Security document and method for the authentication thereof

11077697 · 2021-08-03

Assignee

Inventors

Cpc classification

International classification

Abstract

A security document with a first security element, which includes a first item of visually recognizable and in particular machine-readable information, and a second security element, which includes a second item of in particular machine-readable information which can be used to verify the first item of information. A method for the authentication thereof is also described.

Claims

1. A method for authenticating a security document with the following steps: reading a first item of visually recognizable and machine-readable information from a first security element; reading a second item of machine-readable information from a second security element; verifying the first item of information by reference to the second item of information wherein at least one of the reading steps comprises: capturing an image sequence or a video of the security document by recording the security document from different angles; and verifying a presence of an optically variable element or an optically variable security feature by verifying a desired optical change of the optically variable element or of the optically variable security feature in the captured image sequence or video.

2. The method according to claim 1, wherein the reading of the first or the second item of information or the verification of the first item of information is carried out by means of a hand-held device.

3. The method according to claim 1, wherein, before or during the reading of the first or the second item of information, instructions for capturing the individual image, the image sequence or the video are displayed on a display of the hand-held device, which comprise specifications with respect to a recording angle, or a recording distance.

4. The method according to claim 1, wherein, to verify the first item of information, a checksum of the first item of information is generated and compared with a reference checksum comprised by the second item of information.

5. The method according to claim 4, wherein a scan of a biometric feature is recorded by means of the hand-held device and compared with the feature stored in the first or the second item of information.

6. The method according to claim 5, wherein the scan is compressed or reduced into a template.

7. The method according to claim 1, wherein, to verify the first item of information, at least an encrypted part of the first item of information is decrypted by means of a key comprised by the second item of information.

8. The method according to claim 1, wherein, to verify the first item of information, the first item of information is compared with a redundant copy of the first item of information comprised by the second item of information.

9. The method according to claim 1, wherein a password comprised by the second item of information is used as access authentication for a program of the hand-held device or a database stored on the hand-held device or on a computing machine different from the hand-held device.

10. The method according to claim 1, wherein a third item of information is retrieved, by reference to the first or the second item of information, from a database stored on the hand-held device or on a computing machine different from the hand-held device or a third item of information is captured or recorded by the hand-held device.

11. The method according to claim 10, wherein the third item of information comprises a key or a part of a key for decoding the first item of information or, together with the second item of information, forms a key pair.

12. The method according to claim 10, wherein the third item of information comprises a checksum for the first or the second item of information.

13. The method according to claim 10, wherein the third item of information comprises a redundant reproduction of at least a part of the first item of information.

14. The method according to claim 10, wherein the third item of information comprises a password for database access or for access to an RFID chip.

15. The method according to claim 10, wherein the third item of information comprises an item of information about a reference state of a security feature of the first or the second security element.

16. The method according to claim 15, wherein, by reference to the third item of information, an individual image or an image sequence or a video is displayed on a display of the hand-held device, which demonstrate a reference state of a diffractive security feature of the first or the second security element.

17. The method according to claim 16, wherein the individual image or the image sequence or the video comprises a reproduction of the security feature from different viewing or illumination angles.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) The invention is now explained in more detail by reference to embodiment examples. There are shown in:

(2) FIG. 1 a schematic representation of an embodiment example of a security document;

(3) FIG. 2 a schematic representation of the method sequence during the verification of a security document;

(4) FIG. 3 a schematic representation of the method sequence during the verification of an alternative security document;

(5) FIG. 4 a schematic representation of an embodiment example of a security document with RFID chip;

(6) FIG. 5 a schematic representation of the method sequence during the verification of a security document involving an external database;

(7) FIG. 6 a schematic representation of an alternative embodiment example of a security document with RFID chip;

(8) FIG. 7 a schematic representation of the method sequence during the verification of a security document according to FIG. 6 involving an external database;

(9) FIG. 8 a schematic representation of a further embodiment example of a security document.

DETAILED DESCRIPTION

(10) A security document 1 in the form of a personal identity card comprises an area 11 with readable identity data, a passport photograph 12, and a standardized machine-readable zone 13. The area 11 and the passport photograph 12 are partially overlapped by an optically variable security element 14. A machine-readable security element 15 is additionally provided.

(11) The area 11 comprises personalized data relating to a holder of the security document. These can be, for example, the name of an identity card holder, biometric data, passport photographs, issue and validity dates, nationality, a chassis number or type classification of a motor vehicle associated with the security document, or the like.

(12) These data are also at least partially reproduced in the machine-readable zone 13. By a machine-readable zone 13 is meant here an area of the document which complies with ICAO document 9303, part 3.

(13) The machine-readable security element 15 is preferably formed as a code, in particular as a one- or two-dimensional barcode, in particular as a DataMatrix code, QR code, Aztec code, UPC (Universal Product Code), Code 128, Code 39 or PDF417 code. Such codes can preferably be formed as a diffractive code. Further encoding possibilities for the second security element are for example surface patterns, dot patterns, in particular pixel patterns, numerical codes, special proprietary barcodes such as e.g. color barcodes or three-dimensional barcodes, codes which are written into storage media such as e.g. In volume holograms. Codes based on magnetic storage media (magnetic strips, magnetic inks) as well as codes applied by fluorescent inks (for example UV-fluorescent inks), IR upconverters, polarizing optical elements can alternatively or additionally used. For the optical or electronic reading, additional methods may be required, such as UV illumination, electronic readers for magnetic codes, optical filters which are placed on the document or which are held e.g. In front of the camera lens (e.g. polarization filters, moiré analyzers).

(14) A high information density can hereby be provided in a small space. In particular in the case of a diffractive barcode, there is at the same time an optical security effect which additionally impedes forgery. The diffractive optical effect in the case of a diffractive barcode can provide the actual encoding or form an additional item of encoded information or provide a merely decorative optical effect which contains no encoded information. The decorative effect can also be combined with an item of encoded information.

(15) The security element 14 preferably comprises, individually or in combination, a diffractive structure, a zero-order diffraction structure, a blazed grating, a macrostructure, in particular a lens structure or microprism structure, a mirror surface, a matte structure, in particular an anisotropic or isotropic matte structure, a volume hologram or a thin-film structure with color-change effect.

(16) It is further preferred if the security element 14 comprises a reflective layer, in particular a whole-surface or partial metal layer and/or a whole-surface or partial layer made of a high refractive index (HRI) material.

(17) It is additionally expedient if the security element 14 comprises single- or multi-layered printed structures, in particular comprising colored, optically active and/or optically variable dyes and/or pigments.

(18) Such structures can only be reproduced with difficulty and therefore provide a particularly good level of protection against forgery. At the same time, a variety of appealing optical effects can thus be achieved. As the security element 14 overlaps the area 11 and the passport photograph 12 at least in areas, it is not possible to manipulate these elements without destroying the security feature 14.

(19) As FIG. 2 shows, the document 1 can be captured for authentication using a hand-held device 2, for example a smartphone, with an integrated camera. A corresponding piece of software of the hand-held device captures both the information from the areas 11, 12 and 13 and the machine-readable information of the security element 15.

(20) The information read from the security element 15 can then be displayed on a display 21 of the hand-held device. The user can now check whether this information is consistent with the printed information in the area 11 or whether it, or also the passport photograph 12 or the machine-readable zone 13, has been manipulated.

(21) Furthermore, a reproduction 22 of the security element 14 can also be displayed on the display 21. This serves to assist the user, in order to make it easier for him to identify a correct and not manipulated security element 14. Further information, such as for example the earliest possible date of issue of the document (date of being brought into circulation), can additionally be displayed.

(22) The security element 15 can furthermore contain still further information or perform further functions. It is particularly advantageous if the security element 15 comprises a key or a part of a key for decoding an item of encrypted information contained in the areas 11 or 13.

(23) A particularly high level of protection against forgery is achieved by such an encryption method. For example, the item of information contained in the security element 15 can be the public key of an asymmetric key pair, which acts as a digital signature for a part of the areas 11 or 13 encoded with the private key of the key pair. It is then not possible to manipulate these areas without knowing the private key. For example, the Elliptic Curve Digital Signature Algorithm (ECDSA) and/or, for example, SHA-256 hash algorithm are particularly suitable.

(24) It is likewise possible that the security element 15 comprises a checksum for an item of information contained in the areas 11, 12 or 13. Through such a checksum it is ensured that manipulations on these areas can be recognized immediately. For example, a checksum can comprise several check digits, which are each generated from individual biographical data elements of the security document, such as for example name, date of birth, etc. ICAO document 9303 as well as the equivalent ISO standard 7501, part 1-3 describe an example of a standardized formula for calculating such check digits. However, non-standardized and optionally confidential methods can also be used.

(25) In the embodiment according to FIG. 3 the security element 15 comprises another additional optically variable structure 151. This can likewise be displayed during the verification as a reference reproduction 23 on the display 21 of the hand-held device, which further increases the level of protection against forgery of the document 1.

(26) The optically variable structure 151 likewise preferably comprises, individually or in combination, a diffractive structure, a zero-order diffraction structure, a blazed grating, a macrostructure, in particular a lens structure or microprism structure, a mirror surface, a matte structure, in particular an anisotropic or isotropic matte structure, a volume hologram or a thin-film structure with color-change effect.

(27) It is further preferred if the optically variable structure 151 comprises a reflective layer, in particular a whole-surface or partial metal layer and/or a whole-surface or partial layer made of a high refractive index (HRI) material and/or single- or multi-layered printed structures, in particular comprising colored, optically active and/or optically variable dyes and/or pigments.

(28) As already described, security elements 15 which are visually appealing and particularly secure against forgery can thus be produced.

(29) A detailed view of such a document 1 is reproduced again in FIG. 6.

(30) In the embodiment of the security document 1 according to FIG. 4 an RFID chip 16 is additionally provided on the security document 1. A redundant copy of the information from the areas 11, 12, 13 for example can be stored in the RFID chip 16. This is preferably encrypted, wherein an item of information present in the security element 15 can serve, in the manner already described, as a key for access to the information of the RFID chip.

(31) A query of an external database 3 can additionally be performed, as FIG. 5 shows, by the hand-held device 2. An item of information stored in the security element 15 or in the chip 16 can serve as a password or access key for the database 3. Information from both elements can also be supplemented in order to achieve a particularly high level of security.

(32) The database 3 can in turn provide a copy of the data from the areas 11, 12, 13, supply reproductions 22 of the security elements 14, 15 in the described manner or also provide further keys or checksums for verifying the document 1.

(33) The method sequence for this is illustrated again in FIG. 7. The information of the security elements 15 and 16 is captured and optionally decrypted by the hand-held device 2. The biographical information of the identity card holder stored in the chip 16 is now displayed and can be compared with the information applied in the area 11. An electronically stored passport photograph can optionally also be displayed and compared with the passport photograph 12. Manipulations in the areas 11 and 12 can hereby already be recognized.

(34) At the same time, the hand-held device accesses the database 3 and from there also downloads a copy of the biographical data of the identity card holder. These are now likewise displayed and can likewise be compared with the data stored in the document 1. Thus, it is also possible to recognize a forgery when both the areas 11 and 12 and the security element 15 and the chip 16 are manipulated.

(35) The hand-held device furthermore also obtains the already explained reproduction 22, 23 of the security elements 14, 151 from the database 3 or from the memory in the chip 16 in the security document 1 or from the memory in a chip in the hand-held device 2 and displays it to the user. An item of information of the security element 15 can here be used as an access code or password for the respective database or the respective chip. The respective security element here is preferably represented at several viewing angles, in order thus to demonstrate the optically variable effects of the security elements 14, 151 and to make it easier to verify them.

(36) FIG. 8 shows a further embodiment example of a security document 1. The machine-readable security element 15, which preferably has a machine-readable code, directly adjoins the security element 14, which preferably has an optically variable element. The security elements 14, 15 can be regarded according to the invention as a combined security element 30. It is advantageous if the security elements 14, 15 are formed as a common patch. The security elements 14, 15 can hereby be applied to a substrate of the security document 1 in a single application step.

(37) In FIG. 8 the combined security element 30 overlaps both the area 11 with readable identity data and the passport photograph 12. This has the advantage that it is possible to manipulate the area 11, as well as the passport photograph 12, only by destroying the combined security element 30. However, it is also conceivable that only one of the security elements 14, 15 overlaps the area 11 and/or the passport photograph 12.