摘要:
In order to detect security documents irrespective of their individual graphic designs, a method and apparatus are provided in which the presence of certain structural elements common to a variety of different security documents are analyzed without analyzing the whole printed image or comparing it for identity with the stored printed image. For example, the structural elements may be curved colored lines present in a certain minimum density of a surface, or intertwined line structures known as guilloches. The document to be copied is scanned as in any normal copying operation and the structural elements identified by electronic pattern recognition in order to determine whether copying is to be permitted, without requiring additional detection elements.
摘要:
A recording medium is provided with picture information in a tamper-resistant and high-resolution form. The picture information is broken down into a light/dark portion and a color portion. The light/dark portion needed for the visual impression is incorporated in the recording medium in a high-resolution form. The colored picture information is congruently superimposed on this portion so as to produce an integral ensemble. Protection from falsification is ensured by incorporating one of the portions of the picture information in the card structure in largely tamper-resistant fashion.
摘要:
The invention relates to a method and an apparatus for applying flat punched elements in the desired position to the surface of a carrier material, the elements being present in multiple copies on a sheet. The multiple copies are fed to an applying device and positioned therein. At the same time as individual elements are separated out or punched, these elements are fixed in position with respect to the carrier material.
摘要:
A process for manufacturing a carrier element is described that has one or more ICs to be incorporated into an identity card or credit card. The carrier element comprises a substrate having on its surface a plurality of contact areas which are connected via connector paths to corresponding terminals of the IC disposed on the substrate. The IC, including the connections to the conductor paths, is protected from mechanical stresses by a cured casting compound. In order to prevent the casting compound from flowing off uncontrollably during its application, an opening is provided in the heat-set adhesive layer applied to one side of the substrate, said opening holding back the liquid resin during its application and acting as a limiting frame. The opening in the adhesive layer is located at least where the IC is to be disposed.
摘要:
The invention relates to a method, an apparatus and sheets of materials for producing marked security threads as are used to increase the protection of documents and parers of value against forgery. The inventive method is for processing, in particular cutting, security threads out of sheets of material in register, the sheets of material being fed to the processing units in exact alignment. The feed principal is based on guiding the sheet of material on at least one edge of the sheet, determining the position relative to one of the edges of the sheet, producing a signal form the determination of position, and positioning the feeding device relative to the processing unit so that the sheet of material runs into the latter in a predetermined position.
摘要:
An identity card, e.g. a check card or credit card, usually has a field in which the card user writes has signature when the card is handed over. A weakness that manipulators of the cards could exploit up to now was that the signature field could be detached and replaced by an imitated signature field. To make such manipulation easily recognizable and thus impede forgery, the invention proposes making the security print (guilloche print), that covers the surroundings of the signature field anyway, extend without interruption across the signature field as well. Whereas it is already extremely difficult to imitate a signature field provided with such a security print, it is virtually impossible to dispose the security print in such a way that is passes continuously from the signature field into the surroundings of the signature field (FIG. 1).
摘要:
The invention relates to a method and apparatus for monitoring the destruction of thin sheet material, in particular bank notes, in an automatic sorting machine, whereby the sheet material is fed by a transport means successively sheet by sheet to a motor-driven cutting means having meshing cutter boards. The destruction process and/or its immediate result are detected by sensor means.
摘要:
An identity card is provided with a character set usable as a printing block, whereby the "natural foamability" that laser action brings about in the plastic materials commonly used for identity cards, such as PVC and polycarbonate, is exploited to obtain a relief height sufficient for a clear impression of the characters. The standard total height of the embossed characters relative to the rest of the card surface is reached by an additional deformation of the card body in the embossed character area so as to form flat underlying the characters.
摘要:
Information is provided in a multilayer identification card by means of a laser beam. This information is recorded by irreversibly changing (blackening) transparent synthetic material. Synthetic materials which blacked at different intensity values are used for the individual card layers. By controlling the laser beam intensity, information can thus be recorded only in one layer or else simultaneously in several layers. If the layer arrangement, layer materials and recording parameters (intensity, writing width, etc.) are selected appropriately, images can be produced which change their appearance when the viewing angle is changed. The various visual effects which can thereby be obtained serve to distinguish the authenticity of the identification card.
摘要:
In order to protect secret information in the electronic storage medium, the storage medium is provided in a housing protected against access. This housing contains one or more detector elements, via which erasure of the memory contents is initiated when unauthorized access is detected. The detector elements are connected with a clock unit which sets these elements into operation for short periods of time at certain time intervals. This clocked operation allows for the energy consumption of the overall arrangement to be reduced many times over without any essential restriction of security.