WO2011086275A1 - Procede de securisation d'un objet et objet correspondant - Google Patents
Procede de securisation d'un objet et objet correspondant Download PDFInfo
- Publication number
- WO2011086275A1 WO2011086275A1 PCT/FR2010/052822 FR2010052822W WO2011086275A1 WO 2011086275 A1 WO2011086275 A1 WO 2011086275A1 FR 2010052822 W FR2010052822 W FR 2010052822W WO 2011086275 A1 WO2011086275 A1 WO 2011086275A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- graphic
- signature
- graphic element
- multilayer
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2033—Matching unique patterns, i.e. patterns that are unique to each individual paper
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0047—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/125—Offline card verification
Definitions
- the present invention relates to the field of securing objects, possibly including the verification, the authentication thereof.
- the invention relates, according to a first of its objects, to a method of securing an object comprising the steps of:
- the method is essentially characterized in that:
- the relative position of the first graphic element and the second graphic element is random.
- the graphic signature is unique.
- the creation of the multilayer graphic signature further comprises the superposition in partial or total transparency of a third graphic element on a third layer, distinct from the first and second layers, the relative position of said third graphic element and said first graphic element. and / or said second graphic element being random, said third graphic element possibly comprising a random graphic element.
- the object bearing the graphic signature is very secure.
- the multilayer graphic signature according to the invention thus comprises by superposition at least two graphic elements.
- Each graphic element comprises for example at least one of the following elements:
- the storage step comprises a step of affixing said multilayer graphic signature on said object, or integrating said multilayer graphic signature to said object.
- said object is a multilayer object, the integration of said multilayer graphic signature to said object being carried out in at least one of said object's layers.
- each layer of the signature is a respective layer of said object.
- the method further comprises the steps of:
- the numeric or alpha-numeric identifier may be dependent or independent of the object or signature.
- the numerical or alpha-numerical identifier makes it possible to index the digital signature. For this purpose it can be an index, a sequential registration number, or correspond to at least one distinctive or nominative element of the object.
- the production of the first shot of the multilayer graphic signature is performed during the manufacture of the object, for example by means of a CCD sensor, so that the reference digital signature is created from the first one. shooting before putting the object on the market.
- the method further comprises the steps of:
- the graphic identifier is a datamatrix.
- said graphic identifier is printed on one of the layers of said multilayer signature.
- the method further comprises the steps of:
- the second digital image of the multilayer graphic signature is made after the manufacture of the object, so that the second digital signature is created after the object is put on the market.
- comparing the first and second digital signatures comprises the steps of:
- the method further comprises a step of determining the type of signature / obj and.
- the invention also relates to a computer program, comprising program code instructions for performing the steps of a method as defined above when said program is run on a computer.
- the invention relates to a secure object, comprising:
- a multilayer graphic signature by superposition in partial or total transparency of a first random graphic element on a first layer and a second graphic element on a second layer, stored on or in said object, preferably of which at least one graphic element comprises a random graphic element.
- the object is essentially characterized in that the relative position of the first graphic element and the second graphic element is random.
- the object further comprises a third graphic element that may comprise a random graphic element on a third layer, distinct from the first and second layers, and wherein the relative position of said third graphic element and said first graphic element and / or said second graphical element is random.
- a third graphic element may comprise a random graphic element on a third layer, distinct from the first and second layers, and wherein the relative position of said third graphic element and said first graphic element and / or said second graphical element is random.
- the object further comprises a graphical identifier, optionally multilayer, from a shooting of the superimposed set of said first and second graphic elements, and said third graphic element when it exists; and / or from said at least one distinctive or nominative element of the object.
- the graphic identifier makes it possible to unequivocally designate the secure object in a database by means of its corresponding numerical identifier, for the purpose of authenticating said object.
- said graphic identifier is printed on one of said multilayer signature layers, preferably in the form of datamatrix.
- said object is a multicouch.es object, one of which supports or contains the first graphic element, another layer supports or contains the second graphic element, and possibly another layer still supports or contains, when it exists, the third graphic element.
- the object and the graphic signature comprise the same number of layers, so that each layer of the signature is a respective layer of said object.
- the object further comprises a package, wherein one or one of the layers is the first, second, or third layer when it exists.
- the invention ensures the uniqueness and non-reproducibility of the signature, therefore the security of the object. Indeed, if it is theoretically possible to regenerate the same computer code (same graphic element (s)) and to reprint it on an object, because of the mechanical tolerances of the processes implemented, this ( s) graphic element (s) will never be located in exactly the same place, which makes practically impossible the reproduction of the signature.
- the invention also has the advantage that the association of the signature with the object may not require the use of exogenous materials to said object. Its longevity is therefore the same as an object to which no such signature is associated.
- FIG. 1 illustrates an exploded view of an embodiment of an object of the type of identity card according to the invention
- FIG. 2A illustrates an embodiment of a graphic signature according to the invention
- FIG. 2B illustrates an embodiment of an object comprising a graphic signature and a graphic identifier according to the invention
- FIG. 2C illustrates in close-up an embodiment of a graphic signature and a graphic identifier according to the invention
- FIGS. 3A to 3H illustrate embodiments of random graphic elements according to the invention
- FIG. 4 illustrates an embodiment of the method according to the invention
- FIG. 5 illustrates an embodiment of a graphic signature according to the invention, with a view to the authentication of the object.
- the object 10 to be secured is a multilayer object, in this case a document, official document (card) of identity for example, in which the object to be secured, will be described essentially.
- Multilayer signature 23 according to the invention is integrated.
- Partial layer means a layer whose surface is smaller than the surface of the object on which it is superimposed, for example a label.
- the object 10 typically comprises a first layer 11, called base layer, on which is printed a first graphic, for example in the form of guilloches ( Figure 1).
- a first graphic for example in the form of guilloches ( Figure 1).
- the card consists of an assembly of several layers produced independently.
- the first layer is generally printed in offset, screen printing or other printing techniques used for the realization of security graphics.
- the independent layers are assembled by boards comprising for example 24 or 48 cards and each card is then cut individually.
- a second layer 12 for example polycarbonate, for example customizable by laser marking, in which is printed a second graphic, different from the first graphic.
- the second graphic is printed during the personalization step of the card, once the card is assembled.
- optically variable we mean an element whose at least one of its aspects changes when it is subject to a relative movement with respect to the line of sight of an observer (human being, camera).
- the relative movement may be a translational movement, and / or a rotational movement, about a horizontal axis (X axis), a vertical axis (Y axis), and / or rotation in the plane of the X the secure object (Z axis).
- Changes in aspects may include all or some of the following:
- the graphic signature 23 is multilayer.
- Each graphic element 20, 21, 22 of the multilayer graphic signature is included in a respective graphic window F1, F2, F3, the shapes and dimensions of the windows F1, F2, F3 being preferably identical to each other.
- the graphic signature in the sense of the present invention is the graphic resultant of the superposition of said windows, by partial or total transparency of a set of graphic elements distributed over a plurality of layers, as illustrated in FIG. for example to all or part of a face of the object 10.
- each layer comprises a respective single graphic element
- first graphic signature element 20 on a first layer 11 and at least one second graphic signature element 21 on a second layer 12.
- the first graphic signature element 20 may be a predetermined graphic element (image, logo or other) or a random graphic element.
- Random graphical element means, in a given graphical window, a graphic comprising a set of at least one element, of which at least one of the following characteristics of each element is random:
- the population of unique elements generated by the algorithm used for the creation of the random graphic element is preferably greater than one million.
- the object analyzed for verification / authentication of the signature is the global pattern obtained by superimposing the layers.
- the overall pattern is itself printed with a positioning tolerance with respect to the print medium (s) represented by the layers, at least one of which preferably comprises at least one fixed element (non-random ) analysable.
- the combination of the graphical hazard generated by the algorithm and the positioning randomness of the graphical windows PI, F2, F3 ensures a real random source in the global pattern to be analyzed. in the graphic signature 23.
- FIG. 3C, 3D square or rectangular (FIG. 3E, 3F), in honeycomb (FIG. 3G, 3H), or of any shape, meshed with a grid of predetermined shape: square, triangular, radial, or other .
- N a random number included in the graphic signature (for example generated by a RAND function () relative to a domain typically ranging from 10 to 30).
- the patterns are polygons (FIGS. 3B, 3D, 3F, 3H).
- X max is the horizontal size of the discrete array. the vertical size.
- a random size can be determined between predefined terminals ⁇ t min ⁇ ti ⁇ t max ) and an orientation a over the range [0, 360 °] or over a smaller range
- Each random pattern Mi is therefore characterized in particular by its abscissa (Mi (xi)), its ordinate (Mi (yi)) on the grid, its size, and its orientation.
- Another parameter may be the color of the pattern which can also be randomly determined in a predefined color palette.
- the first graphic signature element 20 is an extract of the first graphic of the first layer 11 of the object, in this case an extract of guilloches, printed on the object to be secure / authenticate.
- the second signature graphic element 21 on the second layer may also be a predetermined graphic element (image, logo or other) or a random graphic element as described above.
- the second layer 12 of the object comprises distinctive or nominative elements of the object, in this case personal information about the wearer of the object, for example the surname, first name, date of birth, etc.
- the object is equipped with an electronic chip, it is provided with a serial number that can serve as a distinctive or nominative element of the object, the chip being generally inserted into another layer (no illustrated) of object 10.
- the object further comprises a graphical identifier 30, optionally multilayer, from a shooting of the graphic signature 23; and / or from said at least one distinguishing or nominative element of the object, for example the graphic identifier is generated by an algorithmic engine notably from the personal information and / or the chip number.
- the graphic identifier 30 is created during the personalization or the serialization of the object.
- the relative position error between the windows F1, F2, F3 is desirable for the relative position error between the windows F1, F2, F3 to be as small as possible, that is to say to say less than a threshold, for example to give uniformity of appearance to all the objects produced.
- the methods of manufacture and / or assembly (superposition) of said windows involve unavoidable mechanical tolerances resulting in a random error of relative position of said windows.
- the invention advantageously uses instead the random error of relative position.
- the signature is unique.
- graphic element and / or said second graphic element is random, for the same reasons.
- the third graphic element 22 is a hologram carried by a laminate (laminar layer), and applied after personalization of the object 10.
- the multilayer signature 23 thus comprises in total or partial superposition the first 20, second 21 and optionally third graphical element (FIG. 2A).
- a shooting of the multilayer graphic signature 23 is for example recorded in a database.
- a digital signature is calculated, and this digital signature is recorded in a (possibly the same) database, so as to constitute at least a part of a reference digital signature.
- two databases are used: one that contains the image of the shot, and one that contains the calculated signature, for reasons of space and security.
- the digital signature is calculated from the shooting of the graphic signature preferably by a specific algorithm including the use in the field of treatment of 1 images.
- the digital shot is pretreated to eliminate noise, rectified from a preset landmark that must be included on one of the layers to correct any distortion or distortion effects. of rotation due to shooting, and then analyzed to produce descriptors that will constitute said signature, or digital fingerprint.
- the descriptors may consist of all or some of the following:
- the pretreated image (described in grayscale or colors in a particular representation space, for example such as RGB or HSV), or
- the image obtained after extraction of the contours thereof such as the classical statistical moments (mean, variance, etc.), the Zernike moments, etc.
- color or texture descriptors computed locally or globally on the pretreated image such as color histograms or descriptors derived from the use of Gabor filters,
- a numerical identifier is then associated with said digital signature record, so as to facilitate subsequent searches by indexing.
- the numerical identifier can be an index, or correspond to at least one distinctive or nominative element of the object, for example a serial number, the name and / or first name of the bearer of the object 10, etc.
- the digital identifier is stored remotely on the same server (database) as the reference signature, preferably accessible securely, possibly via the Internet.
- the numerical identifier makes it possible to index the graphic signature.
- the digital identifier is a function, for example of hashing, of the digital image of the graphic signature 23.
- MRZ Machine Readable Zone
- the graphic identifier 30 is printable and coded in the form of a two-dimensional barcode symbol.
- the numerical identifier 30 is a Datamatrix (FIGS. 2B, 2C).
- the graphic identifier 30 is further stored locally on the object, by apposition, printing, gluing, insertion or the like.
- the Datamatrix is printed on the card 10 after the lamination of at least one of the first 11, second 12 and optionally third layer 13 of the card if the graphic identifier is an index; and after lamination of all layers otherwise.
- a digital shooting of the multilayer graphic signature 23 is carried out, for example by a camera or any equipment provided with a CCD sensor and a memory.
- the digital shooting of the multilayer graphic signature 23 is then compared to the reference digital signature.
- a 1: 1 comparison is made between the object to be analyzed and the reference digital signature (of the object or original document) bearing the same number or the same identifier, rather than a search 1 of N which could be disrupted by the presence of several similar motives in a base of several million.
- the comparison can be implemented by studying similarities or by studying differences between a signature to be analyzed, called “suspicious” stored on or in a “suspect” object, and a reference signature, called “authentic”.
- the comparison is carried out in a manner known per se, in particular in image analysis, by the characterization of shapes (detection of salient points, extraction of contours, etc.), texture (matrices of cooccurrences, etc. ..) and colors, combined. Numerically, it can consist, for example, in calculating a bit error rate ⁇ BER) between the two signatures, and in returning "True” when this rate is lower than a given threshold, "False” in the opposite case.
- the threshold is preferably chosen so that the statistical probability that the response is erroneous is negligible.
- the comparison of the graphic signatures is reduced to the comparison of the digital signatures by an algorithm known per se, making particular use of the field of image processing. According to the algorithm chosen for the calculation of the digital signature, the comparison may comprise, for example, the following steps:
- the corresponding reference numerical signature is searched for in the database, by means of the numerical or alphanumeric index deduced from the suspect,
- the two digital signatures are compared according to one or more predetermined criteria,
- the predetermined criteria for comparing two digital signatures preferably depend on the nature of the information stored therein.
- a criterion can be based on the calculation of a distance between two paired descriptors (that is to say computed with the same coordinates or on the same graphical elements of the shooting of the graphic signature of the suspect of one part, and that of the reference on the other hand) according to a formula adapted to the nature of the descriptor.
- the use of a threshold then makes it possible to accept or reject the criterion depending on whether the distance is below or above it.
- the decision process is preferably chosen so that the probability of a false answer is negligible.
- a step of determining the type of signature / object can also be provided to increase the search speed of the reference signature.
- This step includes the location of the graphic identifier (DataMatrix for example) and the determination of its orientation and its scale in the digital image. For example, reading the image of the graphic identifier 30 may make it possible to determine that the object is of the type of identity card, of the passport type, of the manufactured object type, etc. Of this type, it is possible to search for the corresponding reference signature only on the part of the database in which this type of signature is stored, and not on the whole of the database. It is also possible to provide several databases, one for each type of object, in order to increase the security of the process.
- the image extracted in the preceding step may have certain characteristics that are common to the type of object.
- the graphic signature comprises a constant background print with a specific graphic design (eg, guilloches)
- this step may consist in ensuring that the background in question is present on the image, by means of any printing technique. known image analysis.
- the program may terminate by returning an appropriate message to the user.
- the present description is not limited to the previously described embodiments.
- the object 10 may comprise a package, a layer of said package constituting in this case the first 11 and / or second layer 12 of the object 10.
- the object 10 comprises a substrate provided with a background printing and possibly personalization information may comprise random elements.
- the position of the packaging with respect to the background printing, or even the personalization information is given with a certain tolerance, and therefore with a hazard, for the mechanical reasons mentioned above. before.
- This embodiment is particularly advantageous for the securing of sensitive products, for example for pharmaceutical products, for example drugs, packaged in a pre-printed box, then personalized with a lot number and a date (of manufacture, expiry, consumption etc); a box on which a hologram can then be applied in the form of a transparent self-adhesive label before digitally acquiring the graphic signature at the end of the packaging line.
- sensitive products for example for pharmaceutical products, for example drugs, packaged in a pre-printed box, then personalized with a lot number and a date (of manufacture, expiry, consumption etc); a box on which a hologram can then be applied in the form of a transparent self-adhesive label before digitally acquiring the graphic signature at the end of the packaging line.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Credit Cards Or The Like (AREA)
- Image Generation (AREA)
- Materials For Medical Uses (AREA)
Abstract
Description
Claims
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EA201290661A EA025707B1 (ru) | 2010-01-18 | 2010-12-20 | Способ повышения защищенности официального документа или этикетки и указанные официальный документ и этикетка |
| PL10809300T PL2526531T3 (pl) | 2010-01-18 | 2010-12-20 | Sposób zabezpieczania obiektu i odpowiedni obiekt |
| EP10809300.6A EP2526531B1 (fr) | 2010-01-18 | 2010-12-20 | Procede de securisation d'un objet et objet correspondant |
| UAA201209960A UA106785C2 (uk) | 2010-01-18 | 2010-12-20 | Спосіб зробити об'єкт безпечним і відповідний об'єкт |
| ES10809300.6T ES2548328T3 (es) | 2010-01-18 | 2010-12-20 | Procedimiento de protección de un objeto y objeto correspondiente |
| US13/522,796 US10290167B2 (en) | 2010-01-18 | 2010-12-20 | Method for making an object secure, and corresponding object |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR1000176 | 2010-01-18 | ||
| FR1000176A FR2955288B1 (fr) | 2010-01-18 | 2010-01-18 | Procede de securisation d'un objet, et objet correspondant |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2011086275A1 true WO2011086275A1 (fr) | 2011-07-21 |
Family
ID=42309671
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/FR2010/052822 Ceased WO2011086275A1 (fr) | 2010-01-18 | 2010-12-20 | Procede de securisation d'un objet et objet correspondant |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US10290167B2 (fr) |
| EP (1) | EP2526531B1 (fr) |
| EA (1) | EA025707B1 (fr) |
| ES (1) | ES2548328T3 (fr) |
| FR (1) | FR2955288B1 (fr) |
| PL (1) | PL2526531T3 (fr) |
| UA (1) | UA106785C2 (fr) |
| WO (1) | WO2011086275A1 (fr) |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8856044B1 (en) | 2013-03-23 | 2014-10-07 | Jeffrey Drazan | Segmented access of remotely stored biographical data to a client device |
| BR112017017518A2 (pt) | 2015-02-19 | 2018-04-17 | Troy Group Inc | sistema de registro de documento seguro encoberto |
| ES2931458T3 (es) * | 2015-03-17 | 2022-12-29 | Agfa Offset Bv | Procedimiento de generación de motivos de seguridad |
| US20190138778A1 (en) * | 2016-03-11 | 2019-05-09 | Bilcare Limited | A system for product authentication and method thereof |
| CA3023598C (fr) | 2016-06-10 | 2024-04-02 | Sicpa Holding Sa | Procede, dispositif d'imagerie et systeme servant a generer une mesure d'authenticite d'un objet |
| FR3058541B1 (fr) | 2016-11-09 | 2018-11-23 | Surys | Procede pour l’authentification d’une illustration. |
| US11042792B2 (en) | 2017-07-24 | 2021-06-22 | Surys | Methods for encoding a source color illustration, for authenticating an illustration, and related computer media |
| EP3557457A1 (fr) * | 2018-04-19 | 2019-10-23 | Thales Dis France SA | Procédé pour authentifier un document sécurisé |
| US10783374B2 (en) * | 2019-01-11 | 2020-09-22 | Motor Trend Group, LLC | Vehicle identification system and method |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004089649A2 (fr) * | 2003-04-07 | 2004-10-21 | Ivy Trust | Moyen d'identification |
| WO2005010814A1 (fr) * | 2003-06-25 | 2005-02-03 | Tbs Holding Ag | Document non falsifiable et son procede d'obtention |
| WO2006053685A2 (fr) * | 2004-11-18 | 2006-05-26 | Giesecke & Devrient Gmbh | Documents de valeur, production et verification de documents de valeur |
| FR2890666A1 (fr) * | 2005-09-15 | 2007-03-16 | Arjowiggins Security Soc Par A | Structure comportant un substrat en matiere fibreuse et procede pour authentifier et/ou identifier une telle structure. |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5841886A (en) * | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
| US7676059B2 (en) * | 1994-10-21 | 2010-03-09 | Digimarc Corporation | Video steganography or encoding |
| US20090097695A9 (en) * | 1995-05-08 | 2009-04-16 | Rhoads Geoffrey B | Personal document authentication system using watermarking |
| DE19649874A1 (de) * | 1996-12-02 | 1998-06-04 | Giesecke & Devrient Gmbh | Wertdokument |
| US20050160271A9 (en) * | 1998-11-19 | 2005-07-21 | Brundage Trent J. | Identification document and related methods |
| FR2839917B1 (fr) * | 2002-05-22 | 2004-10-08 | Arjo Wiggins | Article forme a partir d'au moins un jet de matiere fibreuse comportant au moins une zone d'epaisseur nulle et procede de fabrication dudit article |
| US7212209B2 (en) * | 2004-03-03 | 2007-05-01 | Barbara Lehman | System and method of representing personal profile in symmetrical graphical form |
| US8179412B2 (en) * | 2009-08-19 | 2012-05-15 | Eastman Kodak Company | Merging image pixels based on main-scan misalignment |
| DE102010034793A1 (de) * | 2010-08-18 | 2012-02-23 | Hologram Industries Research Gmbh | Dokument mit Hologramm und Verfahren zu dessen Herstellung |
-
2010
- 2010-01-18 FR FR1000176A patent/FR2955288B1/fr not_active Expired - Fee Related
- 2010-12-20 UA UAA201209960A patent/UA106785C2/uk unknown
- 2010-12-20 ES ES10809300.6T patent/ES2548328T3/es active Active
- 2010-12-20 PL PL10809300T patent/PL2526531T3/pl unknown
- 2010-12-20 EA EA201290661A patent/EA025707B1/ru active IP Right Revival
- 2010-12-20 US US13/522,796 patent/US10290167B2/en active Active
- 2010-12-20 EP EP10809300.6A patent/EP2526531B1/fr active Active
- 2010-12-20 WO PCT/FR2010/052822 patent/WO2011086275A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004089649A2 (fr) * | 2003-04-07 | 2004-10-21 | Ivy Trust | Moyen d'identification |
| WO2005010814A1 (fr) * | 2003-06-25 | 2005-02-03 | Tbs Holding Ag | Document non falsifiable et son procede d'obtention |
| WO2006053685A2 (fr) * | 2004-11-18 | 2006-05-26 | Giesecke & Devrient Gmbh | Documents de valeur, production et verification de documents de valeur |
| FR2890666A1 (fr) * | 2005-09-15 | 2007-03-16 | Arjowiggins Security Soc Par A | Structure comportant un substrat en matiere fibreuse et procede pour authentifier et/ou identifier une telle structure. |
Also Published As
| Publication number | Publication date |
|---|---|
| FR2955288B1 (fr) | 2013-05-10 |
| EA025707B1 (ru) | 2017-01-30 |
| US20130002713A1 (en) | 2013-01-03 |
| EP2526531A1 (fr) | 2012-11-28 |
| FR2955288A1 (fr) | 2011-07-22 |
| EA201290661A1 (ru) | 2013-01-30 |
| US10290167B2 (en) | 2019-05-14 |
| EP2526531B1 (fr) | 2015-06-03 |
| UA106785C2 (uk) | 2014-10-10 |
| ES2548328T3 (es) | 2015-10-15 |
| PL2526531T3 (pl) | 2015-11-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2526531B1 (fr) | Procede de securisation d'un objet et objet correspondant | |
| EP2294558B1 (fr) | Procédé et dispositif d'identification d'une plaque d'impression d'un document | |
| FR2973137A1 (fr) | Procede et systeme d'authentification d'un document securise | |
| EP2780865B1 (fr) | Motif de codage d'une information numérique sur une surface et procédés de marquage et de lecture | |
| EP1716520A2 (fr) | UTILISATION D UNE SIGNATURE NUMERIQUE OBTENUE A PARTIR D&apo s;AU MOINS UNE CARACTERISTIQUE STRUCTURELLE D UN ELEMENT MAT ERIEL POUR PROTEGER DE LA LECTURE DIRECTE DES INFORMATIONS SENSIBLES ET PROCEDE DE LECTURE DE CES INFORMATIONS PROTEGEES | |
| EP3380987B1 (fr) | Procede d'authentification et/ou de controle d'integrite d'un sujet | |
| EP2150923A2 (fr) | Procède et dispositif de sécurisation de documents | |
| EP2619714A1 (fr) | Motif d'identification bidimensionnel, article comprenant un tel motif et procedes de marquage et d'identification d'un tel motif. | |
| EP3382605A1 (fr) | Procédé d'analyse d'un document structuré susceptible d'être déformé | |
| CA3024562A1 (fr) | Procede d'authentification augmentee d'un sujet materiel | |
| EP2489016B1 (fr) | Procédé et dispositif de controle d'un document sécurisé | |
| EP3210166B1 (fr) | Procede de comparaison d'images numeriques | |
| EP4355581B1 (fr) | Formation d'une image 3d a partir d'une structure lenticulaire | |
| EP3362947B1 (fr) | Procédé de sécurisation d'un code-barres 2d | |
| FR3111726A1 (fr) | procédé d’authentification d’un élément optiquement variable. | |
| WO2013156728A1 (fr) | Dispositif de securite et document identitaire | |
| WO2020025790A1 (fr) | Procede de securisation d'une bouteille et verification de la bouteille. | |
| EP2073175A1 (fr) | Support d'identification sécurisé et procédé de sécurisation d'un tel support | |
| WO2018142054A1 (fr) | Procede de verification de l'authenticite d'un produit sensible. | |
| WO2024104674A1 (fr) | Document de sécurité comprenant un motif de sous-pixels | |
| FR3017971A1 (fr) | Procede de controle de l'authenticite d'un produit contenu dans un emballage | |
| WO2023020795A1 (fr) | Procédé de personnalisation d'un dispositif de sécurité, dispositif de securite personnalise, document d'identite comportant un tel dispositif, et procéde d'authentifiction d'un tel dispositif | |
| WO2018065381A1 (fr) | Procede de lecture d'une serie de codes-barres bidimensionnels disposes sur un support, produit programme d'ordinateur et dispositif de lecture associes | |
| FR3054057A1 (fr) | Procede d'authentification augmentee d'un sujet materiel |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10809300 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2010809300 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 201290661 Country of ref document: EA |
|
| WWE | Wipo information: entry into national phase |
Ref document number: A201209960 Country of ref document: UA |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 13522796 Country of ref document: US |