US20060005050A1 - Tamper-free and forgery-proof passport and methods for providing same - Google Patents

Tamper-free and forgery-proof passport and methods for providing same Download PDF

Info

Publication number
US20060005050A1
US20060005050A1 US10/864,353 US86435304A US2006005050A1 US 20060005050 A1 US20060005050 A1 US 20060005050A1 US 86435304 A US86435304 A US 86435304A US 2006005050 A1 US2006005050 A1 US 2006005050A1
Authority
US
United States
Prior art keywords
smart
passport
inlay
core substrate
smart inlay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/864,353
Inventor
Eli Basson
Boaz Shuman
Igor Merling
Eli Hassan
Ilan Kander
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
On Track Innovations Ltd
Supercom IP LLC
Original Assignee
Supercom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Supercom Ltd filed Critical Supercom Ltd
Priority to US10/864,353 priority Critical patent/US20060005050A1/en
Assigned to SUPERCOM LTD. reassignment SUPERCOM LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BASON, ELI, HASSAN, ELI, KANDER, ILAN, MERLING, IGOR, SHUMAN, BOAZ
Priority to US11/010,382 priority patent/US7243840B2/en
Priority to BRPI0512287-2A priority patent/BRPI0512287A/en
Priority to AU2005252038A priority patent/AU2005252038A1/en
Priority to PCT/IL2005/000606 priority patent/WO2005120726A2/en
Priority to MXPA06014309A priority patent/MXPA06014309A/en
Priority to US11/570,338 priority patent/US7905415B2/en
Priority to KR1020077000622A priority patent/KR20070051836A/en
Priority to CA002570077A priority patent/CA2570077A1/en
Priority to AP2006003864A priority patent/AP2006003864A0/en
Priority to EA200700002A priority patent/EA012731B1/en
Priority to CN2005800189722A priority patent/CN101002214B/en
Priority to EP05749890.9A priority patent/EP1791655B1/en
Publication of US20060005050A1 publication Critical patent/US20060005050A1/en
Assigned to ON TRACK INNOVATIONS LTD. reassignment ON TRACK INNOVATIONS LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SUPERCOM LTD.
Priority to IL179938A priority patent/IL179938A/en
Priority to ZA200700075A priority patent/ZA200700075B/en
Priority to HK07112372.6A priority patent/HK1103827A1/en
Assigned to DBFIP SCL LLC reassignment DBFIP SCL LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SUPERCOM IP LLC
Assigned to SUPERCOM IP LLC reassignment SUPERCOM IP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SAFEND LTD
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/02Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
    • G06K19/025Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine the material being flexible or adapted for folding, e.g. paper or paper-like materials used in luggage labels, identification tags, forms or identification documents carrying RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card

Definitions

  • the present invention relates to tamper-free and forgery-proof identification documents, and in particular to smart passports.
  • MTRD Machine Readable Travel Document
  • a machine-readable passport since October 2003.
  • the passport is required to contain biometric data that uniquely identifies its bearer.
  • This turns the passport into a “smart” passport, which comprises a contactless chip that stores the personal biometric information as digital information.
  • the chip is accessed contactlessly by a reader that retrieves the biometric information and compares it with information stored in a database, to verify the identity of the passport bearer.
  • the International Civil Aviation Organization (ICAO) is setting the standard to be followed by all such smart passport issuers.
  • Smart documents are known in the art. Smart cards have been used to store personal information and even biometric information about their owners to facilitate electronic transactions. The information is stored on embedded chips, see for example U.S. Pat. No. 6,219,439, the content of which is incorporated herein by reference, U.S. Pat. No. 6,219,439 further describes a identifying characteristic authentication system using a smart card having stored physiological data of a user on a chip disposed therein, and a fingerprint scan (or retina scan, voice identification, saliva or other identifying characteristic data) for comparison against the stored data. The system is self-contained so that the comparison of the identifying characteristic data with the data stored on the chip is done immediately on board the reader without relying upon communications to or from an external source in order to authenticate the user. This arrangement also prevents communication with external sources prior to user authentication being confirmed, so as to prevent user data from being stolen or corrupted.
  • U.S. Pat. No. 6,101,477 describes a smart card for travel-related use, such as for airline, hotel, rental car, and payment-related applications. Memory space and security features within specific applications provide partnering organizations (e.g., airlines, hotel chains, and rental car agencies) the ability to construct custom and secure file structures.
  • U.S. Pat. No. 5,291,560 describes a personal identification system based on iris analysis.
  • U.S. Pat. No. 5,363,453 describes a personal identification system based on biometric fingerprint data. However, there is no encryption of the biometric information involved.
  • EP 0019191B1 discloses a paper of value (e.g. an ID) with an integrated circuit in which a checkable coding is written, the communication with the integrated circuit preferably being effected contactlessly via antennas.
  • the integrated circuit is set in the gap of an at least partly metalized carrier foil. This foil is then laminated between two paper webs. Since the carrier foil is only laminated in between the two paper webs, however, there is the danger that the layers can be separated from each other relatively easily so that the plastic inlay provided with the chip can be used for possible forgeries. Further, this security element is a strictly machine-checkable security element that can only be checked by means of special detectors.
  • U.S. patent application 20030164611 by Schneider discloses a security paper for producing documents of value, such as bank notes, certificates, etc., with at least one multilayer security element.
  • the security element is disposed at least partly on the surface of the security paper and has at least one visually checkable optical effect and at least one integrated circuit.
  • Other recent U.S. patent applications relevant to the subject of the present invention include applications Nos. 20040081332, 20030117262, 20030116630, 20030099379, 20030093187 and 20020143588.
  • the present invention discloses a method and system for providing secure, tamper-free and forgery-proof smart documents, in particular smart passports.
  • the present invention further discloses a smart inlay that has inventive physical security components or “features”, and which can be inserted into any standard passport, thereby turning it into a smart passport.
  • the smart inlay of the present invention is functionally flexible in that provides full accommodation of existing and emerging standards in the filed of smart documents, in particular of smart passports. These standards will include requirements for global interoperability, technical reliability, practicality and durability.
  • the emerging standards will most likely require a digital representation of personal biometric information on a contactless chip in the passport booklet or in a visa
  • the digital representation will include data.
  • the biometric representation may be that of a face and fingerprint or iris.
  • the contactless chip may be made by a variety of manufacturers, according to the ISO 14443A/B or ISO 15693 standards.
  • the booklet may include the smart inlay in its cover (using a cover substantially identical with that of existing, non-smart passports) or in a data page. In a visa, the visa sticker will contain the chip and its antenna.
  • the biometric information is expected to provide a singular match (comparison) of a person to data stored in a database for identity verification. All digital information on the chip will be cryptographically signed to prevent forgery.
  • the planned biometric storage needs include ca. 12 KB (kilo-bytes) for a face, 10 KB for a fingerprint, 30 KB for an iris and 5 KB for text+overhead.
  • a smart passport will require will need 32 or 64 KBs.
  • the required antenna size is the same as in ID-1 size documents similar to a credit size card.
  • the inlay has to be mechanically reinforced to protect the inlaid chip and antenna.
  • the smart passport has to be readable by a contactless reader that supports both ISO 14443A and 14443B standards.
  • the present invention provides a smart inlay that can accommodate a variety of chips, for example a Philips P5CT072 72K E 2 PROM or a ST Micro Electronics ST19XR34 34K E 2 PROM.
  • the present invention further provides an upgrade path from a regular (non-smart) paper passport to a smart passport.
  • a smart inlay comprising a core substrate operative to store and exchange information contactlessly with an external reader, the core substrate further conditioned to bind to a passport surface, at least one physical security feature coupled to the core substrate and operative to render the smart inlay tamper-proof, and a logical security feature incorporated in the core substrate and operative to render the smart inlay forgery-proof.
  • a smart passport comprising a passport booklet and a smart inlay incorporated in the passport booklet, whereby the smart inlay imparts tamper-proof and forgery-proof properties to the passport.
  • a method for tamper-proofing and forgery-proofing a passport comprising the steps of providing a smart inlay operative to uniquely identify an authorized bearer of the passport, the smart inlay adaptively fitting into the passport, and attaching the smart inlay to the passport.
  • the step of providing a smart inlay further includes providing an inlay with a core substrate operative to store and exchange information contactlessly with an external reader, the core substrate further conditioned to bind to a passport surface; at least one physical security component coupled to the core substrate and operative to render the inlay tamper-proof; and a logical security component incorporated in the core substrate and operative to render the smart inlay forgery-proof.
  • the step of attaching the smart inlay to the passport includes attaching the inlay to the inside of a cover of the passport.
  • the step of attaching the smart inlay to the passport includes attaching the inlay to at least one inside page of the passport.
  • a method for preventing tampering in a smart passport that includes a contactless chip physically connected to an antenna, comprising the steps of providing at least one physical security component operative to disconnect the chip from the antenna and using the at least one physical component to protect the smart passport form tamper attempts.
  • FIG. 1 shows a preferred embodiment of a smart inlay according to the present invention: a) cross-section; b) top view; c) top view of three attached smart inlays; and d) view of a smart inlay trimed from a strip.
  • FIG. 2 shows embodiments of a smart passport incorporating the smart inlay according to the present invention: a) attached to a smart passport cover, b) inserted into the inside of a smart passport booklet.
  • FIG. 3 shows schematically steps in the manufacturing of the smart inlay: a) main process steps; b) detail of a patterned first adhesive with “voids”; c) various adhesive patterns overlaid with an antenna.
  • FIG. 4 shows schematically a summary of a set of logical operations involved in functionalizing the smart passport and rendering it logically forgery-proof
  • FIG. 5 shows a detailed flow-chart of the operations involved in the fabrication and functionalization of both a smart inlet and a smart passport.
  • the present invention discloses devices and methods for providing secure, tamper-free and forgery-proof smart documents, in particular smart passports.
  • the present invention discloses in particular a smart inlay to be used in a smart passport, and security features that make such a smart passport tamper-proof and forgery-proof.
  • the present invention further provides an upgrade path from a regular (non-smart) paper passport to a smart passport.
  • FIG. 1 a shows in cross section a preferred embodiment of a smart inlay 100 according to the present invention.
  • Smart inlay 100 comprises a core substrate (or “core layer”) 102 made preferably of synthetic sheets, e.g. from Teslin manufactured by PPG Industries (www.ppg.com) or Artisyn manufactured by Darmic Inc. (www.daramic.com).
  • core substrate or “core layer”
  • PPG Industries www.ppg.com
  • Darmic Inc. www.daramic.com
  • Teslin and Artisyn are further advantageous in that one can use most adhesives or glues that are water-based, solvent-based or heat or pressure activated, single or dual component.
  • the core substrate material may include Vinyl or Polyurethane based materials.
  • Smart inlay 100 further comprises an embedded contactless chip module 104 that includes an encapsulated chip 106 and a lead frame 108 , and tearing lines (“tear lines”) 110 that provide a first main inventive security component. Tear lines 110 are preferably positioned under the lead frame electrodes. Alternatively, in some embodiments, the tear lines may extend the whole width of the inlay, to provide added bending flexibility (in addition to a weak spot) to the passport into which the inlay is incorporated (see below).
  • Smart inlay 100 further comprises an antenna 120 that allows two-way communication between the chip and an outside contactless reader system (not shown).
  • the chip module is electrically connected to the antenna through the lead frame.
  • smart inlay 100 further comprises a cover material 112 attached to the core by a thin layer of adhesive 114 , preferably a highly solvent resistant adhesive, and most preferably a thermo-set-type adhesive with a relatively high bond breaking temperature, e.g. serial number 9534 manufactured by Apollo (www.apolloadhesives.com), 3M (www.3m.com) adhesive sheet 9218, 9200 or 9328,
  • the core substrate has a typical thickness of 220-240 micron
  • the smart inlay has a typical size that fits in a page of a smart passport, see for example FIG. 1 b.
  • Other dimensions in FIG. 1 a are marked H 1 , typically 380 microns, H 2 , typically 30 microns, H 3 , typically 350 microns and H 4 , typically 20-50 microns.
  • the chip may be any standard chip such as a Philips P5CT072 72K E 2 PROM or a Thompson ST19XR34 34K E 2 PROM.
  • FIG. 1 b shows in a top view a smart passport inlay (“smart cover”) with vinyl cover 120 (normally inserted in the “back cover” of a passport, see below) complemented by a “dumb” section 122 (normally inserted in a “front cover” of a passport, see below), both with typical dimensions indicated on the figure.
  • the smart inlay may be included in a set of attached smart inlays on a continuous reel, in this case three inlays 130 , 132 and 134 .
  • FIG. 1 d shows a single smart inlay 150 , cut away from the continuous reel.
  • the dimensions shown in both FIGS. 1 b and 1 c are exemplary only, and in no way limiting.
  • FIG. 2 a shows a smart passport booklet 200 ′ that includes a smart inlay 202 incorporated into a cover 204 (usually a back, fiber-reinforced vinyl cover, for example one manufactured by ICG Holliston (www.icgholliston.com)). The figure further shows an external booklet page 206 and the rest of the booklet contents 208 .
  • FIG. 2 b shows a smart passport booklet 200 ′′ in which a smart inlay 210 is incorporated between two internal pages 212 and 214 .
  • the inlay may be either glued to one or both of the internal pages, attached directly to the passport backbone, or both.
  • the attachment to the passport backbone can be done either by sowing part of the inlay into the backbone, by lamination to a cover or to a page, by gluing, or by other known means.
  • FIG. 3 a shows schematically steps in a preferred manufacturing process of the smart inlay of the present invention.
  • the manufacturing is performed in a system in which a continuous material strip 300 , preferably made of Teslin or Artisyn is fed by a reel.
  • Smart inlay cores with a top surface 301 a and a bottom surface 301 b are part of strip 300 .
  • a chip hole 302 and local weakening patterns in the core layer, referred to hereinafter generically as “tear lines” 304 are fabricated (e.g. punched) in the feed strip in a step 350 .
  • the tear lines are designed to provide a local weak link in the smart inlay, so that any attempt to separate the core layer from the cover will lead to irreversible core substrate deformation and mechanical destruction of the antenna/chip assembly. That is, such an attempt will cause the separation of the antenna from the chip, or the breakup of the chip electrode/lead frame.
  • the tear lines may be in the form of perforations, preferably positioned under the electrode area as shown in FIG. 1 a or as thinned areas in the core layer in the same places. Any attempt to tamper with the finished inlay, e.g.
  • a first adhesive pattern 306 designed for antenna positioning and securing to the core (also referred to herein as “antenna base adhesive”) is deposited on top surface 301 a in step 352 .
  • the antenna base adhesive pattern may be variable in size and shape, and may cover either partially or substantially totally the area of the top surface. In case it covers substantially the entire inlay surface, this may be the only adhesive layer applied in the manufacturing process.
  • the adhesive may be any type of adhesive, for example PE or EVA, an adhesive such as 3M adhesive sheet 9218, 9200 or 9328, Scapa Tape G175, or a pressure sensitive adhesive such as D74 manufactured by Colquimica (www.colquimica.pt).
  • the preferred adhesive is a thermo-set adhesive such as serial number 9534 manufactured by Apollo (www.apolloadhesives.com).
  • Thermo-set adhesives behave irreversibly and have a wide range of bond-breaking temperatures that reaches over 200 degrees C. This makes the adhesive itself the “strong” link in the composite layer structure, and ensures failure in places other that the adhesive, providing yet another inventive physical security feature.
  • the first adhesive is the only adhesive used, it is further preferably patterned, as explained with reference to FIG. 3 c below.
  • a “patterned” adhesive means any non-smooth, irregular adhesive surface, layer thickness, or general appearance.
  • the pattern follows some regular periodic form or topology such as regular corrugations, mesh, waves, zigzag, spring-like, or other geometric shapes.
  • the first adhesive pattern may be segmented or placed in a patterned structure 306 ′ that has gaps or “voids”, as shown in FIG. 3 b.
  • This allows a second adhesive (glue) layer 114 ′ (see below) to fill the gaps, creating a composite structure of the two glues and further strengthening the product.
  • the non-smooth and non-uniform application of the first glue layer that leads to the formation of a composite, interlaced, or intermingled structure with the second adhesive, results in even greater resistance to tampering and forgery.
  • the strong adhesive composite will cause failure in a non-adhesive “weak spot” and result for example in the tearing of the antenna or of the smart inlay layer materials, or in the destruction of the chip.
  • the glue may be also layered on the chip area, leading to additional weak spots (added to those provided by the tear lines) which may cause potential breakage of the chip if an attempt is made to separate the layers.
  • a chip module 308 (shown in more detail in FIG. 1 a ) is pressed in from the top surface into chip hole 302 .
  • an antenna 310 is wound on top of the patterned adhesive layer and attached (e.g. welded or soldered) to respective chip connections on the chip lead frame. This is followed by pressing the antenna, typically under additional heating into adhesive pattern 306 to form a flat surface.
  • a second adhesive layer 114 ′ (used if the first adhesive layer does not fulfill that function) is introduced between the inlay and the cover and used to fill any voids in glue layer 306 ′.
  • the introduction of this layer is shown in an additional step 358 . It has been determined experimentally that attempts to peel off the inlay from the cover show distinct tampering effects when second adhesive layer 114 ′ is also applied in a patterned form (independently of the form, patterning or even presence of a first adhesive layer), as shown in both step 358 and in a cross section in FIG.
  • FIG. 3 c shows several exemplary embodiments of geometries of patterned adhesives according to the present invention.
  • Embodiments A-E show a first adhesive overlaid with the antenna, and embodiment H shows a cross section of a composite, two-adhesive structure with the antenna in the middle.
  • embodiment A shows a zigzag first adhesive pattern 360 , overlaid by an antenna 362 .
  • Embodiment B shows a series of glue segments 364 overlaid by an antenna 366 .
  • Embodiment C shows a “stretched spring” adhesive pattern 368 overlaid by an antenna 370 .
  • Embodiment D shows a full adhesive strip 372 overlaid by an antenna 374 .
  • Embodiment E shows a dot adhesive pattern 376 overlaid by an antenna 378 .
  • “overlaid” preferably also means that the antenna is actually sunk into the adhesive, so that is in the same plane as the adhesive.
  • Methods for deposition of patterned adhesives are well known in the art.
  • Embodiment H shows in cross section a composite adhesive structure in which a first adhesive 380 and a second adhesive 382 (both having a tooth-like appearance as in FIG. 3 b ) are interlocked or interlaced, locking in an antenna 384 .
  • the first adhesive is deposited such that it has a plurality of holes, “dips” or “valleys” in the vertical direction perpendicular to the core substrate top surface.
  • the antenna is wound and pressed in, preferably under heat, as described in step 356 .
  • the second adhesive layer is then applied, filling in the holes, dips or valleys of the first adhesive, and locking the antenna in place in the composite two-adhesive layer.
  • the cross section in H is in essence an enlargement of line 114 with thickness H 4 in FIG. 1 a for a specific embodiment.
  • the two adhesives and the antenna are locked between a core substrate 386 and a cover 388 .
  • the invention thus advantageously provides a number of physical security features, some of which have been mentioned above and some of which will be discussed in more detail now. All physical security features are geared toward providing a tamper-proof product.
  • the tear lines mentioned and shown with regard to FIG. 1 a provide security by causing destruction of the functional integrity of the smart inlay (e.g. separation of the antenna from the chip or breakage of either the antenna or the chip) in the case of any tampering attempt.
  • the use of preferably thermo-set adhesives implies irreversibility and allows a choice of high enough bond-breaking temperatures. This ensures that any attempt to separate the different layers results in layers deformation or destruction before adhesive bond breaking.
  • the patterning of either the first or of the second adhesive (or both coexisting together) provides additional tamper-proof security because the adhesive competes locally in strength with the core material.
  • FIG. 4 shows schematically a summary of a set of logical operations involved in functionalizing the smart passport and making it logically forgery-proof.
  • the set of operations includes 5 phases, each phase including a physical operation performed on a device, and an attendant logical operation occurring in a computer database.
  • the chip functionality is tested, resulting in the storage (registration) of a chip serial number (CSN) and a chip operating system serial number (OSSN) in the computer database.
  • CSN chip serial number
  • OSSN chip operating system serial number
  • the database allows to establish a unique logical link between the CSN and the OSSN, referred to herein as “logical link 1”.
  • phase 402 the complete circuit of the smart inlay including the antenna are functionally tested and the results registered in the database.
  • phase 404 the smart passport is functionally tested, and a passport serial number (PSN) identifying the passport booklet is retrieved from the booklet and registered in the database. This establishes a second logical link between the CSN, OSSN and PSN, referred to herein as “logical link 2”.
  • logical link 2 a second logical link between the CSN, OSSN and PSN, referred to herein as “logical link 2”.
  • the passport is issued to a particular person, and personal information, preferably biometric (e.g. photo, iris, fingerprint, etc.) is inserted into both the passport and the database.
  • a unique link also referred to as “logical link 3” is created between the passport and the person to which it is issued using a combination of some or all of logical links 1 and 2 and the personal information.
  • phase 408 the smart passport is presented at a border control station to identify its carrier. A check is made to restore the unique “key” or “secret” formed by the combination of logical links 1 and 2 and the personal information of the carrier. The result of this check is matched against the stored “key” or “secret” stored in the database and optionally in the passport. If there is no fit, the implication is that the carrier and the passport do not match, and/or that the passport is forged.
  • FIG. 5 shows a detailed flow-chart of the operations involved in the fabrication and functionalization of both a smart inlet and a smart passport.
  • the process starts with the fabrication of the smart inlay substrate, in a system that may be substantially similar to that described for smart cards in U.S. Pat. Nos. 6,108,022 and/or 5,973,710 to Landsman.
  • chip holes and weakened substrate areas are made in a core substrate in step 502 , followed by spreading of the antenna glue base (first adhesive layer) in step 504 , and insertion of the encapsulated chip into the hole in step 506 .
  • a chip functionality test (process 400 in FIG.
  • step 536 is run in step 536 to test Go/NoGo chip functionality and to essentially form logical link 1 as described above. If the test fails, the chip is rejected in step 538 and another chip is placed in the hole. If the test is successful, the antenna is wound on the adhesive layer in step 508 , its wires are trimmed (cut) in step 510 and the antenna is welded to the chip electrodes in step 512 . The chip and antenna are then levelled flush with the top surface of the core substrate in step 514 .
  • a second test (process 402 in FIG. 4 ) is run to test circuit functionality, i.e. to confirm that the circuit is active.
  • the smart inlay is marked and trimmed into a strip in step 518 and placed in an exit tray in step 520 (resulting in the product seen in FIG. 1 b ).
  • a blind inlay substrate material similar to the smart inlay core is supplied in step 522
  • a preferrably vynil cover material is supplied in parallel in step 524
  • all three elements are bound together in step 526 .
  • the binding is preferably done by applying the second adhesive layer to either the inlay, the cover or both.
  • the layers are bound under pressure and heat (depending on the type of glue) in step 528 , followed by a third test (process 404 in FIG. 4 ) in step 530 , following which a defected smart cover is marked.
  • a “good” smart inlay is trimmed to strips in step 532 and placed in an exit tray in step 534 (resulting in the product shown in FIG. 1 c ).
  • the smart passport is now prepared using the smart inlay provided in step 534 . If in the form of a smart cover, the smart inlay is glued or attached otherwise to a passport booklet in step 550 , the booklet is folded in step 552 , and each individual passport is cut in step 554 .
  • a fourth test (process 406 in FIG. 4 ) is run in step 556 . If the test fails (passport does not respond to a reader), the smart passport is marked as rejected and placed in a reject bin in step 560 . If the test succeeds, the passport is ready for issuing and placed in an exit tray in step 558 .

Abstract

A smart passport comprising a smart inlay that includes a core substrate operative to store and exchange information contactlessly with an external reader, at least one physical security component coupled to the core substrate and operative to render the smart inlay and thereby the passport tamper-proof, and a logical security component incorporated in the core substrate and operative to render the smart inlay and thereby the passport forgery-proof. The physical security component is preferably selected from the group at least one tear line and at least one patterned adhesive, both operative to cause irreversible damage to the information storage and communication capabilities of the passport in case of tampering.

Description

    FIELD OF THE INVENTION
  • The present invention relates to tamper-free and forgery-proof identification documents, and in particular to smart passports.
  • BACKGROUND OF THE INVENTION
  • Security, particularly at major airports has become a significant concern. No printable identification is currently available to positively identify a passenger with high reliability. No means is currently available to transmit such information securely and to associate that information with user specific permissions
  • All passengers entering the USA have been required to bring a Machine Readable Travel Document (MTRD), i.e. a machine-readable passport since October 2003. Starting October 2004, the passport is required to contain biometric data that uniquely identifies its bearer. This turns the passport into a “smart” passport, which comprises a contactless chip that stores the personal biometric information as digital information. The chip is accessed contactlessly by a reader that retrieves the biometric information and compares it with information stored in a database, to verify the identity of the passport bearer. The International Civil Aviation Organization (ICAO) is setting the standard to be followed by all such smart passport issuers.
  • Smart documents are known in the art. Smart cards have been used to store personal information and even biometric information about their owners to facilitate electronic transactions. The information is stored on embedded chips, see for example U.S. Pat. No. 6,219,439, the content of which is incorporated herein by reference, U.S. Pat. No. 6,219,439 further describes a identifying characteristic authentication system using a smart card having stored physiological data of a user on a chip disposed therein, and a fingerprint scan (or retina scan, voice identification, saliva or other identifying characteristic data) for comparison against the stored data. The system is self-contained so that the comparison of the identifying characteristic data with the data stored on the chip is done immediately on board the reader without relying upon communications to or from an external source in order to authenticate the user. This arrangement also prevents communication with external sources prior to user authentication being confirmed, so as to prevent user data from being stolen or corrupted.
  • U.S. Pat. No. 6,101,477 describes a smart card for travel-related use, such as for airline, hotel, rental car, and payment-related applications. Memory space and security features within specific applications provide partnering organizations (e.g., airlines, hotel chains, and rental car agencies) the ability to construct custom and secure file structures. U.S. Pat. No. 5,291,560 describes a personal identification system based on iris analysis. U.S. Pat. No. 5,363,453 describes a personal identification system based on biometric fingerprint data. However, there is no encryption of the biometric information involved.
  • EP 0019191B1 discloses a paper of value (e.g. an ID) with an integrated circuit in which a checkable coding is written, the communication with the integrated circuit preferably being effected contactlessly via antennas. The integrated circuit is set in the gap of an at least partly metalized carrier foil. This foil is then laminated between two paper webs. Since the carrier foil is only laminated in between the two paper webs, however, there is the danger that the layers can be separated from each other relatively easily so that the plastic inlay provided with the chip can be used for possible forgeries. Further, this security element is a strictly machine-checkable security element that can only be checked by means of special detectors.
  • U.S. patent application 20030164611 by Schneider discloses a security paper for producing documents of value, such as bank notes, certificates, etc., with at least one multilayer security element. The security element is disposed at least partly on the surface of the security paper and has at least one visually checkable optical effect and at least one integrated circuit. Other recent U.S. patent applications relevant to the subject of the present invention include applications Nos. 20040081332, 20030117262, 20030116630, 20030099379, 20030093187 and 20020143588.
  • All prior art solutions deal with only partial aspects of the problem. All known solutions require basically a new product, fabricated with processes and steps materially different from existing processes and steps used in present day regular (non-smart) passports. Since these processes and steps differ from each other, there is no “standardized” manufacturing of a smart passport. No prior art solution is known to be a full solution that allows a regular passport to be transformed into a smart passport without requiring major production system changes and/or major fabrication step changes. Therefore, it would be advantageous to provide a smart passport that will not require major overhaul of existing methods and systems, yet fulfill its total security and forgery/tamper-proof functions. It would be further advantageous to find a “generic” solution that can incorporate various chips and operating systems (OSs) into the smart passport, which can then be issued by all authorized issuers that use such different chips and OSs.
  • SUMMARY OF THE INVENTION
  • The present invention discloses a method and system for providing secure, tamper-free and forgery-proof smart documents, in particular smart passports. The present invention further discloses a smart inlay that has inventive physical security components or “features”, and which can be inserted into any standard passport, thereby turning it into a smart passport. The smart inlay of the present invention is functionally flexible in that provides full accommodation of existing and emerging standards in the filed of smart documents, in particular of smart passports. These standards will include requirements for global interoperability, technical reliability, practicality and durability. The emerging standards will most likely require a digital representation of personal biometric information on a contactless chip in the passport booklet or in a visa The digital representation will include data. The biometric representation may be that of a face and fingerprint or iris. The contactless chip may be made by a variety of manufacturers, according to the ISO 14443A/B or ISO 15693 standards. The booklet may include the smart inlay in its cover (using a cover substantially identical with that of existing, non-smart passports) or in a data page. In a visa, the visa sticker will contain the chip and its antenna.
  • The biometric information is expected to provide a singular match (comparison) of a person to data stored in a database for identity verification. All digital information on the chip will be cryptographically signed to prevent forgery. The planned biometric storage needs include ca. 12 KB (kilo-bytes) for a face, 10 KB for a fingerprint, 30 KB for an iris and 5 KB for text+overhead. At the least, a smart passport will require will need 32 or 64 KBs. The required antenna size is the same as in ID-1 size documents similar to a credit size card. The inlay has to be mechanically reinforced to protect the inlaid chip and antenna. Finally, the smart passport has to be readable by a contactless reader that supports both ISO 14443A and 14443B standards.
  • The present invention provides a smart inlay that can accommodate a variety of chips, for example a Philips P5CT072 72K E2PROM or a ST Micro Electronics ST19XR34 34K E2PROM. The present invention further provides an upgrade path from a regular (non-smart) paper passport to a smart passport.
  • According to the present invention, there is provided a smart inlay comprising a core substrate operative to store and exchange information contactlessly with an external reader, the core substrate further conditioned to bind to a passport surface, at least one physical security feature coupled to the core substrate and operative to render the smart inlay tamper-proof, and a logical security feature incorporated in the core substrate and operative to render the smart inlay forgery-proof.
  • According to the present invention there is provided a smart passport comprising a passport booklet and a smart inlay incorporated in the passport booklet, whereby the smart inlay imparts tamper-proof and forgery-proof properties to the passport.
  • According to the present invention there is provided a method for tamper-proofing and forgery-proofing a passport, comprising the steps of providing a smart inlay operative to uniquely identify an authorized bearer of the passport, the smart inlay adaptively fitting into the passport, and attaching the smart inlay to the passport.
  • According to one feature in the method for tamper-proofing and forgery-proofing a passport of the present invention, the step of providing a smart inlay further includes providing an inlay with a core substrate operative to store and exchange information contactlessly with an external reader, the core substrate further conditioned to bind to a passport surface; at least one physical security component coupled to the core substrate and operative to render the inlay tamper-proof; and a logical security component incorporated in the core substrate and operative to render the smart inlay forgery-proof.
  • According to another feature in the method for tamper-proofing and forgery-proofing a passport of the present invention, the step of attaching the smart inlay to the passport includes attaching the inlay to the inside of a cover of the passport.
  • According to yet another feature in the method for tamper-proofing and forgery-proofing a passport of the present invention, the step of attaching the smart inlay to the passport includes attaching the inlay to at least one inside page of the passport.
  • According to the present invention there is provided a method for preventing tampering in a smart passport that includes a contactless chip physically connected to an antenna, comprising the steps of providing at least one physical security component operative to disconnect the chip from the antenna and using the at least one physical component to protect the smart passport form tamper attempts.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention is herein described, by way of example only, with reference to the accompanying drawings, wherein:
  • FIG. 1 shows a preferred embodiment of a smart inlay according to the present invention: a) cross-section; b) top view; c) top view of three attached smart inlays; and d) view of a smart inlay trimed from a strip.
  • FIG. 2 shows embodiments of a smart passport incorporating the smart inlay according to the present invention: a) attached to a smart passport cover, b) inserted into the inside of a smart passport booklet.
  • FIG. 3 shows schematically steps in the manufacturing of the smart inlay: a) main process steps; b) detail of a patterned first adhesive with “voids”; c) various adhesive patterns overlaid with an antenna.
  • FIG. 4 shows schematically a summary of a set of logical operations involved in functionalizing the smart passport and rendering it logically forgery-proof;
  • FIG. 5 shows a detailed flow-chart of the operations involved in the fabrication and functionalization of both a smart inlet and a smart passport.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention discloses devices and methods for providing secure, tamper-free and forgery-proof smart documents, in particular smart passports. The present invention discloses in particular a smart inlay to be used in a smart passport, and security features that make such a smart passport tamper-proof and forgery-proof. The present invention further provides an upgrade path from a regular (non-smart) paper passport to a smart passport.
  • FIG. 1 a shows in cross section a preferred embodiment of a smart inlay 100 according to the present invention. Smart inlay 100 comprises a core substrate (or “core layer”) 102 made preferably of synthetic sheets, e.g. from Teslin manufactured by PPG Industries (www.ppg.com) or Artisyn manufactured by Darmic Inc. (www.daramic.com). Each of these materials provides a number of important advantages: each allows a judicious choice and application of tamper-proof adhesives, for example poly-vinyl-acetates (PVAs), thermoplastic adhesives such as ethylene vinyl acetate (EVA) or polyethylene (PE), or the family of thermo-set adhesives. Teslin and Artisyn are further advantageous in that one can use most adhesives or glues that are water-based, solvent-based or heat or pressure activated, single or dual component. Alternatively, the core substrate material may include Vinyl or Polyurethane based materials. Smart inlay 100 further comprises an embedded contactless chip module 104 that includes an encapsulated chip 106 and a lead frame 108, and tearing lines (“tear lines”) 110 that provide a first main inventive security component. Tear lines 110 are preferably positioned under the lead frame electrodes. Alternatively, in some embodiments, the tear lines may extend the whole width of the inlay, to provide added bending flexibility (in addition to a weak spot) to the passport into which the inlay is incorporated (see below). Smart inlay 100 further comprises an antenna 120 that allows two-way communication between the chip and an outside contactless reader system (not shown). The chip module is electrically connected to the antenna through the lead frame. Optionally, smart inlay 100 further comprises a cover material 112 attached to the core by a thin layer of adhesive 114, preferably a highly solvent resistant adhesive, and most preferably a thermo-set-type adhesive with a relatively high bond breaking temperature, e.g. serial number 9534 manufactured by Apollo (www.apolloadhesives.com), 3M (www.3m.com) adhesive sheet 9218, 9200 or 9328,
  • or Scapa Tape G175 (www.scapatapesnacom). The core substrate has a typical thickness of 220-240 micron, while the smart inlay has a typical size that fits in a page of a smart passport, see for example FIG. 1 b. Other dimensions in FIG. 1 a are marked H1, typically 380 microns, H2, typically 30 microns, H3, typically 350 microns and H4, typically 20-50 microns. Advantageously, the chip may be any standard chip such as a Philips P5CT072 72K E2PROM or a Thompson ST19XR34 34K E2PROM.
  • FIG. 1 b shows in a top view a smart passport inlay (“smart cover”) with vinyl cover 120 (normally inserted in the “back cover” of a passport, see below) complemented by a “dumb” section 122 (normally inserted in a “front cover” of a passport, see below), both with typical dimensions indicated on the figure. As shown in FIG. 1 c, for efficient production purposes (described in more detail in FIG. 3 a), the smart inlay may be included in a set of attached smart inlays on a continuous reel, in this case three inlays 130, 132 and 134. FIG. 1 d shows a single smart inlay 150, cut away from the continuous reel. The dimensions shown in both FIGS. 1 b and 1 c are exemplary only, and in no way limiting.
  • FIG. 2 a shows a smart passport booklet 200′ that includes a smart inlay 202 incorporated into a cover 204 (usually a back, fiber-reinforced vinyl cover, for example one manufactured by ICG Holliston (www.icgholliston.com)). The figure further shows an external booklet page 206 and the rest of the booklet contents 208. FIG. 2 b shows a smart passport booklet 200″ in which a smart inlay 210 is incorporated between two internal pages 212 and 214. In this case, the inlay may be either glued to one or both of the internal pages, attached directly to the passport backbone, or both. The attachment to the passport backbone can be done either by sowing part of the inlay into the backbone, by lamination to a cover or to a page, by gluing, or by other known means.
  • FIG. 3 a shows schematically steps in a preferred manufacturing process of the smart inlay of the present invention. The manufacturing is performed in a system in which a continuous material strip 300, preferably made of Teslin or Artisyn is fed by a reel. Smart inlay cores with a top surface 301 a and a bottom surface 301 b are part of strip 300. First, a chip hole 302 and local weakening patterns in the core layer, referred to hereinafter generically as “tear lines” 304 are fabricated (e.g. punched) in the feed strip in a step 350. The tear lines are designed to provide a local weak link in the smart inlay, so that any attempt to separate the core layer from the cover will lead to irreversible core substrate deformation and mechanical destruction of the antenna/chip assembly. That is, such an attempt will cause the separation of the antenna from the chip, or the breakup of the chip electrode/lead frame. This is one main inventive physical security feature of the smart inlay of the present invention. The tear lines may be in the form of perforations, preferably positioned under the electrode area as shown in FIG. 1 a or as thinned areas in the core layer in the same places. Any attempt to tamper with the finished inlay, e.g. trying to separate the core layer from the vinyl cover (or from an internal cover or page if the inlay is inserted between two booklet pages) will result in the failure described above. A first adhesive pattern 306 designed for antenna positioning and securing to the core (also referred to herein as “antenna base adhesive”) is deposited on top surface 301 a in step 352. The antenna base adhesive pattern may be variable in size and shape, and may cover either partially or substantially totally the area of the top surface. In case it covers substantially the entire inlay surface, this may be the only adhesive layer applied in the manufacturing process. The adhesive may be any type of adhesive, for example PE or EVA, an adhesive such as 3M adhesive sheet 9218, 9200 or 9328, Scapa Tape G175, or a pressure sensitive adhesive such as D74 manufactured by Colquimica (www.colquimica.pt).
  • In the case of the first adhesive layer being the only layer in the process, the preferred adhesive is a thermo-set adhesive such as serial number 9534 manufactured by Apollo (www.apolloadhesives.com). Thermo-set adhesives behave irreversibly and have a wide range of bond-breaking temperatures that reaches over 200 degrees C. This makes the adhesive itself the “strong” link in the composite layer structure, and ensures failure in places other that the adhesive, providing yet another inventive physical security feature. Furthermore, if the first adhesive is the only adhesive used, it is further preferably patterned, as explained with reference to FIG. 3 c below. As used herein, a “patterned” adhesive means any non-smooth, irregular adhesive surface, layer thickness, or general appearance. Preferably, the pattern follows some regular periodic form or topology such as regular corrugations, mesh, waves, zigzag, spring-like, or other geometric shapes. Inventively and advantageously, the first adhesive pattern may be segmented or placed in a patterned structure 306′ that has gaps or “voids”, as shown in FIG. 3 b. This allows a second adhesive (glue) layer 114′ (see below) to fill the gaps, creating a composite structure of the two glues and further strengthening the product. In other words, the non-smooth and non-uniform application of the first glue layer that leads to the formation of a composite, interlaced, or intermingled structure with the second adhesive, results in even greater resistance to tampering and forgery. If any attempt is made to separate the smart inlay layers, or to separate the inlay from the cover or page it is attached to, the strong adhesive composite will cause failure in a non-adhesive “weak spot” and result for example in the tearing of the antenna or of the smart inlay layer materials, or in the destruction of the chip. The glue may be also layered on the chip area, leading to additional weak spots (added to those provided by the tear lines) which may cause potential breakage of the chip if an attempt is made to separate the layers.
  • In step 354, a chip module 308 (shown in more detail in FIG. 1 a) is pressed in from the top surface into chip hole 302. In step 356, an antenna 310 is wound on top of the patterned adhesive layer and attached (e.g. welded or soldered) to respective chip connections on the chip lead frame. This is followed by pressing the antenna, typically under additional heating into adhesive pattern 306 to form a flat surface.
  • As mentioned, when the smart inlay (and its “dumb” section in case of a smart cover) produced in steps 350-356 is about to be attached to a cover, a second adhesive layer 114′ (used if the first adhesive layer does not fulfill that function) is introduced between the inlay and the cover and used to fill any voids in glue layer 306′. The introduction of this layer is shown in an additional step 358. It has been determined experimentally that attempts to peel off the inlay from the cover show distinct tampering effects when second adhesive layer 114′ is also applied in a patterned form (independently of the form, patterning or even presence of a first adhesive layer), as shown in both step 358 and in a cross section in FIG. 3 b, which shows a tooth-like adhesive layer 306′ or 114′ formed on the core substrate. To emphasize, patterning either or both adhesive layers advantageously improves the security aspects of the smart inlay and passport of the present invention. This constitutes yet another inventive physical security feature of the present invention
  • FIG. 3 c shows several exemplary embodiments of geometries of patterned adhesives according to the present invention. Embodiments A-E show a first adhesive overlaid with the antenna, and embodiment H shows a cross section of a composite, two-adhesive structure with the antenna in the middle. In more detail, embodiment A shows a zigzag first adhesive pattern 360, overlaid by an antenna 362. Embodiment B shows a series of glue segments 364 overlaid by an antenna 366. Embodiment C shows a “stretched spring” adhesive pattern 368 overlaid by an antenna 370. Embodiment D shows a full adhesive strip 372 overlaid by an antenna 374. Embodiment E shows a dot adhesive pattern 376 overlaid by an antenna 378. In all cases, “overlaid” preferably also means that the antenna is actually sunk into the adhesive, so that is in the same plane as the adhesive. Methods for deposition of patterned adhesives are well known in the art.
  • Embodiment H shows in cross section a composite adhesive structure in which a first adhesive 380 and a second adhesive 382 (both having a tooth-like appearance as in FIG. 3 b) are interlocked or interlaced, locking in an antenna 384. The first adhesive is deposited such that it has a plurality of holes, “dips” or “valleys” in the vertical direction perpendicular to the core substrate top surface. The antenna is wound and pressed in, preferably under heat, as described in step 356. The second adhesive layer is then applied, filling in the holes, dips or valleys of the first adhesive, and locking the antenna in place in the composite two-adhesive layer. The cross section in H is in essence an enlargement of line 114 with thickness H4 in FIG. 1 a for a specific embodiment. Thus, the two adhesives and the antenna are locked between a core substrate 386 and a cover 388.
  • The invention thus advantageously provides a number of physical security features, some of which have been mentioned above and some of which will be discussed in more detail now. All physical security features are geared toward providing a tamper-proof product. First, the tear lines mentioned and shown with regard to FIG. 1 a provide security by causing destruction of the functional integrity of the smart inlay (e.g. separation of the antenna from the chip or breakage of either the antenna or the chip) in the case of any tampering attempt. Second, the use of preferably thermo-set adhesives implies irreversibility and allows a choice of high enough bond-breaking temperatures. This ensures that any attempt to separate the different layers results in layers deformation or destruction before adhesive bond breaking. Third, the patterning of either the first or of the second adhesive (or both coexisting together) provides additional tamper-proof security because the adhesive competes locally in strength with the core material.
  • FIG. 4 shows schematically a summary of a set of logical operations involved in functionalizing the smart passport and making it logically forgery-proof. The set of operations includes 5 phases, each phase including a physical operation performed on a device, and an attendant logical operation occurring in a computer database. In phase 400, the chip functionality is tested, resulting in the storage (registration) of a chip serial number (CSN) and a chip operating system serial number (OSSN) in the computer database. The database allows to establish a unique logical link between the CSN and the OSSN, referred to herein as “logical link 1”. In phase 402, the complete circuit of the smart inlay including the antenna are functionally tested and the results registered in the database. In phase 404 the smart passport is functionally tested, and a passport serial number (PSN) identifying the passport booklet is retrieved from the booklet and registered in the database. This establishes a second logical link between the CSN, OSSN and PSN, referred to herein as “logical link 2”. In phase 406, the passport is issued to a particular person, and personal information, preferably biometric (e.g. photo, iris, fingerprint, etc.) is inserted into both the passport and the database. At this stage, a unique link (also referred to as “logical link 3”) is created between the passport and the person to which it is issued using a combination of some or all of logical links 1 and 2 and the personal information. This may be done for example by creating a unique “key” or “secret” using encription or encoding well known in the art. The “key” or the “secret” is stored in the database and optionally in the passport (chip) and may be retrived after accessing its location in the chip memory using an access key. In phase 408, the smart passport is presented at a border control station to identify its carrier. A check is made to restore the unique “key” or “secret” formed by the combination of logical links 1 and 2 and the personal information of the carrier. The result of this check is matched against the stored “key” or “secret” stored in the database and optionally in the passport. If there is no fit, the implication is that the carrier and the passport do not match, and/or that the passport is forged.
  • FIG. 5 shows a detailed flow-chart of the operations involved in the fabrication and functionalization of both a smart inlet and a smart passport. The process starts with the fabrication of the smart inlay substrate, in a system that may be substantially similar to that described for smart cards in U.S. Pat. Nos. 6,108,022 and/or 5,973,710 to Landsman. Following essentially the steps in FIG. 3 a, chip holes and weakened substrate areas (tear lines) are made in a core substrate in step 502, followed by spreading of the antenna glue base (first adhesive layer) in step 504, and insertion of the encapsulated chip into the hole in step 506. At this point, a chip functionality test (process 400 in FIG. 4) is run in step 536 to test Go/NoGo chip functionality and to essentially form logical link 1 as described above. If the test fails, the chip is rejected in step 538 and another chip is placed in the hole. If the test is successful, the antenna is wound on the adhesive layer in step 508, its wires are trimmed (cut) in step 510 and the antenna is welded to the chip electrodes in step 512. The chip and antenna are then levelled flush with the top surface of the core substrate in step 514. A second test (process 402 in FIG. 4) is run to test circuit functionality, i.e. to confirm that the circuit is active. If the test fails, the smart inlay is marked and trimmed into a strip in step 518 and placed in an exit tray in step 520 (resulting in the product seen in FIG. 1 b). To produce a smart cover, a blind inlay substrate material similar to the smart inlay core is supplied in step 522, a preferrably vynil cover material is supplied in parallel in step 524, and all three elements (smart inlay substrate, blind inlay substrate and cover) are bound together in step 526. The binding is preferably done by applying the second adhesive layer to either the inlay, the cover or both. The layers are bound under pressure and heat (depending on the type of glue) in step 528, followed by a third test (process 404 in FIG. 4) in step 530, following which a defected smart cover is marked. A “good” smart inlay is trimmed to strips in step 532 and placed in an exit tray in step 534 (resulting in the product shown in FIG. 1 c).
  • The smart passport is now prepared using the smart inlay provided in step 534. If in the form of a smart cover, the smart inlay is glued or attached otherwise to a passport booklet in step 550, the booklet is folded in step 552, and each individual passport is cut in step 554. A fourth test (process 406 in FIG. 4) is run in step 556. If the test fails (passport does not respond to a reader), the smart passport is marked as rejected and placed in a reject bin in step 560. If the test succeeds, the passport is ready for issuing and placed in an exit tray in step 558.
  • All publications, patents and patent applications mentioned in this specification are herein incorporated in their entirety by reference into the specification, to the same extent as if each individual publication, patent or patent application was specifically and individually indicated to be incorporated herein by reference. In addition, citation or identification of any reference in this application shall not be construed as an admission that such reference is available as prior art to the present invention.

Claims (26)

1. A smart inlay comprising:
a. a core substrate operative to store and exchange information contactlessly with an external reader, said core substrate further conditioned to bind to a passport surface;
b. at least one physical security component coupled to said core substrate and operative to render the smart inlay tamper-proof; and
c. a logical security component incorporated in said core substrate and operative to render the smart inlay forgery-proof.
2. The smart inlay of claim 1, wherein said core substrate includes a contactless chip module for providing said information exchange operativeness and an antenna connected to said chip module for providing said information exchange operability.
3. The smart inlay of claim 1, wherein said at least one physical security component is selected from the group consisting of at least one tear line and at least one patterned adhesive.
4. The smart inlay of claim 3, wherein said at least one patterned adhesive is a thermo-set adhesive.
5. The smart inlay of claim 3, wherein said at least one patterned adhesive includes two patterned adhesives forming a composite adhesive structure.
6. The smart inlay of claim 3, wherein said at least one tear line is selected from the group of a local core substrate thinning and a core substrate perforation.
7. The smart inlay of claim 1, wherein said logical security feature includes a unique key obtained from a combination of a first logical link, a second logical link and personal information.
8. The smart inlay of claim 1, wherein said core substrate is made of a material selected from the group consisting of Teslin and Artisyn.
9. A smart passport comprising:
a. a passport booklet; and
b. a smart inlay incorporated in said passport booklet, said smart inlay further including:
i. a core substrate operative to store and exchange information contactlessly with an external reader, said core substrate further conditioned to bind to a passport surface,
ii. at least one physical security component coupled to said core substrate and operative to render the smart inlay tamper-proof, and
iii. a logical security component incorporated in said core substrate and operative to render the smart inlay forgery-proof,
whereby said smart inlay provides tamper-proof and forgery-proof properties to the passport;
10. The smart passport of claim 9, wherein said smart inlay is attached to a passport cover.
11. The smart passport of claim 9, wherein said smart inlay is attached to an internal page of the passport.
12. The smart passport of claim 9, wherein said at least one physical security component is selected from the group consisting of at least one tear line and at least one patterned adhesive.
13. The smart passport of claim 12, wherein said at least one patterned adhesive is a thermo-set adhesive.
14. The smart passport of claim 12, wherein said at least one patterned adhesive includes two patterned adhesives forming a composite adhesive structure.
15. The smart passport of claim 12, wherein said at least one tear line is selected from the group of a local core substrate thinning and a core substrate perforation.
16. The smart passport of claim 9, wherein said logical security feature includes a unique key obtained from a combination of a first logical link, a second logical link and personal information.
17. The smart passport of claim 9, wherein said core substrate is made of a material selected from the group consisting of Teslin and Artisyn.
18. A method for tamper-proofing and forgery-proofing a passport comprising the steps of:
a. providing a smart inlay operative to uniquely identify an authorized bearer of the passport, said smart inlay adaptively fitting into the passport; and
b. attaching said smart inlay to said passport.
19. The method of claim 18, wherein said step of providing a smart inlay further includes providing an inlay that includes:
i. a core substrate operative to store and exchange information contactlessly with an external reader, said core substrate further conditioned to bind to a passport surface,
ii. at least one physical security component coupled to said core substrate and operative to render said smart inlay tamper-proof, and
iii. a logical security component incorporated in said core substrate and operative to render said smart inlay forgery-proof.
20. The method of claim 19, wherein said step of attaching said smart inlay to said passport includes attaching said inlay to a cover of said passport.
21. The method of claim 19, wherein said providing of an inlay that includes at least one physical security component includes providing at least one physical security component selected from the group consisting of at least one tear line and at least one patterned adhesive.
22. A method for preventing tampering in a smart passport that includes a contactless chip physically connected to an antenna, comprising the steps of:
a. providing at least one physical security component operative to disconnect the chip from the antenna; and
b. using said at least one physical component to protect the smart passport form tamper attempts.
23. The method of claim 22, wherein said step of providing at least one physical security component includes providing a smart inlay having a core substrate holding both the chip and the antenna, said core substrate further including at least one component selected from the group consisting of at least one tear line positioned in proximity to both the chip and the antenna and at least one patterned adhesive that glues the contactless chip to the antenna.
24. The method of claim 22, wherein said providing of a smart inlay with at least one patterned adhesive includes providing at least one thermo-set adhesive positioned to hold both the chip and the antenna.
25. The method of claim 22, wherein said providing of a smart inlay with at least one patterned adhesive includes providing two patterned adhesives forming a composite adhesive structure positioned to hold both the chip and the antenna.
26. The method of claim 22, wherein said providing of a smart inlay with at least one tear line includes providing a tear line selected from the group consisting of a local smart inlay core substrate thinning and a smart inlay core substrate perforation.
US10/864,353 2004-06-10 2004-06-10 Tamper-free and forgery-proof passport and methods for providing same Abandoned US20060005050A1 (en)

Priority Applications (16)

Application Number Priority Date Filing Date Title
US10/864,353 US20060005050A1 (en) 2004-06-10 2004-06-10 Tamper-free and forgery-proof passport and methods for providing same
US11/010,382 US7243840B2 (en) 2004-06-10 2004-12-14 Smart identification document
EP05749890.9A EP1791655B1 (en) 2004-06-10 2005-06-07 Smart identification document
CA002570077A CA2570077A1 (en) 2004-06-10 2005-06-07 Smart identification document
CN2005800189722A CN101002214B (en) 2004-06-10 2005-06-07 Smart identification document
PCT/IL2005/000606 WO2005120726A2 (en) 2004-06-10 2005-06-07 Smart identification document
MXPA06014309A MXPA06014309A (en) 2004-06-10 2005-06-07 Smart identification document.
US11/570,338 US7905415B2 (en) 2004-06-10 2005-06-07 Smart identification document
KR1020077000622A KR20070051836A (en) 2004-06-10 2005-06-07 Smart identification document
BRPI0512287-2A BRPI0512287A (en) 2004-06-10 2005-06-07 smart personal identification, personal identification processing system, document information reader, smart core, smart passport, smart passport fraud and forgery proof method, method to prevent reading a smart passport
AP2006003864A AP2006003864A0 (en) 2004-06-10 2005-06-07 Smart identification document
EA200700002A EA012731B1 (en) 2004-06-10 2005-06-07 Smart electronic personal identification document
AU2005252038A AU2005252038A1 (en) 2004-06-10 2005-06-07 Smart identification document
IL179938A IL179938A (en) 2004-06-10 2006-12-10 Smart identification document
ZA200700075A ZA200700075B (en) 2004-06-10 2007-01-03 Smart Identification document
HK07112372.6A HK1103827A1 (en) 2004-06-10 2007-11-12 Smart identification document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/864,353 US20060005050A1 (en) 2004-06-10 2004-06-10 Tamper-free and forgery-proof passport and methods for providing same

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/010,382 Division US7243840B2 (en) 2004-06-10 2004-12-14 Smart identification document

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US11/010,382 Continuation-In-Part US7243840B2 (en) 2004-06-10 2004-12-14 Smart identification document
US11/570,338 Division US7905415B2 (en) 2004-06-10 2005-06-07 Smart identification document

Publications (1)

Publication Number Publication Date
US20060005050A1 true US20060005050A1 (en) 2006-01-05

Family

ID=35459475

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/864,353 Abandoned US20060005050A1 (en) 2004-06-10 2004-06-10 Tamper-free and forgery-proof passport and methods for providing same
US11/010,382 Expired - Fee Related US7243840B2 (en) 2004-06-10 2004-12-14 Smart identification document
US11/570,338 Expired - Fee Related US7905415B2 (en) 2004-06-10 2005-06-07 Smart identification document

Family Applications After (2)

Application Number Title Priority Date Filing Date
US11/010,382 Expired - Fee Related US7243840B2 (en) 2004-06-10 2004-12-14 Smart identification document
US11/570,338 Expired - Fee Related US7905415B2 (en) 2004-06-10 2005-06-07 Smart identification document

Country Status (6)

Country Link
US (3) US20060005050A1 (en)
CN (1) CN101002214B (en)
EA (1) EA012731B1 (en)
HK (1) HK1103827A1 (en)
MX (1) MXPA06014309A (en)
ZA (1) ZA200700075B (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060019745A1 (en) * 2004-07-22 2006-01-26 Igt Remote gaming eligibility system and method using RFID tags
US20060158406A1 (en) * 2005-01-20 2006-07-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Semi-permanent electronic paper
US20060187061A1 (en) * 2005-02-07 2006-08-24 Colby Steven M Radio frequency shielding
US20060259773A1 (en) * 2005-05-12 2006-11-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Alert options for electronic-paper verification
US20060265744A1 (en) * 2005-05-12 2006-11-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US20060282903A1 (en) * 2005-06-08 2006-12-14 Jung Edward K User accessibility to electronic paper
US20070012761A1 (en) * 2005-07-18 2007-01-18 Paone Timothy V Secure personal identification document and system for preventing unauthorized use of same
US20070066401A1 (en) * 2004-02-25 2007-03-22 Cfph, Llc System and Method for Convenience Gaming
US20070143621A1 (en) * 2005-01-20 2007-06-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US20080015013A1 (en) * 2006-05-05 2008-01-17 Gelman Geoffrey M Game access device with time varying signal
US20080041965A1 (en) * 2006-08-18 2008-02-21 Simon Phillips Cut here to destroy indicator
US20080113787A1 (en) * 2006-11-15 2008-05-15 Alderucci Dean P Biometric access sensitivity
US20080113786A1 (en) * 2006-11-14 2008-05-15 Alderucci Dean P Biometric access data encryption
US20080113785A1 (en) * 2006-11-14 2008-05-15 Alderucci Dean P Conditional biometric access in a gaming environment
US20080134324A1 (en) * 2005-01-20 2008-06-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US20080148396A1 (en) * 2005-01-20 2008-06-19 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US20080218312A1 (en) * 2007-03-08 2008-09-11 Asher Joseph M Game access device with privileges
US20080311994A1 (en) * 2004-02-25 2008-12-18 Amaitis Lee M System and method for wireless gaming with location determination
US20090075729A1 (en) * 2006-05-05 2009-03-19 Dean Alderucci Systems and methods for providing access to wireless gaming devices
WO2009051787A1 (en) * 2007-10-18 2009-04-23 Winefather, Llc Tamper-resistant microchip assembly
US20100026466A1 (en) * 2005-05-06 2010-02-04 Colby Steven M Passive Radio Frequency Data Logger
US20100116884A1 (en) * 2006-04-18 2010-05-13 Dean Alderucci Systems and methods for providing access to wireless gaming devices
US20100193591A1 (en) * 2007-08-03 2010-08-05 Arjowiggins Security method of fabricating an insert including an rfid device
US7774606B2 (en) 2005-01-20 2010-08-10 The Invention Science Fund I, Inc Write accessibility for electronic paper
US20100321248A1 (en) * 2007-07-04 2010-12-23 Arjowiggins Security Integrale Solutions Fibrous substrate for insert including an antenna
US20110002107A1 (en) * 2008-02-22 2011-01-06 Junsuke Tanaka Transponder and Booklet
WO2011056915A1 (en) * 2009-11-05 2011-05-12 Carlyle Rampersad International alpha-numeric demographic identity code
US8063878B2 (en) 2005-01-20 2011-11-22 The Invention Science Fund I, Llc Permanent electronic paper
US8074878B1 (en) * 2009-09-04 2011-12-13 F3M3 Companies, Inc. System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card
KR101106974B1 (en) 2011-06-03 2012-01-20 주식회사 테스나 A passport cover
US8292741B2 (en) 2006-10-26 2012-10-23 Cfph, Llc Apparatus, processes and articles for facilitating mobile gaming
US8319601B2 (en) 2007-03-14 2012-11-27 Cfph, Llc Game account access device
US8506400B2 (en) 2005-07-08 2013-08-13 Cfph, Llc System and method for wireless gaming system with alerts
US8613658B2 (en) 2005-07-08 2013-12-24 Cfph, Llc System and method for wireless gaming system with user profiles
US8690679B2 (en) 2005-08-09 2014-04-08 Cfph, Llc System and method for providing wireless gaming as a service application
US8956231B2 (en) 2010-08-13 2015-02-17 Cfph, Llc Multi-process communication regarding gaming information
US8974302B2 (en) 2010-08-13 2015-03-10 Cfph, Llc Multi-process communication regarding gaming information
US9183693B2 (en) 2007-03-08 2015-11-10 Cfph, Llc Game access device
US9495852B1 (en) 2005-05-06 2016-11-15 Steven M. Colby Electronically switchable RFID tags
US9524458B2 (en) 2005-02-07 2016-12-20 Mynette Technologies, Inc. Switchable epassport including shielding
US9569777B2 (en) 2005-02-07 2017-02-14 Mynette Technologies, Inc. EPassport including shielding method
CN107358288A (en) * 2017-07-22 2017-11-17 黄燕云 RFID anti-fake certificates
US10460566B2 (en) 2005-07-08 2019-10-29 Cfph, Llc System and method for peer-to-peer wireless gaming
US10535221B2 (en) 2006-10-26 2020-01-14 Interactive Games Llc System and method for wireless gaming with location determination
US10692090B2 (en) 2016-01-26 2020-06-23 Worldpay Limited Tamper-proofing and identity validation in a secure electronic transaction processing system
US10726664B2 (en) 2004-02-25 2020-07-28 Interactive Games Llc System and method for convenience gaming
WO2020219525A1 (en) * 2019-04-22 2020-10-29 Avery Dennison Retail Information Services, Llc Self-adhesive straps for rfid devices

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2397272B (en) * 2003-01-15 2006-11-15 Hewlett Packard Co Secure physical documents and methods and apparatus for publishing and reading them
US9152901B2 (en) * 2003-03-12 2015-10-06 Bundesdruckerei Gmbh Method for the production of a book cover insert and book-type security document and book cover insert and book-type security document
EP1738303B1 (en) * 2004-03-25 2008-09-17 Bauer, Eric Method for making an electronic label
PL1756755T3 (en) * 2004-06-16 2012-08-31 Gemalto Sa Shielded contactless electronic document
US20080169901A1 (en) * 2004-07-26 2008-07-17 Koninklijke Philips Electronics N.V. Arrangement for Identifying Persons
US10417463B2 (en) 2005-02-07 2019-09-17 Steven Michael Colby Passport RFID readability
US11170185B2 (en) 2005-02-07 2021-11-09 Steven Michael Colby State dependent passport reading
US11295095B2 (en) 2005-02-07 2022-04-05 Mynette Technologies, Inc. Secure reading of passport RFID tags
US10650199B2 (en) 2005-02-07 2020-05-12 Steven Michael Colby Passport including metallic fibers
US10956689B2 (en) 2005-02-07 2021-03-23 Mynette Technologies, Inc. Passport including RFID shielding
US11270182B2 (en) 2005-02-07 2022-03-08 Mynette Technologies, Inc. RFID financial device including mechanical switch
US10592709B2 (en) 2005-02-07 2020-03-17 Steven Michael Colby Passport shield
US10417462B2 (en) 2005-02-07 2019-09-17 Steven Michael Colby Passport including readability states
US11347949B2 (en) 2005-05-06 2022-05-31 Mynette Technologies, Inc. Cellular device including inductive antenna
DE102005025806B4 (en) * 2005-06-02 2008-04-17 Bundesdruckerei Gmbh Method for access from a terminal to an electronic device
US7482925B2 (en) * 2005-06-24 2009-01-27 Visa U.S.A. Apparatus and method to electromagnetically shield portable consumer devices
FR2888367B1 (en) * 2005-07-07 2007-10-19 Oberthur Card Syst Sa DOCUMENT WITH INTEGRATED CONTACTLESS ELECTRONIC DEVICE WITH RESONATOR.
US20070040683A1 (en) * 2005-08-22 2007-02-22 Neal Oliver Light-activated RFID tag
FR2893161B1 (en) * 2005-11-04 2009-01-23 Oberthur Card Syst Sa ELECTRONIC MICROCIRCUIT DOCUMENT WITHOUT CONTACT AND PROXIMITY SENSOR.
FR2895550B1 (en) * 2005-12-22 2008-08-22 Arjowiggins Soc Par Actions Si PROTECTIVE STRUCTURE FOR AN ARTICLE, IN PARTICULAR A DOCUMENT.
JP4876718B2 (en) * 2006-05-31 2012-02-15 カシオ計算機株式会社 Electronic paper recorder
FR2901899B1 (en) * 2006-06-06 2009-05-08 Ask Sa MASKING DEVICE FOR NON-CONTACT PORTABLE OBJECT OF SECURE DOCUMENT TYPE WITH RADIO FREQUENCY DEVICE
US7635089B2 (en) * 2006-07-03 2009-12-22 Identity Stronghold, Llc Device for shielding reading of a contactless smartcard
FR2904880B1 (en) * 2006-08-11 2008-10-10 Ask Sa SECURITY DEVICE INTEGRATED WITH CONTACTLESS OBJECT OF SECURE DOCUMENT TYPE WITH RADIO FREQUENCY DEVICE.
US20080061149A1 (en) * 2006-09-11 2008-03-13 Colin Tanner Proximity payment card with security interlock
US20080142588A1 (en) * 2006-12-13 2008-06-19 Immotec Security Systems, Ltd. RFID Access Control Intercommunication
CN101231707A (en) * 2007-01-25 2008-07-30 3M创新有限公司 Electromagnetic shielding device
DE102007009216A1 (en) 2007-02-26 2008-10-30 Giesecke & Devrient Gmbh Portable data carrier e.g. smart card, for contact-less data exchange, has processor connected with antenna, and shield designed such that it enables contact-less communication through shield in state
DE102007009213A1 (en) 2007-02-26 2008-08-28 Giesecke & Devrient Gmbh Portable data carrier
HK1109708A2 (en) * 2007-04-24 2008-06-13 On Track Innovations Ltd Interface card and apparatus and process for the formation thereof
US8604995B2 (en) * 2007-06-11 2013-12-10 Visa U.S.A. Inc. Shielding of portable consumer device
IL184260A0 (en) * 2007-06-27 2008-03-20 On Track Innovations Ltd Mobile telecommunications device having sim/antenna coil interface
FR2919409B1 (en) 2007-07-26 2009-09-04 Smart Packaging Solutions Sps SECURE DOCUMENT WITH NON-CONTACT CHIP WITH DATA PROTECTION AGAINST UNAUTHORIZED READING.
US8157178B2 (en) * 2007-10-19 2012-04-17 First Data Corporation Manufacturing system to produce contactless devices with switches
US8028923B2 (en) * 2007-11-14 2011-10-04 Smartrac Ip B.V. Electronic inlay structure and method of manufacture thereof
US20090123743A1 (en) * 2007-11-14 2009-05-14 Guy Shafran Method of manufacture of wire imbedded inlay
US8038068B2 (en) * 2007-11-28 2011-10-18 Visa U.S.A. Inc. Multifunction removable cover for portable payment device
KR101433623B1 (en) * 2007-12-13 2014-09-23 삼성전자주식회사 Anti-skimming system
KR101286871B1 (en) 2008-01-23 2013-07-16 스마트랙 아이피 비.브이. Manufacture of a smart card
US8107881B2 (en) * 2008-02-26 2012-01-31 First Data Corporation Wireless translation device
AT507034B1 (en) * 2008-06-18 2010-04-15 Keba Ag METHOD AND DEVICE FOR PROTECTING A READER FOR CARDBOARD DATA AGAINST THE UNAUTHORIZED EVALUATION OR COPYING OF MAGNETICALLY-CODED DATA OF AN ADDED CARDBOARD DATA SUPPORT
US8272574B2 (en) * 2008-09-30 2012-09-25 Infineon Technologies Ag Document for personal identification having protection against external manipulations and a method for producing
GB0818271D0 (en) * 2008-10-06 2008-11-12 Rue De Int Ltd Document security feature
US20100090008A1 (en) * 2008-10-13 2010-04-15 Oded Bashan Authentication seal
US8550361B2 (en) * 2008-10-28 2013-10-08 First Data Corporation Systems, methods, and apparatus to facilitate locating a user of a transaction device
US20100102123A1 (en) * 2008-10-28 2010-04-29 First Data Corporation Systems, Methods, and Apparatus for Facilitating Access to Medical Information
US20100102131A1 (en) * 2008-10-28 2010-04-29 First Data Corporation Systems and Methods for Disabling a Contactless Transaction Device
US10803515B2 (en) * 2008-10-31 2020-10-13 First Data Corporation Systems, methods, and apparatus for using a contactless transaction device reader with a computing system
KR100903687B1 (en) * 2008-12-30 2009-06-18 두성산업 주식회사 Electronpassport case for preventing of information leakage and improving tag recognition ratio
AU2009336872B2 (en) * 2009-01-07 2015-07-23 Idemia Identity & Security Germany Ag Apparatus for a checkpoint
US20100295286A1 (en) * 2009-05-13 2010-11-25 Goldstein Keith E Cover and method of manufacturing the same
JP2011078046A (en) * 2009-10-02 2011-04-14 Ricoh Co Ltd Information input device
US8195236B2 (en) 2010-06-16 2012-06-05 On Track Innovations Ltd. Retrofit contactless smart SIM functionality in mobile communicators
US8381973B2 (en) * 2010-11-22 2013-02-26 International Business Machines Corporation System and method for providing and verifying a passport
US8424757B2 (en) 2010-12-06 2013-04-23 On Track Innovations Ltd. Contactless smart SIM functionality retrofit for mobile communication device
FR2968432B1 (en) * 2010-12-06 2012-12-28 Oberthur Technologies METHOD FOR INPUTTING A MODULE IN A MICROCIRCUIT CARD
US10095970B1 (en) * 2011-01-31 2018-10-09 Dynamics Inc. Cards including anti-skimming devices
US8763914B2 (en) * 2012-01-17 2014-07-01 On Track Innovations Ltd. Decoupled contactless bi-directional systems and methods
SG2013055355A (en) * 2013-07-19 2015-02-27 Kok Ann Wong Land title deed
DE102014000389B3 (en) * 2014-01-10 2015-05-28 Giesecke & Devrient Gmbh Passbook and method of making a security document
AT515401B1 (en) * 2014-02-03 2016-04-15 Seibersdorf Labor Gmbh Shielding element for attachment to an object
US9694614B2 (en) 2014-07-01 2017-07-04 International Business Machines Corporation Printed publication with a digital file enhancer from an affixed chip
US9930475B1 (en) 2015-01-02 2018-03-27 Wells Fargo Bank, N.A. Customer service document with data storage device
US10878686B1 (en) * 2018-03-26 2020-12-29 Badge Messenger Inc. Badge holder with one touch communication
US11403472B2 (en) * 2019-11-04 2022-08-02 Edgar Davin Salatandre Apparatus for use with a NFC tag reader
US11208839B2 (en) * 2020-03-03 2021-12-28 Gmi Holdings, Inc. Space venting upward acting door system and method
US11412825B2 (en) 2020-11-04 2022-08-16 Identity Stronghold, Llc Shielding card holder system
EP4002210A1 (en) * 2020-11-12 2022-05-25 AdvanIDe Holdings Pte. Ltd. Card inlay for direct connection or inductive coupling technology
US11551050B2 (en) 2020-11-12 2023-01-10 Advanide Holdings Pte. Ltd. Card inlay for direct connection or inductive coupling technology

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5291560A (en) * 1991-07-15 1994-03-01 Iri Scan Incorporated Biometric personal identification system based on iris analysis
US5363453A (en) * 1989-11-02 1994-11-08 Tms Inc. Non-minutiae automatic fingerprint identification system and methods
US5973710A (en) * 1995-04-13 1999-10-26 Supercom, Ltd. Method and apparatus for printing on passports and the like
US6101477A (en) * 1998-01-23 2000-08-08 American Express Travel Related Services Company, Inc. Methods and apparatus for a travel-related multi-function smartcard
US6108022A (en) * 1995-04-13 2000-08-22 Supercom Ltd. Method for producing identification documents and documents produced by it
US6219439B1 (en) * 1998-07-09 2001-04-17 Paul M. Burger Biometric authentication system
US20020143588A1 (en) * 2001-04-03 2002-10-03 Yoshihisa Ishigami Card system for immigration/emigration control and card for use in the system
US20030093187A1 (en) * 2001-10-01 2003-05-15 Kline & Walker, Llc PFN/TRAC systemTM FAA upgrades for accountable remote and robotics control to stop the unauthorized use of aircraft and to improve equipment management and public safety in transportation
US20030099379A1 (en) * 2001-11-26 2003-05-29 Monk Bruce C. Validation and verification apparatus and method
US20030117262A1 (en) * 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
US20030116630A1 (en) * 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
US20030132301A1 (en) * 2002-12-31 2003-07-17 Massachusetts Institute Of Technology Manually operated switch for enabling and disabling an RFID card
US20030164611A1 (en) * 2000-07-05 2003-09-04 Walter Schneider Antifalsification paper and security document produced therefrom
US20040081332A1 (en) * 2002-10-23 2004-04-29 Tuttle William J. Apparatus and method for document reading and authentication
US20050236489A1 (en) * 2004-04-27 2005-10-27 Francois Droz Portable information carrier with transponders
US20050242194A1 (en) * 2004-03-11 2005-11-03 Jones Robert L Tamper evident adhesive and identification document including same

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2919649A1 (en) 1979-05-16 1980-11-20 Bbc Brown Boveri & Cie SECURITY PAPER
GB9011457D0 (en) * 1990-05-22 1990-07-11 Amblehurst Ltd Tamper indicating security tape
TW231257B (en) * 1992-03-02 1994-10-01 Ciba Geigy
DE4311385C2 (en) 1993-04-07 1998-05-20 Walter Holzer Identification card
US6546112B1 (en) * 1993-11-18 2003-04-08 Digimarc Corporation Security document with steganographically-encoded authentication data
EP1548637A3 (en) * 1994-08-25 2008-01-02 Neotec Holdings Limited Method and apparatus for providing identification
ATE183001T1 (en) 1995-12-14 1999-08-15 Landis & Gyr Tech Innovat ADDITIONAL SECURITY FEATURE FOR CHIP CARDS
US6214454B1 (en) * 1996-09-25 2001-04-10 Nippon Paint Co., Ltd. Electromagnetic wave absorbing material
US6121544A (en) 1998-01-15 2000-09-19 Petsinger; Julie Ann Electromagnetic shield to prevent surreptitious access to contactless smartcards
FR2784083B1 (en) 1998-10-01 2000-12-15 Gemplus Card Int ANTI-FRAUD PACKAGE FOR AN INTEGRATED CIRCUIT CARD COMPRISING REMOTE COMMUNICATION MEANS
ES2351549T3 (en) * 2000-03-21 2011-02-07 Mikoh Corporation A RADIO FREQUENCY IDENTIFICATION LABEL WITH INDICATION OF INDEBIT HANDLING.
FR2824018B1 (en) * 2001-04-26 2003-07-04 Arjo Wiggins Sa COVER INCORPORATING A RADIOFREQUENCY IDENTIFICATION DEVICE
JP2003099752A (en) * 2001-09-26 2003-04-04 Hitachi Electronics Service Co Ltd Passport with id chip for preventing falsification
JP2003211878A (en) * 2002-01-21 2003-07-30 Hitachi Electronics Service Co Ltd Passport with id chip for preventing forgery
JP2003216908A (en) * 2002-01-22 2003-07-31 Hitachi Electronics Service Co Ltd Passport forgery detecting apparatus
US7002474B2 (en) * 2002-07-17 2006-02-21 Ncr Corporation Radio frequency identification (RFID) tag and a method of operating an RFID tag
US7100835B2 (en) 2002-12-31 2006-09-05 Massachusetts Institute Of Technology Methods and apparatus for wireless RFID cardholder signature and data entry
US7339120B2 (en) * 2003-06-26 2008-03-04 Matsushita Electric Industrial Co., Ltd. Electromagnetic wave shield
FR2863083B1 (en) * 2003-12-02 2006-03-03 A S K IDENTITY BOOKLET WITH RADIOFREQUENCY INDENTIFICATION DEVICE
US7287704B2 (en) * 2005-05-03 2007-10-30 Composecure, Llc Laser markable secure documents

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5363453A (en) * 1989-11-02 1994-11-08 Tms Inc. Non-minutiae automatic fingerprint identification system and methods
US5291560A (en) * 1991-07-15 1994-03-01 Iri Scan Incorporated Biometric personal identification system based on iris analysis
US5973710A (en) * 1995-04-13 1999-10-26 Supercom, Ltd. Method and apparatus for printing on passports and the like
US6108022A (en) * 1995-04-13 2000-08-22 Supercom Ltd. Method for producing identification documents and documents produced by it
US6101477A (en) * 1998-01-23 2000-08-08 American Express Travel Related Services Company, Inc. Methods and apparatus for a travel-related multi-function smartcard
US6219439B1 (en) * 1998-07-09 2001-04-17 Paul M. Burger Biometric authentication system
US20030164611A1 (en) * 2000-07-05 2003-09-04 Walter Schneider Antifalsification paper and security document produced therefrom
US20020143588A1 (en) * 2001-04-03 2002-10-03 Yoshihisa Ishigami Card system for immigration/emigration control and card for use in the system
US20030093187A1 (en) * 2001-10-01 2003-05-15 Kline & Walker, Llc PFN/TRAC systemTM FAA upgrades for accountable remote and robotics control to stop the unauthorized use of aircraft and to improve equipment management and public safety in transportation
US20030099379A1 (en) * 2001-11-26 2003-05-29 Monk Bruce C. Validation and verification apparatus and method
US20030117262A1 (en) * 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
US20030116630A1 (en) * 2001-12-21 2003-06-26 Kba-Giori S.A. Encrypted biometric encoded security documents
US20040081332A1 (en) * 2002-10-23 2004-04-29 Tuttle William J. Apparatus and method for document reading and authentication
US20030132301A1 (en) * 2002-12-31 2003-07-17 Massachusetts Institute Of Technology Manually operated switch for enabling and disabling an RFID card
US20050242194A1 (en) * 2004-03-11 2005-11-03 Jones Robert L Tamper evident adhesive and identification document including same
US20050236489A1 (en) * 2004-04-27 2005-10-27 Francois Droz Portable information carrier with transponders

Cited By (130)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9355518B2 (en) 2004-02-25 2016-05-31 Interactive Games Llc Gaming system with location determination
US10653952B2 (en) 2004-02-25 2020-05-19 Interactive Games Llc System and method for wireless gaming with location determination
US10391397B2 (en) 2004-02-25 2019-08-27 Interactive Games, Llc System and method for wireless gaming with location determination
US8504617B2 (en) 2004-02-25 2013-08-06 Cfph, Llc System and method for wireless gaming with location determination
US10360755B2 (en) 2004-02-25 2019-07-23 Interactive Games Llc Time and location based gaming
US8696443B2 (en) 2004-02-25 2014-04-15 Cfph, Llc System and method for convenience gaming
US8308568B2 (en) 2004-02-25 2012-11-13 Cfph, Llc Time and location based gaming
US8162756B2 (en) 2004-02-25 2012-04-24 Cfph, Llc Time and location based gaming
US8616967B2 (en) 2004-02-25 2013-12-31 Cfph, Llc System and method for convenience gaming
US20070066401A1 (en) * 2004-02-25 2007-03-22 Cfph, Llc System and Method for Convenience Gaming
US9430901B2 (en) 2004-02-25 2016-08-30 Interactive Games Llc System and method for wireless gaming with location determination
US20070275779A1 (en) * 2004-02-25 2007-11-29 Amaitis Lee M System and method for convenience gaming
US20070281792A1 (en) * 2004-02-25 2007-12-06 Amaitis Lee M System and method for convenience gaming
US20070281785A1 (en) * 2004-02-25 2007-12-06 Amaitis Lee M System and method for convenience gaming
US11514748B2 (en) 2004-02-25 2022-11-29 Interactive Games Llc System and method for convenience gaming
US10347076B2 (en) 2004-02-25 2019-07-09 Interactive Games Llc Network based control of remote system for enabling, disabling, and controlling gaming
US11024115B2 (en) 2004-02-25 2021-06-01 Interactive Games Llc Network based control of remote system for enabling, disabling, and controlling gaming
US10515511B2 (en) 2004-02-25 2019-12-24 Interactive Games Llc Network based control of electronic devices for gaming
US10726664B2 (en) 2004-02-25 2020-07-28 Interactive Games Llc System and method for convenience gaming
US20080311994A1 (en) * 2004-02-25 2008-12-18 Amaitis Lee M System and method for wireless gaming with location determination
US8016667B2 (en) * 2004-07-22 2011-09-13 Igt Remote gaming eligibility system and method using RFID tags
US8425314B2 (en) 2004-07-22 2013-04-23 Igt Remote gaming eligibility system and method using RFID tags
US20060019745A1 (en) * 2004-07-22 2006-01-26 Igt Remote gaming eligibility system and method using RFID tags
US8880890B2 (en) 2005-01-20 2014-11-04 The Invention Science Fund I, Llc Write accessibility for electronic paper
US20110055587A1 (en) * 2005-01-20 2011-03-03 Jung Edward K Y Alert options for electronic-paper verification
US8621224B2 (en) 2005-01-20 2013-12-31 The Invention Science Fund I, Llc Alert options for electronic-paper verification
US20110215161A1 (en) * 2005-01-20 2011-09-08 Jung Edward K Y Write accessibility for Electronic paper
US20080148396A1 (en) * 2005-01-20 2008-06-19 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US8640259B2 (en) 2005-01-20 2014-01-28 The Invention Science Fund I, Llc Notarizable electronic paper
US8281142B2 (en) 2005-01-20 2012-10-02 The Invention Science Fund I, Llc Notarizable electronic paper
US20080134324A1 (en) * 2005-01-20 2008-06-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Notarizable electronic paper
US8063878B2 (en) 2005-01-20 2011-11-22 The Invention Science Fund I, Llc Permanent electronic paper
US20060158406A1 (en) * 2005-01-20 2006-07-20 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Semi-permanent electronic paper
US7774606B2 (en) 2005-01-20 2010-08-10 The Invention Science Fund I, Inc Write accessibility for electronic paper
US9734354B2 (en) 2005-01-20 2017-08-15 Invention Science Fund I, Llc Notarizable electronic paper
US7856555B2 (en) 2005-01-20 2010-12-21 The Invention Science Fund I, Llc Write accessibility for electronic paper
US20070143621A1 (en) * 2005-01-20 2007-06-21 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US9524458B2 (en) 2005-02-07 2016-12-20 Mynette Technologies, Inc. Switchable epassport including shielding
US9569777B2 (en) 2005-02-07 2017-02-14 Mynette Technologies, Inc. EPassport including shielding method
US20060187060A1 (en) * 2005-02-07 2006-08-24 Colby Steven M Identity devices including radio frequency shielding
US20060187055A1 (en) * 2005-02-07 2006-08-24 Colby Steven M Containers including radio frequency shielding
US7719425B2 (en) 2005-02-07 2010-05-18 Colby Steven M Radio frequency shielding
US20060187061A1 (en) * 2005-02-07 2006-08-24 Colby Steven M Radio frequency shielding
US20100026466A1 (en) * 2005-05-06 2010-02-04 Colby Steven M Passive Radio Frequency Data Logger
US9495852B1 (en) 2005-05-06 2016-11-15 Steven M. Colby Electronically switchable RFID tags
US8816826B2 (en) 2005-05-06 2014-08-26 Steven M. Colby Passive radio frequency data logger
US7739510B2 (en) 2005-05-12 2010-06-15 The Invention Science Fund I, Inc Alert options for electronic-paper verification
US20060259773A1 (en) * 2005-05-12 2006-11-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Alert options for electronic-paper verification
US20060265744A1 (en) * 2005-05-12 2006-11-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Write accessibility for electronic paper
US7865734B2 (en) 2005-05-12 2011-01-04 The Invention Science Fund I, Llc Write accessibility for electronic paper
US20060282903A1 (en) * 2005-06-08 2006-12-14 Jung Edward K User accessibility to electronic paper
US7669245B2 (en) * 2005-06-08 2010-02-23 Searete, Llc User accessibility to electronic paper
US8613658B2 (en) 2005-07-08 2013-12-24 Cfph, Llc System and method for wireless gaming system with user profiles
US10733847B2 (en) 2005-07-08 2020-08-04 Cfph, Llc System and method for gaming
US8708805B2 (en) 2005-07-08 2014-04-29 Cfph, Llc Gaming system with identity verification
US8506400B2 (en) 2005-07-08 2013-08-13 Cfph, Llc System and method for wireless gaming system with alerts
US10510214B2 (en) 2005-07-08 2019-12-17 Cfph, Llc System and method for peer-to-peer wireless gaming
US11069185B2 (en) 2005-07-08 2021-07-20 Interactive Games Llc System and method for wireless gaming system with user profiles
US10460566B2 (en) 2005-07-08 2019-10-29 Cfph, Llc System and method for peer-to-peer wireless gaming
US20070012761A1 (en) * 2005-07-18 2007-01-18 Paone Timothy V Secure personal identification document and system for preventing unauthorized use of same
US8690679B2 (en) 2005-08-09 2014-04-08 Cfph, Llc System and method for providing wireless gaming as a service application
US11636727B2 (en) 2005-08-09 2023-04-25 Cfph, Llc System and method for providing wireless gaming as a service application
US10460557B2 (en) 2006-04-18 2019-10-29 Cfph, Llc Systems and methods for providing access to a system
US20100116884A1 (en) * 2006-04-18 2010-05-13 Dean Alderucci Systems and methods for providing access to wireless gaming devices
US10957150B2 (en) 2006-04-18 2021-03-23 Cfph, Llc Systems and methods for providing access to wireless gaming devices
US8403214B2 (en) 2006-04-18 2013-03-26 Bgc Partners, Inc. Systems and methods for providing access to wireless gaming devices
US10286300B2 (en) 2006-05-05 2019-05-14 Cfph, Llc Systems and methods for providing access to locations and services
US11024120B2 (en) 2006-05-05 2021-06-01 Cfph, Llc Game access device with time varying signal
US20090075729A1 (en) * 2006-05-05 2009-03-19 Dean Alderucci Systems and methods for providing access to wireless gaming devices
US8397985B2 (en) 2006-05-05 2013-03-19 Cfph, Llc Systems and methods for providing access to wireless gaming devices
US8840018B2 (en) 2006-05-05 2014-09-23 Cfph, Llc Device with time varying signal
US10535223B2 (en) 2006-05-05 2020-01-14 Cfph, Llc Game access device with time varying signal
US8899477B2 (en) 2006-05-05 2014-12-02 Cfph, Llc Device detection
US8939359B2 (en) 2006-05-05 2015-01-27 Cfph, Llc Game access device with time varying signal
US20080015013A1 (en) * 2006-05-05 2008-01-17 Gelman Geoffrey M Game access device with time varying signal
US11229835B2 (en) 2006-05-05 2022-01-25 Cfph, Llc Systems and methods for providing access to wireless gaming devices
US20090082098A1 (en) * 2006-05-05 2009-03-26 Dean Alderucci Systems and methods for providing access to wireless gaming devices
US20100304850A1 (en) * 2006-05-05 2010-12-02 Gelman Geoffrey M Game access device with time varying signal
US10751607B2 (en) 2006-05-05 2020-08-25 Cfph, Llc Systems and methods for providing access to locations and services
US8695876B2 (en) 2006-05-05 2014-04-15 Cfph, Llc Systems and methods for providing access to wireless gaming devices
US8740065B2 (en) 2006-05-05 2014-06-03 Cfph, Llc Systems and methods for providing access to wireless gaming devices
US7665668B2 (en) * 2006-08-18 2010-02-23 Mastercard International, Inc. Cut here to destroy indicator
US20080041965A1 (en) * 2006-08-18 2008-02-21 Simon Phillips Cut here to destroy indicator
US11017628B2 (en) 2006-10-26 2021-05-25 Interactive Games Llc System and method for wireless gaming with location determination
US8292741B2 (en) 2006-10-26 2012-10-23 Cfph, Llc Apparatus, processes and articles for facilitating mobile gaming
US10535221B2 (en) 2006-10-26 2020-01-14 Interactive Games Llc System and method for wireless gaming with location determination
US20080113785A1 (en) * 2006-11-14 2008-05-15 Alderucci Dean P Conditional biometric access in a gaming environment
US20080113786A1 (en) * 2006-11-14 2008-05-15 Alderucci Dean P Biometric access data encryption
US10706673B2 (en) 2006-11-14 2020-07-07 Cfph, Llc Biometric access data encryption
US8510567B2 (en) 2006-11-14 2013-08-13 Cfph, Llc Conditional biometric access in a gaming environment
US9280648B2 (en) 2006-11-14 2016-03-08 Cfph, Llc Conditional biometric access in a gaming environment
US8645709B2 (en) 2006-11-14 2014-02-04 Cfph, Llc Biometric access data encryption
US11182462B2 (en) 2006-11-15 2021-11-23 Cfph, Llc Biometric access sensitivity
US10546107B2 (en) 2006-11-15 2020-01-28 Cfph, Llc Biometric access sensitivity
US9411944B2 (en) 2006-11-15 2016-08-09 Cfph, Llc Biometric access sensitivity
US20080113787A1 (en) * 2006-11-15 2008-05-15 Alderucci Dean P Biometric access sensitivity
US8784197B2 (en) 2006-11-15 2014-07-22 Cfph, Llc Biometric access sensitivity
US9183693B2 (en) 2007-03-08 2015-11-10 Cfph, Llc Game access device
US20080218312A1 (en) * 2007-03-08 2008-09-11 Asher Joseph M Game access device with privileges
US10424153B2 (en) 2007-03-08 2019-09-24 Cfph, Llc Game access device with privileges
US8581721B2 (en) 2007-03-08 2013-11-12 Cfph, Llc Game access device with privileges
US11055958B2 (en) 2007-03-08 2021-07-06 Cfph, Llc Game access device with privileges
US10332155B2 (en) 2007-03-08 2019-06-25 Cfph, Llc Systems and methods for determining an amount of time an object is worn
US10366562B2 (en) 2007-03-14 2019-07-30 Cfph, Llc Multi-account access device
US8319601B2 (en) 2007-03-14 2012-11-27 Cfph, Llc Game account access device
US11055954B2 (en) 2007-03-14 2021-07-06 Cfph, Llc Game account access device
US20100321248A1 (en) * 2007-07-04 2010-12-23 Arjowiggins Security Integrale Solutions Fibrous substrate for insert including an antenna
US8963778B2 (en) 2007-07-04 2015-02-24 Arjowiggins Security Integrale Solutions Fibrous substrate for insert including an antenna
US20100193591A1 (en) * 2007-08-03 2010-08-05 Arjowiggins Security method of fabricating an insert including an rfid device
WO2009051787A1 (en) * 2007-10-18 2009-04-23 Winefather, Llc Tamper-resistant microchip assembly
US9934459B2 (en) * 2008-02-22 2018-04-03 Toppan Printing Co., Ltd. Transponder and booklet
US20110002107A1 (en) * 2008-02-22 2011-01-06 Junsuke Tanaka Transponder and Booklet
US8074878B1 (en) * 2009-09-04 2011-12-13 F3M3 Companies, Inc. System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card
WO2011056915A1 (en) * 2009-11-05 2011-05-12 Carlyle Rampersad International alpha-numeric demographic identity code
US8974302B2 (en) 2010-08-13 2015-03-10 Cfph, Llc Multi-process communication regarding gaming information
US10744416B2 (en) 2010-08-13 2020-08-18 Interactive Games Llc Multi-process communication regarding gaming information
US8956231B2 (en) 2010-08-13 2015-02-17 Cfph, Llc Multi-process communication regarding gaming information
US10406446B2 (en) 2010-08-13 2019-09-10 Interactive Games Llc Multi-process communication regarding gaming information
KR101106974B1 (en) 2011-06-03 2012-01-20 주식회사 테스나 A passport cover
US11093948B2 (en) 2016-01-26 2021-08-17 Worldpay Limited Systems and methods for performing identity validation for electronic transactions
US11074588B2 (en) 2016-01-26 2021-07-27 Worldpay Limited Tamper-proof electronic transaction device
US11514459B2 (en) 2016-01-26 2022-11-29 Worldpay Limited Fraud reduction electronic transaction device
US11538042B2 (en) 2016-01-26 2022-12-27 Worldpay Limited Systems and methods for preventing identity fraud of electronic transaction device
US10692090B2 (en) 2016-01-26 2020-06-23 Worldpay Limited Tamper-proofing and identity validation in a secure electronic transaction processing system
US11823208B2 (en) 2016-01-26 2023-11-21 Worldpay Limited Systems and methods for preventing identity fraud of electronic transaction device
US11823206B2 (en) 2016-01-26 2023-11-21 Worldpay Limited Systems and methods for reducing identity fraud of electronic transaction device
US11823207B2 (en) * 2016-01-26 2023-11-21 Worldpay Limited Fraud reduction electronic transaction device
CN107358288A (en) * 2017-07-22 2017-11-17 黄燕云 RFID anti-fake certificates
WO2020219525A1 (en) * 2019-04-22 2020-10-29 Avery Dennison Retail Information Services, Llc Self-adhesive straps for rfid devices
JP2022529522A (en) * 2019-04-22 2022-06-22 エイヴェリー デニソン リテール インフォメーション サービシズ リミテッド ライアビリティ カンパニー Self-adhesive strap for RFID devices

Also Published As

Publication number Publication date
MXPA06014309A (en) 2007-05-23
ZA200700075B (en) 2008-05-28
CN101002214A (en) 2007-07-18
HK1103827A1 (en) 2007-12-28
EA012731B1 (en) 2009-12-30
US20050274794A1 (en) 2005-12-15
US20080272196A1 (en) 2008-11-06
US7905415B2 (en) 2011-03-15
US7243840B2 (en) 2007-07-17
EA200700002A1 (en) 2007-06-29
CN101002214B (en) 2010-08-18

Similar Documents

Publication Publication Date Title
US20060005050A1 (en) Tamper-free and forgery-proof passport and methods for providing same
EP2386426A2 (en) Document and method of manufacturing same
CN100526093C (en) Individualized security document
US7832771B2 (en) Method for the production of a book-type security document and a book-type security document
US20110215909A1 (en) Structure including at least two integrated microcircuit devices with contactless communication
AU2005211867B2 (en) Identification document and method for the production thereof
EP3374931A1 (en) Value or security document made of a fiber composite material, and method for producing the value or security document
WO2012038940A2 (en) Electronic passport
EP1791655B1 (en) Smart identification document
CA2536312C (en) Flexible sheet assembly
JP2013521153A (en) Document with cover
EP2287012A1 (en) Inlet for security documents in the form of a booklet
IL179938A (en) Smart identification document

Legal Events

Date Code Title Description
AS Assignment

Owner name: SUPERCOM LTD., ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BASON, ELI;SHUMAN, BOAZ;MERLING, IGOR;AND OTHERS;REEL/FRAME:015454/0559

Effective date: 20040603

AS Assignment

Owner name: ON TRACK INNOVATIONS LTD., ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SUPERCOM LTD.;REEL/FRAME:018564/0875

Effective date: 20061127

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: DBFIP SCL LLC, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:SUPERCOM IP LLC;REEL/FRAME:047042/0454

Effective date: 20180906

AS Assignment

Owner name: SUPERCOM IP LLC, NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SAFEND LTD;REEL/FRAME:047264/0009

Effective date: 20180904