(19)
(11) EP 2 559 563 B1

(12) EUROPEAN PATENT SPECIFICATION

(45) Mention of the grant of the patent:
26.03.2014 Bulletin 2014/13

(21) Application number: 11461534.7

(22) Date of filing: 18.08.2011
(51) International Patent Classification (IPC): 
B42D 25/351(2014.01)
G07D 7/20(2006.01)
B41M 3/14(2006.01)

(54)

A security document with a see-through feature, and methods for manufacturing and authentication thereof

Sicherheitsdokument mit durchsichtigem Merkmal und Verfahren zu dessen Herstellung und Authentifizierung

Document de sécurité avec fonction de visualisation et procédés de fabrication et d'authentification associés


(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(43) Date of publication of application:
20.02.2013 Bulletin 2013/08

(73) Proprietor: Polska Wytwornia Papierow Wartosciowych S.A.
00-222 Warszawa (PL)

(72) Inventors:
  • Olszynska, Agata
    00-222 Warszawa (PL)
  • Wojcik, Pawel
    00-222 Warszawa (PL)
  • Chrzastowski, Szymon
    00-222 Warszawa (PL)
  • Ziolkowski, Slawomir
    00-222 Warszawa (PL)
  • Leszczynska-Ambroziewicz, Ewa
    00-222 Warszawa (PL)

(74) Representative: Pawlowski, Adam 
Eupatent.PL ul. Zeligowskiego 3/5
90-752 Lodz
90-752 Lodz (PL)


(56) References cited: : 
EP-A2- 1 775 932
US-A- 3 827 726
DE-A1- 19 906 388
US-A1- 2010 295 290
   
       
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description


    [0001] The present invention relates to security documents with a see-through security feature.

    [0002] See-through security features, also known as recto-verso or look-through, are one of known counterfeit protection methods. A typical see-through security feature comprises two partial images applied on opposite sides of a semi-transparent substrate, which form a complete image when viewed in transmitted light. See-through security features are commonly applied to documents having a uniform semi-transparent substrate, such as a semi-transparent plastic or paper substrate printed at both sides.

    [0003] A European patent EP0388090 "Sheet with security device" describes a sheet comprising a see-through feature, which is provided in a region of the sheet which is more transparent than a majority of the remainder of the sheet. The sheet has a paper substrate.

    [0004] The aim of the present invention is to provide an improved security document with a see-through security feature. US 2010/0295290 discloses a security document having corresponding features to those of the preambles of claim 1 and claim 7, respectively.

    [0005] The object of the invention is a method for manufacturing a security document by providing transparent external layers, at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, laminating the layers to form the security document and applying to the document, before and/or after lamination of layers, personalized data and a see-through security feature in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light. The method further comprises the steps of: before applying the see-through security feature obtaining the personalized data for the security document, obtaining the complete image for the see-through security feature, and dividing the complete image to the first partial image and to the second partial image using a function having a value dependent on at least part of the personalized data for the security document.

    [0006] Preferably, the method further comprises the steps of, when dividing the complete image: generating a mask having a size of the complete image and comprising a plurality of regions using the function having a value dependent on at least part of the personalized data for the security document and assigning the regions of the complete image which coincide with the regions of the mask to the first partial image and the remaining regions to the second partial image.

    [0007] Preferably, the function having a value dependent on at least part of the personalized data for the security document is a hash function.

    [0008] Preferably, the complete image comprises at least part of the personalized data for the security document.

    [0009] Preferably, the see-through security feature is applied by ink jet printing before lamination.

    [0010] Preferably, the see-through security feature is applied by laser engraving after lamination.

    [0011] The object of the invention is also a security document having a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data, wherein the fragmentation of the complete image to the first and second partial images is having a value dependent on at least part of the personalized data comprised in the security document.

    [0012] Preferably, at least one semi-transparent internal layer comprises a first internal layer of a first transparency with an opening corresponding to the see-through area and a second semi-transparent layer of a second transparency, higher than the first transparency.

    [0013] Preferably, the first internal layer of the first transparency is opaque.

    [0014] Preferably, the document further comprises an integrated circuit chip with memory in which there is stored a definition of the function on which the fragmentation of the complete image is dependent and/or a mask for verifying the authenticity of the fragmentation of the complete image and/or the first and second partial images and/or the complete image.

    [0015] The object of the invention is also a method for authenticating a security document in a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data. The method comprises the steps of: obtaining at least part of the personalized data of the security document, generating a mask having a size of the complete image and comprising a plurality of regions, using a function having a value dependent on the obtained at least part of the personalized data and verifying whether the first partial image and/or the second partial image are compliant with the generated mask.

    [0016] The object of the invention is also a device for authenticating a security document in a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at last one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data. The device comprises a document reader configured to obtain at least part of the personalized data of the security document, as well as the first partial image and/or the second partial image and a verification module configured to generate a mask having a size of the complete image and comprising a plurality of regions, using a function having a value dependent on the obtained at least part of the personalized data and to verify whether the first partial image and/or the second partial image are compliant with the generated mask.

    [0017] The object of the invention is shown by way of exemplary embodiments on a drawing, in which:

    Fig. 1 shows a top view of the security document,

    Fig. 2 shows an assembly view of one exemplary embodiment of the security document,

    Fig. 3 shows an assembly view of another exemplary embodiment of the security document,

    Fig. 4 shows the steps of a first embodiment of the method according to the invention,

    Fig. 5 shows the steps of a second embodiment of the method according to the invention,

    Figs. 6-9 show examples of separation of a complete image to a first and to a second partial image using a mask having a value dependent on personalized data,

    Fig. 10 shows a structure of a device for authenticating a security document.



    [0018] Fig. 1 shows a top view of the security document according to the invention, which may have a form of a plastic card 100 with a dimensions of e.g. approximately 8 cm x 5 cm and with an integrated circuit chip 124 with data 123 stored therein and with a plurality of standard identification elements related to personalized data, such as a photo 121 of a face, embossed, printed and/or engraved name and an ID number 122 of the document holder. As shown in Figs. 2 and 3, the document is a laminate of transparent external layers 101, 102 and at least one semi-transparent internal layer 104 with a see-through area 110 which is more transparent than the majority of the remainder of the document. The see-through area 110 has a see-through security feature comprising a first partial image 111 applied on one side of the at least one semi-transparent internal layer 104 and a second partial image 112 applied on the other side of the at least one semi-transparent internal layer 104, wherein the first partial image 111 and the second partial image 112 form a complete image 113 when viewed in transmitted light.

    [0019] Fig. 2 shows an assembly view of one exemplary embodiment of the security document. The document is a laminate of plastic layers. The embodiment shown in Fig. 2 comprises transparent layers 101, 102, between which there is an internal layer 103 of a first transparency with an opening 110 corresponding to the see-through area and a second semi-transparent layer 104 of a second transparency, higher than the first transparency. Preferably, the internal layer 103 of a first transparency is opaque. The first and second partial images 111, 112 can be applied by laser engraving the opposite sides of the semi-transparent layer 104 after lamination of the layers.

    [0020] Fig. 3 shows an assembly view of another exemplary embodiment of the security document. The document is a laminate of plastic layers. The embodiment shown in Fig. 3 is similar to that shown in Fig. 2, but it comprises two additional transparent or semi-transparent layers 105, 106 located at opposite sides of the semi-transparent layer 104. The total transparency of the layers 104, 105, 106 should be higher than the total transparency of layers 103, 104, 105, 106, such that the transparency of the area 110 is higher than the transparency of the remaining portion of the document. The see-through security feature can be is applied by ink jet printing the first image and the second image on layers 105, 106 before lamination of the layers. It can be also applied by laser engraving of a laminated document, or by any other method applicable for applying see-through security features. The first partial image 111 (e.g. the recto image) can be applied by using different print or engraving parameters than the second partial image 112 (e.g. the verso image) in order to achieve similar shades of the complete image 113 when viewed in transmitted light.

    [0021] The total transparency of all layers in the see-through area 110 should be such as to allow the see-through feature to be seen in certain light conditions.

    [0022] The layers 101-106 can be made of materials typical to plastic card laminates, such as polycarbonate, polyvinyl chloride and/or polyester.

    [0023] The definition of the function, the mask image 114, the partial images 111, 112 and/or the complete image 113 can be stored in the integrated circuit chip 124, which facilitates verification of the security document.

    [0024] Fig. 4 shows the steps of a first embodiment of the method according to the invention. First, in step 201 at least part of personalized data for applying to the document 100 is obtained, such as a name of the document holder, a personal ID number, a date of issuance of the document, a photo etc. Next, in step 202 a complete see-through image is obtained. The complete see-through image can be common for a group of documents, for example it can be a country code, a document type, a common symbol, year of issuance etc. Alternatively, the complete see-through image can be personalized and include a personal ID number, a name, a surname, a photo etc. Exemplary complete see-through images 113 are shown in Figs. 6-9. Next, a mask image 114 is generated in step 203 as a function of the at least part of personalized data. The mask image 114 has the size of the complete see-through image 113 and comprises a plurality of regions 115 generated as a function having a value dependent on the at least part of the personalized data 121-123 for the security document.

    [0025] For example, the function can be a hash function for the card holder's name. The hash function should generate substantially unique outputs for unique personalized data. For example, an MD5 hash function can generate a 128-bit hash value, which guarantees with a very high probability that all card holder names will be assigned different hash values.

    [0026] The hash value can be used to generate a mask. As a simple example, shown with reference to Fig. 6, the MD5 hash value for personalized data = "JOHN SMITH" is (in a hexadecimal form) "f3c686cf530baf2269e7442163cb602e". The individual bits of the hash value can be used to define the regions of the mask image. For example, the mask image 114 can be divided into 4x4 squares and the consecutive squares can be defined as active/inactive depending on the value (1/0) of the first 16 bits of the hash value (which in this example is "F3C6" = "1111001111000110"), as shown in the example of Fig. 6. In practice, more bits of the 128-bit MD5 hash value should be used, or even longer hash value should be used, in order to guarantee uniqueness of the mask.

    [0027] In step 204, the first partial image 111 and the second partial image 112 are generated, by overlaying the mask 114 on the complete image 113. The regions of the complete image 113 which coincide with the regions of the mask can be assigned to the first partial image 111 and the remaining regions can be assigned to the second partial image 112.

    [0028] Next, blank layers 101-106 are provided in step 205. The personalized data 121-123 and the partial see-through images 111, 112 are applied in step 206, for example by Ink-jet method. Then, the layers are laminated in step 207.

    [0029] Fig. 5 shows the steps of a second embodiment of the method according to the invention. Steps 211-214 are equivalent to steps 201-204 of the method shown in Fig. 4. In step 215, a blank or partially personalized laminate is provided. In step 216, the see-through images and optionally the rest of the personalized data are applied to the laminate, for example by laser engraving.

    [0030] Figs. 7-9 show further exemplary embodiments of masks 114 applied to exemplary complete images 113 and resulting partial images 111, 112.

    [0031] Fig. 7 shows an example, wherein the mask 114 comprises a plurality of rectangles, wherein the top-left corner point and the bottom-right corner points are defined by the function having a value dependent on at least part of the personalized data. In order to avoid a situation where a large rectangle would cover most of the mask region, the maximum size of the rectangle is limited.

    [0032] Fig. 8 shows an example, wherein the mask 114 comprises a plurality of regions obtained by drawing lines having coordinates defined by the function having a value dependent on at least part of the personalized data and active regions selected in areas between the lines.

    [0033] Fig. 9 shows an example, wherein the mask 114 comprises a plurality of regions obtained by drawing ellipses having center points and radii defined by the function having a value dependent on at least part of the personalized data.

    [0034] Fig. 10 shows a structure of a device for authenticating the security document according to the invention. The device comprises a document reader 301 configured to obtain at least part of the personalized data 121-123 of the security document (for example by an optical reader or an IC chip interface), as well as the first partial image 111 and/or the second partial image 112 (for example by an optical reader). A verification module 302 is configured to generate a mask 114 having a size of the complete image 113 and comprising a plurality of regions 115, as a function having a value dependent on the obtained at least part of the personalized data 121-123 and to verify whether the first partial image 111 and/or the second partial image 112 are compliant with the generated mask 114. The mask 114 can be generated by a mask generator 304 on the basis of the value of the hash function 303, wherein the mask generator 304 receives the personalized data 121-123 from the document reader 301. The hash function 303 and the mask generator 304 operate in the same manner as corresponding units in the system for manufacturing the card. The verification can be performed by an image comparator 305 receiving as input the mask 114 from the mask generator 304 and the partial images 111, 112 from the document reader 301 and providing an output determining whether the images overlap or not.

    [0035] The security document with a see-through security feature is improved in that the see-through security feature is personalized not only by applying personalized data in the see-through area, but also by personalized method of generating the regions which belong to the first and second partial images. In order to falsify the security document according to the invention by changing the personalized data, the see-through security feature should be changed as well. This not only requires additional manipulation within the see-through area, but knowledge of the function having a value dependent on the personalized data as well, in case when the hash function is not stored on the card chip. Therefore, the see-through security feature according to the invention can be used for authenticating the document and for verifying the data contained therein.


    Claims

    1. A method for manufacturing a security document by providing transparent external layers (101, 102), at least one semi-transparent internal layer (103-106) with a see-through area (110) which is more transparent than the majority of the remainder of the document, laminating the layers (101-106) to form the security document and applying to the document, before and/or after lamination of layers (101-106), personalized data (121-123) and a see-through security feature in the see through area (110), the see-through feature comprising a first partial image (111) applied on one side of the at least one semi-transparent internal layer (104) and a second partial image (112) applied on the other side of the at least one semi-transparent internal layer (104), wherein the first and second partial images (111, 112) form a complete image (113) when viewed in transmitted light, the method characterized by further comprising the steps of: before applying the see-through security feature: obtaining the personalized data (121-123) for the security document, obtaining the complete image (113) for the see-through security feature, and dividing the complete image (113) to the first partial image (111) and to the second partial image (112) using a function having a value dependent on at least part of the personalized data (121-123) for the security document.
     
    2. The method according to claim 1, further comprising the steps of: when dividing the complete image: generating a mask (114) having a size of the complete image and comprising a plurality of regions (115) using the function having a value dependent on at least part of the personalized data (121-123) for the security document and assigning the regions (115) of the complete image (113) which coincide with the regions of the mask to the first partial image (111) and the remaining regions to the second partial image (112).
     
    3. The method according to any of previous claims, wherein the function having a value dependent on at least part of the personalized data (121-123) for the security document is a hash function.
     
    4. The method according to any of previous claims, wherein the complete image (113) comprises at least part of the personalized data (121-123) for the security document.
     
    5. The method according to any of previous claims, wherein the see-through security feature is applied by ink jet printing before lamination.
     
    6. The method according to any of previous claims, wherein the see-through security feature is applied by laser engraving after lamination.
     
    7. A security document having a form of a laminate of transparent external layers (101, 102) and at least one semi-transparent internal layer (103-106) with a see-through area (110) which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area (110), the see-through feature comprising a first partial image (111) applied on one side of the at least one semi-transparent internal layer (104) and a second partial image (112) applied on the other side of the at least one semi-transparent internal layer (104), wherein the first and second partial images (111, 112) form a complete image (113) when viewed in transmitted light, and wherein the security document comprises personalized data (121-123) characterized in that the division of the complete image (113) into the first and second partial images (111, 112) is dependent on at least part of the personalized data (121-123) comprised in the security document.
     
    8. The security document according to claim 7, wherein the at least one semi-transparent internal layer comprises a first internal layer (103) of a first transparency with an opening corresponding to the see-through area (110) and a second semi-transparent layer (104) of a second transparency, higher than the first transparency.
     
    9. The security document according to claim 8, wherein the first internal layer (103) of the first transparency is opaque.
     
    10. The security document according to any of claims 7-9, further comprising an integrated circuit chip (124) with memory in which there is stored a definition of the function on which the fragmentation of the complete image (113) is dependent and/or a mask (114) for verifying the authenticity of the fragmentation of the complete image (113) and/or the first and second partial images (111, 112) and/or the complete image (113).
     
    11. A method for authenticating the security document of any one of claims 7-10 : the method characterized by comprising the steps of:

    - obtaining at least part of the personalized data (121-123) of the security document,

    - generating a mask (114) having a size of the complete image (113) and comprising a plurality of regions (115), using a function having a value dependent on the obtained at least part of the personalized data (121-123),

    - verifying whether the first partial image (111) and/or the second partial image (112) are compliant with the generated mask (114).


     
    12. A device for authenticating the security document of any one of claims 7-10 the device characterized by comprising:

    - a document reader (301) configured to obtain at least part of the personalized data (121-123) of the security document, as well as the first partial image (111) and/or the second partial image (112),

    - a verification module (302) configured to generate a mask (114) having a size of the complete image (113) and comprising a plurality of regions (115), using a function having a value dependent on the obtained at least part of the personalized data (121-123) and to verify whether the first partial image (111) and/or the second partial image (112) are compliant with the generated mask (114).


     


    Ansprüche

    1. Verfahren zum Herstellen eines Sicherheitsdokumentes durch Bereitstellen von transparenten externen Schichten (101, 102), mindestens einer halbtransparenten internen Schicht (103-106) mit einer Durchsichtsfläche (110), die transparenter als der größte Rest des Dokumentes, Laminieren der Schichten (101-106), um das Sicherheitsdokument zu bilden, und, vor und/oder nach dem Laminieren der Schichten (101-106), Aufbringen von personalisierten Daten (121-123) und eines Durchsichtssicherheitsmerkmals in der Durchsichtsfläche (110) auf das Dokument, wobei das Durchsichtsmerkmal ein erstes Teilbild (111) umfasst, das auf eine Seite der mindestens einen halbtransparenten internen Schicht (104) aufgebracht ist, und ein zweites Teilbild (112), das auf die andere Seite der mindestens einen halbtransparenten internen Schicht (104) aufgebracht ist, wobei das erste und zweite Teilbild (111, 112) ein vollständiges Bild (113) bilden, wenn es im Durchlicht betrachtet wird, wobei das Verfahren dadurch gekennzeichnet ist, dass es die folgenden Schritte umfasst: Vor dem Aufbringen des Durchsichtssicherheitsmerkmals: Erhalten der personalisierten Daten (121-123) für das Sicherheitsdokument, Erhalten des vollständigen Bildes (113) für das Durchsichtssicherheitsmerkmals und Teilen des vollständigen Bildes (113) in das erste Teilbild (111) und in das zweite Teilbild (112) unter Verwendung einer Funktion, die einen Wert hat, welcher von mindestens einem Teil der personalisierten Daten (121-123) für das Sicherheitsdokument abhängt.
     
    2. Verfahren nach Anspruch 1, das ferner die folgenden Schritte umfasst: Beim Teilen des vollständigen Bildes: Erzeugen einer Maske (114), die eine Größe des vollständigen Bildes hat und mehrere Bereiche (115) umfasst, unter Verwendung der Funktion, die einen Wert hat, welcher zumindest von einem Teil der personalisierten Daten (121-123) für das Sicherheitsdokument abhängt, und Zuweisen der Bereiche (115) des vollständigen Bildes (113), die mit den Bereichen der Maske übereinstimmen, zum ersten Teilbild (111) und der restlichen Bereiche zum zweiten Teilbild (112).
     
    3. Verfahren nach einem der vorherigen Ansprüche, wobei die Funktion, die einen Wert hat, welcher zumindest von einem Teil der personalisierten Daten (121-123) für das Sicherheitsdokument abhängt, eine Hash-Funktion ist.
     
    4. Verfahren nach einem der vorherigen Ansprüche, wobei das vollständige Bild (113) mindestens einen Teil der personalisierten Daten (121-123) für das Sicherheitsdokument umfasst.
     
    5. Verfahren nach einem der vorherigen Ansprüche, wobei das Durchsichtssicherheitsmerkmal durch Tintenstrahldruck vor dem Laminieren aufgebracht wird.
     
    6. Verfahren nach einem der vorherigen Ansprüche, wobei das Durchsichtssicherheitsmerkmal durch Lasergravur nach dem Laminieren aufgebracht wird.
     
    7. Sicherheitsdokument, das eine Form eines Laminats von transparenten externen Schichten (101, 102) und mindestens eine halbtransparente interne Schicht (103-106) mit einer Durchsichtsfläche (110) hat, welche transparenter als größte Teil des Restes des Dokumentes ist, wobei ein Durchsichtssicherheitsmerkmal auf die Durchsichtsfläche (110) aufgebracht wird, wobei das Durchsichtsmerkmal ein erstes Teilbild (111) umfasst, welches auf eine Seite der mindestens einen halbtransparenten internen Schicht (104) aufgebracht ist, und ein zweites Teilbild (112) umfasst, das auf die andere Seite der mindestens einen halbtransparenten internen Schicht (104) aufgebracht ist, wobei das erste und zweite Teilbild (111, 112) ein vollständiges Bild (113) bilden, wenn es im Durchlicht betrachtet wird, und wobei das Sicherheitsdokument personalisierte Daten (121-123) umfasst, dadurch gekennzeichnet, dass das Aufteilen des vollständigen Bildes (113) in das erste und zweite Teilbild (111, 112) zumindest teilweise von den personalisierten Daten (121-124) abhängt, die im Sicherheitsdokument enthalten sind.
     
    8. Sicherheitsdokument nach Anspruch 7, wobei die mindestens eine halbtransparente interne Schicht eine erste interne Schicht (103) einer ersten Transparenz mit einer Öffnung umfasst, die der Durchsichtsfläche (110) entspricht, und die eine zweite halbtransparente Schicht (104) einer zweiten Transparenz umfasst, die größer als die erste Transparenz ist.
     
    9. Sicherheitsdokument nach Anspruch 8, wobei die erste interne Schicht (103) der ersten Transparenz lichtundurchlässig ist.
     
    10. Sicherheitsdokument nach einem der Ansprüche 7-9, das ferner eine integrierte Schaltung (124) mit Speicher umfasst, in dem eine Definition der Funktion gespeichert ist, von der die Fragmentierung des vollständigen Bildes (113) abhängig ist, und/oder eine Maske (114) zum Überprüfen der Echtheit der Fragmentierung des vollständigen Bildes (113) und/oder das erste und zweite Teilbild (111, 112) und/oder das vollständige Bild (113).
     
    11. Verfahren für die Authentifizierung des Sicherheitsdokumentes nach einem der Ansprüche 7-10, wobei das Verfahren dadurch gekennzeichnet ist, dass es folgende Schritte umfasst:

    - Erhalten von mindestens einem Teil der personalisierten Daten (121-123) des Sicherheitsdokumentes,

    - Erzeugen einer Maske (114), die eine Größe des vollständigen Bildes (113) hat und mehrere Bereiche (115) umfasst, unter Verwendung einer Funktion, die einen Wert hat, welcher zumindest von einem Teil der erhaltenen personalisierten Daten (121-123) abhängt,

    - Überprüfen, ob das erste Teilbild (111) und/oder das zweite Teilbild (112) mit der erzeugten Maske (114) konform sind.


     
    12. Vorrichtung zum Authentifizieren des Sicherheitsdokumentes nach einem der Ansprüche 7-10, wobei die Vorrichtung dadurch gekennzeichnet ist, dass sie Folgendes umfasst:

    - ein Dokumentenlesegerät (301), das zum Gewinnen zumindest eines Teils der personalisierten Daten (121-123) des Sicherheitsdokumentes ausgelegt ist, sowie des ersten Teilbildes (111) und/oder des zweiten Teilbildes (112),

    - ein Überprüfungsmodul (302), das zum Erzeugen einer Maske (114), welche eine Größe des vollständigen Bildes (113) hat und mehrere Bereiche (115) umfasst, unter Verwendung einer Funktion ausgelegt ist, die einen Wert hat, welcher zumindest von dem gewonnenen Teil der personalisierten Daten (121-123) abhängig ist, und zum Überprüfen, ob das erste Teilbild (111) und/oder das zweite Teilbild (112) mit der erzeugten Maske (114) konform sind.


     


    Revendications

    1. Procédé de fabrication d'un document de sécurité par la fourniture de couches externes transparentes (101, 102), d'au moins une couche interne semi-transparente (103-106) avec une zone translucide (110) qui est plus transparente que la majorité du reste du document, la stratification des couches (101-106) pour former le document de sécurité et l'application au document, avant et/ou après la stratification de couches (101-106), de données personnalisées (121-123) et d'une caractéristique de sécurité translucide dans la zone translucide (110), la caractéristique translucide comprenant une première image partielle (111) appliquée sur un côté de l'au moins une couche interne semi-transparente (104) et une deuxième image partielle (112) appliquée sur l'autre côté de l'au moins une couche interne semi-transparente (104), dans lequel les première et deuxième images partielles (111, 112) forment une image complète (113) lorsqu'elles sont visualisées à une lumière transmise, le procédé étant caractérisé en ce qu'il comprend en outre les étapes de : avant l'application de la caractéristique de sécurité translucide, l'obtention des données personnalisées (121-123) pour le document de sécurité, l'obtention de l'image complète (113) pour la caractéristique de sécurité translucide, et la division de l'image complète (113) en la première image partielle (111) et la deuxième image partielle (112) en utilisant une fonction ayant une valeur dépendant d'au moins une partie des données personnalisées (121-123) pour le document de sécurité.
     
    2. Procédé selon la revendication 1, comprenant en outre les étapes de : lors de la division de l'image complète, la génération d'un masque (114) ayant une taille de l'image complète et comprenant une pluralité de régions (115) utilisant la fonction ayant une valeur dépendant d'au moins une partie des données personnalisées (121-123) pour le document de sécurité et l'affectation des régions (115) de l'image complète (113) qui coïncident avec les régions du masque à la première image partielle (111) et des régions restantes à la deuxième image partielle (112).
     
    3. Procédé selon l'une quelconque des revendications précédentes, dans lequel la fonction ayant une valeur dépendant d'au moins une partie des données personnalisées (121-123) pour le document de sécurité est une fonction de la hachage.
     
    4. Procédé selon l'une quelconque des revendications précédentes, dans lequel l'image complète (113) comprend au moins une partie des données personnalisées (121-123) pour le document de sécurité.
     
    5. Procédé selon l'une quelconque des revendications précédentes, dans lequel la caractéristique de sécurité translucide est appliquée par impression à jet d'encre avant la stratification.
     
    6. Procédé selon l'une quelconque des revendications précédentes, dans lequel la caractéristique de sécurité translucide est appliquée par gravage laser après la stratification.
     
    7. Document de sécurité ayant une forme d'une stratification de couches externes transparentes (101, 102) et d'au moins une couche interne semi-transparente (103-106) avec une zone translucide (110) qui est plus transparente que la majorité du reste du document, dans lequel une caractéristique de sécurité translucide est appliquée dans la zone translucide (110), la caractéristique translucide comprenant une première image partielle (111) appliquée sur un côté de l'au moins une couche interne semi-transparente (104) et une deuxième image partielle (112) appliquée sur l'autre côté de l'au moins une couche interne semi-transparente (104), dans lequel les première et deuxième images partielles (111, 112) forment une image complète (113) lorsqu'elles sont visualisées à une lumière transmise, et dans lequel le document de sécurité comprend des données personnalisées (121-123), caractérisé en ce que la division de l'image complète (113) en la première image partielle (111) et la deuxième image partielle (112) dépend d'au moins une partie des données personnalisées (121-123) comprises dans le document de sécurité.
     
    8. Document de sécurité selon la revendication 7, dans lequel l'au moins une couche interne semi-transparente comprend une première couche interne (103) d'une première transparence avec une ouverture correspondant à la zone translucide (110) et une deuxième couche semi-transparente (104) d'une deuxième transparence supérieure à la première transparence.
     
    9. Document de sécurité selon la revendication 8, dans lequel la première couche interne (103) de la première transparence est opaque.
     
    10. Document de sécurité selon l'une quelconque des revendications 7 à 9, comprenant en outre une puce de circuits intégrés (124) avec une mémoire dans laquelle est mémorisée une définition de la fonction de laquelle dépend la fragmentation de l'image complète (113) et/ou un masque (114) pour vérifier l'authenticité de la fragmentation de l'image complète (113) et/ou des première et deuxième images partielles (111, 112) et/ou de l'image complète (113).
     
    11. Procédé d'authentification du document de sécurité selon l'une quelconque des revendications 7 à 10, le procédé étant caractérisé en ce qu'il comprend les étapes de :

    - l'obtention d'au moins une partie des données personnalisées (121-123) du document de sécurité,

    - la génération d'un masque (114) ayant une taille de l'image complète (113) et comprenant une pluralité de région (115), en utilisant une fonction ayant une valeur dépendant de l'au moins une partie obtenue des données personnalisées (121-123),

    - la vérification si la première image partielle (111) et/ou la deuxième image partielle (112) sont conformes au masque généré (114).


     
    12. Dispositif d'authentification du document de sécurité selon l'une quelconque des revendications 7 à 10, le dispositif étant caractérisé en ce qu'il comprend :

    - un lecteur de document (301) configuré pour effectuer l'obtention d'au moins une partie des données personnalisées (121-123) du document de sécurité, ainsi que de la première image partielle (111) et/ou la deuxième image partielle (112),

    - un module de vérification (302) configuré pour effectuer la génération d'un masque (114) ayant une taille de l'image complète (113) et comprenant une pluralité de région (115), en utilisant une fonction ayant une valeur dépendant de l'au moins une partie obtenue des données personnalisées (121-123) et la vérification si la première image partielle (111) et/ou la deuxième image partielle (112) sont conformes au masque généré (114).


     




    Drawing





























    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description