EP3095615A1 - A security document and a method for manufacturing of a security document - Google Patents
A security document and a method for manufacturing of a security document Download PDFInfo
- Publication number
- EP3095615A1 EP3095615A1 EP15461534.8A EP15461534A EP3095615A1 EP 3095615 A1 EP3095615 A1 EP 3095615A1 EP 15461534 A EP15461534 A EP 15461534A EP 3095615 A1 EP3095615 A1 EP 3095615A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- apertures
- security document
- middle layer
- line
- document according
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/346—Perforations
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/351—Translucent or partly translucent parts, e.g. windows
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/405—Marking
- B42D25/43—Marking by removal of material
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/45—Associating two or more layers
Definitions
- the present invention relates to a security document and method for manufacturing of a security document in form of a multilayer laminate.
- Security documents such as identity documents, licenses, credit cards, access cards, transportation tickets or the like, comprise various security features to prevent or at least make them harder to be forged.
- see-through windows which appear to the user as a transparent fragment of an otherwise non-transparent document.
- the see-through windows as known so far have a shape of a relatively large size geometric figure, typically a circle, having typically a size of at least 1 cm 2 .
- the see-through windows may have implemented therein additional security features, such as microprint.
- a European patent application EP2261054A1 discloses a method of manufacturing a security page, comprising: arranging a plurality of layers on top of each other. In order to produce a security document with a plurality of layers the method comprises: pressing said plurality of layers towards each other in order to prevent said layers from moving, cutting a hole through each of said plurality of layers, welding said plurality of layers to each other at edges of said hole, and attaching said plurality of layers and said transparent material to each other by laminating.
- a drawback of this method is cost-ineffective requirement for joining of different layers in order to prevent said layers from moving.
- a European patent application EP2722193A1 entitled “Secure data carrier and method of production of said secure data carrier” discloses a data carrier comprising: a central portion covered by at least one translucent protective layer on at least one of its sides, at least one see-through portion, comprising an orifice filled with a translucent plug, going at least partially through of said central portion, said central portion comprising a colored core and at least one opaque layer colored in a color different from the colored core in order to show a layered structure of different colors on the edge of the data carrier.
- a drawback of this method is requires a layered structure of different colors on the edge of the data carrier.
- a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures.
- the apertures are arranged along a line and each of the apertures has a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line.
- a first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer.
- a second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
- the apertures can be filled with another material.
- the apertures can be filled with the material of the outer layers.
- the document may comprise a security feature implemented in the area of at least one aperture, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
- a security feature implemented in the area of at least one aperture, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
- the number of the distances can be equal to the number of apertures.
- the line is in a form of closed boundary of a geometrical figure.
- the number of the distances can be lower by one than the number of the apertures.
- the line may form an open shape.
- the apertures may have the same shape or different shapes.
- the apertures may have a shape of a circle, an oval, a square, a polygon with sharp edges, a polygon with rounded edges, an ellipse, a letter or a digit.
- the apertures may have a length, measured along the line, greater than width measured perpendicularly to the length of the apertures.
- the ratio of the length to width of the aperture can be higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
- the document may comprise a second middle layer adjacent to the first middle layer.
- the document may comprise at least one further outer layer.
- a method for manufacturing of a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures comprises the steps of forming, in the middle layer, the apertures being arranged along a line and each of the apertures having a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line.
- a first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer; and a second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
- the security document as described herein has a form of a laminate of a plurality of layers, comprising at least one non-transparent (preferably, opaque) middle layer and at least two outer layers which have a transparency greater than the middle layer (preferably being fully transparent).
- the middle layer has a plurality of apertures (in other words, openings or through-holes) which in the laminate are covered by the outer transparent layers.
- the apertures may be filled with another material or filled with the material of the outer layers during lamination.
- Additional security features can be implemented in the area of the see-through security feature, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
- Figs. 1A-1C show a first set of examples of the see-through security feature of the invention.
- the see-through security feature of the first set of examples is formed by a plurality of apertures arranged along a line 201 (indicated by a dashed line) having a shape of a boundary of a circle.
- a line 201 indicated by a dashed line
- In the second example there are four apertures 221-224 separated by four distances 221A-224A.
- In the third example there are eight apertures 231-238 separated by eight distances 231 A-238A.
- Figs. 2A-2C show a second set of examples of the see-through security feature of the invention.
- the see-through security feature of the second set of examples is formed by a plurality of apertures arranged along a line 301 having a shape of a boundary of a square.
- first example there are two apertures 311, 312 separated by two distances 311A, 312A.
- second example there are four apertures 321-324 separated by four distances 321A-324A.
- In the third example there are eight apertures 331-338 separated by eight distances 331A-338A.
- Figs. 3A-3C show a third set of examples of the see-through security feature of the invention.
- the see-through security feature of the third set of examples is formed by a plurality of apertures arranged along a line 401 having a shape of a boundary of a polygon.
- In the third example there are six apertures 431-436 separated by six distances 431A-436A.
- Figs. 4A-4C show a fourth set of examples of the see-through security feature of the invention.
- the see-through security feature of the fourth set of examples is formed by a plurality of apertures arranged along a line 501.
- In the first example there are two apertures 511, 512 separated by one distance 511A.
- In the second example there are four apertures 521-524 separated by three distances 521A-523A.
- In the third example there are six apertures 531-536 separated by five distances 531A-535A.
- Fig. 5 shows a fifth example of the see-through security feature of the invention.
- the see-through security feature of the fifth example is formed by a plurality of apertures having different shapes: lines with sharp ends 611, lines with rounded ends 612, ellipses 613, circles 614, letters 615 and digits 616.
- the apertures can be arranged along lines having other shapes than that shown in the drawing, such as a shape of an oval, a rectangle, a rectangle with rounded edges, a non-regular polygon, etc.
- the apertures can have a similar shape, such as that shown in Fig. 1A or different shapes, such as that shown in Fig. 3C or 5 .
- the number of distances between the apertures can be equal to the number of apertures, such as in case of a line forming a boundary of a geometrical figure such as shown in Fig. 1A , or can be lower than one from the number of apertures, such as in case of a line forming an "open" shape such as shown in Fig. 4A .
- each of the apertures has a length greater than the length of each of the distances between the apertures.
- the lengths are measured along the path of the line. Therefore, in Fig. 4B only the spaces 521A, 522A, 523A between the ends of the apertures located in the middle of the line along which the apertures are arranged are to be treated as the "distance" within the above meaning, while the space between the ends of the apertures 521, 524 located at the ends of the line is not to be treated as the "distance", as it is greater than the length of the apertures.
- the apertures are preferably narrow, i.e. they have a length (measured along the lines 201, 301, 401, 501) greater than the width (measured perpendicularly to the length of the apertures).
- the width is smaller than 5 mm, or smaller than 4 mm, or smaller than 3 mm, or smaller than 2 mm or smaller than 1 mm.
- the length is greater than 1 mm, or greater than 2 mm, or greater than 3 mm, or greater than 4 mm, or greater than 5 mm.
- the ratio of the length to width is higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
- Figs. 6A-6B show a first set of examples of cross-sections of a document with a see-through security feature of the invention.
- the first cross-section, as shown in Fig. 6A is taken along line A-A of Fig. 1A and represents a first plane PA and the second cross-section, as shown in Fig. 6B , is taken along line B-B of Fig. 1A and represents a second plane PB.
- the middle layer 111 and two outer layers 121, 131.
- the first cross-section comprises two apertures 211, 212 of the middle layer 111.
- the second cross-section comprises a full middle layer without any apertures.
- the drawing may be not in scale.
- lines A-A along which the first cross-section can be taken such that it comprises at least one aperture in the middle layer are shown in other figures as well.
- lines B-B along which the second cross-section can be taken such that it comprises a full middle layer without any apertures are shown in other figures as well.
- Figs. 7A-7B show a second set of examples of cross-sections of a document with a see-through security feature of the invention, which are similar to that of Fig. 6A-6B with the difference in that the document comprises two or more middle layers 111, 112 - the apertures 211, 212 are formed through all the layers. It further comprises one or both multi-layer outer layers, comprising layers 121, 122 at one side and layers 131, 132 at another side (more than two outer layers are possible as well).
- the distances 211A, 212A between the apertures 211, 212 along the line 201 form bridges, which keep the internal portion of the middle layer 111 limited by the line 201 connected with the remaining portion of the middle layer 111.
- the line 201 forms a closed curve forming a boundary of a geometrical figure, such as a circle in Fig. 1A
- the internal portion of that figure is filled by the internal portion of the middle layer 111 limited by the line 201.
- the document according to the invention shows better durability, as most of the area within the line 201 is filled by the middle layer material and only its boundary is formed by the apertures. Therefore, the see-through feature may have a size of the prior art see-through window, but better durability.
- apertures 211, 212 are relatively narrow, they are more difficult to be forged in contrast with larger-size see-through windows.
Landscapes
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
- The present invention relates to a security document and method for manufacturing of a security document in form of a multilayer laminate.
- Security documents, such as identity documents, licenses, credit cards, access cards, transportation tickets or the like, comprise various security features to prevent or at least make them harder to be forged.
- One type of security features are so-called see-through windows, which appear to the user as a transparent fragment of an otherwise non-transparent document. The see-through windows as known so far have a shape of a relatively large size geometric figure, typically a circle, having typically a size of at least 1 cm2. The see-through windows may have implemented therein additional security features, such as microprint.
- One drawback of the currently known see-through windows is that due to a relatively large size, they can be relatively easily forged by cutting a hole and filing it with a forged content.
- Another drawback of the currently known see-through windows is that the document can be weakened in the area of the see-through window, as it lacks the middle layer portion, which is filled by the material of the transparent outside layers, which typically have different properties than the middle layer material. This may result the document to be more prone to damage in the see-through area.
- A
European patent application EP2261054A1 discloses a method of manufacturing a security page, comprising: arranging a plurality of layers on top of each other. In order to produce a security document with a plurality of layers the method comprises: pressing said plurality of layers towards each other in order to prevent said layers from moving, cutting a hole through each of said plurality of layers, welding said plurality of layers to each other at edges of said hole, and attaching said plurality of layers and said transparent material to each other by laminating. A drawback of this method is cost-ineffective requirement for joining of different layers in order to prevent said layers from moving. - A European patent application
EP2722193A1 entitled "Secure data carrier and method of production of said secure data carrier" discloses a data carrier comprising: a central portion covered by at least one translucent protective layer on at least one of its sides, at least one see-through portion, comprising an orifice filled with a translucent plug, going at least partially through of said central portion, said central portion comprising a colored core and at least one opaque layer colored in a color different from the colored core in order to show a layered structure of different colors on the edge of the data carrier. A drawback of this method is requires a layered structure of different colors on the edge of the data carrier. - There is a need for providing an improved see-through security feature for security documents, which would be more difficult to be forged and which would deteriorate the properties of the document in a limited manner.
- There is presented a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures. The apertures are arranged along a line and each of the apertures has a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line. A first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer. A second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
- The apertures can be filled with another material.
- The apertures can be filled with the material of the outer layers.
- The document may comprise a security feature implemented in the area of at least one aperture, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
- The number of the distances can be equal to the number of apertures.
- The line is in a form of closed boundary of a geometrical figure.
- The number of the distances can be lower by one than the number of the apertures.
- The line may form an open shape.
- The apertures may have the same shape or different shapes.
- The apertures may have a shape of a circle, an oval, a square, a polygon with sharp edges, a polygon with rounded edges, an ellipse, a letter or a digit.
- The apertures may have a length, measured along the line, greater than width measured perpendicularly to the length of the apertures.
- The ratio of the length to width of the aperture can be higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
- The document may comprise a second middle layer adjacent to the first middle layer.
- The document may comprise at least one further outer layer.
- There is also disclosed a method for manufacturing of a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures. The method comprises the steps of forming, in the middle layer, the apertures being arranged along a line and each of the apertures having a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line. Next, laminating the middle layer and the outer layers to form a security document, such that: a first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer; and a second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
- The invention will be shown by means of exemplary embodiments on a drawing, in which:
-
Figs. 1A-1C show a first set of examples of a see-through security feature of the invention; -
Figs. 2A-2C show a second set of examples of a see-through security feature of the invention; -
Figs. 3A-3C show a third set of examples of a see-through security feature of the invention; -
Figs. 4A-4C show a fourth set of examples of a see-through security feature of the invention; -
Fig. 5 shows a fifth example of a see-through security feature of the invention; -
Figs. 6A-6B show a first set of examples of cross-sections of a document with a see-through security feature of the invention; -
Figs. 7A-7B show a second set of examples of cross-sections of a document with a see-through security feature of the invention; - The security document as described herein has a form of a laminate of a plurality of layers, comprising at least one non-transparent (preferably, opaque) middle layer and at least two outer layers which have a transparency greater than the middle layer (preferably being fully transparent). The middle layer has a plurality of apertures (in other words, openings or through-holes) which in the laminate are covered by the outer transparent layers. The apertures may be filled with another material or filled with the material of the outer layers during lamination. When the document is viewed at from the above, the user can see through the document in the area of the apertures, therefore the apertures form a see-through security feature for the security document.
- Additional security features can be implemented in the area of the see-through security feature, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
-
Figs. 1A-1C show a first set of examples of the see-through security feature of the invention. The see-through security feature of the first set of examples is formed by a plurality of apertures arranged along a line 201 (indicated by a dashed line) having a shape of a boundary of a circle. In the first example there are twoapertures distances distances 221A-224A. In the third example there are eight apertures 231-238 separated by eight distances 231 A-238A. -
Figs. 2A-2C show a second set of examples of the see-through security feature of the invention. The see-through security feature of the second set of examples is formed by a plurality of apertures arranged along aline 301 having a shape of a boundary of a square. In the first example there are twoapertures distances distances 321A-324A. In the third example there are eight apertures 331-338 separated by eightdistances 331A-338A. -
Figs. 3A-3C show a third set of examples of the see-through security feature of the invention. The see-through security feature of the third set of examples is formed by a plurality of apertures arranged along aline 401 having a shape of a boundary of a polygon. In the first example there are twoapertures distances distances 421A-424A. In the third example there are six apertures 431-436 separated by sixdistances 431A-436A. -
Figs. 4A-4C show a fourth set of examples of the see-through security feature of the invention. The see-through security feature of the fourth set of examples is formed by a plurality of apertures arranged along aline 501. In the first example there are twoapertures distance 511A. In the second example there are four apertures 521-524 separated by threedistances 521A-523A. In the third example there are six apertures 531-536 separated by fivedistances 531A-535A. -
Fig. 5 shows a fifth example of the see-through security feature of the invention. The see-through security feature of the fifth example is formed by a plurality of apertures having different shapes: lines withsharp ends 611, lines with rounded ends 612,ellipses 613,circles 614,letters 615 anddigits 616. - Other embodiments are possible as well.
- The apertures can be arranged along lines having other shapes than that shown in the drawing, such as a shape of an oval, a rectangle, a rectangle with rounded edges, a non-regular polygon, etc.
- The apertures can have a similar shape, such as that shown in
Fig. 1A or different shapes, such as that shown inFig. 3C or5 . - The number of distances between the apertures can be equal to the number of apertures, such as in case of a line forming a boundary of a geometrical figure such as shown in
Fig. 1A , or can be lower than one from the number of apertures, such as in case of a line forming an "open" shape such as shown inFig. 4A . - In all embodiments shown, each of the apertures has a length greater than the length of each of the distances between the apertures. The lengths are measured along the path of the line. Therefore, in
Fig. 4B only thespaces apertures - The apertures are preferably narrow, i.e. they have a length (measured along the
lines -
Figs. 6A-6B show a first set of examples of cross-sections of a document with a see-through security feature of the invention. The first cross-section, as shown inFig. 6A is taken along line A-A ofFig. 1A and represents a first plane PA and the second cross-section, as shown inFig. 6B , is taken along line B-B ofFig. 1A and represents a second plane PB. InFigs. 6A, 6B there is visible themiddle layer 111 and twoouter layers apertures middle layer 111. The second cross-section comprises a full middle layer without any apertures. The drawing may be not in scale. - Examples of lines A-A along which the first cross-section can be taken such that it comprises at least one aperture in the middle layer are shown in other figures as well. Examples of lines B-B along which the second cross-section can be taken such that it comprises a full middle layer without any apertures are shown in other figures as well.
-
Figs. 7A-7B show a second set of examples of cross-sections of a document with a see-through security feature of the invention, which are similar to that ofFig. 6A-6B with the difference in that the document comprises two or moremiddle layers 111, 112 - theapertures layers - The
distances apertures line 201 form bridges, which keep the internal portion of themiddle layer 111 limited by theline 201 connected with the remaining portion of themiddle layer 111. This facilitates manufacturing of the document - in the manufacturing process the apertures are 211, 212 are formed e.g. by punching the middle layer and then themiddle layer 111 withapertures outer layer 121 and then covered by the secondouter layer 131 and laminated. The shorter the apertures and the more distances formed along the line, the better connection between the internal portion of themiddle layer 111 limited by theline 201 with the remaining portion of themiddle layer 111. - If the
line 201 forms a closed curve forming a boundary of a geometrical figure, such as a circle inFig. 1A , the internal portion of that figure is filled by the internal portion of themiddle layer 111 limited by theline 201. In contrast to prior art see-through security windows wherein the whole area limited by theline 201 boundary would form an aperture in themiddle layer 111, the document according to the invention shows better durability, as most of the area within theline 201 is filled by the middle layer material and only its boundary is formed by the apertures. Therefore, the see-through feature may have a size of the prior art see-through window, but better durability. - Moreover, as the
apertures
Claims (15)
- A security document having a form of a laminate of a non-transparent middle layer (111) and outer layers (121, 131) having transparency greater than the middle layer (111), wherein the middle layer (111) has a plurality of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), characterized in that- the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are arranged along a line (201, 301, 401, 501) and each of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) has a length greater than the length of each of the distances (211A, 212A, 221A-224A, 231A-238A, 311A, 312A, 321A-324A, 331A-338A, 411 A, 412A, 421A-424A, 431A-436A, 511 A, 521A-523A, 531A-535A) between the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), the lengths being measured along the path of the line (201, 301, 401, 501);- a first cross-section of the security document in a first plane (PA) crossing the line (201, 301, 401, 501) comprises an aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) of the middle layer (111); and- a second cross-section of the security document in a second plane (PB) crossing the line (201, 301, 401, 501) comprises a full middle layer (111) without any apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).
- The security document according to claim 1 wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are filled with another material.
- The security document according to claim 2 wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are filled with the material of the outer layers (121, 131).
- The security document according to any of previous claim wherein the document comprises security feature implemented in the area of at least one aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks.
- The security document according to any of previous claim wherein the number of the distances (211 A, 212A, 221A-224A, 231A-238A, 311 A, 312A, 321A-324A, 331A-338A, 411 A, 412A, 421A-424A, 431A-436A) is equal to the number of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436).
- The security document according to claim 5 wherein the line (201, 301, 401) is in a form of closed boundary of a geometrical figure.
- The security document according to claims 1 - 4 wherein the number of the distances (511A, 521A-523A, 531A-535A) is lower by one than the number of the apertures (511, 512, 521-523, 531-535).
- The security document according to claim 7 wherein the line (501) forms an open shape.
- The security document according to any of previous claim wherein the apertures have the same shape (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 511, 512).
- The security document according to claims 1 to 8 wherein the apertures have different shapes (411, 412, 421-424, 431-436, 521-524, 531-536, 611-616).
- The security document according to any of previous claim wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) have a shape of a circle, an oval, a square, a polygon with sharp edges, a polygon with rounded edges, an ellipse, a letter or a digit.
- The security document according to any of previous claim wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) have a length, measured along the line (201, 301, 401, 501), greater than width measured perpendicularly to the length of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).
- The security document according to claim 12 wherein the ratio of the length to width of the aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) is higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
- The document according to any of previous claim wherein the document comprises at least one of: a second middle layer (112) adjacent to the first middle layer (111) or at least one further outer layer (122, 132).
- A method for manufacturing of a security document having a form of a laminate of a non-transparent middle layer (111) and outer layers (121, 131) having transparency greater than the middle layer (111), wherein the middle layer (111) has a plurality of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), characterized in that it comprises the steps of:- forming, in the middle layer (111), the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) being arranged along a line (201, 301, 401, 501) and each of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) having a length greater than the length of each of the distances (211 A, 212A, 221A-224A, 231 A-238A, 311 A, 312A, 321A-324A, 331A-338A, 411 A, 412A, 421A-424A, 431 A-436A, 511 A, 521A-523A, 531A-535A) between the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), the lengths being measured along the path of the line (201, 301, 401, 501);- laminating the middle layer (111) and the outer layers (121, 131) to form a security document, such that:o a first cross-section of the security document in a first plane (PA) crossing the line (201, 301, 401, 501) comprises an aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) of the middle layer (111); ando a second cross-section of the security document in a second plane (PB) crossing the line (201, 301, 401, 501) comprises a full middle layer (111) without any apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15461534.8A EP3095615A1 (en) | 2015-05-20 | 2015-05-20 | A security document and a method for manufacturing of a security document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15461534.8A EP3095615A1 (en) | 2015-05-20 | 2015-05-20 | A security document and a method for manufacturing of a security document |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3095615A1 true EP3095615A1 (en) | 2016-11-23 |
Family
ID=53181230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15461534.8A Withdrawn EP3095615A1 (en) | 2015-05-20 | 2015-05-20 | A security document and a method for manufacturing of a security document |
Country Status (1)
Country | Link |
---|---|
EP (1) | EP3095615A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2261054A1 (en) | 2009-06-12 | 2010-12-15 | Gemalto Oy | A method of manufacturing a security page |
WO2011138007A1 (en) * | 2010-05-04 | 2011-11-10 | Giesecke & Devrient Gmbh | Data carrier comprising polymer substrate with motif region |
WO2012072214A1 (en) * | 2010-12-01 | 2012-06-07 | Giesecke & Devrient Gmbh | Data carrier with marking |
WO2012117053A1 (en) * | 2011-03-01 | 2012-09-07 | Bundesdruckerei Gmbh | Composite body and method for producing a composite body having an internal security feature |
WO2013013807A1 (en) * | 2011-07-25 | 2013-01-31 | Giesecke & Devrient Gmbh | Security element with window in the substrate |
US20130043311A1 (en) * | 2010-02-10 | 2013-02-21 | De La Rue International Limited | Security element for document of value |
EP2722193A1 (en) | 2012-10-19 | 2014-04-23 | Gemalto SA | Secure data carrier and method of production of said secure data carrier |
WO2014180542A1 (en) * | 2013-05-06 | 2014-11-13 | Giesecke & Devrient Gmbh | Multi-layered data carrier |
-
2015
- 2015-05-20 EP EP15461534.8A patent/EP3095615A1/en not_active Withdrawn
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2261054A1 (en) | 2009-06-12 | 2010-12-15 | Gemalto Oy | A method of manufacturing a security page |
US20130043311A1 (en) * | 2010-02-10 | 2013-02-21 | De La Rue International Limited | Security element for document of value |
WO2011138007A1 (en) * | 2010-05-04 | 2011-11-10 | Giesecke & Devrient Gmbh | Data carrier comprising polymer substrate with motif region |
WO2012072214A1 (en) * | 2010-12-01 | 2012-06-07 | Giesecke & Devrient Gmbh | Data carrier with marking |
WO2012117053A1 (en) * | 2011-03-01 | 2012-09-07 | Bundesdruckerei Gmbh | Composite body and method for producing a composite body having an internal security feature |
WO2013013807A1 (en) * | 2011-07-25 | 2013-01-31 | Giesecke & Devrient Gmbh | Security element with window in the substrate |
EP2722193A1 (en) | 2012-10-19 | 2014-04-23 | Gemalto SA | Secure data carrier and method of production of said secure data carrier |
WO2014180542A1 (en) * | 2013-05-06 | 2014-11-13 | Giesecke & Devrient Gmbh | Multi-layered data carrier |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2012328328B2 (en) | Security element | |
EP2483082B1 (en) | Data carrier having a window | |
EP2909041B1 (en) | Secure data carrier and method of production of said secure data carrier | |
ES2569612T3 (en) | Safety element and manufacturing method | |
JP6477682B2 (en) | Card, card manufacturing method | |
US10696587B2 (en) | Glass sheet with identification code | |
RU2649747C2 (en) | Printed security feature, object comprising such printed security feature, and process of producing same | |
US10336123B2 (en) | Multilayer security element | |
EP2499002B1 (en) | Identification document and a method of producing | |
EP2209654B1 (en) | Multilayered security document having at least two film elements and method for the production | |
JP2021154739A (en) | Laminate | |
EP2110263A2 (en) | Protective element (variants), method for the production thereof, counterfeit-proof material and value paper | |
EP3095615A1 (en) | A security document and a method for manufacturing of a security document | |
EP3838611A1 (en) | Security element for a data carrier, data carrier and method of production of the security element and use of the security element for production of a data carrier | |
WO2013143006A1 (en) | Perforation-based security feature | |
WO2019058091A1 (en) | A method of manufacturing a security sheet | |
WO2013143007A1 (en) | Perforation-based security feature in a multilayer substrate | |
US20140125050A1 (en) | Sheet Document having a Translucent or Transparent Region | |
KR101166652B1 (en) | Multi-function security marking structure and processing method | |
KR102266337B1 (en) | Method for visually customising an identity document comprising a latent image | |
JP2005262891A (en) | Card using permeable raw material | |
JP4439138B2 (en) | Card with transparent material | |
AU2015340387B2 (en) | Identification document comprising a guilloche and and an arrangement of pixels | |
JP6252863B2 (en) | Latent image printed matter | |
JP6505567B2 (en) | IC tag manufacturing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
17P | Request for examination filed |
Effective date: 20170131 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
17Q | First examination report despatched |
Effective date: 20180309 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20201121 |