VERIFICATION OF AN ARTICLE PROVIDED WITH A SECURITY ELEMENT
20210074109 · 2021-03-11
Inventors
Cpc classification
G07D7/207
PHYSICS
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
International classification
G07D7/207
PHYSICS
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
Abstract
A method for verifying an object is furnished with a security element in which the security element is manufactured in a multi-step method with register variations and contains in a check field an individual characteristic feature of the security element in the form of a superimposition of at least two areal regions. The check field of the security element is optically captured by a camera, the area proportions of the superimposed and not superimposed areal regions are determined and from it a check value for the individual characteristic feature of security element is formed and compared with a reference check value, on which a verification result for the object furnished with the security element is created.
Claims
1.-20. (canceled)
21. A method for verifying an object furnished with a security element in which the security element is manufactured in a multi-step method with register variations and contains in a check field an individual characteristic feature of the security element in the form of a superimposition of at least two areal regions, which are generated upon the manufacture of the security element in different manufacturing steps with register variations, wherein in the method the check field of the security element is optically captured by a camera, the area proportions of the superimposed and/or not superimposed areal regions are determined and from it a check value for the individual characteristic feature of the security element is formed, the formed check value is compared with a reference check value, and on the basis of the comparison result, a verification result for the object furnished with the security element is created.
22. The method according to claim 21, wherein the reference check value is formed upon or after the manufacture of the security element, or upon or after the furnishing of the object with the security element, by determining the area proportions of the superimposed and/or not superimposed areal regions and forming therefrom the reference check value.
23. The method according to claim 21, wherein the reference check value is stored in a database together with an individual marking of the security element and/or the object and is queried from the database for comparison with the formed check value.
24. The methods according to claim 21, wherein the reference check value is present in particular in encrypted or encoded form in the security element or in the object furnished with the security element and is read in for comparison with the formed check value.
25. The method according to claim 21, wherein the check field of the security element is optically captured by a smartphone camera and the determination of the area proportion and the forming of the check value is effected through a software program running on the smartphone.
26. The method according to claim 21, wherein the verification method is carried out in a check field, which contains a superimposition of three, four or more areal regions, which are generated upon the manufacture of the security element in different manufacturing steps with register variations.
27. The method according to claim 21, wherein the verification method is carried out in a check field whose areal regions are generated at least partly by printing methods.
28. The method according to claim 21, wherein the verification method is carried out in a check field whose areal regions are formed at least partly by applications, or by elements or windows on the applications.
29. The method according to claim 21, wherein the verification method is carried out in a check field whose areal regions are formed at least partly by planar laser cuttings, watermarks, laser markings, ink-jet inscriptions or toner-based methods.
30. The method according to claim 21, wherein the verification method is carried out in a check field whose areal regions consist respectively of a multiplicity of small print elements.
31. The method according to claim 30, wherein the check field has several partial regions in which the relative locations of the respective print elements are displaced relative to each other.
32. The method according to claim 21, wherein the verification method is carried out in a security element which is integrated in the object.
33. A verification system for the carrying out of the method according to claim 21, having an object furnished with a security element in which the security element is manufactured in a multi-step method with register variations and contains in a check field an individual characteristic feature of the security element in the form of a superimposition of at least two areal regions, which are generated upon the manufacture of the security element in different manufacturing steps with register variations and a checking apparatus for the verification of the object, having a camera for the optical capture of the check field of the security element, an evaluation unit for determining the area proportions of the superimposed and not superimposed areal regions and for forming a check value for the individual characteristic feature of the security element therefrom, and means for comparing the formed check value with a reference check value and for creation of a verification result on the basis of the comparison result.
34. The verification system according to claim 33, wherein the checking apparatus contains means for capturing an encoded reference check value, for decoding the captured reference check value and for comparing the formed check value with the decoded reference check value.
35. The verification system according to claim 33, wherein the verification system comprises a database, in which are deposited for the security elements respectively a reference check value together with an individual marking of the security element and/or the object, and that the checking apparatus contains means for querying the reference check value or the comparison result of check value and reference check value from the database on the basis of the individual marking of the security element and/or the object.
36. The verification system according to claim 33, wherein the checking apparatus is a bank-note processing machine or a smartphone.
37. Security element for a verification system according to claim 33 which is manufactured in a multi-step method with register variations and contains in a check field an individual characteristic feature of the security element in the form of a superimposition of at least two areal regions which are generated upon the manufacture of the security element in different manufacturing steps with register variations.
38. An object, in particular value document, security paper, identification card or branded article having a security element according to claim 37.
39. A checking apparatus for a verification system according to claim 33, having a camera for the optical capture of the check field of the security element, an evaluation unit for determining the area proportions of the superimposed and not superimposed areal regions and for forming a check value for the individual characteristic feature of the security element therefrom, and means for comparing the formed check value with a reference check value and for creating a verification result on the basis of the comparison result.
40. A computer program product which has machine-readable program commands for a control unit of a data-processing apparatus which cause the latter to execute a method according to claim 21.
Description
[0065] Further embodiment examples as well as advantages of the invention will be explained hereinafter with reference to the figures, in whose representation a rendition that is true to scale and to proportion has been dispensed with in order to increase the clearness.
[0066] There are shown:
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073] The invention will now first be explained by the example of the verification of a bank note with the help of a smartphone.
[0074] For checking the authenticity, the bank note 10 having the check field 12 can simply be captured optically in the hereinafter described manner with a smartphone camera and verified with the help of a check app installed on the smartphone.
[0075] In the process, the bank note 10 and the check field 12 are generated in a multi-step method with register variations. For example, the denomination number 14-A was applied to the bank note 10 in the screen printing method, a portrait 16-A in the intaglio printing method, and a serial number 18 in letterpress. Simultaneously with the denomination number 14-A, a first checkered pattern 14-B (in
[0076] The present inventors have now recognized that these unavoidable register variations of the different manufacturing processes can serve as a kind of fingerprint for the identification of a certain security element or a certain bank note.
[0077] For estimating, one can assume, for example, that the manufacturing steps involved in the generation of the check field 12 have respectively register variations of 1 mm in mutually orthogonal directions (hereinafter designated as x and y direction). The maximally allowed variation amounts to, for example, 1.5 mm. A typical smartphone camera with nominally 6 megapixels has a resolution of 28482136 pixels.
[0078] When, using such a camera, an area is recorded which contains at least the check field 12 and the serial number 18, for example, with a receiving area of 120 mm90 mm, a point density of about 600 dpi or a resolution of 42 m results. In two manufacturing steps there therefore result in every direction 2000 m/40 m=50 distinguishable locations, thus altogether 50.sup.2=2,500 different combinations of register variations. If three manufacturing steps are rendered in the check field 12, already 6,250,000 possibilities result.
[0079] If an areal region is present, for example in a security thread whose insertion location can vary in transverse direction by 3 mm, thus the number of the possibilities can again be multiplied by 6000 m/40 m=150. For a security thread having a well recognizable subject, the location can also be employed in the longitudinal direction and thus further increase the number of the possible combinations.
[0080] With reference to
[0081] As is evident from the above estimate, the number of possible register variation combinations at the current resolution of smartphone cameras for two production steps is usually still too low to be able to make a clear identification of a bank note. Nevertheless, the number of the possibilities is already so large that in spite of the simple check with a smartphone, upon a positive verification an authentic bank note can be inferred with high probability. If a greater number of manufacturing steps is included, the number of register variation combinations can also be sufficient for an unambiguous identification of a bank note.
[0082] The check value derived from the relative area proportions can be captured upon or immediately after the manufacture of the bank note 10, for example upon the quality control of the bank notes, for the first time and be deposited together with the serial number 18 of the bank note 10 as a reference check value in a database 34 (
[0083] For the verification, the bank note 10 is then photographed, as shown in
[0084] The check app then sets up a connection 36 from the smartphone 30 to the database 34 and transfers the serial number 18 and the formed check value. In the database 34, the transferred check value is compared with the reference check value stored there for the serial number 18 and the comparison result is transferred back to the check app via the connection 36. This displays the result of the authenticity check, for example, in the display 38 and can give, for reinforcement, also an acoustic feedback about the successful or failed verification. In a variant, the database can also transfer the stored reference check value to the check app and the comparison of the formed check value with the reference check value can be performed in the check app itself.
[0085] Alternatively or additionally, the reference check value can, after its first-time capture, also be applied in encrypted form to the bank note 10, for example in the form of a bar code 28 arranged beside the check field 12. For verification, the bank note 10 can then be photographed by a user with the camera of his or her smartphone 30 and thereby the check field 12 be optically captured together with the bar code 28. The check app executed on the smartphone 30 then establishes via the image-processing module the area proportions 20-26 in the check field 12, forms therefrom the check value for bank note 10, reads the bar code 28 and decrypts the reference check value encoded thereby. The established check value is compared with the decrypted reference check value and the result of the authenticity check is displayed in the display 38 and is outputted, where applicable, also acoustically.
[0086] For the sake of simpler representation, a superimposition of only two areal regions is shown in
[0087] For the determination of the check value, the image captured by the camera of the smartphone is advantageously preprocessed in the above-described manner. Then, for example, a histogram can be formed in which the pixel frequencies of different colors or gray levels are determined. Further threshold values can be formed in different gradations or different color channels and the obtained pixel numbers again be determined, similar to a histogram. Further statistical methods of image processing which correlate different fields, for example via correlations with each other, can be also applied.
[0088] As shown in
[0089] To remedy this, in one or several partial regions the print elements 48-R, 48-G, 48-B are arranged offset relative to each other such that with perfect register they do not cover each other completely. This is illustrated in
[0090] A check field does not have be present on the document as a separate field, it can also be integrated into the graphic design of the document, as is illustrated with the help of check field 50 of
[0091] In the process, the user does not need to know the presence or the position of check field 50 in graphic design 52. It suffices when the user records the entire bank note or at least the design 52 with his or her smartphone camera 30, because the check app knows the position of the check field 50 and its properties to be checked. Should the recording quality be insufficient or the check field 50 be recorded incompletely, the check app can generate an error message and request a renewed recording, where applicable, with an indication of the region to be recorded.
[0092]
[0093] After the transport of the cashbox 62, the receiver can first check whether the security element 60 is intact and then verify that the security element 60 actually belongs to the identification number 66 of the cashbox 62. For this purpose, he or she merely has to photograph the check field of the security element 60 with the camera of his or her smartphone and input the identification number 66 of the cashbox 62 or likewise photograph it. The app then forms the check value for the security element 60, establishes, where applicable, the identification number 66 via an OCR module, then sets up a connection to the database 34 and transfers the identification number 66 and the formed check value. In the database 34, the transferred check value is compared with the reference check value stored there as to the identification number 66 and the comparison result is transferred back to the smartphone app which communicates the success or failure of the verification to the receiver.
LIST OF REFERENCE SIGNS
[0094] 10 Bank note [0095] 12 Check field [0096] 14-A Denomination number [0097] 14-B First checkered pattern [0098] 16-A Portrait [0099] 16-B Second checkered pattern [0100] 18 Serial number [0101] 20, 22, 24, 26 Areal regions [0102] 28 Bar code [0103] 30 Smartphone [0104] 32 Photographic capture [0105] 34 Database [0106] 36 Connection [0107] 40 Check field [0108] 42, 44, 46 Partial regions [0109] 48-R, 48-G, 48-B Print elements [0110] 50 Check field [0111] 52 Graphic [0112] 54 Part of the leaf structure [0113] 56 Green apples [0114] 58 Red apples [0115] 60 Security element [0116] 62 Cash box [0117] 64 Cover gap [0118] 66 Identification number