EP2559563B1 - A security document with a see-through feature, and methods for manufacturing and authentication thereof - Google Patents
A security document with a see-through feature, and methods for manufacturing and authentication thereof Download PDFInfo
- Publication number
- EP2559563B1 EP2559563B1 EP11461534.7A EP11461534A EP2559563B1 EP 2559563 B1 EP2559563 B1 EP 2559563B1 EP 11461534 A EP11461534 A EP 11461534A EP 2559563 B1 EP2559563 B1 EP 2559563B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- see
- security document
- image
- personalized data
- transparent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 24
- 238000004519 manufacturing process Methods 0.000 title claims description 4
- 230000001419 dependent effect Effects 0.000 claims description 21
- 238000003475 lamination Methods 0.000 claims description 8
- 238000013467 fragmentation Methods 0.000 claims description 5
- 238000006062 fragmentation reaction Methods 0.000 claims description 5
- 238000010147 laser engraving Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000007641 inkjet printing Methods 0.000 claims description 3
- 238000010030 laminating Methods 0.000 claims description 2
- 229920003023 plastic Polymers 0.000 description 5
- 239000004033 plastic Substances 0.000 description 4
- 239000000758 substrate Substances 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 1
- 229920000515 polycarbonate Polymers 0.000 description 1
- 239000004417 polycarbonate Substances 0.000 description 1
- 229920000728 polyester Polymers 0.000 description 1
- 239000004800 polyvinyl chloride Substances 0.000 description 1
- 229920000915 polyvinyl chloride Polymers 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/351—Translucent or partly translucent parts, e.g. windows
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/45—Associating two or more layers
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/2016—Testing patterns thereon using feature extraction, e.g. segmentation, edge detection or Hough-transformation
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M3/00—Printing processes to produce particular kinds of printed work, e.g. patterns
- B41M3/14—Security printing
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B41—PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
- B41M—PRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
- B41M5/00—Duplicating or marking methods; Sheet materials for use therein
- B41M5/24—Ablative recording, e.g. by burning marks; Spark recording
Definitions
- the present invention relates to security documents with a see-through security feature.
- See-through security features also known as recto-verso or look-through, are one of known counterfeit protection methods.
- a typical see-through security feature comprises two partial images applied on opposite sides of a semi-transparent substrate, which form a complete image when viewed in transmitted light.
- See-through security features are commonly applied to documents having a uniform semi-transparent substrate, such as a semi-transparent plastic or paper substrate printed at both sides.
- a European patent EP0388090 Sheet with security device describes a sheet comprising a see-through feature, which is provided in a region of the sheet which is more transparent than a majority of the remainder of the sheet.
- the sheet has a paper substrate.
- US 2010/0295290 discloses a security document having corresponding features to those of the preambles of claim 1 and claim 7, respectively.
- the object of the invention is a method for manufacturing a security document by providing transparent external layers, at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, laminating the layers to form the security document and applying to the document, before and/or after lamination of layers, personalized data and a see-through security feature in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light.
- the method further comprises the steps of: before applying the see-through security feature obtaining the personalized data for the security document, obtaining the complete image for the see-through security feature, and dividing the complete image to the first partial image and to the second partial image using a function having a value dependent on at least part of the personalized data for the security document.
- the method further comprises the steps of, when dividing the complete image: generating a mask having a size of the complete image and comprising a plurality of regions using the function having a value dependent on at least part of the personalized data for the security document and assigning the regions of the complete image which coincide with the regions of the mask to the first partial image and the remaining regions to the second partial image.
- the function having a value dependent on at least part of the personalized data for the security document is a hash function.
- the complete image comprises at least part of the personalized data for the security document.
- the see-through security feature is applied by ink jet printing before lamination.
- the see-through security feature is applied by laser engraving after lamination.
- the object of the invention is also a security document having a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data, wherein the fragmentation of the complete image to the first and second partial images is having a value dependent on at least part of the personalized data comprised in the security document.
- At least one semi-transparent internal layer comprises a first internal layer of a first transparency with an opening corresponding to the see-through area and a second semi-transparent layer of a second transparency, higher than the first transparency.
- the first internal layer of the first transparency is opaque.
- the document further comprises an integrated circuit chip with memory in which there is stored a definition of the function on which the fragmentation of the complete image is dependent and/or a mask for verifying the authenticity of the fragmentation of the complete image and/or the first and second partial images and/or the complete image.
- the object of the invention is also a method for authenticating a security document in a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data.
- the method comprises the steps of: obtaining at least part of the personalized data of the security document, generating a mask having a size of the complete image and comprising a plurality of regions, using a function having a value dependent on the obtained at least part of the personalized data and verifying whether the first partial image and/or the second partial image are compliant with the generated mask.
- the object of the invention is also a device for authenticating a security document in a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at last one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data.
- the device comprises a document reader configured to obtain at least part of the personalized data of the security document, as well as the first partial image and/or the second partial image and a verification module configured to generate a mask having a size of the complete image and comprising a plurality of regions, using a function having a value dependent on the obtained at least part of the personalized data and to verify whether the first partial image and/or the second partial image are compliant with the generated mask.
- Fig. 1 shows a top view of the security document according to the invention, which may have a form of a plastic card 100 with a dimensions of e.g. approximately 8 cm x 5 cm and with an integrated circuit chip 124 with data 123 stored therein and with a plurality of standard identification elements related to personalized data, such as a photo 121 of a face, embossed, printed and/or engraved name and an ID number 122 of the document holder.
- the document is a laminate of transparent external layers 101, 102 and at least one semi-transparent internal layer 104 with a see-through area 110 which is more transparent than the majority of the remainder of the document.
- the see-through area 110 has a see-through security feature comprising a first partial image 111 applied on one side of the at least one semi-transparent internal layer 104 and a second partial image 112 applied on the other side of the at least one semi-transparent internal layer 104, wherein the first partial image 111 and the second partial image 112 form a complete image 113 when viewed in transmitted light.
- Fig. 2 shows an assembly view of one exemplary embodiment of the security document.
- the document is a laminate of plastic layers.
- the embodiment shown in Fig. 2 comprises transparent layers 101, 102, between which there is an internal layer 103 of a first transparency with an opening 110 corresponding to the see-through area and a second semi-transparent layer 104 of a second transparency, higher than the first transparency.
- the internal layer 103 of a first transparency is opaque.
- the first and second partial images 111, 112 can be applied by laser engraving the opposite sides of the semi-transparent layer 104 after lamination of the layers.
- Fig. 3 shows an assembly view of another exemplary embodiment of the security document.
- the document is a laminate of plastic layers.
- the embodiment shown in Fig. 3 is similar to that shown in Fig. 2 , but it comprises two additional transparent or semi-transparent layers 105, 106 located at opposite sides of the semi-transparent layer 104.
- the total transparency of the layers 104, 105, 106 should be higher than the total transparency of layers 103, 104, 105, 106, such that the transparency of the area 110 is higher than the transparency of the remaining portion of the document.
- the see-through security feature can be is applied by ink jet printing the first image and the second image on layers 105, 106 before lamination of the layers.
- the first partial image 111 (e.g. the recto image) can be applied by using different print or engraving parameters than the second partial image 112 (e.g. the verso image) in order to achieve similar shades of the complete image 113 when viewed in transmitted light.
- the total transparency of all layers in the see-through area 110 should be such as to allow the see-through feature to be seen in certain light conditions.
- the layers 101-106 can be made of materials typical to plastic card laminates, such as polycarbonate, polyvinyl chloride and/or polyester.
- the definition of the function, the mask image 114, the partial images 111, 112 and/or the complete image 113 can be stored in the integrated circuit chip 124, which facilitates verification of the security document.
- Fig. 4 shows the steps of a first embodiment of the method according to the invention.
- step 201 at least part of personalized data for applying to the document 100 is obtained, such as a name of the document holder, a personal ID number, a date of issuance of the document, a photo etc.
- step 202 a complete see-through image is obtained.
- the complete see-through image can be common for a group of documents, for example it can be a country code, a document type, a common symbol, year of issuance etc.
- the complete see-through image can be personalized and include a personal ID number, a name, a surname, a photo etc.
- Exemplary complete see-through images 113 are shown in Figs. 6-9 .
- a mask image 114 is generated in step 203 as a function of the at least part of personalized data.
- the mask image 114 has the size of the complete see-through image 113 and comprises a plurality of regions 115 generated as a function having a value dependent on the at least part of the personalized data 121-123 for the security document.
- the function can be a hash function for the card holder's name.
- the hash function should generate substantially unique outputs for unique personalized data.
- an MD5 hash function can generate a 128-bit hash value, which guarantees with a very high probability that all card holder names will be assigned different hash values.
- the hash value can be used to generate a mask.
- the individual bits of the hash value can be used to define the regions of the mask image.
- more bits of the 128-bit MD5 hash value should be used, or even longer hash value should be used, in order to guarantee uniqueness of the mask.
- step 204 the first partial image 111 and the second partial image 112 are generated, by overlaying the mask 114 on the complete image 113.
- the regions of the complete image 113 which coincide with the regions of the mask can be assigned to the first partial image 111 and the remaining regions can be assigned to the second partial image 112.
- step 205 blank layers 101-106 are provided in step 205.
- the personalized data 121-123 and the partial see-through images 111, 112 are applied in step 206, for example by Ink-jet method.
- step 207 the layers are laminated in step 207.
- Fig. 5 shows the steps of a second embodiment of the method according to the invention. Steps 211-214 are equivalent to steps 201-204 of the method shown in Fig. 4 .
- step 215 a blank or partially personalized laminate is provided.
- step 216 the see-through images and optionally the rest of the personalized data are applied to the laminate, for example by laser engraving.
- Figs. 7-9 show further exemplary embodiments of masks 114 applied to exemplary complete images 113 and resulting partial images 111, 112.
- Fig. 7 shows an example, wherein the mask 114 comprises a plurality of rectangles, wherein the top-left corner point and the bottom-right corner points are defined by the function having a value dependent on at least part of the personalized data.
- the maximum size of the rectangle is limited.
- Fig. 8 shows an example, wherein the mask 114 comprises a plurality of regions obtained by drawing lines having coordinates defined by the function having a value dependent on at least part of the personalized data and active regions selected in areas between the lines.
- Fig. 9 shows an example, wherein the mask 114 comprises a plurality of regions obtained by drawing ellipses having center points and radii defined by the function having a value dependent on at least part of the personalized data.
- Fig. 10 shows a structure of a device for authenticating the security document according to the invention.
- the device comprises a document reader 301 configured to obtain at least part of the personalized data 121-123 of the security document (for example by an optical reader or an IC chip interface), as well as the first partial image 111 and/or the second partial image 112 (for example by an optical reader).
- a verification module 302 is configured to generate a mask 114 having a size of the complete image 113 and comprising a plurality of regions 115, as a function having a value dependent on the obtained at least part of the personalized data 121-123 and to verify whether the first partial image 111 and/or the second partial image 112 are compliant with the generated mask 114.
- the mask 114 can be generated by a mask generator 304 on the basis of the value of the hash function 303, wherein the mask generator 304 receives the personalized data 121-123 from the document reader 301.
- the hash function 303 and the mask generator 304 operate in the same manner as corresponding units in the system for manufacturing the card.
- the verification can be performed by an image comparator 305 receiving as input the mask 114 from the mask generator 304 and the partial images 111, 112 from the document reader 301 and providing an output determining whether the images overlap or not.
- the security document with a see-through security feature is improved in that the see-through security feature is personalized not only by applying personalized data in the see-through area, but also by personalized method of generating the regions which belong to the first and second partial images.
- the see-through security feature should be changed as well. This not only requires additional manipulation within the see-through area, but knowledge of the function having a value dependent on the personalized data as well, in case when the hash function is not stored on the card chip. Therefore, the see-through security feature according to the invention can be used for authenticating the document and for verifying the data contained therein.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Manufacturing & Machinery (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Credit Cards Or The Like (AREA)
Description
- The present invention relates to security documents with a see-through security feature.
- See-through security features, also known as recto-verso or look-through, are one of known counterfeit protection methods. A typical see-through security feature comprises two partial images applied on opposite sides of a semi-transparent substrate, which form a complete image when viewed in transmitted light. See-through security features are commonly applied to documents having a uniform semi-transparent substrate, such as a semi-transparent plastic or paper substrate printed at both sides.
- A European patent
EP0388090 "Sheet with security device" describes a sheet comprising a see-through feature, which is provided in a region of the sheet which is more transparent than a majority of the remainder of the sheet. The sheet has a paper substrate. - The aim of the present invention is to provide an improved security document with a see-through security feature.
US 2010/0295290 discloses a security document having corresponding features to those of the preambles of claim 1 and claim 7, respectively. - The object of the invention is a method for manufacturing a security document by providing transparent external layers, at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, laminating the layers to form the security document and applying to the document, before and/or after lamination of layers, personalized data and a see-through security feature in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light. The method further comprises the steps of: before applying the see-through security feature obtaining the personalized data for the security document, obtaining the complete image for the see-through security feature, and dividing the complete image to the first partial image and to the second partial image using a function having a value dependent on at least part of the personalized data for the security document.
- Preferably, the method further comprises the steps of, when dividing the complete image: generating a mask having a size of the complete image and comprising a plurality of regions using the function having a value dependent on at least part of the personalized data for the security document and assigning the regions of the complete image which coincide with the regions of the mask to the first partial image and the remaining regions to the second partial image.
- Preferably, the function having a value dependent on at least part of the personalized data for the security document is a hash function.
- Preferably, the complete image comprises at least part of the personalized data for the security document.
- Preferably, the see-through security feature is applied by ink jet printing before lamination.
- Preferably, the see-through security feature is applied by laser engraving after lamination.
- The object of the invention is also a security document having a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data, wherein the fragmentation of the complete image to the first and second partial images is having a value dependent on at least part of the personalized data comprised in the security document.
- Preferably, at least one semi-transparent internal layer comprises a first internal layer of a first transparency with an opening corresponding to the see-through area and a second semi-transparent layer of a second transparency, higher than the first transparency.
- Preferably, the first internal layer of the first transparency is opaque.
- Preferably, the document further comprises an integrated circuit chip with memory in which there is stored a definition of the function on which the fragmentation of the complete image is dependent and/or a mask for verifying the authenticity of the fragmentation of the complete image and/or the first and second partial images and/or the complete image.
- The object of the invention is also a method for authenticating a security document in a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at least one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data. The method comprises the steps of: obtaining at least part of the personalized data of the security document, generating a mask having a size of the complete image and comprising a plurality of regions, using a function having a value dependent on the obtained at least part of the personalized data and verifying whether the first partial image and/or the second partial image are compliant with the generated mask.
- The object of the invention is also a device for authenticating a security document in a form of a laminate of transparent external layers and at least one semi-transparent internal layer with a see-through area which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area, the see-through feature comprising a first partial image applied on one side of the at least one semi-transparent internal layer and a second partial image applied on the other side of the at last one semi-transparent internal layer, wherein the first and second partial images form a complete image when viewed in transmitted light, and wherein the security document comprises personalized data. The device comprises a document reader configured to obtain at least part of the personalized data of the security document, as well as the first partial image and/or the second partial image and a verification module configured to generate a mask having a size of the complete image and comprising a plurality of regions, using a function having a value dependent on the obtained at least part of the personalized data and to verify whether the first partial image and/or the second partial image are compliant with the generated mask.
- The object of the invention is shown by way of exemplary embodiments on a drawing, in which:
-
Fig. 1 shows a top view of the security document, -
Fig. 2 shows an assembly view of one exemplary embodiment of the security document, -
Fig. 3 shows an assembly view of another exemplary embodiment of the security document, -
Fig. 4 shows the steps of a first embodiment of the method according to the invention, -
Fig. 5 shows the steps of a second embodiment of the method according to the invention, -
Figs. 6-9 show examples of separation of a complete image to a first and to a second partial image using a mask having a value dependent on personalized data, -
Fig. 10 shows a structure of a device for authenticating a security document. -
Fig. 1 shows a top view of the security document according to the invention, which may have a form of aplastic card 100 with a dimensions of e.g. approximately 8 cm x 5 cm and with anintegrated circuit chip 124 with data 123 stored therein and with a plurality of standard identification elements related to personalized data, such as aphoto 121 of a face, embossed, printed and/or engraved name and anID number 122 of the document holder. As shown inFigs. 2 and 3 , the document is a laminate of transparentexternal layers internal layer 104 with a see-througharea 110 which is more transparent than the majority of the remainder of the document. The see-througharea 110 has a see-through security feature comprising a firstpartial image 111 applied on one side of the at least one semi-transparentinternal layer 104 and a secondpartial image 112 applied on the other side of the at least one semi-transparentinternal layer 104, wherein the firstpartial image 111 and the secondpartial image 112 form acomplete image 113 when viewed in transmitted light. -
Fig. 2 shows an assembly view of one exemplary embodiment of the security document. The document is a laminate of plastic layers. The embodiment shown inFig. 2 comprisestransparent layers internal layer 103 of a first transparency with anopening 110 corresponding to the see-through area and a secondsemi-transparent layer 104 of a second transparency, higher than the first transparency. Preferably, theinternal layer 103 of a first transparency is opaque. The first and secondpartial images semi-transparent layer 104 after lamination of the layers. -
Fig. 3 shows an assembly view of another exemplary embodiment of the security document. The document is a laminate of plastic layers. The embodiment shown inFig. 3 is similar to that shown inFig. 2 , but it comprises two additional transparent orsemi-transparent layers semi-transparent layer 104. The total transparency of thelayers layers area 110 is higher than the transparency of the remaining portion of the document. The see-through security feature can be is applied by ink jet printing the first image and the second image onlayers complete image 113 when viewed in transmitted light. - The total transparency of all layers in the see-through
area 110 should be such as to allow the see-through feature to be seen in certain light conditions. - The layers 101-106 can be made of materials typical to plastic card laminates, such as polycarbonate, polyvinyl chloride and/or polyester.
- The definition of the function, the
mask image 114, thepartial images complete image 113 can be stored in theintegrated circuit chip 124, which facilitates verification of the security document. -
Fig. 4 shows the steps of a first embodiment of the method according to the invention. First, instep 201 at least part of personalized data for applying to thedocument 100 is obtained, such as a name of the document holder, a personal ID number, a date of issuance of the document, a photo etc. Next, in step 202 a complete see-through image is obtained. The complete see-through image can be common for a group of documents, for example it can be a country code, a document type, a common symbol, year of issuance etc. Alternatively, the complete see-through image can be personalized and include a personal ID number, a name, a surname, a photo etc. Exemplary complete see-throughimages 113 are shown inFigs. 6-9 . Next, amask image 114 is generated instep 203 as a function of the at least part of personalized data. Themask image 114 has the size of the complete see-throughimage 113 and comprises a plurality ofregions 115 generated as a function having a value dependent on the at least part of the personalized data 121-123 for the security document. - For example, the function can be a hash function for the card holder's name. The hash function should generate substantially unique outputs for unique personalized data. For example, an MD5 hash function can generate a 128-bit hash value, which guarantees with a very high probability that all card holder names will be assigned different hash values.
- The hash value can be used to generate a mask. As a simple example, shown with reference to
Fig. 6 , the MD5 hash value for personalized data = "JOHN SMITH" is (in a hexadecimal form) "f3c686cf530baf2269e7442163cb602e". The individual bits of the hash value can be used to define the regions of the mask image. For example, themask image 114 can be divided into 4x4 squares and the consecutive squares can be defined as active/inactive depending on the value (1/0) of the first 16 bits of the hash value (which in this example is "F3C6" = "1111001111000110"), as shown in the example ofFig. 6 . In practice, more bits of the 128-bit MD5 hash value should be used, or even longer hash value should be used, in order to guarantee uniqueness of the mask. - In
step 204, the firstpartial image 111 and the secondpartial image 112 are generated, by overlaying themask 114 on thecomplete image 113. The regions of thecomplete image 113 which coincide with the regions of the mask can be assigned to the firstpartial image 111 and the remaining regions can be assigned to the secondpartial image 112. - Next, blank layers 101-106 are provided in
step 205. The personalized data 121-123 and the partial see-throughimages step 206, for example by Ink-jet method. Then, the layers are laminated instep 207. -
Fig. 5 shows the steps of a second embodiment of the method according to the invention. Steps 211-214 are equivalent to steps 201-204 of the method shown inFig. 4 . Instep 215, a blank or partially personalized laminate is provided. Instep 216, the see-through images and optionally the rest of the personalized data are applied to the laminate, for example by laser engraving. -
Figs. 7-9 show further exemplary embodiments ofmasks 114 applied to exemplarycomplete images 113 and resultingpartial images -
Fig. 7 shows an example, wherein themask 114 comprises a plurality of rectangles, wherein the top-left corner point and the bottom-right corner points are defined by the function having a value dependent on at least part of the personalized data. In order to avoid a situation where a large rectangle would cover most of the mask region, the maximum size of the rectangle is limited. -
Fig. 8 shows an example, wherein themask 114 comprises a plurality of regions obtained by drawing lines having coordinates defined by the function having a value dependent on at least part of the personalized data and active regions selected in areas between the lines. -
Fig. 9 shows an example, wherein themask 114 comprises a plurality of regions obtained by drawing ellipses having center points and radii defined by the function having a value dependent on at least part of the personalized data. -
Fig. 10 shows a structure of a device for authenticating the security document according to the invention. The device comprises adocument reader 301 configured to obtain at least part of the personalized data 121-123 of the security document (for example by an optical reader or an IC chip interface), as well as the firstpartial image 111 and/or the second partial image 112 (for example by an optical reader). Averification module 302 is configured to generate amask 114 having a size of thecomplete image 113 and comprising a plurality ofregions 115, as a function having a value dependent on the obtained at least part of the personalized data 121-123 and to verify whether the firstpartial image 111 and/or the secondpartial image 112 are compliant with the generatedmask 114. Themask 114 can be generated by amask generator 304 on the basis of the value of thehash function 303, wherein themask generator 304 receives the personalized data 121-123 from thedocument reader 301. Thehash function 303 and themask generator 304 operate in the same manner as corresponding units in the system for manufacturing the card. The verification can be performed by animage comparator 305 receiving as input themask 114 from themask generator 304 and thepartial images document reader 301 and providing an output determining whether the images overlap or not. - The security document with a see-through security feature is improved in that the see-through security feature is personalized not only by applying personalized data in the see-through area, but also by personalized method of generating the regions which belong to the first and second partial images. In order to falsify the security document according to the invention by changing the personalized data, the see-through security feature should be changed as well. This not only requires additional manipulation within the see-through area, but knowledge of the function having a value dependent on the personalized data as well, in case when the hash function is not stored on the card chip. Therefore, the see-through security feature according to the invention can be used for authenticating the document and for verifying the data contained therein.
Claims (12)
- A method for manufacturing a security document by providing transparent external layers (101, 102), at least one semi-transparent internal layer (103-106) with a see-through area (110) which is more transparent than the majority of the remainder of the document, laminating the layers (101-106) to form the security document and applying to the document, before and/or after lamination of layers (101-106), personalized data (121-123) and a see-through security feature in the see through area (110), the see-through feature comprising a first partial image (111) applied on one side of the at least one semi-transparent internal layer (104) and a second partial image (112) applied on the other side of the at least one semi-transparent internal layer (104), wherein the first and second partial images (111, 112) form a complete image (113) when viewed in transmitted light, the method characterized by further comprising the steps of: before applying the see-through security feature: obtaining the personalized data (121-123) for the security document, obtaining the complete image (113) for the see-through security feature, and dividing the complete image (113) to the first partial image (111) and to the second partial image (112) using a function having a value dependent on at least part of the personalized data (121-123) for the security document.
- The method according to claim 1, further comprising the steps of: when dividing the complete image: generating a mask (114) having a size of the complete image and comprising a plurality of regions (115) using the function having a value dependent on at least part of the personalized data (121-123) for the security document and assigning the regions (115) of the complete image (113) which coincide with the regions of the mask to the first partial image (111) and the remaining regions to the second partial image (112).
- The method according to any of previous claims, wherein the function having a value dependent on at least part of the personalized data (121-123) for the security document is a hash function.
- The method according to any of previous claims, wherein the complete image (113) comprises at least part of the personalized data (121-123) for the security document.
- The method according to any of previous claims, wherein the see-through security feature is applied by ink jet printing before lamination.
- The method according to any of previous claims, wherein the see-through security feature is applied by laser engraving after lamination.
- A security document having a form of a laminate of transparent external layers (101, 102) and at least one semi-transparent internal layer (103-106) with a see-through area (110) which is more transparent than the majority of the remainder of the document, wherein a see-through security feature is applied in the see-through area (110), the see-through feature comprising a first partial image (111) applied on one side of the at least one semi-transparent internal layer (104) and a second partial image (112) applied on the other side of the at least one semi-transparent internal layer (104), wherein the first and second partial images (111, 112) form a complete image (113) when viewed in transmitted light, and wherein the security document comprises personalized data (121-123) characterized in that the division of the complete image (113) into the first and second partial images (111, 112) is dependent on at least part of the personalized data (121-123) comprised in the security document.
- The security document according to claim 7, wherein the at least one semi-transparent internal layer comprises a first internal layer (103) of a first transparency with an opening corresponding to the see-through area (110) and a second semi-transparent layer (104) of a second transparency, higher than the first transparency.
- The security document according to claim 8, wherein the first internal layer (103) of the first transparency is opaque.
- The security document according to any of claims 7-9, further comprising an integrated circuit chip (124) with memory in which there is stored a definition of the function on which the fragmentation of the complete image (113) is dependent and/or a mask (114) for verifying the authenticity of the fragmentation of the complete image (113) and/or the first and second partial images (111, 112) and/or the complete image (113).
- A method for authenticating the security document of any one of claims 7-10 : the method characterized by comprising the steps of:- obtaining at least part of the personalized data (121-123) of the security document,- generating a mask (114) having a size of the complete image (113) and comprising a plurality of regions (115), using a function having a value dependent on the obtained at least part of the personalized data (121-123),- verifying whether the first partial image (111) and/or the second partial image (112) are compliant with the generated mask (114).
- A device for authenticating the security document of any one of claims 7-10 the device characterized by comprising:- a document reader (301) configured to obtain at least part of the personalized data (121-123) of the security document, as well as the first partial image (111) and/or the second partial image (112),- a verification module (302) configured to generate a mask (114) having a size of the complete image (113) and comprising a plurality of regions (115), using a function having a value dependent on the obtained at least part of the personalized data (121-123) and to verify whether the first partial image (111) and/or the second partial image (112) are compliant with the generated mask (114).
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL11461534T PL2559563T3 (en) | 2011-08-18 | 2011-08-18 | A security document with a see-through feature, and methods for manufacturing and authentication thereof |
EP11461534.7A EP2559563B1 (en) | 2011-08-18 | 2011-08-18 | A security document with a see-through feature, and methods for manufacturing and authentication thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11461534.7A EP2559563B1 (en) | 2011-08-18 | 2011-08-18 | A security document with a see-through feature, and methods for manufacturing and authentication thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2559563A1 EP2559563A1 (en) | 2013-02-20 |
EP2559563B1 true EP2559563B1 (en) | 2014-03-26 |
Family
ID=45002875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11461534.7A Active EP2559563B1 (en) | 2011-08-18 | 2011-08-18 | A security document with a see-through feature, and methods for manufacturing and authentication thereof |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2559563B1 (en) |
PL (1) | PL2559563T3 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3286012B1 (en) | 2015-04-21 | 2019-03-20 | Giesecke+Devrient Mobile Security GmbH | Multilayer security element |
US10800201B2 (en) | 2016-03-04 | 2020-10-13 | Bundesdruckerei Gmbh | Security object having a dynamic and static window security feature and method for production |
DE102023100676B3 (en) | 2023-01-12 | 2024-03-07 | Melzer Maschinenbau Gmbh | Security element for a security document |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL2011352C2 (en) * | 2013-08-29 | 2015-03-10 | Morpho B V | Identification assembly for an identity document. |
MA44826A (en) | 2016-02-26 | 2019-01-02 | De La Rue Int Ltd | SECURITY DEVICE MANUFACTURING PROCESSES |
DE102016007140A1 (en) * | 2016-06-10 | 2017-12-14 | Giesecke+Devrient Mobile Security Gmbh | authentication system |
DE102016112672A1 (en) | 2016-07-11 | 2017-03-09 | Bundesdruckerei Gmbh | Method for producing a layer arrangement for a security document and security document |
DE102016009258A1 (en) | 2016-07-29 | 2018-02-01 | Giesecke+Devrient Mobile Security Gmbh | authentication arrangement |
KR102443286B1 (en) * | 2017-03-09 | 2022-09-14 | 도판 인사츠 가부시키가이샤 | Display body, booklet, ID card, manufacturing method of a display body, and manufacturing apparatus of a display body |
CA2978877C (en) | 2017-09-11 | 2023-04-04 | Canadian Bank Note Company, Limited | Method for making window, embedded watermark and other integrated security features in a thermoplastic security document |
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
IT201800002811A1 (en) * | 2018-02-19 | 2019-08-19 | St Poligrafico E Zecca Dello Stato S P A | DOCUMENT WITH AN ELEMENT OF SECURITY AND RELATED METHOD |
DE102019000149A1 (en) | 2019-01-10 | 2020-07-16 | Mühlbauer Gmbh & Co. Kg | Security deposit for an ID document with a transparent window |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3827726A (en) * | 1972-05-02 | 1974-08-06 | Polaroid Corp | Identification cards |
GB8905471D0 (en) | 1989-03-10 | 1989-04-19 | De La Rue Co Plc | Sheet with security device |
DE19906388A1 (en) * | 1999-02-16 | 2000-08-24 | Bundesdruckerei Gmbh | Personalizing, verifying identity, security documents involves placing personal data and/or correlated data in document in second, machine-readable form generated using biometric technique |
JP2007110301A (en) * | 2005-10-12 | 2007-04-26 | Fujitsu Ltd | Image printing apparatus, discrimination apparatus, and printed matter |
DE102008012419A1 (en) * | 2007-10-31 | 2009-05-07 | Bundesdruckerei Gmbh | Polymer composite layer for security and/or valuable documents comprises at least two interlocking polymer layers joined together with a surface printed with a printed layer absorbing in the visible region in and/or on the composite |
-
2011
- 2011-08-18 PL PL11461534T patent/PL2559563T3/en unknown
- 2011-08-18 EP EP11461534.7A patent/EP2559563B1/en active Active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3286012B1 (en) | 2015-04-21 | 2019-03-20 | Giesecke+Devrient Mobile Security GmbH | Multilayer security element |
US10800201B2 (en) | 2016-03-04 | 2020-10-13 | Bundesdruckerei Gmbh | Security object having a dynamic and static window security feature and method for production |
DE102023100676B3 (en) | 2023-01-12 | 2024-03-07 | Melzer Maschinenbau Gmbh | Security element for a security document |
Also Published As
Publication number | Publication date |
---|---|
EP2559563A1 (en) | 2013-02-20 |
PL2559563T3 (en) | 2014-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2559563B1 (en) | A security document with a see-through feature, and methods for manufacturing and authentication thereof | |
US10675904B2 (en) | Identification document with tactile feature | |
US8087698B2 (en) | Personalizing ID document images | |
US8033476B2 (en) | Identification document with three dimensional image of bearer | |
US6817530B2 (en) | Multiple image security features for identification documents and methods of making same | |
EP3465637B9 (en) | A method for authenticating a document | |
US20060197337A1 (en) | Identification document with lenticular watermark | |
US11230128B2 (en) | Method for producing secure identification document with color portrait and secure identification document thereof | |
US20210094332A1 (en) | Method for producing color secure identification document and color secure identification document thereof | |
EA025707B1 (en) | Method for improving security of an official document or a label, and said official document and label | |
US10315454B2 (en) | Method for processing a security element | |
KR100879961B1 (en) | Puzzle Typed KeyCode With Image, and Security System and Method Using It | |
EP2322355B1 (en) | A method for making a latent image on a document substrate and a document substrate with a latent image | |
Liersch | ID cards and passports | |
EP2790133B1 (en) | Security feature and object with security feature | |
US11749048B2 (en) | Method for authenticating a secure document | |
JP2016104527A (en) | Printed matter and manufacturing method of the same | |
JP7319882B2 (en) | Authenticity determination card and its manufacturing method | |
US20210216982A1 (en) | Converged payment credential | |
AU2020313389A1 (en) | Method for manufacturing a two-dimensional coloured bar code and associated security device | |
JP2009137147A (en) | Authentication medium and method of manufacturing the same | |
TW202039268A (en) | Security inlay with tactile coating arrangement for an identity document and method for producing such a security inlay | |
JP2019137042A (en) | Variable information printed matter and method for creating variable information printed matter data | |
KR20170042125A (en) | Method for enhacing security of card and card with enhanced security thereby |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
17P | Request for examination filed |
Effective date: 20130620 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20140103 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 602011005747 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: B42D0015100000 Ipc: B42D0025351000 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: B41M 3/14 20060101ALI20140218BHEP Ipc: B42D 25/351 20140101AFI20140218BHEP Ipc: G07D 7/20 20060101ALI20140218BHEP |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 658765 Country of ref document: AT Kind code of ref document: T Effective date: 20140415 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602011005747 Country of ref document: DE Effective date: 20140508 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140626 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: MEYER AND KOLLEGEN, CH Ref country code: AT Ref legal event code: MK05 Ref document number: 658765 Country of ref document: AT Kind code of ref document: T Effective date: 20140326 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: VDEP Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140726 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140626 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
REG | Reference to a national code |
Ref country code: PL Ref legal event code: T3 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140728 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602011005747 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20150106 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140818 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602011005747 Country of ref document: DE Effective date: 20150106 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140818 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140627 Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20110818 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 6 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 7 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 8 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20140326 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20190828 Year of fee payment: 9 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20190827 Year of fee payment: 9 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602011005747 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20200818 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20210302 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20200818 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: LT Payment date: 20220802 Year of fee payment: 12 Ref country code: FI Payment date: 20220829 Year of fee payment: 12 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20220905 Year of fee payment: 12 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230623 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PL Payment date: 20230606 Year of fee payment: 13 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MM4D Effective date: 20230818 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230818 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230818 Ref country code: FI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230818 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230831 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240826 Year of fee payment: 14 |