Method of authenticating and/or identifying a security article

09811723 · 2017-11-07

Assignee

Inventors

Cpc classification

International classification

Abstract

A method of authenticating and/or identifying a security article including a first image includes superimposing at least partially the first image of the article with a second image. The second image may be produced by an electronic imager. The method further includes performing a relative movement between the first and second images so as to make it possible to observe an item of information relating to authentication and/or identification of the security article during the relative movement between the first and second images.

Claims

1. A method for authenticating and/or identifying a security article comprising a first image, the method comprising: displaying on an electronic imager a second image produced by the electronic imager or projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article, at least partially superimposing the first image of the security article with the second image, and performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images, and an effect of motion or of animation being observed during the relative motion between the superimposed first and second images.

2. The method as claimed in claim 1, wherein pixels of a screen serve at least partially to form the second image in the form of a revelation frame.

3. The method as claimed in claim 1, wherein the security article comprises a zone which is at least partially transparent, translucent, or of reduced opacity, wherein the zone includes the first image.

4. The method as claimed in claim 3, wherein the zone is at least a partially transparent window.

5. The method as claimed in claim 1, wherein the second image is electronically displayed on a screen.

6. The method as claimed in claim 1, further comprising projecting the second image on a background or on the security article.

7. The method as claimed in claim 1, wherein the relative motion of the first image with respect to the second image is a translation and/or rotation motion.

8. The method as claimed in claim 1, wherein the relative motion is generated by a displacement of an electronic imager and/or by a displacement of the security article.

9. The method as claimed in claim 1, wherein the relative motion is generated by a modification of the second image.

10. The method as claimed in claim 1, wherein the second image is electronically displayed or projected from a liquid crystal display (LCD).

11. The method as claimed in claim 1, wherein the first image and the second image exhibit polarization properties.

12. The method as claimed in claim 11, wherein the second image is produced using a polarized light and the first image comprises a polarizing filter.

13. The method as claimed in claim 1, wherein, prior to the authentication and/or identification information item being observable during the relative motion between the first and second images, the first and second images are positioned in an orientation in which one of the first and second images partially masks the other of the first and second images.

14. The method as claimed in claim 1, wherein the security article comprises several different first images and/or several different second images are electronically displayed or projected.

15. The method as claimed in claim 1, wherein the second image is based on a photo and/or video of the first image of the security article.

16. The method as claimed in claim 1, wherein the relative motion between the first and second images is a physical motion between the security article and an electronic imager displaying or projecting the second image.

17. The method as claimed in claim 1, wherein the effect of motion or of animation is of interleaved images.

18. A method for authenticating and/or identifying a security article comprising a first image, comprising: displaying on an electronic imager a second image produced by the electronic imager or projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article, at least partially superimposing the first image of the security article with the second image, and performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images, wherein the first image comprises a revelation frame and the second image comprises a combined image including at least two interleaved images, the combined image and the revelation frame being associated with one another.

19. A method for authenticating and/or identifying a security article comprising a first image, comprising: projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article, at least partially superimposing the first image of the article with the second image, the second image being an electronically projected image, the second image being formed independently from the first image, and performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images.

Description

(1) The invention may be better understood upon the reading which will follow, of the description of nonlimiting examples of implementation thereof and on examining the schematic and partial figures of the drawing, wherein:

(2) FIG. 1 represents a block diagram of steps implemented in an exemplary method according to the invention,

(3) FIGS. 2 to 4 represent examples of associations of security articles and of electronic imagers for the implementation of an example of the method according to the invention,

(4) FIG. 5 represents an exemplary electronic imager displaying indicators,

(5) FIG. 6 represents an exemplary security article comprising a security element and an integrated microcircuit,

(6) FIG. 7 represents a series of interleaved images making it possible to create a combined image,

(7) FIG. 8 represents a combined image obtained on the basis of the series of interleaved images of FIG. 7,

(8) FIG. 9 represents an exemplary revelation frame that can be associated with the combined image of FIG. 8,

(9) FIGS. 10 to 14 represent exemplary embodiments of security articles comprising a first image in the form of a combined image or of a revelation frame,

(10) FIG. 15 represents an example of first image or second image comprising two different combined images for the implementation of an example of the method according to the invention,

(11) FIG. 16 represents an exemplary first image or second image comprising a revelation frame for the implementation of an example of the method according to the invention, associated with the combined images of FIG. 15,

(12) FIGS. 17 and 18 represent respectively an exemplary first image and an exemplary second image, each comprising both a revelation frame and a combined image,

(13) FIGS. 19 to 21 illustrate an exemplary implementation of the method according to the invention, the security article comprising a first image in the form of a revelation frame and the electronic imager producing a second image in the form of a combined image,

(14) FIGS. 22 and 23 illustrate another exemplary implementation of the method according to the invention, the security article comprising a first image in the form of a combined image and the electronic imager producing a second image in the form of a revelation frame,

(15) FIGS. 24 to 26 illustrate another exemplary implementation of the method according to the invention, and

(16) FIGS. 27 to 31 illustrate other examples of implementation of the method according to the invention.

(17) Represented in FIG. 1 is a block diagram relating to steps implemented in an exemplary method according to the invention.

(18) In a first step I, a first image of the security article is superimposed at least partially with a second image produced by an electronic imager.

(19) In a second step II, a relative motion is generated between the first and second images.

(20) Finally, in a third step III, the information item authenticating and/or identifying the security article, which appears during the relative motion between the first and second images, is observed.

(21) The three steps I, II and III may or may not be carried out simultaneously.

(22) Represented in FIGS. 2 to 4 are examples of association between a security article 1 and an electronic imager 10 making it possible to implement such a method.

(23) In FIG. 2, the electronic imager 10 is for example a computer screen on which a second image 30 is displayed.

(24) The security article 1 is for example in the form of a banknote and comprises a first image 20.

(25) The security article 1 is placed on the screen of the electronic imager 10 so as to at least partially superimpose the first image 20 on the second image 30, and then the security article 1 is displaced in relation to the screen of the electronic imager 10 to observe an information item authenticating and/or identifying the security article 1, in accordance with the steps described in FIG. 1.

(26) As a variant, the security article 1 in reference remains stationary with respect to the screen of the electronic imager 10 and the second image 30 is animated with a motion on the screen, for example a translation, for example with the aid of a program activated or not by the user.

(27) In FIG. 3, the electronic imager 10 is for example in the form of a digital projector, projecting a second image 30 onto a background 50, for example the wall of a room.

(28) The security article 1 comprising the first image 20 can then be at least partially superimposed on the second image 30 projected onto the background 50 so as to implement the steps described with reference to FIG. 1.

(29) In FIG. 4, the electronic imager 10 is a projector which projects the second image 30 directly onto the security article 1.

(30) The second image 30 can, as in the example of FIG. 4, be projected, for example in the form of a “W”, onto a zone of the security article 1 where the first image 20 is not present. Next, the security article 1 can for example be folded over on itself so as to superimpose the first image 20, for example in the form of an “A”, on the second image 30 projected by the electronic imager 10, so as to implement the steps described in FIG. 1. The part of the security article 1 comprising the first image 20 can in particular be folded back over the part comprising the second image 30, this part remaining stationary, in such a way that the second image 30 is situated between the imager 10 and the first image 20.

(31) In a variant, not represented, the second image 30 is projected directly onto the first image 20 of the article 1. In particular, the projection of the second image 30 onto the first image 20 of the security article 1 can then allow an at least partial superposition of the first and second images. Next, the electronic imager 10 is for example displaced in relation to the article so as to implement steps II and III described with reference to FIG. 1.

(32) Represented in FIG. 5 is a variant embodiment in which the electronic imager 10 is a screen displaying several second images 30a, 30b, 30c and 30d.

(33) The second images 30a to 30d can have different properties, for example shapes, colors, dimensions, dots or different frame lines.

(34) Advantageously, the second images 30a to 30d are differentiated so as to allow one of them at least to be associated with at least one first image 20 present on a security article 1. In this way, it is for example possible to authenticate and/or identify a greater diversity of security articles 1 having different respective first images, corresponding to the various second images 30a to 30d.

(35) As a variant, the security article 1 comprises several different first images 20, as may be seen for example in FIG. 14, and the electronic imager 10 produces one or more second images 30. In this way, it is for example possible to authenticate and/or to identify a given security article 1 on a greater diversity of different electronic imagers, and especially with electronic imagers having different resolutions. In this way, the two advantages described previously may be brought together.

(36) The electronic imager 10 can display one or more indicators 40a, 40b, 40c and 40d making it possible to advise the user as regards the way of positioning the security article 1 with respect to the imager.

(37) In particular, the indicators 40a to 40d can make it possible to know where to position the top right corner of the security article 1, so as to correctly superimpose a first image 20 of a security article 1 on a second image 40a, 40b, 40c or 40d displayed on the screen of the electronic imager 10.

(38) FIG. 6 illustrates the possibility of the security article 1 comprising an extra security element 51 of any known type, for example one of those described previously, for example a luminescent security thread.

(39) Furthermore, the security article 1 can comprise an integrated microcircuit 52, for example an RFID or optical chip, making it possible to communicate with the electronic imager 10 so as to control the display of an indicator such as described previously or to disseminate an information item as regards the way of positioning the first and second images.

(40) Especially in the examples described previously, the first image 20 can comprise a revelation frame 3 and the second image 30 can comprise a combined image 2 comprising at least two interleaved images 2a, the combined image 2 being associated with the revelation frame 3, or vice versa, as mentioned above.

(41) The subsequent FIGS. 7 to 26 illustrate this possibility.

(42) Represented in FIG. 7 is a series of interleaved images 2a making it possible to create a combined image 2, visible in FIG. 8, representing in this example a pattern in the form of an elephant.

(43) The interleaved images 2a correspond for example to four different positions of the elephant and thus make it possible to create a decomposition of the motion of the elephant.

(44) Each interleaved image 2a can comprise as illustrated a set of parallel lines, spaced apart in a regular or irregular manner, and exhibiting variable thicknesses.

(45) The images 2a are superimposed one above the other so as to form a combined pattern which corresponds to the combined image 2.

(46) Represented in FIG. 9 is an exemplary revelation frame 3 that can be associated with the combined image 2 of FIG. 8.

(47) The revelation frame 3 is for example of rectangular shape and comprises a set of parallel lines, spaced apart in a regular or irregular manner, and having variable thicknesses.

(48) The revelation frame 3 exhibits an area, a length and a width, which are greater than those of the combined image 2, thus enabling all the motions of the elephant to be viewed more easily during the relative displacement between the combined image 2 and the revelation frame 3.

(49) In this example, the combined image 2 and the revelation frame 3 comprise sets of alternately dark and light lines, especially black and white lines, but it could be otherwise. For example, the lines may be colored and be different for the combined image 2 and for the revelation frame 3.

(50) Represented in FIGS. 10 to 14 are exemplary embodiments of security article 1 for the implementation of the method according to the invention.

(51) In FIG. 10, the article 1 comprises a window 4, preferably at least partially transparent, in which the first image 20 appears in the form of a revelation frame 3. The first image 20 can for example be formed by printing, especially copper-plate, metallization or demetallization.

(52) In FIG. 11, the security article 1 comprises a patch 5 in which the first image 20 appears in the form of a revelation frame 3, the patch 5 comprising for example holographic printings.

(53) The patch 5 may be at least partially transparent.

(54) The revelation frame 3 can comprise holographic printings and/or metallizations and/or demetallizations.

(55) In FIG. 12, the security article 1 comprises a security thread 6 in which the first image 20 appears in the form of a combined image 2.

(56) The security thread 6 can also be at least partially transparent or comprise a partially transparent zone at the level of the combined image 2.

(57) In FIG. 13, the security article 1 comprises a security thread 6 in which the first image 20 appears in the form of a revelation frame 3.

(58) The security thread 6 may be at least partially transparent or exhibit an at least partially transparent zone. The revelation frame 3 can extend from one edge of the security article 1 to the opposite edge.

(59) In FIG. 14, the security article 1 comprises a security thread 6 comprising several first images 20 in the form of combined images 2. The first images 20 are produced in such a way that the security article 1 can be used with different electronic imagers, especially exhibiting different resolutions, each first image 20 being adapted to a given resolution of an electronic imager.

(60) The security thread 6 may be at least partially transparent or comprise at least one at least partially transparent zone, especially at the level of a combined image 2.

(61) The presence of several first images 20 on the security article 1, disposed on a security thread 6, can make it possible to simplify the method for fabricating the security article 1 by incorporating the security thread 6 into a substrate, especially a fibrous substrate. An incorporation with the datum may in particular not be necessary.

(62) In all the examples described previously, the combined images 2 and the revelation frames 3 may be swapped.

(63) The at least partially transparent zones may be situated at the level of the combined images 2 or of the revelation frames 3, or at the level of both at once.

(64) The security thread 6 may be introduced into the security article 1 in a conventional manner, for example at the surface, in the bulk or as window(s).

(65) The combined images 2 and/or the revelation frames 3 can furthermore comprise a polarizing filter. The security article 1 can then be authenticated and/or identified by means of an electronic imager 10 emitting polarized light.

(66) In FIG. 15 is represented in a schematic manner a second image 30 (or a first image) comprising two different combined images 21 and 22. The second combined image 22 is for example a symmetric image of the first combined image 21 after possible modification of its size, so as to obtain a network of combined images 22 organized as rows and columns

(67) FIG. 16 represents the corresponding first image 20 (respectively the second image), in the form of a revelation frame 3 of the interleaved images 21a and 22a represented schematically in FIG. 16. This revelation frame 3 comprises the association of two elementary frames 3c and 3d making it possible to observe respectively the interleaved images 21a and 22a. The frame 3c comprises for example a succession of black strips alternating with strips of the frame 3d consisting of an alternation of white and black lines, with a smaller pitch.

(68) In FIG. 17 is represented in a schematic manner a first image 20 (or second image) in the form of a combined image 22 disposed according to a network of combined images 22 around a revelation frame 31.

(69) In FIG. 18 is represented in a schematic manner the second image 30 (respectively the first image) in the form of a combined image 21 surrounded by a revelation frame 32.

(70) Illustrated in FIGS. 19 to 21 is an exemplary implementation of a method according to the invention.

(71) In this example, the electronic imager 10 takes for example the form of a mobile telephone on which is displayed a second image 30 in the form of a combined image 2 (visible in FIG. 21).

(72) Furthermore, the security article 1 comprises a polarizing filter on which the first image 20 has been formed in the form of a revelation frame 3.

(73) FIG. 20 illustrates the superposition of the security article 1 comprising the first image 20 in the form of a revelation frame 3 on the second image 30 in the form of a combined image 2 produced by the electronic imager 10, the latter emitting polarized light.

(74) The user displaces the security article 1 so as to bring it into a crossed orientation making it possible to observe the opacity of the polarizing filter in relation to the polarized light.

(75) Next, as may be seen in FIG. 21, the security article 1 comprising the revelation frame 3 is displaced by a translation motion along the arrows F with respect to the combined image 2 displayed by the screen of the electronic imager 10, so as to cause the animation of the interleaved images to appear. The displacement takes place while preserving the relative orientation of the frame with respect to the screen.

(76) Such a method makes it possible to authenticate and/or to identify the security article 1 according to several security levels.

(77) The positioning of the revelation frame 3 comprising the polarizing filter according to the orientation making it possible to observe the opacity of the polarizing filter, this observation being visible only on a screen emitting polarized light, for example a screen of the LCD type, affords a first security level.

(78) The revelation of the animation of the interleaved images by displacement of the revelation frame 3 in relation to the combined image 2 affords a second security level.

(79) Represented in FIGS. 22 and 23 is another exemplary implementation of the method according to the invention.

(80) In this example, the electronic imager 10 is preferably a screen, especially of the LCD type, comprising a plurality of pixels.

(81) FIG. 22 partially represents the electronic imager 10 in the form of an LCD screen comprising a plurality of pixels, and FIG. 23 represents a part of FIG. 22 magnified.

(82) The set of pixels of the screen forms the second image 30 in the form of a revelation frame 3.

(83) As may be seen in FIG. 23, the screen can comprise a regular arrangement of pixels disposed in the form of horizontal and vertical lines. In particular, the horizontal lines can comprise a repetition of three pixels P.sub.1, P.sub.2, and P.sub.3, of different colors, for example RGB.

(84) Furthermore, as may be seen in FIG. 23, the horizontal lines of pixels may be separated by zones N black in color devoid of pixels.

(85) In this way, when the combined image 2 of the security article 1 is superimposed on the screen of the electronic imager 10 comprising the revelation frame 3, a relative motion horizontally can reveal a multichrome animation making it possible to observe interleaved images, and after having applied a rotation of 90° to the combined image 2, a relative motion vertically can make it possible to reveal a monochrome animation making it possible to observe said interleaved images.

(86) According to a variant, the combined image 2 and the revelation frame 3 are produced so as to allow the observation of an animation by a relative motion in two different directions, especially perpendicular. Such an effect is for example obtained by means of a revelation frame 3 consisting of rows and of columns of dots, for example of square shape, and of an adapted combined image 2, like that represented in FIG. 25.

(87) The electronic imager 10 can correspond to the screen of a mobile telephone, having for example a resolution of 160 dpi, thus making it possible to obtain a revelation frame whose pixels are spaced 159 μm apart.

(88) The combined image 2 present on the security article 1 can appear in a through window of the security article 1, sealed by a transparent plastic strip. The transparent plastic strip can exhibit circular polarizing filter properties.

(89) The security article 1 comprising the polarizing transparent plastic strip on which the combined image 2 is formed may be fabricated so that the polarization properties are preserved on the constituent zones of the combined image, representing for example several successive positions of a spiral. Accordingly, it is possible to produce the combined image 2 in the manner described previously, for example by printing the plastic strip with a specific ink affording a polarization property or by heating, for example with a laser, the zones required to be devoid of polarizing properties.

(90) Represented in FIGS. 24 to 26 is another exemplary implementation of the method according to the invention.

(91) In this example, the electronic imager 10 in the form of a screen comprises a first part 30a of the second image in the form of a revelation frame 3a, as may be seen in FIG. 24.

(92) The security article 1 comprises the other part 30b of the second image in the form of a revelation frame 3b, for example in an at least partially transparent window of the article. Moreover, the security article 1 comprises the first image 20 in the form of a combined image 2, for example in an at least partially transparent window of the article, as may be seen in FIG. 25.

(93) When the security article 1 is folded over on itself so as to superimpose the combined image 2 on the part 3b of the revelation frame, and then superimposed on the electronic imager 10 so as to superimpose the combined image 2 and the part 3b of the revelation frame on the part 3a of the revelation frame formed on the screen of the electronic imager 10, it is possible to implement the method according to the invention by relative motion of the part of the security article 1 comprising the combined image 2 with respect to the part of the security article 1 comprising the part 3b of the revelation frame, the latter being stationary in relation to the screen comprising the part 3a of the revelation frame so as to allow the reconstruction of the revelation frame and the observation of the interleaved images, as may be seen in FIG. 26. The combined image 2 advantageously allows the observation of an animation or of two animations by a relative motion respectively in two different directions, especially perpendicular.

(94) Represented in FIG. 27 is an exemplary security article 1 in the form of a passport comprising a first image 20, printed in the form of a combined image 2, and an RFID chip 60.

(95) The chip 60 is able to communicate with the electronic imager 10 (not represented) so as to make it possible to produce the second image 30 associated with the first image 20.

(96) In particular, during the method for authenticating and/or identifying the passport 1, the first image 20 is illuminated with the electronic imager. The chip 60 comprises an information item transmitted to the electronic imager which then projects the second image as a function of this information item.

(97) Represented in FIG. 28 is another exemplary implementation of the method according to the invention.

(98) In this example, the security article 1, in the form of a passport, comprises a first image 20 in the form of a combined image 2 obtained by metallization of a transparent plastic film inserted into the passport by way of a window 4.

(99) The passport 1, especially the combined image 2, is photographed and/or filmed by a digital camera 70 belonging or linked to the electronic imager. A recognition program can then make it possible to recognize the combined image 2 and to acquire from a database a second image associated with the first image. The database is for example stored on a secure server. The second image thus obtained is displayed and/or projected by the electronic imager so as to make it possible to authenticate and/or to identify the passport 1 by relative motion of the first and second images.

(100) Represented in FIG. 29 is a security article 1 in the form of a banknote.

(101) The security article 1 comprises a first printed image 20, representing for example the face of a person, this first image 20 comprising a combined image 2, for example at the level of the person's hair. Preferably, the combined image 2 appears in a transparent, translucent or reduced-opacity zone of the security article 1.

(102) To authenticate and/or identify the banknote 1, it is for example possible to photograph the banknote, especially the first image 20, and to produce a second image associated with the first image, this second image being obtained on the basis of the photograph of the banknote.

(103) For example, the electronic imager is a mobile telephone capable of photographing the banknote, and a program internal to the mobile telephone makes it possible to download a second image associated with the first image which may thereafter be displayed on the screen of the mobile telephone to implement the method according to the invention.

(104) According to a variant, said program internal to the mobile telephone makes it possible to generate said second image associated with said first image.

(105) Represented in FIGS. 30 and 31, in section, are two examples of security article comprising luminescent zones.

(106) In FIG. 30, the security article 1 comprises a substrate 80 on which is printed a black opaque layer 81. The substrate 80 is for example entirely covered by the black opaque layer 81.

(107) Moreover, a first luminescent image 20, especially fluorescent and/or phosphorescent, for example in the form of a combined image, is printed on the black opaque layer 81.

(108) The associated electronic imager, not represented, is able to project a second image 30, not represented, onto the first image 20 under ultraviolet (UV) lighting.

(109) In this way, the first image 20 is not observable under normal lighting on account of the presence of the black opaque layer 81. On the other hand, under UV lighting, the first image 20 is observable and it is possible to at least partially superimpose the second image 30 on it, especially in the form of a revelation frame, so as to implement the method according to the invention.

(110) In FIG. 31, the first image 20 is printed with a black opaque ink on a luminescent layer 81, especially fluorescent and/or phosphorescent, itself printed on the substrate 80.

(111) In this example, the first image 20 is visible both under normal lighting and under UV lighting.

(112) The expression “comprising a” is synonymous with “comprising at least one”.