WO2017064233A1 - Procédé de vérification d'un document, document et système informatique - Google Patents

Procédé de vérification d'un document, document et système informatique Download PDF

Info

Publication number
WO2017064233A1
WO2017064233A1 PCT/EP2016/074664 EP2016074664W WO2017064233A1 WO 2017064233 A1 WO2017064233 A1 WO 2017064233A1 EP 2016074664 W EP2016074664 W EP 2016074664W WO 2017064233 A1 WO2017064233 A1 WO 2017064233A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
computer system
image
signature
user computer
Prior art date
Application number
PCT/EP2016/074664
Other languages
German (de)
English (en)
Inventor
Helmut Moritz MAXEINER
Steffen Scholze
Matthias DR. SCHWAN
Frank Müller
Elke DR. FILZHUTH
Original Assignee
Bundesdruckerei Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei Gmbh filed Critical Bundesdruckerei Gmbh
Priority to EP16788643.1A priority Critical patent/EP3362999B1/fr
Publication of WO2017064233A1 publication Critical patent/WO2017064233A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the invention relates to a method for checking a document, in particular a value and / or security document. Of more valuable, the invention relates to a document and a computer system for carrying out such a method.
  • document-specific information can be stored in a background system, for example a server computer system.
  • the document-specific information may be, for example, revocation information, a validity period or other information that can confirm or refute the validity of the document.
  • a payload computer system may retrieve document data from the document and send a release request to the server computer system for verification of the document via a secure connection.
  • the release request typically includes encrypted document data that is decrypted by the server computer system for verification.
  • the server computer system can access the decrypted data stored on the data to this data document see information and send a release information depending on the stored information.
  • the document data of the ID card could be stored and, for example, a movement profile of the user can be created, even if this document data is transmitted in encrypted form.
  • the object of the invention is therefore to provide a method, a document and a computer system that allow a review of a document, with the greatest possible anonymity of the user should be guaranteed.
  • Embodiments of the invention are the subject of the dependent claims.
  • Embodiments of the invention are particularly advantageous, since the inspection feature sent to the server computer system was also determined from a random value in addition to the document information, so that no tracing back of the check feature to the document data is possible. Thus, no data of the document holder, but only the anonymized inspection feature are sent to the server computer system. Thus, it is not possible that person-specific data can be stored on the server computer system. It is also not necessary to store personal data on the server computer system or on the user computer system. Thus, the greatest possible anonymity is ensured while at the same time ensuring reliable monitoring of the document.
  • a "user” is understood to mean a natural person.
  • a "value, identity or security document” is understood to mean a paper and / or plastic-based document on which person-specific and / or document-specific information is visually readable, which identifies the user or the document, for example for release and Use of certain services or features.
  • identity documents in particular passports, identity cards, visas and driving licenses, vehicle registration documents, vehicle registration documents, company identity cards, health cards or other ID documents, as well as consignment notes or other proofs of entitlement.
  • the document may also be a voucher or an access card.
  • the document may be a "Machine Readable Travel Document (MRTD)" as specified by the International Aviation Authority (ICAO) Such document enables the identification of the holder by means of an on-line procedure. Identification of an MRTD when no network is available.
  • MRTD Machine Readable Travel Document
  • ICAO International Aviation Authority
  • information is understood as meaning all information that is applied to the document and relates to a person and / or the document or to an identification of the person and / or the document, for example, the information personal data or data with which a release for certain services can take place.
  • the information may be designed for a one-time authentication of the document, such as a voucher. After a single authentication, the document can be revoked for re-authentication. Alternatively, however, the information can also be provided for a repeated authentication, wherein a defined number of authentication processes is also conceivable and after reaching this number no further authentication can take place.
  • optical sensor is understood to mean a sensor or an interface via which information can be detected optically, for example, the optical sensor is a camera.
  • a "user computer system” is understood here to mean a computer system to which the user has access, which can be, for example, a personal computer (PC), a tablet PC or a telecommunications terminal, in particular a smartphone an interface for connection to a communication network, wherein the communication network network can be a private or public network, in particular the Internet Depending on the embodiment, this connection can also be established via a mobile radio network Sensor for acquiring the information.
  • PC personal computer
  • tablet PC a tablet PC or a telecommunications terminal
  • the communication network network can be a private or public network, in particular the Internet
  • this connection can also be established via a mobile radio network Sensor for acquiring the information.
  • a "telecommunication terminal” here is a portable, battery-operated device with an interface for a communication network understood, in particular a mobile phone, a smartphone or a portable computer, such as a laptop, notebook or tablet PC with an interface for the communication network.
  • the interface for the communication network may be a mobile radio interface or an interface for another wired or wireless communication, such as a Bluetooth and / or a WLAN interface.
  • Interfaces are understood to mean here any devices on the computer system or on the telecommunication terminal, via which a connection to a communication network can be established.For example, the interfaces can be designed for wireless communication with a communication network for connecting the computer system or the telecommunication terminal to a wired communication network are formed.
  • a “communication network” here means any type of telecommunication network into which the user computer system, in particular the telecommunication terminal, can dial in.
  • this term encompasses telecommunication networks, which according to a mobile radio standard, such as a GSM, UMTS,
  • communication networks such as wired Internet networks, wireless LAN networks or connections via Bluetooth or another interface of the telecommunication terminal can be established via such a communication network, for example a connection to the Internet can be established the connection can be established directly via a Wi-Fi network, a Bluetooth connection or other short-range connection.
  • a “server computer system” is understood to mean a data processing system which can confirm or deny the identity of a user to third parties in an automated manner.
  • An “el D provider computer system” is a data processing system that can confirm or deny the identity of a user to third parties in an automated manner.
  • "An” el D provider computer system is preferably located in a specially protected environment, particularly in a so-called Trust center, so that the confirmation of a user's identity by an elD provider computer system has a particularly high reliability.
  • machine-readable in optical form applied information are understood, for example:
  • Guilloche are printed on the document with the help of so-called line printing. They generally consist of various fanbands of superimposed wave and loop patterns; - Micro-font: These are printed letters in the smallest font. With the naked eye, the micro-font can hardly recognize. For example, micro-typeface is incorporated into the motifs on the euro banknotes as a picture element. With the help of a magnifying glass, the micro-font can be read;
  • metameric color uniformity Due to metameric color uniformity, different spectral compositions of light in humans can produce the same color impression and, for example, make them visually perceptible by means of color filters or variable illumination sources;
  • euro banknotes are equipped with this optical security feature;
  • Barcode in particular one or two-dimensional barcodes, monochrome or multicolor;
  • optical security features can be visually, in particular also cognitively, detected by a user, in particular be machine-detectable with an optical sensor.
  • the document itself does not require any sections for reading out the data or the random value, so that the production of the document can be simplified. In particular, it is not necessary for the method that the document must have a chip.
  • a tamper-proof image and a code are applied to the document, the code being determined with an image of the image, the image having a reduced amount of data compared to the image, the method comprising the following steps:
  • a tamper-proof image here means an image which is provided with one or more security features.
  • security features may be optical or non-optical in nature.
  • the binary representation of the image is less than or equal to the binary representation of the image.
  • the amount of data can be reduced, for example, by reducing the resolution by scaling, reducing the color space covered by merging colors or other known reduction methods.
  • the amount of data is reduced such that the optically readable code of the image requires only limited space on the document.
  • the reduction in the amount of data can therefore be selected as a function of the space available on the document, wherein the image can still be cognitively captured by the user and compared with the image.
  • the code of the image can be created from the image, wherein the code of the image is encrypted, for example, with a private key of the user, the associated public key is certified / certified by a public authority.
  • the code of the image may be associated with the signature, in particular concatenated, and received together as a single optically readable code;
  • code refers to either the variant containing only the code of the image or the variant containing the code of the image and the signature, thus requiring only one receiving operation, whereby the process can be simplified
  • the code of the image can also be used to determine the inspection characteristic.
  • the security clearance verification request may include at least one of the following:
  • Timestamp of the request the timestamp being especially signed, - identity of the requester
  • the signature, the identity and / or the public key can be checked by the server computer system, and database access is only possible upon successful verification.
  • the release information may include at least one of the following:
  • Timestamp of the response time the timestamp being particularly signed
  • the user computer system can check the timestamp, the elements and / or the signature. If the check is successful, the received signal is displayed. If the check is unsuccessful, an error message will be displayed on the screen of the user computer system.
  • Submitting further data may increase the security of the review process.
  • the time of the request or the timeliness of the release information can be checked by transmitting a timestamp. If the identity of the requester is communicated, it can be checked whether the requester is authorized for such a verification request, thereby ensuring that the release information is not transmitted to unauthorized users. Likewise, the transmission of a signature or a key can ensure that the requesting party is entitled to such a verification request.
  • the document-specific information can be, for example, release information and / or revocation information. This allows a simple examination of the document without additional information, in particular user-specific see information, are required. In particular, it is not necessary to store user-specific information or data on the server computer system.
  • the server computer system requires only the anonymized inspection feature and the blocking or release information associated with the inspection feature. Since no business-specific data is stored on the server computer system, the greatest possible anonymity of the user is guaranteed.
  • the integrity of the document can be checked, whereby also in this method a storage of the person-specific data is not required by the anonymized test feature.
  • the test feature can also be used here, so that no nuancesren information or data is required.
  • a tamper-proof image is applied to the document, the method comprising the following steps:
  • the signature and / or the code may be applied to the document and read by the user computer system.
  • a first check of the document by checking the signature and visual inspection of the image and the image can be done before a connection is established to the server computer system.
  • the image can be viewed without a connection to the server computer system and compared with the image of the badge.
  • the signature can be received without connection to the server and the test feature can be compared with the read test feature.
  • the signature and / or the code are applied to the document in optically detectable form, they can be visually, in particular also cognitively, detected by a user, in particular be machine-detectable with an optical sensor.
  • the document itself does not require an interface for reading out the data or the random value, so that the production of the document can be simplified. In particular, it is not necessary for the method that the document must have a chip.
  • the signature and / or the code may be stored on a server computer system, wherein the user computer system establishes a secure connection to the server computer system and the signature and / or code is read from the user computer system.
  • the amount of data that is applied to the document can be reduced.
  • the random value can be highly entropic and in particular have a character length of at least five characters, wherein the individual characters can in particular assume the value of a digit or a letter.
  • the random value may be generated with a Binary Symmetry Source and have maximum entropy.
  • a signature, data for determining the identity and / or a public key of for sending a verification request of an authorized user can be stored on the server computer system.
  • a document for carrying out such a method has a machine-readable zone (MRZ) in which the document data are applied in optically, and optionally cognitively, detectable form so that they are detected by an interface, for example a reader can.
  • MMRZ machine-readable zone
  • free positions of the machine-readable zone can be used for the random value.
  • the areas of the document data used for the key may be located immediately before the random value, so that these parts as well as the random value can be read together.
  • a signature of a test feature in machine-readable form may be optically applied to the document, which may be stored from the document data as well as a key which has been determined from the random value and parts of the personal and / or document-specific data.
  • an image and a code in machine-readable form are optically applied to the document, the code being determined from an image of the image and optionally the signature of the inspection feature, the image having a reduced amount of data compared to the image.
  • the code of the image and the signature can be optically applied together in machine-readable form.
  • the document may further comprise a memory in which a signature of a verification feature is stored, which consists of the personal and / or document-specific data as well as a key, which consists of the random value and parts of the Personal and / or document-specific data has been determined, the document has an interface for reading the memory.
  • the document can be read out and checked optically, possibly even without connection to a server computer system. If a user computer system with a corresponding interface for reading out the document is present, the data can also be read out of the memory via the interface and a corresponding check of the document with the read-out data can take place.
  • FIG. 1 shows a system for carrying out a method for authenticating a passport or security document
  • FIG. 2 shows an illustration of a method for authenticating a passport or security document
  • FIG. 3 shows a representation of a method of manufacturing and / or
  • FIG. 1 shows a computer system 100 for authenticating a document 102, for example a passport or security document.
  • the document 102 is associated with a user 106 and / or a service.
  • a machine readable zone MMRZ
  • personal and / or document-specific data 104 are imprinted, imprinted or applied in some other way, so that they can be detected by a sensor, in particular by an optical sensor.
  • the personal and / or document-specific data 104 contain, for example, personal data of the user 106, such as the name or the address of the user 106.
  • the personal and / or document-specific data 104 may also contain data that is relevant to the use of a service or a function are required, such as access data.
  • a random value 105 is printed in the machine-readable zone.
  • the random value 105 is preferably highly entropic and has a character length of at least five characters, wherein the individual characters may in particular assume the value of a digit or a letter.
  • an image 107 of the user is applied to the identity document.
  • Other information or data enabling the user to be identified may also be applied to the document 102.
  • a signature 109 of a test feature 115 described in more detail below and a code 111 are applied to the document 102. Consequently, in this example, the code 111 does not also contain the signature 109, but only the code of the image 107.
  • the test feature 115 is determined from the personal and / or document-specific data 104 and a key 113.
  • the key 113 is composed of the random value 105, and in the preparation and registration of the document specified parts 104a of the personal and / or AIDSenspez 'RFI view data 104.
  • the inspection 115 is removed from the key 113 and the personal and / or Document specific data 104 calculated.
  • the parts 104a of the personal and / or document-specific data 104 used for the key can be arranged, for example, immediately before the random value 105, so that these parts 104a and the random value 105 can be read together.
  • the code 111 is formed from an image of the image 107. From image 107, an image has been generated whose binary representation is smaller than or equal to the binary representation of the image.
  • the amount of data is reduced, for example, by reducing the resolution by scaling, reducing the covered color space by merging colors or other known reduction methods, so that an optically readable code 111 of the image can be created.
  • the reduction is chosen such that the image created from the code 111 can still be cognitively captured by the user 106 and compared with the image 107.
  • the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 can be detected with an optical sensor.
  • the personal and / or document specific data 104 and the random value 105 may be visually captured by a person.
  • the information is applied to the document in written form so that both cognitive detection and machine readability or detection with a sensor of the personal and / or document-specific data 104 is possible.
  • the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 are printed on the document 102.
  • the system 100 further includes a user computer system 108 and a server computer system 110, each having an interface 112, 114, to establish a connection 118 between the user computer system 108 and the server computer system 110 via a communication network 116.
  • the interfaces 112, 114 may be designed, for example, for wireless communication with the communication network 116. But it is also possible that the interfaces 112, 114 are formed for connecting the user computer system 108 and the server computer system 110 to a wired communication network.
  • the communication network may be, for example, a mobile radio network, such as a GSM, UMTS, CDMA or LTE network.
  • a mobile radio network such as a GSM, UMTS, CDMA or LTE network.
  • wired Internet networks, wireless LAN networks or connections via Bluetooth or other cutting parts 112, 114 are possible.
  • a connection to the Internet can be established via such a communication network.
  • the connection can be established directly via a WLAN network, a Bluetooth connection or another short-range connection.
  • data is transferred between the user computer system 108 and the server computer system 110 via end-to-end encryption.
  • end-to-end encryption a preferably volatile (ephemeral) symmetric key may be used, which may be agreed upon, for example, during the execution of a cryptographic protocol between the user computer system 108 and the server computer system 110.
  • the user computer system 108 has an interface 120, here an optical reader for optically capturing the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the document 102.
  • the optical reader is a camera that can record the information.
  • the user computer system 108 includes a processor 122 for executing program instructions 124, 125, 126, 127, 128, 129.
  • the program instructions 124 serve to read out the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the document 102.
  • the program instructions 125 are used to create a test characteristic explained in more detail below.
  • the program instructions 126 serve to check the signature 109.
  • the program instructions 127 serve to calculate an image from the code 111.
  • the program instructions 128 are used to create and send a verification request from the user computer system 108 to the server computer system 110.
  • the program instructions 129 serve to receive a first or second signal from the server computer system 110.
  • the user computer system 108 may be formed by any computer system having an interface 112 and an optical reader, in particular an optical sensor.
  • the user computer system 108 is, for example, a mobile telecommunication terminal.
  • the server computer system 110 has a memory 135 and a processor 136.
  • a test feature 115 of the document 102 as well as document-specific information 117 are stored in the memory 135.
  • the document-specific information 117 is stored in such a way that an unambiguous assignment of the document-specific information 117 to the test feature 115 is possible.
  • the document-specific information 117 can be, for example, blocking information, ie information about a temporary or permanent invalidity of the document 102, release information, ie information about a temporary or permanent validity, a ventilation period or other information that determines the validity of the document.
  • further information 119 may be stored, which are assigned to the test feature 115, for example a signature or information on the identity of a user authorized to check the validity of the document.
  • program instructions 138, 140, 142, 144 are stored in the memory 135, which can each be executed by the processor 136.
  • the program instructions 138 are used to receive a top check request from the user computer system 108.
  • the program instructions 140 are used to access the check features 115 stored in the memory 135 and the information 117, 119 assigned to the check feature 115.
  • the program instructions 142 are used to check the one Inspection feature 115 associated information 117, 119.
  • the program instructions 144 are used to send a first or a second signal.
  • Authentication of the document 102 is performed by the method illustrated in FIG.
  • the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 are recorded on the document 102 with the reading device of the user computer system 108.
  • an image of the document 102 is created by the reader.
  • program instructions 124, the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 on the image of the document 102 can be identified.
  • finding or identifying the person-specific and / or document-specific data 104, the random value 105, the signature 109 and the code 111 can be facilitated by the identification features associated with the information.
  • the program instruction 125 calculates the test feature 115 from these. From the random value 105 and the parts 104a of the personal and / or document-specific data 104, a key 113 is created. Subsequently, the test feature 115 is calculated from this key 113 and the personal and / or document-specific data 104 with a preferably pseudo-random folding test function. Since the key 113 contains the random value 105 in addition to the personal and / or document-specific data 104, a return tracking of the personal and / or document-specific data 104 from the test feature 115 is practically impossible. Thus, the test feature 115 is anonymized, since it is not possible to draw conclusions about the owner of the document 102 or the personal and / or document-specific data 104 from the test feature 115.
  • this test feature 115 is verified by the program instructions 126 with the likewise read signature 109 of the test mark 115. If this check is successful, information about the successful check is displayed on the screen 146 of the user computer system 108.
  • This first checking step can take place without a connection to a network or a server computer system 110, so that even without such a connection a first check of the document 102 can take place.
  • an image is calculated by the program instructions 127 from the code 111 and displayed on the screen 146 of the user computer system.
  • the user can compare the image with the image 107 applied to the document 102 in order to check the document.
  • the image can be compared with the owner of the document 102.
  • This verification step can also take place without a connection to a network or a server computer system 110.
  • a secure connection is established between the user computer system 108 and the server computer system 110, for example with end-to-end encryption, and a verification request is sent.
  • the verification request contains the verification feature 115 as well as further information that proves the authorization of the user for the verification request.
  • the verification request includes data on the identity of the user, a signed timestamp of the time of the verification request, a signature on parts of the request, or a public one Key of the user.
  • This information may be stored in the server computer system 110 at a previous registration, as discussed below.
  • a database access to the memory 135 of the server computer system 110 takes place, wherein it is first checked whether a corresponding verification feature 115 is stored in the memory 135 and document-specific information 117 is stored for this verification feature 115.
  • a first signal is generated, the first signal indicating the invalidity of the document 102. This first signal is sent to the user computer system 108 and displayed on the screen 146 of the user computer system 108 upon receipt.
  • test feature 115 is stored and the test feature 115 is associated with document-specific information 117, these are checked, a second signal is created, sent to the user computer system 108 and displayed on the screen 146.
  • Checking the document specific information 117 may include only checking the type of document specific information 117. It will be noted, for example, that the document-specific information 117 is merely blocking information or release information, ie merely containing the information "valid" or "invalid". In this case, the second signal may include the document specific information 117.
  • a more detailed check may be made, for example, if the document specific information 117 includes a validity period. In this case, it can be checked whether the verification request is made within this period and, depending on this verification result, information Be created "valid" or "invalid".
  • the second signal can therefore contain the document-specific information 117 or a result of a check of the document-specific information 117. If the document-specific information 117 is transmitted, an examination by the user computer system 108 or the user can also take place.
  • the first or second signal may include further information, such as a signed timestamp, about the time of dispatch of the verification information over which the user computer system 108 may check the timeliness of the document specific information 117.
  • a time interval for sending the check request and receiving the signals may be set.
  • elements of the verification request may be sent which may be compared with the original verification request, or a signature on parts of the verification request enabling the signals to be checked.
  • a method for producing or personalizing a document 102 is explained in FIG. After providing the document 102, the personal and / or document-specific data 104, the random value 105, the image 107, the signature 109 and the code 111 are determined and applied to the document 102. For example, the personal and / or document-specific data 104, the random value 105, the subject 107, the signature 109 and the codes 111 are printed and / or impressed on the document 102.
  • the personal and / or document-specific data 104, the random value 105 and the image are applied in a form such that they can be detected by an optical sensor as well as cognitively by the user.
  • the personal and / or document-specific data 104 and the random value 105 are applied to the document 102 in plain text.
  • the signature may be in the form of a barcode or other optically detectable signature.
  • applied ren form the code 111 is already in an optically detectable form and is applied accordingly.
  • An image whose binary representation is smaller than or equal to the binary representation of the image 107 has been generated in advance from the image 107.
  • the amount of data is reduced for example by reducing the resolution by scaling, reducing the color space covered by merging colors or other known reduction methods, and from this image a code 111 of the image is created.
  • the reduction is selected so that the image created from the code 111 can continue to be cognitively captured by the user 106 and compared with the image 107.
  • the identity feature 115 was calculated from the personal and / or document-specific data 104 and the random value 105 beforehand by an identity server computer system by generating a key 113 from the random value 105 and parts 104a of the personal and / or document-specific data 104 This key 113 and the personal and / or document-specific data 104 with a preferably pseudo-random folding test function, the test feature 115 was calculated. Subsequently, this test feature 115 was signed and the signature 109 was created.
  • An identification server system is a server system on which the personal and / or document-specific data 104 are stored, or which can use such. Furthermore, the identification server system sets the random value 105 and also stores it.
  • a secure connection is established between the identity server computer system and the server computer system 110, for example with end-to-end encryption, and the check feature and document-specific information 117 created by the identity server computer system are transmitted to the server computer system.
  • a user 106 may register himself or his user computer system 108, with corresponding data by which the identity of the user and / or the user computer system can be determined, entered into the identity server computer system and transmitted from the latter via the secure connection to the server computer system.
  • the system described in FIG. 1 makes it possible to check the document without user data having to be transmitted. Thus, the greatest possible anonymization of the user is ensured when checking the document 102.
  • the server computer system 110 no personal and / or document-specific data 104 has to be stored, but only the anonymized checking feature 115 and the document-specific information.
  • the code 111 of the image and / or the signature 109 may also be stored on the server computer system.
  • the secure connection between user computer system 108 and server computer system 110 is first established and the code 111 of the image and / or signature 109 received. Subsequently, the verification of the signature 109 or of the test feature 115 as well as the cognitive check of the image of the image 107 can be carried out by the user.
  • the personal and / or document-specific data 104, the random value 105, the signature 109 and the code 111 of the image can also be stored in a memory of the document 102 and read out from the user computer system 108 via a corresponding interface.
  • the document 102 in this embodiment may include a chip for executing program instructions to authenticate a user computer system 108 to the document and to facilitate reading the information from the memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

L'invention concerne un procédé de vérification d'un document (102), notamment d'un document de valeur ou de sécurité. Des données (104) spécifiques à un document et/ou à une personne sont mémorisées sous forme lisible par machine sur le document (102), une valeur aléatoire (105) étant mémorisée sur le document (102) sous forme lisible par machine et une image (107) pourvue d'au moins une caractéristique de sécurité optique et un code (111) étant appliqués sur le document (102). Le code est déterminé avec une représentation de l'image (107) qui comporte un quantité de données réduite par rapport à l'image (107). L'invention concerne en outre un document (102) et un système informatique (100) destiné à mettre en œuvre un tel procédé.
PCT/EP2016/074664 2015-10-16 2016-10-14 Procédé de vérification d'un document, document et système informatique WO2017064233A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16788643.1A EP3362999B1 (fr) 2015-10-16 2016-10-14 Procédé de vérification d'un document, document et système informatique

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102015220244.5 2015-10-16
DE102015220244.5A DE102015220244A1 (de) 2015-10-16 2015-10-16 Verfahren zur Überprüfung eines Dokumentes, Dokument und Computersystem

Publications (1)

Publication Number Publication Date
WO2017064233A1 true WO2017064233A1 (fr) 2017-04-20

Family

ID=57218856

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2016/074664 WO2017064233A1 (fr) 2015-10-16 2016-10-14 Procédé de vérification d'un document, document et système informatique

Country Status (3)

Country Link
EP (1) EP3362999B1 (fr)
DE (1) DE102015220244A1 (fr)
WO (1) WO2017064233A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110956736A (zh) * 2019-12-20 2020-04-03 恒银金融科技股份有限公司 一种带忘取回收功能的纸币清分存款机
DE102020127853A1 (de) 2020-10-22 2022-04-28 Bundesdruckerei Gmbh Verfahren zum Personalisieren eines ID-Dokuments, personalisiertes ID-Dokument sowie Verfahren zum Authentifizieren eines personalisierten ID-Dokuments

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11198573A (ja) * 1998-01-09 1999-07-27 Itou Hisao 顔写真検証システム
DE102008041990A1 (de) 2008-09-11 2010-03-25 Bundesdruckerei Gmbh Dokument, Verfahren zur Herstellung und zur Überprüfung eines Dokuments, Computerprogrammprodukt, Datenverarbeitungssystem und Prüfsystem
WO2012035306A1 (fr) * 2010-09-18 2012-03-22 Philip Wesby Système et procédé pour le codage et l'authentification contrôlée

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102012203313A1 (de) * 2012-03-02 2013-09-05 Bundesdruckerei Gmbh Verfahren zum Identifizieren einer Person

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11198573A (ja) * 1998-01-09 1999-07-27 Itou Hisao 顔写真検証システム
DE102008041990A1 (de) 2008-09-11 2010-03-25 Bundesdruckerei Gmbh Dokument, Verfahren zur Herstellung und zur Überprüfung eines Dokuments, Computerprogrammprodukt, Datenverarbeitungssystem und Prüfsystem
WO2012035306A1 (fr) * 2010-09-18 2012-03-22 Philip Wesby Système et procédé pour le codage et l'authentification contrôlée

Also Published As

Publication number Publication date
EP3362999B1 (fr) 2021-08-04
DE102015220244A1 (de) 2017-04-20
EP3362999A1 (fr) 2018-08-22

Similar Documents

Publication Publication Date Title
DE69932643T2 (de) Identifizierungsvorrichtung mit gesichertem foto sowie mittel und verfahren zum authentifizieren dieser identifizierungsvorrichtung
DE19960769B4 (de) Verfahren und System zur Erstellung eines authentifizerbaren Bildes von einem Objekt
EP1891607B1 (fr) Procede d'acces d'une station de donnees a un appareil electronique
EP1944716B1 (fr) Procédé et dispositif de sécurisation d'un document comportant une signature apposée et des données biométriques dans un système informatique
EP3289508A1 (fr) Procédé pour produire une signature électronique
EP2041729A2 (fr) Appareil de lecture pour un document, procédé pour la lecture d'un objet de données et produit de programme informatique
DE102011122273A1 (de) Vorrichtung und Verfahren zum Erzeugen von digitalen Bildern
EP3362999B1 (fr) Procédé de vérification d'un document, document et système informatique
EP3206151B1 (fr) Procédé et système d'authentification d'un appareil de télécommunication mobile sur un système informatique de service et appareil de télécommunication mobile
DE602005006407T2 (de) Methode und System zur Signierung von physischen Dokumenten und zur Authentisierung von Signaturen auf physischen Dokumenten
EP3314585B1 (fr) Procédé et système pour authentifier un document et procédé pour créer et/ou personnaliser un document
DE102013113667A1 (de) Verfahren zum Entriegeln einer Fahrzeugverriegelungsanlage
EP3234928A1 (fr) Procédé de vérification de l'authenticité d'une caractéristique de sécurité qui est disposée sur un document
EP3289509B1 (fr) Procédé pour produire une signature électronique
DE102013104000B4 (de) Verfahren zum Generieren und Übermitteln sowie zum Empfangen eines signierten Dokumentes
EP3295419A1 (fr) Procédé de vérification de l'identité d'une personne
DE102021127976B4 (de) Wiederherstellen eines kryptografischen Schlüssels
DE102019202083A1 (de) Sichere Sensoranordnung
DE102020123755B4 (de) Verfahren zum Authentifizieren mit einem optoelektronisch lesbaren Code sowie Funktionsfreigabeeinrichtung und Computerprogramm hierzu
DE102009008184B4 (de) Prüfen einer Authentisierung eines Besitzers eines portablen Datenträgers
EP4174700A1 (fr) Fourniture d'un document numérique
EP3289507B1 (fr) Jeton id, système et procédé de génération de signature électronique
EP3338254B1 (fr) Appareil de verification de document
DE102015115653A1 (de) Verfahren zum Bereitstellen von digitalen Dokumentendaten
DE102010002462A1 (de) Kamerasystem zur Aufnahme von Bildern und Verfahren zur Speicherung von Bildern in einem Dokument

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16788643

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2016788643

Country of ref document: EP