SECURITY PAPER

Everyone knows how easy it is to copy printed documents today.

With today’s technology, counterfeiters have the easy part. A simple color printer is usually enough.

Security paper contains a host of refinements, makes tampering attempts immediately visible and can be distinguished from conventional paper even by the layman. All manufacturing processes are designed to allow the integration of all known security features. These make forgery more difficult, are an obstacle to illegal copying and guarantee the user’s confidence in the authenticity of the document. Only such paper deserves to be called security paper.

 

Security features such as :

 

Watermark

are image marks introduced into the paper by different thicknesses of paper, which can be recognized by light transmission and were originally used to identify the producing paper mill. In particular, they are used as a security feature on banknotes and postage stamps as well as in personal documents.

 

Invisible” security ink (UV)

An invisible print in aFLUO color identifies the original. This special ink is practically invisible in daylight. Under a UV test lamp, it illuminates in red, yellow or blue, for example. Security element that is also used for banknotes.

 

Copy protection

When copying, a gray inscription “COPY” automatically appears on the entire page of each copy – and the watermark has disappeared.

This means that the original and the copy can be easily distinguished from each other – without any help. A glance in daylight is enough.

 

Individual numbering

All printouts can be printed with a consecutive number or code. This is what makes each printed security paper unique.

 

Full color design

Individual color design with special colors (reactive to solvents, erasable, etc.)

 

Micro fonts

Very small fonts that are not visible to the naked eye.

 

The following documents are provided with these security features :

– official forms

– identity cards

– letterheads, business forms, contract forms

– certificates,

– certificates,

– the design of the brand,

– ISO documentation, etc.

 

Optionally, fingerprints and signatures can also be integrated. However, this integration requires additional verification of the data entered.

 

Once the data is recovered and integrated into the application, the image files are deleted. Deletion is the responsibility of the relevant authority.

 

The IT security of DIBIKO DIBIDAT is due to the integration into the respective network infrastructure of the respective municipality or registry office, which depends mainly on the security mechanisms in place there.

 

The manufacturer has no direct influence on the installation of data security measures in the respective municipal network or in the network of the authority concerned. Nevertheless, the manufacturer’s data protection and data security concept and the manufacturer’s recommendations (which are part of the operating instructions) set requirements for the operating environment.

 

– Space environment

– Network Integration

– Firewall and virus protection

– Authorization concept

– logging

– Data backup

– deletion deadlines

DOWNLOAD INFORMATION