A method of generating a multiplexed image for printing that can be observed in a plurality of modes includes determining a finite shape of a multiplexed palette in a combined color space. The contrast of the multiplexed image in each mode can be optimized by determining a maximum volume hyperrectangle enclosed in the finite shape. Gamut mapping to this maximum volume hyperrectangle allows for generation of a multiplexed image that has a maximum contrast and is free from artifacts caused by an interdependency between the colors in each mode. Performing a dimensionality reduction using PCA allows for reducing the complexity of the optimization problem.
An identification document has an activatable security feature, the activatable security feature has a first antenna part and a second antenna part arranged such that a gap is formed between them. The security feature further has a patch connected to the first antenna part and the second antenna part such that it bridges the gap, the patch being formed of a material having conductive properties which are changeable from low-conductive to high-conductive such that a conductive path is provided between the first antenna part and the second antenna part after energy has been applied to the patch, such as by laser irradiation. The security feature further has an electrical device such as an RFID chip connected to the first antenna part and/or the second antenna part.
Various systems and methods for securely transacting over the Internet are described herein. The systems and methods receive, at a credential application executing on a mobile device, a disambiguation pay load based on an interaction with a web service. The systems and methods receive, by the credential application, information representing the web service. The systems and methods verify, by the credential application, that an identity of the web service matches the web service represented by the information. The systems and methods, in response to successfully verifying that the identity of the web service matches the web service represented by the information, connecting to the confirmed web service for providing one or more credentials from the credential application.
CENTRE NATIONAL DE LA RECHERCHE SCENTIFIQUE (France)
UNIVERSITÉ JEAN MONNET SAINT ETIENNE (France)
Inventor
Ayala, Stéphane
Destouches, Nathalie
Hèbert, Mathieu
Dalloz, Nicolas
Doan Le, Van
Abstract
A method of generating a reduced palette for use in a printing process is disclosed. In the method, a plurality of images obtainable by varying printing parameters of the printing apparatus are printed, and color values of the same are measured. Based on the color values, a clustering is performed to obtain a plurality of clusters having similar color values. For each cluster, one or more representative images are selected to form the palette. In this manner, images with color values both inside a convex hull and on the convex hull can be included in the palette.
Various systems and methods for securely and efficiently exchanging credentials are described herein. The systems and methods establish a communication channel between a mobile device and a reader. The systems and methods establish a communication channel between a mobile device and a reader. The systems and methods receive, via the communication channel at a credential application executing on the mobile device, a request for a document. The systems and methods transmit the document from the mobile device to the reader via the communication channel and after the document is transmitted from the mobile device to the reader, condition keeping the communication channel active by the mobile device or credential application based on information received from the reader.
A security document includes a security feature with a hologram and a color image arranged on top of each other. Holographic features of the hologram are visible when the security document is viewed under white light, and a plurality of image features of the color image are visible when the document is viewed under UV light. The image features are perfectly aligned with the holographic features. This can be achieved, for example, by providing one or more registration marks when forming the holographic features, and using said registration marks to later print the color image. Another possibility is to use the structure of the hologram to selectively apply two or more UV-sensitive ink materials onto the hologram to automatically align the same with the holographic features.
A personalizable security document (10) includes a security feature (3b) including a combination of a plurality of different features. In particular, the security feature (3b) may include a laser-engraved image in a first layer (16), and one or more fluorescent inks (7a, 7b) in further layers (27a, 27b), which are disposed below the first layer. Optionally, a watermark (8) may also be provided in a lower layer (18). A laser-engraving of the image is performed from a first side (S1) of the substrate (1) such that patterns formed by the inks (7a, 7b) are not affected. Under white light, the laser-engraved image can be viewed from the first side of the substrate, whereas multi-color fluorescence of the patterns can be observed from the second side (S2) under UV light.
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventor
Sharma, Nipun
Flores Figueroa, Manuel Alejandro
Destouches, Nathalie
Vocanson, Francis
Abstract
A personalizable security document (1) includes a laser- engravable film (2) formed on a layer (6) of the security document (1) as a functional layer, which can be irradiated with laser light of a specific wavelength to form a color image. The functional layer includes metallic nanoparticles (20) that can be excited with the laser light of a specific wavelength to promote a growth, reshaping, or reorganization of the nanoparticles, which results in a change in the color of the laser-engravable film (2) that can be observed, for example, in one or more observation modes. The laser-engravable film (2) is provided as a thin film in the nanometer range, which is very difficult to tamper with.
Disclosed herein are systems and methods for deterministic and handsfree engagement for data transfer of mobile identification and other data. In an embodiment, a computer system presents disambiguation data via a user interface, and also broadcasts one or more advertising packets containing the disambiguation data. The computer system establishes a wireless connection with a mobile device. This includes receiving, from the mobile device, at least one message that contains shared-secret data that is based on the disambiguation data. The computer system receives, from the mobile device via the established wireless connection, a mobile driver' s license (mDL) of a user of the mobile device.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
10.
IDENTIFICATION DOCUMENT DATA PAGE AND RELATED PRODUCTION METHOD
The invention relates to a multilayer structure intended to be inserted in an identification document and comprising at least one first layer at least partially opaque forming a data area, the first layer comprising at least one through opening integrally confined by at least partially opaque material of the first layer, and a second layer at least partially transparent extending at least partially on the data area in order to extend into the through opening, the second layer comprising a part extending beyond the first layer and forming an edge part, the second layer comprising at least one element forming a security element, the security element being present and/or visible on and/or in the edge part and in the through opening of the first layer.
A method of generating a personalized output image for a security document includes obtaining image information of a first image (16) formed on one side of a page of the security document (10), and a personalized input image showing a portrait of a holder of the security document (10). On the basis of the two images, a personalized output image (15) is calculated such that, when the personalized output image (15) and the first image (16) are viewed in transmission, the portrait of the holder of the security document appears. It is particularly advantageous to use a camouflage pattern, a broken-line pattern or a random pixel pattern as the first image (16) in order to obscure the portrait of the holder as much as possible.
Methods and systems are provided for performing operations comprising: capturing, by a client device, an image depicting an identity document, the identity document comprising biographical data and a portrait; generating a hash based on the biographical data; generating a biometric representation based on the portrait; accessing security information associated with the identity document; comparing the security information to at least one of the hash or biometric representation; and authenticating the identity document based on a result of comparing the security information to at least one of the hash or biometric representation.
A personalizable security document (10) includes a laser-engravable portion (5a) that exhibits a color-change effect when viewed under white light. This color-change effect is used to selectively mask a further security feature provided as a first pattern (27a) in a layer that is below the layer including the laser-engravable portion (5a). This is achieved by appropriately matching the color of the laser-engravable portion (5a) to the color of the first pattern (27a).
Techniques for providing more control to an issuer, e.g., governmental entity, and more particularly their backend team, which may provide citizens with a personalized virtualized experience. This may be achieved by the issuer provisioning adequate data, which is made available to a mobile App and/or verification devices. By using various techniques, the issuer may deliver such information using the same approach as for document data and even along with document data. The information may be packaged in a way that is no different from provisioning a document. In addition, because the document data is digitally signed by the issuer, it ensures authentic information for the user interface.
Techniques for using additive manufacturing for applying personalization or serialization information to a substrate are described herein. The techniques may include providing a base substrate formed from a first material such as polyvinyl chloride, polyester, or polycarbonate and applying, via an additive manufacturing process such as three-dimensional printing, a layer to at least a portion of the base substrate. The layer can include at least one of personalization or serialization information. The layer can be formed from the same material as the substrate or formed from a second material with substantially similar material properties as the substrate material.
B29C 64/112 - Processes of additive manufacturing using only liquids or viscous materials, e.g. depositing a continuous bead of viscous material using individual droplets, e.g. from jetting heads
Various systems and methods for securely sharing private information are described herein. A mobile device comprises instruction to configured the mobile device to identify a verifier device having an available wireless connection, the wireless connection having a wireless connection strength; determine that a triggering event occurs, the triggering event based on the wireless connection strength; when the triggering event occurs; connect to the verifier device; transmit a digital credential to the verifier device, each of a plurality of data elements of the digital credential separately encrypted using distinct encryption keys; receive a request to access a requested data element of the digital credential; prompt a user of the mobile device for consent to share the requested data element; and transmit information to the verifier device when the user consents sharing the requested data element, the information used to decrypt only the requested data element.
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventor
Ayala, Stéphane
Destouches, Nathalie
Hébert, Mathieu
Dalloz, Nicolas
Abstract
A method of generating a multiplexed image (18) for printing that can be observed in a plurality of modes includes determining a finite shape (22) of a multiplexed palette (10) in a combined color space. The contrast of the multiplexed image (18) in each mode can be optimized by determining a maximum volume hyperrectangle (20) enclosed in the finite shape (22). Gamut mapping to this maximum volume hyperrectangle (20) allows for generation of a multiplexed image (18) that has a maximum contrast and is free from artifacts caused by an interdependency between the colors in each mode. Performing a dimensionality reduction using PCA allows for reducing the complexity of the optimization problem.
The invention relates to a multilayer structure (2) intended to be inserted in an identification document and comprising: at least one first layer (4) at least partially opaque forming a data area (6), the first layer (4) comprising at least one through opening (8) integrally confined by at least partially opaque material of the first layer (4), and a second layer (10) at least partially transparent extending at least partially on the data area (6) in order to extend into the through opening (8), the second layer (10) comprising a part extending beyond the first layer (4) and forming an edge part (12), the second layer (10) comprising at least one element forming a security element, the security element being present and/or visible on and/or in the edge part (12) and in the through opening (8) of the first layer (4).
A personalizable security document (10) includes a security feature (3) embedded inside a body of said document (10). The security feature (3) includes a laser-sensitive material, which can be irradiated with laser light to form a color feature that is visible from one or both sides of the document (10). In order to achieve a high image quality, a protective material is provided over the laser-sensitive material. This prevents the pigments of the laser-sensitive material to come into direct contact with the material forming the document (10), such as polycarbonate. Instead, the activated pigments are transferred to the layer of protective material, which may ensure the desired image quality. The subtrate (3b) and/or the protective layer (3a) can be made of glass. The protective layer (3a) can be a titanium dioxide layer, a silica layer or a metallic layer.
Various systems and methods for securely transacting over the Internet are described herein. The systems and methods receive, at a credential application executing on a mobile device, a disambiguation payload based on an interaction with a web service. The systems and methods receive, by the credential application, information representing the web service. The systems and methods verify, by the credential application, that an identity of the web service matches the web service represented by the information. The systems and methods, in response to successfully verifying that the identity of the web service matches the web service represented by the information, connecting to the confirmed web service for providing one or more credentials from the credential application.
Disclosed is an ink comprising a transparent matrix being UV curable and heat scalable, and at least one pigment component. The ink in its UV-cured state has a peel strength in the range of about 6 to 8 N/cm, wherein this adhesiveness is achievable by means of a further lamination step under the influence of pressure and heat so that the ink acts as a hot glue. Further disclosed is a safety structure comprising a semitransparent layer being formed at least partially by the UV-cured ink, and a secure article comprising the safety structure. Further disclosed is a use of the ink for silkscreen printing.
C09D 11/101 - Inks specially adapted for printing processes involving curing by wave energy or particle radiation, e.g. with UV-curing following the printing
A personalizable security document (10) includes a security feature (3b) including a combination of a plurality of different features. In particular, the security feature (3b) may include a laser-engraved image in a first layer (16), and one or more fluorescent inks (7a, 7b) in further layers (27a, 27b), which are disposed below the first layer. Optionally, a watermark (8) may also be provided in a lower layer (18). A laser-engraving of the image is performed from a first side (SI) of the substrate (1) such that patterns formed by the inks (7 a, 7b) are not affected. Under white light, the laser-engraved image can be viewed from the first side of the substrate, whereas multi-color fluorescence of the patterns can be observed from the second side (S2) under UV light.
A method comprises transferring information that includes a response uniform resource locator (URL) between a primary device and a secondary device using a primary communication channel between the primary device and the secondary device; determining, using the secondary device, status of connectivity of a network separate from the primary communication channel; transmitting, by the secondary device, a response to a request from the primary device via the network using the response URL when the status indicates the network is available, and transmitting the response via the primary communication channel when the status indicates the network is unavailable.
H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
Various systems and methods for securely sharing private in formation are described herein. A mobile device comprises instruction to configured the mobile device to identify a verifier device having an available wireless connection, the wireless connection having a wireless connection strength; determine that a triggering event occurs, the triggering event based on the wireless connection strength; when the triggering event occurs: connect to the verifier device; transmit a digital credential to the verifier device, each of a plurality of data elements of the digital credential separately encrypted using distinct encryption keys; receive a request to access a requested data element of the digital credential; prompt a user of the mobile device for consent to share the requested data element; and transmit information to the verifier device when the user consents sharing the requested data element, the information used to decrypt only the requested data element.
A computing device implemented method of identity authentication comprises receiving a biometric token; performing a biometric capture of a user; converting the biometric capture into a biometric bitstream; recovering a predictable seed of data using the biometric bitstream and the biometric token; using the recovered predictable seed of data to produce challenge response data sent to a verifier device in response to a challenge message received from the verifier device; and verifying the challenge response data using identity data of the user.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A secure image for a security document is generated by performing a rasterization process for each of a plurality of mono-color base images using a plurality of different threshold functions. For each base image, the plurality of threshold functions cover different intensity regions and result in a complex rasterization pattern depending on the intensity of the input image. The resulting binary images obtained by the rasterization process are combined using offset printing with fluorescent inks of different colors, to result in a multi-color fluorescent output image including a plurality of different complex rasterization patterns.
Various systems and methods for using credentials are described herein. In an example, the system is configured to generate and issue electronic credentials that may include aggregate credentials from various issuers. In another example, a query statement is used to express relationships between credential data elements and obtain a subset of data corresponding to the query.
A laser engraving apparatus (100) is calibrated using a number of predetermined calibration images (12). The calibration images (12) are engraved on a predefined substrate surface (14, 15) of a substrate (16) by varying only a single laser parameter. Based on measured colour values of the engraved calibration images, a relationship between said colour values and a predefined laser parameter value, for example, a predefined laser power, is established. This relationship is then used to generate a map for mapping a grayscale value of an input image to a grayscale value of an output image, which is then engraved on the substrate (16) while varying the same laser parameter that was varied during the calibration.
Various systems and methods for managing identity credentials on a mobile device are described herein. A verifier device may perform operations including receiving one or more data elements associated with a credential, wherein the data elements are signed with a signature associated with an issuer of the data elements, analyzing the signature to determine a confidence score, the confidence score enumerated into a plurality of confidence levels, configuring a verification process based on the confidence score, and executing the verification process.
A method for identity verification. The method may include receiving an image of an identification document at an electronic device and identifying a first facial image therein. The first facial image may be an image resulting from a pattern of perforations formed in a substrate of the identification document. The method may further include receiving a presentation of a second image at the electronic device and identifying a second facial image therein. The first facial image and the second facial image may be compared by the electronic device, and an indicator of the confidence level that the first facial image and second facial image are of a same face may be provided.
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06V 30/413 - Classification of content, e.g. text, photographs or tables
31.
Secure identity document and methods of manufacturing the same
A security document is disclosed to include an image area provided on a front side of the document that includes image content, an information area provided on the front side that includes informational content, and a security feature including a pattern of perforations provided in an overlapping relationship with the image area and the information area so as to simultaneously bind and secure the image content with the informational content.
Providing virtualized credentials of a license holder includes determining contextual data that governs visual information presented on a display and displaying credential data on the display, where visual characteristics of the credential data that is displayed varies according to the contextual data. The display may be a display on a device of the license holder or a display on a device that is viewable by a relying party. The visual characteristics may be modified according to a location of at least some of the credential data on the display on the device of the license holder, a particular font used, a particular color used for text, a color scheme of an existing image and/or a specific image that is independent of the credential data. The visual characteristics may be modified according to the color scheme by changing a background color on the screen of the device of the license holder.
G06F 3/147 - Digital output to display device using display panels
G06T 11/60 - Editing figures and textCombining figures or text
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H04M 1/72403 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
33.
SYSTEM AND METHOD FOR ESTABLISHING SECURE SESSION WITH ONLINE DISAMBIGUATION DATA
Various systems and methods for securely sharing private information are described herein. A method of using disambiguation data to confirm the association with an online web service prior to engaging in a transaction, includes receiving, at an unresolved credential application executing on a mobile device, a disambiguation payload, wherein the disambiguation payload is purportedly associated with a web service, and wherein at least a portion of the disambiguation payload is signed with a cryptographic key associated with the web service; extracting a network location from the disambiguation payload; obtaining verification data from a resource at the network location to verify the web service; and validating the disambiguation payload using the verification data.
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
34.
System and method for identity creation and assertion
A system is disclosed that includes an identity server that is configured to build, manage, augment, and assert a user's identity. The identity server may also be configured to manage attestations for the user's identity.
The invention relates to a multilayer structure (2) intended to be inserted in an identification document and comprising:—at least one first layer (4) at least partially opaque forming a data area (6), the first layer (4) comprising at least one through opening (8) integrally confined by at least partially opaque material of the first layer (4), and—a second layer (10) at least partially transparent extending at least partially on the data area (6) in order to extend into the through opening (8), the second layer (10) comprising a part extending beyond the first layer (4) and forming an edge part (12), the second layer (10) comprising at least one element forming a security element, the security element being present and/or visible on and/or in the edge part (12) and in the through opening (8) of the first layer (4).
A credential with one or more security features is disclosed. The disclosed credential includes a windowed security feature. The windowed security feature is taught to include a mirror element positioned in proximity with a transparent window and a first photo-luminescent feature positioned relative to the transparent window and the mirror element such that the mirror element enhances a luminescence of the first photo-luminescent feature when viewed and illuminated through the transparent window.
Providing virtualized credentials of a license holder includes determining contextual data that governs visual information presented on a display and displaying credential data on the display, where visual characteristics of the credential data that is displayed varies according to the contextual data. The display may be a display on a device of the license holder or a display on a device that is viewable by a relying party. The visual characteristics may be modified according to a location of at least some of the credential data on the display on the device of the license holder, a particular font used, a particular color used for text, a color scheme of an existing image and/or a specific image that is independent of the credential data. The visual characteristics may be modified according to the color scheme by changing a background color on the screen of the device of the license holder.
G06F 3/147 - Digital output to display device using display panels
G06T 11/60 - Editing figures and textCombining figures or text
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
H04M 1/72403 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
The present disclosure refers to a method for manufacturing a secured window in an identification card. The method comprising embedding information in a transparent window of the identification card and covering the embedded information with a thermochromic layer on a first side of the transparent window. The thermochromic layer is configured to become substantially transparent when subjected to a level of heat greater than a determined threshold value. In addition the method comprises the step of covering a second side of the transparent window, opposite to the first side, with a further thermochromic layer, the further thermographic layer being configured to become substantially transparent when subjected to a level of heat greater than the determined threshold value, such that the embedded information becomes visible through the transparent window when both sides of the window are exposed to the level of heat greater than the determined threshold value.
Printing, engraving, etching, or embossing techniques and security documents produced therefrom that can help inhibit or prevent tampering or forgery, particularly forgery or tampering of security document blanks or blank security documents. For example, for at least one character of a given alphabet used for the text in the security document, the character may include one or more slight variations or differences between instances of such character based on, for example, human selection, a predefined pattern, an automated selection algorithm or formula, or random or semi-random selection. In order to duplicate the security document blank, a forger would need to painstakingly review and copy each individual character including the slight variation or difference provided with that instance of the character.
A security system includes a first security badge having a visual portion that varies according to signals provided to the first security badge and an authorization server that periodically provides signals to the first security badge in response to a query of the authorization server by the first security badge while the first security badge remains in a controlled zone, the signals varying independently of reader access of the first security badge. The first security badge may be read by a reader only in connection with initial entry into the controlled zone. Authorization of a user of the first security badge may vary while the user remains in the controlled zone. The first security badge may include a visual image of a user of the first security badge and displays additional information. The additional information may include name and authorization status of the user.
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
UNIVERSITÉ JEAN MONNET SAINT ETIENNE (France)
Inventor
Vangheluwe, Marie
Vermeulin, Alice
Destouches, Nathalie
Hébert, Mathieu
Abstract
A method for building a security image for a security structure of a security document from multiplexing color images, including selecting a marking method capable of producing sets of colors on the security document comprising different colors that can be displayed according to illumination/observation modes of the security structure, establishing a plurality of color sets that can be displayed by the security structure in a plurality of the different illumination/observation modes, distributing the color sets in a plurality of groups of color sets, establishing combinations of groups of color sets having at least one color set in common across the number of different illumination/observation modes, selecting a combination of a group of color sets based on the number of desired illumination/observation modes and the number of colors per color image, and determining the color images to multiplex by means of the combination of the group of color sets selected.
A secure multilayer structure, in particular for a secure document, including a base layer, at least one masking layer including a window opened in the masking layer, the window having an edge, a security element including a photoluminescent agent positioned between the base layer and the masking layer, adjacent to the window edge, such that the presence of the agent can be checked by illuminating the edge of the window and viewing the re-radiated luminescent light emerging from the masking layer through the window edge.
B32B 27/06 - Layered products essentially comprising synthetic resin as the main or only constituent of a layer next to another layer of a specific substance
Various systems and methods for managing identity credentials on a mobile device are described herein. A verifier device may perform operations including receiving one or more data elements associated with a credential, wherein the data elements are signed with a signature associated with an issuer of the data elements, analyzing the signature to determine a confidence score, the confidence score enumerated into a plurality of confidence levels, configuring a verification process based on the confidence score, and executing the verification process.
Various systems and methods for managing identity credentials on a mobile device are described herein. A verifier device may perform operations including receiving one or more data elements associated with a credential, wherein the data elements are signed with a signature associated with an issuer of the data elements, analyzing the signature to determine a confidence score, the confidence score enumerated into a plurality of confidence levels, configuring a verification process based on the confidence score, and executing the verification process.
A credential with one or more security features is disclosed. The disclosed credential includes a windowed security feature. The windowed security feature is taught to include a mirror element positioned in proximity with a transparent window and a first photo-luminescent feature positioned relative to the transparent window and the mirror element such that the mirror element enhances a luminescence of the first photo-luminescent feature when viewed and illuminated through the transparent window.
The method comprises a pre-lamination step wherein a layer is placed in contact at least on one side with a lamination plate having a recess and the layer undergoes lamination such that a raised portion is formed on the layer; an assembling step wherein another layer is placed in contact with the layer, and the raised portion of the layer is at least partially placed in an opening of the other layer and a lamination step wherein said layers are laminated together.
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
G06K 1/12 - Methods or arrangements for marking the record carrier in digital fashion otherwise than by punching
B32B 37/02 - Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by a sequence of laminating steps, e.g. by adding new layers at consecutive laminating stations
B32B 37/18 - Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the properties of the layers with all layers existing as coherent layers before laminating involving the assembly of discrete sheets or panels only
The present disclosure refers to a method for manufacturing a secured window in an identification card. The method comprising embedding information in a transparent window of the identification card and covering the embedded information with a thermochromic layer on a first side of the transparent window. The thermochromic layer is configured to become substantially transparent when subjected to a level of heat greater than a determined threshold value. In addition the method comprises the step of covering a second side of the transparent window, opposite to the first side, with a further thermochromic layer, the further thermographic layer being configured to become substantially transparent when subjected to a level of heat greater than the determined threshold value, such that the embedded information becomes visible through the transparent window when both sides of the window are exposed to the level of heat greater than the determined threshold value.
The invention relates to a multilayer structure (2) intended to be inserted in an identification document and comprising: - at least one first layer (4) at least partially opaque forming a data area (6), the first layer (4) comprising at least one through opening (8) integrally confined by at least partially opaque material of the first layer (4), and - a second layer (10) at least partially transparent extending at least partially on the data area (6) in order to extend into the through opening (8), the second layer (10) comprising a part extending beyond the first layer (4) and forming an edge part (12), the second layer (10) comprising at least one element forming a security element, the security element being present and/or visible on and/or in the edge part (12) and in the through opening (8) of the first layer (4).
Maintaining a plurality of different sets of data groups for virtualized credentials of a holder includes storing a first subset of the data groups according to a standard for storing data groups, where the standard verifies each data group in the first subset of data groups, storing a second subset of the data groups as a plurality of auxiliary data elements that are separate from the first subset, where auxiliary data elements are not directly accessible using the standard, providing at least one custom data group in the first subset that verifies each of the auxiliary data elements, and verifying at least one of the auxiliary data elements using the custom data group and verifying the custom data group using the standard. The standard may be ISO 18013. The digital signature may be provided by a party that is trusted by a relying party that receives data from the holder.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Providing virtualized credential information includes determining whether a relying party device has access to a network/cloud infrastructure that contains at least some of the credential information, a license holder device providing the virtualized credential information directly to the relying party device in response to the relying party device not having access to the network/cloud infrastructure, and displaying at least some of the subset of credential data on a screen of the device of the relying party. Providing virtualized credential information may also include the license holder device providing authorization data to the relying party device in response to the relying party device having access to the network/cloud infrastructure and determining a preference for the relying party device to receive at least some of the virtualized credential information from the network/cloud infrastructure.
Maintaining information for a traveler includes creating a virtual travel credential containing information from a physical passport of the traveler and/or physical travel document(s) of the traveler, storing at least a portion of the virtual travel credential in a mobile device carried by the traveler, monitoring a location of the mobile device, and providing a signal in response to the mobile device transitioning from a first country/territory to a second country/territory. Monitoring the location of the mobile device may include detecting a cellular network in communication with the mobile device or using GPS functionality of the mobile device or receiving information that the traveler boarded a plane headed for the second country/territory. At least a portion of the virtual travel credential may be stored in a virtual travel credential server. The virtual travel credential server may communicate with the mobile device using a cellular network.
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventor
Vangheluwe, Marie
Vermeulin, Alice
Destouches, Nathalie
Hébert, Mathieu
Abstract
HID Global CID SAS, Université Jean Monnet Saint Etienne and Centre National de la Recherche Scientifique. The invention relates to a method for building at least one security image for a security structure of a security document from the multiplexing of color images (62, 64, 66, 68, 70), the method comprising the following steps: • selecting a marking method capable of producing sets of colors on the security document comprising different colors that can be displayed according to the modes of illumination and observation of the security structure, then, for example by means of a calculator, • establishing several sets of colors by physical measurement that can be displayed by the security structure in different illumination and observation modes. • distributing sets of colors comprising the different colors produced by the marking technique, in several groups of color sets, said different colors being measured, • establishing combinations of groups of color sets having at least one color set in common according to the number of different illumination and observation modes and the number of colors per image, • selecting (12) a combination of a group of color sets according to the number of desired illumination and observation modes and the number of colors per image, and • determining the images to multiplex by means of the combination of the group of color sets selected.
Printing or engraving or other techniques and resulting security documents can help inhibit or prevent tampering or forgery, such as by providing a strikethrough path through characters in a word. A characteristic of the strikethrough path can depend upon a characteristic of the word. For example, the strikethrough path can alternatingly ascend and descend through successive words in a sequence, such that the location of the strikethrough path within a particular character depends on that particular character, upon a location of the character within the word, or both. The strikethrough path can be constructed such that if characters are copied or excised and re-arranged, such re-arrangement is evident by misalignment of one or more portions of the strikethrough path that would otherwise be aligned in the original document.
A security document includes a first ink layer and a second ink layer. The first ink layer includes a first color in a first color zone and a second color in a second color zone offset from the first color zone in a first direction, and a first blended color including a mixture of the first and second colors in a first blended color zone between the first color zone and the second color zone. The second ink layer includes a third color in a third color zone and a fourth color in a fourth color zone offset from the third color zone in a second direction, and a second blended color including a mixture of the third and fourth colors in a second blended color zone between the third color zone and the fourth color zone. The first direction is different than the second direction.
A security feature, a document including a security feature, and a method of producing a document are provided. In one example a security document is disclosed to include a substrate having a micro-replicated lacquer applied to a first side of the substrate and a metal complex ink applied to the first side of the substrate thereby covering the micro-replicated lacquer applied to the first side of the substrate.
C09D 11/037 - Printing inks characterised by features other than the chemical nature of the binder characterised by the pigment
C09D 11/101 - Inks specially adapted for printing processes involving curing by wave energy or particle radiation, e.g. with UV-curing following the printing
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for storing, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices Providing temporary use of non-downloadable software for provisioning, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices; Software as a service, featuring software for over the air provisioning, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices
A security document with unidirectional visual illumination is disclosed. A security feature is positioned within the document and not visible in normal ambient lighting conditions but becomes visible under specialized lighting conditions, for example in the presence of ultraviolet light. The security feature is constructible such that it is visible only from a single side of the security document, with the side being predeterminable regardless of the orientation of the specialized light.
B42D 25/455 - Associating two or more layers using heat
B42D 25/46 - Associating two or more layers using pressure
B32B 27/08 - Layered products essentially comprising synthetic resin as the main or only constituent of a layer next to another layer of a specific substance of synthetic resin of a different kind
B44F 1/06 - Designs or pictures characterised by special or unusual light effects produced by transmitted light, e.g. transparencies, imitations of glass-paintings
B32B 3/26 - Layered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a particular shape of the outline of the cross-section of a continuous layerLayered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a layer with cavities or internal voids
B32B 7/02 - Physical, chemical or physicochemical properties
B32B 5/14 - Layered products characterised by the non-homogeneity or physical structure of a layer characterised by a layer differing constitutionally or physically in different parts, e.g. denser near its faces
B32B 37/06 - Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the heating method
B32B 37/10 - Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the pressing technique, e.g. using direct action of vacuum or fluid pressure
B42D 13/00 - Loose leaves modified for bindingInserts
A credential with one or more security features is disclosed. The disclosed credential includes a windowed security feature. The windowed security feature is taught to include a mirror element positioned in proximity with a transparent window and a first photo-luminescent feature positioned relative to the transparent window and the mirror element such that the mirror element enhances a luminescence of the first photo-luminescent feature when viewed and illuminated through the transparent window.
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
Goods & Services
Chips (integrated circuits); magnetic cards, smart cards
and electronic identity cards. Paper and cardboard (unprocessed, semi-processed or for
stationery or printing); secure cardboard or paper for the
manufacture of security documents, fiduciary documents and
identity documents, diplomas or official titles, access
cards or access tickets in order to enable identification,
authentication and traceability of such documents; security
paper for the integration of an electronic chip and intended
for the security of identity documents in particular;
watermarked security paper; plastic films and sheets,
printable or not, for laminating (protecting) documents;
plastic film strips, printable or not, for the production of
fiduciary documents, secure or identity documents; plastic
films and sheets for the integration of an electronic chip
so as to secure them.
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
Goods & Services
Chips, namely, computer chips, multiprocessor chips, semiconductor chips; magnetic coded cards for use as electronic tickets, smart cards, namely, blank smart cards, and electronic encoded identity cards and electronic magnetic identity cards Paper and cardboard; secure cardboard or paper in the nature of inlays for the manufacture of security documents, fiduciary documents and identity documents, diplomas or official titles, access cards or access tickets in order to enable identification, authentication and traceability of such documents; security paper namely paper containing security features for the integration of an electronic chip and intended for the security of identity documents in particular; watermarked paper containing security features; plastic film strips, printable or not, namely plastic sheets for writing, printing and marking for the production of fiduciary documents, secure or identity documents; plastic films and sheets for the integration of an electronic chip so as to secure them, namely, inlays of cardboard or paper for documents and cards
61.
Online peer-to-peer communication for accelerated data transmission
A method and system for facilitating machine-to-machine communications at an improved communication rate is provided. An illustrative system is disclosed to include a transmitting device, a requesting device, and a communication server that helps facilitate an online exchange of data between the transmitting device and requesting device by using information exchanged directly between the transmitting device and receiving device.
H04J 3/16 - Time-division multiplex systems in which the time allocation to individual channels within a transmission cycle is variable, e.g. to accommodate varying complexity of signals, to vary number of channels transmitted
H04W 76/11 - Allocation or use of connection identifiers
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 92/18 - Interfaces between hierarchically similar devices between terminal devices
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
62.
PROCESS FOR MANUFACTURING A NON-OPAQUE LAYER FOR A MULTILAYER STRUCTURE COMPRISING A WINDOW, AND A MULTILAYER WITH SUCH A NON-OPAQUE LAYER
For manufacturing a multilayer structure (28) with a clear window (30), a layer (12) of non-opaque plastic material is provided. This non-opaque layer (12) has a region (15) with an extra-thickness formed by embossing. The non-opaque layer (12) is covered with at least one compensation layer (22) having a window (25), with the region (15) with an extra-thickness in coincidence with the window (25). Other layers (24) are possibly laminated with the non-opaque layer (12) and the compensation layer (22).
B32B 7/00 - Layered products characterised by the relation between layers Layered products characterised by the relative orientation of features between layers, or by the relative values of a measurable parameter between layers, i.e. products comprising layers having different physical, chemical or physicochemical properties Layered products characterised by the interconnection of layers
B32B 7/02 - Physical, chemical or physicochemical properties
B32B 7/10 - Interconnection of layers at least one layer having inter-reactive properties
B32B 15/00 - Layered products essentially comprising metal
B32B 15/04 - Layered products essentially comprising metal comprising metal as the main or only constituent of a layer, next to another layer of a specific substance
B32B 27/06 - Layered products essentially comprising synthetic resin as the main or only constituent of a layer next to another layer of a specific substance
B32B 27/08 - Layered products essentially comprising synthetic resin as the main or only constituent of a layer next to another layer of a specific substance of synthetic resin of a different kind
B32B 27/28 - Layered products essentially comprising synthetic resin comprising copolymers of synthetic resins not wholly covered by any one of the following subgroups
B32B 3/00 - Layered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form
B32B 3/02 - Layered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by features of form at particular places, e.g. in edge regions
B32B 3/18 - Layered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a discontinuous layer, i.e. apertured or formed of separate pieces of material characterised by an internal layer formed of separate pieces of material
B32B 3/26 - Layered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a particular shape of the outline of the cross-section of a continuous layerLayered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a layer with cavities or internal voids
B32B 3/30 - Layered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a particular shape of the outline of the cross-section of a continuous layerLayered products comprising a layer with external or internal discontinuities or unevennesses, or a layer of non-planar shapeLayered products comprising a layer having particular features of form characterised by a layer with cavities or internal voids characterised by a layer formed with recesses or projections, e.g. grooved, ribbed
B42D 15/00 - Printed matter of special format or style not otherwise provided for
B42D 25/00 - Information-bearing cards or sheet-like structures characterised by identification or security featuresManufacture thereof
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Providing temporary use of non-downloadable software for
provisioning, managing and authenticating digital government
identity credentials carried on smart phones, tablets and
other wireless mobile devices; software as a service,
featuring software for over the air provisioning, managing
and authenticating digital government identity credentials
carried on smart phones, tablets and other wireless mobile
devices; provisioning of authentication for others digital
government identity credentials carried on smart phones,
tablets and other wireless mobile. Identification verification services, namely, providing
management and authentication of digital government identity
credentials carried on smart phones, tablets and other
wireless mobile devices.
Providing virtualized credentials of a holder includes authorizing a subset of credential data to be sent to a device of a relying party that is different from the holder, where the subset of credential data depends on a role of the relying party, selection by the holder, and/or contextual data of the relying party and includes displaying the subset of credential data on a screen of the device of the relying party. The contextual data may be a privacy level setting, distance between the relying party and the holder, and/or geolocation of the relying party. The role of the relying party may be provided by the relying party. Role information provided by the relying party may be provided in a verifiable format. The role information may be digitally signed or securely derived and determined by a mutual authentication algorithm between the relying party and the holder.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable software for storing, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices. Providing temporary use of non-downloadable software for provisioning, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices; software as a service, namely software for over the air provisioning, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices; provisioning of authentication for others digital government identity credentials carried on smart phones, tablets and other wireless mobile devices. Identification verification services, namely, providing, management and authentication of digital government identity credentials carried on smart phones, tablets and other wireless mobile devices.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable software for storing, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices Providing temporary use of non-downloadable software for provisioning, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices; Software as a service, featuring software for over the air provisioning, managing and authenticating digital government identity credentials carried on smart phones, tablets and other wireless mobile devices Identification verification services, namely, providing, management and authentication of digital government identity credentials carried on smart phones, tablets and other wireless mobile devices
A laminate structure along with one or more security features is disclosed. The laminate structure may correspond to an identification document, such as an identification card, and may include a core layer with one or more security elements established thereon. As light is emitted into the core layer, the light impacts one or more of the security elements and is re-radiated back out of the core layer, thereby providing an indication that the laminate structure includes the security elements and is, therefore, authentic.
B32B 37/18 - Methods or apparatus for laminating, e.g. by curing or by ultrasonic bonding characterised by the properties of the layers with all layers existing as coherent layers before laminating involving the assembly of discrete sheets or panels only
B32B 38/00 - Ancillary operations in connection with laminating processes
09 - Scientific and electric apparatus and instruments
16 - Paper, cardboard and goods made from these materials
Goods & Services
Integrated-circuit chips; Magnetic cards, Cards with micro-processors and Electronic identification cards. Paper and cardboard (untreated, semi-finished or for stationery or printing); Security paper or cardboard for producing security documents, fiduciary documents and identity documents, diplomas or formal qualifications, access cards or tickets to enable the identification, authentication and traceability of said documents; Safety paper enabling the incorporation of an electronic chip and intended for security purposes, in particular for identity documents; Watermarked security paper; Plastic films and foils, whether printable or not, for laminating (protecting) documents; Strips of plastic film, whether printable or not, for producing fiduciary documents, security documents or identity documents; Plastic films and foils enabling the incorporation of an electronic chip for security purposes.
69.
E-document comprising an electromagnetic interference element
A laminated structure for an E-document, comprising a first support layer defining at least two flat flaps connected by at least one fold line, the first flap supporting an antenna and a microcircuit device enabling contactless data exchange, the second flap supporting an electromagnetic interference element arranged in relation to the microcircuit device so as to be able to oppose contactless reading and/or writing of the microcircuit device in at least one folded configuration of the structure, the structure having at least one heat-activated or pressure-sensitive adhesive layer making it possible to receive the microcircuit device and/or the antenna and/or the electromagnetic interference element at least in part in its thickness, and/or the flaps having at least one layer of an adhesive and/or a fibrous layer and/or a polymer layer having a different thickness for each of the flaps.
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory
An assembly includes a wire antenna including at least on conductive turn, a first fibrous substrate on which the antenna extend. The first substrate comprises at least one coated paper including a fibrous base containing at least 30 mass % of natural fibers in the fibrous mass. The antenna is connected to a face of the flexible substrate. The paper includes on that face at least one surface layer containing at least one mineral load and a coating binder. The fibrous base may contain at least 40 mass %, preferably 50 mass %, more preferably 60 mass % and ideally at least 70 mass % of natural fibers, with preferably a lower proportion of long natural fibers relative to short ones when the fibrous mass includes synthetic fibers, in particular between 5 and 25% of synthetic fibers.
16 - Paper, cardboard and goods made from these materials
Goods & Services
Paper and cardboard (untreated, semi-finished or for stationery or printing); safety paper; safety paper to prevent attempts at falsification; safety paper enabling the incorporation of an electronic chip and intended for security purposes, in particular for identity documents.