EP2001688B1 - Equipement pour procéder une présentation d'une impression de sécurité sur un support d'informations - Google Patents
Equipement pour procéder une présentation d'une impression de sécurité sur un support d'informations Download PDFInfo
- Publication number
- EP2001688B1 EP2001688B1 EP07718368.9A EP07718368A EP2001688B1 EP 2001688 B1 EP2001688 B1 EP 2001688B1 EP 07718368 A EP07718368 A EP 07718368A EP 2001688 B1 EP2001688 B1 EP 2001688B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- information
- medium
- representation
- information carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Not-in-force
Links
- 238000000034 method Methods 0.000 title claims description 39
- 230000008569 process Effects 0.000 title claims description 18
- 238000012545 processing Methods 0.000 claims description 78
- 239000000463 material Substances 0.000 claims description 66
- 230000007246 mechanism Effects 0.000 claims description 27
- 238000004519 manufacturing process Methods 0.000 claims description 20
- 238000003860 storage Methods 0.000 claims description 10
- 230000003287 optical effect Effects 0.000 claims description 9
- 230000001419 dependent effect Effects 0.000 claims description 5
- 238000004422 calculation algorithm Methods 0.000 description 48
- 238000001514 detection method Methods 0.000 description 34
- 239000000835 fiber Substances 0.000 description 17
- 238000013500 data storage Methods 0.000 description 13
- 230000008901 benefit Effects 0.000 description 10
- 239000000969 carrier Substances 0.000 description 10
- 230000008859 change Effects 0.000 description 10
- 230000005855 radiation Effects 0.000 description 10
- 230000006399 behavior Effects 0.000 description 8
- 239000002245 particle Substances 0.000 description 8
- 239000000126 substance Substances 0.000 description 8
- 238000011161 development Methods 0.000 description 7
- 230000001965 increasing effect Effects 0.000 description 7
- 239000000758 substrate Substances 0.000 description 7
- 239000000654 additive Substances 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 6
- 239000012876 carrier material Substances 0.000 description 6
- 238000010897 surface acoustic wave method Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 5
- 239000003990 capacitor Substances 0.000 description 5
- 238000005259 measurement Methods 0.000 description 5
- 230000003595 spectral effect Effects 0.000 description 5
- 238000000576 coating method Methods 0.000 description 4
- 239000011324 bead Substances 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 3
- 239000011248 coating agent Substances 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 239000004020 conductor Substances 0.000 description 3
- 230000005670 electromagnetic radiation Effects 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 238000005286 illumination Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000010521 absorption reaction Methods 0.000 description 2
- 239000003086 colorant Substances 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000000537 electroencephalography Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- 239000002184 metal Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000002688 persistence Effects 0.000 description 2
- 239000004033 plastic Substances 0.000 description 2
- 239000012857 radioactive material Substances 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000000859 sublimation Methods 0.000 description 2
- 230000008022 sublimation Effects 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 238000000862 absorption spectrum Methods 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000000996 additive effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000975 dye Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 230000010355 oscillation Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000002277 temperature effect Effects 0.000 description 1
- 238000007669 thermal treatment Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000002834 transmittance Methods 0.000 description 1
- 239000012780 transparent material Substances 0.000 description 1
- 238000011282 treatment Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M3/00—Printing processes to produce particular kinds of printed work, e.g. patterns
- B41M3/14—Security printing
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- B42D2033/24—
-
- B42D2033/32—
-
- B42D2035/16—
Definitions
- the invention relates to a device for processing a representation of a security printing on an information carrier with a security printing, wherein the information carrier comprises a printing medium with a base material and a production-related, resulting from a random process medium information, wherein a processing device for displaying a security printing with a device for storing and / or retrieving a ciphering key and being connected to a printing mechanism and the processing device is connected directly or indirectly to a detection device for determining the medium information.
- the WO 2003/077197 A1 discloses a card having a thermally writable surface and a magnetic or electronic data storage. In order to achieve a certain degree of protection against counterfeiting, parts of the information contained on the thermally writable surface are also stored in the magnetic or electronic data memory. To produce a counterfeit, it would be necessary, in addition to the imprint and the contents of the data storage, for example, by a commercially available chip card reader to change.
- a method and a system for authenticity assurance or authenticity checking of documents are proposed. These documents each have a substrate with individual substrate features. Prior to the publication of a document, an image of the substrate is taken and the image data obtained in association with document data stored in order to keep this data ready for any subsequent comparison requests regarding the authenticity of a document issued. It is proposed to associate with the authenticity assurance system a printing unit which is connected downstream of an optical image recording device, in particular a scanner and adapted to print on the documents or banknotes the test code values determined by a data processing device, namely by means of a fluorescent or photochromic printing ink.
- the banknotes or documents thus prepared are then circulated after completion.
- the calculation of the check code value takes place according to a protected algorithm, which is applied to the respective image data of the banknotes or documents. Because the bills or documents differ because of the random distribution of fluorescent security fibers in the substrate and these differences are reflected in the image data, the check code calculation algorithm results in different check code values for the individual bills or documents.
- the change to the document corresponds to the addition or variation of a feature that documents the authentication process.
- a printer such as a thermal sublimation printer
- a small spot on the document with color or metal vapor is printed.
- a deliberate influence or change of the document by means of laser light is proposed.
- the specified method is mainly suitable for industrial purposes or large-scale processing of documents, such as for banknote production, and are the proposed printing works, such as thermal sublimation printer or laser beam marking devices, for increasing the security against counterfeiting in the general area of application for small series of documents, such as ticketing - or personalization little suitable.
- the WO 2005/010814 A1 describes a method for producing forgery-proof documents, in particular for the production of ID cards, as well as a corresponding document.
- the properties of the document are digitally signed and applied to the document.
- identifiable bodies are incorporated into the substrate of the document in random distribution.
- personal data is applied to the substrate. From these two properties, an identification feature is formed and stored on the document.
- the US 4,114,032 A describes a method for the production of counterfeit-proof carrier materials, in particular for paper money, credit cards or identification cards, which carrier material has integrated magnetic or magnetizable fibers.
- a device for checking the authenticity of such carrier materials is disclosed.
- the fibers enclosed in the carrier material are counted by means of a scanning or scanning device, wherein the carrier material and the scanner device are moved in a predetermined relative movement to each other.
- the authentication of the carrier material is based on an evaluation of the output signals of the scanner device obtained.
- the WO 03/077197 A1 describes an information carrier, in particular a card, a ticket or a passport, which has a thermally write and optionally rewritable section and a magnetic or electronic data memory.
- This information carrier is provided for the identification of persons in order to allow authorized persons to access correspondingly secured areas.
- the thermally writable portion of this information carrier has a photograph of the authorized person.
- a first and a second data record are stored in the data memory. At least part of the second data set is used to verify the authenticity of the information carrier.
- a photograph of the authorized person is taken, the photo and a first record is stored in the thermally writable portion of the information carrier, a second record is deposited in the magnetic or electronic data storage and subsequently by reading and comparing the first and second data set, the authenticity of the information carrier is checked.
- thermosensitive, repeatedly written and erasable layer As is well known, this layer is well suited for introducing variable or updatable information.
- the US 2002/170966 A1 Describes tamper-proof information carriers which have a digital watermark and another machine-readable code, in particular a barcode, and a method for checking the originality of such information carriers.
- the digital watermark contains an extract of the barcode information.
- the digital watermark is compared to the barcode. If there is a match or a predetermined congruence or sufficient relationship quality of the information carrier is evaluated as authentic.
- the evaluation is carried out by means of a standard computer system which has the necessary programs for the optical recognition of the information, as well as the software for the decryption and authentication. After the digital watermark has been applied, the information carriers signed with it can no longer be changed. If a change in the watermark is absolutely necessary, a new information carrier must be created with a changed watermark.
- EP 0 656 607 A2 becomes a card-shaped information carrier with a plurality of randomly distributed, electromagnetically detectable recognition features described.
- Visually detectable data such as graphics, symbols or the like, are printed on the surface of the card-shaped information carrier. These visually recognizable data are associated with the randomly distributed, magnetic characteristics and deposited in a code memory section of the card-shaped information carrier, in particular via a magnetic strip or a barcode.
- a device is provided which has electromagnetic sensors with which the electromagnetic behavior of the information carrier or its magnetically sensitive particles or recognition features can be detected. The corresponding electrical signals of these sensors are then encoded and stored in the code storage section of the information carrier. On the basis of this stored security code then the card-shaped information carrier can be checked at any time for authenticity.
- One of the objects of the invention is to produce a security print on an information carrier which increases the security against forgery of the information carrier and the representation thereon or to check the security print on the information carrier.
- a security print can be produced or checked, the representation of which also contains information about the print medium-that is, medium information.
- a representation unique to a particular information carrier can be produced.
- a unique information carrier can be provided, wherein due to the representation on the information carrier, the originality of the information carrier is fixed or can be determined.
- a processing device for displaying a security print is connected to a printing mechanism, and the processing device is directly or indirectly connected to a detecting device for detecting the medium information, it becomes possible to obtain the information medium unique to an information carrier read the detection device and processed by the processing device.
- the processing device can thereby enable an identification of the information carrier during the processing of the medium information or a linkage of the medium information with other data.
- the inventive device for processing a representation of a security printing also provides that the processing device is connected to a device for storing and / or retrieving a ciphering key. As a result, different encryption keys for various processing devices can be stored or processed by means of the device.
- the processing device is designed to use a ciphering key stored on an authentication token and / or on a smart card for encrypting and / or decrypting data concerning a security print.
- the encryption key is "portable", for example, a person can be assigned a cipher key, which does not have to be constantly stored on the device. This allows someone with different rights to create or verify security prints on the same device.
- the information carrier for a security printing namely that the medium information is formed by a generated during the production of the print medium by a random process property and / or structure of the print medium and the print medium for thermal input or application of visible representations is formed, is advantageous in that the medium information identifies a single thermally writable information carrier and enables the representation of a thermally applied or introduced security pressure.
- a manufacturability of security printing on the information carrier by commercially available inkjet or laser printers or copiers is severely limited.
- the advantage is that the information carrier on the one hand includes security features in the print medium, so that all information carriers are distinguishable from each other, and on the other hand only with a printing mechanism for thermal input or application of information can be printed. By combining these Features can be achieved an increased security against counterfeiting.
- an embodiment in which the representation to be printed in the form of machine-readable information, in particular as a barcode, Worldcode, Pearlstrings and / or text characters, is placed on and / or in the print medium.
- the representation can be read by an automatic detection device, the information can be further processed by machine.
- the representation in the form of information recognizable by humans is brought onto and / or into the print medium.
- the information can be read and checked even in the event of a failure of mechanical aids.
- the print data is encrypted prior to linking to the media information.
- safety-relevant information in the print data can be protected against unauthorized persons.
- the - medium-readable by the print medium - medium information can not contribute to decrypt the print data, since the encryption of the print data is performed independently of the medium information. Thus, the security against unauthorized reading of the print data is increased.
- a further, advantageous embodiment provides that the medium information is encrypted before being linked to the print data.
- the medium information is encrypted before being linked to the print data.
- Another advantage is achieved when encrypting in a processing device for displaying a security print. This allows an external encryption device be saved.
- An advantageous embodiment is given by the fact that the production-related medium information from a dependent on the location of the representation on the print medium portion of the print medium, in particular only the portion of the surface on which the print representation or is introduced, is used for linking with the print data. This can prevent the representation or parts of the representation from being copied to other locations on the same print medium.
- the presentation is recorded on and / or placed on a paper-like or film-like printing medium. It is advantageous that the printing medium has a flexible shape and the cost of a paper or film-like printing medium are normally lower.
- a card-shaped print medium has the advantage that it is robust and can contain other data carriers.
- a magnetic or chipcard can be used to electronically store the information shown in the illustration.
- An embodiment proves to be advantageous in which the representation is introduced into a printing medium which is provided on at least one side with a thermosensitive layer or at least partially consists of a thermosensitive material or in which the printing mechanism for introducing information on and / or is formed in a thermosensitive material. It is advantageous that no additional material, such as ink or other dyes, must be applied to the printing medium or stored in the printing mechanism. The printing mechanism must therefore be serviced less often.
- the representation is created by a device for thermally introducing information onto a print medium.
- thermally writable materials can be provided with a security print and on the other hand, a representation can be created on a print medium, which has security features that can be influenced thermally.
- the representation captured by a detection device it is also possible for the representation captured by a detection device to be decrypted or the medium information to be encrypted before comparing the medium data extracted from the security print and the medium information. As a result, preparation for comparing medium data and medium information can be easily achieved.
- Another advantage is achieved when a truth value is generated when comparing or decrypting. This makes it possible to decide whether the representation or the print medium on which the representation is located is valid and this information, for example a software program, is passed on. By generating a truth value during decryption, a truth value can be generated without the medium information having to be read out, and it can contribute to a more rapid determination of the validity of the information carrier.
- an embodiment is advantageous in which a structure and / or property of the printing medium formed by luminescent, in particular fluorescent and / or phosphorescent, or radioactive materials is detected or an advantageous development of an information carrier is thereby achieved given that the base material and / or another material is formed by an at least short-term self-radiating material, for example by a luminescent, in particular fluorescent or phosphorescent material, and / or a radioactive material.
- a very forgery-proof medium information can be used as a security feature.
- the afterglow duration of a luminescent material can thereby also be used as a property for the medium information.
- An advantageous embodiment is given by a magnetic, magnetic conductive and / or electrically conductive materials formed structure and / or property is detected by the printing medium or that the base material and / or another material is formed by a magnetic, magnetically conductive and / or electrically conductive material.
- a structure and / or property formed thereby can be detected by structurally simple and cost-effective measuring methods, in particular contactless. As a result, the service life of the measuring or detection devices and the information data carrier can also be increased.
- a structure and / or characteristic of the pressure medium is formed, which is formed by materials which have a different electromagnetic radiation behavior compared to the base material of the pressure medium, in particular a different kind of electromagnetic radiation behavior in a wavelength range of UV radiation, visible light, IR Radiation and / or microwave radiation or if the further material is distinguishable from the base material electromagnetic radiation behavior, in particular in a wavelength range of UV radiation, visible light, IR radiation and / or microwave radiation is formed. Due to the radiation behavior of the pressure medium, a structure and / or property of the pressure medium can thus be detected. It is advantageous that the detection can be done without contact and is therefore to be expected with a lower wear of the devices or the information carrier.
- the medium information may be determined from one or more holograms located on and / or in the print medium, or for at least one hologram-like representation to be applied to and / or in the print medium. It is advantageous that holograms offer a high security against counterfeiting and thus the medium information is less easily forged or copied. Furthermore, a hologram can also be used for checking the authenticity of the printing medium by the human eye.
- the medium information is read from a recording device from the print medium, which comprises a sensor which is selected from a group comprising area camera, line scan, UV sensor and / or IR sensor or a development of a device for Processing a representation of a security printing
- the detection device at least one optical Sensor for detecting the medium information includes, which is selected from a group comprising area camera, line scan camera, UV sensor and / or IR sensor.
- the medium information can not be recognized by the human eye and thus becomes more tamper-proof.
- the medium information is read from a printing device by a detection device comprising a sensor selected from a group consisting of magnetic sensor, eddy current sensor, capacitive sensor and / or inductive sensor.
- a detection device comprising a sensor selected from a group consisting of magnetic sensor, eddy current sensor, capacitive sensor and / or inductive sensor.
- the medium information is read by a detection device from the printing medium, which comprises a SAW (surface acoustic wave) sensor and / or ultrasonic sensor.
- a detection device from the printing medium, which comprises a SAW (surface acoustic wave) sensor and / or ultrasonic sensor.
- SAW surface acoustic wave
- ultrasonic sensor As a result, special vibration properties can be read out, which serve as medium information.
- a surface wave sensor and chemical properties that affect the vibration behavior of the sensor or the pressure medium can be read out.
- the linking of the print data and the medium information takes place by an electronic device, preferably by an electronic device in a card-shaped information carrier, and / or if the processing device comprises an electronic data processing unit, in particular with a microprocessor , which is designed for comparing the detected medium information from the print medium and from a graphical representation of the print medium determined medium data.
- the processing device comprises an electronic data processing unit, in particular with a microprocessor , which is designed for comparing the detected medium information from the print medium and from a graphical representation of the print medium determined medium data.
- complex, quickly executable linkage algorithms can be implemented, so that the combination of the print data and the medium information contributes to increased security against counterfeiting.
- a cipher key or encrypted cipher key for encryption or decryption is a cipher key or encrypted cipher key, in particular with a length of 2 kilobytes, which is located in particular on an electronically readable medium, such as a smart card.
- the encryption key on the electronic data carrier can be read by an electronic processing device without the need for manual key entry.
- it is advantageous that the encryption key can be exchanged, in particular a smart card can be used against a second smart card containing another encryption key. This allows an encryption device to work with multiple encryption keys.
- the device comprises a processing device for linking and encrypting data, a printing mechanism and / or a computing unit connected to the printing mechanism, being authenticated. This will ensure that the proper, authorized devices for the procedure are used.
- the authentication takes place by means of an authentication token and an authentication device or the processing device is connected to an authentication device and the processing device is designed to create a valid representation of a security print only if the authentication device has a valid authentication Token is connected. Additional security can be achieved by the authentication token since only those persons have access to the devices necessary for the procedure which have an authentication token. Only specially authorized persons can create a security print.
- a refinement proves to be advantageous in which a symmetrical encryption algorithm, in particular a triple DES algorithm, is used for the encryption or decryption.
- a symmetrical encryption algorithm in particular a triple DES algorithm
- a cipher key for creating and reading the presentation is needed. Therefore, when issuing the cipher key, it is not necessary to pay attention to who or what device is provided for reading out and which for creating the display.
- a further, advantageous embodiment provides that a representation of the security printing is processed, which is formed by a two-dimensional barcode, in particular a Worldcode, by Pearlstrings and by a plain text or that the representation of security printing by a combination of a two-dimensional barcode, in particular a Worldcode, Pearlstrings and / or plain text is formed.
- a forgery-proof and easily readable machine representation can be created and these are also read due to the clear text in the representation by persons with the naked eye.
- a further advantage is achieved in that the device for storing and / or retrieving the ciphering key comprises a writing and / or reading unit for a smart card or the like. This allows the encryption key to be stored or retrieved on a smart card.
- a smart card has the advantage that it can be easily distributed - for example by post - and can be easily exchanged.
- the electronic data processing unit is designed to execute a software or firmware or in which the software or firmware for encrypting and / or decrypting medium information, a cipher key, print data and / or the Representation of a security printing is formed or if the software or firmware is designed to link medium information, a cipher key, print data and / or the representation of a security print.
- complex algorithms can be implemented, which are independent of the hardware used.
- the software or firmware renewed or a so-called update can be performed.
- the printing mechanism for thermal introduction and / or deletion of representations on and / or in a several times thermally descriptive and erschbaren information carrier is formed or that the printing medium is provided on at least one side with a thermo-reversible printable layer or at least partially consists of a thermo-reversible printable material. It is advantageous that an information carrier can be used several times or the information can be changed on the information carrier.
- a further development proves to be advantageous, in which the processing device is connected to a device for reading, writing and / or deleting electronic storage media of a card-shaped data carrier or the information carrier.
- encryption keys can be read from a card-shaped data carrier or soft or firmware updates can be carried out for the processing apparatus.
- the operability is improved.
- the processing device is connected to a decoding device for processing a representation for a security printing, in particular with a world code decoder.
- the processing apparatus can thereby be made simpler since the decoder need not be included in the processing apparatus.
- the worldcode decoder can decode a world code.
- the device comprises a detection device, which is designed to detect the representation on the print medium and / or the medium information of the print medium. Thereby, the representation or the medium information can be detected directly by the decoder and it can be a more reliable processing of the data of the detection device by the decoding device.
- An embodiment of an information carrier for security printing provides that the random structure is formed on the surface of the base material, for example by elevations and / or depressions.
- This type of structure provides enhanced copy protection because the structure can not be reproduced by an ink or laser copier. Furthermore, a cost-effective production of this superficial structure is possible.
- the printing medium comprises a further material for forming the production-related property and / or structure resulting from a random process.
- the other material consists of fibers.
- fibers By added or incorporated in the print medium fibers easily distinguishable, unique print media can be produced.
- each fiber has its own profile, by which it can be distinguished from other fibers. Fibers can also contribute to increasing the stability or strength of the pressure medium.
- the further material is formed by granular and / or bead-like particles. Grain-like or bead-like particles are particularly easy to handle during production and can produce a uniformly distributed structure in the printing medium with little effort.
- the further material or the base material contains molecule markers.
- molecule markers can only be made visible by special laboratory equipment or microscopes.
- the printing medium is a card-shaped data carrier with a magnetic memory and / or a nonvolatile electronic storage medium.
- the information carrier 1 is formed by a printable printing medium 2, which comprises a base material 3 and a medium information 4 uniquely assigned to the printing medium 2.
- a printable printing medium 2 which comprises a base material 3 and a medium information 4 uniquely assigned to the printing medium 2.
- various information 7 in the form of a representation 29, in particular in the form of a security print 40 up and / or introduced. It is essential that the information carrier 1 is unique due to the production of the print medium 2 and that a security print 40 can be displayed thereon or in it.
- the display 29 of the security print 40 located on the information carrier 1 contains information about the medium information 4.
- the security print 40 can contain graphic elements, symbols, plain text 70, pictograms, logos and various machine-readable representations 29, such as e.g. one-dimensional or two-dimensional bar codes 22, in particular a world code 23, graphic character codes, pearl necklace codes 24 and / or dot codes and the like.
- the security print 40 is embodied such that it also contains information 7 about the medium information 4 of the print medium 2.
- a preferred representation 29 of the security printing 40 a combination of a world code 23, a pearl string code or Pearlstrings 24 and a plain text 70 is used.
- the worldcode 23 is a two-dimensional machine-readable code, the information 7 being represented by the arrangement of circular ring segments arranged around a center.
- the pearl string code or Pearlstrings 24 is a code in which the information 7 by means of information-dependent differently extending or wavy lines and information-dependent different sized dots or "beads" is displayed. Also, at least part of information 7 represented by the pearl necklace code 24 may be displayed as plain text 70 to be read by the human eye.
- the printing medium 2 is preferably card-shaped or sheet-like with a flat upper side 5 and underside 6.
- the information 7 in the form of readable by the human eye information 7 and / or machine-readable information 7 or be introduced.
- Under the human eye readable information 7 is understood to be information that can be read and understood by persons without the aid of complex, technical devices.
- the base material 3 of the printing medium 2 or information carrier 1 gives it the necessary strength and can accommodate further materials 8 and / or be coated with different layers 9.
- the base material 3 can also be located between two layers 9.
- the base material 3 is formed by a paper-like and / or plastic-like material, for example PVC.
- the base material can also be formed by a, in particular at least partially transparent, film.
- the necessary for the information carrier 1 media information 4 is formed by a unique and preferably resulting in a manufacturing process by a random process property or structure and / or caused by a random process, unique feature of the print medium 2.
- the random process is preferably selected such that, due to the size of a result set of the random process, the probability of two identical outputs of the random process - ie the probability of producing two print media 2 with identical properties or characteristics - is very small or nearly impossible.
- the unique feature or the unique property is thus different for each print medium 2, so that two print media 2 can be distinguished on the basis of a measurement or determination of their features or their properties, at least with the aid of a device.
- the production-related medium information 4 can be formed by a structure 10 of the base material 3, by fibers 11, by platelets 12, by particles 13, by beads 14 and / or by additives 15. It is essential for the medium information 4 that this can not be changed without destroying the information carrier 1 or that it is very difficult and very costly to produce a copy of a printing medium 2 with the same medium information 4 as that of the original ,
- the structure 10 may be formed by elevations 16 and / or depressions 17 in the base material 3 and / or an overlying layer 9.
- the elevations 16 can also be formed by a further material 8, for example in the form of fibers 11, platelets 12, particles 13, beads 14 or the like.
- the elevations 16 can by nubs 18, strip- and / or linearly arranged webs 19 may be formed.
- the recesses 17 may be lens-shaped and / or be formed by channel-like recesses 20.
- the medium information 4 by fibers 11 or threads may be located in the base material 3 and / or in a further layer 9. It is also possible that the fibers 11 are located on the upper side 5 and / or the lower side 6 of the pressure medium 2.
- the materials 8 through which the medium information 4 is formed may preferably have different material properties than the base material 3, for example they may have a higher or lower electrical and / or magnetic conductivity, be stronger or weaker than the base material may be magnetized or another radiation and / or electromagnetic wave absorption characteristics.
- the materials 8 may be made of metal or an electrically conductive plastic so that they can be driven by a capacitive or inductive sensor 39. Fig. 6 -registered. It is also possible that the materials 8 are made of one, in particular only on special, spectral regions 21, transparent material.
- the spectral regions 21, at which the material 8 differs from the base material 3 in the absorption and / or reflection behavior are outside the spectral range which can be recognized by a human eye, for example in the UV range or in the infrared range.
- material 8 a luminescent substance.
- substances which have an afterglow duration of different lengths. The afterglow period can form the medium information 4.
- molecular markers can also be used.
- a molecule marker is understood as meaning particles or substances which form a connection with certain molecules in the pressure medium 2 and which can be made visible by a chemical or physical process.
- molecule markers can have fluorescent properties that can be visualized using special microscopes. By arranging the molecule markers on or in the printing medium 2, the medium information 4 can be formed.
- the information carrier 1 may also comprise at least one machine-readable data storage element 25.
- This data storage element 25 is intrinsically connected to the card-shaped information carrier 1, in particular integrated in this or at least partially embedded therein, glued or vapor-deposited on this.
- the data storage element 25 can be formed by a magnetic strip 26 and / or by an electronic chip 27.
- This electronic chip 27 on the card-shaped information carrier 1 can communicate with electronic peripheral units via contact surfaces or contact elements and / or via a coil arrangement integrated in the card body for receiving and / or transmitting electromagnetic alternating fields.
- a magnetic strip 26 and / or a chip 27 for a contact or contactless communication to electronic peripheral units it is of course also possible on the print medium 2 other, known from the prior art data storage elements 25 for preferably variable, but non-volatile deposit of information or To provide data.
- Such a data storage element 25 on the information carrier 1 should therefore be repeatedly written and erasable by a function of the information to be backed up 7, without permanent supply of external energy, the respective information 7 long-term preserving memory element.
- a memory element can thus be provided the aforementioned magnetic strip 26 and / or an EEPROM memory, which is associated with an electronic processing unit, in particular a microcomputer, for processing data.
- This EEPROM memory and the arithmetic unit form the so-called chip 27 of the information carrier 1 in card form.
- an information carrier 1 which can be written on and erased by a thermally reversible method is used.
- the information carrier 1 at least on one of its flat sides 5, 6, a coating 28 or film of a thermosensitive material, as in the prior art, such as from EP 0 473 403 A2 (NCR Corporation) is well known.
- These graphical representations 29 can be composed of a plurality of individual pixels or pixels or be formed from continuous, uninterrupted lines, arcs and the like.
- black / white or monochrome representations it is of course also possible to generate color representations, provided that the writing tools or treatment mechanisms are matched thereto and corresponding color contrast producing material is present on the card-shaped information carrier 1.
- Fig. 5 shows a preferred embodiment of the apparatus 30 for processing and processing a security printing 40 - Fig. 1a, Fig. 1b on an information carrier 1 Fig. 1a, Fig. 1b -.
- the device 30 preferably comprises a processing device 32, a connection board 74 and a printing mechanism 75.
- the device 30 is connected via a connection 73, preferably with a USB connection or an RS232 connection, to a computing unit 37, in particular to a personal computer. connected.
- the processing device 32 is designed to display a representation 29 - Fig. 1a, Fig. 1b - To produce a security print 40 or check.
- the processing device 32 may be connected via a connection 76 with a decoder 77.
- a further embodiment provides for connecting an authentication device 79 to the processing device 32 via a connection 78.
- the processing device 32 is connected via a connection 80 to the connection board 74, to which the printing mechanism 75 is also connected via a connection 82.
- the processing device 32 preferably comprises electronic means which allow at least data encryption or encryption.
- the processing device 32 to a microprocessor, which is designed to execute a software or firmware.
- the microprocessor is designed for communication with other devices or are connected to the microprocessor interface blocks that allow communication according to the RS-232 standard or the USB standard (Universal Serial Bus).
- the decoding device 77 connected to the processing device 32 is designed to generate a printed image 64 from electronic data or information 7.
- Fig. 11 - To produce in electronic form which can be brought for example by the printing mechanism 75 on a printing medium 2.
- the decoding device 77 can preferably also be read from a representation 29 read in by an information carrier 1.
- Fig. 1a Extract and provide this extracted information to the processing device 32.
- the decoder 77 is formed by a world code decoder 81.
- the authentication device 79 connected to the processing device 32 via the connection 78 in one variant of the device 30 comprises an interface to an authentication token 83 that can be connected to the authentication device 79.
- the authentication token 83 is a physical element which has one or more a plurality of ciphering keys 44 or encrypted ciphering keys 44, in particular password-encrypted ciphering keys 44, which are used for a correct function or for authentication of the processing apparatus 32.
- the authentication token 83 can ensure that only the owner of a valid authentication token 83 has access to the processing device 32. It is also possible that the processing device 32 is designed to be fully functional only on a specific authentication token 83 or a specific encryption key 44 on the authentication token 83.
- the encryption key 44 located on the authentication token 83 can also be used for encryption and decryption of information 7. It can thereby be achieved that the device 30 is protected against unauthorized access or a security pressure 40.
- Fig. 1a, Fig. 1b can be created only by means of matching authentication tokens 83 and processing device 32.
- the authentication token 83 is preferably provided by a smart card with a chip 27 or a magnetic strip 26. Fig. 1a, Fig. 1b - educated.
- the chip 27 comprises at least one nonvolatile memory. It is also possible that the authentication token 83 is also equipped with a processor.
- the authentication device 79 may exchange data with the authentication token 83 through contacts or by radio.
- the authentication token 83 may also be a card, in particular a smart card, with a thermoreversible printable material, so that those can be printed by the printing device 75.
- the connection board 74 of the device 30 is preferably designed as a backplane 84 and comprises a plurality of interfaces, preferably RS-232 and USB interfaces.
- the processing device 32 is connected to the printing mechanism 75 via the interfaces of the connection board 74, the processing device 32 being connected to the connection board 74 via the connection 80 and the printing mechanism 75 being connected to the connection board 74 via the connection 82.
- the connection 80 is preferably formed by a connection according to the RS-232 standard. It is further also possible to connect the connection board 74 via connection 73 to the arithmetic unit 37.
- the printing mechanism 75 preferably comprises a printing device 34 - Fig. 6 for the thermo-reversible writing of an information carrier 1 and a detection device 33 Fig. 6 for capturing the medium information 4 Fig. 2a to Fig. 2g - The information carrier 1.
- the printing device 34 includes a printhead for creating representations 29 -. Fig. 1a, Fig. 1b - with a resolution of preferably 300 dpi.
- the computing unit 37 connected to the device 30 is equipped with an authentication software, an encryption software 85 or a token system for authenticating the device 30.
- An authentication device 87 can also be connected to the arithmetic unit 37 via a connection 86.
- connections 73, 76, 78, 80, 82, 86 are preferably formed by compounds according to the RS232 standard. It is also possible to use one or more of these connections 73, 76, 78, 80, 82, 86 through USB connections or wireless connections.
- a wireless connection can be made by means of a radio transmission, for example by means of a connection according to the Bluetooth standard, or an optical transmission form, for example by means of an infrared connection.
- Fig. 6 showed a further embodiment of the device 30, with which the information carrier 1 can be checked and preferably described and deleted.
- the device 30 comprises a control device 31 with a processing device 32, a detection device 33, a printing device 34, preferably a reading and writing device, a storage unit 35 and a guide mechanism 36.
- the control device 31 serves to coordinate the individual devices and is connected to them.
- the control device 31 can also be connected to an external computing unit 37, in particular a personal computer, or a local or global network.
- the connection to the individual units or devices can be made via lines or at least partially via wireless connections, for example infrared connections or radio links.
- the control device 31 also includes the processing device 32. It is also possible that the processing device 32 is formed by a stand-alone device. Another possibility is to equip the control device 31 with software or firmware which can take over the tasks of the processing device 32.
- the control device 31 or the processing device 32 can also be connected to an external encryption device 38, in particular to an encryption accelerator card.
- the tasks of the processing device 32 may also be performed by software on a computing unit 37, such as a personal computer.
- the detection device 33 preferably comprises at least one sensor 39, with which an information 7 located on the information carrier 1 can be detected.
- the detection device 33 preferably also comprises a sensor 41, which is used to detect the medium information 4 - Fig. 1a -
- the pressure medium 2 is formed.
- the detection device 33 may also be designed to detect properties of luminescent or otherwise self-radiating materials 8 or additives 15.
- the radioactivity of the printing medium 2 or of the information carrier 1 can be measured by means of a Geiger-Müller counter connected to the control device 31, by means of a scintillation counter or by means of semiconductor detectors, and from this the medium information 4 can be obtained.
- the printing medium 2 is preferably irradiated with electromagnetic waves or otherwise energized before the measurement or during the measurement, in order to bring about a radiation of the material.
- the sensor can also by a in the ultraviolet (UV) range 21 of the light sensitive sensor or in the infrared (IR) range sensitive sensor, for example by a responsive to UV or IR radiation semiconductor element may be formed.
- the senor 39 may also include a controller 42 for the detection device 33, which is connected to the control device 31 in order to relieve the control device 31 or to provide an interface compatible with the control device 31.
- the printing device 34 of the device 30 is preferably designed for printing on the information carrier 1.
- a printhead 43 suitable for a thermally reversible printing process is used.
- information can be 7 brought to the information carrier 1 and changed or deleted if necessary.
- the storage unit 35 of the device 30 may be connected to the control device 31 for storing or retrieving data.
- program data for a control program or other data in particular one or more encryption keys 44 - Fig. 12 . Fig. 13 or encrypted encryption key 44.
- the encryption key or keys 44 can be called up by the control device 31 or the processing device 32.
- the storage unit 35 may comprise a removable medium, in particular a smart card.
- the device 30 is preferably also equipped with a guide mechanism 36.
- the guide mechanism 36 preferably comprises a plurality of guide rollers 46, guide plates or guide rails 47 and preferably also a counter-pressure roller 48.
- the guide mechanism 36 serves to guide or convey an information carrier 1, preferably a card-shaped information carrier 1.
- the counter-pressure roller 48 is opposite to the printing device 34 or arranged the printhead 43 and serves to support the information carrier 1 in a printing operation or in an erase operation.
- control device 31 may also be connected to an input and output device.
- the input device may be in the form of a keyboard, or by a touch screen.
- the output device can be formed by indicator lights, for example LEDs, a liquid crystal display or by a screen, for example by a touch screen.
- the device 30 can also comprise a data interface 45, which is used to describe a data storage element 25.
- a data interface 45 which is used to describe a data storage element 25.
- Fig. 1a, Fig. 1b - For example, a magnetic strip 26 - Fig. 1a, Fig. 1b - or a chip 27 - Fig. 1a, Fig. 1b -, is trained.
- a further object of the device 30 according to the invention may be that in a corresponding machine-readable data storage element 25- Fig. 1a, Fig. 1b -, ie in a magnetic strip 26 - Fig. 1a, Fig. 1b - or a chip 27 - Fig. 1a, Fig. 1b - to read stored information or data, either to process itself or forward for data processing to higher-level units and at least part of the changed or current data in optically recognizable form or in the form of a representation 29 - Fig. 1a, Fig.
- the representation of the data of the data storage element 25 can also be in the form of a security print 40. Fig. 1a, Fig. 1b - respectively.
- the device 30 according to the invention can therefore be used to permanently or at least extract the data stored in the data storage element 25, such as a remaining balance, changed authorizations, a history of the use of the information carrier 1, the current bonus points or the like to write or print on the information carrier 1 with visibility for weeks or years. These visual images, which are recognizable by the human eye, are then often changeable or updatable by subsequent thermal treatments by means of the device 30.
- card-shaped information carrier 1 with any machine-readable information 7, such as one or two-dimensional bar codes, graphic character or point codes and the like., But also with plain text information, such as Signs, letters, graphics, logos, pictograms and the like. Be provided.
- machine-readable information 7 such as one or two-dimensional bar codes, graphic character or point codes and the like.
- plain text information such as Signs, letters, graphics, logos, pictograms and the like.
- the device 30 is also used for processing, in particular for printing or writing, deleting as required or rewrite at least one side of card-shaped information carriers 1.
- Under information carrier 1 are mainly in your format standardized, largely made of plastic card body, especially so-called Smart Cards, understood to contain visible and / or invisible information 7 to the human eye.
- These information carriers 1 are widely used as an identification or identification card, as an authorization card for the use of services, as verification means for access or use authorizations, as authorization means for transactions, as means of payment and the like.
- the information carrier 1 to be processed with the device 30 has other formats, in particular small or large-area formats.
- overwriting or rewriting device 30 i. to delete and optionally rewrite sheet-shaped information carriers 1 in DIN A4 format or larger use.
- the size of the information carrier 1 to be processed depends only on the dimensioning of the device 30 and the size of the device 30 and the individual functional elements are virtually unlimited. Merely due to the preferred, but not limited to the embodiment of the device 30 as a card processing device, for the sake of simplicity, card-shaped information carriers 1 are frequently referred to.
- the device 30 is here as a mobile checking unit 49, which may include a detection device 33, an output device 50, an input device 51, a transmission device 52.
- the transmission device 52 can be formed by a radio module, for example by a Bluetooth module, by an infrared module or by an interface module for a cable transmission, for example a USB module.
- the mobile checking unit 49 is preferably provided with a handle, in the immediate vicinity of which at least part of an input device 51, in particular a push-button, is arranged.
- the checking unit 49 is connected via a radio module to a computing unit 37.
- the arithmetic unit 37 may be connected to an authentication device 87 in order to exclude unauthorized users from use.
- the checking unit 49 may also include an authentication device 77, in particular a world code decoder 81.
- Fig. 8 to Fig. 10b are various sensors 39, 41 for detecting a representation 29 - Fig. 1a on the information carrier 1 or for recording the medium information 4 Fig. 1a - The information carrier 1 shown.
- Fig. 8 shows a sensor 39, 41, which includes a camera 53.
- the camera 53 may be an area camera or a line camera.
- the camera 53 can show increased sensitivity in the desired area 21.
- a filter 54 in front of the sensor 39, 41, in particular in front of the camera 53, in order to be able to examine a special spectral region 21.
- a structured, light beam deflecting filter 54 for example a grating, in particular a grating or a hologram-adapted grating, or a lens in order to be able to detect the desired medium information 4.
- the information carrier 1 is illuminated or illuminated by a lighting device 55.
- the illumination device 55 may be formed by a light emitting diode, a laser diode or a gas discharge lamp.
- the illumination device 55 may also be pulsed, for example, synchronously to a sampling frequency of the sensor 39, 41, in particular the camera 53, operated become.
- the illumination device 55 can also be made multi-colored, in particular such that different colors are switched on at different times.
- the connection of the colors can in turn be carried out with a sampling frequency or readout frequency of the sensor 39, 41 synchronous frequency. This can also be a persistence of one or more luminescent materials 8 or additives 15 -. Fig. 2d to Fig. 2g - be measured or recorded.
- the sensor 41 preferably comprises a coil 56 and preferably also a coil core 57 and a controller 58.
- This sensor 41 can be used to read a medium information 4 of the information carrier 1 containing magnetic or magnetically conductive materials 8. It is also possible to use two coils 56, wherein one coil is used as a test coil and another coil 56 as a measuring coil.
- the coils can act or measure from one side of the information carrier 1 or from both sides of the information carrier 1 onto the printing medium 2 or the information carrier 1.
- the spool core 57 may also be shaped such that the spool core 57 adjoins both sides of the information carrier 1.
- a further variant of a sensor 41 is shown, in which the medium information 4 - Fig. 1a, Fig. 1b - Is determined by capacitors 59.
- the capacitors 59 may be applied to one side of the information carrier 1 or from both sides.
- the capacitors 59 necessary for determining the medium information 4 are preferably connected to a controller 60 or evaluation circuit.
- the controller 60 may be connected to the control device 31 or at least partially integrated therein.
- the information carrier 1 can be stationary relative to the sensor 41 or can be moved past with a relative movement.
- the relative speed of the information carrier 1 is measured or a time path diagram is determined.
- the sensor 41 for detecting the medium information 4 - Fig. 1a, Fig. 1b - the detection device 33 - Fig. 6 and Fig. 7 - Can also be formed by a SAW (surface acoustic wave) sensor or ultrasonic sensor.
- SAW surface acoustic wave
- a SAW sensor or SAW (Surface Acousitc Wave) sensor chemical properties of the pressure medium 2 can be detected, which form a medium information 4.
- the surface of the sensor which preferably comprises a piezoelectric element, reacts with the substances on the printing medium and thereby the oscillation capability of the sensor is measurably influenced.
- an ultrasonic sensor acoustic properties of the pressure medium 2 can be used to determine a medium information 4 of the pressure medium 2, for example, the vibration behavior.
- Fig. 11 is a method of creating security printing 40 - Fig. 1a, Fig. 1b - shown.
- print data 61 which contain information, and the medium information 4 are forwarded to a linking algorithm 62.
- the data or information linked by the linking algorithm 62 is then forwarded to an encryption algorithm 63.
- the encryption algorithm 63 together with an encryption key 44, generates a print image 64 from the input data of the encryption algorithm 63.
- the generated print image 64 is printed by the printing device 34 - Fig. 6 - as illustration 29 - Fig. 1a, Fig. 1b - or security pressure 40 - Fig. 1a, Fig. 1b - brought to the information carrier 1.
- the print data 61 can be different information 7 - Fig. 1a, Fig. 1b - include, for example, data identifying a person, an entrance ticket or a ticket.
- Different information 7 can be used to identify a person. For example, the name, the date of birth, an identification number, a photo and / or other biometric data, such as information 7 about a fingerprint, nature of the retina of the eye, various body dimensions or other properties that may be used to identify a person. It is also possible to incorporate information 7 of a person's voice or electrical characteristics, such as an ECG (electrocardiogram) or an EEG (electro-encephalography), into the print data 61.
- ECG electrocardiogram
- EEG electro-encephalography
- the medium information 4 - Fig. 2a to Fig. 2g is - by means of the detection device 33 - Fig. 6 - From the nature of the print medium 2 - Fig. 1 - of the information carrier 1 - Fig. 1 - determined.
- the nature or properties that define the medium information 4 are preferably formed by the random process in the production of the print medium 2.
- the detection device 33 parts of the nature of the print medium 2 are recorded, which then form the medium information 4.
- the printing medium 2 can be scanned with a grid spacing of measuring points of 0.5 mm. During scanning, it can be determined which nature of the print medium 2 is at the measuring points.
- the texture can be used as a truth value, for example if a fiber 11 - Fig. 2b to Fig. 2d - Is present at the measuring point or not, or determined as a value with a higher resolution, in particular an 8-bit or 16-bit value of the color of the measuring point. It is also possible to observe a measuring point over a period of time, and to record the time profile of the measured value by means of the detection device 33. As a result, for example, a persistence of a luminescent substance can be measured. The determination of which parts of the nature of the print medium 2 are detected can either be chosen to be the same for each information carrier 1 or from the print data 61, ciphering keys 44 and / or from the location of the representation 29. Fig.
- the locations of the measuring points can be selected depending on the name or other data of the person.
- the locations of the measurement points may depend on the encryption key 44 used.
- Another possible embodiment provides to use only those properties or properties of the printing medium 2 as medium information 4, which are located at the location of the representation 29 or the location of the measuring points can depend on the location of the representation 29.
- medium information 4 can be used from an upper surface section of the surface or vice versa.
- the linking algorithm 62 and the encryption algorithm 63 may be used in the control device 31 - Fig. 6 or processing device 32 - Fig. 6 - be implemented. In this case, it is preferable to use the linking algorithm 62 or the encryption algorithm 63 uses descriptive or executable software or firmware which is executed by a microprocessor in the control device 31 or in the processing device 32.
- the command sequence of the linking algorithm 62 or the encryption algorithm 63 is stored in an electronic or magnetic storage medium, which is located in the microprocessor or in an external memory.
- an encryption algorithm 63 is used as the linking algorithm 62.
- the medium information 4 is used as a ciphering key 44 with which the print data 61 is encrypted.
- the cipher key 44 is preferably in the memory unit 35 - Fig. 6 - saved.
- the length of the ciphering key 44 may be of a length customary for encryption algorithms 63, for example 56 bits, 64 bits, 128 bits or 512 bits or a length of 2 kbytes. It is also possible that the cipher key 44 is stored in encrypted form in the storage unit 35, for example, the cipher key 44 may be encrypted by a password.
- Fig. 12 a further variant of the method for creating a security print 40 is shown.
- the medium information 4 and / or the print data 61 can each be supplied to an encryption algorithm 63 before linking.
- the linking algorithm 62 encrypted print data 61 or an encrypted medium information 4 are then linked.
- the data of the linking algorithm 62 it is then possible for the data of the linking algorithm 62 to be transferred to an encryption algorithm 63.
- Various encryption algorithms 63 may also be used or applied several times in an encryption.
- a method for checking a security pressure 40 is shown.
- the illustration 29 - Fig. 1a, Fig. 1b - Read by an information carrier 1 by a detection device 33 and passed to a decryption algorithm 65.
- the decryption algorithm 65 decrypts the read-in data of the representation 29 by means of an encryption key 44 and forwards the decrypted data to an extraction algorithm 66.
- the extraction algorithm 66 divides the data into information data 67 and medium data 68, which possibly still by a decryption mechanism 65 and decrypted with cipher key 44.
- the medium information 4 of the information carrier 1 is read in by the detection device 33 and forwarded to a comparison algorithm 69, which also receives the extracted medium data 68.
- the comparison algorithm 69 compares the medium data 68 obtained from the display 29 and to represent the medium information 4 with the medium information 4 read directly from the detection device 33, and generates a truth value 72 or information regarding the coincidence of medium data 68 and medium information 4. It is also possible not to decrypt the encrypted medium data 68, but to encrypt the directly read medium information 4 and then to compare the encrypted medium data 68 with the encrypted medium information 4.
- the extraction algorithm 66 can also be embodied such that a truth value 71 is generated which provides information about the validity of the representation 29 on the information carrier 1. This can be achieved by the representation 29 also comprising information 7 with which errors in the representation 29 can be recognized. Such information 7 may be redundant information 7 or for each representation 29 consistent test information. The errors can be detected, for example, by the use of a Hamming code in the representation 29, as is well known from the information or coding theory.
- encryption algorithms 63 different types of algorithms can be used. For example, symmetric encryption algorithms 63, such as an RC2, RC4, RC5, DES, Triple DES, or AES algorithm may be used.
- the DES (Digital Encryption Standard) algorithm is understood to mean an encryption algorithm that uses a 56-bit cipher key.
- the Triple DES algorithm uses the DES algorithm three times in succession.
- Asymmetric encryption algorithms 63 may also be used for encryption.
- hash algorithms in particular MD5, SHA-1 or RIPEMD-160, can also be used.
Landscapes
- Credit Cards Or The Like (AREA)
Claims (11)
- Dispositif permettant le traitement d'une représentation (29) d'une impression de sécurité (40) sur un support d'informations (1), ledit support d'informations (1) comportant un support d'impression (2) avec un matériau de base (3) et une information du support (4) conditionnée par le mode de fabrication et obtenue par un processus stochastique, un dispositif de traitement (32) pour la représentation (29) de l'impression de sécurité (40) étant reliée à un dispositif pour stocker et/ou télécharger une clé de chiffrage (44) et à un mécanisme d'impression (75), et ledit dispositif de traitement (32) est relié directement ou indirectement à un dispositif de détection (33) destiné à découvrir l'information du support (4), caractérisé en ce que le mécanisme d'impression (75) est configuré pour entrer des informations sur et/ou dans un matériau thermosensible et en ce que le dispositif de traitement (32) est relié à un dispositif d'authentification (79), et le dispositif de traitement (32) est configuré pour établir une représentation (29) valide d'une impression de sécurité (40) uniquement lorsque le dispositif d'authentification (79) est relié à un jeton d'authentification (83) valide, et en ce que le dispositif de traitement (32) est configuré pour utiliser la clé de chiffrage (44), stockée sur le jeton d'authentification (83), tel qu'une carte à puce, afin de coder et/ou décoder des données concernant une impression de sécurité (40).
- Dispositif selon la revendication 1, caractérisé en ce que le dispositif de détection (33) comporte au moins un capteur optique pour détecter l'information du support (4), lequel est choisi dans un groupe contenant des caméras surfaciques, des caméras du type capteur en peigne, des capteurs UV et/ou des capteurs IR.
- Dispositif selon la revendication 1, caractérisé en ce que le dispositif pour stocker et/ou télécharger la clé de chiffrage (44) comporte une unité d'écriture et/ou de lecture pour une carte à puce ou tout élément similaire.
- Dispositif selon l'une quelconque des revendications 1 à 3, caractérisé en ce que le dispositif de traitement (32) comporte une unité électronique de traitement des données, en particulier avec un microprocesseur, laquelle est réalisée pour comparer l'information (4) détectée du support d'impression (2) et de données du support (68) déterminées à partir d'une représentation (29) graphique sur le support d'impression (2).
- Dispositif selon la revendication 4, caractérisé en ce que l'unité électronique de traitement des données est configurée pour l'exécution d'un logiciel ou d'un microprogramme.
- Dispositif selon la revendication 5, caractérisé en ce que le logiciel ou microprogramme est conçu pour coder et/ou décoder l'information du support (4), une clé de chiffrage (44), des données imprimées (61) et/ou la représentation (29) d'une impression de sécurité (40).
- Dispositif selon la revendication 5 ou 6, caractérisé en ce que le logiciel ou microprogramme est conçu pour combiner l'information du support (4), une clé de chiffrage (44), des données imprimées (61) et/ou la représentation (29) d'une impression de sécurité (40).
- Dispositif selon la revendication 1, caractérisé en ce que le mécanisme d'impression (75) est conçu pour entrer et/ou effacer thermiquement des représentations (29) sur et/ou dans un support d'informations (1) sur lequel des informations ont été écrites et/ou effacées thermiquement à plusieurs reprises.
- Dispositif selon l'une quelconque des revendications 1 à 8, caractérisé en ce que le dispositif de traitement (32) est relié à un dispositif pour lire, écrire et/ou effacer des supports d'enregistrement électroniques d'un support de données en forme de carte ou du support d'informations (1).
- Dispositif selon l'une quelconque des revendications 1 à 9, caractérisé en ce que le dispositif de traitement (32) est relié à un dispositif de décodage (77) destiné à traiter une représentation (29) pour une impression de sécurité (40), en particulier à un décodeur de code universel(81).
- Dispositif selon la revendication 10, caractérisé en ce que le dispositif de décodage (77) comporte, pour le traitement d'une représentation (29) pour une impression de sécurité (40), un dispositif de détection (33) qui est configuré pour détecter la représentation (29) sur le support d'impression (2) et/ou l'information (4) du support d'impression (2).
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/AT2007/000151 WO2008119087A1 (fr) | 2007-04-03 | 2007-04-03 | Procédé pour la réalisation et la vérification d'un document à impression de texte en clair sûr, et dispositif et support d'information à cet effet |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| EP2001688A1 EP2001688A1 (fr) | 2008-12-17 |
| EP2001688B1 true EP2001688B1 (fr) | 2014-01-15 |
Family
ID=39048841
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP07718368.9A Not-in-force EP2001688B1 (fr) | 2007-04-03 | 2007-04-03 | Equipement pour procéder une présentation d'une impression de sécurité sur un support d'informations |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP2001688B1 (fr) |
| WO (1) | WO2008119087A1 (fr) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102012022037A1 (de) * | 2012-11-09 | 2014-05-15 | Heidelberger Druckmaschinen Ag | Sicherheitsvorrichtung zur Herstellung von Sicherheitsetiketten und Sicherheitsetikett |
| DE102014214548B4 (de) * | 2014-07-24 | 2022-10-13 | Morpho Cards Gmbh | Verfahren zur Herstellung eines Dokuments |
Family Cites Families (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| NL7406230A (fr) * | 1973-05-11 | 1974-11-13 | ||
| US5601931A (en) * | 1993-12-02 | 1997-02-11 | Nhk Spring Company, Ltd. | Object to be checked for authenticity and a method for manufacturing the same |
| US20020170966A1 (en) * | 1995-07-27 | 2002-11-21 | Hannigan Brett T. | Identification document including embedded data |
| DE10162537A1 (de) * | 2001-12-19 | 2003-09-04 | Norbert Hampp | Verfahren zur Authentizitätssicherung von Dokumenten |
| GB2385299A (en) | 2002-03-08 | 2003-08-20 | Ec Smart | Thermally writeable card, ticket or pass with holder's image |
| AU2003235091A1 (en) * | 2002-04-23 | 2003-11-10 | Mitsubishi Plastics, Inc. | Information recording / displaying card, image processing method using same, and image processor |
| WO2005010814A1 (fr) * | 2003-06-25 | 2005-02-03 | Tbs Holding Ag | Document non falsifiable et son procede d'obtention |
| AT502714B1 (de) * | 2005-10-25 | 2012-04-15 | Binder Consulting Gmbh | Verfahren zur erstellung und überprüfung eines sicheren klartextdruckes, sowie vorrichtung und informationsträger hierfür |
-
2007
- 2007-04-03 EP EP07718368.9A patent/EP2001688B1/fr not_active Not-in-force
- 2007-04-03 WO PCT/AT2007/000151 patent/WO2008119087A1/fr not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2008119087A1 (fr) | 2008-10-09 |
| EP2001688A1 (fr) | 2008-12-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69524098T2 (de) | Nicht veränderbare sich selbst verifizierende gegenstände | |
| DE60121814T3 (de) | "sicherheits-, identifikations- und verifikationssystem" | |
| US8542094B2 (en) | Apparatus and method for secure detection of an item and a method of securing access to information associated with the item | |
| DE212011100113U1 (de) | Sicherheitsverbesserungen für flexible Trägermaterialien | |
| DE10204870B4 (de) | Verfahren zur Fälschungssicherung eines Wertträgers, Wertträger und Verfahren zur Überprüfung seiner Echtheit | |
| WO2004070667A2 (fr) | Procede de production de marques de securite | |
| WO2001039108A2 (fr) | Systeme d'individualisation pour un article | |
| EP2807787B1 (fr) | Clef dérivée d'un document | |
| US8235286B2 (en) | Card capable of authentication | |
| RU2435218C2 (ru) | Карта с возможностью аутентификации | |
| DE102006049284B4 (de) | Verfahren zur Erstellung und Überprüfung eines sicheren Klartextdruckes sowie Vorrichtung und Informationsträger hierfür | |
| EP2001688B1 (fr) | Equipement pour procéder une présentation d'une impression de sécurité sur un support d'informations | |
| EP2210225B1 (fr) | Document avec un dispositif d'affichage intégré, procédé de fabrication d'un document, et appareil de lecture | |
| EP4051509B1 (fr) | Vérification d'un document de sécurité sur la base de morphologies de gouttelettes | |
| AU2020227153B2 (en) | Verifiable access credential | |
| EP2930699A1 (fr) | Caractéristique de sécurité comprenant une section de code et de marquage | |
| DE102005013962B4 (de) | Dokumentenpapier mit aufgedrucktem Sicherheitselement und Verfahren zum Erstellen fälschungsgeschützter Dokumente | |
| EP2210218B1 (fr) | Document avec un dispositif d'affichage intégré | |
| EP3356980B1 (fr) | Procédé et appareil pour l'authentification d'un objet ou d'une personne moyennant un élément de sécurité construit de manière modulaire | |
| DE60124283T2 (de) | Optischer Datenträger mit einem auf optischer Beugung basierenden Code, und zugehöriges Lesegerät | |
| DE102007016329B4 (de) | Authentifizierbares Etikett sowie Vorrichtung zum Authentifizieren eines authentifizierbaren Etiketts | |
| RU2803761C2 (ru) | Верифицируемые учетные данные для доступа | |
| EP3548300B1 (fr) | Procédé de fabrication et de vérification d'un document de sécurité et document de sécurité | |
| CN1862600A (zh) | 门票管理系统及门票管理方法 | |
| DE102005032704A1 (de) | Wertdokumente, Herrstellung und Prüfung von Wertdokumenten |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20080331 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA HR MK RS |
|
| 17Q | First examination report despatched |
Effective date: 20100817 |
|
| RBV | Designated contracting states (corrected) |
Designated state(s): BE BG CH CY CZ DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BINDER CONSULTING GMBH |
|
| REG | Reference to a national code |
Ref country code: DE Ref legal event code: 8566 |
|
| DAX | Request for extension of the european patent (deleted) | ||
| GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
| INTG | Intention to grant announced |
Effective date: 20130806 |
|
| GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): BE BG CH CY CZ DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: ABP PATENT NETWORK AG, CH |
|
| REG | Reference to a national code |
Ref country code: NL Ref legal event code: VDEP Effective date: 20140115 |
|
| REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140515 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140515 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: LU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140403 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| 26N | No opposition filed |
Effective date: 20141016 |
|
| REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140403 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 10 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140416 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140115 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20070403 |
|
| REG | Reference to a national code |
Ref country code: CH Ref legal event code: PCAR Free format text: NEW ADDRESS: OTHMARSTRASSE 8, 8008 ZUERICH (CH) |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 11 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 12 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20180321 Year of fee payment: 12 |
|
| GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20190403 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190403 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20200312 Year of fee payment: 14 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20200311 Year of fee payment: 14 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20200326 Year of fee payment: 14 |
|
| REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20210430 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210430 |