US 9,811,723 B2
Method of authenticating and/or identifying a security article
Henri Rosset, Le Pin (FR); and Philippe Dietemann, Saint-Martin-d'Heres (FR)
Assigned to ARJOWIGGINS SECURITY, Boulogne Billancourt (FR)
Appl. No. 13/806,734
Filed by Henri Rosset, Le Pin (FR); and Philippe Dietemann, Saint-Martin-d'Heres (FR)
PCT Filed Jun. 22, 2011, PCT No. PCT/IB2011/052741
§ 371(c)(1), (2), (4) Date Mar. 8, 2013,
PCT Pub. No. WO2011/161635, PCT Pub. Date Dec. 29, 2011.
Claims priority of application No. 10 54932 (FR), filed on Jun. 22, 2010.
Prior Publication US 2013/0169677 A1, Jul. 4, 2013
Int. Cl. G09G 5/00 (2006.01); G06K 9/00 (2006.01); B41M 3/14 (2006.01); G07D 7/12 (2016.01); G07D 7/128 (2016.01); B42D 25/41 (2014.01); B42D 25/43 (2014.01); B42D 25/29 (2014.01); B42D 25/355 (2014.01); B42D 25/00 (2014.01); B42D 25/333 (2014.01); B42D 25/305 (2014.01); B42D 25/351 (2014.01); G07D 7/00 (2016.01); G07D 7/01 (2016.01); G07D 7/207 (2016.01); B42D 25/382 (2014.01); B42D 25/346 (2014.01); B42D 25/387 (2014.01); B42D 25/391 (2014.01)
CPC G06K 9/00442 (2013.01) [B41M 3/148 (2013.01); B42D 25/00 (2014.10); B42D 25/29 (2014.10); B42D 25/305 (2014.10); B42D 25/333 (2014.10); B42D 25/351 (2014.10); B42D 25/355 (2014.10); B42D 25/41 (2014.10); B42D 25/43 (2014.10); G07D 7/003 (2017.05); G07D 7/01 (2017.05); G07D 7/12 (2013.01); G07D 7/128 (2013.01); G07D 7/207 (2017.05); B42D 25/346 (2014.10); B42D 25/382 (2014.10); B42D 25/387 (2014.10); B42D 25/391 (2014.10); B42D 2033/04 (2013.01); B42D 2033/06 (2013.01); B42D 2033/10 (2013.01); B42D 2033/16 (2013.01); B42D 2033/20 (2013.01); B42D 2033/22 (2013.01); B42D 2033/26 (2013.01); B42D 2033/46 (2013.01); B42D 2035/14 (2013.01); B42D 2035/16 (2013.01); B42D 2035/24 (2013.01); B42D 2035/36 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for authenticating and/or identifying a security article comprising a first image, the method comprising:
displaying on an electronic imager a second image produced by the electronic imager or projecting on a background or on the security article a second image produced by an electronic imager, the electronic imager being an electronic device that is independent from the security article,
at least partially superimposing the first image of the security article with the second image, and
performing a relative motion between the superimposed first and second images so as to make it possible to observe an authentication and/or identification information item for the security article during the relative motion between the superimposed first and second images, and
an effect of motion or of animation being observed during the relative motion between the superimposed first and second images.