method for verifying security document as well as a security document, device and security element
专利摘要:
The present invention relates to a method for verifying a security document (1) by means of a reading device (2), characterized in that first transmission and / or reflection properties of a first region (3) of the security document (1) are detected in a first spectral range by the reading device (2) and a first data set specifying these properties is generated from it, wherein the first region (3) at least in some regions overlaps an element of optical security (1a, 1b) provided in security document (1) or incorporated in security document (1), wherein second transmission and / or reflection properties of the first region (3) of security document (1) are detected in the second spectral range by the reading device (2) and a second data set specifying these properties is generated from it, wherein the first spectral range differs from the second spectral range, where the authenticity is The security document (1) and / or security element (1a, 1b) is checked against at least the first data set and the second data set. 公开号:BR112019012094A2 申请号:R112019012094-7 申请日:2017-12-13 公开日:2019-10-29 发明作者:Grau Michael;Hoffmann Michael;Staub René;Frieser Uwe 申请人:Kurz Digital Solutions Gmbh & Co Kg;Ovd Kinegram Ag; IPC主号:
专利说明:
Invention Patent Descriptive Report for METHOD TO CHECK SECURITY DOCUMENT, AS WELL AS SECURITY DOCUMENT, DEVICE AND SECURITY ELEMENT. [0001] The invention relates to a method for verifying a security document, as well as a security document, a device and a security element. [0002] Automated document controls are becoming increasingly widespread. Thus, for example, ePassport, Automated Border Control (ABC) or Automated Passport Control (APC) ports are known. Instead of having documents checked manually, users use self-service machines. Users place their identification documents, travel documents or boarding passes inside or on top of the machine and the machine reads the document. [0003] In automated document control, standard verification devices with particular lighting and viewing settings are preferably used. During automated verification and verification of the trip or identification document for authenticity and if the holder is the legitimate holder, in particular the biometric data of the chip and the machine-readable data in the document are used. Such a device is described in DE 10 2013 009 474 A1. [0004] Optical security elements, in particular diffractive security elements, such as holograms, which represent a recognizable protection against manipulation for the human observer, generally cannot be recognized or detected by means of this machine detection. To make matters worse, in the presence of diffractive security elements, the illumination light is diffracted in the chamber and the ability to recognize machine-readable customizations located below or other machine-detectable features is reduced or entirely avoided. Petition 870190054494, of 06/13/2019, p. 28/133 2/81 [0005] The aim of the present invention, then, is to improve the verification of the security document mechanism. [0006] The objective is achieved by a method, according to claim 1 as well as by a security document, according to claim 62, a device, according to claim 63 and a security element, according to claim 67. [0007] Such a method for verifying a security document by means of a reading device is characterized by the fact that the first transmission and / or reflection properties of a first region of the security document are detected in a first spectral band by the device of reading and a first set of data specifying these properties is generated from it, in which the first region overlaps at least in some regions an optical security element provided in the security document or incorporated in the security document, in which second transmission properties and / or reflection of the first region of the security document is detected in a second spectral band by the reading device and a second set of data specifying these properties is generated from it, in which the first spectral band differs from the second spectral band and in which authenticity of the security document and / or the security element is checked each based on at least the first data set and the second data set. [0008] The device, in particular, reading device, for checking a security document is characterized by the fact that it has a piece of sensor equipment that is designed so that it detects first transmission and / or reflection properties of a first region of the security document in a first spectral range and generates a first set of data specifying these properties of the document, in which the first region overlaps at least in al Petition 870190054494, of 06/13/2019, p. 29/133 3/81 in some regions an optical security element provided in the security document or incorporated in the security document, in which the sensor equipment is further designed so that it detects second transmission properties and / or reflection of the first region of the security document in the second spectral band and generates a second set of data specifying these properties of it, in which the first spectral band differs from the second spectral band, and in which the device has a piece of analysis equipment that is designed so that it verifies authenticity of the security document and / or the security element based on at least the first data set and the second data set. [0009] It is thus achieved that security documents and / or security elements, in particular, regions of security documents and / or security elements containing security features, in particular, identification documents of all types, in particular , travel documents, security, notes, payment instructions, certificates, etc., can be checked for authenticity through automated document control, and the protection against counterfeiting of security documents is further enhanced here. [0010] Advantageous embodiments of the invention are described in the appended claims. [0011] An optical security element is a security element that generates an item of optical information that is identifiable to the human observer, in particular optically variable information. For this, it may also be necessary to use auxiliaries such as an enlarger or a UV lamp (UV = ultraviolet, ultraviolet light). An optical security element here preferably consists of the transfer canvas of a transfer film, a laminating film or a film element, in particular in the form of a wire Petition 870190054494, of 06/13/2019, p. 30/133 4/81 security. The security element here is preferably applied to the surface of the security document and / or at least partially incorporated in the security document. [0012] Furthermore, it is possible that the security document does not have only one optical security element, but several optical security elements, which are preferably formed differently and / or are introduced differently to the security document and / or applied to the security document. safety. Optical security elements here can be applied to an upper side of the security document over the entire surface, be completely embedded between layers of the security document, but still be applied to an upper side of the security document only on part of the surface, in particular, in the form of strips or threads or in the form of a patch, and / or embedded in a layer of the security document. The security document carrier substrate in the region of the optical security element preferably has a through hole or window region, with the result that the security element can be seen optically both in the light reflected from the front and rear side of the security document and in transmitted light. [0013] The detection of the transmission and / or reflection property of a security document region at least partially comprising the security element in different spectral bands makes it possible to improve the authenticity detection capabilities of the security feature machine because of different appearances and to eliminate possible disturbing properties of optically active elements and, in particular, optically variable elements of the security element. This can be further improved in that not only two, but still three, four or more spectral bands differing from each other can be defined, in which the transmission properties Petition 870190054494, of 06/13/2019, p. 31/133 5/81 and / or reflection of the first region of the security document are detected by the reading device. [0014] In addition, the reading device can issue an item of information about authenticity, in particular, an assessment of authenticity, the security element or the security document. The assessment of the authenticity of the security element can be issued by the reading device as a level of probability and / or confidence, which preferably quantifies the assessment of authenticity, in particular, authenticity. [0015] Thus, the third and / or fourth transmission and / or reflection properties of the first region of the security document can be detected in a third spectral band or in a fourth spectral band by the reading device and a third data set or a a fourth set of data specifying these properties can be generated from it, in which the third or fourth spectral range differs from the first and the second spectral range. The authenticity of the security document is then advantageously verified on the basis of at least the first, second, third and / or fourth data set. [0016] By detecting transmission and / or reflection properties in three or more different spectral bands, it can be guaranteed that one or more spectral features inherent in the security element are safely detected, whereby the verification of authenticity is improved. Appearances that should only be placed in a specific spectral range can thus be reliably detected and used for verification of authenticity. [0017] The transmission and / or reflection properties of the first region are detected by the reading device preferably in the light reflected from the front side of the security document, in the light reflected from the back side of the security document and / or in the transmitted light. In the case of detection of reflected light from the front or rear side the document Petition 870190054494, of 06/13/2019, p. 32/133 6/81 security here is preferably irradiated, in each case, by a reading device on the front or rear side and the image showing in the reflection is detected by means of one or more sensors of the reading device, which are similarly arranged on the front or rear side of the security element. Alternatively, a first detection can be carried out on one side, the document can be turned and then the detection is carried out on the other side. With the help of specific features, such as an external document format or a window format, the two detected sides or the front and rear sides are joined together electronically. In detecting the transmission property of the first region in the transmitted light, the light sources and one or more of the sensors of the reading device are preferably arranged on different sides of the security document. [0018] Thus, for example, the first, second, third and / or fourth transmission and / or reflection properties of the first region of the security document are detected in the first, second, third and / or fourth spectral band for reading device on the sides of the front side of the security document in reflected light, on the sides of the back side of the security document in reflected light and / or in transmitted light. A first, second, third or fourth data set specifying these properties is generated from it by the reading device. The first, the second, the third and / or the fourth data set preferably comprise the transmission and / or reflection properties of the first region not only in a single lighting / observation situation, but in two or more lighting / observation situations . For example, the first, second, third and / or fourth data set can thus specify the reflection property of the first region in the light reflected from the front side and the rear side in the respective spectral range, specifying the reflection property of the first Petition 870190054494, of 06/13/2019, p. 33/133 7/81 region in the light reflected from the front or rear side as well as the transmission property in the light transmitted in the respective spectral band, and specify the reflection property of the first region in the light reflected from the front and rear side as well as the transmission property in the transmitted light in the respective spectral range. [0019] Through a corresponding detection of the transmission and / or reflection property of the first region and the use and / or comparison of these data, the margin of error, in particular, in relation to the declaration of authenticity, in particular, in relation to wear and / or contamination of the security document can be further improved and, in addition, the recognition of forgeries or manipulations can be further improved. [0020] Through the use of spectral bands that lie in the wavelength range not visible to the human observer, interruptions in the detection of the machine due to optically active elements of the security element, in particular, optically variable elements of the security element, can be recognized by corresponding comparison and eliminated on machine detection. The margin of error and the result of the check can still be improved here. [0021] Data sets for the front side are preferably compared with data sets for the back side. In order that the transmission and / or reflection properties of the front and rear sides can be detected, it may be necessary to turn the document on the reading device. [0022] The first, second, third and / or fourth spectral range is preferably selected from the group: an IR range (IR = infrared, infrared light) from electromagnetic radiation, in particular, the wavelength range from 850 nm to 950 nm, a range of VIS (VIS = light visible to the naked eye of a human) of electromagnetic radiation, in particular, the wavelength range from 400 nm to 700 nm, and Petition 870190054494, of 06/13/2019, p. 34/133 8/81 the UV range of electromagnetic radiation, in particular, the wavelength range from 1 nm to 400 nm, preferably from the 240 nm to 380 nm range, still preferably from the 300 nm to 380 nm range. [0023] The security element of the security document preferably comprises one or more security features. The first region here is preferably defined so that it at least partially overlaps one or more of the security features of the security element, preferably overlaps at least two security features of the security document. Furthermore, it is possible that the security document also has another one or more security features, which are arranged overlapping or partially overlapping with the first region. Such security features of the security document can consist, for example, of colored fibers, a base printing film or a metallic thread. Base film printing can have more security features and at least in partial regions, be drawn, for example, fluorescent under UV radiation or contain an IR converter or be drawn partially transparent or opaque in the IR range. As a physical process, an IR converter uses the sequential absorption of at least two photons, in particular IR photons or electromagnetic waves in the infrared wavelength range, then, in order to re-emit the absorbed energy thus accumulated in an emission subsequent photon, in particular a VIS photon or an electromagnetic wave in the visible wavelength range, where the wavelength of the emitted photon or the wave is less than the respective wavelength of at least two photons or electromagnetic waves absorbed. The print can, in particular, be in the form of a machine-readable encoding, for example, a barcode or machine-readable recording. Petition 870190054494, of 06/13/2019, p. 35/133 9/81 [0024] If several security features are present in the first region, then they overlap, preferably at least in some regions. However, it is still possible for security features to be arranged spaced apart from each other in the first region or to unite, in particular, they are in direct contact with each other when observed in reflected light and / or transmitted light. [0025] By comparing the first and second data sets and optionally a third and fourth data sets, one or more relative values for two or more security features of the security element are determined. [0026] Thus, for example, the relative position, in particular, the spacing of two or more security features of the security elements and / or the security document with respect to each other, is determined as a relative value of these data sets . [0027] In addition, the relative size of two or more security features of the security element and / or security document can be determined as a relative value. [0028] In addition, the relative formation of two or more security features of the security element and / or security document with respect to each other can be determined as a relative value. Thus, in particular, the accuracy of recording the orientation and formation of image elements of the two or more security features is determined by comparing the data sets. [0029] Registration or precision of registration or precision of registration is understood as an editorial precision of two or more elements and / or no communication between them. The registration accuracy is to vary within a given tolerance, which is as small as possible. At the same time, accurate registration of various elements and / or languages between configurations is an important feature to increase con Petition 870190054494, of 06/13/2019, p. 36/133 10/81 process reliability. Differentiated positioning can be carried out, in particular, by means of sensory signals, preferably optically detectable, or registration marks. These registration marks may represent separate special elements and / or regions and / or parts of the elements and / or regions and / or areas to be placed. [0030] Furthermore, the relative coverage and / or relative orientation and / or relative size of two or more security features of the security element and / or security document with respect to each other can be determined as a relative value by comparing the data sets. [0031] The relative values of the two or more security features determined by the comparison are still preferably compared with allocated reference values and authenticity is denied if the deviation falls outside an allocated tolerance range. [0032] Several advantages are achieved through this procedure. Through the use of relative values and non-absolute values, the corresponding verification is much less susceptible to large deviations from “ideal” measurement conditions occurring in practice. It is thus possible, for example, to eliminate measurement deviations that are caused, for example, by contamination and / or wear of the security document and / or the reading device and / or by a defective calibration of the reading device. Also, the recognition of counterfeits can also be clearly improved here: thus, first, it is difficult for the counterfeiter to achieve a correspondingly accurate provision of registration and the formation of different security features in a counterfeit, due to the inaccuracy of registration of the counterfeiting methods. production used that. Because of the determination of corresponding relative values, it is possible, for the reasons above, to clearly reduce, in particular, the tolerance range compared to a comparison of absolute values and thus still to safely detect deviations Petition 870190054494, of 06/13/2019, p. 37/133 11/81 still light. This results in a clear increase in the detection of counterfeits. [0033] In order to verify the authenticity of the security document, in particular, the following steps can thus be performed: [0034] The disposition of the position and / or formation of a first security feature of the security element is determined by means of the first data set. The position and / or arrangement of a second security feature of the security element is determined by means of the second data set. The determined position arrangements and / or formations are then preferably compared with each other in order to determine the relative position arrangement, in particular spacing, relative size, relative formation, in particular, the accuracy of recording the orientation and formation of image elements, coverage and / or orientation of the two security features of the security element in relation to each other. In addition, the positioning and / or formation of a third and / or fourth security feature of the security element are advantageously determined by means of the third or fourth data set respectively. These can then also be compared with each other in an additional step. [0035] Security features preferably have, in each case, one or more image elements or image regions and, in addition, ideally a background region surrounding the image elements. A security feature advantageously comprises one or more different image elements, which are formed, in particular, as flat elements and / or line elements. The image elements of different security elements preferably become detectable or undetectable under lighting in the different spectral bands and / or produce a predetermined contrast, in particular, to the background region. Petition 870190054494, of 06/13/2019, p. 38/133 12/81 [0036] The security features are still preferably designed so that in at least one of the spectral bands detected by the reading device, in particular, in the first, second, third and / or fourth spectral band, a contrast between the image elements and the background region is generated on reflection and / or transmission. [0037] Contrast in reflection and / or transmission means, in particular, a difference in lightness and / or a difference in color. In the case of a difference in lightness, the contrast is preferably defined as follows: K = (Lmax ~ Lmin) / (Lmax + Lmin), where Lmax and Lmin correspond to the lightness of the background, or respectively of the security feature, or vice versa, depending on whether the lightness of the security element or plane bottom is lighter. The contrast values are preferably between 0 and 1. [0038] Alternatively, a contrast with respect to a difference in lightness can be defined as follows: K = (Background lpiano - Lrscurso) / (Background lpiano + Lpecurso). The value range is now preferably between -1 and +1. An advantage of this definition is, in particular, that a “contrast inversion” also involves a change in the signal. [0039] When evaluating a difference in contrast and / or a difference in color and / or appearance in the case of paints, it should be considered, in particular, that there are different possibilities for the creation of colored drawings. The absorbent power of the material that is printed, and / or the fillings in the ink, which result in greater or lesser dispersion, depending on the refractive index of the respective ink, and / or also on the type of reflective layer that is behind or in front ink, has an effect on color printing. The type of lighting and / or the direction can also have a marked influence on the reflection and / or transmission behavior of a color impression. In addition, there is Petition 870190054494, of 06/13/2019, p. 39/133 13/81 inks that preferably give the same illuminated impression at different angles and that alter the color impression in particular depending on the illumination and the angle of illumination, such as, for example, interference pigments and / or liquid crystals. [0040] A colored layer can be substantially transparent in the VIS range because of thin paints or pigments. This means that the colored layer preferably absorbs certain bands of the spectrum in different extensions, but only disperses to a lesser extent. In the case of illumination and observation in reflected light, the colored layer thus, in particular, does not reflect or reflects only to a very small extent. Color printing results from radiation dispersed back onto the document substrate, which is filtered through the colored layer. [0041] However, a layer of color in particular can also contain pigments that spread strongly. This is called, in particular, opaque ink. In this case, the radiation scattered back is substantially independent of the substrate of the document. [0042] Colored layers that represent a mixed shape are also possible and are generally called translucent. [0043] Inks are generally described by hue, its lightness and saturation, which can be represented with coordinates in a three-dimensional color space, e. RGB or Lab. In the case of the Lab color space, the green and red colors are opposite each other on the a axis, with yellow and blue on the b axis, and L describes a luminance value between 0 and 100. The distance between these coordinates it must be large enough that a color sensor can recognize a color distance or color difference, in particular the color contrast. This color distance is denoted by ΔΕ and is calculated according to ISO 12647 and ISO 13655 as the Euclidean distance: Petition 870190054494, of 06/13/2019, p. 40/133 14/81 ~ ™ ΜΓ Έ (& ρ ô4) 4 · (¾ δφ) * L p , a P , b P mean the color value of one color value, L v , a v , b v for the color value of another color value, forming the color distance ΔΕ. A distance from the color ΔΕ should be greater than or equal to 3, preferably greater than or equal to 5, still preferably greater than or equal to 6. [0044] Other color spaces are, for example, Luv or HSV. In image analysis for resource recognition and image segmentation, the HSV color space is preferably used, which is derived from the RGB color space. Here, H stands for hue, S for saturation and V for value (intensity), which are arranged in a cylindrical coordinate system. The hue here is arranged in the circle and the position of a hue is indicated in degrees. To recognize a color deviation, for example, from green, the H tint should deviate from the setpoint value defined in a 360 ° tint circle by at least 10 °, preferably at least 20 °, still preferably at least 30 ° , with a tolerance range of 20 °, preferably 40 °, still preferably 60 °. Saturation S has a value of at least 100, in particular, at least 75, preferably at least 50, in a preferred value range of 0 to 255. Saturation S is particularly preferably at least 39%, in particular, at least 29%, particularly preferably 19.5%, of a value range. The value (intensity) V has a value of at least 70, in particular, between 70 and 120, preferably between 80 and 130, in a preferred value range between 0 and 256. The value (intensity) V is particularly preferably at least 27%, in particular, between 27% and 47%, still preferably between 31% and 51%, of a value range. [0045] Still, it is advantageous if the contrasts and / or distances of the color, Petition 870190054494, of 06/13/2019, p. 41/133 15/81 in particular, color contrasts between the image elements and the background region of a security feature in a first of the spectral bands differs sufficiently from the contrast or distance of the color in a second of the spectral bands, in particular , differs by at least 5%, preferably by at least 10%. An ability to recognize separately from the security feature by the reading device is improved here and an improved detection of counterfeits is thus guaranteed. [0046] The image elements and the background regions of the security element preferably have a difference in reflection and / or transmission greater than 5%, in particular, more than 10%, and in particular, they are between 15% and 100%, preferably 25% and 100%, in the first, second, third and / or fourth spectral range. [0047] The maximum scope captured from the luminosity values comprises, in particular, 256 stages of lightness. In the case of another, in particular a higher resolution, the number of lighting phases available may change. [0048] The contrast, in particular, the contrast of lightness and / or color, between image elements and background region in at least one of the first, second, third and / or fourth spectral band in light reflected and / or transmitted light is advantageously greater than or equal to 5%, preferably 8%, still preferably 10%. The contrast, in particular, the contrast of lightness and / or color, between image elements and background region in at least one of the first, second, third and / or fourth spectral band in the reflected light and / or transmitted light may, however, also be less than or equal to 95%, preferably 92%, still preferably 90%. [0049] A security feature of the optical security element or at least one image element is preferably formed by a partially formed metal layer, preferably by a Petition 870190054494, of 06/13/2019, p. 42/133 16/81 metallic reflective layer. The partially formed metal layer preferably consists of Al, Cu, Cr, Ag, Au or respective alloys. The metallic layer can be applied by printing, for example, a printing substance having one or more metallic pigments and / or spray deposition and / or thermal vapor deposition. Partial metallization is advantageously produced by partial printing and / or engraving and / or by a removal process, in particular using a soluble varnish as a resistance, and / or a photolithographic method. The partial metallic layer can, however, also be produced, in particular, by local removal by means of a laser. The partially molded metallic layer can also be a partial element of an RFID component (RFID = radio frequency identification), for example an antenna made of copper. [0050] A partially modeled metallization is, in particular, clearly recognizable under IR illumination and can thus be correlated with other regions. In addition, there is also the possibility that particular structures, in particular matte structures with an HRI layer (HRI = High Refraction Index), are arranged in the background and are recognizable under IR or VIS lighting and can be used as a reference for to perform an authenticity check. Particular structures can, in particular, also be arranged in the metallization region, with the result that they are preferably also recognizable under IR or VIS lighting and, therefore, can be used as a reference. [0051] It is likewise possible to use a metallic reflective layer and an HRI layer in combination. [0052] At least one security feature of the optical security element or an image element is advantageously formed by a colored layer. High recognition reliability can be achieved here. Petition 870190054494, of 06/13/2019, p. 43/133 17/81 [0053] It is advantageous if the colored layer in the first spectral band is formed substantially transparent in the first, second, third and / or fourth spectral band. For this, the colored layer preferably has a transmittance of at least 50%, in particular, greater than 80%, ideally greater than 90%, in the respective spectral range. [0054] The colored layer can have a transmittance in the second spectral range of a maximum of 50%, in particular, of a maximum of 25%. Keep in mind that these values may also refer to only a partial range of the second spectral range. Thus, in particular, the VIS range is wide-ranging and is preferably detected as an RGB image by a color camera. [0055] In addition, it is still possible that the colored layer is formed or appears luminescent. The ideally colored layer consists of several paints. [0056] The colored layer can be excited by radiation from the second and / or third spectral band, in particular, under UV lighting and / or VIS lighting. It is advantageous if the colored layer is formed so that a colored print is recognizable under different illuminations, for example, under VIS and / or UV. [0057] The colored layer can be a partially formed colored layer. It is also conceivable that the colored layer consists of a base varnish with mixed paints and / or pigments. In addition, the colored layer may have optically variable pigments and / or magnetically detectable pigments. The colored layer can be dried on a solvent base and / or thermally dried and cured by means of UV radiation and / or chemically cured. [0058] The color layer can preferably be inserted as a resistance to etching. For this, they are based in particular on the base of PVC and / or PVAC copolymer (polyvinyl acetate), in which Petition 870190054494, of 06/13/2019, p. 44/133 18/81 they preferably have dyes and / or pigments, in particular multicolored or achromatic pigments and / or effect pigments. [0059] The color layer can be deposited using a usual printing method. Offset printing, canvas, engraving, pad, relief printing and / or letterpress printing can be used to apply the ink. In addition, it can also be applied by means of a digital printing method, in particular by means of inkjet printing or by means of toner and / or liquid toner. [0060] At least one security feature may preferably also have features or properties that become recognizable or visible, in particular, in the UV range or by means of UV lighting. These features bring, in particular, an additional level of verification, by which the automated inspection capability can be better used. [0061] The security feature of the security element can be formed by a relief structure and a reflective layer, in which the relief structure deflects the incident radiation by default, in particular, in at least one of the spectral bands. It is advantageous if the reflecting layer is or appears transparent or substantially transparent in at least one of the spectral bands, that is, it has a transmittance greater than 50%, preferably greater than 70%, and / or has a reflection less than 50%, preferably less than 30%. The reflective layer is preferably formed by an HRI layer, in particular, a layer made of ZnS (zinc sulfite) and / or TiO2 (titanium dioxide). [0062] The relief structure is preferably formed by a relief structure with optically variable properties and / or comprises one or more of the following relief structures: diffraction grid, asymmetric diffractive structure, isotropic matte structure, anisotropic matte structure, flaming grid , zero order diffractive structure, Petition 870190054494, of 06/13/2019, p. 45/133 19/81 reflective structures of light and / or focus, in particular, microprisms, microlenses. A particularly reliable check of the security feature and thus of the document can also be guaranteed. [0063] The relief structure is advantageously due to a diffraction structure that diffracts the electromagnetic radiation incident in one of the first, second, third and / or fourth spectral band in a predetermined form so that part of the radiation is incident at least in one detector, and yet electromagnetic radiation is not or is substantially non-incident in at least one detector in another of the first, second, third and / or fourth spectral bands. [0064] The diffraction structure is advantageously formed by a zero order diffraction structure for at least one spectral range. The period of the diffraction structure is preferably below the wavelength of the visible range. In particular, it is 500 nm or less. The ideally shaped diffraction structure has a color effect typical of them in visible light. [0065] The structure preferably dispersed or diffracted in at least one detector both under VIS illumination and under IR illumination. [0066] To determine the relative formation of the first and the second security feature, the formation of the image elements of the first and the second security feature is preferably checked for whether the image elements are arranged with record accuracy with respect to each other , in particular, if image elements formed as lines merge in a positively precise shape and / or combine with respect to their inclination. [0067] According to the invention, the image elements can be, among other things, graphically drawn sketches, figurative representations, images, visually recognizable design elements, symbols, logos, portraits, patterns, alphanumeric characters, text, colored drawings , etc. Petition 870190054494, of 06/13/2019, p. 46/133 20/81 [0068] The data sets are preferably the raw images of the first region and / or the security elements and / or security features or their image elements, which the reading device registers in the respective spectral range. They can, in particular, be grayscale images or color images. A greyscale image can, in particular, comprise one or more, preferably all, the color channels and / or the hue of an image. [0069] The first, second, third and / or fourth data set is preferably subjected to image processing. [0070] In the following, different image processing steps are described that are preferably used to analyze the data sets and, in particular, to verify the authenticity of the security document and / or the security element on the basis of the first and the second. second data set. The different steps can be combined with each other depending on usage, and one may sometimes require the other. [0071] The basis of image analysis is, in particular, an image preparation stage in which the image is adapted and pre-processed for feature recognition, in particular feature recognition and image segmentation. [0072] By characteristic it is preferably a distinct or interesting point of an object or image element, in particular a corner or an edge. The point can be described in particular with reference to its periphery and can thus be clearly recognized or found again. [0073] A preferred step is to convert the raw images, preferably to a gray scale image. In the case of a grayscale image, each pixel or image point preferably consists of a brightness value between 0, which is allocated for black, and 255, which is allocated for white. Petition 870190054494, of 06/13/2019, p. 47/133 21/81 If the image has only a small range of brightness values, the brightness of the image can be transformed by multiplying, for example, the brightness value of each pixel by a factor or performing a histogram comparison. For color image processing, the color channels of each image point are preferably first converted to a gray scale value or a luminance value. [0074] For a first determination of position, the gray scale image available is preferably analyzed by means of model matching (model matching step). [0075] By model matching applications we mean, in particular, algorithms that identify parts of an image or motif, in particular, image elements of a security feature that corresponds to a predefined image or motif of the model. The model is preferably stored in a database. The picture elements or picture objects are preferably checked at their picture point by picture point for a match with a reference image or reference reason. If the number of points, that is, the image points and / or reference points, is very large, the number of reference points can be reduced, in particular, by reducing the resolution of the subjects or images. The purpose of the algorithm is to find and find the highest match of the reference image or reference reason within the respective data set. [0076] Grayscale images are advantageously binarized with a threshold in an image pre-processing step. [0077] One or more threshold values are advantageously determined by an algorithm, in particular, the k mean algorithm. Here, the object of the k-mean algorithm is a group analysis in which pixels Petition 870190054494, of 06/13/2019, p. 48/133 22/81 with a lightness value below one or more threshold values are preferably defined as black and all others are defined as white. The determination of a black image is, in particular, carried out by means of the following steps: comparison of the lightness values of the point data of the image of the allocated data set with a first threshold value, in which all the image points that are below of the first threshold value are allocated by the binary value 0, in particular, they are defined as black. The definition of the threshold value is carried out, in particular, on the basis of information regarding the recognized resource or type of document, which is stored in a first region of the security document and / or security element. [0078] The first threshold value is advantageously less than 20% of the value range in the UV range as an allocated spectral range. In particular, the first threshold value is less than 40 in the case of a value range from 0 to 255. [0079] In the IR range as an allocated spectral range, the first threshold value is preferably less than 25% of the value range, in particular, the first threshold value is less than 60 in the case of the value range from 0 to 255. [0080] A white image is preferably determined from the data set allocated by calculating a constant binary image. To determine the white image, the following steps, in particular, can be performed: comparison of the lightness values of the point data of the image of the allocated data set with a second threshold value, in which all the points of image that are above the second threshold value are allocated by binary value 1, in particular, they are defined as blank. [0081] In the UV range as an allocated spectral range, the second threshold value is advantageously greater than 5% of the value range, in particular, the second threshold value is greater than 20 in the case of a value range Petition 870190054494, of 06/13/2019, p. 49/133 23/81 from 0 to 255. [0082] In the IR range as an allocated spectral range, the second threshold value is preferably greater than 30% of the value range, in particular, the second threshold value is greater than 80 in the case of a value range from 0 to 255. [0083] The first and second threshold values preferably differ from each other. [0084] The difference between light and dark is preferably greater than 80 in the IR range, in particular, in the case of an IR image, and greater than 20 in the UV range, in particular, in the case of a UV image. [0085] To calculate the edge image, a threshold algorithm, in particular an adaptive threshold algorithm with a large block size, can be applied to the allocated data set. The adaptability of the threshold algorithm here refers in particular to one or more regions of the image and / or one or more pixels of the image. This incorporates local changes in the background clarity in the calculation. Thus, it can be ensured that the borders present are correctly recognized. [0086] To produce the threshold image, the following calculations are performed: - calculation of a margin image of the allocated data set, - calculation of a black image of the allocated data set, - calculation of a white image of the allocated data set. [0087] The steps can be performed in the indicated sequence or in a sequence deviating from it. In addition, the calculation of the threshold image is performed by combining the margin image, the black image and the white image. Petition 870190054494, of 06/13/2019, p. 50/133 24/81 [0088] A margin image is preferably first multiplied by the black image at the image point or pixel level. All black regions of the black image are now also black in the border image. A black margin image is thus obtained. In an additional step the white image is added to the black margin image. All the image points or pixels that are white in the white image are now also white in the black border image. As a result, a finalized threshold image is obtained. [0089] The first and / or second threshold value can be set depending on the type of document recognized, in the recognized lighting and / or in the spectral range. It is thus possible to adapt the threshold value precisely to the respective situation and thus be able to carry out the best possible verification. [0090] The reverse procedure is also conceivable. Color channels can originate from different color spaces, for example, the RGB color space or the HSV color space. [0091] The threshold images present can still be pre-processed and / or segmented in additional image processing steps to recognize the details of the image through different filters. [0092] If filters are used, in particular the image points are manipulated depending on the neighboring pixels. The filter preferably acts as a mask, in which, in particular, the calculation of an image point is indicated, depending on its neighboring image points. [0093] A low-pass filter is used to advantage. The low-pass filter, in particular, ensures that changes in high-frequency or high-contrast values, such as image noise or hard edges, are suppressed. The image of the security feature in the respective data set is therefore faded or blurred, Petition 870190054494, of 06/13/2019, p. 51/133 25/81 and looks less sharp. For example, locally large contrast differences are thus changed to locally small contrast differences in each case, e.g. a white pixel and a black pixel neighboring each other become two gray pixels or also identical. [0094] In addition, bilateral filters can also be used. This is a selective soft focus lens or low pass filter. In particular, flat regions of the security element with medium contrasts are shown in soft focus, but at the same time strong contrasting region or subject borders are obtained. In the selective soft focus image, the brightness values of the image points in the vicinity of an initial image point are preferably integrated into the calculation depending not only on their distance, but preferably also on their contrast. The middle filter represents an additional possibility of noise suppression. This filter also obtains contrast differences between neighboring regions, while reducing high-frequency noise. [0095] There is also a range of filters different from those described here, as for example. Sobel operator, Laplace filter or filtering within a frequency domain into which the image was previously converted. Frequency domain filtering (transformation is usually performed with the fast Fourier transform) offers advantages, such as an increase in efficiency during image processing. [0096] Filters and filter operations are preferably also used for edge analysis and edge detection and / or elimination of image interference and / or smoothing and / or reducing signal noise. [0097] To recognize and discover details of the image, the pre-treated images must be divided or segmented into significant image regions. There are several approaches to this. Petition 870190054494, of 06/13/2019, p. 52/133 26/81 [0098] The basis of a segmentation can preferably be an edge detection by means of algorithms that recognize the edges and the object transitions. High-contrast edges can be located within an image with different algorithms. [0099] These include, among other things, the Sobel operator. The algorithm uses a convolation through a convolation matrix (filter kernel) that produces a gradient image of the original image. With these, high frequencies in the image are represented with gray scale values. [00100] The regions of greatest intensity are where the lightness of the original image changes most strongly and therefore represents the largest edges. The direction of the edge's progression can also be determined with this method. [00101] The Prewitt operator, which, in contrast to the Sobel operator, does not additionally weigh the observed image lines or image columns, works in a similar way. [00102] If the edge direction is not relevant, the Laplace filter, which approaches the Laplace operator, can be applied. This forms the sum of the two pure or partial secondary derivatives of a signal. [00103] If only exact pixel edges are sought and not the edge strength, the Canny algorithm, which marks the contours, is useful. [00104] Another segmentation is preferably carried out by means of characteristic detectors and characteristic descriptors, in which, preferably, the Accelerated KAZE (A-KAZE) algorithm (Japanese kaze ~ for wind) is applied. A-KAZE is, in particular, a combination of a resource detector and a resource descriptor. [00105] Preferably, in a first step, distinct points on the objects or image elements of the reference image, which is preferably stored in a database, and the image elements to be checked are searched by means of detector A Petition 870190054494, of 06/13/2019, p. 53/133 27/81 KAZE based on several different image filters. These points are described by the descriptor A-KAZE in particular with reference to their surroundings. A feature described with the descriptor A-KAZE advantageously consists of an encoded, but clear, data volume, in particular with a defined size or length and / or the coordinates. [00106] A characteristic combiner, preferably a brute force correspondent, advantageously compares the descriptions of the characteristics to be compared in the two objects or image elements and forms pairs of characteristics whose descriptions correspond almost or completely. From this comparison, a result value can be calculated, which is a measure of the correspondence of the two resources. Depending on the size of the result value, you can decide whether the features are similar enough or not. [00107] Depending on the correspondence method, an upstream pre-selection or, alternatively, a point-to-point analysis, which can, however, be very time-consuming, can also occur. The transformation, thus, the scaling, displacement, elongation, etc., between the two images or image elements, can be calculated, preferably, from the compatible resources. In principle, however, it is also conceivable that the BRISK algorithm (BRISK ··· Binary Robust Invariant Scalable Keypoints) or the SIFT algorithm (SIFT = ScaleInvariant Feature Transform) is used as the algorithm. [00108] To approach or approach the shape and position of an object, enveloping bodies, in particular envelope curves, are preferably used in an additional step of image processing. [00109] In the simplest case, this can be a bounding box, a rectangle parallel to the axis, in particular a square, that surrounds the object. A bounding rectangle can be used in the same way that, in contrast to the bounding box, it does not need to be parallel to the Petition 870190054494, of 06/13/2019, p. 54/133 28/81 axis, but can be rotated. In addition, a bounding ellipse can be used. A bounding ellipse can approximate round objects, in particular curved objects, better than a rectangle, and is defined by the center point, radius and angle of rotation. More complex bodies can be approximated by means of a convex envelope or a surrounding polygon. However, processing these objects requires much more computation time than in the case of simple approximations. Because of the computational outlay, in each case, an object that is as simple as possible is therefore used here. [00110] One or more of the following steps are preferably performed in order to verify the authenticity of the security document and / or security element on the basis of the generated data sets, in particular, the first, second, third and / or fourth set of data: [00111] 1. Conversion of one or more of the raw images, preferably into one or more gray-scale images and / or color and threshold images, in particular calculation of one or more threshold and / or color preparation images . [00112] 2. Comparison of individual images, in particular raw, grayscale, color and / or threshold images with one or more models for verification, preferably by means of model matching. [00113] 3. Border detection in one or more images in each case, in particular raw, grayscale, color and / or threshold images. [00114] 4. Find the position of one or more objects in one or more images in each case, in particular in raw, grayscale, color and / or threshold images, by means of surrounding bodies and / or segmentation and / or recognition of one or more of the objects in Petition 870190054494, of 06/13/2019, p. 55/133 29/81 each case by means of one or more resource detectors and / or resource descriptors. [00115] 5. Comparison of one or more grayscale values and / or color values, in each case, of one or more of the images, in particular, raw, grayscale images and / or thresholds, with grayscale values and / or color values stored in a database. [00116] 6. Comparison of two or more of the images, in particular, two or more of the raw images, in gray scale and / or thresholds, in which, in each case, one or more, in particular, all, steps 1 through 5 were applied. The comparison of exchanges of one or more of the objects in individual images, in particular, in the raw, grayscale images and / or thresholds, in each case, by means of one or more bounding boxes or similar methods. [00117] 7. Comparison of the lightness values of, in each case, one or more of the superimposed images, in particular, raw superimposed images, in gray scale and / or thresholds, and one or more possible additional image analyzes. [00118] Advantageously, a security feature, in particular, a first security feature, comprises a first object consisting of one or more image elements. [00119] The first security feature preferably has a metallic layer, in which the metal of the metallic layer is provided in the region of the image elements, and no metallic layer is provided in a background region surrounding the image elements. A transparent reflective layer made of a material with a high refractive index can preferably be provided in the background region surrounding the image elements. [00120] One security feature, in particular, a second or a Petition 870190054494, of 06/13/2019, p. 56/133 30/81 additional security feature advantageously additionally comprises, in particular, a second, object consisting of one or more image elements. [00121] The second security feature preferably has a colored layer, in which the inks and / or pigments in the colored layer are supplied in the region of the image elements and the inks and / or pigments in the colored layer are not provided or are supplied in low concentration in a background region surrounding the image elements. The colored layer preferably has UV fluorescent pigments. [00122] The first security feature consisting of a first object and the second security feature consisting of a second object preferably partially overlapping. [00123] For verification, the first object is detected by means of the first data set, in particular, by the detection of the metallic surface in the first spectral band, in particular, in the IR band. The first object appears first dark in front of the lightest security document substrate under IR illumination. Possible elements of diffractive design of the first object can influence the contrast, but only to a small extent, if the IR band is used as the first spectral band. [00124] The first object is preferably shown in soft focus with a bilateral filter, in which this is, in particular, a selective low-pass filter that leaves the hard edges intact. Preferably, by means of a digital comparison of the recording object or the first data set with a reference image stored in a database, in particular a model match, the metal region is searched for using a previously stored model image. The verification preferably takes place with Petition 870190054494, of 06/13/2019, p. 57/133 31/81 based on prior knowledge of a database in which the different possible images and the necessary checks are described by the resource developer. [00125] In addition, in an additional step, the second object of the second data set can be detected, in particular, by detecting the colored layer, in a second spectral band, in particular, in the UV band or VIS band. [00126] Advantageously, from the first data set the first object of the first security feature is detected and a reference point, in particular the central point, from the first object is calculated and from the second data set the second object from the second resource security is detected and a reference point, in particular, the central point, of the second object is calculated. One or more central points, points of intersection, points on edges, corner points, points on surfaces, points on volumes, local and / or global minimums and / or local and / or global maximums, in particular of one or more objects, but also quantities of the above points, such as, for example, straight lines, edges, regions of variation, confidence intervals and / or any surfaces, in particular of one or more objects, are considered reference points. Such reference point quantities can also be assembled from different proportions of the aforementioned reference points. The verification of the authenticity of the security document and / or the corresponding security element is then preferably carried out by comparing the spacing of the calculated reference points, in particular central points, or other types of reference points of the first and second objects with a value of reference. With the help of other reference points, the orientations of the objects in relation to each other can also be determined, whose comparison with reference values also allows a verification of authenticity. Petition 870190054494, of 06/13/2019, p. 58/133 32/81 [00127] To calculate the reference point, in particular the central point, of the first and / or the second object, in each case, a rectangular structure is preferably calculated, which preferably limits the first or the second object, in particular, it limits the geometric shapes of the first and / or the second object as close as possible, in which the reference point, in particular the central point, of the rectangular structure is, in particular, evaluated as a reference point, in particular, as a central point, of the first or second object. The rectangular structure around the largest recognized object is preferably calculated. [00128] Advantageously, to calculate the reference point, in particular the central point, of the first and / or the second object, the first and second threshold images are first calculated and then, in each case, a rectangular structure is calculated or produced. The structure preferably involves all the image points of the first or second threshold image with the binary value 1. However, the structure can also surround all the image points of the first or second threshold image with the binary value 0. The point of reference, in particular, the central point, of the structure is, in particular, evaluated as reference point, in particular, central point, of the first or second object. If the external contours of the objects cannot be fully recognized, then, preferably, an adaptation of the algorithms is necessary; in particular, the corresponding image recognition algorithm is suitable for this. With the aid of the best corresponding position, in particular the almost optimal position, preferably the optimal position, of a suitable mold, a virtual reference point, in particular a central point, of the first or second object is preferably determined. [00129] Deviations can form due to manufacturing tolerances. Petition 870190054494, of 06/13/2019, p. 59/133 33/81 However, deviations from the rectangular frames or bounding boxes between them must exceed a predetermined deviation in order to ensure reliable verification. In particular, the maximum permissible deviation may preferably be less than ± 0.8 mm, in particular less than ± 0.5 mm, preferably less than ± 0.2 mm, longitudinally and transversely, where these represent the permitted deviation of the boxes delimiting each other or a reference. [00130] A first security feature and a second security feature preferably overlap at least in some regions. The security element is preferably arranged above the second security feature in the case of viewing the front side of the security document. The first and second security features have, in each case, one or more image elements and a background region, where the image elements of the first security element are opaque or very opaque in a second spectral band and , in particular, consists of a metallic layer. [00131] The first data set and the second data set are preferably compared to whether the image elements or one or more image elements of the second security feature in the second data set are reproduced in image only in the region of the region of background of the first security feature. [00132] Furthermore, it is possible that the first and second security elements have, in each case, one or more image elements and a background region, in which the image elements of the second security element are transparent or very transparent in the first spectral band, but have a contrast, in particular, the contrast of lightness and / or color, between image element and background element greater than 5%, preferably 8% and still preferably 10%, in the second spectral range. [00133] The position and formation of one or more image elements Petition 870190054494, of 06/13/2019, p. 60/133 34/81 of the second security feature are preferably determined from the second data set, in particular, by calculating a second threshold image. In addition, the position and formation of one or more image elements of the first security feature are determined from the first data set, in particular, by calculating a first threshold image. In an additional step, key points, such as outcomes, of the image elements of the first and second security features are determined and on the respective basis a check is made according to the data elements of the reference values of the first and second safety features are positioned with record accuracy with respect to each other and / or merge and / or combine with respect to their inclination. [00134] It is also possible that the first security feature comprises a partial metallic layer and a diffractive structure. The second security feature comprises a partial color layer, where the material of the metallic layer or the colored layer is provided in one or more image elements of the first and second security features and is not provided in a background region surrounding the image elements. The image elements of the metallic layer and the colored layer are preferably formatted congruent with each other. The diffractive structures are still preferably designed so that they diffract the radiation from the second spectral band, in particular, from the VIS band, on a sensor of the reading device, but do not diffract the radiation from the first spectral band, in particular, from the band IR, to the sensor of the reading device. [00135] The identical formation specified above of the metal layer and the color layer of the first or second safety feature is preferably achieved insofar as the color layer is used as a corrosion resistance for partial demetallization Petition 870190054494, of 06/13/2019, p. 61/133 35/81 of the metal layer in the production of the security element. Another preferred variant is to use an opaque color print, in particular, for the respective exposure wavelength, preferably an absorbent and / or translucent ink, as a mask for photolithographic structuring of the metal layer. The exact registration structure thus generated from these two layers can be correspondingly detected using the method described above and used to verify the authenticity of the security document. [00136] One or more of the following measures can be implemented in any combination in order to verify, in particular, the authenticity of the security document, in particular, information regarding the authenticity of the security document: [00137] The first security feature comprises a partial metallic layer and the second security feature comprises a partial colored layer, in which the material of the metallic layer or colored layer is provided in one or more image elements of the first security feature and the second security feature and is not provided in a background region. Several image elements of the colored layer are in the form of a machine-readable code, in particular a QR code. The metallic layer is demetallized using a first mask layer, which is in the form of a first information item, and using a second mask layer, which is formed by the colored layer. It is thus achieved that the image elements of the metallic layer no longer contain the first complete item of information. During the verification, in each case, the image elements of the first and second security features are determined from the first and second data sets and compared to verify the combination of the respective image elements of the first and second security features. security produces the first complete item of information. Petition 870190054494, of 06/13/2019, p. 62/133 36/81 [00138] In the same way as described above, the security feature of the security element, and also security features of the security document that are arranged in the first region, in particular, overlapping one or more security features of the element security, can be detected from the generated data sets, in particular, the first, second, third and / or fourth data set. These security features of the security document and / or substrate can then, in the same way as described above with respect to the security features of the security element, be used, in particular, also in determining corresponding relative values for security features of the security element. security element to verify the authenticity of the security document. [00139] In addition, it is also possible that one or more of the security features of the security element and / or security document contain items of individualized or personalized information, for example, by partial removal of a metal layer from the respective security feature. security by means of a laser or by overprinting the ink that fluoresces under UV irradiation. This individualization or personalization can, additionally, by comparison with other items of information that both the data sets detected and a database that the reading device accesses, can be used to verify the authenticity of the security document. [00140] If the security element has a security feature comprising a colored layer, then the following steps are preferably still carried out to verify the authenticity of the security document: [00141] determine one or more parameters of the colored layer, selected from position, color, paint coverage, reflection, orientation, size, shape, customization, color change and electromagnetic properties, in particular, on the basis of one or more among the first, Petition 870190054494, of 06/13/2019, p. 63/133 37/81 second, third and fourth data sets, in which the comparison of one or more determined parameters with preferred allocated reference values is preferably performed and a denial of authenticity is performed if the deviation exceeds the predefined tolerance range. [00142] If the security element has a security feature comprising a metallic layer, then the following steps are preferably still carried out to verify the authenticity of the security document: [00143] determine one or more parameters of the metallic layer, selected from position, reflection, color, orientation, size, shape, customization, area coverage, transmission, in particular, on the basis of one or more of the first, second, third and fourth data sets, in which the comparison of one or more determined parameters with preferred allocated reference values is preferably performed and a denial of authenticity is performed if the deviation exceeds a predefined tolerance range. [00144] If the security element has a security feature comprising an antenna, then the following steps are preferably still carried out to verify the authenticity of the security document: [00145] determine one or more parameters of the metallic layer or antenna structure, selected from position, electromagnetic properties, design, color, in particular, on the basis of one or more of the first, second, third and fourth data sets, in which a comparison of one or more determined parameters with preferred allocated reference values is preferably performed and a denial of authenticity is performed if the deviation exceeds a predefined tolerance range. Petition 870190054494, of 06/13/2019, p. 64/133 38/81 [00146] If the security document under the security element has a document history comprising a metallic layer and / or colored layer, then the following steps are preferably still carried out to verify the authenticity of the security document: [00147] determine one or more parameters of the metallic layer and / or the colored layer, selected from position, color, paint coverage, reflection, orientation, size, shape, electromagnetic properties, personalization and area coverage, in particular, at the base of one or more of the first, second, third and fourth data sets, in which a comparison of one or more determined parameters with preferred allocated reference values is, in particular, performed and a denial of authenticity is performed if the deviation exceeds a predefined tolerance range. [00148] If the security element has a security feature comprising an RFID chip, then the following steps are preferably still taken to verify the authenticity of the security document: [00149] read one or more items of information stored on the RFID chip, which include, in particular, a specification of one or more security features of the security element and / or code stored therein, verification of the security document on the basis of information items read, in particular, whether one or more security features of the security element match the read specifications and / or include the read code. [00150] If the security element has a security feature comprising at least a diffractive and / or refractive structure, then the following steps are preferably still carried out to verify the authenticity of the security document: determination of one or more parameters of the structure diffractive and / or refractive, selected Petition 870190054494, of 06/13/2019, p. 65/133 39/81 position, reflection, dispersion, brightness, arrangement of the design elements of the diffractive and / or refractive structure, in particular, on the basis of one or more of the first, second, third and fourth data sets, in particular, comparison of one or more determined parameters with preferred allocated reference values and denial of authenticity if the deviation exceeds a predefined tolerance range. [00151] If the security element has a security feature comprising a self-luminous structure, such as, for example, an OLED or a luminescent layer, then the following steps are preferably still carried out to verify the authenticity of the security document: determination of one or more parameters of the self-luminous structure, selected from luminescence when excited, color when excited, position of the elements of the self-luminous structure, in particular, on the basis of one or more of the first, second, third and fourth data sets, in particular, comparison of one or more determined parameters with preferred allocated reference values and denial of authenticity if the deviation exceeds a predefined tolerance range. [00152] If the security document has a document body with several layers and / or a window and / or a through-hole region, then the following steps are preferably still performed to verify the authenticity of the security document: determination of one or more parameters of the document body, selected from the window position, window format, position of the layers with respect to each other, in particular, on the basis of one or more of the first, second, third and fourth data sets, in in particular, comparison of one or more determined parameters with preferred allocated reference values and denial of authenticity if the deviation exceeds a predefined tolerance range. [00153] A check on a security element region Petition 870190054494, of 06/13/2019, p. 66/133 40/81 of the guarantee document can be carried out safely due to the presence of a plurality of resources to be verified, so a reliable statement regarding the authenticity of the document can be made, that is, there is a high probability or confidence of the authenticity of the document. Individual verifiable resources can in principle be combined with each other. Individual resources can advantageously be correlated with each other relatively. It is conceivable, for example, that the position of a first image element is correlated with the position of a second image element, or that its orientations or sizes are correlated with each other. The color of a first image element or object under VIS illumination can also be correlated with the color or brightness of the first image element under IR illumination. [00154] It is advantageous if an item of information about the authenticity of the security element or security document is issued by the reading device. This can be accomplished both visually and acoustically and / or electronically. [00155] The document can be an identification document, a travel document, an identity card, a passport, a visa, a guarantee, a note, a certificate, etc. The document or at least the page to be checked, such as the data page in a passport, or a page with a visa sticker, preferably has a single layer or multilayer substrate. The substrate is preferably present in the form of a card or a data page made of paper and / or plastic. In particular, the substrate is made of a plastic, preferably made of PVC, ABS, PET, PC, Teslin or combinations (multi-layered composite) thereof. It is also conceivable that the substrate is made of paper or a textile material. The substrate can have a transparent region and / or an opening. [00156] The performance of the method according to the invention can Petition 870190054494, of 06/13/2019, p. 67/133 41/81 also comprise the provision and / or production of a security document that is designed as defined above and / or a security element that is designed as defined above. [00157] The sensor equipment of the device preferably has one or more sensors and / or one or more radiation sources. Preferably, different radiation sources and / or sensors are allocated to the first and second spectral bands. The sensor equipment ideally comprises one or more radiation sources that emit or detect visible light, UV light and / or IR radiation. [00158] In addition, the sensor equipment can be designed so that, in addition to the spectral range, the lighting directions and / or the observation directions can also be varied. Thus, for example, illumination in the VIS range can be performed from different directions or direction ranges, which results in several sets of data for the same spectral range. So, for example, disturbing reflections can be avoided. [00159] It is also conceivable that the device has at least a laser diode and / or an LED. Preferably, software evaluates the signals obtained by the device. The software can be directly on the device or also on a connected PC or other external device, such as a smartphone or a server. [00160] The invention is explained by way of example below by means of several examples of modalities with the aid of the attached drawings. They are shown in: [00161] Figures 1a, 1b show schematic representations of a security document [00162] Figure 1c shows a schematic representation of a reading device [00163] Figure 1d shows a flow chart for a verification method Petition 870190054494, of 06/13/2019, p. 68/133 42/81 [00164] Figures 2a, 2b show the schematic representation of a UV print and a partial metallization with virtual bounding box [00165] Figures 3a, 3b, 3c, 3d show a schematic representation of a security feature in a modality [00166 ] Figures 4a, 4b, 4c show another schematic representation of a security feature in a modality [00167] Figures 5a, 5b, 5c show the schematic representation of the superimposition of security features shown in Figures 3 and 4 [00168] Figures 6a, 6b, 6c, 6d show the schematic representation of a security feature when viewed in different spectral bands [00169] Figures 7a, 7b, 7c show the schematic representation of a security document with security element drawn in some regions [00170] Figures 8a, 8b, 8c, 8d, 8e show the schematic representation of a security feature formed as a QR code when observed in different spectral bands [00 171] Figure 9 shows the schematic representation of a security feature with individual markings formed on it [00172] Figures 1 a and 1 b illustrate in an example the structure of a security document 1. [00173] Figure 1a shows security document 1 in the top view and Figure 1b is shown in cross section. [00174] Security document 1 preferably consists of an ID document, for example, a passport, a passport card, an access card. However, it can also be another security document 1, for example, a note, security, a certificate or a credit card or bank card. Petition 870190054494, of 06/13/2019, p. 69/133 43/81 [00175] Security document 1 has a body of document 11 and one or more security elements, of which two security elements 1a, 1b are shown in Figures 1a and 1b. [00176] Security elements can here be applied to the body of document 11 of security document 1, or be incorporated into the body of document 11 of security document 1, in particular, be fully or partially incorporated. [00177] The body of the document 11 of the security document is preferably formed in multiple layers and, in particular, comprises a carrier substrate, which is formed of a paper substrate and / or plastic substrate. In addition, the body of the document 11 may also comprise one or more protective layers, one or more decorative layers and / or one or more security features. With reference to this, Figure 1 b shows, as an example, a security feature 15 of security document 1, which at least partially overlaps region 3 or at least in some regions overlaps region 3 of security document 1, in which the security element 1a is applied. The body of document 11 here preferably also comprises an electronic circuit, in particular, an RFID chip, in which the information is stored. [00178] One or more security elements, in particular security elements 1a, 1b, preferably consist in each case of an element that is manufactured independently of the production of the body of the document 11 and is applied to the body of the document 11 or embedded in the body of document 11 only during the production of the security document. The security elements 1a, 1b are, in particular, formed by transfer layers of a transfer film, a laminating film and / or a film element, in particular, in the form of a security thread. The security elements here can cover one surface of the security document over the entire Petition 870190054494, of 06/13/2019, p. 70/133 44/81 the surface and / or cover only partially, for example, be formed in the strip or patch shape, as shown with respect to the security elements 1a, 1b in Figure 1a. [00179] The security elements, in particular the security elements 1a, 1b, here preferably have a protective layer 14, a decorative layer 12 and an adhesive or adhesion-promoting layer 13. Thus, for example, the security element 1a is formed as the transfer layer of a transfer film, which comprises a protective layer 14, a decorative layer 12 and an adhesive layer 13 and is applied to the front side of the document body 11, as shown in Figure 1a. [00180] Security element 1 b is formed as a film element comprising two adhesion promoting layers 13 and a decorative layer 12, has a patch shape and is incorporated within the body of the document 11 during production of the body of the document 11, as shown in Figure 1b. [00181] The decorative layers 12 of the security elements 1a, 1b, in each case, form one or more security features, which are preferably also optically visible to the human observer. Figure 1a shows as an example four security features 10, which are provided by decorative layers 12 of security element 1a, 1b. Here, preferably, each of the security features 10 is formed or provided by an allocated layer or several allocated layers of the decorative layer 12. [00182] Thus, decorative layers 12 have, for example, one or more of the following layers: [00183] The decorative layer 12 preferably has one or more metallic layers, which are preferably, in each case, provided in the security element not over the entire surface, but only partially. The metallic layers here can be formed opaque, Petition 870190054494, of 06/13/2019, p. 71/133 45/81 translucent or partially transparent. The metallic layers here are preferably formed by different metals, which have markedly different reflection and / or transmission spectra. For example, the metal layers are formed of aluminum, copper, gold, silver, chromium, tin or an alloy of these metals. In addition, the metallic regions can be designed traced and / or with different layer thicknesses locally. [00184] One or more metallic layers here are preferably structured in a standardized manner such that they comprise one or more image elements, in which the metal of the metallic layer is provided, and comprise a background region, in which the metal of the metallic layer is not provided. The image elements here can preferably be formed as alphanumeric characters, but also as graphics and complex representations of objects. [00185] Still, it is possible that the dimensions of the image elements in at least one lateral direction are less than 300 pm, preferably less than 200 pm, still preferably less than 50 pm. It is hereby possible to hide the structure of the respective metal layer from the human observer, but still guarantee machine detectability. [00186] The decorative layer 12 may further comprise one or more colored layers, in particular, paints. Such colored layers are preferably colored layers which are applied by means of a printing method, and which have one or more inks and / or pigments which are incorporated in a binder matrix. The inks and / or pigments here have an absorption / reflection spectrum and / or an absorption / reflection behavior that preferably differs, in particular, it differs markedly, in different spectral bands detected by the reading device. However, they may also differ as in a range Petition 870190054494, of 06/13/2019, p. 72/133 46/81 spectral, as, for example, in the VIS range. The colored layers, in particular, paints, can be transparent, clear, partially dispersed, translucent or non-transparent or opaque. [00187] Inks and / or pigments that are detectable in the IR range, for example, in the near infrared range from 800 nm to 1000 nm, which are detectable in the VIS range, such as, for example, common printing inks, and / or which are detectable in the UV range, that is, in particular, absorb UV light and / or have UV luminescent properties, are preferably used as paints and / or pigments. Photochromic substances that are activated in the UV range and become visible in the VIS range can also be used as dyes and / or pigments. [00188] One or more colored layers here preferably, in each case, comprise one or more image elements in which the inks and / or pigments of the colored layer are provided and a background region in which the pigments or inks of the layer are not supplied or are supplied in low concentration. [00189] The decorative layer 12 preferably has two or more colored layers, in which the image elements are formed differently and / or the pigments and / or inks of the colored layer have different reflection and / or absorption properties, in particular, in first, second, third and / or fourth spectral band. [00190] The decorative layer 12 preferably has one or more optically active relief structures, which are preferably in each case introduced to the surface of a layer of replication varnish. These relief structures are preferably diffractive relief structures, such as, for example, holograms, diffraction grids, diffraction grids with symmetrical or asymmetrical profile profiles, zero order diffraction structures. These relief structures can also be matt structures of isotropic and / or anisotropic dispersion, red-hot grills and / or relief structures that act substantially in Petition 870190054494, of 06/13/2019, p. 73/133 47/81 reflection and / or transmission, such as microlenses, microprisms or micro mirrors. [00191] The decorative layer 12 preferably has one or more interference layers that reflect or transmit the incident light in a selective wavelength manner. These layers can be formed, for example, by thin-film elements, in particular thin-film Fabry-Pérot elements, which generate a color shift effect depending on the viewing angle, based on an arrangement of layers that have an optical thickness in the half a region or λ / 2 wavelength (λ is the wavelength of light or the wavelength of an electromagnetic wave) or a quarter or λ / 4 of wavelength of incident light. Constructive interference in an interference layer with a refractive index n and a thickness d is calculated as follows: [00192] 2nd cos (Θ) - mA, [00193] where Θ is the angle between the direction of illumination and the direction of observation, λ is the wavelength of light and m is an integer. These layers comprise a spacer layer, in particular disposed between an absorption layer and a reflective layer, or can preferably be formed by a layer comprising thin film pigments. [00194] The decorative layer may still preferably have one or more layers of liquid crystal, which on the one hand generate reflection and / or transmission of incident light depending on the polarization of the incident light and on the other hand also generate a selective reflection of length of wave and / or transmission of incident light, depending on the direction of the liquid crystals. [00195] As shown in Figure 1a, a first region 3 of the security document, which overlays the security element 1a Petition 870190054494, of 06/13/2019, p. 74/133 48/81 at least in some regions, it is detected by a reading device 2. The security element 1a preferably comprises one or more security features, which in Figure 1a are formed by the security features 10, in the first region 3. [00196] Still, it is possible that the first region 3 overlaps with one or more security features of security document 15, as shown in an example in Figure 1a the security feature of security document 15. The security feature of the security document 15 here is preferably formed correspondingly, as described above with respect to the security features 10 of the security element. [00197] Still, it is possible that, in addition to the first region, other one or more second and third regions of the security document 1, which overlap the security element 1b, for example, are covered by the reading device. The entire surface of the document can, in particular, also be detected. [00198] Figure 1c schematically shows the structure of a reading device 2, which can be used to check security document 1. Reading device 2 has a piece of sensor equipment 21, a piece of analysis equipment 22 and a piece of output equipment 23. The sensor equipment 21 preferably has one or more radiation sources 24 and one or more sensors 25. [00199] Thus, the equipment of the sensor 21 preferably has three or more radiation sources 24, which, in each case, emit radiation with a different spectral composition, in particular, emit light from a UV range, a VIS range or an IR range. The sensor equipment 21 preferably has one or more sensors 25, which are configured to detect radiation of different spectral bands or wavelengths, for example, by connection upstream of the corresponding band filters and corresponding selection of the sensors. Petition 870190054494, of 06/13/2019, p. 75/133 49/81 image, in which one or more of the sensors 25 can preferably, in each case, detect one or more spectral intervals. These sensors are preferably image sensors, even more preferably cameras, in particular preferably detectors, which can in particular record an image with a minimum resolution of 350 ppi, in particular 400 ppi, preferably 500 ppi, along the horizontal axis and / or vertical. [00200] The sensor equipment 21 here preferably has, for example, shown in Figure 1c, sensors 25, which are arranged on different sides of a piece of the feeding equipment for a document of value in order to be able to detect the spectrum transmission and / or reflection both when viewed in reflected light from the front and rear and when viewed in transmitted light. [00201] The analysis equipment 22 evaluates the data sets generated by the equipment of the sensor 21 and preferably comprises hardware and / or software components that perform the performance of the evaluation steps described for the one below. Here, it is still possible for the analysis equipment 22 to access an external database 26. [00202] Still, the reading device 2 preferably comprises a piece of the output equipment 23, which has issued the result of the authenticity check to the operator optically, acoustically, haptically, electronically and / or otherwise. [00203] In addition to the sensors 25 described above, the reading device 2 can also comprise other sensors 25 for detecting data from the security document, for example, an RFID reading device, as well as sensors 25 for detecting or magnetic security features of the security document. [00204] Figure 1d shows a flow chart of a method for verifying security document 1. Petition 870190054494, of 06/13/2019, p. 76/133 50/81 [00205] A security document 1 is preferably provided in a step 101. In a step 102 the first transmission and / or reflection properties of a first region 3 are detected in a first spectral band. In a step 103, second transmission and / or reflection properties of the first region 3 are detected in a second spectral band. Steps 102 and 103 can be performed in parallel or sequentially. In a step 104 a first data set specifying the first transmission and / or reflection properties is generated. In a step 105 a second set of data specifying the second transmission and / or reflection properties is generated. Steps 104 and 105 can be performed in parallel or sequentially. In a step 106 the authenticity of security document 1 or security element 1a is verified against the first data set and the second data set. Advantageously, still, in particular, the third and / or fourth transmission and / or reflection properties can also be detected in a third spectral band or in a fourth spectral band by the reading device 2. [00206] The first, second, third and / or fourth spectral range is selected, in particular, from the group: IR range of electromagnetic radiation, in particular, in the wavelength range from 850 nm to 950 nm, VIS range of electromagnetic radiation, in particular, in the wavelength range of 400 nm to 700 nm, and the UV range of electromagnetic radiation, in particular, in the wavelength range of 1 nm to 395 nm. [00207] To verify the authenticity of the security document 1, the relative position arrangement, in particular, spacing, the relative size, the relative formation, in particular, the accuracy of recording the orientation and formation of image elements, the coverage Petition 870190054494, of 06/13/2019, p. 77/133 51/81 and / or the orientation of two or more security features 10 of the security element 1a with respect to each other are preferably first determined by comparison, at least of the first data set and the second data set. In an additional step, the relative values determined from the two or more security features 10 are then compared with predefined reference values, in which a denial of authenticity is performed if the deviation falls outside a predefined tolerance range. [00208] In addition, the following steps can also be performed to verify the authenticity of security document 1: determining the position arrangement and / or forming a first security feature 10a of the security element 1a by means of the first data set, determining the position arrangement and / or forming a second security feature 10b of the security element 1a by means of the second data set, comparison of the determined position dispositions and / or formation with each other to determine the relative position disposition, in particular, spacing, the relative size, the relative formation, in particular, the orientation recording accuracy and forming image elements, covering and / or orienting two or more security features 10 of security element 1a with respect to each other. [00209] Figure 2a shows a schematic representation of virtual bounding boxes 201a, 202a, preferably in the form of a rectangular structure, around one or more objects 9a, 9b in a security element 1a, in particular, around a security feature 10a comprising a print 201 that fluoresces under UV irradiation and a security feature 10b comprising partial metallization 202. Bounding boxes 201a, 202a preferably limit the respective objects 9a, 9b as close as possible. The pri Petition 870190054494, of 06/13/2019, p. 78/133 52/81 first, second, third and / or fourth data set is preferably subjected to image processing, by which bounding boxes 201a, 202a are generated. Bounding boxes 201a, 202a serve to determine the center points 201b, 202b of security features 201, 202. The center points of bounding boxes 201a, 202a preferably correspond to the center points 201b, 202b of objects 9a, 9b, in particular, UV printing 201 and partial metallization 202. [00210] Figure 2b shows a distance 200, represented by a double arrow 200, showing the distance between the calculated central points 203b, 204b of the bounding boxes 203a, 204a. The verification of authenticity is then preferably performed by comparing the spacing 200 of the calculated central points 203b, 204b with a reference value. [00211] Security element 1a of security document 1 preferably has one or more security features 10. [00212] Figure 3a now shows a schematic representation of a first security feature 10a in a drawing as a UV fluorescent print 205. The first security feature 10a preferably has one or more image elements 7a and a plane region background 7b surrounding the image elements 7a. The first security feature 10a shown in Figure 3a is a colored layer 8b, in particular, a UV print 205, which is visible only in the UV range. [00213] Figure 3b shows another schematic representation of a second security feature 10b. The second safety feature 10b provides a partially formed metal layer 8a as partial metallization 206, in particular with Kinegram® molded diffractive structures, which is easy to recognize, in particular, in the IR range. Petition 870190054494, of 06/13/2019, p. 79/133 53/81 Under IR illumination, the metallic layer 8a first appears dark against the background region 7b. [00214] The image of the second security feature 10b shown in Figure 3b is preferably shown in soft focus with a bilateral filter. This is, in particular, a selective low-pass filter that leaves hard edges intact. [00215] In particular, threshold images are calculated from the images of the first security feature 10a and the second security feature 10b represented respectively in Figures 3a and 3b. To generate the threshold images, the following three calculations are preferably performed, in particular, one after the other. [00216] In a first stage, a binary adaptive threshold is performed. In the following example, it is assumed that the gray scale image 256 comprises lightness values, where the lightness value 0 is allocated to black and the lightness value 255 is allocated to white. [00217] For binary adaptive thresholding, a filter kernel that is large in comparison to the image resolution is preferably chosen with the result that any edges present are correctly recognized. This first filtering step results, in particular, in the image recognition features of error, contamination or other things that are not, in fact, a real motif edge. The result is a “margin image”. [00218] A constant binary threshold is then performed again and all lightness values that fall below a defined lightness value are set to binary value 0, which is preferably allocated to black. The threshold is defined on the basis of prior knowledge regarding the type of document recognized. The result is a “black image”. Example of the threshold with respect to lightness: IR image: lightness value less than 60, UV image: lightness value less than 40. These examples of values apply to a Petition 870190054494, of 06/13/2019, p. 80/133 54/81 image with a lightness range of 256 values. Images with a lightness range of 512 values or 1024 values are, in particular, also possible. [00219] A constant binary threshold is then performed again on the scanned image in gray scale and all lightness values that are above a defined value to binary value 1, which is preferably allocated to white. The threshold is defined on the basis of prior knowledge regarding the type of document recognized. The result is a "white image". Example of the threshold with respect to lightness: IR image: lightness value greater than 140, UV image: lightness value greater than 60. [00220] In the ideal case, the difference between light and dark, in particular brightness values perceived as light and light values that are perceived as dark, is given in the case of an IR image over a value range of more than 80 values brightness neighbors, in the case of a UV image over a value range of more than 20 neighboring brightness values. The three partial images are then combined so that the border image is first multiplied by the black image at the pixel level, with the result of all black regions of the black image, preferably, therefore, also appearing black in the border image. The result is a black bordered image. [00221] The white image is then added to the black margin image, with the result that, preferably, all white pixels in the white image thus appear white in the black margin image. The result is the threshold image. [00222] Figure 3c shows a schematic representation of the superimposition of the security features 10a and 10b of a security element 1a shown in Figures 3a and 3b under simultaneous irradiation in the IR range and the UV range. Petition 870190054494, of 06/13/2019, p. 81/133 55/81 [00223] Figure 3d shows a security element 1a under illumination in a second spectral band, in particular the UV band, which is composed of an overprint of a first security feature 10a and a second security feature 10b. The UV 205 fluorescent printing, in particular, consisting of UV fluorescent ink, is visible only in regions where the UV 205 printing is not covered by a metallic layer 8a of the partial metallization 206, as the metallic layer 8a is almost opaque, preferably completely opaque, both for exciting radiation in the UV range and for the fluorescence of the print 205, where the optical densities of the metallic layer 8a of the partial metallization 206 inherently have a value greater than 1.0, preferably a value greater than 1.3. The background region 7b advantageously barely fluoresces at all, or at least it fluoresces much more weakly than or in a color other than UV fluorescent printing 205. [00224] Another advantageous variant of a security element 1 uses the diffractive properties of diffractive and / or stochastic structures, in particular, matte dispersion structures, in order to deflect, that is, diffract or disperse, electromagnetic radiation, in particular, the IR band and / or VIS band, on a reading device 2, in particular, on one or more detectors on a reading device 2, still preferably on one or more sensors on a reading device 2. This has the result that the regions of a security element 1a designed with these diffraction or dispersion structures illuminate, that is, more intensely, preferably illuminate more lightly, that is, more intensely than a typical metallic surface, in an IR image registered in the IR range and / or in a VIS image registered in the VIS range through the use of diffraction properties, in which possible production variations in relation to the mold of the s estru Petition 870190054494, of 06/13/2019, p. 82/133 56/81 diffraction tures are considered manufacturing tolerances when verifying the authenticity of the security element 1. [00225] Figure 4a shows three partial regions 70a, 70b and 70c of a security element 10 under illumination with a spectral band, in particular a VIS band, in which partial metallizations 208 formed with a complex shape, in particular, in the form of geometric structures, still preferably in the form of alphanumeric characters made in curved lines or guilloche, are shown in the partial regions 70a and 70b and an image element 7a containing circular lines which are formed on the one hand as a color print 207 and by on the other hand as a partial metallization 208 is shown in the partial region 70c. The color print 207 color as desired in the partial region 70c merges into the tolerance-free partial metallization 208. [00226] In an advantageous embodiment of the verification method, the verification of the authenticity of the security element 10 represented in Figure 4a is carried out in one or more spectral bands, preferably a first spectral band and a second spectral band, still preferably in a band of the VIS and an IR band, in which at the base of the registration of the security element 10 in the corresponding spectral bands a first data set allocated correspondingly to the first spectral band, preferably the VIS band, that is, the VIS image, and a second set of data allocated correspondingly to the second spectral band, preferably the IR band, that is, that the IR image is generated by the reading device 2. Figure 4b shows the partial regions 70a, 70b, and 70c of the security 10 under lighting in a second spectral band, preferably the IR band, with the result that only partial metallizations 202 in the three regions partial details of security element 10 and Petition 870190054494, of 06/13/2019, p. 83/133 57/81 color printing 207 is not detectable for the reading device 2, as the color printing in this example does not absorb or absorbs only a little in the IR range. [00227] In a first step the IR image can be compared, by a piece of software, preferably software containing algorithms, with a model, in particular, a standard data set and / or standard image, still preferably a model, image standard and / or standard data set provided by a database, within the framework of a plausibility check or authenticity check, in which several algorithms, preferably model matching, bounding box and A-KAZE, are performed in parallel or sequentially. The partial region 70a can be designed as a diffractive and / or reflective structure, in particular, Kinegram®, which shows the same shape, that is, appearance, or design in each of the first, second and third spectral bands under observation, for example, by a verification device or a reading device 2. The position and / or the shape of the partial metallizations 208 of the partial regions 70a, 70b and / or 70c can vary within given tolerance ranges. [00228] The partial regions 70a and 70c may differ in that the partial metallization 208 in the partial region 70a is preserved unchanged by an optional second partial metallization. The first and / or second partial metallizations advantageously always remain in perfect register in relation to the diffractive and / or reflective structures molded in the partial metallizations 208 over the entire surface or over part of the surface, preferably one or more Kinegrams®. [00229] After a first partial metallization 208 of the security element 10, the partial region 70c can be overprinted with an etching resistance, in particular a colored etching resistance, even more preferably a blue etching resistance, in Petition 870190054494, of 06/13/2019, p. 84/133 58/81 that the tolerance ranges of position, shape and / or record the accuracy of the embossing resistance in relation to the partial metallization 208 can be taken into account during an authenticity check. An etching resistance, in particular a colored etching resistance, even more preferably a blue etching resistance, is characterized on the one hand by the effect of the core on the other by the property that the etching resistance can act as a partial metallization etching mask additional. [00230] In the case of a colored corrosion resistance, in particular a blue corrosion resistance, the VIS image is checked during an authenticity check if the colored lines, in particular blue, of the corrosion resistance merge accurately and / or precision position and / or accurately record on the metallic lines of a first partial metallization 208 and / or second partial metallization, where the metallic lines of the first and / or second partial metallization are visible on the IR image, or detectable by a reading device 2 The colored lines, in particular blue, of the engraving resistance are preferably invisible in the IV image, that is, not detectable by a reading device 2, since the blue dye used acts only in a weakly absorbing manner, preferably without absorbing a range of IV, in particular in an almost IV range, preferably in a range close to IV in a range of wave lengths from 800 nm to 1000 nm, which is provided for IR verification, in particular authenticity verification. [00231] In an additional step, an authenticity check is carried out in a third spectral band, in particular, the UV band, in which the color and / or registration precision and / or registration precision and / or print format fluorescent UV 207b is checked for partial metallizations located in front of the fluorescent UV 207b print of the detection direction of a reading device 2 and / or Petition 870190054494, of 06/13/2019, p. 85/133 59/81 colored, in particular blue, corrosion resistance or corrosion resistant printing. Figure 4c shows the partial regions 70a, 70b, and 70c of the security element 10 under illumination with radiation from a third spectral band, in particular, radiation from the UV band, with the result that only the fluorescent printing by UV 207b did not cover by the partial metallizations 208 in the image element 7a they are detectable by a corresponding reading device 2 and can be converted into a third data set, in particular a UV image. The fluorescent UV 207b print under the color print is recognizable or not, or is attenuated by the color print 207, depending on the properties of the color print 207, in particular the resistance to blue corrosion. Within the framework of a plausibility check, it can preferably still be checked whether the color of the light emitted by the UV 207b fluorescent printing has a particular color, in particular a yellow color, where the UV 207b fluorescent printing can be excited by radiation, in particular, electromagnetic radiation, in particular, UV radiation. [00232] In addition, the typical values of the resource tolerances of different objects selected from position, color, paint coverage, reflection, orientation, size, shape, electromagnetic properties, reflection, personalization and area coverage of one or more of the drawings of the partial region 70a with respect to one or more of the drawings of the partial region 70c of the security element 10, in each case, selected from the fluorescent printing by UV 207b, the color, in particular, blue, resistance to corrosion and / or the metallizations 208, are in each case ± 0.8 mm, in particular ± 0.5 mm, preferably less than 0.2 mm and more than -0.2 mm. In particular, the tolerances for corrosion resistance, preferably blue, color and fluorescent printing by UV 207b in the partial region 70c with respect to partial metallizations 208 in the partial region 70a are in the range ± 0.8 mm, in Petition 870190054494, of 06/13/2019, p. 86/133 60/81 particular, ± 0.5 mm, preferably less than 0.2 mm and more than 0.2 mm. These tolerances result from the typical variations in the printing processes placed on record in relation to each other and can also be much smaller or larger depending on the machines and control. [00233] The comparison of the properties of a security feature 10, that is, in particular, the geometric and / or optical properties, with the corresponding properties of a model, or reference image preferably serves as a first plausibility test, in in particular, to precisely locate, that is, determine the position, of security features 10. [00234] Authentication verification preferably refers to the tolerance-free transition, that is, registration accuracy or registration accuracy, between a 207 color print, in particular a corrosion resistance and / or UV fluorescent print 207b , in particular, a resistance to UV fluorescent corrosion and / or an active IR impression, and the regions with partial metallizations 208. [00235] In another advantageous method, the security feature 10 to be verified is located in the partial region 70c by a reading device 2 and segmented in at least two partial regions, which contain the fluorescent printing by UV 207b and / or the resistance colored corrosion, in particular blue and partial metallization 208, by observation in at least two different spectral bands. An algorithm, preferably the KAZE accelerated resource detector / descriptor (A-KAZE), is implemented in order to recognize, or to determine, key points, such as the outcomes of printed lines 207, 207b, in particular circular lines, and the metallic lines of the partial metallizations 208. The algorithm or another algorithm then performs a comparison of the coordinates of the key points between the data sets, in particular the VIS image and the IR image, in order to verify Petition 870190054494, of 06/13/2019, p. 87/133 61/81 the accuracy of registration in the transition regions of the printed structures 207, 207b and metallic structures 208, or lines, in which the shapes and / or inclinations of the printed structures 207, 207b and metallic structures 208, in particular, in the regions transition periods can also be verified. This procedure is advantageous if the intrinsic or inherent properties of a security element are used, as the security feature can be checked for existence with high probability or confidence. The verification method is independent of possible application tolerances, that is, tolerances during the application of safety features to a substrate, and distortions, that is, distortion of the safety feature, since they do not influence the described local properties. The verification method is also not significantly impaired by damage, as, for example, due to missing areas and / or minor folds, with respect to the safety feature 10 to be verified. [00236] Possible damage to the security element to be checked in cases where the security element 1a, 1b is additionally provided with a partial overprint, in particular by means of a letterpress, an offset printing or a cutlery printing, must be taken into account in all cases, during the verification method, how the properties to be verified of a partial metallization, in particular a diffractive and / or reflective structure, even more preferably a Kinegram®, can be markedly impaired. The same applies to mechanical modifications to a security element, such as a security stamp or blind recording. However, the corresponding algorithms, in particular shape recognition algorithms, more preferably characterize the correspondence, are capable of taking possible distortions in one or more images to be compared and correspondingly compensating for them. In addition, a Petition 870190054494, of 06/13/2019, p. 88/133 62/81 compensation can be advantageously transferred to the algorithms, in order to take into account the expected image errors, which fall within the tolerance ranges, for example by varying the widths of the security elements due to changes in the security document caused by the application process or age, during the evaluation of the data sets, or images, by the algorithms. Thus, for example, a compensation of less than 10%, in particular less than 5%, is expected in order to compensate the strains during manufacture or during use. [00237] In principle, it is advantageous that, for each of the security features 10 of a security element 1a, 1b, be verified, an acceptance level is determined in advance, which divides the results of the authenticity verification of the security document. security 1 in accepted and does not accept authenticity results. [00238] In another advantageous method, for verifying the authenticity of a security document 1 comprising a security element 1a, as shown in Figures 5a to 5c, in which the image element 7a of the security element 1a is designed with a print colored 209, still preferably an additional UV fluorescent print, which is arranged in perfect register with respect to a partial metallization 210 when observed from the observer's direction, in particular, the direction of detection of a reading device 2. In partial metallization, a diffractive and / or refractive and / or dispersion structure, which diffracts light incident on a first spectral band, in particular a VIS band, at least partially on a camera or a sensor 25 of a reading device 2, as shown as an example in Figure 5a, and not to diffract IR radiation in a second spectral band, in particular, an IR band, or diffract only a small in the extension, in a camera of a reading device 2, as shown as an example in Figure 5b, Petition 870190054494, of 06/13/2019, p. 89/133 63/81 can be molded over the entire surface or over part of the surface. [00239] A register, or a data set, registered by a sensor 25, in particular, a camera, preferably a detector, of a reading device 2 thus shows a partial color region 7a containing the color print 209 of an element security 1, which corresponds over the entire surface or over part of the surface to the partial region 7a containing the partial metallization 210. In the second spectral band, in particular, an IR band, however, the partial region 7a appears dark in front of a region lighter background 7b of a substrate of a multilayer security element 1a. Even more preferably, the ink, preferably a red ink, of the color print 209 contains at least one pigment which is fluorescent under UV irradiation, preferably a pigment which fluoresces yellow, with the result that the partial region 7a containing the color print 209 emits light which is colored, in particular, yellow, under fluorescence in a third spectral band, preferably a UV band, as shown as an example in Figure 5c. [00240] A security element 1a authenticity check now consists of comparing the first data set allocated with the VIS range, the second data set allocated with the IR range, the third data set allocated with the range of VIS UV and more data sets allocated to one or more spectral bands, data sets allocated, however, to at least three spectral bands with respect to position, shape and one or more expected colors, registration accuracy, registration accuracy and / or the precision of the intensity modulation with each other by means of a piece of software, in particular, software containing algorithms, in which during a plausibility check a comparison between the first, second and third data sets with a model, in particular, a standard data set, still preferably a standard data set contained Petition 870190054494, of 06/13/2019, p. 90/133 64/81 in a database, and during an authenticity check the intrinsic or inherent properties of the security element 1a are verified. During the verification of authenticity, the exact comparison of the data sets with a reference image, that is, a model, is preferably not the previous one, but the detection of the intrinsic properties is, with the result that, for example, it deviates, by for example, because of production tolerances, they do not play a decisive role in verifying authenticity. [00241] Thus, for example, a color image element 7a of a security document 1a can be implemented, in Figure 5a, in the form of an alphanumeric character, in particular the letter K ", in which the image element 7a is provided with a color print 209, still preferably a fluorescent UV print, which has a partial metallization 210, in particular a reflective metallic layer, placed behind with record accuracy when viewed from the observer's direction, or from the direction of a sensor of a reading device 2. Also, in the image element 7a diffractive and / or macroscopic and / or dispersion structures 210, which diffract and / or scatter light incident on the security element 1a, can be molded on part of the surface or on every surface, on which these diffractive and / or macroscopic structures 210 in a preferred embodiment can be designed as selected structures from one or more one-dimensional grid structures or bidimensional with sinusoidal, rectangular and / or asymmetric relief structures and / or matte structures. [00242] Advantageously, the security element 1a contains one or more replication layers containing one or more surface reliefs formed over the entire surface or part of the surface as optically variable elements, in particular, at least a selection of a hologram, Kinegram® and / or Trustseal®, preferably a sinusoidal diffraction grid, an asymmetric relief structure, Petition 870190054494, of 06/13/2019, p. 91/133 65/81 a flaming grid, a preferably isotropic structure or anisotropic matte structure or a microstructure or nanostructure with light diffraction and / or refractor of light and / or light, a binary or continuous Fresnel lens, a microprism structure, a structure microlenses or a combination structure. [00243] In another advantageous embodiment, a matte structure is at least partially formed in a layer of an arranged security element 1a, observed from the direction of a detector of a reading device 2, behind a color print 209, in particular, a partially transparent print, still preferably a fluorescent UV print, wherein that matte structure disperses incident light so that the maximum of the scattered light is incident on a sensor of a reading device 2 during a verification of the security element 1a. The ink, in particular red ink, from the colored print 209 here acts as a filter, in particular, a spectral filter, for the incident light, with the result that the scattered light appears in a red color for an observer and / or an reading device 2 and appears in the form of a correspondingly colored alphanumeric character, in particular, in the form of the letter "K", due to the formation of the image element 7a. In addition, different optical diffraction structures can be formed in the image element 7a in the form of line, planar shape or in the form of alphanumeric characters, lines and / or text with respect to the print 209 drawn in the partial region 7a with a tolerance of ± 0.5 mm, in particular, ± 0.2 mm, preferably less than 0.2 mm and more than -0.2 mm, in the horizontal and vertical direction, as shown in the example in Figure 5a, which can preferably having a number of lines greater than 2000 lines per mm, with the result that the light may no longer be diffracted in a camera of a reading device 2 and the corresponding regions, or partial regions, appear dark. In Figures 5a, 5b Petition 870190054494, of 06/13/2019, p. 92/133 66/81 and 5c the substrate with a possible print 209 is not shown. [00244] Figure 5b shows the partial region 7a under radiation illumination in the IR range, in which the partial metallization 210, that is, the metallic region appears dark against the partial regions of a lighter substrate in a plane region. bottom 7b. Depending on the design of the matte structure and the arrangement of the lighting in the verification device, the matte region may likewise light up. If a fluorescent ink is added to the printing ink 209, the imaging element 7a may light up under irradiation in a strip of UV light in a predetermined color, in particular a yellow color. [00245] In an advantageous verification method, the at least three recordings, that is, images or data sets preferably from the VIS range, the IR range and the UV range, are correlated with each other by means of software, in particular software containing algorithms, an authenticity check is performed for each individual image, that is, for each individual data set. A check that uses the resource inherent relationships between these different data sets for verifying authenticity is particularly advantageous. [00246] In another advantageous method, the transmission properties and / or the reflection properties of a first region 3, preferably of a window element, still preferably of a window resource, of a security document 1 are detected in a or more spectral bands by the reading device 2 both on the front side 6a and on the back side 6b, and for this one or more data sets allocated to the corresponding spectral bands are generated, which, in each case, contain a first item of information with relation to the front side 6a of one or more detectable security elements 10 on the front side 6a and a second information item with respect to the rear side 6b of one or more detectable security elements 10 Petition 870190054494, of 06/13/2019, p. 93/133 67/81 on the rear side 6b, in which a verification of the authenticity of the security document 1 is carried out with the help of the analysis of the data sets by a piece of software, in particular, software containing algorithms, and / or a comparison of the results of analysis, in particular, threshold images, with a model, in particular, with a model threshold image, still preferably with a model threshold image located in a database. In addition, the paints and / or optical diffraction structures drawn on the entire surface or part of the surface on the back side 6b of the security document 1 to be verified may advantageously differ within the meaning of verifying the authenticity of the paints and / or structures drawn on the entire surface or part of the surface on the front side 6a of the security document 1 or be present only on one side, that is, on the front side 6a or on the rear side 6b, and be used as another verification feature, in which the provision of the paints and / or structures on the front side 6a can become with registration accuracy, in particular, within a registration tolerance of ± 0.5 mm, in particular, of ± 0.2 mm, preferably less than 0.2 mm and more than -0.2 mm, with respect to the arrangement of paints and / or structures on the rear side 6b. In addition, one or more selected properties of position, color, ink coverage, reflection, orientation, size, shape, electromagnetic properties, reflection, personalization, and area coverage, of colored and / or structured regions can be recognized by software by provision of a data set and compared with a reference data set, ie a model, for verifying authenticity. Features that have a record accuracy are particularly advantageous. Thus, for example, a partially metallized safety feature can be metallic on the front side, while the same metallic regions can have color placed behind them exactly in the register, that is, free of tolerance, when viewed from the rear side. Petition 870190054494, of 06/13/2019, p. 94/133 68/81 [00247] In another advantageous method, one or more first superimposed regions, which partially or completely comprise one or more security features 10 of one or more security elements 1a of a security document 1, are read by a device reading 2 in one or more spectral bands, in particular, selected from a VIS band, an IR band and a UV band, and one or more data sets 5 are allocated to the spectral bands correspondingly, in which a piece of software, in particular, software comprising one or more algorithms, in particular, model matching, bounding box or A-KAZE, allocates security document 1 to a type, or model, preferably a type or model contained in a database , by evaluating the data sets, in which the database provides one or more selected properties of type, design, position, registration accuracy, registration position, color, ink coverage, reflection, orien tation, size, shape, electromagnetic properties, reflection, personalization, and area coverage of color prints 209 and / or partial metallizations 210 of safety features 10. Partial metallizations can, in particular, be designed as part of a Kinegram®. In addition, the allocation criteria during the verification of the authenticity of security document 1 can advantageously become dependent on the version, model and / or manufacturer of the reading device 2, or verification device, in order to consider variances based on the version of the illuminations and / or sensor conditions and / or sensor settings, or sensor conditions and / or sensor conditions, in the analysis and comparison of the data sets with reference data sets, in particular models, still preferably models stored in a database. In addition, there are more advantages than manufacturing tolerances, which occur during the production of partial metallizations 210 and / or Petition 870190054494, of 06/13/2019, p. 95/133 69/81 distortions during the application of partial metallizations 210 and / or during the recording of partial metallizations 210 on a security document 1, of a plastic document, in particular, a polycarbonate document are considered within the framework of the authenticity check of the security document 1. [00248] In another advantageous modality, a first allocation of the guarantee document 1 is made based on the information contained in the security document 1 itself, such as, for example, in a machine-readable zone, a bar code or a component electronic device, such as a chip. With the help of this information, further analysis and comparison with the database are carried out. [00249] In another advantageous verification method for verifying authenticity a security document 1 is verified, its regions having raised structures, with an HRI layer, which is arranged behind or in front of the structured regions of an observer's view, wherein the HRI layer may additionally be provided with a colored layer. In addition, a colored drawing, contained in the colored layer, can be printed with a registration accuracy of ± 0.5 mm, in particular, ± 0.2 mm, preferably less than 0.2 mm and more than -0.2 mm, with respect to the region with a matte structure, which is molded in the structured regions, in which the HRI layer is not present in the interspaces, that is, in the regions in which no colored design nor the matte structure is present. If the reflective layer, in particular, is not formed, the matte structure, which is formed, in particular, as a relief structure, for example, in a replication layer, may still be present, but not noticeable or optically detectable by because of the lack of reflective layer. In addition, the colored drawing ink can be seen only in a VIS range and / or be detectable only in an IR range, and the colored drawing ink can be drawn partially or completely with pigments Petition 870190054494, of 06/13/2019, p. 96/133 70/81 UV fluorescents, with the result that the position of the partial regions that fluoresce in a UV range is arranged in perfect record with respect to the visible partial regions in a range of VIS and with respect to the detectable matte structures in a range of range IR and / or VIS range. [00250] Figure 6a shows a ray-like design element or security element 1a under illumination in a VIS strip, which has a matte structure in a central region 70e, in which the matte structure disperses incident light in a camera. a reading device 2 both under illumination in a VIS range and under illumination in an IR range. The dispersion effects of the matte structure are observed only in the 70e regions of the design element drawn with the HRI layer, with the result that compared with an observation in a VIS range a clearly recognizable change in contrast or a change in contrast that can be evaluated with the camera is detectable in transitions to the matte structure. [00251] Figure 6b shows the design element of lightning type under illumination in an IR band, in which the ink of the colored design is chosen so that it has no absorption effect under illumination in an IR band, with the result whereas in Figure 6b only the partial regions 70e of the design element drawn with a matte structure and an HRI layer are shown, in which the partial regions of the design element must match the registration accuracy with the central regions 70e in Figure 6a. [00252] Advantageously, fluorescent UV pigments can be mixed with the colored varnish or ink of the design element, with the result that under illumination of a UV band the entire region 70f of the design element lights up, as shown in Figure 6c. [00253] Thus, different partial regions of the design element Petition 870190054494, of 06/13/2019, p. 97/133 71/81 are observed under three different illuminations, which must be arranged with precise registration and / or with registration precision in relation to each other, in which these properties can be verified by means of software within the framework of a document authenticity check Safety 1. Possible printing tolerances of the colored print of the design element with respect to the central region of the design element containing the matte structure are not relevant for the verification of the intrinsic or inherent properties described above, or self-reference. [00254] Figure 6d shows a security document 1, in particular the data page of a passport, comprising a security element 1a, in particular a design element of the radius 600 type, which is molded in a partial region on the front side 6a of the security document 1, where at least the surrounding region 7b with respect to the security element 1a is not provided with an HRI layer. [00255] Figure 7a shows another advantageous example. A transparent layer containing a KINEGRAM® TKO (TKO = Transparent KlNEGRAM Overlay) is used to protect, in particular, the protection against counterfeiting, on the front side 6a of a security document 1, where the front side 6a contains data readable by a reading device 2, which can be used for an authenticity check and / or plausibility check of the security document 1. An HRI layer is used as a reflective layer. In a structured background region 700a on the front side 6a, a grid structure with a number of lines preferably greater than 2000 lines per mm is formed over the entire surface or over part of the surface, whereby in the case of lighting in a first spectral band, in particular, a VIS band, and a second spectral band, in particular, an IR band, no diffraction order light Petition 870190054494, of 06/13/2019, p. 98/133 72/81 is reflected in a sensor, that is, camera, of a reading device 2. The grid structure still has an HRI layer placed under it seen from the front side 6a, with the result that the grid structure together with the HRI layer has a filter effect, as the grid structure influences how much light it can transmit through the HRI layer in a wavelength-dependent manner, which can then be reflected back or scattered back through the front side 6a of the security document 1. [00256] Still preferably, in the structured background region 700a there is a partial metallization formed over part of the surface, preferably in the form of one or more alphanumeric characters, here as object 9b in the form of three letters "UTO", which is found with an accuracy of position in relation to one or more margins of the structured bottom region 700a. The TKO can vary in terms of position up to ± 2 mm, in particular up to ± 0.8 mm, preferably up to ± 0.2 mm, in relation to the substrate due to variations in application. [00257] Particularly preferable, the security document 1 can be verified by the reading device 2 in some regions, in which, in particular, a predetermined pre-selection and / or a pre-selection determined by the reading device 2 of regions to be scanned occurs. Even more preferably, the regions to be checked can also be selected from a data set, in particular, by an algorithm. [00258] Also, a difference in contrast between the structured background region 700a and the background region of TKO 700b containing one or more additional structures or mirror regions is observed under lighting, in particular, under lighting of a IR band, of security document 1, where the formation of the contrast difference on the surface of security document 1 is compared with a model, in particular, a standard data set, Petition 870190054494, of 06/13/2019, p. 99/133 73/81 still preferably a set of standard data stored in a database, in order to determine the authenticity of the security document 1. [00259] In another advantageous method, the position of the partial metallizations in the region of object 9b, in particular, supporting the shape of a three-letter sequence, can additionally be determined by lighting in an IR band, as shown in Figure 7c , and used as another verification step in an authenticity check, in which the partial metallizations as intrinsic or inherent properties of the security document 1 are in perfect register with respect to the margin of one or more security elements 1a, design elements and / or security document 1. [00260] Advantageously, in another spectral band, preferably a VIS band, a colored contrast and / or light contrast can be between the diffractive regions of the grid structure in the background structured region 700a of TKO and the remaining region of plane background 700b of TKO, which are separated by a contrast margin 700 shown in Figure 7a, where the difference in contrast results from the filter effects of the respective diffractive structures, as these particular wavelength bands, or frequency bands, of one or more spectral bands of the incident light scatter back and / or reflect and / or transmit differently. [00261] Still preferably, the security document may comprise a print, in particular, fluorescent UV printing, in the structured background region 700a and / or the remaining background region 700b, which is printed on a layer of film and / or a substrate contained in a security document 1. [00262] Figure 7a shows security document 1 under the illumination of a VIS band, Figure 7b shows the security document Petition 870190054494, of 06/13/2019, p. 100/133 74/81 rance 1 under UV band illumination and Figure 7c shows security document 1 under IR band illumination. [00263] The UV impression detected in a UV strip in the region of object 9b, which in Figure 7b has the form of a sequence of three letters "UTO", is recorded accurately, with a tolerance of ± 0.5 mm, in ± 0.2 mm, preferably less than 0.2 mm and more than -0.2 mm, in relation to the partial metallization detected in an IR band in the region of object 9b, which in Figure 7c also presents the shape of a sequence of the three letters “UTO” and the outer contours of a structured RICS surface. A RIGS (Rotation Induced Color Shift) structure comprises in particular a zero order diffractive structure with an HRI layer placed behind it, in particular a zero order diffraction network, with a period below the wavelength of visible light, in particular half the wavelength of visible light. In particular, the RICS structure reflects certain wavelength ranges in the mirror reflection that are dependent on the orientation of the RICS structure. Under illumination in the IR range, in the case of a RICS structure, preferably dependent on the angle of observation, a contrast relative to a structure without RICS effect in particular can also be recognized. In addition, the at least two image elements detectable under illumination of an IR interval can be compared with at least two objects 9a, 9b detectable under illumination of a VIS interval with the position and / or formation of the structured background region 700a and / or the rest of the base region 700b and applied as another verification step in the structure of a security document 1 authenticity check. [00264] In another advantageous embodiment of the security element 1 a and the verification method, the security element 1 a is designed and verified using the following steps in the form of a QR code: Petition 870190054494, of 06/13/2019, p. 101/133 75/81 [00265] In a first step, a diffractive and / or reflective relief structure, preferably a Kinegram®, and / or a zero order diffraction structure and / or a Kinegram® zero.zero is performed as a first resource security 10 with a partial metallic layer 8a. In Figure 8a partial metallization 214, or Kinegram®, is shown as an example as a closed rosette pattern, in which the material of metallic layer 8a is provided, in particular, in the regions of the imaging elements 7a of the first feature 10a and is not provided in a background region 7b surrounding the imaging elements 7a. [00266] In a second step, a 213 impression consisting of a UV fluorescent ink, which is not visible in the visible range or VIS range, is overprinted on the first security element shown in Figure 8a, in which the impression 213 is shaped like a second security feature 10b in the form of a QR code in the regions of the image elements 7a as a first complete item of information and the shaded areas of the image elements 7a preferably represent the UV fluorescent printing 213, wherein the layer material colored 8b is in particular provided in the regions of the imaging elements 7a of the first security feature 10a and is not provided in a background region 7b surrounding the imaging elements 7a. [00267] In a third stage the impression 213 acts, in particular, as a corrosion resistance mask for another partial metallization 214b on the basis of the partial metallization 214 already carried out in the first stage, with the result that the regions of partial metallization 214 that were not overprinted by print 213 are demetallized. Figure 8c shows the IR image of the partial metallization 214b remaining after demetallization through IR radiation lighting, in particular, from the first spectral band, still preferably from the Petition 870190054494, of 06/13/2019, p. 102/133 76/81 IR range, in which a first data set contains at least the IR image as a partial image of the QR code, which no longer comprises the first complete item of information, but comprises a first part of the two parts of the first complete information item of the second security feature 10b. [00268] Figure 8d shows the UV image of the regions of the fluorescent printing by UV 213 through irradiation by UV radiation, in particular, a second spectral band, still preferably the UV band, which is produced as regions of the print 213 did not cover partial metallization 214b, in which a second data set contains at least the UV image as a partial image of the QR code, which no longer comprises the second complete item of information, but comprises a second part of the two parts of the first complete item of information from the second security feature 10b. [00269] The total image produced by a piece of software containing algorithms in the form of the complete QR code is shown in Figure 8e and is a data set consisting of the combination of the first part and the second part of the two parts of the first complete information item the first data set and the second data set. [00270] In another advantageous embodiment, a first security feature 10a and a second security feature 10b are deliberately arranged not with record accuracy, are preferably still arranged in partially spaced regions of security document 1, and the corresponding data sets are joined together to form a total image by a piece of software, in particular, software containing algorithms. [00271] A QR code record only on a first track is Petition 870190054494, of 06/13/2019, p. 103/133 77/81 pectral, in particular, the IR band, only in a second spectral band, in particular, the UV band, only in a third spectral band, in particular, the VIS band, or only in a fourth spectral band by a reading device 2, in particular, a document verification device, contains only part of the first complete information item, which is contained in the second security feature 10b as the complete QR code, with the result that it is not possible obtain the first complete item of information from the QR code. The combination of the first data set, generated in a first spectral range, in particular, the IR range, and the second data set, generated in a second spectral range, in particular, the UV range, however, makes it possible, through a piece of software containing algorithms, to reconstruct the first complete information item, which is contained in the second security feature 10b as the QR code. [00272] During image processing the UV image is preferably filtered, where only the appropriate yellow pixels or image points, in particular image point data, are considered and are represented in black in a generated UV binary image by a piece of software containing algorithms, preferably image recognition algorithms and pattern recognition algorithms, of the UV image. Still preferably, during image processing the IR image recorded under IR illumination is filtered, in which the metallic regions of the partial metallization 214b appearing in the dark are considered and are represented in black in a binary IR image generated by the IR image software. . Through the superimposition with precision of registration of the UV binary image and the IR binary image, the complete QR code is disclosed as another binary image, with the result that the first complete item of information is readable from the QR code. Petition 870190054494, of 06/13/2019, p. 104/133 78/81 [00273] As another verification step regarding the authenticity of the security element 1a, the registration accuracy of the UV binary image and the IR binary image can be verified, because in the region of the QR code, which is composed of the image binary UV and the binary IR image, there is an almost tolerance-free transition, preferably a tolerance-free transition. [00274] An advantageous embodiment of the security element 1a is shown in Figure 9 and consists of introducing individual marking, preferably consisting of alphanumeric characters, as additional customization and / or individual characterization in one or more partial flat regions 70 of the partial metallization 216 configured as desired, preferably by means of a laser, in particular a laser diode. In a particularly advantageous embodiment, a color print 215 acted as a corrosion resistant color varnish in order to produce the partially metallized regions 216. If the metal layer is now removed by the laser, the color layer below appears again during reading on a reading device 2 the color print 215, still preferably a fluorescent UV print in the partial regions 70 is detectable in a first spectral band, preferably the IR band, and / or a second spectral band, still preferably the band UV, and / or a third spectral band, still preferably the VIS band. [00275] Another advantageous modality of the method consists of comparing the security element 10 detected by the reading device 2 in a first spectral band, preferably the IR band, and / or in a second spectral band, still preferably the UV band, and the threshold image produced respectively of the IR image detected in the form of a data set, in particular the first data set and / or the UV image in the form of a data set, Petition 870190054494, of 06/13/2019, p. 105/133 79/81 in particular, the second data set, by software containing algorithms, in particular, containing an algorithmic model correspondence, with a model, preferably a model contained in a database, and thus to verify authenticity. In addition, the first data set and the second data set, which preferably reflect the image of the partial metallization format 216 respectively in a first spectral band and a second spectral band, can be directly compared with a corresponding model, preferably a contained model in a database, to verify the authenticity of a detected security element 10. [00276] Furthermore, the flat partial regions 70 of the partial metallization 216 of a security element 10 can be formed by laser as a human-readable code, preferably machine-readable code, and used for verifying the authenticity of the security element 10 through comparison with a stored code, in particular, with a code stored in a database, still preferably with an instruction for that code. [00277] In yet another advantageous method, the color print 215 exposed by laser in the partial regions 70 of the partial metallization 216 of a security element 10, in particular UV printing, still preferably fluorescent UV printing, can be provided with a color pattern, in which the color pattern must be in perfect register, in particular, in the register, with the edges of the partial regions 70 and in which to verify the authenticity of the security element 10 the color pattern is compared with a stored color pattern, in particular, with a data set reflecting the color pattern image, still preferably with a data set reflecting the color pattern image contained in a database. [00278] In another advantageous method, the individual markings formed in the partial regions 70 of the partial metallization 216 of an element Petition 870190054494, of 06/13/2019, p. 106/133 80/81 security 10, preferably by a laser, in particular a laser diode, preferably consisting of alphanumeric characters, are detected in one or more spectral bands by the reading device 2 and the data sets thus generated allocated to the bands spectral data are analyzed by unsupervised self-learning algorithms, still preferably monitored or unmonitored self-learning image recognition algorithms and / or pattern recognition algorithms and checked for authenticity. List of security document reference numbers 1a, 1b security element security feature 10th first security feature 10b second security feature document body decorative layer adhesive layer protective layer security feature of the security document 101,102,103,104,105,106 step reading device sensor equipment analysis equipment output equipment radiation sources sensors database 200 distance between central points 201,203, 205, 207, 207b, 209, 213, 215 printing Petition 870190054494, of 06/13/2019, p. 107/133 81/81 201a, 203a printing bounding box 201b, 203b center point of a print bounding box 202, 204, 206, 208, 210, 214, 214b, 216 partial metallization 202a, 204a boundary box for partial metallization 202b, 204b central point of the boundary box of a partial metallization 3 first region 6th front side 6b back side 600 design element 7th image element 7b background region 70 partial region 70a, 70d first partial region 70b, 70e second partial region 70c, 70f third partial region 700 contrast margin 700a background structured region 700b background remnant region 8th metallic layer 8b colored layer 9a first object 9b second object Petition 870190054494, of 06/13/2019, p. 108/133
权利要求:
Claims (79) [1] 1. Method for verifying a security document (1) by means of a reading device (2), characterized by the fact that the first transmission and / or reflection properties of a first region (3) of the security document (1) are detected in a first spectral range by the reading device (2) and a first set of data specifying these properties is generated from it, in which the first region (3) at least in some regions overlays an optical security element (1a, 1b ) laid down in the security document (1) or incorporated in the security document (1), in which the second transmission and / or reflection properties of the first region (3) of the security document (1) are detected in a second spectral band by the reading device (2) and a second set of data specifying these properties is generated from it, in which the first spectral band differs from the second spectral band, in which the security document authenticity a (1) and / or the security element (1a, 1b) is verified based on at least the first data set and the second data set. [2] 2. Method according to claim 1, characterized by the fact that an item of information about authenticity, in particular, an assessment of authenticity, the security element (1a, 1b) or the security document (1) is emitted by the reading device (2). [3] 3. Method, according to claim 1 or 2, characterized by the fact that the third and / or fourth transmission and / or reflection properties of the first region (3) of the security document (1) are detected in a third band spectral or in a fourth spectral range by the reading device (2) and a third data set or fourth data set specifying these properties is generated from it, in which the third spectral range or the fourth spectral range Petition 870190054494, of 06/13/2019, p. 109/133 2/24 differs from the first spectral band and the second spectral band, in which the authenticity of the security document (1) and / or the security element (1a, 1b) is verified, in particular, based on at least the first , the second, the third data set and / or the fourth data set. [4] 4. Method according to any one of the preceding claims, characterized by the fact that the first, second, third and / or fourth transmission and / or reflection properties of the first region (3) of the security document (1 ) are detected in the first, second, third and / or fourth spectral range by the reading device (2) on the sides of the front side (6a) in the reflected light, on the sides of the rear side (6b) in the reflected light and / or in the light transmitted and the first, second, third or fourth data set specifying these properties is generated from it, where preferably at least one of the first detected data sets contains data on the reflection properties in the light reflected from the front and / or rear side, data on the reflection properties in the light reflected from the front and / or rear side and in the transmitted light, and the authenticity of the security document (1) and / or security element (1a, 1b) is verified against this data of this data set. [5] 5. Method according to any one of the preceding claims, characterized by the fact that the first, second, third and / or fourth spectral range is selected from the group: IR range of electromagnetic radiation, in particular, of a range of length from 850 nm to 950 nm, VIS range of electromagnetic radiation, in particular, from a wavelength range of 400 nm to 700 nm, and UV range from electromagnetic radiation, in particular, from a wavelength range wave from 1 nm to 400 nm, preferably from a wavelength range of 240 nm to 380 nm, in particular, preferably from a wavelength range of 300 nm to 380 nm Petition 870190054494, of 06/13/2019, p. 110/133 3/24 nm. [6] 6. Method according to any one of the preceding claims, characterized by the fact that the security element (1a, 1b) of the security document (1) has one or more security features (10), in particular, in the first region (3), and / or where the security document (1) in the first region (3) has one or more security features (10), where security features (10) preferably overlap at least in some regions . [7] 7. Method, according to any of the preceding claims, characterized by the fact that the following steps are taken to verify the authenticity of the security document (1): determining one or more relative values, in particular the relative position arrangement, in particular the spacing, the relative size, the relative formation, in particular, the accuracy of recording the orientation and formation of image elements (7a), the relative coverage and / or relative orientation of two or more security features (10) of the security element (1a, 1b) and / or the security document (1) with respect to each other by comparison, at least first data set and second data set, comparison of one or more relative values determined from the two or more security features (10) with allocated reference values and denial of authenticity if the deviation falls outside an allocated tolerance range. [8] 8. Method, according to any of the preceding claims, characterized by the fact that to verify the authenticity of the security document (1), the following steps are performed: determination of the position arrangement and / or formation of a first security feature (10a) of the security element (1a, 1b) by means of the first data set, determination of the position arrangement and / or formation of Petition 870190054494, of 06/13/2019, p. 111/133 4/24 a second security feature (10b) of the security element (1a, 1b) and / or the security document via the second data set, optionally determining the position arrangement and / or forming a third feature security (10c) and / or fourth security feature (10d) of the security element (1a, 1b) and / or the security document via the third data set or fourth data set, comparison of the determined position provisions and / or forming each other to determine the relative position arrangement, in particular spacing, the relative size and / or the relative formation, in particular, the accuracy of recording the orientation and formation, and / or the coverage of two or more security features (10) of the security element (1a, 1b) with respect to each other or of image elements (7a) of two or more of the security features. [9] Method according to one of claims 6 to 8, characterized in that at least one of the security features (10) has one or more image elements (7a) and a surrounding background region (7b) of the image elements (7a), in which the contrast between image elements (7a) and the background region (7b) in at least one of the first, second, third and / or fourth spectral band in the light reflected and / or transmitted light is greater than 5%, preferably greater than 8% and still preferably greater than 10% and / or the difference in reflection and / or transmittance is greater than 5%, in particular, greater than 10% in particular, it is between 15% and 100%, preferably between 25% and 100%. [10] Method according to one of claims 6 to 9, characterized in that at least one of the security features (10) has one or more image elements (7a) and a surrounding background region (7b) of the image elements (7a), where Petition 870190054494, of 06/13/2019, p. 112/133 5/24 the contrast between the image elements (7a) and the background region (7b) in at least one of the first, second, third and / or fourth spectral band in the reflected light and / or light transmitted is less than 95%, preferably less than 92% and still preferably less than 90%. [11] Method according to one of claims 6 to 10, characterized in that at least one of the safety features (10) is formed by a partially formed metal layer (8a), preferably a reflective metallic layer, which is easily recognizable, in particular, under IR illumination. [12] 12. Method according to claim 11, characterized in that the metallic layer (8a) consists of Al, Cu, Cr, Ag, Au or a respective alloy. [13] 13. Method according to one of claims 6 to 12, characterized in that at least one of the safety features (10) is formed by a colored layer (8b). [14] 14. Method according to claim 13, characterized by the fact that the colored layer (8b) is formed substantially transparent in the first spectral band. [15] 15. Method according to one of claims 13 or 14, characterized in that the colored layer (8b) has a transmittance in the second spectral band and / or in a partial band of the second spectral band of at most 50%, in not more than 25%. [16] 16. Method according to one of claims 13 to 15, characterized in that the colored layer (8b) is formed or appears luminescent. [17] 17. Method according to one of claims 13 to 16, characterized by the fact that the colored layer (8b) is excited by radiation from the second spectral band and / or third spectral band, in Petition 870190054494, of 06/13/2019, p. 113/133 6/24 in particular, in UV lighting and / or VIS lighting. [18] 18. Method according to one of claims 13 to 17, characterized by the fact that at least one of the safety features (10) is formed by a relief structure and a reflective layer, in which the relief structure deflects radiation incident by default, in particular, in at least one of the spectral bands. [19] 19. Method according to claim 18, characterized by the fact that the reflective layer is or appears transparent in at least one of the spectral bands and, in particular, is formed by a reflective layer, preferably an HRI layer, in which the the reflective layer preferably has a transmittance greater than 50%, in particular, greater than 70%, and / or a reflection less than 50%, in particular, less than 30%. [20] 20. Method according to claim 18 or 19, characterized in that the relief structure is formed by a relief structure with optically variable properties and / or comprises one or more of the following relief structures: diffraction grating , asymmetric diffraction structure, isotropic matte structure, anisotropic matte structure, flaming grid, zero order diffraction structure, focus or refractive structures in light, in particular, microprisms, microlenses. [21] 21. Method according to one of claims 18 to 20, characterized in that the relief structure is formed by a diffraction structure, in particular, a zero order diffraction structure, which diffracts the incident light in a predetermined form in one of the first, the second, the third and / or the fourth spectral band, but not to diffract or substantially not to diffract the incident light in one or more of the other first, second, third and / or fourth spectral bands. [22] 22. Method according to one of claims 6 to 21, Petition 870190054494, of 06/13/2019, p. 114/133 7/24 characterized by the fact that to determine the relative formation of the first security feature (10a) and the second security feature (10b), the formation of one or more image elements (7a) from the first security feature (10a) ) and one or more image elements of the second security feature (10b) is checked for whether the image elements (7a) are arranged with record accuracy with respect to each other, in particular, if image elements (7a) formed as lines merge in a positively precise shape and / or correspond with respect to their slope. [23] 23. Method according to any one of the preceding claims, characterized in that the first, second, third and / or fourth data set reproduces the image of the first region through a plurality of image point data, which preferably they allocate, in each case, at least one lightness value to the image points of the first region (3). [24] 24. Method according to claim 23, characterized in that the lightness value is selected from a given value range, which comprises, in particular, 256 values, preferably 512 values, particularly preferably 1024 values. [25] 25. Method according to one of claims 23 or 24, characterized in that the first, second, third and / or fourth data set allocates, in each case, a lightness value per color channel to the image points of the first region (3). [26] 26. Method according to any one of the preceding claims, characterized by the fact that the first, second, third and / or fourth data set is subjected to image processing, which comprises, in particular, one or more of the following phases: image filtering, in particular, through a filter Petition 870190054494, of 06/13/2019, p. 115/133 8/24 low-pass and / or bilateral filter, model matching, threshold, bounding box and A-KAZE determination, in particular, A-KAZE resource detector and resource descriptor determination. [27] 27. Method, according to any of the preceding claims, characterized by the fact that in each case a threshold image is calculated from the first, second, third and / or fourth data set. [28] 28. Method, according to claim 27, characterized by the fact that the following steps are performed to calculate the threshold image of the first, second, third and / or fourth allocated data set: calculation of a margin image of the set of allocated data, calculation of a black image of the allocated data set, calculation of a white image of the allocated data set, calculation of the threshold image combining the margin image, the black image and the white image. [29] 29. Method according to claim 28, characterized by the fact that the margin image is determined from the data set allocated by calculating an adaptive and binary image. [30] 30. Method according to one of claims 28 or 29, characterized in that to calculate the margin image, a filter, in particular, a bilateral filter, with a filter kernel that is large compared to the resolution of image, preferably a filter kernel greater than 71 image points, is applied to the allocated data set, in which the filter performs a contrast of the edges. [31] 31. Method according to one of claims 28 to 30, characterized in that the black image is determined from the data set allocated by calculating a constant binary image. [32] 32. Method according to one of claims 28 to 31, characterized in that the following steps are taken to determine the black image: Petition 870190054494, of 06/13/2019, p. 116/133 9/24 comparing the lightness values of the image point data of the allocated data set with a first threshold value, in which all image points that fall below the first threshold value are allocated by binary value 0, in particular, they are then defined as black. [33] 33. Method, according to claim 32, characterized by the fact that in the case of the UV range as an allocated spectral range, the first threshold value is less than 20% of the value range, in particular, the first threshold value is less than 40 in the case of a value range from 0 to 255. [34] 34. Method, according to claim 32 or 33, characterized by the fact that in the case of the IR range as an allocated spectral range, the first threshold value is less than 25% of the value range, in particular, the first threshold value is less than 60 in the case of a value range from 0 to 255. [35] 35. Method according to one of claims 28 to 34, characterized in that the white image is determined from the data set allocated by calculating a constant binary image. [36] 36. Method according to one of claims 28 to 35, characterized in that the following steps are taken to determine the white image: comparison of the lightness values of the image point data of the allocated data set with a second threshold value, in which all the image points that are above the second threshold value are allocated by the binary value 1, in particular, they are then , defined as white. [37] 37. Method, according to claim 36, characterized by the fact that in the case of the UV range as an allocated spectral range, the second threshold value is greater than 5% of the value range, in particular, the second threshold value is greater that 20 in the case of a value range of Petition 870190054494, of 06/13/2019, p. 117/133 10/24 0 to 255. [38] 38. Method, according to claim 36 or 37, characterized by the fact that in the IR range as an allocated spectral range, the second threshold value is greater than 30% of the value range, in particular, the second threshold value is greater than 80 in the case of a value range from 0 to 255. [39] 39. Method according to one of claims 28 to 38, characterized in that the first and second threshold values differ from each other. [40] 40. Method according to one of claims 28 to 39, characterized by the fact that the first and / or second threshold value is defined depending on the type of document recognized, in the recognized lighting and / or in the allocated spectral range. [41] 41. Method according to one of claims 28 to 40, characterized in that the following steps are performed to combine the margin image, the black image and the white image: multiplication of the margin image by the black image, addition of the white image to the result image before multiplication. [42] 42. Method according to one of claims 6 to 41, characterized in that at least one of the security features (10), in particular, the first security feature (10a), comprises a first object (9a) consisting of in one or more image elements (7a), where the metal of a metal layer (8a) is provided in the region of the image elements (7a) and the metal of the metal layer (8a) of the security feature (10) is not it is provided in a background region (7b) surrounding the image elements (7a). [43] 43. Method according to one of claims 6 to 42, characterized in that at least one of the security features (10), in particular, the second security feature (10b) or one Petition 870190054494, of 06/13/2019, p. 118/133 11/24 additional security feature, comprises a second object (9b) consisting of one or more image elements (7a), in which inks and / or pigments of a colored layer (8b) of the security feature are provided in the region of the image elements (7a) and these inks and / or pigments of the colored layer (8b) are not supplied or are supplied in low concentration in a background region (7b) surrounding the image elements (7a). [44] 44. Method according to claims 42 and 43, characterized by the fact that from the first data set the first object (9a) of the first security feature (10a) is detected and a reference point, in particular, the central point of the first object (9a) is calculated, where from the second data set the second object (9b) of the second security feature (10b) is detected and a reference point, in particular, the central point , of the second object (9b) is calculated, in which the verification of the authenticity of the security document (1) and / or the security element (1a, 1b) is performed by comparing the spacing of the calculated reference points, in particular , the central points, of the first object (9a) and the second object (9b) with a reference value. [45] 45. Method according to claim 44, characterized by the fact that to calculate the reference point, in particular, the central point, of the first and / or the second object (9b), in each case, a rectangular structure is calculated, which preferably surrounds the geometric shapes of the first object (9a) and / or the second object (9b), in which the reference point, in particular the central point, of the rectangular structure is evaluated as a reference point, in particular , as the central point, of the first object (9a) or the second object (9b). [46] 46. Method, according to claim 45, characterized by the fact that the rectangular structure around the largest recognized object is calculated. Petition 870190054494, of 06/13/2019, p. 119/133 12/24 [47] 47. Method according to one of claims 44 or 45, characterized in that to calculate the reference point, in particular, the central point, of the first object (9a) and / or the second object (9b), in in each case, a first or second threshold image is calculated from the first and second data sets, in each case a rectangular structure is calculated or produced, in which the structure is around all the image points of the first threshold image or the second threshold image with binary value 1 or is around all the image points of the first threshold image or second threshold image with binary value 0 and in which the reference point, in particular the central point, of the structure is evaluated as a reference point, in particular, as a central point, of the first object (9a) or second object (9b). [48] 48. Method according to one of claims 6 to 47, characterized in that the first of the security features (10a) and the second of the security features (10b) overlap at least in some regions, where the first feature security (10a) is arranged above the second security feature (10b) when viewed from the front side (6a) of the security element (1a, 1b), where the first and second security features (10a, 10b), in each case, have one or more image elements (7a) and a background region (7b) and the image elements (7a) of the first security feature (10a) are opaque or very opaque in the second spectral band, in particular, consist of a metallic layer (8a), in which the first data set and the second data set are preferably compared to whether image elements (7a) of the second security feature (10b) in the second data set are reproduced in image only in the region the background region (7b) of the first security feature (10a). Petition 870190054494, of 06/13/2019, p. 120/133 13/24 [49] 49. Method according to one of claims 6 to 48, characterized in that the first of the security features (10a) and the second of the security features (10b), in each case, have one or more image elements (7a) and a background region (7b), in which the image elements (7a) of the second security feature (10b) are transparent or very transparent in the first spectral band, but in the second spectral band they have a contrast to the background region (7b) of the second security feature (10b), preferably have a contrast greater than 5%, in particular, more than 8%, preferably more than 10%, as the background region (7b) the second security element (1b), where the first and second security features (10a, 10b) preferably overlap at least in some regions and the second security feature (10b) is arranged above the first security feature (10a ) when viewed from the front side (6a) of the document safety device (1). [50] 50. Method according to claims 6 to 49, characterized in that the position and formation of one or more of the image elements (7a) of the second security feature (10b) are determined from the second set of in particular, by calculating a second threshold image, in which the position and formation of one or more of the image elements (7a) of the first security feature (10a) are determined from the first data set, in in particular, by calculating a first threshold image, at which key points, such as outcomes of the image elements (7a) of the first security feature (10a) and the second security feature (10b) are determined and the accuracy of recording a positioning, formation and / or orientation of the image elements (7a) of the first and the second security element (1a, 1b) in relation to each other is verified in the respective base, in particular, for whether image elements Petition 870190054494, of 06/13/2019, p. 121/133 14/24 (7a) of the first safety feature (10a) and the second safety feature (10b) are positioned with record accuracy in relation to each other according to allocated reference values and / or merge and / or combine with respect to your inclination. [51] 51. Method according to one of claims 6 to 50, characterized in that the first security feature (10a) comprises a partial metallic layer (8a) and a diffractive structure and the second security feature (10b) comprises a partial colored layer (8b), wherein the material of the metallic layer (8a) or the colored layer (8b) is provided in one or more image elements (7a) of the first security feature (10a) and the second feature (10b) and is not provided in a background region (7b) surrounding these, where the image elements (7a) of the metallic layer (8a) and the colored layer (8b) are congruent with each other, in that the diffractive structures are designed so that they diffract radiation from the second spectral band, in particular, from the VIS band, on a sensor (25) of the reading device (2), but do not diffract radiation from the first spectral band, in particular, the IR range, to the sensor (25) of the scanning device itura (2). [52] 52. Method according to one of claims 6 to 51, characterized in that the first safety feature (10a) comprises a partial metallic layer (8a) and the second safety feature (10b) comprises a partial colored layer ( 8b), where the material of the metallic layer (8a) or the colored layer (8b) is provided in one or more image elements (7a) of the first security feature (10a) and the second security feature (10b) and it is not provided in a background region (7b) surrounding these, where several image elements (7a) of the colored layer (8b) are in a machine-readable code format, where the metallic layer (8a) is demetallized using a first layer of mask, Petition 870190054494, of 06/13/2019, p. 122/133 15/24 which is in the format of a first item of information, and using a second layer of mask, which is formed by the colored layer (8b), with the result that the image elements (7a) of the metallic layer (8a) do not contain the first full item of information. [53] 53. Method according to claim 52, characterized by the fact that a machine-readable code and / or the first item of information is calculated by combining the first data set and the second data set. [54] 54. Method, according to any of the preceding claims, characterized by the fact that the following steps are still carried out to verify the authenticity of the security document (1), if the security element (1a, 1b) has a security feature security (10) comprising a colored layer (8b): determination of one or more parameters of the colored layer (8b), selected from the position, color, paint coverage, reflection, orientation, size, shape, customization, change of core electromagnetic properties, in particular, on the basis of one or more among the first, second, third and fourth data sets, in which a comparison of one or more determined parameters with preferred allocated reference values is preferably performed and a denial of authenticity is performed if the deviation exceeds a predefined tolerance range. [55] 55. Method, according to any of the preceding claims, characterized by the fact that the following steps are still carried out to verify the authenticity of the security document (1), if the security element (1a, 1b) has a security feature security (10) comprising a metallic layer (8a): determination of one or more parameters of the metallic layer (8a), selected from the position, reflection, orientation, size, shape, customization, area coverage, in particular, on the basis of a Petition 870190054494, of 06/13/2019, p. 123/133 16/24 or more from the first, second, third and fourth data sets, in which a comparison of one or more determined parameters with preferred allocated reference values is preferably performed and a denial of authenticity is performed if the deviation exceeds a range predefined tolerance. [56] 56. Method, according to any one of the preceding claims, characterized by the fact that the following steps are still taken to verify the authenticity of the security document (1), if the security element (1a, 1b) has a security feature security (10) comprising an antenna: determination of one or more parameters of the metallic layer (8a), selected from position, electromagnetic properties, design, color, in particular, based on one or more of the first, second, third and fourth data sets, in which a comparison of one or more parameters determined with preferred allocated reference values is preferably performed and a denial of authenticity is performed if the deviation exceeds a predefined tolerance range. [57] 57. Method, according to any of the preceding claims, characterized by the fact that the following steps are still carried out to verify the authenticity of the security document (1), if the security document (1) underneath the security element ( 1a, 1b) has a document history comprising a metallic layer (8a) and / or colored layer (8b): determination of one or more parameters of the metallic layer (8a) and / or colored layer (8b), selected from position , color, ink coverage, reflection, orientation, size, shape, electromagnetic properties, reflection, personalization and area coverage, in particular, on the basis of one or more of the first, second, third and fourth data sets, in which a comparison of one or more determined parameters with values of Petition 870190054494, of 06/13/2019, p. 124/133 17/24 preferred allocated reference is, in particular, performed and a denial of authenticity is performed if the deviation exceeds a predefined tolerance range. [58] 58. Method, according to any one of the preceding claims, characterized by the fact that the following steps are still taken to verify the authenticity of the security document (1), if the security element (1a, 1b) has a security feature security (10) comprising an RFID chip: reading one or more items of information stored on the RFID chip, which include, in particular, a specification of one or more security features (10) of the security element (1a, 1b) and / or code stored there, verification of security document (1) on the basis of the read information items, in particular, whether one or more security features (10) of the security element (1a, 1b) match the read specifications and / or include the read code. [59] 59. Method, according to any of the preceding claims, characterized by the fact that the following steps are still carried out to verify the authenticity of the security document (1), if the security element (1a, 1b) has a security feature security (10) comprising a diffractive and / or refractive structure: determination of one or more parameters of the diffractive and / or refractive structure, selected from position, reflection, dispersion, brightness, arrangement of the design elements (600) of the diffractive and / or refractive structure, in particular, on the basis of one or more among the first, second, third and fourth data sets, in particular, comparison of one or more determined parameters with preferred allocated reference values and denial of authenticity if the deviation exceeds the predefined tolerance range. [60] 60. Method, according to any of the preceding claims, characterized by the fact that the following steps are still Petition 870190054494, of 06/13/2019, p. 125/133 18/24 carried out to verify the authenticity of the security document (1), if the security element (1a, 1b) has a security feature (10) comprising a self-luminous structure: determination of one or more parameters of the self-luminous structure, selected for luminescence when excited, color when excited, position of the elements of the self-luminous structure, in particular, on the basis of one or more of the first, second, third and fourth data sets, in in particular, comparison of one or more determined parameters with preferred allocated reference values and denial of authenticity if the deviation exceeds the predefined tolerance range. [61] 61. Method, according to any of the preceding claims, characterized by the fact that the following steps are still carried out to verify the authenticity of the security document (1), if the security document (1) comprises the body of the document ( 11) with several layers and / or a window and / or a through hole region: determination of one or more parameters of the document body (11), selected from the window position, window format, position of the layers in relation to each other, in particular, on the basis of one or more of the first, second, third and fourth data sets, in particular, comparison of one or more determined parameters with preferred allocated reference values and denial of authenticity if the deviation exceeds the predefined tolerance range. [62] 62. Adequate security document to carry out the method, according to any of the previous claims. [63] 63. Device, in particular, reading device (2), to check the security document (1), characterized by the fact that the device has the sensor piece of equipment (21), which is designed so that it detects first transmission properties and / or Petition 870190054494, of 06/13/2019, p. 126/133 19/24 reflection of a first region (3) of the security document (1) in a first spectral band and generates a first set of data specifying these properties of it, in which the first region (3) at least in some regions overlaps a optical security element (1a, 1b) provided in the security document (1) or incorporated in the security document (1), in which the sensor equipment (21) is further designed so that it detects second transmission properties and / or reflection of the first region (3) of the security document (1) in the second spectral band and generates a second set of data specifying these properties of it, in which the first spectral band differs from the second spectral band, and in which the device has a piece of analysis equipment (22), which is designed to verify the authenticity of the security document (1) and / or the security element (1a, 1b) based on at least the first data set and the second data set. [64] 64. Device according to claim 63, characterized by the fact that the sensor equipment (21) has one or more sensors (25) and one or more radiation sources (24), in which preferably different radiation sources ( 24) and / or sensors (25) are allocated to the first spectral range and the second spectral range. [65] 65. Device according to one of claims 63 or 64, characterized by the fact that the sensor equipment (21) comprises one or more radiation sources (24), in which one or more of the radiation sources (24) respectively emit visible light, UV light and / or IR radiation. [66] 66. Device according to one of claims 63 to 65, characterized by the fact that the sensor equipment has one or more sensors (25), in which one or more of the sensors (25) respectively detect visible light, UV light and / or IR radiation. [67] 67. Security element (1a, 1b), in particular, for use Petition 870190054494, of 06/13/2019, p. 127/133 20/24 in a method according to one of claims 1 to 61, characterized by the fact that the security element (1a, 1 b) of the security document (1) has two or more security features (10), [68] 68. Security element (1a, 1b) according to claim 67, characterized by the fact that two or more of the security features (10) of the security element (1a, 1b), in each case, have an arrangement of predetermined position, in particular, a predetermined spacing, an index of predetermined size, in each case, a predetermined formation, in particular, a precision of registration of the orientation and formation of predetermined image elements (7a), a predetermined coverage and / or predetermined orientation with respect to each other. [69] 69. Security element (1a, 1 b) according to one of claims 67 to 68, characterized in that at least one of the security features (10) comprises a first object (9a) consisting of one or more elements image (7a), where the metal of the metal layer (8a) is provided in the region of the image elements (7a) and the metal of the metal layer (8a) is not provided in a surrounding background region (7b) to the image elements (7a). [70] 70. Security element (1a, 1 b) according to one of claims 67 to 69, characterized in that at least one of the security features (10) comprises a second object (9b) consisting of one or more elements image (7a), in which inks and / or pigments of the colored layer (8b) of the security feature (10) are provided in the region of the image elements (7a) and these inks and / or pigments of the colored layer (8b) they are not supplied or are supplied in low concentration in a background region (7b) surrounding the image elements (7a). [71] 71. Security element (1a, 1 b), according to one of the Petition 870190054494, of 06/13/2019, p. 128/133 21/24 claims 67 to 70, characterized by the fact that the security element (1a, 1b) has a first and a second security feature (10a, 10b), in which a first security feature (10a) and a second security feature (10b) overlap at least in some regions, where the first security feature (10a) is placed above the second security feature (10b) when viewed from the front side (6a) of the security element (1a, 1b), in which the first and second security features (10a, 10b), in each case, have one or more image elements (7a) and a background region (7b) and the image elements (7a ) of the first safety feature (10a) are opaque or very opaque in the second spectral band, in particular, they consist of the metallic layer (8a). [72] 72. Security element (1a, 1 b) according to one of claims 67 to 71, characterized in that the security element (1a, 1b) has a first and / or a second security feature (10a, 10b), in which the first security feature (10a) and / or the second security feature (10b), in each case, comprise one or more image elements (7a) and a background region (7b), wherein the image elements (7a) of the second security feature (10b) are transparent or very transparent in the first spectral band, but in the second spectral band have a contrast to the background region (7b) of the second security feature ( 10b), preferably have a contrast greater than 5%, in particular, greater than 8%, preferably greater than 10%, as the background region (7b) of the second security element (10b), where the first and the second security feature (10a, 10b) preferably overlaps at least in some regions and the second feature Security system (10b) is placed above the first security element (10a) when viewed from the front side (6a) of the security document (1). [73] 73. Security element (1a, 1 b), according to one of the Petition 870190054494, of 06/13/2019, p. 129/133 22/24 claims 67 to 72, characterized by the fact that the security element (1a, 1b) has a first and a second security feature (10a, 10b), in which one or more of the image elements (7a) of the second security feature (10b) and one or more of the image elements (7a) of the first security feature (10a) are provided with registration accuracy on the security element (1a, 1b) with respect to positioning, formation and / or orientation of the image elements (7a) of the first and the second security element (1a, 1b) with respect to each other, in particular, the image elements (7a) of the first security feature (10a) and the second security feature ( 10b) are positioned with record accuracy in relation to each other and / or merge and / or combine with respect to their inclination. [74] 74. Security element (1a, 1 b) according to one of claims 67 to 73, characterized in that the security element (1a, 1b) has a first and a second security feature (10a, 10b) , wherein the first safety feature (10a) comprises a partial metallic layer (8a) and a diffractive structure and the second safety feature (10b) comprises a partial colored layer (8b), wherein the material of the metallic layer (8a) ) or colored layer (8b) is provided in one or more image elements (7a) of the first security feature (10a) and / or the second security feature (10b) and is not provided in a background region (7b) surrounding these, in which the image elements (7a) of the metallic layer (8a) and the colored layer (8b) are congruent with each other, in which the diffractive structures are designed in such a way that they diffract radiation from the second spectral band, in particular, of the VIS range, in a sensor of the reading device (2), but they do not diffract radiation from the first spectral band, in particular, from the IR band, to the sensor of the reading device (2). [75] 75. Security element (1a, 1 b), according to one of the Petition 870190054494, of 06/13/2019, p. 130/133 23/24 claims 67 to 74, characterized by the fact that the security element (1a, 1b) has a first and a second security feature (10a, 10b), wherein the first security feature (10a) comprises a layer partial metallic (8a) and the second security feature (10b) comprises a partial colored layer (8b), in which the material of the metallic layer (8a) or the colored layer (8b) is provided in one or more image elements ( 7a) of the first security feature (10a) and the second security feature (10b) and is not provided in a background region (7b) surrounding these, where several image elements (7a) of the colored layer (8b ) are in a machine-readable code format, where the metallic layer (8a) is formed in the form of a first item of information using a first layer of mask and is demetallized using a second layer of mask, consisting of the colored layer (8b), with the result that the image elements (7a) of the metallic layer (8a) do not contain the first complete item of information. [76] 76. Security element (1a, 1 b) according to one of claims 67 to 75, characterized in that it comprises a machine-readable code and / or the first item of information. [77] 77. Security element (1a, 1 b) according to one of claims 67 to 76, characterized in that the security element (1a, 1b) has a security feature (10) comprising an antenna. [78] 78. Security element (1a, 1 b) according to one of claims 67 to 77, characterized in that the security element (1a, 1b) has at least one security feature (10) comprising a security chip RFID, in which the RFID chip has stored items of information, which include, in particular, a specification of one or more security features (10) of the security element (1a, 1b) and / or code stored therein, where the security document Petition 870190054494, of 06/13/2019, p. 131/133 24/24 (1) can be checked, in particular, on the basis of the information items read, in particular, whether one or more of the security features (10) of the security element (1a, 1b), in each case, correspond to the read specifications and / or include the read code. [79] 79. Security document (1) with at least one security element (1a, 1b) according to one of claims 67 to 78, characterized in that the security document (1) under the security element (1a , 1b) has a document history comprising a metallic layer (8a) and / or colored layer (8b) and / or in which the security document (1) comprises the body of the document (11) with several layers and / or a window and / or through hole region.
类似技术:
公开号 | 公开日 | 专利标题 BR112019012094A2|2019-10-29|method for verifying security document as well as a security document, device and security element US10019626B2|2018-07-10|Method for authenticating a security element, and optically variable security element JP2020509508A5|2021-01-21| RU2596447C2|2016-09-10|Protective element and method of making protective element EA028408B1|2017-11-30|Method for creating and recognizing an anti-counterfeit identification of random texture and recognizer thereof US20030230816A1|2003-12-18|Optically active structure for secured documents and the like, and methods for their production JPH08286593A|1996-11-01|Optical information recording medium US10479128B2|2019-11-19|Security feature EP3385924B1|2021-06-02|Identification method EP3432277A1|2019-01-23|Identification device, identification method, identification program, and computer readable medium containing identification program US9704080B2|2017-07-11|Security element for sensitive documents and a sensitive document BRPI0617310A2|2011-05-10|Printed and / or customized graphic element creation method Fake proof on a stand and bracket thus obtained KR20210132703A|2021-11-04|How to Authenticate a Magnetic Induction Mark with a Portable Device DE102017102556A1|2018-08-09|A method for verifying a security document and a security document, a device and a security element EP3284065A1|2018-02-21|Method for verifying a security device comprising a signature RU2700008C1|2019-09-12|Protective element, which contains hidden information, and containing its valuable document JP2020525882A|2020-08-27|Method and security element for authenticating objects, especially security elements WO2010059075A1|2010-05-27|Counterfeit-proof value paper with a security element |, a method for protecting a value paper against counterfeit |, a display device and a security element | AU2016330007B2|2021-10-28|Security print media and method of manufacture thereof RU2561413C1|2015-08-27|Multi-layer composite element based on paper and valuable counterfeit-proof document RU2557620C1|2015-07-27|Multilayer polymer structure and method of making same KR20170087484A|2017-07-28|Multi-layer body and method for the production thereof BR112014025459B1|2021-05-25|optical safety component, manufacture of such component and safe product equipped with such component KR20200051537A|2020-05-13|QR Code Preventing Forgery and Falsification Comprising Photonic Crystal Materials and Method Using there of WO2020191520A1|2020-10-01|Microstructure detection based anti-counterfeiting paper product, and manufacturing method and authentication method therefor
同族专利:
公开号 | 公开日 WO2018109035A3|2018-08-23| US20190384955A1|2019-12-19| CA3047482A1|2018-06-21| EP3555811A2|2019-10-23| WO2018109035A2|2018-06-21| AU2017375027A1|2019-07-11| KR20190107024A|2019-09-18| JP2020509508A|2020-03-26| MX2019006851A|2019-11-21| US11068681B2|2021-07-20| MA47021A|2019-10-23|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 GB2088919B|1980-05-30|1984-05-02|Gao Ges Automation Org|Paper securities with authenticity mark of luminescent material| US6373965B1|1994-06-24|2002-04-16|Angstrom Technologies, Inc.|Apparatus and methods for authentication using partially fluorescent graphic images and OCR characters| US6827769B2|2001-05-10|2004-12-07|Pitney Bowes Inc.|Photosensitive optically variable ink heterogeneous compositions for ink jet printing| DE10260124A1|2002-12-19|2004-07-01|Giesecke & Devrient Gmbh|Security element for documents of value| GB2403798B|2003-07-03|2006-11-29|Ver Tec Security Systems Ltd|Apparatus and methods for device quality evaluation| US7706565B2|2003-09-30|2010-04-27|Digimarc Corporation|Multi-channel digital watermarking| DE102004007379B3|2004-02-16|2005-09-01|Ovd Kinegram Ag|Valuable object with moiré pattern| CN1950857B|2004-03-09|2012-08-22|科学和工业研究理事会|Improved fake currency detector using visual and reflective spectral response| DE102004059798A1|2004-12-10|2006-06-29|Ovd Kinegram Ag|Optically variable element with electrically active layer| GB0810807D0|2008-06-12|2008-07-23|Rue De Int Ltd|Securing document security systems and method of controlling access| DE102009057360A1|2009-12-08|2011-06-09|Bundesdruckerei Gmbh|Method for verifying authenticity of personalized safety document, involves comparing photographic view produced for verifying authenticity with another photographic view stored in data memory for confirmation of authenticity of document| DE102010019194A1|2010-05-04|2011-11-10|Giesecke & Devrient Gmbh|Value document with recess| US20110298204A1|2010-06-07|2011-12-08|Xerox Corporation|Document security by aligning visible and hidden marks| DE102010062032A1|2010-11-26|2012-05-31|Bundesdruckerei Gmbh|Value and / or security document and method for its production| DE102011005518A1|2011-03-14|2012-09-20|Bundesdruckerei Gmbh|Security element with a 3D color effect and verification method and verification device for such a security element| JP6042757B2|2013-03-21|2016-12-14|日本発條株式会社|Identification medium, code information reading method, code information reading apparatus, identification medium manufacturing method, and identification medium manufacturing apparatus| DE102013009474A1|2013-06-06|2014-12-11|Modi Modular Digits Gmbh|Apparatus for automatically verifying a person's identity document and method for generating identification data of a person for use in an automated identity control station| DE102014207323B4|2014-04-16|2018-08-16|Koenig & Bauer Ag|Method for identifying an object| DE102015100520A1|2015-01-14|2016-07-28|Leonhard Kurz Stiftung & Co. Kg|Multilayer body and method for its production| DE102015106800B4|2015-04-30|2021-12-30|Leonhard Kurz Stiftung & Co. Kg|Method for producing a multilayer body|US11167581B2|2018-04-06|2021-11-09|Proof Authentication Corporation|Authentication hologram| FR3081244B1|2018-05-17|2020-05-29|Idemia Identity & Security France|CHARACTER RECOGNITION PROCESS| US11262298B2|2018-08-30|2022-03-01|Caterpillar Inc.|System and method for determining fluid origin| US10950079B2|2018-12-17|2021-03-16|Morgan State University|Method and apparatus for determining the authenticity of flat objects: banknotes, documents, security labels, and related items| US10509991B1|2019-03-18|2019-12-17|Capital One Services, Llc|Detection of images in relation to targets based on colorspace transformation techniques and utilizing infrared light| US10534948B1|2019-03-18|2020-01-14|Capital One Services, Llc|Optimizing detection of images in relation to targets based on colorspace transformation techniques| US10496862B1|2019-03-18|2019-12-03|Capital One Services, Llc|Detection of images in relation to targets based on colorspace transformation techniques and utilizing ultraviolet light| US10496911B1|2019-03-18|2019-12-03|Capital One Services, Llc|Detection of images in relation to targets based on colorspace transformation techniques and utilizing ultraviolet and infrared light| US10523420B1|2019-04-18|2019-12-31|Capital One Services, Llc|Transmitting encoded data along transmission mediums based on colorspace schemes| US10504013B1|2019-04-24|2019-12-10|Capital One Services, Llc|Colorspace encoding multimedia data on a physical page| US10529300B1|2019-06-20|2020-01-07|Capital One Services, Llc|Adaptive image display based on colorspace conversions| US10614635B1|2019-07-25|2020-04-07|Capital One Services, Llc|Augmented reality system with color-based fiducial marker| US10833852B1|2019-10-03|2020-11-10|Capital One Services, Llc|Encoded data along tape based on colorspace schemes| GB2588181A|2019-10-11|2021-04-21|De La Rue Int Ltd|A method and apparatus for inspecting a light control layer for a security device| US10715183B1|2019-10-25|2020-07-14|Capital One Services, Llc|Data encoding with error-correcting code pursuant to colorspace schemes| US10867226B1|2019-11-04|2020-12-15|Capital One Services, Llc|Programmable logic array and colorspace conversions| US10762371B1|2019-11-14|2020-09-01|Capital One Services, Llc|Object detection techniques using colorspace conversions| US10878600B1|2019-12-10|2020-12-29|Capital One Services, Llc|Augmented reality system with color-based fiducial marker utilizing local adaptive technology| DE102020101559A1|2020-01-23|2021-07-29|Kurz Digital Solutions Gmbh & Co. Kg|Method for authenticating a security document| US20210248338A1|2020-02-08|2021-08-12|Blocktag, Inc.|Systems, methods and apparatuses of a security device| DE102020109171A1|2020-04-02|2021-10-07|Bundesdruckerei Gmbh|Integrity check of a document with personal data| DE102020120842A1|2020-08-07|2022-02-10|Bundesdruckerei Gmbh|Generation of document templates with security features|
法律状态:
2021-10-13| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 DE102016124717|2016-12-16| DE102017102556.1A|DE102017102556A1|2017-02-09|2017-02-09|A method for verifying a security document and a security document, a device and a security element| PCT/EP2017/082681|WO2018109035A2|2016-12-16|2017-12-13|Method for verifying a security document as well as a security document, a device and a security element| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
|