EP1610959A1 - Wert- und sicherheitsdokument - Google Patents
Wert- und sicherheitsdokumentInfo
- Publication number
- EP1610959A1 EP1610959A1 EP04725289A EP04725289A EP1610959A1 EP 1610959 A1 EP1610959 A1 EP 1610959A1 EP 04725289 A EP04725289 A EP 04725289A EP 04725289 A EP04725289 A EP 04725289A EP 1610959 A1 EP1610959 A1 EP 1610959A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- area
- perforations
- value
- security document
- carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000004519 manufacturing process Methods 0.000 claims abstract description 7
- 229910000679 solder Inorganic materials 0.000 claims description 5
- 238000006073 displacement reaction Methods 0.000 claims 2
- 230000005855 radiation Effects 0.000 claims 1
- 230000000149 penetrating effect Effects 0.000 abstract 1
- 230000001788 irregular Effects 0.000 description 6
- 238000000034 method Methods 0.000 description 5
- 239000000463 material Substances 0.000 description 3
- 239000011888 foil Substances 0.000 description 2
- 239000002184 metal Substances 0.000 description 2
- 239000003086 colorant Substances 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000005476 soldering Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/346—Perforations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/128—Viewing devices
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/21—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for multiple purposes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/23—Identity cards
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/24—Passports
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
-
- B42D2033/22—
Definitions
- the invention is based on a value and security document according to the category of independent claim 1.
- the invention is also based on a system of a value and security document and a decoder according to the category of independent claim 16.
- the invention is also based on a method Manufacture of value and security documents or systems of value and security documents and decoders according to the category of independent claim 31.
- Value and security documents are already known which have perforations (for example from DE 199 34 434 A1). Furthermore, the document WO 99/01291 describes value and security documents which have a first area and a window, the first area being verified by means of windows of the value and security document.
- Perforations are often introduced on value and security documents. They are less secure in themselves.
- the solution of verifying a first area by means of a window is very complex since the window material differs from the material of the holder of the value and security document.
- the value and security document according to the invention as well as the system according to the invention from a value and security document and a decoder and the method according to the invention for producing them have the advantage in comparison that they have a high level of security due to the interrelation between the two intended areas. Furthermore, the manufacturing process is inexpensive and offers a variety of design options. Another advantage is that the verification of the security element is already possible for viewers with little previous technical education. Such a security feature is referred to as a "public feature".
- the measures listed in the dependent claims enable advantageous further developments and improvements of the value and security document specified in the independent claim and of the system comprising the value and security document and decoder, as well as the corresponding methods for production.
- perforations It is particularly advantageous to provide several pieces of information in the perforations, so that encryption is generated by arranging them side by side or alternately. It is also advantageous to provide markings that make it easier to place them on top of one another. A further increase in security is achieved in that perforations are introduced obliquely, ie at a defined angle to the solder on the surface, the desired information then also having to be read out obliquely.
- FIG. 1 and FIG. 2 value and security documents according to the invention (schematically), FIG. 3 parts of the security feature of value and security documents according to the invention (schematically), FIG. 4, FIG. 5, FIG. 6 and FIG. 7 further value and security documents according to the invention (schematically) ), FIG. 8, FIG. 9 and FIG. 10 systems according to the invention from a value and security document and decoder (schematic) and FIG. 11 sections through an inventive value and security document perpendicular to the surface of the value and security document (schematic). Description of the embodiments
- a value and security document 1 is shown schematically in FIG. Postage stamps, banknotes, ID cards, passports, packaging, labels and stickers, tickets, tickets and other tickets, tax stamps and shares are generally subsumed under value and security documents.
- the value and security document 1 consists of a carrier which consists of a paper or plastic material or metal foil or, if appropriate, a layered composite of paper and / or plastic and / or metal foil. Such a value and security document 1 has security features that make it possible to verify the authenticity of this value and security document.
- the value and security document that is shown with reference to FIG. 1 has a security feature that is composed of a first area 2 and a second area 3.
- Both areas are arranged locally separated from one another, it being possible for at least parts of the first area 2 and the second area 3 to be covered by folding the security document over one another, ie.
- Each of these two areas has perforations, of which at least some of the perforations pass through the carrier, a pattern or an image ect due to the totality of the respective perforations. is formed. A viewer can see through the part of the perforations that pass through the support.
- These perforations have a diameter which ranges from submicrometers to a few millimeters, preferably between 10 to 1000 ⁇ m, particularly preferably in the range from 50 to 200 ⁇ m. The perforations are therefore called micro perforations.
- the perforations run essentially perpendicular to the surface of the value and security document.
- the value and security document shown in FIG. 1 also has a fold line 4, which in a preferred exemplary embodiment is provided by a corresponding printed line on the value and security document.
- the line can also be indicated only on the basis of a few points or lines. However, it is also possible to omit this line 4 completely.
- line 4 is represented by a dashed line.
- both areas of the security feature, the first area 2 and the second area 3 can now be placed one on top of the other and made to coincide. The superimposition of the first area 2 and the second area 3 is shown with reference to FIG. 2.
- FIG. 2 a shows how the value and security document is folded along the fold line 4 and the first area 2 and the second area 3 are placed one above the other along the direction 40, here represented by an arrow.
- the first area 2 is placed over the second area 3.
- the order in which the first and second areas lie one above the other is irrelevant in this case.
- a region 5 is thus formed, which is composed of the first region 2 and the second region 3 placed one above the other.
- the superimposition of the areas 2 and 3 has the effect that some of the perforations of the area 2, which are continuous, and of the area 3, which are also continuous, come to lie on top of one another when correctly overlaid.
- the viewer can distinguish these perforations, which lie one above the other and which are continuous, from the perforations which, on the whole, do not pass through the supports in the area 2 and 3.
- the decisive factor is that the continuous perforations lying one above the other in area 5 represent information that was previously not or only very difficult to recognize when the perforations in area 2 or 3 were viewed separately.
- Such information can be image information such as patterns, representations of people, symbols, objects etc. and / or sequences of numbers and / or letters.
- FIGS. 2 b and c show further examples of the arrangement of the fold lines 4 and the directions 40, the regions 2 and 3 being superimposed along the directions 40.
- each area of the security feature has perforations on the value and security document. Examples of such perforations, in particular in the special function when used as decoders for other perforated areas, are shown in FIG. 3.
- Each perforation 7 is schematically represented in the image parts a, b and c by a circle.
- the perforations should be continuous.
- the perforations that do not go through the holder of the value and security document are not shown, but may be provided in addition to the continuous perforations in preferred exemplary embodiments of the invention.
- FIGS. 3 a and b show regular arrangements of the perforations in an area of the security feature. In a further exemplary embodiment, however, the perforations can also be arranged irregularly, as shown in FIG. 3 c.
- a value and security document 1 is shown on the basis of FIG. 4, which has two areas 2 and 3, each of which contains an irregular arrangement of continuous perforations.
- Each area is made up of continuous primary perforations 7 'and continuous secondary perforations 7 ", the primary perforations 7' (shown here in dark) contributing to the information which is visible to the viewer when superimposed.
- the secondary perforations 7" (here marked somewhat lighter) do not contribute to the information which is visible when the first area 2 and the second area 3 are superimposed.
- the light and dark marking was only carried out in FIG. 4 in order to distinguish between the two types of perforations.
- the secondary perforations 7 "have the important task of” encrypting "the information contained in both areas.
- the presence of the secondary perforations 7 ′′ means that the information cannot be seen when looking through only one of the areas 2 or 3.
- the viewer only recognizes an irregular arrangement of perforations.
- FIG. 4 b shows how the perforations are Add information in the first area 2 and in the second area 3 when superimposed to form an area 5.
- the perforations 7' are accordingly arranged such that they lie directly one above the other when the first region 2 and the second region 3 are superimposed.
- the secondary perforations 7 are arranged in such a way that when the first region 2 and the second region 3 are superimposed, two secondary continuous perforations do not lie one above the other.
- the observer cannot pass through at the locations where the secondary perforations 7" are arranged view both superimposed areas, that is, through the support.
- the information that the viewer sees when looking through the superimposed area 5 when looking through the perforations of the superimposed area 5 is the number 3 in the exemplary embodiment shown in FIG. 4 facilitate the viewer with a backlight.
- documents placed on top of each other can be placed on an illuminated screen.
- the light passing through the superimposed primary perforations T improves the recognizability of the information.
- a further possibility of improving the recognizability can be achieved by depositing it with a colored background, for example a black or a blue background.
- the background can be recognized by the primary perforations 7 ′ lying one above the other and stands out from the other colors of the value and security document.
- Both areas can have a regular arrangement of the perforations, one of the two areas can be designed with a regular and the other area with an irregular arrangement of the perforations, and both areas can be provided with an irregular arrangement of the perforations. It is also possible to vary the size of the perforations and the shape of the perforations. In this application only perforations with a circular cross-section are shown. However, it is also possible to form the perforations with, for example, a square, rectangular or star-shaped cross section. The cross-sectional shape can have symmetries with respect to one or more axes or can have an asymmetrical shape. Here, for example, a circular shape is conceivable that has an irregular bulge at one point.
- FIG. 5 a shows the first area 2 and the second area 3 with the continuous perforations 7.
- the first area 2 has an irregular arrangement of the perforations and the second area 3 has a regular arrangement of the perforations 7.
- the second area 3 acts as a decoder for the encrypted information of the area 2.
- This decoder can in turn itself a pattern or picture ect. represent.
- Each of the perforations shown here is continuous.
- FIG. 5 b shows a first area 50 which arises when the first area 2 and the second area 3 are superimposed. The number “1” can be recognized as information.
- the viewer recognizes further information, which is illustrated with reference to FIG. 5 c.
- the area 51 which is superimposed by one another of the first area 2 and the In the second area 3, the letter “E” can be seen.
- the perforations in the first area 2 of FIG. 5 a are accordingly arranged in such a way that they contain both information, the number “1” and the letter “E” the information is concealed at the same time, since the viewer cannot separate the two information, and the second area 3 is used to separate the information and allow the viewer to recognize it.
- markings can be arranged on the value and security document 1 in a preferred exemplary embodiment. Such markings are shown schematically in FIG. 6. These markings can be provided, for example, as perforations 22 or 23, which come to lie one above the other when the first region 2 and the second region 3 are correctly superimposed. This means that the viewer can also see through these continuous perforations 22 and 23. Markings 24, shown here as a cross, can also be provided, which can also be recognized by the viewer in the translucent light. These markings 24 can be applied, for example, by printing on the carrier of the value and security document. When the first area 2 and the second area 3 are correctly superimposed, these must also lie one above the other.
- a plurality of first areas 2 and / or a plurality of second areas 3 can also be provided on the value and security document, which can in each case be superimposed.
- several different markings are preferably provided, so that the correct stacking is made easier.
- part of the continuous perforations of the first area 2 and / or of the second area 3 are arranged in such a way that when these are placed one above the other, the areas of information are recognized on the carrier part which is not continuous at this point.
- FIG. 7 a shows the value and security document with the two areas 2 and 3, the continuous perforations 7 and in the first area 2 a micro-inscription 8 represented as a number sequence “10”.
- letter sequences and / or number and letter sequences and / After the first and second areas have been superimposed, the area 5 is created as in the previous exemplary embodiments, which is illustrated with reference to Figure 7.
- the special feature of this exemplary embodiment is that, in addition to the superimposed, continuous and information forming perforations (here designed as a pattern of eight perforations), a perforation is arranged such that the micro-writing 8 contained in the first area 2, ie the number sequence “10”, is visible through the perforation. This is shown in an enlarged representation in FIG. 7 c. Analogously, several perforations could also be provided, through which a microprint can be recognized. Furthermore, color information can also be arranged in place of the micro-writing, so that color information can be recognized through part of the perforations of an area when superimposed. In this case the order of the superimposed areas 2 and 3 must be taken into account when superimposing.
- FIG. 8 a Another embodiment of the invention is shown with reference to Figure 8. It can be seen in FIG. 8 a that the two areas of the security feature are divided into two value and security documents.
- a first value and security document 1 shown here as a banknote with a value of 50, has the first area 2 with the perforations that at least partially pass through the carrier.
- This second value and security document 6 is to be referred to in the following in generalized terms as a decoder, since when the second area 3 'is superimposed on the first area 2, area 5' is created in which information can be recognized by a viewer, i.e. is decoded.
- the superimposed value and security documents 1 and 6 are shown with reference to Figure 8 b.
- the decoder is not designed as an independent value and security document, but merely provides one Carrier with the correspondingly arranged perforations.
- This decoder can then be designed, for example, in such a way that each banknote of a country or various value and security documents from a manufacturer can be verified, since the perforation arrangement allows a number of security features to be read out. It is of course also conceivable to use this decoder only for a special value and security document.
- FIGS. 9 and 10 Various arrangements of areas 2 and 3 'on value and security documents or decoders are shown on the basis of FIGS. 9 and 10, which are now explained below. It can be seen in FIG. 9 that the areas 2 and 3 'on the value and security document 1 or on the decoder 6 can also be arranged such that the decoder and the value and security document when the first area 2 and the second area 3' are superimposed. do not have to overlap completely to the area 5 '. Here only corner areas of the value and security document 1 and the decoder 6 overlap.
- FIG. 9 shows that the areas 2 and 3 'on the value and security document 1 or on the decoder 6 can also be arranged such that the decoder and the value and security document when the first area 2 and the second area 3' are superimposed. do not have to overlap completely to the area 5 '. Here only corner areas of the value and security document 1 and the decoder 6 overlap.
- FIG. 10 shows that the overlap of the value and security document 1 and the decoder 6 for reading out the information in the area 5 ′ can also take place in such a way that the longitudinal axes of Value and security document 1 and decoder 6 (here designated by reference numerals 10 and 10 ') form an angle which corresponds to neither 0 ° nor 90 °.
- the exemplary embodiment shown here also contains second readable information which can be read out by rotating the value and security document 1 and the decoder 6 relative to one another. This can be seen in Figure 10 b.
- the axes 10 and 10 'of the value and security document 1 and the decoder 6 now form a different angle than in Figure 10 a.
- FIG. 11 a shows sections through the value and security document 1 perpendicular to the surface.
- the continuous perforations 70 and 71 in the first area 2 and in the second area 3 can be clearly seen.
- FIG. 11 b shows sections of the value and security document 1, these sections each comprising the first area 2 and the second area 3, which are superimposed.
- the perforations shown in this exemplary embodiment have an axis which runs at an angle to the perpendicular to the surface of the value and security document 1.
- the perforations 70 have a first angle ⁇ (with the Reference numeral 28) for soldering to the surface of the value and security document.
- first angle ⁇ with the Reference numeral 28
- second area 3 in addition to the perforations 70 with the angle ⁇ , further perforations 71 are provided which have a different angle ⁇ (with the reference symbol 27) ( ⁇ o ⁇ ) to the perpendicular to the surface of the value and security document, the sign of the angle is observed.
- perforations 70 partially lie on top of one another, which, when superimposed, have the same angle to the plumb line to the surface of the value and security document and perforations that are not at the same angle to the plumb line to the surface of the value and security document. If the viewer now looks along the direction of the perforations, which have the same direction when superimposed, then the viewer can see through the holder of the value and security document. The viewer cannot see through the parts of the security feature in which perforations have different angles to the perpendicular of the surface of the value and security document. This is shown schematically in FIG. 11b.
- the oblique perforations can thus be used to specifically vary the information contained in the security feature. For example, two different pieces of information can be provided in one of the two areas 2 or 3 by perforations with different angles to the perpendicular to the surface of the value and security feature. Similarly, perforations can increase the variation options, which are tapered. For the execution of tapered and oblique perforations, the content of the document DE 199 344 34 A1 is fully included in the description.
- the above-mentioned special features with regard to the shape of the perforations when cut perpendicular to the surface of the value and security document can be applied both to security features in which the first area 2 and the second area 3 are arranged on one and the same value and security document are, as well as security features in which the first area 2 are arranged on a value and security document and the second area 3 on a decoder.
- the security features for value and security documents described in the above exemplary embodiments can be generated in that the perforations are made by laser through the carrier of the value and security document or the deco that are blown. It is necessary for the laser to have sufficient energy in order to ensure that the perforation is completely continuous through the document.
- the laser is positioned at the previously determined points at which perforations are to be created.
- the perforations can also be punched into the value and security document.
- the methods described above for determining the points at which perforations are provided and for positioning the punching tool can be used analogously.
- value and security documents In the above exemplary embodiments, value and security documents, systems consisting of value and security documents and decoders, and methods for their production have been described.
- the manufacturing processes can be carried out with simple means.
- the security features can advantageously be varied many times and thus adapted to the customer's requirements.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10315558A DE10315558A1 (de) | 2003-04-05 | 2003-04-05 | Wert- und Sicherheitsdokument, System aus einem Wert- und Sicherheitsdokument und einem Decoder und Verfahren zu deren Herstellung |
PCT/DE2004/000719 WO2004089644A1 (de) | 2003-04-05 | 2004-04-02 | Wert- und sicherheitsdokument |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1610959A1 true EP1610959A1 (de) | 2006-01-04 |
Family
ID=32981068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04725289A Withdrawn EP1610959A1 (de) | 2003-04-05 | 2004-04-02 | Wert- und sicherheitsdokument |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1610959A1 (de) |
DE (1) | DE10315558A1 (de) |
WO (1) | WO2004089644A1 (de) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004056553B4 (de) * | 2004-11-23 | 2013-03-14 | Giesecke & Devrient Gmbh | Sicherheitsanordnung für Sicherheitsdokumente und Verfahren zum Herstellen der Sicherheitsdokumente |
IT1396839B1 (it) * | 2009-12-04 | 2012-12-14 | Cartiere Fedrigoni & C Spa | Documento anticontraffazione, particolarmente per cartevalore e simili |
FR2965752B1 (fr) * | 2010-10-08 | 2012-11-30 | Arjowiggins Security | Structure de securite incorporant des microperforations |
DE102011084819B4 (de) | 2011-10-19 | 2018-08-02 | Bundesdruckerei Gmbh | Verfahren zur Verifikation eines Sicherheitsdokuments mit einem Muster unter Verwendung einer Anzeigevorrichtung |
WO2013143006A1 (en) * | 2012-03-29 | 2013-10-03 | Orell Füssli Sicherheitsdruck Ag | Perforation-based security feature |
BR112015005837A2 (pt) | 2012-09-21 | 2017-07-04 | Orell Fuessli Sicherheitsdruck Ag | documento de segurança com microperfurações |
ITTO20131074A1 (it) * | 2013-12-24 | 2015-06-25 | Cts Electronics S P A | Metodo e dispositivo di verifica microforature per validare documenti |
GB2543481B (en) * | 2015-10-05 | 2018-01-31 | De La Rue Int Ltd | A security sheet for an identity document |
WO2020037002A1 (en) * | 2018-08-13 | 2020-02-20 | Crane & Co., Inc. | Lens-less micro-optic film |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020117845A1 (en) * | 2000-01-03 | 2002-08-29 | Bundesdruckerei Gmbh | Security and/or valve document |
NL1012460C2 (nl) * | 1999-06-28 | 2001-01-02 | Iai Bv | Verbeterd, door middel van een perforatiepatroon tegen vervalsing bestendig document. |
DE19934434B4 (de) * | 1999-07-22 | 2006-10-05 | Bundesdruckerei Gmbh | Wert- und Sicherheitserzeugnis mit Mikrokanälen |
NL1020346C2 (nl) * | 2002-04-09 | 2003-10-13 | Ind Automation Integrators I A | Van een vergelijkingsperforatie voorzien, tegen namaak beveiligd document. |
-
2003
- 2003-04-05 DE DE10315558A patent/DE10315558A1/de not_active Withdrawn
-
2004
- 2004-04-02 WO PCT/DE2004/000719 patent/WO2004089644A1/de active Application Filing
- 2004-04-02 EP EP04725289A patent/EP1610959A1/de not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2004089644A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2004089644A1 (de) | 2004-10-21 |
DE10315558A1 (de) | 2004-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2040934B2 (de) | Sicherheitselement | |
EP1924446B1 (de) | Echtheitszertifikat mit mikro-refraktionsbild | |
EP2257440B1 (de) | Sicherheitselement | |
EP2121348B1 (de) | Sicherheitselement für ein wertdokument | |
EP2448767B1 (de) | Sicherheitselement und herstellungsverfahren dafür | |
EP3475096B1 (de) | Optisch variables sicherheitselement | |
DE102007035161A1 (de) | Sicherheitselement mit mehreren optisch variablen Strukturen | |
EP3152063B1 (de) | Sicherheitselement und identifikationsdokument | |
EP0920383A1 (de) | Kopiergeschützter sicherheitsdruck | |
EP1509402B1 (de) | Wertdokument mit einem optischen sicherheitsbereich | |
EP1610959A1 (de) | Wert- und sicherheitsdokument | |
DE102009031386A1 (de) | Sicherheitselement und Herstellungsverfahren dafür | |
EP2516175B1 (de) | Sicherheitselement und herstellverfahren dafür | |
DE112017003094T5 (de) | Tiefgedruckte Vorrichtungen und Verfahren zur Herstellung solcher Vorrichtungen | |
WO2003085193A1 (de) | Wertdokument | |
EP3160755A1 (de) | Sicherheitselement und verfahren zu seiner herstellung | |
AT522668A2 (de) | Integration von Mikrobild-Designs | |
EP4049853B1 (de) | Sicherheitselement mit einem lumineszenzmerkmal, datenträger und herstellungsverfahren | |
DE60220604T2 (de) | Bedienelement für bedruckte Gegenstände | |
EP3075561B1 (de) | Mehrfarbiges sicherheitselement mit effektfarben | |
WO2020025540A1 (de) | Lichtsteuerfolie, dokument mit einer lichtsteuerfolie und verfahren zur herstellung eines dokumentes mit einer lichtsteuerfolie | |
DE102020109155A1 (de) | Banknote oder Dokument jeweils mit mindestens einem durch Drucken auf einem Substrat aufgebrachten Sicherheitselement | |
EP3498488A1 (de) | Sicherheitselement mit einer optisch variablen struktur | |
EP1480838A1 (de) | Sicherheitsdokument und sicherheitselement für ein sicherheitsdokument |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050924 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL HR LT LV MK |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20060720 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: SPRENGER, MARTIN Inventor name: SAUTER, DIETER Inventor name: GRAMMLICH, DANIEL Inventor name: HORST, WOLFGANG Inventor name: FRANZ-BURGHOLZ, ARNIM |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20101102 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230526 |