EP1319220B1 - Security system, particularly for valuable documents - Google Patents
Security system, particularly for valuable documents Download PDFInfo
- Publication number
- EP1319220B1 EP1319220B1 EP01960674A EP01960674A EP1319220B1 EP 1319220 B1 EP1319220 B1 EP 1319220B1 EP 01960674 A EP01960674 A EP 01960674A EP 01960674 A EP01960674 A EP 01960674A EP 1319220 B1 EP1319220 B1 EP 1319220B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- pattern
- security element
- verification
- light incidence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000012795 verification Methods 0.000 claims abstract description 121
- 238000000034 method Methods 0.000 claims abstract description 16
- 230000010287 polarization Effects 0.000 claims description 12
- 238000005286 illumination Methods 0.000 claims 2
- 239000000969 carrier Substances 0.000 claims 1
- 230000000694 effects Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000012447 hatching Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000000859 sublimation Methods 0.000 description 1
- 230000008022 sublimation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/128—Viewing devices
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
- G07D7/0032—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using holograms
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/207—Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
Definitions
- the invention relates to a security system, in particular for the authenticity verification of value documents, which consists of a security element and a verification element, which make information hidden by surface contact visible to one another, and corresponding security elements, verification elements and value documents.
- the invention further relates to methods and apparatus for reading the hidden information.
- a self-verifying value document which generally carries unrecognizable information at a location under normal observation.
- a verification element is applied, which can be made to coincide with the security information carrying the hidden information by folding the value document so that the hidden information becomes visible.
- a text written in microwriting in the security element is increased by means of an optical lens as a verification element when the verification element is brought to coincide with the security element by folding the value document.
- the security element and the verification element are designed such that they produce a so-called moiré pattern when covering the verification element with the security element.
- both the security element and the verification element may comprise a polarization element. With appropriate regionally different orientation of the polarization plane information can be made visible in this way.
- the DE 197 29 918 A shows a banknote with a security feature and a verification element for verifying this security feature, wherein at least one verification element and at least one security feature verifiable with this verification feature are integrated into the banknote at different locations. The verification element and the security element are superimposed for verification.
- the security or verification elements have an even higher degree of counterfeit security, so that on the one hand value documents can be made even more secure against forgery and the authenticity verification.
- a security system comprises a planar security element which is arranged in a carrier plane.
- the security element comprises a hologram carrier, which reconstructs a pattern holographic way, which lies outside the carrier plane under the incidence of light. Hidden information is stored in this pattern.
- the security system according to the invention comprises an at least partially transparent verification element which makes the information concealed in the pattern holographically generated by the security element readable when the security element is touched flat when exposed to light.
- a document of value or bill is thus at one point a security element.
- This security element is a hologram carrier.
- the hologram contained therein generates an image or pattern which is offset from the document to be protected and which can be two-dimensional or three-dimensional. In the pattern hidden information is stored. This hidden information, which is now at a distance from the document, can be read out with a verification element.
- the hidden information is thus not applied directly to the value document as in the case of known security features, but is only generated at a distance from the value document by holographic means.
- the hologram of the security element makes the counterfeiting significantly more difficult.
- the information stored in the holographically generated pattern can only be made visible by the verification element.
- the security element comprises a hologram, which generates a phase-modulated pattern when illuminated.
- the hidden information can be stored in such a way that the phase of the light in the area of the hidden information is different from the phase of the surrounding areas of the pattern.
- the verification element is then configured to convert this phase modulation to visible amplitude modulation. This is z. B. in a known manner by the phase contrast method or the Schlieren method possible.
- the verification element also comprises a hologram which reconstructs a corresponding pattern under light incidence, which generates the optical light pattern necessary for converting the phase modulation into an amplitude modulation.
- a security element which is a hologram, which in turn reconstructs a line pattern under the incidence of light outside the carrier plane.
- the verification element is also a hologram which generates a line pattern in the same plane outside the carrier plane.
- the line patterns are designed so that a moiré pattern results, as if two actually existing line patterns would be brought to coincide at the location of the holographically reconstructed line pattern.
- the security element in turn generates a pattern upon incidence of light on a holographic path outside the carrier plane.
- This pattern is amplitude modulated in a way that it is invisible to the naked eye.
- the verification element comprises a lens structure which, when the verification element is in contact with the security element, makes the amplitude modulation visible to the eye.
- the lens structure may be a strip lens structure.
- the necessary distance between the object to be imaged by the lens structure, in this case the holographically reconstructed pattern of the security element, is generated by the lens structure in that the holographically generated pattern lies outside the lens plane or the contact surface between the verification element and the security element.
- a corresponding lens structure can be used for verification, without this having a thickness necessary for the generation of this distance.
- the thickness is to be kept as small as possible.
- this embodiment according to the invention offers the possibility of exploiting the advantages of forgery prevention with the aid of lens structures even on thin documents of value.
- both the security element and the verification element generate a pattern outside the contact surface of the verification element and the security element when the light is incident on a holographic path. Both patterns created in this way each carry a different part of hidden information. Only when the verification element is brought to coincide with the security element, are under the light the two parts of the hidden information are reconstructed with the patterns and seen in their entirety.
- Another embodiment of the invention comprises a security element, which in turn reconstructs a pattern on the holographic path outside the carrier plane, which is polarization-modulated.
- the hidden information is generated in such a way that in the area of the information, the polarization is different than in the surrounding area.
- the verification element in this embodiment is a polarization filter with which the various polarizations can be made visible in a known manner. In this way the hidden information becomes recognizable.
- the security element can also generate a light pattern of constant polarization and the hidden information stored in a polarization-modulated verification element.
- the security element is again designed such that it reconstructs an amplitude-modulated pattern outside the carrier plane under the incidence of light.
- This amplitude modulation carries the hidden information.
- the verification element comprises a grid structure on a window element.
- the security element can be designed such that it generates a holographically generated pattern when the light is incident, but this is not a constant distance from the carrier level.
- the verification element must take into account this circumstance by appropriately adapted spatial frequencies. In such an embodiment, no information is visible in the level of the value document. Only the holographic reproduction produces the pattern in which the hidden information is stored. This pattern does not represent a plane but is at a varying distance from the plane of the security element. This changing distance can only be compensated with the aid of the verification element. In addition, the information is additionally hidden, in which they in the holographically generated, non-planar pattern z. B.
- the verification element has different tasks. On the one hand, it compensates for the different distance of the holographically generated pattern from the carrier plane. On the other hand, it makes the information hidden in the holographically generated pattern visible.
- the holographically generated pattern which results from incident light on the security element, may have different distances from the carrier plane.
- a 3D hologram can be generated.
- a bill can be in a 3D hologram, which generates a pattern in only a small distance from the carrier plane, keep the blur within tolerable limits.
- the information stored in the holographically generated pattern resulting from incident light on the security element can be read out with an external verification element.
- both the verification element and the security element are applied to one and the same value document.
- the elements can then be brought to coincidence in order to make the hidden information visible. This way is a Self-verifying system possible.
- the same effect can be achieved by juxtaposition of two bills in a corresponding orientation.
- the pattern reconstructed by the incidence of light on the security element can be virtual or even real, ie can be imaged on a screen.
- a security element according to the invention for use in a security system according to the invention comprises a hologram structure which reconstructs a pattern with hidden information outside the carrier plane in the event of incidence of light by holographic means.
- a verification element according to the invention for use with a security system according to the invention serves to visualize the hidden information which is reconstructed by a security element according to the invention outside the carrier plane of the security element when light is incident.
- the verification element is at least partially transparent.
- the verification element may carry another security feature. It can, for.
- another hologram structure may be applied which produces another image superimposed on the hidden information like a background.
- a value document according to the invention comprises a security element according to the invention and / or a verification element according to the invention.
- a verification element according to the invention is brought into coincidence with the security element.
- the security element and the verification element on an object eg. As a banknote provided, it is advantageous if the verification element with the security element through Folding of the document is brought to coincidence. In this way, a verification is possible without further aids are necessary.
- the security system according to the invention can be designed so that it makes the hidden information with appropriate coverage of the verification element and the security element with appropriate incidence visible to the naked eye.
- a device according to the invention which enables verification by machine.
- Such a device comprises a device which brings the security element with a verification element to cover.
- the verification element may be part of the device or be applied to the object to be verified itself and be brought by machine folding with the security element to coincide.
- a lighting device is provided which illuminates the security element and verification elements brought to cover.
- the hidden information is visible and readable by means of a read-out device.
- This can be z.
- B. be a corresponding brightness detector that can detect differences in brightness in the hidden information.
- the read-out device may comprise a camera which allows image processing and evaluation of the image of the hidden information.
- FIG. 1 shows a value document 1, for example a banknote, with a verification element 3 and a security element 5.
- the verification element is indicated by hatching.
- the security element 5 comprises a hologram carrier.
- this hologram carrier generates a pattern outside the plane of the document 1 when light enters, e.g. B. the bill.
- the thus holographically generated pattern advantageously has a distance 7 of 100 to 300 ⁇ m from the surface of the bill 1.
- the reference numerals 1, 3, 5, 7 and 9 are generally used in the following for various embodiments.
- the security element 5 In an embodiment in which the verification element 3 carries a line grid, the security element 5 generates a holographic pattern upon incidence of light, which is likewise modulated in a strip shape. If one brings a verification element 3 with the security element 5 to cover, the line grid of the verification element has a distance from the holographically generated pattern. In this way, by tilting z. For example, the area below the line grid can be made visible or by vertical line of sight the area between the line grid of the verification element 3. In this way, tilting effects can be generated, which are otherwise visible only in the presence of an actual distance between the grid pattern and the image plane.
- Fig. 7 such an embodiment is schematically visible in the side sectional view. Shown is a folded bill 1, have been brought in the verification element 403 and security element 5, 405 to cover. This is the position during the read-out process.
- the term "readout" is generally used in this specification for verification, whether by the naked eye or by machine.
- the verification element is transparent and with a z. B. printed strip pattern provided. Due to the distance 7, the region of the holographically generated pattern 400, which is visible through the stripe pattern of the verification element 3, 403, depends on the viewing direction on the security element 5, 405. Depending on the viewing direction z. B. the area below the stripe pattern 3, 403 be visible, or the area between the strip of the verification element 3, 403rd
- the security element 5, which is visible in FIG. 1, can also be a hologram carrier, which generates a phase-modulated pattern outside the plane of the banknote 1 when the light is incident.
- the verification element 3 is an element that converts this phase modulation into an amplitude modulation. Is this phase modulation z. B. in the form of letters OK, the hidden information "OK" 6 is visible to the eye 8 by placing the verification element 3 with the security element 5, as shown in Figure 2, the hidden information.
- the security element 5, 205 generates a line pattern 200 when light falls outside the plane of the bill 1.
- the verification element 3, 203 generates a line pattern upon incidence of light in the same plane outside the bill 1, when verification element 3, 203 and security element 5, 205 are superposed.
- the line patterns are set to give a moiré pattern, as is known for the superposition of actual line patterns. In this moiré pattern information can be stored by appropriate arrangement of the holographically generated lines, so that z. B. again the font "OK" is recognizable.
- the security element 5,105 can also produce a pattern 100 outside the plane of the bill 1, which is made visible by means of a lens structure 102 in the verification element 3, 103, z.
- a certain distance 7 from the lens structure of the pattern to be imaged is necessary, which according to the invention is obtained by the holographic reconstruction of the pattern 100.
- the lens structure 102 thus does not need to have a certain thickness, as usual, to produce this distance from the object to be imaged. Possible is z. B. a lenticular lens structure.
- a simple other embodiment comprises a security element 5, which reconstructs outside the plane of the bill 1 a holographically generated pattern upon incidence of light, which carries only a portion of information that is not meaningful on its own.
- the verification element 3 comprises a comparable holographic structure which reconstructs in the same plane outside the bill 1 a holographically generated pattern representing the remaining part of the information. If now the verification element is brought into coincidence together with the security element and exposed to light, then both parts of the hidden information become visible and can be read out together.
- the partial information generated holographically by illuminating the security element 5 may include parts of the letters O and K that are not per se recognizable as such.
- the remaining remaining parts of the letters O and K are holographically generated by illuminating the verification element in the same place when the two elements come to rest on each other. In this way the whole picture becomes OK.
- a security element 5, 305 which generates a pattern 300 holographically outside the plane 9 of the bill 1, which has different polarization in different areas. While z.
- the polarization in the area of the letters O and K is horizontally polarized.
- the verification element 3, 303 is a polarizing filter that is polarized perpendicularly. In this way, the horizontally polarized light from the regions of the holographically generated pattern corresponding to the letters O and K can not pass through the verification element 3, 303, so that they appear black.
- the holographically generated distance 7 between the reconstructed pattern of the security element makes the forgery more difficult.
- An ordinary direct Storing the information on the bill is easier to imitate than a hologram having corresponding information in a staggered plane.
- the information is such that it can only be read out with the aid of the verification element. Without such a verification element, the holographically stored information is not recognizable.
- An even higher security against counterfeiting can be achieved if the holographically generated pattern 505 has no constant distance 7 from the bill 1, but z. B. reconstructed in a wavy surface or in a stepped surface, see Figure 8 in the diagram. Again, the ripple is much smaller than shown.
- the verification element 3, 503 is designed such that it does not account for this non-constant distance, wherein this can be achieved by a corresponding spatial frequency of the verification element.
- the necessary hologram structures for the above embodiments may, for. B. optically produced or computer generated in conventional ways. They can of course be provided in different places or even several times on the bill. Likewise, z. B. an arrangement in two opposite corners of the bill conceivable.
- the security element can produce both a virtual and a real image that can be captured on a screen.
- the verification element 3 is at least partially transparent. Thus, light can strike the security element through the verification element and make the holographic pattern stored behind the banknote 1 visible. Viewing this pattern through the verification element reveals the hidden information.
- a security feature can still be provided on the verification element itself, for. B. another hologram structure that causes a different optical effect to further increase the security against counterfeiting.
- the transparency of the verification element must remain sufficient that the hidden information can still be read.
- FIG. 2 shows the read-out process.
- Viewer 8 sees the collated bill 1.
- the verification element 3 lying on the security element 5 makes visible the information hidden in the pattern holographically generated by the security element 5.
- a mechanical arrangement for reading the security system is shown schematically.
- the bill 1 is folded by machine, so that verification element 3 and security element 5 come to rest on each other.
- the bill folded in this way is brought into the beam path of a lighting device 10 with a light direction 12.
- the light beam 12 passes through the verification element 3 on the security element 5, which is not visible in FIG.
- the holographically generated pattern is detected by the verification element 3, which is at least partially transparent, with the aid of the camera 14, z.
- the verification element 3 recognizes the hidden information that is visible in the holographically generated pattern.
- the image thus generated with the visible hidden information is transmitted from the camera 14 z. B. a computer unit 16.
- an evaluation of the image can be made, for. For example, a comparison with expected images to verify authenticity.
- the light source 10 may also be arranged behind the folded bill 1.
- the security system according to the invention thus offers the advantage that the hidden information is stored in a pattern which is not in the plane of the bill or the value document 1. Instead, the pattern outside the value document 1 is holographically generated. This makes the counterfeiting significantly more difficult.
- holographic displacement of the pattern with the hidden information enables verification by means of elements which normally must be some distance from the hidden information pattern, e.g. As lenticular lens structures or line grid with a tilting effect. In the invention, no increased thickness is necessary because the distance is generated holographically.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Toxicology (AREA)
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Business, Economics & Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Holo Graphy (AREA)
- Credit Cards Or The Like (AREA)
- Preparation Of Compounds By Using Micro-Organisms (AREA)
- Radar Systems Or Details Thereof (AREA)
- Burglar Alarm Systems (AREA)
- Saccharide Compounds (AREA)
Abstract
Description
Die Erfindung betrifft ein Sicherheitssystem insbesondere zur Echtheitsverifikation von Wertdokumenten, das aus einem Sicherheitselement und einem Verifikationselement besteht, die durch flächige Berührung miteinander versteckte Information sichtbar machen, und entsprechende Sicherheitselemente, Verifikationselemente und Wertdokumente. Die Erfindung betrifft weiterhin Verfahren und Vorrichtungen zum Auslesen der versteckten Information.The invention relates to a security system, in particular for the authenticity verification of value documents, which consists of a security element and a verification element, which make information hidden by surface contact visible to one another, and corresponding security elements, verification elements and value documents. The invention further relates to methods and apparatus for reading the hidden information.
Dokumente, Urkunden, Banknoten, Ausweise, Plastikkarten etc. lassen sich mit Hilfe moderner hochauflösender Farbscanner sowie mit Hilfe von Farblaserdruckem bzw. Thermosublimationsdruckern detailgetreu und farbecht reproduzieren. Auch durch die allgemeine Erhältlichkeit von Farbkopierern ist es wesentlich einfacher geworden, hochwertige Fälschungen herzustellen.Documents, certificates, banknotes, identity cards, plastic cards, etc. can be reproduced with the help of modern high-resolution color scanners and with the help of color laser printers or thermal sublimation printers in true to detail and colourfast. Also by the general availability of color copiers, it has become much easier to produce high-quality counterfeits.
Es besteht daher ein Bedürfnis, Dokumente, Ausweise, Banknoten, Wertpapiere, Plastikkarten etc. durch zusätzlich aufgebrachte Sicherheitsmerkmale fälschungssicher zu machen. Durch derartige Sicherheitsmerkmale kann zumindest bewirkt werden, daß die Herstellung einer qualitativ hochwertigen Fälschung stark verteuert wird. Als derartige Sicherheitsmerkmale sind Wasserzeichen, Seidenfäden, verschlungene Linienstrukturen, sowie die Verwendung besonderen Papiers bekannt. Auch das Aufbringen von metallisierten Prägehologrammen auf Banknoten, Kreditkarten und Euroscheckkarten hat sich inzwischen allgemein durchgesetzt.There is therefore a need to make documents, ID cards, banknotes, securities, plastic cards, etc. counterfeit-proof by additionally applied security features. Such security features can at least make the production of a high quality counterfeit strong becomes more expensive. As such security features are watermarks, silk threads, intricate line structures, and the use of special paper known. The application of metallized embossed holograms on banknotes, credit cards and euro check cards has now become generally accepted.
Aus
Bei den derzeit immer sich verbessernden Kopier- und Fälschungstechniken besteht jedoch die Gefahr, daß derartige flächige Elemente keine ausreichende Fälschungssicherheit bieten. So kann z. B. erwartet werden, daß auch in Mikroschrift aufgebrachter Text mit einem Kopierer ausreichender Auflösung reproduziert werden kann. Ebenso können gegebenenfalls die Muster zur Erzeugung eines Moiré-Musters reproduziert werden.However, with the ever-improving copying and counterfeiting techniques, there is a risk that such sheet-like elements will not provide adequate counterfeit security. So z. For example, it can be expected that even microformed text can be reproduced with a copier of sufficient resolution. Also, if necessary, the patterns for producing a moiré pattern can be reproduced.
Die
Wünschenswert ist es also, daß die Sicherheits- bzw. Verifikationselemente einen noch höheren Fälschungssicherheitsgrad aufweisen, so daß zum einen Wertdokumente noch fälschungssicherer gemacht werden können und die Echtheitsverifikation zuverlässiger.It is therefore desirable that the security or verification elements have an even higher degree of counterfeit security, so that on the one hand value documents can be made even more secure against forgery and the authenticity verification.
Diese Aufgabe mit wird einem Sicherheitssystem mit den Merkmalen des Anspruchs 1, ein Sicherheitselement mit den Merkmalen des Anspruchs 15, ein Verifikationselement mit den Merkmalen des Anspruchs 16, ein Wertdokument mit den Merkmalen eines der Ansprüche 18 bis 20, einem Ausleseverfahren mit den Merkmalen des Anspruchs 22 bzw. einer Auslesevorrichtung mit den Merkmalen des Anspruchs 24 erreicht.This object is achieved with a security system having the features of
Ein erfindungsgemäßes Sicherheitssystem umfaßt ein flächiges Sicherheitselement, das in einer Trägerebene angeordnet ist. Das Sicherheitselement umfaßt einen Hologrammträger, der unter Lichteinfall auf holographischem Wege ein Muster rekonstruiert, das außerhalb der Trägerebene liegt. In diesem Muster ist versteckte Information gespeichert. Weiterhin umfaßt das erfindungsgemäße Sicherheitssystem ein zumindest teilweise transparentes Verifikationselement, das bei flächiger Berührung des Sicherheitselements unter Lichteinfall die in dem durch das Sicherheitselement holographisch erzeugten Muster versteckte Information auslesbar macht.A security system according to the invention comprises a planar security element which is arranged in a carrier plane. The security element comprises a hologram carrier, which reconstructs a pattern holographic way, which lies outside the carrier plane under the incidence of light. Hidden information is stored in this pattern. Furthermore, the security system according to the invention comprises an at least partially transparent verification element which makes the information concealed in the pattern holographically generated by the security element readable when the security element is touched flat when exposed to light.
Auf bzw. in dem zu sichernden Gegenstand, z. B. einem Wertdokument oder Geldschein befindet sich also an einer Stelle ein Sicherheitselement. Dieses Sicherheitselement ist ein Hologrammträger. Das darin enthaltene Hologramm erzeugt bei Lichteinfall ein gegenüber dem zu sichernden Dokument versetztes Bild bzw. Muster, welches zweidimensional oder dreidimensional sein kann. In dem Muster ist eine versteckte Information gespeichert. Diese versteckte Information, die sich nun in einem Abstand von dem Dokument befindet, kann mit einem Verifikationselement ausgelesen werden.On or in the object to be secured, z. B. a document of value or bill is thus at one point a security element. This security element is a hologram carrier. The hologram contained therein generates an image or pattern which is offset from the document to be protected and which can be two-dimensional or three-dimensional. In the pattern hidden information is stored. This hidden information, which is now at a distance from the document, can be read out with a verification element.
Die versteckte Information ist also nicht wie bei bekannten Sicherheitsmerkmalen direkt auf dem Wertdokument aufgebracht, sondern wird auf holographischem Wege erst in einem Abstand von dem Wertdokument erzeugt. Das Hologramm des Sicherheitselements erschwert die Fälschung signifikant. Im Gegensatz zu bisher bereits als Sicherheitselement eingesetzten Hologrammen ist die Information, die in dem holographisch erzeugten Muster gespeichert ist, jedoch erst durch das Verifikationselement sichtbar zu machen.The hidden information is thus not applied directly to the value document as in the case of known security features, but is only generated at a distance from the value document by holographic means. The hologram of the security element makes the counterfeiting significantly more difficult. In contrast to holograms already used as a security element, however, the information stored in the holographically generated pattern can only be made visible by the verification element.
Auf diese Weise wird ein sehr viel besserer Fälschungsschutz erreicht. Zudem ist die Information ohne Verifikationselement nicht erkennbar und somit nicht kopierbar.In this way a much better counterfeit protection is achieved. In addition, the information without verification element is not recognizable and thus not copied.
Bei einer vorteilhaften Ausgestaltung des Sicherheitssystems umfaßt das Sicherheitselement ein Hologramm, das bei Beleuchtung ein phasenmoduliertes Muster erzeugt. Die versteckte Information kann dabei derart gespeichert sein, daß die Phase des Lichts im Bereich der versteckten Information eine andere ist, als die Phase der umgebenden Bereiche des Musters. Das Verifikationselement ist dann derart ausgestaltet, daß es diese Phasenmodulation in eine sichtbare Amplitudenmodulation umwandelt. Dies ist z. B. in bekannter Weise durch das Phasenkontrastverfahren oder das Schlierenverfahren möglich.In an advantageous embodiment of the security system, the security element comprises a hologram, which generates a phase-modulated pattern when illuminated. The hidden information can be stored in such a way that the phase of the light in the area of the hidden information is different from the phase of the surrounding areas of the pattern. The verification element is then configured to convert this phase modulation to visible amplitude modulation. This is z. B. in a known manner by the phase contrast method or the Schlieren method possible.
In noch vorteilhafterer Ausgestaltung umfaßt auch das Verifikationselement ein Hologramm, das ein entsprechendes Muster unter Lichteinfall rekonstruiert, das die zur Umwandlung der Phasenmodulation in eine Amplitudenmodulation notwendigen optischen Lichtmuster erzeugt.In an even more advantageous embodiment, the verification element also comprises a hologram which reconstructs a corresponding pattern under light incidence, which generates the optical light pattern necessary for converting the phase modulation into an amplitude modulation.
Eine andere vorteilhafte Ausgestaltung des erfindungsgemäßen Sicherheitssystems umfaßt ein Sicherheitselement, das ein Hologramm ist, das unter Lichteinfall wiederum außerhalb der Trägerebene ein Linienmuster rekonstruiert. Auch das Verifikationselement ist ein Hologramm, das in derselben Ebene außerhalb der Trägerebene ein Linienmuster erzeugt. Die Linienmuster sind dabei so ausgestaltet, daß sich ein Moiré-Muster ergibt, wie wenn zwei tatsächlich vorhandene Linienmuster an der Stelle der holographisch rekonstruierten Linienmuster zur Deckung gebracht werden würden. Durch entsprechende Ausgestaltung der Hologramme und der damit erzeugten Linienmuster läßt sich in dem Moiré-Muster Information speichern, die nur bei Überdeckung sichtbar ist.Another advantageous embodiment of the security system according to the invention comprises a security element, which is a hologram, which in turn reconstructs a line pattern under the incidence of light outside the carrier plane. The verification element is also a hologram which generates a line pattern in the same plane outside the carrier plane. The line patterns are designed so that a moiré pattern results, as if two actually existing line patterns would be brought to coincide at the location of the holographically reconstructed line pattern. By appropriate design of the holograms and the line pattern generated thereby can be stored in the moiré pattern information that is visible only when overlapping.
Bei einer anderen vorteilhaften Ausgestaltung des erfindungsgemäßen Sicherheitssystems erzeugt das Sicherheitselement wiederum ein Muster bei Lichteinfall auf holographischem Wege außerhalb der Trägerebene. Dieses Muster ist amplitudenmoduliert in einer Weise, daß es mit bloßem Auge nicht erkennbar ist. Das Verifikationselement umfaßt eine Linsenstruktur, die beim Aufeinanderliegen des Verifikationselements mit dem Sicherheitselement die Amplitudenmodulation für das Auge sichtbar macht. Zum Beispiel kann die Linsenstruktur eine Streifenlinsenstruktur sein.In another advantageous embodiment of the security system according to the invention, the security element in turn generates a pattern upon incidence of light on a holographic path outside the carrier plane. This pattern is amplitude modulated in a way that it is invisible to the naked eye. The verification element comprises a lens structure which, when the verification element is in contact with the security element, makes the amplitude modulation visible to the eye. For example, the lens structure may be a strip lens structure.
Bei der Ausgestaltung wird der nötige Abstand zwischen dem durch die Linsenstruktur abzubildenden Objekt, in diesem Fall des holographisch rekonstruierten Musters des Sicherheitselements, von der Linsenstruktur dadurch erzeugt, daß das holographisch erzeugte Muster außerhalb der Linsenebene bzw. der Berührungsfläche zwischen Verifikationselement und Sicherheitselement liegt. Auf diese Weise kann eine entsprechende Linsenstruktur zur Verifikation eingesetzt werden, ohne daß diese eine zur Erzeugung dieses Abstands notwendige Dicke aufweist. Gerade bei Wertdokumenten wie Geldscheinen ist die Dicke jedoch möglichst klein zu halten. Insofern bietet diese erfindungsgemäße Ausgestaltung die Möglichkeit, auch auf dünnen Wertdokumenten die Vorteile der Fälschungssicherung mit Hilfe von Linsenstrukturen auszunutzen.In the embodiment, the necessary distance between the object to be imaged by the lens structure, in this case the holographically reconstructed pattern of the security element, is generated by the lens structure in that the holographically generated pattern lies outside the lens plane or the contact surface between the verification element and the security element. In this way, a corresponding lens structure can be used for verification, without this having a thickness necessary for the generation of this distance. Especially in value documents such as bills, the thickness is to be kept as small as possible. In this respect, this embodiment according to the invention offers the possibility of exploiting the advantages of forgery prevention with the aid of lens structures even on thin documents of value.
In anderer Ausgestaltung der Erfindung erzeugen sowohl das Sicherheitselement als auch das Verifikationselement bei Lichteinfall auf holographischem Wege ein Muster außerhalb der Berührungsfläche von Verifikationselement und Sicherheitselement. Beide so erzeugten Muster tragen jeweils einen unterschiedlichen Teil versteckter Information. Erst wenn das Verifikationselement mit dem Sicherheitselement zur Deckung gebracht wird, werden unter Lichteinfall die beiden Teile der versteckten Information mit den Mustern rekonstruiert und in ihrer Gesamtheit erkennbar.In another embodiment of the invention, both the security element and the verification element generate a pattern outside the contact surface of the verification element and the security element when the light is incident on a holographic path. Both patterns created in this way each carry a different part of hidden information. Only when the verification element is brought to coincide with the security element, are under the light the two parts of the hidden information are reconstructed with the patterns and seen in their entirety.
Eine andere Ausgestaltung der Erfindung umfaßt ein Sicherheitselement, das wiederum auf holographischem Wege außerhalb der Trägerebene ein Muster rekonstruiert, das polarisationsmoduliert ist. Die versteckte Information wird dabei derart erzeugt, daß in dem Bereich der Information die Polarisation anders ist als im umgebenden Bereich. Das Verifikationselement ist bei dieser Ausgestaltung ein Polarisationsfilter, mit dem in bekannter Weise die verschiedenen Polarisationen sichtbar gemacht werden können. Auf diese Weise wird die versteckte Information erkennbar. Ebenso kann das Sicherheitselement auch ein Lichtmuster konstanter Polarisation erzeugen und die versteckte Information in einem polarisationsmodulierten Verifikationselement gespeichert sein.Another embodiment of the invention comprises a security element, which in turn reconstructs a pattern on the holographic path outside the carrier plane, which is polarization-modulated. The hidden information is generated in such a way that in the area of the information, the polarization is different than in the surrounding area. The verification element in this embodiment is a polarization filter with which the various polarizations can be made visible in a known manner. In this way the hidden information becomes recognizable. Likewise, the security element can also generate a light pattern of constant polarization and the hidden information stored in a polarization-modulated verification element.
In einer weiteren Ausgestaltung der Erfindung ist das Sicherheitselement wiederum so ausgestaltet, daß es außerhalb der Trägerebene unter Lichteinfall ein amplitudenmoduliertes Muster rekonstruiert. Diese Amplitudenmodulation trägt die versteckte Information. Das Verifikationselement umfaßt eine Rasterstruktur auf einem Fensterelement. Durch entsprechende Anpassung der Form der Rasterstruktur und der holographisch erzeugten Amplitudenmodulation kann aufgrund des holographisch erzeugten Abstandes zwischen der Rasterstruktur und der Amplitudenmodulation ein Kippeffekt erreicht werden. Je nach Blickrichtung auf das Raster des Verifikationselements wird z. B. unter die Linien der Rasterstruktur gesehen und die dort vorhandene Information sichtbar. Andererseits wird bei senkrechtem Blick auf die Verifikationsrasterstruktur die Information sichtbar, die zwischen den Rasterlinien des Verifikationselements sichtbar ist. Auf diese Weise kann Information je nach Kippwinkel der aufeinanderliegenden Elemente sichtbar gemacht werden.In a further embodiment of the invention, the security element is again designed such that it reconstructs an amplitude-modulated pattern outside the carrier plane under the incidence of light. This amplitude modulation carries the hidden information. The verification element comprises a grid structure on a window element. By appropriate adaptation of the shape of the raster structure and the holographically generated amplitude modulation, a tilting effect can be achieved due to the holographically generated distance between the raster structure and the amplitude modulation. Depending on the viewing direction of the grid of the verification element z. B. seen under the lines of the grid structure and the information available there visible. On the other hand, with a vertical view of the verification grid structure, the information visible between the grid lines of the verification element becomes visible. In this way, information can be made visible depending on the tilt angle of the superimposed elements.
Um eine noch größere Fälschungssicherheit zu erlangen, kann das Sicherheitselement derart ausgestaltet sein, daß es unter Lichteinfall ein holographisch erzeugtes Muster erzeugt, das jedoch keinen konstanten Abstand von der Trägerebene hat. Das Verifikationselement muß diesem Umstand durch entsprechend angepaßte Ortsfrequenzen Rechnung tragen. Bei einer solchen Ausgestaltung ist keine Information in der Ebene des Wertdokuments sichtbar. Erst durch die holographische Reproduktion wird überhaupt das Muster erzeugt, in dem die versteckte Information gespeichert ist. Dieses Muster stellt keine Ebene dar, sondern hat einen wechselnden Abstand von der Ebene des Sicherheitselements. Dieser wechselnde Abstand kann nur mit Hilfe des Verifikationselements ausgeglichen werden. Zudem ist die Information noch zusätzlich verborgen, in dem sie in dem holographisch erzeugten, nicht ebenen Muster z. B. nur als Phasenmodulation, Polarisationsmodulation oder Linienmuster zur Erzeugung eines Moiré-Musters gespeichert ist. In diesem Fall hat das Verifikationselement also verschiedene Aufgaben. Zum einen gleicht es den unterschiedlichen Abstand des holographisch erzeugten Musters von der Trägerebene aus. Zum anderen macht es die in dem holographisch erzeugten Muster versteckte Information sichtbar.In order to obtain an even greater protection against counterfeiting, the security element can be designed such that it generates a holographically generated pattern when the light is incident, but this is not a constant distance from the carrier level. The verification element must take into account this circumstance by appropriately adapted spatial frequencies. In such an embodiment, no information is visible in the level of the value document. Only the holographic reproduction produces the pattern in which the hidden information is stored. This pattern does not represent a plane but is at a varying distance from the plane of the security element. This changing distance can only be compensated with the aid of the verification element. In addition, the information is additionally hidden, in which they in the holographically generated, non-planar pattern z. B. is stored only as a phase modulation, polarization modulation or line pattern for generating a moiré pattern. In this case, the verification element has different tasks. On the one hand, it compensates for the different distance of the holographically generated pattern from the carrier plane. On the other hand, it makes the information hidden in the holographically generated pattern visible.
Das holographisch erzeugte Muster, das durch Lichteinfall auf das Sicherheitselement entsteht, kann verschiedene Abstände von der Trägerebene haben. Besonders vorteilhaft ist jedoch die Größenordnung von einigen 100 µm, vorteilhafterweise 100 bis 300 µm. Auf diese Weise läßt sich ein 3D-Hologramm erzeugen. Trotz der Schwierigkeiten, die sich beim Aufbringen bzw. Einbringen eines Hologramms auf die rauhe Oberfläche z. B. eines Geldscheins ergeben, läßt sich bei einem 3D-Hologramm, das ein Muster in nur so geringem Abstand von der Trägerebene erzeugt, die Unschärfe in tolerierbaren Grenzen halten.The holographically generated pattern, which results from incident light on the security element, may have different distances from the carrier plane. However, the order of magnitude of a few 100 μm, advantageously 100 to 300 μm, is particularly advantageous. In this way, a 3D hologram can be generated. Despite the difficulties involved in applying or introducing a hologram on the rough surface z. B. a bill, can be in a 3D hologram, which generates a pattern in only a small distance from the carrier plane, keep the blur within tolerable limits.
Die Information, die in dem holographisch erzeugten Muster gespeichert ist, das durch Lichteinfall auf das Sicherheitselement entsteht, kann mit einem externen Verifikationselement ausgelesen werden. Besonders vorteilhaft ist es jedoch, wenn auf ein und demselben Wertdokument sowohl das Verifikationselement als auch das Sicherheitselement aufgebracht sind. Durch entsprechendes Falten des Wertdokuments können die Elemente dann zur Deckung gebracht werden, um die versteckte Information sichtbar zu machen. Auf diese Weise ist ein selbstverifizierendes System möglich. Bei entsprechender Anordnung der Elemente auf den Geldscheinen kann derselbe Effekt auch durch Aufeinanderliegen zweier Geldscheine in entsprechender Ausrichtung erreicht werden.The information stored in the holographically generated pattern resulting from incident light on the security element can be read out with an external verification element. However, it is particularly advantageous if both the verification element and the security element are applied to one and the same value document. By appropriate folding of the value document, the elements can then be brought to coincidence in order to make the hidden information visible. This way is a Self-verifying system possible. With appropriate arrangement of the elements on the bills, the same effect can be achieved by juxtaposition of two bills in a corresponding orientation.
Das durch Lichteinfall auf das Sicherheitselement rekonstruierte Muster kann je nach Ausgestaltung virtuell oder auch reell, also auf einem Schirm abbildbar, sein.Depending on the embodiment, the pattern reconstructed by the incidence of light on the security element can be virtual or even real, ie can be imaged on a screen.
Ein erfindungsgemäßes Sicherheitselement zur Verwendung in einem erfindungsgemäßen Sicherheitssystem umfaßt eine Hologrammstruktur, die bei Lichteinfall auf holographischem Wege ein Muster mit einer versteckten Information außerhalb der Trägerebene rekonstruiert. Ein erfindungsgemäßes Verifikationselement zum Einsatz mit einem erfindungsgemäßen Sicherheitssystem dient der Sichtbarmachung der versteckten Information, die von einem erfindungsgemäßen Sicherheitselement außerhalb der Trägerebene des Sicherheitselements rekonstruiert wird, wenn Licht einfällt.A security element according to the invention for use in a security system according to the invention comprises a hologram structure which reconstructs a pattern with hidden information outside the carrier plane in the event of incidence of light by holographic means. A verification element according to the invention for use with a security system according to the invention serves to visualize the hidden information which is reconstructed by a security element according to the invention outside the carrier plane of the security element when light is incident.
Das Verifikationselement ist zumindest teilweise transparent. Zusätzlich zu den Strukturen, die der Sichtbarmachung der versteckten Information dienen, kann das Verifikationselement ein weiteres Sicherheitsmerkmal tragen. Es kann z. B. eine weitere Hologrammstruktur aufgebracht sein, die ein anderes Bild erzeugt, das der versteckten Information wie ein Hintergrund überlagert ist.The verification element is at least partially transparent. In addition to the structures that serve to visualize the hidden information, the verification element may carry another security feature. It can, for. For example, another hologram structure may be applied which produces another image superimposed on the hidden information like a background.
Ein erfindungsgemäßes Wertdokument umfaßt ein erfindungsgemäßes Sicherheitselement und/oder ein erfindungsgemäßes Verifikationselement.A value document according to the invention comprises a security element according to the invention and / or a verification element according to the invention.
Bei einem erfindungsgemäßen Verfahren zum Auslesen der Information, die in dem unter Lichteinfall auf dem Sicherheitselement holographisch rekonstruierten Muster versteckt ist, wird ein erfindungsgemäßes Verifikationselement mit dem Sicherheitselement zur Deckung gebracht. Ist das Sicherheitselement und das Verifikationselement auf einem Gegenstand, z. B. einem Geldschein, vorgesehen, ist es vorteilhaft, wenn das Verifikationselement mit dem Sicherheitselement durch Faltung des Dokuments zur Deckung gebracht wird. Auf diese Weise ist eine Verifikation möglich, ohne daß weitere Hilfsmittel notwendig sind.In a method according to the invention for reading out the information which is hidden in the pattern holographically reconstructed on the security element when the light is incident, a verification element according to the invention is brought into coincidence with the security element. Is the security element and the verification element on an object, eg. As a banknote provided, it is advantageous if the verification element with the security element through Folding of the document is brought to coincidence. In this way, a verification is possible without further aids are necessary.
Das erfindungsgemäße Sicherheitssystem kann so ausgestaltet sein, daß es bei entsprechender Überdeckung des Verifikationselements und des Sicherheitselements die versteckte Information bei entsprechendem Lichteinfall für das bloße Auge sichtbar macht. Es kann jedoch auch eine erfindungsgemäße Vorrichtung-vorgesehen sein, die die Verifikation maschinell ermöglicht. Eine solche Vorrichtung umfaßt eine Einrichtung, die das Sicherheitselement mit einem Verifikationselement zur Deckung bringt. Dabei kann das Verifikationselement Teil der Vorrichtung sein oder auf dem zu verifizierenden Gegenstand selbst aufgebracht sein und durch maschinelle Faltung mit dem Sicherheitselement zur Deckung gebracht werden. Eine Beleuchtungseinrichtung ist vorgesehen, die die zur Deckung gebrachten Sicherheitselement und Verifikationselemente beleuchtet. So wird die versteckte Information sichtbar und mit Hilfe einer Ausleseeinrichtung auslesbar. Dies kann z. B. ein entsprechender Helligkeitsdetektor sein, der Helligkeitsunterschiede in der versteckten Information nachweisen kann. Schließlich kann die Ausleseeinrichtung eine Kamera umfassen, die eine Bildverarbeitung und Auswertung des Bildes der versteckten Information ermöglicht.The security system according to the invention can be designed so that it makes the hidden information with appropriate coverage of the verification element and the security element with appropriate incidence visible to the naked eye. However, it is also possible to provide a device according to the invention which enables verification by machine. Such a device comprises a device which brings the security element with a verification element to cover. In this case, the verification element may be part of the device or be applied to the object to be verified itself and be brought by machine folding with the security element to coincide. A lighting device is provided which illuminates the security element and verification elements brought to cover. Thus, the hidden information is visible and readable by means of a read-out device. This can be z. B. be a corresponding brightness detector that can detect differences in brightness in the hidden information. Finally, the read-out device may comprise a camera which allows image processing and evaluation of the image of the hidden information.
Erfindungsgemäße Ausführungsformen der Erfindung werden anhand beiliegender Figuren erläutert. Dabei zeigt
- Fig. 1
- schematisch ein erfindungsgemäßes Wertdokument mit einem erfindungsgemäßen Sicherheitssystem,
- Fig. 2
- schematisch den Auslesevorgang gemäß einem erfindungsgemäßen Verfahren,
- Fig. 3
- schematisch einen erfindungsgemäßen maschinellen Auslesevorgang,
- Fig. 4
- schematisch eine seitliche Schnittansicht einer Ausführungsform eines erfindungsgemäßen Wertdokuments während des Auslesevorgangs,
- Fig.5
- schematisch eine andere Ausführungsform des erfindungsgemäßen Wertdokuments während des Auslesevorgangs im seitlichen Schnitt,
- Fig.6
- schematisch eine weitere Ausführungsform eines erfindungsgemäßen Wertdokuments während des Auslesevorgangs im seitlichen Schnitt,
- Fig. 7
- schematisch eine weitere Ausführungsform eines erfindungsgemäßen Wertdokuments während des Auslesevorgangs im seitlichen Schnitt, und
- Fig.8
- schematisch eine weitere Ausführungsform eines erfindungsgemäßen Wertdokuments während des Auslesevorgangs im seitlichen Schnitt.
- Fig. 1
- 1 schematically a value document according to the invention with a security system according to the invention,
- Fig. 2
- schematically the readout process according to a method according to the invention,
- Fig. 3
- schematically a machine readout according to the invention,
- Fig. 4
- 1 is a schematic sectional side view of an embodiment of a value document according to the invention during the read-out process;
- Figure 5
- schematically another embodiment of the inventive document of value during the reading process in the lateral section,
- Figure 6
- schematically another embodiment of a value document according to the invention during the read-out in the lateral section,
- Fig. 7
- schematically a further embodiment of a value document according to the invention during the read-out in the lateral section, and
- Figure 8
- schematically a further embodiment of a value document according to the invention during the read-out process in the lateral section.
In Fig. 1 ist ein Wertdokument 1, z.B. ein Geldschein, mit einem Verifikationselement 3 und einem Sicherheitselement 5 gezeigt. In dem gezeigten Beispiel ist das Verifikationselement schraffiert angedeutet. Das Sicherheitselement 5 umfaßt einen Hologrammträger. Gemäß einer Ausführungsform erzeugt dieser Hologrammträger bei Lichteinfall ein Muster außerhalb der Ebene des Dokuments 1, z. B. des Geldscheins. Das so holographisch erzeugte Muster hat vorteilhafterweise einen Abstand 7 von 100 bis 300 µm von der Fläche des Geldscheins 1. Die Bezugsziffern 1, 3, 5, 7 und 9 werden im folgenden allgemein für verschiedene Ausführungsformen benutzt.FIG. 1 shows a
Bei einer Ausführungsform, bei der das Verifikationselement 3 ein Linienraster trägt, erzeugt das Sicherheitselement 5 bei Lichteinfall ein holographisches Muster, das ebenfalls streifenförmig moduliert ist. Bringt man ein Verifikationselement 3 mit dem Sicherheitselement 5 zur Deckung, so hat das Linienraster des Verifikationselements einen Abstand von dem holographisch erzeugten Muster. Auf diese Weise kann durch Kippung z. B. der Bereich unterhalb des Linienrasters sichtbar gemacht werden oder durch senkrechte Blickrichtung der Bereich zwischen dem Linienraster des Verifikationselements 3. Auf diese Weise können Kippeffekte erzeugt werden, die sonst nur bei Vorliegen eines tatsächlichen Abstands zwischen dem Rastermuster und der Bildebene sichtbar sind.In an embodiment in which the
In Fig. 7 ist eine solche Ausführungsform schematisch in der Seitenschnittansicht sichtbar. Gezeigt ist ein gefalteter Geldschein 1, bei dem Verifikationselement 403 und Sicherheitselement 5, 405 zur Deckung gebracht worden sind. Dies ist die Stellung während des Auslesevorganges. Der Begriff "Auslesen" wird in dieser Beschreibung allgemein für das Verifiizeiren gebraucht, sei es mit bloßem Auge oder maschinell. Bei entsprechendem Lichteinfall rekonstruiert aus dem Hologramm des Sicherheitselements 5, 405 im Abstand 7 von der Berührungsebene 9 ein holographisch erzeugtes Muster 400. Das Verifikationselement ist transparent und mit einem z. B. aufgedruckten Streifenmuster versehen. Durch den Abstand 7 ist der Bereich des holographisch erzeugten Musters 400, der durch das Streifenmuster des Verifikationselements 3, 403 sichtbar ist, von der Blickrichtung auf das Sicherheitselement 5, 405 abhängig. Je nach Blickrichtung kann z. B. der Bereich unterhalb des Streifenmusters 3, 403 sichtbar sein, oder der Bereich zwischen dem Streifen des Verifikationselements 3, 403.In Fig. 7, such an embodiment is schematically visible in the side sectional view. Shown is a folded
Wie auch in den Figuren 4, 5, 6 und 8 ist durch kurze senkrechte Linien am Geldschein 1 angedeutet, in welchem Bereich sich das Verifikationselement und das Sicherheitselement befinden. Selbstverständlich sind dies keine gegenständlichen Merkmale. Zudem sind die Figuren 4 bis 8 nicht maßstabsgetreu zu sehen. Im speziellen ist z.B. der Abstand 7 sehr viel kleiner. Verifikationselement und Sicherheitselement liegen direkt aufeinander und sind vorzugsweise jeweils nicht dicker als der Geldschein 1.As in the figures 4, 5, 6 and 8 is indicated by short vertical lines on the
Das Sicherheitselement 5, das in Figur 1 sichtbar ist, kann auch ein Hologrammträger sein, der bei Lichteinfall ein phasenmoduliertes Muster außerhalb der Ebene des Geldscheins 1 erzeugt. In diesem Fall ist das Verifikationselement 3 ein Element, daß diese Phasenmodulation in eine Amplitudenmodulation umwandelt. Ist diese Phasenmodulation z. B. in Form der Buchstaben OK, wird durch Aufeinanderlegen des Verifikationselements 3 mit dem Sicherheitselement 5, wie es in Figur 2 gezeigt ist, die versteckte Information "OK" 6 für das Auge 8 sichtbar.The
Bei einer anderen Ausführungsform, die in Seitenansicht in Fig. 5 gezeigt ist, erzeugt das Sicherheitselement 5, 205 bei Lichteinfall außerhalb der Ebene des Geldscheins 1 ein Linienmuster 200. Auch das Verifikationselement 3, 203 erzeugt ein Linienmuster bei Lichteinfall in derselben Ebene außerhalb des Geldscheins 1, wenn Verifikationselement 3, 203 und Sicherheitselement 5, 205 aufeinanderliegen. Die Linienmuster sind derart eingestellt, daß sich ein Moiré-Muster ergibt, wie es für die Überlagerung von tatsächlichen Linienmustem bekannt ist. In diesem Moiré-Muster kann durch entsprechende Anordnung der holographisch erzeugten Linien eine Information gespeichert sein, so daß z. B. wieder die Schrift "OK" erkennbar wird.In another embodiment, which is shown in side view in Fig. 5, the
Schließlich kann das Sicherheitselement 5,105 auch ein Muster 100 außerhalb der Ebene des Geldscheins 1 erzeugen, das mit Hilfe einer Linsenstruktur 102 in dem Verifikationselement 3, 103 sichtbar gemacht wird, z. B. durch Vergrößerung, siehe Fig. 4. Dazu ist ein gewisser Abstand 7 von der Linsenstruktur von dem abzubildenden Muster notwendig, der erfindungsgemäß durch die holographische Rekonstruktion des Musters 100 erhalten wird. Die Linsenstruktur 102 muß also nicht wie gewöhnlich eine gewisse Dicke aufweisen, um diesen Abstand von dem abzubildenden Objekt zu erzeugen. Möglich ist z. B. eine Lentikularlinsenstruktur.Finally, the security element 5,105 can also produce a
Eine einfache andere Ausgestaltung umfaßt ein Sicherheitselement 5, das außerhalb der Ebene des Geldscheins 1 ein holographisch erzeugtes Muster bei Lichteinfall rekonstruiert, das nur einen Teil einer Information trägt, der für sich alleine nicht aussagekräftig ist. Das Verifikationselement 3 umfaßt eine vergleichbare holographische Struktur, die in derselben Ebene außerhalb des Geldscheins 1 ein holographisch erzeugtes Muster rekonstruiert, das den restlichen Teil der Information darstellt. Wird nun das Verifikationselement zusammen mit dem Sicherheitselement in Überdeckung gebracht und mit Licht beaufschlagt, so werden beide Teile der versteckten Information sichtbar und können zusammen ausgelesen werden.A simple other embodiment comprises a
Zum Beispiel kann die Teilinformation, die auf holographischem Wege durch Beleuchtung des Sicherheitselements 5 erzeugt wird, Teile der Buchstaben O und K umfassen, die für sich alleine nicht als solche erkennbar sind. Die verbleibenden restlichen Teile der Buchstaben O und K werden durch Beleuchtung des Verifikationselements holographisch an derselben Stelle erzeugt, wenn die beiden Elemente aufeinander zu liegen kommen. Auf diese Weise wird das gesamte Bild OK erkennbar.For example, the partial information generated holographically by illuminating the
Bei einer anderen Ausgestaltung der Seitenansicht der Fig. 6 liegt z. B. ein Sicherheitselement 5, 305 vor, das außerhalb der Ebene 9 des Geldscheins 1 ein Muster 300 holographisch erzeugt, das in verschiedenen Bereichen verschiedene Polarisation hat. Während z. B. der größte Teil des holographisch rekonstruierten Musters 300eine senkrechte Polarisation hat, ist die Polarisation im Bereich der Buchstaben O und K waagrecht polarisiert. Das Verifikationselement 3, 303 ist ein Polarisationsfilter, der senkrecht polarisiert ist. Auf diese Weise kann das waagrecht polarisierte Licht aus den Bereichen des holographisch erzeugten Musters, die den Buchstaben O und K entsprechen, nicht durch das Verifikationselement 3, 303 hindurchtreten, so daß diese schwarz erscheinen.In another embodiment of the side view of FIG. 6 z. B. a
Der holographisch erzeugte Abstand 7 zwischen dem rekonstruierten Muster des Sicherheitselements erschwert die Fälschung. Eine gewöhnliche direkte Speicherung der Information auf dem Geldschein ist leichter nachzuahmen als ein Hologramm, das in einer versetzten Ebene entsprechende Information aufweist. Zudem ist die Information derart, daß sie nur mit Hilfe des Verifikationselements ausgelesen werden kann. Ohne ein solches Verifikationselement ist auch die holographisch gespeicherte Information nicht erkennbar. Eine noch höhere Fälschungssicherheit kann erreicht werden, wenn das holographisch erzeugte Muster 505 keinen konstanten Abstand 7 von dem Geldschein 1 hat, sondern z. B. in einer welligen Fläche oder in einer stufigen Fläche rekonstruiert, siehe Figur 8 im Schema. Wiederum ist die Welligkeit sehr viel kleiner als dargestellt. Bei einer solchen Ausführungsform ist das Verifikationselement 3, 503 derart ausgestaltet, daß es diesem nicht konstanten Abstand Rechnung trägt, wobei dies durch eine entsprechende Ortsfrequenz des Verifikationselements erreicht werden kann.The holographically generated
Die notwendigen Hologrammstrukturen für obige Ausführungen können z. B. auf herkömmlichen Wege optisch hergestellt oder computergeneriert werden. Sie können selbstverständlich an verschiedenen Stellen oder sogar mehrfach auf dem Geldschein vorgesehen sein. Ebenso ist z. B. eine Anordnung in zwei gegenüberliegenden Ecken des Geldscheins denkbar. Das Sicherheitselement kann sowohl ein virtuelles als auch ein reelles Bild erzeugen, das auf einem Schirm aufgefangen werden kann.The necessary hologram structures for the above embodiments may, for. B. optically produced or computer generated in conventional ways. They can of course be provided in different places or even several times on the bill. Likewise, z. B. an arrangement in two opposite corners of the bill conceivable. The security element can produce both a virtual and a real image that can be captured on a screen.
Das Verifikationselement 3 ist zumindest teilweise transparent. So kann durch das Verifikationselement hindurch Licht auf das Sicherheitselement treffen und das darin gespeicherte holographische Muster hinter dem Geldschein 1 sichtbar machen. Betrachtung dieses Musters durch das Verifikationselement macht die versteckte Information erkennbar.The
Zusätzlich kann auf dem Verifikationselement selbst noch ein Sicherheitsmerkmal vorgesehen sein, z. B. eine weitere Hologrammstruktur, die einen anderen optischen Effekt hervorruft, um die Fälschungssicherheit weiter zu erhöhen. Selbstverständlich muß die Transparenz des Verifikationselements dabei ausreichend bleiben, daß die versteckte Information noch ausgelesen werden kann.In addition, a security feature can still be provided on the verification element itself, for. B. another hologram structure that causes a different optical effect to further increase the security against counterfeiting. Of course, the transparency of the verification element must remain sufficient that the hidden information can still be read.
Figur 2 zeigt den Auslesevorgang. Betrachter 8 sieht den zusammengelegten Geldschein 1. Das auf dem Sicherheitselement 5 liegende Verifikationselement 3 macht die in dem von dem Sicherheitselement 5 holografisch erzeugten Muster versteckte Information sichtbar.FIG. 2 shows the read-out process.
In Fig. 3 ist schematisch eine maschinelle Anordnung zum Auslesen des Sicherheitssystems gezeigt. In nicht gezeigter Weise wird der Geldschein 1 maschinell gefaltet, so daß Verifikationselement 3 und Sicherheitselement 5 aufeinander zu liegen kommen. In einer wiederum nicht gezeigten Transporteinrichtung wird der so gefaltete Geldschein in den Strahlengang einer Beleuchtungseinrichtung 10 mit einer Lichtrichtung 12 gebracht. Der Lichtstrahl 12 geht durch das Verifikationselement 3 auf das Sicherheitselement 5, das in der Fig. 3 nicht sichtbar ist. Dort wird durch das Sicherheitselement 5 das Muster holographisch außerhalb des Geldscheins 1 erzeugt. Das holographisch erzeugte Muster wird durch das Verifikationselement 3, das zumindest teilweise transparent ist, mit Hilfe der Kamera 14, z. B. einer CCD-Kamera, in Richtung 13 aufgenommen. Dabei macht das Verifikationselement 3 die verdeckte Information, die in dem holographisch erzeugten Muster sichtbar ist, erkennbar. Das so erzeugte Bild mit der sichtbaren versteckten Information, wird von der Kamera 14 z. B. einer Rechnereinheit 16 zugeleitet. Hier kann mit bekannten Bildverarbeitungsmethoden eine Auswertung des Bildes vorgenommen werden, z. B. ein Vergleich mit erwarteten Bildern, um die Echtheit zu verifizieren.In Fig. 3, a mechanical arrangement for reading the security system is shown schematically. In a manner not shown, the
Bei entsprechender Ausgestaltung des Sicherheitselements 5 kann die Lichtquelle 10 auch hinter dem gefalteten Geldschein 1 angeordnet sein.With a corresponding embodiment of the
Bei einer anderen nicht gezeigten Ausführungsform einer erfindungsgemäßen Vorrichtung zum Auslesen ist das Verifikationselement nicht auf dem Geldschein, sondern in der Maschine selbst fixiert und der Geldschein 1 wird mit dem Sicherheitselement 5 daran vorbei bewegt.In another not shown embodiment of a device according to the invention for reading the verification element is not fixed on the bill, but in the machine itself and the
Das erfindungsgemäße Sicherheitssystem bietet also den Vorteil, daß die versteckte Information in einem Muster gespeichert ist, das nicht in der Ebene des Geldscheins bzw. des Wertdokuments 1 liegt. Statt dessen wird das Muster außerhalb des Wertdokuments 1 holographisch erzeugt. Dies erschwert die Fälschung signifikant. Zusätzlich ermöglicht eine solche holographische Verlagerung des Musters mit der versteckten Information die Verifikation mit Hilfe von Elementen, die normalerweise einen gewissen Abstand von dem Muster mit der versteckten Information haben müssen, z. B. Lentikularlinsenstrukturen oder Linienraster mit einem Kippeffekt. Bei der Erfindung ist dazu keine erhöhte Dicke notwendig, da der Abstand holographisch erzeugt wird.The security system according to the invention thus offers the advantage that the hidden information is stored in a pattern which is not in the plane of the bill or the
Claims (24)
- A security system, in particular for a value document, having a flat security element (5, 105, 205, 305, 405, 505) in a carrier plane (9) which reconstructs under light incidence by holographic means outside the carrier plane (9) a pattern (100, 200, 300, 400, 500) having concealed information stored therein, and a flat, at least partly transparent verification element (3, 103, 203, 303, 403, 503) which, upon flat contact with the security element (5, 105, 205, 305, 405, 505), makes the information stored therein readable.
- The security system according to claim 1 having a security element comprising a first hologram carrier which reconstructs under light incidence outside the carrier plane (9) a first pattern having the concealed information stored therein as phase modulation, the verification element being designed so as to convert the phase modulation to a visible amplitude modulation.
- The security system according to claim 2, wherein the verification element (3) comprises a second hologram carrier which reconstructs under light incidence a second pattern which interacts with the phase modulation induced by the security element (5) under light incidence, such that the phase modulation of the security element (5) is converted to a visible amplitude modulation.
- The security element according to claim 1, wherein the security element (205) comprises a first hologram carrier which reconstructs under light incidence outside the carrier plane (9) a stripe pattern (200) having the concealed information stored therein, and the verification element (203) comprises a second hologram carrier which, upon flat contact of the verification element (203) with the security element (205), reconstructs at the position of the stripe pattern reconstructed by light incidence on the security element (205) a further stripe pattern so as to produce a moiré pattern showing the concealed information.
- The security system according to claim 1, wherein the security element (105) comprises a first hologram carrier which reconstructs under light incidence outside the carrier plane (9) an amplitude-modulated pattern (100) carrying the concealed information, and the verification element (103) comprises a lens structure (102) which causes the concealed information to become visible when the security element (105) and the verification element (103) are superposed.
- The security element according to claim 5, wherein the verification element (103) comprises a strip lens structure (102).
- The security system according to claim 1, wherein the security element (5) comprises a first hologram carrier which reconstructs under light incidence outside the carrier plane (9) an amplitude-modulated pattern carrying a first part of the concealed information, and the verification element (3) comprises a second hologram carrier which reconstructs under light incidence outside the carrier plane an amplitude-modulated pattern carrying the remaining part of the concealed information, such that under simultaneous light incidence on both hologram carriers in the superposed state, both patterns are reconstructed and combine to give recognizable information.
- The security system according to claim 1, wherein the security element (305) comprises a first hologram carrier which reconstructs outside the carrier plane (9) a polarization-modulated pattern (300) whose polarization in the area of the concealed information is different from that in the remaining area, and the verification element (203) comprises a polarization element.
- The security system according to claim 1, wherein the security element (405) comprises a hologram carrier which reconstructs under light incidence outside the carrier plane an amplitude-modulated pattern (400) carrying the concealed information, and the verification element (403) comprises a window element provided with a grid structure, the grid structure being so formed that upon flat contact of the verification element (403) and the security element (405), different areas of the amplitude-modulated holographically reconstructed pattern (400) are recognizable depending on the viewing angle and thus display the concealed information.
- The security system according to any of claims 1 to 9, wherein the security element (505) is constructed such that the holographically reconstructed pattern (500) with the concealed information is not reconstructed in one plane.
- The security system according to any of claims 1 to 10, wherein the distance (7) of the pattern reconstructed by light incidence on the security element (5, 105, 205, 305, 405, 505) from the carrier plane (9) is in the range of a few 100 µm, preferably 100 to 300 µm.
- The security system according to any of claims 1 to 11, wherein the verification element (3, 103, 203, 303, 403, 503) and the security element (5, 105, 205, 305, 405, 505) are applied to, or incorporated in, an object (1), in particular a value document, such that they can be brought into flat contact by folding the object (1).
- The security system according to any of claims 1 to 12, wherein the security element (5, 105, 205, 305, 405, 505) is designed such that the pattern reconstructed by light incidence is virtual.
- The security system according to any of claims 1 to 12, wherein the security element (5, 105, 205, 305, 405, 505) is designed such that the pattern reconstructed by light incidence is real.
- The security element for use in a security system according to any of claims 1 to 14 having a holographic carrier element which reconstructs under light incidence by holographic means a pattern (100, 200, 300, 400, 500) with concealed information outside the carrier plane (9).
- Use of a verification element in a security system according to any of claims 1 to 14 for making the concealed information visible that is reconstructed by a security element (5, 105, 205, 305, 405, 505) according to claim 15 under light incidence in a plane outside the carrier plane (9) of the security element.
- The use according to claim 16, wherein the verification element (3, 103, 203, 403, 503) is equipped with an additional security feature.
- A value document having a security element according to claim 15.
- A value document having a verification element according to either of claims 16 and 17.
- A value document having a security system according to any of claims 1 to 14, wherein the security element (5, 105, 205, 305, 405, 505) and the verification element (3, 103, 203, 403, 503) can be brought into flat contact by folding the value document (1).
- The value document according to claim 20, wherein the verification element (3, 103, 203, 403, 503) carries additional information.
- A method for reading out the information concealed in the pattern reconstructed under light incidence on a security element according to claim 15, wherein a verification element according to either of claims 16 and 17 is brought into register with the security element.
- The method according to claim 22, wherein the security element and the verification element are applied to, or incorporated in, an object (1), wherein the object is folded to bring the verification element and the security element into register.
- An apparatus for reading out the information concealed in the pattern reconstructed under light incidence on a security element according to claim 15, having
a device which brings the security element according to claim 15 into register with a verification element according to either of claims 16 and 17,
an illumination device which is directed onto the security element (5) brought into register with the verification element, and
a readout device for picking up and evaluating the light which, coming from the illumination device, is changed by the security element (5) and the verification element (3).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10040785A DE10040785A1 (en) | 2000-08-21 | 2000-08-21 | Security system, in particular for documents of value |
DE10040785 | 2000-08-21 | ||
PCT/EP2001/009511 WO2002017242A1 (en) | 2000-08-21 | 2001-08-17 | Security system, particularly for valuable documents |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1319220A1 EP1319220A1 (en) | 2003-06-18 |
EP1319220B1 true EP1319220B1 (en) | 2007-07-18 |
EP1319220B2 EP1319220B2 (en) | 2016-11-02 |
Family
ID=7653123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01960674.8A Expired - Lifetime EP1319220B2 (en) | 2000-08-21 | 2001-08-17 | Security system, particularly for valuable documents |
Country Status (8)
Country | Link |
---|---|
US (3) | US7315407B2 (en) |
EP (1) | EP1319220B2 (en) |
AT (1) | ATE367627T1 (en) |
AU (1) | AU2001282102A1 (en) |
CZ (1) | CZ2003558A3 (en) |
DE (2) | DE10040785A1 (en) |
RU (1) | RU2282244C2 (en) |
WO (1) | WO2002017242A1 (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7654580B2 (en) * | 1995-11-29 | 2010-02-02 | Graphic Security Systems Corporation | Self-authenticating documents with printed or embossed hidden images |
US7114750B1 (en) * | 1995-11-29 | 2006-10-03 | Graphic Security Systems Corporation | Self-authenticating documents |
DE10040785A1 (en) * | 2000-08-21 | 2002-03-21 | Hsm Gmbh | Security system, in particular for documents of value |
US20040121241A1 (en) * | 2002-07-09 | 2004-06-24 | Dai Nippon Printing Co., Ltd. | Volume hologram medium |
US7429062B2 (en) * | 2002-10-30 | 2008-09-30 | Xerox Corporation | Anti-counterfeiting see-through moire security feature using frequency-varying patterns |
US7083340B2 (en) * | 2004-01-09 | 2006-08-01 | National Graphics, Inc. | Systematic lenticular lens selection in a digital printing environment |
US20050152040A1 (en) * | 2004-01-09 | 2005-07-14 | Goggins Timothy P. | Digitally imaged lenticular products incorporating a special effect feature |
US6995913B2 (en) * | 2004-01-09 | 2006-02-07 | National Graphics, Inc. | Digitally imaged lenticular products incorporating customized elements |
DE102004044459B4 (en) * | 2004-09-15 | 2009-07-09 | Ovd Kinegram Ag | Security document with transparent windows |
DE102004044458B4 (en) * | 2004-09-15 | 2010-01-07 | Ovd Kinegram Ag | The security document |
DE102004056553B4 (en) * | 2004-11-23 | 2013-03-14 | Giesecke & Devrient Gmbh | Security arrangement for security documents and method for producing the security documents |
DE102005027380B4 (en) | 2005-06-14 | 2009-04-30 | Ovd Kinegram Ag | The security document |
ATE413287T1 (en) * | 2005-09-20 | 2008-11-15 | Alcan Tech & Man Ltd | ITEM WITH OPTICAL EFFECT |
EP2081776B1 (en) * | 2006-10-04 | 2014-06-25 | Reserve Bank of Australia | Security document containing an authentication device |
DE102006055480A1 (en) * | 2006-11-24 | 2008-05-29 | Bayer Innovation Gmbh | Coding method, decoding method, codec and data carrier for holographic storage |
CA2627004A1 (en) * | 2007-03-22 | 2008-09-22 | Photogram Technologies Inc. | Hand-held decoder card having a parallax barrier portion and a light filtering portion and method of making same |
DE102007048366A1 (en) * | 2007-10-09 | 2009-04-16 | Interprint Gmbh & Co Kg | Hidden marking insertion method for printed product, involves applying information on carrier before, during or after printing carrier, and forming structure information such that information is selected with selection unit by moire effect |
DE102007052326A1 (en) | 2007-10-31 | 2009-05-07 | Bundesdruckerei Gmbh | Method for producing a security feature for a document |
DE102007000886B4 (en) | 2007-11-12 | 2018-04-05 | Bundesdruckerei Gmbh | Document with an integrated display device, and reader for such a document |
FR2940179B1 (en) | 2008-12-23 | 2017-06-02 | Arjowiggins | SECURITY DOCUMENT COMPRISING AT LEAST ONE COMBINED IMAGE AND A REVELATION MEANS, AND ASSOCIATED METHOD. |
FR2948216B1 (en) | 2009-07-17 | 2011-11-25 | Arjowiggins Security | SECURITY ELEMENT WITH PARALLAX EFFECT |
FR2948217B1 (en) | 2009-07-17 | 2011-11-11 | Arjowiggins Security | SECURITY ELEMENT WITH PARALLAX EFFECT |
RU2461882C2 (en) * | 2009-08-26 | 2012-09-20 | Аркадий Николаевич Адамчук | Method of protecting documents |
AT11874U1 (en) | 2009-12-03 | 2011-06-15 | Securikett Ulrich & Horn Gmbh | LABEL FOR AUTHENTICATING THE AUTHENTICITY OF A PRODUCT |
IT1396839B1 (en) * | 2009-12-04 | 2012-12-14 | Cartiere Fedrigoni & C Spa | ANTI-COUNTERFEITING DOCUMENT, PARTICULARLY FOR VALUE AND SIMILAR |
FR2961621B1 (en) | 2010-06-22 | 2014-09-05 | Arjowiggins Security | METHOD OF AUTHENTICATING AND / OR IDENTIFYING A SECURITY ARTICLE |
FR2961622B1 (en) * | 2010-06-22 | 2013-02-08 | Arjowiggins Security | METHOD FOR AUTHENTICATION AND / OR IDENTIFICATION OF A SECURITY ARTICLE |
AU2011309108B2 (en) * | 2010-09-28 | 2014-11-20 | Toppan Printing Co., Ltd. | Booklet having anti-counterfeiting function, and method for producing same |
CA2814368C (en) | 2010-10-11 | 2017-02-28 | Graphic Security Systems Corporation | Method for constructing a composite image incorporating a hidden authentication image |
RU2467879C1 (en) * | 2011-06-30 | 2012-11-27 | Федеральное Государственное Унитарное Предприятие "Гознак" (Фгуп "Гознак") | Valuable document with optically variable structure (versions) |
FR2993204B1 (en) | 2012-07-16 | 2018-02-02 | Oberthur Fiduciaire Sas | SAFETY STRUCTURE. |
DE102012108200B4 (en) | 2012-09-04 | 2019-03-07 | Hologram Industries Research Gmbh | Method for producing a multi-leaf document with hologram and multi-leaf document with hologram, such as passport |
WO2014153595A1 (en) * | 2013-03-27 | 2014-10-02 | Innovia Security Pty Ltd | Lens-foil based security device |
FR3025742B1 (en) * | 2014-09-17 | 2016-10-21 | Arjowiggins Security | SECURITY ELEMENT |
CN104309312B (en) * | 2014-10-11 | 2017-06-16 | 北京志恒达科技有限公司 | Automatic laser stamp device and automatic laser code printing method |
KR20220119636A (en) * | 2019-12-26 | 2022-08-30 | 도판 인사츠 가부시키가이샤 | Display body and display method |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2196443B (en) * | 1986-10-17 | 1990-04-04 | Gen Electric Plc | Secure holographic data storage using an optical phase encryption device |
US5396559A (en) † | 1990-08-24 | 1995-03-07 | Mcgrew; Stephen P. | Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns |
GB9211123D0 (en) * | 1992-05-26 | 1992-07-08 | Amblehurst Ltd | Holographic device |
GB9309673D0 (en) | 1993-05-11 | 1993-06-23 | De La Rue Holographics Ltd | Security device |
RU2103741C1 (en) * | 1996-04-08 | 1998-01-27 | Акционерное общество закрытого типа Научно-производственное объединение "Криптон" | Device for checking validity of holograms |
AUPO289296A0 (en) * | 1996-10-10 | 1996-10-31 | Securency Pty Ltd | Self-verifying security documents |
DE19729918B4 (en) † | 1997-07-04 | 2010-07-01 | Securency International Pty Ltd., Craigieburn | Security and / or value document |
DE69832574T2 (en) * | 1997-07-29 | 2006-06-14 | Nhk Spring Co Ltd | Optical identification system with cholesteric liquid crystals |
TW409230B (en) † | 1998-01-16 | 2000-10-21 | Ind Tech Res Inst | Hologram false-preventing recognition structure and the method thereof |
EP1049590B2 (en) † | 1998-01-21 | 2011-11-23 | Securency International Pty Ltd | Method of verifying the authenticity of a security document and document for use in such a method |
DE10040785A1 (en) * | 2000-08-21 | 2002-03-21 | Hsm Gmbh | Security system, in particular for documents of value |
-
2000
- 2000-08-21 DE DE10040785A patent/DE10040785A1/en not_active Withdrawn
-
2001
- 2001-08-17 AT AT01960674T patent/ATE367627T1/en active
- 2001-08-17 RU RU2003107678/09A patent/RU2282244C2/en not_active IP Right Cessation
- 2001-08-17 US US10/362,254 patent/US7315407B2/en not_active Expired - Fee Related
- 2001-08-17 WO PCT/EP2001/009511 patent/WO2002017242A1/en active IP Right Grant
- 2001-08-17 EP EP01960674.8A patent/EP1319220B2/en not_active Expired - Lifetime
- 2001-08-17 CZ CZ2003558A patent/CZ2003558A3/en unknown
- 2001-08-17 DE DE50112744T patent/DE50112744D1/en not_active Expired - Lifetime
- 2001-08-17 AU AU2001282102A patent/AU2001282102A1/en not_active Abandoned
-
2007
- 2007-11-09 US US11/983,540 patent/US7724408B2/en not_active Expired - Fee Related
-
2010
- 2010-04-07 US US12/755,485 patent/US8077364B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
AU2001282102A1 (en) | 2002-03-04 |
DE50112744D1 (en) | 2007-08-30 |
CZ2003558A3 (en) | 2003-11-12 |
US20100195176A1 (en) | 2010-08-05 |
EP1319220B2 (en) | 2016-11-02 |
DE10040785A1 (en) | 2002-03-21 |
RU2282244C2 (en) | 2006-08-20 |
ATE367627T1 (en) | 2007-08-15 |
US20030169468A1 (en) | 2003-09-11 |
US20080062485A1 (en) | 2008-03-13 |
WO2002017242A1 (en) | 2002-02-28 |
US7315407B2 (en) | 2008-01-01 |
US8077364B2 (en) | 2011-12-13 |
EP1319220A1 (en) | 2003-06-18 |
US7724408B2 (en) | 2010-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1319220B1 (en) | Security system, particularly for valuable documents | |
DE19729918B4 (en) | Security and / or value document | |
DE69033362T2 (en) | METHOD FOR PRODUCING A COUNTERFEIT-PROOF DOCUMENT | |
DE69320624T2 (en) | HOLOGRAPHIC SECURITY DEVICE | |
EP1819527B1 (en) | Security arrangement for security documents | |
DE69123355T3 (en) | SECURITY DEVICE | |
DE69738115T2 (en) | Security documents with built-in authentication means | |
DE60310977T2 (en) | AUTHENTICATION OF DOCUMENTS AND ARTICLES BY MOIREMUSTER | |
EP2208118B1 (en) | Method and device for producing holograms having regions of different scattering characteristics and corresponding hologram | |
DE69917947T2 (en) | NEW METHOD AND DEVICE FOR AUTHENTICATING DOCUMENTS BY APPLYING THE INTENSITY PROFILE OF MOIREMUSTER | |
WO2003027952A1 (en) | Label with a diffractive barcode and reading arrangement for such labels | |
DE102014217099B4 (en) | Process for the production of a security hologram with a transmission volume hologram in contact copy | |
DE4443029A1 (en) | Master hologram for the production of copy-proof holograms | |
EP1718475B1 (en) | Security element comprising a lens grid and method for the production thereof | |
EP2686173B1 (en) | Security element having a 3d color effect and verification method and verification device for such a security element | |
EP2126638B1 (en) | Method for writing holographic pixels | |
EP2215529B1 (en) | Method and device for producing holograms having an individually exposed watermark-type structure | |
EP3648983B1 (en) | Optically variable security arrangement | |
DE60124283T2 (en) | Optical data carrier with an optical diffraction-based code, and associated reader | |
WO2009056358A1 (en) | Method and device for producing holograms having an individually exposed watermark-type structure | |
DE19926733A1 (en) | Holographic strip e.g. for banknote etc., has sequence of adjacent individual holograms which can be read by relative movement of laser | |
DE10100836A1 (en) | Reading of holographic markings formed as security markings on such as a banknotes using a laser | |
EP1060908A2 (en) | Optical authenticity feature | |
DE19926698A1 (en) | Computer generated security feature for application to document or banknote, uses computer-generated hologram algorithm to calculate interference pattern applied to carrier | |
DE102004063376A1 (en) | Method and device for generating a multi-channel diffraction image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030319 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
17Q | First examination report despatched |
Effective date: 20060728 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20070718 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: CH Ref legal event code: NV Representative=s name: PATENTANWAELTE SCHAAD, BALASS, MENZL & PARTNER AG |
|
REF | Corresponds to: |
Ref document number: 50112744 Country of ref document: DE Date of ref document: 20070830 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
ET | Fr: translation filed | ||
LTIE | Lt: invalidation of european patent or patent extension |
Effective date: 20070718 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071029 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071218 |
|
NLV1 | Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act | ||
BERE | Be: lapsed |
Owner name: GIESECKE & DEVRIENT G.M.B.H. Effective date: 20070831 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FD4D |
|
PLBI | Opposition filed |
Free format text: ORIGINAL CODE: 0009260 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070831 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071019 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 |
|
26 | Opposition filed |
Opponent name: SECURENCY INTERNATIONAL PTY LTD Effective date: 20080415 |
|
PLAX | Notice of opposition and request to file observation + time limit sent |
Free format text: ORIGINAL CODE: EPIDOSNOBS2 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070831 |
|
PLBB | Reply of patent proprietor to notice(s) of opposition received |
Free format text: ORIGINAL CODE: EPIDOSNOBS3 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070817 |
|
RDAF | Communication despatched that patent is revoked |
Free format text: ORIGINAL CODE: EPIDOSNREV1 |
|
APBM | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNO |
|
APBP | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2O |
|
APAH | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNO |
|
APBQ | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3O |
|
PGRI | Patent reinstated in contracting state [announced from national office to epo] |
Ref country code: IT Effective date: 20110616 |
|
APBU | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9O |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 50112744 Country of ref document: DE |
|
PLAY | Examination report in opposition despatched + time limit |
Free format text: ORIGINAL CODE: EPIDOSNORE2 |
|
PLBC | Reply to examination report in opposition received |
Free format text: ORIGINAL CODE: EPIDOSNORE3 |
|
PLAY | Examination report in opposition despatched + time limit |
Free format text: ORIGINAL CODE: EPIDOSNORE2 |
|
APAH | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNO |
|
APBM | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNO |
|
APBP | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2O |
|
APBU | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9O |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 16 |
|
PLAB | Opposition data, opponent's data or that of the opponent's representative modified |
Free format text: ORIGINAL CODE: 0009299OPPO |
|
PUAH | Patent maintained in amended form |
Free format text: ORIGINAL CODE: 0009272 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: PATENT MAINTAINED AS AMENDED |
|
R26 | Opposition filed (corrected) |
Opponent name: SECURENCY INTERNATIONAL PTY LTD Effective date: 20080415 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20160823 Year of fee payment: 16 |
|
27A | Patent maintained in amended form |
Effective date: 20161102 |
|
AK | Designated contracting states |
Kind code of ref document: B2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R102 Ref document number: 50112744 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: AELC |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20160822 Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 50112744 Country of ref document: DE Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH, DE Free format text: FORMER OWNER: GIESECKE & DEVRIENT GMBH, 81677 MUENCHEN, DE |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20170824 Year of fee payment: 17 Ref country code: DE Payment date: 20170831 Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PUE Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH, DE Free format text: FORMER OWNER: GIESECKE AND DEVRIENT GMBH, DE |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20180118 AND 20180124 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 367627 Country of ref document: AT Kind code of ref document: T Effective date: 20170817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170817 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: TP Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH, DE Effective date: 20180530 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 18 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170817 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20180824 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20180827 Year of fee payment: 18 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 50112744 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20180817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190301 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190831 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190831 |