EP4246373A2 - Production de modèles de documents dotés de caractéristiques de sécurité - Google Patents
Production de modèles de documents dotés de caractéristiques de sécurité Download PDFInfo
- Publication number
- EP4246373A2 EP4246373A2 EP23183050.6A EP23183050A EP4246373A2 EP 4246373 A2 EP4246373 A2 EP 4246373A2 EP 23183050 A EP23183050 A EP 23183050A EP 4246373 A2 EP4246373 A2 EP 4246373A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- document
- security
- optical
- security features
- channels
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/305—Associated digital information
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/23—Identity cards
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/48—Controlling the manufacturing process
- B42D25/485—Controlling the manufacturing process by electronic processing means
Definitions
- the invention relates to the use of a document template with security features for producing a valuable or security document, in particular a so-called valuable or security document such as an identity card, a passport or a credit card.
- the invention further relates to a combination of a document template for a value or security document and the value or security document that is produced using the document template.
- Documents e.g. valuable and security documents such as ID cards, passports or credit cards, are used in many security-critical application scenarios.
- the risk is correspondingly high that an authorized owner of such a document or an unauthorized third party will physically manipulate the document after it has been issued, for example to gain unauthorized access to a protected building complex, access to protected data, or access to the services provided .
- an unauthorized third party could attempt to replace the owner's facial image, which is printed on an ID document that has already been produced and issued or on a personalized value document, with his own facial image or with a morphed image (identity theft).
- Other manipulations are also possible, such as manipulating location and age information on the document or making a physical copy of a genuine document.
- the document has electronic components, such as in particular a data memory and a microprocessor, there are various approaches in the prior art to a document or at least the content of its data memory using individual identifiers, cryptographic keys, signatures and other document-specific or person-specific data or algorithms to be clearly identified and tamper-proof.
- the GB 2 352 708 A describes an ID card that includes a substrate on which characters are displayed; and an at least partially transparent overlay on which characters and optionally a photographic representation and handwriting can be printed that at least partially covers the substrate so that the characters on the substrate and the overlay are visible side by side.
- the WO 00/38932 A1 describes a document which has at least one document number, an optical marking with a machine-readable identifier and a memory field for recording a control number on a substrate.
- the control number is only generated at the moment of delivery to an authorized person using a cryptographic operation from at least the document number, the identifier and a first secret key and written into the memory field.
- a certificate of authenticity generated in this way can be checked for authenticity with a verifier using a cryptographic operation and the information stored on the document using a second key.
- the WO 2018/109035 A2 describes a method for verifying a security document using a reading device.
- First transmission and/or reflection properties of a first area of the security document are recorded in a first spectral range by the reading device. From this, a first data set specifying these properties is created. The first area overlaps, at least in some areas, an optical security element arranged on the security document or embedded in the security document.
- Second transmission and/or reflection properties of the first area of the security document are recorded in a second spectral range by the reading device. From this, a second data set specifying these properties is created.
- the first spectral range differs from the second spectral range.
- the authenticity of the security document and/or the security element is checked based on at least the first data record and the second data record.
- the US 2005/010776 A1 describes systems and methods for securing an identification document that has at least one storage element capable of storing information.
- An encryption key is provided, the encryption key comprising a public key and a private key.
- An optically variable element (OVD) in a machine-readable format is created, with the OVD associated with the public key.
- a payload of data is generated for storage in the storage element. At least a portion of the payload is encrypted with the private key, and the encrypted payload is transmitted to at least one location on the identification document. At least a portion of the payload may be based on data randomly selected from data stored in the storage element or encrypted from data stored in the storage element.
- the storage element can be an optically variable Element (OVD), optical storage media, a hologram, a kinegram, an Excelgram, a pixelgram, a three-dimensional barcode, a two-dimensional barcode, a magnetic stripe and a chip.
- Transmitting the encrypted payload may include at least one of embedding, digital watermarking, printing, and encoding encrypted data in at least one location on the identification document.
- the WO 2020/004633 A1 describes an authentication body comprising a sheet-shaped lamination sheet having a first area formed in the lamination sheet and in which personal identification information is recorded, and a second area formed in the lamination sheet and having a hologram structure in which verification data is recorded, the first individual information is assigned.
- the invention is based on the object of creating an improved approach to providing a value or security document.
- Embodiments can have the advantage that they make it possible to ensure during the design of such documents that an integrity check of the finished document can actually be ensured using an optical reading device, in particular with acceptable error probabilities. This makes it possible to ensure that the finished document is optimized with respect to the optical reading device, which means that important features of the document cannot be reliably recognized.
- a design process is provided that takes the system of document and inspection or reading device into account, so that the possibilities and limitations of the optical reading device and the manufacturing process can be taken into account when designing the documents. In particular, systematic pseudo-errors during processing in the field due to contradictory design of security features can be avoided.
- Embodiments can have the advantage that they allow the available optical security features to be freely selected and combined with one another in the course of designing the document layout using the database. If, during the course of the design, security features are instantiated in such a way that they spatially overlap or are adjacent to one another and at the same time occupy a common channel, there is a risk that the optical reading device cannot cleanly separate these security features from one another or detect them in isolation from one another. For example, the optical reading device can only detect an overlay of the corresponding security features, from which it cannot individually extract the underlying security features. For example, in this case one or more of these security features cannot be detected or not completely detected by the optical reading device.
- the optical reading device may detect a plurality of predefined characteristic details of the security feature to be checked as being present. For example, the security feature is compared with a reference template. If the match is sufficient, i.e. if the recorded security feature and/or the recorded characteristic details of the security feature match the reference template, the security feature is classified as present or valid.
- a match may include, for example, an identity and/or a match within a predefined tolerance range.
- Embodiments can have the advantage that for a given optical reading device or for a given optical reading device type, it can be checked in the course of a layout design whether the instantiated security features can actually be detected in the course of a validity check with the corresponding optical reading device or the corresponding optical reading device type . If the check of the layout draft is positive, ie no potentially problematic security feature combinations are detected, the checked layout draft is saved as an electronic document template. If the test is negative, i.e. if instantiated security features are identified in the course of the test, which the reading device cannot resolve individually and therefore cannot check, A correction of the layout draft is initiated and the resulting corrected layout draft is saved as an electronic document template.
- the resulting corrected layout draft is saved as an electronic document template after correction.
- a positive test result is a prerequisite for saving the resulting corrected layout draft.
- the check and correction can, for example, be repeated several times in a row until the check of the corrected layout draft is positive and it is saved as an electronic document template without further correction.
- Embodiments can have the advantage that before a document is produced, it can be ensured that all security features of the corresponding document can be validated or verified with the optical reading device that is intended to check the document.
- validation tests of the corresponding document with one or more corresponding optical reading devices, which are intended for validating or verifying the corresponding document are unnecessary. Rather, corresponding validation tests can be replaced by checking the layout design before the physical document is produced.
- the optical reading device has a given optical resolution and the checking of the layout draft is carried out in such a way that it is carried out for adjacent areas of the layout draft that cannot be spatially resolved by the optical reading device.
- the checking of the layout design is carried out in such a way that it is carried out for neighboring instantiated types of security features that cannot be spatially resolved by the optical reading device.
- the checking of the layout draft is carried out in such a way that it is carried out for overlapping areas of the layout draft that cannot be spatially resolved by the optical reading device.
- the checking of the layout design is carried out in such a way that it is carried out for overlapping instantiated types of security features that cannot be spatially resolved by the optical reading device.
- Embodiments may have the advantage that the optical resolution of the optical reading device is taken into account when checking the layout design.
- the optical resolution of the optical reading device for example, areas of the layout design and/or instantiated security features included in the layout design can be identified for which an examination is relevant.
- two instantiated security features as separate security features or areas of the layout design comprising two security features as separate ones
- the spatial separation can, for example, be sufficient to separate the corresponding security features. If, on the other hand, the optical resolution is not sufficient for spatial separation, separation can take place, for example, by occupying different optical channels.
- the document to be produced is a multi-layer document which is made up of a plurality of layers.
- the layout design defines a plurality of layers in which the security features are instantiated.
- security features are instantiated in different layers, i.e. at different levels, of the layout design. Security features that overlap or are arranged on different levels in overlapping areas of the layout design of the layout design cannot, for example, be spatially separated by the optical reading device.
- one or more of the channels are reader-specific channels, which are each assigned to one or more optical reader types.
- the method further includes selecting one or more of the reader types for which the layout design is checked. The check as to whether spatially overlapping or adjacent types of security features occupy a common channel is carried out on a reader-device type-specific basis. This means that only common channels that are assigned to a common reader type are taken into account. If overlapping or adjacent instantiated types of security features occupy the same channel, but each for different types of reading devices, for example, no signal is output and therefore no correction is entered.
- Embodiments may have the advantage that a layout design can be tested for a plurality of different optical reader types. It can therefore be ensured that the instantiated security features can be detected by all optical reading devices of the majority of different optical reading device types and used for document validation or verification.
- production of the value or security document according to the electronic document template is subject to manufacturing tolerances with regard to the spatial arrangement of the instantiated optical security features, these manufacturing tolerances being included in the determination of the overlapping or adjacent areas that cannot be spatially resolved by the optical reading device.
- these manufacturing tolerances are included in the determination of overlapping or adjacent security features that cannot be spatially resolved by the optical reading device.
- Tolerances can occur not only on the receiver side, for example in the form of the resolution of the optical reading device, but also on the transmitter side. Tolerances on the transmitter side include, for example, manufacturing tolerances of the security features. Embodiments can have the advantage that the transmitter-side influence of the manufacturing tolerances of the instantiated security features on the detectability or separability of security features that occupy the same channel can be taken into account when checking the layout design.
- the types of optical security features in the database are each assigned a verification error rate when checking for validity by the optical reading device if the security feature in question occurs sporadically, and wherein the method includes a calculation of an overall verification error rate for the layout design and / or the resulting corrected layout draft.
- Embodiments may have the advantage that an overall verification error rate for the layout design can be calculated based on the verification error rates of the individual instantiated security features.
- the review of the layout design may include a review of the overall review error rate. For example, if a total inspection error calculated for a layout design exceeds a predefined threshold, a signal is output and a correction to the corresponding layout design is input in response to the signal.
- the resulting corrected layout draft is saved, for example, as the electronic document template.
- the verification error rates of the individual instantiated security features are summed up to calculate the overall verification error rate.
- One of the examination error rates is, for example, false acceptance rates (“False Acceptance Rates”/FARs) and/or false rejection rates (“False Rejection Rates”/FRRs).
- the overall test error rate is, for example, an overall false acceptance rate or an overall false rejection rate. For example, an overall false acceptance rate and an overall false rejection rate are calculated.
- the channels are selected from the group formed by frequency channels, flip angles, excitation wavelengths, color impressions and combinations thereof.
- a channel can be defined, for example, by a frequency or a frequency range in which security features are detected.
- a channel can be defined, for example, by a tilt angle of a surface of the document relative to a plane assigned to the optical reading device, under which security features are detected. At the assigned level acts For example, it is an image layer. The tilt angle defines, for example, a relative tilting of the surface of the document, ie the object plane, relative to the image plane.
- a channel can, for example, be defined by one or more wavelengths and/or wavelength ranges with which security features are stimulated.
- a channel can, for example, be defined by a color impression with which security features are detected.
- the optical security features are selected from the group formed by guilloches, micro-writing, metameric systems, printing with fluorescence, phosphorescence and / or up-conversion colors, printing with infrared color, barcodes , in particular one- or two-dimensional barcodes, optically variable colors, transparent or reflective holograms or kinegrams, watermarks, in particular digital watermarks that carry machine-readable information, register printing elements, in particular see-through registers, see-through windows, mottled fibers, security threads, microperforations and their combinations.
- the method additionally has an optimization of the document template, preferably with the aid of an optimization algorithm using an ROC curve or a performance curve taking manufacturing tolerances into account.
- a function to be optimized is defined, which defines a property of the layout design, such as the ability to detect individual security features or an overall error rate.
- the defined function is an ROC curve or a performance curve.
- the corresponding function can be defined, for example, taking into account manufacturing tolerances of the instantiated security features and/or the resolution capacity of the optical reading device. The corresponding function is minimized or maximized as an objective function in the course of executing the optimization algorithm.
- Embodiments can have the advantage that the layout design and thus the document template can be optimized.
- parameters of the instantiated security features can be automatically optimized and the result of the optimization can be used to correct or adapt the layout design.
- a distance between security features that occupy the same channel can be optimized.
- the distance is minimized to a minimum distance at which the corresponding security features can just about be separated from the optical reading device.
- manufacturing tolerances of the security features and/or the resolution capacity of the optical reading device are taken into account.
- the method additionally has placement and scaling of security features to which multivariate separate channels are assigned, preferably combining the excitation wavelength and color impression channels, in order to optimize the document template.
- Embodiments can have the advantage that the placement and scaling of the security features are taken into account during the optimization. For example, a distance between security features can be adjusted and therefore optimized by adjusting the placement and/or scaling of one or more of the corresponding security features.
- the corresponding security features are security features that occupy the same channel.
- the corresponding security features are security features that occupy separate channels.
- the channels are, for example, multivariant channels. Optimizing the document template with regard to the placement and scaling of security features can, for example, aim to prevent crosstalk between separate channels.
- the value or security document is produced using the electronic document template.
- the electronic document template is made available, for example, to a production system for documents, such as valuable or security documents.
- the manufacturing system includes an electronic design system on which the document template is created.
- the document template is sent from the design system to the manufacturing system over a network.
- the document template is made available to the manufacturing system on a removable storage medium.
- an electronic drafting system includes a printing system for printing the document.
- the design system includes, for example, a personalization system for personalizing a document blank to produce the corresponding personalized document, such as a personalized value or security document.
- the document body can comprise a plurality of material layers, with one or more of the material layers being individually personalized. For example, all material layers of the plurality of material layers are individually personalized. For example, the plurality of material layers includes one or more material layers that are not personalized. The plurality of material layers are assembled into the document body, for example after the personalization of the one or more material layers.
- the plurality of material layers are laminated to form the document body from the plurality of material layers.
- the resulting document body thus includes a or several individually personalized layers of material.
- all material layers of the resulting document body are individually personalized.
- the resulting document body includes one or more layers of material that are not personalized.
- the document body may consist of multiple layers of material, each individually personalized and then laminated to form the document body from the personalized layers.
- the personalization system is configured to introduce personalization data into the document blank to be personalized.
- the personalization data includes, for example, attributes of an owner of the document, such as a name, an address, etc.
- the personalization data includes, for example, biometric data of the owner, such as a facial photo or fingerprint data.
- the personalization data is printed on the document or on a document layer.
- one or more of the security features each include personalization data of the owner.
- the printing system includes the personalization system for printing personalization data.
- the document includes a memory in which the personalization system stores the personalization data.
- the document is a composite body which comprises a plurality of material layers or sheets of material.
- the security features are arranged on one or more of the material layers.
- security features are incorporated into one or more of the material layers.
- security features are printed on one or more of the material layers.
- the plurality of sheets of material are arranged one on top of the other in a document-specific order, for example, to form a sheet of material booklet from which a composite body is produced, for example by means of lamination.
- one or more of the security features include data that is required to access a memory included in the document.
- one or more of the tested security features is a security feature that includes corresponding data.
- the optical reading device for example, records the corresponding security features.
- a data reading device comprising the optical reading device extracts the corresponding data from the recorded security feature.
- the data reader derives, for example, a cryptographic key.
- the data reader uses this cryptographic key when executing a cryptographic protocol to unlock the memory of the document, ie to gain access to the memory from which the data reader reads data using a contact or contactless communication interface.
- the value or security document is produced using such a document template.
- the value or security document includes, for example, a multi-layer composite body.
- the value or security document has, for example, an integrated electronic circuit and an electronic memory for storing data requiring protection and means for executing a cryptographic protocol and an interface to a data reader, which allows the data reader to access the data requiring protection after execution of the cryptographic protocol.
- the execution of the cryptographic protocol is only possible using an optical security feature of this document.
- a computer program is stored, the execution of which by the processor causes the implementation of a method according to the invention.
- a production system for valuable or security documents has an electronic design system as well as a printing system for valuable or security printing and/or a personalization system for personalizing document blanks for producing the valuable or security documents.
- the value or security document is produced using a method which is a process for creating a test-optimized document layout, the basis of which is preferably the representation of all features based on carriers (supports), occupied reception channels and test characteristics.
- This process makes features, forms and/or production data available in databases.
- the desired layout is created and the user can be supported.
- the local occupancy of all channels and the expected performance are preferably analyzed using a ROC curve or a merit function. If the result is process-safe, the layout can be used and the existing data is preferably sent directly to prepress or a printing system to print the document. Otherwise, there is the possibility of reworking until the goal is achieved. For example, the correction and checking of the layout design is repeated iteratively until the check for potentially problematic feature combinations is positive and no problematic feature combinations are found.
- the test routine preferably also includes tests for the maximum area and channel occupancy of the document, the ratio of personal data to static features and purely aesthetic emblems, for example design elements, an estimate of the processability and the expected false acceptance rate (FAR ("False Acceptance Rate”) value) and the false rejection rate (FRR) in the field based on known external data and performance curves, manufacturability due to space occupancy and use of special materials and/or the expected cost of the final document.
- FAR Fals Acceptance Rate
- FRR false rejection rate
- a "document” is a physical object, for example a paper-based or plastic-based card, with or without an integrated circuit, such as a chip, which establishes an identity or a property or right of the holder of the document.
- a document can in particular be a valuable or security document.
- An identity document is a document that contains information regarding the identity of its owner (name, address, facial image, signature, etc.).
- An identity document can be, for example, an ID card, a passport, an employee ID card or a personalized document of value (e.g. credit card).
- Documents often contain security features such as facial images, holograms, verification numbers, cryptographic keys or the like.
- a "document template” is a data object stored electronically on a design system that can be used to create a document whose properties are determined by the document template.
- a "layout element” is an element of a layout of a document or a document template that has optical security features. Different types of layout elements have different optical security features or combinations of such security features.
- Optical security features are features of a document that enable the authenticity or integrity of a document to be verified using an optical reader that includes such security features.
- security features are guilloches, micro-writing, metameric systems, printing with fluorescent, phosphorescent and/or up-conversion colors, printing with infrared colors, barcodes, in particular one- or two-dimensional barcodes, optically variable colors, transparent ones or reflective holograms or kinegrams, watermarks, in particular digital watermarks that carry machine-readable information, register printing elements, in particular see-through registers, see-through windows, mottled fibers, security threads, microperforations and combinations thereof.
- a feature occupies one or more channels depending on the definition (CMYK vs. RGB).
- a feature has an area that is required as a support to apply the feature and display it undisturbed.
- a feature has a structure per channel that needs to be checked.
- Features are stored in a database with information about occupied channels, surface characteristics, structure and test conditions. In principle, features can be arranged arbitrarily in the layout, although an overlap of features may be prohibited.
- a “database” here means a container and/or system for storing and managing electronic data.
- the database is preferably a document-external database that stores the image reference data and optionally also further reference data for a large number of documents.
- a database can therefore be designed, for example, as a directory or directory tree.
- a database is preferably a database system that is designed to store large amounts of data efficiently, consistently and permanently To provide subsets in different, needs-based representation forms for users and application programs.
- a database system consists of two parts: the management software, called database management system (DBMS), and the amount of data to be managed, the database (DB) in the narrower sense, sometimes also called "database”.
- DBMS database management system
- the management software internally organizes the structured storage of data and controls all reading and writing access to the database.
- a database system offers a database language to query and manage data. Examples of databases are a characteristics database (channels, carriers (support), characteristics), a form database (form, data groups) and a manufacturing database (manufacturing tolerances, process limits).
- An “optical reading device” is a device for optically detecting a document, in particular for optically detecting a security feature of such a document.
- a “data reader” is a device for reading data from an electronic memory.
- a data reader can be accommodated with an optical reader in a reader, for example in the form of a terminal.
- a “channel for the optical detection of a security feature” is defined by the specific optical properties of a security feature. Examples of channels in this sense are frequency channels, tilt angles, excitation wavelengths, color impressions and their combinations.
- images are recorded in Vis, UV and IR. Extensions, particularly in the area of holographic representations, are conceivable. This results in, for example, 3 channels VisR, VisG, VisB, i.e. red, green and blue.
- the UV area can also be divided into sub-areas.
- the UV range is divided into three sub-ranges analogous to the visible channels VisR, VisG, VisB, which are referred to as UVR, UVG, UVB.
- the UV sub-range with the largest wavelengths is referred to as the "red” UV range UVR, the middle UV sub-range with medium wavelengths as the "green” UV range UVG and the UV sub-range with the smallest wavelengths as the "blue” UV range.
- UVB range There is also an IR channel and a holo channel. Since both static and personalized features can occur in each channel, this results in a total of 16 channels in this form, for example.
- the “separation of channels” means the detection of the optical security features by an optical reading device, separated according to channels.
- different optical sensors can separately record and process signals from different channels or process them separately.
- the separation of channels is made more difficult by, among other things, so-called crosstalk.
- a feature regularly occupies a certain number of channels. For example, a yellow UV color can occupy the UVG and UVR channels; a lasered text, for example, can occupy all channels.
- the requirement for separability now means that features within the individual channels do not overlap or adjoin one another too closely. An occasional exception are texts and codes that are decoded directly. These can also be calculated out of the corresponding channels with prior knowledge of a form, a decoder and/or a characteristic.
- supp(M Channel i ) ⁇ x Channel i , , y Channel j
- x Channel i and y Channel i are the coordinates of image points in a two-dimensional document plane or detection plane.
- Crosstalk is a term from telephony and originally describes an effect that allows you to quietly hear another conversation on the telephone - hence the name.
- Today the term is generally used in communications engineering to refer to the undesired mutual influence of actually independent signal channels.
- optical security features The “instantiation of selected types of optical security features” is understood to mean the inclusion of representatives of such types of optical security features in a document template when designing this document template.
- “Placement and scaling” is understood to mean the local placement and choice of a specific dimensioning of the dimensions of an optical security feature in the layout of a document template when instantiating it.
- a “document carrier layer of a valuable or security document” is a layer in, on or on the body of the valuable or security document, which carries the information of the document, in particular its optical security features.
- An "electronic representation of a document support layer” is the layout design of the document support layer of a document stored in a storage device of a document template design system.
- a "draft layout” is a data set that stores the instantiated visual security features of a document and their placement and scaling.
- Communication Channels are channels that are associated with channels in a database in which different types of optical security features are assigned to more than just one of those types of optical security features are assigned.
- a "submission of a correction to the layout draft” is the new entry of a corrected or the correction of an existing layout draft in need of correction by the designer (the "Designer") of the layout draft.
- optical resolution of an optical reading device is the minimum distance between two structures, in particular security features in a document layout, which just allows the spatial resolution (separation) of these two structures in an image recorded by this optical reading device.
- the resolution is quantified, for example, by specifying an angular distance or an angular resolution or by specifying a distance between structures that can just be separated.
- Manufacturing tolerances are unwanted deviations of the actual values of layout parameters such as positions, sizes or optical features from the target values of these layout parameters.
- an "examination error rate” (also error rate, error quotient, error density, error rate or error frequency) is the relative proportion of incorrect elements in relation to the total, i.e. the relative frequency with which an error occurs.
- error rate also error rate, error quotient, error density, error rate or error frequency
- error frequency is the relative proportion of incorrect elements in relation to the total, i.e. the relative frequency with which an error occurs.
- a distinction is often made in particular between false positive and false negative test results.
- the types of optical security features in the database are each assigned a verification error rate when checking for validity by the optical reading device.
- An “overall verification error rate” for a layout design and/or a resulting layout is calculated from the individual verification error rates of the types of security features instantiated in the layout (design) according to the rules of probability calculation.
- a layout is created and displayed in test channels. Based on known performance experiences (ROC curve or similar), an expected value is created for field tests. Manufacturing-specific know-how can also be evaluated when arranging features (e.g. color coverage). Biometric characteristics in particular can be particularly weighted.
- ROC curve (ROC: English for receiver operating characteristic or German operating characteristic of an observer), also called limit value optimization curve or isosensitivity curve, is a method for evaluating and optimizing analysis strategies.
- the ROC curve visually represents the dependence of efficiency with error rate for different parameter values. It is an application of signal detection theory.
- the ROC curve can be used to get the best possible value of a parameter find, for example in a dichotomous (semi-)quantitative characteristic or two-class classification problem.
- the resulting relative frequency distributions are determined in the form of sensitivity (true positive rate) and false positive rate.
- the sensitivity (true positive rate) is preferably entered as an ordinate ("y-axis") and the false positive rate as an abscissa ("x-axis").
- the parameter value itself does not appear, but can be used as a label or digital label for the points.
- the result is typically a relationship that corresponds to a curved, ascending curve.
- An ROC curve close to the diagonal indicates a random process: Values close to the diagonal mean an equal hit rate and false positive rate, which corresponds to the expected hit frequency of a random process.
- the ideal ROC curve initially rises (almost) vertically (the hit rate is close to 100%, while the error rate initially remains close to 0%), only then does the false positive rate increase.
- An ROC curve that remains well below the diagonal indicates that the values have been misinterpreted.
- the theoretical optimum (in the sense of a compromise between hit and error rate) of the tested value is then determined visually or computer-aided from the contact point of a diagonally rising tangent with the ROC curve.
- the limit value can be found as the perpendicular of the contact point of the tangent to the test value curve.
- the points of the curve can be labeled with the test value.
- a “merit function” or performance function refers to a function that measures an agreement between data and a fitting model for a specific selection of parameters. For example, by general convention, the performance function is small when agreement is high. For example, in the course of a regression, parameters can be adjusted based on the value of the merit function until a smallest value is obtained, thereby producing an optimal adjustment of the corresponding parameters that results in the smallest value of the merit function. In other words, the corresponding parameters can be optimized by minimizing the merit function. The result of the corresponding optimization are optimal or optimized parameter values.
- a Bayesian network refers to a directed acyclic graph in which the nodes are random variables and the edges describe conditional dependencies between the variables. Each node of the network is given a conditional probability distribution of the random variable it represents, which assigns random variables to the parent nodes.
- a Bayesian network is used to represent the joint probability distribution of all variables involved as compactly as possible using known conditional independencies. The conditional (in)dependence of subsets of the variables is combined with a priori knowledge.
- conditional probability distribution of random variables with the given variables can be calculated with the help of various algorithms and thus inference can be carried out. For example, a Monte Carlo algorithm can be used for approximate inference.
- a “frequency channel” is an optical channel defined by one frequency, by multiple frequencies, or by a spectrum of optical frequencies in or outside the visible range of electromagnetic radiation.
- tilt angles are important in connection with the tilting effect, which can be a possible security feature of valuable or security documents, in particular banknotes.
- the tilting effect can be created by embossing or lenticular images; an important example is the so-called kinegram.
- a kinegram or kinegram is a technology for protecting against counterfeiting of banknotes, metal bars, passports, visas and identity cards using the tilting effect. From a safety perspective, it is referred to as an “OVD” (Optically Variable Device).
- the usually shiny silver kinegrams represent a two-dimensional sequence of movements.
- the name is derived from the term kinematics because depending on the angle at which the kinegram is viewed, a clearly defined, film-like sequence takes place.
- excitation wavelength channel is defined by the wavelengths of the discrete or continuous spectrum of a light source used to illuminate a document in the optical reader. These excitation wavelengths do not have to be identical to the spectra emitted by the illuminated document. This is not the case, for example, with fluorescence, phosphorescence and/or up-conversion colors.
- a channel defined by "color impressions” is defined by the optical color impressions of an observer.
- the optical impression of an observer results from the product of the reflection or remission, the illuminance and the spectral Sensitivity.
- optical sensor refers here to a sensor that is designed to capture one or more images of a physical object, e.g. a document or part of a document.
- the images can in particular be digital images.
- the optical sensor can be, for example, a camera or a video camera.
- the optical sensor can, for example, be designed to selectively detect light of a specific wavelength range, e.g. infrared light (IR light) or light in the wavelength range visible to the human eye (white light, daylight).
- IR light infrared light
- the captured images are preferably digital images that are stored electronically and/or sent to a system that further processes the image.
- a “facial image” here is understood to mean an image, in particular a digital image, which depicts the face of a person.
- a "digital image” is a data set in which image content is represented and stored.
- the digital image can be a data record in which the content of an image is represented by integers.
- the digital image can be a raster graphic.
- a “system” here is understood to mean an entirety of one or more system elements that is capable of processing data.
- a system can include a computer or a distributed computer system, which is designed, for example, as a cloud computer system. It is also possible that individual components of the system or the entire system are implemented in dedicated hardware.
- the testing system can be completely integrated into a terminal, which, in addition to one or more cameras, also contains one or more lighting systems and a copy of the database with the reference data.
- individual components, such as the database to be provided by a component external to the terminal, for example via a database server connected to the terminal via a network connection.
- an exemplary layout draft 100 of a document 101 or an electronic document template has a plurality of layout elements.
- the layout design 100 includes a plurality of types of optical security features 104 to 108 that are instantiated in the layout design 100.
- the security features can be placed on the same level or layer of the document and optionally scaled or, in the case of a multi-layer document, on different layers arranged one above the other.
- An optical reading device for example, captures the top of a corresponding document.
- the security features are distributed, for example, in a detection plane of a document carrier layer, which is spanned by two axes 102, 103 of an x, y coordinate system.
- One or more security features can, for example, be arranged in an overlapping manner, such as the exemplary security features 105 and 107 or 106 and 108 in the Figure 1 .
- the optical security features can include, for example, textual features (text fields) 104 or other types of optical security features.
- security features may be arranged adjacent to one another, such as exemplary security features 107 and 108, so that they touch each other.
- Security features can also have completely disjoint carriers, such as security features 106 and 105 or 107 and 106 in Figure 1 .
- optical reading device which attempts to validate or verify a document with the correspondingly instantiated security features, will not be able to tell the security features apart or . able to separate from each other.
- the optical reading device comes to the conclusion that one or both security features are incomplete and therefore invalid.
- security features arranged adjacent to one another such as such as security features 107 and 108. If the resolution of the optical reading device is not sufficient to resolve the boundary or a small distance between the corresponding security features, the optical reading device is also unable to distinguish or separate these security features from one another. In this case too, the optical reading device could come to the conclusion that one or both security features are incomplete and therefore invalid.
- the optical security features M 1 and M 2 occupy different channels.
- the optical security feature M 1 is assigned, for example, to the channels with channel numbers 6 and 11, while the optical security feature M 2 is assigned, for example, to the channel with channel number 5.
- the optical security features M 1 and M 2 are, for example, security features that have completely disjoint carriers, that is, they occupy completely overlapping and non-contact (disjoint) areas of the layout design.
- the channel numbers are plotted on the vertical axis 201.
- the horizontal x and y axes 203 and 202 span the detection plane.
- the exemplary method for generating an electronic document template for a value or security document has the following steps:
- a database DB is made available.
- the database assigns one or more channels to different types of optical security features for optical detection with an optical reading device.
- the corresponding optical reading device is designed, for example, to separate the channels.
- one of a plurality of types of optical security features is selected from the database.
- the selected optical security features are placed on an electronic representation of a document carrier layer of the document to be designed, for example a value or security document, to generate a layout draft and, if necessary, scaled.
- step 303 The layout draft created in this way with the instantiated optical security features is checked in step 303.
- spatially overlapping or adjacent security features are checked to see whether they occupy a common channel. If the result is negative and the check shows that potentially problematic overlapping or adjacent security features are present, the design is corrected in step 304.
- a signal is issued or sent which identifies possible problematic combinations of security features.
- a correction to the layout design is entered or received.
- the signal is displayed on a display device of a user interface in the form of a conflict indication, which identifies the possible problematic combinations of security features.
- correction commands are received via an input device in the user interface.
- Correcting problematic combinations of security features can, for example, include spacing the corresponding security features on the document carrier layer from one another. The distance is selected, for example, such that the corresponding security features can be separated from the corresponding reading device, taking into account manufacturing tolerances and/or resolution capacity of the optical reading device, even though they occupy the same channel.
- a corresponding complaint can be made, for example, by adjusting the placement of the security features and/or by rescaling the security features, in the course of which they are reduced in size.
- the correction may include replacing one or more of the security features with security features of a different type, which occupies a different channel.
- a correction may include omitting or removing one of the instantiated security features from the layout design.
- the conflict notice may include one or more automatically generated correction suggestions.
- the correction suggestions can, for example, be created and output in a hierarchical order.
- a first suggestion can, for example, suggest a change in the placement of instantiated security features
- a second suggestion can, for example, suggest a change in the scaling of instantiated security features
- a third suggestion can, for example, suggest replacement suggestions for replacing instantiated security features with security features of a different type, which is a different one Channel occupied
- a fourth suggestion can, for example, suggest removing one or more of the instantiated security features.
- the input received in response to the conflict notice identifies one of the correction suggestions to be implemented to correct the layout design.
- the layout draft is corrected according to the input.
- the checking and correction steps 303, 304 can, for example, also be integrated into the selection step 302, ie carried out while the layout draft is being created. For example, a corresponding check is carried out in the course of instantiating each of the security features. If an optical security feature is selected and arranged on the electronic representation of the document carrier layer, it is checked, for example, whether this optical security feature overlaps another optical security feature or is adjacent to another optical security feature which occupies the same channel as the selected security feature. If this is the case, a signal with a Conflict notices issued. For example, the potentially conflicting security features are highlighted visually, for example in color, in a visual representation of the electronic representation of the document carrier layer on the output device of the user interface.
- one or more correction suggestions to resolve the conflict are also displayed.
- step 303 is repeated to check whether the correction resolves any conflicts regarding overlapping or adjacent security features of the same channel. This can allow correction of the layout design to be done iteratively.
- the layout draft is saved as an electronic document template in step 305.
- the saved layout draft can be an unchanged layout draft if the check in step 303 was positive, i.e. no conflicts occurred, or a layout draft that has been corrected one or more times if conflicts were found and corrected in previous checking steps.
- an embodiment of a document 101 has an integrated electronic circuit 402.
- the integrated electronic circuit 402 includes, for example, an electronic memory 403 for storing sensitive data and a processor 404, which is configured to execute a cryptographic protocol 407.
- the cryptographic protocol 407 is implemented, for example, in the form of executable program instructions.
- the document 101 comprises a communication interface 405 for communication with a terminal 411 or with a communication interface 415 of a terminal 411 configured as a data reader or comprising a data reader.
- the document 101 comprises a plurality of optical security features 408, which, for example using one according to the method of Figure 3 generated electronic document template in which document 101 was instantiated.
- the plurality of optical security features 408 includes, for example, different types of optical security features that occupy different channels or can be detected via different channels.
- the exemplary terminal 411 includes, for example, an electronic one Circuit 412 with an electronic memory 413 for storing data and a processor 414 which is configured to execute a cryptographic protocol 417.
- the cryptographic protocol 417 is implemented, for example, in the form of executable program instructions.
- the terminal 411 includes, for example, a communication interface 415 for communication with the document 101 or with the communication interface 405 of the document 101.
- the terminal 411 includes an optical reading device 416 or optical sensor for detecting optical security features 408 of the document 101.
- the optical reading device 416 is configured to capture optical security features using different channels.
- the optical reading device 416 includes a plurality of different optical sensors, which are configured to detect optical security features via different channels.
- the optical reader 416 includes one or more optical sensors, each configured to use a plurality of channels to detect optical security features.
- the processor 414 of the terminal 411 is configured to control the optical reader 416 for detecting the plurality of optical security features 408.
- the recorded security features 408 are checked for validity by the terminal 411.
- the recorded optical data of the security features 408 are compared with reference data which is stored in the memory 413 of the terminal. If the recorded optical data matches the stored reference data sufficiently, the security features 408 and thus the document 101 are classified as valid and authentic.
- one or more of the security features 408 include data that is extracted by the terminal 411 from the data captured by the optical reading device 416.
- the processor 414 derives, for example, a cryptographic key in the course of executing the cryptographic protocol 417, which unlocks the document 101 and allows the terminal 411 to access the data requiring protection in the electronic memory 403 of the document 411.
- the terminal 411 can prove that the document 101 is actually available for visual inspection. This means that secret reading attempts can be prevented, for example without the owner willingly presenting document 101 for this purpose.
- the terminal must also provide an authorization certificate that defines access rights of the terminal 411.
- the authorization certificate specifies data categories for which the terminal 411 has read rights.
- the terminal 411 sends the authorization certificate to the communication interface 405 of the document 101 via the communication interface 415 as part of an authentication Document 101.
- the terminal 411 for example using a challenge-response method, has possession of a private cryptographic key after which the associated public cryptographic key is assigned to the reading rights defined in the authorization certificate. If the terminal 411 can present its reading authorization and/or the key derived from the security features 408, it receives, for example, read access to the data requiring protection in the memory 403 of the document 101 and can read them out via the communication interfaces 405, 415.
- the data presented by the terminal 411 is checked to prove the access or reading authorization, for example by the processor 404 using the cryptographic protocol 407.
- an embodiment of an electronic design system 500 for generating electronic document templates has, for example, a processor 502 which is configured to execute program instructions 504 of a computer program for generating an electronic document template for a value or security document.
- the electronic design system 500 includes, for example, a storage device 503 and a communication interface 504.
- the electronic design system 500 includes, for example, an output device 505, such as a display, and input devices 506, such as a mouse and/or keyboard.
- the electronic design system 500 has, for example, access to a database 507.
- the database 507 can, for example, be included in the storage device 503 of the electronic design system 500 or it can be a remote database to which the electronic design system 500 can access via the communication interface 503 and, for example a network, such as an intranet or the Internet, accesses.
- various types of optical security features T1, T2, T3, ..., TN are stored in the database 507.
- one or more channels K1, K2, K3 are assigned to the different types of optical security features T1, T2, T3, ..., TN for the optical detection of the security feature in question with an optical reading device.
- the different types of optical security features T1, T2, T3, ..., TN can be assigned different channels for optical detection for different types of optical reading devices.
- the database 507 can also include information about the manufacturing tolerance of the optical security features T1, T2, T3, ..., TN and/or the resolution capacity of the optical reading device(s).
- the database 507 may include information on testing error rates for the various types of optical security features T1, T2, T3, ..., TN, such as false acceptance rates and/or false rejection rates.
- the verification error rates of the various types of optical security features T1, T2, T3, ..., TN are each assigned to a specific type of optical reading device or only apply to that corresponding type.
- Corresponding information can also be stored in various databases, for example.
- the electronic design system 500 can have access to a separate form database, which provides form specifications for documents to be produced, such as specifications for the content arrangement and structuring of the document's data and for data groups which the corresponding document should contain.
- the electronic design system 500 can, for example, have access to a separate manufacturing database, which includes, for example, information on manufacturing tolerances and/or process limits.
- the electronic design system 500 is configured to allow a user to select a plurality of types of the optical security features T1, T2, T3, ..., TN from the database 507 and to instantiate the selected types by placing and scaling security features of the selected types on an electronic representation of a document carrier layer of a valuable or security document to generate a layout draft.
- the user can make inputs via the input devices 506, the result of which, for example in the form of the layout draft, is displayed to the user using the output device 505.
- the electronic design system 500 is further configured to perform a layout design review. For example, for spatially overlapping or adjacent types of security features, it is checked whether they occupy a common channel.
- a signal is output, for example via the output device 505, and an input of a correction of the layout draft is received in response to the signal via the input devices 506.
- the resulting corrected layout draft is used, for example, as an electronic document template for producing a corresponding one Document, i.e. value or security document, stored in the storage device 503.
- an embodiment of a manufacturing system 600 for valuable or security documents 101 has an electronic design system 500, such as Figure 5 , on. Furthermore, the manufacturing system 600 has, for example, a printing system 602 for value or security printing.
- the electronic drafting system 500 provides the printing system 602 with the electronic artwork.
- material sheets 601 for producing the document 101 are provided.
- the printing system 602 prints the material sheets 601 according to the specifications of the electronic print template. In the case of a multi-layer document, these material sheets 601 are joined together, for example, to form a material sheet booklet, from which the document 101 or the document body of the document 101 is produced, for example by means of lamination.
- the manufacturing system 600 further includes a personalization system 604 for personalizing document blanks 605 for producing personalized documents 101, such as valuable or security documents.
- a personalization system 604 for personalizing document blanks 605 for producing personalized documents 101, such as valuable or security documents.
- the owner's personal data is printed on the document blanks 605 or one of the material sheets 603.
- the personalization system 604 can be integrated into the printing system 602, for example. Additionally or alternatively, personal or personal data of the owner can be introduced into an electronic memory of the document blank 605 by the personalization system 604.
Landscapes
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Editing Of Facsimile Originals (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102020120842.1A DE102020120842A1 (de) | 2020-08-07 | 2020-08-07 | Erzeugung von Dokumentenvorlagen mit Sicherheitsmerkmalen |
| PCT/EP2021/072073 WO2022029321A1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
| EP21755950.9A EP4192692B1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
Related Parent Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP21755950.9A Division EP4192692B1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
| EP21755950.9A Division-Into EP4192692B1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| EP4246373A2 true EP4246373A2 (fr) | 2023-09-20 |
| EP4246373A3 EP4246373A3 (fr) | 2023-12-27 |
| EP4246373B1 EP4246373B1 (fr) | 2025-01-29 |
Family
ID=77398553
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP21755950.9A Active EP4192692B1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
| EP23183050.6A Active EP4246373B1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP21755950.9A Active EP4192692B1 (fr) | 2020-08-07 | 2021-08-06 | Production de modèles de documents dotés de caractéristiques de sécurité |
Country Status (4)
| Country | Link |
|---|---|
| EP (2) | EP4192692B1 (fr) |
| DE (1) | DE102020120842A1 (fr) |
| HU (1) | HUE071880T2 (fr) |
| WO (1) | WO2022029321A1 (fr) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102024112438A1 (de) * | 2024-05-03 | 2025-11-06 | Bundesdruckerei Gmbh | Verfahren und Vorrichtung zum Herstellen eines Dokuments mit einem Sicherheitsmerkmal |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000038932A1 (fr) | 1998-12-24 | 2000-07-06 | Ovd Kinegram Ag | Document pouvant etre active et systeme pour documents pouvant etre actives |
| GB2352708A (en) | 1999-08-06 | 2001-02-07 | David Pierce Hughes | Laminated identity badge and method for production thereof |
| US20050010776A1 (en) | 2003-03-31 | 2005-01-13 | Kenen Leo M. | Optically variable devices with encrypted embedded data for authentication of identification documents |
| WO2018109035A2 (fr) | 2016-12-16 | 2018-06-21 | Ovd Kinegram Ag | Procédé de vérification d'un document de sécurité et document de sécurité, dispositif et élément de sécurité |
| WO2020004633A1 (fr) | 2018-06-29 | 2020-01-02 | 凸版印刷株式会社 | Corps d'authentification, procédé de fabrication de corps d'authentification, procédé de lecture de corps d'authentification et procédé de vérification de corps d'authentification |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| SG10201408694WA (en) | 2014-12-26 | 2016-07-28 | Mastercard Asia Pacific Pte Ltd | Computer-aided card design validation |
| US9710636B1 (en) | 2016-10-20 | 2017-07-18 | International Business Machines Corporation | Digital identity card management |
-
2020
- 2020-08-07 DE DE102020120842.1A patent/DE102020120842A1/de active Pending
-
2021
- 2021-08-06 EP EP21755950.9A patent/EP4192692B1/fr active Active
- 2021-08-06 HU HUE21755950A patent/HUE071880T2/hu unknown
- 2021-08-06 WO PCT/EP2021/072073 patent/WO2022029321A1/fr not_active Ceased
- 2021-08-06 EP EP23183050.6A patent/EP4246373B1/fr active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2000038932A1 (fr) | 1998-12-24 | 2000-07-06 | Ovd Kinegram Ag | Document pouvant etre active et systeme pour documents pouvant etre actives |
| GB2352708A (en) | 1999-08-06 | 2001-02-07 | David Pierce Hughes | Laminated identity badge and method for production thereof |
| US20050010776A1 (en) | 2003-03-31 | 2005-01-13 | Kenen Leo M. | Optically variable devices with encrypted embedded data for authentication of identification documents |
| WO2018109035A2 (fr) | 2016-12-16 | 2018-06-21 | Ovd Kinegram Ag | Procédé de vérification d'un document de sécurité et document de sécurité, dispositif et élément de sécurité |
| WO2020004633A1 (fr) | 2018-06-29 | 2020-01-02 | 凸版印刷株式会社 | Corps d'authentification, procédé de fabrication de corps d'authentification, procédé de lecture de corps d'authentification et procédé de vérification de corps d'authentification |
Non-Patent Citations (1)
| Title |
|---|
| ICAO - BEST PRACTICE GUIDELINES FORT OPTICAL MASCHINE AUTHENTICATION, February 2018 (2018-02-01) |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4192692A1 (fr) | 2023-06-14 |
| EP4246373A3 (fr) | 2023-12-27 |
| WO2022029321A1 (fr) | 2022-02-10 |
| DE102020120842A1 (de) | 2022-02-10 |
| EP4192692B1 (fr) | 2025-04-23 |
| EP4246373B1 (fr) | 2025-01-29 |
| HUE071880T2 (hu) | 2025-10-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69634583T2 (de) | System und Verfahren zum Prüfen von Identifizierungskarten | |
| DE69923781T2 (de) | Druck und überprüfung von selbstprüfenden sicherheitsdokumenten | |
| WO2020001696A1 (fr) | Procédé pour prouver l'authenticité de produits et représentation imprimée | |
| EP2692086B1 (fr) | Procédé et appareil pour générer et authentifier des documents de sécurité | |
| WO2017137153A1 (fr) | Vérification d'un objet présentant un élément de sécurité | |
| DE102007060605A1 (de) | Sichern von Personen-Identitätsdokumenten gegen Fälschung | |
| EP4246373B1 (fr) | Production de modèles de documents dotés de caractéristiques de sécurité | |
| EP3889922B1 (fr) | Vérification de l'intégrité d'un document comportant des données à caractère personnel | |
| DE69535212T2 (de) | Verfahren und systeme zur erzeugung und authentifizierung unveränderbarer selbstüberprüfender artikel | |
| DE102008041990A1 (de) | Dokument, Verfahren zur Herstellung und zur Überprüfung eines Dokuments, Computerprogrammprodukt, Datenverarbeitungssystem und Prüfsystem | |
| EP3789976B1 (fr) | Procédé de vérification de l'authenticité d'un document, produit programme informatique, appareil de vérification et système de traitement des données | |
| EP2394250B1 (fr) | Procédé et dispositif pour vérifier des documents par utilisation d'une transformation en ondelettes | |
| DE102006049284B4 (de) | Verfahren zur Erstellung und Überprüfung eines sicheren Klartextdruckes sowie Vorrichtung und Informationsträger hierfür | |
| EP1057144B1 (fr) | Moyen d'autorisation d'acces ou d'identification et procede permettant de le realiser | |
| EP4051507B1 (fr) | Procédé et système de production et de vérification d'un document de sécurité | |
| EP3185221B1 (fr) | Dispositif d'authentification et procede de reconnaissance optique ou acoustique | |
| DE102023115512A1 (de) | Sicherheitsdokument-verifizierungsvorrichtung und verfahren zum prüfen eines sicherheitsdokuments | |
| EP3772726B1 (fr) | Procédé de vérification de l'authenticité d'un document de valeur ou de sécurité ainsi que document de valeur ou de sécurité | |
| DE102015116627A1 (de) | Verfahren und Vorrichtung zur Authentifikation eines Objekts oder einer Person über ein modulartig aufgebautes Sicherheitselement | |
| EP3548300B1 (fr) | Procédé de fabrication et de vérification d'un document de sécurité et document de sécurité | |
| EP3408789A1 (fr) | Dispositif d'authentification, document d'authentification et procédé pour authentifier une personne | |
| DE102024105533A1 (de) | Sicherheitsdokument, verfahren und vorrichtung zum herstellen eines sicherheitsdokuments | |
| EP4330051A2 (fr) | Signe de sécurité pour un document de valeur, document de valeur et procédé de réalisation d'un signe de sécurité | |
| DE102021203081A1 (de) | Verfahren und Vorrichtung zum Verifizieren einer Echtheit eines Objekts und Gerät zur Objektbeurteilung | |
| Abass et al. | A Review: Strategies for Recognizing Forgery in Identity Documents |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
| AC | Divisional application: reference to earlier application |
Ref document number: 4192692 Country of ref document: EP Kind code of ref document: P |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Free format text: PREVIOUS MAIN CLASS: G06K0019000000 Ipc: B42D0025485000 Ref country code: DE Ref legal event code: R079 Ref document number: 502021006579 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: G06K0019000000 Ipc: B42D0025485000 |
|
| PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
| AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06K 19/00 20060101ALI20231117BHEP Ipc: G06K 15/02 20060101ALI20231117BHEP Ipc: B42D 25/23 20140101ALI20231117BHEP Ipc: B42D 25/305 20140101ALI20231117BHEP Ipc: B42D 25/485 20140101AFI20231117BHEP |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
| 17P | Request for examination filed |
Effective date: 20240328 |
|
| RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06K 19/00 20060101ALI20240802BHEP Ipc: G06K 15/02 20060101ALI20240802BHEP Ipc: B42D 25/23 20140101ALI20240802BHEP Ipc: B42D 25/305 20140101ALI20240802BHEP Ipc: B42D 25/485 20140101AFI20240802BHEP |
|
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
| INTG | Intention to grant announced |
Effective date: 20240923 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
| AC | Divisional application: reference to earlier application |
Ref document number: 4192692 Country of ref document: EP Kind code of ref document: P |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
| REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 502021006579 Country of ref document: DE |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
| P01 | Opt-out of the competence of the unified patent court (upc) registered |
Free format text: CASE NUMBER: APP_8993/2025 Effective date: 20250221 |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250429 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250529 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250429 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250529 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250430 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20250819 Year of fee payment: 5 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: W10 Free format text: ST27 STATUS EVENT CODE: U-0-0-W10-W00 (AS PROVIDED BY THE NATIONAL OFFICE) Effective date: 20251015 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20250822 Year of fee payment: 5 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20251020 Year of fee payment: 5 Ref country code: FR Payment date: 20250821 Year of fee payment: 5 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20250129 |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 502021006579 Country of ref document: DE |
|
| RAP4 | Party data changed (patent owner data changed or rights of a patent transferred) |
Owner name: BUNDESDRUCKEREI GMBH |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |