Method for checking an optical security feature of a valuable document

A security feature, optical security technology, used in computer parts, banknote authenticity testing, instruments, etc.

Active Publication Date: 2013-06-12
GIESECKE & DEVRIENT CURRENCY TECHNOLOGY GMBH
View PDF9 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in doing so, the complexi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for checking an optical security feature of a valuable document
  • Method for checking an optical security feature of a valuable document
  • Method for checking an optical security feature of a valuable document

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] figure 1 The means 10 for processing value files (in this example banknote processing means) in the banknote form are used for checking the authenticity of value files 12 and for sorting depending on the result of the authenticity check, etc. Wait. The apparatus 10 has: an input pocket 14 for the input of value files 12 to be processed; a singler 16 which can access the value files 12 in the input slot 14; successively arranged gates 20 and 20 ′; and a respective output slot 26 or 26 ′ or 26 ″ after each gate, or at one end of the transport path 22 following both gates. Along the transport path 22 given by the transport device 18 , before the gate 20 and after the picker 16 is arranged a sensor assembly 24 for acquiring properties of the value files 12 fed in individual form, and Used to form sensor signals exhibiting the described properties. The control device 30 is connected via signal connections at least to the sensor assembly 24 and to the doors 20 and 20' and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Described is a method for checking a specified optical security feature in or on a specified section of a valuable document on the basis of pixel data of pixels of an image of the specified section, which are assigned in each case to locations in or on the section, and represent optical properties of the valuable document at the locations, in which method a check is carried out as to whether a first number of those pixels or a first proportion of those pixels of the pixels of the image whose pixel data are within a first reference region specified for the security feature according to a first specified criterion exceeds a first hit minimum value specified for the security feature,; and whether a first scattering of the pixel data of those pixels which are within the first reference region for the pixel data according to the first criterion exceeds a first scatter minimum value specified for the security feature, and, in dependence on the result of the check, an authenticity signal is formed which represents an authenticity indication only if the first number or the first proportion exceeds the first hit minimum value and the scattering exceeds the first scatter minimum value.

Description

technical field [0001] The invention relates to a method for checking an optical security feature in or on a part of an image of a value document on the basis of pixel data of the part, a method for checking an optical security feature of a value document, and an optical security feature for checking a value document. device for safety features. Background technique [0002] A value document is understood here to be a card-shaped object, and preferably a sheet-shaped object, which represents, for example, a monetary value or an authorization and should therefore not be able to be arbitrarily generated by unauthorized persons. Thus, the value file has a security feature that cannot be simply produced (in particular copied), the presence of which indicates authenticity, ie produced by an authorized authority. Important examples of such value documents are identity documents, chip cards, tickets, vouchers, checks and especially banknotes. [0003] Of particular interest are o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07D7/12G07D7/20
CPCG07D7/2041G07D7/205G07D7/1205
Inventor S.苏N.霍尔
Owner GIESECKE & DEVRIENT CURRENCY TECHNOLOGY GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products