Language selection

Search

Patent 2739508 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2739508
(54) English Title: METHOD OF MANUFACTURING SECURITY DOCUMENT AND METHOD FOR AUTHENTICATING THE DOCUMENT
(54) French Title: PROCEDE DE FABRICATION D'UN DOCUMENT DE SECURITE ET PROCEDE D'AUTHENTIFICATION DU DOCUMENT
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • B42D 25/40 (2014.01)
  • B42D 25/305 (2014.01)
  • G06K 19/06 (2006.01)
  • G07D 07/004 (2016.01)
(72) Inventors :
  • GREEN, STEPHEN BANISTER (United Kingdom)
(73) Owners :
  • DE LA RUE INTERNATIONAL LIMITED
(71) Applicants :
  • DE LA RUE INTERNATIONAL LIMITED (United Kingdom)
(74) Agent: BORDEN LADNER GERVAIS LLP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2009-10-02
(87) Open to Public Inspection: 2010-04-15
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/GB2009/002352
(87) International Publication Number: GB2009002352
(85) National Entry: 2011-04-04

(30) Application Priority Data:
Application No. Country/Territory Date
0818271.9 (United Kingdom) 2008-10-06
PCT/GB2009/001122 (United Kingdom) 2009-05-05

Abstracts

English Abstract


A method of manufacturing a security document is provided, comprising:
providing a first security element article
having a corresponding predetermined first unique identification code which is
detectable from the first security element article;
incorporating the first security element article into a document; generating a
machine-readable security feature containing
document data representative of the first unique identification code
corresponding to the first security element article and of at least a
second unique identification code corresponding to a second security element
applied to the document; and applying the
machine-readable security feature to the document.


French Abstract

L'invention concerne un procédé de fabrication dun document de sécurité, comportant les étapes consistant à : mettre en place un premier article formant élément de sécurité, doté dun premier code unique didentification prédéterminé correspondant qui est détectable à partir du premier article formant élément de sécurité ; incorporer le premier article formant élément de sécurité dans un document ; générer une entité de sécurité lisible par une machine contenant des données relatives au document représentatives du premier code unique didentification correspondant au premier article formant élément de sécurité et dau moins un deuxième code unique didentification correspondant à un deuxième élément de sécurité appliqué au document ; et appliquer lentité de sécurité lisible par une machine au document.

Claims

Note: Claims are shown in the official language in which they were submitted.


20
CLAIMS
1. A method of manufacturing a security document, comprising:
providing a first security element article having a corresponding
predetermined first unique identification code which is detectable from the
first
security element article;
incorporating the first security element article into a document;
generating a machine-readable security feature containing document
data representative of the first unique identification code corresponding to
the
first security element article and of at least a second unique identification
code
corresponding to a second security element applied to the document; and
applying the machine-readable security feature to the document.
2. A method of manufacturing a security document according to claim 1,
wherein generating the machine-readable security feature comprises obtaining
the first unique identification code and the second unique identification code
by
reading the or each identification code from the respective security elements
and/or by retrieving the respective identification codes from a memory store,
and
generating the document data based on the obtained identification codes.
3. A method of manufacturing a security document according to claim 1 or claim
2, wherein the document data comprises each of the first and second unique
identification codes individually.
4. A method of manufacturing a security document according to claim 1 or claim
2, wherein the document data comprises a code in which each of the first and
second unique identification codes are incorporated.
5. A method of manufacturing a security document according to any of the
preceding claims, wherein the first and second unique identification codes are
the same.

21
6. A method of manufacturing a security document according to any of the
preceding claims, wherein the machine-readable security feature is readable by
optical recognition or magnetic recognition.
7. A method of manufacturing a security document according to any of the
preceding claims, wherein the document data is encoded or encrypted such that
it is not directly intelligible to an observer.
8. A method of manufacturing a security document according to any of the
preceding claims, wherein the machine-readable security feature comprises a
2D barcode, scrambled indicia or a digital watermark.
9. A method of manufacturing a security document according to any of the
preceding claims, wherein the machine-readable security feature is not
apparent
in the visible spectrum, preferably being formed of an ink which luminesces
under UV or IR radiation, or an ink which is IR-absorbent, or a magnetic ink.
10. A method of manufacturing a security document according to any of claims
1 to 5, wherein the machine-readable security feature comprises a RFID chip or
a magnetic print or strip having the document data stored therein.
11. A method of manufacturing a security document according to any of the
preceding claims, wherein the first security element article comprises a
contactless, readable data store, preferably a RFID chip, containing machine-
readable data including the first unique identification code.
12. A method of manufacturing a security document according to any of claims
1 to 10, wherein the first security element article comprises a film for
application
to the document, the film having the first unique identification code printed,
engraved or perforated thereon.

22
13. A method of manufacturing a security document according to claim 12
wherein the film is a polymeric film and preferably comprises optically
variable
regions.
14. A method of manufacturing a security document according to any of claims
1 to 10, wherein the first security element article comprises a security
thread,
preferably a magnetic thread, containing machine-readable data including the
first unique identification code.
15. A method of manufacturing a security document according to any of claims
1 to 10, wherein the first security element article comprises an optically
active
element, preferably a hologram, carrying the first unique identification code.
16. A method of manufacturing a security document according to claim 15,
wherein the optically active element is modified to carry the first unique
identification by printing, laser engraving or perforation.
17. A method of manufacturing a security document according to any of the
preceding claims, wherein the second security element comprises any of:
a machine-readable code printed on the document and including the
second unique identification code;
a machine-readable code laser-marked onto the document and including
the second unique identification code;
a contactless, readable data store, preferably a RFID chip, containing
machine-readable data including the second unique identification code;
a film for application to the document, the film having the second unique
identification code printed, engraved or perforated thereon;
a security thread, preferably a magnetic thread, containing machine-
readable data including the second unique identification code; and
an optically active element, preferably a hologram, carrying the second
unique identification code.

23
18. A method of manufacturing a security document according to any of the
preceding claims, further comprising applying one or more additional security
elements to the document, each additional security element having a respective
unique identification code, and incorporating the respective unique
identification
codes into the document data before the machine-readable security feature is
applied to the document.
19. A method of manufacturing a security document according to claim 18,
wherein the one or more additional security elements comprise any of:
a machine-readable code printed on the document and including a
respective unique identification code;
a machine-readable code laser-marked onto the document and including
a respective unique identification code;
a contactless, readable data store, preferably a RFID chip, containing
machine-readable data including a respective unique identification code;
a film for application to the document, the film having a respective unique
identification code printed, engraved or perforated thereon;
a security thread, preferably a magnetic thread, containing machine-
readable data including the a respective identification code; and
an optically active element, preferably a hologram, carrying a respective
unique identification code.
20. A method of manufacturing a security document according to claim 18,
wherein at least one of the additional security elements comprises at least a
portion of the document surface, and the method further comprises measuring a
surface characteristic of the document surface portion and recording the
measured characteristic to provide the corresponding unique identification
code.
21. A method of manufacturing a security document according to claim 20,
wherein the surface characteristic is measured by laser surface analysis of
the at
least a portion of the document surface.

24
22. A method of manufacturing a security document according to any of the
preceding claims, wherein the document is a booklet document comprising more
than one page, at least one of first security element article or the second
security
element being provided on a first page of the booklet, and the machine-
readable
security feature being provided on a second page of the booklet document.
23. A method of manufacturing a security document according to any of the
preceding claims, wherein the security document is a document of value,
preferably a passport, identification document, certificate, or licence.
24. A method of determining the authenticity of a document, the document
being manufactured in accordance with any of claims 1 to 23, the method
comprising:
reading the machine-readable security feature to retrieve at least one
unique identification code contained therein;
detecting the first unique identification code from the first security element
article;
detecting the second unique identification code from the second security
element; and
comparing the at least one unique identification codes retrieved from the
machine-readable security feature with the first unique identification code
from
the first security element article and/or the second unique identification
code
from the second security element, to determine whether a security element
identified by the machine-readable security feature is present on the
document,
to thereby determine whether the document is authentic.
25. A method according to claim 24, wherein at least two unique identification
codes are retrieved from the machine-readable security feature; and the two
retrieved unique identification codes are compared with the first and second
unique identification codes to determine whether the document is authentic.

25
26. A method according to claim 24 or 25, wherein the machine-readable
security feature is read by an optical or magnetic scan of at least a portion
of the
document.
27. A method according to any of claims 24 to 26, wherein the first and/or
second unique identification code is detected by at least one of:
an optical scan of the security element;
radio frequency interrogation;
magnetic interrogation;
visual observation by a user; and
laser surface analysis.
28. A method according to any of claims 24 to 27, wherein the document data
contained in the machine-readable security feature is encrypted, and the
method
further comprises decrypting the document data to retrieve the at least one
identifier.

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
1
Method of Manufacturing Security Document
and Method for Authenticating the Document
5. This invention relates to the manufacture of security documents such as
passports, licences, currency and the like, and methods of authenticating such
documents.
Secure documents such as passports, identification documents, certificates and
licences are frequently the target of counterfeiters and persons wishing to
make
fraudulent changes to the data contained therein. Typically such documents are
provided with a number of security elements for checking the authenticity of
the
document. These may include both security element articles which are affixed
to
or incorporated into the document, such as RFID chips, holographic films,
magnetic threads etc, as well as features which are created on the document
itself, such as colour-changing inks, security inks (e.g. IR and UV visible
inks)
and other printed data. Some such security elements may themselves contain
personalisation information identifying the owner of the document (e.g. data
giving the owner's name, a photograph or biometric data), whereas other
security elements may be provided to prevent other data being manipulated (for
example a holographic film overlaying printed data).
In order to determine the authenticity of the document, typically one or more
of
the security elements are inspected to ascertain whether they provide the
expected response or whether the data contained therein corresponds to the
person presenting the document, for example.
Persons wishing to produce counterfeits of such documents, or to fraudulently
alter data in existing documents, typically attempt to do so by substituting
security elements with similar ones obtained from other security documents or,
depending on the technologies involved, manufactured themselves or obtained
illegally. As the sophistication of such techniques improves, it has become
more
difficult to detect forgeries since in many cases the substituted security
element

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
2
provides the same or similar response to that which an inspector of the
document expects.
In an attempt to address this problem, various approaches have been proposed
whereby certain characteristics of the document are measured or otherwise
detected and recorded elsewhere on the document. During authentication, the
same characteristics are remeasured and compared with the recorded data to
confirm that no tampering has occurred. For example, WO-A-00/38932
describes reading the printed serial number from a document such as a bank
.cheque and performing a cryptographic operation to arrive at a check number
which is then printed or otherwise applied to the document. To confirm the
document's authenticity, the serial number is read again and compared with the
check number. WO-A-00/39953 discloses a watermarking technique whereby
information regions on a document (such as printed data, photographs etc) are
captured and used to generate a digital watermark which is embedded
elsewhere on the document.
WO-A-2006/053685 discloses providing a document with one or more barcodes
in which data relating to a measurable property of the document is encoded.
Examples of the measurable properties made use of are: the location of
elements of a printed image, or paper fibres and the relative positions of
RFID
chips or security threads. Similarly, EP-A-1 139302 and EP-A-1 501054 describe
recording information visible from the document in a RFID chip provided on the
document, such as the denomination of a banknote.
The present invention provides a method of manufacturing a security document,
comprising:
providing a first security element article having a corresponding
predetermined first unique identification code which is detectable from the
first
security element article;
incorporating the first security element article into a document;
generating a machine-readable security feature containing document
data representative of the first unique identification code corresponding to
the

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
3
first security element article and of at least a second unique identification
code
corresponding to a second security element applied to the document; and
applying the machine-readable security feature to the document.
The present technique provides significant advantages over known methods by
including in the machine-readable security feature at least one unique
identification code which is integral to a security element article applied to
the
document. That is, the first identification code is inherent to the security
element
article (and detectable from the security element article alone, rather than
the
security document as a whole). In contrast, the measured characteristics
utilised
in previous methods are either taken from the relationship between such
articles
and the remainder of the document, or from the document substrate (or printing
thereon), and do not uniquely identify security element articles. The present
approach recognises that it is the substitution of security element articles
(such
as RFID chips, laminate patches and security threads) which is of primary
concern in combating counterfeiting, yet such substitution will not be
reliably
detected by the known methods. For instance, where the measured
characteristics involve the position of a security element article such as a
RFID
tag relative to the document, it would not be difficult for a counterfeiter to
replace
the security element article with another of identical appearance in the
appropriate position, which would remain undetected. Likewise, where visible
information taken from the document is stored within an article such as an
RFID
tag, this could be replicated by copying the stored data.
By providing the security element article with a unique identifier, such as a
number or other code, and recording the identifier in the machine-readable
security feature, substitution of the security element article can be readily
detected, since the identifier (if any) of the substituted security element
article
will no longer match the document data embodied in the machine-readable
security feature. By additionally including in the MR feature at least a
second
unique identification code detectable from a second security element on the
document (which may be another "article" or an element which is intrinsic to
the
substrate, such as a printed serial number), the security is significantly
enhanced

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
4
since both the unique ID codes must match those stored in the MR feature for a
finding of authenticity to be returned. The more security elements and
corresponding ID codes that are included in the MR feature, the greater the
security.
The unique identification codes can take any convenient form, such as
alphanumeric, symbolic or even binary, provided they serve the purpose of
distinguishing one security element from many others of a similar type. For
example, a serial number or barcode could be used. The identifiers may or may
not be recognisable to an observer, but preferably, at least some of the
identifiers are not recognisable, in order to increase the difficulty of
producing a
copy.
The present invention further provides a method of determining the
authenticity
of a security document made according to the above method, comprising:
reading the machine-readable security feature to retrieve at least one
unique identification code contained therein;
detecting the first unique identification code from the first security element
article;
detecting the second unique identification code from the second security
element; and
comparing the at least one unique identification codes retrieved from the
machine-readable security feature with the first unique identification code
from
the first security element article and/or the second unique identification
code
from the second security element, to determine whether a security element
identified by the machine-readable security feature is present on the
document,
to thereby determine whether the document is authentic.
In this way, the authenticity of a document can be judged based on the
identity
of at least one security element article comprised in the document, which
provides a level of security over and above that achieved by simply testing
the
responses of the security elements or identifying that the elements are
provided
at the correct positions. The technique also lends itself particularly well to

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
automation, since at least some of the identification codes as well as the
security
feature itself may be machine-readable. This reduces the possibility of user
error.
5 The existence of the ID code of the security element article prior to
assembly of
the document also provides additional benefits in that, if desired, the
relevant ID
code for the article could be obtained in advance and later retrieved from a
memory store when the MR feature is to be generated to thereby streamline the
MR feature generation process and reduce the likelihood of error.
Alternatively,
however, the MR feature generation process could involve reading the ID code
from the article.
The document data representing the identifiers may be embodied in the
machine-readable security feature in a number of ways. In one embodiment, the
document data comprises each of the at least two identifiers. That is, the
machine-readable security feature could comprise a machine-readable list of
the
identifiers. In other embodiments, the document data comprises a code in which
each of the at least two identifiers are incorporated. For example, the
various
identifiers could be represented by different portions of a barcode or other
graphic. These embodiments could also be used in combination, certain of the
identifiers being represented individually, and others incorporated into a
code.
In certain embodiments, each of the security elements may be independently
allocated its own identifier which may or may not match any of the other
identifiers. It is preferable that the first and second ID codes are different
to one
another, to increase security. In this case, the document data embodied in the
machine-readable security feature includes all of the identifiers
corresponding to
the at least some security elements to be identified. In other preferred
embodiments, each of the security elements is associated with the same
identifier, common to all of the security elements. That is, each of the
security
elements is provided with the same detectable serial code or other identifier.
In
this case, the machine-readable security feature need only contain that same

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
6
identifier, this identifier being compared against the identifiers detected
from
each of the security elements to be identified.
The machine-readable security feature may be provided on the document in a
number of ways. Preferably, the machine-readable security feature is readable
by optical recognition (within or outside the visible spectrum). For example,
the
machine-readable security feature could be printed onto the document, or
otherwise applied by means of a label, a transfer or the like. The feature
could
also comprise perforations or variations in the document thickness such as a
watermark, which can be detected in transmitted light.
Advantageously, the document data is encrypted such that it is not directly
intelligible to an observer. That is, even if the feature itself is visible to
a user, it
is not understandable without first decoding its meaning. Preferably, the
machine-readable security feature comprises a 2D barcode, scrambled indicia or
a digital watermark. In particularly preferred embodiments, the machine-
readable security feature is not apparent in the visible spectrum, preferably
being formed of a UV, IR or fluorescent ink. As well as hiding the feature
from
potential counterfeiters, this makes it more difficult to copy since such
techniques are not readily available.
In other embodiments, the machine-readable security feature comprises a RFID
chip or a magnetic strip having the document data stored therein. Whilst such
features may themselves be visible to an observer, the data therein is not
readily
accessible without the appropriate reading apparatus. It is also more
difficult to
manufacture counterfeit features of this sort.
Any number of security elements may be provided on the document, and all or a
selection of them may have corresponding identifiers included in the machine-
readable security feature. The security elements may or may not contain
personalisation information.

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
7
The first security element article can be of any type which is pre-
manufactured
and then affixed to or incorporated into the document substrate. In preferred
examples, the first security element article comprises a contactless, readable
data store, preferably a RFID chip, containing machine-readable data including
the first unique identification code. In alternative embodiments, the first
security
element article comprises a film for application to the document, the film
having
the first unique identification code printed, engraved or perforated thereon.
Preferably, the film is a polymeric film and may comprise optically variable
regions.
In other advantageous examples, the first security element article comprises a
security thread, preferably a magnetic thread, containing machine-readable
data
including the first unique identification code. Alternatively, the first
security
element article may comprise an optically active element, preferably a
hologram,
carrying the first unique identification code. Preferably, the optically
active
element is modified to carry the first unique identification by printing,
laser
engraving or perforation.
The second security element could comprise any of the above mentioned
exemplary security element articles (containing the second unique ID code), or
could comprise a feature inherent to the document substrate, printed,
engraved,
perforated or otherwise.
In preferred implementations, the method further comprises applying one or
more additional security elements to the document, each additional security
element having a respective unique identification code, and incorporating the
respective unique identification codes into the document data before the
machine-readable security feature is applied to the document. As indicated
previously, the greater the number of ID codes recorded in the MR feature, the
greater the security enhancement. The additional security element(s) could
comprise elements of any of the types already discussed with respect to the
second security element.

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
8
Alternatively, in preferred examples, at least one of the additional security
elements may comprise at least a portion of the document surface, and the
method further comprises measuring a surface characteristic of the document
surface portion and recording the measured characteristic to provide the
corresponding unique identification code. In this way, the MR feature and all
of
the other security elements it references are firmly linked to the document
substrate itself. In similar examples, any dimension, thickness, weight or
other
measurable characteristic of the document, or a feature thereof, could be
used.
Advantageously, the surface characteristic is obtained by laser surface
analysis
of the at least a portion of the document surface.
As noted above, it is generally preferable that the identifiers associated
with
each security element are detectable by machine so that authentication can be
carried out automatically. However, such identifiers may still be detectable
by a
user, e.g. printed data. In some embodiments, it is preferable that the one or
more security elements comprises readable indicia incorporating a
corresponding identifier which can be compared by an observer against the
document data contained in the machine-readable security feature. This
enables authentication to be carried out with only one machine reading step
(or
even manually, if the machine-readable security feature is additionally
intelligible
to an observer).
Any number of security elements and corresponding identifiers could be
provided. The more security elements for which identifiers are incorporated
into
the machine-readable security feature, the more difficult the document is to
forge.
The technique can be applied to any document, but preferably, the document is
a booklet document comprising more than one page, at least one of the two or
more security elements being provided on a first page, and the machine-
readable security feature being provided on a second page of the booklet
document. In this way, substitution of one or other of the pages will be
readily
detected.

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
9
Advantageously, the security document is a document of value, preferably a
passport, identification document, banknote, certificate, or licence.
In the method of authenticating, the data contained in the machine-readable
security feature may be extracted in any manner appropriate for the type of
feature in question. Preferably, the machine-readable security feature is read
by
an optical scan of at least a portion of the document.
Likewise, the unique identification codes may be detected using techniques
appropriate to each security element type. Preferably, the identifier
associated
with at least one of the security elements is detected by at least one of:
an optical scan of the security element;
radio frequency interrogation;
magnetic interrogation;
visual observation by a user; and
laser surface analysis.
Advantageously, the document data contained in the machine-readable security
feature is encrypted, and the method further comprises decrypting the document
data to retrieve the at least one identifier.
Depending on the level of security required, not all of the identifiers stored
in the
machine-readable security feature need be checked against the corresponding
security elements. However, preferably, the identifiers associated with each
of
the security elements for which identifiers are retrieved from the document
data
are detected and compared with the retrieved identifiers.
Examples of documents and methods of authentication in accordance with the
present invention will now be described with reference to the accompanying
drawings, in which:
Figure 1 schematically illustrates a first exemplary security document;

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
Figure 2 is a flow diagram showing an embodiment of a method for
manufacturing the security document of Figure 1;
Figure 3 is a flow diagram showing steps which may be involved in the
generation of a MR security feature; and
5 Figure 4 shows a second exemplary security document viewed in daylight
and under UV, with the security elements illustrated at an enlarged scale for
clarity.
The following description will focus on the example of a passport document.
10 However, as noted above, the present technique can be applied to any type
of
security document. The invention is most advantageously used in secure
documents / documents of value. In the context of a passport, problems that
the
present arrangement may be able to help detect include:-
1. Substitution of the MRP (Machine-readable Passport) Data Page
2. Fraudulent Changes to the Data Page (MRZ Zone / Photo)
3. Substitution of the Film (e.g. a holographic overlay film)
4. Chip or Inlay Substitution
5. Substitution of the page with the passport number on
6. Substitution of a page with a laser perforated number
A exemplary passport document 10 made using the presently-disclosed
methods is shown schematically in Figure 1. The document is of a booklet
configuration, having a front cover 11a, a back cover 11b and internal pages
including a data page 12a and an adjacent page 12b. On the data page 12a is
typically provided personalisation information, such as printed information
13,
including the document owner's name, nationality and date of birth, for
example,
and a photograph 14 of the owner. Commonly, the data page 12a includes a
machine-readable zone 15 ("MRZ"), in which are printed letters, numbers and
other symbols, which can be scanned and processed using optical recognition to
retrieve data. The boundary of the MRZ 15 is indicated in Figure 1 using
broken
lines but in practice this is not typically made visible.

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
11
To protect the personalisation data 13, photograph 14 and MRZ 15, at least a
portion of the data page 12a may be covered with a film 16. This typically
comprises a polymeric film which is laminated to the page 12a using adhesive
and/or heat sealing. The film 16 preferably includes features such as
holograms, colour changing inks or other optically variable elements such that
the film cannot easily be reproduced. By covering the data on data page 13
with
the film 16, the data cannot be changed without first removing the film 16,
which
process will typically damage or destroy the film and the security features
contained therein.
The document is typically also provided with information on one or more other
pages, such as passport number 17 which here is shown on the adjacent page
12b though in practice may be reproduced on every page of the document. The
passport number may be printed or could be provided by perforations, for
example laser perforations. The passport number 17 may include a check digit
symbol such as that disclosed in our International Patent Application Number
PCT/GB2007/002551.
The document preferably also includes a data store which can be read without
direct contact, such as a RFID chip 18. Figure 1 indicates the RFID chip 18 in
the vicinity of internal page 12b, but in practice the RFID chip 18 would
typically
be provided on the inside face of front cover 11 a or back cover 11 b,
connected
to a suitable antenna (not shown). The data contained in RFID chip 18 can be
read using a suitable radio frequency reading device as is well known in the
art.
It will be appreciated that the above identified security elements fall
broadly into
two categories: security element "articles" which are manufactured
independently of the document substrate and then affixed to the document by
adhesive or otherwise, such as the RFID chip 18 and laminate film 16. A
further
example would be a security thread which can be affixed to or incorporated
within the page or a holographic transfer patch, for example. Each of these
articles is provided with a detectable ID code prior to incorporation into the
document. For instance, RFID chips are typically provided with a unique serial

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
12
number during manufacture, independently of any biographical or other data
that
may later be programmed. It is not possible for the unique serial number to be
changed (it is not re-writeable). Laminate film 16 can be provided with an ID
code by printing or perforation (for example), before application to the
document
10.
Other elements, such as the passport serial number 17 and MRZ 15, are created
only upon printing (or perforating) the document substrate.
To correlate the key security elements found in an MRP (Machine-readable
Passport) or ePassport, and to provide a means of detecting whether any of the
features have been substituted or changed, the adjacent page 12b (the one
opposite to the MRP data page 12a) of the passport 10 is arranged to hold data
relevant to at least some of the above-described security elements 15, 16, 17
and 18, including at least one security element "article". This is achieved by
providing a machine-readable security feature 20 on page 12b containing
document data in which is incorporated a number of unique identifiers
associated with at least some of the security elements 15 to 18.
In this embodiment, each of the security elements 15 to 18 has been allocated
an individual identification code. The manner in which this is done will
depend
on the type of security element in question. The identifier may be intrinsic
to the
security element (e.g. a serial number automatically applied to the element
during manufacture), or may be added specially (e.g. printed onto the security
element). Generally, the identifier serves to identify the security element
itself,
rather than the owner of the document: it is preferable that there is no
correspondence between the personalisation details and the identifier applied.
In this example, MRZ 15 includes an identifier "XYZXYZXYZ" in its machine-
readable text. This identifier may form part of other information or could be
designated as standalone data. The film 16 has marked thereon an identifier
16a formed of the number "987654". The identifier 16a is preferably printed
onto
the film prior to lamination, on the side of the film 16 which adheres to the
data
page 12a. Advantageously, the identifier 16a is printed in an ink which
responds

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
13
only outside the visible spectrum (e.g. IR or UV ink), such that it is not
visible to
an observer.
The passport number 17 which is typically printed on or perforated into
several
internal pages of the document forms its own inherent identifier, in this case
consisting of the code "GB12345". The number 17 is typically configured in
such
a way that the code can be captured using optical recognition techniques. The
code may also include a check digit as mentioned above and this can be used
on its own or in combination with the rest of the code as an identifier.
The RFID chip 18 is preferably encoded with a serial number during
manufacture, as well as personalisation information relating to the passport
holder. The serial number can be used as an identifier and can be retrieved by
interrogating the RFID chip in the usual way.
Some or all of the above identifiers, including at least one corresponding to
the
RFID tag 18 or the laminate film 16 (i.e. a security element article) are
incorporated into document data held by the machine-readable security feature
20. In this embodiment, this is provided in the form of an optically and/or
magnetically recognisable printed code applied to page 12b of the document.
The code could alternatively be applied in the form of a label, transfer,
perforations, etc. Any other page could be used for the feature 20, but the
page
adjacent the data page 12a is convenient since this is the page the document
will be opened to in the usual course of authentication.
The feature 20 can be generated and applied in a number of ways. Figures 2
and 3 show steps involved in the production of the security document. In
Figure
2, an exemplary manufacturing process is shown in which three security element
articles A are to be provided on the security document. In this example, the
articles include an RFID chip, a laminate patch and a hologram, provided in
step
S100. As previously described, each of these articles incorporates an
identification code which is detectable from the article. For instance the
RFID
chip contains a serial number constituting its identification code ID1, the
laminate

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
14
patch has printed thereon an identification code ID2 and the hologram has a
laser engraved identification code ID3. An incomplete passport document D is
provided which may already incorporate one or more security elements, such as
security prints and, in this case, a perforated serial number "12345". The
security document D could at this stage already be printed with
personalization
information if desired. In step S102, the three security element articles A
are
affixed to the passport document D using appropriate techniques. It should be
noted that the security element articles need not all be applied to the
passport
document in the same step of the process. For instance, the RFID chip may be
embedded into the passport cover during manufacture of the cover material, the
hologram may be applied prior to printing any personalization information and
the laminate patch may be adhered to the passport document once
personalization is complete. In step S104, the machine-readable feature is
generated and this will be described in further detail below in relation to
Figure 3.
However, it should be noted that at least some of the generation steps could
alternatively take place before any or all of the security element articles
are
applied to the document D. Finally, in step S106, the generated machine-
readable feature is applied to the document. Again, in practice this need not
be
the last step of the process since further security elements could be added to
the
document after the MR feature has been applied. For example, the MR feature
could be provided underneath the laminate patch.
Turning to Figure 3, steps of the machine-readable security feature generation
process are shown. In the first step, S202, identification codes to be
included in
the machine-readable feature are obtained. Depending on the nature of the
security element in question, this may either involve reading the
identification
codes from the respective security elements or retrieving certain
identification
codes from a data store, or a combination of both. For example, during
manufacture of the passport document, the ID code of the RFID chip, laminate
patch or hologram can be recorded in the database before the article is
applied
to the document. If this database is made available to the MR generation
process, these identification codes could therefore be retrieved directly from
the
data store, rather than reading the elements for a second time. However, if
the

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
machine-readable security feature generation process is taking place at a
remote location, it may be preferable to retrieve the codes from the security
elements themselves.
5 In step S204, once the respective ID codes have been retrieved, these are
collated and in step S206 the collated document data is encoded to form the
machine-readable feature. The nature of the encoding step will depend on the
form of machine-readable feature desired.
10 The machine-readable security feature conveniently embodies the "document
data" in a 2D barcode, such as a PDBTM barcode by De La Rue International
Limited, or the like. Any type of barcode can be used such as linear barcode,
stacked 2D Barcodes (for example Codablock - F and PDF417), and matrix 2D
barcodes (for example, Aztec Code, Datamatrix or Semacode). Suitable
15 barcodes and techniques for encoding and decoding the data are disclosed in
EP-A-0954801 and EP-A-1471461 to Cobblestone Software, Inc. Providing the
security feature 20 in a format such as a barcode is advantageous because the
data contained therein is not directly intelligible to an observer. Further,
the
potential amount of data which can be stored in the feature 20, and therefore
to
some degree its security, is significant. Using a barcode allows a greater
density
of information to be stored per unit area compared with techniques such as
digital watermarking. Also, since the barcode can be unique in its structure,
it
makes fraudulent alteration of the code extremely difficult. However, in other
examples it may be preferred to have at least some of the data in a format
which
is directly understandable to a user, for example printed in the form of
machine-
readable text or numbers.
More than one such barcode or other feature may also be provided, collectively
making up the machine-readable security feature. In some cases, the various
identification codes might be represented individually (i.e. with a code or
symbol
for each identifier), whereas in other cases the identifiers may be combinedly
represented in one code or symbol (such as is the case in the above-mentioned
bar code).

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
16
For further improved security, the feature 20 may be rendered using security
ink,
such as an ink which is not perceivable to the human eye under usual lighting
conditions, for example a yellow invisible fluorescent ink, or a magnetic ink
(which may or may not be visible). The fact the code can be printed in
invisible
inks adds an additional level of security and complexity to any potential
fraudulent alteration or counterfeit attempts.
In this embodiment, the barcode 20 is printed onto page 12b opposite to the
MRP page 12a in a resolution that can be detected and read reliably by the
optical scanner of an ePassport page reader. Any software that is required for
decoding the barcode or other feature can be incorporated into the reader or
into
a computer system with which the reader communicates. The fact that the
decoder software is built into a passport reader makes reverse engineering of
the barcode decoder difficult. Since the feature 20 is machine-readable, the
process of checking and verification can be automatically performed.
The barcode 20 may be read by a dedicated application installed on the
passport reader; this would read the barcode, decode the information and then
check that all the data matched with that detected elsewhere (from the
selected
security elements 15 to 18). Although this process could be done on the front
desk, at an immigration point, it is more likely to be implemented as a back
office
check as it may require two separate scans of the passport (e.g. the MRP page
12a and adjacent page 12b in the above embodiment) and/or more sophisticated
detection methods for detecting each of the identifiers from the security
elements
15 to 18.
It should be noted that whilst the barcode has advantages, as noted above, the
use of a barcode is not essential. For example the feature 20 could comprise
scrambled indicia (e.g. the document data visually scrambled for reassembly by
a suitably programmed reader) or a digital watermark. Alternatively the
document data could be printed onto page 12b (or any other page) or stored in
some other way in the document 10 (e.g. in the RFID chip 18 or on a magnetic

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
17
strip). An extension to this would be to hold the document data centrally on a
database (as the information would be generated before or during
personalisation of the passport) together with the applicant's other biometric
and
biographic data, with the feature 20 containing a key code for looking-up the
relevant identifiers in the database. Information as to which identifier
should
correspond to which security element would be pre-programmed. This would
enable verification to take place against data held on a central database
rather
than in the passport itself.
In a second example, depicted schematically in Figure 4, the document 10'
(shown in daylight at 10'a and as a UV simulation at 10'b) is provided with
security elements 15' to 18' which correspond to those described in the first
example, the reference numerals having the addition of a prime ('). Here, the
passport number 17' is formed by laser perforation and includes a check symbol
(circled), and a further security element 19' is provided in the form of a
printed
number. Optionally, the second embodiment further includes an extra security
feature 30 provided by measuring a characteristic of the document 10'. This is
described in more detail below.
In this example, all of the security elements 15' to 19' are associated with
the
same identifier, "GB1234996". MRZ 15' includes "GB1234996" on the second
line of machine-readable text. The code 16a' provided on the laminate film is
also "GB1234996", as is the passport number both laser-perforated 17' and
printed 19' onto the document. The RFID chip 18' is programmed with the code
"G1234996" in its Datagroup 13 or Datagroup 1 sector, for example. The same
code "GB1234996" is stored in the document data embodied by the machine-
readable security feature 20', which in this case is a 2D barcode but could
take
any appropriate form as described in the previous example. The document data
could include the code repeated for each security element. However, since the
code is the same for all security elements 15' to 19', the code need only be
stored once in the machine-readable security feature 20', and can be checked
against each of the selected security features.

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
18
The first and second examples could also be used in combination with each
other, for example, a code common to a subset of the security elements (e.g.
passport numbers 17' and 19') could be stored alongside individual identifiers
for
other elements (e.g. the RFID chip 18' and the laminate code 16a').
The second embodiment also makes use of an optional security element 30 in
the form of a measured characteristic of the document 10'. In this case, the
characteristic is the surface roughness of the document substrate, which can
be
detected by laser surface analysis. It has been found that many document
substrates, such as paper, exhibit surface roughness at a microscopic level
which varies from place to place on the substrate, and between substrates
(even
those of the same type). Hence measuring and recording the surface roughness
of a defined area of a substrate is akin to recording a person's fingerprint.
Security element 30 therefore consists of a stored surface roughness profile
which has been measured for at least a portion of the surface of the document
10', preferably from a page other than that on which the feature 20' is
placed.
When a document requires authentication, laser surface analysis of the
specified
area is performed, and the result compared with that retrieved from the
document data in the machine-readable security feature 20'.
Other comparable measurements can also be used as security elements. For
example, the measurement could be taken from an element (including a printed
element) applied to the document 10' rather than the document itself. For
example, the exact dimensions of a line printed in invisible ink could be
recorded. Or, if there is a measurable variation in standard page dimensions,
weight or thickness, any one or more of these could be measured and recorded.
The scope of the number and/or type of security elements can be a large or
small as is required, and could for instance include such features as a laser
perforation check digit, laminate film number, taggant information (RFID chip
number) etc., as described above. The security elements selected will depend
on the application for which the document is intended. Further, it should be
noted that not all of the security elements provided on the document need be

CA 02739508 2011-04-04
WO 2010/040987 PCT/GB2009/002352
19
provided with an identifier and/or recorded in the machine-readable security
feature. For example, the document may additionally be provided with
holograms, embossings, watermarks or any other security elements which may
or may not be associated with an identifier recorded in the security feature.
Finally it should be noted that each identification code need not be
'programmed'
as such, into the respective security element. A first example is the use of a
measured characteristic of the document surface, identified as security
element
30 above. In another example, where one of the security element articles is an
RFID chip, its identifier can be descriptive of its contents, for instance if
the chip
contains three Datagroup sectors 1, 2 and 7, then this information can be
stored
in the machine-readable security feature as the identifier. If the chip is
substituted or the contents of the chip are modified (e.g. a Datagroup is
removed), this will be identified by checking the machine-readable feature.
Alternatively, the identifier could include a signature of some of the data in
the
RFID chip. The signature would be generated using the same key as that used
to sign the chip data and could be verified using the "Document Signer" key
stored in the chip. This is a digital certificate containing a public key
which can
be used to decrypt a digital signature and verify that it was encrypted with a
corresponding private key. The certificate will have been digitally signed by
a
trusted Certificate Authority and therefore can be validated for authenticity.
Similar 'descriptive' unique identification codes can be generated for any of
the
security elements.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Inactive: First IPC assigned 2016-02-09
Inactive: IPC assigned 2016-02-09
Inactive: IPC assigned 2016-02-09
Inactive: IPC assigned 2016-02-03
Inactive: IPC assigned 2016-02-03
Inactive: IPC removed 2016-02-03
Inactive: IPC expired 2016-01-01
Inactive: IPC removed 2015-12-31
Inactive: Dead - RFE never made 2015-10-02
Application Not Reinstated by Deadline 2015-10-02
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2015-10-02
Inactive: Abandon-RFE+Late fee unpaid-Correspondence sent 2014-10-02
Inactive: IPC expired 2014-01-01
Inactive: IPC removed 2013-12-31
Inactive: Correspondence - PCT 2011-10-11
Inactive: Cover page published 2011-06-06
Inactive: IPC assigned 2011-05-23
Application Received - PCT 2011-05-23
Inactive: First IPC assigned 2011-05-23
Inactive: Notice - National entry - No RFE 2011-05-23
Inactive: IPC assigned 2011-05-23
Inactive: IPC assigned 2011-05-23
National Entry Requirements Determined Compliant 2011-04-04
Application Published (Open to Public Inspection) 2010-04-15

Abandonment History

Abandonment Date Reason Reinstatement Date
2015-10-02

Maintenance Fee

The last payment was received on 2014-09-11

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Basic national fee - standard 2011-04-04
MF (application, 2nd anniv.) - standard 02 2011-10-03 2011-09-21
MF (application, 3rd anniv.) - standard 03 2012-10-02 2012-09-07
MF (application, 4th anniv.) - standard 04 2013-10-02 2013-09-10
MF (application, 5th anniv.) - standard 05 2014-10-02 2014-09-11
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
DE LA RUE INTERNATIONAL LIMITED
Past Owners on Record
STEPHEN BANISTER GREEN
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2011-04-03 1 70
Description 2011-04-03 19 879
Claims 2011-04-03 6 216
Representative drawing 2011-04-03 1 21
Drawings 2011-04-03 4 142
Reminder of maintenance fee due 2011-06-05 1 114
Notice of National Entry 2011-05-22 1 196
Reminder - Request for Examination 2014-06-02 1 116
Courtesy - Abandonment Letter (Request for Examination) 2014-11-26 1 164
Courtesy - Abandonment Letter (Maintenance Fee) 2015-11-26 1 174
PCT 2011-04-03 10 443
Correspondence 2011-10-10 3 83