EP4389445A1 - Élément de sécurité à caractéristique de sécurité holographique de sécurisation - Google Patents

Élément de sécurité à caractéristique de sécurité holographique de sécurisation Download PDF

Info

Publication number
EP4389445A1
EP4389445A1 EP23218840.9A EP23218840A EP4389445A1 EP 4389445 A1 EP4389445 A1 EP 4389445A1 EP 23218840 A EP23218840 A EP 23218840A EP 4389445 A1 EP4389445 A1 EP 4389445A1
Authority
EP
European Patent Office
Prior art keywords
information
security
security element
stored
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP23218840.9A
Other languages
German (de)
English (en)
Inventor
Alexander Tries
Christian Kunath
Jeffry Gahlbeck
Martin Sprenger
Kathrin KLÜNDER
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of EP4389445A1 publication Critical patent/EP4389445A1/fr
Pending legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/328Diffraction gratings; Holograms
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/41Marking using electromagnetic radiation

Definitions

  • the invention relates to a security element with a hologram, which protects information stored in the security element against forgery.
  • Security elements are physical objects that have at least one security feature that is intended to protect the security element against imitation, counterfeiting, manipulation and the like.
  • Security elements can be, for example, driving licenses, passports, visas, identity cards, banknotes, bank cards, credit cards or the like.
  • security elements are also physical components that are inserted into the first-mentioned security elements, for example.
  • a security element can therefore be a security thread, a patch, a lamination body, a hologram film or the like.
  • Individualizing information is information that individualizes the corresponding security element compared to other similar security elements. Such individualizing information is considered personalizing if it can be assigned to a person to whom the security element itself is assigned. In the case of an identity card or passport, for example, this is the information that belongs to the person for whom the passport or identity card is issued.
  • a hologram is the storage of information in structures whose characteristic size and/or distances are in the range of the wavelength of light.
  • light is not only visible light, but also electromagnetic radiation from the adjacent Wavelength ranges such as the infrared wavelength range and the UV wavelength range.
  • Holograms can generally be classified according to different criteria. A key distinction is between thick and thin holograms. While in thin holograms the layer in which the holographic information is stored is of the same order of magnitude as the wavelength with which the hologram can be reconstructed, in thick holograms the volume range in which the holographic information is stored is significantly larger than the wavelength with which the hologram can be reconstructed. Thick holograms are therefore also referred to as volume holograms.
  • Volume holograms are characterized, for example, by the fact that they exhibit high angular selectivity and wavelength selectivity with regard to reconstruction. This means that the direction from which the reconstruction light must be irradiated for reconstruction and its wavelength are strongly limited or precisely defined. This does not apply to thin holograms.
  • Thin holograms are known, for example, as surface embossed holograms, which are often mirrored and are included as a security feature in credit cards that are currently in common use.
  • German personal documents such as identity cards and passports contain a printed, often even color-printed portrait image and an additional holographic storage layer in which a copy of the portrait image coded in grayscale is stored.
  • This copy can be detected, for example, when light of a suitable wavelength, in the case of German personal documents in the green wavelength range, hits the security document at 45°, at 90° to the surface.
  • the angles of the irradiation of the reconstruction light and the detection or observation direction are referred to as reconstruction geometry.
  • Reconstruction conditions or reconstruction condition are referred to as Reconstruction conditions or reconstruction condition.
  • further information is encoded in alphanumeric characters in the hologram of German personal documents, which is also stored a second time, ie redundantly, in the personal document by means of printing and/or laser engraving, ie a permanent material change due to laser radiation.
  • a master is used, as for example in the EP 0 896 260 A2 is described.
  • a device is described for producing volume holograms from a master hologram of a ground glass screen, which is recorded with one or more wavelengths and one or more reference angles.
  • the device described has a radiation source for laser radiation for irradiating a master hologram and a film.
  • a modulation device a so-called spatial light modulator (SLM), in particular a liquid crystal display (LCD) or an LCoS (Liquid Crystal on Silicon), is present to modulate the coherent laser radiation.
  • SLM spatial light modulator
  • LCD liquid crystal display
  • LCoS Liquid Crystal on Silicon
  • Security elements in the form of identification documents such as passports and identity cards are used to determine and verify the identity of people. Recently, verification is often carried out via electronic media. This is known, for example, as a video identification process. A person's identity is verified in a video call, where video data is transmitted in addition to audio data. Image data from the passport or identity card is transmitted to an institution or person who is supposed to confirm the identity of a person.
  • security features such as tactile security features, but also security features dependent on the direction of view or the direction of capture, cannot be verified at all or only with difficulty using such processes.
  • the difficulty for holograms is that, if they are flat, they often cannot be captured over their entire surface at the same time during image data capture and transmitted in such a way that they, in particular in the case of a flat portrait image, it can be compared with the portrait image next to it or partially superimposed on it.
  • the invention is therefore based on the object of creating a security element which enables good or improved protection of information that is easy to record in the security document and is at the same time easy to verify.
  • the invention is achieved by a security element with the features of patent claim 1, a method for producing the security element according to claim 10, a verification device for a security element according to claim 15, a method for verifying the security element according to claim 16 and computer programs according to claim 17.
  • Advantageous embodiments of the invention emerge from the subclaims.
  • the invention is based on the idea of encoding the securing information and storing it in the security hologram in such a way that it can be evaluated easily and reliably by machine.
  • at least one piece of information that is stored in the security element in another way is stored in coded form as a hologram in the security element.
  • the first information and the coded second information are first extracted and prepared for comparison in such a way that either the first information is coded in the same way as the second information was during production and the coded first information is compared with the extracted second information, or alternatively the second information is decoded and the decoded second information is compared with the first information. If a match is found in one of the two alternative methods, the corresponding security element is marked as genuine. If, on the other hand, a disparity is found, the security element is marked as fake.
  • the verification result can then be used, for example, to automatically trigger further technical processes, such as access control.
  • Coding or coding is understood here as the translation of information into another representation.
  • coding can also mean the encryption of the Information. Encryption is a transformation in which one piece of information is converted into a second piece of information using another piece of information, which is called a key, and the transformation and reverse transformation is only possible with knowledge of another piece of information, ie the key.
  • the invention provides a security element comprising a data carrier with a detectable first security feature in which a first piece of information is stored, and wherein the data carrier comprises a storage layer in which at least a second detectable security feature is holographically stored, wherein the second security feature stores a second piece of information which can be derived from the first piece of information, wherein the second piece of information is a machine-readable pattern.
  • a computer program is created with program code for carrying out all method steps of the verification method when the computer program is executed in a computer.
  • a computer program with program code stored on a machine-readable data carrier is created for carrying out the verification method when the program code is executed in a computer.
  • the various embodiments of the invention all offer the advantage that the coding of the first information is linked to a second information, which is a machine-readable code, which significantly improves the detection using image data.
  • a machine-readable code is considered to be a code that is specifically designed for detection by a machine device.
  • This refers to codes that are designed in such a way that they make imaging errors such as distortions and/or imaging errors in the form of partial damage or similar recognizable and correctable.
  • this includes barcodes referred to as one-dimensional codes, although they have a two-dimensional extension, as well as two-dimensional codes such as QR codes or similar.
  • machine-readable codes preferably have at least one error correction method, such as a checksum, or other methods that enable the correction of one or more errors due to incomplete or slightly incorrect detection. While check digits only make it possible to verify that the data has been entered correctly, error correction procedures make it possible to record the information completely correctly despite individual errors in parts of the pattern.
  • error correction method such as a checksum, or other methods that enable the correction of one or more errors due to incomplete or slightly incorrect detection. While check digits only make it possible to verify that the data has been entered correctly, error correction procedures make it possible to record the information completely correctly despite individual errors in parts of the pattern.
  • the invention is significantly improved if the coding includes encryption. This can prevent the machine-readable feature from being easily generated by counterfeiters. If, for example, the key required for encryption is kept secret, the machine-readable pattern from the first information cannot be encoded by counterfeiters. This makes counterfeiting significantly more difficult. If an encryption method with secret information, i.e. with a key, is used, verification is only possible by those people or entities who know the key.
  • a further improvement, especially with regard to the user applications of the novel security element, can be achieved if the encryption method which is carried out during coding is a so-called asymmetric encryption method.
  • This refers to encryption methods that have two related keys. One key is used to encode the information and the other key is used to decode it.
  • it is possible, for example, to encode the second information with a first secret key when producing the security element.
  • the second key required for decoding can be made public and enables verification in such a way that it can be checked whether the information stored in the pattern after decryption matches the first information stored in the security element in the first security feature.
  • a preferred embodiment of the invention thus provides that the second information comprises an encryption of the first information, in particular the second information is asymmetrically encrypted.
  • a corresponding development of the method thus provides that the coding comprises an encryption, so that the second information comprises an encryption of the first information, in particular the first information is encrypted asymmetrically.
  • the coding step comprises a cryptography step and the coding comprises an encryption and the decoding comprises a decryption.
  • One embodiment of the verification device provides that the coding unit is a cryptography unit and that the coding comprises an encryption and the decoding comprises a decryption, in particular by means of an asymmetric encryption method.
  • an asymmetric procedure offers the advantage that although verification, i.e. checking the authenticity, is possible because the second information can be decrypted and compared with the first information, no correct second pattern can be generated from a known first information. This is reserved for the institution that has knowledge of the secret key, which is usually the issuer and/or manufacturer of the security elements.
  • the "public key" is not is not made public, but is only made available to institutions responsible for checking and verification, possibly in another encrypted form, so that, for example, the verification process can be carried out by means of a computer program, but counterfeiters who do not have access to this protected computer program or a verification device are not even able to decode and thereby decrypt the second information stored in the machine-readable pattern.
  • the issuer and producer of the security elements when using an asymmetric encryption method, still wants to make decoding and decryption possible for a broad public and, if necessary, also wants to use different key pairs consisting of a public and a secret key, it is advantageous if a public key with which the second information can be decrypted is stored in the security element.
  • the first piece of information used is information that is individualizing for the security element, particularly preferably personalizing.
  • Biometric information is particularly suitable for this.
  • Biometric information can be any biometric information.
  • Particularly suitable are an eye distance, a nose length, relationships of certain dimensions in the portrait image or fingerprint patterns or similar.
  • the first piece of information can thus be stored directly in the portrait image in its representation, for example.
  • the eye distance or a nose length can be extracted from image data by corresponding pattern recognition programs, as are known in the prior art. Since the non-holographic information of the security document can usually be recorded over the entire surface, these programs can usually calculate out imaging errors such as distortions and the like without difficulty. It is therefore possible to print a feature that clearly identifies a person, the portrait image, on to secure it in a simple manner, ie to directly secure information stored in the portrait image using the holographically stored machine-readable pattern.
  • a preferred embodiment of the security element thus provides that the first information is personalizing information, in particular biometric information.
  • a particularly high level of protection of the holographic feature is achieved if the second information is or will be stored as a volume hologram.
  • the second security feature is preferably designed as a volume hologram. While surface holograms can be produced by embossing, exposure to coherent light is required to produce volume holograms in order to form the corresponding hologram. The effort is therefore significantly increased.
  • versions with volume holograms are possible, which have a high diffraction efficiency and are therefore easy to capture in image data.
  • the second information is designed as a two-dimensional pattern with at least two types of pattern elements, wherein the pattern elements of one type produce a uniform optical impression in the image data captured during the reconstruction during the holographic reconstruction and different types of pattern elements produce different optical impressions in the image data captured during the reconstruction during the reconstruction.
  • one type of pattern element can thus be assigned the diffraction efficiency 0.
  • Such a pattern element corresponds to a location area in the reconstructed pattern that shows no light effect in the image data.
  • the other type of pattern element is assigned location areas that show a bright light effect in the image data.
  • a binary two-dimensional pattern can comprise pattern elements that all have a diffraction efficiency other than zero. Some pattern elements preferably have a diffraction efficiency of at least 10%, but no more than 30%, and the other pattern elements have a diffraction efficiency of at least 60%, preferably more than 70%.
  • the bright pattern elements are at least "twice as bright", preferably at least "three times as bright” as the dark pattern elements.
  • Such a two-dimensional machine-readable pattern is thus a bright area in the image data, but one that exhibits brightness fluctuations or variations. Such a security feature is more difficult to forge and replicate.
  • embodiments are also possible in which not only two types of pattern elements, but several types of pattern elements are used, which differ, for example, in terms of the diffraction efficiency, i.e. the brightness of the pattern elements, in the reconstructed image of the holographically stored pattern. This is comparable to grayscale values when storing photographic data using a printing process.
  • patterns can be produced by storing different types of pattern elements in the volume hologram using different wavelengths.
  • individual pattern elements can produce a green color impression, whereas other pattern elements produce a red color impression.
  • several "red” types of pattern elements and several "green” types of pattern elements can exist, each of which differs from the other in terms of diffraction efficiency, which is reflected in the brightness of the pattern elements generated in the image data.
  • the effort required for counterfeiting is significantly increased.
  • the possibility of information being encoded in a pattern is also significantly increased. This means that a greater variety of information can be stored on the same surface or with the same number of pattern elements in the stored holographic pattern. While two different pieces of information can be stored in one pattern element with two types of pattern elements, three different pieces of information can be stored in one pattern element if three types are used. The information content is increased accordingly by the number of pattern elements.
  • the pattern elements are preferably intensity-modulated surface areas, each of which holographically stores a surface area of a planar scatterer or a mirror.
  • the security element can be a holographic film in which, for example, both the portrait image is stored as a color-graded image, for example with green pixels that have different diffraction efficiencies, and at the same time the machine-readable pattern is stored in the same hologram film spatially offset or even partially or completely superimposed.
  • Completely or partially superimposed in this case means that in the area in which the two-dimensional pattern that stores the second information is formed, no information from the security feature storing the first information is formed.
  • Information is assumed to be partially superimposed or completely superimposed because it is partially or completely arranged in the otherwise rectangular or square area in which the first security feature, e.g. the portrait image, is formed.
  • the first information is formed by means of the first security feature in a layer other than the storage layer of the hologram, for example printed on the hologram layer
  • a third security feature is stored in the data carrier, which stores either the first information or the second information redundantly in the data carrier a further time, wherein the storage methods with which the third security feature is formed or stored differ from the method with which the redundantly stored first information is formed or stored by means of the first security feature or the redundantly stored second information is formed or stored by means of the second security feature.
  • a portrait image is printed once in the security element, for example by means of a colored inkjet print, once as a mono-colored or even full-color portrait image of the volume hologram and additionally as monochromatic or polychromatic machine-readable pattern is or is stored.
  • the verification method in such embodiments can be expanded to the extent that a match between the first information and the third information or the security features with which the first information and the third information are stored in the security element can be carried out in addition to the check of whether the second information encoded in the machine-readable pattern matches the first information stored in the first and third security features.
  • the effort required to manipulate a security element is thereby increased enormously and counterfeits become easier to detect.
  • the two-dimensional pattern comprises a plurality of different types of pattern elements, wherein the plurality of types of pattern elements comprises pattern elements which reconstruct at different wavelengths and, for at least one of these different wavelengths, comprise types of pattern elements which have different diffraction efficiencies.
  • the plurality of pattern elements for each of the different wavelengths comprises different types of pattern elements which differ in terms of diffraction efficiency.
  • the different wavelengths at which types of pattern elements of the plurality of pattern elements are reconstructed there are in each case at least two types of pattern elements whose diffraction efficiency differs by at least 10%.
  • Other embodiments may provide a larger difference of at least 25% or even 50%.
  • At least two of the different wavelengths are in the optically visible wavelength range.
  • Volume reflection holograms have sufficient wave selectivity that the different colors corresponding to the different reconstruction wavelengths can be recognized or detected by a human observer or a color camera system.
  • the reconstruction wavelengths of all the different types of pattern elements of the pattern are in the non-visible wavelength range. This creates a covert security feature.
  • the pattern of the second security feature is formed from different types of pattern elements which do not reconstruct with wavelengths of visible light and are spatially superimposed on the first security feature in such a way that at least part of the detectable first information is stored in relation to a planar extent of the security element at the same position as pattern elements of the pattern of the second security feature.
  • the first and second security elements are detected optically.
  • Fig.1 shows a schematic of a security element 1.
  • the security element is designed as a data carrier 5 in the form of a security document 10 designed as an ID card.
  • Individualizing data 20 are stored in the security element 1. These include, for example, an ID number 30, a validity date 110 and an identifier 130, which can be, for example, a public key 350 of a key pair for asymmetric encryption.
  • Personalizing data 40 are stored in the security element 1 as further individualizing data 20. These include a portrait image 50, preferably printed in color, a name 60, a first name 70, a date of birth 80, a nationality 90, a place of birth 100 and an image of the signature 120.
  • the various personalizing data 40 can be printed, as mentioned for the portrait image, or stored in any other way in the security element.
  • these can be stored using laser marking through permanent conversion of substrate material, for example from transparent plastic to blackened plastic.
  • some or all of the data created using laser marking can also be captured tactilely.
  • the security element 1 also contains general security features 150.
  • a security print 160 and a national symbol 210 here in the form of an eagle, are mentioned here as examples.
  • the national symbol 210 which is reconstructed using red light, for example, is preferably designed as a three-dimensional volume hologram which shows parallax effects, i.e. changes its appearance when the viewing direction changes. This means that the three-dimensional shape of the eagle is stored in the hologram.
  • the security element 1 contains a two-dimensional machine-readable pattern 250. In the embodiment shown, this is designed as a QR code.
  • the machine-readable pattern 250 is a two-dimensional pattern 251.
  • the two-dimensional pattern 251 consists of pattern areas or Pattern elements 252, 253 that either reconstruct brightly (252) or do not reconstruct (253) and thus appear dark.
  • the pattern is thus formed using binary pattern elements 252, 253.
  • Other embodiments can provide that the individual diffracting pattern elements have different diffraction efficiencies and thus different brightness values.
  • the machine-readable pattern reconstructs with light in the green wavelength range.
  • the machine-readable pattern stores a second item of information that is derived from a first item of information stored in a first security feature 310 in the security element.
  • the preferably color-printed portrait image represents the first security feature 310, in which an eye distance 52 is stored in the security element 1 via a representation of eyes 51.
  • the holographically stored machine-readable pattern 250 as the second security feature 320 includes this first information, namely the eye distance as coded second information.
  • this first information namely the eye distance as coded second information.
  • an asymmetric encryption is carried out so that the shape of the machine-readable pattern cannot be generated by a forger even if the eye distance 52 is known.
  • the first information can be printed in the portrait image using a color composition that is not perceptible when illuminated with light in the visible wavelength range, but shows luminescence, in particular in the visible wavelength range, when excited with light in the non-visible wavelength range, in particular in the UV range or in the IR range. It is also possible to print this first information with a printing preparation in such a way that it reveals the same information when excited in the UV wavelength range as well as in the IR wavelength range.
  • the printing preparation uses both a dye that luminesces when excited with UV or a pigment that luminesces when excited with UV, as well as an IR-excitable dye that shows up-conversion or an IR-excitable pigment.
  • This information can be a fingerprint pattern, for example, or it can also include other biometric data or non-biometric personalizing data.
  • Fig.2 5 shows an example of a device for producing a security element.
  • the device 500 comprises a hologram exposure unit 600. This has a coherent light source 610 and optionally further coherent light sources 615.
  • a spatial light modulator 620 is arranged in the beam guide between the coherent light source 610 and a hologram master 630.
  • the control device 700 is designed, for example, as a computer 710 with an input 720 for receiving data 720 for individualization and personalization.
  • the hologram exposure device 600 is controlled via this computer 710.
  • a photosensitive layer 510 is provided and brought into contact with the hologram master 630, which in the embodiment shown is designed, for example, as a hologram master of a reflection volume hologram.
  • This comprises a hologram of a flat, homogeneously luminous reflecting area, which is an image of a diffuser or a mirror.
  • the spatial light modulator 620 is controlled in such a way that, for example, individual areas of the hologram master representing the homogeneously luminous surface are exposed and thus copied into the photosensitive layer 510 and other areas are not illuminated and thus are not reconstructed and copied.
  • the binary machine-readable pattern as it is shown, for example, in Fig.1 as a second security element 320 in the form of the holographically stored machine-readable pattern 250 of the.
  • the intensity selected for the exposure of the individual pattern elements 252, 253 can be changed via the spatial light modulator, so that pattern elements 252, 253 with different brightness appear in the machine-readable pattern.
  • a further coherent light source 615 which has a different light wavelength, can be used to either create other holographic elements, such as the holographically stored pattern 250 in Fig.1 drawn national symbol 210, with the aid of the hologram master 630, in which the national symbol is stored as a hologram for the other wavelength.
  • the light from the further coherent light source is generally not guided via the spatial light modulator 620.
  • the machine-readable holographic pattern comprises pattern elements that reconstruct at different wavelengths and that the light from the further coherent light source 615 is also guided at least partially via the spatial light modulator.
  • a second spatial light modulator (not shown) for the light from the further coherent light source 615.
  • Other embodiments can provide even further coherent light sources for even further wavelengths and, if necessary, light from spatial light modulators.
  • the first information is printed onto the fully developed and fixed photosensitive layer 510, for example by means of a printing device 800.
  • the first information is stored here by means of a first security feature 310, which can be an alphanumeric print, a print made using luminescent colorants and/or a color print, for example in the form of a portrait image.
  • the first information can also be formed and stored in the first security feature by means of other methods, for example via a classic laser marking, i.e. via a partial carbonization of substrate layers, or the like.
  • a further substrate layer 520 for example a plastic layer, is provided and printed with the first security feature, which stores the first information, at the same time or at a time offset from the holographic exposure of the photosensitive layer 510.
  • the substrate layer 520 and optionally further substrate layers are then brought together with the photosensitive layer 510 and connected to one another in a lamination process by means of a lamination device 900.
  • Adhesives can be used here.
  • the photosensitive layer 510 which can also be a layer composite, is joined to the at least one substrate layer 520 to form a lamination body without the use of an adhesive.
  • a lamination body is also referred to as a data carrier 5, since data is stored in it.
  • the printed photosensitive layer 510 which according to the embodiment according to Fig.2 represents a data carrier 5.
  • a security element 1 which is usually a preliminary product for the production of an identity document or other security or valuable document
  • the device according to Fig.3 preferably a security element 1 as a finished security document 10 in the form of a Lamination body is manufactured.
  • the device 500 can contain further devices that insert further security features and security elements, and that even after the lamination body has been manufactured, further process steps can be carried out, such as laser engraving and/or electronic personalization by storing information in an electronic data storage device laminated into the security document.
  • the first information can also be stored, for example, in such an electronic chip in a security element designed as a security document.
  • a verification system 1000 for verifying a security element 1 is shown schematically.
  • the verification system comprises an image data acquisition device 1100, a verification apparatus 1300 and an access barrier 1400.
  • the image data acquisition device 1100 comprises a camera 1150. This is designed to capture diffracted light 1120 for capturing the second security element 320 and additional security elements visible in visible light, such as the first security element 310, when reconstruction light 1110 of a suitable wavelength is irradiated onto a security element 1 at a predetermined reconstruction angle.
  • the reconstruction light can be provided by a light source 1130, which generates white light, for example, when the second holographically stored second security feature 320 is stored as a volume hologram.
  • the light source 1130 can also be designed as a laser.
  • the image capture device 1100 can also comprise an excitation source 1140 in the form of a UV lamp or the like in order to make luminescent components of the first security element 310 detectable.
  • the image data capture device provides image data 1200.
  • the verification device 1300 which is designed, for example, as a computer 1305 with a computing device 1310, a storage device 1320 and has a program code 1330 stored in the storage device, has an input 1340 for receiving the image data 1200.
  • An extraction unit 1350, a coding unit 1360, which optionally comprises a cryptography unit 1365, a comparison unit 1370 and a verification unit 1380 are realized by means of the program code that is executed on the computing device 1310.
  • the extraction unit is designed to extract a first piece of information from the image data, for example an eye distance from the portrait image, which represents a first security feature, and the machine-readable pattern as a second piece of information.
  • the coding unit 1360 decodes the machine-readable pattern. This produces a coding result which, in the case of a genuine security element, should be equal to the first piece of information extracted from the first security feature by the extraction unit 1350. This is, for example, the eye distance.
  • the comparison unit 1370 then compares, for example, the first piece of information with the decoded second piece of information and determines whether there is equality or inequality. Based on the comparison result, the verification unit 1380 determines a verification result which is fed via an output unit 1385, for example to an output 1388.
  • the output unit can also output a pictorial representation of the result.
  • an access lock 1400 is linked to the output 1388, which, for example, enables or blocks access to a protected area depending on the verification result.
  • the verification result can also be output, for example, as a signal, which can be further processed.
  • the first information can also be encoded in the same way as was done when producing the machine-readable pattern and thus compared with the second information of the comparison unit for equality or inequality.
  • the first information for example the eye distance
  • the second information in encrypted form.
  • the encryption has taken place using an asymmetric encryption method.
  • the eye distance has been encrypted with a secret key and encoded in the machine-readable pattern.
  • a cryptographic step can now be carried out when decoding the pattern, which is carried out using a publicly known key. This again gives a value for the eye distance, which can be compared with the eye distance extracted from the first security feature.
  • the flow chart of a verification according to an embodiment of a verification method 2000 is explained again schematically.
  • the image data of the security element 2100 is captured.
  • the hologram of the security element 1120 is reconstructed.
  • Other embodiments can provide that only the image data already captured are received 2200.
  • the first information and the machine-readable pattern are extracted from the first security feature as second information 2300.
  • a coding step is then carried out 2400 in order to derive information to be compared with the first information from the second information or to encode the first information in such a way that it is comparable with the second information.
  • a cryptography step is carried out here 2410.
  • the second information which is preferably an encryption of the first information generated using an asymmetric encryption method, is decrypted using a publicly known key.
  • the first information is then compared with the coding or cryptography result 2500.
  • a verification decision is then made depending on whether or not an equality between the coding or cryptography result and the originally extracted information is determined 2600.
  • the verification decision is output 2650.
  • the verification result is then additionally processed automatically, for example via an access control at a personal lock or the like 2700.
  • FIG.6 A further embodiment of a security element 1 in the form of a security document 10 designed as an ID card is shown.
  • the portrait image 50 which is printed on the one hand, is additionally stored as a holographic portrait image 260 in light/dark or brightness levels.
  • the holographically formed machine-readable pattern 250 is additionally formed in the same storage layer, a photosensitive layer, but in a different location.
  • This provides multiple protection for the first information, which is provided both in the first security feature 310, which is formed as a holographic portrait image, and in the third security feature 330, the printed portrait image 50, as well as in coded, preferably encrypted form, is stored in the holographic machine-readable pattern of the second security feature 320.
  • the machine-readable pattern 250 of the second security feature 320 is colored.
  • the pattern elements which have a detectable diffraction efficiency, reconstruct at at least two different wavelengths, the light of which preferably produces different color impressions for a human observer, i.e. to which different colors are assigned.
  • the pattern preferably has pattern elements that reconstruct at three or more wavelengths, i.e. three or more colors. This makes counterfeiting significantly more difficult and increases the information density of the storable information of the pattern.
  • the pattern 250 comprises at least two different types of pattern elements that reconstruct at the same wavelength and each have a diffraction efficiency other than zero.
  • the pattern may additionally comprise pattern elements that do not reconstruct or reconstruct imperceptibly.
  • the security element is preferably formed in a photosensitive layer or in a lamination body comprising a photosensitive layer.
  • the photosensitive layer preferably comprises photopolymers. However, any layer can be used in which a hologram can be exposed.
  • the other substrate layers which are formed in a lamination body with the photosensitive layer Any common substrate layer can be used for the substrates to be bonded. These include in particular polycarbonate, polyethylene, PVC, but also composite materials such as ABS, paper, cotton or similar.
  • Any printing method can be used as the printing method. However, digital printing methods, in particular an inkjet printing method, are particularly suitable. In this case, printing inks are used in particular which are made on the basis of the plastic material on which the printing is carried out.
  • polycarbonate layers are suitable as the substrate layer and preparations which comprise a binder with a polycarbonate derivative, preferably based on a geminal disubstituted dihydroxydiphenylcycloalkane, as are described, inter alia, in the EN 10 2008 012 423 A1 are described.

Landscapes

  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)
EP23218840.9A 2022-12-20 2023-12-20 Élément de sécurité à caractéristique de sécurité holographique de sécurisation Pending EP4389445A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102022214091.5A DE102022214091A1 (de) 2022-12-20 2022-12-20 Sicherheitselement mit absicherndem holografischen Sicherheitsmerkmal

Publications (1)

Publication Number Publication Date
EP4389445A1 true EP4389445A1 (fr) 2024-06-26

Family

ID=89224757

Family Applications (1)

Application Number Title Priority Date Filing Date
EP23218840.9A Pending EP4389445A1 (fr) 2022-12-20 2023-12-20 Élément de sécurité à caractéristique de sécurité holographique de sécurisation

Country Status (2)

Country Link
EP (1) EP4389445A1 (fr)
DE (1) DE102022214091A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0896260A2 (fr) 1997-08-06 1999-02-10 HSM Holographic Systems München GmbH Dispositif pour la fabrication d'hologrammes individuels pour la sécurité de documents
DE102008012423A1 (de) 2007-10-31 2009-05-07 Bundesdruckerei Gmbh Verfahren zur Herstellung eines Polymerschichtverbundes und Polymerschichtverbund mit farbigem Sicherheitsmerkmal
DE102016103694A1 (de) * 2016-03-02 2017-09-07 Ovd Kinegram Ag Sicherheitsdokument und Verfahren zu dessen Authentifizierung
DE102016104300A1 (de) * 2016-03-09 2017-09-14 Leonhard Kurz Stiftung & Co. Kg Sicherheitselement sowie ein Verfahren zur Herstellung eines Sicherheitselements

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007052951B4 (de) 2007-10-31 2021-11-18 Bundesdruckerei Gmbh Verifizierungsvorrichtung für ein Hologramm
DE102014217099B4 (de) 2014-08-27 2022-02-24 Bundesdruckerei Gmbh Verfahren zur Herstellung eines Sicherheitshologramms mit einem Transmissionsvolumenhologramm in Kontaktkopie

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0896260A2 (fr) 1997-08-06 1999-02-10 HSM Holographic Systems München GmbH Dispositif pour la fabrication d'hologrammes individuels pour la sécurité de documents
DE102008012423A1 (de) 2007-10-31 2009-05-07 Bundesdruckerei Gmbh Verfahren zur Herstellung eines Polymerschichtverbundes und Polymerschichtverbund mit farbigem Sicherheitsmerkmal
DE102016103694A1 (de) * 2016-03-02 2017-09-07 Ovd Kinegram Ag Sicherheitsdokument und Verfahren zu dessen Authentifizierung
DE102016104300A1 (de) * 2016-03-09 2017-09-14 Leonhard Kurz Stiftung & Co. Kg Sicherheitselement sowie ein Verfahren zur Herstellung eines Sicherheitselements

Also Published As

Publication number Publication date
DE102022214091A1 (de) 2024-06-20

Similar Documents

Publication Publication Date Title
EP2208117B1 (fr) Procédé et dispositif de production d'hologrammes en tant qu'éléments de sécurité
EP1716545B1 (fr) Objet de valeur ayant un motif moire
EP0618543A2 (fr) Système d'identification
DE2943436A1 (de) Maschinell pruefbares schutzmuster fuer dokumente und verfahren zur erzeugung und pruefung des schutzmusters
EP3424024A1 (fr) Document de sécurite et procédé permettant d'authentifier ce document
EP1187728B1 (fr) Support d'information a hologramme
DE10353092A1 (de) Datenträger mit Kennzeichnungen
EP2391512A1 (fr) Elément de sécurité optiquement variable
EP2100277B1 (fr) Élément de sécurité à codes-barres multicolores et pouvant varier de manière optique
WO2018211034A1 (fr) Procédé d'authentification d'un objet, en particulier d'un élément de sécurité et l'élément de sécurité
DE102016103694A1 (de) Sicherheitsdokument und Verfahren zu dessen Authentifizierung
DE102017004037A1 (de) Sicherheitseinlage rnit einer Vertiefung für ein Ausweisdokument und Verfahren zur Herstellung einer Sicherheitseinlage mit einer Vertiefung für ein Ausweisdokument
DE102007044486B4 (de) Sicherheitselement zur Erhöhung der Fälschungssicherheit eines Sicherheitsdokuments und Sicherheitsdokument
EP4389445A1 (fr) Élément de sécurité à caractéristique de sécurité holographique de sécurisation
EP1057144B1 (fr) Moyen d'autorisation d'acces ou d'identification et procede permettant de le realiser
EP3039491B1 (fr) Procédé de marquage décentralisé d'un document de sécurité
EP4215378A2 (fr) Vérification d'un document de sécurité sur la base de morphologies de gouttelettes
DE102023104020B3 (de) Identifikationsdokument, Entschlüsselungsanwendung und Verfahren zum Herstellen eines Identifikationsdokuments
EP3548300B1 (fr) Procédé de fabrication et de vérification d'un document de sécurité et document de sécurité
EP3174727B1 (fr) Production de documents de sécurité ayant des vues de portrait
DE60124283T2 (de) Optischer Datenträger mit einem auf optischer Beugung basierenden Code, und zugehöriges Lesegerät
EP2214914B1 (fr) Procédé de production d'un element de sécurité pour un document et document correspondant
DE112020005935T5 (de) Verfahren zum Herstellen eines Anzeigekörpers, Anzeigekörper und Verfahren zum Verifizieren einer Authentizität eines Anzeigekörpers
DE10046950A1 (de) Sicherheitssiegel und Verfahren zu dessen Herstellung
EP4051507A1 (fr) Procédé et système de production et de vérification d'un document de sécurité

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR