EP3528216A1 - Document having a security element and related method - Google Patents
Document having a security element and related method Download PDFInfo
- Publication number
- EP3528216A1 EP3528216A1 EP19157723.8A EP19157723A EP3528216A1 EP 3528216 A1 EP3528216 A1 EP 3528216A1 EP 19157723 A EP19157723 A EP 19157723A EP 3528216 A1 EP3528216 A1 EP 3528216A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- document
- layers
- authentication data
- layer
- security element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 40
- 230000002452 interceptive effect Effects 0.000 claims abstract description 49
- 230000005855 radiation Effects 0.000 claims description 25
- 239000000463 material Substances 0.000 claims description 17
- 238000004519 manufacturing process Methods 0.000 claims description 14
- 230000008878 coupling Effects 0.000 claims description 10
- 238000010168 coupling process Methods 0.000 claims description 10
- 238000005859 coupling reaction Methods 0.000 claims description 10
- 239000011248 coating agent Substances 0.000 claims description 9
- 238000000576 coating method Methods 0.000 claims description 9
- 238000010147 laser engraving Methods 0.000 claims description 6
- 230000003287 optical effect Effects 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 6
- 239000010409 thin film Substances 0.000 claims description 6
- 229910052751 metal Inorganic materials 0.000 claims description 5
- 229910044991 metal oxide Inorganic materials 0.000 claims description 5
- 150000004706 metal oxides Chemical class 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 239000012780 transparent material Substances 0.000 claims description 4
- 238000004070 electrodeposition Methods 0.000 claims description 3
- 230000005670 electromagnetic radiation Effects 0.000 claims description 3
- 238000001704 evaporation Methods 0.000 claims description 3
- 230000008020 evaporation Effects 0.000 claims description 3
- 239000002184 metal Substances 0.000 claims description 3
- 150000002739 metals Chemical class 0.000 claims description 3
- 239000000049 pigment Substances 0.000 claims description 3
- 238000004544 sputter deposition Methods 0.000 claims description 3
- 238000001429 visible spectrum Methods 0.000 claims description 3
- 238000000608 laser ablation Methods 0.000 claims description 2
- 230000010287 polarization Effects 0.000 claims description 2
- 238000000354 decomposition reaction Methods 0.000 description 9
- 238000012795 verification Methods 0.000 description 8
- 230000000670 limiting effect Effects 0.000 description 7
- 238000001514 detection method Methods 0.000 description 6
- 239000000654 additive Substances 0.000 description 3
- 230000000996 additive effect Effects 0.000 description 3
- 238000011088 calibration curve Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 238000005192 partition Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 241001589086 Bellapiscis medius Species 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 238000003786 synthesis reaction Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 230000002238 attenuated effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005094 computer simulation Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/45—Associating two or more layers
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/328—Diffraction gratings; Holograms
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/207—Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
- G09F2003/0276—Safety features, e.g. colour, prominent part, logo
Definitions
- the present invention refers to a document apt to identify with certainty the holder and/or to allow a verification of the authenticity of the document itself.
- the document may be made, for example, in the form of book, card or banknote.
- the latter is preferably of the type in accordance with the standard ICAO 9303 (ISO 7810:2003).
- the document is of the type having a customized security element that bears data selectively detectable by visual observation or by means of measurement or visual instruments.
- US2008/0106091 discloses a security document provided with two optical elements, each of which is placed at a respective transparent window. At the moment of verification, the two transparent windows are superimposed one on the other, folding the document, and the two optical elements so superimposed produce an identification combination.
- WO2017/092865 discloses a security element designed such as to show a first colour visually perceptible if observed in reflected light and a second colour visually perceptible if observed in transmitted light.
- WO2016015130 declares an authentication document provided with a transparent window and of a security element at the latter.
- the security element comprises an authentication data comprising two components reported respectively on the front and on the rear of the document and a register between them, in such a way that a visual inspection of the document allows to verify the integrity of the information.
- WO 2011/020537 declares an identification document and the corresponding manufacture method, provided with an authentication element comprising two superimposed pictures.
- EP 2 559 563 A1 declares how to realize a security document with a semitransparent intermediate layer bearing portions of an authentication data that is reassembled if observed in transmitted light.
- the structure of the security element from the known solutions doesn't achieve a satisfying compromise between an adequate sophistication of security criteria and a simplicity in manufacturing techniques and/or document verification.
- the reachable level of security is exclusively limited to protection/verification of the document authenticity, without the possibility to protect/verify even the authenticity of customized sensitive data associated and/or present thereon.
- the performance of the security element of the known documents can be improved in terms of versatility and durability of materials used both for the element itself and for the whole document, also relating to the mainly portable use of the latter.
- the technical problem posed and solved by the present invention is therefore that of providing a document provided with a security element, which allows to overcome one or more drawbacks above mentioned referring to the prior art.
- the invention also refers to a method of making and verifying the authenticity of above said document according to claim 22 and 27, respectively.
- the term "document” is to be intended in its broadest sense to include both recognition documents that bear data, for example, to prove the identity of the holder or to allow an authentication of the latter, either banknotes or, more generally, payment devices, without limitation either to the type of material used or to the format of the document itself.
- authentication means for proving the origin of the document and/or of identifying the author/holder to which the document is assigned.
- the document according to the invention provides a support element, or support, which incorporates a security element.
- the latter comprises a plurality of superimposed layers that define two opposite faces of the security element.
- two or more of such layers bear a corresponding component of an authentication data associated or associable with the support.
- Such components are arranged according to a position of mutual register between each other.
- the above said plurality of layers comprises at least one layer, which will be recalled as inferring layer, which indeed interfere with an electromagnetic wave that passes therethrough.
- the interfering layer is configured in such a way that the components are all simultaneously detectable to form, or to compose, the authentication data exclusively when observed, or irradiated, from a same observation direction relating to only one of the opposite faces of the security element. In such observation, or irradiation, condition the security element allows to verify the congruity of the authentication data with a reference data.
- the interfering layer is interposed between two of the components of the authentication data and/or between two layers each bearing a respective component of the authentication data.
- the detection - in its entirely - of the authentication data is exclusively feasible from a single observation direction of the document which - as it will clearly appear from the description below - relates to transmitted radiation.
- the authentication data is reconstructed thanks to the position of mutual register of the above-mentioned components.
- the document is therefore hardly adjustable or unduly alterable, for example for the purpose of sabotage or tampering, providing a high level of inviolability of the structural integrity of the security element.
- the document according to the invention is customizable in such a way that the authentication data contained in the security element coincides with one (or more) reference data, for example arranged on the support element.
- This solution is particularly advantageous as it is possible to associate a reference data uniquely assigned to the document - such as for example a serial number, the reproduction of a face, personal data of the sensitive holder or information of the equivalent type - to the authentication data present in the security element. In this way, it is possible to provide an instrument that certifies both the authenticity of the document itself and the authenticity of sensitive information associated therewith.
- the document of the invention is easy to be manufactured and easy to be operated during verification.
- the components wherein the authentication data is decomposed are recorded on a corresponding layer of the security element according to a calibration function that allows to observe, or detect, the authentication data formed by two or more components having substantially the same intensity, in this way reducing possible uncertainties associated with the document verification operations.
- the security element has high durability.
- a document according to a preferred embodiment of the invention is overall denoted by the numerical reference 1.
- the document 1 is a document made, for example, in form of book or card, and yet more preferably is of the type pursuant to the standard ICAO 9303 (ISO 7810:2003).
- inventive concept of the present invention may be, for example, related to a document provided with pages, suitable for constituting different types of passports with a booklet of existing formats, but at the same time also applicable to a banknote.
- the document is structurally defined by, or comprising of, a support 100 and is equipped with a security element 101 integrated in, or jointed to, the support itself.
- the security element 101 comprises a plurality of layers respectively denoted by the references 10, 11 and 20, and defining a first external layer, an intermediate layer and a second external layer, respectively.
- the security element 101 is integrated within the support 100 so that the overall configuration of the document 1 is as such as to define two planar dimensions predominant compared to a third one, with reference to three axes x, y and z mutually orthogonal to each other.
- the support 100 and the security element 101 jointed thereto define a document in a card format.
- the layers 10, 11 and 20 have same form and extension on card plane (x-y plane) and are superimposed along the direction parallel to the axis z which defines the thickness of the card and of the security element 101.
- the two external layers 10 and 20 define two opposite faces, respectively A and B, of the security element 101 same.
- each of the two opposite faces A and B of the security element 101 corresponds to a respective opposite face of the support 100.
- the thickness of the security element 101 defined by the layers 10, 11 and 20 is substantially equal to the overall thickness of the support 100.
- the opposite faces A and B of the security element 101 and the respective opposite faces of the support 100 jointly determine two opposite sides of the document 1 substantially without discontinuity.
- the security element 101 is illustrated as having a perimetral profile defined by a closed curve, in particular oval, which borders a region with at least one symmetry axis inside thereof.
- the plurality of layers 10, 11, 20 overall bears an authentication data denoted by the way of example by the abbreviation "OK", which comprises, i.e. is partitioned into, two or more components.
- OK an authentication data denoted by the way of example by the abbreviation "OK"
- two components denoted by or and K are provided.
- the OK authentication data is intended to further be associated (or associable) to a reference data, i.e. a variable information, encodable or encoded, as for example a serial number, OCR codes, one-dimensional codes, two-dimensional codes, face reproduction, personal information of the holder of the document 1, or sensitive information of equivalent type.
- a reference data i.e. a variable information, encodable or encoded, as for example a serial number, OCR codes, one-dimensional codes, two-dimensional codes, face reproduction, personal information of the holder of the document 1, or sensitive information of equivalent type.
- Such OK authentication data is encoded within the document 1 by the security element 101.
- the support 100 bears the reference data.
- the reference data may otherwise be contained in remote devices functionally connected to or associable with (for example by wireless connections) the document 1.
- Each of said two or more components indicates instead a respective portion wherein the OK authentication data has been decomposed.
- the OK authentication data results to be complete, and thence consistent to the information expressed by the reference data, only when detectable as composed by all components that has been partitioned into.
- the authentication data is overall contained within the plurality of layers of the security element 101, and, as mentioned, each of said layers bears a corresponding component.
- an authentication data capable of being partitioned into a greater or minor number of components with respect to the number of layers that composes the security element 101 and/or provides more than one component for a same layer.
- the OK authentication data has been partitioned into two components O, K and the security element 101 comprises the three superimposed layers 10, 11, 20.
- the three layers 10, 11 and 20 are preferably contiguous and bound together.
- coupling means are provided, configured to stably bind together the several layers that compose the plurality of layers of the security element 101.
- the intermediate layer 11 is interposed between the first external layer 10 and the second external layer 20, in particular an interfering layer that acts on the electromagnetic wave R which passes through the security element 101, as illustrated hereinafter.
- the components O, K are respectively contained by the first layer 10 and by the second layer 20 according to one their relating position of mutual register.
- the two layers which bear the components of the authentication data can be later referred as "principal layers" for the sole purpose of identifying them.
- the relative position of mutual register for the components indicates a relative alignment (as a non-limiting example, of spatial or frequency type) between the components such that a superimposition (again as a non-limiting example, of spatial type) of the latter according to a selective direction, or verse, of observation allows to rebuild correctly and completely the authentication data.
- the coupling means previously mentioned gives the structure of the security element 101 more effectiveness and makes a - rigid - constraint among the layers that allows to keep the components in register, even when the document 1 is subjected to stress that makes it, for example, bend.
- the relative position of the intermediate layer 11 with respect to the first layer 10 and the second layer 20 allows to define which are the layers associated to said "A Side” or "B Side” of the document 1, depending on the direction according to which the electromagnetic wave R incise and crosses the security element 101.
- Each of said "A Side” and “B Side” of the document 1 can be associated, thence, even to observation direction, incidence or irradiation thereof, to which reference will be made by the term “in reflected radiation” or “in transmitted radiation” depending on the interaction between the interfering layer 11 and the electromagnetic wave R.
- layers or surfaces of certain materials - often denoted by thin-film when their thickness is typically comparable to the wavelength of the incident radiation - have the properties of reflecting, transmitting and/or selectively absorbing an electromagnetic radiation that invests it, depending on its frequency and/or of the structural and chemical properties of the material.
- reflected components of the radiation can be, for example, eliminated or totally reflected; it's possible to divide or combine radiations of different wavelengths or with different directions and more.
- observation direction in transmitted radiation is associated with the radiation coming from the B Side of the document 1, in the current example.
- an observation direction, or verse, "in reflected radiation” is established when the latter is observed from the same face whereon the security element 101 is hit by the electromagnetic wave R.
- Such observation direction in reflected radiation is then associated with the radiation coming from the A Side of the document 1, still in the current example.
- the interfering layer 11 is therefore configured in such a way that the two components O and K are both detectable to form the OK authentication data exclusively from an observation direction, in particular the observation direction in transmitted radiation, relating to one only - the B Side, in this example - of the two opposite faces of the document 1, and more in general of the security element 101 incorporated therein.
- the interfering layer 11 partitions the electromagnetic wave R affecting the security element 101 into at least one transmitted component Rt associated with first wavelengths and into at least one reflected component R r associated with second wavelengths, as illustrated in Fig. 1B .
- the reflected component R r of the wave R conveys the first component O of the OK authentication data contained by the first layer 10.
- the reflected component Rr of the wave R involves an attenuated intensity of the signal associated with the first component O, contained by the first layer 10, with respect to the intensity of the signal associated with the second component K, coming from the second layer 20.
- the calibration process of this example provides the image of figure 5A to be decomposed into two components, respectively shown in Figures 5B and 5C . It is to be noted that this example refers to a decomposition into components which makes use of a pattern 72 shown in figure 7 , associated with a specific example of one of the preferred decomposition mode of the authentication data, that will be after illustrated more in detail.
- the two components of the greyscale image are thus transferred (o recorded) on a first layer 10 and on a second layer 20 of a security element devoid of the interfering layer 11 (step 740), and that will be used as a reference element for the calibration process.
- the same components are also transferred (or recorded) on a first layer 10 and on a second layer 20 of a second security element 101 instead provided with an interfering layer 11 (step 750).
- Said calibration curve is a function that takes into account the properties of the plurality of layers that compose the security element (for example, radiometric - or photometric - properties, such as thickness or material of the involved layers) and the information recording process, which, preferably making advantage of algorithms of the type disclosed by [1], [2], [3] and here incorporated by these references, allows to define the specific transfer modes of each component in the corresponding layers, in order for them to have intensity substantially equal when observed, or detected, from the observation direction in transmitted radiation.
- the properties of the plurality of layers that compose the security element for example, radiometric - or photometric - properties, such as thickness or material of the involved layers
- the information recording process which, preferably making advantage of algorithms of the type disclosed by [1], [2], [3] and here incorporated by these references, allows to define the specific transfer modes of each component in the corresponding layers, in order for them to have intensity substantially equal when observed, or detected, from the observation direction in transmitted radiation.
- the OK authentication data matches one or more reference data prepared on the support 100.
- the security element 101 although is preferably configured to allow a selective transparency to an electromagnetic wave within the visible spectrum, in alternative embodiments is configured to operate even with electromagnetic waves whose characteristics lay outside said wavelengths (or frequency) range.
- the layers bearing the components wherein the authentication data has been decomposed may be made of materials suitable to be customized (or encoded).
- the layers opposite to the interfering layer are preferably made of a plastic material transparent to visible radiation.
- the phase of the layers bearing the components of the authentication data provides a recording of the latter in a corresponding layer by means of "additive” techniques, such as for example printing techniques, in particular inkjet, laser engraving or the like, and/or “subtractive” techniques, such as for example laser ablation techniques or analogous techniques, even combined together.
- additive such as for example printing techniques, in particular inkjet, laser engraving or the like
- subtractive such as for example laser ablation techniques or analogous techniques
- the above-mentioned components of the authentication data are in the form of polarizable coating, in such a way that the authentication data detectable is a variable content data as a function of the polarization type obtained on said polarizable coating.
- the components are in the form of photo-activatable pigments and may be contained in a corresponding layer, for example at a their thickness d and/or at a their interface surface S, as shown in figure 1B .
- interface surface intends to denote a discontinuity zone, for example between two layers of the security element 101 that are identical but distinguished or between layers contiguous but qualitatively different.
- the security element 101 even the interfering layer itself may bear a component of the authentication data. For this reason, in embodiments is enough for the security element 101 to be provided with at least two layers superimposed, each bearing a respective component of the authentication data.
- the interfering layer 11 is preferably realized as a coating of the interface surface S of the layer 10 and/or layer 20.
- such coating is of the thin-film type, preferably comprising metallic elements, metal oxides or other materials having similar properties.
- the thin-fil type indicates that the coating thickness is substantially comparable to the wavelength of the incident radiation thereon, in particular - in case of document providing a detection within the visible radiation, such thickness may be comprised between 20 and 500 nm.
- Multiple interfering layers may also be provided in a same security element.
- the interfering layer is obtained by one or more deposition techniques, such as electrodeposition, sputtering, evaporation of metals or of metal oxides.
- a preferred configuration of the document 1 is illustrated, in two separate phases of the production process, and provides a security element 101 comprising three superimposed layers, preferably made of plastic transparent material, and denoted by the references 30, 40 and 50.
- the intermediate layer 40 among said three layers is coated on each of its interface surfaces S by a corresponding interfering layer 41, 42, preferably in the form of thin-film.
- the optical density of the interfering layers 41 and 42 is comprised in the range 0.1 - 0.5.
- each of said two interfering layers 41, 42 will be provided with a respective component of the two components O, K wherein an OK authentication data has been decomposed.
- phase means of the layers which, preferably through one of the previously mentioned techniques and according to the register positioning mode already described, performs the recording of a first component on (or in) the interfering layer 41 and the recording of a second component K on (or in) the interfering layer 42, as indicated in Fig. 3 .
- the intermediate layer 40 provided with the interfering layers 41, 42 containing the components O, K, and the remaining two layers 30, 50 are subsequently coupled together, preferably in such a way as to be contiguous and then rigidly bound - as visible in figure 3A - so as to ensure, at least during a verify phase of the document, the detection in perfect register of said two components O, K with each other.
- FIG 4A is illustrated a further embodiment wherein the security element 101 comprises, similarly to the preceding example, three superimposed layers 30, 40 50.
- the intermediate layer 40 among said three layers is coated on only one of the interface surfaces S by an interfering layer 41, preferably in the form of thin-film.
- An authentication data F is decomposed into three components F1, F2, F3, and two of said three components - F1 and F2 - are respectively recorded on the interface surface Si of the interfering layer 41 and on the interface surface Sm of the intermediate layer 40, preferably though the above-mentioned additive techniques.
- the remaining component F3 is instead recorded on the thickness of the intermediate layer 40, preferably through the laser engraving technique.
- FIG 4B provides a security element 101 similar to that illustrated in figure 4A , which differs only due to a different distribution on the three components F1, F2, F3 wherein the authentication data F has been partitioned.
- the second component F2 is recorded on the interface surface of the interfering layer 41 while the first F1 and the third F3 component are recorded (for example, through laser engraving) in the thickness of a respective 30, 50 external layers of the three layers 30, 40, 50 of the security element 101.
- this configuration provides the interfering layer 41 to be provided with the respective component F2 prior to the coupling with the remaining layers 30, 40. Subsequently to said coupling, the remaining layers 30, 40 are provided with the respective components F1, F3.
- such components are obtained by digitally processing the authentication data and, in this way, each of the algorithms disclosed, due to its specificity, better fit to a certain type of information (for example, alphanumeric characters, photographs, portraits, alphanumeric strings or other).
- the procedure (shown below) of decomposing the authentication data into components is preferably used when the latter relates to images which depict a face 71 or alpha-numerical codes 81.
- the authentication data is partitioned preferably into two components, following a predetermined pattern 70 using the aid of algorithms, for example filtering algorithms, preferably of the type disclosed in [4], here incorporated by this reference.
- Said pattern is generated as a theme or recurring scheme 72, 82, preferably as a monochromatic bitmap file, in a regular and balanced way, multiplying and adding them to each other, according to a regular and ordered grid, identical basic modules (for example, composed of elementary geometric figures), pursuant to the translational symmetry rules (for example, operating vertical and horizontal translation).
- a theme or recurring scheme 72, 82 preferably as a monochromatic bitmap file, in a regular and balanced way, multiplying and adding them to each other, according to a regular and ordered grid, identical basic modules (for example, composed of elementary geometric figures), pursuant to the translational symmetry rules (for example, operating vertical and horizontal translation).
- each component (the components illustrated by the references 73, 74 when referring to the portrait 71, the components illustrated by the references 83, 84 when referring to the alpha-numerical code 81) is respectively generated using the portion of the authentication data corresponding to the white and the black ones of the pattern 72, 82.
- the authentication data 91 is decomposed into two components 92, 93 according to a random pattern 90, even in this case making use of algorithms within reach of those skilled in the art, preferably of the type disclosed in [4].
- the two components 92, 93 are generated respectively using the portion of the authentication data 91 corresponding to the white and the black of the pattern 90.
- the pattern 90 is generated as a non-regular theme or scheme, preferably as a monochromatic bitmap file, juxtaposing, according to a disorderly and irregular grid, basic modules different one from each other, preferably following the randomness of a pseudo-random number generator [5], here incorporated by this reference.
- Such decomposition method is preferably recommended for treatment of photos/images, as illustrated in figure 9 .
- the authentication data 101, 111 is a string, preferably alpha-numerical string, whose elements are sorted following a specific criterion.
- the elements of the string comprise alphabetic characters, and the authentication data is partitioned into two components. In a first case, the components are denoted by the references 102, 103 and in a second case the components are denoted by the references 112, 113.
- the elements of the string of each component are regularly distributed among the two components 102, 103, whilst in the second case ( Figure 11 ) said elements are randomly distributed among the two components 112, 113, being compliant with the relative position of said sorting criterion among the elements.
- the authentication data for example an image
- the authentication data is partitioned into more than two components, preferably in three components, and wherein an interfering layer 11, 41, 42 bears at least one of said components.
- the partition into three components is compliant with, for example, the following criterion:
- the three components can be obtained considering their decomposition in compliance with, for example, models based on principles of additive synthesis (RGB) or subtractive synthesis (YMC).
- RGB additive synthesis
- YMC subtractive synthesis
- the method can be partitioned into two main phases.
- a preliminary phase overall denoted in the chart by the reference 127, of making the security element 101 and a phase subsequent to the latter with the authentication data.
- the security element 101 is firstly necessary to provide a first layer 20 of material, preferably a plastic transparent material and comprising photo-activatable pigments.
- the first layer 20 of the security element 101 is preferably a material having properties such as to be customized through laser engraving techniques.
- an interfering layer 11 On an interface surface S of said first layer 20 is thus laid an interfering layer 11, preferably a thin-film, for example through one of the previously disclosed techniques (electrodeposition, sputtering or evaporation of metals or metal oxides).
- the first layer 20 provided with the interfering layer 11 is coupled to a second layer 10, preferably in plastic transparent material.
- the overall configuration of the three layers 10, 11, 20 is such that the interfering layer 11 is interposed between the first 20 and the second layer 10 and that, preferably, said three layers are contiguous and bound together, by coupling means suitable for the purpose.
- the interfering layer has the property to be selectively transparent to an electromagnetic wave R which passes through the security element 101, in the described example preferably a wave within the visible spectrum.
- the security element 101 should be now customized con the authentication data.
- the authentication data relates to an image depicting the holder of the document 1. It is, however, clear that is possible to associate other types of information to the authentication data.
- the customization phase provides the step 120 of an initial digitally providing of said image, in such a way that the latter can be processed.
- the authentication data is a graphic format image 91, i.e. a digital data in a format that expresses an information intelligible for the human eye.
- a graphic format image 91 i.e. a digital data in a format that expresses an information intelligible for the human eye.
- an image may be downloaded from an image database 128, or even be digitally generated according to any modes available for those skilled in art and which, already known, will be no longer discussed.
- a coding algorithm is selected for the authentication data, preferably pursuant to one of the methods (a, b, c, d) above disclosed.
- the algorithm allows to partition the authentication data into more components and, in the current example, the algorithm which predicts the use of random grids will be taken into account.
- a random pattern 90 is thus generated, at step 122, and preferably starting from a same theme/scheme for each document, choosing as a random generation seed a characteristic element of the document to be produced, as for example the number of the card itself.
- a first component 92 containing the sole portions of the image corresponding to the white of the pattern is generated, referring to step 124a.
- a second component 93 containing the sole portions of the image corresponding to the black of the pattern will be generated (step 124b).
- a calibration of the intensity of the components is performed (as indicated at step 129), calculating a calibration curve to define the specific transfer modes of each component in the respective layers of the security element, in order for them to have intensity almost equal when detected from the observation direction in transmitted radiation of the security element.
- the two components 92, 93 thus obtained are associated 125 to two separate layers of the security element 101.
- the first layer 20 bears the first component 92 and the second layer 10 bears the second component 93, according to a position of mutual register.
- the two components 92, 93 are recorded in the thickness of a respective layer 20, 10 through laser engraving techniques.
- the document 1, and advantageously the support 100 is further customized by reference data of the card holder, such as, for example, the same image 91 used as authentication data.
- the document 1 is thus ready to be used.
- an electromagnetic wave R investing the document 1 is provided.
- the security element 101 is thence observed 130 in reflected radiation, to detect the authentication data from one or both its opposite faces A, B.
- the security element 101 is thence observed 131 in transmitted radiation to detect the authentication data in a complete form.
- the completely detected authentication data is then compared 132 to a reference data. Their congruity is therefore verified and, in positive case 133, the document 1 results to be true. On the contrary, the document is counterfeit.
- the reference data is prepared on the document 1 itself, preferably on the support 100, in such a way that the congruity of the latter to the authentication data allows to verify both the authenticity of document 1 itself and the authenticity of the sensitive information associated therewith.
- the document 1 may even provide additional security elements that allow (any) congruity verifications 134 in addition to those associated with the authentication data according to the method previously disclosed.
Landscapes
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Engineering & Computer Science (AREA)
- Toxicology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Manufacturing & Machinery (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Credit Cards Or The Like (AREA)
- Document Processing Apparatus (AREA)
Abstract
Description
- The present invention refers to a document apt to identify with certainty the holder and/or to allow a verification of the authenticity of the document itself. The document may be made, for example, in the form of book, card or banknote.
- In case of identity document, the latter is preferably of the type in accordance with the standard ICAO 9303 (ISO 7810:2003).
- In particular, the document is of the type having a customized security element that bears data selectively detectable by visual observation or by means of measurement or visual instruments.
- On the market, several types of documents are available, such as for example banknotes, recognition documents, passports or the like, that bear one or more portions made in such a way as to be transparent to light (whether widespread or directly incident) and containing security elements capable of confirming or not the authenticity of the document itself.
- For example,
US2008/0106091 discloses a security document provided with two optical elements, each of which is placed at a respective transparent window. At the moment of verification, the two transparent windows are superimposed one on the other, folding the document, and the two optical elements so superimposed produce an identification combination. -
WO2017/092865 discloses a security element designed such as to show a first colour visually perceptible if observed in reflected light and a second colour visually perceptible if observed in transmitted light. -
WO2016015130 declares an authentication document provided with a transparent window and of a security element at the latter. The security element comprises an authentication data comprising two components reported respectively on the front and on the rear of the document and a register between them, in such a way that a visual inspection of the document allows to verify the integrity of the information. -
WO 2011/020537 declares an identification document and the corresponding manufacture method, provided with an authentication element comprising two superimposed pictures. -
EP 2 559 563 A1 - The documents of prior art above mentioned, even though making use of security elements, represent solutions perfectible regarding aspect such as reliability, ease of implementation and operation, and prevention of counterfeiting attempts.
- In particular, the structure of the security element from the known solutions doesn't achieve a satisfying compromise between an adequate sophistication of security criteria and a simplicity in manufacturing techniques and/or document verification.
- Furthermore, for most of known solutions, the reachable level of security is exclusively limited to protection/verification of the document authenticity, without the possibility to protect/verify even the authenticity of customized sensitive data associated and/or present thereon.
- In addition, the performance of the security element of the known documents can be improved in terms of versatility and durability of materials used both for the element itself and for the whole document, also relating to the mainly portable use of the latter.
- The technical problem posed and solved by the present invention is therefore that of providing a document provided with a security element, which allows to overcome one or more drawbacks above mentioned referring to the prior art.
- This problem is solved by a document according to
claim 1. The invention also refers to a method of making and verifying the authenticity of above said document according to claim 22 and 27, respectively. - Preferred features of the present invention represent the subject matter of the dependent claims.
- In this context, the term "document" is to be intended in its broadest sense to include both recognition documents that bear data, for example, to prove the identity of the holder or to allow an authentication of the latter, either banknotes or, more generally, payment devices, without limitation either to the type of material used or to the format of the document itself.
- Similarly, the terms "authentication", "identification", "recognition" or similar words are to be intended to indicate activities associated with proving the origin of the document and/or of identifying the author/holder to which the document is assigned.
- In general terms, the document according to the invention provides a support element, or support, which incorporates a security element. The latter comprises a plurality of superimposed layers that define two opposite faces of the security element. In particular, two or more of such layers bear a corresponding component of an authentication data associated or associable with the support. Such components are arranged according to a position of mutual register between each other.
- Furthermore, the above said plurality of layers comprises at least one layer, which will be recalled as inferring layer, which indeed interfere with an electromagnetic wave that passes therethrough. More in detail, the interfering layer is configured in such a way that the components are all simultaneously detectable to form, or to compose, the authentication data exclusively when observed, or irradiated, from a same observation direction relating to only one of the opposite faces of the security element. In such observation, or irradiation, condition the security element allows to verify the congruity of the authentication data with a reference data. Preferably, the interfering layer is interposed between two of the components of the authentication data and/or between two layers each bearing a respective component of the authentication data.
- Decomposing authentication data in more components to be associated to the different layers of the security element, jointly with the presence of one specific of said layers configured to be transparent selectively to an electromagnetic wave, confers high safety features to the document. In this way, thus, the detection - in its entirely - of the authentication data is exclusively feasible from a single observation direction of the document which - as it will clearly appear from the description below - relates to transmitted radiation. In this condition, the authentication data is reconstructed thanks to the position of mutual register of the above-mentioned components.
- In virtue of such a configuration, the document is therefore hardly adjustable or unduly alterable, for example for the purpose of sabotage or tampering, providing a high level of inviolability of the structural integrity of the security element.
- In a preferred embodiment, the document according to the invention is customizable in such a way that the authentication data contained in the security element coincides with one (or more) reference data, for example arranged on the support element.
- This solution is particularly advantageous as it is possible to associate a reference data uniquely assigned to the document - such as for example a serial number, the reproduction of a face, personal data of the sensitive holder or information of the equivalent type - to the authentication data present in the security element. In this way, it is possible to provide an instrument that certifies both the authenticity of the document itself and the authenticity of sensitive information associated therewith.
- Furthermore, in its embodiments, the document of the invention is easy to be manufactured and easy to be operated during verification.
- Advantageously, the components wherein the authentication data is decomposed are recorded on a corresponding layer of the security element according to a calibration function that allows to observe, or detect, the authentication data formed by two or more components having substantially the same intensity, in this way reducing possible uncertainties associated with the document verification operations.
- Moreover, in virtue of the proposed structure, the security element has high durability.
- Other advantages, characteristics and application methods of the present invention will become apparent from the following detailed description of several embodiments, presented by way of non-limiting examples.
- Reference will be made to the figures of the accompanying drawings, in which:
-
Figures 1 and 1A show a front view and an enlargement of a transversal cross-section, respectively, of a security element of a document according to the present invention according to a first embodiment; -
Figure 1B schematically illustrates, in a transversal cross-section view, the behaviour of the security element of the document of theFigures 1 and 1A in an observation or irradiation condition from a selected direction; -
Figure 2 shows a transversal cross-section view of the document ofFigure 1 ; -
Figures 2A and 2B each show, in a schematic prospective view, different observation methods of the document ofFigure 1 ; -
Figures 3 and3A each show a lateral view of the document according to the present invention according to a second embodiment, respectively in an assembling configuration and in an assembled configuration; -
Figure 4A shows a partial side exploded view of a document according to a third embodiment of the present invention; -
Figure 4B shows a partial side exploded view of a document according to a fourth embodiment of the present invention; -
Figures 5A, 5B, 5C and 5D illustrate a preferred generation method for decomposing into components an authentication data associable with the document according to the invention; -
Figures 6A and 6B each schematically illustrates a corresponding exemplary type of data verifiable by a document according to the present invention; -
Figure 7 schematically illustrates a first elaboration method of a first type of authentication data associable with the document according to the invention; -
Figure 7A and 7B each shows a corresponding flow chart of the operations relating to the elaboration method ofFigures 7 ; -
Figure 7C shows a flow chart of the operations relating to the generation method ofFigures 5A, 5B, 5C and 5D ; -
Figure 8 schematically illustrates the elaboration method illustrated byfigure 7 of a second type of authentication data associable with the document according to the invention; -
Figure 9 schematically illustrates a second elaboration of the first type of authentication data associable with the document according to the invention; -
Figure 9A shows of flow charts of the operations relating to the elaboration method ofFigure 9 ; -
Figures 10 and11 each schematically illustrates a respective variant of a third elaboration method of a third type of authentication data associable with the document according to the invention; -
Figure 12 shows a flow chart of a preferred variant of a manufacture method of an embodiment of a document according to the present invention; and -
Figure 13 shows a flow chart of a verification method of the document according to a preferred variant of execution of the the present invention. - With initial reference to
Figures 1 and2 , a document according to a preferred embodiment of the invention is overall denoted by thenumerical reference 1. Preferably, thedocument 1 is a document made, for example, in form of book or card, and yet more preferably is of the type pursuant to the standard ICAO 9303 (ISO 7810:2003). - In the reported examples in the present description, reference will be made to figures that illustrate a document in a format amenable to a card, and preferably with purpose of identification of the holder thereof. However, as already mentioned, the present invention is intended to refer to documents in general, in particular to recognition devices or payment instruments, regardless of the relating format and/or material used to make them.
- It will therefore be understood that the inventive concept of the present invention may be, for example, related to a document provided with pages, suitable for constituting different types of passports with a booklet of existing formats, but at the same time also applicable to a banknote.
- In general terms, the document is structurally defined by, or comprising of, a
support 100 and is equipped with asecurity element 101 integrated in, or jointed to, the support itself. Thesecurity element 101 comprises a plurality of layers respectively denoted by thereferences - Preferably, the
security element 101 is integrated within thesupport 100 so that the overall configuration of thedocument 1 is as such as to define two planar dimensions predominant compared to a third one, with reference to three axes x, y and z mutually orthogonal to each other. In other words, thesupport 100 and thesecurity element 101 jointed thereto define a document in a card format. Thelayers security element 101. The twoexternal layers security element 101 same. - In the example preferred embodiment hither considered, each of the two opposite faces A and B of the
security element 101 corresponds to a respective opposite face of thesupport 100. In particular, the thickness of thesecurity element 101 defined by thelayers support 100. - In this case, the opposite faces A and B of the
security element 101 and the respective opposite faces of thesupport 100 jointly determine two opposite sides of thedocument 1 substantially without discontinuity. - In the example of
Figure 1 , thesecurity element 101 is illustrated as having a perimetral profile defined by a closed curve, in particular oval, which borders a region with at least one symmetry axis inside thereof. - Obviously, different perimetral profiles (and associated dimensions) of the security element 101 - in relation to, for example, the extension of the support 100 - are possible, even depending on the type of
document 1 that the person skilled in the art intends to consider. - It is also possible to provide more than one
single security element 101 for asame document 1. - In general terms, the plurality of
layers - The OK authentication data is intended to further be associated (or associable) to a reference data, i.e. a variable information, encodable or encoded, as for example a serial number, OCR codes, one-dimensional codes, two-dimensional codes, face reproduction, personal information of the holder of the
document 1, or sensitive information of equivalent type. - Such OK authentication data is encoded within the
document 1 by thesecurity element 101. - In a particularly advantageous embodiment of
document 1, thesupport 100 bears the reference data. - In different embodiments, the reference data may otherwise be contained in remote devices functionally connected to or associable with (for example by wireless connections) the
document 1. - Each of said two or more components indicates instead a respective portion wherein the OK authentication data has been decomposed.
- Therefore, the OK authentication data results to be complete, and thence consistent to the information expressed by the reference data, only when detectable as composed by all components that has been partitioned into.
- Several possible ways, in which this authentication data is decomposed and is physically contained in the plurality of layers of the
security element 101, will be illustrated in the following description. - In any case, the authentication data is overall contained within the plurality of layers of the
security element 101, and, as mentioned, each of said layers bears a corresponding component. - It is possible to provide an authentication data capable of being partitioned into a greater or minor number of components with respect to the number of layers that composes the
security element 101 and/or provides more than one component for a same layer. - With reference to the example illustrated by Figures from 1 to 2B, as previously described, the OK authentication data has been partitioned into two components O, K and the
security element 101 comprises the threesuperimposed layers - As can be seen from the view along the a-a section of
figure 1A , the threelayers - Preferably and independently from the type of described embodiment, coupling means (not shown) are provided, configured to stably bind together the several layers that compose the plurality of layers of the
security element 101. - Referring again to the example of the above-mentioned figures, and with particular reference to
figure 1B , in this configuration theintermediate layer 11 is interposed between the firstexternal layer 10 and the secondexternal layer 20, in particular an interfering layer that acts on the electromagnetic wave R which passes through thesecurity element 101, as illustrated hereinafter. - The components O, K are respectively contained by the
first layer 10 and by thesecond layer 20 according to one their relating position of mutual register. For simplicity of disclosure, the two layers which bear the components of the authentication data can be later referred as "principal layers" for the sole purpose of identifying them. - In general, within the context of this description, the relative position of mutual register for the components indicates a relative alignment (as a non-limiting example, of spatial or frequency type) between the components such that a superimposition (again as a non-limiting example, of spatial type) of the latter according to a selective direction, or verse, of observation allows to rebuild correctly and completely the authentication data.
- The coupling means previously mentioned gives the structure of the
security element 101 more effectiveness and makes a - rigid - constraint among the layers that allows to keep the components in register, even when thedocument 1 is subjected to stress that makes it, for example, bend. - Furthermore, the relative position of the
intermediate layer 11 with respect to thefirst layer 10 and thesecond layer 20 allows to define which are the layers associated to said "A Side" or "B Side" of thedocument 1, depending on the direction according to which the electromagnetic wave R incise and crosses thesecurity element 101. - Each of said "A Side" and "B Side" of the
document 1 can be associated, thence, even to observation direction, incidence or irradiation thereof, to which reference will be made by the term "in reflected radiation" or "in transmitted radiation" depending on the interaction between the interferinglayer 11 and the electromagnetic wave R. - In the context of the present invention, it is worth to recall, for better clarity, a few known principles regarding an electromagnetic wave interacting with the surface of a material or with one or more surfaces of a layers' series of material, even if one different from each other.
- In the optical field, layers or surfaces of certain materials - often denoted by thin-film when their thickness is typically comparable to the wavelength of the incident radiation - have the properties of reflecting, transmitting and/or selectively absorbing an electromagnetic radiation that invests it, depending on its frequency and/or of the structural and chemical properties of the material.
- In virtue of such properties, reflected components of the radiation can be, for example, eliminated or totally reflected; it's possible to divide or combine radiations of different wavelengths or with different directions and more.
- The phenomena that form the basis for this reaction to the incident radiation are essentially amenable to diffraction and interference phenomena and to achieve the desired result, at least in general terms, the number of layers (and the involved thicknesses) and the materials which they are made of, must be properly taken into account.
- Without further deepening into the discussion, when an electromagnetic wave crosses one (or more) surface/layer, principally due to multiple reflection phenomena both at the interface with the surface(s) and between the interfaces of different layers whether present, an interference is generally realized either constructive or destructive in function (also) of the optical path travelled by the wave and of the spectral characteristics of the wave itself.
- Therefore, substantially depending on the type of interference obtained, the transmission of specific wavelengths and the reflection of others are selectively determined.
- Exemplary applications of the general principle above illustrated are dichroic filters, prisms, frames and analogous devices based on the same principle, in the knowledge of those skilled in the art and that will be not further depth.
- Referring again to the example of
Figures 1 to 2B , for thedocument 1 is then established an observation direction, or verse, "in transmitted radiation" when the latter is observed from the opposite face towards that whereon thesecurity element 101 is hit by the electromagnetic wave R. - Such observation direction in transmitted radiation is associated with the radiation coming from the B Side of the
document 1, in the current example. In the same way, for thedocument 1 an observation direction, or verse, "in reflected radiation" is established when the latter is observed from the same face whereon thesecurity element 101 is hit by the electromagnetic wave R. Such observation direction in reflected radiation is then associated with the radiation coming from the A Side of thedocument 1, still in the current example. - The interfering
layer 11 is therefore configured in such a way that the two components O and K are both detectable to form the OK authentication data exclusively from an observation direction, in particular the observation direction in transmitted radiation, relating to one only - the B Side, in this example - of the two opposite faces of thedocument 1, and more in general of thesecurity element 101 incorporated therein. - Specifically, the interfering
layer 11 partitions the electromagnetic wave R affecting thesecurity element 101 into at least one transmitted component Rt associated with first wavelengths and into at least one reflected component Rr associated with second wavelengths, as illustrated inFig. 1B . - Observing the
security element 101 from the A Side of thedocument 1, it is noted that the reflected component Rr of the wave R conveys the first component O of the OK authentication data contained by thefirst layer 10. - Due to the filtering effect realized by interfering
layer 11, from the same observation direction (i.e. in reflected radiation), however, it is not possible to detect the transmitted component Rt of the wave which conveys the second component K of the OK authentication data contained by thesecond layer 20. Otherwise observing thesecurity element 101 from the B Side of thedocument 1, it is noted that the transmitted component Rt of the wave R, crossing both thefirst layer 10 and thesecond layer 20, conveys along both the first component O and the second component K of the OK authentication data, contained by thefirst layer 10 and by thesecond layer 20, respectively. Therefore, the solution above described allows to verify congruity of the OK authentication data by a reference data associated therewith. - Observing in transmitted radiation, it is possible that the reflected component Rr of the wave R involves an attenuated intensity of the signal associated with the first component O, contained by the
first layer 10, with respect to the intensity of the signal associated with the second component K, coming from thesecond layer 20. - In this case, appropriate configurations of the
document 1, in particular of the first 10 and the second layer and 20, of the interferinglayer 11 and of the recording modes of the authentication data, allow to balance the intensity of the signals detected from the observation direction in transmitted radiation and associated with the two components O, K of the OK authentication data, in such a way that they have almost identical intensities. - For this purpose, exemplifying, it is hereinafter described a possible calibration process that uses a greyscale image, as shown in
figure 5A , consisting of fields with 100 levels of grey. The flow chart of the operations associated with this preferred example is shown infigure 7C . - The calibration process of this example provides the image of
figure 5A to be decomposed into two components, respectively shown inFigures 5B and 5C . It is to be noted that this example refers to a decomposition into components which makes use of apattern 72 shown infigure 7 , associated with a specific example of one of the preferred decomposition mode of the authentication data, that will be after illustrated more in detail. - The two components of the greyscale image are thus transferred (o recorded) on a
first layer 10 and on asecond layer 20 of a security element devoid of the interfering layer 11 (step 740), and that will be used as a reference element for the calibration process. The same components are also transferred (or recorded) on afirst layer 10 and on asecond layer 20 of asecond security element 101 instead provided with an interfering layer 11 (step 750). - Lightening the two safety elements during transmission, and comparing them with each other, it is possible to measure the variation of the image grey levels - as illustrated in
Figure 5D - and to use the data obtained by these measurements in order to determine a "calibration curve" (step 760). - Said calibration curve is a function that takes into account the properties of the plurality of layers that compose the security element (for example, radiometric - or photometric - properties, such as thickness or material of the involved layers) and the information recording process, which, preferably making advantage of algorithms of the type disclosed by [1], [2], [3] and here incorporated by these references, allows to define the specific transfer modes of each component in the corresponding layers, in order for them to have intensity substantially equal when observed, or detected, from the observation direction in transmitted radiation.
- As previously mentioned, advantageously, in a preferred embodiment of the
document 1, the OK authentication data matches one or more reference data prepared on thesupport 100. - By the way of example, types of authentication data, used to verify the
document 1 authenticity by comparing to a reference data reported on thesupport 100 of the latter, are provided by the examples ofFigures 6A and 6B . It will also be appreciated that, based on the characteristics of the incident electromagnetic wave R, the detection of the authentication data is possible either by visual observation or even by suitable detection means, for example automatic detection means. - For this reason, the
security element 101, although is preferably configured to allow a selective transparency to an electromagnetic wave within the visible spectrum, in alternative embodiments is configured to operate even with electromagnetic waves whose characteristics lay outside said wavelengths (or frequency) range. - Advantageously, the layers bearing the components wherein the authentication data has been decomposed may be made of materials suitable to be customized (or encoded).
- Furthermore, according to preferred embodiments, the layers opposite to the interfering layer are preferably made of a plastic material transparent to visible radiation.
- Preferably, the phase of the layers bearing the components of the authentication data provides a recording of the latter in a corresponding layer by means of "additive" techniques, such as for example printing techniques, in particular inkjet, laser engraving or the like, and/or "subtractive" techniques, such as for example laser ablation techniques or analogous techniques, even combined together.
- In many embodiments of the present invention, the above-mentioned components of the authentication data are in the form of polarizable coating, in such a way that the authentication data detectable is a variable content data as a function of the polarization type obtained on said polarizable coating.
- In several exemplary embodiments, the components are in the form of photo-activatable pigments and may be contained in a corresponding layer, for example at a their thickness d and/or at a their interface surface S, as shown in
figure 1B . - In the context of the present description, the expression "interface surface" intends to denote a discontinuity zone, for example between two layers of the
security element 101 that are identical but distinguished or between layers contiguous but qualitatively different. - It is specified that, for embodiments of the
security element 101, even the interfering layer itself may bear a component of the authentication data. For this reason, in embodiments is enough for thesecurity element 101 to be provided with at least two layers superimposed, each bearing a respective component of the authentication data. - Referring again to
Figures 1A ,1B and2 , the interferinglayer 11 is preferably realized as a coating of the interface surface S of thelayer 10 and/orlayer 20. Advantageously, such coating is of the thin-film type, preferably comprising metallic elements, metal oxides or other materials having similar properties. The thin-fil type, as previously mentioned, indicates that the coating thickness is substantially comparable to the wavelength of the incident radiation thereon, in particular - in case of document providing a detection within the visible radiation, such thickness may be comprised between 20 and 500 nm. Multiple interfering layers may also be provided in a same security element. Preferably, the interfering layer is obtained by one or more deposition techniques, such as electrodeposition, sputtering, evaporation of metals or of metal oxides. - With respect to the exemplary embodiment of the
document 1 previously disclosed, as stated, different configurations relating to positioning and number of interferinglayers 11 of thesecurity element 101 are also feasible. A few examples of such variants are illustrated below. - In the example of
figure 3 and3A , a preferred configuration of thedocument 1 is illustrated, in two separate phases of the production process, and provides asecurity element 101 comprising three superimposed layers, preferably made of plastic transparent material, and denoted by thereferences - In a preliminary phase, as shown in
figure 3 , theintermediate layer 40 among said three layers is coated on each of its interface surfaces S by a corresponding interferinglayer layers - Subsequently, each of said two interfering
layers - The above-mentioned components are thus sent to phase means of the layers which, preferably through one of the previously mentioned techniques and according to the register positioning mode already described, performs the recording of a first component on (or in) the interfering
layer 41 and the recording of a second component K on (or in) the interferinglayer 42, as indicated inFig. 3 . - The
intermediate layer 40, provided with the interferinglayers layers figure 3A - so as to ensure, at least during a verify phase of the document, the detection in perfect register of said two components O, K with each other. - In
figure 4A is illustrated a further embodiment wherein thesecurity element 101 comprises, similarly to the preceding example, threesuperimposed layers - In this case, the
intermediate layer 40 among said three layers is coated on only one of the interface surfaces S by an interferinglayer 41, preferably in the form of thin-film. - An authentication data F is decomposed into three components F1, F2, F3, and two of said three components - F1 and F2 - are respectively recorded on the interface surface Si of the interfering
layer 41 and on the interface surface Sm of theintermediate layer 40, preferably though the above-mentioned additive techniques. - The remaining component F3 is instead recorded on the thickness of the
intermediate layer 40, preferably through the laser engraving technique. - Finally, the embodiment illustrated in
figure 4B , provides asecurity element 101 similar to that illustrated infigure 4A , which differs only due to a different distribution on the three components F1, F2, F3 wherein the authentication data F has been partitioned. - As visible, in this case the second component F2 is recorded on the interface surface of the interfering
layer 41 while the first F1 and the third F3 component are recorded (for example, through laser engraving) in the thickness of a respective 30, 50 external layers of the threelayers security element 101. - Preferably, from a standpoint of the realization process, this configuration provides the interfering
layer 41 to be provided with the respective component F2 prior to the coupling with the remaininglayers layers - As previously mentioned, configurations that provide the decomposition of the authentication data into a greater number of components are also feasible.
- Several types of algorithms are below reported, by the way of non-limiting examples, that are available for decomposing the authentication data into said two or more components, specifically referring to the features of the information that the authentication data contains.
- Preferably, such components are obtained by digitally processing the authentication data and, in this way, each of the algorithms disclosed, due to its specificity, better fit to a certain type of information (for example, alphanumeric characters, photographs, portraits, alphanumeric strings or other).
- Referring to
Figures 7 ,7A ,7B and8 , the procedure (shown below) of decomposing the authentication data into components is preferably used when the latter relates to images which depict aface 71 or alpha-numerical codes 81. - The authentication data is partitioned preferably into two components, following a
predetermined pattern 70 using the aid of algorithms, for example filtering algorithms, preferably of the type disclosed in [4], here incorporated by this reference. - Said pattern is generated as a theme or
recurring scheme - In the illustrated case, each component (the components illustrated by the
references portrait 71, the components illustrated by thereferences pattern - Hereinafter it is indicated, as a way of non-limiting example, the flow of operations to be executed.
- Pattern generation (
Figure 7A ): - choose, during a step or
phase 701, the monochromatic recurring theme 70 (in black and white); - build, during a step or
phase 702, thepattern - Generation of the two components (respectively denoted by the
references - generate, during a step or
phase 710, two selections corresponding with the black and white portions of the pattern by means of selection functions, preferably the selection functions of Adobe Photoshop®; - superimpose, during a step or
phase 720, the selection of the white portion on theauthentication data first component pattern - superimpose, during a step or
phase 730, the selection of the black portion on theauthentication data second component pattern - Now referring to
Figures 9 and9A , in the illustrated example theauthentication data 91 is decomposed into twocomponents random pattern 90, even in this case making use of algorithms within reach of those skilled in the art, preferably of the type disclosed in [4]. - Similarly to that illustrated in the previous paragraph a), the two
components authentication data 91 corresponding to the white and the black of thepattern 90. - In this case, the
pattern 90 is generated as a non-regular theme or scheme, preferably as a monochromatic bitmap file, juxtaposing, according to a disorderly and irregular grid, basic modules different one from each other, preferably following the randomness of a pseudo-random number generator [5], here incorporated by this reference. - In this case, in other words, it is possible to generate a random grid as a pattern, using for example a reference data associated with, or reported on, the document 1 (for example the card number, personal data or other similar information) as a seed of random generation.
- Such decomposition method is preferably recommended for treatment of photos/images, as illustrated in
figure 9 . - Below, and further referring to
figure 9A , the flow of operations to be executed to generate the random pattern is indicated, by the way of a non-limiting example. -
- provide, during a phase or step 910, a pseudo-random number generator, for example a generator that uses the Mersenne Twister algorithm [6], here incorporated by this reference;
- select, during a phase or step 920, a generation seed, for example a reference data associated with, or reported on, the
document 1; - provide, during a phase or step 930, one (or more) recurring monochromatic (black or white) theme/scheme to build the
pattern 90; - replicate, during a phase or step 940, the theme/scheme along the entire dimension of the
pattern 90 according to the random coordinates given by the pseudo-random number generator. - In this case, the
authentication data Figures 10 and11 , the elements of the string comprise alphabetic characters, and the authentication data is partitioned into two components. In a first case, the components are denoted by thereferences references - In the first case (
Figure 10 ), the elements of the string of each component are regularly distributed among the twocomponents Figure 11 ) said elements are randomly distributed among the twocomponents - Now referring to the case wherein the authentication data, for example an image, is partitioned into more than two components, preferably in three components, and wherein an interfering
layer - The partition into three components is compliant with, for example, the following criterion:
- a first component contains the close-up of a face illustrated in an image (foreground);
- a second component contains un intermediate level of the image (middleground);
- a third component contains the background of the image (background). Each component can be obtained even by the use of a regular or random pattern, as previously disclosed in paragraph a), preferably with three distinct shades.
- Whether the image was a colour image, the three components can be obtained considering their decomposition in compliance with, for example, models based on principles of additive synthesis (RGB) or subtractive synthesis (YMC).
- It is now described, by way of non-limiting example, a preferred method to manufacture the
document 1, in the specific case of the latter being in card ID-1 format and provided with a customizedsecurity element 101, i.e. containing an authentication data related to an image depicting the holder (for example, the face) of the card. - For the sake of simplicity, reference will be made to the structure of the
document 1 shown in figures from 1 to 2B, wherein thesecurity element 101 comprises three layers superimposed and the authentication data is partitioned into two components. - Further referring to the flow chart illustrated by
figure 12 , is thence described the succession of operations necessary to manufacture saiddocument 1. - In general terms, the method can be partitioned into two main phases.
- A preliminary phase, overall denoted in the chart by the
reference 127, of making thesecurity element 101 and a phase subsequent to the latter with the authentication data. - To manufacture the
security element 101 is firstly necessary to provide afirst layer 20 of material, preferably a plastic transparent material and comprising photo-activatable pigments. - The
first layer 20 of thesecurity element 101 is preferably a material having properties such as to be customized through laser engraving techniques. - On an interface surface S of said
first layer 20 is thus laid an interferinglayer 11, preferably a thin-film, for example through one of the previously disclosed techniques (electrodeposition, sputtering or evaporation of metals or metal oxides). - Subsequently, the
first layer 20 provided with the interferinglayer 11 is coupled to asecond layer 10, preferably in plastic transparent material. - The overall configuration of the three
layers layer 11 is interposed between the first 20 and thesecond layer 10 and that, preferably, said three layers are contiguous and bound together, by coupling means suitable for the purpose. - The interfering layer, as above disclosed, has the property to be selectively transparent to an electromagnetic wave R which passes through the
security element 101, in the described example preferably a wave within the visible spectrum. - The
security element 101 should be now customized con the authentication data. - As stated, in the example here considered, the authentication data relates to an image depicting the holder of the
document 1. It is, however, clear that is possible to associate other types of information to the authentication data. - For this purpose, the customization phase provides the
step 120 of an initial digitally providing of said image, in such a way that the latter can be processed. - Preferably, the authentication data is a
graphic format image 91, i.e. a digital data in a format that expresses an information intelligible for the human eye. Obviously, such an image may be downloaded from animage database 128, or even be digitally generated according to any modes available for those skilled in art and which, already known, will be no longer discussed. - Subsequently, in a step 121, a coding algorithm is selected for the authentication data, preferably pursuant to one of the methods (a, b, c, d) above disclosed.
- The algorithm allows to partition the authentication data into more components and, in the current example, the algorithm which predicts the use of random grids will be taken into account.
- Further referring to
Figure 9 , arandom pattern 90 is thus generated, atstep 122, and preferably starting from a same theme/scheme for each document, choosing as a random generation seed a characteristic element of the document to be produced, as for example the number of the card itself. - Once the pattern is obtained, a
first component 92 containing the sole portions of the image corresponding to the white of the pattern is generated, referring to step 124a. Similarly, asecond component 93 containing the sole portions of the image corresponding to the black of the pattern will be generated (step 124b). - Preferably, as previously disclosed, a calibration of the intensity of the components is performed (as indicated at step 129), calculating a calibration curve to define the specific transfer modes of each component in the respective layers of the security element, in order for them to have intensity almost equal when detected from the observation direction in transmitted radiation of the security element.
- The two
components security element 101. In particular, thefirst layer 20 bears thefirst component 92 and thesecond layer 10 bears thesecond component 93, according to a position of mutual register. - Preferably, the two
components respective layer - Preferably, the
document 1, and advantageously thesupport 100, is further customized by reference data of the card holder, such as, for example, thesame image 91 used as authentication data. - The
document 1 is thus ready to be used. - In the flow chart illustrated in
figure 13 , the steps of a method to verify thedocument authenticity 1 are represented according to the present invention, according to a preferred embodiment of the latter. - Preliminarily, an electromagnetic wave R investing the
document 1 is provided. Thesecurity element 101 is thence observed 130 in reflected radiation, to detect the authentication data from one or both its opposite faces A, B. - In this way, it is verified whether only one component of the authentication data contained thereof is detectable.
- The
security element 101 is thence observed 131 in transmitted radiation to detect the authentication data in a complete form. - The completely detected authentication data is then compared 132 to a reference data. Their congruity is therefore verified and, in positive case 133, the
document 1 results to be true. On the contrary, the document is counterfeit. Advantageously, the reference data is prepared on thedocument 1 itself, preferably on thesupport 100, in such a way that the congruity of the latter to the authentication data allows to verify both the authenticity ofdocument 1 itself and the authenticity of the sensitive information associated therewith. Thedocument 1 may even provide additional security elements that allow (any)congruity verifications 134 in addition to those associated with the authentication data according to the method previously disclosed. - The present invention has been herein described referring to preferred embodiments. It is to be intended that other embodiments may be implemented which belong to the same inventive core, as defined within the scope of claims set forth below.
- [1] Acharya and Ray, Image Processing: Principles and Applications, Wiley-Interscience 2005.
- [2] Russ, The Image Processing Handbook: Fourth Edition, CRC 2002.
- [3] Specification ICC.1:2010 (Profile version 4.3.0.0).
- [4] Functions of filtering and masking Adobe®.
- [5] A. Menezes, P, van Oorschot, S. A. Vanstone - Handbook of Applied Cryptography - CRC Press 1996.
- [6] Mersenne Twister: A 623 - Dimensionally Equidistributed Uniform Pseudo -Random Number Generator MAKOTO MATSUMOTO Keio University and the Max-Planck-Institut fur Mathematik and TAKUJI NISHIMURA Keio University. ACM Transactions on Modeling and Computer Simulation, Vol. 8, No. 1, January 1998.
Claims (25)
- A document (1), comprising:▪ a support (100); and▪ a security element (101) bearing an authentication data (OK; F), which security element (101) comprises a plurality of layers (10, 11, 20; 30, 40, 41, 42, 50) superimposed and fixed one to each other to define two opposite sides (A, B) of the security element (101),wherein at least two main layers (10, 20; 41, 42) of said plurality each bears a respective component (O, K; F1, F2, F3) of said authentication data (OK; F) arranged in mutual register,
and wherein said plurality of layers comprises at least one interfering layer (11; 41, 42) interposed among at least two main layers, said interfering layer being configured to selectively transmit first wavelengths and to reflect second wavelengths of an incident electromagnetic radiation (R) thereon, such that said components (O, K; F1, F2, F3) of said authentication data (OK; F) are all observable or detectable to form said authentication data (OK; F) exclusively from one observation direction in transmitted radiation related to only one of said two opposite faces (A, B) of the security element (101),
in such a way that the document (1) allows to verify the congruity of said authentication data (OK; F) with reference data. - The document (1) according to claim 1, wherein said two main layers (10, 20) are directly adjacent and in contact with said interfering layer (11).
- The document (1) according to any one of the preceding claims, wherein an additional layer (40) of said plurality of layers is interposed between said two main layers (30, 50).
- The document (1) according to any one of the preceding claims, wherein said interfering layer (11; 41, 42) is in the form of a coating of an interface surface (S) of a layer of said plurality of layers.
- The document (1) according to claim 4, wherein said coating (11; 41, 42) is of the thin-film type, preferably comprising metallic elements or metal oxides.
- The document (1) according to claim 4 or 5, wherein said interfering layer (11; 41, 42) is obtained by one or more processes comprised in the list comprising electrodeposition, sputtering, evaporation of metals or of metal oxides.
- The document (1) according to any one of the preceding claims, wherein interfering layer (11; 41, 42) is configured to allow a selective transparency of the security element (101) to an electromagnetic wave within the visible spectrum.
- The document (1) according to any one of the preceding claims, wherein at least one layer of said plurality of layers is made of plastic and/or transparent material to said incident electromagnetic radiation (R).
- The document (1) according to any one of the preceding claims, wherein said two main layers (10, 20) each bears the respective component (O, K) of the authentication data at their own thickness and/or at their own interface surface (S).
- The document (1) according to any of the preceding claims, wherein said components (O, K) of the authentication data are realized by means of photo-activatable pigments.
- The document (1) according to any one of the preceding claims, wherein said components (O, K) of the authentication data are in the form of polarizable coating and said authentication data (OK) is a variable content data according to the type of polarization obtained on said polarizable coating.
- The document (1) according to any one of the preceding claims, wherein said two components (O, K) of the authentication data are recorded on the respective layer of said plurality of layers by one or more techniques comprised in the list comprising laser engraving, laser ablation, inkjet.
- The document (1) according to any one of the preceding claims, wherein the optical density of said interfering layer (11; 41, 42) is comprised between 0.1 and -0.5 approximately.
- The document (1) according to any one of the preceding claims, wherein said authentication data (OK; F) coincides with one more reference data provided on the support (100).
- The document (1) according to any one of the preceding claims, wherein said support (100) is in the form of a page, card or banknote.
- The document (1) according to any one of the preceding claims, wherein said plurality of layers is a laminate.
- The document (1) according to any one of the preceding claims, wherein the thickness of the security element (101) defined by said plurality of layers is substantially equal to the thickness of the support (100).
- The document (1) according to any one of the preceding claims, wherein said two or more components (O, K; F1, F2, F3) are transferred on a respective layer of said plurality (10, 11, 20; 30, 40, 41, 42, 50) according to a calibration function obtained from the properties of the latter and in such a way that said two or more components have the same intensity when observed, or detected, to form said authentication data (OK; F).
- A method of making a document (1) according to any one of the preceding claims, comprising the steps of:▪ digitally providing an authentication data (OK) to be associated with the document (1);▪ providing two or more layers of material configured to bear said authentication data (OK), wherein said two or more layers comprise an interfering layer with an electromagnetic wave passing therethrough;▪ coupling at least one layer (20) of said two or more layers with said interfering layer (10);▪ decomposing said authentication data (OK) into two or more components;▪ transferring, in a position of mutual register, each of said two or more components on a respective of said two or more layers to obtain a security element (101);▪ providing a support element (100) of the security element (101) to obtain the document (1),wherein said two or more layers are coupled in a superimposed manner and wherein said interfering layer is configured in such a way that said two or more components are all detectable to form said authentication data exclusively from an observation direction relating to only one of two opposite sides (A, B) of the security element (101).
- The method of making a document (1) according to claim 19, comprising the steps of:▪ providing three layers of said two or more layers of material, wherein the intermediate layer of said three layers is said interfering layer;▪ coupling a first layer of said three layers with the interfering layer and subsequently coupling the latter with the remaining of said three layers;▪ transferring a first component of said two or more components on said first layer and a second component of said two or more components on said remaining layer.
- The method of making a document according to claim 19, comprising the steps of:▪ providing four layers of said two or more layers of material wherein one of which is said interfering layer;▪ coupling a first layer of said three layers with the interfering layer;▪ transferring a first component on said interfering layer and subsequently▪ coupling the two remaining layers with said first layer and with said interfering layer, respectively; and subsequently▪ transferring on said two remaining layers a second and a third component respectively.
- The method of making a document according to any one of the claims from 19 to 21, wherein a phase of calibrating the intensity of said two or more components is performed prior to transferring the latter on a respective one of said two or more layers.
- The method of making a document according to any one of the claims from 19 to 22, comprising the step of preparing one or more reference data on said support element (100), wherein said authentication data (OK) corresponds to said one or more reference data.
- Method of making a document accord to any one of claims from 19 to 23, wherein said two or more components (O, K; F1, F2, F3) are digitally obtained by processing said authentication data (OK; F) based on regular grid or on patterns obtained by algorithms implemented by random or pseudo-random number generators.
- A method of verifying the authenticity of a document comprising the steps of:▪ providing a document (1) according to any one of the claims from 1 to 18;▪ exposing the security element of said document (1) to an electromagnetic wave (R) with a direction of incidence which invests said document (1) from one of two opposite sides (A, B) of a security element (101) of the latter;▪ detecting an authentication data (OK) contained by the security element (101) from an observation direction facing the face opposite to the face related to said incidence direction;▪ comparing the authentication data (OK) detected with a reference data associated with the document (1) to verify their congruity and therefore the authenticity of the document (1).
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IT102018000002811A IT201800002811A1 (en) | 2018-02-19 | 2018-02-19 | DOCUMENT WITH AN ELEMENT OF SECURITY AND RELATED METHOD |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3528216A1 true EP3528216A1 (en) | 2019-08-21 |
EP3528216B1 EP3528216B1 (en) | 2020-08-05 |
Family
ID=62386670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19157723.8A Active EP3528216B1 (en) | 2018-02-19 | 2019-02-18 | Document having a security element and related method |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3528216B1 (en) |
ES (1) | ES2832074T3 (en) |
IT (1) | IT201800002811A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2596075A (en) * | 2020-06-15 | 2021-12-22 | Iq Structures Sro | Composite security element |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0628408A1 (en) * | 1993-06-08 | 1994-12-14 | Dragisa Andric | Security paper with color mark |
WO1997047478A1 (en) * | 1996-06-14 | 1997-12-18 | De La Rue International Limited | Security device |
EP1415828A1 (en) * | 2002-10-30 | 2004-05-06 | Xerox Corporation | Anti-counterfeiting feature using line patterns |
US20080106091A1 (en) | 2004-09-15 | 2008-05-08 | Wayne Robert Tompkin | Security Document With Transparent Windows |
WO2011020537A1 (en) | 2009-08-18 | 2011-02-24 | Mühlbauer Ag | Identification document having two superimposed images |
EP2559563A1 (en) | 2011-08-18 | 2013-02-20 | Polska Wytwornia Papierow Wartosciowych S.A. | A security document with a see-through feature, and methods for manufacturing and authentication thereof |
WO2016015130A1 (en) | 2014-07-30 | 2016-02-04 | Canadian Bank Note Company, Limited | Security document having a protected window and method for making the same |
WO2017092865A1 (en) | 2015-12-01 | 2017-06-08 | Giesecke & Devrient Gmbh | Security element and data carrier equipped therewith |
-
2018
- 2018-02-19 IT IT102018000002811A patent/IT201800002811A1/en unknown
-
2019
- 2019-02-18 EP EP19157723.8A patent/EP3528216B1/en active Active
- 2019-02-18 ES ES19157723T patent/ES2832074T3/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0628408A1 (en) * | 1993-06-08 | 1994-12-14 | Dragisa Andric | Security paper with color mark |
WO1997047478A1 (en) * | 1996-06-14 | 1997-12-18 | De La Rue International Limited | Security device |
EP1415828A1 (en) * | 2002-10-30 | 2004-05-06 | Xerox Corporation | Anti-counterfeiting feature using line patterns |
US20080106091A1 (en) | 2004-09-15 | 2008-05-08 | Wayne Robert Tompkin | Security Document With Transparent Windows |
WO2011020537A1 (en) | 2009-08-18 | 2011-02-24 | Mühlbauer Ag | Identification document having two superimposed images |
EP2559563A1 (en) | 2011-08-18 | 2013-02-20 | Polska Wytwornia Papierow Wartosciowych S.A. | A security document with a see-through feature, and methods for manufacturing and authentication thereof |
WO2016015130A1 (en) | 2014-07-30 | 2016-02-04 | Canadian Bank Note Company, Limited | Security document having a protected window and method for making the same |
WO2017092865A1 (en) | 2015-12-01 | 2017-06-08 | Giesecke & Devrient Gmbh | Security element and data carrier equipped therewith |
Non-Patent Citations (4)
Title |
---|
A. MENEZES; P, VAN OORSCHOT; S. A. VANSTONE: "Handbook of Applied Cryptography", 1996, CRC PRESS |
ACHARYA; RAY: "Image Processing: Principles and Applications", WILEY-INTERSCIENCE, 2005 |
MERSENNE TWISTER: "A 623 - Dimensionally Equidistributed Uniform Pseudo -Random Number Generator MAKOTO MATSUMOTO Keio University and the Max-Planck-Institut fur Mathematik and TAKUJI NISHIMURA Keio University", ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION, vol. 8, no. 1, pages January 1998 |
RUSS: "The Image Processing Handbook", 2002, CRC |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2596075A (en) * | 2020-06-15 | 2021-12-22 | Iq Structures Sro | Composite security element |
Also Published As
Publication number | Publication date |
---|---|
EP3528216B1 (en) | 2020-08-05 |
ES2832074T3 (en) | 2021-06-09 |
IT201800002811A1 (en) | 2019-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2533982B1 (en) | Security element for document of value | |
JP4914896B2 (en) | Especially safe and / or safe items such as valuable documents | |
EP2345008B1 (en) | Method of manufacturing security document and method for authenticating the document | |
JP5274020B2 (en) | Authentic card | |
WO2006050367A2 (en) | Full color spectrum object authentication methods and systems | |
MXPA05003984A (en) | Identification document and related methods. | |
JP2013541431A (en) | Improved security for flexible substrates | |
JPH0780370B2 (en) | Identification card having a visible authentication mark and its manufacturing method | |
US7675662B2 (en) | Embedded information carrier for optical data | |
WO2017159608A1 (en) | Identification device, identification method, identification program, and computer readable medium containing identification program | |
US9871660B2 (en) | Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture | |
KR20150082211A (en) | Method for authenticating a security element by superimposing n shared colour images, and security element implementing said method | |
EP3528216B1 (en) | Document having a security element and related method | |
JPWO2020004633A1 (en) | Certificate, how to manufacture the certificate, how to read the certificate, and how to verify the certificate | |
JPWO2007072795A1 (en) | A card that can be identified with a phosphor particle chip | |
JP6532534B2 (en) | A method for authentication and verification of security documents based on the measurement of relative position variations in different processes involved in the creation of security documents | |
JP6347336B2 (en) | Diffraction grating recording medium | |
JP2016091121A (en) | Forgery prevention medium authenticity determination method and forgery prevention medium authenticity determination device | |
WO2021112143A1 (en) | Method for manufacturing display body, display body, and method for verifying authenticity of display body | |
CA2739508A1 (en) | Method of manufacturing security document and method for authenticating the document | |
JP2020194069A (en) | Authentication medium and manufacturing method thereof | |
JPWO2010058809A1 (en) | Embossed hologram chip and manufacturing method thereof | |
POTOLINCA et al. | The study of documents counterfeit procedures by analyzing the security elements | |
Grant | Recent advances in retroreflective security materials |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20200213 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: B42D 25/29 20140101ALI20200227BHEP Ipc: G07D 7/00 20160101AFI20200227BHEP Ipc: B42D 25/30 20140101ALI20200227BHEP Ipc: B42D 25/45 20140101ALI20200227BHEP Ipc: B42D 25/00 20140101ALI20200227BHEP Ipc: B42D 25/328 20140101ALI20200227BHEP |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20200428 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1299780 Country of ref document: AT Kind code of ref document: T Effective date: 20200815 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602019000377 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20200805 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1299780 Country of ref document: AT Kind code of ref document: T Effective date: 20200805 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201207 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201105 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201106 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201105 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20201205 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602019000377 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2832074 Country of ref document: ES Kind code of ref document: T3 Effective date: 20210609 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
26N | No opposition filed |
Effective date: 20210507 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20210228 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210218 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210218 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210228 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220228 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20220228 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20230222 Year of fee payment: 5 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20230228 Year of fee payment: 5 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20190218 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20240301 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20200805 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240228 Year of fee payment: 6 Ref country code: GB Payment date: 20240221 Year of fee payment: 6 |