AU2014250638A1 - Security element, value document comprising such a security element, and method for producing such a security element - Google Patents

Security element, value document comprising such a security element, and method for producing such a security element Download PDF

Info

Publication number
AU2014250638A1
AU2014250638A1 AU2014250638A AU2014250638A AU2014250638A1 AU 2014250638 A1 AU2014250638 A1 AU 2014250638A1 AU 2014250638 A AU2014250638 A AU 2014250638A AU 2014250638 A AU2014250638 A AU 2014250638A AU 2014250638 A1 AU2014250638 A1 AU 2014250638A1
Authority
AU
Australia
Prior art keywords
facets
security element
pixels
area
pixel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2014250638A
Inventor
Christian Fuhse
Wittich Kaule
Michael Rahm
Andreas Rauch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Priority to AU2014250638A priority Critical patent/AU2014250638A1/en
Publication of AU2014250638A1 publication Critical patent/AU2014250638A1/en
Abandoned legal-status Critical Current

Links

Landscapes

  • Diffracting Gratings Or Hologram Optical Elements (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

- 45 Abstract There is provided a security element (1) for a security paper, value document or the like, having a carrier (8) which has an areal region (3) which is divided into a multiplicity of pixels (4) which respectively comprise at least one optically active facet 5 (5), whereby the majority of the pixels (4) respectively have several of the optically active facets (5) of identical orientation per pixel (4), and the facets (5) are so oriented that the areal region (3) is perceptible to a viewer as an area that protrudes and/or recedes relative to its actual spatial form.

Description

-1-. Security element value document having such a security element, and manufacturing method for a security element [I] The present invention relates to a security element for a security paper, value document or the like, to a value document having such a security element, and to a 5 method for manufacturing such a security element. 121 Objects to be protected are frequently equipped with a security element which permits verification of the authenticity of the object and at the same time serves as protection from unauthorized reproduction. 131 Objects to be protected are for example security papers, identity documents and 10 value documents (such as e.g. bank notes, chip cards, passports, identification cards, identification cards, shares, investment securities, deeds, vouchers, checks, admission tickets, credit cards, health cards, etc.) as well as product authentication elements, such as e.g. labels, seals, packages, etc. [41 A technology that is widespread particularly in the field of security elements and 15 gives a three-dimensional appearance to a practically planar foil involves various forms of holography. However, such technologies have some disadvantages for the use of a security feature, in particular on bank notes. On the one hand, the quality of the three-dimensional representation of a hologram depends strongly on the illumination conditions. The representations of holograms are often hardly recognizable in 20 particular in diffuse illumination. Furthermore, holograms have the disadvantage that they are meanwhile present at many places in everyday life and, hence, their special rank as a security feature is vanishing. [51 On these premises, the invention is based on the object of avoiding the disadvantages of the prior art and in particular providing a security element for a 25 security paper, value document or the like which achieves a good three-dimensional appearance at the same time as an extremely flat configuration of the security element.
-2 161 According to the invention this object is achieved by a security element for a security paper, value document or the like, having a carrier which has an areal region which is divided into a multiplicity of pixels which respectively comprise at least one optically active facet, whereby the majority of the pixels respectively have several of 5 the optically active facets of identical orientation per pixel, and the facets are so oriented that the areal region is perceptible to a viewer as an area that protrudes and/or recedes relative to its actual spatial form. [7] This makes it possible to provide an extremely flat security element, in which e.g. the maximum height of the facets is no greater than 10 im, but which nevertheless 10 produces a very good three-dimensional impression upon viewing. Hence, it is possible to simulate for the viewer an area of strongly bulged appearance by means of a (macroscopically) planar areal region. It is basically possible to produce arbitrarily shaped three-dimensional configurations of the perceptible area in this manner. There can thus be simulated portraits, objects, motifs or other objects of three-dimensional 15 appearance. The three-dimensional impression here is always relative to the actual spatial form of the areal region. Thus, the areal region can be of flat configuration or also of curved configuration itself. However, there is always obtained a three dimensional appearance relative to this base area form, so that to a viewer the areal region then does not appear planar or curved in the same way as the areal region itself. 20 181 The areal region perceptible as a protruding and/or receding area is understood here to mean in particular that the areal region is perceptible as a continuously bulged area, Thus, the areal region can be perceived e.g. as an area with an apparent bulge that deviates from the curvature or actual spatial form of the areal region. With the security element of the invention there can accordingly be imitated e.g. a bulged surface by 25 simulating the corresponding reflection behavior. 191 The areal region is in particular a contiguous areal region. However, the areal region can also have gaps or even comprise non-contiguous partial regions. In this manner the areal region can be interlaced with other security features. The other security features may involve e.g. a true-color hologram, so that a viewer can perceive -3 together the true-color hologram and the protruding and/or receding area provided by the areal region of the invention. [101 The orientation of the facets is chosen in particular such that the areal region is perceptible to a viewer as a non-planar area. 5 [11] The majority of the pixels which respectively have several of the optically active facets of identical orientation per pixel can be 51% of the pixel number. However, it is also possible that the majority is greater than 60%, 70%, 80% or in particular greater than 90% of the pixel number. 1121 Further, it is also possible that all pixels of the areal region respectively have 10 several of the optically active facets of identical orientation. 1131 The optically active facets can be configured as reflective and/or transmissive facets. 1141 The facets can be formed in a surface of the carrier, Further, it is possible that the facets are formed in the upper side as well as in the underside of the carrier and oppose 15 each other. In this case, the facets are preferably configured as transmissive facets with a refractive effect, whereby the carrier itself is of course also transparent or at least translucent. The dimensions and orientations of the facets are then chosen in particular such that an area is perceptible to a viewer such that it protrudes and/or recedes relative to the actual spatial form of the upper side and/or underside of the carrier. 20 1151 The carrier can be configured as a layered composite. In this case, the facets can lie on an interface within the layered composite. Thus, the facets can e.g. be embossed into an embossing lacquer located on a carrier foil, subsequently metallized, and embedded in a further lacquer layer (e.g. protective lacquer or adhesive lacquer). 1161 In particular, in the security element of the invention, the facets can be 25 configured as embedded facets.
-4 1171 In particular, the optically active facets are so configured that the pixels have no optically diffractive effect. 1181 The dimensions of the optically active facets can be between I pm and 300 im, preferably between 3 im and 100 pm and particularly preferably between 5 Rm and 30 5 pm. In particular, a substantially ray-optical reflection behavior or a substantially ray optical refractive effect is preferably present. [19] The dimensions of the pixels are so chosen that the area of the pixels is smaller than the area of the areal region by at least one order of magnitude and preferably by at least two orders of magnitude. The area of the areal region and the area of the pixels 10 are understood here to be in particular the respective area upon projection in the direction of the macroscopic surface normal of the areal region to a plane. 1201 In particular, the dimensions of the pixels can be chosen such that the dimensions of the pixels at least in one direction are smaller than the dimensions of the area of the areal region by at least one order of magnitude and preferably by at least two orders of 15 magnitude. 121] The maximum extension of a pixel is preferably between 5 pm and 5 mm, preferably between 10 jm and 300 pm, particularly preferably between 20 jim and 100 pm. The pixel form and/or the pixel size can vary within the security element, but does not have to. 20 1221 The grating period of the facets per pixel (the facets can form a periodic or aperiodic grating, e.g. a sawtooth grating) is preferably between I pm and 300 jm or between 3 pm and 300 pm, preferably between 3 pm and 100 pm or between 5 pm and 100 jpm, particularly preferably between 5 pm and 30 pm or between 10 pm and 30 pim. The grating period is chosen in particular such that at least two facets of 25 identical orientation are contained per pixel and that diffraction effects practically no longer play a part for incident light (e.g. from the wavelength range of 380 nm to 750 nm). Since no, or no practically relevant, diffraction effects occur, the facets can be referred to as achromatic facets, or the pixels as achromatic pixels, which cause a 5 directionally achromatic reflection. The security element thus has an achromatic reflectivity with regard to the grating structure present through the facets of the pixels. 1231 The facets are preferably configured as substantially planar area elements. The chosen formulation according to which the facets are configured as substantially 5 planar area elements takes account of the fact that, for manufacturing reasons, perfectly planar area elements can normally never be manufactured in practice. 1241 The orientation of the facets is determined in particular by their inclination and/or their azimuth angle. The orientation of the facets can of course also be determined by other parameters. In particular, the parameters in question are two mutually orthogonal 10 parameters, such as e.g. the two components of the normal vector of the respective facet. 1251 On the facets there can be formed at least in certain regions a reflective or reflection-enhancing coating (in particular a metallic or high-refractive coating). The reflective or reflection-enhancing coating can be a metallic coating which is vapor 15 deposited for example, As a coating material there can be employed in particular aluminum, gold, silver, copper, palladium, chromium, nickel and/or tungsten as well as alloys thereof. Alternatively, the reflective or reflection-enhancing coating can be formed by a coating with a material having a high refractive index. 1261 The reflective or reflection-enhancing coating can be configured in particular as a 20 partly transmissive coating. [271 In a further embodiment, there can be formed on the facets at least in certain regions a color-shifting coating. The color-shifting coating can be configured in particular as a thin-film system or thin-film interference coating. There can be realized here e.g. a layer sequence of metal layer - dielectric layer - metal layer or a layer 25 sequence of three dielectric layers, whereby the refractive index of the middle layer is lower than the refractive index of the two other layers. As a dielectric material there can be employed e.g. ZnS, SiO2, TiO 2 /MgF 2
.
-6 1281 The color-shifting coating can also be configured as an interference filter, thin semi-transparent metal layer with selective transmission through plasma resonance effects, nanoparticles, etc. The color-shifting layer can also be realized in particular as a liquid-crystal layer, diffractive relief structure or subwavelength grating. A thin-film 5 system constructed of reflector, dielectric, absorber (formed on the facets in this order) is also possible. [291 The thin-film system plus facet can be configured not only as facet/reflector/dielectric/absorber, as described above, but also as facet/absorber/dielectric/reflector. The order depends in particular on which side the 10 security element is to be viewed from. Further, color-shift effects visible on both sides are also possible when the thin-film system plus facet is configured for example as absorber/dielectric/absorber/facet or absorber/dielectric/reflector/dielectric/absorber/ fa cet. 1301 The color-shifting coating can be configured not only as a thin-film system, but 15 also as a liquid-crystal layer (in particular of cholesteric liquid-crystal material). [31] If a diffusely scattering object is to be simulated, a scattering coating or surface treatment of the facets can be provided. Such a coating or treatment can scatter according to Lambert's cosine law, or there can be a diffuse reflection with an angular distribution deviating from Larnbert's cosine law. In particular, scattering with a 20 pronounced preferential direction is of interest here. [321 Upon the manufacture of the facets by an embossing process, the embossing area of the embossing tool, with which the form of the facets can be embossed into the carrier or into a layer of the carrier, can be provided additionally with a microstructure in order to produce certain effects. For example, the embossing area of the embossing 25 tool can be provided with a rough surface, so that facets with diffuse reflection arise in the end product. 1331 In the security element of the invention, at least two facets can preferably be provided per pixel. There can also be three, four, five or more facets.
-7I 1341 In the security element of the invention, the number of facets per pixel can be chosen in particular such that a maximum predetermined facet height is not exceeded. The maximum facet height can amount to for example 20 gm or also 10 gm. 1351 Further, in the security element of the invention, the grating period of the facets 5 can be chosen to be identical for all pixels. It is also possible, however, that individual or several ones of the pixels have different grating periods. Further, it is possible that the grating period varies within a pixel and is thus not constant. Furthermore, there can also be embossed into the grating period a phase information item which serves for encoding further information items. In particular, there can be provided a verification 10 mask having grating structures which have the same periods and azimuth angles as the facets in the security element of the invention. In a partial region of the verification mask the gratings can have the same phase parameter as the security element to be verified, and in other regions a certain phase difference. When the verification mask is placed over the security element, the different regions will then appear with varying 15 lightness or darkness on account of the moire effect. In particular, the verification mask can be provided on the same object to be protected as the security element of the invention. [361 In the security element of the invention, the areal region can be configured such that it is perceptible to a viewer as an imaginary area. This is understood to mean in 20 particular that the security element of the invention shows a reflection behavior that cannot be produced with a real macroscopically bulged surface. In particular, the imaginary area can be perceptible as a rotating mirror which rotates the visible mirror image eg. by 90*. [371 Such an imaginary area and in particular such a rotating mirror is very easy for a 25 viewer to detect and to verify. 1381 In principle, any real bulged reflective or transmissive surface can be modified to an imaginary area by means of the areal region of the security element of the invention. This can be realized e.g. by the azimuth angles of all facets being changed, -8 for example rotated by a certain angle. This makes it possible to achieve interesting effects. For example, if all azimuth angles are rotated to the right by 45', the areal region is a bulged area apparently illuminated from the top right for a viewer, when illuminated directly from above, If all azimuth angles are rotated by 900, the light 5 reflexes move upon tilting in a direction perpendicular to the direction that a viewer would expect. This unnatural reflection behavior then for example also makes it no longer possible for a viewer to decide whether the area perceptible as bulged is present toward the front or toward the back (relative to the areal region). [39] Further, diffraction effects can be suppressed in targeted fashion by an aperiodic 10 grating or the introduction of random phase parameters. [401] Also, it is possible to provide the orientations of the facets with "noise" (i.e. change them slightly relative to the optimal form for the area to be simulated), in order to simulate for example surfaces of matt appearance. Thus, the areal region not only seems to be protruding and/or receding relative to its actual spatial form, but can also 15 be given an exactly registered positioned texture. [41] Furthermore, the carrier can have, besides the areal region, a further areal region which is preferably interlaced with the one areal region and in particular configured as a further security feature. Such a configuration can be referred to e.g. as interlacing or as a multi-channel image. The further areal region can be divided, in the same way as 20 the one areal region, into a multiplicity of pixels which respectively comprise at least one optically active facet, whereby the majority of the pixels preferably respectively have several of the optically active facets of identical orientation per pixel, and the facets are so oriented that the further areal region is perceptible to a viewer as an area that is bulged or protrudes and/or recedes relative to its actual spatial form, This makes 25 it possible to realize e.g. two different three-dimensional representations. 1421 By means of the interlacing, the one areal region can be superimposed e.g. with additional exactly registered color information or gray scale information (combination -9 for example with true-color hologram or halftone image e.g. on the basis of sub wavelength gratings). [431 Furthermore, there can be hidden or stored in the arrangement of the facets a phase information item as a further security element. 5 [441 In the security element of the invention, at least one facet can have on its surface a light-scattering microstructure. Several or also all facets can of course also have such a light-scattering microstructure on the facet surface. 1451 For example, the light-scattering microstructure can be configured as a coating. In particular, it is possible to embed the facets and to employ as an embedding material 10 one with which the desired light-scattering microstructure can be realized. 1461 With such a configuration, scattering objects, such as e.g. a marble figure, a gypsum model, etc., can be simulated with the security element of the invention. [47] The facets can of course also be embedded in a colored material, in order to additionally realize a color effect or simulate a colored object. 15 [481 In the security element of the invention, the orientations of several facets can be so changed relative to the orientations for producing the protruding and/or receding area that the protruding and/or receding area is still perceptible, but with a surface of matt appearance. Thus, the protruding and/or receding area can also be presented with a matt surface appearance. 20 1491 The invention also comprises a method for manufacturing a security element for security papers, value documents or the like, wherein the surface of a carrier is so height-modulated in an area region that the areal region is divided into a multiplicity of pixels respectively having at least one optically active facet, whereby the majority of the pixels respectively have several optically active facets of identical orientation 25 per pixel, and the facets are so oriented that the areal region is perceptible to a viewer of the manufactured security element as an area that protrudes and/or recedes relative to its actual spatial form.
- 10 [50] The manufacturing method of the invention can be developed in particular such that the security element of the invention as well as the developments of the security element of the invention can be manufactured. [511 The manufacturing method can further contain the step of computing the pixels 5 starting out from a surface to be simulated. In this computing step the facets (their dimensions as well as their orientations) are computed for all pixels. On the basis of these data the height modulation of the area region can then be carried out. [52] In the manufacturing method of the invention, the step of coating the facets can further be provided. The facets can be provided with a reflective or reflection 10 enhancing coating. The reflective or reflection-enhancing coating can be a complete mirror coating or also a partly transparent mirror coating. [53] For producing the height-modulated surface of the carrier there can be employed known microstructuring methods, such as e.g. embossing methods. Thus, for example also using methods known from semiconductor fabrication (photolithography, electron 15 beam lithography, laser beam lithography, etc.) suitable structures in resist materials can be exposed, possibly refined, molded, and employed for fabricating embossing tools. There can be used known methods for embossing in thermoplastic foils or into foils coated with radiation-curing lacquers. The carrier can have several layers which are applied successively and optionally structured, and/or it can be assembled from 20 several parts. [54] The security element can be configured in particular as a security thread, tear thread, security band, security strip, patch or as a label for application to a security paper, value document or the like. In particular, the security element can span transparent or at least translucent regions or recesses. 25 [551 The term security paper is understood here to be in particular the not yet circulable precursor to a value document, which can have, besides the security element of the invention, for example also further authentication features (such as e.g. luminescent substances provided within the volume), Value documents are understood here to be, on the one hand, documents manufactured from security papers. On the other hand, value documents can also be other documents and objects that can be provided with the security element of the invention in order for the value documents to have uncopiable authentication features, thereby making it possible to check 5 authenticity and at the same time preventing unwanted copying. 156] There is further provided an embossing tool having an embossing area with which the form of the facets of a security element of the invention (including its developments) can be embossed into the carrier or into a layer of the carrier. 1571 The embossing area preferably has the inverted form of the surface contour to be 10 embossed, whereby this inverted form is advantageously produced by the formation of corresponding depressions. 1581 Further, the security element of the invention can be used as a master for exposing volume holograms or for purely decorative purposes. 1591 To expose the volume hologram, a photosensitive layer in which the volume 15 hologram is to be formed can be brought, directly or through the intermediary of a transparent optical medium, in contact with the front side of the master and thus with the front side of the security element. [601 Then the photosensitive layer and the master are exposed with a coherent light beam, thereby causing the volume hologram to be written into the photosensitive layer. 20 The procedure can be identical or similar to the procedure for producing a volume hologram as described in DE 10 1006 016 139 Al. The basic procedure is described for example in paragraphs nos. 70 to 79 on pages 7 and 8 of the stated print in connection with Figures la, ib, 2a and 2b. There is hereby incorporated into the present application the total content of DE 10 2006 016 139 Al with regard to the 25 manufacture of volume holograms.
-12 [61] It is evident that the features mentioned hereinabove and those to be explained hereinafter are usable not only in the stated combinations, but also in other combinations or in isolation, without going beyond the scope of the present invention. 1621 Hereinafter the invention will be explained more closely by way of example with 5 reference to the attached drawings, which also disclose features essential to the invention. For more clarity, the figures do without a representation that is true to scale and to proportion. There are shown: Figure 1 a plan view of a bank note having a security element I according to the invention; 10 Figure 2 an enlarged plan view of a part of the area 3 of the security element 1; Figure 3 a cross-sectional view along the line 6 in Figure 2; Figure 4 a schematic perspective representation of the pixel 47 of Figure 2; Figure 5 a sectional view of a further embodiment of some facets of the security element 1; 15 Figure 6 a sectional view of a further embodiment of some facets of the security element 1; Figure 7 a sectional view for explaining the computing of the facets; Figure 8 a plan view for explaining a square grid for computing the pixels; Figure 9 a plan view for explaining a 60 grid for computing the pixels; 20 Figure 10 a plan view of three pixels 4 of the area 3; Figure I1 a cross-sectional view of the representation of Figure 10; Figure 12 a plan view of three pixels 4 of the area 3; Figure 13 a cross-sectional view of the plan view of Figure 12; - 13 Figure 14 a plan view of three pixels 4 of the area 3; Figure 15 a sectional view of the plan view of Figure 14; Figure 16 a plan view for explaining the computing of the pixels according to a further embodiment; 5 Figure 17 a sectional view of the arrangement of the facets of the pixels on a cylindrical base area; Figure 18 a sectional view for explaining the production of the pixels for the application according to Figure 17; Figures 19 - 21 representations for explaining the angles in reflective and transmissive 10 facets; Figure 22 a sectional view of a reflective surface to be simulated; Figure 23 a sectional view of a lens 22 simulating the surface according to Figure 22; Figure 24 a sectional view of the transmissive facets for simulating the lens 15 according to Figure 23; Figure 25 a sectional view of a reflective surface to be simulated; Figure 26 a sectional view of a lens 22 simulating the surface according to Figure 25; Figure 27 a sectional view of the corresponding transmissive facets for 20 simulating the lens according to Figure 24; Figure 28 a sectional view of an embodiment in which transmissive facets are formed on both sides of the carrier 8; Figure 29 a sectional view according to a further embodiment in which transmissive facets are formed on both sides of the carrier 8; - 14 Figure 30 a representation for explaining the angles in the embodiment in which transmissive facets are formed on both sides of the carrier 8; Figure 31 a schematic sectional view of an embossing tool for manufacturing the security element of the invention according to Figure 5. 5 Figs. 32a-32c representations for explaining embedded facets, whereby the facets are configured as reflective facets; Figs. 33a + 33b representations for explaining embedded facets, whereby the facets are configured as transmissive facets; Figure 34 a representation for explaining embedded scattering facets, and 10 Figure 35 a representation for explaining embedded matt shining facets. [631 In the embodiment shown in Figure 1, the security element I of the invention is integrated in a bank note 2 such that the security element I is visible from the front side of the bank note 2 shown in Figure 1. 1641 The security element I is configured as a reflective security element I with a 15 rectangular outside contour, whereby the area 3 limited by the rectangular outside contour is divided into a multiplicity of reflective pixels 4 of which a small portion is represented enlarged in Figure 2 as a plan view. 1651 The pixels 4 here are square and have an edge length in the range of 10 to several 100 pim. Preferably, the edge length is no greater than 300 rim. In particular, it can be 20 in the range between 20 and 100 l.xm. [661 The edge length of the pixels 4 is chosen in particular such that the area of each pixel 4 is smaller than the area 3 by at least one order of magnitude, preferably by two orders of magnitude.
- 15 1671 The majority of the pixels 4 respectively have several reflective facets 5 of identical orientation, whereby the facets 5 are the optically active areas of a reflective sawtooth grating. [68] In Figure 3 there is represented the sectional view along the line 6 for six 5 neighboring pixels 4 , 42, 43, 44, 45 and 46, whereby the representation in Figure 3, as also in the other figures, is partly not true to scale for the sake of better representability. Further, the reflective coating on the facets 5 is not shown in Figures I to 3 or in Figure 4 for simplifying the representation. 1691 The sawtooth grating of the pixels 4 is formed here in a surface 7 of a carrier 8, 10 whereby the thus structured surface 7 is preferably coated with a reflective coating (not shown in Figure 3). The carrier 8 may be for example a radiation-curing plastic (UV resin) which is applied to a carrier foil (for example a PET foil) not shown. [701 As to be seen in Figure 3, the pixels 4 , 42, 44, 45 and 46 respectively have three facets 5 whose orientation is respectively identical per pixel 4, 42, 44, 45 and 46. The 15 sawtooth grating and thus also the facets 5 of these pixels are identical here except for their different inclination a, a4 (for simplifying the representation, only the angles of inclination a, and C4 of one respective facet 5 of the pixels 41 and 44 are drawn in). The pixel 43 has only a single facet 5 here. [711 Regarded in plan view (Figure 2), the facets 5 of the pixels 41 - 46 are strip 20 shaped mirror surfaces which are aligned mutually parallel, The orientation of the facets 5 is chosen here such that the area 3 is perceptible to a viewer as an area that protrudes and/or recedes relative to its actual (macroscopic) spatial form, which is the form of a planar area here. A viewer perceives here the surface 9 represented in cross section in Figure 3 when he looks at the facets 5. This is attained by choosing the 25 orientations of the facets 5, which reflect the incident light Ll as if it were falling on an area according to the spatial form indicated by line 9 in Figure 3, as represented schematically by the incident light L2. The reflection produced by the facets 5 of a - 16 pixel 4 corresponds to the average reflection of the region of the surface 9 that is converted or simulated by the corresponding pixel 4. [721 In the security element I of the invention, a height profile of three-dimensional appearance is thus simulated by a, here gridded, arrangement of reflective sawtooth 5 structures (facets 5 per pixel 4) which imitate the reflection behavior of the height profile. With the area 3 there can thus be produced arbitrary three-dimensionally perceptible motifs, such as e.g. a person, parts of a person, a number or other objects. 1731 Besides the slope 5 of the individual facets 5, the azimuth angle a of the simulated surface is also to be adjusted. For the pixels 41 - 46 the azimuth angle ai 10 relative to the direction according to the arrow P1 (Figure 2) amounts to 0*, For the pixel 47 the azimuth angle a amounts to for example approx. 1700. The sawtooth grating of the pixel 47 is shown schematically in a three-dimensional representation in Figure 4, [741 For manufacturing the security element 1, the reflective sawtooth structures can 15 be written into a photoresist for example by means of gray scale lithography, subsequently developed, electroformed, embossed into UV lacquer (carrier) and mirror-coated. The mirror coating can be realized for example by means of an applied metal layer (for example vapor-deposited). Typically, there is applied an aluminum layer with a thickness of e.g. 50 nm. There can of course also be employed other 20 metals, such as e.g. silver, copper, chromium, iron, etc., or alloys thereof. Alternatively to metals, there can also be applied high-refractive coatings, for example ZnS or TiO 2 . The vapor deposition can be over the full area. It is also possible, however, to carry out a coating that is only in certain regions or grid-shaped, so that the security element 1 is partly transparent or translucent. 25 [751 The period A of the facets 5 is, in the simplest case, identical for all pixels 4. It is also possible, however, to vary the period A of the facets 5 per pixel 4. Thus, e.g. the pixel 47 has a smaller period A than the pixels 41 - 46 (Figure 2). In particular, the period A of the facets 5 can be chosen randomly for each pixel. By varying the choice - 17 of the period A of the sawtooth gratings for the facets 5 it is possible to minimize a possibly existing visibility of a diffraction image arising from the sawtooth gratings. [76] Within a pixel 4 a fixed period A is provided. However, it is basically also possible to vary the period A within a pixel 4, so that aperiodic sawtooth gratings per 5 pixel 4 are present. [77] For avoiding unwanted diffraction effects, on the one hand, and for minimizing the necessary foil thickness (thickness of the carrier 8), on the other hand, the period A of the facets 5 is preferably between 3 gm and 300 gin. In particular, the spacing is between 5 pm and 100 gm, whereby particularly preferably a spacing between 10 gm 10 and 30 gm is chosen. [78] In the embodiment example described here, the pixels 4 are square. It is also possible, however, to configure the pixels 4 to be rectangular. Other pixel forms can also be used, such as e.g. a parallelogrammatic or hexagonal pixel form. The pixels 4 here preferably have dimensions that are greater than the spacing of the facets 5, on the 15 one hand, and are so small that the individual pixels 4 do not disturbingly strike the unarmed eye, on the other hand. The size range resulting from these requirements is between about 10 and a few 100 pn. [79] Slopes a and azimuth angles a of the facets 5 within a pixel 4 then result from the slope of the simulated height profile 9. 20 1801 Besides the slope a and the azimuth angle a, a phase parame t er p: can further be introduced optionally for each pixel 4. The surface relief of the security element I can then be described in the i-th pixel 4; by the following height function hi (x,y): h,(x,y) = A,['(-x-sina, +y cosa, + p9 mod A] [81] Here, Ai is the amplitude of the sawtooth grating, ai the azimuth angle, and A; the 25 grating period. "mod" stands for the modulo operation and yields the positive remainder upon division. The amplitude factor A: results from the slope of the simulated surface profile 9.
- 18 [82] By changing the phase parameter pi, the sawtooth gratings or the facets 5 of different pixels 4 can be shifted relative to each other. For the parameters pi, random values or other values varying per pixel 4 can be used. There can thus be eliminated a possibly visible diffraction pattern of the sawtooth grating (of the facets 5 per pixel 4) 5 or of the grid grating of the pixels 4, which can otherwise cause unwanted color effects. Further, due to the varied phase parameters pi there are also no special directions in which the sawtooth gratings of neighboring pixels 4 match each other particularly well or particularly poorly, which prevents a visible anisotropy. 1831 In the security element I of the invention, the azimuth angle a as well as the 10 slopes ; of the facets 5 per pixel 4 can be chosen such that they do not correspond to the simulated surface 9 as well as possible, but rather deviate therefrom somewhat. For this purpose, a (preferably random) component can be added for each pixel 4 to the optimal value for simulating the surface 9 in accordance with a suitable distribution. Depending on the size of the pixel 4 and the strength of the noise (standard deviation 15 of the distribution), different interesting effects can thus be achieved. In the case of very fine pixels 4 (about 20 m), the otherwise shiny surface appears increasingly matt with increasing noise. In the case of larger pixels (about 50 pm), one obtains an appearance comparable to a metallic lacquering. In the case of very large pixels (several 100 pm), the individual pixels 4 are resolved by the unarmed eye. They then 20 appear as coarse but smooth portions which light up brightly at different viewing angles. 1841 The strength of the noise can be chosen differently for different pixels 4, through which causes the surface of bulged appearance can seem to vary in smoothness or mattress in different places. There can thus be produced for example the effect that the 25 viewer perceives the area 3 as a smooth protruding and/or receding area having a matt inscription or texture. [851 Further, it is possible to apply a color-shifting coating, in particular a thin-film system, to the facets 5. The thin-film system can have for example a first, a second and a third dielectric layer which are formed one on the other, whereby the first and third - 19 layers have a higher refractive index than the second layer. Due to the different inclinations of the facets 5, different colors are perceptible to a viewer without the security element I having to be rotated, The perceptible area thus has a certain color spectrum. 5 1861 The security element I can be configured in particular as a multi-channel image which has different, mutually interlaced partial areas, whereby at least one of the partial areas is configured in the manner according to the invention, so that this partial area is perceptible to the viewer as a three-dimensional partial area. The other partial areas can of course also be configured in the described way by means of pixels 4 with 10 at least one facet 5. The other partial areas can also, but do not have to, be perceptible as an area protruding and/or receding relative to the actual spatial form. The interlacing can be for example of checkered, or also strip-like configuration. Interesting effects are achievable through the interlacing of several partial areas. When e.g. the simulation of a spherical surface is interlaced with the representation of a 15 number, this can be carried out such that for the viewer the impression arises of the number being located in the interior of a glass ball with a semi-mirroring surface. 1871 Besides the above-described employment of color-shifting coatings, it is further possible to provide the security element I of the invention additionally with color information. Thus, ink can e.g. be printed on the facets 5 (either transparent or thin) or 20 be provided below an at least partly transparent or translucent sawtooth structure. For example, there can thereby be carried out a decoloration of a motif represented by means of the pixels 4. When e.g. a portrait is simulated, the ink layer can provide the facial color. 1881 A combination with a true-color hologram or Kinegram, in particular the 25 interlacing with a true-color hologram which shows a colored representation of the surface 9 simulated with the pixels 4, is also possible. Thus, the basically achromatic three-dimensional image of an object will appear colored at certain angles.
-20 1891 Further, a combination with a subwavelength grating is possible. In particular, the interlaced representation of the same motif by both technologies is advantageous, whereby the three-dimensional effect of the sawtooth structures is combined with the color information of the subwavelength gratings. 5 [901 The surface 9 simulated with the pixels 4 may be in particular a so-called imaginary area. This is understood here to be the formation of a reflection behavior or transmission behavior that cannot be produced with a real bulged reflective or transmissive surface. [911 For further explaining the concept of the imaginary area, a mathematical criterion 10 for delimitation from real areas will hereinafter be introduced and explained by the example of a rotating mirror. 1921 Upon the simulation of a real bulged surface, the latter is describable by a height function h(xy). It can be assumed here that the function h(x,y) is differentiable (non differentiable functions could be approximated by differentiable functions that would 15 ultimately produce the same effect for the observer). If one now integrates the gradient of h(x,y) along an arbitrarily closed curve C, the integral will disappear: ,Vh(x,y)di = 0 [931 In figurative terms, this means that one walks the same height differences up as down along a closed path and lands at the same height again at the end. The sum of the 20 height differences overcome on this path must thus be zero. 1941 In the security element I of the invention, slope and azimuth of the facets 5 correspond to the gradient of the height function. There can now be constructed cases where slope and azimuth of the facets 5 run into each other practically continuously, but no height function can be found with which the above integral disappears. In this 25 case, the simulation of an imaginary area is to be spoken of.
-21 [95] A special embodiment is e.g. a rotating mirror. In this connection, we will first consider the simulation of a real convex mirror with a parabolic profile. The height function is given by h(x,y) =-c(x 2 y') 5 where c > 0 is a constant and determines the curvature of the mirror. In such a mirror the viewer can see an upright reduced mirror image of himself. The parameters of the sawtooth structures are then given by a (x, y) = arctan(x, y) and 10 A(x,y) = 2c(x +y2) [961 If one now adds to the azimuth angle a a constant angle 6, the mirror image will be rotated by precisely this angle. Provided that 8 does not involve integral multiples of 1804, an imaginary surface will thus arise. If one chooses for example 6 = 90', the mirror image will be rotated by 90* and a mirror image obtained that cannot be 15 achieved with a smooth bulged real surface. If one equates the gradient of h1 to the slope of the sawtooth structures, one can now find closed curves where the above integral does not disappear. For example, a curve K along a circle around the center with radius R > 0 yields SVh(xy)sd = f2c ds = 4;rcR * 0 20 [971 In figurative terms, this rotating mirror thus simulates a surface where one walks continuously uphill along a circle, but lands at the end at the same height at which one started. Such a real surface can obviously not exist. [981 With the hitherto described security elements I it was assumed that the area is configured as a reflective area. However, the same effects of the three-dimensional 25 impression are substantially also achievable in transmission when the sawtooth -22 structures or the pixels 4 with the facets 5 (including the carrier 8) are at least partly transparent. Preferably, the sawtooth structures lie between two layers with different refractive indices. In this case, the security element I then appears to the viewer like a glass body with a bulged surface. 5 [991 The described advantageous embodiments can also be applied for the transmissive configuration of the security element 1. Thus, for example the rotating mirror of an imaginary area can rotate the image in transmission. [100]The transmissive configuration of the security element will be described in more detail hereinafter in connection with Figures 19 to 29. 10 [101IThe forgery resistance of the security element I of the invention can be increased by further features only visible with aids, which can also be referred to as hidden features. [102]Thus, additional information can e.g. be encoded in the phase parameters of the individual pixels 4. In particular, there can be produced a verification mask with 15 grating structures which have the same periods and azimuth angles as the security element 1 of the invention. In a partial region of the area, the gratings of the verification mask can have the same phase parameter as the security element to be verified, and in other regions a certain phase difference. These different regions will then appear to vary in lightness or darkness through moire effects when the security 20 element I and the verification mask are placed one over the other. [103]1n particular, the verification mask can also be provided in the bank note 2 or the other element provided with the security element 1. [104]The pixels 4 can also have other outlines, besides the described outline forms. These outlines can then be recognized with a magnifying glass or a microscope. 25 [1051Further, an arbitrary other structure can also be embossed or written in a small portion of the pixels 4, instead of the corresponding sawteeth or facets 5, without this striking the unarmed eye. In this case, these pixels are not part of the area 3, so that an -23 interlacing of the area 3 with the differently configured pixels is present. These differently configured pixels can be for example every 100th pixel in comparison to the pixels 4 of the area 3. There can be incorporated into these pixels a microprint or a logo, for example letters that are 10 prn big in a pixel that is 40 pm big. 5 11061In the hitherto described embodiment examples, the facets are so formed in the surface 7 of the carrier 8 that the lowest points or the minimum height values of all facets 5 (Figure 3) lie in a plane. It is also possible, however, to form the facets 5 such that the averages of the heights of all facets 5 are at the same height, as represented schematically in Figure 5. Further, it is possible to configure the facets 5 such that the 10 peak values or the maximum height values of all facets 5 of the pixels 4 are at the same height, as indicated schematically in Figure 6. 11071In Figure 7 there is shown a sectional representation in the same way as in Figure 3, but with a mirror surface 10 drawn in for the pixel 44, which simulates the surface 9 in the region of the pixel 44. At a pixel size of for example 20 pm to 100 'm, such a 15 mirror surface 10 would result in undesirably great heights d being present. At a mirror inclination of 45*, the corresponding mirror surface 10 would protrude out of the x-y plane by 20 pum to 100 jim. However, maximum heights d of 10 gm are preferably desired. Hence, the mirror surface 10 is subjected to a modulo d operation, so that the facets 5 drawn in Figure 7 are formed, whereby the normal vectors n of the facets 5 20 correspond to the normal vector n of the mirror surface 10. [108]The surface 9 to be simulated can be present for example as a set of xy values with respectively associated height h in the z direction (3D bitmap). Using such a 3D bitmap, a defined square grid or 60* grid (Figures 8, 9) can be constructed in the x-y plane. The grid points are connected so as to result in an area coverage in the x-y plane 25 with triangular tiles, as represented schematically in Figures 8 and 9. At the three comer points of each tile the h values are taken from the 3D bitmap. The smallest of these h values is subtracted from the h values of the three comer points of the tiles. With these new h values at the corner points there is constructed a sawtooth area comprising slanted triangles (triangular plane elements). The plane elements -24 protruding too far out of the x-y plane are replaced by the facets 5. This provides the area description for the facets 5 so that the security element I of the invention can be manufactured. [109]The surface 9 to be simulated can be given by a mathematical formula f(x,y,z) 5 h(x,y) - z = 0. The facets 5 or their orientations are obtained from tangent planes of the surface 9 to be simulated. These can be ascertained from the mathematical derivation of the function f(x,y,z). The facet 5 attached at a point xO, yo is described by the normal vector: n (rO,yO,zO) =n= n (x 0 ,yo,z) /i ((xo,yo,zo)) ((,(xn,yo,z)2+( (x,y,z) (xY 0 , Z)) 10 [110]The azimuth angle a of the tangent plane is arctan (ny/n) and the slope angle a of the tangent plane is arecos nz. The area f(xy,z) can be curved arbitrarily and (xo,yo),zo) is the point on the area for which point the computing is being carried out. The computing is carried out successively for all points selected for the sawtooth structure, [111IRegions are respectively cut out of the slanted planes with the thus computed 15 normal vectors which are to be attached at the selected points in the x-y plane, so that overlaps of the associated elements are avoided in the case of neighboring x-y points. The slanted plane elements protruding too far out of the x-y plane are divided into smaller facets 5. as was described in connection with Figure 7. [112]The surface to be simulated can be described by triangular area elements, 20 whereby the planar triangular elements are spanned between selected points which lie within and on the edge of the surface to be simulated. The triangles can be described as plane elements by the following mathematical function f(x,y,z) ~25 x -xI y-y, z-z, f(x,y,z) x 2 -x Y2 -Y z 2 -z, =0, xI -x y 3 - y, z'- z1 where x:, y;, z; are the triangular corner points. 5 [1113]1n this case, the area can be projected into the x-y plane and the individual triangles slanted according to their normal vector. The slanted plane elements form the facets, and are subdivided into smaller facets 5 if they protrude too far out of the x-y plane, as was described in connection with Figure 7. 11141 When the surface to be simulated is given by triangular area elements, one can 10 also proceed as follows. The total surface to be simulated is subjected all at once (or cells of each surface) to a Fresnel construction modulo d (or modulo di). Since the surface to be simulated consists of plane elements, triangles which are filled with the facets 5 automatically arise on the x-y plane. [115]The construction of the facets can also be carried out as follows. In the x-y plane 15 above which the surface 9 to be simulated is defined, suitable x-y points are chosen and connected so as to yield an area coverage of the x-y plane with polygonal tiles. Above an arbitrarily chosen point (e.g. a corner point) in each tile, the normal vector is determined from the surface 9 thereabove to be simulated. In each tile there is now attached a Fresnel mirror (pixel 4 with several facets 5) corresponding to the normal 20 vector. [116]Preferably, square tiles or pixels 4 are applied. However, arbitrary (irregular) tilings are possible in principle. The tiles can adjoin each other (which is preferred because of the greater efficiency) or there can be joints between the tiles (for example in the case of circular tiles). 25 [117]The slope angle a of the plane can be represented as follows 26 af a= arccos nz arcos 1118]The azimuth angle a of the slope can be represented as follows af 5 c = arctan (ny/ n ) arctan a ax where a = 0 to 180' for n, > 0 and a = 180 to 360 for ny < 0. [11.9]Determining the facets 5 including their orientations in accordance with the invention can be carried out in two basically different ways. Thus, the x-y plane can be 10 subdivided into pixels 4 (or tiles) and for each pixel 4 the normal vector is determined for the reflective planar area which is then converted to several facets 5 of identical orientation. Alternatively, it is possible to approximate the surface 9 to be simulated by plane elements, if it is not already given by plane elements, and then to subdivide the plane elements into the individual facets 5. 15 [120]1n the first procedure, a tiling in the x-y plane is thus first determined. The tiling can be laid out absolutely arbitrarily, It is also possible, however, that the tiling consists only of identical squares with the side length a, where a is preferably in the range of 10 to 100 pm. The tiling can, however, also consist of different formed tiles which fit together precisely or with which there are joints. The tiles can be formed 20 differently and contain an encoding or an concealed information item. In particular, the tiles can be adjusted to the projection of the surface to be simulated into the x-y plane.
-27 [1211A reference point is then defined in arbitrary fashion in each tile. The normal vectors at the points of the surface to be simulated that lie perpendicularly above the reference points in the tiles are associated with the corresponding tiles. If, in the surface to be simulated lying above the reference point, several normal vectors are 5 associated with the reference point (e.g. at an edge or corner where several area elements abut), an averaged normal vector can be determined from these normal vectors. [122]A subdivision is defined in each tile in the x-y plane. This subdivision can be arbitrary. From the normal vector the azimuth angle a and the slope angle a are then 10 computed. Optionally, an offset system can also be defined, which assigns an offset (height value) to each facet 5. The offset can be arbitrary in each region of the subdivision, It is also possible, however, to apply the offset such that the averages of the facets 5 are all at the same height or that the maximum values of all facets 5 are at the same height. 15 [1231In the subdivisions in the associated tiles there are then attached computationally, as facets 5, slanted plane elements with the normal vector associated with the tile, with consideration of the offset system. The thus computed surface form is then formed in the surface 7 of the carrier 8. [124] However, there can not only be defined an arbitrary subdivision in each tile in the 20 x-y plane. Thus, there can also be defined, for example, grating lines which are approximately or precisely perpendicular to the projection of the normal vector into the x-y plane. The grating lines can have arbitrary spacings. It is also possible, however, that the spacings of the grating lines follow a certain pattern. Thus, grating lines can be provided for example not precisely parallel to each other, in order to avoid 25 interference for example. It is also possible, however, that the grating lines are parallel to each other but have different spacings. The different spacings of the grating lines can comprise an encoding. Further, it is possible that the grating lines of all facets 5 have equal spacings in each pixel 4. The spacing can be in the range of 1 pm to 20 pm.
-28 [125]The grating lines can also have equal spacings within each tile or within each pixel 4, but vary per pixel 4. The grating line spacing Ai and the slope angle ai of the associated facet 5 determine the structure thickness di = Ai tan ai, whereby di preferably amounts to I to 10 pm. 5 [126]The facets 5 can also all possess the same height d. The grating constant is then determined in a region-based manner by the slope angle ai of the associated facet i: Ai = d/tan a,. [127]From the normal vector the azimuth angle a and the slope angle a are then determined again. The sawtooth grating defined by grating lines, azimuth angle and 10 slope angle is attached computationally in the associated tile with consideration of the offset system. [128]One can also start out from a surface 9 to be simulated that is constructed from plane elements i (or that is so processed that it constructs itself from plane elements i), whereby the structure depth of the surface to be simulated and the dimensions of the 15 plane elements are considerably greater than di. [129]For example, the plane elements i are respectively given by three corner points Xl:- yli, Zhi; x2b, Y2i Z2i; x.3h y3i, z4i [130IThe relief comprising plane elements is represented by z = f(xy), where ( ) y -z - x X' Z 2 x z -zl 20 ( - z) =0 ) I I ) x 3 , -x, y1 -y [131]This yields, solved for z, - 29 z = z ±__________ x -xx y -y 'i~ ~ ~ ~~. Y32 21 X~ J YI 2 ' (- X 1 Y, - Y [132]The sought sawtooth area whose structure thickness in the regions i is smaller than di results from z modulo di, where z is computed from the above formula and 5 where the x and y values upon computing respectively lie within the triangle given by x a, yl; x 2 N, y21; xsi, y 3 i in the x-y plane. 11331The thus computed sawtooth area is automatically composed of the facets 5. There result as grating constants Ai in the regions i Ai = di/tan oj 10 [13411f an everywhere equal grating constant A is desired, the following di are to be inserted di= A tan ai where o; is the slope angle of the triangle given by x 1 j, yii, zH; x 21 , Y2:, z 2 i; x 3 i, y3i, z. [135IThe following alternative procedure is possible. In the following formula A a 15 surface 9 to be simulated lying above the x-y plane is described by triangular plane elements x 2 - xe zI - ) y. -y1 z -z' x xe t z -zi ' 'y Y 1 * z3 z z=z z
(A)
-30 [136]The plane elements i are respectively given by three corner points Xui, Yh, zH; x 2 i, Y2i, Z2i; X3i, Y3:, Zli. [137]The corner points are so numbered that zh is the smallest value among the three values zj, zzj, z 3 i (Zh = min (z 1 , z 2 , z 3 i)). 5 f138jThe following formula B represents a sawtooth area that simulates the three dimensional impression of the surface 9 to be simulated given by the formula A (Y ) xJ -X zu -j z yoi -y z - J 72i Z I y y - - x )I, ~ z Z- y -y- z -z x2-x ys- y I X. X:
Y
3 (B) 1139]As one can see, the sawtooth area according to formula B differs from the area to 10 be simulated according to formula A in that the minimum value zH in the region i is respectively subtracted from the value z. The sawtooth area according to formula B consists of slanted triangles attached to the x-y plane. [140] When a maximum thickness di for the structure depth is predetermined, it may be that the maximum thickness is exceeded in the sawtooth area according to formula B. 15 This can be remedied by the formation of the individual facets with an identical normal vector according to z modulo di, where z is computed from the above formula B and the x and y values upon computing lie respectively within the triangle given by xh, y 1 i; x 2 i, y 2 j; x3i, y 3 ; in the x-y plane. [141]The thus computed sawtooth area is composed of the triangular regions which 20 are filled with the facets 5, whereby the grating constants A in the regions i result as Ai = d;/tan a;. The angle (i is the slope angle of the triangle given by x 1 j, yaj, zn; x 2 i, Y2i, Z2i; X 3 1, y 3 i, Z 3
;
- 31 1142]The procedures shown here for surfaces to be simulated which are described by triangles and which are converted according to the invention into pixels 4 with several facets 5 are to be understood as examples. In general, one proceeds as follows according to the invention in the case of surfaces to be simulated which are described 5 by plane elements. The plane elements are subdivided into cells. Upon the subdivisions a value (for example the minimum value of z in the cell) is subtracted. There is thus obtained according to the invention a sawtooth grating which is flatter than the surface 9 to be simulated and which in region-based fashion has respectively identical normal vectors in the cells. 10 [143]This sawtooth grating imitates the original surface 9 to be simulated including its three-dimensional impression. This sawtooth grating is flatter than a sawtooth grating created by the same procedure without the subdivision of the pixels 4 into several facets 5 according to the invention. [14411n Figure 10 there is shown a plan view of three pixels 4 of the area 3 according 15 to a further embodiment, whereby the pixels 4 are configured irregularly (continuous lines) with an irregular subdivision or facets 5 (dashed lines). The pixel edges and the subdivisions are straight lines here, but they can also be curved. 114511n Figure I I there is shown the corresponding cross-sectional view, whereby the normal vectors of the facets 5 are drawn in schematically. Per pixel 4 the normal 20 vectors of all facets 5 are identical, while they differ from pixel 4 to pixel 4. The normal vectors are slanted in space and generally not in the drawing plane, as represented in Figure 1 1 for simplicity's sake. [14611n Figure 12 there is shown a plan view with the same division of the pixels 4 as in Figure 11, but whereby the subdivision (facets 5) per pixel 4 is different. In the 25 shown embodiment example the grating period A of the facets 5 is constant in each pixel 4, but different from pixel 4 to pixel 4. [t47]Figure 13 shows the corresponding cross-sectional view.
_32 [14811n Figure 14 there is shown a further modification, whereby the pixel form is the same as in Figure 10. However, the subdivision per pixel 4 is encoded, Every second grating line spacing is twice as large as the preceding grating line spacing. In Figure 15 the corresponding cross-sectional view is represented. 5 114911f the surface to be simulated is given as a height-line image, the normal vectors can be determined as follows. Discrete points are chosen on the height lines 15 (Figure 16 shows a schematic plan view) and these points are connected such that a triangular tiling arises. The computing of the normal vector for the triangles is effected in the way described hereinabove. 10 [150]1n the previous embodiments the normal vector was always computed relative to the x-y plane. It is also possible, however, to compute the normal vector in relation to a curved base area, such as e.g. a cylindrical surface. In this case, the security element can be provided on a bottle label (for example on the bottleneck) such that the simulated surface can then be perceived three-dimensionally by a viewer undistorted. 15 For this purpose, the normal vector n relative to the cylindrical surface need only be converted to the normal vector ntran, relative to a plane, so that the above-described manufacturing methods can be used. When the security element of the invention is then applied as a bottle label to the bottleneck (with the cylindrical curvature), the simulated surface 9 can then be perceived undistorted in three-dimensional fashion. 20 The conversion to be carried out results from the following formulae x = r sin, (D = arcsin x/r Xtans = 2rir/360, t = 360 xsns/2nr 25 [151]The normal vector n.. at the place (xtra,,,y) can be computed as follows, (cos# 0 sin#) 6C= 0 1 0 fi sin# 0 cos#5) where fi normal vector over (x,y). [152]The security element I of the invention can be configured not only as a reflective 5 security element 1, but also as a transmissive security element 1, as mentioned hereinabove. In this case, the facets 5 are not mirror-coated and the carrier 8 consists of a transparent or at least translucent material, whereby the viewing is effected in transmission. Upon an illumination from behind, a user should perceive the simulated surface 9 as if a reflective security element I according to the invention illuminated 10 from the front were present. [153]The facets 5 computed for a reflective security element I are replaced by data for microprisms 16, whereby the corresponding angles are represented upon reflection (Figure 19) and for transmissive prisms 16 in Figures 20 and 21. Figure 20 shows the incidence on the inclined facets 5, whereas Figure 21 shows the incidence on the 15 smooth side, the latter being preferred due to the possible greater incident light angles. [154]The azimuth angle of the reflective facet 5 is designated a, and the slope angle of the facet 5 as a. The refractive index of the microprism 16 amounts to n, the azimuth angle of the microprism 16 amounts to a, = 180* + a,. The slope angle of the microprism 16 according to Figure 20 amounts to sin (op - 2 a,) = n sin a, whereby 20 there holds for small angles 2 a, = (n - 1) ap and 4 a, = ap (for n = 1.5). [155IThe slope angle of the microprism 16 according to Figure 21 amounts to sin (2 a) = n sin P; sin (ap) = n sin (op - P), whereby there holds for small angles 4 a, = up (for n = 1.5). [156]The components of the normal vector are, when a and a are known, -34 nz=cos cr , ny/n,=sin x/cos a , 2 +ny 2 +n, = nx =cosa-Vl-cosc , n, =sina-dl-cos 2 cr 5 1157]1n Figure 22 there is shown schematically a reflective surface 9 to be simulated with a hill 20 and a hollow 21. The negative focal length -f of the mirroring hill 20 amounts to r/2 and the positive focal length f of the mirroring hollow 21 amounts to r/2. 115811n Figure 23 there is shown schematically a lens 22 which has a transparent 10 concave portion 23 as well as a transparent convex portion 24. The concave portion 23 simulates the mirroring hill 20, whereby the negative focal length -f of the concave portion 23 amounts to 2r. The transparent convex portion 24 simulates the mirroring hollow 21 and has a positive focal length f= 2r. [159]The lens 22 according to Figure 23 can be replaced by the sawtooth arrangement 15 according to Figure 24. [160The arrows in Figures 20 to 23 show schematically the ray trajectory for incident light L. From these ray trajectories it is evident that the lens 22 simulates the surface 9 in transmission as desired, [161]In Figures 25 to 27 there is shown an example in which the sawtooth side lies on 20 the light incidence side. Otherwise the representation of Figure 25 corresponds to the representation of Figure 22, the representation of Figure 26 corresponds to the representation in Figure 23, and the representation of Figure 27 corresponds to the representation in Figure 24. [162]For computing the transmissive sawtooth structures the above-described methods 25 can be employed.
35 [163]The transparent sawtooth structure shown in Figure 27 corresponds substantially to a cast of a corresponding reflective sawtooth structure for simulating the surface 9 according to Figure 25. However, the simulated surface here appears substantially flatter in transmission (at a refractive index of 1.5) than in reflection. Hence, the height 5 of the sawtooth structure is preferably increased, or the number of facets 5 per pixel 4 increased. [1641It is if course also possible to provide the described sawtooth structures with a semi-transparent mirror coating. In this case, the simulated surface 9 normally appears to be more deeply structured in reflection than in transmission. 10 1165]Further, it is possible to provide both sides of a transparent or at least translucent carrier 8 with a sawtooth structure which has the multiplicity of microprisms 16, as is indicated in Figures 28 and 29, In Figure 28 the sawtooth structures 25, 26 on both sides are mirror-symmetric. In Figure 29 the two sawtooth structures 25, 27 are not of mirror-symmetric configuration. 15 11661For computing a sawtooth structure 25 and 27 according to Figures 28 and 29 it can be assumed that the sawtooth structure 25, 27 is composed of a prismatic surface 28 with a slope angle up and an auxiliary prism 29 attached thereunder with a slope angle nh, as represented schematically in Figure 30. Thus, up + as is the effective total prism angle. 20 [167]When the relief slope angle to be imitated is designated as a,, the following holds since the angle sum in the triangle is 1804: 900 pl + 90 - P2 + op + oh = 180* Op + oh ~ P l+ 2, 25 [168]From the law of refraction sin op = n sin p , sin (2 os + oh)= n sin 02 -36 results UP - arcsin((sin op)/n) = arcsin((sin (2 01 + oh))/l) - Oh [169]Thus, the sought slope angle ap of the prismatic surface 28 can be easily 5 computed starting out from the relief slope angle o, to be imitated at an e.g. predetermined auxiliary prism slope angle ah. [170]1t should be noted that a perpendicular viewing has been assumed in the stated computations for the imitation of a mirror relief by prisms. Upon tilted viewing there can result distortions, and upon viewing in white light there can result colored edges 10 on the represented motif, because the refractive index n entering into the computation is wavelength-dependent. [171IThe reflective or refractive security elements represented in Figures 1 to 30 can also be embedded into transparent material or provided with a protective layer. [172IAn embedding is effected in particular in order to protect the micro-optic 15 elements from soiling and wear, and in order to prevent unauthorized simulation by taking an impression of the surface structure. Example: Embedded mirrors [173JUpon embedding or attachment of a protective layer, the properties of the micro optic layer with the facets 5 change. In Figures 32 a-c this behavior is illustrated for 20 embedded mirrors (the facets 5 are configured as mirrors), whereby Figure 32a shows the arrangement before embedding. [174]Upon embedding of the mirrors into a transparent layer 40, the direction in which a mirror image appears changes, as Figure 32b shows. If the original reflective effect is now to be achieved in a relief simulated by embedded micromirrors 5, this is to be 25 taken into consideration for the angle of inclination of the micromirrors, see Figure 32c.
-37 Example: Embedded prisms [175]With embedded prisms 16, a refractive-index difference between prism material and embedding material 40 is required and to be taken into consideration in the computing of the light beam deflection. 5 [176]Figure 33b shows schematically the simulation of the reflective arrangement of Figure 32a by a transmissive prism arrangement with open prisms 16, as already discussed e.g. for Figures 19-.27. [177]Figure 33b shows schematically a possible simulation of the reflective arrangement of Figure 32a by embedded prisms 16, whereby the refractive indices of 10 prism material and embedding material 40 must differ. Example: Embedded scattering facets [17811n the two preceding examples the simulation of mirroring objects was demonstrated. For simulating scattering objects (e.g. marble figure, gypsum model), scattering facets can be used, of which here is an example (see Figure 34): 15 [17910n a foil 41 as a carrier material the following construction is realized: The embossed facets 5 which simulate the object surface are located on the back side of the foil. The facets 5 have dimensions of for example 10 pm to 20 ptm. On the facets 5 there is applied a lacquer 42 pigmented with titanium oxide (particle size approx. I sm), so that the facets 5 are filled with this scattering material. The viewing side is 20 indicated by the arrow P2. Example: Embedded matt shining facets 118011n the following way a matt reflecting object can be simulated (see Figure 35): 11811n a foil 41 as a carrier material the following construction is realized: The embossed facets 5 which simulate the object surface are located on the back side of the 25 foil. The facets 5 have dimensions of for example 10 pm to 20 pm. The embossed layer is provided with a semi-transparent mirror coating 43 and there is applied thereto - 38 a lacquer 42 pigmented with titanium oxide (particle size approx. I km), so that the facets are filled with this scattering material. Upon viewing from the viewing side the simulated object appears matt shining. The viewing side is indicated by the arrow P2. Colored facets: 5 [182]For simulating colored objects, the embedding of the facets in Figures 32b, 32c, 33b, 34 or 35 can be effected with inked material (also material inked differently in various regions). 1183]The security element I of the invention can be configured as a security thread 19 (Figure 1). Further, the security element I can not only, as described, be formed on a 10 carrier foil from which it can be transferred to the value document in the known way. It is also possible to form the security element I directly on the value document. It is thus possible to carry out a direct printing with subsequent embossing of the security element onto a polymer substrate, in order to form a security element according to the invention on plastic bank notes for example. The security element of the invention can 15 be formed in many different substrates. In particular, it can be formed in or on a paper substrate, a paper with synthetic fibers, i.e. paper with a content x of polymeric material in the range of 0 < x < 100 wt%, a plastic foil, e.g. a foil of polyethylene (PE), polyethylene terephthalate (PET), polybutylene terephthalate (PBT), polyethylene naphthalate (PEN), polypropylene (PP) or polyamide (PA), or a multilayer composite, 20 in particular a composite of several different foils (compound composite) or a paper foil composite (foil/paper/foil or paper/foil/paper), whereby the security element can be provided in or on or between each of the layers of such a multilayer composite. [184]In Figure 31 there is shown schematically an embossing tool 30 with which the facets 5 can be embossed into the carrier 8 according to Figure 5. For this purpose, the 25 embossing tool 30 has an embossing area 31 in which the inverted form of the surface structure to be embossed is formed.
-39 [1851A corresponding embossing tool can of course not only be provided for the embodiment according to Figure 5. An embossing tool of the same kind can also be made available for the other described embodiments.
-40 List of reference signs Security element Bank note Area 5 Pixel Facets Line Surface Carrier 10 Simulated surface Mirror surface 15 Height line 16 Microprism 19 Security thread 15 20 Hill 21 Hollow 22 Lens 23 Concave portion 24 Convex portion 20 25 Sawtooth structure 26 Sawtooth structure 27 Sawtooth structure 28 Prismatic surface 29 Auxiliary prism 25 30 Embossing tool 31 Embossing area 40 Transparent layer 41 Foil 42 Pigmented lacquer 30 43 Semi-transparent mirror coating -41 L Incident light LI Incident light L2 Incident light P1 Arrow 5 P2 Arrow
AU2014250638A 2009-12-04 2014-10-15 Security element, value document comprising such a security element, and method for producing such a security element Abandoned AU2014250638A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2014250638A AU2014250638A1 (en) 2009-12-04 2014-10-15 Security element, value document comprising such a security element, and method for producing such a security element

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102009056934.0 2009-12-04
AU2010327031 2010-12-03
AU2014250638A AU2014250638A1 (en) 2009-12-04 2014-10-15 Security element, value document comprising such a security element, and method for producing such a security element

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2010327031A Division AU2010327031C1 (en) 2009-12-04 2010-12-03 Security element, value document comprising such a security element, and method for producing such a security element

Publications (1)

Publication Number Publication Date
AU2014250638A1 true AU2014250638A1 (en) 2014-11-06

Family

ID=51845142

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2014250638A Abandoned AU2014250638A1 (en) 2009-12-04 2014-10-15 Security element, value document comprising such a security element, and method for producing such a security element

Country Status (1)

Country Link
AU (1) AU2014250638A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10252563B2 (en) 2015-07-13 2019-04-09 Wavefront Technology, Inc. Optical products, masters for fabricating optical products, and methods for manufacturing masters and optical products
US10850550B2 (en) 2016-04-22 2020-12-01 Wavefront Technology, Inc. Optical switch devices
US10859851B2 (en) 2014-10-24 2020-12-08 Wavefront Technology, Inc. Optical products, masters for fabricating optical products, and methods for manufacturing masters and optical products
US11113919B2 (en) 2017-10-20 2021-09-07 Wavefront Technology, Inc. Optical switch devices
US11221448B2 (en) 2019-04-19 2022-01-11 Wavefront Technology, Inc. Animated optical security feature

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10859851B2 (en) 2014-10-24 2020-12-08 Wavefront Technology, Inc. Optical products, masters for fabricating optical products, and methods for manufacturing masters and optical products
US10252563B2 (en) 2015-07-13 2019-04-09 Wavefront Technology, Inc. Optical products, masters for fabricating optical products, and methods for manufacturing masters and optical products
US11590790B2 (en) 2015-07-13 2023-02-28 Wavefront Technology, Inc. Optical products, masters for fabricating optical products, and methods for manufacturing masters and optical products
US10850550B2 (en) 2016-04-22 2020-12-01 Wavefront Technology, Inc. Optical switch devices
US11618275B2 (en) 2016-04-22 2023-04-04 Wavefront Technology, Inc. Optical switch devices
US11113919B2 (en) 2017-10-20 2021-09-07 Wavefront Technology, Inc. Optical switch devices
US11861966B2 (en) 2017-10-20 2024-01-02 Wavefront Technology, Inc. Optical switch devices
US11221448B2 (en) 2019-04-19 2022-01-11 Wavefront Technology, Inc. Animated optical security feature

Similar Documents

Publication Publication Date Title
US10525758B2 (en) Security element, value document comprising such a security element, and method for producing such a security element
CA2780458C (en) Security element, value document having such a security element, and manufacturing method for a security element
US10427368B2 (en) Multi-layer body
AU2006230761B2 (en) Patterned optical structures with enhanced security feature
AU2013283489A1 (en) Decorative element and security document comprising a decorative element
AU2014250638A1 (en) Security element, value document comprising such a security element, and method for producing such a security element
ES2890476T3 (en) Procedure for manufacturing a security element and a security element
AU2014250641A1 (en) Security element, value document comprising such a security element and method for producing such a security element
US11345178B2 (en) Security element, and method for producing a security element
US20230406026A1 (en) Optical devices and methods of manufacture thereof
AU2016228200A1 (en) Security element, value document comprising such a security element and method for producing such a security element

Legal Events

Date Code Title Description
MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted