.
  • the number of bits of the multi-bit word can be j (n being a positive integer).
  • it is also possible to chose j 2, 3, 4, 5, 6, 7, 8, 9, 10 or more.
  • the number of additional marks per symbol can be equal to the number of bits of the multi-bit word, in the present embodiment, the number of additional marks per group is different from the number of bits of the multi-bit word that is represented by the group of additional marks. In other words, an additional mark does not necessarily represent a single bit.
  • FIG. 7 shows a simplified flow chart illustrating the process of generating the security feature during the channel coding process.
  • step S1 input data is passed to the channel coding process.
  • a data stream 4, 8, 10 is indicated on the right hand side of step SI .
  • step S2 a multi-bit word (in this example 4 bit) is selected from the data stream.
  • step S3 a specific symbol is selected for the specific multi-bit word.
  • step S3 a predefined set of symbols may be used which is generated in a symbol generator. Different sets of symbols may be used within a single object (depended on the number of security features present on the object) or for different objects.
  • a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more sophisticated detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
  • an object 1 or a component, element, area, region and/or portion of the object may then be analyzed for a specific characteristic, as for example a physical appearance of the object and/or the component, element, region, area, and/or portion of the object.
  • the security element can then be applied to the object and/or the component, element, region, area, and/or portion of the object, either after manufacturing the object and/or the component, element, region, area, and/or portion of the object, while manufacturing the object and/or the component, element, region, area, and/or portion of the object, or after manufacturing the object and/or the component, element, region, area, and/or portion of the object
  • FIG. 8 shows a simplified diagram of an embodiment of the invention.
  • the object 1 is a valuable document, and more specifically a banknote.
  • the object 1 to which the security feature is applied may be a valuable object, a security object, a consumer product, a security document, a certificate (for example of birth, residence, marital status, name etc.), a certified copy of a document, a card, as for example a smart card, an access card, a credit card, a bonus card, an identity card, a passport, etc.
  • the security feature is incorporated into the metalized stripe or patch 15 (for example a layer, sheet or foil having a thin metal layer) of the valuable document (banknote).
  • the element of the object 1 to which the security feature is applied can be the metalized stripe or patch.
  • the security feature is a laser written structure.
  • the added marks 3 of the security feature are local, micrometer sized demetalizations.
  • the metal (or other) layer of the metalized stripes of banknotes (and other documents) has defects in the form of little holes which seem randomly distributed over the stripe.
  • the security feature is spread over the whole stripe by adding the additional marks 3 in form of holes. These holes are generated by a laser (not shown) and look like all other demetalized dots which are due to the manufacturing process.
  • the security feature is written using a high resolution laser lithographic system allowing direct demetalization of thin metal layers.
  • the demetalization has very small dot sizes (only a few micrometers, as for example 1 , 2, 3, 4 up to 10, 16 or 20 ⁇ ) and a very high positional accuracy of for example 0,1 , 0,2 up to 0,5 pm.
  • the original marks (dots/holes) which are also present in the stripe are not shown.
  • the security feature only comprises a few additional micrometer sized dots that appear randomly distributed. If these dots are sufficiently small, they cannot be observed with the naked eye, neither in reflection nor in transmission. Even with a magnifying glass or microscope, the dots cannot be detected in reflection mode by the naked eye. Only in transmission mode and by use of a microscope, the dots can be identified.
  • the number of dots (additional marks) per area of the stripe can then be very low.
  • the total number of dots on the entire stripe or within a data field may be between 100 and 200 (FIG. 8 is only a simplified drawing). This improves the covertness of the feature.
  • the positions of the marks within each symbol are randomly distributed (pseudo-randomly).
  • the marks (or dots) do then appear like a random pattern similar to the original defects in the metalized foil stripes of the valuable documents such as banknotes.
  • An individual composition or set of symbols can be used for each object (banknote).
  • the added marks are arranged in groups (symbols) 11 as previously described and the groups/symbols 11 are arranged on the metalized stripe of the valuable document.
  • a specific area is determined in which the (all) marks of a group/symbol are found. This area is referred to as a block. All blocks of the security feature can then be arranged side-by-side (non-overlapping). This simplifies the detection. An overlapping arrangement of the blocks is also possible.
  • a block may be a rectangular area. However, in other embodiment, different shapes of a block can be used.
  • a certain number of blocks can be combined. This combination of blocks is referred to as a data field 12.
  • a single data field 12 may then carry the entire stored information/data.
  • the number of bits to be stored in the feature depends on the used error correction algorithm and the number of errors which are to be detected and/or corrected.
  • individual user data may be incorporated into the banknote.
  • y is equal to or lower than x.
  • the data may be a serial number of the valuable document.
  • An example including (Reed-Solomon) error correction may have the following data structure:
  • the individual user data to be stored in the security feature can be the serial number 18, but also a batch number, a denomination, a production country, a production year or other information.
  • the additional information/data stored in the security feature can be statistical data or other features of the valuable document. This may then lead to the possibility of correlating security features or data of the valuable document. Using correlation can improve the level of security against copying and counterfeiting.
  • the additional data/information can indicate production variations of the object 1.
  • These production variations may comprise properties like optical density, alignment, geometrical distortions, edge sharpness, holes etc.
  • the data/information in the security feature can be correlated with another security feature of the object.
  • This other security feature may be a UV (ultraviolet), magnetic or infrared (IR) print.
  • Two symbols 11 of one set of symbols (for example all symbols of one data field in this example) never share any marks. This means that the additional marks of two symbols are never at the same location and/or the additional marks of different symbols can also vary in shape and/or size.
  • the number of marks per symbol can be increased as long as the physical appearance of the object is not affected (at least not above a level that renders ten additional marks visible to the naked eye). This reduces the error rate as a symbol may still correctly be detected and read-out, even if not all marks are readable. The detection becomes more robust, the more marks are used per symbol.
  • each banknote The positions of the marks within the symbols are randomly chosen.
  • the security feature of each banknote is individually calculated. This provides a unique individual structure for each object 1 (banknote).
  • an additional marking 13, 14 or structure may be provided on the object 1 carrying the security feature.
  • the additional marking 13, 14 serves to align the object with a detector in order to readout the security feature.
  • the object 1 comprises a first additional marking 13 for rough alignment and a second additional marking 14 for fine alignment.
  • the second marking 14 (for fine alignment) is made by the same manufacturing steps and/or devices used for the additional marks 3 of the security feature.
  • the laser used for the additional marks may also be used for the second marking 14. This provides that the same precision is achieved for the additional marks 14.
  • FIG. 9 shows a simplified drawing illustrating the detection of the security feature.
  • the security feature is read-out with a dedicated sensor or detection apparatus.
  • the security feature can be read-out using an optical arrangement including for example a light source 16 and a microscope 17 (including a camera).
  • a light source 16 can be located behind the valuable document (backside) and the microscope 17 (including a camera) is located on the opposite side of the valuable document (front side).
  • the additional marks 3 of the security feature may be a very little bit larger (in maximum diameter or cross- sectional area) than the original marks/dots, such that the demetalized dots appear a little bit brighter than the background.
  • a picture is taken (by the camera inside 17) of the area were the security feature is located.
  • the picture is then processed (image processing). Since the locations of added marks are known, the pattern recognition algorithm can directly search for the specific additional marks. If the marks are detected, the authenticity of the object is confirmed. Due to redundancy, the authenticity can also be confirmed, if only a few and not all additional marks are detected.
  • the robustness of the coding allows very stable read-out of the security feature at high transport speeds of the valuable document, in particular of banknotes.
  • the same basic structure of the security element may be used on different valuable documents.
  • each symbol can be located within a specific area, region or portion of the object.
  • the security feature is organized hierarchically. This means that a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more sophisticated detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
  • FIG. 10 shows another embodiment of the invention.
  • additional marks are added to a sheet or layer or surface of an object. There are no original marks.
  • the additional marks are adapted to a characteristic of the object.
  • the additional marks may be adapted in anyone of following characteristics in order not to be visible to the naked eye: distribution and/or size and/or the shape and/or the color.
  • the pre-determined machine readable information can then be represented by the relative locations and/or sizes and/or shapes and/or colors of the additional marks.
  • the error coding and/or channel coding as well as the encryption can then be performed as described with respect to the other embodiments of the invention.
  • the additional marks can be arranged in blocks (predefined limited area). These blocks can be overlapping or non-overlapping.
  • the blocks can have any predetermined shape as for example rectangular or circular etc.
  • this characteristic is the appearance of the surface of an object 1 , as for example a sheet of paper or plastic.
  • the object 1 includes additional marks 3 seeming randomly distributed.
  • the security feature is hidden by the random appearance of the marks.
  • the additional marks 3 can also be adapted in size and number per area (distribution) in order to be hidden to the visible eye.
  • only a few marks are added, so that the general appearance of the surface of the object 1 remains substantially unchanged.
  • the additional marks of the security feature blend into the area, region and/or portion of the object in which the additional marks are created.
  • the location and/or shape and/or color and/or distribution of the additional marks represent(s) predetermined machine readable information (data). They are adapted to the characteristic of the object (or an element of an object) to which the security feature is applied.
  • the characteristic (color, etc) of the object 1 (or element of the object) can advantageously be due to a manufacturing process of the object 1.
  • the characteristic can be a side-effect or unavoidable consequence of the manufacturing process.
  • the characteristic can also be a desired effect or desired physical appearance of the object.
  • the security feature is, at least not immediately visible when the object is inspected by the naked eye.
  • raw data 4 can be processed according to a channel coding algorithm in order to generate the channel encoded data 6.
  • the channel encoded data 6 has the physical appearance necessary for hiding the channel encoded data in the object 1.
  • the raw data 4 can first be processed according to an error correction algorithm (for example Reed-Solomon error correction) in order to generate the error correction coded data 8.
  • This error correction coded data 8 can then be processed according to the channel coding algorithm 5 in order to generate the channel encoded data 6.
  • the additional error correction process can advantageously be used to incorporate additional data into the raw data.
  • This redundant or additional data can then serve to detect and/or to correct errors during a read-out process (detection process) of the channel encoded data 6.
  • Error correction algorithms as for example the Reed-Solomon algorithm, are well-known in the art and the amount of redundant data can be adapted to the specific requirements of the application.
  • the raw data 4 can also be processed according to an encryption algorithm (as for example AES - advanced encryption standard) in which for example an encryption key is used before the error correction algorithm is applied.
  • the encrypted data 10 can then be processed according to the error correction algorithm 7 (as previously described).
  • the error correction coded data 8 is then processed using a channel coding algorithm 5 in order to obtain the channel encoded data 6 (as previously described).
  • the predetermined information or data that is represented by the security feature can be encrypted raw data. Any pre-determined information/data (typically digital data) may then be encrypted before it is channel coded. This increases the security of the feature.
  • an error correction algorithm as for example the Reed-Solomon algorithm, can be applied to the data in order to make it possible to detect and/or correct detection/read-out errors.
  • An advantageous channel coding process 5 is shown in FIG. 6, which can also be applied to the embodiment of FIG. 10.
  • the process of assigning marks/groups of marks/symbols to the predetermined data/information such that the physical appearance of the security feature is similar to a specific physical characteristic of the object is the process of channel coding.
  • the marks/groups of marks/symbols are then properly arranged on the object while taking care that the physical appearance of the existing characteristic of the surface of the object is not affected to an extent that the additional marks become visible to the marked eye.
  • the preexisting characteristic can be substantially invisible to the naked eye.
  • a group of additional marks or a symbol can be more easily detected than a single mark.
  • a group or symbol can advantageously be based on redundant information. The more redundant the information of a symbol or group of marks, the lower the error rate during read out of the information.
  • Each of the groups of marks/symbols has a predetermined number of marks.
  • the number of marks per symbol can be equal to the number of bits of the multi-bit word or the number of marks per group can be different from the number of bits of the multi-bit word that is represented by the group of marks. In other words, a mark does not necessarily represent a single bit.
  • Two or more different symbols can be used for the same multi-bit word. This is advantageous as the redundancy within the security feature is then further increased while the random appearance is improved.
  • One of the multiple possible symbols is then randomly selected and arranged on the object.
  • This channel coding process shown in FIG. 7 can also be applicable to the embodiment shown in FIG. 10. It is also possible to use the security feature according to aspects of the invention hierarchically. This means that a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more sophisticated detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
  • an object 1 or a component, element, area, region and/or portion of the object may then be analyzed for a specific characteristic, as for example a physical appearance of the object and/or the component, element, region, area, and/or portion of the object.
  • the security element can then be applied to the object and/or the component, element, region, area, and/or portion of the object, either after manufacturing the object and/or the component, element, region, area, and/or portion of the object, while manufacturing the object and/or the component, element, region, area, and/or portion of the object.
  • the object 1 to which the security feature is applied may be a valuable object, a security object, a consumer product, a security document, a certificate (for example of birth, residence, marital status, name etc.), a certified copy of a document, a card, as for example a smart card, an access card, a credit card, a bonus card, an identity card, a passport, etc.
  • the security feature can be applied to the surface in form of dots or holes or fibers. These dots or holes or fibers then form the additional marks.
  • the marks are printed dots.
  • the added marks 3 of the security feature are micrometer sized dots. The added marks seem randomly distributed over the surface of the object.
  • the security feature can be spread over the whole surface of the object by adding the additional marks 3 in form of dots.
  • the dot size (diameter) of the additional marks 3 can be a few micrometers, as for example 1 , 2, 3, 4 up to 10, 16 or 20 pm,
  • the security feature only comprises a few additional micrometer size dots that appear randomly distributed. If these dots are sufficiently small, they cannot be observed with the naked eye, neither in reflection nor in transmission. Even with a magnifying glass or microscope, the dots may not be detected. The number of dots per area of the surface of the object can then be very low.
  • the positions of the marks within each symbol (block) are pseudo-randomly distributed, which means they are predetermined but seem randomly distributed. The marks (or dots) do then appear like a random pattern.
  • An individual composition or set of symbols can be used for each object (banknote).
  • the added marks are arranged in groups (symbols) 11 as previously described and the groups/symbols 11 are arranged on the surface of the object 1.
  • a specific area is determined in which the (all) marks of a group/symbol are found, which is referred to as a block.
  • All blocks of the security feature can then be arranged side- by-side (non-overlapping). An overlapping arrangement of the blocks is also possible.
  • a block may be a rectangular area. However, in other embodiment, different shapes of a block can be used.
  • the blocks can be combined to a data field 12 as previously described. A single data field 12 may then carry the entire stored information/data. The data field may be repeated over the surface of the object. This further increases the redundancy and therefore the robustness of the security feature.
  • Another data field can be used to read the data/information stored in the security feature.
  • Each data field may use different symbols or sets of symbols for the same data. This provides that the surface of the object 1 does not show any regularity (repetition of patterns).
  • the object 1 comprises a first additional marking 13 for rough alignment and a second additional marking 14 for fine alignment.
  • the second marking 14 (for fine alignment) is advantageously made by the same manufacturing steps and/or devices (i.e. for example the same printer etc) used for the additional marks 3 of the security feature.
  • the laser may also be used for the second marking 14. This provides that the same precision is achieved for the additional marks 14.
  • Error correction algorithms and/or encryption algorithms can be applied as previously described with respect to other embodiments of the invention,
  • the additional information/data stored in the security feature can be statistical data or other features of the object 1. This may then lead to the possibility of correlating security features or data of the object 1. Using correlation of data as previously described can improve the level of security against copying and counterfeiting.

Landscapes

  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Electromagnetism (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

The invention relates to a security feature representing predetermined machine readable data and being adapted to an inherent characteristic of an object to which the security feature is applied. The invention also relates to an object comprising the security feature.

Description

TITLE OF THE INVENTION
Security Feature and Object with Security Feature FIELD OF THE INVENTION
The invention relates to a security feature and an object comprising the security feature.
BACKGROUND
A large variety of security features for all kinds of valuable or security objects is know in the art. Most security features make use of specific optical effects of small structures or physical/optical effects of rare substances.
WO 2009/150622 A2 discloses visible markings formed by small elements having defined different geometric shapes and forming encrypted information by a specific arrangement and varying shapes of small elements seems anticipated. US 7 353 994 B2 describes randomly distributed particles, i.e. the images derived from the particles are random.
WO 2011/098803 A1 describes apertures which are not hidden in the document.
SUMMARY It is an object of the invention to provide a security feature that is covert regardless of whether or not it is visible to the naked eye. It is also an object of the invention to provide an object comprising the security feature. According to an aspect of the invention, a security feature is provided that represents (stores, contains) predetermined machine readable data and is adapted to an inherent characteristic of an object (or an element of an object) to which the security feature is applied. The characteristic of the object (or element of the object) can advantageously be due to a manufacturing process of the object. The inherent characteristic can be a side-effect or unavoidable consequence of the manufacturing process. The inherent characteristic can also be a desired effect or desired physical appearance of the object. However, the inherent characteristic is advantageously not intentionally created for hiding the security feature. This aspect of the invention generally provides that the security feature is not immediately visible when the object is inspected by the naked eye (or even by use of detection or inspection instruments). The security feature according to aspects of the invention can thereby blend into its environment. According to an aspect of the invention, marks may be added to object. The feature can then be hidden to the naked eye (covert) due to various different reasons. The security feature can advantageously be adapted to the inherent characteristic of the object in terms of one or more of the following: size, shape, distribution, number and/or color etc. More specifically, the color, size, shape, distribution and/or number of added (additional) marks (dots, holes, particles) may be adapted to the characteristic of the object (visual appearance). The added marks may be very small (for example having a diameter less than 20 μηι). The additional marks may have the same or similar color as the object (at least in the location of the surface of the object where the marks are added). The additional marks may be randomly distributed. The additional marks may have only a small number per predefined area of the surface of the object. The added or additional marks may also be luminescent under UV (ultraviolet) light or IR (infrared) light. Under normal ambient conditions (normal daylight) the additional marks may be substantially invisible to the naked eye. The added marks are advantageously not perceivable or distinguishable by the naked eye under ambient light. These aspects further support the covertness of the security feature.
The process of configuring any predetermined data such that the physical appearance of the security feature is similar to a specific physical inherent characteristic of the object forms part of a channel coding. In other words, the invention also provides a security feature comprising additional marks which are arranged according to the channel coding in accordance with the aspects of the invention described here below.
In an embodiment of the invention, the object may comprise original marks as a characteristic of the object. The original marks can be a consequence of the manufacturing process of the object. The original marks can be randomly distributed. The security feature can then be configured to have a similar appearance as provided by the original marks on the object. This means that the pre-existing characteristic of the object can be imitated without substantially changing the original physical appearance of the object. The original marks may be defects, impurities, particles, holes, fibers, pigments, etc. The security feature may then comprise additional marks having a similar appearance as the originally existing marks. The additional marks can be similar to the original marks in terms of one or more of the following characteristics: size, shape, number, distribution, color etc. Each of these aspects of the invention further improves the covertness of the security feature.
The pre-existing characteristic or original marks of the object can also be substantially invisible to the naked eye. This means that also the original marks may not be obvious when inspected by the naked eye without using a magnifying glass, a microscope or other means of inspection or special light as UV or IR light. The additional marks may then have the same appearance and also be substantially invisible to the naked eye.
According to an aspect of the invention, one or more of the following characteristics may be used to represent the pre-determined machine readable information: the absolute or relative location of the additional marks, the size the shape, and/or the color of the individual additional marks.
According to a further aspect of the invention, the additional marks can be arranged in groups. The information or data may then be represented by a specific arrangement within a group of additional marks. A group of additional marks is also referred to as a symbol. A symbol may also only comprise one additional mark. This aspect has various advantages. The group or symbol may be easily identified. A group or symbol can be based on redundant information. The more redundant the information of a symbol or group of additional marks is, the better the error rate during read out of the information. In an embodiment of the invention, the relative and/or absolute location of the marks within a specific area, region or portion of the object may represent the information (data). This also simplifies the detection of the marks and can be used to increase redundancy of the information. All detectable parameters and properties of the marks, be it individual, be it with respect to each other or with respect to the object can advantageously be used to represent information (data).
Each of the groups may then comprise a predetermined number of marks. The number of marks per group may for example be n. In advantageous embodiments n may be equal to 1 , 2, 3, 4, 5, 6 or more. According to an aspect of the invention, each group of marks may represent a multi-bit word of data (predetermined data) that is then represented by (stored in) the security feature. This simplifies the channel coding process in which the marks, group of marks or symbols are assigned to the data (predetermined information).
According to an aspect of the invention, the number of bits of the multi-bit word can be j. In advantageous embodiments j may be equal to 2, 3, 4, 5, 6, 7, 8, 9, 10 or more.
The number of marks per group may be different from the number of bits of the multi-bit word that is represented by the group of marks. In other words, a mark does not necessarily represent a single bit. According to an aspect of the invention, two or more different symbols may be used for the same data (multi-bit word). This is advantageous as the redundancy within the security feature can be further increased while the appearance may still be random, if one of the multiple possible symbols is randomly selected.
According to an aspect of the invention, the predetermined information or data that is represented by the security feature can be encrypted raw data. Any predetermined information/data (typically digital data) may then be encrypted before it is channel coded. This increases the security of the feature.
The pre-determined data/information can be encrypted using the Advanced Encryption Standard (AES). This is a symmetric key-algorithm in which only the owner of the key can decode the stored information. The AES algorithm generates a hash value which is stored in the data field. Reading out the hash value is not sufficient for the reconstruction of the stored information. In addition, the key is needed to decrypt the hash value and to obtain the original information. Furthermore, the pre-determined information/data that is represented by security feature may be processed according to an error correction algorithm in order to make it possible to detect and/or correct detection/read-out errors. An advantageous algorithm is the Reed-Salomon algorithm. According to an aspect of the invention, the encrypted raw data can be an encrypted serial number of the object (for example the serial number of a banknote).
It is also possible to use the security feature according to aspects of the invention hierarchically. This means that a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more complex detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
The object to which the security feature is applied may be a valuable object, a security object, a consumer product, a security document, a valuable document, a certificate (for example of birth, residence, marital status, name etc.), a certified copy of a document, a card, as for example a smart card, an access card, a credit card, a bonus card, an identity card, a passport, etc.
In an advantageous embodiment, the object may be a valuable document, as for example a banknote.
The security feature may then be incorporated, for example into a metalized layer or foil (for example a foil with a thin metal layer) of an element of an object, as for example a valuable document or a banknote. The metal may be aluminum or copper. In one embodiment the element of the object can be a metalized stripe. In another embodiment of the invention, the element of the object carrying the security feature can be a patch. The element carrying the security feature may have a thin layer of metal or lacquer or color to which the security feature is applied.
The security feature according to an embodiment of the invention may comprise dots. One dot may then be one additional mark. The additional marks, i.e. the dots may be printed. The dots may be adapted in number and/or size and or distribution and/or color to the surface of an object. The object may be a sheet of paper or plastic etc. For example, if the surface of the object is white, the additional marks (dots) may also be substantially white or light yellow. The maximum diameter of the dots may be smaller than 20 μηι. The additional marks may be printed with luminescent (fluorescent etc.) color, as for example UV or IR luminescent color.
In another embodiment, the security feature may be a laser written structure. The marks of the security feature may be local, micrometer sized demetalizations. This is advantageous as the kind of metalized stripes or patches used on banknotes (and other documents) usually shows some defects in the form of little holes which seem randomly distributed over the stripe. These holes are due to the manufacturing process. The security feature may be located in a part of the foil stripe or it may be spread over the whole foil stripe by adding additional marks in form of holes. These holes can be generated by a laser and then look like all other demetalized dots which are due to the manufacturing process.
The security feature may be read-out with a dedicated sensor or detection apparatus. The detection may be based on a pattern recognition. A picture may be taken of the area where the security feature is located. The picture may then be processed. The possible locations of additional marks are known, so that the pattern recognition algorithm can search for the specific additional marks. If the marks are detected, the authenticity of the object can be confirmed. Due to redundancy, the authenticity may also be confirmed if only a few and not all additional marks are detected. With respect to the above described embodiment using an element or object comprising demetalized dots, the security feature may be detected and read out in transmission using a microscopic setup. A light source can be located behind the valuable document (backside) and the microscope can be located on the opposite side of the valuable document (front side). If the additional marks of the security feature are a very little bit larger (in maximum diameter or cross-sectional area) than the original marks/dots, the demetalized dots may appear brighter than the background. In other words, the security feature itself comprises of a number of statistically appearing laser written dots. The number of dots per area of the stripe can then be very low. In an embodiment, the number of dots may be between 100 and 200. This improves the covertness of the feature.
The robustness of the coding allows very stable read-out of the data/information stored in the security feature even at high transport speeds of the valuable document, in particular of banknotes. An image processing algorithm can be used to decode the data after an image is taken. The same basic structure of the security element may be used on different valuable documents. Within the context of this specification the following parameters apply::
Number of user bits: x (= k*j)
Number of Symbols (user data) k
Number of bits of serial number of a banknote: y Number of bits of additional (user) information: z
Number of„marks" per symbol: n
Number of bits per symbol/ multi-bit-word: j
Number of ..existing marks" (original marks): v
Number of ..added marks" (additional marks): w For example, a Reed-Solomon error code RS(m,k) transforms k symbols of data into j bit by adding 2*t parity symbols of j bits. The result is m symbols of j bit. In the decoding step t=(m-k)/2 incorrect symbols can be detected and corrected.
Generally, the number of bit to be stored in the feature depends on the used error correction algorithm and the number of errors which are to be detected and/or corrected.
According to an embodiment of the invention, individual user data may be incorporated into the banknote. If for example, the user storage capacity of the security feature is x bit (k multi-bit-words of j Bit, i.e. x=k*j), it is possible to incorporate for example a serial number that can be represented by y bit, while y is equal to or lower than x. The data may be a serial number of the valuable document. In another embodiment, only a part of the user data may be used (for example for a serial number) and the remaining z=x-y bits may be used for other information.
According to an aspect of the invention, the individual user data to be stored in the security feature can be a serial number, a batch number, a denomination, a production country, a production year or other information.
In an embodiment of the invention, this additional information/data (z bit) can be statistical data or other features of the valuable document. This may then lead to the possibility of correlating security features or data of the valuable document. Using correlation can improve the level of security against copying and counterfeiting. An advantage of the security feature according to aspects of the invention is that the feature is not necessarily affected by a specific design of the object. Furthermore, the security feature according to aspects of the invention does not affect the design of the object due to its covert character. The security feature according to aspects of the invention may be written using a laser lithographic system allowing direct demetalization of thin metal layers. The demetalization may have very small dot sizes (only a few micrometers, as for example 1 , 2, 3, 4 up to 10, 16 or 20 μηη) and a very high relative positional accuracy of the additional marks of for example 0,1 , 0,2 up to 0,5 μηη. The security feature according to aspects of the invention may then comprise only a few micrometer sized dots which appear randomly distributed. If these dots are sufficiently small, they cannot be observed with the naked eye, neither in reflection nor in transmission.
In an embodiment of the invention, even with a magnifying glass or microscope, the dots may not be detected in reflection mode by the naked eye. Only in transmission mode and by use of a microscope, the dots may be identified.
According to an aspect of the invention, the positions of the marks within each symbol are randomly distributed (pseudo-randomly). The marks (or dots) do then appear like a random pattern similar to defects in metalized foil stripes of valuable documents such as banknotes. In particular, metalized foil stripes of valuable documents or banknotes usually have this kind of defects.
Due to the random appearance of the additional marks it is hardly possible to notice any regularity by comparing the mark patterns of different objects.
According to an aspect of the invention, individual statistical information of the object may be stored in a secure data carrier which is included in the object.
According to an aspect of the invention, the pre-determined data/information to be stored in the security feature may be correlated with other information. This information may, for example relate to production variations of the object. These production variations may comprise properties like optical density, alignment, geometrical distortions, edge sharpness, holes etc.
In an embodiment of the invention, the data/information in the security feature may be correlated with the printed serial number of the object. According to an aspect of the invention, the data/information in the security feature may be correlated with another security feature of the object. This other security feature may be a UV (ultraviolet), magnetic or infrared (IR) print.
According to an aspect of the invention, the data/information in the security feature may be correlated with production variations of the whole object or only of the component of the object carrying the security feature. These production variations may relate to UV fibers, paper roughness, alignment, batch properties etc.
According to an aspect of the invention, each symbol can be located within (or delimited by) a specific area, region or portion of the object. Using this kind of defined area, region or portion can be advantageous in order to identify the different symbols. The predefined area of a symbol is referred to as a block.
According to an aspect of the invention, the several blocks (areas, regions or portions containing the symbols) may be composed in order to represent data fields.
According to another aspect of the invention, multiple data fields containing the same information may be provided on the object. This aspect of the invention improves the robustness of the security features, if one or more of the data fields is partially or entirely destroyed. According to an aspect of the invention, two symbols of one set of symbols never share any marks. This means that the marks of two symbols are never at the same location. The marks of different symbols may also vary in shape and size.
According to an aspect of the invention, the number of marks per symbol can be increased. This reduces the error rate as a symbol may still be correctly detected and read even if not all marks are readable. The more marks are used per symbol, the more robust is the channel coding.
According to an aspect of the invention, the positions of the marks within the symbols are randomly chosen.
According to an aspect of the invention, each security feature can be individually calculated. This provides a unique individual structure for each security feature and different objects can have a different security feature. According to an aspect of the invention, an additional marking or structure may be provided on the object carrying the security feature. The additional marking may serve to align the object with a detector in order to read-out the security feature.
In an embodiment of the invention, the object may comprise a first additional marking for rough alignment and a second additional marking for fine alignment. At least the second marking for fine alignment can be produced by the same manufacturing steps and/or devices which are used for the additional marks of the security feature.
If, in an embodiment, the security feature comprises additional marks made by a laser, the laser may also be used for the second marking. If, in another embodiment, the security feature comprises additional marks made by printing, the same printing device may also be used for the second marking. This provides that the same precision that is used for the additional marks of the feature is automatically applied to the second marking that serves to properly align the object for the detecting the additional marks of the security feature.
Furthermore, the first marking can be a different type of marking than the second marking. It can, for example be visible to the naked eye while the second marking is not visible. The structure and visibility of the first marking can be much greater than the visibility and structure of the second marking. According to still another aspect of the invention the security feature can be organized hierarchically. This means that a security feature may have different levels so that a first level is detectable by a first type of detectors and the second level is detected by a second type of detectors. The first type of detectors may be rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more complex detectors (second type). Accordingly, it is possible to incorporate different levels of security within a single security feature.
The different hierarchical levels within the security feature can be provided by using different shapes and/or sizes and/or colors and/or numbers and/or distributions and/or patterns for the marks of different levels of the security feature. For example, a smaller size (maximum diameter or area) of the additional marks may render it impossible to detect those marks with a rather simple detector.
The invention also provides a valuable object or security object comprising a security feature in accordance with the invention. Advantageously, a banknote is provided comprising the security feature in accordance with aspects of the invention.
The invention also provides a method of manufacturing a security feature in accordance with the aspect of the invention. An object or a component and/or element and/or area and/or region and/or portion of the object may then be analyzed for a specific characteristic, as for example a physical appearance of the object and/or the component and/or element and/or region and/or area, and/or portion of the object.
The object and/or the component and/or element and/or region and/or area and/or portion of the object is manufactured. A security element can then be applied to the object and/or the component and/or element and/or region and/or area and/or portion of the object, either after manufacturing the object, or while manufacturing.
The security feature can be adapted by shape and/or size and/or color and/or distribution and/or appearance to the characteristic of the object and/or the component and/or element and/or region and/or area and/or portion of the object.
If the characteristic is a certain pattern or assembly of marks, it can be advantageous to create additional marks for the security feature having about the same size, shape and/or color (individually). However, the additional marks are advantageously less in number then the already existing marks (original marks).
A channel coding may be used in order to provide a representation of predefined information or data that is machine readable and the physical appearance of which is similar to a characteristic of an object (or an element of an object) to which the security feature is applied. The characteristic of the object (or element of the object) can advantageously be due to a manufacturing process of the object. The characteristic can be a side- effect or unavoidable consequence of the manufacturing process. The characteristic can also be a desired effect or desired physical appearance of the object. This aspect of the invention generally provides that the security feature is not immediately visible when the object is inspected by the naked eye under normal ambient light (for example daylight). BRIEF DESCRIPTION OF DRAWINGS
Further advantages and characteristics of the invention will ensue from the following description of the preferred embodiments of the invention with reference to the accompanying drawings, wherein FIG.1 shows a simplified schematic representation of an object having specific production characteristics,
FIG. 2 shows the object of FIG. 1 carrying the security feature according to an embodiment of the invention,
FIG. 3 shows a simplified block diagram of an embodiment according to aspects of the invention,
FIG. 4 shows a simplified block diagram of an embodiment according to aspects of the invention,
FIG. 5 shows a simplified block diagram of an embodiment according to aspects of the invention, FIG. 6 shows a diagram illustrating aspects of the invention,
FIG. 7 shows a flow chart illustrating the procedure of creating a security feature in accordance with aspects of the invention,
FIG. 8 is a simplified schematic of an embodiment of the invention,
FIG. 9 is a simplified schematic of a detection apparatus, and FIG. 10 is a simplified schematic of an embodiment of the invention.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
FIG. 1 shows a simplified schematic representation of an object 1 having an inherent characteristic. In the present embodiment, this characteristic is a plurality of marks 2 which are created during manufacturing of the object 1. However, in general, these marks may be any kind of intended or non-intended characteristic. In this embodiment, the original marks 2 may, for example be anyone or several of the following: defects and/or impurities and/or particles and/or holes and/or fibers and/or pigments. These marks or defects can be randomly distributed.
FIG. 2 shows the object 1 of FIG. 1 again. However, the object 1 now includes additional marks 3 which are similar to the already existing (original) marks 2 and also seem randomly distributed. According to this aspect of the invention, the security feature is hidden by using an appearance for the marks 3 which is similar to the appearance of the original marks 2. Also the marks 3 themselves can have approximately the same shape, size, color or other characteristic to make the marks look like the marks 2. Advantageously, only a few marks are added, so that the general appearance of the original marks remains substantially unchanged. If the number of added marks 3 is w and the number of existing marks is v, an advantageous ratio is w < v (w is lower than v). The ratio v/w may advantageously be greater than 1 , and in some embodiments greater than 10 or greater than 20. In other words, the additional marks of the security feature are adapted to the existing marks of the object in terms of size, shape, distribution, number and/or color etc. This improves the covertness of the security feature. The security feature (i.e. in this embodiment, the additional marks of the security feature) blends into the area, region and/or portion of the object in which the additional marks are created. The location and/or shape and/or color and/or distribution of the additional marks represent(s) predetermined machine readable information (data). They are adapted to the characteristic (pre-existing marks due to manufacturing) of the object (or an element of an object) to which the security feature is applied. The characteristic of the object (or element of the object) can advantageously be due to a manufacturing process of the object. The characteristic can be a side-effect or unavoidable consequence of the manufacturing process. The characteristic can also be a desired effect or desired physical appearance of the object. The security feature is, at least not immediately visible when the object is inspected by the naked eye. FIG. 3 shows a simplified diagram of an embodiment according to aspects of the invention. In this embodiment, the raw data 4 is processed according to a channel coding algorithm in order to generate the channel encoded data 6. The channel encoded data 6 has the physical appearance necessary for hiding the channel encoded data in the object 1. Advantageous embodiments of the channel coding are described below.
FIG. 4 shows a simplified diagram of an embodiment of the invention according to aspects of the invention. In this embodiment, the raw data 4 is first processed according to an error correction algorithm (for example Reed-Solomon error correction) in order to generate the error correction coded data 8. This error correction coded data 8 is then processed according to the channel coding algorithm 5 in order to generate the channel encoded data 6. The additional error correction process can advantageously be used to incorporate redundant data into the raw data. This redundant or additional data can then serve to detect and/or to correct errors during a read-out process of the channel encoded data 6. The Reed- Solomon algorithm is well-known in the art and the amount of redundant data can be adapted to the specific requirements of the application.
FIG. 5 shows a simplified diagram of an embodiment according to aspects of the invention. The raw data 4 is first processed according to an encryption algorithm (as for example AES - advanced encryption standard) in which for example a key is used. The encrypted data 10 is then processed according to the error correction algorithm 7 (as previously described). The error correction coded data 8 is then processed with a channel coding algorithm 5 in order to obtain the channel encoded data 6 (as previously described).
In other words, the predetermined information or data that is represented by the security feature can be encrypted raw data. Any pre-determined information/data (typically digital data) may then be encrypted before it is channel coded. This increases the security of the feature. Furthermore, an error correction algorithm, as the Reed-Solomon algorithm can be applied to the data in order to make it possible to detect and/or correct detection/read-out errors. FIG. 6 shows a simplified diagram illustrating the channel coding process 5. Just as a simplified example, there are binary numbers 1011 (11) representing is either the raw data 4, the error correction coded data 8 or the encrypted data 10. This multi-bit word 1011 can only be a part of a long data stream including a plurality of multi-bit words. For each multi-bit word of the data stream (in this example 4 bit) a specific symbol is generated and assigned to this multi-bit word. In the present example, the bit word 1011 as the specific symbol 11. The marks 31 , 32 have a specific size, shape and location within a certain area, field, region and/or portion of the object 1. The multi-bit word 1100 (12) may then be another multi-bit word of the data stream to be processed. As previously described, this data stream, can be the raw data 4, the error correction coded data 8 or the encrypted data 10. The multi-bit word 1100 also has a specific predetermined symbol 11 with marks 33 and 34. All marks 31 , 32, 33 and 34 are substantially adapted to have the physical appearance of marks already present on an object 1. Furthermore, the distribution of the marks 31 , 32 and 33, 34 within a specific area as well as the number of the marks 31 , 32, 33 and 34 within the specific area can also be adapted to the given characteristics of the object 1. In other words, also the blocks (area of symbols) can be adapted to hide the additional marks. Each multi- bit word (in case of a 4 bit word there are 24=16 different multi-bit words), one specific symbol can be generated which is advantageously different from all other symbols. In order to increase the reliability and in order to reduce the error rate during detection, the number of the marks within each symbol 11 can be increased as long as the covertness of the security feature is not impaired.
The process of assigning additional marks/groups of additional marks/symbols to the predetermined data/information such that the physical appearance of the security feature is similar to a specific physical characteristic of the object is the process of channel coding. The marks/groups of marks/symbols are then properly arranged on the object while taking care that the physical appearance of the preexisting marks (the existing characteristic) is not affected.
The original marks can be due to the manufacturing process of the object. The original marks are randomly distributed. The original characteristic of the object is imitated by adding marks/groups of marks/symbols without substantially changing the original physical appearance of the object. The original marks may be defects and/or impurities and/or particles and/or holes and/or fibers and/or pigments, etc. The security feature may then comprise additional marks having a similar appearance as the originally existing marks. The additional marks can be similar to the original marks in terms of size, shape, number, distribution, color etc. Each of these aspects of the invention further improves the covertness of the security feature. All the pre-existing characteristics or pre-existing marks can be substantially invisible to the naked eye. This means that the marks are not obvious when inspected by the naked eye without using a magnifying glass, a microscope or other means of inspection. The additional marks may then have the same appearance and also be substantially invisible to the naked eye. The location (relative and/or absolute), size and/or shape and/or color of the individual additional marks etc. is used to store the pre-determined machine readable information in the object.
A group of marks or a symbol can be more easily identified than a single mark. A group or symbol can advantageously be based on redundant information. The more redundant the information of a symbol or group of marks, the lower the error rate during read out of the information. All detectable parameters and properties of the marks, be it individual, be it with respect to each other (relative location/position) or with respect to the object can advantageously be used to represent information (data).
Each of the groups of marks/symbols has a predetermined number of marks. The number of marks per group may for example be n (n being a positive integer). In advantageous embodiments n = 1 , 2, 3, 4, 5, 6 or more. In the present embodiment, n is equal to 2 (n=2).
The number of bits of the multi-bit word can be j (n being a positive integer). In this embodiment, j is equal to 4 (j=4). However, it is also possible to chose j = 2, 3, 4, 5, 6, 7, 8, 9, 10 or more.
Although the number of additional marks per symbol can be equal to the number of bits of the multi-bit word, in the present embodiment, the number of additional marks per group is different from the number of bits of the multi-bit word that is represented by the group of additional marks. In other words, an additional mark does not necessarily represent a single bit.
Two or more different symbols can be used for the multi-bit word. This is advantageous as the redundancy within the security feature is then further increased while the random appearance is also improved. One of the multiple possible symbols is then randomly selected and arranged on the object. FIG. 7 shows a simplified flow chart illustrating the process of generating the security feature during the channel coding process. In step S1 input data is passed to the channel coding process. Just as an example, a data stream 4, 8, 10 is indicated on the right hand side of step SI . In step S2, a multi-bit word (in this example 4 bit) is selected from the data stream. In step S3, a specific symbol is selected for the specific multi-bit word. In step S3 a predefined set of symbols may be used which is generated in a symbol generator. Different sets of symbols may be used within a single object (depended on the number of security features present on the object) or for different objects.
It is also possible to use the security feature according to aspects of the invention hierarchically. This means that a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more sophisticated detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature. In order to define an appropriate channel coding (definition of the properties of the security feature), an object 1 or a component, element, area, region and/or portion of the object may then be analyzed for a specific characteristic, as for example a physical appearance of the object and/or the component, element, region, area, and/or portion of the object. The security element can then be applied to the object and/or the component, element, region, area, and/or portion of the object, either after manufacturing the object and/or the component, element, region, area, and/or portion of the object, while manufacturing the object and/or the component, element, region, area, and/or portion of the object, or after manufacturing the object and/or the component, element, region, area, and/or portion of the object
FIG. 8 shows a simplified diagram of an embodiment of the invention. In the present embodiment, the object 1 is a valuable document, and more specifically a banknote. In other embodiments, the object 1 to which the security feature is applied may be a valuable object, a security object, a consumer product, a security document, a certificate (for example of birth, residence, marital status, name etc.), a certified copy of a document, a card, as for example a smart card, an access card, a credit card, a bonus card, an identity card, a passport, etc.
The security feature is incorporated into the metalized stripe or patch 15 (for example a layer, sheet or foil having a thin metal layer) of the valuable document (banknote). In other words the element of the object 1 to which the security feature is applied, can be the metalized stripe or patch.
In this embodiment, the security feature is a laser written structure. The added marks 3 of the security feature are local, micrometer sized demetalizations. The metal (or other) layer of the metalized stripes of banknotes (and other documents) has defects in the form of little holes which seem randomly distributed over the stripe. The security feature is spread over the whole stripe by adding the additional marks 3 in form of holes. These holes are generated by a laser (not shown) and look like all other demetalized dots which are due to the manufacturing process. The security feature is written using a high resolution laser lithographic system allowing direct demetalization of thin metal layers.
The demetalization has very small dot sizes (only a few micrometers, as for example 1 , 2, 3, 4 up to 10, 16 or 20 μιτι) and a very high positional accuracy of for example 0,1 , 0,2 up to 0,5 pm. The original marks (dots/holes) which are also present in the stripe are not shown. The security feature only comprises a few additional micrometer sized dots that appear randomly distributed. If these dots are sufficiently small, they cannot be observed with the naked eye, neither in reflection nor in transmission. Even with a magnifying glass or microscope, the dots cannot be detected in reflection mode by the naked eye. Only in transmission mode and by use of a microscope, the dots can be identified.
The number of dots (additional marks) per area of the stripe can then be very low. In this embodiment, the total number of dots on the entire stripe or within a data field may be between 100 and 200 (FIG. 8 is only a simplified drawing). This improves the covertness of the feature.
The positions of the marks within each symbol are randomly distributed (pseudo-randomly). The marks (or dots) do then appear like a random pattern similar to the original defects in the metalized foil stripes of the valuable documents such as banknotes. An individual composition or set of symbols can be used for each object (banknote).
The added marks are arranged in groups (symbols) 11 as previously described and the groups/symbols 11 are arranged on the metalized stripe of the valuable document. A specific area is determined in which the (all) marks of a group/symbol are found. This area is referred to as a block. All blocks of the security feature can then be arranged side-by-side (non-overlapping). This simplifies the detection. An overlapping arrangement of the blocks is also possible. A block may be a rectangular area. However, in other embodiment, different shapes of a block can be used. A certain number of blocks can be combined. This combination of blocks is referred to as a data field 12. A single data field 12 may then carry the entire stored information/data. The data field may be repeated along the stripe (here three times). This further increases the redundancy and therefore the robustness of the security feature. If one of the data fields is destroyed, another data field can be used to read the data/information stored in the security feature. Each data field may use different symbols or sets of symbols for the same data. This provides that the stripe 15 does not show any regularity (repetition of patterns). For example, a Reed-Solomon error code RS(m,k) transforms k symbols of data into j bit by adding 2*t parity symbols of j bit. The result is m symbols of j bit. In the decoding step t=(m-k)/2 incorrect symbols can be detected and corrected.
Generally, the number of bits to be stored in the feature depends on the used error correction algorithm and the number of errors which are to be detected and/or corrected.
According to an embodiment of the invention, individual user data may be incorporated into the banknote. If for example, the user storage capacity of the security feature is x bit (k multi-bit-words of j Bit, i.e. x=k*J), it is possible to incorporate for example a serial number that can be represented by y bit, while y is equal to or lower than x. The data may be a serial number of the valuable document. In another embodiment, only a part of the user data may be used (for example for a serial number) and the remaining z=x-y bit may be used for other information. An example including (Reed-Solomon) error correction may have the following data structure:
- number of bits per multi-bit-word (=symbol): j = 4
- User information: x= 12 * 4 bit = 48 user bit (k = 12)
- Error correction (Reed-Solomon): 48 user bit + 48 bit (parity) = 96 error coded bit (t=6 wrong 4-bit-symbols can be corrected)
The data stored in the security feature on the stripe can be individual user data. If for example, the storage capacity of the security feature is x bit of data (k multi- bit-words of j Bit), it is possible to incorporate for example a serial number that can be represented by y bit, and y <= x. In this embodiment, the data is the serial number of the valuable document (banknote). Only a part of the x bits is used for the serial number and the remaining z= x-y bits are used for other information.
The individual user data to be stored in the security feature, can be the serial number 18, but also a batch number, a denomination, a production country, a production year or other information. The additional information/data stored in the security feature can be statistical data or other features of the valuable document. This may then lead to the possibility of correlating security features or data of the valuable document. Using correlation can improve the level of security against copying and counterfeiting.
The additional data/information can indicate production variations of the object 1. These production variations may comprise properties like optical density, alignment, geometrical distortions, edge sharpness, holes etc.
The data/information in the security feature can be correlated with another security feature of the object. This other security feature may be a UV (ultraviolet), magnetic or infrared (IR) print.
Two symbols 11 of one set of symbols (for example all symbols of one data field in this example) never share any marks. This means that the additional marks of two symbols are never at the same location and/or the additional marks of different symbols can also vary in shape and/or size.
The number of marks per symbol can be increased as long as the physical appearance of the object is not affected (at least not above a level that renders ten additional marks visible to the naked eye). This reduces the error rate as a symbol may still correctly be detected and read-out, even if not all marks are readable. The detection becomes more robust, the more marks are used per symbol.
The positions of the marks within the symbols are randomly chosen. The security feature of each banknote is individually calculated. This provides a unique individual structure for each object 1 (banknote).
According to an aspect of the invention, an additional marking 13, 14 or structure may be provided on the object 1 carrying the security feature. The additional marking 13, 14 serves to align the object with a detector in order to readout the security feature. In this embodiment of the invention, the object 1 comprises a first additional marking 13 for rough alignment and a second additional marking 14 for fine alignment. The second marking 14 (for fine alignment) is made by the same manufacturing steps and/or devices used for the additional marks 3 of the security feature. In other words, the laser used for the additional marks may also be used for the second marking 14. This provides that the same precision is achieved for the additional marks 14. FIG. 9 shows a simplified drawing illustrating the detection of the security feature. The security feature is read-out with a dedicated sensor or detection apparatus.
With respect to the above described embodiment using the stripe or patch and demetalized dots, the security feature can be read-out using an optical arrangement including for example a light source 16 and a microscope 17 (including a camera). A light source 16 can be located behind the valuable document (backside) and the microscope 17 (including a camera) is located on the opposite side of the valuable document (front side). The additional marks 3 of the security feature may be a very little bit larger (in maximum diameter or cross- sectional area) than the original marks/dots, such that the demetalized dots appear a little bit brighter than the background.
A picture is taken (by the camera inside 17) of the area were the security feature is located. The picture is then processed (image processing). Since the locations of added marks are known, the pattern recognition algorithm can directly search for the specific additional marks. If the marks are detected, the authenticity of the object is confirmed. Due to redundancy, the authenticity can also be confirmed, if only a few and not all additional marks are detected.
The robustness of the coding allows very stable read-out of the security feature at high transport speeds of the valuable document, in particular of banknotes. The same basic structure of the security element may be used on different valuable documents.
Each symbol can be located within a specific area, region or portion of the object. According to still another aspect of the invention the security feature is organized hierarchically. This means that a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more sophisticated detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
The different hierarchical levels within the security feature can be provided by using different shapes, sizes, colors, numbers, distributions and/or patterns for the marks of different levels of the security feature. For example, a smaller size of the marks may render it impossible to detect those marks with a rather simple detector. FIG. 10 shows another embodiment of the invention. In this embodiment, additional marks are added to a sheet or layer or surface of an object. There are no original marks. The additional marks are adapted to a characteristic of the object. The additional marks may be adapted in anyone of following characteristics in order not to be visible to the naked eye: distribution and/or size and/or the shape and/or the color. The pre-determined machine readable information can then be represented by the relative locations and/or sizes and/or shapes and/or colors of the additional marks. The error coding and/or channel coding as well as the encryption can then be performed as described with respect to the other embodiments of the invention. The additional marks can be arranged in blocks (predefined limited area). These blocks can be overlapping or non-overlapping. The blocks can have any predetermined shape as for example rectangular or circular etc.
In the present embodiment, this characteristic is the appearance of the surface of an object 1 , as for example a sheet of paper or plastic.
The object 1 includes additional marks 3 seeming randomly distributed. The security feature is hidden by the random appearance of the marks. The additional marks 3 can also be adapted in size and number per area (distribution) in order to be hidden to the visible eye. Advantageously, only a few marks are added, so that the general appearance of the surface of the object 1 remains substantially unchanged. The additional marks of the security feature blend into the area, region and/or portion of the object in which the additional marks are created.
The location and/or shape and/or color and/or distribution of the additional marks represent(s) predetermined machine readable information (data). They are adapted to the characteristic of the object (or an element of an object) to which the security feature is applied. The characteristic (color, etc) of the object 1 (or element of the object) can advantageously be due to a manufacturing process of the object 1. The characteristic can be a side-effect or unavoidable consequence of the manufacturing process. The characteristic can also be a desired effect or desired physical appearance of the object. The security feature is, at least not immediately visible when the object is inspected by the naked eye.
Similar to the other embodiments of the invention, raw data 4 can be processed according to a channel coding algorithm in order to generate the channel encoded data 6. The channel encoded data 6 has the physical appearance necessary for hiding the channel encoded data in the object 1. In this embodiment, the raw data 4 can first be processed according to an error correction algorithm (for example Reed-Solomon error correction) in order to generate the error correction coded data 8. This error correction coded data 8 can then be processed according to the channel coding algorithm 5 in order to generate the channel encoded data 6. The additional error correction process can advantageously be used to incorporate additional data into the raw data. This redundant or additional data can then serve to detect and/or to correct errors during a read-out process (detection process) of the channel encoded data 6. Error correction algorithms, as for example the Reed-Solomon algorithm, are well-known in the art and the amount of redundant data can be adapted to the specific requirements of the application.
The raw data 4 can also be processed according to an encryption algorithm (as for example AES - advanced encryption standard) in which for example an encryption key is used before the error correction algorithm is applied. The encrypted data 10 can then be processed according to the error correction algorithm 7 (as previously described). The error correction coded data 8 is then processed using a channel coding algorithm 5 in order to obtain the channel encoded data 6 (as previously described).
In other words, the predetermined information or data that is represented by the security feature can be encrypted raw data. Any pre-determined information/data (typically digital data) may then be encrypted before it is channel coded. This increases the security of the feature. Furthermore, an error correction algorithm, as for example the Reed-Solomon algorithm, can be applied to the data in order to make it possible to detect and/or correct detection/read-out errors. An advantageous channel coding process 5 is shown in FIG. 6, which can also be applied to the embodiment of FIG. 10. The process of assigning marks/groups of marks/symbols to the predetermined data/information such that the physical appearance of the security feature is similar to a specific physical characteristic of the object is the process of channel coding. The marks/groups of marks/symbols are then properly arranged on the object while taking care that the physical appearance of the existing characteristic of the surface of the object is not affected to an extent that the additional marks become visible to the marked eye. The preexisting characteristic can be substantially invisible to the naked eye.
A group of additional marks or a symbol can be more easily detected than a single mark. A group or symbol can advantageously be based on redundant information. The more redundant the information of a symbol or group of marks, the lower the error rate during read out of the information.
All detectable parameters and properties of the additional (added) marks, be it individual, be it with respect to each other or with respect to the object can advantageously be used to represent information (data).
Each of the groups of marks/symbols has a predetermined number of marks. The number of marks per group may for example be n (n being a positive integer). In advantageous embodiments n = 1 , 2, 3, 4, 5, 6 or more. In the present embodiment n=2. The number of marks per symbol can be equal to the number of bits of the multi-bit word or the number of marks per group can be different from the number of bits of the multi-bit word that is represented by the group of marks. In other words, a mark does not necessarily represent a single bit.
Two or more different symbols can be used for the same multi-bit word. This is advantageous as the redundancy within the security feature is then further increased while the random appearance is improved. One of the multiple possible symbols is then randomly selected and arranged on the object.
This channel coding process shown in FIG. 7 can also be applicable to the embodiment shown in FIG. 10. It is also possible to use the security feature according to aspects of the invention hierarchically. This means that a security feature may have different levels so that a first level is detectable by rather simple detectors. Some marks provided within the security feature may then not be detectable by the simple detectors but only by more sophisticated detectors. Accordingly, it is possible to incorporate different levels of security within a single security feature.
In order to define an appropriate channel coding (definition of the properties of the security feature), an object 1 or a component, element, area, region and/or portion of the object may then be analyzed for a specific characteristic, as for example a physical appearance of the object and/or the component, element, region, area, and/or portion of the object. The security element can then be applied to the object and/or the component, element, region, area, and/or portion of the object, either after manufacturing the object and/or the component, element, region, area, and/or portion of the object, while manufacturing the object and/or the component, element, region, area, and/or portion of the object.
The object 1 to which the security feature is applied may be a valuable object, a security object, a consumer product, a security document, a certificate (for example of birth, residence, marital status, name etc.), a certified copy of a document, a card, as for example a smart card, an access card, a credit card, a bonus card, an identity card, a passport, etc.
The security feature can be applied to the surface in form of dots or holes or fibers. These dots or holes or fibers then form the additional marks. In the present embodiment, the marks are printed dots. The added marks 3 of the security feature are micrometer sized dots. The added marks seem randomly distributed over the surface of the object. The security feature can be spread over the whole surface of the object by adding the additional marks 3 in form of dots.
The dot size (diameter) of the additional marks 3 can be a few micrometers, as for example 1 , 2, 3, 4 up to 10, 16 or 20 pm, The security feature only comprises a few additional micrometer size dots that appear randomly distributed. If these dots are sufficiently small, they cannot be observed with the naked eye, neither in reflection nor in transmission. Even with a magnifying glass or microscope, the dots may not be detected. The number of dots per area of the surface of the object can then be very low. The positions of the marks within each symbol (block) are pseudo-randomly distributed, which means they are predetermined but seem randomly distributed. The marks (or dots) do then appear like a random pattern.
An individual composition or set of symbols can be used for each object (banknote).
The added marks are arranged in groups (symbols) 11 as previously described and the groups/symbols 11 are arranged on the surface of the object 1. A specific area is determined in which the (all) marks of a group/symbol are found, which is referred to as a block. All blocks of the security feature can then be arranged side- by-side (non-overlapping). An overlapping arrangement of the blocks is also possible. A block may be a rectangular area. However, in other embodiment, different shapes of a block can be used. The blocks can be combined to a data field 12 as previously described. A single data field 12 may then carry the entire stored information/data. The data field may be repeated over the surface of the object. This further increases the redundancy and therefore the robustness of the security feature. If one of the data fields 12 is destroyed, another data field can be used to read the data/information stored in the security feature. Each data field may use different symbols or sets of symbols for the same data. This provides that the surface of the object 1 does not show any regularity (repetition of patterns).
The object 1 comprises a first additional marking 13 for rough alignment and a second additional marking 14 for fine alignment. The second marking 14 (for fine alignment) is advantageously made by the same manufacturing steps and/or devices (i.e. for example the same printer etc) used for the additional marks 3 of the security feature.
In other words, the laser may also be used for the second marking 14. This provides that the same precision is achieved for the additional marks 14.
Error correction algorithms and/or encryption algorithms can be applied as previously described with respect to other embodiments of the invention, The additional information/data stored in the security feature can be statistical data or other features of the object 1. This may then lead to the possibility of correlating security features or data of the object 1. Using correlation of data as previously described can improve the level of security against copying and counterfeiting.
All the other aspects and characteristics of the invention can also be applied to this embodiment of the invention.
Although the invention has been described hereinabove with reference to specific embodiments, it is not limited to these embodiments and no doubt further alternatives will occur to the skilled person that lie within the scope of the invention as claimed.

Claims

1. A security feature storing predetermined machine readable data and being adapted to an inherent characteristic of an object to which the security feature is applied.
2. The security feature according to claim 1 , wherein the security feature comprises or is formed of additional marks being adapted to the inherent characteristic of the object in terms of size and/or shape and/or distribution and/or number and/or color and representing the predetermined machine readable data.
3. The security feature according to claim 1 or 2, wherein the characteristic of the object is a plurality of original marks.
4. The security feature according to claim 3, wherein the original marks are a consequence of the manufacturing process of the object.
5. The security feature according to anyone of claims 3 or 4, further comprising additional marks representing the predetermined machine readable data and having a similar appearance as the original marks.
6. The security feature according to claim 5, wherein the additional marks are similar to the original marks in terms of size, shape, number, distribution and/or color.
7. The security feature according to claim 5 or 6, wherein the additional marks and the original marks are substantially invisible to the naked eye.
8. The security feature according to anyone of claims 2 to 7, wherein the predetermined machine readable data is represented by the relative and/or absolute locations, sizes, shapes and/or colors of the additional marks.
9. The security feature according to anyone of claims 2 to 8, wherein the additional marks are arranged in groups.
10. The security feature according to claim 9, wherein each group of additional marks represents a multi-bit word of the predetermined machine readable data.
11. The security feature according to anyone of claims 9 or 10, wherein two or more different groups represent the same multi-bit word.
12. The security feature according to anyone of the previous claims, wherein the predetermined machine readable data is encrypted.
13. The security feature according to anyone of the previous claims, wherein the predetermined machine readable data is error coded
14. The security feature according to anyone of the previous claims, being further configured to have different levels of security.
15. The security feature according to anyone of the claims 2 to 14, wherein the additional marks are written by a laser or printed.
16. The security feature according to anyone of the claims 2 to 15, wherein the additional marks of the security feature are local, micrometer sized demetalizations and/or the additional marks are located in a metalized stripe or patch of a valuable document.
17. The security feature according to anyone of the previous claims, wherein the predetermined machine readable data comprises individual user data.
18. The security feature according to anyone of the previous claims, wherein the predetermined machine readable data is correlated with data relating to the object.
19. The security feature according to anyone of the previous claims, further comprising an additional marking for fine alignment.
20. An object, in particular a banknote comprising the security feature according to anyone of the previous claims.
PCT/EP2014/057399 2013-04-11 2014-04-11 Security feature and object with security feature WO2014167103A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP14716594.8A EP2984607A1 (en) 2013-04-11 2014-04-11 Security feature and object with security feature

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP13163309.1A EP2790133B1 (en) 2013-04-11 2013-04-11 Security feature and object with security feature
EP13163309.1 2013-04-11

Publications (1)

Publication Number Publication Date
WO2014167103A1 true WO2014167103A1 (en) 2014-10-16

Family

ID=48095652

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2014/057399 WO2014167103A1 (en) 2013-04-11 2014-04-11 Security feature and object with security feature

Country Status (3)

Country Link
EP (2) EP2790133B1 (en)
ES (1) ES2727101T3 (en)
WO (1) WO2014167103A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022039050A1 (en) 2020-08-17 2022-02-24 東レ株式会社 Epoxy resin composition, prepreg, and fiber-reinforced composite material

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2019224175A1 (en) * 2018-02-20 2020-10-01 Chameleon Innovations Australia (Cia) Pty Ltd Method for article authentication

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10100063A1 (en) * 2001-01-02 2002-07-11 Giesecke & Devrient Gmbh Security with integrated circuit as well as a method for authenticity checking and a method for quality monitoring
WO2002095674A1 (en) * 2001-05-21 2002-11-28 Oji Paper Co., Ltd. Ic chip mounting element, production method therefor and thermal transfer film used in the production method
US20030115470A1 (en) * 2001-12-14 2003-06-19 Cousins Steve B. Method and apparatus for embedding encrypted images of signatures and other data on checks
DE10304805A1 (en) * 2003-02-05 2004-08-19 Informium Ag Process for the production of security labels
US7353994B2 (en) 2000-12-20 2008-04-08 Andrew John Farrall Security, identification and verification systems
WO2009150622A2 (en) 2008-06-12 2009-12-17 Keit Ltd. Encrypted marking and method for securing and certifying the authenticity of a product
WO2011098803A1 (en) 2010-02-10 2011-08-18 De La Rue International Limited Security element for document of value

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4939354A (en) * 1988-05-05 1990-07-03 Datacode International, Inc. Dynamically variable machine readable binary code and method for reading and producing thereof
KR100765752B1 (en) * 2005-06-10 2007-10-15 삼성전자주식회사 Method and apparatus for detecting specific pattern and copying machine including same

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7353994B2 (en) 2000-12-20 2008-04-08 Andrew John Farrall Security, identification and verification systems
DE10100063A1 (en) * 2001-01-02 2002-07-11 Giesecke & Devrient Gmbh Security with integrated circuit as well as a method for authenticity checking and a method for quality monitoring
WO2002095674A1 (en) * 2001-05-21 2002-11-28 Oji Paper Co., Ltd. Ic chip mounting element, production method therefor and thermal transfer film used in the production method
US20030115470A1 (en) * 2001-12-14 2003-06-19 Cousins Steve B. Method and apparatus for embedding encrypted images of signatures and other data on checks
DE10304805A1 (en) * 2003-02-05 2004-08-19 Informium Ag Process for the production of security labels
WO2009150622A2 (en) 2008-06-12 2009-12-17 Keit Ltd. Encrypted marking and method for securing and certifying the authenticity of a product
WO2011098803A1 (en) 2010-02-10 2011-08-18 De La Rue International Limited Security element for document of value
US20130043311A1 (en) * 2010-02-10 2013-02-21 De La Rue International Limited Security element for document of value

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2984607A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022039050A1 (en) 2020-08-17 2022-02-24 東レ株式会社 Epoxy resin composition, prepreg, and fiber-reinforced composite material

Also Published As

Publication number Publication date
EP2984607A1 (en) 2016-02-17
EP2790133A1 (en) 2014-10-15
ES2727101T3 (en) 2019-10-14
EP2790133B1 (en) 2019-02-20

Similar Documents

Publication Publication Date Title
US11548310B2 (en) Authenticating identification and security documents and other objects
US8055013B2 (en) Conveying auxilliary data through digital watermarking
JP5528457B2 (en) Geometric code authentication method and apparatus
US6978036B2 (en) Tamper-resistant authentication techniques for identification documents
EP2533982B1 (en) Security element for document of value
RU2458395C2 (en) Methods and apparatus for ensuring integrity and authenticity of documents
JP2008541260A (en) Authentication of banknotes or other physical objects
US9854127B2 (en) Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
US20210074109A1 (en) Verification of an article provided with a security element
JP2009184134A (en) Invisible identification information containing printed matter, printing method thereof and printing device therefor, authenticity determination method of printed matter and authenticity determination device therefor
EP3113083A2 (en) Method for protecting the authenticity of an object, item, document, packaging and/or a label from imitation, forgery and theft
EP2790133B1 (en) Security feature and object with security feature
WO2003030105A2 (en) System and method for authentication and tracking of a workpiece
KR20170097760A (en) A method for proving and authenticating secure documents based on measurements of relative position changes of different processes involved in manufacture
JP6112358B2 (en) Pattern forming body
WO2016197025A1 (en) System and method for production and verification of counterfeit-protected banknotes
JP2016104527A (en) Printed matter and manufacturing method of the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14716594

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2014716594

Country of ref document: EP