EP3095615A1 - A security document and a method for manufacturing of a security document - Google Patents

A security document and a method for manufacturing of a security document Download PDF

Info

Publication number
EP3095615A1
EP3095615A1 EP15461534.8A EP15461534A EP3095615A1 EP 3095615 A1 EP3095615 A1 EP 3095615A1 EP 15461534 A EP15461534 A EP 15461534A EP 3095615 A1 EP3095615 A1 EP 3095615A1
Authority
EP
European Patent Office
Prior art keywords
apertures
security document
middle layer
line
document according
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15461534.8A
Other languages
German (de)
French (fr)
Inventor
Paulina Wojciechowska
Pawel Wojcik
Ariel Biernacki
Arkadiusz Karpinski
Ewelina Kosciuczyk
Wieslawa Kowalska
Joanna Ragus
Agata Olszynska
Ewa Leszczynska-Ambroziewicz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Polska Wytwornia Papierow Wartosciowych SA
Original Assignee
Polska Wytwornia Papierow Wartosciowych SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Polska Wytwornia Papierow Wartosciowych SA filed Critical Polska Wytwornia Papierow Wartosciowych SA
Priority to EP15461534.8A priority Critical patent/EP3095615A1/en
Publication of EP3095615A1 publication Critical patent/EP3095615A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/346Perforations
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/351Translucent or partly translucent parts, e.g. windows
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/43Marking by removal of material
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/45Associating two or more layers

Definitions

  • the present invention relates to a security document and method for manufacturing of a security document in form of a multilayer laminate.
  • Security documents such as identity documents, licenses, credit cards, access cards, transportation tickets or the like, comprise various security features to prevent or at least make them harder to be forged.
  • see-through windows which appear to the user as a transparent fragment of an otherwise non-transparent document.
  • the see-through windows as known so far have a shape of a relatively large size geometric figure, typically a circle, having typically a size of at least 1 cm 2 .
  • the see-through windows may have implemented therein additional security features, such as microprint.
  • a European patent application EP2261054A1 discloses a method of manufacturing a security page, comprising: arranging a plurality of layers on top of each other. In order to produce a security document with a plurality of layers the method comprises: pressing said plurality of layers towards each other in order to prevent said layers from moving, cutting a hole through each of said plurality of layers, welding said plurality of layers to each other at edges of said hole, and attaching said plurality of layers and said transparent material to each other by laminating.
  • a drawback of this method is cost-ineffective requirement for joining of different layers in order to prevent said layers from moving.
  • a European patent application EP2722193A1 entitled “Secure data carrier and method of production of said secure data carrier” discloses a data carrier comprising: a central portion covered by at least one translucent protective layer on at least one of its sides, at least one see-through portion, comprising an orifice filled with a translucent plug, going at least partially through of said central portion, said central portion comprising a colored core and at least one opaque layer colored in a color different from the colored core in order to show a layered structure of different colors on the edge of the data carrier.
  • a drawback of this method is requires a layered structure of different colors on the edge of the data carrier.
  • a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures.
  • the apertures are arranged along a line and each of the apertures has a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line.
  • a first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer.
  • a second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
  • the apertures can be filled with another material.
  • the apertures can be filled with the material of the outer layers.
  • the document may comprise a security feature implemented in the area of at least one aperture, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
  • a security feature implemented in the area of at least one aperture, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
  • the number of the distances can be equal to the number of apertures.
  • the line is in a form of closed boundary of a geometrical figure.
  • the number of the distances can be lower by one than the number of the apertures.
  • the line may form an open shape.
  • the apertures may have the same shape or different shapes.
  • the apertures may have a shape of a circle, an oval, a square, a polygon with sharp edges, a polygon with rounded edges, an ellipse, a letter or a digit.
  • the apertures may have a length, measured along the line, greater than width measured perpendicularly to the length of the apertures.
  • the ratio of the length to width of the aperture can be higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
  • the document may comprise a second middle layer adjacent to the first middle layer.
  • the document may comprise at least one further outer layer.
  • a method for manufacturing of a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures comprises the steps of forming, in the middle layer, the apertures being arranged along a line and each of the apertures having a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line.
  • a first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer; and a second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
  • the security document as described herein has a form of a laminate of a plurality of layers, comprising at least one non-transparent (preferably, opaque) middle layer and at least two outer layers which have a transparency greater than the middle layer (preferably being fully transparent).
  • the middle layer has a plurality of apertures (in other words, openings or through-holes) which in the laminate are covered by the outer transparent layers.
  • the apertures may be filled with another material or filled with the material of the outer layers during lamination.
  • Additional security features can be implemented in the area of the see-through security feature, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
  • Figs. 1A-1C show a first set of examples of the see-through security feature of the invention.
  • the see-through security feature of the first set of examples is formed by a plurality of apertures arranged along a line 201 (indicated by a dashed line) having a shape of a boundary of a circle.
  • a line 201 indicated by a dashed line
  • In the second example there are four apertures 221-224 separated by four distances 221A-224A.
  • In the third example there are eight apertures 231-238 separated by eight distances 231 A-238A.
  • Figs. 2A-2C show a second set of examples of the see-through security feature of the invention.
  • the see-through security feature of the second set of examples is formed by a plurality of apertures arranged along a line 301 having a shape of a boundary of a square.
  • first example there are two apertures 311, 312 separated by two distances 311A, 312A.
  • second example there are four apertures 321-324 separated by four distances 321A-324A.
  • In the third example there are eight apertures 331-338 separated by eight distances 331A-338A.
  • Figs. 3A-3C show a third set of examples of the see-through security feature of the invention.
  • the see-through security feature of the third set of examples is formed by a plurality of apertures arranged along a line 401 having a shape of a boundary of a polygon.
  • In the third example there are six apertures 431-436 separated by six distances 431A-436A.
  • Figs. 4A-4C show a fourth set of examples of the see-through security feature of the invention.
  • the see-through security feature of the fourth set of examples is formed by a plurality of apertures arranged along a line 501.
  • In the first example there are two apertures 511, 512 separated by one distance 511A.
  • In the second example there are four apertures 521-524 separated by three distances 521A-523A.
  • In the third example there are six apertures 531-536 separated by five distances 531A-535A.
  • Fig. 5 shows a fifth example of the see-through security feature of the invention.
  • the see-through security feature of the fifth example is formed by a plurality of apertures having different shapes: lines with sharp ends 611, lines with rounded ends 612, ellipses 613, circles 614, letters 615 and digits 616.
  • the apertures can be arranged along lines having other shapes than that shown in the drawing, such as a shape of an oval, a rectangle, a rectangle with rounded edges, a non-regular polygon, etc.
  • the apertures can have a similar shape, such as that shown in Fig. 1A or different shapes, such as that shown in Fig. 3C or 5 .
  • the number of distances between the apertures can be equal to the number of apertures, such as in case of a line forming a boundary of a geometrical figure such as shown in Fig. 1A , or can be lower than one from the number of apertures, such as in case of a line forming an "open" shape such as shown in Fig. 4A .
  • each of the apertures has a length greater than the length of each of the distances between the apertures.
  • the lengths are measured along the path of the line. Therefore, in Fig. 4B only the spaces 521A, 522A, 523A between the ends of the apertures located in the middle of the line along which the apertures are arranged are to be treated as the "distance" within the above meaning, while the space between the ends of the apertures 521, 524 located at the ends of the line is not to be treated as the "distance", as it is greater than the length of the apertures.
  • the apertures are preferably narrow, i.e. they have a length (measured along the lines 201, 301, 401, 501) greater than the width (measured perpendicularly to the length of the apertures).
  • the width is smaller than 5 mm, or smaller than 4 mm, or smaller than 3 mm, or smaller than 2 mm or smaller than 1 mm.
  • the length is greater than 1 mm, or greater than 2 mm, or greater than 3 mm, or greater than 4 mm, or greater than 5 mm.
  • the ratio of the length to width is higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
  • Figs. 6A-6B show a first set of examples of cross-sections of a document with a see-through security feature of the invention.
  • the first cross-section, as shown in Fig. 6A is taken along line A-A of Fig. 1A and represents a first plane PA and the second cross-section, as shown in Fig. 6B , is taken along line B-B of Fig. 1A and represents a second plane PB.
  • the middle layer 111 and two outer layers 121, 131.
  • the first cross-section comprises two apertures 211, 212 of the middle layer 111.
  • the second cross-section comprises a full middle layer without any apertures.
  • the drawing may be not in scale.
  • lines A-A along which the first cross-section can be taken such that it comprises at least one aperture in the middle layer are shown in other figures as well.
  • lines B-B along which the second cross-section can be taken such that it comprises a full middle layer without any apertures are shown in other figures as well.
  • Figs. 7A-7B show a second set of examples of cross-sections of a document with a see-through security feature of the invention, which are similar to that of Fig. 6A-6B with the difference in that the document comprises two or more middle layers 111, 112 - the apertures 211, 212 are formed through all the layers. It further comprises one or both multi-layer outer layers, comprising layers 121, 122 at one side and layers 131, 132 at another side (more than two outer layers are possible as well).
  • the distances 211A, 212A between the apertures 211, 212 along the line 201 form bridges, which keep the internal portion of the middle layer 111 limited by the line 201 connected with the remaining portion of the middle layer 111.
  • the line 201 forms a closed curve forming a boundary of a geometrical figure, such as a circle in Fig. 1A
  • the internal portion of that figure is filled by the internal portion of the middle layer 111 limited by the line 201.
  • the document according to the invention shows better durability, as most of the area within the line 201 is filled by the middle layer material and only its boundary is formed by the apertures. Therefore, the see-through feature may have a size of the prior art see-through window, but better durability.
  • apertures 211, 212 are relatively narrow, they are more difficult to be forged in contrast with larger-size see-through windows.

Landscapes

  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A security document having a form of a laminate of a non-transparent middle layer (111) and outer layers (121, 131) having transparency greater than the middle layer (111), wherein the middle layer (111) has a plurality of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616). The apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are arranged along a line (201, 301, 401, 501) and each of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) has a length greater than the length of each of the distances (211A, 212A, 221A-224A, 231A-238A, 311A, 312A, 321A-324A, 331 A-338A, 411 A, 412A, 421 A-424A, 431 A-436A, 511 A, 521 A-523A, 531 A-535A) between the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), the lengths being measured along the path of the line (201, 301, 401, 501). A first cross-section of the security document in a first plane (PA) crossing the line (201, 301, 401, 501) comprises an aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) of the middle layer (111); and a second cross-section of the security document in a second plane (PB) crossing the line (201, 301, 401, 501) comprises a full middle layer (111) without any apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).

Description

    TECHNICAL FIELD
  • The present invention relates to a security document and method for manufacturing of a security document in form of a multilayer laminate.
  • BACKGROUND
  • Security documents, such as identity documents, licenses, credit cards, access cards, transportation tickets or the like, comprise various security features to prevent or at least make them harder to be forged.
  • One type of security features are so-called see-through windows, which appear to the user as a transparent fragment of an otherwise non-transparent document. The see-through windows as known so far have a shape of a relatively large size geometric figure, typically a circle, having typically a size of at least 1 cm2. The see-through windows may have implemented therein additional security features, such as microprint.
  • One drawback of the currently known see-through windows is that due to a relatively large size, they can be relatively easily forged by cutting a hole and filing it with a forged content.
  • Another drawback of the currently known see-through windows is that the document can be weakened in the area of the see-through window, as it lacks the middle layer portion, which is filled by the material of the transparent outside layers, which typically have different properties than the middle layer material. This may result the document to be more prone to damage in the see-through area.
  • A European patent application EP2261054A1 discloses a method of manufacturing a security page, comprising: arranging a plurality of layers on top of each other. In order to produce a security document with a plurality of layers the method comprises: pressing said plurality of layers towards each other in order to prevent said layers from moving, cutting a hole through each of said plurality of layers, welding said plurality of layers to each other at edges of said hole, and attaching said plurality of layers and said transparent material to each other by laminating. A drawback of this method is cost-ineffective requirement for joining of different layers in order to prevent said layers from moving.
  • A European patent application EP2722193A1 entitled "Secure data carrier and method of production of said secure data carrier" discloses a data carrier comprising: a central portion covered by at least one translucent protective layer on at least one of its sides, at least one see-through portion, comprising an orifice filled with a translucent plug, going at least partially through of said central portion, said central portion comprising a colored core and at least one opaque layer colored in a color different from the colored core in order to show a layered structure of different colors on the edge of the data carrier. A drawback of this method is requires a layered structure of different colors on the edge of the data carrier.
  • There is a need for providing an improved see-through security feature for security documents, which would be more difficult to be forged and which would deteriorate the properties of the document in a limited manner.
  • SUMMARY
  • There is presented a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures. The apertures are arranged along a line and each of the apertures has a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line. A first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer. A second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
  • The apertures can be filled with another material.
  • The apertures can be filled with the material of the outer layers.
  • The document may comprise a security feature implemented in the area of at least one aperture, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
  • The number of the distances can be equal to the number of apertures.
  • The line is in a form of closed boundary of a geometrical figure.
  • The number of the distances can be lower by one than the number of the apertures.
  • The line may form an open shape.
  • The apertures may have the same shape or different shapes.
  • The apertures may have a shape of a circle, an oval, a square, a polygon with sharp edges, a polygon with rounded edges, an ellipse, a letter or a digit.
  • The apertures may have a length, measured along the line, greater than width measured perpendicularly to the length of the apertures.
  • The ratio of the length to width of the aperture can be higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
  • The document may comprise a second middle layer adjacent to the first middle layer.
  • The document may comprise at least one further outer layer.
  • There is also disclosed a method for manufacturing of a security document having a form of a laminate of a non-transparent middle layer and outer layers having transparency greater than the middle layer, wherein the middle layer has a plurality of apertures. The method comprises the steps of forming, in the middle layer, the apertures being arranged along a line and each of the apertures having a length greater than the length of each of the distances between the apertures, the lengths being measured along the path of the line. Next, laminating the middle layer and the outer layers to form a security document, such that: a first cross-section of the security document in a first plane crossing the line comprises an aperture of the middle layer; and a second cross-section of the security document in a second plane crossing the line comprises a full middle layer without any apertures.
  • BRIEF DESCRIPTION OF FIGURES
  • The invention will be shown by means of exemplary embodiments on a drawing, in which:
    • Figs. 1A-1C show a first set of examples of a see-through security feature of the invention;
    • Figs. 2A-2C show a second set of examples of a see-through security feature of the invention;
    • Figs. 3A-3C show a third set of examples of a see-through security feature of the invention;
    • Figs. 4A-4C show a fourth set of examples of a see-through security feature of the invention;
    • Fig. 5 shows a fifth example of a see-through security feature of the invention;
    • Figs. 6A-6B show a first set of examples of cross-sections of a document with a see-through security feature of the invention;
    • Figs. 7A-7B show a second set of examples of cross-sections of a document with a see-through security feature of the invention;
    DETAILED DESCRIPTION
  • The security document as described herein has a form of a laminate of a plurality of layers, comprising at least one non-transparent (preferably, opaque) middle layer and at least two outer layers which have a transparency greater than the middle layer (preferably being fully transparent). The middle layer has a plurality of apertures (in other words, openings or through-holes) which in the laminate are covered by the outer transparent layers. The apertures may be filled with another material or filled with the material of the outer layers during lamination. When the document is viewed at from the above, the user can see through the document in the area of the apertures, therefore the apertures form a see-through security feature for the security document.
  • Additional security features can be implemented in the area of the see-through security feature, such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks and other security features.
  • Figs. 1A-1C show a first set of examples of the see-through security feature of the invention. The see-through security feature of the first set of examples is formed by a plurality of apertures arranged along a line 201 (indicated by a dashed line) having a shape of a boundary of a circle. In the first example there are two apertures 211, 212 separated by two distances 211 A, 212A. In the second example there are four apertures 221-224 separated by four distances 221A-224A. In the third example there are eight apertures 231-238 separated by eight distances 231 A-238A.
  • Figs. 2A-2C show a second set of examples of the see-through security feature of the invention. The see-through security feature of the second set of examples is formed by a plurality of apertures arranged along a line 301 having a shape of a boundary of a square. In the first example there are two apertures 311, 312 separated by two distances 311A, 312A. In the second example there are four apertures 321-324 separated by four distances 321A-324A. In the third example there are eight apertures 331-338 separated by eight distances 331A-338A.
  • Figs. 3A-3C show a third set of examples of the see-through security feature of the invention. The see-through security feature of the third set of examples is formed by a plurality of apertures arranged along a line 401 having a shape of a boundary of a polygon. In the first example there are two apertures 411, 412 separated by two distances 411A, 412A. In the second example there are four apertures 421-424 separated by four distances 421A-424A. In the third example there are six apertures 431-436 separated by six distances 431A-436A.
  • Figs. 4A-4C show a fourth set of examples of the see-through security feature of the invention. The see-through security feature of the fourth set of examples is formed by a plurality of apertures arranged along a line 501. In the first example there are two apertures 511, 512 separated by one distance 511A. In the second example there are four apertures 521-524 separated by three distances 521A-523A. In the third example there are six apertures 531-536 separated by five distances 531A-535A.
  • Fig. 5 shows a fifth example of the see-through security feature of the invention. The see-through security feature of the fifth example is formed by a plurality of apertures having different shapes: lines with sharp ends 611, lines with rounded ends 612, ellipses 613, circles 614, letters 615 and digits 616.
  • Other embodiments are possible as well.
  • The apertures can be arranged along lines having other shapes than that shown in the drawing, such as a shape of an oval, a rectangle, a rectangle with rounded edges, a non-regular polygon, etc.
  • The apertures can have a similar shape, such as that shown in Fig. 1A or different shapes, such as that shown in Fig. 3C or 5.
  • The number of distances between the apertures can be equal to the number of apertures, such as in case of a line forming a boundary of a geometrical figure such as shown in Fig. 1A, or can be lower than one from the number of apertures, such as in case of a line forming an "open" shape such as shown in Fig. 4A.
  • In all embodiments shown, each of the apertures has a length greater than the length of each of the distances between the apertures. The lengths are measured along the path of the line. Therefore, in Fig. 4B only the spaces 521A, 522A, 523A between the ends of the apertures located in the middle of the line along which the apertures are arranged are to be treated as the "distance" within the above meaning, while the space between the ends of the apertures 521, 524 located at the ends of the line is not to be treated as the "distance", as it is greater than the length of the apertures.
  • The apertures are preferably narrow, i.e. they have a length (measured along the lines 201, 301, 401, 501) greater than the width (measured perpendicularly to the length of the apertures). Preferably, the width is smaller than 5 mm, or smaller than 4 mm, or smaller than 3 mm, or smaller than 2 mm or smaller than 1 mm. Preferably, the length is greater than 1 mm, or greater than 2 mm, or greater than 3 mm, or greater than 4 mm, or greater than 5 mm. Preferably, the ratio of the length to width is higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
  • Figs. 6A-6B show a first set of examples of cross-sections of a document with a see-through security feature of the invention. The first cross-section, as shown in Fig. 6A is taken along line A-A of Fig. 1A and represents a first plane PA and the second cross-section, as shown in Fig. 6B, is taken along line B-B of Fig. 1A and represents a second plane PB. In Figs. 6A, 6B there is visible the middle layer 111 and two outer layers 121, 131. The first cross-section comprises two apertures 211, 212 of the middle layer 111. The second cross-section comprises a full middle layer without any apertures. The drawing may be not in scale.
  • Examples of lines A-A along which the first cross-section can be taken such that it comprises at least one aperture in the middle layer are shown in other figures as well. Examples of lines B-B along which the second cross-section can be taken such that it comprises a full middle layer without any apertures are shown in other figures as well.
  • Figs. 7A-7B show a second set of examples of cross-sections of a document with a see-through security feature of the invention, which are similar to that of Fig. 6A-6B with the difference in that the document comprises two or more middle layers 111, 112 - the apertures 211, 212 are formed through all the layers. It further comprises one or both multi-layer outer layers, comprising layers 121, 122 at one side and layers 131, 132 at another side (more than two outer layers are possible as well).
  • The distances 211A, 212A between the apertures 211, 212 along the line 201 form bridges, which keep the internal portion of the middle layer 111 limited by the line 201 connected with the remaining portion of the middle layer 111. This facilitates manufacturing of the document - in the manufacturing process the apertures are 211, 212 are formed e.g. by punching the middle layer and then the middle layer 111 with apertures 211, 212 can be manipulated, e.g. laid on top of the first outer layer 121 and then covered by the second outer layer 131 and laminated. The shorter the apertures and the more distances formed along the line, the better connection between the internal portion of the middle layer 111 limited by the line 201 with the remaining portion of the middle layer 111.
  • If the line 201 forms a closed curve forming a boundary of a geometrical figure, such as a circle in Fig. 1A, the internal portion of that figure is filled by the internal portion of the middle layer 111 limited by the line 201. In contrast to prior art see-through security windows wherein the whole area limited by the line 201 boundary would form an aperture in the middle layer 111, the document according to the invention shows better durability, as most of the area within the line 201 is filled by the middle layer material and only its boundary is formed by the apertures. Therefore, the see-through feature may have a size of the prior art see-through window, but better durability.
  • Moreover, as the apertures 211, 212 are relatively narrow, they are more difficult to be forged in contrast with larger-size see-through windows.

Claims (15)

  1. A security document having a form of a laminate of a non-transparent middle layer (111) and outer layers (121, 131) having transparency greater than the middle layer (111), wherein the middle layer (111) has a plurality of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), characterized in that
    - the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are arranged along a line (201, 301, 401, 501) and each of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) has a length greater than the length of each of the distances (211A, 212A, 221A-224A, 231A-238A, 311A, 312A, 321A-324A, 331A-338A, 411 A, 412A, 421A-424A, 431A-436A, 511 A, 521A-523A, 531A-535A) between the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), the lengths being measured along the path of the line (201, 301, 401, 501);
    - a first cross-section of the security document in a first plane (PA) crossing the line (201, 301, 401, 501) comprises an aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) of the middle layer (111); and
    - a second cross-section of the security document in a second plane (PB) crossing the line (201, 301, 401, 501) comprises a full middle layer (111) without any apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).
  2. The security document according to claim 1 wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are filled with another material.
  3. The security document according to claim 2 wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) are filled with the material of the outer layers (121, 131).
  4. The security document according to any of previous claim wherein the document comprises security feature implemented in the area of at least one aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), such as offset or silk-screen printed elements, tactile elements or personalized data, preferably a microprint, a laser engraving, a hologram, UV-active inks, thermochromic inks or IR-absorbing inks.
  5. The security document according to any of previous claim wherein the number of the distances (211 A, 212A, 221A-224A, 231A-238A, 311 A, 312A, 321A-324A, 331A-338A, 411 A, 412A, 421A-424A, 431A-436A) is equal to the number of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436).
  6. The security document according to claim 5 wherein the line (201, 301, 401) is in a form of closed boundary of a geometrical figure.
  7. The security document according to claims 1 - 4 wherein the number of the distances (511A, 521A-523A, 531A-535A) is lower by one than the number of the apertures (511, 512, 521-523, 531-535).
  8. The security document according to claim 7 wherein the line (501) forms an open shape.
  9. The security document according to any of previous claim wherein the apertures have the same shape (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 511, 512).
  10. The security document according to claims 1 to 8 wherein the apertures have different shapes (411, 412, 421-424, 431-436, 521-524, 531-536, 611-616).
  11. The security document according to any of previous claim wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) have a shape of a circle, an oval, a square, a polygon with sharp edges, a polygon with rounded edges, an ellipse, a letter or a digit.
  12. The security document according to any of previous claim wherein the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) have a length, measured along the line (201, 301, 401, 501), greater than width measured perpendicularly to the length of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).
  13. The security document according to claim 12 wherein the ratio of the length to width of the aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) is higher than 1:1, or higher than 1,5:1, or higher than 2:1, or higher than 3:1, or higher than 4:1 or higher than 5:1.
  14. The document according to any of previous claim wherein the document comprises at least one of: a second middle layer (112) adjacent to the first middle layer (111) or at least one further outer layer (122, 132).
  15. A method for manufacturing of a security document having a form of a laminate of a non-transparent middle layer (111) and outer layers (121, 131) having transparency greater than the middle layer (111), wherein the middle layer (111) has a plurality of apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), characterized in that it comprises the steps of:
    - forming, in the middle layer (111), the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) being arranged along a line (201, 301, 401, 501) and each of the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) having a length greater than the length of each of the distances (211 A, 212A, 221A-224A, 231 A-238A, 311 A, 312A, 321A-324A, 331A-338A, 411 A, 412A, 421A-424A, 431 A-436A, 511 A, 521A-523A, 531A-535A) between the apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616), the lengths being measured along the path of the line (201, 301, 401, 501);
    - laminating the middle layer (111) and the outer layers (121, 131) to form a security document, such that:
    o a first cross-section of the security document in a first plane (PA) crossing the line (201, 301, 401, 501) comprises an aperture (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616) of the middle layer (111); and
    o a second cross-section of the security document in a second plane (PB) crossing the line (201, 301, 401, 501) comprises a full middle layer (111) without any apertures (211, 212, 221-224, 231-238, 311, 312, 321-324, 331-338, 411, 412, 421-424, 431-436, 511, 512, 521-524, 531-536, 611-616).
EP15461534.8A 2015-05-20 2015-05-20 A security document and a method for manufacturing of a security document Withdrawn EP3095615A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP15461534.8A EP3095615A1 (en) 2015-05-20 2015-05-20 A security document and a method for manufacturing of a security document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP15461534.8A EP3095615A1 (en) 2015-05-20 2015-05-20 A security document and a method for manufacturing of a security document

Publications (1)

Publication Number Publication Date
EP3095615A1 true EP3095615A1 (en) 2016-11-23

Family

ID=53181230

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15461534.8A Withdrawn EP3095615A1 (en) 2015-05-20 2015-05-20 A security document and a method for manufacturing of a security document

Country Status (1)

Country Link
EP (1) EP3095615A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10479128B2 (en) * 2017-10-27 2019-11-19 Assa Abloy Ab Security feature

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2261054A1 (en) 2009-06-12 2010-12-15 Gemalto Oy A method of manufacturing a security page
WO2011138007A1 (en) * 2010-05-04 2011-11-10 Giesecke & Devrient Gmbh Data carrier comprising polymer substrate with motif region
WO2012072214A1 (en) * 2010-12-01 2012-06-07 Giesecke & Devrient Gmbh Data carrier with marking
WO2012117053A1 (en) * 2011-03-01 2012-09-07 Bundesdruckerei Gmbh Composite body and method for producing a composite body having an internal security feature
WO2013013807A1 (en) * 2011-07-25 2013-01-31 Giesecke & Devrient Gmbh Security element with window in the substrate
US20130043311A1 (en) * 2010-02-10 2013-02-21 De La Rue International Limited Security element for document of value
EP2722193A1 (en) 2012-10-19 2014-04-23 Gemalto SA Secure data carrier and method of production of said secure data carrier
WO2014180542A1 (en) * 2013-05-06 2014-11-13 Giesecke & Devrient Gmbh Multi-layered data carrier

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2261054A1 (en) 2009-06-12 2010-12-15 Gemalto Oy A method of manufacturing a security page
US20130043311A1 (en) * 2010-02-10 2013-02-21 De La Rue International Limited Security element for document of value
WO2011138007A1 (en) * 2010-05-04 2011-11-10 Giesecke & Devrient Gmbh Data carrier comprising polymer substrate with motif region
WO2012072214A1 (en) * 2010-12-01 2012-06-07 Giesecke & Devrient Gmbh Data carrier with marking
WO2012117053A1 (en) * 2011-03-01 2012-09-07 Bundesdruckerei Gmbh Composite body and method for producing a composite body having an internal security feature
WO2013013807A1 (en) * 2011-07-25 2013-01-31 Giesecke & Devrient Gmbh Security element with window in the substrate
EP2722193A1 (en) 2012-10-19 2014-04-23 Gemalto SA Secure data carrier and method of production of said secure data carrier
WO2014180542A1 (en) * 2013-05-06 2014-11-13 Giesecke & Devrient Gmbh Multi-layered data carrier

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10479128B2 (en) * 2017-10-27 2019-11-19 Assa Abloy Ab Security feature

Similar Documents

Publication Publication Date Title
AU2012328328B2 (en) Security element
EP2483082B1 (en) Data carrier having a window
EP2909041B1 (en) Secure data carrier and method of production of said secure data carrier
ES2569612T3 (en) Safety element and manufacturing method
JP6477682B2 (en) Card, card manufacturing method
US10696587B2 (en) Glass sheet with identification code
RU2649747C2 (en) Printed security feature, object comprising such printed security feature, and process of producing same
US10336123B2 (en) Multilayer security element
EP2499002B1 (en) Identification document and a method of producing
EP2209654B1 (en) Multilayered security document having at least two film elements and method for the production
JP2021154739A (en) Laminate
EP2110263A2 (en) Protective element (variants), method for the production thereof, counterfeit-proof material and value paper
EP3095615A1 (en) A security document and a method for manufacturing of a security document
EP3838611A1 (en) Security element for a data carrier, data carrier and method of production of the security element and use of the security element for production of a data carrier
WO2013143006A1 (en) Perforation-based security feature
WO2019058091A1 (en) A method of manufacturing a security sheet
WO2013143007A1 (en) Perforation-based security feature in a multilayer substrate
US20140125050A1 (en) Sheet Document having a Translucent or Transparent Region
KR101166652B1 (en) Multi-function security marking structure and processing method
KR102266337B1 (en) Method for visually customising an identity document comprising a latent image
JP2005262891A (en) Card using permeable raw material
JP4439138B2 (en) Card with transparent material
AU2015340387B2 (en) Identification document comprising a guilloche and and an arrangement of pixels
JP6252863B2 (en) Latent image printed matter
JP6505567B2 (en) IC tag manufacturing method

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

17P Request for examination filed

Effective date: 20170131

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

17Q First examination report despatched

Effective date: 20180309

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20201121