Security document and method for the authentication thereof
11077697 · 2021-08-03
Assignee
Inventors
Cpc classification
B42D25/328
PERFORMING OPERATIONS; TRANSPORTING
G07D7/004
PHYSICS
B42D25/387
PERFORMING OPERATIONS; TRANSPORTING
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
B42D25/369
PERFORMING OPERATIONS; TRANSPORTING
B42D25/382
PERFORMING OPERATIONS; TRANSPORTING
G06K19/025
PHYSICS
G06K19/0727
PHYSICS
International classification
G06K19/00
PHYSICS
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
G06K19/06
PHYSICS
B42D25/369
PERFORMING OPERATIONS; TRANSPORTING
B42D25/382
PERFORMING OPERATIONS; TRANSPORTING
B42D25/387
PERFORMING OPERATIONS; TRANSPORTING
G07D7/00
PHYSICS
G07D7/004
PHYSICS
B42D25/328
PERFORMING OPERATIONS; TRANSPORTING
Abstract
A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.
Claims
1. A method for authenticating a security document with the following steps: reading a first item of visually recognizable and machine-readable information from a first security element; reading a second item of machine-readable information from a second security element; verifying the first item of information by reference to the second item of information wherein at least one of the reading steps comprises: capturing an image sequence or a video of the security document by recording the security document from different angles; and verifying a presence of an optically variable element or an optically variable security feature by verifying a desired optical change of the optically variable element or of the optically variable security feature in the captured image sequence or video.
2. The method according to claim 1, wherein the reading of the first or the second item of information or the verification of the first item of information is carried out by means of a hand-held device.
3. The method according to claim 1, wherein, before or during the reading of the first or the second item of information, instructions for capturing the individual image, the image sequence or the video are displayed on a display of the hand-held device, which comprise specifications with respect to a recording angle, or a recording distance.
4. The method according to claim 1, wherein, to verify the first item of information, a checksum of the first item of information is generated and compared with a reference checksum comprised by the second item of information.
5. The method according to claim 4, wherein a scan of a biometric feature is recorded by means of the hand-held device and compared with the feature stored in the first or the second item of information.
6. The method according to claim 5, wherein the scan is compressed or reduced into a template.
7. The method according to claim 1, wherein, to verify the first item of information, at least an encrypted part of the first item of information is decrypted by means of a key comprised by the second item of information.
8. The method according to claim 1, wherein, to verify the first item of information, the first item of information is compared with a redundant copy of the first item of information comprised by the second item of information.
9. The method according to claim 1, wherein a password comprised by the second item of information is used as access authentication for a program of the hand-held device or a database stored on the hand-held device or on a computing machine different from the hand-held device.
10. The method according to claim 1, wherein a third item of information is retrieved, by reference to the first or the second item of information, from a database stored on the hand-held device or on a computing machine different from the hand-held device or a third item of information is captured or recorded by the hand-held device.
11. The method according to claim 10, wherein the third item of information comprises a key or a part of a key for decoding the first item of information or, together with the second item of information, forms a key pair.
12. The method according to claim 10, wherein the third item of information comprises a checksum for the first or the second item of information.
13. The method according to claim 10, wherein the third item of information comprises a redundant reproduction of at least a part of the first item of information.
14. The method according to claim 10, wherein the third item of information comprises a password for database access or for access to an RFID chip.
15. The method according to claim 10, wherein the third item of information comprises an item of information about a reference state of a security feature of the first or the second security element.
16. The method according to claim 15, wherein, by reference to the third item of information, an individual image or an image sequence or a video is displayed on a display of the hand-held device, which demonstrate a reference state of a diffractive security feature of the first or the second security element.
17. The method according to claim 16, wherein the individual image or the image sequence or the video comprises a reproduction of the security feature from different viewing or illumination angles.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The invention is now explained in more detail by reference to embodiment examples. There are shown in:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION
(10) A security document 1 in the form of a personal identity card comprises an area 11 with readable identity data, a passport photograph 12, and a standardized machine-readable zone 13. The area 11 and the passport photograph 12 are partially overlapped by an optically variable security element 14. A machine-readable security element 15 is additionally provided.
(11) The area 11 comprises personalized data relating to a holder of the security document. These can be, for example, the name of an identity card holder, biometric data, passport photographs, issue and validity dates, nationality, a chassis number or type classification of a motor vehicle associated with the security document, or the like.
(12) These data are also at least partially reproduced in the machine-readable zone 13. By a machine-readable zone 13 is meant here an area of the document which complies with ICAO document 9303, part 3.
(13) The machine-readable security element 15 is preferably formed as a code, in particular as a one- or two-dimensional barcode, in particular as a DataMatrix code, QR code, Aztec code, UPC (Universal Product Code), Code 128, Code 39 or PDF417 code. Such codes can preferably be formed as a diffractive code. Further encoding possibilities for the second security element are for example surface patterns, dot patterns, in particular pixel patterns, numerical codes, special proprietary barcodes such as e.g. color barcodes or three-dimensional barcodes, codes which are written into storage media such as e.g. In volume holograms. Codes based on magnetic storage media (magnetic strips, magnetic inks) as well as codes applied by fluorescent inks (for example UV-fluorescent inks), IR upconverters, polarizing optical elements can alternatively or additionally used. For the optical or electronic reading, additional methods may be required, such as UV illumination, electronic readers for magnetic codes, optical filters which are placed on the document or which are held e.g. In front of the camera lens (e.g. polarization filters, moiré analyzers).
(14) A high information density can hereby be provided in a small space. In particular in the case of a diffractive barcode, there is at the same time an optical security effect which additionally impedes forgery. The diffractive optical effect in the case of a diffractive barcode can provide the actual encoding or form an additional item of encoded information or provide a merely decorative optical effect which contains no encoded information. The decorative effect can also be combined with an item of encoded information.
(15) The security element 14 preferably comprises, individually or in combination, a diffractive structure, a zero-order diffraction structure, a blazed grating, a macrostructure, in particular a lens structure or microprism structure, a mirror surface, a matte structure, in particular an anisotropic or isotropic matte structure, a volume hologram or a thin-film structure with color-change effect.
(16) It is further preferred if the security element 14 comprises a reflective layer, in particular a whole-surface or partial metal layer and/or a whole-surface or partial layer made of a high refractive index (HRI) material.
(17) It is additionally expedient if the security element 14 comprises single- or multi-layered printed structures, in particular comprising colored, optically active and/or optically variable dyes and/or pigments.
(18) Such structures can only be reproduced with difficulty and therefore provide a particularly good level of protection against forgery. At the same time, a variety of appealing optical effects can thus be achieved. As the security element 14 overlaps the area 11 and the passport photograph 12 at least in areas, it is not possible to manipulate these elements without destroying the security feature 14.
(19) As
(20) The information read from the security element 15 can then be displayed on a display 21 of the hand-held device. The user can now check whether this information is consistent with the printed information in the area 11 or whether it, or also the passport photograph 12 or the machine-readable zone 13, has been manipulated.
(21) Furthermore, a reproduction 22 of the security element 14 can also be displayed on the display 21. This serves to assist the user, in order to make it easier for him to identify a correct and not manipulated security element 14. Further information, such as for example the earliest possible date of issue of the document (date of being brought into circulation), can additionally be displayed.
(22) The security element 15 can furthermore contain still further information or perform further functions. It is particularly advantageous if the security element 15 comprises a key or a part of a key for decoding an item of encrypted information contained in the areas 11 or 13.
(23) A particularly high level of protection against forgery is achieved by such an encryption method. For example, the item of information contained in the security element 15 can be the public key of an asymmetric key pair, which acts as a digital signature for a part of the areas 11 or 13 encoded with the private key of the key pair. It is then not possible to manipulate these areas without knowing the private key. For example, the Elliptic Curve Digital Signature Algorithm (ECDSA) and/or, for example, SHA-256 hash algorithm are particularly suitable.
(24) It is likewise possible that the security element 15 comprises a checksum for an item of information contained in the areas 11, 12 or 13. Through such a checksum it is ensured that manipulations on these areas can be recognized immediately. For example, a checksum can comprise several check digits, which are each generated from individual biographical data elements of the security document, such as for example name, date of birth, etc. ICAO document 9303 as well as the equivalent ISO standard 7501, part 1-3 describe an example of a standardized formula for calculating such check digits. However, non-standardized and optionally confidential methods can also be used.
(25) In the embodiment according to
(26) The optically variable structure 151 likewise preferably comprises, individually or in combination, a diffractive structure, a zero-order diffraction structure, a blazed grating, a macrostructure, in particular a lens structure or microprism structure, a mirror surface, a matte structure, in particular an anisotropic or isotropic matte structure, a volume hologram or a thin-film structure with color-change effect.
(27) It is further preferred if the optically variable structure 151 comprises a reflective layer, in particular a whole-surface or partial metal layer and/or a whole-surface or partial layer made of a high refractive index (HRI) material and/or single- or multi-layered printed structures, in particular comprising colored, optically active and/or optically variable dyes and/or pigments.
(28) As already described, security elements 15 which are visually appealing and particularly secure against forgery can thus be produced.
(29) A detailed view of such a document 1 is reproduced again in
(30) In the embodiment of the security document 1 according to
(31) A query of an external database 3 can additionally be performed, as
(32) The database 3 can in turn provide a copy of the data from the areas 11, 12, 13, supply reproductions 22 of the security elements 14, 15 in the described manner or also provide further keys or checksums for verifying the document 1.
(33) The method sequence for this is illustrated again in
(34) At the same time, the hand-held device accesses the database 3 and from there also downloads a copy of the biographical data of the identity card holder. These are now likewise displayed and can likewise be compared with the data stored in the document 1. Thus, it is also possible to recognize a forgery when both the areas 11 and 12 and the security element 15 and the chip 16 are manipulated.
(35) The hand-held device furthermore also obtains the already explained reproduction 22, 23 of the security elements 14, 151 from the database 3 or from the memory in the chip 16 in the security document 1 or from the memory in a chip in the hand-held device 2 and displays it to the user. An item of information of the security element 15 can here be used as an access code or password for the respective database or the respective chip. The respective security element here is preferably represented at several viewing angles, in order thus to demonstrate the optically variable effects of the security elements 14, 151 and to make it easier to verify them.
(36)
(37) In