Method and device for examining a sheet-shaped or card-shaped valuable document having a security feature having one or more cavities
09683972 ยท 2017-06-20
Assignee
Inventors
- Jan Domke (Vaterstetten, DE)
- Stefan Kokrhoun (Grobenzell, DE)
- Patrick Renner (Reichersbeuern, DE)
- Andre Gregarek (Munich, DE)
Cpc classification
G01N29/348
PHYSICS
G01N29/36
PHYSICS
International classification
G01N29/36
PHYSICS
G01N29/34
PHYSICS
Abstract
A method is for examining a sheet-shaped or card-shaped value document with a security feature having one or more cavities configured in the value document. The width of the cavity or cavities is in at least one respectively specified direction exceeding 10 m. Transmission values are established in a locally resolved manner for the transmission of ultrasound in a specified frequency range. In employing the transmission values, it is checked whether a specified number of transmission values is greater than a specified transmission threshold value.
Claims
1. A method for examining a sheet-shaped or card-shaped value document of a specified type with a security feature having one or more cavities configured in the value document, the width of the cavity or cavities in at least one respectively specified direction exceeding 10 m, the method comprising the steps of: establishing, in a locally resolved manner, transmission values for the transmission of ultrasound in a specified frequency range, checking whether a specified number of the transmission values is smaller than a specified transmission threshold value which corresponds to a transmission that is smaller than the transmission of at least one reference region of the value document or of at least one reference value document not having the cavity or cavities, and in dependence on the result of the checking step, forming a signal which represents an indication of the authenticity of the value document and/or which represents an indication of the presence of a forgery of the value document.
2. The method according to claim 1, wherein the ultrasound has a frequency in the range of 50 kHz to 800 kHz.
3. The method according to claim 1, wherein ultrasonic pulses are employed for establishing the transmission values.
4. The method according to claim 1, wherein the transmission threshold value is determined using the established transmission values.
5. The method according to claim 1, wherein the transmission threshold value was established by examinations of reference value documents of the same type.
6. The method according to claim 1, wherein upon the check it is established whether the respective transmission value lies within a specified interval whose upper limit is the transmission threshold value.
7. The method according to claim 1, wherein only transmission values for a specified region of the value document are used when performing the checking step.
8. The method according to claim 7, wherein the checking step further includes checking whether the distribution of the transmission values in the specified region and/or of those transmission values in the specified region that are smaller than the transmission threshold value satisfies a specified distribution criterion.
9. The method according to claim 1, wherein it is additionally checked whether the locations corresponding to the specified number of transmission values forms a contiguous structure.
10. The method according to claim 1, wherein an extension of the cavity or cavities in the or another direction specified for the respective cavity, parallel to a surface of the value document, is greater than 100 m.
11. The method according to claim 1, wherein an extension of the cavity or cavities in a direction perpendicular to a surface of the value document is greater than 30% of the total thickness of the value document in the region of the cavity or cavities and/or greater than 20 m.
12. The method according to claim 1, wherein the cavity or at least two of the cavities are of line-shaped configuration.
13. The method according to claim 1, wherein the value document comprises a substrate which has partial or complete piercings, and the piercings are covered on both sides by cover layers held on the substrate, and the covered piercings form the cavities.
14. The method according to claim 13, wherein the piercings are disposed in a motif region of the value document.
15. The method according to claim 14, wherein the motif region has a changed visual impression in incident light and/or transmitted light, and/or is configured in the form of a pattern, signs or an encoding.
16. The method according to claim 13, wherein the piercings are of line-shaped configuration and have a width between 0.05 mm and 1 mm.
17. An apparatus for examining a value document with a security feature having one or more cavities configured in the value document, the width of the cavity or cavities in at least one respectively specified direction exceeding 10 m, the apparatus comprising: an ultrasound transmission sensor for detecting locally resolved transmission values for the transmission of ultrasound in a specified frequency range through the value document; a control and evaluation device connected to the ultrasound transmission sensor via a signal connection for evaluation thereof; a transport device for transporting the value document through the ultrasound transmission sensor, wherein the transmission values are detected during the transport of the value document through the ultrasound transmission sensor; wherein the control and evaluation device is configured for checking whether a specified number of transmission values is smaller than a specified transmission threshold value corresponding to a transmission smaller than the transmission of at least one reference region of the value document or of at least one reference value document not having the cavity or cavities, and for forming a signal which represents an indication of the authenticity of the value document and/or which represents an indication of the presence of a forgery of the value document in dependence on the result of the checking step.
18. The apparatus of claim 17, further comprising a data processing device which has a field-programmable gate array (FPGA).
19. The apparatus of claim 17, further comprising a data processing device which has a microcontroller.
20. The apparatus of claim 17, further comprising a data processing device which has a processor and a memory with a data processing program stored therein.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The invention will hereinafter be explained further by way of example with reference to the drawings. Therein are shown:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS
(18) The invention will now be explained by the example of value documents in the form of polymer bank notes.
(19) Referring to
(20) The line grid of the cut lines 22 has in the shown exemplary embodiment a period length of 0.75 mm at a cutting width of the cut lines of 0.25 mm. The surface coverage of the line grid thus amounts to 33%, so that the transmission-view region 12 is recognizable upon viewing both in plan view and in transmission view.
(21) As best recognized in
(22) Returning to the representation of
(23) Visually, the transmission-view region 12 shows as a motif a coat of arms 24 with denomination 26, the appearance being changed in incident light and transmitted light. Additionally, the line grid formed from the cut lines 22 gives the motif region a tactile detectability, since the depressions of the cut lines 22 can be easily felt upon touching the bank notes with the fingers. The cover layers 30 protect the line grid from external influences, in particular from soiling, but retain the tactility of the motif region 12 due to their small layer thickness. The polymeric cover layers on both sides of the piercings also form a suitable continuous surface for the arrangement of further layers, in particular an ink-receiving layer. Due to the normally present elastic properties of the polymeric cover layers, it is ensured that the piercings can be felt with the fingers in particular when the depth amounts to approx. 10 m or more and the width approx. 100 m or more.
(24) This tactile detectability of the motif region 12 thus constitutes, alongside the visual checkability, a further authentication feature that is easily verifiable even by a layman and cannot be imitated with a copying machine, thus offering high-quality protection from forgeries.
(25) The visual checkability of a value document according to
(26) In the exemplary embodiment of
(27) In the exemplary embodiment of
(28) The thus produced motif region 40 shows upon viewing a watermark-like appearance wherein the represented motif is hardly recognizable in incident light, while it appears clearly in transmitted light because of the higher light transmission of the thinned regions. For illustration,
(29) The motif region 40 is also tactilely detectable through the depressions in the substrate formed by the thinning lines 42 and the small layer thickness of the laminated-on cover layers. The tactility of the motif region 40 constitutes, besides the watermark-like plan-view/transmission-view effect, a further authentication feature of the polymer note that is easily checkable even by a layman.
(30) When the laser energy, more precisely, the laser irradiation, i.e. the laser energy per unit surface area, is suitably varied upon lasering, it is also possible to produce relief structures with partial piercings 52 of different depth, as shown in the exemplary embodiment of
(31) The plan-view/transmission-view effects described with reference to the exemplary embodiment of
(32) Partial and complete piercings of the polymer substrate can also be combined, as illustrated in
(33) Referring first to
(34) Referring to
(35) As recognized best in the transmission view of . In a rectangular cut region 74 within the motif region 60, the laser irradiation was increased upon lasering to such an extent that, instead of thinning lines, through-going cut lines 62 were produced in the substrate, which is illustrated in the figures by a narrower hatching. In the interior of the cut region 74 a non-cut region 76 was left in the form of the denomination 20 of the bank note.
(36) When the thus produced motif region 60 is viewed in incident light, as shown in
(37) When the motif region 60 is viewed in transmitted light, however, as represented in .
(38) Since the thinning lines 64 and the cut lines 62 are produced with the same laser beam in the same working operation, they adjoin each other in perfect register in the longitudinal direction, as to be recognized in
(39) Such a motif completing itself in transmitted light offers a high value of attention and recognition, which is further increased by the tactile detectability of the motif region 60.
(40)
(41) As opposed to the exemplary embodiment of
(42)
(43) It will be appreciated that the shown embodiments can be combined with each other at will. For example, it is also possible to produce curved equidistant or curved divergent thinning lines of different depth. Straight and/or curved thinning lines and cut lines can also be combined with each other, as illustrated in principle in
(44) In other exemplary embodiments, there can be employed instead of the polymer substrate a substrate made of bank-note paper. The bank-note paper can consist substantially of natural fibers and/or synthetic fibers.
(45) A value-document processing apparatus 110 in
(46) The sensor assembly 124 in connection with the control and evaluation device 130 serves for detecting properties of the value documents 112 and forming sensor signals rendering these properties. The sensor assembly 124 thus comprises at least one sensor; in this exemplary embodiment there are provided three sensors, namely, a first sensor 132, in the example an optical sensor which detects optical radiation remitted by the value document 112, a second sensor 134, in the example likewise an optical sensor which detects optical radiation transmitted through the value document, and a third sensor 136, in the example an acoustic sensor, more precisely an ultrasonic sensor which detects ultrasonic signals stemming from the value document, in particular transmitted thereby.
(47) While a value document 112 is being transported past, the sensors 132, 134 and 136 detect, in accordance with their function, respective properties of sensing regions on the value document that are determined by the relative position of the sensors to the value document, the corresponding sensor signals thereby being formed. Each of the sensing regions has associated therewith a location that renders the position of the sensing regions for the respective sensor relative to each other and/or relative to the value document.
(48) On the basis of the analog or digital sensor signals of the sensors 132, 134, 136, the control and evaluation device checks whether or not the value document detected by the sensors is deemed authentic and, in dependence on the result of the check, actuates the transport device 118, in particular the gate 120, such that the value document is transported in accordance with the result into one of the output pockets, for example into the output pocket 126, in the example for value documents recognized as authentic, or the output pocket 128, in the example for value documents not recognized as authentic.
(49) The control and evaluation device 130 has for this purpose in particular, besides corresponding interfaces for the sensors, a processor 138 and a memory 140 connected to the processor 138 and storing at least one computer program with program code upon whose execution the processor 138 controls the apparatus or evaluates the sensor signals, in particular for checking the authenticity of a checked value document, and actuates the transport device 118 in accordance with the evaluation.
(50) For this purpose, there is established by the control and evaluation device 130 upon a sensor-signal evaluation for each of the sensors at least one sensing-region property, i.e. at least one local value-document property, which is relevant for testing the value documents with regard to their authenticity. Preferably, a plurality of these properties are established. In dependence on the sensing-region properties, the control and evaluation device 130 respectively establishes for the different sensors authenticity signals that represent whether or not the established sensing properties represent an indication of the authenticity of the value document. In consequence of these signals, corresponding data can be stored in the control and evaluation device 120 for later employment.
(51) In dependence on the authenticity signals, the control and evaluation device 130 establishes an overall result for the authenticity check according to a specified overall criterion and forms in dependence on the result a control signal for the transport device 118, in particular the gate 120. For example, the overall criterion can be such that an authenticity is only recognized when all authenticity signals represent indications of an authenticity of the value document. When this overall criterion is satisfied, the value document is thus classified as authentic, the control and evaluation device 130, by emitting the corresponding control signal, actuates the transport device 118 such that the value document is transported into the output pocket for value documents recognized as authentic, in the example the pocket 126. Otherwise, by emitting the corresponding control signal, it 130 actuates the transport device 118 such that the value document is transported into the output pocket for value documents recognized as non-authentic, in the example the pocket 128.
(52) For processing value documents 112, value documents 112 inserted into the input pocket 114 as a stack or singly are singled by the singler 116 and fed in singled form to the transport device 118, which feeds the singled value documents 112 to the sensor assembly 124. The latter detects properties of the value documents 12, thereby forming sensor signals which render the properties of the value document. The control and evaluation device 130 detects the sensor signals, establishes in dependence thereon an authenticity rating of the respective value document, and actuates the gate 120 in dependence on the result, as described.
(53) The sensor 136 is constructed in the example as follows (cf.
(54) The sensor 136 has a plurality of ultrasonic transducers 142 disposed both transversely to a transport direction T of the value documents 112 and longitudinally thereto substantially in a plane parallel to a along the transport path 122 of the transported value documents 112, and actuated by the control and evaluation device 130, for emitting ultrasonic pulses onto the value document transported past them. These ultrasonic transducers 142 thus serve as ultrasonic transmitters.
(55) Disposed opposite the ultrasonic transducers or transmitters 142 relative to the transport path 122 are the same number of ultrasonic transducers 144 serving as ultrasonic receivers, which so disposed to the control and evaluation device 130 via interfaces not shown in the figures and schematically shown signal connections that they can receive ultrasonic waves that emanate from a value document 112 transported along the transport path 122 and are caused by acoustic irradiation with ultrasonic pulses of the ultrasonic transmitters 142.
(56) Each of the ultrasonic transmitters 142 has associated therewith one of the ultrasonic receivers 144 such that there results therebetween an ultrasonic path 146 extending at least approximately orthogonally to a value document 112 transported along the transport path 122, along which ultrasonic path an ultrasonic pulse emitted by the respective ultrasonic transmitter 142 runs to the ultrasonic receiver 144 associated therewith. With each pair of ultrasonic transmitters and ultrasonic receivers associated therewith or with each ultrasonic path 146 in connection with the control and evaluation device 130, it is thus possible to ascertain a value for the ultrasound transmission of the value document 112 at the acoustically irradiated location on the value document.
(57) The ultrasonic transducers 142 or 144 are so configured that they are configured for emitting or receiving ultrasonic pulses with a duration in the range of, in the example, about 30 s and an ultrasonic frequency, i.e. an amplitude maximum of the frequency spectrum of the ultrasonic pulse, of, in the example, about 400 kHz. Further, they are so dimensioned that a respective spot 148, i.e. sensing region, acoustically irradiated upon acoustic irradiation with the ultrasonic pulses on a value document 112 transported along the transport path 122 has a diameter of about 2 mm. Each of the sensing regions has associated therewith, as the location, the center of the sensing region.
(58) The ultrasonic transmitters 142 and ultrasonic receivers 144 are so disposed in planes parallel to the value document 112 in the transport path 122 that values for the ultrasound transmission are detectable for strip-shaped detection regions 150 extending parallel to the transport direction T, as represented in
(59) Altogether, there can thus result a distribution, represented for a value document 112 schematically in
(60) There thus results a regular arrangement of the sensing regions or locations on the value document 112, in the example a substantially hexagonal arrangement. The arrangement of the ultrasonic transmitters 142 and ultrasonic receivers 144 is so chosen that the distance of consecutive locations in one of the strips or detection regions 150 is smaller than 1 cm. In the example, the distance of nearest neighboring locations amounts to about 1 cm.
(61) The sensor 136 has in the exemplary embodiment in particular twenty-four ultrasonic transmitter/receiver pairs or ultrasonic paths 146, which are so disposed that the detection regions 150 or tracks have a distance between 3 and 4 mm.
(62) For detecting the transmission values, the control and evaluation device 130 detects at constant time intervals the sensor signals of the ultrasonic receivers 144 which render the intensity or power of individual receiving ultrasonic pulses as a function of time and thus, due to the constant transport speed, also of location. Using these signals, the control and evaluation device 130 also establishes the entry of a value document into the detection region of the sensor 136. In other exemplary embodiments, such entry can also be effected in dependence on signals of other sensors and the transport speed. The transmission values are given here simply by the received ultrasonic pulse energies, assuming a basically constant transmit power of the ultrasonic transmitters 142. In other exemplary embodiments, however, it is also possible to divide the received ultrasonic pulse energies by a specified or measured ultrasonic pulse energy of transmitted pulses and thus obtain normalized transmission values.
(63) The established transmission values are stored so as to be associated with the locations for which they were detected. This can be effected for example in such a way that the transmission values are stored in the memory 140 in the time sequence of their detection separately for each of the detection regions 150. The detection region 150 then corresponds to a coordinate in a direction transverse to the transport direction, and the position in the row along the detection region 150 to a coordinate in transport direction T.
(64) The frequency at which the ultrasonic pulses are successively emitted and transport speed of the value document are so chosen that at least five transmission values are detected in each detection region 150 along the transport direction of the value document. In the example, transmission values are detected at a distance of 3 mm, preferably 2 mm, along the transport direction, or 60 to 90 transmission values for the detection region. However, there can also be more or fewer values.
(65) Starting out from these transmission values present for a value document as a function of location, the control and evaluation device 130, more precisely the processor 138, now carries out, when executing program code of the computer program stored in the memory 140, the following method for establishing the authenticity of the value document. The method is illustrated very schematically as a flowchart in
(66) In the described exemplary embodiment, the specified type of value document employed is the type of bank note shown in
(67) In step S10, transmission values for the transmission of ultrasound through the value document are established in a locally resolved manner by means of the ultrasonic sensor and the control and evaluation device.
(68) In step S12, the control and evaluation device 130 establishes whether the value document has a specified value-document type and which position it has. If this is the case, the value-document type is stored for further employment. Otherwise, an error message is issued, whereupon the method is aborted. For establishing the value-document type and the position there can be employed for example the data of one of the optical sensors. Methods for this purpose are known to the person skilled in the art.
(69) In steps S14 and S16, it is checked whether a specified number of transmission values is smaller than the specified transmission threshold value, which corresponds to a transmission that is smaller than the transmission of the reference region of the value document not having the cavity or cavities.
(70) In step S14, the transmission values in the region specified for the value-document type, in
(71) In step S16, it is checked whether a specified number or amount of the transmission values in the specified region 152 is greater than the transmission threshold value. The number or amount of the transmission values is specified in dependence on the type of the value document, in particular the smallest portion of the value document in which the security feature or the cavities of the security feature are disposed, and the local resolution of the ultrasonic sensor, and is to be regarded as a minimum number. For the check, the number of the transmission values lying within the interval as established in step S14 is established and compared with the minimum number. The result of the comparison is stored.
(72) In step S18, it is additionally checked as a further criterion whether the locations corresponding to the specified number of transmission values form a contiguous structure. For this purpose, the locations corresponding to the transmission values lying within the interval are established. Thereafter it is checked whether these locations include a group with at least the minimum number which form a contiguous region, i.e. whether each one of the locations of the respective group has at least one further one of the locations of the group directly neighboring thereto.
(73) If the checks in the steps S16 and S18 yield that the specified number was reached and the locations associated with transmission values within the interval form a contiguous region, the control and evaluation device 130 forms in step S20 a signal representing an indication of the authenticity of the security feature or of the value document.
(74) Otherwise, the control and evaluation device 130 forms a signal representing an indication of the presence of a forgery of the value document.
(75) The signal serves for storing a corresponding authenticity indication value.
(76) The signal or authenticity indication value is used, as described hereinabove, with corresponding signals or authenticity indication values for the other sensors for establishing the authenticity of the value document.
(77) A second exemplary embodiment differs from the described first exemplary embodiment in that, in a step S13 between the unchanged step S10 and a step S14 replacing the step S14, the specified transmission threshold value is established on the basis of the detected transmission values for the value document. The step S13 can be carried out before or after step S12. For this purpose, the control and evaluation device 130 establishes an arithmetic average over all transmission values detected for the value document outside the region 152. This average, lowered by 10% in the example, is employed as the specified transmission threshold value that is set as the upper limit of the interval. The lower limit remains unchanged.
(78) A third exemplary embodiment differs from the first exemplary embodiment in that, instead of the step S18, a step S18 is performed in which, instead of checking whether the transmission values undershooting the transmission threshold value, a check is carried out that takes into consideration the distribution of those transmission values in the specified region that are smaller than the transmission threshold value. More precisely, it is checked whether the locations corresponding to transmission values that lie within the interval form the pattern comprising the region 24 with cavities and, configured therein, the region 26 without cavities as recognizable in
(79) If the checks in the steps S16 and S18 yield that the specified number was reached and the locations associated with transmission values within the interval have the specified distribution, i.e. form the specified pattern here, the control and evaluation device 130 forms, in a step S20 replacing the step S20, a signal representing an indication of the authenticity of the security feature or of the value document.
(80) The further processing is effected as in the first exemplary embodiment.
(81) A further exemplary embodiment differs from the first exemplary embodiment in that the step S18 is omitted, and in a step S20 corresponding to the step S20 the signal is formed only in dependence on the result in step S16.
(82) Yet other exemplary embodiments differ from the above-described exemplary embodiments in that not only transmission values in the region 152 are checked, but all transmission values. Groups of transmission values are then sought that are given by the locations associated with the transmission values forming a contiguous structure. Among these, groups are then sought whose number of transmission values is greater than the minimum number. Finally, the position of the locations corresponding to the transmission values of the group is then established on the value document.
(83) When a group is found and its locations lie within the specified region 152, a signal is formed or a value is stored which signal or value represents an indication of the authenticity of the value document.
(84) Further exemplary embodiments differ from the above-described exemplary embodiments in that the ultrasonic transmitters and ultrasonic receivers are so disposed that the ultrasonic paths respectively formed therebetween extend so as to be inclined relative to the transport plane in which value documents are transported through the ultrasonic sensor. In this case, ultrasound can also be emitted as continuous sound, with the receivers being modified accordingly.
(85) Yet other exemplary embodiments differ from the above-described exemplary embodiments in that there is employed instead of a polymer substrate a substrate made of bank-note paper in which the cavity-forming piercings are configured. The bank-note paper can consist substantially of natural fibers and/or synthetic fibers.