EP2236311A1 - Secure identification document and method for producing it - Google Patents

Secure identification document and method for producing it Download PDF

Info

Publication number
EP2236311A1
EP2236311A1 EP09305275A EP09305275A EP2236311A1 EP 2236311 A1 EP2236311 A1 EP 2236311A1 EP 09305275 A EP09305275 A EP 09305275A EP 09305275 A EP09305275 A EP 09305275A EP 2236311 A1 EP2236311 A1 EP 2236311A1
Authority
EP
European Patent Office
Prior art keywords
xoy
document
data
plan
translucent portion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP09305275A
Other languages
German (de)
French (fr)
Inventor
Jean-Luc Lesur
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Priority to EP09305275A priority Critical patent/EP2236311A1/en
Priority to EP10712067.7A priority patent/EP2414177B1/en
Priority to BRPI1012622A priority patent/BRPI1012622B1/en
Priority to PCT/EP2010/054255 priority patent/WO2010115788A1/en
Priority to SG2011066966A priority patent/SG174440A1/en
Publication of EP2236311A1 publication Critical patent/EP2236311A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/41Marking using electromagnetic radiation

Definitions

  • This invention relates generally to secure identification documents and method for making such identification documents. More particularly, this invention relates to an identification document comprising an anti-counterfeiting element that allows detecting a fraudulent modification of an existing official personalization or a completely falsified document.
  • Identification documents are associated with secure applications, such as for example driving licenses, identity cards, membership cards, badges or passes, passports, discount cards, banking cards, money cards, multi-application cards, and other papers of value; and security documents such as bank notes.
  • Such documents are widely used, they may comprise an electronic module or not. If they comprise an electronic module, they can function either with contact and/or without contacts depending on the application to which they are intended. They may take the shape of card or a booklet or something else.
  • Such identification documents are graphically personalized. Personalized information is personal data of the card's owner, i.e for example his photo, his name, his birth date, his social security number, his biometric information such as his fingerprint for example, a validity date, an identification number allocated to him etc... This personalized information is printed onto the surface of the document, or into one or more constitution layers of the document. Because of the value and importance associated with each of these data carriers, they are often the subject of unauthorized copying and alterations, and forgeries.
  • One of these security features consists in providing a see-though portion into the structure of the document, said see-through portion comprising security markings and/or personal data of the legitimate holder, that are for example laser-engraved into the material constituting the see-through portion.
  • such see-through portion is made in polycarbonate comprising carbon particles that are sensitive to laser beam, so that they burn and blacken under the laser beam.
  • Such see-though portion are difficult to scan and therefore to copy.
  • the security markings are laser engraved into the material constituting the see-through portion, they are impossible to remove by scratching or by attacking with chemical solvents or the like.
  • a drawback of such security feature relates to the fact that an infringer can still modify the markings inside the see-through portion, by laser engraving, even if it is difficult, it is not impossible.
  • Another existing security feature consists in providing on at least one of the main surfaces of the identification document, an optically variable security element, which comprises at least two security markings and/or images.
  • Such security feature is also called "CLI/MLI image” (acronym for "Change Laser Image/ Multiple Laser Image). Said markings are decomposed and interleaved, to create a complex image that is printed into the document. Then, a filter is placed over this complex image, said filter being arranged so that it enables to visualize each marking at a respective particular angle by tilting the document.
  • Such filter can be made either with micro-lens or with printed pattern, which in the simplest case can comprise just parallel lines.
  • Figure 1 shows an example of such existing printed filter over a complex image in a cross-sectional view.
  • the filter 4 comprises parallel lines 6 that are printed onto an upper layer 2 at least translucent.
  • the filter comprises a set of substantially opaque lines 6 that are parallel and clear gaps 5 between opaque lines 6.
  • the period P of the filter is defined by the sum of the line width L and the gap width G.
  • the gap width G essentially defines the resolution requirements for the markings to be revealed.
  • a complex image 3 is printed onto a layer underneath, for example a core layer 1.
  • the complex image, or security pattern comprises in this example two markings A and B decomposed into bands that are interleaved.
  • the printing of the complex image and the filter can be made either by laser engraving or by conventional printing process such as inkjet or offset or silkscreen etc...
  • Each security markings A and B is decomposed into bands that are spaced from a distance P from each other, and each band A of one security marking is interleaved with two bands of the other security marking B, and reciprocally.
  • the distance P between each band of each security marking must be substantially the same as the period P of the filter layer 4. Then, when tilting the document, such that only one marking A or B is seen through the clear gaps 5 of the filter layer 4, this marking is seen clearly. In the figure 1 , one can see that marking A can be viewed when tilting the document at viewing angle VA, while marking B can be viewed when tilting the document at viewing angle VB.
  • optically variable security elements are difficult to copy because impossible to scan, they may still be falsified. Indeed, an infringer can arrive to change the variable data viewed through the filter, or to remove the part of the document comprising the optically variable security feature and to replace it by another part comprising another falsified optically variable element.
  • security feature necessitates complex software for computing the complex image, and it necessitates also the use of a filter material that has to be well registrated with the computed complex image, in order to achieve the required effect. Consequently, such a security feature is relatively complex and expensive to implement.
  • an identification document comprising an anti-counterfeiting element able to display different data and/or images when tilting the document, so that it protects the personalization against counterfeiting, said anti-counterfeiting element being very difficult to modify or to copy, and impossible to remove without destroying the material, while being easy to create.
  • the solution of the invention to this problem relates to the fact that said anti-counterfeiting element is created in three-dimensions through the thickness and depth of an at least translucent portion of the document.
  • each data and/or image to be revealed at a predetermined tilting angle is created into a predetermined plan, through the thickness and depth of the at least translucent portion, and comprises pixels, each pixel being arranged at predetermined location into said plan.
  • all data and/or images to be revealed at different predetermined tilt angles are defined by only one common set of pixels that are arranged at predetermined locations, through the thickness and depth of said at least translucent portion, so that said common set of pixels enables to display the different data and/or images depending on the tilt angle of the document.
  • the pixels are formed by bubbles that are created into the material of said at least translucent portion.
  • Such bubbles are very advantageous because it becomes impossible to remove them without destroying the material. Moreover, they enable to prevent the fraudulent creation of additional bubbles under existing bubbles, because the existing bubbles interfere on the laser beam used to create such bubbles.
  • the invention relates also to a method for manufacturing a secure identification document comprising an anti-counterfeiting element able to display different data and/or images when tilting the document.
  • the method is particularly remarkable in that it comprises following steps :
  • the method comprises following additional step: for each thickness of the at least translucent portion, moving each computed location of each pixel of each data and/or image to be revealed, along lines of potential locations into transversal plans that intersect defined plans, in order to create a common set of pixels able to display each data and/or image depending on the tilt angle of the document.
  • the pixels are advantageously formed by bubbles that are created by means of a laser beam with short focal distance.
  • ID identity
  • the invention is usable with any data carrier that includes, but is not limited to, a driving license, a badge or pass, a passport, a discount card, a membership card, a banking card, a credit card, a money card, a multi-application card, and other security documents and papers of value that are to be provided with information or data in such a way that they cannot be easily imitated by common means.
  • identification documents may take indifferently the shape of card, or booklet, or something else.
  • FIG. 2 shows a schematic perspective view of an identification card 10.
  • the card comprises for example a body 20 made either of only one layer, by molding for example, or of several layers attached together by means of lamination or glue or other conventional process.
  • the card body 20 is preferably protected from external stresses by two overlay layers 21, 22 that cover each main surface of the body. These overlays are preferably transparent, or at least translucent, in order to let visible some information 26 printed onto at least one main surface of the body.
  • Such information 26 can be linked to the personal information of the legitimate holder of the identity card, such as his name and/or his birth date and/or his address and/or his photography and/or a biometric information such as his finger print etc...
  • the card body 20 can be either opaque, or at least translucent and at the most transparent. If the body is completely opaque, it is necessary to provide a portion 23, inside the card body 20, which is at least translucent and at the most transparent. Such translucent portion 23 enables to create a security marking inside, which acts as an anti-counterfeiting element, i.e. that allows detecting a fraudulent modification of an existing document or a completely falsified document.
  • the anti-counterfeiting element which is provided inside the at least translucent portion 23, is created in three dimensions through the thickness and depth of the portion 23.
  • the different data and/or images that are intended to be viewed through the at least translucent portion 23 are created in predetermined locations that are arranged in different plans through the thickness and depth of the portion.
  • each character "0" and “2" of the first information "02" to be displayed is created in each parallel plan 24a and 24b, while each character “1” and “3” of the second information "13" to be revealed is created in each other parallel plan 25a, 25b.
  • each different data to be displayed is created into one different plan 24, 25 through the thickness T and depth D of the portion 23.
  • the data to be revealed can be indifferently text and/or number and/or logo and/or image and/ or photography, or the like... Moreover, such data can be linked to the personal information of the legitimate holder of the ID card. In this later case, each data and/or image to be displayed, when tilting the identification document, is variable from one document to another.
  • Each plan 24, 25 contains several potential locations 27 (shown in figure 3 ) for creating each point or pixel that will compose one character. Amongst these potential locations 27, some of them are transformed in order to change the appearance of the material of the at least translucent portion 23, so that each point or pixel that composes each character of the information to be revealed becomes visible.
  • the material can be changed at predetermined locations into each plan 24, 25, by using a laser beam for example.
  • Such laser beam can either burn the material constituting the portion 23, so that black points can be obtained for each pixel of each character to display, or it can create bubbles inside the material by material ablation or sublimation.
  • a laser beam with short focal distance is preferred, such as a picosecond YAG laser for example, with a short focal distance of typically few centimeters.
  • focale distance can be reduced to 5 cm.
  • YAG laser used can have a short pulse duration, typically 10 ps, pulse energy can vary from 0 up to 200 ⁇ J at a repetition rate of 50KHz for standard YAG laser functioning at 1064nm with maximum power of 10W, while the pulse energy can be around 100 ⁇ J at a repetition rate of 50KHz for YAG laser functioning at 532 nm wavelength with a maximum power of 5W.
  • pulse energy can be around 100 ⁇ J at a repetition rate of 50KHz for YAG laser functioning at 532 nm wavelength with a maximum power of 5W.
  • nanosecond laser which is less expensive than picosencond laser.
  • the card For creating the bubbles or black points in a predetermined depth inside the portion 23, or inside the at least translucent card body if such card body is used, the card is tilted or moved in order to change its position compare to the focal distance of the laser beam.
  • the thus created bubbles that are trapped inside the thickness of the document may be of different nature. They can be for example filled with a gas resulting from the combustion of the constitution material. Thus, they can be filed for example by a carbonic gas, which forms due to the presence of carbon particles in the constituting material 23, or by a chlorine gas for example, due to the combustion of PVC when this material is used in the constitution of the at least translucent portion 23, or the at least translucent body 20, in case no see-through portion 23 is used but only an at least translucent card body.
  • such bubbles are not limited to spherical shape, but can be of any three-dimensional shape, which is representative of a change of the visual appearance of the constitution material. In a further example, such three-dimensional shape can be not filled by a gas but can offer an optical distortion, such that it appears with a different coloration into the at least translucent material.
  • Such bubbles present some advantages. Namely, if an attempt is made by an infringer to modify the information to be revealed when tilting the document, by means of a laser beam through the thickness of the at least translucent portion 23, then the existing bubbles will interfere onto the laser beam which will be diffracted, so that fraudulent modification will appear to be different than the original anti-counterfeiting element and fraud will appear immediately to naked eyes.
  • plan P1 perpendicular to the two plans 24,(XOY) and 25 (XOY')
  • Such transversal plan P1 which is parallel to front edge E surface, can be with other relative angles, which must be around the 90° compare to plans 24 (XOY) and 25 (XOY').
  • This plan P1 provides the alignment of the bubbles of one of the lines, of a logo or text or other items to be revealed by tiliting the card.
  • figure 3 shows an example where the thickness T of the at least translucent portion 23 has been theoretically divided into 7 parts numbered A to G, corresponding respectively to the relative plans P1/A to P1/G . All these parts are intended to be pilled together, and when pilled they reveal the information to be displayed at a particular tilt angle of the document.
  • each part A to G corresponds to the plans P1/A to P1/G, which corresponds respectively to each line of pixels, of data and/or image to be revealed, that have to be created in plans 24 (XOY) and 25 (XOY').
  • the intersection of the plan P1/A to P1/G with the plans 24 (XOY) and 25 (XOY') provides respectively the line OY and OY', on which the pixels of the Line A to Line G, of the data and/or images to be revealed, that have to be created.
  • the markings that are created in each parallel plan 24 reveal first information "02" when tilting the document at a first angle, "0" being located in first plan 24a, while “2” is located in second parallel plan 24b; and second information "13” appears when tilting the document at a second angle , "1" being created in first plan 25a, while “3” being created in second parallel plan 25b.
  • Planes 24 and 25 are in fact inclined compare to the main surfaces of the document and extend through the thickness T and depth D of the at least translucent portion 23.
  • Creation of data and/or images, comprising bubble for each pixel of a character to display is preferred compare to a black burned point.
  • the bubbles are created inside the thickness of the at least translucent portion 23 from the bottom to the top of the portion, in order to render impossible the counterfeiting possibilities by modification. Namely, it is impossible to create an additional bubble deeper than an existing bubble, the existing bubble making interference for the laser beam, and causing particularly a diffraction phenomenon.
  • a second and more complex embodiment also called “encrypted embodiment” in the following description, compare to the first simple embodiment, is illustrated in figures 4A to 4C and 5 .
  • this encrypted embodiment consists in finding a common location for only one common set of bubbles, which is intended to reveal at least two different data and/or images depending on the tilt angle of the document.
  • the first simplest embodiment defines the starting point for computing the locations of the common set of bubbles.
  • Figure 4A shows two different plans 24 and 25, into which are theoretically created the bubbles, according to the simplest first embodiment, for displaying respectively the figure “0” and the figure “1 " depending on the tilt angle of the document around a tilting axis A-A.
  • plans 24 (XOY) and 25 (XOY') are a little bit shifted from theoretical axis OX, in order to show the two figures "0" and " 1 " to be revealed.
  • the figures are shown such that first front lines OY and OY' on the drawing are the bottom lines (i.e. the characters line G in the portion 23, compare to explanations given with figure 3 ).
  • First plan 24 is called plan XOY.
  • the schema illustrates a number of bubbles.
  • the clear circles 27 schematize potential locations of bubbles into the plan XOY
  • the dark bubbles schematize the theoretical locations of the bubbles created in the plan XOY according to the first simplest embodiment, according to which each information to be revealed is created into one plan.
  • the first plan 24 XOY one can see that the dark bubbles are located, so that they draw the figure "0".
  • the second plan 25, also called plan XOY' comprises dark bubbles that are located in locations, so that they draw the figure "1 ".
  • Figure 4B schematizes the view on the bottom edge, opposite to front longitudinal edge E of the document (front edge E is shown in figure 5 ).
  • This surface of bottom edge comprises a transversal plan P1 having a triangle shape, whose sides corresponds respectively to lines OY and OY' of the two plans XOY and XOY' .
  • This transversal plan P1 is the same as the first embodiment and figure 3 .
  • a second transversal plan P2, symmetrical to the first P1 compare to the base of triangle, is created. Then, for each thickness T of the at least translucent portion, i.e. for each line OY, or OY' of each plan XOY, XOY', the location of bubbles to be created for each information to be revealed is moved into the lozenge formed by the two transversal plans P1, P2, in order to obtain common locations of bubbles, defining a common set of bubbles, for the 2 characters to be displayed "0" and "1 ".
  • Figure 4C illustrates that the bottom line OY for drawing the "0” comprises theoretically three bubbles (bold encircled), while the bottom line OY' for drawing the "1” comprises theoretically five bubbles (bold encircled).
  • the common set of bubbles comprises only five bubbles and not eight, i.e. the greatest number of bubbles between the two lines OY and OY' of the two plans at the same thickness T.
  • These locations of bubbles are moved towards the arrows along lines of potential locations 27 of bubbles into the lozenge of the transversal plans P1, P2 that intersect the two planes XOY and XOY' , so that there is more than one possibility to locate the common set of bubbles.
  • Some of the possible possibilities are shown in figure 4C .
  • these steps are repeated for all the lines OY and OY' of the different plans XOY and XOY', at different thicknesses T of the at least translucent portion 23, from the deepest pixels until the pixels near the surface of the at least translucent
  • Figure 5 shows a schematic perspective view of an identification document according to this second encrypted embodiment.
  • the at least translucent portion 23 comprises a common set 28 of bubbles that does not seem to draw anything particularly.
  • a first character "0" appears at a first angle ⁇ 1
  • a second character "5" appears at a second angle ⁇ 2.
  • a deformed "0” still appears, while between the two angles one can see a deformed information between a "0" and a "5" and after the second angle ⁇ 2 a deformed "5" appears.
  • Bubbles that are created through the thickness of the translucent portion are easy to produce with an appropriate laser beam and appropriate computing software.
  • Such laser security feature has to be made from the deepest part to the surface of the transparent portion, in order to limit the counterfeiting possibilities. Indeed, it is impossible to create an additional bubble deeper than an existing bubble, the existing bubble interfering on the laser beam and causing particularly a diffraction phenomenon.

Abstract

The invention relates to secure identification document and method for producing it. Such identification document (10) comprises an anti-counterfeiting element able to display different data and/or images when tilting the document. Said anti-counterfeiting element is particularly remarkable by the fact that it is created in three dimensions through the thickness (T) and depth (D) of an at least translucent portion (23) of the document.

Description

    BACKGROUND
  • This invention relates generally to secure identification documents and method for making such identification documents. More particularly, this invention relates to an identification document comprising an anti-counterfeiting element that allows detecting a fraudulent modification of an existing official personalization or a completely falsified document.
  • Identification documents are associated with secure applications, such as for example driving licenses, identity cards, membership cards, badges or passes, passports, discount cards, banking cards, money cards, multi-application cards, and other papers of value; and security documents such as bank notes. Such documents are widely used, they may comprise an electronic module or not. If they comprise an electronic module, they can function either with contact and/or without contacts depending on the application to which they are intended. They may take the shape of card or a booklet or something else. Such identification documents are graphically personalized. Personalized information is personal data of the card's owner, i.e for example his photo, his name, his birth date, his social security number, his biometric information such as his fingerprint for example, a validity date, an identification number allocated to him etc... This personalized information is printed onto the surface of the document, or into one or more constitution layers of the document. Because of the value and importance associated with each of these data carriers, they are often the subject of unauthorized copying and alterations, and forgeries.
  • To prevent such activities from being carried out on these documents, different types of visual and touchable security features have been added to them. One of these security features consists in providing a see-though portion into the structure of the document, said see-through portion comprising security markings and/or personal data of the legitimate holder, that are for example laser-engraved into the material constituting the see-through portion. Generally, such see-through portion is made in polycarbonate comprising carbon particles that are sensitive to laser beam, so that they burn and blacken under the laser beam. Such see-though portion are difficult to scan and therefore to copy. Moreover, due to the fact that the security markings are laser engraved into the material constituting the see-through portion, they are impossible to remove by scratching or by attacking with chemical solvents or the like. However, a drawback of such security feature relates to the fact that an infringer can still modify the markings inside the see-through portion, by laser engraving, even if it is difficult, it is not impossible.
  • Another existing security feature consists in providing on at least one of the main surfaces of the identification document, an optically variable security element, which comprises at least two security markings and/or images. Such security feature is also called "CLI/MLI image" (acronym for "Change Laser Image/ Multiple Laser Image). Said markings are decomposed and interleaved, to create a complex image that is printed into the document. Then, a filter is placed over this complex image, said filter being arranged so that it enables to visualize each marking at a respective particular angle by tilting the document. Such filter can be made either with micro-lens or with printed pattern, which in the simplest case can comprise just parallel lines.
  • Figure 1 shows an example of such existing printed filter over a complex image in a cross-sectional view. The filter 4 comprises parallel lines 6 that are printed onto an upper layer 2 at least translucent. In fact, the filter comprises a set of substantially opaque lines 6 that are parallel and clear gaps 5 between opaque lines 6. The period P of the filter is defined by the sum of the line width L and the gap width G. The gap width G essentially defines the resolution requirements for the markings to be revealed. A complex image 3 is printed onto a layer underneath, for example a core layer 1. The complex image, or security pattern, comprises in this example two markings A and B decomposed into bands that are interleaved. The printing of the complex image and the filter can be made either by laser engraving or by conventional printing process such as inkjet or offset or silkscreen etc... Each security markings A and B is decomposed into bands that are spaced from a distance P from each other, and each band A of one security marking is interleaved with two bands of the other security marking B, and reciprocally. The distance P between each band of each security marking must be substantially the same as the period P of the filter layer 4. Then, when tilting the document, such that only one marking A or B is seen through the clear gaps 5 of the filter layer 4, this marking is seen clearly. In the figure 1, one can see that marking A can be viewed when tilting the document at viewing angle VA, while marking B can be viewed when tilting the document at viewing angle VB.
  • However, even if these optically variable security elements are difficult to copy because impossible to scan, they may still be falsified. Indeed, an infringer can arrive to change the variable data viewed through the filter, or to remove the part of the document comprising the optically variable security feature and to replace it by another part comprising another falsified optically variable element. Moreover such security feature necessitates complex software for computing the complex image, and it necessitates also the use of a filter material that has to be well registrated with the computed complex image, in order to achieve the required effect. Consequently, such a security feature is relatively complex and expensive to implement.
  • Considering the above, a problem intended to be solved by the invention, is to propose an identification document comprising an anti-counterfeiting element able to display different data and/or images when tilting the document, so that it protects the personalization against counterfeiting, said anti-counterfeiting element being very difficult to modify or to copy, and impossible to remove without destroying the material, while being easy to create.
  • SUMMARY
  • The solution of the invention to this problem relates to the fact that said anti-counterfeiting element is created in three-dimensions through the thickness and depth of an at least translucent portion of the document.
  • Thus, the fact to create different data and/or images to be revealed depending on the tilt angle of the document, in three dimensions, so that the data and/or image is not printed at only one depth of the at least translucent portion, but through the thickness at different depths, it becomes much more difficult to reproduce it or to modify it , because it necessitates to accurately control the depth to which the modification is to be made.
  • In such case, each data and/or image to be revealed at a predetermined tilting angle is created into a predetermined plan, through the thickness and depth of the at least translucent portion, and comprises pixels, each pixel being arranged at predetermined location into said plan.
  • In a further embodiment, all data and/or images to be revealed at different predetermined tilt angles are defined by only one common set of pixels that are arranged at predetermined locations, through the thickness and depth of said at least translucent portion, so that said common set of pixels enables to display the different data and/or images depending on the tilt angle of the document.
  • Thus, with such an embodiment, it becomes impossible to change a first data and/or image to be displayed without changing a second one. Consequently, such embodiment complicates much more a fraudulent modification.
  • In a preferred embodiment, the pixels are formed by bubbles that are created into the material of said at least translucent portion.
  • Such bubbles are very advantageous because it becomes impossible to remove them without destroying the material. Moreover, they enable to prevent the fraudulent creation of additional bubbles under existing bubbles, because the existing bubbles interfere on the laser beam used to create such bubbles.
  • According to another aspect, the invention relates also to a method for manufacturing a secure identification document comprising an anti-counterfeiting element able to display different data and/or images when tilting the document. The method is particularly remarkable in that it comprises following steps :
    • for each data and/or image to be revealed, defining a plan through the thickness and depth of an at least translucent portion,
    • in each plan, computing amongst several potential locations, the location of each pixel of the data and/or image to be revealed, each location inside said plan being more or less deep into the at least translucent portion,
    • creating each pixel at each computed location, starting from bottom to the top of the at least translucent portion.
  • According to a further embodiment, the method comprises following additional step: for each thickness of the at least translucent portion, moving each computed location of each pixel of each data and/or image to be revealed, along lines of potential locations into transversal plans that intersect defined plans, in order to create a common set of pixels able to display each data and/or image depending on the tilt angle of the document.
  • The pixels are advantageously formed by bubbles that are created by means of a laser beam with short focal distance.
  • BRIEF DESCRIPTION OF DRAWINGS
  • Other particularities and advantages of the invention will be better understood with the help of the description below, which has been provided as an illustrative and non limitative example by reference to the enclosed figures that represent:
    • Figure 1, already described, is a cross-sectional view of an existing printed filter over a complex image able to reveal different sets of data or images when tilting the document and viewed through the printed filter,
    • Figure 2, a schematic perspective view of an identification document comprising an anti-counterfeiting element according to a first embodiment of the invention,
    • Figure 3, schemas illustrating the steps of construction of an anti-counterfeiting element according to the embodiment of figure 2,
    • Figure 4A to 4C, schemas illustrating the steps of construction of an anti-counterfeiting element according to a second embodiment of the invention,
    • Figure 5, a schematic perspective view of an identification document comprising the anti-counterfeiting element according to the second embodiment and made according to the manufacturing steps illustrated in figures 4A to 4C.
    DETAILED DESCRIPTION
  • Hereafter, an embodiment of the present invention will be described in the context of identity (ID) card and a method for producing it. However, it is to be understood that the invention is usable with any data carrier that includes, but is not limited to, a driving license, a badge or pass, a passport, a discount card, a membership card, a banking card, a credit card, a money card, a multi-application card, and other security documents and papers of value that are to be provided with information or data in such a way that they cannot be easily imitated by common means. Such identification documents may take indifferently the shape of card, or booklet, or something else.
  • Figure 2 shows a schematic perspective view of an identification card 10. The card comprises for example a body 20 made either of only one layer, by molding for example, or of several layers attached together by means of lamination or glue or other conventional process. The card body 20 is preferably protected from external stresses by two overlay layers 21, 22 that cover each main surface of the body. These overlays are preferably transparent, or at least translucent, in order to let visible some information 26 printed onto at least one main surface of the body. Such information 26 can be linked to the personal information of the legitimate holder of the identity card, such as his name and/or his birth date and/or his address and/or his photography and/or a biometric information such as his finger print etc...
  • The card body 20 can be either opaque, or at least translucent and at the most transparent. If the body is completely opaque, it is necessary to provide a portion 23, inside the card body 20, which is at least translucent and at the most transparent. Such translucent portion 23 enables to create a security marking inside, which acts as an anti-counterfeiting element, i.e. that allows detecting a fraudulent modification of an existing document or a completely falsified document.
  • In order to increase the security of such document, the anti-counterfeiting element, which is provided inside the at least translucent portion 23, is created in three dimensions through the thickness and depth of the portion 23. In fact, the different data and/or images that are intended to be viewed through the at least translucent portion 23 are created in predetermined locations that are arranged in different plans through the thickness and depth of the portion.
  • In the example of figure 2, two different information are able to be viewed through the portion 23 depending on the tilting angle of the card around the tilting axis A-A, which is for example perpendicular to front longitudinal edge E of the document. At a first angle α1, information "02" is viewed, while at a second angle α2 information "13" is viewed. For that, each character that composes the information to be revealed at a particular angle, is created into a particular plan 24, 25 through the thickness T and depth D of the at least translucent portion 23. In the example of figure 2, each character "0" and "2" of the first information "02" to be displayed is created in each parallel plan 24a and 24b, while each character "1" and "3" of the second information "13" to be revealed is created in each other parallel plan 25a, 25b. In the example of figure 2, only two different data are to be revealed when tilting the document, but it is only for simplification and of course it is possible to display more than two different data when tilting the document. In this case, each different data to be displayed is created into one different plan 24, 25 through the thickness T and depth D of the portion 23. The data to be revealed can be indifferently text and/or number and/or logo and/or image and/ or photography, or the like... Moreover, such data can be linked to the personal information of the legitimate holder of the ID card. In this later case, each data and/or image to be displayed, when tilting the identification document, is variable from one document to another.
  • Each plan 24, 25 contains several potential locations 27 (shown in figure 3) for creating each point or pixel that will compose one character. Amongst these potential locations 27, some of them are transformed in order to change the appearance of the material of the at least translucent portion 23, so that each point or pixel that composes each character of the information to be revealed becomes visible. For that, the material can be changed at predetermined locations into each plan 24, 25, by using a laser beam for example. Such laser beam can either burn the material constituting the portion 23, so that black points can be obtained for each pixel of each character to display, or it can create bubbles inside the material by material ablation or sublimation. In order to change the material with great precision, a laser beam with short focal distance is preferred, such as a picosecond YAG laser for example, with a short focal distance of typically few centimeters. For example, focale distance can be reduced to 5 cm. YAG laser used can have a short pulse duration, typically 10 ps, pulse energy can vary from 0 up to 200µJ at a repetition rate of 50KHz for standard YAG laser functioning at 1064nm with maximum power of 10W, while the pulse energy can be around 100µJ at a repetition rate of 50KHz for YAG laser functioning at 532 nm wavelength with a maximum power of 5W. But such example is not limitative and it is also possible to use for example nanosecond laser, which is less expensive than picosencond laser.
  • For creating the bubbles or black points in a predetermined depth inside the portion 23, or inside the at least translucent card body if such card body is used, the card is tilted or moved in order to change its position compare to the focal distance of the laser beam.
  • The thus created bubbles that are trapped inside the thickness of the document may be of different nature. They can be for example filled with a gas resulting from the combustion of the constitution material. Thus, they can be filed for example by a carbonic gas, which forms due to the presence of carbon particles in the constituting material 23, or by a chlorine gas for example, due to the combustion of PVC when this material is used in the constitution of the at least translucent portion 23, or the at least translucent body 20, in case no see-through portion 23 is used but only an at least translucent card body. Moreover, such bubbles are not limited to spherical shape, but can be of any three-dimensional shape, which is representative of a change of the visual appearance of the constitution material. In a further example, such three-dimensional shape can be not filled by a gas but can offer an optical distortion, such that it appears with a different coloration into the at least translucent material.
  • Such bubbles present some advantages. Namely, if an attempt is made by an infringer to modify the information to be revealed when tilting the document, by means of a laser beam through the thickness of the at least translucent portion 23, then the existing bubbles will interfere onto the laser beam which will be diffracted, so that fraudulent modification will appear to be different than the original anti-counterfeiting element and fraud will appear immediately to naked eyes.
  • In the schema of figure 2, one can define a plan P1(YOY') perpendicular to the two plans 24,(XOY) and 25 (XOY') Such transversal plan P1, which is parallel to front edge E surface, can be with other relative angles, which must be around the 90° compare to plans 24 (XOY) and 25 (XOY'). This plan P1 provides the alignment of the bubbles of one of the lines, of a logo or text or other items to be revealed by tiliting the card. By duplicating the plan P1 using other plans parallel to P1, across the plans 24 and 25, through the thickness T of the portion 23, and at separated distance of pixels size, the different lines of the different items to be created are defined.
  • In order to explain how the different locations of the pixels constituting each character to be displayed are predetermined, i.e. the locations of each bubble to create, figure 3 shows an example where the thickness T of the at least translucent portion 23 has been theoretically divided into 7 parts numbered A to G, corresponding respectively to the relative plans P1/A to P1/G . All these parts are intended to be pilled together, and when pilled they reveal the information to be displayed at a particular tilt angle of the document.
  • As it has already been explained, each part A to G corresponds to the plans P1/A to P1/G, which corresponds respectively to each line of pixels, of data and/or image to be revealed, that have to be created in plans 24 (XOY) and 25 (XOY'). The intersection of the plan P1/A to P1/G with the plans 24 (XOY) and 25 (XOY') provides respectively the line OY and OY', on which the pixels of the Line A to Line G, of the data and/or images to be revealed, that have to be created.
  • Thus, on part A, one can see, on the left part of the drawing, that at first intersection of the transversal plan P1/A and the surface 24a corresponding to first top line OY of plan XOY 24a, there are three locations for bubbles to create (in dark) amongst potential locations 27 (schematized by all the circles). This corresponds to the creation of the dark pixels of character "0" on Line A. In a same manner, the intersection of the transversal plan P1/A and the surface 25a corresponding to first top line OY' of plan XO'Y' 25a, reveals only one location for bubbles to create (in dark) amongst potential locations 27 (schematized by all the circles). This corresponds to the creation of the only dark pixel of character "1" on Line A. In a similar way, on the right part of the drawing, first intersection of the transversal plan P1/A and surface 24b corresponding to first top line OY of plan XOY 24b, there are three locations for bubbles to create (in dark), corresponding to the three dark pixels of the character "2" on Line A, while first intersection of the transversal plan P1/A and surface 25b corresponding to first top line OY' of plan XOY' 25b, there are three locations for bubbles to create (in dark), corresponding to the three dark pixels of the character "3" on Line A. These steps of computing are repeated for each thickness T of portion 23, using plan P1/A to P1/G in correspondence to the characters line A to Line G, i.e. for each line OY and OY' of each plan XOY and XOY', until bottom lines OY, OY' (Line G, part G). Then, all the computed bubbles are created inside the at least translucent material, by using a laser beam with short focal distance. For that, for each thickness of the at least translucent portion, bubbles are created in such a manner that the deepest are first created, until the surface of the at least translucent portion.
  • Then, when all the plans P1/A to P1/G are pilled together, all the created bubbles on surface 24a, by means of transversal plans P1 corresponding to all the lines OY of plan XOY, are intended to reveal "0", while all the created bubbles on first surface 24b are intended to reveal "2". In the same manner, all the created bubbles on surface 25a, by means of transversal plans P1" corresponding to all the lines OY' of plan XOY', are intended to reveal "1", while surface 25b is intended to reveal "3".
  • In the illustrated example, when all the parts are pilled together, the markings that are created in each parallel plan 24 reveal first information "02" when tilting the document at a first angle, "0" being located in first plan 24a, while "2" is located in second parallel plan 24b; and second information "13" appears when tilting the document at a second angle , "1" being created in first plan 25a, while "3" being created in second parallel plan 25b. Planes 24 and 25 are in fact inclined compare to the main surfaces of the document and extend through the thickness T and depth D of the at least translucent portion 23.
  • Creation of data and/or images, comprising bubble for each pixel of a character to display is preferred compare to a black burned point. Indeed, in such case, the bubbles are created inside the thickness of the at least translucent portion 23 from the bottom to the top of the portion, in order to render impossible the counterfeiting possibilities by modification. Namely, it is impossible to create an additional bubble deeper than an existing bubble, the existing bubble making interference for the laser beam, and causing particularly a diffraction phenomenon.
  • A second and more complex embodiment, also called "encrypted embodiment" in the following description, compare to the first simple embodiment, is illustrated in figures 4A to 4C and 5. Instead of creating several sets of bubbles, each set being intended to reveal each information to be displayed as in the first embodiment, this encrypted embodiment consists in finding a common location for only one common set of bubbles, which is intended to reveal at least two different data and/or images depending on the tilt angle of the document. For implementing such encrypted embodiment, the first simplest embodiment defines the starting point for computing the locations of the common set of bubbles.
  • Figure 4A shows two different plans 24 and 25, into which are theoretically created the bubbles, according to the simplest first embodiment, for displaying respectively the figure "0" and the figure "1" depending on the tilt angle of the document around a tilting axis A-A. In figure 4A, plans 24 (XOY) and 25 (XOY') are a little bit shifted from theoretical axis OX, in order to show the two figures "0" and "1" to be revealed. Moreover, the figures are shown such that first front lines OY and OY' on the drawing are the bottom lines (i.e. the characters line G in the portion 23, compare to explanations given with figure 3).
  • First plan 24 is called plan XOY. The schema illustrates a number of bubbles. Amongst these schematic bubbles, the clear circles 27 schematize potential locations of bubbles into the plan XOY, while the dark bubbles schematize the theoretical locations of the bubbles created in the plan XOY according to the first simplest embodiment, according to which each information to be revealed is created into one plan. In this first plan 24 XOY, one can see that the dark bubbles are located, so that they draw the figure "0". In the same manner, the second plan 25, also called plan XOY', comprises dark bubbles that are located in locations, so that they draw the figure "1 ".
  • Figure 4B schematizes the view on the bottom edge, opposite to front longitudinal edge E of the document (front edge E is shown in figure 5). This surface of bottom edge comprises a transversal plan P1 having a triangle shape, whose sides corresponds respectively to lines OY and OY' of the two plans XOY and XOY' . In fact, at each thickness T into the translucent portion 23, there is a surface, parallel to the surface of front longitudinal edge E, that comprises a transversal plan P1 having a triangle shape, whose sides corresponds to each line OY and OY' of the plans XOY and XOY'. This transversal plan P1 is the same as the first embodiment and figure 3.
  • For the purpose of computation of the common locations of the common set of bubbles in this second embodiment, a second transversal plan P2, symmetrical to the first P1 compare to the base of triangle, is created. Then, for each thickness T of the at least translucent portion, i.e. for each line OY, or OY' of each plan XOY, XOY', the location of bubbles to be created for each information to be revealed is moved into the lozenge formed by the two transversal plans P1, P2, in order to obtain common locations of bubbles, defining a common set of bubbles, for the 2 characters to be displayed "0" and "1 ". This is schematized in figure 4C for the first line OY of the plan XOY and the first line OY' of the plan XOY', said first line being at the bottom of the portion 23. In figure 4C, potential locations into the lozenge are schematized by clear bubbles, while theoretical bubbles for creating different sets of bubbles for each information to be revealed "0" and "1" according to first embodiment are schematized by a bold circle, and the common new set of bubbles, according to the encrypted embodiment, intended to display the two characters "0" and "1", depending on the tilt angle of the document is schematized by dark bubbles. The new locations of bubbles have to be into the viewing axes of the two transversal planes P1 and P2. Figure 4C illustrates that the bottom line OY for drawing the "0" comprises theoretically three bubbles (bold encircled), while the bottom line OY' for drawing the "1" comprises theoretically five bubbles (bold encircled). In this case, the common set of bubbles comprises only five bubbles and not eight, i.e. the greatest number of bubbles between the two lines OY and OY' of the two plans at the same thickness T. These locations of bubbles are moved towards the arrows along lines of potential locations 27 of bubbles into the lozenge of the transversal plans P1, P2 that intersect the two planes XOY and XOY' , so that there is more than one possibility to locate the common set of bubbles. Some of the possible possibilities are shown in figure 4C. Then, these steps are repeated for all the lines OY and OY' of the different plans XOY and XOY', at different thicknesses T of the at least translucent portion 23, from the deepest pixels until the pixels near the surface of the at least translucent portion.
  • Figure 5 shows a schematic perspective view of an identification document according to this second encrypted embodiment. The at least translucent portion 23 comprises a common set 28 of bubbles that does not seem to draw anything particularly. However, when tilting the document around the axis A-A perpendicular to the front longitudinal edge E of the document (along plan XOZ), then some interesting information appear and disappear depending on the tilt angle. In the illustrated example, a first character "0" appears at a first angle α1, while a second character "5" appears at a second angle α2. Before the first angle, a deformed "0" still appears, while between the two angles one can see a deformed information between a "0" and a "5" and after the second angle α2 a deformed "5" appears.
  • All plans used for the realization of the different detailed embodiments that have been described can be not necessary perpendicular between each other and can be placed at different angles of a traditional 3D system comprising axes X, Y,Z and constituted by the borders of the body of the document 10.
  • The detailed embodiments that have been described are not limited to those and other embodiments apply without departing the scope of the invention. Particularly, the embodiments have been described for only two different information, but the invention applies also for such embodiments intended to reveal more than two different information depending on the tilt angle. Moreover, the described embodiments comprise an at least translucent portion 23, but the invention applies also for document whose the whole core is at least translucent and at the most transparent.
  • Bubbles that are created through the thickness of the translucent portion are easy to produce with an appropriate laser beam and appropriate computing software.
  • Moreover, it is possible to create information to be displayed that can be variable from one document to another, depending on personalization data. Indeed, it is possible to create two or more different data and/or images, through the thickness and depth of the translucent portion, said data and/or images being linked to the personalization information of the legitimate holder of the document.
  • Such laser security feature has to be made from the deepest part to the surface of the transparent portion, in order to limit the counterfeiting possibilities. Indeed, it is impossible to create an additional bubble deeper than an existing bubble, the existing bubble interfering on the laser beam and causing particularly a diffraction phenomenon.
  • Moreover, such security feature is difficult to copy or modify because placement possibilities are difficult to compute. Finally, concerning the second encrypted embodiment, adding a bubble, in order to modify a first data and/or image, implies to modify the second data and/or image to be revealed. Consequently, the second encrypted embodiment is much more difficult to modify.

Claims (12)

  1. Identification document comprising an anti-counterfeiting element able to display different data and/or images when tilting the document, characterized in that said anti-counterfeiting element is created in three-dimensions through the thickness (T) and depth (D) of an at least translucent portion (23, 20) of the document.
  2. Identification document according to claim 1, wherein the whole body (20) of the document defines said at least translucent portion.
  3. Identification document according to claim 1 or 2, wherein each data and/or image to be revealed at a predetermined tilt angle is created into a predetermined plan (24 (XOY); 25(XOY')), through the thickness (T) and depth (D) of the at least translucent portion (23, 20), and comprises pixels, each pixel being arranged at predetermined location into said plan (24 (XOY); 25(XOY')).
  4. Identification document according to claim 1 or 2, wherein all data and/or images to be revealed at different predetermined tilt angles are defined by only one common set (28) of pixels that are arranged at predetermined locations through the thickness (T) and depth (D) of said at least translucent portion (23, 20), so that said common set (28) of pixels enables to display the different data and/or images depending on the tilt angle of the document.
  5. Identification document according to anyone of preceding claims, wherein the pixels are formed by bubbles that are created into the material of said at least translucent portion (23, 20).
  6. Identification document according to anyone of preceding claims, wherein at least one data and/or image to be revealed at a predetermined tilting angle is linked to personalized information of the legitimate holder of the document.
  7. Method for manufacturing a secure identification document comprising an anti-counterfeiting element able to display different data and/or images when tilting the document, characterized in that said method comprises the following steps :
    - for each data and/or image to be revealed, defining a plan (24 (XOY); 25(XOY')) through the thickness (T) and depth (D) of an at least translucent portion (23, 20),
    - in each plan (24 (XOY); 25(XOY')), computing amongst several potential locations (27), the location of each pixel of each data and/or image to be revealed, each location inside said plan being more or less deep into the at least translucent portion (23, 20),
    - creating each pixel at each computed location, starting from bottom to the top of the at least translucent portion (23, 20).
  8. Method according to claim 7, wherein the computing step consists in building several transversal plans (P1/A to P1/G) that intersect each defined plan (24 (XOY); 25(XOY')), through the thickness (T) of the at least translucent portion (23, 20), and at separated distance of pixel size, each built plan (P1/A to P1/G) providing the lines of the pixels to be created at each thickness (T) for each line (OY, OY') of each defined plan (24 (XOY); 25(XOY')).
  9. Method according to claim 8, wherein it comprises following additional step: for each thickness (T) of the at least translucent portion (23, 20), moving each computed location of each pixel, of each data and/or image to be revealed, along lines of potential locations (27) into transversal plans (P1, P2) that intersect the defined plans (24 (XOY); 25(XOY')), in order to create a common set (28) of pixels able to display each data and/or image depending on the tilt angle of the document.
  10. Method according to anyone of claims 7 to 9, wherein the step of creation of pixels consists in creating bubbles in place of pixels, by means of a laser beam with short focal distance.
  11. Method according to anyone of claims 7 to 10, wherein the step of computing the locations of pixels of the data and/or images to display consists in computing, for each thickness (T) of the at least translucent portion (23, 20), said locations, so that when all the computed locations are pilled, they form the data and/or images to be displayed.
  12. Use of a laser beam with short focal distance for creating bubbles through the thickness (T) and depth (D) of an at least translucent portion (23, 20) of an identification document, so that each bubble defines a pixel of data and/or image to be revealed when tilting said document.
EP09305275A 2009-03-31 2009-03-31 Secure identification document and method for producing it Withdrawn EP2236311A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP09305275A EP2236311A1 (en) 2009-03-31 2009-03-31 Secure identification document and method for producing it
EP10712067.7A EP2414177B1 (en) 2009-03-31 2010-03-30 Secure identification document and method for producing it
BRPI1012622A BRPI1012622B1 (en) 2009-03-31 2010-03-30 identification document, method for making a secure identification document, and use of a laser beam with short focal length
PCT/EP2010/054255 WO2010115788A1 (en) 2009-03-31 2010-03-30 Secure identification document and method for producing it
SG2011066966A SG174440A1 (en) 2009-03-31 2010-03-30 Secure identification document and method for producing it

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP09305275A EP2236311A1 (en) 2009-03-31 2009-03-31 Secure identification document and method for producing it

Publications (1)

Publication Number Publication Date
EP2236311A1 true EP2236311A1 (en) 2010-10-06

Family

ID=40756500

Family Applications (2)

Application Number Title Priority Date Filing Date
EP09305275A Withdrawn EP2236311A1 (en) 2009-03-31 2009-03-31 Secure identification document and method for producing it
EP10712067.7A Active EP2414177B1 (en) 2009-03-31 2010-03-30 Secure identification document and method for producing it

Family Applications After (1)

Application Number Title Priority Date Filing Date
EP10712067.7A Active EP2414177B1 (en) 2009-03-31 2010-03-30 Secure identification document and method for producing it

Country Status (4)

Country Link
EP (2) EP2236311A1 (en)
BR (1) BRPI1012622B1 (en)
SG (1) SG174440A1 (en)
WO (1) WO2010115788A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2722193A1 (en) * 2012-10-19 2014-04-23 Gemalto SA Secure data carrier and method of production of said secure data carrier
US10479128B2 (en) * 2017-10-27 2019-11-19 Assa Abloy Ab Security feature

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2304077A (en) * 1995-06-30 1997-03-12 Andrew John Farrall Security device comprising reflective particles
GB2324065A (en) * 1997-04-09 1998-10-14 James Howard Slater An identification code for banknotes or credit cards comprising a pattern of random beads
WO2001057831A1 (en) * 2000-02-04 2001-08-09 Societe Novatec S.A. Method and device for reading authentication means and adapted identification means
WO2007090437A1 (en) * 2006-02-06 2007-08-16 Veil, Marc Protection system, protection method and an element protected in this way

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3151407C1 (en) * 1981-12-24 1983-10-13 GAO Gesellschaft für Automation und Organisation mbH, 8000 München ID card and process for its manufacture
DE102006021961A1 (en) * 2006-05-10 2007-11-15 Giesecke & Devrient Gmbh Safety element with laser marking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2304077A (en) * 1995-06-30 1997-03-12 Andrew John Farrall Security device comprising reflective particles
GB2324065A (en) * 1997-04-09 1998-10-14 James Howard Slater An identification code for banknotes or credit cards comprising a pattern of random beads
WO2001057831A1 (en) * 2000-02-04 2001-08-09 Societe Novatec S.A. Method and device for reading authentication means and adapted identification means
WO2007090437A1 (en) * 2006-02-06 2007-08-16 Veil, Marc Protection system, protection method and an element protected in this way

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2722193A1 (en) * 2012-10-19 2014-04-23 Gemalto SA Secure data carrier and method of production of said secure data carrier
WO2014060504A1 (en) * 2012-10-19 2014-04-24 Gemalto S.A. Secure data carrier and method of production of said secure data carrier
EP2909041B1 (en) 2012-10-19 2016-09-21 Gemalto SA Secure data carrier and method of production of said secure data carrier
US10479128B2 (en) * 2017-10-27 2019-11-19 Assa Abloy Ab Security feature

Also Published As

Publication number Publication date
EP2414177A1 (en) 2012-02-08
EP2414177B1 (en) 2018-06-13
SG174440A1 (en) 2011-10-28
BRPI1012622A2 (en) 2016-03-29
BRPI1012622B1 (en) 2020-02-04
WO2010115788A1 (en) 2010-10-14

Similar Documents

Publication Publication Date Title
EP1698485A2 (en) Identification document with lenticular watermark
US8505979B2 (en) Method for producing a data carrier and data carrier produced therefrom
CA2769594C (en) Identification document having a personalized visual marking and method for its manufacture
US10259256B2 (en) Process for securing an identification document and secure identification document
ES2569612T3 (en) Safety element and manufacturing method
US10112434B2 (en) Shadow image security feature
EP2373493B1 (en) Identification document with an improved anti-counterfeiting element
JP2010527809A (en) Film element for detecting authenticity and method for manufacturing the same
EP2414172B1 (en) A method for manufacturing an identification document comprising a see-through portion with anti-counterfeiting bubbles and a corresponding use of a laser
US20070279697A1 (en) Security element for a data carrier, data carrier comprising such a security element, semifinished product for producing a data carrier, and method for producing a data carrier
US9682592B2 (en) Light control film formed with a security feature
EP3127092B1 (en) Data carrier
EP2239145A1 (en) Anti-counterfeiting element with flip images for an identification document and a method for its manufacture
EP2414177B1 (en) Secure identification document and method for producing it
EP3838611A1 (en) Security element for a data carrier, data carrier and method of production of the security element and use of the security element for production of a data carrier
ES2286200T3 (en) PROTECTION AGAINST DATA FALSIFICATION.
UA5903U (en) Plastic card

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

AKY No designation fees paid
REG Reference to a national code

Ref country code: DE

Ref legal event code: R108

Effective date: 20110526

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20101207