The present invention relates to a document provided with a device for securing confidential information mentioned in the document and a method for implementing this security device.
Here, a document is used to communicate, to at least a given recipient, confidential information in the form of an alphanumeric code, for example. Alternatively, the information is not encoded but written in a language understood by only the recipient(s). This type of document finds application in the fields of banking, insurance, telecommunications, healthcare, gaming and more generally in any field where restricted information circulates, i.e. intended for a limited number of identified persons.
The confidentiality of the information should be maintained when the document circulates between the sender and recipient while allowing the latter rapid access to the information. For this, it is known to conceal the information mentioned on a document by a mask, the recipient removing the mask, by scraping for example, in order to gain access to the information. However, it turns out that not only is it possible, under certain lighting, to read the information through the mask, but also that scraping off the mask can damage or even destroy the information mentioned on the document. In addition, once the masking has been scratched away and the information read, it is possible to place a mask back on the information, making it appear as though it had never been read.
It is helpful to ensure that the information can only be read for the first time by the defined recipient(s). It is therefore helpful to check that, before the recipient reads the information, no one has had access to the information, despite the presence of the information security device. For this, WO-A-2007144486 describes a document provided with a window cut out in the document. Two protective elements are secured to the two faces of the document, at the window. The information is printed on one face of an element intended to be in contact with a face of the other element. Thus, the information is positioned in the window, with the two elements protecting the information on each face of the document. A third masking element is removably mounted on one face of the document so as to hide the information that is located in the window and mentioned between the two elements. The various elements are formed by labels. The masking element is larger than the window, thereby covering it completely. Two overhanging parts of the masking element are permanently secured to the precut areas of the document. These precut zones are located along two parallel sides of the window. When the masking element is removed, owing to a gripping tab provided on an edge of the masking element, the precut areas are ripped at the same time the information is accessed, as a result of the masking element being secured to these areas.
That said, the invention aims to propose another document provided with a security device overcoming the drawbacks of the prior art mentioned above, particularly by improving the efficiency of the security device.
To this end, the invention relates to a document provided with a device for securing confidential information mentioned in the document, the latter comprising:
The invention thus enables the previously mentioned objectives to be attained.
As the entire periphery of the masking element is integral with the document, it is no longer possible to raise a portion thereof to access the information. The latter is located on an element always positioned in the window, on the face of the document although independent of the masking element which is positioned on the other face of the document. The second label positioned in the window allows the information to the read when the masking element is removed, while avoiding degradation of the label supporting the information when the masking element is removed. Such a configuration further facilitates the implementation steps of the invention while optimizing the total thickness of the security device on the document by distributing the number of constituent elements of the device on the two faces of the document.
According to advantageous but non-mandatory aspects of the invention, such a document may include one or more of the following characteristics:
The invention also relates to a method for implementing a document equipped with a device for securing confidential information according to one of the preceding features, characterized in that it comprises at least the following steps:
According to advantageous but non-mandatory aspects of the invention, such a method may include one or more of the following steps:
The invention will be better understood and other advantages thereof will become more apparent upon reading the following description of an embodiment of the invention that will follow, given solely as a non-limiting example and with reference to the accompanying drawings, wherein:
The document 1 illustrated in the various figures is a sheet of paper. Such a document may also be made of another material, for example a polymer-based material or a vegetable-fiber based material such as linen or cotton. In all cases, the document 1 is adapted to include at least information 2 that is confidential in nature, i.e. intended for one person or a predefined number of persons. It is easy to see that non-confidential information can also be present on the document 1. In all cases, the information 2 is applied to the document 1 by techniques known per se, advantageously by printing. For this purpose, the dimensions of the document 1 are standardized to allow for the use of printing machines commonly encountered in the printing industry. In particular, the dimensions of the document generally correspond to the A4 format, i.e. 21 cm×29.7 cm. It is easy to see that the document may have all dimensions commonly used in office automation, printing and/or copying.
Here, the confidential information 2 that is mentioned in the document 1 is an alphanumeric code. Alternatively, it may be a color code, text or other type of confidential information, such as a barcode or a flashcode. Such information is often intended to allow a given device or product to be used, such as a bank card or a telephone. Alternatively, such information gives access to a given location or predefined data, such as a database. In all cases, this confidential information is secured by a device described with reference to
When the document 1 includes information in a so-called confidential configuration 2, i.e. when the latter has not been read by at least one authorized person, it appears as shown in
The masking label 3 is provided, on one side 5, with a tab 6 forming a gripping member enabling the user to remove the label 3. In a non-illustrated variant, the tab is located on the side opposite the side 5. Advantageously, the tab 6 is equipped with a sign, arrows 7 in this case, indicating the direction toward which one must pull in order to remove the label 3. The tab 6 is free to move relative to the document 1 while masking label 3 is secured to the document 1 and, in the configuration of
For this, the masking label 3 is secured to the document 1 by strong, non-repositionable adhesive. The masking label 3 is secured around the periphery of a window 8 cut out in the document 1, in the area where the document defines the edges of the window 8. The respective dimensions of the window 8 and masking label 3 are such that the masking label 3 completely covers the window 8 when the masking label 3 is positioned on the window 8. To achieve this, the sides 5, 50, 51, 52 of the masking label 3 overlap onto the document 1 along all the edges 80, 81, 82, 83 of the window 8. In other words, the label 3 is larger than the window 8, so that all the edges 5, 50, 51, 52 of the masking label 3 are located on the document 1 when masking label 3 covers the window 8. As illustrated in
The window 8 arranged in the document 1 is particularly visible in
As shown in
Furthermore, if the areas of structural weakness 11, 12 are, as in the example, preferably made by discontinuous pre-cutting or punching of the document, it is possible to produce them according to another technique, also known per se. For example, they are obtained by a smaller thickness of the constituent material of the document and/or by a material of a different nature than that of the document. In a variant not represented, the areas of structural weakness have a geometric shape other than rectangular, such as triangular for example.
As shown in
As a result, any attempt to dissociate, even partially, the masking label 3 of document 1 to access the confidential information 2 is detected owing to the tearing, or at least degradation of the constituent material of the document 1 around the window 8 in which the information 2 is located. It is easy to understand that it is possible, in order to optimize the bond between the masking label 3 and the areas of structural weakness 11, 12, that the dimensions of the bonding areas of the masking label 3 of the document are variable according to the sides 5, 50, 51, 52 of the label 3. In particular, the bonding areas formed by the strips 9, 10 are larger in the areas of structural weakness 11, 12, than at the other edges of the window 8, in order to ensure complete overlapping of the areas of structural weakness 11, 12.
As can be more clearly seen in
This label 16 is made of an advantageously matte, transparent material. This material is, for example, polyester. When the information 2 is mentioned, for example by printing, on the face 15 of the first label 16, the information is positioned so that, when the first label 16 is in place, the information 2 is located in the window 8.
The dimensions and shape of the label 16 are adapted to be secured, in a definitive manner, by its face 17 opposite the face 15, to a face 18 of the document 1. In the example, the rectangular label 16 has a length of 48 mm and a width of 23 mm. The label 16 is secured, by means of a strong, non-repositionable adhesive, so that it cannot be separated from the document 1. The label 16 is bonded so that it completely covers the window 8, overlapping onto the document 1, along the periphery of the window 8 but without covering the areas of structural weakness 11, 12. Thus, the label 16 is bonded to the document 1 in the parts 13, 14 of the document 1 located between the edges 81, 83 and areas of structural weakness 11, 12, respectively.
The width of the part of the label 16 overlapping onto the face 18 of the document 1, thus de facto the width of the fastening strip of the label 16 on the document 1, is sufficient to ensure permanent attachment of the label 16 on the document, without disturbing the operation of the security device, while ensuring that the information 2 can be read through window 8. Typically, the width of such a fastening strip, continuous over the entire periphery of the label 16, is between 48 mm and 23 mm depending on the dimensions of the areas of structural weakness 11, 12.
A second label 19, also transparent, is secured from the face 20 of the document 1 opposite the face 18. This second label 19 may be made of the same material as the first label 16. Advantageously, it is made of a transparent and glossy material, for example polyethylene terephthalate or PET. The shape and dimensions of the label 19 are such that it is positioned in the window 8 without exceeding it. In the example, the rectangular label 19 measures 34 mm long and 14 mm wide. Thus, the label 19 is set back from the window 8 by 1 mm in width and in length in this embodiment.
The face 21 of the label 19 which is opposite the face 17 of the first label 16 ensures the bonding of the two labels 16 and 19. This bonding is permanent by techniques known per se, for example by means of a strong, non-repositionable adhesive and will not alter the light transmission, to allow the information 2 to be read.
In all cases, the information 2 is legible in the window 8, through the two labels 16, 19 when the masking label 3 is removed. The second label 19 prevents all direct contact between the first label 16 and the masking label 3 therefore, de facto, prevents all damage to the first label 16 and thus the information 2, when the masking label 3 is removed.
As can be more clearly seen in
This produces a document 1 wherein the confidential information 2 is mentioned on an information support element 16, 19, located in a window 8 cut out in the document 1. The information is masked by a masking element 3, positioned directly above information 2, in the window 8, from the face 20 of the document 1 opposite the face 18 on which the information support element 16 is maintained.
The document 1 thus forms a separation between the information support element 16, 19 and the information masking element 3, in both the active configuration of the securing device, i.e. masking of the information, and in the inactive configuration, namely when one is able to access and read the information when the masking label 3 has been removed.
The window 8 defines a passage between the masking element 3 and information support element 16, 19. Such a configuration between the information masking device, the document and the information support element makes it possible to optimize the security of the information. Access to the information is independent of the document as such and without direct contact between the information and the masking element, by the presence of the label 19.
Furthermore, as can particularly be seen in
As can be seen in
Here, the concealment of the information 2 and its reading are achieved by passing light through an area of the document, the window 8, devoid of material. Information security 2 is optimal as nothing interferes, deflects or blocks the passage of light through the various masking labels 3 or information support 16, 19. With such a configuration, when the device is active it is not possible to distinguish the masking patterns 4 from the patterns forming the information.
The device of the invention uses the passage of light through transparent materials to support and conceal the confidential information 2.
Here, the document 1 is used as a neutral and separate support of the information and the masking device, which allows any constituent material of the document to be used. In other words, the constituent material of the document and its shape and/or dimensions are not directly involved in masking the information. The information is masked by the presence of masking patterns 4, the passage of light through the various labels and the window and the printing of a background.
The implementation of such a device on a document is now described in reference to
In a next step, positioning, all appropriate means and known per se are used to position the first label 16 from the face 18 of the document 1, on the window 8. During this step, a strong and non-repositionable adhesive is used to bond the face 17 of the label 16 on the areas 13, 14 of the document 1 located between the edges 81, 83 of window 8 and the areas of structural weakness 11, 12, taking care not to bond in the areas of structural weakness 13, 14.
After this step, the face 18 of the document 1 is equipped with a part of the information support element, namely the first label 16. This label is visible through the window 8 from the other face 21 of the document 1. The part of the label 16 on which the information 2 will be printed is thus positioned on the window 8.
The document 1 is then turned over in the direction of the arrow F so that the visible face of the document 1, in
Beforehand, advantageously, before the masking label 3 is put into place, the second label 19 was removably mounted to the label 3. To do this, the second label 19 is secured by its face 23 to the face 22 of the masking label 3. During this operation, the position of the label 19 on the label 3 is chosen so that, once the assembly is in position on the document 1, the label 19 occupies the entire face of the window 8 without overlapping on the latter. For increased readability, in
It is easy to see that in other embodiments, second label 19 and the masking element 3 are positioned successively. In other words, in this case, the labels 19 and 3 are not pre-assembled. During this step, it is ensured that the entire window 8 is masked and that the two areas of structural weakness 11, 12 are fully covered by the two lateral strips 9, 10 of the masking label 3. The masking label 3 is definitively secured by strong, non-repositionable adhesive on the document 1, adjacent to the circumference 80 to 83 of the window 8 and the areas of structural weakness 11, 12. Only the gripping member, thus the tab 6, is not secured to the document 1, as it is devoid of adhesive.
Advantageously, the adhesive used is similar to that used to bond the first label 16 to the other face 18 of the document 1. Alternatively, the adhesives are different.
Preferably, in the contact area between the two labels 3 and 19, i.e. at the window 8, the adhesive is weak and repositionable owing to the desensitization treatment. This thus remains mainly on the face 22 of the label 3 when it is removed, so as not to change the optical characteristics of the label 19, i.e. so as not to disturb the reading of the information 2 by the window 8 when the masking label 3 is removed.
Only the strips 9, 10, 5, 51 of the masking label 3 are provided with a strong and non-repositionable adhesive on the face 22 side of the label 3.
The document 1 is then turned over in the direction of the arrow F1, so that the visible face of the
Advantageously, the various steps are performed out in a discontinuous manner. Typically, the step of securing the various labels 3, 16, 19 of the document 1 are performed in one location and/or at a given time. The information 2 is printed in a remote location and/or at another time, therefore independently of the steps mentioned above. In other words, it is the end user providing the confidential information who performs the last step consisting of affixing the information to the document 1, the latter being already provided with other components of the security device.
It is understood that these steps can be performed continuously, i.e. in a single operation, the delivered document being delivered ready to receive the code by an approved user, referred to as the customizer.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2014/000475 | 3/13/2014 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2015/150849 | 10/8/2015 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6686014 | Washburn | Feb 2004 | B1 |
20100013209 | Kovacevitch | Jan 2010 | A1 |
Number | Date | Country |
---|---|---|
2827217 | Jan 2003 | FR |
2007144486 | Dec 2007 | WO |
2009103021 | Aug 2009 | WO |
Number | Date | Country | |
---|---|---|---|
20170066275 A1 | Mar 2017 | US |