B42D25/309

Security document and method for the authentication thereof

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

Security document and method for the authentication thereof

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

Method for the insertion of guilloche patterns, method for the extraction of guilloche patterns, method for the authentication of these guilloche patterns and devices for implementation

A method of inserting guilloche patterns in a document, each guilloche pattern being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure using an operation of determining an insertion intensity of each guilloche pattern previously generated on the basis of a mid-gray level of the document near said guilloche pattern. A device for implementing this insertion method. The method further provides for extracting guilloche patterns from a secure document likely to be degraded by determining a contrast card of at least one portion of the secure document that includes the guilloche patterns, identifying, on this contrast card an optimal percolation trajectory, and extracting the optimal percolation trajectory, said trajectory corresponding to the guilloche pattern. The method further provides for authentication of the guilloche patterns of a secure document likely to be degraded, by the extraction operations, and comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.

Method for the insertion of guilloche patterns, method for the extraction of guilloche patterns, method for the authentication of these guilloche patterns and devices for implementation

A method of inserting guilloche patterns in a document, each guilloche pattern being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure using an operation of determining an insertion intensity of each guilloche pattern previously generated on the basis of a mid-gray level of the document near said guilloche pattern. A device for implementing this insertion method. The method further provides for extracting guilloche patterns from a secure document likely to be degraded by determining a contrast card of at least one portion of the secure document that includes the guilloche patterns, identifying, on this contrast card an optimal percolation trajectory, and extracting the optimal percolation trajectory, said trajectory corresponding to the guilloche pattern. The method further provides for authentication of the guilloche patterns of a secure document likely to be degraded, by the extraction operations, and comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.

Identification document with dynamic window

An identification document including a multilayer laminate having a core layer defining an opening therethrough, and a dynamic window in the opening. The dynamic window includes an optically variable coating on at least a front or a back of the dynamic window. The optically variable coating appears transparent when viewed from the front of the identification document in light transmitted through the dynamic window from the back of the identification document toward the front of the identification document, and appears nontransparent when viewed from the front of the identification document in light reflected from the front of the identification document. Fabricating an identification document with a dynamic window includes forming an opening in a core layer, positioning a dynamic window in the opening, and plate laminating the core layer and the dynamic window between at least one outer layer on each side of the core layer.

Identification document with dynamic window

An identification document including a multilayer laminate having a core layer defining an opening therethrough, and a dynamic window in the opening. The dynamic window includes an optically variable coating on at least a front or a back of the dynamic window. The optically variable coating appears transparent when viewed from the front of the identification document in light transmitted through the dynamic window from the back of the identification document toward the front of the identification document, and appears nontransparent when viewed from the front of the identification document in light reflected from the front of the identification document. Fabricating an identification document with a dynamic window includes forming an opening in a core layer, positioning a dynamic window in the opening, and plate laminating the core layer and the dynamic window between at least one outer layer on each side of the core layer.

Security document and method for the authentication thereof

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

Security document and method for the authentication thereof

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

Embedding security information in an image

A method for producing an identification article is described. The method includes associating one or more data items with one or more line patterns, where the line patterns include one or more line segments. A particular data item is associated with at least a subset of line segments and the particular data item corresponds to an attribute of a user of the identification article. The method further includes integrating the line patterns with graphical features of the identification article. The graphical features being discernable by a human eye and the subset of line segments is indiscernible by the human eye. The method includes identifying a region of the identification article that includes the subset of line segments associated with the particular data item and associating the particular line pattern with an identifying feature of the user.

METHOD AND APPARATUS FOR DETECTION OF COUNTERFEIT AND/OR REUSED STAMPS

A method is disclosed which is performed by at least one first apparatus. In the method, information indicative of at least one characteristic of a franking is obtained. It is determined whether or not the franking is a counterfeit franking and/or a reused franking based on the obtained information or based on the obtained information and based on reference information indicative of at least one characteristic of a franking. The at least one characteristic includes at least one of a physical characteristic of the franking, a visual characteristic of an image provided on the franking, and/or a characteristic based on at least one material of the franking.