The present disclosure is generally directed to security features, security documents incorporating security features, and methods of manufacturing the same.
The use of identification documents and other credentials is pervasive. Credentials are used on a daily basis for a number of different purposes. Credentials, which may also be referred to as secure documents, are most commonly used to prove identity, verify age, access an asset (e.g., secure area, financial account, computing resource, etc.), as evidence for driving privileges, cash a check, and the like. Airplane passengers are required to show a credential during check in, during security screening, and prior to boarding their flight. We also live in an ever-evolving cashless society where credentials are used to make payments, access automated teller machines, debit an account, or make a payment, etc. Many industries require that their employees carry photo identification credentials on the job in order to access various locations on a job site.
While many different types of security features have been developed to enhance the security associated with credentials, optically variable or holographic security features have been among the most popular features developed in the last decade due to the difficulty associated with copying and the ease with which they can be verified. Although holographic features provide good security against forgery, there is a need to continue developing new types of security features, whether holographic or not. This continued development helps stay in front of potential document forgers and other bad actors.
Embodiments of the present disclosure aim to overcome the shortcomings described above. In some embodiments, a secure identity document or secure document is provided with one or more forge-proof features, which may be referred to herein as a security feature. In accordance with at least some embodiments, a secure document includes a front side, a backside opposite the front side, and an image area provided on the front side that comprises image content. In accordance with some embodiments of the present invention, the secure document also includes an information area on the front side that may have informational content and a security feature. In accordance with some embodiments, the security feature includes a pattern of perforations provided in an overlapping relationship with the image area and the information area, which simultaneously binds and secures the image content with the informational content.
In a further embodiment of the present disclosure, a method of manufacturing a secure document is disclosed. In an embodiment, the method includes receiving the secure document with a front side and opposing backside and creating an image area on the front side of the secure document. In an embodiment, the method also includes creating an information area on the front side of the secure document and creating a security feature. In an embodiment, the security feature may have a pattern of perforations that overlap at least some of the image area and overlap at least some of the information area.
In another embodiment of the present invention, a forge-proof document is provided. In an embodiment, the forge-proof document includes a polycarbonate substrate and an image area that may have an image printed onto at least one side of the polycarbonate substrate. In an embodiment of the present disclosure, the forge-proof document also includes an information area comprising information that is printed adjacent to the image area and a security feature. In one embodiment, the security feature includes a pattern of perforations in the polycarbonate substrate where a first portion of the pattern of perforations overlap the image area and a second portion of the pattern of perforations overlap the information area.
In another embodiment of the present invention, an identification document comprising a first facial image and first additional information is provided. In this embodiment, the first facial image is generated with a first pattern of perforations formed in a substrate of the identification document. In an embodiment, the first additional information corresponds to a holder of the identification document and the additional information is provided as a second pattern of perforations formed in the substrate of the identification document.
The accompanying drawings are incorporated into and form a part of the specification to illustrate several examples of the present disclosure. These drawings, together with the description, explain the principles of the disclosure. The drawings simply illustrate possible and alternative examples of how the disclosure can be made and used and are not to be construed as limiting the disclosure to only the illustrated and described examples. Further features and advantages will become apparent from the following, more detailed, description of the various aspects, embodiments, and configurations of the disclosure, as illustrated by the drawings referenced below.
Now referring to the Figures,
The front side F of the document 1 may include a first security feature 2 with a perforation pattern 6 that displays first image information 4 when viewed against a bright background. In other words, when the document 1 is viewed against a light source, the first security feature 2 along with the first image information 4 are visible. The document 1 also may include a second security feature 3 having second image information 5 that is displayed by reflecting light emitted thereon. In accordance with an embodiment of the present disclosure, the first image information 4 comprises information that may be similar to the second image information 5. The perforation pattern 6 may be formed using a laser. Thus, in embodiments where paper, plastic, or any type of textile may be used for the document 1, using a laser has the advantage that at the position of the perforation pattern 6, the material, such as paper, plastic or textile, that is intended to be removed may be completely removed. When the fingertips of a user brush over the document 1 at the perforation pattern 6, generally no elevation, channel, or burr, can be felt. However, if the perforation pattern 6 were applied by forgers by means of, for instance, conically formed needles, cup-shaped edges or burrs would be created and are easily discernible with the fingertips of a user. Therefore, the perforation pattern 6 provides a good means of identifying possible forgeries. In accordance with embodiments of the present disclosure, the second information 5 may be formed in the document 1 with an engraving process, ink jet printing, or laser printing.
As may be seen with references to
Each of the front side F and the backside B include the second security feature 3 along with the first image information 4 and the second image information 5. Here, the first image information 4 and the second image information 5 on the back side B are mirrored versions of the first image information 4 and the second image information 5 on the front side F. In other words, the first image information 4 and the second image information 5 on the front side F are horizontally mirrored on the back side B. Thus, the first image information 4 on the front side F corresponds to the first image information 4 on the backside B. Similarly, the second image information 5 on the front side F corresponds to the first image information 5 on the backside B.
In accordance with embodiments of the present disclosure, a size of the second image information 5 on the front side F may be larger than a size of the second image information 5 on the backside B. In particular, in this embodiment, the size of the second image information 5 on the backside B may be the same size as the first image information 4 on the backside B. Moreover, as may be seen with reference to
Similar to the front side F, the first security feature 2 and the first image information 4 on the backside B are visible when the document 1 is viewed against a bright background, such as a light source. Furthermore, as noted above, the second security feature 3 and the second image information 5 are visible when light is not shining through the document 1. However, when light is shining through the document 1, the first security feature 2, the first image information 4, the second security feature 3, and the second image information 5 appear in a lighter color than only the second security feature 3 and the second image information 5 when no light is shining through the document 1. Also, similar to the front side F, the second security feature 3 and the second image information 5 on the backside B are visible by reflecting light emitted thereon.
It should be noted that while in
As explained above, the first security feature 2 comprises the perforation pattern 6 having the first image information 4 when the document 1 is viewed against a bright background. Moreover, the second security feature 3 comprises the second image information 5 that is displayed by reflecting light emitted thereon.
In accordance with embodiments of the present disclosure, the front side F of the document 1 may comprise the second security feature 3 having a pattern formed using a first printing technique, and the backside B may comprise the second security feature 3 having a pattern formed using a second printing technique. In other words, in this embodiment, the second security feature 3 on the front side F may be formed with a technique that may be different from the technique used to form the second security feature 3 on the backside B. Here, the first and second printing techniques may comprise laser engraving, inkjet printing, or laser printing. In an embodiment where different printing techniques are used to form the second security features 3 respectively on the front side F and the backside B, the first printing technique may comprise laser engraving and the second printing technique may comprise inkjet printing or laser printing.
Further, in an embodiment that employs separate printing techniques for the second security feature 3 on the front side F and the second security feature 3 on the backside B, the second image information 5 formed with the first printing technique may be applied on the front side F and the second image information 5 formed with the second printing technique may be applied on the backside B. Nevertheless, when different printing techniques are employed, the second image information 5 may still correspond to the first image information 6 as discussed above. Furthermore, when different printing techniques are employed, the second image information 5 on the backside B mirrors the second image information 5 on the front side F.
In accordance with embodiments of the present disclosure, a code may be incorporated into the first security feature 2 and the second security feature 3. In some embodiments, the code may only be visible when the document 1 is subjected to special processing. Examples of special processing include exposing the code to blacklight UV light or the like or viewing the code under different optical lenses.
Conversely, a visible code may be incorporated into the first security feature 2 and the second security feature 3. In an embodiment, the code may identify the machine used to create the document 1. In this embodiment, if the document 1 is forged, the machine used to generate the forgery may be identified.
In order to modulate a brightness of the features of the document 1, such as the first security feature 2, the first image information 4, the second security feature 3, and the second image information 5, perforations may be formed in the document 1 that correspond to the first security feature 2, the first image information 4, the second security feature 3, and the second image information 5 in accordance with embodiments of the present disclosure. In particular, techniques for modulating brightness tones, similar to graphic art, are possible by applying perforations according to a fixed grid, where the size of the perforations may be a measure of intensity. An example of this technique are black and white photographs that are reproduced in newspapers. Moreover, by using perforation holes of equal dimensions, brightness tones may be created where the density of the dimensions of the perforation holes may be a measure of the intensity. An example of this technique can be found in the series of Netherlands postage stamps in which the likeness of Her Majesty the Queen is represented by dots of varying density. In accordance with embodiments of the present disclosure, both techniques can be combined.
Now making reference to
The system 7 also may include a laser beam generating means 13 that may be controlled by the computing device 12. The computing device 12 controls an intensity of a laser beam 14 output from the laser beam generating means 13 and focuses the laser beam 14 transmitted by the laser beam generating means 13. In addition, the computing device 12 controls the direction in which the laser beam 14 is transmitted. In accordance with embodiments of the present disclosure, the direction of the laser beam 14 may be varied in multiple planes in order to apply a perforation pattern 16 that, in some embodiments, corresponds to the security information and/or image information discussed above, respectively, in a document 15.
The laser beam generating means 13 may include mirror systems, which may be used to adjust the laser beam 14 output from the laser beam generating means 13. In accordance with further embodiments of the present disclosure, the laser beam generating means 13 stands still and a carrier on which the document 15 is placed moves relative to the laser beam generating means 13 and the laser beam 14. In further embodiments, the carrier may move in one direction, such as in a direction Y, while the laser beam generating means 13 moves in a second direction, such as a direction X. The choice between the various possibilities depends on the technology used. Nevertheless, the perforation pattern 16 and security information, such as the first security feature 2, the first image information 4, the second security feature 3, and the second image information 5, should comprise perforation holes of differing diameter, wherein the diameter may be a function of the brightness to be represented in any of the first security feature 2, the first image information 4, the second security feature 3, and the second image information 5. Perforation holes of differing density may be created by causing the laser beam generating means 13 to generate more or fewer holes locally. An example of this shown with reference to
Now making reference to
It should be noted that the description of
As noted above, when the document 1 is viewed against a bright background, the first security feature 2 and the first image information 4 are visible. In accordance with an embodiment of the present disclosure, the first security feature 2, which may include the perforation pattern 6, displays grey tones when viewed against a bright background. In this embodiment, the document 1 may be manufactured from a material that transmits light to a limited extent, where some of the perforations forming part of the perforation pattern 6 extend over part of the document 1 at the position of the perforation pattern 6. Thus, a thickness of the remaining portion of the document 1 at the position of the perforation pattern 6 may be modulated in accordance with the image to be displayed, i.e., the security features 2 and 3 and the image information 4 and 5. The grey tones displayed when viewed against a bright background may be controlled by modulating the density and/or the diameter of the perforations in the first security feature 2 in order to generate image information. Embodiments that explain how to achieve these different grey tones will now be discussed with reference to
Now referring to
In another embodiment of the present disclosure, a width of the perforations may be modulated to control the grey tones. For example, making reference to
When the document 1 is viewed at the front side F or the backside B, as indicated with dotted lines in
In addition to the configurations shown with reference to
In addition to a circular configuration, the perforations in the document 1 may have a rectangular configuration, as shown with regard to
Furthermore, the perforations in the document 1 may be formed with different layers, where one of the layers may include an ink, as shown with reference to
Again, it is pointed out that the description of
Now making reference to
In some embodiments, the image area 42 may be adjacent to, but not overlapping with, the information area 43. In some embodiments, the information area 43 may contain at least some information that describes an image or collection of images provided in the image area 42. As a non-limiting example, the information area 43 may contain information describing a person or subject whose image may be provided in the image area 42. Such information contained in the information area 43 may include, without limitation, the name, address, date of birth, etc., of the individual pictured in the image area 42.
As can be appreciated, the strength of the facial image security feature 60 is inherently provided by the features of the security feature (e.g., the perforations, patterns, etc.). Embodiments of the present disclosure further contemplate that the positioning of the facial image security feature 60 can help improve the overall strength of any security feature provided in the image area 42 and/or information area 43. For instance, by providing the facial image security feature 60 with an overlapping relationship with both the image area 42 and the information area 43, a binding between the image area 42 and the information area 43 can be established vis-à-vis the facial image security feature 60. In some embodiments, the facial image security feature 60 may include an image that is based on, identical to, or mirrors an image provided in the image area 42. Furthermore, in some embodiments, the facial image security feature 60 may include an image based on informational content in the information area 43. However, because the facial image security feature 60 overlaps both the image area 42 and information area 43, the facial image security feature 60 links the two areas 42, 43 and provides an indication that both areas 42, 43 were created at the same time as the facial image security feature 60.
As with other first security features 2 depicted and described herein, it should be appreciated that the facial image security feature 60 may be provided as an array of perforations of varying sizes so as to replicate an image, which may or may not correspond to the image in the image area 42. The perforations of the facial image security feature 60, as shown in
Although the facial image security feature 60 is shown as overlapping two types of areas on the document 1, it should be appreciated that the document 1 may be provided with more than two distinct areas (whether image areas, information areas, or other discrete areas on a document). In addition, the facial image security feature 60 may be sized and positioned so as to overlap two, three, four, or more of the distinct areas on the document 1. Moreover, although the image area 42 and the information area 43 are shown as being adjacent and non-overlapping, it should be appreciated that embodiments of the present disclosure contemplate a document where at least a portion of the image area 42 overlaps a portion of the information area 43 and the overlap between the image area 42 and the information area 43 may have at least some of the facial image security feature 60 provided thereon.
Although the facial image security feature 60 shown in
More broadly, while an image, such as a facial image, on the document 1 may result from a pattern of perforations formed on or in the document, images on the document that may result from such a pattern of perforations formed on or in the document, or more generally the various credentials of the present disclosure, are not limited to a facial image, such as an individual's photo, or other images. As shown in
The additional information 50 may be any suitable information. Often, the additional information 50 can be information that may be relevant to the particular type of credential 10 on or in which the additional information is formed. Still further, the additional information 50 may desirably be information that may be particular to the person identified by the document 1, as opposed to information that does not help identify a person or that is generic among a group of people, such as the issuing authority (e.g., state, country, or organization) of the credential 10. Non-limiting examples of the type of additional information 50 that may be included on the document 1 include: birthdate, in any format; driver's license class or certification; identification of membership in a professional organization; professional license number; permission(s) information; security clearance level; etc. For example, being of a certain age is a requirement for many different services and products, such as tobacco or alcohol, which is often government regulated. Accordingly, as illustrated in
As indicated above,
Using a combination of a facial image, such as the facial image of the facial image security feature 60, and additional information, such as the additional information 50, each comprised of a pattern of perforations formed in a substrate, can provide more accurate and verifiable data, which can be processed faster. As described herein, using images comprised of a pattern of perforations formed in a substrate, in general, increases the likelihood that a credential is not fraudulent. Integrating such a security feature (e.g., perforated images) with multiple data points, such as a facial image and additional information, as described herein, further increases the likelihood that a credential is not fraudulent as it would be even harder to create a fake or false copy of the credential. Additionally, integrating the security feature of perforated images with multiple data points permits relatively easy and quick authentication of the identification document (using, in general, fraudulent-deterring perforated images), verification of the identification of the holder (using, for example, a perforated facial image), and verification of additional personal information, such as age of the document holder, (using, for example, perforated additional personal information) substantially simultaneously with substantially a single viewing action or motion.
Referring back to
In some embodiments, the facial image security feature 60 overlaps the image area 42 and the information area 43 in equal proportions. In some embodiments, the facial image security feature 60 overlaps the image area 42 in a larger proportion as compared to the information area 43. In some embodiments, the facial image security feature 60 overlaps the image area 42 in a smaller proportion as compared to the information area 43. The amount of overlap from one area to the other may also provide an indication of whether or not the facial image security feature 60 is a valid feature or a forgery of the feature. Furthermore, in some embodiments, the image area 42 is at least partially overlapping with respect to the information area 43. In this embodiment, the facial image security feature 60 overlaps at least a portion of the overlapping between the image area 42 and information area 43.
The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with others.
The present application is a national stage application under 35 U.S.C. § 371 of PCT Appl. No. PCT/EP2019/078000, filed Oct. 15, 2019, which claims the benefit of U.S. Provisional Pat. Appl. No. 62/834,741, filed Apr. 16, 2019, and U.S. Provisional Pat. Appl. No. 62/746,314, filed Oct. 16, 2018, each of which is hereby incorporated herein by reference in its entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2019/078000 | 10/15/2019 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2020/079018 | 4/23/2020 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4313984 | Moraw | Feb 1982 | A |
20080169638 | Beyer-Meklenburg | Jul 2008 | A1 |
20160176219 | Nijssen | Jun 2016 | A1 |
Number | Date | Country |
---|---|---|
102017000124 | Jul 2018 | DE |
0013418 | Jul 1980 | EP |
1997643 | Dec 2008 | EP |
WO-2020079018 | Apr 2020 | WO |
Entry |
---|
“International Application Serial No. PCT/EP2019/078000, International Search Report dated Jan. 17, 2020”, 4 pgs. |
“International Application Serial No. PCT/EP2019/078000, Written Opinion dated Jan. 17, 2020”, 6 pgs. |
“International Application Serial No. PCT/EP2019/078000, International Preliminary Report on Patentability dated Apr. 29, 21”, 8 pgs. |
“European Application Serial No. 19789945.3, Communication Pursuant to Article 94(3) EPC dated Jul. 7, 2023”, 5 pgs. |
Number | Date | Country | |
---|---|---|---|
20220009268 A1 | Jan 2022 | US |
Number | Date | Country | |
---|---|---|---|
62834741 | Apr 2019 | US | |
62746314 | Oct 2018 | US |