Method of authenticating and/or identifying a security article
09811723 · 2017-11-07
Assignee
Inventors
Cpc classification
B42D25/387
PERFORMING OPERATIONS; TRANSPORTING
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
B42D25/41
PERFORMING OPERATIONS; TRANSPORTING
B42D25/351
PERFORMING OPERATIONS; TRANSPORTING
B42D25/391
PERFORMING OPERATIONS; TRANSPORTING
B42D25/382
PERFORMING OPERATIONS; TRANSPORTING
G07D7/207
PHYSICS
B42D25/00
PERFORMING OPERATIONS; TRANSPORTING
B41M3/148
PERFORMING OPERATIONS; TRANSPORTING
International classification
G09G5/00
PHYSICS
B42D25/41
PERFORMING OPERATIONS; TRANSPORTING
B42D25/00
PERFORMING OPERATIONS; TRANSPORTING
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
B42D25/351
PERFORMING OPERATIONS; TRANSPORTING
G07D7/00
PHYSICS
G07D7/207
PHYSICS
Abstract
A method of authenticating and/or identifying a security article including a first image includes superimposing at least partially the first image of the article with a second image. The second image may be produced by an electronic imager. The method further includes performing a relative movement between the first and second images so as to make it possible to observe an item of information relating to authentication and/or identification of the security article during the relative movement between the first and second images.
Claims
1. A method for authenticating and/or identifying a security article comprising a first image, the method comprising: displaying on an electronic imager a second image produced by the electronic imager or projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article, at least partially superimposing the first image of the security article with the second image, and performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images, and an effect of motion or of animation being observed during the relative motion between the superimposed first and second images.
2. The method as claimed in claim 1, wherein pixels of a screen serve at least partially to form the second image in the form of a revelation frame.
3. The method as claimed in claim 1, wherein the security article comprises a zone which is at least partially transparent, translucent, or of reduced opacity, wherein the zone includes the first image.
4. The method as claimed in claim 3, wherein the zone is at least a partially transparent window.
5. The method as claimed in claim 1, wherein the second image is electronically displayed on a screen.
6. The method as claimed in claim 1, further comprising projecting the second image on a background or on the security article.
7. The method as claimed in claim 1, wherein the relative motion of the first image with respect to the second image is a translation and/or rotation motion.
8. The method as claimed in claim 1, wherein the relative motion is generated by a displacement of an electronic imager and/or by a displacement of the security article.
9. The method as claimed in claim 1, wherein the relative motion is generated by a modification of the second image.
10. The method as claimed in claim 1, wherein the second image is electronically displayed or projected from a liquid crystal display (LCD).
11. The method as claimed in claim 1, wherein the first image and the second image exhibit polarization properties.
12. The method as claimed in claim 11, wherein the second image is produced using a polarized light and the first image comprises a polarizing filter.
13. The method as claimed in claim 1, wherein, prior to the authentication and/or identification information item being observable during the relative motion between the first and second images, the first and second images are positioned in an orientation in which one of the first and second images partially masks the other of the first and second images.
14. The method as claimed in claim 1, wherein the security article comprises several different first images and/or several different second images are electronically displayed or projected.
15. The method as claimed in claim 1, wherein the second image is based on a photo and/or video of the first image of the security article.
16. The method as claimed in claim 1, wherein the relative motion between the first and second images is a physical motion between the security article and an electronic imager displaying or projecting the second image.
17. The method as claimed in claim 1, wherein the effect of motion or of animation is of interleaved images.
18. A method for authenticating and/or identifying a security article comprising a first image, comprising: displaying on an electronic imager a second image produced by the electronic imager or projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article, at least partially superimposing the first image of the security article with the second image, and performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images, wherein the first image comprises a revelation frame and the second image comprises a combined image including at least two interleaved images, the combined image and the revelation frame being associated with one another.
19. A method for authenticating and/or identifying a security article comprising a first image, comprising: projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article, at least partially superimposing the first image of the article with the second image, the second image being an electronically projected image, the second image being formed independently from the first image, and performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images.
Description
(1) The invention may be better understood upon the reading which will follow, of the description of nonlimiting examples of implementation thereof and on examining the schematic and partial figures of the drawing, wherein:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17) Represented in
(18) In a first step I, a first image of the security article is superimposed at least partially with a second image produced by an electronic imager.
(19) In a second step II, a relative motion is generated between the first and second images.
(20) Finally, in a third step III, the information item authenticating and/or identifying the security article, which appears during the relative motion between the first and second images, is observed.
(21) The three steps I, II and III may or may not be carried out simultaneously.
(22) Represented in
(23) In
(24) The security article 1 is for example in the form of a banknote and comprises a first image 20.
(25) The security article 1 is placed on the screen of the electronic imager 10 so as to at least partially superimpose the first image 20 on the second image 30, and then the security article 1 is displaced in relation to the screen of the electronic imager 10 to observe an information item authenticating and/or identifying the security article 1, in accordance with the steps described in
(26) As a variant, the security article 1 in reference remains stationary with respect to the screen of the electronic imager 10 and the second image 30 is animated with a motion on the screen, for example a translation, for example with the aid of a program activated or not by the user.
(27) In
(28) The security article 1 comprising the first image 20 can then be at least partially superimposed on the second image 30 projected onto the background 50 so as to implement the steps described with reference to
(29) In
(30) The second image 30 can, as in the example of
(31) In a variant, not represented, the second image 30 is projected directly onto the first image 20 of the article 1. In particular, the projection of the second image 30 onto the first image 20 of the security article 1 can then allow an at least partial superposition of the first and second images. Next, the electronic imager 10 is for example displaced in relation to the article so as to implement steps II and III described with reference to
(32) Represented in
(33) The second images 30a to 30d can have different properties, for example shapes, colors, dimensions, dots or different frame lines.
(34) Advantageously, the second images 30a to 30d are differentiated so as to allow one of them at least to be associated with at least one first image 20 present on a security article 1. In this way, it is for example possible to authenticate and/or identify a greater diversity of security articles 1 having different respective first images, corresponding to the various second images 30a to 30d.
(35) As a variant, the security article 1 comprises several different first images 20, as may be seen for example in
(36) The electronic imager 10 can display one or more indicators 40a, 40b, 40c and 40d making it possible to advise the user as regards the way of positioning the security article 1 with respect to the imager.
(37) In particular, the indicators 40a to 40d can make it possible to know where to position the top right corner of the security article 1, so as to correctly superimpose a first image 20 of a security article 1 on a second image 40a, 40b, 40c or 40d displayed on the screen of the electronic imager 10.
(38)
(39) Furthermore, the security article 1 can comprise an integrated microcircuit 52, for example an RFID or optical chip, making it possible to communicate with the electronic imager 10 so as to control the display of an indicator such as described previously or to disseminate an information item as regards the way of positioning the first and second images.
(40) Especially in the examples described previously, the first image 20 can comprise a revelation frame 3 and the second image 30 can comprise a combined image 2 comprising at least two interleaved images 2a, the combined image 2 being associated with the revelation frame 3, or vice versa, as mentioned above.
(41) The subsequent
(42) Represented in
(43) The interleaved images 2a correspond for example to four different positions of the elephant and thus make it possible to create a decomposition of the motion of the elephant.
(44) Each interleaved image 2a can comprise as illustrated a set of parallel lines, spaced apart in a regular or irregular manner, and exhibiting variable thicknesses.
(45) The images 2a are superimposed one above the other so as to form a combined pattern which corresponds to the combined image 2.
(46) Represented in
(47) The revelation frame 3 is for example of rectangular shape and comprises a set of parallel lines, spaced apart in a regular or irregular manner, and having variable thicknesses.
(48) The revelation frame 3 exhibits an area, a length and a width, which are greater than those of the combined image 2, thus enabling all the motions of the elephant to be viewed more easily during the relative displacement between the combined image 2 and the revelation frame 3.
(49) In this example, the combined image 2 and the revelation frame 3 comprise sets of alternately dark and light lines, especially black and white lines, but it could be otherwise. For example, the lines may be colored and be different for the combined image 2 and for the revelation frame 3.
(50) Represented in
(51) In
(52) In
(53) The patch 5 may be at least partially transparent.
(54) The revelation frame 3 can comprise holographic printings and/or metallizations and/or demetallizations.
(55) In
(56) The security thread 6 can also be at least partially transparent or comprise a partially transparent zone at the level of the combined image 2.
(57) In
(58) The security thread 6 may be at least partially transparent or exhibit an at least partially transparent zone. The revelation frame 3 can extend from one edge of the security article 1 to the opposite edge.
(59) In
(60) The security thread 6 may be at least partially transparent or comprise at least one at least partially transparent zone, especially at the level of a combined image 2.
(61) The presence of several first images 20 on the security article 1, disposed on a security thread 6, can make it possible to simplify the method for fabricating the security article 1 by incorporating the security thread 6 into a substrate, especially a fibrous substrate. An incorporation with the datum may in particular not be necessary.
(62) In all the examples described previously, the combined images 2 and the revelation frames 3 may be swapped.
(63) The at least partially transparent zones may be situated at the level of the combined images 2 or of the revelation frames 3, or at the level of both at once.
(64) The security thread 6 may be introduced into the security article 1 in a conventional manner, for example at the surface, in the bulk or as window(s).
(65) The combined images 2 and/or the revelation frames 3 can furthermore comprise a polarizing filter. The security article 1 can then be authenticated and/or identified by means of an electronic imager 10 emitting polarized light.
(66) In
(67)
(68) In
(69) In
(70) Illustrated in
(71) In this example, the electronic imager 10 takes for example the form of a mobile telephone on which is displayed a second image 30 in the form of a combined image 2 (visible in
(72) Furthermore, the security article 1 comprises a polarizing filter on which the first image 20 has been formed in the form of a revelation frame 3.
(73)
(74) The user displaces the security article 1 so as to bring it into a crossed orientation making it possible to observe the opacity of the polarizing filter in relation to the polarized light.
(75) Next, as may be seen in
(76) Such a method makes it possible to authenticate and/or to identify the security article 1 according to several security levels.
(77) The positioning of the revelation frame 3 comprising the polarizing filter according to the orientation making it possible to observe the opacity of the polarizing filter, this observation being visible only on a screen emitting polarized light, for example a screen of the LCD type, affords a first security level.
(78) The revelation of the animation of the interleaved images by displacement of the revelation frame 3 in relation to the combined image 2 affords a second security level.
(79) Represented in
(80) In this example, the electronic imager 10 is preferably a screen, especially of the LCD type, comprising a plurality of pixels.
(81)
(82) The set of pixels of the screen forms the second image 30 in the form of a revelation frame 3.
(83) As may be seen in
(84) Furthermore, as may be seen in
(85) In this way, when the combined image 2 of the security article 1 is superimposed on the screen of the electronic imager 10 comprising the revelation frame 3, a relative motion horizontally can reveal a multichrome animation making it possible to observe interleaved images, and after having applied a rotation of 90° to the combined image 2, a relative motion vertically can make it possible to reveal a monochrome animation making it possible to observe said interleaved images.
(86) According to a variant, the combined image 2 and the revelation frame 3 are produced so as to allow the observation of an animation by a relative motion in two different directions, especially perpendicular. Such an effect is for example obtained by means of a revelation frame 3 consisting of rows and of columns of dots, for example of square shape, and of an adapted combined image 2, like that represented in
(87) The electronic imager 10 can correspond to the screen of a mobile telephone, having for example a resolution of 160 dpi, thus making it possible to obtain a revelation frame whose pixels are spaced 159 μm apart.
(88) The combined image 2 present on the security article 1 can appear in a through window of the security article 1, sealed by a transparent plastic strip. The transparent plastic strip can exhibit circular polarizing filter properties.
(89) The security article 1 comprising the polarizing transparent plastic strip on which the combined image 2 is formed may be fabricated so that the polarization properties are preserved on the constituent zones of the combined image, representing for example several successive positions of a spiral. Accordingly, it is possible to produce the combined image 2 in the manner described previously, for example by printing the plastic strip with a specific ink affording a polarization property or by heating, for example with a laser, the zones required to be devoid of polarizing properties.
(90) Represented in
(91) In this example, the electronic imager 10 in the form of a screen comprises a first part 30a of the second image in the form of a revelation frame 3a, as may be seen in
(92) The security article 1 comprises the other part 30b of the second image in the form of a revelation frame 3b, for example in an at least partially transparent window of the article. Moreover, the security article 1 comprises the first image 20 in the form of a combined image 2, for example in an at least partially transparent window of the article, as may be seen in
(93) When the security article 1 is folded over on itself so as to superimpose the combined image 2 on the part 3b of the revelation frame, and then superimposed on the electronic imager 10 so as to superimpose the combined image 2 and the part 3b of the revelation frame on the part 3a of the revelation frame formed on the screen of the electronic imager 10, it is possible to implement the method according to the invention by relative motion of the part of the security article 1 comprising the combined image 2 with respect to the part of the security article 1 comprising the part 3b of the revelation frame, the latter being stationary in relation to the screen comprising the part 3a of the revelation frame so as to allow the reconstruction of the revelation frame and the observation of the interleaved images, as may be seen in
(94) Represented in
(95) The chip 60 is able to communicate with the electronic imager 10 (not represented) so as to make it possible to produce the second image 30 associated with the first image 20.
(96) In particular, during the method for authenticating and/or identifying the passport 1, the first image 20 is illuminated with the electronic imager. The chip 60 comprises an information item transmitted to the electronic imager which then projects the second image as a function of this information item.
(97) Represented in
(98) In this example, the security article 1, in the form of a passport, comprises a first image 20 in the form of a combined image 2 obtained by metallization of a transparent plastic film inserted into the passport by way of a window 4.
(99) The passport 1, especially the combined image 2, is photographed and/or filmed by a digital camera 70 belonging or linked to the electronic imager. A recognition program can then make it possible to recognize the combined image 2 and to acquire from a database a second image associated with the first image. The database is for example stored on a secure server. The second image thus obtained is displayed and/or projected by the electronic imager so as to make it possible to authenticate and/or to identify the passport 1 by relative motion of the first and second images.
(100) Represented in
(101) The security article 1 comprises a first printed image 20, representing for example the face of a person, this first image 20 comprising a combined image 2, for example at the level of the person's hair. Preferably, the combined image 2 appears in a transparent, translucent or reduced-opacity zone of the security article 1.
(102) To authenticate and/or identify the banknote 1, it is for example possible to photograph the banknote, especially the first image 20, and to produce a second image associated with the first image, this second image being obtained on the basis of the photograph of the banknote.
(103) For example, the electronic imager is a mobile telephone capable of photographing the banknote, and a program internal to the mobile telephone makes it possible to download a second image associated with the first image which may thereafter be displayed on the screen of the mobile telephone to implement the method according to the invention.
(104) According to a variant, said program internal to the mobile telephone makes it possible to generate said second image associated with said first image.
(105) Represented in
(106) In
(107) Moreover, a first luminescent image 20, especially fluorescent and/or phosphorescent, for example in the form of a combined image, is printed on the black opaque layer 81.
(108) The associated electronic imager, not represented, is able to project a second image 30, not represented, onto the first image 20 under ultraviolet (UV) lighting.
(109) In this way, the first image 20 is not observable under normal lighting on account of the presence of the black opaque layer 81. On the other hand, under UV lighting, the first image 20 is observable and it is possible to at least partially superimpose the second image 30 on it, especially in the form of a revelation frame, so as to implement the method according to the invention.
(110) In
(111) In this example, the first image 20 is visible both under normal lighting and under UV lighting.
(112) The expression “comprising a” is synonymous with “comprising at least one”.