EP2240333A2 - Élément de sécurité - Google Patents

Élément de sécurité

Info

Publication number
EP2240333A2
EP2240333A2 EP09707424A EP09707424A EP2240333A2 EP 2240333 A2 EP2240333 A2 EP 2240333A2 EP 09707424 A EP09707424 A EP 09707424A EP 09707424 A EP09707424 A EP 09707424A EP 2240333 A2 EP2240333 A2 EP 2240333A2
Authority
EP
European Patent Office
Prior art keywords
security element
microreflectors
detector
security
radiation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP09707424A
Other languages
German (de)
English (en)
Inventor
Markus Gerigk
Andreas BÄCKER
Simon Vougioukas
Thomas Birsztejn
Josef Kenfenheuer
Ludger BRÜLL
Georgios Tziovaras
Dirk Pophusen
Mehmet-Cengiz Yesildag
Heinz Pudleiner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bayer Intellectual Property GmbH
Original Assignee
Bayer Technology Services GmbH
Bayer MaterialScience AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE102008007731A external-priority patent/DE102008007731B4/de
Priority claimed from DE102008016803A external-priority patent/DE102008016803A1/de
Priority claimed from DE102008051409A external-priority patent/DE102008051409A1/de
Application filed by Bayer Technology Services GmbH, Bayer MaterialScience AG filed Critical Bayer Technology Services GmbH
Publication of EP2240333A2 publication Critical patent/EP2240333A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • GPHYSICS
    • G02OPTICS
    • G02BOPTICAL ELEMENTS, SYSTEMS OR APPARATUS
    • G02B5/00Optical elements other than lenses
    • G02B5/12Reflex reflectors
    • G02B5/122Reflex reflectors cube corner, trihedral or triple reflector type
    • G02B5/124Reflex reflectors cube corner, trihedral or triple reflector type plural reflecting elements forming part of a unitary plate or sheet
    • B42D2033/18
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose

Definitions

  • the invention relates to optical security elements, their use for the identification and authentication of objects, as well as methods and devices for the identification and authentication of objects based on the optical security elements.
  • Security elements are preferably inseparably connected to the objects to be protected. The attempt to separate the security elements from the object preferably leads to their destruction, so that the security elements can not be misused.
  • the authenticity of an object can be verified by the presence of one or more security elements.
  • Optical security elements such as e.g. Watermarks, specialty inks, guilloche patterns, micro-typefaces and holograms are established worldwide.
  • An overview of optical security elements, which are particularly but not exclusively suitable for document protection, is published in the following book: Rudolf L. van Renesse, Optical Document Security, Third Edition, Artech House Boston / London, 2005 (pp 63-259).
  • optical security elements can be divided into the following categories:
  • Level 1 Visible ⁇ overi) - the security element is visible to the human eye and can therefore be checked easily and without any aids. Visible security elements allow each person in a first
  • Level 2 Invisible (covert) - the security element is invisible to the human eye.
  • a (simple) device is necessary.
  • Level 3 Forensic - the authentication is done by special equipment.
  • optically variable security elements that produce a different visual impression under different viewing angles.
  • Such security elements have, for example, optical diffraction structures which reconstruct different images at different viewing angles. Such effects can not be reproduced with the normal and widely used copying and printing techniques.
  • DOE diffractive optically variable image element
  • Embossed holograms are characterized in that the light-diffracting structure is converted into a three-dimensional relief structure, which is transferred to a stamping mold.
  • This embossing mold can be embossed as a master hologram in plastic films. This makes it possible to produce a large number of security elements cost.
  • the disadvantage is that many products are not equipped with visible holograms for design or aesthetic reasons. Although perfume bottles are objects that are regularly and extensively counterfeited, there are no holograms on these products, as they do not seem to fit with the product's "image” for marketing purposes, so it would be desirable to have security features available. which can also be integrated into (design) products without adversely affecting the "image” of the product.
  • a disadvantage of the embossing holograms described is further that they can not be detected by machine for authenticity. Complete coverage of the supply chain requires fast and reliable proof of authenticity at various points.
  • optical codes such as e.g. Barcodes used. Barcodes are pure features for the recognition and tracking of an object, which have no security features. They are easy to copy / fake.
  • a combination of product tracking features and anti-counterfeiting features provide RFID chips, but their use is limited because of their relatively high cost, slow read speed, and sensitivity to electromagnetic interference. It would therefore be desirable to have a security feature that is machine readable to allow for automated product tracking along the supply chain and to be able to perform a machine authenticity check.
  • embossed holograms are not customizable according to the prior art.
  • the embossed holograms are indistinguishable. This means, on the one hand, that a forger has to copy / forge only one master hologram in order to obtain a multitude of embossed holograms for counterfeit products.
  • objects can not be individualized by the embossed holograms because of their indistinguishability. For reasons of better protection against counterfeiting and the possibility of tracking and recognizing individual objects, it is preferable to use security features which can be individualized, ie which have individual security features for each product to be protected.
  • Individual characteristics are, for example, a serial number, the date of manufacture or, in the case of personal security documents, the name, an HD number or a biometric feature.
  • An individualizable security element is described, for example, in EP 0896260 A3, in which the individualization is carried out during the production of the security element.
  • Individuality is based on a deterministic process. The choice of parameters in the manufacture of the security element clearly and reproducibly determines the design of the security element. Deterministic individuality has the disadvantage that it can in principle be readjusted / copied, since there is a clear and reproducible method that generates the individual characteristics.
  • the variability in a deterministic method is usually limited, ie only a limited number of individual features can be generated with a limited set of parameters, so that only a limited number of objects can be made distinguishable.
  • the protection against counterfeiting and the number of distinguishable objects is generally higher for security elements which have random features than for security features with purely deterministic features.
  • WO2005088533A1 a method is described in which objects that have a fibrous structure (eg paper) can be clearly recognized on the basis of their random surface properties.
  • a laser beam is focused on the surface of the object, moved over the surface and detected by means of photodetectors at different points of the surface at different angles different degrees of scattered rays.
  • the detected scattered radiation is characteristic of a variety of different materials and individually for each surface. It is very difficult to imitate because it is due to coincidence in the manufacture of the object.
  • the scatter data for the individual objects are stored in a database in order to be able to authenticate the object at a later time. For this purpose, the object is measured again and the scatter data compared with the stored reference data.
  • a disadvantage of the method described is that only objects that have a sufficiently large number of random scattering centers can be detected by this method. Furthermore, for an authenticity check always the application of the method and thus a corresponding device is required. It is any People who hold such an object in their hands, not possible to make an obvious assessment of the authenticity of the object.
  • the task of providing a security element are implemented in the security features of different security levels side by side.
  • security features of all the above-mentioned levels ⁇ overt, covert, forensic) are included.
  • the security element should therefore allow both an obviousness check by a human without the aid of aids (devices) alone with his senses ⁇ overt), but at the same time also contain features of higher security levels ⁇ covert, forensic), which make a forgery more difficult and can be proven with the help of appropriate aids can.
  • the security element should be machine-checkable and customizable.
  • the security element should have at least one random character feature to provide maximum protection against counterfeiting while allowing a high number of objects to be differentiated.
  • the security element should be inexpensive and connectable to a variety of objects without adversely affecting object design.
  • the method for checking the authenticity and / or identifying the security element should be machine-executable and fast.
  • the device for checking the authenticity and / or identification of the security element should be cost-effective and operable by anyone after a short introduction, without the need for special knowledge.
  • a security element comprising at least one layer in which a multiplicity of randomly distributed and / or oriented microreflectors are contained.
  • the subject of the present invention is therefore a security element comprising at least one transparent layer, in which a plurality of microreflectors are randomly distributed, characterized in that at least a part of the microreflectors has at least one reflecting surface which is not arranged parallel to the surface of the transparent layer ,
  • the security element is characterized in that it comprises at least one layer that is transparent to electromagnetic radiation having at least one wavelength.
  • Transparency is understood to mean that the proportion of the electromagnetic radiation having at least one wavelength which penetrates the layer is greater than the sum of the portions of the electromagnetic radiation having at least one wavelength which are absorbed by the layer or reflected at the boundary surfaces of the layer , The transmittance of the layer is thus greater than 50%, wherein the transmittance of the ratio of the intensity of electromagnetic radiation having at least one wavelength which passes through the layer, based on the intensity of the electromagnetic radiation having the at least one wavelength which impinges on the layer is to be understood.
  • a transparent layer is referred to as a transparent layer.
  • the transmittance of the transparent layer for at least one wavelength is preferably between 60% and 100%, particularly preferably between 80% and 100%.
  • the at least one wavelength of the electromagnetic radiation for which the at least one layer of the security element according to the invention has the abovementioned property of transparency is preferably in the range between 300 nm and 1000 nm, particularly preferably between 400 nm and 800 nm.
  • the transparent layer of the security element according to the invention has a transmittance of at least 60% for electromagnetic radiation with a wavelength between 400 and 800 nm.
  • the transparent layer of the security element according to the invention has a thickness between 1 .mu.m and 1 cm.
  • the layer thickness is preferably in the range between 1 ⁇ m and 1 mm, particularly preferably between 10 ⁇ m and 500 ⁇ m.
  • the transparent layer is preferably made of glass, a ceramic or a plastic.
  • the transparent layer is preferably a film formed from a varnish or a film.
  • a film and a film are characterized in that one of the three spatial dimensions (thickness) is at least a factor of 10, preferably at least 100 times smaller than the two remaining spatial dimensions (length, width) of its body.
  • a varnish is a liquid or powder coating material which is thinly applied to objects and built up into a continuous film by chemical or physical processes (for example, evaporation of the solvent, polymerization of paint-containing monomers or oligomers, or the like).
  • a film is a solid body that has the ability to be wound on or around objects and to conform to their shape.
  • thermoplastic material in the form of a film is used as the transparent layer.
  • suitable films of thermoplastic materials are, for example, those of known thermoplastic aromatic polycarbonates Weight average molecular weights Mw of from 25,000 to 200,000, preferably from 30,000 to 120,000 and in particular from 30,000 to 80,000 (Mw determined via Eta rel in dichloromethane at 20 ° C and a concentration of 0.5 g per 100 ml) and those of known thermoplastic polyarylsulfones, which linear (see DE-OS 27 35 144) or branched (see DE-OS 27 35 092 and DE-OS 23 05 413) may be.
  • thermoplastic cellulose esters thermoplastic polyvinyl chlorides, thermoplastic styrene-acrylonitrile copolymers and thermoplastic polyurethanes.
  • Suitable cellulose esters are obtained by conventional processes by esterification of the cellulose with aliphatic monocarboxylic anhydrides, preferably acetic and butyric or acetic and propionic anhydrides.
  • thermoplastics are e.g. Polypolyacrylates and copolyacrylates and poly- or copolymers of copolymethacrylate such as by way of example and preferably polymethyl methacrylate (PMMA), poly- or copolymers with styrene, such as by way of example and preferably transparent polystyrene (PS) or polystyrene-acrylonitrile (SAN), transparent thermoplastic polyurethanes, and polyolefins, such as by way of example and preferably transparent polypropylene types or polyolefins based on cyclic olefins (for example TOPAS®, Topas Advanced Polymers), poly- or copolycondensates of terephthalic acid, such as, by way of example and preferably, poly- or copolyethylene terephthalate (PET or CoPET) or glycol-modified PET (PETG ), Polyethylene glycol naphthenate (PEN), transparent polysulfones (PSU).
  • Suitable linear polyaryl sulfones are all known aromatic polysulfones or polyethersulfones having Mw (weight average molecular weight measured, for example, by light scattering) between about 15,000 and about 55,000, preferably between about 20,000 and about 40,000.
  • Mw weight average molecular weight measured, for example, by light scattering
  • Suitable branched polyaryl sulfones are in particular the branched polyaryl ether sulfones according to DE-OS 23 05 413 or US Pat. No. 3,960,815, whose Mw (weight average molecular weight, measured, for example, by light scattering) is between about 15,000 and about 50,000, preferably between about 20,000 and 40 000 lie. (For more details see DE-AS 30 10 143).
  • Suitable thermoplastic polyvinyl chlorides are, for example, the commercially available types of PVC.
  • thermoplastic resins e.g. Styrene / acrylonitrile or alpha-methylstyrene / acrylonitrile copolymers
  • the thermoplastic resins can be prepared by known methods, e.g. by bulk polymerization, solution polymerization, suspension polymerization and
  • Cycloolefin copolymers are described in the patents of Mitsui-Chemicals US Pat. No. 5,912,070 or Ticona GmbH EP 765,909.
  • films can be made to DE-OS 25 17 033 and DE-OS 25 31 240.
  • Thermoplastic polyurethanes can also be used to produce the layers according to the invention.
  • the foils can be matted on one side or structured on one side. This is e.g. achieved by the melt of the thermoplastic material is pressed through a slot die and the melt flag is withdrawn via a frosted or structured cooling roll.
  • the thermoplastic layer can either be a single-layer layer of these plastics, or a multilayer plastic layer of individual layers of various plastics with a thickness of 0.001 to 1 mm.
  • a security element according to the invention furthermore comprises a plurality of microreflectors, which are randomly distributed and / or oriented within the transparent layer.
  • Random distribution and / or orientation means that the position of individual microreflectors and / or the orientation of individual microreflectors within the transparent layer can not be foreseen by the production process.
  • the position and / or orientation of individual microreflectors is subject to random fluctuations in the manufacturing process.
  • the location and / or orientation of individual microreflectors can therefore not easily reproduced. This fact is due to the high level of protection afforded by the security features according to the invention: they can only be adjusted at great expense.
  • both the location (distribution of the microreflectors within the transparent layer) and their orientation are of a random nature. By chance, this is not meant to be strictly mathematical.
  • Random means that there is a random component that makes it impossible to accurately predict the location and orientation of individual microreflectors.
  • microreflectors have a preferred position and / or orientation. Around this position and / or orientation is a distribution, which can be determined by the manufacturing process. However, the position and / or orientation of individual microreflectors remains uncertain.
  • a microreflector according to the invention is characterized in that it comprises at least one surface which reflects incident electromagnetic radiation in a characteristic manner.
  • the characteristic reflection is characterized in that electromagnetic radiation having at least one wavelength is reflected in at least one direction predetermined by the angle of incidence, the proportion of the reflected radiation having the at least one wavelength being greater than the sum of the portions of the absorbed and transmitted radiation of at least a wavelength.
  • the degree of reflection of the at least one surface is therefore greater than 50%, wherein the degree of reflection of the ratio of the intensity of the electromagnetic radiation having at least one wavelength which is reflected from the surface, based on the intensity of the electromagnetic radiation having the at least one wavelength on the surface hits, it is understood.
  • a reflective surface is referred to as a reflective surface.
  • the reflectance of the reflective surface of the microreflector for at least one wavelength is between 60% and 100%, more preferably between 80% and 100%.
  • the at least one wavelength of the electromagnetic radiation for which the at least one surface of a microreflector of the security element according to the invention has the abovementioned property of reflectivity is preferably in the range between 300 nm and 1000 nm, particularly preferably between 400 nm and 800 nm.
  • the reflective surface of a microreflector of the inventive security element has a reflectance of at least 60% for electromagnetic radiation having a wavelength between 400 and 800 nm.
  • the reflection is preferably directed reflection and / or diffraction, ie the proportion of diffusely reflected radiation (scattering) is preferably less than 50%, particularly preferably less than 40%. Bent and directionally reflected radiation is referred to collectively as reflected radiation.
  • the reflective surface of a microreflector has a size between l * 10 "14 m 2 and 1 * 10 " 5 m 2 .
  • the size of the reflective surface is preferably in the range between 1 ⁇ 10 -12 m 2 and 1 ⁇ 10 -6 m 2 , more preferably between 1 ⁇ 10 -10 m 2 and 1 ⁇ 10 -7 m 2 .
  • an area element of 1 cm 2 contains on average 1 to 1000 microreflectors, preferably between 10 and 100 microreflectors.
  • the average distance between two micro-reflectors is preferably at least 5 times the average size of the reflective surface of the microreflectors In a particularly preferred embodiment, the average distance is between 10 and 50 times the average size of the reflective surface of the micro-reflectors and hereinafter the arithmetic mean of the corresponding magnitude.
  • the reflective surface of a microreflector is flat or has a curvature.
  • a parallel beam that impinges on the surface also reflected parallel back from the surface.
  • a parallel beam impinging on the surface is reflected in the form of divergent (convex curvature) or convergent (concave curvature) jets.
  • Flat surfaces have the advantage that sharp reflection bands occur in a narrow angular range (see, e.g., Figure 9).
  • Curved surfaces have the advantage that reflections occur over a wider angular range, but show wide bands. Depending on the application, therefore, flat or curved reflective surfaces are preferred.
  • the reflective surface may be flat or may include one or more structures that result in diffraction of electromagnetic radiation.
  • the microreflectors may be approximately spherical, rod-shaped, cuboidal, polyhedron-shaped, platelet-shaped or have another conceivable shape.
  • the microreflectors are platelet-shaped, where platelet-shaped is understood to mean that the spatial extent in two dimensions is approximately the same while the spatial extent Expansion in the third dimension by at least a factor of 4 is smaller than the spatial dimensions in the two remaining dimensions. Almost equal means that the spatial dimensions differ by a maximum of a factor of 2.
  • the surface formed by the spatial extent of a microreflector in the two dimensions of approximately equal extension is preferably a reflective surface.
  • platelet-shaped microreflectors have an orientation distribution which is particularly well suited for authentication and identification purposes when producing the security element by extrusion of a film containing a microplate.
  • Platelet-shaped microreflectors assume a preferential orientation parallel to the surface of the transparent layer as a result of the extrusion process.
  • the orientation of individual microplates continues to have a random component; however, the microreflectors are oriented in parallel rather than perpendicular to the surface of the transparent layer; the orientation of the microreflectors has a random distribution about the orientation parallel to the surface of the transparent layer.
  • the microreflectors therefore have a preferred orientation, which is characterized in that their reflective surfaces are randomly oriented in an angular range of 0 to 60 ° relative to the surface of the transparent layer.
  • the angle of inclination of the reflective surfaces with respect to the surface of the transparent layer is in the range between 0 and 50 °, more preferably between 0 and 30 °.
  • the micro-reflectors have a maximum length of less than 200 microns and a thickness of 2-10 microns, with a round, elliptical, or n-square shape with n> 3.
  • Elliptic is here and below not to be understood in the strict mathematical sense.
  • a rectangle or parallelogram or trapezoid or generally n-corner with rounded corners is here and below also understood to be elliptical.
  • the microreflectors contain at least one metallic component. It is preferably a metal from the series aluminum, copper, nickel, silver, gold, chromium, zinc, tin or an alloy of at least two of said metals.
  • the microreflectors may be coated with a metal or alloy, or may be made entirely of a metal / alloy.
  • metal identification platelets as described by way of example in WO 2005/078530 A1, are used as microreflectors. They have reflective surfaces. If a multiplicity of such metal identification platelets are randomly distributed and / or oriented in a transparent layer, a characteristic reflection pattern results upon irradiation of the transparent layer at different angles, which can be used for identification and authentication.
  • the metal identification platelets are characterized by characteristics which can be visualized by means of magnification techniques (eg magnifying glass, microscope): the metal identification platelets can be printed and / or have diffractive structures (eg a hologram) or eg characterized by an arbitrarily formed through-hole.
  • the tag is determined by its outer shape (triangle, square, hexagon, circle, ellipse, letter, number, character, pictogram, or other conceivable shapes).
  • the microreflectors can be introduced into a transparent layer by known techniques. If the material from which the transparent layer is made, e.g. around a thermoplastic, it is e.g. possible, the thermoplastic with the micro-reflectors in one
  • a step preferably occurs in which the microreflectors are sheared in a layer in order to achieve a random distribution with preferred orientation in the shear direction.
  • the shearing direction is preferably parallel to the surface of the later transparent layer.
  • the security element according to the invention may comprise further layers in addition to the transparent layer.
  • one or more further layers are provided above and / or below the transparent layer.
  • below the transparent layer to attach a so-called support layer, which gives the transparent layer a necessary rigidity and / or dimensional stability in order to handle the transparent layer with the micro-reflectors can.
  • the transparent layer with the microreflectors a further transparent layer which ensures scratch resistance and / or UV resistance.
  • the surface of the transparent layer and the surface of the security element are preferably arranged parallel to one another.
  • the security element according to the invention is in the form of a foil which is e.g. can be connected via laminating and / or laminating and / or injection molding with other films.
  • the security element can be easily connected to an object and is thus versatile and flexible use, eg as a security film in plastic cards and / or ID cards, as a label in or on packaging, as part of electronic boards, and much more.
  • the security element preferably has a thickness of between 5 ⁇ m and 2 mm and a surface extent of at least 0.25 cm 2 and at most 100 cm 2 .
  • the security element has the property that the microreflectors are randomly distributed and / or oriented in the transparent layer. Therefore, a security element that is tilted with respect to a light source will show reflections when viewed at different locations on the security element and / or at different tilt angles, depending on where the security element has a microreflector, its reflective surface at an angle to the radiation source and to the viewer is oriented, so that the law of reflection applies.
  • This effect can not be imitated by means of printing technology of paints and pigments, since pigments applied to a carrier by printing technology have the same orientation and are not tilted with respect to the carrier.
  • the present invention furthermore relates to the use of the security element according to the invention for the authentication and / or identification of objects, preferably for the individualized authentication and / or identification of objects.
  • the inventive security element is preferably inseparably connected to an object to be protected.
  • the attempt to remove the security element from the object destroys the security element and / or the object.
  • the security element is in the form of a film, then the security element can be connected to the object via adhesion and / or lamination. It is known to the person skilled in the art of film processing how films must be bonded by means of adhesion and / or lamination, so that a composite arises, which can not be separated without destroying.
  • the object to be authenticated and / or identified may be a personalized security or identification document.
  • Identity documents, passports, driver's licenses, credit cards, bank cards, access control cards or other identity documents may be used as such security documents or identification documents, for example, without being restricted to these.
  • the security element may be recognizable as an excellent area on or on an object. If the object is e.g. a badge, the security element could be in the form of an excellent area on the badge, e.g. Also, a hologram or a photo as an excellent area, in which it is immediately apparent that this area contains a corresponding element. In a preferred embodiment, the security element is integrated in the object in such a way that, as such, it is not conspicuous and / or obviously recognizable. If the object is e.g. an identity card in the form of a credit card, the security element extends in a preferred form over an entire page of the card or over both sides of the card. The security element is preferably linked to other functions. Thus, the security element may e.g.
  • the integration of printing and security element has the advantage that the printed image or a part of the printed image for positioning the security element according to the invention in relation to a source of electromagnetic radiation and a detector can be used to identify and / or authenticate the object based on the security element make.
  • the integration of print image and security element allows a simultaneous authentication / identification of the security element and a verification of the printed image (see also Example 4).
  • the subject matter of the present invention is furthermore a method for authenticating (authenticity checking) the security element or an object to which the security element according to the invention is attached.
  • Authentication is the process of verifying (verifying) an alleged identity.
  • the authentication of objects, documents, persons or data is a statement that they are authentic - that is, they are unchanged, not copied and / or not faked originals.
  • the authentication consists of an obviousness check, that is, an easy-to-check feature is used to examine whether or not the object under consideration is an obvious counterfeit.
  • the security element according to the invention allows the authenticity check in various ways.
  • the security element according to the invention is characterized in that it comprises a transparent layer in which a plurality of microreflectors are introduced, which can be seen with the naked eye.
  • the micro-reflectors have the property that they reflect electromagnetic radiation of at least one wavelength when the arrangement of electromagnetic radiation source, at least one reflective surface of at least one microreflector and a detector for the reflected electromagnetic radiation obeys the law of reflection.
  • the inventive method for authenticating an object based on the security element according to the invention comprises at least the following steps:
  • the electromagnetic radiation may be mono- or polychromatic.
  • the electromagnetic radiation preferably has at least one wavelength in the range from 300 nm to 1000 nm, particularly preferably in the range from 400 nm to 800 nm.
  • a light source e.g. a laser, an LED, a halogen lamp, an incandescent lamp, a candle, the sun, or another source of electromagnetic radiation that emits electromagnetic radiation of at least one wavelength in the range 300 nm to 1000 nm.
  • a laser is used.
  • the irradiation can be flat, linear or punctiform, wherein under planar irradiation is understood that the irradiation of the security element, a majority of the security element is detected by the radiation, while punctiform irradiation is understood that only a small part of the security element of the radiation is detected.
  • the beam profile may be determined by techniques known to those skilled in the art, e.g. the use of lenses or diffractive elements can be adjusted accordingly.
  • the detection of the reflected radiation takes place with a sensor sensitive to the electromagnetic radiation used, for example a photodiode or a phototransistor (point sensor), a camera sensor (area sensor (CCD, CMOS)) or the like.
  • a sensor sensitive to the electromagnetic radiation for example a photodiode or a phototransistor (point sensor), a camera sensor (area sensor (CCD, CMOS)) or the like.
  • the advantage of the method according to the invention is that in its simplest embodiment (qualitatively) it can be performed by a human without the use of equipment.
  • This embodiment is characterized in that as the source of electromagnetic radiation, the sun or a lamp or a candle or other light source is used and serves as a detector, the human eye.
  • the security element is held by the viewer at an angle to the light source, so that individual micro-reflectors reflections.
  • the observer can tilt the security element with respect to the light source so that the reflections extinguish and, if necessary, new reflections appear elsewhere in the security element. In this way, it can be easily verified by a human being that the microreflectors visible to the naked eye are not imitations produced by printing technology.
  • a further advantage of the method according to the invention is that the method can be carried out by machine or can be supported mechanically and allows a quantitative evaluation.
  • a machine execution or support allows the verification of a larger number of security elements or objects based on security elements in a shorter time and at a lower cost than a (purely) personal execution.
  • machine execution or machine support allows comparison of reflection patterns with security elements that have been authenticated at different times.
  • step (C) is carried out by machine.
  • the object to be authenticated and / or a radiation source and / or at least one detector are moved relative to one another around the micro-reflectors flashing at different locations and / or at different orientation angles as a function of the relative position of the object (security element) with respect to the radiation source and Record detector.
  • the process according to the invention accordingly comprises the further steps (D) and (E) following step (C):
  • the security element and at least one detector can be held to one another rigidly (stationary) and to carry out a relative movement between the radiation source and the rigid arrangement of security element and detector.
  • the change in position can be carried out so that the radiation source irradiates another part of the security element when the position changes; but it can also be carried out so that the same part of the security element is irradiated, but at a different angle. It is also conceivable to carry out the change in position so that the same part of the security element is irradiated at the same angle, but a detector detects the radiation reflected at a different angle. In all cases, another part of the microreflectors is detected when the position changes.
  • the movement may be continuous at a constant rate, accelerating or decelerating, or discontinuous, i. e.g. gradually.
  • steps (B), (C), (D) and (E) is carried out until a sufficient number of micro-reflectors has been detected for the respective application.
  • the respective application includes an identification of the object based on the security element, it is necessary to detect so many microreflectors that a clear assignment of the reflection pattern to an object is possible. On the identification of an object based on the security element according to the invention will be discussed in more detail below.
  • the security element is fastened in a first step on a carrier, which already has a predetermined Orientation towards a source of electromagnetic radiation and at least one detector.
  • the carrier is designed in such a way and can be aligned with the radiation source and at least one detector or is already aligned so that after fixing the security element according to the invention on the carrier, a part of the microreflectors is arranged so that the arrangement of the part of the microreflectors, at least one Detector and the radiation source meets the law of reflection.
  • the type and nature of the wearer is determined by the object that is to be authenticated on the basis of the security element associated with it.
  • the object is, for example, a credit card format ID card
  • the indentation clearly defines the position of the card on the carrier.
  • the radiation source and the detector are respectively arranged around the carrier in such a way that the law of reflection for a part of the microreflectors is fulfilled.
  • At least one laser is used as the radiation source.
  • Laser light can be bundled very well and has a high intensity.
  • a focused laser beam can be scanned over the security element.
  • at least one laser and at least one detector are arranged rigidly relative to one another. The object is aligned relative to the rigid array of at least one laser and at least one detector so that the law of reflection for a portion of the microreflectors is met. The alignment can be facilitated by means of a carrier.
  • the object is moved by means of a movably executed carrier with respect to the rigid arrangement of at least one laser and at least one detector.
  • the movement is carried out in such a way that the movement causes various microreflectors to show successive reflections. It is conceivable to focus the laser beam on the security element and to drive the object past the laser beam. As a result, successive different areas of the security element are scanned by the laser beam. If the laser beam strikes a microreflector whose reflective surface is oriented so that the arrangement of reflective surface, radiation source and detector fulfills the law of reflection, this microreflector shows a reflection at the moment of the scan, which can be detected by the detector.
  • the scanning laser beam has a defined profile on the security element. This profile can be round elliptical, linear, dumbbell or otherwise.
  • the profile has a long and a short axis, e.g. given in an elliptical, linear or dumbbell-shaped profile.
  • the length of the short axis is in the order of magnitude of the average size of the reflective surfaces of the microreflectors.
  • the long axis is on the order of the mean distance between two microreflectors.
  • the term order of magnitude here and below means that two variables differ or are equal to one another by a factor smaller than 10 and larger than 0.1.
  • the long axis is slightly longer than the average distance between two microreflectors, more preferably its size is in the range between 1 and 10 times the mean distance between two microreflectors.
  • the short axis is preferably slightly longer than the average size of the reflective surfaces of the microreflectors, more preferably its size is in the range of 1 to 10 times the mean size of the reflective surfaces of the microreflectors.
  • a security element is illuminated areally and the beams reflected at different microreflectors under different angles are detected with the aid of a plurality of point sensors or with the aid of an area sensor.
  • This embodiment has the advantage that microreflectors can be detected at different locations and with different orientations without requiring relative movement between the security element and / or radiation source and / or detector.
  • the process according to the invention comprises the further steps (F) and (G) following step (C) or (E):
  • steps (F) and (G) depends on the particular application. If the authentication is an obviousness check, it is checked whether there are micro-reflectors whose reflective surfaces are not arranged parallel to the surface of the transparent layer. Accordingly, the requirement (target pattern) is that individual reflections occur when the array of surface of the transparent layer, radiation source and detector does not meet the law of reflection.
  • the notification as to whether or not the object is an obvious counterfeit can be made on the basis of a yes / no statement. It is possible, for example, to use a light signal for this: if there is no obvious forgery, a green light comes on, if it is an obvious counterfeit, a red light comes on.
  • an acoustic signal or other message which can be detected by the human senses, conceivable.
  • the authentication is to serve to verify the identity of a concrete object, then in step (F) a so-called 1: 1 comparison between the currently detected reference pattern and the reflection pattern of the presumed object (target pattern) is necessary.
  • the reflection pattern represents the reflections of the security element or of a part of the security element detected as a function of the position of the object in relation to the radiation source and a detector.
  • the reflection pattern therefore exists, for example, in the form of a number table in which the intensities measured at different angles at different locations the radiation reflected by the security element is detected. Such a number table can be directly compared with a target number table.
  • the measured intensity distribution it is also possible to use the measured intensity distribution to create a different representation of a reflection pattern by means of mathematical operations before a comparison with a desired pattern is carried out.
  • a Fourier transformation of the originally spatially dependent measured data is performed, since the Fourier-transformed data have a translational invariance and thus a higher positioning tolerance is given.
  • the characteristic features represent a kind of fingerprint or signature of the security element.
  • the signature is a digitally storable and machine processable representation of the security feature.
  • the signature is unique, i. identical security elements result in the same signature; different security elements give different signatures.
  • the reflection pattern mentioned in step (F) may be a signature.
  • the comparison of the reflection pattern with at least one desired pattern can be made on the basis of the complete number table or on the basis of characteristic features from the number table.
  • known pattern matching methods can be used, in which similarities between the data records is sought (see, for example, Image Analysis and Processing: 8th International Conference, ICIAP '95, San Remo, Italy, September 13-15, 1995. Proceedings ( Lecture Notes in Computer Science), WO 2005088533 (A1), WO2006016114 (A1), C. Demant, B. Streicher-Abel, P. Waszkewitz, Industrial Image Processing, Springer-Verlag, 1998, p. 133 ff, J. Rosenbaum, Barcode, Verlagtechnik Berlin, 2000, p. 84 ff, US Pat. No. 7333641 B2, DE10260642 A1, DE10260638 A1, EP1435586B1). A specific procedure is described in Example 4.
  • At least steps (A) to (G) are carried out by machine.
  • the following is an example of such a machine execution: A user places an object in a defined manner on a support and starts the mechanical execution by pressing a button.
  • the carrier is e.g. moved by means of a stepping motor into a position in which the surface of the security element, a radiation source and a detector form an arrangement in which the law of reflection is not met, but the radiation source, the detector and a hypothetical plane which is opposite by an angle ⁇ the surface of the security element is inclined to form a law satisfying the law of reflection. If microreflectors are present in the security element that are in this hypothetical plane, they would show reflections if they were to be irradiated.
  • the radiation source is e.g. activated by a control unit so that radiation falls on an area of the security element. If microreflectors with an orientation parallel to the said hypothetical plane are present in this region, reflections in the form of an increased intensity of incoming radiation are registered at the detector. About the stepping motor, the carrier can be further moved and / or tilted to detect more micro-reflectors with possibly different orientation. If no reflections are detected at the detector, it is obviously a fake object.
  • reflections are detected, they can be stored via the control unit and / or a computer unit in the form of a reflection pattern as a function of the position of the object.
  • a so-called rotary encoder is used, which triggers the measurement data acquisition.
  • the rotary encoder detects the change in position and emits an impulse if there is an incremental change in position. In the case of an impulse, a measured value is recorded and stored by the detector. If the sensor is moved over a defined travel distance, the rotary encoder ensures that measuring points are distributed over the travel distance at a constant distance from one another.
  • the currently detected reflection pattern can then, if appropriate after smoothing and / or filtering and / or mathematical transformation by means of the computer unit with at least one desired pattern, for example a reflection pattern of the object stored in a database connected to the computer unit, already at an earlier time has been compared.
  • the Result of the comparison eg the degree of correspondence between the compared reflection patterns, is then output to the user in the form of a visible or audible message via an output unit connected to the control unit or the computer unit (monitor, printer, loudspeaker, oa).
  • the present invention furthermore relates to a method for identifying a security element or an object according to the invention, which carries a security element according to the invention.
  • Identification is understood as a process that serves to uniquely recognize a person or an object.
  • the method according to the invention comprises at least the steps (A) to (C) and (F) to (G) already discussed in the method for authenticating an object in the embodiments discussed there, wherein in step (G) instead of a message about the
  • Authenticity is a message about the identity of the object. Steps (D) and (E) are optional. If the security element, for example, illuminated areally and by means of a
  • Area sensor as detector detects a number of micro-reflectors sufficient for the application, is a change in position and the detection of more
  • the method for identifying an object based on the security element according to the invention therefore comprises at least the following steps:
  • step (G) outputting a notification of the identity of the object depending on the result of the comparison in step (F).
  • the steps (A) to (G) of the inventive method are carried out by machine.
  • step (F) of the inventive method the reflection pattern of the observed object is compared with reflection patterns which have already been determined at an earlier time.
  • identity of an object is determined by the reflection pattern and there is a comparison of the considered reflection pattern with all stored in a database reflection patterns already detected object (l: n-adjustment).
  • the identity of the object on the basis of another feature, for example by means of a barcode associated with the object, and by the comparison between the currently measured reflection pattern and the reflection pattern associated with the identified object, the correctness of the object Assign assignment (authentication).
  • the present invention furthermore relates to a device for identifying and / or authenticating an object based on a security element according to the invention, comprising at least a source of electromagnetic radiation, and a detector for detecting the radiation reflected by the security element.
  • the source of electromagnetic radiation can emit monochromatic or polychromatic radiation. It preferably emits electromagnetic radiation having at least one wavelength in the range 300 nm to 1000 nm, particularly preferably in the range 400 nm to 800 nm.
  • a laser is used.
  • the detector used is a sensor which is sensitive to the electromagnetic radiation used, for example a photodiode or a phototransistor (point sensor), a camera sensor (area sensor (CCD, CMOS)) or the like.
  • a carrier is further provided, on which an object can be fixed.
  • the carrier facilitates the positioning of the security element with respect to the radiation source and / or the detector.
  • the carrier comprises an area which is brought into contact with the object to be identified or authenticated.
  • the object is either placed on the carrier, suspended in the carrier or otherwise connected to the carrier, so that the object assumes a defined and predictable orientation (location) in space.
  • the security element which is connected to the object, either already in a law satisfying the law of reflection or it can be easily brought by movement of the carrier in such an arrangement.
  • the carrier is, for example, a carriage which can be brought to a first position in which a connection of the object to the carriage is easily made possible by a user, and which can be brought to a second position in which Microreflectors in the security element, the radiation source and a detector form an arrangement that meets the law of reflection.
  • the support is moveable so that the security element can be moved relative to the radiation source and / or the detector to irradiate different microreflectors at the same or different angles and the reflections from different microreflectors at the same or at different angles to be able to capture.
  • a laser is used as radiation source and a phototransistor as detector.
  • Laser and phototransistor are arranged rigidly to each other.
  • the object to be authenticated and / or identified may be moved on a movable carrier in relation to the rigid array of laser and photodiode.
  • the laser is arranged at an angle ⁇ to the normal of the surface of the security element.
  • the detector is arranged at an angle ⁇ 'to the normal of the surface of the security element, where ⁇ ⁇ ⁇ '.
  • the laser, the normals and the detector lie in one plane. This arrangement of laser, surface of the security element and detector does not fulfill the law of reflection because ⁇ ⁇ ⁇ '.
  • microreflectors are detected which have a relative to the surface of the security element correspondingly inclined orientation of the reflective surface.
  • the angle ⁇ is in the range of 0 ° to 80 °, preferably in the range of 0 ° to 60 °.
  • the angle ⁇ ' is in the range of 0 ° to 80 °, preferably in the range of 0 ° to 60 °.
  • the laser illuminates the security element with a defined spot profile.
  • the profile preferably has a long and a short axis, as is given, for example, in the case of an elliptical, linear or dumbbell-shaped profile.
  • the length of the short axis is in the order of magnitude of the average size of the reflective surfaces of the microreflectors.
  • the long axis is on the order of the mean distance between two microreflectors.
  • the long axis is slightly longer than the average distance between two microreflectors, more preferably its size is in the range between 1 and 10 times the mean distance between two microreflectors.
  • the short axis is preferably slightly longer than the average size of the reflective surfaces of the microreflectors, more preferably its size is in the range of 1 to 10 times the mean size of the reflective surfaces of the microreflectors.
  • the device further comprises a control unit, which is connected to a computing unit and a database.
  • the control unit is used to control the radiation source, if necessary to control the movable carrier carried out in order to make a change in position of the object can and to detect the signals registered at the detector.
  • the database stores reflection patterns of security elements that can be used for 1: 1 or 1: n reconciliation. With the arithmetic unit mathematical operations on records can be made and made a comparison between reflection patterns.
  • arithmetic unit and control unit are suitable, e.g. Microprocessors.
  • the device has at least one output via which the result of a comparison can be transferred to a user of the device in the form of a message.
  • the output can e.g. a lamp that lights up when an obviousness check has revealed that the object is an obvious counterfeit.
  • the output may be e.g. a screen indicating to what extent the reflection pattern of a currently detected security element matches a reflection pattern from a connected database.
  • Other issues such as a printer, a loudspeaker or other devices serving as an interface between a machine (device) and a human (user) are conceivable.
  • the security element according to the invention combines several security levels next to each other.
  • the micro-reflectors are visible to the naked eye (overt), the The distribution and / or orientation of the individual microreflectors can be measured (covered) by means of the device according to the invention; the shape and / or the ability to acquire the microreflectors can be analyzed by means of a magnification unit ⁇ covert, forensic).
  • the inventive security element offers a high protection against counterfeiting and / or imitation, since the random distribution and / or orientation of the
  • Microreflectors is difficult to copy.
  • the security element according to the invention allows an obviousness check, which can be carried out by any human without aids.
  • the inventive security element allows an individualization of an object, since the random distribution and / or orientation of the microreflectors for each
  • the security element according to the invention is inexpensive and can be connected to a large number of objects without it having a negative influence on the object design.
  • Methods for identifying an object based on the security element according to the invention can be performed quickly and mechanically.
  • the device according to the invention is also inexpensive and can be operated by people after the shortest introduction, who have no special knowledge.
  • Figure 1 shows schematically an enlarged detail of a security element (1) according to the invention in the plan view comprising a transparent layer (2) in which micro-reflectors (3) are randomly distributed.
  • the microreflectors have a hexagonal shape which can be visualized for authenticity testing by means of a magnification unit (e.g., magnifying glass, microscope).
  • a magnification unit e.g., magnifying glass, microscope
  • FIG. 2 shows schematically an enlarged section of a security element (1) according to the invention in the side view (cross section).
  • the security element comprises a transparent layer (2) into which microreflectors (3) are introduced. These are randomly distributed and the reflective surface (4) of each microreflector has a random orientation.
  • a source of electromagnetic radiation (5) the security element can be irradiated.
  • rays (6) hit the reflecting surfaces and are thrown back (reflected).
  • the reflected radiation (7) can be collected with a detector (8). Only those surfaces which have a certain orientation with respect to radiation source (5) and detector (8) lead to a signal at the detector (see FIG. 3).
  • FIG. 3 illustrates the law of reflection on a microreflector (3).
  • Electromagnetic radiation (6) impinges on the surface (4) of the microreflector (3) at an angle ⁇ relative to the surface normal (9) to the surface (4).
  • the radiation is reflected and reflected back to the surface normal (9) at a failure angle ⁇ (7).
  • the angles ⁇ and ⁇ are equal.
  • the detector (8) attached to the appropriate position, the directionally reflected radiation can be collected.
  • the surface of the microreflector contains diffraction structures, in addition to the directionally reflected beam (the so-called zero diffraction order), further rays occur at defined angles, which are dependent on the diffraction structures, around the directionally reflected beam (higher
  • diffracted rays typically have a lower intensity than the directionally reflected radiation.
  • the diffracted rays can also be detected
  • FIG. 4 shows a photomicrograph of a product of the incorporation of microreflectors into a polymer (cylindrical granule grain from Example 1).
  • FIG. 5 shows a light micrograph of the film from Example 2.
  • FIG. 6 shows a light micrograph of a metal identification drawing plate in an identity card from Example 3.
  • FIG. 7 shows an exemplary embodiment of the device according to the invention and of the method according to the invention for authenticating and / or identifying objects on the basis of a security element according to the invention.
  • the device comprises a source (5) for electromagnetic radiation, a detector (8) for electromagnetic radiation, a control unit (10) for controlling the radiation source (5) and for processing the at the detector (8) measured signals, a computing unit (11) for performing mathematical operations and for comparing the currently detected reflection pattern of a security element (1) with at least one desired or reference pattern, a database (12), in the reference pattern and / or target pattern are stored for comparison and an output (13) via which the result of a comparison can be transmitted to a user.
  • the units 5, 8, 10, 11, 12 and 13 are electrically, optically, via radio or another signal transmission channel interconnected (dashed lines).
  • the device also includes an input unit via which a user can operate the device (not explicitly shown in FIG. 7).
  • the input unit may be part of the control unit or the computer unit.
  • Two or more of the units 10 to 13 may also be integrated in one unit. It is also possible to connect the output unit 13 directly to the control unit 10.
  • the radiation source (5) and the detector are in a plane with the surface normal of the security element. They are arranged rigidly (immovably) to one another and form with the surface of the security element an arrangement which does not fulfill the law of reflection, i. Radiation falling on the security element (6) is reflected back from the surface of the security element and from the boundary layers between the transparent layer and possibly further layers of the security element (7 ") and does not get into the detector
  • the detector (8) is rather tilted by an angle ⁇ with respect to the beam 7 "(the beams 7 'and 7" enclose the angle ⁇ .)
  • the detector (8) detects reflections (7') of microreflectors whose reflective surface is opposite to the surface of the beam This ensures, on the one hand, that the security element is not an imitation in which microreflectors have been applied to the object by means of printing technology, on the other hand, no radiation reflected by the surface of the security element reaches the detector and causes it there an offset signal, the last point leads to a significant improvement the signal
  • FIG. 8 shows the structure used in example 4 for authentication / identification of a security element (1) in the form of an identification card which is moved relative to a laser (5) and a detector (8) (direction of movement indicated by the thick arrow). During the movement, a part of the card is irradiated and the radiation reflected from this surface (14) is detected.
  • FIG. 9 shows the intensity / of the radiation detected at the detector as a function of the travel path x of a security element from example 3 (see example 4).
  • FIG. 10 shows the intensity / of the radiation detected at the detector as a function of the travel path x of a white ID card without microreflectors (see Example 4).
  • FIG. 11 shows by way of example in a graphic representation the generation of zero crossings for storage and / or comparison with other data sets.
  • the dotted curve (15) represents the originally measured intensity signal (possibly after filtering and smoothing) as a function of location. From this curve, averaging over the ⁇ 50 adjacent values for each individual point produces the arithmetic mean, represented by the dotted line Curve (16). At the intersections between the original data (15) and the averaged data (16) is a so-called zero crossing (solid curve (17)). The zero crossings as a function of the location are stored. They may be used for comparison with the corresponding records of other security features for identification and / or authentication purposes.
  • Example 1 Preparation of a compound containing microreflectors
  • the microreflectors used were hexagonal metal marking plates of the designation "OV Dot B” made of nickel with a thickness of 5 ⁇ m and a distance of the opposite sides of 100 ⁇ m.
  • the platelets were printed, with some of the words “OVDot” to read.
  • In the middle of the plates was a large “B” as Naturalgangsformbohrung.
  • the clearance of the through-hole from the sides was 25 ⁇ m and accounted for 12.5% of the total area of the metal tag.
  • a compound was made with the metal identification platelets.
  • melt volume flow rate (MVR) is 6.0 cm 3 / (10 min) at 300 0 C and 1.2 kg load.
  • the equipment used for the production of the films consists of
  • a three-roll smoothing calender with horizontal roll arrangement wherein the third roll is pivotable by +/- 45 ° relative to the horizontal; • a roller conveyor;
  • the compound from Example 1 was fed to the hopper of the extruder. In the respective plasticizing cylinder / screw of the extruder, the melting and conveying of the respective material took place. The material melt was then fed via the adapter to the smoothing calender whose rolls had the temperature stated in Table 1. On the smoothing calender (consisting of three rolls) was the final shaping and cooling of the film. To structure the film surfaces, a rubber roller (fine matt 2-sided surface) and a steel roller (matt 6-surface) were used. The rubber roller used for structuring the film surface is disclosed in US 4,368,240 to Nauta Roll Corporation, USA. Subsequently, the film was transported through a trigger. Thereafter, a protective film made of polyethylene can be applied on both sides and carried out a winding of the film.
  • Makrolon® 3108 550115 PC from Bayer MaterialScience AG
  • the metal identification platelets could be recognized as small dark hexagons.
  • the metal identification platelets were evenly and randomly distributed over the entire film surface. Clumped agglomerated platelets could not be identified. There were no damaged or even destroyed platelets recognizable.
  • the through hole "B" was undamaged. The shear resulted in the metal tags not being randomly oriented but randomly oriented by a preferred orientation parallel to the surface of the film. This random distribution around a preferred orientation is particularly advantageous in the inventive method for authentication and identification of objects, since a large part of the microreflectors are accessible to the method.
  • Microreflectors which are oriented perpendicular to the surface of the transparent layer, show no reflections in the inventive method, since they lie in an angular range, which is not accessible to a reflection measurement. Such microreflectors have no purpose, they are not functional.
  • a preferred orientation parallel to the surface of the transparent layer, as achieved in the present example, has a high proportion of functional microreflectors.
  • the film can be used as a security element according to the invention. It can e.g. be laminated with other films to form a film composite can be punched out of the cards that can be used as ID cards (see Example 3).
  • the security element is therefore an integral part of the object (ID card) and can not be removed from it intact.
  • Example 3 Lamination of a film composite and production of a badge
  • a composite film was laminated from the following films:
  • the films were laminated in a press made by Bürkle at 10 bar and 180 ° C. Subsequently, a card the size of a credit card (format ID-I) was punched from the composite film. Thereafter, the metal detection platelets in the card were examined for their appearance by light microscopy.
  • Example 4 Device and method for authentication and identification of an object (ID card) based on the security element according to the invention
  • the radiation source used was a Flexpoint® FP-65/5 laser (wavelength 650 nm, maximum power 5 mW).
  • the beam profile was line-shaped with a length of 2 mm and a width of 20 ⁇ m.
  • the detector used was a Si NPN phototransistor type FT-30 from STM.
  • the identification card generated in Example 3 was used.
  • Laser and phototransistor were arranged rigidly to each other.
  • the security element was compared to the rigid arrangement moved by one centimeter (see thick arrow in Figure 8). The speed was about 1 cm / second.
  • the security element was irradiated continuously by laser light, wherein the longer side of the line-shaped beam profile was formed perpendicular to the direction of movement.
  • 7,000 measured values (intensity of the reflected light) were detected by means of the phototransistor.
  • FIG. 9 shows the result of the measurement in the form of a graphical representation.
  • the intensity of the reflected light / is plotted against the travel x. There are clear reflections in
  • Microreflectors those microreflectors oriented exactly such that the laser source, reflecting surface and phototransistor form a law satisfying the law of reflection show the highest intensity, while microreflectors having a slight deviation from the exact orientation have a smaller deviation corresponding to the deviation
  • FIG. 10 shows a comparison of the result of a corresponding measurement on an identity card without microreflectors.
  • the procedure is identical to the case described above. There are no sharp bands as in the case of Figure 9 can be seen.
  • the curve shown in FIG. 9 represents a section of a characteristic reflection pattern of a security element.
  • the raw data are usually smoothed and / or filtered. For example, it is possible to average for each value over a range of adjacent values to reduce noise. In the present case, averaging over ⁇ 5 adjacent values would be advantageous.
  • a data reduction (signal approximation) takes place, ie the data is reduced to characteristic features.
  • a special procedure will be briefly outlined here.
  • the security element in addition to the microreflectors also has other optical features such as a print.
  • the signals resulting from such optical features are superimposed on the signals by the micro-reflectors.
  • other optical features e.g. to include a printed image in the analysis.
  • the printed image can be used for position detection, on the one hand, and in addition to the microreflectors for authentication and / or identification, on the other hand.
  • a printed image when exposed to light, produces a bright-dark distribution of the reflected light that can be detected by the detector.
  • the light-dark distribution can be used as a reference indicating the relative position of microreflectors reflecting at defined angles.
  • the presence of the characteristic Paoloscuro distribution can be used for authentication and / or identification.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Optics & Photonics (AREA)
  • Credit Cards Or The Like (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Lock And Its Accessories (AREA)
  • Collating Specific Patterns (AREA)
  • Optical Elements Other Than Lenses (AREA)

Abstract

L'invention concerne des éléments de sécurité optiques, leur utilisation pour l'identification et l'authentification d'objets, ainsi que des procédés et des dispositifs pour identifier et authentifier des objets au moyen desdits éléments de sécurité optiques.
EP09707424A 2008-02-05 2009-01-24 Élément de sécurité Withdrawn EP2240333A2 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE102008007731A DE102008007731B4 (de) 2008-02-05 2008-02-05 Verfahren und Vorrichtung zur Identifizierung und Authentifizierung von Objekten
DE102008016803A DE102008016803A1 (de) 2008-04-02 2008-04-02 Authentifizierung von Objekten mittels Bilderkennung
DE102008051409A DE102008051409A1 (de) 2008-10-11 2008-10-11 Sicherheitselement
PCT/EP2009/000450 WO2009097979A2 (fr) 2008-02-05 2009-01-24 Élément de sécurité

Publications (1)

Publication Number Publication Date
EP2240333A2 true EP2240333A2 (fr) 2010-10-20

Family

ID=40873443

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09707424A Withdrawn EP2240333A2 (fr) 2008-02-05 2009-01-24 Élément de sécurité

Country Status (7)

Country Link
US (1) US20110031735A1 (fr)
EP (1) EP2240333A2 (fr)
JP (1) JP2011511322A (fr)
KR (1) KR20100127748A (fr)
CN (1) CN102066125A (fr)
BR (1) BRPI0907765A8 (fr)
WO (1) WO2009097979A2 (fr)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2716550C (fr) 2008-03-25 2019-07-16 Orthosoft Inc. Procede et systeme pour planifier / guider des modifications sur un os
US11224443B2 (en) 2008-03-25 2022-01-18 Orthosoft Ulc Method and system for planning/guiding alterations to a bone
CN101978243B (zh) * 2008-03-25 2013-04-24 奥索瑟夫特公司 跟踪系统和方法
DE102009023536A1 (de) 2009-05-30 2010-12-02 Bayer Technology Services Gmbh Positionsgeber
EP2526377A4 (fr) * 2010-01-19 2014-03-12 Orthosoft Inc Système et procédé de suivi
GB2478537B (en) 2010-03-08 2013-07-24 Rue De Int Ltd Improvements in security documents
DE102010015014A1 (de) 2010-04-14 2011-10-20 Bayer Technology Services Gmbh Optischer Scanner
DE102010020810A1 (de) 2010-05-18 2011-11-24 Bayer Technology Services Gmbh Identifizierung von Gegenständen
DE102010021380A1 (de) 2010-05-25 2011-12-01 Bayer Technology Services Gmbh Identifizierung von Gegenständen
JP5771961B2 (ja) * 2010-12-06 2015-09-02 大日本印刷株式会社 微粒子含有シートの製造方法
DE102010062959A1 (de) * 2010-12-13 2012-06-14 Bayer Technology Services Gmbh Positionserkennung
JP5589939B2 (ja) * 2011-04-12 2014-09-17 大日本印刷株式会社 微粒子、粒子群、偽造防止用インク、偽造防止用トナー、偽造防止用シートおよび偽造防止媒体
JP5824878B2 (ja) * 2011-05-31 2015-12-02 大日本印刷株式会社 偽装防止用粒子の製造方法
JP5729140B2 (ja) * 2011-05-31 2015-06-03 大日本印刷株式会社 偽造防止用樹脂粒子の製造方法、偽造防止用インクの製造方法、偽造防止用シートの製造方法
WO2014012577A1 (fr) 2012-07-17 2014-01-23 Hewlett-Packard Indigo B.V. Caractéristique de sécurité visuelle
AT515845B1 (de) * 2014-06-10 2017-05-15 Hueck Folien Gmbh Sicherheitselement und Verfahren zur Herstellung eines Sicherheitselements mit lichtstreuenden Strukturen
JP5880653B2 (ja) * 2014-09-29 2016-03-09 大日本印刷株式会社 微粒子含有シートの製造方法
US10385514B1 (en) 2014-12-30 2019-08-20 Idemia Identity & Security USA LLC Identification document with dynamic window
JP6024794B2 (ja) * 2015-07-02 2016-11-16 大日本印刷株式会社 微粒子含有シートの製造方法
US10112433B2 (en) * 2015-11-13 2018-10-30 Entrust Datacard Corporation Optically variable tactile security feature
FI3932099T3 (fi) 2019-02-28 2023-03-25 Sicpa Holding Sa Todennettavia käyttöoikeustietoja

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3365517A (en) * 1965-04-08 1968-01-23 Union Carbide Corp Mixtures of polycarbonates and polyarylene polyethers
DE2305413C2 (de) * 1973-02-03 1982-05-13 Bayer Ag, 5090 Leverkusen Verzweigte aromatische Polyaryläthersulfone
US4152367A (en) * 1977-08-04 1979-05-01 Bayer Aktiengesellschaft Branched polyaryl-sulphone/polycarbonate mixtures and their use for the production of extruded films
US5059245A (en) * 1979-12-28 1991-10-22 Flex Products, Inc. Ink incorporating optically variable thin film flakes
DE3010143C2 (de) * 1980-03-15 1982-05-06 Bayer Ag, 5090 Leverkusen Kunststoffverbundlaminat, seine Herstellung und seine Verwendung
US4368240A (en) * 1981-07-27 1983-01-11 Nauta Roll Corporation High gloss rubber roll
IT1269506B (it) * 1994-02-04 1997-04-01 De La Rue Giori Sa Impianto di controllo di qualita' di fogli stampati in particolare di carte-valore
DE19536043A1 (de) * 1995-09-28 1997-04-10 Hoechst Ag Polyolefinfolie mit Cycloolefinpolymer, Verfahren zu ihrer Herstellung und ihre Verwendung
KR100220961B1 (ko) * 1996-04-11 1999-09-15 사또 아끼오 적층 필름 및 포장재
DE10113268B4 (de) * 2001-03-16 2021-06-24 Bundesdruckerei Gmbh Sensor für die Echtheitserkennung von Sicherheitsmerkmalen auf Wert und/oder Sicherheitsdokumenten
DE10126342C1 (de) * 2001-05-30 2003-01-30 Hsm Gmbh Optisches Element und Verfahren zu dessen Herstellung
US6898943B2 (en) * 2001-08-06 2005-05-31 Yamatake Corporation Method of controlling temperature/humidity or temperature and device for controlling temperature/humidity or temperature
JP3947027B2 (ja) * 2002-03-29 2007-07-18 株式会社東芝 認証システム及び認証方法
DE10232245B4 (de) * 2002-07-17 2008-06-12 Leonhard Kurz Gmbh & Co. Kg Optisch variables Element mit variierender Distanzschicht-Dicke
JP4030830B2 (ja) * 2002-08-13 2008-01-09 日本電気株式会社 縞模様画像鑑定装置および縞模様画像鑑定方法
JP2004171109A (ja) * 2002-11-18 2004-06-17 Nippon Telegr & Teleph Corp <Ntt> デバイス認証システム
JP3719435B2 (ja) * 2002-12-27 2005-11-24 セイコーエプソン株式会社 指紋照合方法及び指紋照合装置
US7808706B2 (en) * 2004-02-12 2010-10-05 Tredegar Newco, Inc. Light management films for displays
DE102004045211B4 (de) * 2004-09-17 2015-07-09 Ovd Kinegram Ag Sicherheitsdokument mit elektrisch gesteuertem Anzeigenelement
EP1669213A1 (fr) * 2004-12-09 2006-06-14 Sicpa Holding S.A. Elément de sécurité avec un aspect dépendent de l'angle d'observation
WO2006076616A2 (fr) * 2005-01-14 2006-07-20 Cabot Corporation Dispositifs de securite, leur utilisation et leurs procedes de fabrication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2009097979A2 *

Also Published As

Publication number Publication date
JP2011511322A (ja) 2011-04-07
BRPI0907765A2 (pt) 2015-07-14
CN102066125A (zh) 2011-05-18
US20110031735A1 (en) 2011-02-10
WO2009097979A2 (fr) 2009-08-13
WO2009097979A3 (fr) 2009-11-12
BRPI0907765A8 (pt) 2016-04-26
KR20100127748A (ko) 2010-12-06

Similar Documents

Publication Publication Date Title
EP2240333A2 (fr) Élément de sécurité
DE102008051409A1 (de) Sicherheitselement
EP2867031B1 (fr) Élément de sécurité doté de microstructures comprenant des structures de diffraction et procédés de fabrication et de vérification correspondants
DE112009002538T5 (de) Passerverfahren und Vorrichtung für geprägte und gedruckte Merkmale
WO2014177267A1 (fr) Élément de sécurité optiquement variable
WO2013156149A1 (fr) Élément de sécurité optiquement variable
WO2012097463A1 (fr) Procédé de fabrication d&#39;un support de données multicouche et support de données fabriqué selon ledit procédé
EP2773514A1 (fr) Élément de sécurité optiquement variable
WO2009097980A2 (fr) Élément de sécurité
DE202010017843U1 (de) Positionsgeber
WO2009036878A1 (fr) Thermoplaste comprenant des plaquettes de marquage métalliques
EP2239150B1 (fr) Dispositif de sécurité
EP3778255A2 (fr) Produit de valeur ou de sécurité, son procédé de fabrication et dispositif de reconstruction et de détection d&#39;un hologramme par réflexion d&#39;un tel produit
EP3972852A1 (fr) Élément de sécurité comprenant une image anamorphique
DE102020133863B4 (de) Wert- oder sicherheitsprodukt sowie verfahren zu dessen herstellung
EP3989007A1 (fr) Produit de valeur ou de sécurité, ainsi que son procédé de vérification
EP3279003A1 (fr) Élément de sécurité et procédé de fabrication d&#39;un élément de sécurité
EP4187512A1 (fr) Dispositif et procédé de détection optique d&#39;un produit de valeur ou de sécurité
EP3989187A1 (fr) Procédé de vérification de l&#39;authenticité d&#39;une caractéristique de sécurité, formée de plusieurs parties, d&#39;un produit de valeur ou de sécurité
EP2892728B1 (fr) Élément composite muni d&#39;un réseau de lentilles interne
DE102015015407A1 (de) Prägeverfahren zum Prägen von Mikro- oder Nanostrukturen
AT518766A2 (de) Winkelabhängige Effekte erzeugende diffraktive Vorrichtung

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20100906

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: BAYER INTELLECTUAL PROPERTY GMBH

Owner name: BAYER MATERIALSCIENCE AG

17Q First examination report despatched

Effective date: 20130903

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: BAYER INTELLECTUAL PROPERTY GMBH

18D Application deemed to be withdrawn

Effective date: 20140114