EP1610959A1 - Document de valeur et de securite - Google Patents

Document de valeur et de securite

Info

Publication number
EP1610959A1
EP1610959A1 EP04725289A EP04725289A EP1610959A1 EP 1610959 A1 EP1610959 A1 EP 1610959A1 EP 04725289 A EP04725289 A EP 04725289A EP 04725289 A EP04725289 A EP 04725289A EP 1610959 A1 EP1610959 A1 EP 1610959A1
Authority
EP
European Patent Office
Prior art keywords
area
perforations
value
security document
carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP04725289A
Other languages
German (de)
English (en)
Inventor
Arnim Franz-Burgholz
Wolfgang Horst
Daniel Grammlich
Dieter Sauter
Martin Sprenger
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of EP1610959A1 publication Critical patent/EP1610959A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/346Perforations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/128Viewing devices
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/21Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for multiple purposes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/23Identity cards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/24Passports
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • B42D2033/22

Definitions

  • the invention is based on a value and security document according to the category of independent claim 1.
  • the invention is also based on a system of a value and security document and a decoder according to the category of independent claim 16.
  • the invention is also based on a method Manufacture of value and security documents or systems of value and security documents and decoders according to the category of independent claim 31.
  • Value and security documents are already known which have perforations (for example from DE 199 34 434 A1). Furthermore, the document WO 99/01291 describes value and security documents which have a first area and a window, the first area being verified by means of windows of the value and security document.
  • Perforations are often introduced on value and security documents. They are less secure in themselves.
  • the solution of verifying a first area by means of a window is very complex since the window material differs from the material of the holder of the value and security document.
  • the value and security document according to the invention as well as the system according to the invention from a value and security document and a decoder and the method according to the invention for producing them have the advantage in comparison that they have a high level of security due to the interrelation between the two intended areas. Furthermore, the manufacturing process is inexpensive and offers a variety of design options. Another advantage is that the verification of the security element is already possible for viewers with little previous technical education. Such a security feature is referred to as a "public feature".
  • the measures listed in the dependent claims enable advantageous further developments and improvements of the value and security document specified in the independent claim and of the system comprising the value and security document and decoder, as well as the corresponding methods for production.
  • perforations It is particularly advantageous to provide several pieces of information in the perforations, so that encryption is generated by arranging them side by side or alternately. It is also advantageous to provide markings that make it easier to place them on top of one another. A further increase in security is achieved in that perforations are introduced obliquely, ie at a defined angle to the solder on the surface, the desired information then also having to be read out obliquely.
  • FIG. 1 and FIG. 2 value and security documents according to the invention (schematically), FIG. 3 parts of the security feature of value and security documents according to the invention (schematically), FIG. 4, FIG. 5, FIG. 6 and FIG. 7 further value and security documents according to the invention (schematically) ), FIG. 8, FIG. 9 and FIG. 10 systems according to the invention from a value and security document and decoder (schematic) and FIG. 11 sections through an inventive value and security document perpendicular to the surface of the value and security document (schematic). Description of the embodiments
  • a value and security document 1 is shown schematically in FIG. Postage stamps, banknotes, ID cards, passports, packaging, labels and stickers, tickets, tickets and other tickets, tax stamps and shares are generally subsumed under value and security documents.
  • the value and security document 1 consists of a carrier which consists of a paper or plastic material or metal foil or, if appropriate, a layered composite of paper and / or plastic and / or metal foil. Such a value and security document 1 has security features that make it possible to verify the authenticity of this value and security document.
  • the value and security document that is shown with reference to FIG. 1 has a security feature that is composed of a first area 2 and a second area 3.
  • Both areas are arranged locally separated from one another, it being possible for at least parts of the first area 2 and the second area 3 to be covered by folding the security document over one another, ie.
  • Each of these two areas has perforations, of which at least some of the perforations pass through the carrier, a pattern or an image ect due to the totality of the respective perforations. is formed. A viewer can see through the part of the perforations that pass through the support.
  • These perforations have a diameter which ranges from submicrometers to a few millimeters, preferably between 10 to 1000 ⁇ m, particularly preferably in the range from 50 to 200 ⁇ m. The perforations are therefore called micro perforations.
  • the perforations run essentially perpendicular to the surface of the value and security document.
  • the value and security document shown in FIG. 1 also has a fold line 4, which in a preferred exemplary embodiment is provided by a corresponding printed line on the value and security document.
  • the line can also be indicated only on the basis of a few points or lines. However, it is also possible to omit this line 4 completely.
  • line 4 is represented by a dashed line.
  • both areas of the security feature, the first area 2 and the second area 3 can now be placed one on top of the other and made to coincide. The superimposition of the first area 2 and the second area 3 is shown with reference to FIG. 2.
  • FIG. 2 a shows how the value and security document is folded along the fold line 4 and the first area 2 and the second area 3 are placed one above the other along the direction 40, here represented by an arrow.
  • the first area 2 is placed over the second area 3.
  • the order in which the first and second areas lie one above the other is irrelevant in this case.
  • a region 5 is thus formed, which is composed of the first region 2 and the second region 3 placed one above the other.
  • the superimposition of the areas 2 and 3 has the effect that some of the perforations of the area 2, which are continuous, and of the area 3, which are also continuous, come to lie on top of one another when correctly overlaid.
  • the viewer can distinguish these perforations, which lie one above the other and which are continuous, from the perforations which, on the whole, do not pass through the supports in the area 2 and 3.
  • the decisive factor is that the continuous perforations lying one above the other in area 5 represent information that was previously not or only very difficult to recognize when the perforations in area 2 or 3 were viewed separately.
  • Such information can be image information such as patterns, representations of people, symbols, objects etc. and / or sequences of numbers and / or letters.
  • FIGS. 2 b and c show further examples of the arrangement of the fold lines 4 and the directions 40, the regions 2 and 3 being superimposed along the directions 40.
  • each area of the security feature has perforations on the value and security document. Examples of such perforations, in particular in the special function when used as decoders for other perforated areas, are shown in FIG. 3.
  • Each perforation 7 is schematically represented in the image parts a, b and c by a circle.
  • the perforations should be continuous.
  • the perforations that do not go through the holder of the value and security document are not shown, but may be provided in addition to the continuous perforations in preferred exemplary embodiments of the invention.
  • FIGS. 3 a and b show regular arrangements of the perforations in an area of the security feature. In a further exemplary embodiment, however, the perforations can also be arranged irregularly, as shown in FIG. 3 c.
  • a value and security document 1 is shown on the basis of FIG. 4, which has two areas 2 and 3, each of which contains an irregular arrangement of continuous perforations.
  • Each area is made up of continuous primary perforations 7 'and continuous secondary perforations 7 ", the primary perforations 7' (shown here in dark) contributing to the information which is visible to the viewer when superimposed.
  • the secondary perforations 7" (here marked somewhat lighter) do not contribute to the information which is visible when the first area 2 and the second area 3 are superimposed.
  • the light and dark marking was only carried out in FIG. 4 in order to distinguish between the two types of perforations.
  • the secondary perforations 7 "have the important task of” encrypting "the information contained in both areas.
  • the presence of the secondary perforations 7 ′′ means that the information cannot be seen when looking through only one of the areas 2 or 3.
  • the viewer only recognizes an irregular arrangement of perforations.
  • FIG. 4 b shows how the perforations are Add information in the first area 2 and in the second area 3 when superimposed to form an area 5.
  • the perforations 7' are accordingly arranged such that they lie directly one above the other when the first region 2 and the second region 3 are superimposed.
  • the secondary perforations 7 are arranged in such a way that when the first region 2 and the second region 3 are superimposed, two secondary continuous perforations do not lie one above the other.
  • the observer cannot pass through at the locations where the secondary perforations 7" are arranged view both superimposed areas, that is, through the support.
  • the information that the viewer sees when looking through the superimposed area 5 when looking through the perforations of the superimposed area 5 is the number 3 in the exemplary embodiment shown in FIG. 4 facilitate the viewer with a backlight.
  • documents placed on top of each other can be placed on an illuminated screen.
  • the light passing through the superimposed primary perforations T improves the recognizability of the information.
  • a further possibility of improving the recognizability can be achieved by depositing it with a colored background, for example a black or a blue background.
  • the background can be recognized by the primary perforations 7 ′ lying one above the other and stands out from the other colors of the value and security document.
  • Both areas can have a regular arrangement of the perforations, one of the two areas can be designed with a regular and the other area with an irregular arrangement of the perforations, and both areas can be provided with an irregular arrangement of the perforations. It is also possible to vary the size of the perforations and the shape of the perforations. In this application only perforations with a circular cross-section are shown. However, it is also possible to form the perforations with, for example, a square, rectangular or star-shaped cross section. The cross-sectional shape can have symmetries with respect to one or more axes or can have an asymmetrical shape. Here, for example, a circular shape is conceivable that has an irregular bulge at one point.
  • FIG. 5 a shows the first area 2 and the second area 3 with the continuous perforations 7.
  • the first area 2 has an irregular arrangement of the perforations and the second area 3 has a regular arrangement of the perforations 7.
  • the second area 3 acts as a decoder for the encrypted information of the area 2.
  • This decoder can in turn itself a pattern or picture ect. represent.
  • Each of the perforations shown here is continuous.
  • FIG. 5 b shows a first area 50 which arises when the first area 2 and the second area 3 are superimposed. The number “1” can be recognized as information.
  • the viewer recognizes further information, which is illustrated with reference to FIG. 5 c.
  • the area 51 which is superimposed by one another of the first area 2 and the In the second area 3, the letter “E” can be seen.
  • the perforations in the first area 2 of FIG. 5 a are accordingly arranged in such a way that they contain both information, the number “1” and the letter “E” the information is concealed at the same time, since the viewer cannot separate the two information, and the second area 3 is used to separate the information and allow the viewer to recognize it.
  • markings can be arranged on the value and security document 1 in a preferred exemplary embodiment. Such markings are shown schematically in FIG. 6. These markings can be provided, for example, as perforations 22 or 23, which come to lie one above the other when the first region 2 and the second region 3 are correctly superimposed. This means that the viewer can also see through these continuous perforations 22 and 23. Markings 24, shown here as a cross, can also be provided, which can also be recognized by the viewer in the translucent light. These markings 24 can be applied, for example, by printing on the carrier of the value and security document. When the first area 2 and the second area 3 are correctly superimposed, these must also lie one above the other.
  • a plurality of first areas 2 and / or a plurality of second areas 3 can also be provided on the value and security document, which can in each case be superimposed.
  • several different markings are preferably provided, so that the correct stacking is made easier.
  • part of the continuous perforations of the first area 2 and / or of the second area 3 are arranged in such a way that when these are placed one above the other, the areas of information are recognized on the carrier part which is not continuous at this point.
  • FIG. 7 a shows the value and security document with the two areas 2 and 3, the continuous perforations 7 and in the first area 2 a micro-inscription 8 represented as a number sequence “10”.
  • letter sequences and / or number and letter sequences and / After the first and second areas have been superimposed, the area 5 is created as in the previous exemplary embodiments, which is illustrated with reference to Figure 7.
  • the special feature of this exemplary embodiment is that, in addition to the superimposed, continuous and information forming perforations (here designed as a pattern of eight perforations), a perforation is arranged such that the micro-writing 8 contained in the first area 2, ie the number sequence “10”, is visible through the perforation. This is shown in an enlarged representation in FIG. 7 c. Analogously, several perforations could also be provided, through which a microprint can be recognized. Furthermore, color information can also be arranged in place of the micro-writing, so that color information can be recognized through part of the perforations of an area when superimposed. In this case the order of the superimposed areas 2 and 3 must be taken into account when superimposing.
  • FIG. 8 a Another embodiment of the invention is shown with reference to Figure 8. It can be seen in FIG. 8 a that the two areas of the security feature are divided into two value and security documents.
  • a first value and security document 1 shown here as a banknote with a value of 50, has the first area 2 with the perforations that at least partially pass through the carrier.
  • This second value and security document 6 is to be referred to in the following in generalized terms as a decoder, since when the second area 3 'is superimposed on the first area 2, area 5' is created in which information can be recognized by a viewer, i.e. is decoded.
  • the superimposed value and security documents 1 and 6 are shown with reference to Figure 8 b.
  • the decoder is not designed as an independent value and security document, but merely provides one Carrier with the correspondingly arranged perforations.
  • This decoder can then be designed, for example, in such a way that each banknote of a country or various value and security documents from a manufacturer can be verified, since the perforation arrangement allows a number of security features to be read out. It is of course also conceivable to use this decoder only for a special value and security document.
  • FIGS. 9 and 10 Various arrangements of areas 2 and 3 'on value and security documents or decoders are shown on the basis of FIGS. 9 and 10, which are now explained below. It can be seen in FIG. 9 that the areas 2 and 3 'on the value and security document 1 or on the decoder 6 can also be arranged such that the decoder and the value and security document when the first area 2 and the second area 3' are superimposed. do not have to overlap completely to the area 5 '. Here only corner areas of the value and security document 1 and the decoder 6 overlap.
  • FIG. 9 shows that the areas 2 and 3 'on the value and security document 1 or on the decoder 6 can also be arranged such that the decoder and the value and security document when the first area 2 and the second area 3' are superimposed. do not have to overlap completely to the area 5 '. Here only corner areas of the value and security document 1 and the decoder 6 overlap.
  • FIG. 10 shows that the overlap of the value and security document 1 and the decoder 6 for reading out the information in the area 5 ′ can also take place in such a way that the longitudinal axes of Value and security document 1 and decoder 6 (here designated by reference numerals 10 and 10 ') form an angle which corresponds to neither 0 ° nor 90 °.
  • the exemplary embodiment shown here also contains second readable information which can be read out by rotating the value and security document 1 and the decoder 6 relative to one another. This can be seen in Figure 10 b.
  • the axes 10 and 10 'of the value and security document 1 and the decoder 6 now form a different angle than in Figure 10 a.
  • FIG. 11 a shows sections through the value and security document 1 perpendicular to the surface.
  • the continuous perforations 70 and 71 in the first area 2 and in the second area 3 can be clearly seen.
  • FIG. 11 b shows sections of the value and security document 1, these sections each comprising the first area 2 and the second area 3, which are superimposed.
  • the perforations shown in this exemplary embodiment have an axis which runs at an angle to the perpendicular to the surface of the value and security document 1.
  • the perforations 70 have a first angle ⁇ (with the Reference numeral 28) for soldering to the surface of the value and security document.
  • first angle ⁇ with the Reference numeral 28
  • second area 3 in addition to the perforations 70 with the angle ⁇ , further perforations 71 are provided which have a different angle ⁇ (with the reference symbol 27) ( ⁇ o ⁇ ) to the perpendicular to the surface of the value and security document, the sign of the angle is observed.
  • perforations 70 partially lie on top of one another, which, when superimposed, have the same angle to the plumb line to the surface of the value and security document and perforations that are not at the same angle to the plumb line to the surface of the value and security document. If the viewer now looks along the direction of the perforations, which have the same direction when superimposed, then the viewer can see through the holder of the value and security document. The viewer cannot see through the parts of the security feature in which perforations have different angles to the perpendicular of the surface of the value and security document. This is shown schematically in FIG. 11b.
  • the oblique perforations can thus be used to specifically vary the information contained in the security feature. For example, two different pieces of information can be provided in one of the two areas 2 or 3 by perforations with different angles to the perpendicular to the surface of the value and security feature. Similarly, perforations can increase the variation options, which are tapered. For the execution of tapered and oblique perforations, the content of the document DE 199 344 34 A1 is fully included in the description.
  • the above-mentioned special features with regard to the shape of the perforations when cut perpendicular to the surface of the value and security document can be applied both to security features in which the first area 2 and the second area 3 are arranged on one and the same value and security document are, as well as security features in which the first area 2 are arranged on a value and security document and the second area 3 on a decoder.
  • the security features for value and security documents described in the above exemplary embodiments can be generated in that the perforations are made by laser through the carrier of the value and security document or the deco that are blown. It is necessary for the laser to have sufficient energy in order to ensure that the perforation is completely continuous through the document.
  • the laser is positioned at the previously determined points at which perforations are to be created.
  • the perforations can also be punched into the value and security document.
  • the methods described above for determining the points at which perforations are provided and for positioning the punching tool can be used analogously.
  • value and security documents In the above exemplary embodiments, value and security documents, systems consisting of value and security documents and decoders, and methods for their production have been described.
  • the manufacturing processes can be carried out with simple means.
  • the security features can advantageously be varied many times and thus adapted to the customer's requirements.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Document de valeur et de sécurité et système comprenant un document de valeur et de sécurité qui possède un support et une caractéristique de sécurité comportant dans au moins une première zone au moins partiellement des perforations. Une partie de ces perforations est traversante par rapport au support. Sur le document de valeur et de sécurité et plus précisément sur le décodeur se trouve une seconde zone possédant des perforations, au moins une partie de ces perforations étant traversante par rapport au support. Les perforations de la première zone au moins et de la deuxième zone au moins sont ainsi placées que la superposition rend visible des informations qui apparaissent au moins partiellement lorsqu'un observateur regarde à travers les perforations superposées traversantes de la première zone et de la deuxième zone. La présente invention concerne en outre un procédé de fabrication de documents de valeur et de sécurité de ce type, ou plus précisément de systèmes constitués d'un document de valeur et de sécurité et d'un décodeur.
EP04725289A 2003-04-05 2004-04-02 Document de valeur et de securite Withdrawn EP1610959A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10315558A DE10315558A1 (de) 2003-04-05 2003-04-05 Wert- und Sicherheitsdokument, System aus einem Wert- und Sicherheitsdokument und einem Decoder und Verfahren zu deren Herstellung
PCT/DE2004/000719 WO2004089644A1 (fr) 2003-04-05 2004-04-02 Document de valeur et de securite

Publications (1)

Publication Number Publication Date
EP1610959A1 true EP1610959A1 (fr) 2006-01-04

Family

ID=32981068

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04725289A Withdrawn EP1610959A1 (fr) 2003-04-05 2004-04-02 Document de valeur et de securite

Country Status (3)

Country Link
EP (1) EP1610959A1 (fr)
DE (1) DE10315558A1 (fr)
WO (1) WO2004089644A1 (fr)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004056553B4 (de) * 2004-11-23 2013-03-14 Giesecke & Devrient Gmbh Sicherheitsanordnung für Sicherheitsdokumente und Verfahren zum Herstellen der Sicherheitsdokumente
IT1396839B1 (it) * 2009-12-04 2012-12-14 Cartiere Fedrigoni & C Spa Documento anticontraffazione, particolarmente per cartevalore e simili
FR2965752B1 (fr) * 2010-10-08 2012-11-30 Arjowiggins Security Structure de securite incorporant des microperforations
DE102011084819B4 (de) 2011-10-19 2018-08-02 Bundesdruckerei Gmbh Verfahren zur Verifikation eines Sicherheitsdokuments mit einem Muster unter Verwendung einer Anzeigevorrichtung
WO2013143006A1 (fr) * 2012-03-29 2013-10-03 Orell Füssli Sicherheitsdruck Ag Caractéristique de sécurité basée sur des perforations
CA2884217C (fr) 2012-09-21 2019-09-10 Orell Fussli Sicherheitsdruck Ag Document de securite a microperforations
ITTO20131074A1 (it) * 2013-12-24 2015-06-25 Cts Electronics S P A Metodo e dispositivo di verifica microforature per validare documenti
GB2543481B (en) * 2015-10-05 2018-01-31 De La Rue Int Ltd A security sheet for an identity document
MX2020013863A (es) * 2018-08-13 2021-05-27 Crane & Co Inc Película microóptica sin lente.

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020117845A1 (en) * 2000-01-03 2002-08-29 Bundesdruckerei Gmbh Security and/or valve document
NL1012460C2 (nl) * 1999-06-28 2001-01-02 Iai Bv Verbeterd, door middel van een perforatiepatroon tegen vervalsing bestendig document.
DE19934434B4 (de) * 1999-07-22 2006-10-05 Bundesdruckerei Gmbh Wert- und Sicherheitserzeugnis mit Mikrokanälen
NL1020346C2 (nl) * 2002-04-09 2003-10-13 Ind Automation Integrators I A Van een vergelijkingsperforatie voorzien, tegen namaak beveiligd document.

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2004089644A1 *

Also Published As

Publication number Publication date
DE10315558A1 (de) 2004-10-14
WO2004089644A1 (fr) 2004-10-21

Similar Documents

Publication Publication Date Title
EP2040934B2 (fr) Élément de sécurité
EP1924446B1 (fr) Certificat d'authenticité avec micro-image de refraction
EP2257440B1 (fr) Élément de sécurité
EP2121348B1 (fr) Élément de sécurité pour document de valeur
EP2448767B1 (fr) Élément de sécurité et procédé de production correspondant
DE102007035161A1 (de) Sicherheitselement mit mehreren optisch variablen Strukturen
EP3475096B1 (fr) Élément de sécurité optique variable
EP3152063B1 (fr) Élément de sécurité et document d'identification
EP0920383A1 (fr) Imprime antifalsification
EP1509402B1 (fr) Document de valeur a zone de securite optique
EP1610959A1 (fr) Document de valeur et de securite
DE102009031386A1 (de) Sicherheitselement und Herstellungsverfahren dafür
EP2516175B1 (fr) Élément de sécurité et procédé de fabrication correspondant
DE112017003094T5 (de) Tiefgedruckte Vorrichtungen und Verfahren zur Herstellung solcher Vorrichtungen
WO2016000817A1 (fr) Élément de sécurité et procédé pour le fabriquer
AT522668A2 (de) Integration von Mikrobild-Designs
EP4049853B1 (fr) Élément de sécurité doté d'une marque luminescente, support de données et procédé de fabrication
DE60220604T2 (de) Bedienelement für bedruckte Gegenstände
EP3075561B1 (fr) Element de securite multicolore a effets
WO2020025540A1 (fr) Film de contrôle de lumière, document doté d'un film de contrôle de lumière et procédé de fabrication d'un document doté d'un film de contrôle de lumière
DE102020109155A1 (de) Banknote oder Dokument jeweils mit mindestens einem durch Drucken auf einem Substrat aufgebrachten Sicherheitselement
EP3498488A1 (fr) Élément de sécurité doté d'une structure optique variable
DE29724867U1 (de) Sicherheits- und/oder Wertdokument
EP1480838A1 (fr) Document de securite et element de securite pour un document de securite

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20050924

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL HR LT LV MK

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20060720

RIN1 Information on inventor provided before grant (corrected)

Inventor name: SPRENGER, MARTIN

Inventor name: SAUTER, DIETER

Inventor name: GRAMMLICH, DANIEL

Inventor name: HORST, WOLFGANG

Inventor name: FRANZ-BURGHOLZ, ARNIM

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20101102

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230526