WO2017100952A1 - Procédé et dispositif de vérification d'authenticité d'un document de sécurité - Google Patents

Procédé et dispositif de vérification d'authenticité d'un document de sécurité Download PDF

Info

Publication number
WO2017100952A1
WO2017100952A1 PCT/CH2015/000187 CH2015000187W WO2017100952A1 WO 2017100952 A1 WO2017100952 A1 WO 2017100952A1 CH 2015000187 W CH2015000187 W CH 2015000187W WO 2017100952 A1 WO2017100952 A1 WO 2017100952A1
Authority
WO
WIPO (PCT)
Prior art keywords
force sensor
surface structures
structures
security document
authentication device
Prior art date
Application number
PCT/CH2015/000187
Other languages
English (en)
Inventor
Martin Eichenberger
Sylvain Chosson
Original Assignee
Orell Füssli Sicherheitsdruck Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orell Füssli Sicherheitsdruck Ag filed Critical Orell Füssli Sicherheitsdruck Ag
Priority to PCT/CH2015/000187 priority Critical patent/WO2017100952A1/fr
Publication of WO2017100952A1 publication Critical patent/WO2017100952A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/206Matching template patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/181Testing mechanical properties or condition, e.g. wear or tear

Definitions

  • the invention relates to a method and a device for verifying the authenticity of a security document .
  • a variety of methods is known for the machine-assisted verification of the authenticity of a security document, such as a banknote, a cheque, a stock certificate or an identification document. These methods include optical verification techniques , techniques for reading invisible features (such as infrared markings or markings based on UV-excitable fluorescent dyes) , or techniques for detecting magnetic features.
  • the method for verifying the au ⁇ thenticity of a security document by means of an authen- tication device comprises the following steps:
  • the surface structures will gen ⁇ erate a spatial or temporal force pattern acting on the force sensor, which can be scanned by the force sensor.
  • This step typically involves checking at least one characteristic feature of the scan. A number of methods to be used in this check are given belo .
  • the "step of deriving the authenticity of said security document from said scan” can e.g. comprise one or more of the following steps:
  • This comparison can e.g. be carried out using known image comparison techniques.
  • the surface structures that are scanned can be of a variety of techniques, in particular:
  • the surface structures can be formed, at least in part, by intaglio print, i.e. by inks applied by means of intaglio printing .
  • intaglio printing can be used to form detectable surface structures .
  • the surface structures can be formed, at least in part, by an embossed mark of the security document .
  • the surface structures can be formed, at least in part, by a structured layer applied, directly or indirectly, to a substrate of the security document.
  • a structured layer can e.g. be a structured transfer foil with a thickness sufficient to generate surface structures that can be detected by the force sensor.
  • the authentication device according to the invention comprises
  • a spatially resolving force sensor This is the sensor to be used for scanning the surface of the security document.
  • This control unit is adapted and structured to generate a scan of the surface structures of a security document pressed against said force sensor and to derive the authenticity of the security document from said scan.
  • the authentication device is advantageously a phone or a tablet computer. However, it can also be a dedicated device adapted to a single purpose only.
  • the force sensor is advantageously integrated into a touch-sensitive display of the authentication device or into a fingerprint sensor of the authentication device .
  • Fig. 1 shows a banknote as an example of a security document
  • Fig. 2 shows a sectional view along line II- II of Fig. 1
  • Fig. 3 shows an authentication device
  • Fig. 4 is a simplified block diagram of the authentication device
  • Fig. 5 shows the step of pressing the security document against the force sensor
  • Fig. 6 shows a sectional view of a second em bodiment of the surface structures
  • Fig. 7 shows a sectional view of a third em ⁇ bodiment of the surface structures
  • Fig. 8 illustrates a method for scanning sur face structures by means of a point force sensor
  • Fig. 9 shows the force recorded by the point force sensor versus time
  • Fig. 10 illustrates yet another scanning method.
  • security document refers to any document that may require a verification of authenticity, i.e. the term is to be understood broadly. However, the invention is particularly suited for verifying the authenticity of banknotes, cheques and identification documents .
  • spatially resolving force sensor refers to a sensor that has a scanning area and that is able to measure forces acting on said scanning area in spatially resolved manner. In other words, the sensor is able to record a spatially resolved one- or two-dimensional image of the forces acting on it.
  • point force sensor refers to a sensor that measures the force acting on a small sensing a rea thereof .
  • a "small” sensing area is an area much smaller than the total lateral extension of the surface structures and advantageously not larger than the lateral extension of individual structure elements of the surface structures.
  • embossed mark is a mark formed by a deformation of the security document by means of embossing or debossing, in particular by means of a pair of dies between which the substrate of the security document or of a foil to be applied to the security document has been compressed, e.g. in the course of the intaglio printing process or in a separate step.
  • the embossed mark can be formed in the substrate of the security document or in a foil applied to the substrate of the security document.
  • Fig. 1 shows a security document 1 in the form of a banknote having a flexible substrate 2, which can e.g. be of paper, cotton, polymer or a combination thereof.
  • Substrate 1 can carry a variety of security fea ⁇ tures, such as intaglio-printed motifs 3, 4, 5, an embossed mark 6 embossed into substrate 2, and a foil element 7 laminated to substrate 1.
  • Foil element 7 carries in turn a mark 8, which can e.g. again be embossed or in ⁇ taglio printed in foil element 7, or which can e.g. be a metallic or non-metallic structure 8 applied to foil element 7.
  • Security document 1 can also be equipped with a perforation extending through substrate 2 .
  • Such perforations are e.g. known from US 2006/006236 and can e.g. be formed by laser pulses.
  • This characteristic relief advantageously comprises a plurality of structures 10 arranged on a first side 11 of substrate 2 , such as shown in Fig. 2 for the example of motif 4.
  • the surface structures 10 should have at least one, advantageously several or all, of the following features:
  • the height H of the structures 10 is advantageously between 10 ⁇ and 100 ⁇ , in particular between 20 ⁇ and 40 ⁇ . Structures within these height ranges can be well detected by the techniques described below without adding to much thickness to the security document.
  • the total lateral extension D of the structures 10 is advantageously at least 5 mm, in particu ⁇ lar at least 10 mm. Again, an arrangement of structures of such extension can be well detected by the techniques described below.
  • At least a plurality of the structures 10 should have distances d of neighboring edges in a range smaller than 2000 ⁇ , in particular smaller than 500 ⁇ , which is much smaller than a typical fingertip and can therefore be resolved as a structure when a finger is used for pressing the document against the force sensor as described below.
  • a minimum lateral distance is advantageously at least 1 ⁇ for easy detection.
  • edges of the structures 10 are advantageously "sharp" in order to obtain a good signal contrast in the force sensor described below.
  • the width w of at least some of the edges of the surface structures 10, as seen along a direction of view perpendicular to substrate 1, is advantageously less than the height H of the surface structures.
  • such edges 13 are shown for one of the structures 10 of Fig.
  • the security document advantageously carries a target marker 15 on substrate 1 at a second surface 14 of substrate 2.
  • the target marker 15 is located opposite the structures 10, i.e. at substantially the same location as the structures 10 but merely on the other side of substrate 2.
  • Target marker 15 is visually perceptible to the human observer and allows him/her to identify the position of the structures 10 when viewing document 1 from second side 14.
  • Target marker 15 can e.g. a printed marker.
  • the structures 10 are formed by the intaglio printed motif 4.
  • the structures 10 can also be formed by one of the other intaglio printed motifs 3 or by the embossed mark 6.
  • the structures 10 can also be formed by a metallic or non-metallic structured layer applied to substrate 1 or to foil element 1, such as structure 8 on foil element 7.
  • the structures 10 can also be formed by the perforations 9. These perforations advantageously extend through all of security document 1, i.e. they are formed by "through-holes", but they may also extend only through part of the security document, i.e. they are formed by "blind holes”.
  • the perforations can e.g. extend through substrate 2, through foil element 7, or through both these elements.
  • the surface structures can also be created by a combination of the above techniques, e.g. by intaglio printing onto laminated surface structures.
  • Fig. 3 shows an embodiment of an authentication device 20. It typically comprises a housing 21 holing a variety of components, such as a display 22 and/or one or more user-operatable input elements 23.
  • Display 22 may be a touch-sensitive display.
  • - authentication device 20 is a mobile phone and/or a tablet computer .
  • Some of the components of authentication device 20 are depicted in the block diagram of Fig. 4. It comprises a control unit 24, which is e.g. a microprocessor equipped with software for controlling the operation of the device.
  • Control unit 24 is connected to a memory 25 holding not only said software but also various data, some of which is described in more detail below.
  • authentication device 20 is a mobile phone, it comprises radio transceivers 26 as known to the skilled person for data and/or voice communication.
  • authentication device 20 further comprises a display 22, in particular a touch-sensi ⁇ tive display, and/or one or more user-operatable input elements 23.
  • authentication device 20 is equipped with a spatially resolving force sensor 28.
  • Force sensor 28 can use any known force sensor design that has a resolution sufficient to resolve the structures 10 when these structures are pressed against it, e.g. by means of a finger 30, as shown in Fig. 5.
  • Force sensor 28 can e.g. comprise a sensing array such as described in WO 2015/066599, where a large number of piezo-electric sensing elements are provided for a spatially resolved detection of a force pattern.
  • a sensing array such as described in WO 2015/066599
  • a large number of piezo-electric sensing elements are provided for a spatially resolved detection of a force pattern.
  • techniques as described in WO2014037016 can be used.
  • display 22 of the de ⁇ vice can e.g. be a touch-sensitive display using such a force sensor.
  • the force sensor can also be integrated in a fingerprint sen ⁇ sor of the device, which may be separate from display 22, e.g. integrated in input element 23.
  • a fingerprint sensor is typically used for unlocking the device.
  • force sensor 28 can be used for fingerprint detection as well as document verification because both tasks are based on scanning surface structures of comparable dimensions.
  • Control unit 24 of authentication device 20 is adapted and structured to generate a scan of the surface structures 10 of the security document pressed against force sensor 28. Such a scan can e.g. be triggered automatically or started as soon as the device detects the presence of potentially qualifying surface structures by means of force sensor 28.
  • control unit 24 runs the authentication method as described below and displays a result thereof on display 22.
  • Target mark 15 can be used for properly placing the structures 10 over force sensor 28 if force sensor 28 is small, and for applying the pressure at the correct location.
  • Authentication device 20 will then scan the force pattern and process it further.
  • the scanned pattern can be compared to a number of reference patterns stored in memory 25 of the device using conventional image recognition techniques that compensate for rotation and offset between the scanned pattern and the stored reference pat ⁇ terns .
  • a suitable algorithm can comprise the following steps for comparing the scanned pattern with a given reference pattern : 1. Calculate the two-dimensional correlation between the scanned pattern and the reference pattern.
  • a suitable algorithm can also use other image processing algorithms for determining the similarity of two images. For example, it can be based on feature matching or template matching techniques as e.g. implemented by the opencv software package (see
  • a high correlation peak in one of the steps 1 is then indicative of a match between the reference pattern and the scanned pattern.
  • control unit 24 can e.g. calculate the two-dimensional Fourier transform of the scanned pattern and check this transform for the presence and/or absence of certain harmonics.
  • a regular stripe pattern as shown under reference number 8 in Fig. 1 will give rise to a very specific spectral distribution of the Fourier components with marked peaks representing the line repetition frequency and (depending on the lines' contours) the harmonics thereof.
  • the above comparison of the scan to reference patterns can also be combined with the above checking for certain features without using stored reference patterns, thereby providing a redundant check with increased relia ⁇ bility.
  • Fig. 6 shows a further embodiment of a security document 1.
  • This document again comprises a substrate 1 with first structures ( lOa-1 , 10a2) applied to its first side 11.
  • first structures lOa-1 , 10a2
  • second structures lOb-1, 10b-2
  • the first and second structures overlap at least partially, in particular only partially. In their overlapping regions, they form sub-regions A, B, C, D and E where the overall document 1 has different thickness.
  • the first and second structures form the following sub-regions:
  • a structure is present on first side 11, but not on second side 14 of document 1.
  • a structure is present on second side 14, but not on first side 11, of document 1.
  • scanning the structures as described above by means of a force sensor allows checking the two structures and their mutual registration on opposite sides of the document, which allows an even more reliable verification of authenticity.
  • Fig. 7 shows a further embodiment where the surface structures 10 contain regions of at least three different heights (one of which may have zero height) .
  • each such region has a lateral extension of at least 100 ⁇ for being detected individually, and/or the height differences between the regions are at least 10 ⁇ .
  • a surface structure as shown in Fig. 7 can e.g. be formed by a single one or a combination of more than one of the following methods:
  • thermochromic ink e.g. of thermochromic ink
  • thermochromic ink e.g. of thermochromic ink
  • Fig. 7 can be applied to any of the surface structures shown herein, e.g. to the two- sided surface structures of Fig. 6 as well as to the onesided surface structure of Fig. 2.
  • Figs. 8 and 9 disclose a second way of scanning the structures.
  • the senor was assumed to be a one-dimensional or two-dimensional force sensor, the sensor may also be a point force sensor structured to measure a force at one location, in particular a pen 30 with a force-sensing tip 31 as shown in Fig. 8.
  • the user moves the force sensor 30, 31 over the surface structures 10 while contacting the same, as indicated by arrow 32, in substan ⁇ tially linear movement with steady velocity, while the force sensor carries out a time-resolved measurement, giving rise to recorded force versus time data as shown in Fig. 9.
  • Processing the data can e.g. comprise the steps of - Timescale the signal trait to a standard length, thereby making the result independent on the scanning velocity.
  • FIGs. 8 and 9 While the embodiment of Figs. 8 and 9 is best suited for scanning ID-barcode-like structures, i.e.
  • Fig. 10 illustrates a method using a point force sensor 30, 31 that is adapted to also scan two-dimensional structures.
  • the device for carrying out the present method contains, in addition to the point force sensor 30, 31, a position sensor for measuring the position of the force sensor 30, 31, advantageously in at least two dimensions.
  • the user can place the document on a surface and start rubbing the surface structures 10 with force sensor 30, 31, e.g. using arbitrary motions, as indicated by the arrow in Fig. 10.
  • the authentication device is able to assemble a 2D force field image, which then can be analyzed e.g. using the image analysis methods described above.
  • the device can be adapted to show the scanned and not yet scanned parts of the structure on a display, thereby guiding the user to scan yet non-scanned parts of the pattern.
  • the device can e.g. comprise a tablet 32 having a flat surface (which can e.g. a touchscreen of the device) with integrated position sensors 33, e.g. capacitive position sensors able to detect the position of the force sensor 30, 31.
  • Suitable techniques for such devices are known from tablets and smartphones and are e.g. described in US 2014/0028634.
  • the security document can be placed on the tablet 32 containing the position sensors 33, whereupon the point force sensor 30, 31 is moved along a random path over the structures while being pressed towards the tablet.
  • the structures can differ between documents, i.e. they can contain different information depending on the document they are applied to.
  • the information can even be unique for each document.
  • the structures 10 can encode its serial number and/or its de ⁇ nomination. If document 1 is a passport, the structures 10 can encode its holder's name and/or the country of origi .
  • the encoded information can then e.g. be compared to individualized alphanumeric or other human-readable information applied to the document, such as a serial number.
  • Individualized structures 10 can e.g. be generated using ink jet printing or printing with thermo- chromic inks, in particular if the structures are to encode information unique for each document.
  • Suitable encoding techniques are e.g. ID-bar- codes or QR codes.
  • Force sensor 28 can be a one-dimensional or a two-dimensional force sensor.
  • a two-dimensional force sensor comprises a two-dimensional matrix of sensing elements that allows a direct scan the two-dimensional shape of the structures 10 in the plane of substrate 2.
  • A, one- dimensional force sensor comprises a one-dimensional array of sensors only. If a one-dimensional force sensor is used but a two-dimensional scan is required, the security document can be displaced in a direction perpendicular to the sensor array while carrying out repetitive measurements in order to scan the structures 10 in two dimensions.
  • the force sensor can also be a point force sensor 30, 31 that is moved relative to the structures to be scanned.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Selon la présente invention, un document de sécurité (1) est doté de fines structures de surface (10), qui peuvent par exemple être générées par impression en creux, gaufrage ou stratification. Afin de vérifier l'authenticité du document, les structures de surface (10) sont appuyées contre un capteur de force à résolution spatiale (28). Le motif lu par le capteur de force (28) peut ensuite être analysé, par exemple par comparaison à un certain nombre de motifs de référence.
PCT/CH2015/000187 2015-12-17 2015-12-17 Procédé et dispositif de vérification d'authenticité d'un document de sécurité WO2017100952A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CH2015/000187 WO2017100952A1 (fr) 2015-12-17 2015-12-17 Procédé et dispositif de vérification d'authenticité d'un document de sécurité

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CH2015/000187 WO2017100952A1 (fr) 2015-12-17 2015-12-17 Procédé et dispositif de vérification d'authenticité d'un document de sécurité

Publications (1)

Publication Number Publication Date
WO2017100952A1 true WO2017100952A1 (fr) 2017-06-22

Family

ID=55069644

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CH2015/000187 WO2017100952A1 (fr) 2015-12-17 2015-12-17 Procédé et dispositif de vérification d'authenticité d'un document de sécurité

Country Status (1)

Country Link
WO (1) WO2017100952A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321876A (zh) * 2019-07-24 2019-10-11 维沃移动通信有限公司 电容指纹识别模组及终端设备

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060006236A1 (en) 2002-07-25 2006-01-12 Von Fellenberg Ian D Security document and verification method
JP2006323715A (ja) * 2005-05-20 2006-11-30 Alps Electric Co Ltd 紙幣判定装置
WO2008062287A1 (fr) * 2006-11-23 2008-05-29 Sicpa Holding S.A. Utilisation d'équipements de détection d'empreintes pour l'authentification d'articles en feuille
WO2012130391A1 (fr) * 2011-03-30 2012-10-04 Giesecke & Devrient Gmbh Procédé pour l'interaction d'un support de données avec un terminal
JP2013061201A (ja) * 2011-09-13 2013-04-04 Osaka Univ 物体表面の質感計測装置およびそれを用いた紙葉類識別装置
US20140028634A1 (en) 2012-07-27 2014-01-30 Christoph Horst Krah Stylus device
WO2014037016A1 (fr) 2012-09-04 2014-03-13 Joanneum Research Forschungsgesellschaft Mbh Tracé imprimé de détection de pression piezo-électrique
WO2015066599A2 (fr) 2013-06-03 2015-05-07 Qualcomm Incorporated Réseau de détection de force piézoélectrique

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060006236A1 (en) 2002-07-25 2006-01-12 Von Fellenberg Ian D Security document and verification method
JP2006323715A (ja) * 2005-05-20 2006-11-30 Alps Electric Co Ltd 紙幣判定装置
WO2008062287A1 (fr) * 2006-11-23 2008-05-29 Sicpa Holding S.A. Utilisation d'équipements de détection d'empreintes pour l'authentification d'articles en feuille
WO2012130391A1 (fr) * 2011-03-30 2012-10-04 Giesecke & Devrient Gmbh Procédé pour l'interaction d'un support de données avec un terminal
US20140217176A1 (en) * 2011-03-30 2014-08-07 Giesecke & Devrient Method for Interaction of a Data Carrier with an End Device
JP2013061201A (ja) * 2011-09-13 2013-04-04 Osaka Univ 物体表面の質感計測装置およびそれを用いた紙葉類識別装置
US20140028634A1 (en) 2012-07-27 2014-01-30 Christoph Horst Krah Stylus device
WO2014037016A1 (fr) 2012-09-04 2014-03-13 Joanneum Research Forschungsgesellschaft Mbh Tracé imprimé de détection de pression piezo-électrique
WO2015066599A2 (fr) 2013-06-03 2015-05-07 Qualcomm Incorporated Réseau de détection de force piézoélectrique

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110321876A (zh) * 2019-07-24 2019-10-11 维沃移动通信有限公司 电容指纹识别模组及终端设备
CN110321876B (zh) * 2019-07-24 2021-05-25 维沃移动通信有限公司 电容指纹识别模组及终端设备

Similar Documents

Publication Publication Date Title
US6163616A (en) System and method for verifying the identity of a person
US5745591A (en) System and method for verifying the identity of a person
US7136514B1 (en) Method for authenticating an individual by use of fingerprint data
EP2102827B1 (fr) Utilisation d'équipements de détection d'empreintes pour l'authentification d'articles en feuille
EP2374111B1 (fr) Authentification
KR101223204B1 (ko) 진품 검증
US20080260199A1 (en) Authenticity Verification Methods, Products and Apparatuses
NO20130886A1 (no) Enkel og pålitelig autentisering av fingeravtrykk
TWI576767B (zh) 用以識別安全文件之方法、裝置及系統
JP2009503672A (ja) スペックルパターンを使用した処方箋認証
US11430234B2 (en) Method of authentication using surface paper texture
KR20150059548A (ko) 터치와 근거리 통신 기반의 전자 도장 및 이를 이용한 전자 날인 인증 시스템
US20190355199A1 (en) Method for retrieving information from a security document by means of a capacitive touchscreen
WO2017100952A1 (fr) Procédé et dispositif de vérification d'authenticité d'un document de sécurité
US20200294342A1 (en) Systems and methods for detection of counterfeit documents
US20040258280A1 (en) Optical document authentication system
KR20070008968A (ko) 신분증 위조 판별 장치 및 그 방법
CN216623302U (zh) 一种自助办事终端
WO1995027956A1 (fr) Procede et systeme d'authentification d'objets
RU2686824C2 (ru) Способ повышения надежности биометрической идентификации личности при считывании отпечатка пальца
TWI501160B (zh) Sensor identification card
US8910877B2 (en) Inductive identification card
Nishimura Proposal of a User Authentication Method Using Near-Infrared Card Images
WO2019191852A1 (fr) Document de sécurité doté d'une fenêtre personnalisée

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15820035

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15820035

Country of ref document: EP

Kind code of ref document: A1