METHOD FOR AUTHENTICATING A SECURITY DOCUMENT
20230062072 · 2023-03-02
Inventors
- Harald Walter (Horgen, CH)
- Corrado Fraschina (Bonstetten, CH)
- Sebastian Mader (Baar, CH)
- Benno Schmitzer (Zirndorf, DE)
- Uwe Frieser (Büchenbach, DE)
- Hendrik Von Prince (Erlangen, DE)
Cpc classification
G07D7/17
PHYSICS
International classification
G07D7/00
PHYSICS
G07D7/17
PHYSICS
Abstract
A method for authenticating a security document by means of at least one device includes: a) providing the security document having at least one first security element and at least one second security element; b) providing the at least one device, wherein the at least one device includes at least one sensor; c) capturing first items of optical information of the at least one first security element by means of the at least one sensor of the at least one device during a first illumination, wherein at least one first dataset specifying these items of information is generated therefrom; d) capturing second items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a second illumination, wherein at least one second dataset specifying these items of information is generated therefrom; e) capturing third items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a third illumination, wherein at least one third dataset specifying these items of information is generated therefrom, wherein the second illumination differs from the third illumination; f) checking the genuineness of the security document and/or the second security element at least on the basis of the at least one second dataset and the at least one third dataset.
Claims
1. A method for authenticating a security document by means of at least one device, wherein in the method the following steps are carried out: a) providing the security document comprising at least one first security element and at least one second security element, b) providing the at least one device, wherein the at least one device comprises at least one sensor, c) capturing first items of optical information of the at least one first security element by means of the at least one sensor of the at least one device during a first illumination, wherein at least one first dataset specifying these items of information is generated therefrom, d) capturing second items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a second illumination, wherein at least one second dataset specifying these items of information is generated therefrom, e) capturing third items of optical information of the at least one second security element by means of the at least one sensor of the at least one device during a third illumination, wherein at least one third dataset specifying these items of information is generated therefrom, wherein the second illumination differs from the third illumination, f) checking the genuineness of the security document and/or the at least one second security element at least on the basis of the at least one second dataset and the at least one third dataset.
2. The method according to claim 1, wherein the at least one device in step b) is selected from: smartphone, tablet, spectacles and/or PDA, wherein the at least one device has a lateral dimension in a first direction (X) of from 50 mm to 200 mm, and/or has a second lateral dimension in a second direction (Y) of from 100 mm to 250 mm.
3. The method according to claim 2, wherein the first lateral dimension in the first direction (X) and the second lateral dimension in the second direction (Y) of the at least one device in step b) span at least one shielding surface.
4. The method according to claim 3, wherein the at least one shielding surface has an outline in the plane spanned by the first direction (X) and the second direction (Y).
5. The method according to claim 1, wherein, the at least one shielding surface of the at least one device in step b) shields the security document and/or the at least one first security element and/or the at least one second security element from diffuse illumination and/or background illumination.
6. The method according to claim 1, wherein, the at least one sensor of the at least one device in step b) is an optical sensor.
7. The method according to claim 1, wherein, the at least one sensor of the at least one device in step b) has a distance and/or an average distance and/or minimum distance from the outline of the at least one shielding surface, of from 3 mm to 70 mm.
8. The method according to claim 1, wherein, the at least one device in step b) comprises at least one internal light source.
9. The method according to claim 1, wherein, the at least one sensor of the at least one device in step b) has a distance and/or an average distance from the at least one internal light source of the at least one device of from 5 cm to 20 cm.
10. The method according to claim 1, wherein, the at least one device in step b) comprises at least one output unit.
11. Method according to claim 1, wherein, the method comprises the following further step: b1) outputting instructions and/or items of user information before and/or during the capture of the first, second and/or third items of optical information of the at least one first or second security element in steps c), d) or e) to a user by means of the at least one device.
12. The method according to claim 1, wherein, the method comprises the following further step: b2) outputting instructions and/or items of user information before and/or during the capture of the second and/or third items of optical information of the at least one first or second security element in steps d) or e), at least on the basis of the at least one first dataset and/or the at least one second dataset, to a user by means of the at least one device.
13-14. (canceled)
15. The method according to claim 1, wherein, the first, second and/or third items of optical information of the at least one first or second security element in steps c), d) or e) are captured by means of the at least one sensor of the at least one device.
16. The method according to claim 1, wherein, the first illumination during the capture of the first items of optical information of the at least one first security element in step c) is diffuse or is directed or has diffuse and directed portions and/or is background illumination.
17. The method according to claim 1, wherein, the second illumination during the capture of the second items of optical information of the at least one second security element in step d) is diffuse.
18. The method according to claim 1, wherein, the at least one device and/or the at least one shielding surface of the at least one device is arranged during the capture of the second items of optical information of the at least one second security element in step d) such that the at least one device and/or the at least one shielding surface of the at least one device shields against at least 75% of directed and/or diffuse portions of the light of all external light sources in the environment of the security document and/or of the at least one second security element.
19. The method according to claim 1, wherein, the at least one device and/or the at least one shielding surface of the at least one device is arranged during the capture of the second items of optical information of the at least one second security element in step d) such that the at least one device and/or the at least one shielding surface of the at least one device shields the security document and/or the at least one second security element from at least 75% of directed and/or diffuse portions of the light of all external light sources at a distance of at least 0.3 m.
20. (canceled)
21. The method according to claim 1, wherein, the directed third illumination is emitted by the at least one internal light source of the at least one device.
22. The method according to claim 1, wherein, the directed third illumination is emitted by the at least one internal light source of the at least one device at a solid angle smaller than or equal to 10°.
23. The method according to claim 1, wherein, the directed third illumination from the at least one internal light source of the at least one device has a luminous intensity of from 5 lumens to 100 lumens.
24. The method according to claim 1, wherein, the second items of optical information of the at least one second security element are not captured in step e) by means of the at least one sensor of the at least one device.
25. The method according to claim 1, wherein, the third items of optical information of the at least one second security element in step e) comprise an item of optical and/or geometric information and/or wherein the third items of optical information of the at least one second security element in step e) do not comprise the item of optical and/or geometric information.
26. The method according to claim 1, wherein, the method comprises the following further step: f1) outputting instructions and/or items of user information before and/or during the checking of the genuineness of the security document and/or of the at least one second security element, at least on the basis of the at least one second dataset and the at least one third dataset, to a user by means of the at least one device.
27. The method according to claim 1, wherein, the at least one first security element in step a) is selected from: barcode, QR code, alphanumeric characters, numbering, hologram, print, barcode, QR code, number, hologram or kinegram design and/or printed design of a product or combinations thereof.
28. The method according to claim 1, wherein, the at least one second security element in step a) comprises at least asymmetrical structures, holograms, micromirrors, matte structures, kinegram, blazed gratings, diffraction structures, mirror surfaces, microlenses, and/or combinations of these structures.
29. (canceled)
30. A security document comprising at least one first security element and at least one second security element.
31-32. (canceled)
33. A device comprising at least one processor, at least one memory, at least one sensor, at least one output unit and/or at least one internal light source.
34. The device according to claim 33, wherein the at least one device is selected from: smartphone, tablet, spectacles and/or PDA, wherein the at least one device (2) has a lateral dimension in a first direction (X) of from 50 mm to 200 mm, and/or has a second lateral dimension in a second direction (Y) of from 100 mm to 250 mm.
35. The device according to claim 33 wherein, the first lateral dimension in the first direction (X) and the second lateral dimension in the second direction (Y) of the at least one device span at least one shielding surface.
36. The device according to claim 33, wherein, the at least one shielding surface has an outline in the plane spanned by the first direction and the second direction (Y).
37-41. (canceled)
Description
[0174] The invention is explained by way of example below with reference to several embodiment examples with the aid of the attached drawings. There are shown in:
[0175]
[0176]
[0177]
[0178]
[0179]
[0180]
[0181]
[0182]
[0183]
[0184]
[0185]
[0186]
[0187]
[0188]
[0195]
[0196] In particular, the security document 1 is utilized for use in an above-mentioned method.
[0197] Such a security document 1 is preferably provided in step a.
[0198] Further, it is possible for the first security element 1a in step a to be selected from: barcode, QR code, alphanumeric characters, numbering, hologram, print or combinations thereof.
[0199] The second security element 1b in step a preferably comprises at least asymmetrical structures, holograms, in particular computer-generated holograms, micromirrors, matte structures, in particular anisotropic scattering matte structures, in particular asymmetrical sawtooth relief structures, kinegram, blazed gratings, diffraction structures, in particular linear sinusoidal diffraction gratings or crossed sinusoidal diffraction gratings or linear single- or multi-step rectangular gratings or crossed single- or multi-step rectangular gratings, mirror surfaces, microlenses, or combinations of these structures.
[0200] The first, second and/or third items of optical information of the first or second security element 1a, 1b in steps c, d or e are preferably captured by means of the sensor 20 of the device 2.
[0201] It is possible for the at least one first, second and/or third dataset in steps c, d, e, f and/or f1 to comprise an image sequence comprising at least one individual image of the at least one first or second security element.
[0202] A second security element is preferably integrated in the first security element 1a, which has the shape of a cloud.
[0203] It is alternatively possible for the shape and the print design of the security document 1 or the banknote to be the first security element 1a, which makes it possible to discover the position of the foil strip 1d relative to the second security element and thus in particular to capture the second security element through suitable evaluation of a dataset captured hereby by means of a device.
[0204]
[0205] The above-mentioned device 2 is preferably used to authenticate an above-mentioned security document 1 in the above-mentioned method.
[0206] The device 2 shown in
[0207] It is possible for the method to comprise the following further step, in particular between steps b and c: [0208] b1 outputting instructions and/or items of user information before and/or during the capture of the first, second and/or third items of optical information of the first or second security element 1a, 1b in steps c, d or e to a user by means of the device 2, in particular by means of the output unit 21 of the device 2, from which the user preferably infers a predetermined relative position or relative position change or relative position progression, a predetermined distance, in particular the distance h, or distance change or distance progression and/or a predetermined angle or angle change or angle progression between the device 2 and the security document 1 and/or the first and/or second security feature 1a, 1b during the capture of the first, second and/or third items of optical information.
[0209] Further, it is possible for the method to comprise the following further step, in particular between steps b and c and/or c and d: [0210] b2 outputting instructions and/or items of user information before and/or during the capture of the second and/or third items of optical information of the first or second security element 1a, 1b in steps d or e, at least on the basis of the at least one first dataset and/or the at least one second dataset, to a user by means of the device 2, in particular by means of the output unit 21 of the device 2, from which the user preferably infers a predetermined relative position or relative position change or relative position progression, a predetermined distance, in particular the distance h, or distance change or distance progression and/or a predetermined angle or angle change or angle progression between the device 2 and the security document 1 and/or the first and/or second security feature 1a, 1b during the capture of the second and/or third items of optical information.
[0211] It is possible for the device 2, in particular in step b, further to be selected from: tablet, spectacles and/or PDA.
[0212] The device 2 shown in
[0213] Further, it is possible for the first lateral dimension in the direction X and the second lateral dimension in the direction Y of the device 2 to span a shielding surface 2a.
[0214] The device shown in
[0215] The shielding surface 2a of the device 2 shown in
[0216] Further, it is also possible for the shielding surface 2a of the device 2 and/or the device 2 in steps c, d and/or e to have a distance h and/or an average distance from the security document 1 and/or the first security element 1a and/or the second security element 1b of from 20 mm to 150 mm, in particular from 50 mm to 130 mm, preferably from 60 mm to 125 mm.
[0217] The output unit 21 of the device 2 shown in
[0218] The device 2 shown in
[0219] The sensor 20 of the device 2 shown in
[0220] It is possible for the sensor 20 of the device 2 shown in
[0221] Further, it is possible for the internal light source 22 of the device 2 shown in
[0222] In particular, the sensor 20 of the device 2 shown in
[0223] Advantageously, the first illumination during the capture of the first items of optical information of the first security element 1a in step c is diffuse or directed or has diffuse and directed portions and/or is background illumination.
[0224] It is possible for the device 2 to have at least one processor, at least one memory, at least one sensor 20, at least one output unit 21 and/or at least one internal light source 22.
[0225]
[0226] The security document 1 shown in
[0227]
[0228] The sensor 20 of the device 2 and/or the device 2 in steps c, d and/or e preferably has a distance h and/or an average distance from the security document 1 and/or the first security element 1a and/or the second security element 1b of from 20 mm to 150 mm, in particular from 50 mm to 130 mm, preferably from 60 mm to 125 mm.
[0229] The shielding surface 2a of the device 2 shields the security document 1 or the first and second security elements 1a, 1b from a portion of the second, in particular directed, illumination 221. In particular, only the portion of the second illumination 221 which preferably does not generate an optical effect in the direction of the sensor 20 reaches the second security element 1b, with the result that in particular no third items of optical information from the second security element 1b are capturable for the sensor 20. The security document 1 and/or the second security element 1b here are preferably illuminated from the field of view of the sensor substantially with diffusely reflected and/or scattered ambient light.
[0230] Here, tests have shown that the smaller the distance h is, the better the shielding action of the device 2 is. On the other hand, the distance must in particular not be too small, in order that the sensor 20 can still focus. The typical range for the distance h is therefore, for example, between 20 mm and 150 mm, preferably between 50 mm and 130 mm, further preferably between 60 mm and 125 mm.
[0231] It is further possible for the second illumination during the capture of the second items of optical information of the second security element 1b in step d to be diffuse, in particular wherein the diffuse second illumination comprises diffuse portions of the light of the external light sources 3 in the environment of the security document 1 and/or of the second security element 1b, in particular at a distance to at least 0.3 m, preferably 1 m, further preferably 5 m, from the security document 1 and/or from the second security element 1b, and/or in particular wherein the diffuse second illumination comprises ambient light and/or background light.
[0232] In particular, the device 2 and/or the shielding surface 2a of the device 2 is arranged during the capture of the second items of optical information of the second security element 1b in step d such that the device 2 and/or the shielding surface 2a of the device 2 shields against at least 75%, in particular at least 90%, preferably at least 95%, further preferably at least 99%, of directed portions of the light of the external light sources 3 in the environment of the security document 1 and/or of the second security element 1b.
[0233] It is advantageous that the device 2 and/or the shielding surface 2a of the device 2 is arranged during the capture of the second items of optical information of the second security element 1b in step d such that the device 2 and/or the shielding surface 2a of the device 2 shields the security document 1 and/or the second security element 1b from at least 75%, in particular at least 90%, preferably at least 95%, further preferably at least 99%, of directed portions of the light of the external light sources 3 at a distance of at least 0.3 m, preferably of at least 1 m, further preferably of at least 5 m.
[0234]
[0235]
[0236] It is preferably checked here whether the security element not capturable, under the second illumination, by the sensor of the device is not present as a permanently capturable security element, such as for example as a printed imitation.
[0237]
[0238] In particular, the second illumination 221 shown in
[0239] The shielding surface 2a of the device 2 shields the security document 1 or the first and second security elements 1a, 1b from a portion of the second, in particular directed, illumination 221, which is in particular included in the third illumination 222. In particular, the light 22a of the internal light source 22 as well as only a portion of the second illumination 221 reaches the second security element 1b, wherein an optical effect is preferably generated in the direction of the sensor 20, with the result that in particular third items of optical information from the second security element 1b are capturable for the sensor 20.
[0240] The second security element 1b is preferably designed such that it generates the third items of optical information, which in particular can be captured by the sensor 20 here and can be processed further by algorithms, in the case of almost perpendicular, directed light 22a, 222.
[0241] Further, it is possible for the directed light 22a from the internal light source 22 of the device 2 or the third illumination 222 from the internal light source 22 of the device 2 to be emitted at a solid angle smaller than or equal to 10°, in particular smaller than or equal to 5°, in particular wherein the average direction of propagation of the directed third illumination is aligned, in particular substantially, perpendicular to the plane spanned by the security document 1 and/or the first security element 1a and/or the second security element 1b.
[0242] It is also advantageous that the third illumination during the capture of the third items of optical information of the second security element 1b in step e is directed, in particular is emitted in a predetermined relative position or relative position change or relative position progression, at a predetermined distance, in particular the distance h, or distance change or distance progression and/or at a predetermined angle or angle change or angle progression between the device 2 and the security document 1 and/or the first and/or second security feature 1a, 1b during the capture of the first, second and/or third items of optical information.
[0243] It is further possible for the directed third illumination to be emitted by the internal light source 22 of the device 2, in particular wherein the direction of propagation of the directed third illumination is aligned, in particular substantially, perpendicular to the plane spanned by the security document 1 and/or the first security element 1a and/or the second security element 1b.
[0244] In particular, it is possible for the directed third illumination from the internal light source 22 of the device 2 to have a luminous intensity of from 5 lumens to 100 lumens, in particular from 5 lumens to 55 lumens, preferably of 50 lumens.
[0245] It is possible for the second items of optical information of the second security element 1b not to be captured by means of the sensor 20 of the device 2 in step e and/or in particular wherein the third items of optical information in step e differ from the second items of optical information in step d.
[0246] Further, it is possible for the third items of optical information of the second security element 1b in step e to comprise an item of optical and/or geometric information and/or for the third items of optical information of the second security element 1b in step e not to comprise the item of optical and/or geometric information.
[0247]
[0248] Further,
[0249]
[0250] It is possible for the second security element to have a border, which has a simple geometric figure, for example a cloud, circles, triangles, quadrangles, pentagons, stars, alphanumeric characters, country outline and/or icons or combinations thereof.
[0251] In particular, this simple geometric figure is sought by means of the sensor 20, the display unit 21 and/or the device 2 in a particular, predefined position, in particular in a superordinate pattern, on the security document 1. The internal light source is preferably activated after a successful search for such a simple geometric figure.
[0252] The third items of optical information can be captured for example as a light shape on a darker background or a dark shape on a light background.
[0253] The method, in particular step f, preferably comprises the following further step: [0254] f1 outputting instructions and/or items of user information before and/or during the checking of the genuineness of the security document 1 and/or of the second security element 1b, at least on the basis of the at least one second dataset and the at least one third dataset, to a user by means of the device 2, in particular by means of the output unit 21 of the device 2, from which the user preferably comprehends the differences present or not present between the at least one second dataset or the second items of optical information and the at least one third dataset or the third items of optical information.
[0255]
[0256] The parameters of the set of parameters of the computer-generated hologram in the top left region is chosen such that the third items of optical information of the second security element 1ba in the form of the letter sequence “UT” is represented sharpest. At the same time, this structure is in particular most susceptible here to the fact that the third items of optical information are generated in an undesired manner by a light source irradiating randomly in the direction of the second security element 1ba. As the reference numbers of the second security elements 1ba to 1bh continue, the sharpness of the third items of optical information represented decreases. The so-called virtual height of the third items of optical information represented by the respective computer-generated holograms increases from the second security element 1ba to the second security element 1bh, in the following sequence: 6 mm, 8 mm, 10 mm, 12 mm, 14 mm, 16 mm, 18 mm and 20 mm, wherein the solid angle is in each case constantly, in particular substantially, 25°.
[0257] The virtual height of a computer-generated hologram in a second security element preferably describes the height at which the third items of optical information appear to be capturable virtually, preferably with reference to the plane which is spanned by the second security element.
[0258] Here, tests have shown that the rougher the background is, the more washed-out the third items of optical information represented in the second security element are, in particular wherein, preferably for faultless detection or capture of the third items of optical information, the roughness Ra of the surface of the first and/or second security element and/or the security document and/or the substrate of the first and/or second security element and/or the security document lies between 0.1 μm and 10 μm, preferably between 0.1 μm and 5 μm, further preferably between 0.1 μm and 3 μm. The parameters of the computer-generated holograms are preferably chosen such that the third items of optical information is detectable or capturable on the provided substrate of the first and/or second security element and/or the security document with its roughness.
[0259] To adapt the computer-generated holograms to the roughness of the substrate or of the surface of the security document, wherein the roughness of the security document can also be present at least proportionately on the surface of the security element, two parameters are crucial in particular: for one thing, the virtual height of the computer-generated holograms which generate the third items of optical information under the third illumination, as well as, for another, the solid angle at which the third items of optical information are visible or detectable or capturable. The virtual height of a computer-generated hologram in a second security element preferably describes the height at which the third items of optical information appear to be capturable virtually, preferably with reference to the plane which is spanned by the second security element (h.sub.0=0).
[0260] The virtual height of the third items of optical information can, in particular from an observer's or sensor's point of view, lie in front of this plane, in particular wherein the virtual height here has a positive amount. Such a positive amount of the virtual height of the third items of optical information generated by a computer-generated hologram can lie in the range of from 0.1 mm to 10 mm, preferably in the range of from 1 mm to 8 mm.
[0261] The virtual height of the third items of optical information can, in particular from an observer's or sensor's point of view, lie behind this plane, in particular wherein the virtual height here has a negative amount. Such a negative amount of the virtual height of the third items of information generated in a computer-generated hologram can lie in the range of from −0.1 mm to −10 mm, preferably in the range of from −1 mm to −8 mm. Furthermore, the virtual height of the third items of optical information can also lie in this plane, in particular wherein the amount of the virtual height is equal to zero.
[0262] By “solid angle” is preferably meant here the angle which spans the light cone under which the third items of optical information are visible or capturable in the case of perpendicular illumination of the second security element and/or security document.
[0263] Here, tests have shown that the smaller the chosen solid angle is, the smaller the danger is that the sensor of the device will unintentionally record the third items of optical information possibly generated by a light source other than the internal light source of the device. In particular, at the same time, it becomes more difficult to carry out step e of the method here, as the third items of optical information are recognizable or capturable in the case of illumination with the internal light source of the device at an ever narrower solid angle. In particular, it has proved to be advantageous here if the solid angle lies in the range of from 10° to 40°.
[0264] Further, it has proved to be advantageous if the third items of optical information represent a negative shape, in particular a dark shape on a light background.
[0265]
[0266] The virtual heights and the solid angles have the following values for the respective second security elements in
LIST OF REFERENCE NUMBERS
[0279] 1 security document [0280] 11, 12, 13, 14, 15 security document [0281] 1a first security element [0282] 1aa, 1ab, 1ac, 1ad first security element [0283] 1b second security element [0284] 1ba, 1bb, 1bc, 1bd second security element [0285] 1be, 1bf, 1bg, 1bh second security element [0286] 1bi, 1bj, 1bk, 1bl second security element [0287] 1bm, 1bn, 1bo, 1bp second security element [0288] 1bq, 1br, 1bs, 1bt second security element [0289] 1c security element [0290] 1d foil strip [0291] 10a reproduction of a first security element [0292] 10b reproduction of a second security element [0293] 10c reproduction of a security element [0294] 2 device [0295] 2a shielding surface [0296] 2b outline [0297] 20 sensor [0298] 21 output unit [0299] 22 internal light source [0300] 22a light [0301] 220 first illumination [0302] 221 second illumination [0303] 222 third illumination [0304] 3 external light source [0305] X, Y direction [0306] R1 first direction [0307] R2 second direction [0308] a, b, c, d, e, f method step