摘要:
The invention relates to a security element (2), in particular in the form of a multi-layer flexible film body, with a top side facing an observer and a back side facing away from the observer, as well as a method for the production thereof. The security element (2) has one or more light-emitting elements arranged in a first area (30) of the security element which radiate light when activated and in particular are formed in each case of a self-luminous, electrically operated, display element. The security element (2) has, in the first area (30), one or more transmissive diffraction structures. The one or more transmissive diffraction structures are arranged such that at least a part of the light radiated by the activated one or more light-emitting elements transmits through at least one partial area of the transmissive diffraction structures.
摘要:
A process for accessing a data storage device of a cloud computer system CCS through a gateway computer system GCS includes setting up a protected connection over the Internet between a first piece of terminal equipment of the user and the GCS by inputting the URL of the CCS into a program of the piece of terminal equipment, and using a modified DNS for name resolution of the URL, so that the protected connection is set up with the GCS instead of with the CCS; transferring a file over the protected connection from the terminal equipment to the GCS; setting up a session over the network between the GCS and the cloud computer system; encrypting the file by the GCS using the cryptographic key; transferring the encrypted file through the session from the GCS to the CCS; and storing the encrypted file in the data storage device of the CCS.
摘要:
Method and device for testing a security element (4) of a security document, the security element (4) being able to contain at least one substance (5) which has optically variable properties, including the following method steps:illuminating the security element (4) with at least one predetermined illumination parameter, filtering the light reflected by the security element into a first component (RLp) having a first polarisation, determining an intensity (I) of the first component (RLp) of reflected light reflected at a reflection angle (φR), for at least one reflection angle (φR), and verifying the presence of a substance (5) which has optically variable properties as a function of the intensity (I) of the first component (RLp).
摘要:
The invention relates to the use of a preparation comprising A) 0.1 to 20 wt % of a binding agent with a polycarbonate derivative based on a geminally disubstituted dihydroxydiphenyl cycloalkane, B) 30 to 99.9 wt % of an organic solvent or of a mixture of solvents, C) 0 to 10 wt %, referred to dry mass, of a dye or of a mixture of dyes, D) 0 to 10 wt % of a functional material or of a mixture of functional materials, E) 0 to 30 wt % of additive and/or auxiliary substances, or of a mixture of such substances, the relative amounts of the components A) to E) always totaling 100 wt %, as an ink jet printing dye.
摘要:
This invention relates to a security product or product of value (100) with a passive, electroluminescent security element (10) which includes a field-induced electroluminescent component (20) (EL component). The EL component (20) contains an electroluminescent laminate (30) disposed between two electrodes (22, 24), which at least comprises an electroluminescent dye embedded in a transparent dielectric material. The laminate (30) consists of just a single layer that directly adjoins the electrodes (22, 24). This invention further relates to an associated production method.
摘要:
In various embodiments, a chip card module is provided that can have: a chip card module support; a wiring structure that is arranged on the chip card module support; an integrated circuit that is arranged on the chip card module support and is electrically coupled to the wiring structure; a chip card module antenna that is arranged on the chip card module support and is electrically coupled to the wiring structure, and a lighting device that is arranged on the chip card module support and is electrically coupled to the wiring structure.
摘要:
An identity card, comprising a card body and a physical unclonable function are arranged within the card body, wherein the physical unclonable function comprises a first light influencing layer and a second light influencing layer.
摘要:
The method relates to a method for generating a soft token, having the following: providing a secure element, wherein, in a protected storage area of the secure element, a secret key of a first asymmetric cryptographic key pair is stored, setting up a first cryptographically secured connection between an electronic device and a service computer system, transmitting a request for the generation of the soft token from the electronic device to the service computer system via the first connection, generating a one-time password on the basis of the reception of the request by the service computer system, registering the one-time password as an identifier of the first connection by the service computer system, transmitting the one-time password from the service computer system to the electronic device via the first connection, issuing the one-time password via a user interface of the electronic device, setting up a second cryptographically stored connection between a user computer system and the service computer system, entering the one-time password into the user computer system, transmitting the entered one-time password from the user computer system to the service computer system via the second connection, verifying, by means of the service computer system, whether the registered one-time password is in agreement with the one-time password received via the second connection, and only if this is the case, reading at least one attribute stored in an ID token, generating the soft token by signing the at least one attribute and the public key of the first cryptographic key pair, transmitting the soft token via the first connection to the electronic device and/or transmitting the soft token via the second connection to the user computer system.
摘要:
A method for reading at least one attribute stored in an ID token using first, second and third computer systems, wherein the third computer system comprises a browser and a client, and wherein a service certificate is assigned to the second computer system, wherein the service certificate comprises an identifier which is used to identify the second computer system, wherein the ID token is assigned to a user, a first cryptographically protected connection (TLS1) is set up between the browser of the third computer system and the second computer system, wherein the third computer system receives a first certificate, the first certificate is stored by the third computer system, the third computer system receives a signed attribute specification via the first connection, a second cryptographically protected connection (TLS2) is set up between the browser of the third computer system and the first computer system, wherein the third computer system receives a second certificate, the signed attribute specification is forwarded from the third computer system to the first computer system via the second connection, the first computer system accesses an authorization certificate, wherein the authorization certificate comprises the identifier, a third cryptographically protected connection (TLS3) is set up between the first computer system and the client of the third computer system, wherein the third computer system receives the authorization certificate containing the identifier via the third connection, the client of the third computer system checks whether the first certificate comprises the identifier as proof of the fact that the first certificate matches the service certificate, the user is authenticated with respect to the ID token, the first computer system is authenticated with respect to the ID token, a fourth cryptographically protected connection with end-to-end encryption is set up between the ID token and the first computer system, after the user and the first computer system have been successfully authenticated with respect to the ID token, the first computer system has read access to the at least one attribute stored in the ID token via the fourth connection in order to read the one or more attributes specified in the attribute specification from the ID token,—the first computer system transmits the at least one attribute to the second computer system after said attribute has been signed.
摘要:
The present invention relates to a security document and/or value document, in particular banknote, with security features and with a verification element for verifying the security feature. The object of the present invention, to develop a generically compliant security document and/or value document, in which security against forgery is increased and the document can be inspected for genuinity more easily and without the use of external aids, is accomplished in that at least one verification element 2 and at least one security feature 3 to be verifiable by this verification element 2 are integrated into the document 1 in various positions, whereby the verification element 2 and the security element 3 are brought over each other only when verification is to take place.