The invention relates to a security document or value document (10) comprising a substrate (11) having a security feature (15), wherein the security feature (15) comprises at least one first printed region (20.1), which is situated at a first position (21.1) on the substrate (11), and at least one second printed region (20.2), which is situated at a second position (21.2) on the substrate (11); the first printed region (20.1) is printed using a first color system (30.1) which has an electroluminescent component (40) and the second printed region (20.2) is printed using a second color system (30.2) which does not have electroluminescent components; the positions (21.1, 21.2) of excitability or non-excitability of electroluminescence of the printed regions (20.1, 20.2) on the security document or value document generate a machine-readable code; and the colors of the two color systems (30.1, 30.2) do not impart any other color impressions to the average observer in the daylight, the color difference Delta E30.1-30.2 of the two color systems (30.1, 30.2) in the daylight being less than 2.5. The invention further relates to a production method and to a method for verifying the authenticity of such security documents and value documents.
Disclosed is a method for evaluating a data metric on homomorphically encrypted data, the method comprising: Providing at least two datasets; encrypting of the at least two datasets, resulting in at least two encrypted datasets in an encrypted domain, wherein the encryption is performed in accordance with a homomorphic encryption scheme; transforming the data metric into the encrypted domain, resulting in a homomorphic data metric; evaluating the homomorphic data metric on the encrypted datasets in the encrypted domain; obtaining at least one encrypted measure of the homomorphic data metric.
The invention relates to a method (1000) and a device for producing hologram security elements, each of which stores a spatial shape of a three-dimensional object. These preferably each store the shape of another object. Spatial image information relating to an object is captured, and the outer contours are determined in different parallel sectional planes spaced apart from one another and are stored in bitmaps (25). A phase image (30) is calculated for each bitmap (25) and convolved using a mapping function in order to generate a modified phase image (40). A plurality of modified phase images (40) is thus generated for the plurality of sectional planes. The phase images (30) are convolved using mapping functions which each have a focal length which changes incrementally. If these modified phase images (40) are exposed as computer-generated holograms in the same recording region (97) of a hologram, they are jointly reconstructed when exposed to coherent light. The outer contours of the different sectional planes of the object are projected in adjacent reconstruction planes. The three-dimensional shape of the object can thus be captured during reconstruction.
G03H 1/00 - Procédés ou appareils holographiques utilisant la lumière, les infrarouges ou les ultraviolets pour obtenir des hologrammes ou pour en obtenir une imageLeurs détails spécifiques
G03H 1/04 - Procédés ou appareils pour produire des hologrammes
G03H 1/20 - Procédés ou appareils pour produire des hologrammes pour copier des hologrammes par une méthode holographique
G03H 1/22 - Procédés ou appareils pour obtenir une image optique à partir d'un hologramme
G03H 1/02 - Procédés ou appareils holographiques utilisant la lumière, les infrarouges ou les ultraviolets pour obtenir des hologrammes ou pour en obtenir une imageLeurs détails spécifiques Détails
G03H 1/08 - Procédés ou appareils pour produire des hologrammes pour faire des hologrammes synthétiques
G03H 1/30 - Procédés ou appareils adaptés spécialement pour produire des hologrammes multiples ou pour en obtenir des images, p. ex. procédés pour l'holographie à plusieurs couleurs uniquement des hologrammes séparés
4.
PARTITIONING AND EXECUTING QUANTUM OPERATIONS USING CLASSICAL AND QUANTUM COMPUTERS
The present disclosure relates to a quantum computing method for executing quantum operations on a quantum system. The method comprises partitioning the quantum operations into multiple sets of quantum operations, assigning each set of quantum operations to a classical computer or a quantum computer. The method further comprises using each assigned classical computer for simulating the execution of the set of quantum operations. The method also includes using each assigned quantum computer for executing the set of quantum operations. The execution of each set of quantum operations comprises preparing a quantum state of the respective individual quantum system using the initial quantum state or an intermediate quantum state of the quantum system. The method comprises combining the individual results to obtain a result of the initial quantum operations.
G06N 10/20 - Modèles d’informatique quantique, p. ex. circuits quantiques ou ordinateurs quantiques universels
G06N 10/60 - Algorithmes quantiques, p. ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard
5.
SECURITY ELEMENT FOR A SECURITY OR VALUE DOCUMENT, PRODUCTION METHOD, METHOD FOR OPTICALLY READING A SECURITY ELEMENT, SECURITY OR VALUE DOCUMENT, AND VERIFICATION METHOD
The invention relates to a security element (21) for a security or value document (20), the security element comprising a substrate and a combined 2D matrix code (1) that is printed on a substrate surface of the substrate and has an arrangement of modules (3) which are arranged on the substrate surface so as to define a matrix code area (2), wherein printed modules (4) of the arrangement of modules (3) are printed using colours that luminesce when illuminated with excitation light and each correspond to a colour channel of a multicolour channel system. The 2D matrix code comprises a first 2D matrix code (5), in which a first item of matrix-coded information is provided so as to be independently optically readable by means of first printed modules, and the first printed modules are printed onto the substrate in a first colour which corresponds to a first colour channel of the multicolour channel system; and a second 2D matrix code (6) which at least partially overlaps the first 2D matrix code in the region of the matrix code area (2), and in which a second item of matrix-coded information is provided so as to be readable by means of second printed modules, and the second printed modules are printed onto the substrate in a second colour which corresponds to a second colour channel of the multicolour channel system, which second colour channel differs from the first colour channel. When optically reading the combined 2D matrix code (1), the first 2D matrix code (5) can be read separately by reading the first colour channel, and the second 2D matrix code (6) can be read separately by reading the second colour channel. The invention also relates to a security or value document (20), to a method for producing a security element for a security or value document, to a method for optically reading a security element, and to a method for verifying a security or value document (20).
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
6.
SECURITY ELEMENT FOR A SECURITY OR VALUE DOCUMENT, PRODUCTION METHOD, METHOD FOR OPTICALLY READING A SECURITY ELEMENT, SECURITY OR VALUE DOCUMENT, AND VERIFICATION METHOD
The invention relates to a security element (21) for a security document or value document (20) and to a method for producing the security element (21), the security element having a substrate and a combined 2D matrix code (1), wherein the combined 2D matrix code (1): is printed onto a substrate surface of the substrate; comprises an arrangement of modules formed by printed modules that are printed using colours that are optically readable under illumination with light; comprises a first 2D matrix code (2) in which a first item of matrix-coded information is provided by means of first printed modules, and the first printed modules are printed onto the substrate in a first colour which is optically readable under illumination with light from a first spectral range; and comprises a second 2D matrix code (3) which at least partially overlaps with the first 2D matrix code in the region of the matrix code area (2), and in which a second item of matrix-coded information is provided by means of second printed modules, and the second printed modules are printed onto the substrate in a second colour which is optically readable under illumination with light from a second spectral range which differs from the first spectral range. When optically reading the combined 2D matrix code (1), the first matrix-coded information can be read by reading the first 2D matrix code (2) under illumination with light from the first spectral range, and the second matrix-coded information can be read by reading the second 2D matrix code (3) under illumination with light from the second spectral range. The invention also relates to a security document or value document (20), to a method for optically reading a security element, to a method for verifying a security or value document (20), and to an optical reading method.
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
7.
QUANTUM-ASSISTED VERIFICATION OF ELECTRONIC CIRCUIT FUNCTIONALITY
The present subject matter relates to a method for proving a statement descriptive of a functionality of an electronic circuit using a quantum computer and a proof assistant. The method comprises: encoding a current proof state into a vector of real numbers of a fixed length, the current proof state defining a task for proving at least part of the statement, encoding the vector into a quantum state of a quantum system of the quantum computer, using the quantum state as an input quantum state by a quantum machine learning model for providing an output quantum state whose measurement represents a proof step for the defined task, measuring the output quantum state, thereby obtaining the proof step for the defined task, providing the proof step to the proof assistant, in response to providing the proof step, receiving a next proof state from the proof assistant.
The present subject matter relates to a method as follows. A current proof state may be encoded into a vector of real numbers of a fixed length. The current proof state defines a task for proving at least part of the statement. The vector may be encoded into a quantum state of a quantum system of the quantum computer. The quantum state may be used as an input quantum state by a quantum machine learning model for providing by the quantum machine learning model an output quantum state, wherein the measurement of the output quantum state represents a proof step for the defined task. The proof step may be provided to the proof assistant. In response to providing the proof step, a next proof state may be received from the proof assistant. It may be determined whether the received proof state indicates that the proof is completed. In response to determining that the proof is not completed, the received proof state may be used as the current proof state for repeating the method.
Disclosed is a method for providing a trained machine learning system for classifying images of fingerprints, the method comprising: providing a training data set, comprising sets of images of fingerprints, wherein each image in the training data set further comprises a binary label encoding a class designation; using the training data set to train a machine learning system, wherein the machine learning system comprises a classical machine learning model implemented on a classical processor and a quantum machine learning model implemented on a quantum processing unit (QPU); encoding the image data of each image in the training data set into a feature vector using the classical machine learning model, obtaining a family of feature vectors; using the family of feature vectors obtained from the images in the training data set to train the classical machine learning model and the quantum machine learning model, for providing the trained machine learning system, comprising a trained classical machine learning model and a trained quantum machine learning model.
G06F 18/2411 - Techniques de classification relatives au modèle de classification, p. ex. approches paramétriques ou non paramétriques basées sur la proximité d’une surface de décision, p. ex. machines à vecteurs de support
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 10/774 - Génération d'ensembles de motifs de formationTraitement des caractéristiques d’images ou de vidéos dans les espaces de caractéristiquesDispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p. ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]Séparation aveugle de source méthodes de Bootstrap, p. ex. "bagging” ou “boosting”
G06V 10/94 - Architectures logicielles ou matérielles spécialement adaptées à la compréhension d’images ou de vidéos
The present disclosure relates to a method for executing a trained classical neural network, the neural network comprising multiple layers. The method comprises: selecting at least one layer of the classical neural network, providing a quantum machine learning model, building a training dataset by inferring the classical neural network, using an inference dataset, such that the training dataset comprises entries, each entry of the entries comprising an input that is received by the selected at least one layer and an output that is provided by the selected at least one layer in response to receiving the input during the inference, training the quantum machine learning model using the training dataset, replacing the selected at least one layer of the neural network by the quantum machine learning model, using a hybrid classical and quantum computing system for executing a hybrid classical-quantum machine learning model that resulted from the replacing.
G06N 10/20 - Modèles d’informatique quantique, p. ex. circuits quantiques ou ordinateurs quantiques universels
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
G06N 10/60 - Algorithmes quantiques, p. ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard
Disclosed is a method for training a machine learning model for generating synthetic data, the method comprising: Providing an encrypted data set, resulting from encryption of an original data set, to a server, the encrypted data set comprising a set of entries, wherein each entry of the encrypted data set comprises values for a set of attributes; application of a homomorphic machine learning algorithm for data synthesis comprising a set of homomorphic group operations on the encrypted data set, such a homomorphic algorithm as understood herein encompasses any algorithm the execution of which causes the decrypted results to coincide with the results of applying the same homomorphic group operations on the original data set.
The invention relates to a method having the following steps which are carried out by a computer: receiving a plurality of facial images having at least partially different brightness levels; determining a parameter value for each of a plurality of image parameters for each of the plurality of facial images; assigning each of the plurality of facial images to one of a plurality of groups of persons if, for each of the plurality of image parameters, the parameter value thereof lies within a respective image parameter value range that is specific to the group of persons; selecting the facial images in the group of persons with the largest number of assigned facial images; and selecting, from the facial images in the selected group of persons, the facial image which has the highest parameter value for a selected image parameter of the plurality of image parameters as the optimal facial image.
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
H04N 23/611 - Commande des caméras ou des modules de caméras en fonction des objets reconnus les objets reconnus comprenant des parties du corps humain
13.
ML BASED SECURITY PROOF OF QUANTUM COMMUNICATION PROTOCOLS WITH NOISY QUANTUM CHANNELS
Disclosed is a method for sharing information using a data sharing system comprising a sender node and a receiver node using a noisy quantum channel in accordance with a quantum communication protocol, the method comprising: providing a trained machine learning model, the machine learning model being configured to receive a set of parameters of a given system and noise model in order to predict whether the given system is secure or unsecure for sharing information according to the quantum communication protocol, the set of parameters indicating a level of success of an attack by a third party and a reception success at a receiver node of the given system and being descriptive of the given system; evaluating the set of parameters for the data sharing system for sharing the information; inputting the evaluated set of parameters and the noise model to the machine learning model, thereby receiving a prediction of a security of the data sharing system; aborting the quantum communication protocol if the data sharing system is predicted as being unsecure.
Disclosed is a method for sharing information between a sender node and a receiver node in accordance with a quantum communication protocol. The method comprises: determining an attack configuration for access by a third party to the quantum channel, the attack configuration being defined by at least a quantum circuit system having specific parameters and an attack success bound, the quantum circuit system being configured to intercept a qubit on the quantum channel, determine the state of the intercepted qubit; using the quantum circuit system to measure first and second metrics by at least intercepting qubits on the quantum channel; determining whether the second metric fulfils an error tolerance bound and whether the first metric fulfills the attack success bound; aborting the communication protocol if the second metric fulfils the error tolerance bound and the first metric fulfills the attack success bound.
Disclosed is a method for sharing information using a data sharing system comprising a sender node and a receiver node using a quantum channel in accordance with a quantum communication protocol, the method comprising: providing a trained machine learning model, the machine learning model being configured to receive a set of parameters of a given system in order to predict whether the given system is secure or unsecure for sharing information according to the quantum communication protocol, the set of parameters indicating a level of success of an attack by a third party and a reception success at a receiver node of the given system and being descriptive of the given system; evaluating the set of parameters for the data sharing system for sharing the information; inputting the evaluated set of parameters to the machine learning model, thereby receiving a prediction of a security of the data sharing system; aborting the quantum communication protocol if the data sharing system is predicted as being unsecure.
Disclosed is a method for performing a method for performing a quantum computation, referred to as initial quantum computation, the initial quantum computation being defined by at least a first set of one or more first type quantum operations, the first set of one or more first type quantum operations having as parameters one or more first rotation angles respectively, each first type quantum operation being a single-qubit rotation around a z- axis in a Bloch sphere by the respective first rotation angle. The method comprises: representing the initial quantum computation by a function f having as arguments the first rotation angles; performing a Taylor expansion of the function f around zero, resulting in foundational derivatives of the function f; for each specific derivative of at least one of the foundational derivatives: using a parameter shift rule for expressing the specific derivative as a linear combination of a set of terms.
G06N 10/80 - Programmation quantique, p. ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiquesPlate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p. ex. informatique quantique en nuage
17.
COMPUTER-IMPLEMENTED METHOD FOR SUPPORTING THE VERIFICATION OF A PHYSICAL DOCUMENT
The invention relates to a computer-implemented method for supporting a verification of a physical document, the document comprising: at least one entry in human-readable form, said entry being located in an associated position on the document, and a machine-readable element which contains one or more specifications which are each linked to an associated entry of the at least one entry. The method comprises: capturing at least one image of the document by means of a camera (104), reading the specifications out of the machine-readable element by means of a reading unit (104), determining the positions of the entries linked to the read-out specifications in the at least one captured image, and displaying the at least one captured image on a display device (106), the read-out specifications each being shown in human-readable form at or adjacent to the determined position of the entry linked to the corresponding specification. A computer program, a machine-readable storage medium and a device (100) for supporting a verification of a physical document are also disclosed.
Disclosed is a method comprising receiving through one or more networks from a user device a location information, the location information indicating a set of locations of a set of landmarks of an object in an image, inputting the location information to the trained machine learning model, receiving an output of the trained machine learning model indicating whether the image is a morphed image or non-morphed image, sending the output to the user device.
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 10/77 - Traitement des caractéristiques d’images ou de vidéos dans les espaces de caractéristiquesDispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p. ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]Séparation aveugle de source
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 10/94 - Architectures logicielles ou matérielles spécialement adaptées à la compréhension d’images ou de vidéos
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 40/40 - Détection d’usurpation, p. ex. détection d’activité
19.
QUANTUM COMMUNICATION OF DATA USING A DISTRIBUTED ENTANGLEMENT STATE
Disclosed is a method of transmitting data from a sender quantum processing unit to a receiver quantum processing unit comprising: encoding the data to be transmitted from the sender quantum processing unit to the receiver quantum processing unit, the encoding comprising mapping the data into a range of rotation angle values for obtaining a rotation angle encoding the data, receiving a sign of the rotation angle by the receiver quantum processing unit; repeatedly performing: creating the distributed entangled state, transforming the qubit state of the sender qubit by the rotation angle, measuring the sender qubit and receiver qubit and storing a tuple comprising the measured sender and receiver states; calculating by the receiver quantum processing unit the rotation angle using the sign of the rotation angle and the stored tuples of the sender and the receiver states, decoding the rotation angle for obtaining the data by the receiver quantum processing unit.
The invention relates to a method for detecting facial modification, the method comprising the following steps carried out by means of a computer (1): receiving at least one pair of images with a colour image of a face and a heat image, captured simultaneously, of the face; adapting the colour image and the heat image so that the face in the colour image is congruent with the face in the heat image; generating a combined image by combining the adapted colour image and the adapted heat image; determining from the combined image, for one or more classes indicating a type of modification, a probability value in each case that specifies a probability that a modification is present for the corresponding class; and classifying, on the basis of the probability values, whether facial modification is present.
G06V 10/26 - Segmentation de formes dans le champ d’imageDécoupage ou fusion d’éléments d’image visant à établir la région de motif, p. ex. techniques de regroupementDétection d’occlusion
G06V 10/32 - Normalisation des dimensions de la forme
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 10/80 - Fusion, c.-à-d. combinaison des données de diverses sources au niveau du capteur, du prétraitement, de l’extraction des caractéristiques ou de la classification
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 20/00 - ScènesÉléments spécifiques à la scène
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 40/40 - Détection d’usurpation, p. ex. détection d’activité
G06V 40/70 - Biométrique multimodale, p. ex. combinaison d’informations de modalités biométriques distinctes
Disclosed is a method of generating a training dataset (500) for training a machine learning model for morphed image detection. The method comprises: repeatedly performing the following: receiving (101) an image (130, 150) of an object (134, 154); identifying (103) a set of landmarks of the object (134, 154) in accordance with a landmark pattern; determining (105) locations of the set of landmarks with respect to a coordinate system defined relative to the object (134, 154), and adding (107) an entry to the training dataset (500), the entry indicating the set of locations and a label, wherein the label indicates whether the received image (130, 150) is a real image or morphed image.
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p. ex. empreintes digitales, balayages de l’iris ou empreintes vocales
G06N 10/00 - Informatique quantique, c.-à-d. traitement de l’information fondé sur des phénomènes de mécanique quantique
G06V 10/774 - Génération d'ensembles de motifs de formationTraitement des caractéristiques d’images ou de vidéos dans les espaces de caractéristiquesDispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p. ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]Séparation aveugle de source méthodes de Bootstrap, p. ex. "bagging” ou “boosting”
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 40/40 - Détection d’usurpation, p. ex. détection d’activité
22.
METHOD FOR GENERATING A PROVISIONING TOKEN BY WAY OF A TERMINAL
Disclosed is a method for providing a digital provisioning token (112) on a terminal (100) for provisioning a digital document (412) to be issued. The provisioning token (112) demonstrates an authorization to receive the digital document (412) to be issued and is cryptographically coupled to the terminal (100). The terminal (100) generates a first asymmetrical key pair with a first private cryptographic key (108) and a first public cryptographic key (110), receives a first data element (114) assigned to the document (412) to be issued, sends a request containing the first public cryptographic key (110) and the first data element (114) to an ID provider server (130) of an ID provider service for creating an identification data set (142), receives a data set ID (144) of the created identification data set (142) and generates the provisioning token (112) which comprises the data set ID (144) and is signed using the first private cryptographic key (108).
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The invention relates to a method for producing a security feature on a carrier substrate for value or security documents, which security feature absorbs in the infrared range and is at least substantially transparent and/or not visible in the visible spectral range, wherein, in the method, IR-absorbing colourants are mixed with a binder and/or solvent to produce a colourant dispersion or solution, and this is applied to the carrier substrate, wherein the carrier substrate is an organic substrate containing carbonate groups (-O-C(=O)-O-) and the printed substrate is then heated to a temperature of at least 160°C, and preferably to between 165°C and 205°C.
B42D 25/351 - Pièces translucides ou en partie translucides, p. ex. fenêtres
B42D 25/36 - Caractéristiques d’identification ou de sécurité, p. ex. pour empêcher la falsification comprenant des matériaux spéciaux
B42D 25/382 - Encres spéciales absorbant ou reflétant la lumière infrarouge
B42D 25/455 - Fabrication associant plusieurs couches en utilisant la chaleur
B42D 25/46 - Fabrication associant plusieurs couches en utilisant la pression
C09D 11/037 - Encres d’imprimerie caractérisées par des particularités autres que la nature chimique du liant caractérisées par le pigment
C09D 11/101 - Encres spécialement adaptées aux procédés d’imprimerie mettant en œuvre la réticulation par énergie ondulatoire ou par radiation de particules, p. ex. réticulation par UV qui suit l’impression
24.
METHOD FOR PRODUCING A SECURITY FEATURE ON A CARRIER SUBSTRATE FOR VALUE OR SECURITY DOCUMENTS
The invention relates to a method for producing a security feature on a carrier substrate for value or security documents, which security feature absorbs in the infrared range and is at least substantially transparent and/or not visible in the visible spectral range, wherein, in the method, IR-absorbing colourants are mixed with a binder and/or solvent to produce a colourant dispersion or solution and this is applied to the carrier substrate, wherein the carrier substrate is an organic substrate containing carbonate groups (-O-C(=O)-O-) and the IR absorbing colourants are dyes or pigments selected from the group of organometallic pigments, perylene derivatives, dithio dyes, dithiolene dyes, cyanines and phthalocyanines.
B42D 25/351 - Pièces translucides ou en partie translucides, p. ex. fenêtres
B42D 25/36 - Caractéristiques d’identification ou de sécurité, p. ex. pour empêcher la falsification comprenant des matériaux spéciaux
B42D 25/382 - Encres spéciales absorbant ou reflétant la lumière infrarouge
B42D 25/455 - Fabrication associant plusieurs couches en utilisant la chaleur
B42D 25/46 - Fabrication associant plusieurs couches en utilisant la pression
C09D 11/037 - Encres d’imprimerie caractérisées par des particularités autres que la nature chimique du liant caractérisées par le pigment
C09D 11/101 - Encres spécialement adaptées aux procédés d’imprimerie mettant en œuvre la réticulation par énergie ondulatoire ou par radiation de particules, p. ex. réticulation par UV qui suit l’impression
The invention relates to a method (100) for producing a document having a security feature. The document has a substrate. The method (100) comprises a first step (101) in which ink is picked up using a numerator. The numerator has a first number stamp and a second number stamp. The first number stamp has a first planar surface which surrounds a first recess structure. The first recess structure forms a first number. The second number stamp has a second planar surface which surrounds a second recess structure. The second recess structure forms a second number. The first planar surface and the second planar surface are covered with printing ink. The first recess structure and the second recess structure must be kept free from the printing ink. The method (100) comprises a second step (103) in which the first number stamp and the second number stamp are placed on the substrate in order to print a negative of the first number and a negative of the second number on the substrate. The negative of the first number and the negative of the second number form the security feature and are each surrounded by a layer of colour.
B41F 13/00 - Parties constitutives communes aux machines ou presses rotatives
B41F 11/02 - Presses ou machines rotatives dont les cylindres de clichés portent plusieurs surfaces d'impression ou pour la mise en œuvre de procédés typographiques, lithographiques ou d'impression en creux, sélectivement ou en combinaison pour les papiers-valeurs
B41F 33/00 - Dispositifs indicateurs, dispositifs de comptage, d'avertissement, de commande ou de sécurité
B41K 3/12 - Appareils à timbrer ayant des moyens incorporés pour supporter les objets à timbrer avec des surfaces de timbrage situées au-dessus de la surface supportant l'objet avec des surfaces de timbrage incurvées pour timbrage par contact de roulement
B41K 3/10 - Appareils à timbrer ayant des moyens incorporés pour supporter les objets à timbrer avec des surfaces de timbrage situées au-dessus de la surface supportant l'objet et se déplaçant à angle droit par rapport à la surface à timbrer ayant des moyens automatiques pour changer les caractères, p. ex. dispositifs de numérotage
26.
DEVICES, SYSTEM AND METHOD FOR ELECTRONIC CASHLESS PAYMENT
The invention relates to a data communication device (110) for performing an electronic payment transaction. The data communication device (110) comprises at least one processor (111), which is designed to execute a payment application (111a) and an ID application (111b), and a communication interface (113), which is designed to communicate with a trust centre server arrangement (130) and a cash ledger (150). The payment application (111a) is designed to transmit a transaction ID and a decentralized identity, DID, of a user (110a) of the data communication device (110) to a payment agent (131a) of the trust centre server arrangement (130). The ID application (111b) is designed to respond to a request from an ID agent (131b) of the trust centre server arrangement (130), which request contains the DID, by transmitting signed user credentials of the user (110a) of the data communication device (110) to the ID agent (131b) of the trust centre server arrangement (130). The payment application (111a) is also designed to receive a signature of the transaction ID from the payment agent (131a) of the trust centre server arrangement (130) and to transmit the signature of the transaction ID to the cash ledger (150) in order to enter the electronic payment transaction with the signature of the transaction ID in the cash ledger (150).
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
27.
BANKNOTE THAT CAN BE FOLDED TO FORM A THREE-DIMENSIONAL BODY
The invention relates to a banknote comprising a flat substrate element (120) with a plurality of folds (200) such that when the substrate element is folded along the folds a three-dimensional body (500) can be created which completely encloses a volume, i.e. each face of the three-dimensional body is formed at least partially from face elements (311-316) of the substrate element, one of the face elements (311-316) having a transparent window region (701) which is formed by a transparent plastic element. The plastic element can have a light-refracting property such that information on an inner surface portion (340) within the three-dimensional body can be identified through the plastic element, which information cannot be identified on the surface portion when the flat substrate element is in the planar state. Information which can be projected onto the inner surface portion can be encoded in the plastic element. A light-deflecting optical security element (780) can be formed on the surface portion (340) opposite the window region (700).
The invention relates to a dividable banknote (10) comprising a flat substrate (15) which comprises a parent portion (20) and a plurality of child portions (30–70), wherein material weaknesses (80) are formed in the flat substrate (15) which form at least one predetermined separation line (81–89) for ripping the flat substrate (15), wherein the parent portion (20) and each of the child portions (30–70) each have at least one individual value indication (21–71) which indicate the value of the child portion (30–70) after it has been removed or the value of the parent portion (20) after all the child portions (30–70) have been separated, wherein each of the child portions (30–70) along one of their portion edges directly borders the parent portion (20) and the material weaknesses (80) are designed such that each of the child portions (30–70) can be removed by ripping the flat substrate (15) along the at least one predetermined separation line (81–89).
The invention relates to a security fibre comprising at least one surface (51, 52); wherein at least three types (10, 20, 30) of dots are located on the at least one surface (51, 52); wherein the three types (10, 20, 30) of dots are positioned such that the density of the dots of a first type (10) varies over a region of the surface (51, 52) and the density of the dots of a second type (20) varies over a region of the surface (51, 52), and wherein the dots of the first (10) type and the dots of the second (20) type gradually mix to form an area of mixed dots (10, 20); wherein the area of mixed dots (10, 20) is overlaid with a third type (30) of dots; wherein the at least three types (10, 20, 30) of dots have substantially no colour when irradiated with visible light having a wavelength of between 380 nm and 780 nm; and wherein, when irradiated with a UV wavelength of between 315 nm and 380 nm or between 280 to 315 nm, the first type (10) of dots is illuminated in a first colour (1), the second type (20) of dots is illuminated in a second colour (2), the area of mixed dots (10, 20) is illuminated in a third colour (3), and the third type (30) of dots is invisible; and wherein, when irradiated with a UV wavelength of between 100 nm and 280 nm, the first type (10) of dots is illuminated in the first colour (1), the second type (20) of dots is illuminated in the second colour (2), and the area of mixed dots (10, 20) overlaid with the third type (30) of dots is illuminated in a fourth colour (4).
xyzz. Here, M represents one or more elements from a group comprising the chemical elements Co, In and Ni; X represents one or more elements from a group comprising the halides F, Cl, Br and I; 0 < x ≤ 0.002; 0 < y ≤ 0.00015; and 0 ≤ z ≤ 0.00050. The particles each have cubic phase fractions and hexagonal phase fractions, the zinc sulfide luminophore emitting a first luminescent radiation in the spectral range between 580 nm and 780 nm in the event of excitation by an electrical field, and the zinc sulfide luminophore emitting a second luminescent radiation in the visible spectral range in the event of thermal stimulation and preceding excitation by means of UV radiation. Furthermore, a security and/or value document having a security feature and a method for detection and/or verification of a security feature having a luminophore are provided.
The invention relates to a method for revoking an asymmetric key pair (266, 268) of a first user computer system (260) using a banknote (100). The method comprises, using a second user computer system (240): • transmitting a revocation request to the banknote (100), • in response to the revocation request, receiving a cryptogram signed by the banknote (100), wherein the first cryptogram comprises an identification number (106) of the banknote (100) and a confirmation of revocation, • forwarding the signed cryptogram to a blockchain server (140; 141) of a blockchain (148) in order to enter the confirmation of revocation of the banknote (100) identified by the identification number (106) into the blockchain (148).
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
G07D 7/004 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p. ex. qui ne correspondent pas à une monnaie en utilisant des éléments de sécurité numériques, p. ex. des informations codées sur un filet ou une bande magnétique
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
The invention relates to a device (100) for generating a biometric image of a person's face using a semi-transparent mirror (103), the surface of which reflects on the front side (104) and transmits on the rear side (109), which is opposite the front side (104), having at least one display device (110) which is arranged on the rear side (109) of the semi-transparent mirror (103) and which is directed at the transmitting surface of the rear side (109) of the semi-transparent mirror (103), and having at least one camera (101) for capturing an image of the person's face, the beam path of which camera extends through the semi-transparent mirror (103) to the person's face, and having a control unit (102) and an output unit (111) which are designed to output information or an instruction as visual or audible user guidance for generating an augmented reality. The invention further relates to a method for generating a biometric image.
G07C 9/25 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer combiné à une vérification d’identité du titulaire du laissez-passer utilisant des données biométriques, p. ex. des empreintes digitales, un balayage de l’iris ou une reconnaissance de la voix
H04N 1/00 - Balayage, transmission ou reproduction de documents ou similaires, p. ex. transmission de fac-similésLeurs détails
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
G06V 40/60 - Moyens statiques ou dynamiques permettant d’aider l’utilisateur à positionner une partie du corps pour l’acquisition de données biométriques
G02B 27/00 - Systèmes ou appareils optiques non prévus dans aucun des groupes ,
33.
PERSONALIZATION OF A SECURITY APPLET ON A MOBILE TERMINAL
The invention relates to a method for personalizing a security applet (114) that is installed on a first security element (112) of a mobile terminal (100). The personalization comprises: • establishing an encrypted communication channel (160) between the mobile terminal (100) and a personalization server (220) via a network (150), • establishing a first encrypted subchannel (162) between an ID token (200) and the personalization server (220) within the encrypted communication channel (160) via the mobile terminal (100), • reading out one or more of the first attributes (206) from the ID token (200) by way of the personalization server (220) via the first encrypted subchannel (162) within the encrypted communication channel (160), • establishing a second encrypted subchannel (164) between the security applet (114) of the first security element (112) and the personalization server (220) within the encrypted communication channel (160), • receiving, by way of the security applet (114) of the first security element (112), the read-out first attributes (206) from the personalisation server (220) via the second encrypted subchannel (164) within the encrypted communication channel (160).
H04W 12/40 - Dispositions de sécurité utilisant des modules d’identité
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
34.
CREATION OF A CRYPTOGRAPHICALLY SECURE ELECTRONIC IDENTITY
The invention relates to a method for creating a cryptographically secure electronic identity of a user on a mobile terminal (100). The method comprises provisioning an ID application program (108) of the mobile terminal (100), comprising: - a personalization server (220) carrying out a remote security inspection on the security infrastructure of the mobile terminal (100) via a network (150), - receiving a result of the remote security inspection performed by the personalization server (220), - in response to a positive result of the remote security inspection, transmitting a key generation request from a provisioning component (107) of the ID application program (108) to a security element (110) of the mobile terminal (100), - in response to the key generation request, the security element (110) generating two asymmetric key pairs associated with the ID application program (108), - the provisioning component (107) transmitting a certificate request to the personalization server (220) containing the public cryptographic keys of the two asymmetric key pairs to the personalization server (220), - receiving a certificate, created by the personalization server (220), of the ID application program (108) containing the first public cryptographic key and a root certificate of a root instance of a PKI, - storing the certificate and the root certificate on the mobile terminal (100).
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
35.
PREDICTING AN IMMINENT OCCURRENCE OF A MALFUNCTION ON THE BASIS OF A LOG DATA ANALYSIS
The invention relates to a method for analyzing log data (122, 152, 182, 196) of a computer system (100). The method comprises: logging log data (122, 152, 182, 196); upon an occurrence of a malfunction (110), extracting the log data (122, 152, 182, 196) logged within a time interval (Δt) preceding the malfunction (110); determining, by means of a statistical analysis, a characteristic combination of features (112) which comprises one or more characteristic features of the extracted combination of log data (122, 152, 182, 196); storing an allocation (108) of the determined characteristic combination of features (112) to the malfunction (110); and monitoring the logged log data (122, 152, 182, 196), wherein the monitoring, upon logging of a combination of log data (122, 152, 182, 196) which has the stored characteristic combination of features (112), involves predicting an imminent occurrence of the malfunction (110).
The invention relates to a method for using a quantum computer system (100) for a cryptographic application. A plurality of qubits (102) are prepared in respective individual intermediate states. In order to prepare the qubits (102), a preparation device (104) of the quantum computer system (100) is used, which is controlled using a set of one or more control parameters. The prepared qubits are read out and the read-out result of the prepared qubits (102) is used as a code for the cryptographic application.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
37.
READING OUT LOCALLY STORED ENCRYPTED IDENTITY ATTRIBUTES
The invention relates to a method for reading out one or more identity attributes of an electronic identity stored on a mobile terminal (100). A remote security element (292) is provided for the electronic identity (113) on a server (280). The electronic identity (113) comprises a first set of identity attributes (109) which is stored on the mobile terminal (100) and comprises one or more identity attributes that are each individually encrypted using a first cryptographic key of the remote security element (292). An attribute identifier is assigned to each of the identity attributes in the first set of identity attributes (109). Furthermore, the identity attributes encrypted using the first cryptographic key are encrypted using a second cryptographic key of the mobile terminal (100).
The invention relates to a process for authenticating a user to an application program (108) installed on a mobile terminal (100). The terminal (100) comprises a first security element (110), which is associated with an operating system (106), and a second security element (112), which is independent of the first security element (110) and is associated with the application program (108). The process comprises the following: • upon an authentication request of the application program (108), the operating system (106) authenticates the user by means of an authentication sensor (118) of the terminal (100) and the first security element (110), • a challenge-response process between the first security element (110) and the second security element (112) is executed, a successful execution of the challenge-response process confirming a successful authentication of the user by the operating system (106), • upon a successful execution of the challenge-response process, the successful authentication of the user to the application program (108) is confirmed by the second security element (112).
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The invention relates to a method for reading out identity attributes (109) of an electronic identity (113) managed by an application (108) installed on the mobile terminal (100) by using a server (280) having a remote security element (292). The method comprises: • receiving, by the application (108), the identity attributes (109) to be read out, • decrypting the identity attributes (109) to be read out, • encrypting the decrypted identity attributes to be read out by using an ephemeral symmetrical cryptographic key (286) stored in the remote security element (292), • sending the encrypted identity attributes (109) to be read out to a computer system (200) which reads out.
The invention relates to a method for unlocking, for a reading computer system (200), one or more identity attributes of one or more electronic identities (113) stored on a mobile terminal (100). Authentication of the reading computer system (200) comprises: * receiving a read request from the reading computer system (200) with a read certificate (246), * centrally executing the authentication of the reading computer system (200), * determining a group of one or more electronic identities (113) having those electronic identities (113) stored on the mobile terminal (100) which belong to one of the types of electronic identities for which the read certificate (246) defines read permissions, * identifying, within the determined group of electronic identities (113), one or more electronic identities which, according to the read request, belong to one of the types of electronic identities to be read, * sending authentication confirmations to one or more applications (108, 109) installed on the mobile terminal (100) which manage identified electronic identities (113).
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
The invention relates to a method for initialising application-specific cryptographic security functions for a mobile application (108) on a mobile terminal (100). The mobile terminal (100) comprises a plurality of security elements (112, 116) which can be used to provide the application-specific cryptographic security functions for the mobile application (108) and are each managed by an external security management service. For each of the external security management services of the plurality of security management services, a local security management program module (109, 111) is installed on the mobile terminal (100).
H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
H04W 12/069 - Authentification utilisant des certificats ou des clés pré-partagées
G06F 21/33 - Authentification de l’utilisateur par certificats
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
42.
PRODUCING DOCUMENT TEMPLATES HAVING SECURITY FEATURES
A method for producing an electronic document template for a value document or security document comprises the following steps: providing (301) a database (DB), in which different types of optical security features are each assigned one or more channels for optical sensing of the security feature in question by means of an optical reading device, the optical reading device being designed for separation of the channels, selecting (302) a plurality of types of the optical security features from the database and instantiating the selected types by placing and scaling security features of the selected types on an electronic representation of a document substrate layer of the value document or security document in order to produce a layout draft, checking (303) the layout draft, wherein, for spatially overlapping or mutually adjoining instantiated types of security features, it is checked whether these types occupy a common channel, and if this is the case, a signal is output and a correction (304) of the layout draft is input as a response to the signal, and storing (305) the resulting corrected layout draft as the electronic document template.
G06K 15/02 - Dispositions pour produire une présentation visuelle permanente des données de sortie utilisant des imprimantes
G06K 19/00 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques
43.
METHOD AND DEVICE FOR PRINTING A SUBSTRATE WITH AN ELECTROLUMINESCENT PRINTING INK, AND IDENTITY, VALUE OR SECURITY DOCUMENT COMPRISING A SUBSTRATE OF THIS TYPE
The invention relates to a method for printing a substrate (110) of an identity, value or security document with an electroluminescent printing ink, comprising the following steps:- providing of an intaglio printing press with an intaglio impression cylinder (102) which can be driven rotationally in a rotational direction (118) and has a surface (104), in which a plurality of depressions (106) for temporarily storing printing ink are made, and with a wiping cylinder (108) which interacts with the surface (104) of the intaglio impression cylinder (102),- applying of the printing ink to the surface (104) and into the depressions (106) of the intaglio impression cylinder (102),- wiping of the surface (104) of the rotating intaglio impression cylinder (102) by way of the movement of the wiping cylinder (108) in a direction (120) which differs from the rotational direction (118) of the intaglio impression cylinder (102), and- applying of the substrate (110) to the intaglio impression cylinder (102), and transferring of the electroluminescent printing ink which is introduced into the depressions (106) to the substrate (110). Moreover, the invention relates to an identity, value or security document, and to an intaglio printing device (100) for carrying out the method.
The invention relates to a device (10) for optically capturing a document (D), comprising a document bed (12) with a surface (14) on which a document (D) is laid, wherein the document bed (12) comprises a first capturing portion (14.1) and a second capturing portion (14.2), which are designed in such a way that the first capturing portion (14.1) is assigned to a first document portion (D1) of a document (D) laid on the surface (14) and the second capturing portion (14.2) is assigned to a second document portion (D2) of the document (D) laid down, and comprising at least one lighting element (B) for illuminating the surface (14) of an optical capturing assembly (16) for detecting light reflected by the document (D) laid down, wherein the detection capturing assembly (16) comprises a first capturing device (18.1) assigned to the first capturing portion (14.1) and a second capturing device (18.2) assigned to the second capturing portion (14.2).
The invention relates to a lamination body (100) comprising: an antenna structure (300) for receiving electromagnetic high-frequency radiation; a circuit arrangement (500) which is coupled to the antenna structure (300) and is designed to demodulate and evaluate at least one item of verification information modulated onto the electromagnetic high-frequency radiation; an electrically operable actuator (400) which is coupled to the circuit arrangement (500) and can be switched by means of the circuit arrangement (500) between at least one state in which it is not supplied with current and a state in which it is supplied with current and in which the actuator (400) changes at least one physical property of the lamination body (100) in comparison with the state of the actuator (400) in which it is not supplied with current, which property can be detected from outside the lamination body (100), wherein the circuit arrangement (500) is designed to compare the demodulated verification information with stipulations during the evaluation process and to switch the actuator (400) into the state in which it is supplied with current only if the demodulated verification information corresponds to the stipulations. The invention also relates to a method for verifying a security element in such a lamination body (100).
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G07D 7/00 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p. ex. qui ne correspondent pas à une monnaie
B42D 25/00 - Cartes ou structures de type feuille portant des informations caractérisées par leurs éléments d’identification ou de sécuritéLeur fabrication
46.
LAMINATION ELEMENT WITH ILLUMINATED SECURITY FEATURE, AND METHOD FOR VERIFYING SAME
The invention relates to a lamination element (100) comprising an antenna structure (300) for receiving electromagnetic high-frequency radiation; at least one lighting means (400) which is coupled to the antenna structure (300) and which can be set to an active state by a current induced in the antenna structure (300) via the electromagnetic high-frequency radiation, said at least one lighting means (400) emitting light in the active state and not emitting light in a passive state; and an individualizing or individualizable security feature which is designed or can be designed with a detection state and a concealed state, wherein in the detection state, individualizing information of the security feature is optically detectable, and in the concealed state, individualizing information cannot be optically detected or can only be optically detected with difficulty. The at least one lighting means (400) is designed and arranged such that changing from the passive state to the active state, or vice versa, of the at least one lighting means (400) causes a changeover between the concealed state and the detection state.
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G07D 7/00 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p. ex. qui ne correspondent pas à une monnaie
B42D 25/00 - Cartes ou structures de type feuille portant des informations caractérisées par leurs éléments d’identification ou de sécuritéLeur fabrication
47.
PROVIDER AND RECEIVER CRYPTOSYSTEMS COMPRISING COMBINED ALGORITHMS
The invention relates to a method for exchanging data between a provider cryptosystem (200) and a receiver cryptosystem (240), said method comprising: - computing (104) composite cryptographic data (236) by executing a plurality of first cryptographic algorithms (214-224), wherein the composite cryptographic data is computed as a function of input data (208), wherein the plurality of first cryptographic algorithms are selected and/or the plurality of first cryptographic algorithms are combined according to a first control algorithm (228-232); - providing (106) the composite cryptographic data from the provider cryptosystem to the receiver cryptosystem; - computing (110) results data (308) using the receiver cryptosystem as a function of the composite cryptographic data by applying one or more of the second cryptographic algorithms (314-324), wherein the one or more second cryptographic algorithms are selected and/or combined according to a second control algorithm (328-332); and - automatically executing (112) a software and/or hardware function (310) using the receiver cryptosystem in accordance with the result data.
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The invention relates to a banknote (100) having a processor (124) and a memory (120). An identification number (116) of the banknote (100), which identification number identifies an anonymous banknote account which is managed by a central bank (220) issuing the banknote (100) and which is individually assigned to the corresponding banknote (100), is stored in the memory (120) of the security element (102). A banknote-specific cryptographic key (118) is stored in a protected memory area (122) of the memory (120). A payment procedure executed using the banknote (100) comprises: - receiving a payment request for a payment using the banknote (100), - generating a payment-specific cryptogram for authorizing the payment using the banknote (100), wherein the cryptogram is generated from the identification number (116) of the banknote (100) and a payment-specific code as input values using the banknote-specific cryptographic key (118), and - sending a payment authorization comprising the payment-specific cryptogram.
The invention relates to a banknote (100) comprising a security element having a processor (124) and a memory (120). A private cryptographic key (118) of an asymmetric key pair of the banknote (100) is stored in a protected storage area (122) of the memory (120). The asymmetric key pair is associated with a banknote-specific blockchain address in a blockchain (148). A payment procedure performed with the banknote (100) includes: ∙ Receiving a payment request for a payment with the banknote (100) in the form of a transaction of an amount to be paid from the blockchain address of the banknote (100) to a blockchain address of a payee, ∙ signing a transaction release with the private cryptographic key (118) of the banknote (100), ∙ sending the signed transaction release.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The invention relates to a document reading device (100) comprising a detection surface (120) for detecting a document and comprising a fixation clamp (110), wherein the detection surface (120) is designed to detect a document of a first document format (210), the fixation clamp (110) is designed to fix the document of the first document format (210) on the detection surface (120) in a specified position, and the fixation clamp (110) is additionally designed to at least partly cover the detection surface (120) so that a recess (115) for receiving a document of a second document format (220) is formed.
xyzz; here, M represents one or more elements from a group comprising the chemical elements Co, In and Ni; X represents one or more elements from a group comprising the halides F, Cl, Br and I; and the following applies: 0 < x < 0.002 and 0 ≤ y < 0.00015 and 0 ≤ z < 0.00050. The particles each have cubic phase portions and hexagonal phase portions. When excited by an electrical field, the zinc sulfide luminophore emits a first radiation in the range of the light spectrum between 580 nm and 780 nm. When excited by heating the luminophore to a temperature between 100°C and 150°C, the zinc sulfide luminophore emits a second radiation in the light spectrum. Furthermore, the invention relates to a security and value document, which may for example be a bank note or a passport, an identity card, a driving licence or a postage stamp. The invention also relates to a method for detecting and/or verifying the security feature according to the invention.
The invention relates to a monitoring system which can be operatively coupled to a monitored object (334, 920, 922, 924), said monitoring system comprising a processor (304, 904.1, 904.2, 904.3), a network interface (308), and at least one sensor (331, 916) and/or a control unit (333, 344, 432). The monitoring system is designed to: • receive (804) a request (322) of a request unit (328); • carry out a first verification (806) of the request; • if the first verification indicates that the request is not trustworthy, canceling (808) the first verification without responding in any manner to the request unit; • otherwise carrying out (810) an additional verification of the request; and • only in the event that the additional verification of the request indicates that the request unit is sufficiently authorized, allowing the transmission of state data of the monitored object, said data having been detected by the sensor, to the request unit and/or changing the state of the monitored object by means of the control unit in accordance with the request.
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The invention relates to a data processing system (300, 902.1, 902.2, 902.3), comprising: -at least one computing unit which is designed as a microprocessor (304, 904.1, 904.2, 904.3) and/or a microcontroller; a non-volatile storage medium (310) with one or more reference credentials (312) in numerical form; an interface (308) for receiving requests via a network; wherein the data processing system is designed to: receive (804) a request (322) from a request unit (328) via the interface; verify (806) whether the request contains a credential (324) which is identical to one of the reference credentials; if the verification indicates that the request does not contain said credential, canceling (808) the verification without responding to the request unit in any manner. If the verification indicates that the request contains said credential, an additional authorization verification is carried out before the execution of a functionality of the data processing system is triggered.
The invention relates to a method for implementing an authentication mechanism using a user computer system (100). The authentication mechanism provides a personalised, server-specific authentication of a user with respect to a service server (220) using an authentication token (140). The method comprises registering a user with a service server (220), which comprises creating a personalised user account (234) with the service server (220) for the user. Furthermore, for the user, a server-specific asymmetric cryptographic key pair is generated by an authentication token (140), which key pair comprises an authentication key (148) and an authenticating key (150). The authenticating key (150) is provided to the service server (220) and the service server assigns the authenticating key to the personalised user account (234).
The invention relates to a UWB monitoring system (100) for monitoring a spatial region (102). The UWB monitoring system (100) comprises a plurality of UWB sensors (110, 110'), of which one or more are connected to a central or distributed control server (116) for controlling the operation of the UWB monitoring system (100) in order to transmit captured sensor data to a local, wired network. The UWB sensors (110, 110') are configured to provide a UWB mesh network having an intermeshed network topology as a wireless network that is at least partially redundant to the local, wired network. One or more of the UWB sensors (110') each comprise a control module (125) having an emergency function (128) which comprises control functions at least for local operation of a part of the UWB monitoring system (100) using the UWB mesh network. The UWB monitoring system (100) is configured to activate the emergency function (128) of the UWB sensors (110') for local operation of the UWB monitoring system (100) using the UWB mesh network in the event of a failure of the local, wired network and to transmit captured sensor data via the UWB mesh network by means of UWB.
H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
56.
SECURITY AGAINST MANIPULATION USING DEVICE-SPECIFIC TOLERANCES
The invention relates to a method for securing against manipulation a UWB communication device (110, 110', 111, 111', 112, 112', 116, 116') which is configured to transmit a UWB signal for communication by means of UWB within a UWB monitoring system (100) for monitoring a three-dimensional zone (102). The method comprises: • extracting, from the transmitted UWB signal, signal variations which are restricted to a tolerance range of the transmitted UWB signal, wherein the extracted signal variations comprise one or more device-specific signal variations, • validating the extracted signal variations using one or more reference values of the device-specific signal variations stored for the UWB communication device (110, 110', 111, 111', 112, 112', 116, 116'), • on successful validation of the extracted signal variations, confirming the integrity of the UWB communication device (110, 110', 111, 111', 112, 112', 116, 116').
The invention relates to a method for issuing a derived credential using a first UWB token (112) with a first credential (133) which comprises a first access authorisation and an issuance authorisation for issuing derived credentials. The method comprises: * receiving an issue request for issuing a second credential derived from the first credential (133), * determining positional data of the first UWB token (112) and of the second UWB token (113), * checking, using the positional data, whether a first position of the first UWB token (112) and a second position of the second UWB token (113) meet a first position-related criterion, * issuing the derived second credential, said derived second credential comprising a second access authorisation derived from the first access authorisation for the second user of the second UWB token (112) and identifying the first credential (133), a prerequisite for issuing the second credential being that the first position-related criterion is met, * transmitting the derived second credential to the second UWB token (112).
H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04W 12/64 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité utilisant des zones géorepérées
G07C 9/20 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer
The invention relates to a UWB monitoring system (100) for monitoring a spatial area (102), comprising a plurality of localisation sensors for determining positional data of mobile portable UWB tokens (112). The UWB monitoring system (100) is configured to detect a presence of an unknown UWB token (112) in the spatial area (102), which transmits a UWB user signal. The transmitted UWB user signal is encoded according to a UWB data encoding scheme (152) unknown to the monitoring system (100). Detecting the presence of the unknown UWB token (112) consists of: detecting a plurality of sensor signals by the spatially distributed plurality of localisation sensors, wherein the detected sensor signals respectively comprise a noise signal and a UWB user signal transmitted by the unknown UWB token (112) with which the noise signal is superimposed, the user signal occurring with a sensor-dependent first temporal shift in the signals detected by the individual localisation sensors as a result of the spatial distribution of the localisation sensors, amplifying the UWB user signal relative to the noise signal, the amplification comprising a combination of the detected sensor signals with each other, wherein the detected sensor signals for combining are respectively time-shifted using a sensor-dependent second time shift, detecting the amplified UWB user signal using the combined sensor signals.
H04W 12/00 - Dispositions de sécuritéAuthentificationProtection de la confidentialité ou de l'anonymat
G01S 5/02 - Localisation par coordination de plusieurs déterminations de direction ou de ligne de positionLocalisation par coordination de plusieurs déterminations de distance utilisant les ondes radioélectriques
The invention relates to a UWB monitoring system (100) for monitoring a spatial region (102). The UWB monitoring system comprises a plurality of UWB sensors (110) which are distributed in the spatial region. The UWB sensors are configured to capture sensor data and to transmit the captured sensor data via the UWB. The UWB monitoring system is configured to capture sensor data comprising personal sensor data in the spatial domain using the UWB sensors, to filter the captured sensor data using an anonymisation filter (123), wherein the anonymisation filter is configured to anonymise the personal sensor data, to analyse the captured sensor data for detecting an exception event, and, upon detecting the exception event, to temporarily suspend anonymising the personal sensor data.
G08B 13/196 - Déclenchement influencé par la chaleur, la lumière, ou les radiations de longueur d'onde plus courteDéclenchement par introduction de sources de chaleur, de lumière, ou de radiations de longueur d'onde plus courte utilisant des systèmes détecteurs de radiations passifs utilisant des systèmes de balayage et de comparaison d'image utilisant des caméras de télévision
The invention relates to a UWB token (112) comprising a UWB antenna (134) for transmitting and receiving UWB signals. The UWB antenna (134) comprises a plurality of conductive antenna structures (142). The antenna structures (142) have a geometric coding with an individual resonance pattern identifying the UWB token (112).
G06K 19/067 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
61.
SECURITY DOCUMENT HAVING SURFACE COATING ON THE BASIS OF NANOMATERIALS
The invention relates to a security document (100) comprising: a substrate layer (101) having an image area (102) to which an image (103) of an owner of the security document (100) is applied; and a personalisation area (104) to which personal data (105) of the owner of the security document (100) are applied; and a surface coating (106) on at least the image area (102) of the substrate layer (101), the surface coating (106) being based on nanomaterials, and the surface coating (106) being resistant to the application of one or more further layers to at least the image area (102) of the substrate layer (101), which image area is coated with the surface coating (106). The invention further relates to a method (400, 500) for producing such a security document.
The invention concerns a method for verifying a document. The method comprises: - receiving (302) a document (500, 700) having a document body (506) with an inkjet print of an image (502, 600) by means of a testing unit (800). The image contains first regions (414.1, 414.2) that contain inkjet droplets of a dye-based ink (216) and second regions (412.1, 412.2) that contain a pigment-based ink (214). The first regions are free of the pigment-based ink and the second regions are free of the dye-based ink. The pigment-based ink is not distinguishable from the dye-based ink under visible light. - recording (304) a test image portraying at least the inkjet print (502); - performing (306) an image analysis comprising: · capturing (308) the morphology of the inkjet droplets; and · reconstructing (310) a digital graphical pattern (404) from the test image on the basis of the droplet morphology; - comparing (312) the reconstructed graphical pattern with a reference value in order to verify the authenticity of the document.
A method for producing a document having a document body and a visually imperceptible security feature joined to the document body comprises providing a key pair (104) comprising a public and a private key, encrypting (106) data that are unique to the document using the public key of the key pair, and coding (108) the encrypted data into a graphical code. The method furthermore comprises providing (110) a photograph to be joined to the document, embedding (112) the graphical code into the photograph, and joining (114) the photograph and the graphical code embedded therein to the document body.
The invention relates to a method for personalizing an identification, value, or security document (100) which comprises a card-shaped composite body (101) with a plurality of material layers (114.1-4). The plurality of material layers (114.1-4) comprise a first material layer (114.2) with a first security element (102) and a second material layer (114.3) with a second security element (104), wherein the two security elements (102, 104) are arranged one over the other so as to at least partly overlap. The method has the steps of providing a blank for the identification, value, or security document (100) which comprises the card-shaped composite body (101) and personalizing both security elements (102, 104). The personalization step includes the process of introducing personalization information into both security elements (102, 104) in a congruous manner using an abrasive machining method. A removal of material (110) resulting from the use of the abrasive machining method extends from a surface (108) of the composite body (101) through the first security element (102) and the second security element (104).
G07D 7/12 - Lumière visible, rayonnement infrarouge ou ultraviolet
65.
METHOD FOR PRODUCING A BOOK BLOCK FOR A BOOK-TYPE VALUE DOCUMENT OR SECURITY DOCUMENT, BOOK BLOCK, METHOD FOR PRODUCING A BOOK-TYPE VALUE DOCUMENT OR SECURITY DOCUMENT, AND BOOK-TYPE VALUE DOCUMENT OR SECURITY DOCUMENT
The invention relates to a method for producing a book block (15) for a book-type value document or security document (11), in which: one or more inner pages (18) and an endpaper (14) are assembled to form a stack; multiple binding holes (36) are introduced into the at least one inner page (18) and the endpaper (14) arranged along a folded edge (16) or the binding holes (36) of the at least one inner page (18) and the endpaper (14) are aligned relative to one another; multiple threads (32, 33) are supplied and guided through the binding holes (36); and the at least one inner page (18) and the endpaper (14) are connected to one another to form a book block (15); wherein a thread connection (28) is produced in which the at least two threads (32, 33) are intertwined with one another and guided through at least two binding holes (36) and brought out on a common inner side (37) of the endpaper (14), and in which the threads (32, 33) are prefixed to the endpaper (14).
B42B 2/00 - Fixation permanente de feuilles, mains de papier ou cahiers les uns aux autres par couture avec un matériau du genre fil, p. ex. un fil textile
The invention relates to a method for checking the authenticity of a security document (3), which comprises a layer, the layer comprising a pattern (4) in the form of an image, which pattern is calculated, by means of a defined algorithm, from a number of data (6, 7) that specify the security document (3). A pattern (5) in the form of an image is calculated, by means of the defined algorithm, from the number of data (6, 7) that specify the security document, and the calculated pattern (5) is at least partially displayed on a display (2) and compared with the pattern (4) shown on the security document (3).
G07D 7/004 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p. ex. qui ne correspondent pas à une monnaie en utilisant des éléments de sécurité numériques, p. ex. des informations codées sur un filet ou une bande magnétique
G07D 7/2033 - Mise en correspondance de motifs uniques, c.-à-d. de motifs qui sont uniques pour chaque papier individuel
G07D 7/207 - Mise en correspondance de motifs créés par l’interaction d’une pluralité de couches, p. ex. de motifs de moiré
67.
METHOD FOR TESTING THE RESISTANCE OF DATA CARRIERS AND SECURITY DOCUMENTS
The invention relates to a method for checking the resistance of security documents and data carriers in relation to disinfecting agents, wherein the surface of security documents or data carriers with flat textile parts that have previously been wetted with a test fluid are scrubbed under defined conditions, wherein the scrubbing test is carried out with at least two different test fluids and the at least two different test fluids are selected from groups of aqueous alcoholic solutions, fluids containing hydrophobic compounds and a solution containing biocides. The invention also relates to a set of test fluids.
B42D 25/28 - Cartes ou structures de type feuille portant des informations caractérisées par leurs éléments d’identification ou de sécuritéLeur fabrication caractérisées par une utilisation ou une finalité particulières pour une utilisation dans des traitements médicaux ou thérapeutiques
B42D 25/455 - Fabrication associant plusieurs couches en utilisant la chaleur
B42D 25/46 - Fabrication associant plusieurs couches en utilisant la pression
B42D 13/00 - Feuilles mobiles conçues pour être reliéesEncarts
G01N 3/56 - Recherche de la résistance à l'usure ou à l'abrasion
G01N 3/08 - Recherche des propriétés mécaniques des matériaux solides par application d'une contrainte mécanique par application d'efforts permanents de traction ou de compression
68.
PRODUCT OF VALUE OR SECURITY PRODUCT, AND METHOD FOR PRODUCING SAME
The invention relates to a product of value or security product (100), with a single-layer or multiple-layer main body, wherein at least one of the layers of the main body comprises an upper side (202) and a lower side (204) which is provided with a recess (200) which is formed from an edge (206) which connects the upper side (202) to the lower side (204), which edge (206) runs at least in sections in a manner which is inclined by an angle with respect to a normal of the upper side (202) or the lower side (204), wherein the recess (200) is filled at least partially with a filling (208) which has an upper surface (210) and a lower surface (212), wherein the upper surface (210) is connected to the lower surface (212) by means of a side cheek (214) which is of complementary design at least in regions with respect to the edge (206) of the recess (200). Moreover, the invention relates to a method for producing a product of value or security product (100).
The invention relates to a method and to an identification apparatus (1) for identifying a person by means of facial recognition. The method comprises the following: providing a depersonalized data set, wherein the depersonalized data set is calculated from a personalized data set by means of data transformation according to a transformation instruction; calculating a re-personalized data set from the depersonalized data set, wherein the re-personalized data set, on the basis of the depersonalized data set, is modified by means of additional data transformation, according to an at least partial reversal of the transformation instruction, in such a way that the person to be identified is identifiable on the basis of the re-personalized data set using the at least one facial recognition algorithm and/or at least one other facial recognition algorithm, which is different from the at least one facial recognition algorithm; providing a comparative data set which comprises current facial image data for the person to be identified; and identifying the person using the re-personalized data set, the comparative data set and the at least one facial recognition algorithm and/or the at least one other facial recognition algorithm. The invention furthermore relates to a computer program product.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
70.
DEVICE AND METHOD FOR THE EDGE TRIMMING OF A BLANK OF A CARD-SHAPED IDENTIFICATION DOCUMENT, DOCUMENT OF VALUE OR SECURITY DOCUMENT
The invention relates to a device (200) for the edge trimming of a blank (102) of a card-shaped identification document, document of value or security document (100), wherein the blank (102) comprises at least two parallel surfaces (104) and a side edge (106) which connects the two surfaces (104) to one another, with a holding device (202) for receiving the blank (102) in such a way that the blank (102) remains free at least in regions for the edge trimming, with a laser cutting device (204) which is configured to emit a laser beam (300) in such a way that the latter impinges in a focused manner on a predefined cutting line (108) of a trimming region (110) of the blank (102), and with an inert gas device (206) which is configured to feed at least one inert gas stream (302) to the trimming region (110), wherein the inert gas device (206) comprises a first feed duct (208) for inert gas, which first feed duct (208) is directed onto one of the surfaces (104), and a second feed duct (210) for inert gas, which second feed duct (210) is directed onto the other one of the surfaces (104). Moreover, the invention relates to a method for the edge trimming of a blank (192'), and to an identification document, document of value or security document (100).
B23K 26/08 - Dispositifs comportant un mouvement relatif entre le faisceau laser et la pièce
B23K 26/10 - Dispositifs comportant un mouvement relatif entre le faisceau laser et la pièce avec un support fixe
B23K 26/142 - Travail par rayon laser, p. ex. soudage, découpage ou perçage en utilisant un écoulement de fluide, p. ex. un jet de gaz, associé au faisceau laserBuses à cet effet pour l'enlèvement de résidus
B23K 26/38 - Enlèvement de matière par perçage ou découpage
B26F 1/31 - Perforation par des moyens non mécaniques, p. ex. par un jet de fluide par des radiations
B26F 3/16 - Séparation par la chaleur par des radiations
71.
MOBILE IMAGE PROCESSING APPARATUS FOR CAPTURING AN IMAGING OF A DOCUMENT
The disclosure encompasses a mobile image processing apparatus (100) for capturing an imaging (117) of a document (101), wherein the document (101) has a security feature (105) comprising a wavelength-converting pigment (107) in a local document region (103). The mobile image processing apparatus (100) comprises a light generating device (109) configured to illuminate the security feature (105) with illumination light of a first light wavelength in order to excite the security feature (105) to emit light of a second wavelength, and an image capturing device (111) for capturing an imaging (117) of the document (101), wherein the image capturing device (111) is configured to capture the light emitted by the security feature (105) in response to the illumination light, in order to obtain an imaging (117) of the security feature (105). Furthermore, the mobile image processing apparatus (100) comprises a processor (113) configured to detect the local document region (103) in the imaging (117) of the document (101), and an image display (115) configured to display the imaging (117) of the document (101) and an imaging (117) of the security feature (105) superimposed on the local document region (103).
G07D 7/00 - Vérification spécialement adaptée à la détermination de l’identité ou de l’authenticité de papiers de valeur ou pour discriminer ceux qui sont inacceptables, p. ex. qui ne correspondent pas à une monnaie
The invention relates to a document of value or security document (11) and to a method for the production thereof, comprising a data carrier (12), which consists of a plurality of layers (3, 4, 5), wherein at least two layers (3, 4, 5) consist of plastic and the layers (3, 4, 5) form a composite body, a three-dimensional structure (21) consisting of a plastics material being applied to the at least one layer (3, 4, 5) by an additive process, and the layers (3, 4, 5) consisting of plastic having a glass transition temperature for forming the composite body which is less than the glass transition temperature of the plastics material of the three-dimensional structure (21).
B42D 13/00 - Feuilles mobiles conçues pour être reliéesEncarts
B29C 64/00 - Fabrication additive, c.-à-d. fabrication d’objets en trois dimensions [3D] par dépôt additif, agglomération additive ou stratification additive, p. ex. par impression en 3D, stéréolithographie ou frittage laser sélectif
The invention relates to a method and a hot-melt adhesive for producing a value- or security document (11) consisting of multiple layers (3, 5), and to a value- or security document, according to which method: a hot-melt adhesive (4) made from a latent reactive adhesive substance is applied in liquid form, or is supplied as a film, to at least a first or second layer (3, 5), or to both layers (3, 5) and the at least two layers (3, 5) together with the hot-melt adhesive layer (4) provided therebetween are combined to form a composite body (6); and the latent reactive adhesive substance is heated and the layers (3, 5) are bonded together by subsequent cooling, a curing time of the hot-melt adhesive being accelerated by at least one extender introduced into the latent reactive adhesive substance.
The invention relates to a photoluminescence sensor device (1) for detecting a security feature (23) of an object (22a) moving relative to the sensor device (1) in a measuring region (ME) of the sensor device (1), wherein the sensor device (1) comprises: a radiation generation device (17) which is designed to generate electromagnetic radiation, wherein the electromagnetic radiation is suitable for prompting an emission of luminescence radiation via a photoluminescent material of the security feature (23); a receiving device (19) which is designed to receive electromagnetic radiation coming from the object (22a) moving relative to the sensor device (1) over a detection time period and to generate a corresponding time-dependent receive signal (ES), wherein, according to the relative position of the object (22a) and the receiving device (19) and according to the electromagnetic radiation generated by the radiation generation device (17) and impinging on the object (22a), the electromagnetic radiation coming from the object (22a) includes the luminescence radiation emitted by the photoluminescent material and/or electromagnetic radiation that was generated by the radiation generation device (17) reflected by the object (22a); and an evaluation device (26) which is designed to evaluate the time-dependent receive signal (ES), wherein the evaluation device (26) is designed to determine whether luminescence radiation emitted by the photoluminescent material has contributed to the time-dependent receive signal (ES), and the evaluation device (26) is also designed to determine a time (UE1, UE2, UEM) or a time interval in which at least one part of an edge (22b) of the object (22a) is located in a corresponding location (EO) in the measuring region (ME).
G07D 7/202 - Vérification de motifs des papiers en utilisant la mise en correspondance de motifs
G01N 21/63 - Systèmes dans lesquels le matériau analysé est excité de façon à ce qu'il émette de la lumière ou qu'il produise un changement de la longueur d'onde de la lumière incidente excité optiquement
MULTILAYER ADHESIVE FILM AND METHOD FOR THE PRODUCTION THEREOF, AND METHOD FOR PRODUCING A BOOK-LIKE VALUABLE OR SECURITY DOCUMENT, AND VALUABLE OR SECURITY DOCUMENT
The invention relates to a multilayer adhesive film and to a method for producing a book-like valuable or security document and to a valuable or security document formed from a book cover (12) and a book block (22) having an endpaper (18) and at least one data page (19), wherein the endpaper (18) and the book cover (12) are adhesively bonded by at least one composite body (6), which comprise at least two adhesive layers (3, 5), wherein the at least one first and the at least one second adhesive layer (3, 5) have different security features.
SECURITY FEATURE FOR A SECURITY DOCUMENT OR VALUE DOCUMENT, COMPRISING AT LEAST ONE LUMINESCENT SUBSTANCE THAT CAN BE EXCITED IN THE ULTRAVIOLET SPECTRAL RANGE AND EMITS IN THE INFRARED SPECTRAL RANGE
The invention relates to a security feature for a security document or value document, comprising at least one luminescent substance that can be excited in the ultraviolet spectral range and, after excitation has been carried out, emits in the infrared spectral range. The invention further relates to a security document or value document comprising a security feature according to the invention.
B42D 25/382 - Encres spéciales absorbant ou reflétant la lumière infrarouge
B42D 25/387 - Encres spéciales absorbant ou reflétant la lumière ultraviolette
B42D 25/36 - Caractéristiques d’identification ou de sécurité, p. ex. pour empêcher la falsification comprenant des matériaux spéciaux
C09K 11/77 - Substances luminescentes, p. ex. électroluminescentes, chimiluminescentes contenant des substances inorganiques luminescentes contenant des métaux des terres rares
77.
VALUE- AND/OR SECURITY DOCUMENT, AND METHOD FOR PRODUCING SAME
The invention relates to a value- or security document consisting of multiple layers (3, 4, 5) with an end face (7, 8) running all around that delimits the planar extent of the layers (3, 4, 5), and in which document the multiple layers (3, 4, 5) are fixedly connected to form a composite body (6) and one of the layers (3, 4, 5) has a luminescent dye, wherein the end faces (7, 8) and the entire surface of the one layer (3, 4, 5) is provided with luminescent dye and said layer provided with luminescent dye (4) is provided between two layers (3, 5) without luminescent dye.
The invention relates to a photoluminescence sensor device (1) for verifying a security feature of an object (22) in a measuring region of the sensor device (1), wherein the sensor device (1) comprises: a radiation generation device (17) which is designed to generate electromagnetic radiation in a first wavelength range, wherein the electromagnetic radiation is suitable for bringing a photoluminescent material into an excited energy state as a security feature or as part of a security feature (23) of the object (22); a receiving device (19) which is designed to receive electromagnetic radiation in a second wavelength range emitted from the photoluminescent material in a measuring operation, said second wavelength range differing from the first wavelength range, and to generate a corresponding receive signal (ES); an evaluation device (26) which is designed the evaluate the receive signal (ES); and a control device (25) which is designed to control the radiation generation device (17) in the measuring operation and in a calibration operation in such a way that the electromagnetic radiation generated by the radiation generation device (17) has a temporal progression of the radiation flow density in at least one time interval, which is not constant in the time interval.
The invention relates to a security element (2) with a pattern (110) made of pattern regions (120) as a security feature (100). The pattern regions (120) comprise at least one first pattern region (121, 121-x) and a second pattern region (122, 122-x), and the first pattern region (121, 121-x) and the second pattern region (122, 122-x) have an anti-Stokes luminescent substance (200) in a non-manipulated state of the security element (2), said luminescent substance exhibiting a luminescence in an anti-Stokes wavelength range when excited with a light signal (407) with a wavelength in an excitation wavelength range. The first pattern region (121, 121-x) and the second pattern region (122, 122-x) differ in that the content of anti-Stokes luminescent material (200) which can be removed from the security element (2) by manipulation is greater in the second pattern region (122, 122-x) than in the first pattern region (121, 121-x). The invention additionally relates to a verification method and a device for verifying such a security element (2), wherein an evaluation of the anti-Stokes luminescence is carried out via a respective communication attachment.
G06K 7/12 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant une longueur d'onde choisie, p. ex. pour lire des marques rouges et ignorer des marques bleues
G06K 19/14 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code utilisant des marquages de différentes sortes sur le même support d'enregistrement, p. ex. un marquage étant lu optiquement et l'autre par des moyens magnétiques au moins une sorte de marquage étant utilisée pour l'authentification, p. ex. de cartes de crédit ou de cartes d'identité le marquage étant lu par irradiation
80.
DEVICE AND METHOD FOR ATTACHING AN ADHESIVE LAYER TO AN ADHESIVE-FREE CONSTITUENT PART OF AN IDENTIFICATION, VALUE OR SECURITY DOCUMENT
The invention relates to a device (200) for attaching an adhesive layer (301) to an adhesive-free constituent part (102, 104) of an identification, value or security document (100), with a first reel receptacle (210) which is configured to receive a first reel (300) with a carrier film (302) and an adhesive strip (303) which is attached to the carrier film (302), with a punching device (220) which is configured to punch out individual adhesive layers (301) from the adhesive strip (303) which is attached to the carrier film (302), and with a transport path (240) along which the carrier film (302) with the punched-out adhesive layer (301) can be guided or is guided, which transport path (240) comprises a constituent-part feed region (241), in which the adhesive-free constituent part (102, 104) can be placed onto one of the punched-out adhesive layers (301), and which transport path (240) comprises a peel-off edge (247) over which the carrier film (302) can be guided or is guided in such a way that the adhesive layer (301) is peeled off from the carrier film (302), and that the adhesive layer (301) remains on the constituent part (102, 104). Moreover, the invention relates to a corresponding method.
The invention relates to a method for checking a security feature (12) in a semi-finished product (12), which consists of at least one paper layer, which has the at least one security feature (23) in a test field (24), wherein, after production and output of the produced semi-finished product (12) from a production machine (14) or before processing of the semi-finished product (12) in a cutting machine (27) or in a printing or laminating machine (32), an excitation radiation is directed to a test field (24) of the semi-finished product (12) provided with the security field (23), wherein an emitted radiation of the security feature (23) of the semi-finished product (12) is detected by a detection device (36), wherein parameters are determined from the emitted radiation by a data processing device (18) and compared to parameters, stored in the data processing device (18), of the originally produced security feature (23) in the test field (24), and wherein the evaluation of the detected parameters together with the stored parameters is output in real time before the start of a subsequent work step of the semi-finished product (12) in order to produce the value or security document.
BUNDESREPUBLIK DEUTSCHLAND, VERTRETEN DURCH DAS BUNDESMINISTERIUM DES INNERN, VERTRETEN DURCH DAS BUNDESKRIMINALAMT (Allemagne)
Inventeur(s)
Bielesch, Ulrich
Mauderer, Michael
Krüger, Per
Löer, Thomas
Seidel, Uwe
Schneider, Ulrich
Weigand, Christian
Willisch, Andreas
Abrégé
The invention relates to a security element (10) for use in a security document (20), the security element (10) comprising a first representation (11) and a second representation (14), the second representation (14) including an anamorphically modified image of the first representation (11).
The invention relates to a method for encrypting files for a secure storage, having the following steps: generating an identification code (F) which is unique to a provided file (D) to be stored; symmetrically encrypting the file (D) to be stored using a symmetric key (F, Z) and storing the file (K) encrypted in this manner; and generating and storing a generated asymmetrically determined index value (L) which is unique to the encrypted file (K) and refers to a storage location of the encrypted file (K).
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
84.
IDENTIFICATION, VALUE OR SECURITY DOCUMENT, AND METHOD AND DEVICE FOR PRODUCING SAME
The invention relates to an identification, value or security document (100), comprising a main body (102), which has a surface (104, 106), onto or into which an inscription field (108) is applied, which is designed to accept and/or absorb a permanent colorant when said colorant is applied to the inscription field (108). The inscription field (108) comprises or consists of a layer (112) of a coating that can be inscribed or written on with the colorant. The invention also relates to a method and a device (300) for producing the identification, value or security document (100).
The invention relates to a method for automated machine learning. A pre-trained learning module (120) and a database (104) are provided. An additional dataset (108) is received and stored in a first data model (106) of the database, and one or more tokens are (109) generated and assigned to one or more token types (111). The token assignments (113) are each classified as verified fact or preliminary assumption, and an index (112) in a second data model (110) is extended using the additional token, a pointer (115) to the additional stored data set, and the token assignments.
G06F 16/31 - IndexationStructures de données à cet effetStructures de stockage
G06F 16/38 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
The invention relates to a computer-implemented method for machine learning. A pre-trained learning module (120) and a database (104) are provided. The learning module comprises a plurality of predetermined trigger definitions (123), which define triggers (121) for assigning tokens (109) to classes (111) of a group of classes. An additional dataset (108) is received and stored in a first data model (106) of the database, and one or more tokens are generated. Among the generated tokens, triggers are identified and each assigned to the relevant trigger definition. The identified triggers are used to assign further generated tokens to one or more classes in the group of classes. Remaining generated tokens, which have not been assigned to one of the trigger definitions nor assigned to a class due to one of the trigger definitions, are assigned to a fallback class. In a second data model (110), an index (112) is extended using the generated tokens, the class assignments of the generated tokens and a pointer (115) to the stored additional dataset.
The invention relates to a computer-implemented method for implementing a cross-database index (112, 222) in a distributed database system (170), which comprises a plurality of independent individual databases (104, 204). The individual databases are communicatively interconnected by means of a network (180). The method comprises an application of a data-processing function of a source database (104) to an additional data set (108), the data-processing function comprising at least an indexing of the additional data set for storage in the source database. Furthermore, a supplementation data set (130) resulting from the application of the data-processing function is created, which supplementation data set comprises the supplementations made in the index of the source data base and is used to supplement at least one additional index (212) of at least one additional individual database of the distributed database system as a receiving database (204). The created supplementation data set is sent via the network to the second individual database for integration into the additional index of the receiving database (204).
G06F 16/31 - IndexationStructures de données à cet effetStructures de stockage
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
The invention relates to a method for authenticating a first computer system (100) to a second computer system (200). A third computer system (300) provides an authentication file containing authentication data for authenticating the first computer system (100). A certificate (112) issued for the first computer system (100) comprises a reference (128) for identifying the authentication data. The third computer system (300) receives a read request from the second computer system (200) for reading the authentication data, wherein the read request identifies the authentication data by using the reference (128). In response to reception of the read request, the third computer system (300) transmits the requested authentication data to the second computer system (200).
The invention relates to an RFID transponder having the following features: an antenna device (4); a rectifier (8); a microcontroller (2) that has a processor and a memory device, which is configured to store data received via the antenna device (4), and that is connected to the rectifier via a voltage regulating device (9) for the purpose of receiving a microcontroller operating voltage; at least one supplementary functional component (3.1, 3.2, 3.3), which is connected to the microcontroller (2) and the operation of which is controlled by means of the microcontroller (2); and a Z diode (10), which is connected between the voltage regulating device (9) and a supply connection of the at least one supplementary functional component (3.1, 3.2, 3.3) and in series with the at least one supplementary functional component (3.1, 3.2, 3.3) in the reverse direction. Furthermore, a portable data carrier having the RFID transponder is provided.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p. ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
90.
METHOD FOR PRODUCING A VALUE OR SECURITY DOCUMENT, AND SECURITY DOCUMENT COMPRISING A SECURITY HOLOGRAM
The invention relates to a method for producing a value or security document (11) and to a security document comprising a security hologram. At least one upper layer (3) and at least one lower layer (5) are connected together in order to form a document body (6). The at least one upper layer (3) forms an upper face, and the at least one lower layer (5) forms a lower face of the document body (6). A window (12) is introduced into the document body (6), said document body (6) being transparent between the upper face and the lower face in said window for a wavelength of light, or a window section (18) is introduced into the at least one upper or at least one lower layer (3, 5), a security hologram (16) being positioned between the upper face and the lower face of the document body (6) in a paired manner with the window (12) or the window section (18). at least one cut-out section (14) is introduced into at least one inner layer (4) arranged in the document body (6) between the at least one upper and at least one lower layer (3, 5), and a web material with multiple successive security holograms (16) is provided. A cutting tool (26, 32) is used to cut out a security hologram (16) with a size which corresponds to the size of the cut-out section (14) of the at least one inner layer (4). The cut-out security hologram (16) is inserted into the cut-out (14) of the at least one inner layer (4), and the at least one inner layer (4) together with the security hologram (16) received in the cut-out section (14) is added to the at least one upper and/or at least one lower layer (3, 5).
The invention relates to a method for printing a layer material (60) for a security document by means of a printing device, wherein the method comprises the following when producing at least one security feature on the layer material (60): providing a layer material (60) to be printed for a security document; arranging the layer material (60) on a supporting device, which is associated with a printing device and is designed to support the layer material (60) during a printing process for printing the layer material (60) by means of the printing device; printing the layer material (60) as part of the printing process in a region of the at least one security feature to be formed on the layer material (60) on a front and a reverse side (61, 62) of the layer material (62), using a first print unit (63, 64), wherein the printing is carried out by means of a first printing method; and printing the layer material (60) as part of the printing process in the region of the at least one security feature on the front and/or on the reverse side of the layer material (60) using a second print unit (65; 67), wherein the printing is carried out by means of a second printing method, which is different from the first printing method; wherein the first and second printing methods are carried out as offset printing and/or flexo printing. The invention furthermore relates to a device for printing a layer material (60) for a security document and to a security document.
The invention relates to a device (1) for exposing a volume hologram, having an optical structure (2), wherein the optical structure (2) comprises, along an optical axis (9): at least one laser radiation source (3) providing coherent laser radiation (10), at least one optical scanner (4) for scanning the laser radiation (10), a modulator (5) for modulating the scanned laser radiation (10), imaging optics (6) for imaging the modulated laser radiation (10), at least one deflection mirror (7) for deflecting the imaged laser radiation (10), and a holding device (8) having an exposure area (13) for holding a hologram master (11) and a holographic recording material (12) to be exposed, wherein the deflection mirror (7) is designed to be rotatable and positionable relative to the exposure area (13), such that the scanned and modulated laser radiation (10) can be positioned as desired within the exposure area (13) by deflection via the at least one deflection mirror (7). The invention further relates to an associated method.
G03H 1/04 - Procédés ou appareils pour produire des hologrammes
G03H 1/20 - Procédés ou appareils pour produire des hologrammes pour copier des hologrammes par une méthode holographique
G03H 1/02 - Procédés ou appareils holographiques utilisant la lumière, les infrarouges ou les ultraviolets pour obtenir des hologrammes ou pour en obtenir une imageLeurs détails spécifiques Détails
G03H 1/00 - Procédés ou appareils holographiques utilisant la lumière, les infrarouges ou les ultraviolets pour obtenir des hologrammes ou pour en obtenir une imageLeurs détails spécifiques
A method for securely transferring a file (F) between a first computer device (100) that is designed to securely transfer files and a second computer device (200) that is not designed to securely transfer files, via a cloud-based platform (P) using symmetrical encryption (A) of a file (F) to be transferred with a symmetrical file key (SK), and asymmetrical encryption (B) of the randomly generated file key (SK) with the public key (AK1) of an asymmetrical key pair (AK) consisting of the public key (AK1) and the private key (AK2).
The invention relates to a method for securely providing a personalized electronic identity on a terminal (2) which can be used by a user (1) for identification purposes when claiming an online service. In the method, an identification application is ran on a terminal (2), which is assigned to a user (1), in a system comprising data processing devices (9; 10; 11; 12) and said terminal (2), and additionally a personalization application and an identity provider application are ran. The method has the following steps in particular: transmitting a request to transmit an identity attribute assigned to the user (1) from the personalization application to the identity provider application; transmitting the identity attribute from the identity provider application to the personalization application after an agreement to transmit the identity attribute by means of the identity provider application is received from the user (1); generating an asymmetric key pair with a public and a private key on the terminal (2) by means of the identification application; transmitting the public-key from the identification application on the terminal (2) to the personalization application; and generating an electronic certificate for the public-key by means of the personalization application and storing the electronic certificate in a data storage device in order to form a first public-key infrastructure of the personalization application, additionally having the steps of; generating a hash value for the identity attribute and recording the hash value onto the electronic certificate. The identity attribute is encoded and transmitted together with the electronic certificate from the personalization application to the identification application (14) on the terminal (2), where both are stored in a local storage device of the terminal (2).
The invention relates to a method for securely providing a personalized electronic identity on a terminal (2), which can be used by a user (1) for identification purposes when using an online service. In the method, an identification application is run on a terminal (2), which is assigned to a user (1), in a system comprising data processing devices (9; 10; 11; 12) and said terminal (2), and additionally a registration application, a personalization application, and an identity provider application are run.
The invention relates to a hologram master (10) for producing customised holograms (400) with kinetic diffraction patterns (32) comprising: a continuous customisation region (20), which comprises at least one first diffraction region (30) having a mirrored blaze grating (31) with kinetic diffraction patterns (32) integrated therein or thereon. The invention further relates to a method for producing security holograms (400) using a hologram master (10) of this kind and to security holograms (400). The advantage consists in the fact that the presence of kinetic diffraction patterns (32) in the at least one diffraction region (30) is not detrimental to customisation.
The invention relates to a method for producing a value or security document (1) or a value or security document blank, comprising the following steps: -providing a document body (2), wherein: the document body (2) has a material layer (4) made of polycarbonate at least on an outer surface (3); the material layer (4) on the outer surface (3) is printed with at least one ink preparation (5) which comprises a binder with a polycarbonate derivative based on a geminally di-substituted dihydroxydiphenyl cycloalkane, -two-dimensionally thermally post-treating the outer surface (3) at least in the printed region (7) such that the material layer (4) in this printed region (7) is at least partially brought into a softening state and at least one dye of the at least one ink preparation (5) is, as a result, diffused at least partially into the material layer (4). The invention further relates to an associated value or security document (1), a value or security document blank, and a totality of value or security documents (1) or value or security document blanks.
B32B 38/00 - Opérations auxiliaires liées aux procédés de stratification
B32B 27/08 - Produits stratifiés composés essentiellement de résine synthétique comme seul composant ou composant principal d'une couche adjacente à une autre couche d'une substance spécifique d'une résine synthétique d'une sorte différente
98.
APPARATUS FOR AUTOMATICALLY CHECKING A SECURITY DOCUMENT AND METHOD FOR READING A SECURITY DOCUMENT BY MACHINE FOR AUTOMATIC DOCUMENT CHECKING
The disclosure relates to an apparatus for automatically checking a security document, having a housing (1); a reading and checking device which is arranged in the housing (1) and is configured to read and check a security document by means of scanning; a document rest (3) which is arranged on the housing (1) in such a manner that the security document placed onto the document rest (3) can be read by the reading and checking device through a viewing window of the document rest (3); a cover (4) which is arranged on the housing (1) and is configured to at least partially cover the document rest (3); an insertion opening (6) which is formed on the cover (4) and through which the security document can be arranged on the document rest (3); and a protection device (8) which is arranged on the cover (4) behind the insertion opening (6) in the insertion direction and opposite the document rest (3) and has protection elements which, during manual insertion of the security document through the insertion opening (6), are moved by the security document, counter to a prestress applied by the protection elements, from a starting position into a protection position in which the protection elements press the security document arranged on the document rest (3) against the latter. A method for reading a security document by machine for automatic document checking is also disclosed.
The invention relates to a coding system for forming a security feature in or on one or a plurality of security or valuable documents, comprising at least two individual phosphors, and at least three phosphor combinations formed with the at least two individual phosphors, wherein the at least three phosphor combinations are applied or attached in the form of at least three luminescent security elements for the security feature in or on said one or said plurality of security or valuable documents, wherein each of the at least three phosphor combinations has an identical spectral sequence of the emission lines and/or emission bands to which a code is assigned, and the at least three luminescent security elements of the security feature have different color coordinates in a CIE standard colorimetric system under predefined excitation conditions, with the result that they bring about different color impressions for an observer.
The invention relates to a method for producing a data page for a book-like document, to a data page and to a device for producing such a data page, in which a data carrier (20) and a tab (23) are oriented with respect to one another such that the tab (23) and the data carrier (20) form an overlapping area (30) and overlap with one another, in which the data carrier (20) and the tab (23), with their overlapping area, are positioned between a first tool (52) and a second tool (53) that are oriented toward one another, and in which the data carrier (20) and the tab (23) are welded to one another in the overlapping area (30) by the tools (52, 53), wherein the tab (23) and the data carrier (20) are connected to one another by way of friction welding in the overlapping area (30), in which the first or the second tool (52, 53) is excited by way of an oscillating translational relative movement the movement direction of which is oriented parallel to the direction of extent of the data page (20) or of the tab (23).