EP3548298A1 - Two security features that together form a third security feature - Google Patents
Two security features that together form a third security featureInfo
- Publication number
- EP3548298A1 EP3548298A1 EP17808469.5A EP17808469A EP3548298A1 EP 3548298 A1 EP3548298 A1 EP 3548298A1 EP 17808469 A EP17808469 A EP 17808469A EP 3548298 A1 EP3548298 A1 EP 3548298A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- signs
- sign
- authentication
- authentication mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 239000000976 ink Substances 0.000 claims description 38
- 230000005284 excitation Effects 0.000 claims description 23
- 238000010521 absorption reaction Methods 0.000 claims description 19
- 239000003086 colorant Substances 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 description 18
- 238000005286 illumination Methods 0.000 description 6
- 238000002955 isolation Methods 0.000 description 5
- 239000011159 matrix material Substances 0.000 description 5
- 238000005259 measurement Methods 0.000 description 3
- 230000000295 complement effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000001465 metallisation Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 238000003490 calendering Methods 0.000 description 1
- 238000004049 embossing Methods 0.000 description 1
- 230000001747 exhibiting effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 229920006254 polymer film Polymers 0.000 description 1
- 239000002966 varnish Substances 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/373—Metallic materials
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/378—Special inks
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/378—Special inks
- B42D25/382—Special inks absorbing or reflecting infrared light
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/378—Special inks
- B42D25/387—Special inks absorbing or reflecting ultraviolet light
Definitions
- the invention relates to a set of at least two safety signs.
- the invention relates in particular, although not exclusively, to a set of two security signs to protect a security document such as a banknote or an identity document or a bank card.
- An object of the invention is to provide a set of security signs further complicating fraudulent reproduction of these security signs.
- the invention proposes a set of N security signs, N being at least two, each security sign forming only an authentication mark different from those formed by the other signs of security. security, the various security signs being designed to form jointly N superimposed security signs, an N + l - th authentication mark unrelated to the other N authentication marks each formed respectively by one of the N signs of security.
- the N + 1 - th authentication mark is different from a simple combination of the other authentication marks such as a juxtaposition, a filling, a complement of the other authentication marks between them.
- N + 1-th authentication mark exists only by the superposition of the various security signs and is therefore not related to any tangible element which makes it all the more difficult to reproduce.
- the set comprises at least two security signs, a first security sign forming only a first authentication mark and a second security sign forming only a second authentication mark, different from the first mark of security.
- authentication the two security signs being conformed to form jointly by superimposing at least the two security signs, a third authentication mark unrelated to the first authentication mark and the second authentication mark.
- each authentication mark forms only a locatable image having a full meaning.
- the authentication mark can thus be an alphanumeric sign, a drawing, a geometrical figure, a bar code ...
- At least two security signs are carried by the same object.
- At least one of the security signs is arranged on the first main face of the object and at least one of the other security signs is arranged on the second main face of the object, the two signs being arranged in the same portion of the object.
- At least two of the security signs are arranged on the same main face of the object, a folding of the object allowing a superposition of the two security signs.
- N is at least three.
- the at least three security signs are printed using inks having at least one absorption / excitation wavelength common to the three security signs, the third sign being further in an ink exhibiting at least one absorption / excitation wavelength of its own and to which the other two safety signs do not react.
- At least one of the security signs is displayed on a device with a screen and at least one other security element is carried by an object.
- At least one of the security signs carried by the object is in an ink different from those of the rest of the object.
- At least one of the security signs is in an ink visible in the light of day.
- at least one first security sign is printed using an ink comprising a first absorption / excitation wavelength and a second absorption / excitation wavelength
- at least one second security sign is printed on the at least one first security sign in an ink comprising the first absorption / excitation wavelength and a third absorption / excitation wavelength different from the second wavelength absorption / excitation.
- the at least one first security sign and the at least one second security sign are printed with inks reissuing different colors so that the N + 1-th authentication mark appears in a panel color scheme comprising a color resulting from the combination of said colors of the at least one first security sign and the at least one second security sign.
- FIG. 1 is a very schematic sectional view of a document comprising an assembly according to a first embodiment of the invention
- FIG. 2 is a view from above of the document illustrated in FIG. 1 and studied by reflection
- FIG. 3 is a view from below of the document illustrated in FIG. 1 and studied by reflection
- FIG. 4 is a view from above or from below of the document illustrated in FIG. 1 and studied by transmission
- FIG. 5 is a very schematic sectional view of a document comprising an assembly according to a second embodiment of the invention as well as a representation of the various security signs studied in reflection and in transmission,
- FIG. 6 is a very schematic sectional view of a document comprising an assembly according to a third embodiment of the invention as well as a representation of the various security signs studied in reflection and in transmission,
- FIG. 7 is a very diagrammatic view from above of a document comprising an assembly according to a fourth embodiment of the invention before and after folding of the document,
- FIG. 8 is a very diagrammatic view of a document and a device provided with a screen comprising an assembly according to a fifth embodiment of the invention
- FIGS. 9a to 9c are very schematic views from above of an object comprising an assembly according to a sixth embodiment of the invention according to different lighting of the object.
- a document 1 such as a security document (banknote, identity card, passport, bank card, etc.) or a document another type of document (lottery ticket (7) comprises a support 2 carrying a security assembly according to the first embodiment of the invention.
- a security document banknote, identity card, passport, bank card, etc.
- a document another type of document lottery ticket
- the same document 1 carries the security assembly and thus here two security signs.
- the support 2 is shaped so that a first main face 3 of the support 2 carries the first safety sign 5 and so that the second main face 4, opposite the first main face 3, bears the second sign 6.
- the two security signs 5, 6 are here arranged to be located in the same area of the support 2. Thus, the two security signs 5, 6 are naturally superimposed on each other (well only separated by the thickness of the support 2).
- the support 2 is here shaped to allow both a study in reflection of the two main faces 3, 4 and at the same time a study in transmission of each of said faces.
- a support 2 like that used in the banknotes is for example appropriate.
- the support 2 is for example paper or polymeric material.
- the support 2 is adapted to be more transparent than in the rest of the support 2 to further improve the transmission study.
- a zone can be made more mechanically transparent by locally reducing the thickness of the support 2 (by a watermark technique, by calendering, etc.) or chemically by means of a varnish, a ink or solution at the time of forming the support 2 or once the support 2 created.
- the print density of the inks can be adapted so that one of the faces of the document 7 is darker than the other. In this way, this makes it possible to observe with identical or almost identical the least dark face, in reflection the sign carried by said face and in transmission the sign carried by the darkest face.
- the security signs 5, 6 are printed in inks having a high contrast with those used for the rest of the support 2 to facilitate the study in reflection, said inks being otherwise relatively opaque to facilitate the study in transmission. Inks are here inks visible in the light of day.
- the first authentication mark 7 formed by the first security sign 5 is clearly visible.
- the second authentication mark 8 formed by the second security sign 6 is also clearly visible.
- the second authentication mark 8 has a word (Einstein).
- the third authentication mark 9 is particularly difficult to reproduce because it exists only by the superposition of the two security signs 5, 6 and can not be connected to any security sign 5, 6 taken isolation.
- the third authentication mark 9 is here a drawing (schematizing electrons gravitating around a nucleus).
- the security package is based on the following general principle.
- the security assembly is here manufactured as follows.
- the three images II, 12, 13 which will correspond to the final respectively to the first authentication mark 7, the second authentication mark 8 and the third authentication mark 9.
- the images I1, 12, 13 each have a meaning but the three images II, 12, 13 have no relation to each other.
- the images I1, 12, 13 are all of identical size, each pixel of each image being either black or white.
- the images I1, 12, 13 thus have a high contrast and there is a 100% contrast between the black and white pixels of these images.
- the images I1, 12, 13 are then processed in the following manner.
- the first image II is broken down into a mask M1, each pixel of which in fact forms a matrix of size 2 * 2.
- the mask M1 is not the same size as the first image II.
- a so-called white pixel is created in the mask M1, that is to say a pixel whose matrix comprises two white zones and two black zones.
- a so-called white pixel in the mask M1 is composed of 50% white areas.
- the distribution of the black and white areas in the pixel is performed randomly.
- a so-called white pixel in the mask M1 is therefore randomly chosen from the following possibilities:
- a so-called black pixel is created in the mask M1, ie a pixel comprising a white zone and three black zones.
- a pixel said black in the mask M1 is composed of 75% black areas.
- the distribution of the black and white areas in the pixel is performed randomly.
- a black pixel in the mask M1 is therefore randomly selected from the following possibilities:
- a mask M1 is obtained, since it is randomly constructed at its pixels, which however forms the first authentication mark 7, that is to say an image that can be identified in itself, since the pixels of the matrix M1 are defined from image II.
- the first authentication mark 7 is identical to the image II but has just a lower contrast than the image II since the pixels Ml mask blanks are 50% white, and the black M M pixels are 75% black.
- the second image 12 is broken down into an encrypted image C2, each pixel of which in fact forms a matrix of size 2 * 2.
- the second image 12 and the encrypted image C2 therefore do not have the same size.
- a so-called white pixel in the encrypted image C2 is a pixel comprising two white zones and two black zones so that a so-called white pixel in the encrypted image C2 is composed at 50% white areas.
- a so-called black pixel in the encrypted image C2 it is a pixel comprising three zones black and a white area is a pixel composed of 75% black areas.
- the distribution of the black and white areas within each pixel of the encrypted image C2 is not chosen randomly.
- the encrypted image C2 must first correspond to the second image 12 to form the second authentication mark 8 (here the word Einstein). In this way, if a pixel is black in the second image 12, the corresponding pixel of the encrypted image C2 must also be a so-called black pixel and if a pixel is white in the second image 12, the corresponding pixel in the image encrypted C2 must also be a so-called white pixel.
- the encrypted image C2 must also be shaped so that the superposition of the mask M1 and the encrypted image C2 forms the third authentication mark 9 linked to the third image 13.
- the third authentication mark 9 corresponds here to the unveiled image D3.
- the unveiled image D3 is such that each pixel actually forms a matrix of size 2 * 2.
- a so-called white pixel in the unveiled image D3 is a pixel comprising a white zone and three black zones so that a so-called white pixel in the unveiled image D3 is composed of 75% black areas.
- a pixel said to be black in the unveiled image D3 it is a pixel comprising four black zones, ie a pixel composed of 100% black areas.
- the superposition of the mask M1 and the encrypted image C2 corresponds to the logical operator "or” that is to say that: for a superimposed black and white pixel of the mask M1 and the encrypted image C2 (or vice versa), the corresponding pixel of the unveiled image D3 will be black,
- the corresponding pixel of the unveiled image D3 will be black
- the corresponding pixel of the unveiled image D3 will be white.
- the encrypted image C2 must therefore be constructed according to the following rules:
- the encrypted image C2 which forms the second authentication mark that is to say an image that is identifiable in itself, is thus constructed, since the pixels of the encrypted image C2 are defined from the image 12
- the encrypted image C2 forming the second authentication mark is identical to the image 12 but just has a lower contrast than the image 12 since the so-called white pixels of the encrypted image C2 are formed at 50. % of white areas and so-called black pixels of the encrypted image C2 are formed at 75% of black areas.
- the unveiled image S3 which is also the third authentication mark 9, is identical to the image 13 but only has a less significant contrast than the image 13 since the white pixels of the unveiled image D3 are formed at 25% of white areas and the black pixels of the unveiled image D3 are formed at 100% black areas.
- the images represented in the various figures of the present application are diagrammatic since they do not represent (for questions of visibility) the less important contrast of the mask M1 and the encrypted image C2 vis-à-vis the initial images , or the less important contrast of the unveiled image S3 with the corresponding initial image on the one hand or with the mask M1 and the encrypted image C2 on the other hand.
- the second embodiment is here identical to the first embodiment, with the difference that the security assembly comprises a third security sign 110 arranged inside the support 102.
- the support 102 is shaped so that the third security sign 110 is arranged in the same area of the support 102 as the other two security signs 105, 106.
- the three security signs 105, 106, 110 are naturally superimposed (but not contiguous by the thickness of the support).
- the signs are arranged so that at least two of the three signs are contiguous (for example by making two separate films each carrying a security sign and by subsequent joining of said films).
- the third security sign 110 is here shaped to form a fourth authentication mark 111 in reflection (for example an apple) unrelated to the first authentication mark 107, the second authentication mark 108 and the third mark of authentication.
- the second authentication mark 108 formed by the second security sign 106 is also clearly visible.
- the three security signs 105, 106, 110 are visible by superposition. Because of their superposition, the three security signs 105, 106, 110 then draw a fifth authentication mark 112 (here a star) unrelated to the first authentication mark 107, the second authentication mark 108, the third authentication mark 109 and the fourth authentication mark 111.
- a fifth authentication mark 112 here a star
- the fifth authentication mark 112 proves particularly difficult to reproduce since it exists only by the superposition of the three signs of security and can not be linked to any security sign taken in isolation.
- the mask / image encrypted / unveiled image principle is applied to the first authentication mark 107, to the second authentication mark 108 and to the fifth authentication mark 112 but via three safety signs 105, 106, 110.
- a person attempts to copy the document by scanner, it will scan both sides of the ticket and thus scan the authentication marks 107, 108 but without being able to scan the fourth authentication mark 111 which is inaccessible.
- the fraudulent document when we look by transmission at the level of the reproduction of the authentication marks 107, 108, we will see the symbol "false" indicating that the ticket has been reproduced fraudulently.
- the three security signs 105, 106, 110 are printed in inks having at least one absorption / excitation wavelength common to the three security signs.
- the third security sign 111 is also printed in inks also having at least one absorption / excitation wavelength different from those of the two other security signs.
- the three security signs 105, 106, 110 are all visible in daylight and the third security sign 110 is furthermore the only one to be visible in infrared light.
- the third authentication mark 109 may thus not exist.
- the superposition of the first authentication mark 107 and the second authentication mark 108 then gives no authentication mark (whether interpretable or not). However, this is not a problem for obtaining the fifth authentication mark 112.
- the third security sign 110 is shaped so that the fourth authentication mark 111 is related to the third authentication mark 109 which is formed by the superposition of the first security sign 105 and the second security sign. 106.
- the third embodiment is here identical to the second embodiment, with the difference that the fourth authentication mark 213 is not interpretable without any figurative sign.
- the first security sign 205 and the second security sign 206 are also conformed so that the superposition of these only two security signs 205, 206 does not form a third interpretable authentication mark.
- the superimposition of the first security sign 205 and the second security sign 206 thus form a third non-interpretable authentication mark 214 without any figurative sign (for questions of visibility the marks of authentication 213 and 214 are represented by a white square but are actually formed by a point cloud forming a more opaque area than is shown).
- the three security signs 205, 206, 210 are always shaped to form together by superposition a fifth authentication mark 212 unrelated to the first authentication mark 207, the second authentication mark 208, the fourth mark of authentication 213 and here the third authentication mark 214.
- the second authentication mark 208 formed by the second security sign 206 is also clearly visible (here the electrons gravitating around the core).
- the three security signs 205, 206, 210 are visible by superposition. Because of their superposition, the three security signs 205, 206, 210 then draw the fifth authentication mark 212 (here a star) unrelated to the first authentication mark 207, the second authentication mark 208, the fourth authentication mark 213 and also irrelevant here with the third authentication mark 214.
- the principle mask / image encrypted / unveiled image is applied to the first authentication mark 207, the second authentication mark 208 and the fifth authentication mark 212 but through three safety signs 205, 206, 210.
- the third authentication mark 214 may not exist.
- the superposition of the first authentication mark 207 and the second authentication mark 208 then gives no authentication mark (whether interpretable or not). However, this is not a problem for obtaining the fifth authentication mark 212.
- This embodiment is identical to the first embodiment except that the second security sign 308 is arranged in a window 315 formed in the support 302 so that the second security sign 308 is visible on both sides of the support 302. by reflection.
- the window 315 is arranged in another area of the support 302 than the one where the first security sign 305 is located.
- the first authentication mark 307 formed by the first security sign 305 is clearly visible (here the sign @). Furthermore, the second authentication mark 308 formed by the second security sign 306 is also visible (here a gear). If we observe the second main face in reflection, the second authentication mark 308 formed by the second security sign 306 is also visible because of the window 315. The first authentication mark 307 is however not visible. by reflection.
- the third authentication mark 309 (and possibly the fourth authentication mark) is particularly difficult to reproduce since it only exists by superimposing the two security signs 305, 306 and can not be connected to any security sign 305, 306 taken alone.
- the set of security signs was carried by the same document
- the first security sign 405 is still carried by the document 401 but the second security sign 406 is displayed on the screen 417 of a device 416.
- the device 416 is here a mobile phone.
- the first authentication mark 407 formed by the first security sign 405 is clearly visible (here the sign €).
- the second authentication mark 408 formed by the second security sign 406 is also visible (here a star).
- the apparatus 416 is part of an overlay device including a camera 421 connected to the apparatus 416 for measuring the relative position of the document 401 on the screen 417. From the data provided by the camera 421, the apparatus 416 automatically repositions the second security sign 406 to be arranged under the first security sign 405.
- the camera 421 is integrated in the camera 416. The camera 421 is thus the camera of the mobile phone.
- the device comprises a tracking system 418 of the position of the document 401 on the screen 417.
- the tracking system here comprises a plate 419 arranged on the apparatus 416.
- the plate 419 comprises for example snap means 416 device to be easily removable.
- the plate 419 is here arranged at the end of the camera 416 at the camera 421, the plate 419 extending substantially perpendicular to the apparatus 416.
- the plate 419 further includes a mirror 420 arranged at the upper end of the plate 419 so as to overlie the camera 421.
- the mirror 420 is arranged so that the measurement field of the camera 421 (centered on a viewing direction A) passes through said mirror 420 and is further arranged to reflect the screen 417 of the apparatus 416 in the measurement field of the camera. In this way, the camera 421 can view the screen 417 via the mirror 420. From the images reflected on the mirror 420, the camera 421 transmits the corresponding images of the position of the document 401 on the screen 417 to the apparatus 416 which allows the apparatus 416 to determine the relative position of the first security sign 405 and to position the second security sign 406 accordingly.
- the mirror 420 is here arranged to reflect the entire surface of the screen 417 in the measurement field of the camera.
- the third authentication mark is particularly difficult to reproduce since it exists only by the superposition of the two security signs 405, 406 and can not be connected to any security sign 405, 406 taken in isolation.
- the security assembly is shaped so that the different authentication marks are studied only by reflection and without folding of the object 501 carrying the security assembly.
- the two security signs are directly printed on each other in inks having both at least one common absorption / excitation wavelength and at least one wavelength. absorption / excitation different from that of the other ink. In this way, the third authentication mark is revealed when all the two security signs are illuminated in the field of their common absorption / excitation wavelength.
- the first safety sign is printed using a visible ink in daylight and under infra-red excitation for a wavelength around 800 nanometers.
- the second security sign is printed using a visible ink in daylight and under infra-red excitation for a wavelength around 900 nanometers.
- the two signs are printed on each other either directly on the object 501 or on a element reported on the object 501. The two signs are found and arranged on the same area of the object 501.
- the object 501 is illuminated under an infrared illumination centered on the wavelength of 800 nanometers, only the first security sign will react so as to reveal the first authentication mark 507 ( here a cross surrounded by a circle) which is visible in reflection.
- the object 501 is illuminated under infrared illumination centered on the wavelength of 900 nanometers, only the second security sign will react so as to reveal the second authentication mark 508 ( here a star) which is visible in reflection.
- the object 501 is illuminated in the visible, the two security signs will react so as to show, by superposition of the two security signs, the third authentication mark 509 (here a heart) which is therefore also visible in reflection.
- the third authentication mark 509 here a heart
- the first authentication mark 507, the second authentication mark 508 or the third authentication mark 509 appear.
- the third authentication mark 509 is particularly difficult to reproduce since it exists only by the superposition of the two security signs and can not be connected to any security sign alone.
- the assembly according to the invention is carried by the same document or by a document and an apparatus provided with a screen, this is not limiting and the assembly according to the invention may be worn from any other way.
- the assembly according to the invention may be worn in part or in whole by another object than a document such as for example a token or a coin.
- the assembly according to the invention may be carried in part by a first object and partly by another second object reported on the first to show at least a third authentication mark.
- the second object is a polarizing filter.
- the security signs are directly printed on the support carrying them, the security signs can be formed directly on a dedicated base then reported itself on the support.
- the base may be a wire carrying at least one of the security signs, the security sign being inserted on the base before or after the arrangement of the base on the support.
- One or more safety signs will then be arranged in the support instead of being on one of the main faces of the support as described.
- the safety sign will for example be inserted into the support at a window formed in the support so that the wire is accessible from both sides of the support.
- the wire will then be shaped to allow a study in reflection and / or a study in transmission of said wire.
- the wire may be in a multilayer film with interferential effects such as that described in the patent application FR 3,011,508 of the present applicant.
- the base may be a patch, a film of film such as a polymer film ... bearing at least one of the security signs, the security sign being inserted on the base before or after the arrangement of the base on the support.
- the base may cover or fill a hole formed in the support to form a window so that the security sign is then accessible on both sides of the support.
- the base will then preferably, although not exclusively, shaped to allow study in reflection and / or transmission of said sign.
- At least one of the security signs may be arranged in one way on the support and at least one other security signs may be arranged in another way on the support: it will thus be possible to have a security sign arranged on a wire and a security sign arranged on a patch.
- the inks used are inks visible in the light of day
- the inks used may in addition or in replacement be inks visible under other wavelengths typically under infra-red or ultraviolet. It is preferable that the inks are visible in the light of day when it is desired that a lambda user can easily detect a counterfeit or otherwise that the inks are invisible in the light of day to complicate a fraudulent reproduction of all of security.
- Inks may be invisible in daylight and visible under ultraviolet or infrared excitation.
- the inks may be visible in daylight and fluorescent under ultraviolet or infrared excitation.
- We can also use inks re-emitting different colors on a first side of the support and on the second side of the support: so when will superimpose two security signs, the third authentication mark will appear in a color panel comprising the first color of the first authentication mark, the second color of the second authentication mark and in a third color resulting from the combination of the two colors. two colors to further complicate a fraudulent reproduction of the whole of the invention.
- security signs are printed, it will be possible to form the security signs in a different way on the support or a base attached to the support, for example by embossing, by metallization, by metallization, etc.
- the authentication marks may be different. At least one of the authentication marks may thus comprise an authentication code for the medium or the object carrying it, such as for example a one - dimensional bar code, a two - dimensional bar code, a serial number, a SealgnOture code. (Trademark) ... Preferably, at least the authentication mark unveiled by superimposing the various security signs will include such an authentication code.
- the security assembly was made from images decomposed in mask / image encrypted / unveiled image whose pixels were matrices 2 * 2, it is understood that said matrices may be of different size eg 2 * 3 or 3 * 2, especially although not exclusively to create different levels of contrast or to allow overlapping more safety signs.
- the dies may also have other shapes than square or rectangular matrices and be for example of circular or hexagonal shape to reinforce the difficulty of fraudulent reproduction.
- the authentication marks are visible and controllable to the naked eye, it may be otherwise. It will thus be possible to use ultraviolet or infrared illumination to study at least one authentication mark or a polarizing filter (linear or circular).
- the device with a screen may include and / or be associated with other sensors than a camera to estimate the position of the object on the screen.
- the screen is touch, it can be directly the touch screen sensors that will determine the relative position of the object on the screen.
- the device may be different from a mobile phone.
- the device may for example be a computer, a touch pad and generally any equipment with a screen.
- the senor may be external and remote from the device.
- the sensor will then be connected to the device wired (for example by USB cable) or non-wired (for example by Bluetooth).
- the tracking system may have a different number of mirrors.
- the tracking system may comprise other optical elements such as a mirror such as one or more optical fibers, one or more lenses.
- the screen may be used to enhance the contrast of the third authentication mark and / or the second security sign.
- the second security sign displayed on the screen is fixed, there may be alternatively a second security sign that is regularly changed on the screen so that with the same first security sign affixed to it, the third authentication mark also changes regularly (with each change of the second security sign). We will thus have an evolution, a movement of the third authentication mark.
- the device may be used to authenticate an object, the detection of a counterfeit can then come directly from the device through the possible observation of the third authentication mark by the camera of the device or may be left to the discretion of the user who will visualize the effects produced.
Landscapes
- Credit Cards Or The Like (AREA)
- Collating Specific Patterns (AREA)
- Air Bags (AREA)
- Magnetic Record Carriers (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL17808469T PL3548298T3 (en) | 2016-12-02 | 2017-12-04 | Two security features that together form a third security feature |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1661896A FR3059594B1 (en) | 2016-12-02 | 2016-12-02 | TWO SAFETY SIGNS JOINTLY FORMING A THIRD SAFETY SIGN |
PCT/EP2017/081336 WO2018100203A1 (en) | 2016-12-02 | 2017-12-04 | Two security features that together form a third security feature |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3548298A1 true EP3548298A1 (en) | 2019-10-09 |
EP3548298B1 EP3548298B1 (en) | 2021-11-10 |
Family
ID=58737621
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP17808469.5A Active EP3548298B1 (en) | 2016-12-02 | 2017-12-04 | Two security features that together form a third security feature |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP3548298B1 (en) |
AU (1) | AU2017367204B2 (en) |
CA (1) | CA3045099C (en) |
FR (1) | FR3059594B1 (en) |
MX (1) | MX2019006335A (en) |
MY (1) | MY195594A (en) |
PL (1) | PL3548298T3 (en) |
WO (1) | WO2018100203A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4019270A1 (en) * | 2020-12-23 | 2022-06-29 | Thales DIS France SA | A security assembly and method for manufacturing the same |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100855940B1 (en) * | 2006-10-14 | 2008-09-02 | (주)삼원 | the product for acoustic absorption and insulation and manufacturing method thereof |
GB0714141D0 (en) | 2007-07-19 | 2007-08-29 | Rue De Int Ltd | security device |
DE102007063275A1 (en) | 2007-12-27 | 2009-07-02 | Giesecke & Devrient Gmbh | Security feature for high tilt angles |
DE102008050768C5 (en) | 2008-10-09 | 2017-11-02 | Bundesdruckerei Gmbh | Security feature based on luminescence emitting materials, value and security document with such a security feature, a method and an apparatus for verification of such a security feature |
FR2961622B1 (en) * | 2010-06-22 | 2013-02-08 | Arjowiggins Security | METHOD FOR AUTHENTICATION AND / OR IDENTIFICATION OF A SECURITY ARTICLE |
DE102011117044B4 (en) * | 2011-10-27 | 2019-05-29 | Bundesdruckerei Gmbh | security element |
US10124620B2 (en) | 2012-03-13 | 2018-11-13 | Graphic Security Systems Corporation | Multi-image optical device |
FR3011508B1 (en) | 2013-10-08 | 2021-05-28 | Banque De France | SECURITY DOCUMENT INCLUDING A FILM WITH INTERFERENTIAL EFFECTS, PROCESS FOR DETERMINING THE AUTHENTICITY OF SUCH A DOCUMENT AND DEVICE FOR IMPLEMENTING SUCH A PROCESS. |
WO2015184556A1 (en) * | 2014-06-06 | 2015-12-10 | Orell Füssli Sicherheitsdruck Ag | Manufacturing method for security device |
MA44826A (en) | 2016-02-26 | 2019-01-02 | De La Rue Int Ltd | SECURITY DEVICE MANUFACTURING PROCESSES |
-
2016
- 2016-12-02 FR FR1661896A patent/FR3059594B1/en active Active
-
2017
- 2017-12-04 MY MYPI2019003127A patent/MY195594A/en unknown
- 2017-12-04 CA CA3045099A patent/CA3045099C/en active Active
- 2017-12-04 WO PCT/EP2017/081336 patent/WO2018100203A1/en unknown
- 2017-12-04 PL PL17808469T patent/PL3548298T3/en unknown
- 2017-12-04 AU AU2017367204A patent/AU2017367204B2/en active Active
- 2017-12-04 MX MX2019006335A patent/MX2019006335A/en unknown
- 2017-12-04 EP EP17808469.5A patent/EP3548298B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
FR3059594B1 (en) | 2021-05-28 |
CA3045099A1 (en) | 2018-06-07 |
MY195594A (en) | 2023-02-02 |
MX2019006335A (en) | 2019-09-26 |
AU2017367204A1 (en) | 2019-06-13 |
EP3548298B1 (en) | 2021-11-10 |
WO2018100203A1 (en) | 2018-06-07 |
FR3059594A1 (en) | 2018-06-08 |
PL3548298T3 (en) | 2022-03-28 |
CA3045099C (en) | 2021-10-26 |
AU2017367204B2 (en) | 2020-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2367695B1 (en) | Security document comprising at least one combined image and a revelation means, and associated method | |
WO2011161636A1 (en) | Method for the authentication and/or identification of a security item | |
EP3397501B1 (en) | Secure item comprising a combined image and/or a revealing screen | |
FR2969670A1 (en) | ELEMENT FOR SAFETY DOCUMENT HAVING AN OPTICAL STRUCTURE | |
FR2961621A1 (en) | METHOD OF AUTHENTICATING AND / OR IDENTIFYING A SECURITY ARTICLE | |
EP2275279A1 (en) | Security document and method of verifying same | |
EP3397502B1 (en) | Secure article comprising a combined image and/or a revelation screen | |
EP3548298B1 (en) | Two security features that together form a third security feature | |
EP2637875B1 (en) | Optically variable security device for a valuable document | |
EP3390064B1 (en) | Security element with hidden information | |
OA19095A (en) | Two security signs together forming a third security sign. | |
WO2015052181A1 (en) | A security document comprising a film with interferential effects, a method for determining the authenticity of such a document and a device for implementing such a method | |
EP3397500B1 (en) | Secure item comprising a revealing screen and a combined image | |
WO2018100200A1 (en) | Repositioning of an image on the screen of an apparatus | |
FR3078015A1 (en) | Micro-imaging pattern integration | |
FR2973910A1 (en) | REFLECTIVE AUTHENTICATION METHOD AND DEVICE | |
FR3120567A1 (en) | Security article or combination of a security article and another object comprising a first and a second frame | |
WO2022263772A1 (en) | Formation of a 3d image from a lenticular structure | |
WO2020119986A1 (en) | Security document incorporating a control pattern | |
FR2976381A3 (en) | Authentication method for verifying authenticity of e.g. document, involves carrying out determination of three-dimensional position of acquisition unit and acquisition of image to establish subsequent description of authentication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20190524 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20201124 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20210708 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1445734 Country of ref document: AT Kind code of ref document: T Effective date: 20211115 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602017049184 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20211110 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220310 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220310 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220210 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220211 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R026 Ref document number: 602017049184 Country of ref document: DE |
|
PLBI | Opposition filed |
Free format text: ORIGINAL CODE: 0009260 |
|
PLAX | Notice of opposition and request to file observation + time limit sent |
Free format text: ORIGINAL CODE: EPIDOSNOBS2 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
26 | Opposition filed |
Opponent name: DE LA RUE INTERNATIONAL LIMITED Effective date: 20220810 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20211231 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20211204 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20211204 Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20211231 |
|
PLBB | Reply of patent proprietor to notice(s) of opposition received |
Free format text: ORIGINAL CODE: EPIDOSNOBS3 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: UEP Ref document number: 1445734 Country of ref document: AT Kind code of ref document: T Effective date: 20211110 |
|
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230522 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20171204 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20231220 Year of fee payment: 7 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: MT Payment date: 20231124 Year of fee payment: 7 Ref country code: IT Payment date: 20231228 Year of fee payment: 7 Ref country code: FR Payment date: 20231222 Year of fee payment: 7 Ref country code: DE Payment date: 20231214 Year of fee payment: 7 Ref country code: BG Payment date: 20231221 Year of fee payment: 7 Ref country code: AT Payment date: 20231221 Year of fee payment: 7 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PL Payment date: 20231124 Year of fee payment: 7 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20211110 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20240101 Year of fee payment: 7 |